'Hacking'에 해당되는 글 266건

  1. 2011.03.03 FPS online game hack (unrealskill.com) Online Game Hack by CEOinIRVINE
  2. 2011.02.03 What is the best way to manually test for buffer overflows? by CEOinIRVINE
  3. 2010.12.17 PT FrameWork by CEOinIRVINE
  4. 2010.10.20 Amazon Seller XSS by CEOinIRVINE
  5. 2010.10.20 FPS hack provider by CEOinIRVINE
  6. 2010.10.16 Hiding files using ntfs file streaming by CEOinIRVINE
  7. 2010.09.21 Back up Jailbreaked iPhone APPs by CEOinIRVINE
  8. 2010.05.25 TCP Analysis - Section 4:TCP Flag Options by CEOinIRVINE 1
  9. 2010.04.23 Java Applet Security Model by CEOinIRVINE
  10. 2010.04.23 SSH JAVA APPLET http://javassh.org/space/start by CEOinIRVINE 1




This website is one of famous game hack provider's website.

Maybe here in US online game is less famous than those in Europe and in Asia.

However, online game including WOW and some FPS games are still rock in US!.



The hackers usually sell their hack monthly basis.

The average price of hack is from 10 to 20.

I heard that they make a lot of money, even better than some of game publishers.


FPS game users suffer from Wall Hack, Aimbot Hack, ESP and etc.
Especially, Aimbot is dangerous because those enables user to shot into enemy's head. (One shot , One Kill)

Of course, wall hack reveles the user's location, so it's a kind of dangerous, too.


I really want online game industry grows faster than now.

Online Game is one of magics in IT human technologies.


Game Goes Well -> Hack Sales Well!



'Hacking' 카테고리의 다른 글

Value Changes (one of game cheating/hacking)  (0) 2011.03.24
DDOS against Korean Governments  (1) 2011.03.04
What is the best way to manually test for buffer overflows?  (0) 2011.02.03
PT FrameWork  (0) 2010.12.17
Amazon Seller XSS  (0) 2010.10.20
Posted by CEOinIRVINE
l

What is the best way to manually test for buffer overflows?

John Strand, past SearchSecurity.com expert EXPERT RESPONSE FROM: John Strand, past SearchSecurity.com expert

Pose a Question
Other Security Categories
Meet all Security Experts
Become an Expert for this site


Digg This!    StumbleUpon Toolbar StumbleUpon    Bookmark with Delicious Del.icio.us   


>
QUESTION POSED ON: 01 August 2008
What is the best way to manually test for buffer overflows?

>
There are two ways of reviewing a program for buffer overflows. First, the source code should be analyzed and reviewed before the code is compiled. Numerous tools are available for this task. My favorites are Fortify Software Inc.'s Rough Auditing Tools for Security (RATS) and Cigital Inc.'s ITS4. Both are free to download. It's also possible to use the '/analyze' compiler option with Microsoft Visual C++. All of the above tool checks are not simply restricted to buffer overflows, but they will check for other weaknesses, such as format string vulnerabilities and heap overflows.

The second way to test for buffer overflows is to look at compiled code. For a long time, many security professionals believed that the only way to detect vulnerabilities was to test the source code for the program. This was (and is) just not true. Numerous tools exist that look for vulnerabilities in a compiler's low-level assembly code. They also utilize fuzzing techniques, which test software by inputting massive amounts of random data and seeing if errors occur.

To review the compiled code for patterns in the assembly code, try tools like msfpescan and mfselfscan from the Metasploit project.

For fuzzing, look at tools like SPIKE, BreakingPoint Inc.'s testing tools and MuDynamic Inc.'s analyzer products. Spike is free, while Breaking Point's and Mu's tools are commercial. If application security checking is an extensive part of your job, I would strongly suggest considering a commercial product.

Many of the fuzzing products available take good input and mangle it to attempt an application break. To do this manually, find the inputs to an application and try to put in as many characters as possible. If it crashes, you need to discuss what went wrong by reviewing the application and system logs with the developers. Obviously it's wise to make sure you have permission before attempting this.

Ultimately the issue is much wider than simply checking for buffer overflows. Buffer overflows fall under the responsibility of developers not validating the inputs to their applications. For every data type in an application, there should be a limit to the number and type of characters it can accept. Identify any inputs that accept data that should not be allowed. For example, a field asking for "State" does not need to allow *, $, @, or ^. Regardless of whether a buffer overflow exists, it should be fixed to only allow the standard Aa-zZ character set.


'Hacking' 카테고리의 다른 글

DDOS against Korean Governments  (1) 2011.03.04
FPS online game hack (unrealskill.com) Online Game Hack  (0) 2011.03.03
PT FrameWork  (0) 2010.12.17
Amazon Seller XSS  (0) 2010.10.20
FPS hack provider  (0) 2010.10.20
Posted by CEOinIRVINE
l

PT FrameWork

Hacking 2010. 12. 17. 08:56
Posted by CEOinIRVINE
l

Amazon Seller XSS

Hacking 2010. 10. 20. 04:58
for example,
change-password/-"><iframe src="http://hackerssite.com">-.html
 
 

https://sellercentral.amazon.com/gp/change-password/-%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E-.html


The XSS bug affects the "Password Assistance" page, thus becoming the ideal phishing weapon for fraudsters who target sensitive personal and financial information. As you can view in the following screenshot, "See Me" injected an iFrame tag that retrieves the first page of XSSed.com. Instead, with border set to 0 in the tag, it could retrieve a deceitful seller central user login page that logs authentication credentials in cleartext and sends them to the fraudster's e-mail inbox.
 

 
Amazon is usually quick at remediating security issues affecting their online properties. Of course, they should go through a thorough source code security review and testing before they put stuff live.

'Hacking' 카테고리의 다른 글

What is the best way to manually test for buffer overflows?  (0) 2011.02.03
PT FrameWork  (0) 2010.12.17
FPS hack provider  (0) 2010.10.20
Hiding files using ntfs file streaming  (0) 2010.10.16
Back up Jailbreaked iPhone APPs  (0) 2010.09.21
Posted by CEOinIRVINE
l

FPS hack provider

Hacking 2010. 10. 20. 00:32
http://unrealskill.com/

'Hacking' 카테고리의 다른 글

PT FrameWork  (0) 2010.12.17
Amazon Seller XSS  (0) 2010.10.20
Hiding files using ntfs file streaming  (0) 2010.10.16
Back up Jailbreaked iPhone APPs  (0) 2010.09.21
TCP Analysis - Section 4:TCP Flag Options  (1) 2010.05.25
Posted by CEOinIRVINE
l
Hiding files using ntfs file streaming


'Hacking' 카테고리의 다른 글

Amazon Seller XSS  (0) 2010.10.20
FPS hack provider  (0) 2010.10.20
Back up Jailbreaked iPhone APPs  (0) 2010.09.21
TCP Analysis - Section 4:TCP Flag Options  (1) 2010.05.25
Java Applet Security Model  (0) 2010.04.23
Posted by CEOinIRVINE
l

How To Backup And Restore Jailbreak iPhone Apps

How to backup cydia packages with pkgbackup

If you own a jailbroken iPhone, you might well realize that backing up your existing jailbreak iPhone apps before installing new firmware is extremely crucial to avoid the task of reinstalling them all over again.

Thanks to applications like PkGBackup, backing up your jailbreak apps is extremely simple. This tutorial will take you through the various steps to backup your Cydia applications using PkGBackup application. 

Before we start some important points:

  • You can also checkout free jailbreak iPhone app like AptBackup that help you achieve the same thing but some of our readers have reported issues using it.
  • This solution might not work for the jailbreak iPhone app that is not compatible with the current version of iPhone OS.

Installing PkGBackup Application

Step 1: From the iPhone springboard, tap on the Cydia icon to launch the application.

Step 2: Tap on the 'Sections' tab at the bottom of the screen and navigate to Utilities -> PkGBackup

How to backup cydia packages with pkgbackup

How to backup cydia packages with pkgbackup

Step 3: PkGBackup is available for $3.49 at the Cydia store. Tap on the 'Purchase' button on the top of the screen and follow the instructions to complete the payment. You will be able to install the app once the payment transaction is completed.

Step 4: Tap on the 'Install' button on the top of the screen. Press 'Confirm' to begin the installation process.

How to backup cydia packages with pkgbackup

Step 5: Once installation is complete, press the large 'Return to Cydia' button to complete the process.

How to backup cydia packages with pkgbackup

Backup Jailbreak iPhone apps

Step 1: From the iPhone Springboard, tap on the PkGBackup icon to launch the application. PkGBackup will now scan all the installed packages/jailbreaks apps.

How to backup cydia packages with pkgbackup

Step 2: The application now lists down the list of active packages. Press the blue arrow button to view the complete list of active packages.

How to backup cydia packages with pkgbackup

Step 3: You may now choose to disable backup options for individual packages. To do this, tap on the package name from the list of active packages and turn off the 'Backup' option.

How to backup cydia packages with pkgbackup

Step 4: With PkGBackup, it is also possible to backup your Springboard layout. To do this, visit the main page of PkGBackup application and turn the 'Include Layout' option on.

Step 5: You can now initiate the backup process. Press the 'Backup' button to begin the backing up of your application list.

How to backup cydia packages with pkgbackup

Step 6: Once the backup process is complete, the application prompts you to sync your iPhone with iTunes. Tap the OK button and connect your iPhone to iTunes to complete syncing the files. Ensure that iTunes completely syncs with the backup file. The backup process is complete.

Restoring Backup Packages/Jailbreak Apps

Step 1: Connect your iPhone to your computer and launch iTunes. From the list of devices, right click (Ctrl-click) on 'iPhone' and select 'Restore Backup' from the popup menu options.

How to backup cydia packages with pkgbackup

Step 2: You are now asked to choose the backup file to restore. If you have more than one backup file in your list, select the appropriate backup file and click the 'Restore' button.

Step 3: Updating your firmware may have deleted the PkGBackup app from your Springboard. Follow the steps mentioned above in the 'Installing PkGBackup Application' section to reinstall the app.

Step 4: From the Springboard, launch the PkGBackup app. The application will indicate the list of active packages as well as the number of packages available from the earlier backup.

How to backup cydia packages with pkgbackup

Step 5: If you would like to selectively restore packages, tap on the blue arrow under the 'Previous Backup' section to enable/disable restore options for individual packages.

Step 6: If you would like to restore the Springboard layout from the backup, turn the option ON from the main page of PkGBackup application.

How to backup cydia packages with pkgbackup

Step 7: Tap the 'Restore' button to begin the restoration process. Once the process is complete, you will be prompted to reboot your device. Tap the 'Reboot' button.

How to backup cydia packages with pkgbackup

Step 8: After the restart, the backed up jailbreak iPhone apps should be available on your iPhone.

As always, let us know how it goes.

'Hacking' 카테고리의 다른 글

FPS hack provider  (0) 2010.10.20
Hiding files using ntfs file streaming  (0) 2010.10.16
TCP Analysis - Section 4:TCP Flag Options  (1) 2010.05.25
Java Applet Security Model  (0) 2010.04.23
SSH JAVA APPLET http://javassh.org/space/start  (1) 2010.04.23
Posted by CEOinIRVINE
l

TCP Analysis - Section 4:TCP Flag Options

Share
Introduction

As we have seen in the previous pages, some TCP segments carry data while others are simple acknowledgements for previously received data. The popular 3-way handshake utilises the SYNs and ACKs available in the TCP to help complete the connection before data is transferred.

Our conclusion is that each TCP segment has a purpose, and this is determined with the help of the TCP flag options, allowing the sender or receiver to specify which flags should be used so the segment is handled correctly by the other end.

Let's take a look at the TCP flags field to begin our analysis:

You can see the 2 flags that are used during the 3-way handshake (SYN, ACK) and data transfers.

As with all flags, a value of '1' means that a particular flag is 'set' or, if you like, is 'on'. In this example, only the "SYN" flag is set, indicating that this is the first segment of a new TCP connection.

In addition to this, each flag is one bit long, and since there are 6 flags, this makes the Flags section 6 bits in total.

You would have to agree that the most popular flags are the "SYN", "ACK" and "FIN", used to establish connections, acknowledge successful segment transfers and, lastly, terminate connections. While the rest of the flags are not as well known, their role and purpose makes them, in some cases, equally important.

We will begin our analysis by examining all six flags, starting from the top, that is, the Urgent Pointer:

1st Flag - Urgent Pointer

The first flag is the Urgent Pointer flag, as shown in the previous screen shot. This flag is used to identify incoming data as 'urgent'. Such incoming segments do not have to wait until the previous segments are consumed by the receiving end but are sent directly and processed immediately.

An Urgent Pointer could be used during a stream of data transfer where a host is sending data to an application running on a remote machine. If a problem appears, the host machine needs to abort the data transfer and stop the data processing on the other end. Under normal circumstances, the abort signal will be sent and queued at the remote machine until all previously sent data is processed, however, in this case, we need the abort signal to be processed immediately.

By setting the abort signal's segment Urgent Pointer flag to '1', the remote machine will not wait till all queued data is processed and then execute the abort. Instead, it will give that specific segment priority, processing it immediately and stopping all further data processing.

If you're finding it hard to understand, consider this real-life example:

At your local post office, hundreds of trucks are unloading bags of letters from all over the world. Because the amount of trucks entering the post office building are abundant, they line up one behind the other, waiting for their turn to unload their bags.

As a result, the queue ends up being quite long. However, a truck with a big red flag suddenly joins the queue and the security officer, whose job it is to make sure no truck skips the queue, sees the red flag and knows it's carrying very important letters that need to get to their destination urgently. By following the normal procedures, the security officer signals to the truck to skip the queue and go all the way up to the front, giving it priority over the other the trucks.

In this example, the trucks represent the segments that arrive at their destination and are queued in the buffer waiting to be processed, while the truck with the red flag is the segment with the Urgent Pointer flag set.

A further point to note is the existence of theUrgent Pointer field. This field is covered in section 5, but we can briefly mention that when the Urgent Pointer flag is set to '1' (that's the one we are analysing here), then the Urgent Pointer field specifies the position in the segment where urgent data ends.

2nd Flag - ACKnowledgement

The ACKnowledgement flag is used to acknowledge the successful receipt of packets.

If you run a packet sniffer while transferring data using the TCP, you will notice that, in most cases, for every packet you send or receive, an ACKnowledgement follows. So if you received a packet from a remote host, then your workstation will most probably send one back with the ACK field set to "1".

In some cases where the sender requires one ACKnowledgement for every 3 packets sent, the receiving end will send the ACK expected once (the 3rd sequential packet is received). This is also called Windowing and is covered extensively in the pages that follow.

3rd Flag - PUSH

The Push flag, like the Urgent flag, exists to ensure that the data is given the priority (that it deserves) and is processed at the sending or receiving end. This particular flag is used quite frequently at the beginning and end of a data transfer, affecting the way the data is handled at both ends.

When developers create new applications, they must make sure they follow specific guidelines given by the RFC's to ensure that their applications work properly and manage the flow of data in and out of the application layer of the OSI model flawlessly. When used, the Push bit makes sure the data segment is handled correctly and given the appropriate priority at both ends of a virtual connection.

When a host sends its data, it is temporarily queued in the TCP buffer, a special area in the memory, until the segment has reached a certain size and is then sent to the receiver. This design guarantees that the data transfer is as efficient as possible, without waisting time and bandwidth by creating multiple segments, but combining them into one or more larger ones.

When the segment arrives at the receiving end, it is placed in the TCP incoming buffer before it is passed onto the application layer. The data queued in the incoming buffer will remain there until the other segments arrive and, once this is complete, the data is passed to the application layer that's waiting for it.

While this procedure works well in most cases, there are a lot of instances where this 'queueing' of data is undesirable because any delay during queuing can cause problems to the waiting application. A simple example would be a TCP stream, e.g real player, where data must be sent and processed (by the receiver) immediately to ensure a smooth stream without any cut offs.

A final point to mention here is that the Push flag is usually set on the last segment of a file to prevent buffer deadlocks. It is also seen when used to send HTTP or other types of requests through a proxy - ensuring the request is handled appropriately and effectively.

4th Flag - Reset (RST) Flag

The reset flag is used when a segment arrives that is not intended for the current connection. In other words, if you were to send a packet to a host in order to establish a connection, and there was no such service waiting to answer at the remote host, then the host would automatically reject your request and then send you a reply with the RST flag set. This indicates that the remote host has reset the connection.

While this might prove very simple and logical, the truth is that in most cases this 'feature' is used by most hackers in order to scan hosts for 'open' ports. All modern port scanners are able to detect 'open' or 'listening' ports thanks to the 'reset' function.

The method used to detect these ports is very simple: When attempting to scan a remote host, a valid TCP segment is constructed with the SYN flag set (1) and sent to the target host. If there is no service listening for incoming connections on the specific port, then the remote host will reply with ACK and RST flag set (1). If, on the other hand, there is a service listening on the port, the remote host will construct a TCP segment with the ACK flag set (1). This is, of course, part of the standard 3-way handshake we have covered.

Once the host scanning for open ports receives this segment, it will complete the 3-way handshake and then terminate it using the FIN (see below) flag, and mark the specific port as "active".

5th Flag - SYNchronisation Flag

The fifth flag contained in the TCP Flag options is perhaps the most well know flag used in TCP communications. As you might be aware, the SYN flag is initialy sent when establishing the classical 3-way handshake between two hosts:

In the above diagram, Host A needs to download data from Host B using TCP as its transport protocol. The protocol requires the 3-way handshake to take place so a virtual connection can be established by both ends in order to exchange data.

During the 3-way handshake we are able to count a total of 2 SYN flags transmitted, one by each host. As files are exchanged and new connections created, we will see more SYN flags being sent and received.

6th Flag - FIN Flag

The final flag available is the FIN flag, standing for the word FINished. This flag is used to tear down the virtual connections created using the previous flag (SYN), so because of this reason, the FIN flag always appears when the last packets are exchanged between a connection.

It is important to note that when a host sends a FIN flag to close a connection, it may continue to receive data until the remote host has also closed the connection, although this occurs only under certain circumstances. Once the connection is teared down by both sides, the buffers set aside on each end for the connection are released.

A normal teardown procedure is depicted below:

The above diagram represents an existing connection betwen Host A and B, where the two hosts are exchanging data. Once the data transfer is complete, Host A sends a packet with the FIN, ACK flags set (STEP 1).

With this packet, Host A is ACKnowledging the previous stream while at the same time initiating the TCP close procedure to kill this connection. At this point, Host A's application will stop receiving any data and will close the connection from this side.

In response to Host A's request to close the connection, Host B will send an ACKnowledgement (STEP 2) back, and also notify its application that the connection is no longer available. Once this is complete, the host (B) will send its own FIN, ACK flags (STEP 3) to close their part of the connection.

If you're wondering why this procedure is required, then you may need to recall that TCP is a Full Duplex connection, meaning that there are two directions of data flow. In our example this is the connection flow from Host A to Host B and vice versa. In addition, it requires both hosts to close the connection from their side, hence the reason behind the fact that both hosts must send a FIN flag and the other host must ACKnowledge it.

Lastly, at Step 4, Host A willl acknowledge the request Host B sent at STEP 3 and the closedown procedure for both sides is now complete!

Summary

This page dealt with the TCP Flag Options available to make life either more difficult, or easy, depending on how you look at the picture :)

Perhaps the most important information given on this page that is beneficial to remember is the TCP handshake procedure and the fact that TCP is a Full Duplex connection.

The following section will examine the TCP Window size, Checksum and Urgent Pointer fields, all of which are relevant and very important. For this reason we strongly suggest you read through these topics, rather than skip over them.

'Hacking' 카테고리의 다른 글

Hiding files using ntfs file streaming  (0) 2010.10.16
Back up Jailbreaked iPhone APPs  (0) 2010.09.21
Java Applet Security Model  (0) 2010.04.23
SSH JAVA APPLET http://javassh.org/space/start  (1) 2010.04.23
Malware Analysis  (0) 2010.04.23
Posted by CEOinIRVINE
l

Java Applet Security Model

Hacking 2010. 4. 23. 18:50

Java Applet Security Model

The standard Java applet security model forces downloaded Java applets to run within a highly restrictive sandbox, severely limiting their capabilities as well as the damage they can do to the user's system. The sandbox prevents applets from accessing the machine's file system, which includes the registry on a Windows box, and does not allow them to launch other programs. Additionally, applets cannot communicate with any system on the network except with the host from which the browser downloaded them. I've always been surprised by the use of the word sandbox to describe this critical component of the Java security model. Although this word invokes happy images of children playing peacefully, most parents know that children playing in a sandbox can jump out of the sandbox and spread sand everywhere. Who uses a sandbox to improve security? I use locks, keys, cages, and other physical devices to protect my stuff. Therefore, I think of the Java sandbox as more of a locked cage. Java applets can operate within the cage, but cannot reach outside of the cage to cause any damage (provided that the cage itself is secure, of course).

In the example depicted in Figure 4.12, the SSH applet was operating within these sandbox restrictions. Therefore, I was only able to make an SSH connection to the Web server that was hosting the applet. If I asked the applet to connect to another host, say ftp.example.com, for example, the JRE would block the attempt and present me with the following error message:

java.security.AccessControlException: access denied (java.net.SocketPermission ftp.example.com resolve)


'Hacking' 카테고리의 다른 글

Back up Jailbreaked iPhone APPs  (0) 2010.09.21
TCP Analysis - Section 4:TCP Flag Options  (1) 2010.05.25
SSH JAVA APPLET http://javassh.org/space/start  (1) 2010.04.23
Malware Analysis  (0) 2010.04.23
Computer Security Consulting  (0) 2010.04.02
Posted by CEOinIRVINE
l
<html>
<head><title>SSH Applet</title></head>
<body>
<applet archive="jta20.jar"        <-- a
        code="de.mud.jta.Applet"        <-- b
        width=590 height=360>
<param name="config" value="applet.conf">
</applet>
</body>
</html>

'Hacking' 카테고리의 다른 글

TCP Analysis - Section 4:TCP Flag Options  (1) 2010.05.25
Java Applet Security Model  (0) 2010.04.23
Malware Analysis  (0) 2010.04.23
Computer Security Consulting  (0) 2010.04.02
Update Snort  (0) 2010.03.04
Posted by CEOinIRVINE
l