Bypassing Firewalls: Tools and Techniques

February 25, 2010
Protocol Tunnelling
A protocol tunnel encapsulates one protocol inside another. Tunnelling is a general
technique which can be used to carry a protocol across a foreign network. It is often
used to join two isolated networks with a private bridge across a public network,
forming a VPN (Virtual Private Network). Most commonly, IP traffic is encrypted and
encapsulated in a TCP stream, which is carried across the public Internet between two
remote sites.
Any protocol can be exploited for tunnelling. The only requirement is that the
protocol is permitted by any firewall that sits between the tunnel end points. Protocols
like SMTP and HTTP generally satisfy this requirement. Others, like ICMP-ECHO
(the “ping” protocol), are also allowed by most configurations.
Bypassing Firewalls
A protocol tunnel can turn an application layer protocol (such as HTTP, or SMTP) into
a transport layer protocol. This can make it very hard for the firewall to reason about
the traffic passing through it.
One tool designed to exploit this fact is GNU httptunnel, which is available under
GNU Public License. This tool creates a point-to-point HTTP tunnel, but it can be used
in conjunction with other software (such as SSH and Telnet) to provide unrestricted
access through a firewall. Users at sites with restrictive firewall policies can enable
protocols that are blocked by tunnelling them through HTTP.
The obvious problem caused by tools such as this is that the firewall policy no
longer dictates the overall security policy. Although users must take a conscious decision
to invoke applications like htc and hts1, it is ultimately the users who can decide
which particular protocols will cross the firewall.
Simple Tunnel
Far more nefarious scenarios are possible, such as one demonstrated recently at BT
Laboratories. The Simple Tunnel2 is another general purpose tunnel developed independently
to GNU httptunnel, but at about the same time. It was built as part of a
demonstrator, designed to highlight the threat that tunnelling poses to network security
Like GNU httptunnel, the Simple Tunnel also uses HTTP as a transport, although it
could easily be extended to almost any client-server protocol. However, it is packaged
as a library and not as an application—it is designed to be built in to other applications.
This library, called libtunnel, provides a channel for passing arbitrary messages
between the tunnel endpoints. This messaging system can be used in higher level libraries
and applications, for communicating with a remote host.
The operation of the Simple Tunnel is illustrated in fig. 1. The client and server
queue messages at each end of the tunnel. The client makes periodic connections to
the server. These connections are HTTP-like, in that the exchange follows the basic
protocol of [7]. The algorithm used by the client is as follows;
1. If the client has messages to send, it makes an HTTP POST request to the server.
The messages are encoded and sent in the body of the request3. Otherwise,
2. if the client has no messages to send, it makes an HTTP GET request to the
server.
3. If the server has any messages to send, they are encoded and returned in the body
of the response

Fuck off….China shuts down training website for hackers

February 25, 2010
China has closed down what is believed to be the country’s biggest training website for hackers, state media has reported.
They say the site, Black Hawk Safety Net, gave lessons in hacking and sold downloads of malicious software.
The reports say three people suspected of running the site were arrested.
Hacking is a sensitive topic for China, especially since the internet giant Google recently threatened to pull out of the country.
Google said China-based hackers had attacked its operations but the Chinese government denied any involvement.
The hacker training operation openly recruited thousands of members online and provided them with cyber attack lessons and Trojan software, the China Daily and the Wuhan Evening News said.
Trojans, which can allow outside access to a computer when implanted, are used by hackers to illegally control computers.
Black Hawk Safety Net recruited more than 12,000 paying subscribers and collected more than seven million yuan ($1m: £650,000) in membership fees, while another 170,000 people had signed up for free membership, the paper said.
The Hubei government refused to comment on the reports.
It was unclear when the shutdown had taken place but the Black Hawk Safety Net site was unavailable on Monday.
Cyber attacks
In January Google threatened to pull out of China unless the government relented on censorship.
It said it had uncovered a computer attack that tried to plunder its software coding and the e-mail accounts of human rights activists protesting against Chinese policies.
Government officials have defended China’s online censorship and said the country is the biggest victim of web attacks.
China has some 350 million internet users – more than any other country – and provides a lucrative search-engine market worth an estimated $1bn last year.
Google holds about a third of the country’s search market, with Chinese rival Baidu having more than 60%.
The BBC’s Damian Grammaticas in Beijing says that the reports made no link between the hacking site and Google’s allegations.
But the case will help authorities show that China is taking action against those who hack into computers, says our correspondent.

Inviting Applications,India Resumes | 3G Auction | Process, Inviting Applications

February 25, 2010

 India started the process pro auctioning 3G and broadband wireless access (BWA) licenses again on Thursday, but it has scaled back the digit of licenses up pro bidding.

The auction was postponed since January continue time.

The government has resolute to auction pro 3G three blocks of 5MHz of paired spectrum in the 2.1GHz belt in 17 of the country’s 22 service areas, with four blocks up pro bidding in the remaining five service areas.

Last time, the government had indicated with the intention of four blocks of spectrum would be auctioned to the confidential sector in generally of the service areas, but it has trimmed down the digit of licenses reportedly since the country’s defense ministry could not be able vacate spectrum in calculate pro the confidential sector entrants.

A block of spectrum in all service areas has already been agreed to two government-owned telecommunications service providers. They will be paying a license fee equivalent to the highest proffer in the public sale pro all service area. The two companies — Mahanagar Telephone Nigam Limited, and Bharat Sanchar Nigam Limited — be inflicted with already rolled made known services in approximately parts of the country.

Inside the justification of the BWA Auction, the government diplomacy to public sale two blocks of 20MHz unpaired spectrum in all of the 22 service areas. A third check has been modest in all the service areas pro the government-owned companies.

India’s Department of Telecommunications (DOT) on Thursday issued a notice appealing applications pro the auctions, a time with it announced a revised schedule pro the public sale.

The 3G public sale is currently scheduled pro April 9. The BWA public sale is scheduled to be held two days with the completion of the public sale of 3G licenses.

Both Indian and foreign companies can proffer in the auctions, though winning foreign bidders will be inflicted with to offer 3G services through Indian establishment ventures in whicbrandolding is a most of 74 percent.

=========Vulnerability Research================

February 25, 2010

Looking for vulnerabilities and exploiting them tends to be the longest
and most laborious part of an ethical hack. However, you are more
likely to have success in gaining elevated access to a system by
exploiting a vulnerability in an application or service, than by any other
method.
Publicly known vulnerabilities are announced in two main ways:
• Fix Advisories
• Full disclosure Advisories

Fix Advisories
Fix advisories warn of a vulnerability, but may not necessarily contain
the actual exploit code for them. They will usually advise the recipient
that an exploit exists for a certain vulnerability and provide details of
how to resolve the issue. These types of announcements are usually
made in conjunction with the software developer.

Full Disclosure Advisories
There are a number of full disclosure mailing lists available for public
subscription. The most well known of which is Bugtraq. In addition to
warning of a vulnerability in a product they will often contain details of
how to exploit the vulnerability. Either in the form of source code or, in
the case of HTTP vulnerabilities, exact details of what data to send to
port 80 on the vulnerable machine.

Application Errors
One of the most common ways to exploit a system is to take advantage
of application errors. For instance, an old version of the UNIX sendmail
SMTP server allows any file on the remote system (e.g. the shadowed
password file) to be e-mailed to an attacker.
More recently, an old bug has re-surfaced thanks to the growing
number of HTTP interfaces to various applications. This bug is known
as the root-bug. In effect, the vulnerability allows you to read any file
on the remote file system irrespective of whether or not the requested
file is within the webroot directory. One of the most common
applications open to the vulnerability is Compaq’s Insight Manager
’utility’.
If an administrator on the remote system has run the rdisk utility, then
by simply going to http://victim:2301/../../../winnt/repair/sam._
will allow the attacker to retrieve the remote system’s SAM file (in
compressed form). This can then easily be imported into a tool such as
L0phtcrack and the account details and passwords gained.
There are two main ways to discover application errors:
• Automated Tools
• Manual Checking

AMD | Bulldozer (processor)

February 25, 2010
Bulldozer is the codename AMD has given to one of the next-generation CPU cores after the K10 microarchitecture for the company’s M-SPACE design methodology, with the core specifically aimed at 10 watt to 100 watt TDP computing products. Bulldozer is a completely new design developed from the ground up and is a part of AMD’s K11-series CPU. AMD claims dramatic performance-per-watt improvements in HPC applications with Bulldozer cores.[1]  Products implementing the Bulldozer core are planned for release in 2011.
The Bulldozer cores will support most of the instruction sets currently implemented in Intel processors (including SSE4.1, SSE4.2), future Instruction sets announced by Intel (AES, PCLMULQDQ and AVX), as well as future instruction sets proposed by AMD

As of November 2009, Bulldozer-based implementations built on 32 nm are scheduled to arrive in 2011 for both servers and desktops, as the 16-core Opteron processor codenamed Interlagos and as the 4- or 8-core desktop processor codenamed Zambezi.

The design of Bulldozer is heavily revamped from the previous generation. With Bulldozer, the two 128-bit FMA-capable FPUs can be combined into one 256-bit FPU. This design is accompanied with two integer cores each with 4 pipelines (the fetch/decode stage is shared). AMD calls this design a “Bulldozer module”. A 16-core processor design would feature eight of these modules, but the operating system will see each module as two physical cores.

scanning ports with different source ports

February 25, 2010
This is just some quick script I hacked up to scan TCP ports using different source ports. The aim of the script is to find badly configured firewalls that allow traffic from certain source ports. This is for instance explained in the NMAP book. I’ve done it in scapy (yeah I know python ones again) and still admire scapy, it’s a wonderful piece of software. Here are some nice references if you decide to write your own networking stuff in scapy:

#   – http://www.secdev.org/projects/scapy/doc/usage.html
#   – http://www.secdev.org/conf/scapy_pacsec05.pdf
#   – https://cs.uwindsor.ca/~rfortier/CRIPT/uploads/slides/Python_Scapy.pdf

You can find the source here.
I chose manual output analysis, this means that the script doesn’t have any logic whatsoever and you will have to decide, if it allows or doesn’t allow traffic from different source ports yourself. Example output:

Received 34 packets, got 8 answers, remaining 28 packets
srcport, dstport, flags, humanflags
20,80,18,[‘SYN’, ‘ACK’]
20,443,18,[‘SYN’, ‘ACK’]
53,80,18,[‘SYN’, ‘ACK’]
53,443,18,[‘SYN’, ‘ACK’]
67,80,18,[‘SYN’, ‘ACK’]
67,443,18,[‘SYN’, ‘ACK’]
88,80,18,[‘SYN’, ‘ACK’]
88,443,18,[‘SYN’, ‘ACK’]

Hope it’s also useful for someone out there.

oh oh oh ….ImageShack was hacked… …….

February 25, 2010
Equally approximately of you may have noticed, news in this area ImageShack being hacked has started to circulate now. While I tried to think it over this for myself, part of the damage has been fixed; I say part since the ImageShack blog still throws database connection errors…

Even if this could be inflicted with been worse for users who store their images here (myself included), here is more to it than meets the eye.

Like the attack on Astalavista, this lone was furthermore performed by the anti-sec group (groups, here may possibly be more) and single makes me think here will be more attacks.

The message which was present on ImageShack’s website with the attack.

Equally you could be inflicted with read their manifesto, hacking ImageShack does not conform to their goal…

    How do we plan to achieve this? Through the full and unrelenting, unmerciful abolition of all supporters of full-disclosure and the security industry in its present form. If you own a security blog, an exploit periodical website or you distribute one exploits…

Furthermore, they don’t think it over the irony of their events. The more they are vacant to hack security unrelated websites (like ImageShack) the more are they vacant to apply FUD. And it’s needles to say with the intention of more FUD equals more bring about pro the whitehats with the intention of they so much despise.

And they are good at spreading FUD! After the Astalavista hack OpenSSH exploit FUD spread online like plague.
The only way I would go about vulnerability disclosure would be trough responsible one… Mentioning that I would be responsible only if the given vulnerability could affect me; otherwise I wouldn’t really care… that’s just me.
Even with all that said, there is one common ground where I can relay with them, concerning PoC code that script kiddies copy-pasta for mass sploitation… PoC should be only left for innovative/new techniques and not for every *dangerous* exploit out there.
Like any online movement it has it’s pros and cons; some didn’t/don’t understand the: VX, Zeitgeist, Anonymous (it is a movement, sort of) or any other movement; so why understand the Anti-sec one, right?

ATI Radeon Drivers And ATI Radeon Graphics Processing Units

February 25, 2010

Do you like record games? Most public who are into computers sort out. Whether it’s a role before a live audience game contaminated with monsters and treasure, or a simulator with the intention of allows you to know could you repeat that? Short a real airplane is really like, record games be inflicted with captured our imagination (and our money) pro decades.

Download ATI Radeon Drivers Updated Tool

Video games be inflicted with increased in quality and content with calculate. Far are the days everywhere a check represented a globe (remember Pong?). Today, complete kingdoms rich in point occur alive on our computer monitors. And with 3D renditions, you can think it over almost one object or character from one top of check over.

Of way, pro such graphics to take place previous to our eyes, we need to be inflicted with the hardware and software to match the supplies of such record games. Fortunately, ATI has been dedicating itself to correctly this very business pro years.

ATI Radeon graphics dispensation units and ATI Radeon drivers be inflicted with been powering our CPUs pro approximately years currently. They are the ones with the intention of take trouble of all persons cool looking 3D renditions with the intention of we love to think it over on videogames. ATI Radeon graphics dispensation units sort out all the distinguished well ahead and fast processes with the intention of are vital pro 3 D graphics, taking this burden from the computer’s CPU. ATI Radeon drivers are the ones with the intention of join and “translate” the in rank from the dispensation units to the CPU.

While the graphics dispensation units are self-determining, ATI Radeon drivers need to be urban pro a point type of operational logic or platform. If you take into tab all the versions of Windows with the intention of Microsoft has released, that’s already several ATI Radeon drivers with the intention of are looked-for.

This ordinarily isn’t a conundrum since ATI graphics dispensation units and their respective drivers occur with the notebook. The conundrum arises as you try to bring up to date your notebook or your drivers, ordinarily since you aspire to install or be inflicted with installed a extra record game with the intention of has much privileged graphics dispensation supplies than the ones your notebook can soubriquet.

The easiest way to soubriquet this is to make lone of persons extra programs with the intention of involuntarily bring up to date the drivers in your notebook. I discover them exceptionally helpful since they bring up to date ALL drivers in your notebook, not single ATI Radeon drivers. They save you tons of calculate (and frustration if you don’t know how to install drivers) and their prices are very reasonable.

Lastly, their biggest benefit is with the intention of they make you a working driver each calculate. A ration of calculate, the drivers with the intention of you discover on Internet don’t bring about, leaving you wondering if the conundrum is with your CPU, your graphics dispensation element, or the newly installed driver.

How to Find real and trustworthy SEO Company

February 25, 2010
A SEO servicerealmpanytrustworthyable pro creating traffic and status in one’s website. They are furthermore reliable in monitoring and making guaranteed with the intention of the traffic and status is maintained pro a cycle of calculate. Because of this, here are a ration of extra SEO companies
With the intention of are tiresome to create first name in the industry. Most of them are really real and tricky working but here are furthermore persons who solely wanted to scam and earn money from other public.

The aid of Internet
Is diffusion fast all ended the planet. Almost all transactions are currently being made ended the Internet and so a ration of businesses be inflicted with ongoing to create their websites. They discover generous traffic with Internet users. Some even say with the intention of it is cheaper to promote and create advertisements ended the Internet than in other forms of media. Inside order to realize the traffic, the website owners look pro the help of SEO companies. The SEO company provides the aptly elements to get on to your website striking to your target audience. It uses several tools to catch the attention of public and to check the products and services with the intention of you are offering on your locate.

The fee pro the services of a SEO company is competitive. It can produce one website title-holder a run pro their money. Once you discover the aptly SEO Company pro you, you are guaranteed with the intention of the fee you paid pro is compensated. But could you repeat that? If you were able to make the services of a fake or scam SEO Company?

Inside order to prevent this business to take place, you must be cautious in looking pro the looked-for SEO Company. There are approximately tips with the intention of you can consider previous to grabbing the initially SEO Company with the intention of offers you their services.

1. Avoid getting SEO companies with the intention of hurl their advertisements through scam emails. If an SEO company sent you an email informing you of the services with the intention of they offer, at that time sort out approximately investigate in this area them. This is the early tactic of scam companies. Other dependable SEO companies sort out not need to advertise themselves since their clients converse in pro them. Satisfied clients will really be too lucky to share to others the services with the intention of they expected from their SEO Company. They will surely refer them to acquaintances and associates with the intention of need their services as well. It is better to inquire from SEO Company with the intention of is referred to you than from persons with the intention of you solely expected emails from.

2. Do not bite to the SEO Company’s look good of achieving distinguished rank at once with you acquired their services. This is indeed an appealing offer but you must watch made known. It is not straightforward to realize a digit 1 rank in the span of two-weeks or a reduced amount of. It requires a ration of talent to realize this goal. You can expect to advance a distinguished rank with the help of the SEO Company but it requires calculate to realize it. It is better to energy pro the low but continuously tender up rank very than the fast distinguished rank but made in illegal style.

Most of the SEO Company with the intention of offers this tactic is scammer since they are using the black hat tactics to make their preferred rank. These SEO Company furthermore look after to aid “cloaking” deal with with the intention of can cause you to be penalized and indifferent from major search engines
Some time ago they be inflicted with found made known in this area it.

3. The relatively low fee compared with the distinguished promises with the intention of they offer. The bring about made by the SEO Company is deadly so they need to be compensated pro it. No topic how skilled they are in the service, they still need to ask pro a competitive fee pro the bring about with the intention of they are willing to offer. Inside detail, more famous SEO company tends to assemble privileged fees since they are already aware of the tricky bring about with the intention of they will sort out to get on to website a better place pro traffic. But here are instances as extra SEO Company can offer low fee since they are still early and wanted to get on to first name and referral from clients. You can opt pro their services but be wary with the intention of you be inflicted with to visage the expose of taking it.

4. Investigate and energy pro SEO company corrupt on referrals and confirmation. If the SEO company claims a locate with the intention of they worked with, check pro their codes or logo on the specified locate. If you cannot discover lone, you can permanently inquire from them to verify with the intention of they are indeed clients of your prospective SEO Company.

Looking pro scammers is not straightforward but if you are single-minded to discover a skilled SEO services company, there’s permanently a better option pro you to locate lone.

123 hard cash Formula Review :: Make cash Power

February 25, 2010
  Money is in the list” ringing in each internet marketers
Ears, it’s hard not to take it sincerely.

I beleve all must build there own lists! Definatly if they are serious in this area making money online!

As you’re probably aware a “list” is simply a collection of subscribers who be inflicted with agreed you their first name and email take up. Usually in chat pro a gift or helpful info. You might offer a newsletter on a theme significant to the content of your locate pro occasion. Once these public are on your catalog, you can hurl them emails and if you sort out it aptly, earn connect commission
From sales of products you preside over your subscribers to.

OK so far aptly?

And this all sounds splendid, but you’re probably asking how sort out you build a catalog? What sort out you need? How sort out you make public to sign up?

How sort out you hurl them messages? What sort out you say? What sort out you advertise?

Questions questions! Don’t agonize, I be inflicted with all the answers pro you. Well to be exact, the answer to all these questions and more can be found in a extra manufactured goods called 1-2-3 currency Formula.

I really rate this manufactured goods since it’s a complete step by step handbook which shows you how to fit up your very own catalog building website. Nothing is missing made known. And you don’t even be inflicted with to agonize if you’ve by no means built a website, since it includes a fit of distinguished quality catalog building websites you can call your own.

I be inflicted with noticed with many other products, the quality of the assets leaves a ration to be desired. Not so with the 123 currency Formula. I was amazed by the quality of the built-in sites. Very kind indeed. This really is a complete A to Z handbook. Just take a look by could you repeat that? You make:

· A collection of videos to handbook you through setting up your own profitable opt-in leaf. (I planning these were splendid. Really straightforward to stay on along as you can bring to a standstill and start them as you need)

· A fit of amazingly distinguished quality catalog building websites and satiated directions on how to personalise them. (You’ll be proud to deposit your first name on these)

· How to assemble names and emails from your locate on complete autopilot . . . Even while you take a nap! (ALL the lofty internet marketers aid this practice to add to their layer accounts 24/7)

· Exactly how to get on to the generally of the subscribers who join your catalog. (Do this aptly and you’ll be earning from the same subscribers pro years to come)

· Not solely could you repeat that? To enter in your messages but an real fit of messages pro you to profit from at once. (With the amount of calculate and brainpower this saves, I planning this was worth the fee alone)

· How to make tons of embattled traffic to your locate, completely emancipated. (Without this, your locate is exhausted in the water)

There are marketers online with lists of 50,000, 100,000 even 500,000 public. Can you even commence to imagine the earning power of their lists?

Send an email to 50,000 public with your connect link in it and discover made known! If single 20% (10,000) clicked on the link in your message and single 1% of persons bought, that’s 100 sales. Multiply with the intention of by however much you would earn as an connect, let’s say $30, and you’ve solely earned a cool $3000. For carriage an email!

So, if you’re looking pro a fast way to make ongoing making money online, or you aspire to add to your online empire, this is it. And don’t not remember with the intention of the splendid business is you can take up again earning from the same traffic pro years to occur. List building really is the formula pro earning cash as straightforward as 1-2-3.