Posts

Security with Block Chain Technology:Part 1

Image
Penetration Testing and Security Audit of Block Chain Technology: By- Samrat Das      Block chain overview: Block chain in the simplest of terms can be defined as a chain of the block that contains information. The basic fundamental relies on timestamping digital documents to prevent backdating them or tampering them. Why is block chain used? Block chain is used for the secure transfer of a variety of things including money, property, contracts, etc. but the facility of no third-party intermediary needed like bank or government. The downside or rather advantage being once a data is recorded inside a block chain, it becomes very difficult to change. Protocol Concepts: Block chain is a software protocol which needs the Internet as a medium to run as a meta-technology. It is made up of: database, software and connected computers. Features of block chain: ·          Resilience: Replicated architecture, the advantage of block chain is even in cases of DOS attack

Malicious File Upload- Intex Router N-150 | CVE-2018-12528

Image
By- Navina Asrani Hi Readers, Recently while tinkering with my wifi router, I was curious to find if it has possible loopholes and vulnerabilities. Curious to explore its functionalities, I started probing with the options. Title of the Vulnerability:   Malicious File Upload Vulnerability Class: Firmware Compromise/ File Upload Technical Details & Description: The firmware allows malicious files to be uploaded without any checking of extensions and allows filed to be uploaded. CVE ID allocated: - CVE-2018-12528 Product & Service Introduction: InteX Router Steps to Re-Produce – 1.        Visit the application 2.         Go to the advanced settings post login 3.        Under backup- restore page upload any random file extension and hit go. 4.        Upon the file being upload, the firmware will get rebooted accepting the arbitrary file. Exploitation Technique: A attacker can upload malicious files to compromise the firmware. Severity

Cross Site Request Forgery- Intex Router N-150 | CVE-2018-12529

Image
By- Navina Asrani Hi Readers, Recently while tinkering with my wifi router, I was curious to find if it has possible loopholes and vulnerabilities. Curious to explore its functionalities, I started probing with the options. Title of the Vulnerability:   Cross Site Request Forgery Vulnerability Class: Code Execution/ Privilege Escalation Technical Details & Description: The firmware allows malicious request to be executed without verifying source of request. This leads to arbitrary execution with malicious request which will lead to the creation of a privileged user. CVE ID allocated: -  CVE-2018-12529 Product & Service Introduction: Intex Router Steps to Re-Produce – 1.        Visit the application 2.         Go to any router setting modification page and change the values, create a request and observe the lack of CSRF tokens. 3.        Craft an html page with all the details for the built-in admin user creation and host it on a server

Cross Site Request Forgery- Frog CMS CVE ID : CVE-2018-8908

Image
Cross Site Request Forgery- Frog CMS By- Samrat Das Hi Readers, Recently while performing some open source security assessment, I came across an CMS Application, “Frog CMS” . Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’. Title of the Vulnerability :  Cross Site Request Forgery Vulnerability Class : Code Execution/ Privilege Escalation Technical Details & Description : The application source code is coded in a way which allows malicious HTML request to be executed without veryifying source of request.This leads to arbitary execution with malicous request which will lead to the creation of a privileged user. CVE ID allocated : -  CVE-2018-8908 Product & Service Introduction : Frog CMS Steps to Re-Produce – 1.       Visit the application 2.       Visit the Add Users Page. 3.       Craft an html page with all the details for an admin user creation and host it on a server 4.       

What are the initial steps to become a hacker?

Image
As all say, the basics are what takes you ahead! For being a hacker (a real one) 1. Learn to program Learning to make your own tools is a must for a hacker, start with learning C/ Python. Upon advancing get hands dirty with Ruby/ Perl. These will help you make scripts to automate attacks and create tools. Reason:  Being a hacker means building your own tools to automate attacks, fuzz through input fields, and create tools customized for different environments according to the scenario. Once you are adept at this, learn at least one server-side language ( preferably PHP, otherwise JSP/ ASP) At a glance, the languages you need to be good at least in basics: 1) C Programming (for low-level attacks such as buffer overflow/ memory attacks) 2) Java Programming ( helps code quickly tools for security testing) 3) Powershell ( much needed for exploitation on Windows and Red Teaming attacks) 4) Python ( a much hand scripting language needed for automating scripts/ writing explo