This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Exploiting Redirect Vulnerabilities

I was surfing through my friend’s forum Secworm.net and read this thread about Redirection Vulnerabilities. So I thought of sharing it with you guys.


Phishing is usually considered to be most effective when it’s combined with social engineering, the hacker term for human manipulation. One way phishing can be combined with social engineering is through the exploitation of redirect vulnerabilities. This article will demonstrate to you what redirect vulnerabilities are, how to spot them, and how they can be exploited.


So first things first. What is a redirect vulnerability? A redirect vulnerability is when a webpage uses a script to redirect you to somewhere (usually another page on the website), but they write that script in such a way that it allows a hacker to manipulate it to send you to an external page instead of an internal one. There are many types of redirect vulnerabilities, but we’ll be looking at the most basic type here for now. Example: let’s say we’re logging in to webpage that has this url:




Code:

http://www.example.com/login.php?dest=members/index.html



Let’s have a look at the url. It’s all looking pretty ordinary up to login.php, but look one step after that. See the dest=members/index.html? members/index.html is the path to the index page for logged in members, so you can determine that dest=members/index.html is a parameter that is being used by the login.php script to redirect users to the member index page after a successful login. Now if the creator of the login.php script was very security conscious, they’d make sure that the dest field could never point to a url that’s not an approved destination. However, if he didn’t know about redirect vulnerabilities, he would just write the script so that it would redirect the user to whatever address dest pointed to. In order to find which one we’re dealing with for this website, we can change the dest parameter and see how the script responds. For instance:




Code:

http://www.example.com/login.php?dest=http://www.google.com



If this page is vulnerable to redirect vulnerabilities, this it should send us to google after we log in. If not, it will generate some sort of error condition and take you to a default page. So if we change the address as specified above, log in, and find ourselves looking at google instead of example.com, then we know it’s vulnerable to redirect vulnerabilities.


Now that you know what redirect vulnerabilities are, can you see how they can be applied to phishing? Let me create a scenario to give you an idea of how redirect vulnerabilities can be used to increase the effectiveness of phishing. Imagine yourself to be a student at a university. You have a school website with the address http://www.myschool.com, and you log in to all your school services (such as mail, course info, etc) through the url




Code:

www.sys.myschool.com/login.php?service=



where the service parameter points to the address of the service being accessed, as demonstrated in the following urls:




Code:

http://www.portal.myschool.com/login.php?service=sys/mail.php

or


http://www.portal.myschool.com/login.php?service=sys/courseInfo.php




Phishers have been targeting students of your school lately, so your system administrators have sent everyone an email telling them to check the url of every webpage they log into with their school account to make sure it’s an actual school page and not a phishing page. A hacker is aware of this, and realizing that this advice will give the you and the other students a false sense of security when you’re on pages that are actual school pages, set out looking for a way to get students to access his phishing page from within the school login system itself. He sees the above urls and recognizes their potential to be vulnerable to redirect exploitation and creates a phishing page that looks exactly like your school’s page that is displayed to you when your login fails. Being a phishing page, it sends him all the login credentials of everyone who logs in through it. Once he knows that the login script is indeed vulnerable, he creates a link to his phishing page from the school login page, hoping that students will log in to the school through his link, get redirected to his fake page, enter their information again without realizing that they left the school page, and then become redirected back to their school page without even noticing that anything out of the ordinary had happened. He starts out with a link like this:




Code:

http://www.portal.myschool.com/login.php?service=http://badsite.com/fakePage.php



However, he realizes that some of the more observant students might see the external address in the url and be too wary to enter their information, so he changes his url into its hexidecimal representation, either by memory or using a tool like this one: http://secworm.net/showthread.php?tid=3, and achieves an ordinary-looking url like this one:




Code:

http://www.portal.myschool.com/login.php?service=%68%74%74%70%3a%2f%2f%62%61%64%73%69%74%65%2e%63%6f%6d%2f%66%61%6b%6 ?5%50%61%67%65%2e%70%68%70



This url gives no indication that it actually redirects students to the hacker’s phishing page, and since you see your school’s domain in the beginning, you and the students think nothing of it. The hacker then sends this link along with an email making the reader want to log in to the student database and steals all their passwords.


Hopefully this will help you understand the basics of redirect vulnerabilities and how they can be used to increase the effectiveness of phishing.


Via. www.Secworm.net

Get Your Website Secured – Free Penetration Service

The question which screw every webmaster’s mind is “How secure my website is?”. Every webmaster is very keen about their website’s security because they do not want to compromise any of the data on it. I have seen many websites getting hacked every now and then. Not only user’s personal information gets compromised but also reputation of the site goes down to zero! There are some professional Ethical hackers who provides Penetration Testing services for websites, but it costs like $500 and above to get any website tested, which not every one can afford.


I found this interesting offer while surfing through SecWorm.net. SecWorm is HackingArticle’s affiliate. Its a forum about Hardcore security and Ethical hacking. Staff of secworm is very much experienced in security field. I have seen them testing many websites and applications and helping people to secure their stuffs.


I noticed they have started this service called “FREE PENETRATION AND BETA TESTING FOR ANY TYPE OF WEBSITE!”, and I was like WHOA!, it is really a good way to help webmasters. One of the staff member of Secworm is my good friend. I asked him why would you provide such an expensive service for free. His answer impressed me, only thing he said was “SecWorm’s slogan is Human Knowledge if for the world, Support Open Source and thats exactly what we are doing.” It made sense to me.


I trust SecWorm people because they have helped me fixing few security issues with HackingArticles. So Any of you want to get your website checked you can visit www.SecWorm.net.


READ THIS TO GET DETAILED INFORMATION.

Windows 7 God Mode

4258248671 9a07685136 Windows 7 God Mode


Windows 7 is predominantly the best OS ever in the history of Microsoft. But, do you know that it has a GodMode within it ?

There is a hidden “GodMode” feature that lets a user access all of the operating system’s control panel features from within a single folder.


To enter “GodMode,” one need to create a new folder and then rename the folder to the following:


GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}


Just try it..:)


Found some more of Microsoft’s inbuilt godmode dev tools-


http://news.cnet.com/8301-13860_3-10426627-56.html


Append each of these after “FolderName.”

{00C6D95F-329C-409a-81D7-C46C66EA7F33}

{0142e4d0-fb7a-11dc-ba4a-000ffe7ab428}

{025A5937-A6BE-4686-A844-36FE4BEC8B6D}

{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}

{1206F5F1-0569-412C-8FEC-3204630DFB70}

{15eae92e-f17a-4431-9f28-805e482dafd4}

{17cd9488-1228-4b2f-88ce-4298e93e0966}

{1D2680C9-0E2A-469d-B787-065558BC7D43}

{1FA9085F-25A2-489B-85D4-86326EEDCD87}

{208D2C60-3AEA-1069-A2D7-08002B30309D}

{20D04FE0-3AEA-1069-A2D8-08002B30309D}


Example- Hacking.{ash23-ifsdf..u know now!}


Now Go and “GOD MODE YOURSELF”.

Isaac Newton on Google logo with dropping Apple

4245813026 44a8a06caf o Isaac Newton on Google logo with dropping Apple


As I was browsing Google today I noticed a new logo which Google created to honor Sir Isaac Newton. The logo has an animated falling Apple and it’s missing an “o” from it. Google usually decorates their logo whenever they want to celebrate a special day, and today happens to be one of them. Isaac Newton was born on January 4.


Isaac Newton is well known for his three laws of motion. Google created an animation of the falling Apple because that is what inspired him to come up with the gravitational formula. I’m posting it here because I know many of you here useGoogle to find our website, and you will definitely wonder why the logo is on Google. I’m also a big fan of Isaac Newton!

How to Shutdown Computer automatically Using Firefox Auto Shutdown Add-on

4222061665 632c48d187 o How to Shutdown Computer automatically Using Firefox Auto Shutdown Add onFirefox is the top most world widely used web browser. Because it is handy and have lots of features though its add-on and extension. Sometimes we download files using Firefox and on the same time we need to go for some work. So until we come back the computer waste the energy. In this situation we can use Firefox Auto shutdown the computer when downloads are completed and helps us to save electric power.


4222067729 241056e744 How to Shutdown Computer automatically Using Firefox Auto Shutdown Add on


Auto Shutdown is a cool Firefox add-on which controls your active download and shut down the computer when downloads are completed through is auto executing user script. Not only this but if Firefox is running idle it also shut downs the pc 4222074655 e22c0502ae o How to Shutdown Computer automatically Using Firefox Auto Shutdown Add onautomatically with pre defined shut down time.


If you are using Downthemall Firefox extension for downloading movies, video, music and images from web then you can easily integrate Auto shutdown Firefox extension with downthemall add-on.

Make Your Keyboard Lights Do DISCO

Keyboard Disco


Howdy Friends!


This trick just makes your keyboard lights go crazy and do disco. LoL.


The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!


1.This piece of code makes ur keyboard a live disco..


Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{CAPSLOCK}”

wshshell.sendkeys “{NUMLOCK}”

wshshell.sendkeys “{SCROLLLOCK}”

loop


2.This one makes it looks like a chain of light….


Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 200

wshshell.sendkeys “{CAPSLOCK}”

wscript.sleep 100

wshshell.sendkeys “{NUMLOCK}”

wscript.sleep 50

wshshell.sendkeys “{SCROLLLOCK}”

loop


Instructions:

*paste any of the two above codes in notepad

*Save as “AnyFileName”.vbs

*Run the file

*To stop, launch task manager and then under “Processes” end “wscript.exe


I hope u would like it..


Feel Free To Share This Post!

Wordpress 2.9 Carmen Now Available

4196599585 d3383d3e2a Wordpress 2.9 Carmen Now Available


Howdy Wordpress Lovers!


I woke up in the morning today and as usual I logged into my Wordpress admin account and guess what,


I saw this on the top of my admin panel:


4197359026 e9c1a86fc5 o Wordpress 2.9 Carmen Now Available


Hell yeah! Wordpress 2.9 has just been launched today. Its called “Carmen” [named in honor of magical jazz vocalist Carmen McRae].


This was the most surprising update for me as Wordpress released the ‘Wordpress 2.9 RC’ just 2 days back. So what’s new in this version? How is it different from the older ones? Wordpress answered these questions like this:



1. Global undo/”trash” feature, which means that if you accidentally delete a post or comment you can bring it back from the grave (i.e., the Trash). This also eliminates those annoying “are you sure” messages we used to have on every delete.


2. Built-in image editor allows you to crop, edit, rotate, flip, and scale your images to show them who’s boss. This is the first wave of our many planned media-handling improvements.


3. Batch plugin update and compatibility checking, which means you can update 10 plugins at once, versus having to do multiple clicks for each one, and we’re using the new compatibility data from the plugins directory to give you a better idea of whether your plugins are compatible with new releases of WordPress. This should take the fear and hassle out of upgrading.


4. Easier video embeds that allow you to just paste a URL on its own line and have it magically turn it into the proper embed code, with Oembed support for YouTube, Daily Motion, Blip.tv, Flickr, Hulu, Viddler, Qik, Revision3, Scribd, Google Video, Photobucket, PollDaddy, and WordPress.tv (and more in the next release).


Well there are more new features and tweaks but the above mentioned are the BIG ones!

Are you a Wordpress fanatic?

So what are you waiting for? Go ahead and try “CARMEN”!


Download Wordpress 2.9

Yes, I need to tell you one more important thing.


Don’t forget to take a backup of your blog before you upgrade your Wordpress!


Happy Blogging!


Feel Free to share this post!