<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Abeon Tech</title>
	<atom:link href="https://abeontech.com/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://abeontech.com/security/</link>
	<description>Sardonic infosec.</description>
	<lastBuildDate>Sun, 08 Aug 2021 03:32:40 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://abeontech.com/wp-content/uploads/2021/07/cropped-android-chrome-512x512-1-32x32.png</url>
	<title>Security Archives - Abeon Tech</title>
	<link>https://abeontech.com/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">4629696</site>	<item>
		<title>An XSS attack in action</title>
		<link>https://abeontech.com/security/xss-attack-action/</link>
					<comments>https://abeontech.com/security/xss-attack-action/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Fri, 06 Sep 2019 10:49:39 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">https://wp.nkdev.info/squadforce/?p=162</guid>

					<description><![CDATA[<p>Teh Cookie Monster. A full example of how XSS can lead to full account takeover. </p>
<p>The post <a href="https://abeontech.com/security/xss-attack-action/">An XSS attack in action</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cross site scripting attacks, commonly called XSS, are becoming more and more prevalent as the power of JavaScript has evolved way beyond simple DOM manipulation. Using the power of embeded JavaScript can be beneficial for an attacker for several reasons including…</p>



<ul class="wp-block-list"><li>HiJacking login sessions (covered in this article)</li><li>Inserting malicious code</li><li>Using resources of your visitors/website</li><li>Inserting links to undesirable websites</li><li>Stealing sensitive information</li></ul>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS? It’s just a popup!</h2>



<p>The common misconception of XSS attacks is that they are benign and of no real significance. Injecting HTML and JavaScript into a page was, once upon-a-time, fairly pointless and meant little more than funky stuff happening to the user inputting the malicious data. The power of JavaScript and now HTML, with offline storage and heavy inbuilt DOM manipulation, has grown exponentially over the past few years.</p>



<p>There are many notable instances of malicious JavaScript deployment being used for exploitation very effectively. <strong>Cross Site Scripting</strong> attacks have been used against the majority of big social media websites, among others, with notable mentions including…</p>



<p>Twitter suffered an <a href="http://www.securelist.com/en/blog/2276/Twitter_XSS_in_the_wild" target="_blank" rel="noreferrer noopener">account hijacking exploit</a>, which snared well over 100,000 Twitter accounts. A recent <a href="https://web.archive.org/web/20150919215550/http://www.hotforsecurity.com/blog/xss-exploit-that-steals-yahoo-mail-cookies-sold-for-700-4544.htmlkies-sold-for-700-4544.html" target="_blank" rel="noreferrer noopener">Yahoo XSS exploit</a> lead to many comprimised accounts but the true number is unknown.</p>



<p>FaceBook has been plagued by vulnerabilities, mostly due to it’s popularity. A notable FaceBook XSS flaw was recently discovered in it’s insant messaging JavaScipt handling which could lead to full access to the target’s private messages. Gmail has been susceptible to several stored and reflected Cross Site Scripting attacks over the past few years. A vulnerability was introduced when <a href="https://web.archive.org/web/20160322194307/http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/" target="_blank" rel="noreferrer noopener">Google+ integration</a> was rolled out and lead to complete account takeover.</p>



<p>Anonymous recently used very simple JavaScript deployment in a very effective manner by inserting a script called “The Hive”, which is a JavaScript based Ddos tool. The aim was simple: take down a well known, and possibly highest value target of all; the Department of Justic. They were successful and it required very little resources compared to previous Ddos attacks.</p>



<p>There are many more examples, but that should be enough to scare even the laziest developers.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">An XSS Cookie Stealer In Action</h2>



<p>The process of hijacking a user’s session is fairly straight forward but the required code usually takes a little tweaking, depending on the target. The idea is simple: find a point to inject JavaScript, get someone with escalated permissions to visit the page, log their information and replace your current login with theirs.</p>



<p>The attackflow is simple:</p>



<ol class="wp-block-list"><li>Find a vulnerability</li><li>Create a payload</li><li>Entice an admin/staff/user to visit the desired URL</li><li>Clone their session or cookie</li><li>Login as victim (Admin?)</li><li>???</li><li>Profit!!!</li></ol>



<p>Ok so jokes of profit aside, the code required to be deployed on the target site is usually minimal as most of the work happens in a small script used to capture the data. Only two files are required – one to process the data and one to store the logged information (it could be combined into one file, but this is an example on protection… Not skiddie copy/pasta material!).</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Introducing “Teh Cookie Monster!”</h2>



<p>I spent some time creating a simple cookie logger to demonstrate how this attack could take place. The main script — “cookie-monster.php” — will handle the data collected and “cookie-jar.txt” will simply log the cookies and other information we grab.</p>



<p>The aim of the script was to log all cookies from our target site to a file and allow them to be viewed. The code below is a modified working example that we use internally to help with penetration testing and script hardening.</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/f3d0004120f9aaa8bb644a23a2e1970c" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p><strong>File: cookie-monster.php</strong></p>



<p>In order for the above code to work we need to embed some pretty simple JavaScript into our target website…</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/aaf427b4c38f1c32f75308a4107da42b" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p>The line of code above will load our script as a blank image and appear to do nothing to the user. The cookie-monster.php script will grab the visitors cookie along with other data, then save it to cookie-jar.txt for later viewing. This could be expanded to return a valid image.</p>



<p>We have our code and we know what to do, so let’s use <a href="https://dvwa.co.uk/" target="_blank" rel="noreferrer noopener">Damn Vulnerable Web Application</a> as an example. I have it installed on my localhost and have two accounts – “admin” and “abeon”. I login as “abeon” and create a malicious URL to send to “admin”. This is where the uber-l337 hacking skillz come in handy… We have to make the page attract the admins attention without causing alarm. There are many tactics but an effective one seems to be pretending to report an issue, so kind of break the page but leave it intact enough so as to not arouse suspicion.</p>



<p>Something like this should do…</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/ad6da9c0424aa789dee87e29cd1b7466" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p>Yup, that’s right. A long and ugly URL which is only partially encoded and not very well. This is intentional as the user will see the “I BROKE IT” message clearly but will probably miss the script tags. There are many ways to obfuscate the payload such as mixed encoding, internal redirect, URL shortening services, external retrieval and more.</p>



<p>cookie-monster.php will log the information when someone clicks the link and display the saved data. View the cookies by visiting the script’s URL with the mode set as 1 and password as defined at the top of the script:</p>



<div class="wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<pre class="wp-block-code"><code>http:&#47;&#47;example.com/cookie-monster.php?mode=1&amp;pswd=123-derpy_skid-321</code></pre>
</div>
</div>



<p>There are many ways to edit cookies but browser plugins are the most popular. <a href="https://chrome.google.com/webstore/detail/editthiscookie/fngmhnnpilhplaeedifhccceomclgfbg">Edit this cookie</a> is a useful cookie editor plugin for Chrome. <a href="https://addons.mozilla.org/en-US/firefox/addon/cookie-quick-manager/">Cookies Quick Manager</a> is very similar, but for FireFox.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Protecting Against XSS Attacks</h2>



<p>Defending against Cross Site Scripting attacks is handled in a similar way to most other forms of exploitation: validation and sanitization of all data is a must!</p>



<p>The best way to defend against malicious user input is to validate any data that could cause harm, such as checking for a valid email address or phone number, and sanitize any data that is displayed back to the user by converting to benign code.</p>



<p>PHP’s inbuilt htmlentities and htmlspecialchars functions handle both tasks in a very similar fashion. htmlspecialchars converts only 5 characters while htmlentities will convert any HTML characters into their representative counterparts. For this reason, it’s advisable to use htmlentities with both ENT_QUOTES and UTF-8 flags set as below.</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/77270a0bf96d94af43b6dd11640fd16b" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p>Setting ENT_QUOTES will convert both single and double quotes which is essential as both can cause serious problems for security. Using the UTF-8 encoding flag is also very important when using ENT_QUOTES as it defines the encoding used and can help to prevent bypassing using obfuscated code.</p>



<p>A final word of warning:<br>This example focuses on reflected XSS attacks. A <a href="https://abeontech.com/security/scoot-sun-independent-xss/">stored XSS vulnerability</a> can be far more damaging as any visitor to the site can be affected &#8211; not just those visiting malicious links.</p>



<p>The biggest offender for XSS attacks is without a doubt search forms. Any data a user can alter should be considered a potential risk. Creating validation and sanitization functions through which data can be passed is always easier and more reliable than adhoc coding. There are frameworks and pre-built classes specifically for validation but altering or further developing these can be difficult.</p>
<p>The post <a href="https://abeontech.com/security/xss-attack-action/">An XSS attack in action</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/xss-attack-action/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">162</post-id>	</item>
		<item>
		<title>Hacking My Bank. For teh lulz.</title>
		<link>https://abeontech.com/security/hacking-bank-secure-mortgage/</link>
					<comments>https://abeontech.com/security/hacking-bank-secure-mortgage/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Sun, 10 Jul 2016 23:58:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1</guid>

					<description><![CDATA[<p>I lost count how many exploits I found in my bank. They have a huge attack surface. </p>
<p>The post <a href="https://abeontech.com/security/hacking-bank-secure-mortgage/">Hacking My Bank. For teh lulz.</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have around 17 years experience making people feel bad by finding errors in their code. I like to think I&#8217;m pretty good at it.</p>



<p>My computing hobby developed into a career in internet marketing as services moved online. Converting knowledge from my hobby to improve the efficacy of marketing campaigns was easier than hacking banks&#8230; Or so I thought. I was recently employed by the leading marketing agency located in Brighton.</p>



<p>They are owned by a large multinational conglomerate which reported an anual revenue of $10 billion in 2014&#8230;</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class=" responsive-embed responsive-embed-16x9 embed-youtube"><iframe title="Austin Powers - 100 billion dollars" width="1140" height="855" src="https://www.youtube.com/embed/jTmXHvGZiSY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div>
</div></figure>



<h3 class="is-style-squadforce-decorated wp-block-heading">For Lulz &#8211; And To Protect My Mortgage</h3>



<p><em>Legal disclaimer:</em> I believe in following the laws of both the UK and host country when conducting security research. As the UK is one of the most oppressive regimes for a white hat hacker, it&#8217;s a good starting point from which I must restrict my activities. Jail isn&#8217;t fun. Been there. done that, got the t-shirt. The t-shirts itch.</p>



<p>Most white hat hackers publicise posts to show weaknesses in big institutions, demonstrate skill and/or gloat. If I&#8217;m being honest, I <a href="http://abeontech.com/security/mocking-military-hacking-hackers/" target="_blank" rel="noreferrer noopener">mocked the military</a> more because I could than I wanted them to fix the issue.</p>



<p>I looked into security risks with Barclays for two reasons; I have a mortgage with them and I worked on their marketing campaign. A security breach would have been both professionally and personally inconvenient. I also assumed banking security had moved on from the days of <strong>sa:blank</strong>.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">The &#8220;SSL = Secure&#8221; Myth</h3>



<p>My initial research into the Barclays websites was fairly brief and in preperation for a job interview. It was obvious that the SSL implementation was very insecure and could easily allow MiTM attacks. Until patched, all it would have taken was a malicious access point setup in a busy branch (London, Brighton, etc) and one could easily exfiltrate account data for malicious purposes.</p>



<p>The first issue I reported was a redundant SSL cert installed on m.barclays.co.uk. The combination of a weak certificate and poorly configured server meant that customer data was at serious risk. The attack vector is <a href="http://www.securityweek.com/new-attack-rc4-based-ssltls-leverages-13-year-old-vulnerability" target="_blank" rel="noreferrer noopener">somewhat esoteric</a>, so I&#8217;ll omit it for brevity. I looked for further problems when I had a little more time…</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS (Cross-Site Scripting)</h2>



<p>I ran domains I suspected to be controlled by Barclays through a semi-automated XSS scanner I developed about a ago. I got a hit on barclaycardcentre.es. The hit was confirmed as McAfee had marked the website as being used as a phishing site. I reported the PoC and moved on&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="799" height="483" src="https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1.png" alt="" class="wp-image-1165" srcset="https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1.png 799w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-300x181.png 300w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-768x464.png 768w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-500x302.png 500w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-48x29.png 48w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-600x363.png 600w" sizes="(max-width: 799px) 100vw, 799px" /></figure></div>



<pre class="wp-block-code"><code>barclaycardcentre.es/busqueda?criterio=1'autofocus/onfocus='prompt(String.fromCharCode(88,83,83))</code></pre>



<p>After starting work on their marketing campaign I took another look at their network. I ran another list of Barclays domains through my XSS script. This time I spotted a similar XSS issue in <a href="https://www.barx.com/" target="_blank" rel="noreferrer noopener">barx.com</a>, a website dedicated to stock trading&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img decoding="async" width="943" height="601" src="https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1.png" alt="" class="wp-image-1166" srcset="https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1.png 943w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-300x191.png 300w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-768x489.png 768w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-500x319.png 500w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-800x510.png 800w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-48x31.png 48w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-600x382.png 600w" sizes="(max-width: 943px) 100vw, 943px" /></figure></div>



<pre class="wp-block-code"><code>barx.com/search-results.html?to=1451624400000&amp;q=barclays "&gt;&lt;svg/onload=prompt(/XSS/)&gt;&amp;from=1420088400000</code></pre>



<p>I was a little concerned about how insecure my mortgage providers where by this point. I just decided to focus on the marketing campaign and try to get the security issues fixed when I could. Then I found a winning fail…</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Public Application Connection Details</h3>



<p>I discovered the most painful security issue in the Barclays network while looking for content related issues during an SEO audit. Two pages on the apps.barclays.mobi domain were showing PHP code as HTML, which seemed odd&#8230;</p>



<p></p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="518" src="https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-1024x518.png" alt="" class="wp-image-1167" srcset="https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-1024x518.png 1024w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-300x152.png 300w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-768x389.png 768w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-500x253.png 500w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-800x405.png 800w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-48x24.png 48w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-600x304.png 600w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1.png 1073w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>Both pages where saved in Google&#8217;s cache, so have been visible to the public for a while&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="784" height="441" src="https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1.png" alt="" class="wp-image-1168" srcset="https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1.png 784w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-300x169.png 300w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-768x432.png 768w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-500x281.png 500w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-48x27.png 48w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-600x338.png 600w" sizes="auto, (max-width: 784px) 100vw, 784px" /></figure></div>



<p>Checking the page source code showed connection details for the application&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-1024x576.png" alt="" class="wp-image-1169" srcset="https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-1024x576.png 1024w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-300x169.png 300w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-768x432.png 768w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-500x281.png 500w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-800x450.png 800w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-1280x720.png 1280w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-48x27.png 48w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-600x337.png 600w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1.png 1366w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<pre class="wp-block-code"><code>$login = new MDG_ApplicationLogin('*snip*', '*snip*', '*snip*');</code></pre>



<p>Enumerating a database once you have the application login details is fairly rudimentary. Having an admin username / password publicly available on a world leading bank is definitely a winning fail. The best case scenario is exfiltrated data. A proficient hacker will root the box and move through the network.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Stating The Obvious</h3>



<p>It should go without saying but unfortunatly doesn&#8217;t; a global bank with total assets in the region of <a href="https://en.wikipedia.org/wiki/Barclays" target="_blank" rel="noreferrer noopener">£1.12 trillion</a>, and an entire team of security specialists, shouldn&#8217;t suffer from such basic security issues.</p>



<p>During my brief employment for the McDonald&#8217;s of marketing, I was allotted 1 hour 30 minutes to penetration test their portfolio of well known clients. I managed to find exploits on all of them. Which is just sad.</p>



<p>As always, the issues were fixed within days when I got in touch with the right person. The problem is that it can take months to get the right contact.</p>



<p>Ethical hackers are often given free swag as a way of saying thanks. It helps promote the companies we hack and they get secured in the process. All I received were legal threats from my previous employer.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Disclosure Timeline</h3>



<ul class="wp-block-list"><li>June 2015 &#8211; Initial report made over the phone. (first few days of the month).</li><li>13 July 2015 &#8211; SEO report conducted on Barclays for job interview. Weak SSL cert reported.</li><li>01 April 2016 &#8211; Started work on Barclays marketing. Reported 2x XSS and weak SSL again.</li><li>31 March 2016 &#8211; Issues escalated to Barclays IT security team. Then ignored.</li><li>04 April 2016 &#8211; Reported publicly available application login details.</li><li>13 June 2016 &#8211; Initial contact with Director of Cyber Response.</li><li>21 June 2016 &#8211; All issues fixed.</li><li>12 July 2016 &#8211; Post made public.</li></ul>
<p>The post <a href="https://abeontech.com/security/hacking-bank-secure-mortgage/">Hacking My Bank. For teh lulz.</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/hacking-bank-secure-mortgage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1</post-id>	</item>
		<item>
		<title>Mocking the Military; Hacking Hackers</title>
		<link>https://abeontech.com/security/mocking-military-hacking-hackers/</link>
					<comments>https://abeontech.com/security/mocking-military-hacking-hackers/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Tue, 05 Apr 2016 10:46:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">https://wp.nkdev.info/squadforce/?p=156</guid>

					<description><![CDATA[<p>I found a way to add pages to the U.S. Department of Defence. Of course I took the piss. Also, hacking hackers bonus content. </p>
<p>The post <a href="https://abeontech.com/security/mocking-military-hacking-hackers/">Mocking the Military; Hacking Hackers</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Disclaimer: This post is probably not safe for work. Bad language, political views, and oxford commas aplenty.</p>



<p>This article covers a few basic cross site scripting bugs in Department of Defence and Ghost Security websites. The idea is to highlight how even the most security conscience among us can forget to check for the most basic exploits.</p>



<p>I love Einstein. I have always had a passion for physics, relativity, and politics. A little cited quote from the aforementioned scientific genius is&#8230;</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Mocking the military</h2>



<p>As much as I hate murder, the recent escalation of terrorism has been far worse. Another idol of mine &#8211; Bill Hicks &#8211; famously said: &#8220;I was in the unenviable position of being for the war, but against the troops. And ah&#8230; Not the most popular stance I&#8217;ve ever taken on an issue&#8221;.</p>



<p>War is bad, m&#8217;kay. Terrorism is worse, m&#8217;kaaay&#8230; Getting on with it.</p>



<p>Cross site scripting is one of the easiest exploits to protect against, yet is one of the most prolific. The example below is a perfect example of an easily overlooked bug in a website that could cause a lot of damage. Simply altering a URL on the Department of Defence website allowed any HTML to get shown in the PDF document:</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="800" height="540" src="https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1.jpg" alt="" class="wp-image-1154" srcset="https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-300x203.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-768x518.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-500x338.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-48x32.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-600x405.jpg 600w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption>The little URL that could</figcaption></figure></div>



<p>The vulnerable page was:</p>



<pre class="wp-block-code"><code>http://www.militaryinstallations.dod.mil/mcfp-web/newsletter.jsp?url=http://www.militaryinstallations.dod.mil/MOS/f?p=MI:PRINT:0::::P11_INST_ID,P11_CONTENT_TITLE,P11_CONTENT_EKMT_ID,P11_CONTENT_DIRECTORY:1930,&#91;HTML_INJECTION] ....</code></pre>



<p>The Department of Defence responded quickly and a fix was rolled out within 24 hours. They confirmed the logic issue was fixed as there were several affected pages. I imagine the reply was sent through gritted teeth, but it got fixed and everyone is happy. Mostly.</p>



<p>I always email the site owner, wait 12 weeks, then try additional contact to get the issue resolved. Certain religious extremist groups may not be as helpful.</p>



<p>My sardonic proof of concept was intended to get a reaction. The vast majority of vulnerabilities go unfixed for months, even in government websites. I have reported hundreds of exploits on websites ranging from a plumber&#8217;s personal blog to <a href="https://www.openbugbounty.org/incidents/63848/" target="_blank" rel="noreferrer noopener">wikileaks</a>.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Hacking hackers</h2>



<p>So we&#8217;ve mocked the military. Why not hack the hackers? I tried to use the same simple technique on a group I&#8217;ve morally supported for a while. Ghost Security are a splinter-group of Anonymous which specialise in combating the spread of religious extremism on the internet.</p>



<p>Surely, the uber-1337 hax0rz can protect against a simple XSS vector? Sadly not.</p>



<h3 class="wp-block-heading">Even hackers make mistakes.</h3>



<p><a href="http://www.ghostsec.org/" target="_blank" rel="noreferrer noopener">GhostSec</a> are great guys and fighting for the right team by taking down extremists. I decided to check their website because T.V kills brain cells.</p>



<p>Within about 30 seconds I found a validation error in their hostchecker tool:</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="800" height="540" src="https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1.jpg" alt="" class="wp-image-1155" srcset="https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-300x203.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-768x518.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-500x338.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-48x32.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-600x405.jpg 600w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure></div>



<p>I notified them about this <a href="https://twitter.com/mradamdavies/status/675407849527353345" target="_blank" rel="noreferrer noopener">on Twitter</a>. They added some basic input validation, replying with: &#8220;just feeding our XSS database ty&#8221;.</p>



<figure class="wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<div class=" embed-twitter"><blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">Erm&#8230; <a href="https://twitter.com/Windev01?ref_src=twsrc%5Etfw">@Windev01</a>, <a href="https://twitter.com/TorReaper?ref_src=twsrc%5Etfw">@TorReaper</a>, <a href="https://twitter.com/ComediAnon?ref_src=twsrc%5Etfw">@ComediAnon</a>. Fix please? <a href="https://t.co/YZzDb0LOIL">pic.twitter.com/YZzDb0LOIL</a></p>&mdash; Mr Adam Davies (@mradamdavies) <a href="https://twitter.com/mradamdavies/status/675407849527353345?ref_src=twsrc%5Etfw">December 11, 2015</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></div>
</div></figure>



<p>The proof of concept code used was, as always, basic:</p>



<pre class="wp-block-code"><code>derp.com/?pwn=1&amp;"&gt;&lt;img src=x onerror=prompt(/XSS/)&gt;</code></pre>



<p>They eventually put some XSS security in place. I thought I&#8217;d test the hacker&#8217;s anti-hacker protection. Only a basic filter had been put in place:</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="600" height="542" src="https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1.png" alt="" class="wp-image-1158" srcset="https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1.png 600w, https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1-300x271.png 300w, https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1-500x452.png 500w, https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1-48x43.png 48w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure></div>



<p>A common XSS WAF bypass technique worked. It took about 2 minutes:</p>



<pre class="wp-block-code"><code>derp.com/?pwn="&gt;&lt;marquee loop=1 width=0 onfinish=1/prompt`/XSSPOSED/`&gt;derp&lt;/marquee&gt;</code></pre>



<p>The rest of the site seemed fairly secure so I moved on, after the obligatory bragging on social media. I read another story about them around 4 months later, so decided to check the once secure site. <a href="https://twitter.com/mradamdavies/status/707252595463684096" target="_blank" rel="noreferrer noopener">XSS number 3</a>&#8230;</p>



<figure class="wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<div class=" embed-twitter"><blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">*sigh* <a href="https://twitter.com/hashtag/XSS?src=hash&amp;ref_src=twsrc%5Etfw">#XSS</a> in your domain lookup tool this time. <a href="https://twitter.com/TorReaper?ref_src=twsrc%5Etfw">@TorReaper</a>, @_Ransacker? <a href="https://t.co/g3Xuw6ZETS">pic.twitter.com/g3Xuw6ZETS</a></p>&mdash; Mr Adam Davies (@mradamdavies) <a href="https://twitter.com/mradamdavies/status/707252595463684096?ref_src=twsrc%5Etfw">March 8, 2016</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></div>
</div><figcaption>Same simple technique, different page. Funnily enough I didn&#8217;t get a reply this time.</figcaption></figure>



<h2 class="is-style-squadforce-decorated wp-block-heading">Trash or treasure?</h2>



<p>The point of this rant is that even the the experts make simple mistakes. The only real difference is scale of impact. If I had been trying to recruit bad people to do silly things, it would be a very different conversation. From making websites dance, to <a href="http://abeontech.com/security/xss-attack-action/">hijacking accounts</a> or <a href="https://ret2libc.wordpress.com/2016/01/03/hacking-banks-for-fun-and-profit/" target="_blank" rel="noreferrer noopener">stealing bank data</a>&#8230;</p>



<p>If I can make your website dance, what are the bad guys doing? The code isn&#8217;t that different.</p>



<figure class="wp-block-embed aligncenter is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class=" responsive-embed responsive-embed-16x9 embed-vimeo"><iframe loading="lazy" title="Shake It" src="https://player.vimeo.com/video/158220403?dnt=1&amp;app_id=122963" width="1140" height="641" frameborder="0" allow="autoplay; fullscreen; picture-in-picture" allowfullscreen></iframe></div>
</div></figure>



<hr class="wp-block-separator aligncenter"/>



<h3 class="is-style-squadforce-decorated wp-block-heading">Update</h3>



<p>I have been informed that Ghost Sec and Ghost Security are different entities. One apparently riding the fame of the other. The source is reliable and respected, so I trust it. The group split and skidz formed GhostSec. The story holds true as, initially, they didn&#8217;t seem to think XSS was an issue. According to press-releases, the original Ghost Security have beem known to use XSS and phishing techniques to hijack accounts. So, check out ghostsecuritygroup.com for comparison.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Feedback</h3>



<p>The most frustrating thing is that cross site scripting attacks are the easiest to test for, most basic to protect against, indicative of weak security, and a risk on many levels. I&#8217;ve used similar techniques to circumvent world leading Web Application Firewalls, then helping to get patched, obviously.</p>



<p>I am genuinely curious as to why such basic exploits are still on such high priority websites. Could it be the budget is too small? Maybe the training isn&#8217;t good enough?</p>



<p>I&#8217;d really like to read comments from professionals and hackers alike, but hey, this is the internet &#8211; try to XSS my comment form if you must <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </p>
<p>The post <a href="https://abeontech.com/security/mocking-military-hacking-hackers/">Mocking the Military; Hacking Hackers</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/mocking-military-hacking-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">156</post-id>	</item>
		<item>
		<title>Scoot.co.uk XSS</title>
		<link>https://abeontech.com/security/scoot-sun-independent-xss/</link>
					<comments>https://abeontech.com/security/scoot-sun-independent-xss/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Fri, 17 Apr 2015 02:26:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1181</guid>

					<description><![CDATA[<p>Stored XSS in several nationwide UK newspapers. One XSS to rule them all.</p>
<p>The post <a href="https://abeontech.com/security/scoot-sun-independent-xss/">Scoot.co.uk XSS</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I am an SEO engineer at heart. Always on the lookout for opportunities from which links and/or citations can be gleaned. Often, while looking for link placements, I find sites with security vulnerabilities. I always try to work with affected sites to help secure the attack vector with mixed results. More often than not the sites get patched and everyone is happy. Sometimes I get ignored. Sometimes I get a generic &#8220;we will fix it&#8221; reply but the exploit gets ignored. The site in question passes the information stored on its site onto several authoritative websites in the UK, some of which are the biggest news organisations we have…</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS Is Bad</h2>



<p><strong>Cross-Site Scripting attacks</strong> (often abbreviated to <a href="https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29" target="_blank" rel="noreferrer noopener">XSS</a>) are bad. They use to be nothing more than annoying popups or adverts inserted into target websites. Technology has since moved on and now the same security flaw can lead to <a href="http://www.symantec.com/connect/blogs/getting-sassy-xss-part-3-port-scanning" target="_blank" rel="noreferrer noopener">colaborative resource management</a>, full data exfiltration, and more. JavaScript using a simple Java extension means hackers are limited by their imagination, nothing less! If a bad guy can inject arbitrary HTML, CSS, and JavaScript into your website they can embed a Java Applet and bypass all sorts of restrictions which would otherwise be in place.</p>



<p>A recent example of effective XSS leverage &#8220;in the wild&#8221; was Anonymous using a <a href="https://code.google.com/p/lowc/" target="_blank" rel="noreferrer noopener nofollow">JavaScript version of LOIC</a> to sucessfully Ddos government targets. Simply asking supporters to visit unrelated but infected sites conducted the attack. The end-user was still culpable but focus shifted from the initial, very small scale hack. <a href="https://abeontech.com/security/xss-attack-action/">XSS cookie stealers</a> are another popular method of implementing XSS as an attack vector and their use is increasing, due to the popularity of JavaScript.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS in Scoot.co.uk</h2>



<p>There are multiple vulnerabilities in dashboard.scoot.co.uk subdomain. Scoot then passes this easily exploited information onto many other website, some of which include the most popular UK news services. This data passes, unvalidated, through sites to which they offer an intergrated business directory.</p>



<p>Arbitrary code including HTML, CSS, JavaScript and Java is stored in the database without any validation.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">What is the problem?</h2>



<p>The implementation is simple and lasting. The attack vector is classed as a &#8220;persistent XSS&#8221; or &#8220;stored XSS&#8221; exploit and is found in many input fields of the dashboard.scoot.co.uk subdodomain. The website contains many vulnerabilities but this article focuses on the stored XSS problem. The attack flow is simple: create a free business listing, add a gallery image, <em>insert your malicious code</em>, wait 2-3 minutes and it&#8217;s live.</p>



<p>An easy way to obfuscate the code is to use the second gallery image as the exploit will be hidden from initial view is present in the page source, being executed as a result.</p>



<p>The main culprit is an unvalidated title attribute for the gallery images. The input field allows arbitrary code to be inserted. Below is a proof of concept code:</p>



<pre class="wp-block-code"><code>"&gt;&lt;/a&gt;XSS HERE&lt;a title="</code></pre>



<p>For reporting purposes I used the following:</p>



<pre class="wp-block-code"><code>"&gt;&lt;/a&gt;&lt;img src=x onerror=prompt(/XSSPOSED/)&gt; &lt;a title="</code></pre>



<p>The image below shows the entry point.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="695" src="https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1.jpg" alt="" class="wp-image-1183" srcset="https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1.jpg 1024w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-300x204.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-768x521.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-500x339.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-800x543.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-48x33.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-600x407.jpg 600w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<h2 class="is-style-squadforce-decorated wp-block-heading">Several Newspapers Hacked!</h2>



<p>Below are examples of the Scoot XSS vulnerability passing the insecure data onto&#8230;.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="602" height="319" src="https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss.jpg" alt="" class="wp-image-1184" srcset="https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss.jpg 602w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-300x159.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-500x265.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-48x25.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-600x318.jpg 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /><figcaption>The Sun</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="601" height="318" src="https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss.jpg" alt="" class="wp-image-1185" srcset="https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss.jpg 601w, https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss-300x159.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss-500x265.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss-48x25.jpg 48w" sizes="auto, (max-width: 601px) 100vw, 601px" /><figcaption><strong>The Independent</strong></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="603" height="318" src="https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss.jpg" alt="" class="wp-image-1186" srcset="https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss.jpg 603w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-300x158.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-500x264.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-48x25.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-600x316.jpg 600w" sizes="auto, (max-width: 603px) 100vw, 603px" /><figcaption><strong>TouchLocal</strong></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="601" height="316" src="https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS.jpg" alt="" class="wp-image-1187" srcset="https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS.jpg 601w, https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS-300x158.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS-500x263.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS-48x25.jpg 48w" sizes="auto, (max-width: 601px) 100vw, 601px" /><figcaption><strong>And Scoot themselves</strong></figcaption></figure></div>



<h2 class="is-style-squadforce-decorated wp-block-heading">The Fix using Responsible disclosure</h2>



<p><a href="https://web.archive.org/web/20150525074730/http://abeontech.com/security/xss-attack-action/#xss-protect">Preventing XSS</a> exploits is simple and can be done in one line of code. Using htmlentities with ENT_QUOTES to encode quotes and UTF-8 to convert text.</p>



<p>This was a stored XSS vulnerability on one site, which then passed the exploit on to several large UK newspaper websites. Getting it fixed was important to me!</p>



<p>I have emailed, called, and begged Scoot to fix this issue as I use thier services. Each time I was told &#8220;we will look into it&#8221;, or &#8220;it&#8217;s a feature&#8221; from confused sales staff. Several attempts to contact the relevant person about this situation have gone unresolved. It appears they care more about up-sales than security.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Disclosure Timeline</h2>



<ul class="wp-block-list"><li>14 December 2012. Initial email ignored.</li><li>01 June 2013. Confused but lengthy phone call. Ignored.</li><li>01 December 2014. Two phone calls ignored. Reply was &#8220;we will look into it&#8221;</li><li>17 April 2015. Final email to Scoot. Public disclosure.</li><li>19 April 2015. Reply from developer. Issue being worked on.</li><li>23 April. Fix implemented by developer. Bounty received. </li></ul>



<p></p>
<p>The post <a href="https://abeontech.com/security/scoot-sun-independent-xss/">Scoot.co.uk XSS</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/scoot-sun-independent-xss/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1181</post-id>	</item>
		<item>
		<title>How to: not get hacked</title>
		<link>https://abeontech.com/security/how-not-to-get-hacked/</link>
					<comments>https://abeontech.com/security/how-not-to-get-hacked/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Wed, 08 Apr 2015 10:48:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://wp.nkdev.info/squadforce/?p=159</guid>

					<description><![CDATA[<p>Most people don&#8217;t really care about security. We hope and believe our computers take care of security for us. Posting the latest Facebook update pretending to be our cat is...</p>
<p>The post <a href="https://abeontech.com/security/how-not-to-get-hacked/">How to: not get hacked</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Most people don&#8217;t really care about security. We hope and believe our computers take care of security for us. Posting the latest Facebook update pretending to be our cat is far more important. The cat and mouse game could work, if your computer was the cat. It&#8217;s not. The best we can do is play catch-up and hope the hackers take more time to develop an exploit than it takes to run an instantaneous, worldwide, fix. Of course, there is no such thing.</strong></p>



<p>I&#8217;ve played and worked with computers for around 17 years. Probably a lot longer if you count my terrible snake clone for the BBC Micro. My hobby developed into a career as the internet&#8230; exploded. I have at least looked at, if not tried to code in, the majority of major languages and systems. From C to Zend, Matlab to MySQL.</p>



<p>My esoteric hobby has had several advantages. My obsession with the least interesting parts of computing &#8211; the mundane code &#8211; has lead to some interesting discoveries. The ability to charge for my hobby being my favourite, learning how to infiltrate most websites on the internet being a close second. I am a devoted white hat developer but not everyone follows the same ethics. My first website was hacked to show nothing but a beheading video&#8230; When I was 13. Learning <a href="https://abeontech.com/security/">security </a>was an obvious step for me. I was obsessed with how people get hacked.</p>



<p>I will not deny that I&#8217;ve had some fun but it&#8217;s always been that. Virii intended for their original purpose &#8211; as a <a href="https://web.archive.org/web/20160311034729/http://priceonomics.com/who-invented-the-computer-virus/" target="_blank" rel="noreferrer noopener">practical joke</a> for friends. I have worked with hundreds of websites to close exploits which could have been used by people with malicious intent. I would rather get a few angrily defensive emails from developers than see terrorists use these same exploits to perpetuate their chosen brand of insanity.</p>



<p>Make sure your tinfoil hat is comfortable. This post will digress. I will go off on tangents. This is my rant. Feel free to call me out in the comments. Until then&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="400" height="300" src="https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions.jpg" alt="" class="wp-image-1142" srcset="https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions.jpg 400w, https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions-300x225.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions-48x36.jpg 48w" sizes="auto, (max-width: 400px) 100vw, 400px" /></figure></div>



<h2 class="has-text-align-left is-style-squadforce-decorated wp-block-heading">Am I a target?</h2>



<p>A common misconception is that &#8220;my computer isn&#8217;t worth hacking&#8221;. This just isn&#8217;t true. Some of the many reasons people get hacked can include: resource abuse, data exfiltration, virus spreading, and last but by no means least… because they can. E-peen is fully extended with coders trying to develop a reputation in the hacking scene. The majority of websites and services are exploited simply because they can be. Often with a fitting excuse being created after the fact.</p>



<hr class="wp-block-separator"/>



<p>If your device is connected to the internet it will, at some point, be the target of an attack. Successful or not. Computers are constantly scanning the internet on the lookout for vulnerabilities. Finding exploitable websites is usually just a case of firing up your chosen scanner with a target domain, I.P. and/or I.P. range. Anyone with even basic knowledge of coding could attack hundreds of thousands of websites, computers and mobile devices using supposed &#8220;white hat&#8221; tools such as <a href="https://web.archive.org/web/20160311034729/http://sectools.org/tool/metasploit/" target="_blank" rel="noreferrer noopener">MetaSploit</a>, w3af, sqlmap, and BeEF. Most people don&#8217;t, but the few that do can be real dicks. The &#8220;internet of things&#8221; is close, but worrying.</p>



<p>So we&#8217;ve built the tension. The end is nigh. Hack all the things is no longer just a meme. What could I do if I wanted to become less of a target? Well, there are a few simple steps anyone can take that can greatly reduce the risk of becoming yet another hacking statistic.</p>



<h2 class="has-text-align-left is-style-squadforce-decorated wp-block-heading">Secure all the things!</h2>



<p>Top 5 lists are for losers. So this is a lenthy top 4 list. Because all hacks fit into 4 categories. Insult me in the comments if you disagree.</p>



<p>Avoiding the vast majority of exploits is actually pretty simple but, as it&#8217;s a change of habit, can take some prompting. Most of the tips below offer ways to help prevent you getting hacked, which shouldn&#8217;t be ignored. I believe it&#8217;s far easier to complete an update than it is to restore files corrupted by <a href="http://en.wikipedia.org/wiki/CryptoLocker" target="_blank" rel="noreferrer noopener">CryptoLocker</a> or something similar.</p>



<ul class="wp-block-list"><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#awareness">Awareness</a></li><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#updates">Updates</a></li><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#pass-man">Password management</a></li><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#res-abuse">Resource abuse</a> (Ddos, FXP, etc)</li></ul>



<h3 class="has-text-align-left is-style-squadforce-decorated wp-block-heading">Awareness</h3>



<p>The internet is inherently insecure. It is relativly easy to pretend to be anyone, send emails as another person or pretend to be another website. If you are not careful you could enter your Facebook details into a malicious website. The biggest step required to become less of a target for hackers is simple diligence.</p>



<p>Internet diligence really boils down to one thing: If you click links in emails or on social media, check the website you are visiting is the correct website by confirming the URL is as expected. An extremely long link or shortening services such as bit.ly could be used to cloak malicious data.</p>



<p>It sounds simple but is easy to overlook as the evolution of social media requires clicking on links from unknown sources. Just remember to check the site if it asks you for login details. Recently, <a href="https://web.archive.org/web/20160311034729/https://twitter.com/mradamdavies/status/562941506735312896" target="_blank" rel="noreferrer noopener">I was almost phished</a> by an advert in Google&#8217;s Adsense which used a cloaked URL&#8230; It happens to the best of us</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Updates</h3>



<p>The best way to mitigate exploitation is to simply keep your operating system and applications up-to-date. I know it can be time consuming and a bit of a pain, but it is the single best way to pro-actively prevent becoming a victim. Patches for most major software are released pretty quickly after disclosure and updating usually just means clicking a button.</p>



<p>A list of common updates should include:</p>



<ul class="wp-block-list"><li>Operating system updates (Windows, Mac, Linux, Mobile)</li><li>Server software updates (LAMP, CMSs, libraries)</li><li>System software (Flash, Java, FTP client, etc)</li></ul>



<p>It&#8217;s a short list but could include hundreds of updates. If you don&#8217;t use software, removal is recommended. Two good examples are Flash and Java. These two are among the most attacked and unused software on the internet. Many websites have abandoned Java due to the constant security issues and HTML5 has all but replaced Flash for most developers. Most modern software will update itself if set to. If it isn&#8217;t set to autoupdate, you should do it manually at least once a month.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Password Management</h3>



<p>Having a unique password for every website is one of the best ways to prevent account hijacking. Your email password should be the most secure as it truly is the one ring to pwn them all. If someone can gain access to your email account they can easily hack any other associated account. I have recommended <a href="https://web.archive.org/web/20160311034729/https://lastpass.com/" target="_blank" rel="noreferrer noopener">LastPass</a> as a means of securely managing passwords for several years. It is free and <a href="https://web.archive.org/web/20160311034729/https://blog.lastpass.com/2010/07/lastpass-gets-green-light-from-security.html/" target="_blank" rel="noreferrer noopener">has been audited</a> several times with very little complaint from the security professionals I respect the most.</p>



<p>Which of the following two passwords is stronger, more secure, and more difficult to crack?</p>



<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">D0g.....................
PrXyc.N(n4k77#L!eVdAfp9</pre>



<p>You may expect that this is a trick question and you&#8217;d be right. The first of the two passwords is actually stronger. Password cracking works on a binary basis &#8211; Is the password correct? Yes / No. So each character added will effectively double the entropy. Password entropy can be counter-intuitive with length being the main factor.</p>



<p>Interested in how passwords really work? I suggest you read Steve Gibson&#8217;s <a href="https://web.archive.org/web/20160311034729/https://www.grc.com/haystack.htm" target="_blank" rel="noreferrer noopener">Password Haystacks</a> if you are in to really techy stuff&#8230; It&#8217;s a great read!</p>



<p>The idea is simple: think of a long password that is easy to remember but contains upper and lower case characters with punctuation. Then simply remember how many dots, dollar signs or other symbol you have at the beginning or end for each site. Security through obscurity isn&#8217;t a recommended technique but it&#8217;s better than nothing!</p>



<p><em>Aside</em>: an easy way to check if a website is handling passwords properly is to reset it. If your password is sent to you, in an email or text, they probably aren&#8217;t hashing the data correctly and your password could be at risk. Any secure database handling of passwords will implement a one way hashing process to ensure the only person that can know your password is you.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Resource Abuse (Ddos, FXP, etc)</h3>



<p>A hacked server or device can cause many issues. Resource abuse is usually the result of ignoring the above. Often an affect of using a default password, outdated software, or account compromise. For this reason I&#8217;m going to include a typical attack scenario from around 5 years ago. This is an offensive way by which folders can be created to obfuscate their true contents. Inspecting, editing, deleting such folders is difficult unless you know the attack vector. It is now a well known and secured vector making it essentially pointless (no copy/pasta here skidz).</p>



<p>FXP is a very little-known form of hacking. It refers to File Transfer Protocol. FXP, although almost dead, is analogous to many hacking techniques. It leverages exploits to distribute illegal material. Hackers target FTP servers (or websites to setup services such as FTP, Torrents, Usenet, etc) to store illegal warez. And even worse on hacked servers. FXP was incorporated into the wider spectrum of &#8220;collaborative resource management&#8221; around 5 years ago, but the logic remains true. If you can hack it some one will then find a reason to justify it after the fact.</p>



<p>Assumptions: we have found a public server in which we can create folders, upload, and download.</p>



<p>First we will create a folder called&#8230;</p>



<pre class="EnlighterJSRAW" data-enlighter-language="shell" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">/.ÿÿcom1 ÿ%d ÿ  /</pre>



<p>This will tell us a lot about the server. The folder created could be shown a number of ways, depending on the server setup. ÿ is a Unix escape character so will try to execute the return command when encountered. This depends on setup. It essentially tells the server to return to the last folder, confusing both server and client as to the folder trying to be entered. %d is one of many command tokens which will try to force a text prompt in some clients/servers. This will usually disrupt further information gathering. There are several other techniques but you get the idea. Forgetting to filter one character can lead to a lot more than you may think. Sneaky people will stuff hacked publci servers with dodgy contents.</p>



<p>Below are variants of the ending folder name with a brief explanation:</p>



<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">/.ÿÿcom1 ÿ%d ÿ  / &lt; Folder name as entered. Not vulnerable.
/.ÿÿcom1ÿ%dÿ/ &lt; Enter by clicking? Not vulnerable.
/com1%d  / &lt; ÿ obfuscates previous character. Vulnerable.
/.ÿÿcom1 ÿ ÿ  / &lt; Command token executed. Vulnerable.
/com1%d  / &lt; Path obfuscated. Vulnerable.
/.ÿcom1    / &lt; Command token executed and path obfuscated. Vulnerable.</pre>



<p>This may mean nothing to the average person. To a hacker it means they can distribute any file they choose with little chance it will get discovered. The combination of possible folder names is almost infinite which makes automated detection almost impossible. A single character can often lead to total security failure. Append-Apostrophe-Sec&#8230; I mean <a href="https://web.archive.org/web/20160311034729/http://en.wikipedia.org/wiki/LulzSec" rel="noreferrer noopener" target="_blank">LulzSec</a> used a simple apostrophe to &#8220;pwn&#8221; some of the biggest government agencies on the plant. Sabu was only caught because he accessed IRC using his real IP. He also ordered car parts to his home address. Not all hackers are that stupid.</p>



<h3 class="wp-block-heading">/ Rant</h3>



<p>I can understand why people don&#8217;t care about security, or getting hacked. I kind of bored myself writing this ~1800 word article.  Then and had to considerably reduce it. I can understand why companies don&#8217;t spend more on security. It seems pointless until you get hacked and have to recover every email ever sent to/from your company.</p>
<p>The post <a href="https://abeontech.com/security/how-not-to-get-hacked/">How to: not get hacked</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/how-not-to-get-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">159</post-id>	</item>
		<item>
		<title>AV Arcade XSS Exploit</title>
		<link>https://abeontech.com/security/av-arcade-xss-exploit/</link>
					<comments>https://abeontech.com/security/av-arcade-xss-exploit/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Sat, 06 Jun 2009 02:50:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1193</guid>

					<description><![CDATA[<p>During registration, the user name field of the AV Arcade script is open to a stored XSS attack. Code will be processed on the members page. The malicious code can...</p>
<p>The post <a href="https://abeontech.com/security/av-arcade-xss-exploit/">AV Arcade XSS Exploit</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>During registration, the user name field of the <strong><a href="https://www.avscripts.net/avarcade" target="_blank" rel="noreferrer noopener">AV Arcade</a></strong> script is open to a stored <strong>XSS attack</strong>. Code will be processed on the members page. </p>



<p>The malicious code can be overflown to the homepage fairly easily. Almost XSS code can be used.</p>



<p>I would now consider this as a serious exploit and suggest fixing this bug A.S.A.P (Edit: This exploit was fixed. Keep AV Arcade up-to-date!)</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">The Fix</h2>



<ul class="wp-block-list"><li>Backup then open yoursite.com/register.php</li><li>Find:<br><code>$info2 = htmlspecialchars($info); 1 $info2 = htmlspecialchars($info);</code></li><li>Add below:<br><code>$username = htmlspecialchars($username); 1 $username = htmlspecialchars($username);</code></li><li>Backup then open yoursite.com/admin/manage_users.php</li><li>Find:<br><code>while($row = mysql_fetch_array($sql)){ 1 while($row = mysql_fetch_array($sql)){</code></li><li>Add below:<br><code>$username = htmlspecialchars($username); 1 $username = htmlspecialchars($username);</code></li><li>Save and upload all files.</li><li>Search your members list for any user names shown as code and delete (You could also I.P. ban them).</li></ul>



<p>This function could easily be expanded for further validation. Thanks to dan20071 for letting me know about this!</p>
<p>The post <a href="https://abeontech.com/security/av-arcade-xss-exploit/">AV Arcade XSS Exploit</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/av-arcade-xss-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1193</post-id>	</item>
		<item>
		<title>Password Security Tips</title>
		<link>https://abeontech.com/security/password-security-tips/</link>
					<comments>https://abeontech.com/security/password-security-tips/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Fri, 04 Jul 2008 02:43:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1190</guid>

					<description><![CDATA[<p>A simple list of Dos and Donts to consider when creating new accounts or updating passwords for current accounts you have. It may sound simple, but mistakes can often be...</p>
<p>The post <a href="https://abeontech.com/security/password-security-tips/">Password Security Tips</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A simple list of Dos and Donts to consider when creating new accounts or updating passwords for current accounts you have.</p>



<p>It may sound simple, but mistakes can often be made when in a rush or creating multiple accounts.</p>



<p>This post contains common good practice. Why not get into the habit of creating good passwords, before bad habits set in?</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Do NOT:</h2>



<ol class="wp-block-list"><li>Use your account name or any data that appears in your record in the password file.</li><li>Use any word or name that appears in any dictionary, reference or list regardless of case changes; especially do not use character strings that appear in password cracking tools’ word lists or bad password lists.</li><li>Phrases and slang with or without white space. Redundant with 2. See below.</li><li>Use any mythological, legendary, religious or fictional character, object, race, place or event. Redundant with 2.</li><li>Use acronyms. Redundant with 2.</li><li>Use alphabetic, numeric or keyboard sequences; many such sequences are included in cracking tools “word” lists. Redundant with 2.</li><li>Titles of books, movies, poems, essays, songs, CDs or musical compositions. Redundant with 2.</li><li>Vary the character sequences obtained from any of the foregoing items by any of the following methods:<ul><li>Prepend or append symbols, punctuation marks and / or digits to a word.</li><li>Use words with some or all the letters reversed.</li><li>Use conjugations or plurals of words.</li><li>Use words with the vowels deleted.</li><li>Replace letters with like looking symbols or digits.</li><li>Replace digits with like looking letters or symbols</li></ul></li></ol>



<ol class="wp-block-list" start="7"><li>Use only the first or the last character in uppercase. Redundant with 2.</li><li>Use only vowels in uppercase. Redundant with 2.</li><li>Use only consonants in uppercase. Redundant with 2.</li><li>Use any personally related information.</li><li>Use anything you can imagine being collected into a list.</li><li>Use a publicly shown example good password.</li><li>Use great vanity license plates. In the future, may be redundant with 2.</li><li>Transliterate words from other languages.</li><li>Repeat any character more than once in a row.</li></ol>



<h2 class="is-style-squadforce-decorated wp-block-heading">DO:</h2>



<ol class="wp-block-list"><li>Use at least 8 characters.</li><li>Include a digit or punctuation.</li><li>Use upper and lower case.</li><li>Choose a phrase or combination of words to make the password easier to remember.</li><li>May be two words separated by a non-letter non-digit.</li><li>May have non printing characters.</li><li>Use different passwords on different machines.</li><li>Change password regularly and don’t reuse passwords or make minor variations (incrementing a digit).</li></ol>



<p>The suggestions overlap as they come from different sources. Most users and some systems will have real difficulty with non printing characters.<br>Personally related information Most people choose passwords that are easy to remember. One way to make passwords easy to remember is to pick passwords or parts of password that are directly related to oneself. Generally these are considered to be poor password choices. </p>



<p>Below is a list of all the personally related information that I have seen in passwords or in lists of what not to use in passwords. It’s listed in the order in which I think this information is most likely to be used in forming passwords:</p>



<ol class="wp-block-list"><li>One’s names and initials.</li><li>One’s account name.</li><li>Names of immediate family members.</li><li>Names, breeds or species of pets.</li><li>One’s birthday.</li><li>Family member’s birthdays.</li><li>One’s vehicle make, model, year.</li><li>Hobbies, interests and related words.</li><li>One’s job title.</li><li>Employer’s name.</li><li>Job related words.</li><li>Friend’s names.</li><li>Street numbers or names, city, county, state or zip code for home, work, family or friends.</li><li>Phone numbers for home, work, family or friends.</li><li>Social security numbers for self and immediate family.</li><li>License plate numbers.</li><li>Birthplace including street address.</li><li>University or college name.</li><li>College major.</li><li>High school name.</li><li>Student or employee ID numbers.</li><li>Serial numbers from consumer products.</li></ol>
<p>The post <a href="https://abeontech.com/security/password-security-tips/">Password Security Tips</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/password-security-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1190</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Minified using Disk
Database Caching using Disk (Request-wide modification query)

Served from: abeontech.com @ 2026-04-21 12:14:43 by W3 Total Cache
-->