'hack'에 해당되는 글 17건

  1. 2008.12.16 Gunz Hack loltastic.dll by CEOinIRVINE
  2. 2008.11.27 China Hacks At Rates by CEOinIRVINE
  3. 2008.11.07 Obama, McCain campaigns' computers hacked for policy data by CEOinIRVINE
  4. 2008.10.03 Testing Injection Exposures by CEOinIRVINE
  5. 2008.10.03 Buffer Overflows by CEOinIRVINE
  6. 2008.09.24 Gunz Online by CEOinIRVINE 1
  7. 2008.09.21 CEH (Certified Ethical Hacker) Terminology and Hacking History by CEOinIRVINE

Gunz Hack loltastic.dll

Online Game 2008. 12. 16. 08:28
IJJI loltastic.dll 12/12/08

So,

So, I've released a dll that will take you there.
It also has some rather cool functions :D

This is going to get patched very quickly.

-----------------------------------------------------------------
IJJI Loltastic.dll
-----------------------------------------------------------------
It'll beep upon injection.
The END key enables chat commands. It'll beep when you activate this as well =b.

@godmode = Revive godmode. It'll revive you when your hp falls lower than 50.
@ninjaflip = It'll turn your jumps into flips. You'll see what I mean when you use it.
@beep = :D
@revive = revives you.

Its a simple dll. Nothing spectacular about it.

K LOOK AT THIS
To inject, get injex and do the following.
1) Open injex
2) Browse for loltastic.dll
3) Type gunz.exe in the process name box.
4) Go to settings and then pick 2nd instance. Settings > Instance > 2
5) Try about 8000 delay first.
6) Press injex
7) Start gunz.
8) If it doesn't inject correctly or you get an error. Try a different delay. Every computer's delay is different. Faster computers need less delay. Slower computers need more. Just keep trying. It'll be somewhere between 4000 and 10000.
9) If it says injected, but doesn't work. That more than likely means you injected at the wrong time. Try a new delay.
10) Good Luck.


------------------------------------------------------------------
F.A.Q.
------------------------------------------------------------------
Q. How to inject?
A. Heroin.

Q. What?
A. Heroin.

Q. What the hell?
A. Heroin.

Q. What inspires your hacks?
A. Heroin.

Q. Are you on drugs?
A. Heroin.

Q. I'm sending the FBI after you.
A. QUICK DO A BARREL ROLL.

Q. OMG WHEN I TYPE "@godmode" IT SAYS NO CHATROOM.
A. It's supposed to do that. The hack will work as normal.

Q. What to inject with?
A. MCinject or xInject

Q. This dll doesn't work.
A. Works fine.

Q. Doesn't work.
A. Works fine.

Q. Its patched.
A. No it isn't.

Q. You're just advertising.
A. Yea, and i also gave you a working dll?

Q. Can't you just give us the good stuff for free?
A. Nope. Can't be done.

------------------------------------------------------------------
Credits to Mirageofpenguins.com staff
------------------------------------------------------------------
Mirage
Xeffar
Sv3nt3k
HitachiHex
x1nixmzeng

Anyways, visit the website.
I'll be releasing more stuff, better stuff. And, i'm still selling some rather entertaining hacks.
I'm also giving a copy of the expensive dll away. See the website for more details. (Read the news)
Attached Files
File Type: rar loltastic.rar (40.3 KB, 956 views)

'Online Game' 카테고리의 다른 글

World of Warcraft adds another half million subscribers  (0) 2008.12.26
Lunia Chronicle  (0) 2008.12.19
Cooking Up A Blockbuster Game  (0) 2008.11.24
Don't waste Electricity with Consle Games  (0) 2008.11.21
'Faith' Saves The Day (ONLINE GAME)  (0) 2008.11.11
Posted by CEOinIRVINE
l

China Hacks At Rates

Business 2008. 11. 27. 04:05

China Hacks At Rates

Parmy Olson

Beijing sharply cuts interest rates to aid the country's faltering economy.

China Hacks At Rates

Parmy Olson, 11.26.08, 11:50 AM EST

Beijing sharply cut interest rates to aid the country's faltering economy.

China is scrambling to prop up its economy. The People's Bank of China made a 108-basis-point cut to interest rates on Wednesday after the markets closed, accelerating its recent policy of monetary loosening in the face of slowing exports and industrial production.

Though a rate cut was expected by the central bank, its magnitude--the largest since the Asian financial crisis in October 1997--was surprising. "Bottom line is the Chinese authorities think the economy is slowing down fast," said Nigel Rendell, a senior emerging market strategist at RBC Capital Markets. "It would not be unusual to cut by around 25 basis points--to do more than four times that highlights the downside risks."

Commodities firmed up on expectations of stronger demand from China, following the lowering of interest rates. Crude futures jumped $2.24, to $53.01 a barrel, on the Nymex; copper futures were up 6 cents, at $1.7140 a pound.

Earlier this week, the World Bank cut its forecast for economic growth in China to 7.5%, from 9.2%, though many economists expect an even slower rate of expansion, of anywhere between 2.0% and 7.0%.

This is the fourth time in three months that Beijing has reduced Chinese interest rates, but the several prior reductions, in October and August, were by just 27 basis points each time. China's benchmark rate now stands at 2.52%. The central bank also lowered its reserve requirements by 200 basis points for large banks and by 100 basis points for smaller banks on Wednesday.

The government has meanwhile been shifting fiscal gears as well, announcing on Nov. 9 a $586.0 billion fiscal stimulus plan. China is keenly monitoring the economic moves made by its key export partner, the United States, where consumer spending has recently slowed. (See "Americans Earn More, Spend Less.") Exports represented 37.1% of China's nominal gross domestic product in 2007. "I think China is looking at what's happening to consumers in the U.S. and what is likely to happen in the coming months," said Rendell. "They see house prices down, equity prices down and people being made unemployed."

China's economy is also still feeling the impact of previous measures that Beijing made to cool the economy and keep a lid on inflation; it was tightening monetary policy in the first half of this year, when the economy appeared to be growing too quickly. But in October, a lower than expected level of imports for the month showed that China was not picking up the slack from slowing economies elsewhere. (See "China's Disquieting Trade Surplus.")

China's currency actually strengthened slightly after the rate cut: the U.S. dollar bought 6.82 yuan late Wednesday in Beijing, down from the 6.83 yuan it bought on Thursday.

Rendell expects the currency to stay between 6.80 and 6.90 against the dollar, which is the range around which it has hovered since June. If exports suffered more markedly, the analyst said Beijing might let the yuan weaken further in 2009. But, given that China still has a notable current account deficit, there would undoubtedly be strong international pressure to keep it from going down that route any time soon, which would put struggling exporters in the West at a disadvantage.

'Business' 카테고리의 다른 글

Holding A Candle To Buffett  (0) 2008.11.27
Layoffs And Lawsuits  (0) 2008.11.27
October Durables Prove Fragile  (0) 2008.11.27
Europe's $260B Game Plan  (0) 2008.11.27
Diagnoses Of Cancer Decline in The U.S.  (0) 2008.11.27
Posted by CEOinIRVINE
l

WASHINGTON (CNN) -- Computers at the headquarters of the Barack Obama and John McCain campaigns were hacked during the campaign by a foreign entity looking for future policy information, a source with knowledge of the incidents confirms to CNN.

Workers at Barack Obama's headquarters first thought there was a computer virus.

Workers at Barack Obama's headquarters first thought there was a computer virus.

Click to view previous image
1 of 2
Click to view next image

The source said the computers were hacked mid-summer by either a foreign government or organization.

Another source, a law enforcement official familiar with the investigation, says federal investigators approached both campaigns with information the U.S. government had about the hacking, and the campaigns then hired private companies to mitigate the problem.

U.S. authorities, according to one of the sources, believe they know who the foreign entity responsible for the hacking is, but refused to identify it in any way, including what country.

The source, confirming the attacks that were first reported by Newsweek, said the sophisticated intrusions appeared aimed at gaining information about the evolution of policy positions in order to gain leverage in future dealings with whomever was elected.

The FBI is investigating, one of the sources confirmed to CNN. The FBI and Secret Service refused comment on the incidents. Video Watch Brian Todd's report on the investigation. »

The sources refused to speak on the record due to the ongoing investigation and also because it is a sensitive matter involving presidential politics.

As described by a Newsweek reporter with special access while working on a post-campaign special, workers in Obama's headquarters first detected what they thought was a computer virus that was trying to obtain users' personal information.

The next day, agents from the FBI and Secret Service came to the office and said, "You have a problem way bigger than what you understand ... you have been compromised, and a serious amount of files have been loaded off your system."

One of the sources told CNN the hacking into the McCain campaign computers occurred around the same time as the breach into those of Obama's campaign.

Representatives of the campaigns could not be reached for comment on the matter.


Posted by CEOinIRVINE
l

Testing for Injection Exposures

Now that you understand the basics of SQL injection, LDAP injection, XPATH injection, and OS command injection, it is important that you test you web applications to verify their security. Many methods can be used in testing for injection flaws in web applications. The following section describes an automated method to test for injection flaws, including SQL, LDAP, XPath, XQUERY, and OS commands, using iSEC’s SecurityQA Toolbar. The SecurityQA Toolbar is a security testing tool for web application security. It is often used by developers and QA testers to determine an application’s security both for specific section of an application as well as the entire application itself. For more information on the product, visit www.isecpartners.com.

Automated Testing with iSEC’s SecurityQA Toolbar

The process for testing for injection flaws in web applications can be cumbersome and complex across a big web application with many forms. To ensure that the web application gets the proper security attention, iSEC Partners’ SecurityQA Toolbar provides a feature to test input fields on a per-page basis rather than having to scan the entire web application. While per-page testing may take a bit longer, it can produce strong results since the testing focus is on each page individually and in real time. To test for injection security issues, complete the following steps.

  1. Visit www.isecpartners.com and request an evaluation copy of the product.

  2. After installing the toolbar on Internet Explorer 6 or 7, visit the web application using IE.

  3. Within the web application, visit the page you want to test. Then choose Data Validation | SQL Injection from the SecurityQA Toolbar (Figure 1-1).

  4. The SecurityQA Toolbar will automatically check for SQL Injection issues on the current page. If you want to see the progress of the testing in real time, click the expand button (the last button on the right) before selecting the SQL Injection option. The expand button will show which forms are vulnerable to SQL Injection in real time.

    Image from book
    Figure 1-1: SecurityQA Toolbar
  5. After the testing is completed on the current page, as noted in the progress bar in the lower left side of the browser, browse to the next page of the application (or any other page you wish to test) and repeat step 3.

  6. After you have completed SQL injection testing on all desired pages of the web application, repeat steps 3 and 5 for LDAP Injection, XPATH Injection, OS Commanding, or any other injection testing under the Data Validation menu.

  7. Once you have finished testing all of the pages on the web application, view the report by selecting Reports | Current Test Results. The SecurityQA Toolbar will then display all security issues found from the testing. Figure 1-2 shows a sample injection report. Notice the iSEC Test Value section that shows the specific request and the specific response in boldface type, which shows which string triggered the injection flaw.

    Image from book
    Figure 1-2: SQL/LDAP/XPATH Injection testing results from SecurityQA Toolbar Click to collapse

'Hacking' 카테고리의 다른 글

SSH without PASSWORD  (0) 2008.10.15
Reverse Engineering Tutoring 1  (0) 2008.10.04
Buffer Overflows  (0) 2008.10.03
LDAP Injection  (0) 2008.10.03
XXE (XML eXternal Entity) Attacks  (0) 2008.10.03
Posted by CEOinIRVINE
l

Buffer Overflows

Hacking 2008. 10. 3. 07:19

Buffer overflows are one of the more complex injection attacks, as they take advantage of developers misusing memory. Like command injection, a successful buffer overflow attack gives the attacker complete control of the remote machine.

Note 

This section is intended to give you a feel for buffer overflows, but it does not discuss buffer overflows in technical detail. You can consult other texts and articles such as Aleph One’s classic “Smashing The Stack For Fun And Profit” in Phrack magazine (www.phrack.org/archives/49/P49-14) for more information on buffer overflows.

Some programming languages, such as C and C++, place memory management responsibilities on the developer. If the developer is not careful, user input could write to memory that was not intended to be written to. One such memory location is called the return address of a stack. The return address holds the memory address of the next machine instruction block to execute. If an application is vulnerable to buffer overflows, an attacker could send a very long string to the web application—longer than the developer expected. The string could potentially overwrite the return address, telling the web application what machine instructions it should execute next. The injection aspect of buffer overflows is that the attacker injects machine instructions (called shell code) into some user input. The attacker somewhat needs to know where the shell code will end up in the memory of the computer running the web application. Then the attacker overwrites the return address to point to the memory location of the shell code.

Exploiting buffer overflows are nontrivial, but finding them is not as difficult, and finding buffer overflows on a local machine is easy. You need only send very long strings in all user inputs. We suggest inputting predictable strings, such as 10,000 capital As, into each input. If the program crashes, it is most likely due to a buffer overflow. Repeat the crash while running the application in a debugger. When the program crashes, investigate the program registers. If you see 41414141 (41 is the ASCII representation of a capital A) in the SP register, you have found a buffer overflow.

Finding buffer overflows on remote machines, such as a web application, is a lot more difficult, because attackers cannot view the contents of the web application’s registers, and it may even be difficult to recognize that the web application has even crashed. The trick to finding buffer overflows on web applications is to do the following:

  1. Identify what publicly available libraries or code the web application is running.

  2. Download that code.

  3. Test that code on your local machine to find a buffer overflow.

  4. Develop exploit code that works on your local machine.

  5. Attempt to execute the exploit code on the web application.

Countermeasure Preventing Buffer Overflows

The easiest step is to avoid developing frontend web applications with C and C++. The speed increase is nominal compared to delays in Internet communication. If you must use code written in C or C++, minimize the amount of code used and perform sanity checks on user input before sending it onto the C or C++ derived code.

If you can’t avoid programming in C or C++, you can take basic steps to prevent some buffer overflows, such as compiling your code with stack protection. You can, for example, use the /GS flag when compiling C and C++ code in Visual Studio, and use –fstack-protector in SSP (also known as ProPolice)-enabled versions of gcc.

'Hacking' 카테고리의 다른 글

Reverse Engineering Tutoring 1  (0) 2008.10.04
Testing Injection Exposures  (0) 2008.10.03
LDAP Injection  (0) 2008.10.03
XXE (XML eXternal Entity) Attacks  (0) 2008.10.03
Directory Traversal Attacks  (0) 2008.10.03
Posted by CEOinIRVINE
l

Gunz Online

Online Game 2008. 9. 24. 07:56

Guz Online

Setting up a GunZ Server - Complete Tutorial

What you are going to need:

(Downloads which have no link can easily be searched for to find the program)

Before you do anything, you are going to need to install Microsoft SQL Server Management Studio Express and Microsoft SQL Server 2005.

Step 1 - Setting up the Database and ODBC:

Creating/Connecting the Database

Open Server Management Studio Express* (SMSE). Within the Object Explorer Panel you will notice the ‘Database’ folder, right click it, click ‘New Database…’.

A ‘New Database’ form will open, and in the text input type ‘GunzDB’ and click OK, your database has been created.

The next thing you are going to want to do is restore the Database. Click File> Open> File… and locate your GunzDB.sql file and open it. You are going to have to connect to the database engine, the settings are alright so all you need to do is click ‘Connect’. Now right click on ‘File’ and allow the ‘SQL Editor’ tool bar to show.

In the toolbar there is a drop-down menu with the ‘master’ database selected, click on the arrow and select the ‘GunzDB’ database and click the button next to the drop-down menu, ‘Execute’. A message showing ‘Command(s) completed successfully.’ should notify you that you have done this all correctly.

Creating the ODBC

Click Start> Run> and in the windows input type ‘odbcad32′. You should already be in the ‘User DSN’ tab so click on ‘Add’. Another window should pop-up. You’ll have to scroll all the way down to the bottom and select ‘SQL Server’ then click ‘Finish’.

Another window/form will pop-up needing information for your new Data Source. For the name, type ‘GunzDB’, for the description you may type whatever you like, but for the SQL server you which to connect to, you must go back into SMSE*, look in the SQL Editor tool bar and click the 2nd icon which will disconnect you from data engine. Now click the 1st icon which will re-connect you, but make sure to copy the ‘Server name’ this time, then click ‘Connect’.

Now having that in hand, you can go back to creating your ODBC and in the ‘Server’ text input, paste in your server name. Click next since the settings are currently fine. Now in the next part, click on the tick box and select ‘GunzDB’ from the drop-down menu and click ‘Next’ and finally click ‘Finish’.

If you would like to check your data source, click ‘Test Data Source…’ in the window or you can just click ‘OK’ to finish. Now to completely finish it, click ‘OK’ again.

Step 2 - Patching GunZ:

Install your GunZ game to a directory of your choice. Now open the Legacy Gamers patch and find the directory where you installed your GunZ game into, and run the patch. After that is done, this step is complete.

Step 3 - Configuring the Server:

Place the server files in your C:\ drive and extract them into a folder with the name ‘GunzServer’. Once in the folder, go to the ‘Locator’ folder and then open the ‘Locator.ini’ file. Somewhere in the file you should see these lines of code:

Quote:

[NETWORK]
IP=”217.0.0.1″
PORT=”8900″

You can either change the ‘217.0.0.0′ to your actual IP or localhost which is ‘127.0.0.1′. Besides that everything else is fine.

Make your way to the MatchServer folder and run ‘MatchServer.exe’, once loaded you may minimize it.

Step 4 - Creating an Account (Manually):

Bring up SMSE and expand the ‘Database’ folder if it hasn’t already been done. Expand ‘GunzDB’, expand ‘Tables’ and right click on ‘dbo.Accounts’ and ‘Open table’.

You do not need to worry about the AID field as that is an automatic generation of account number. In the UserID field, type your account ID, in the Password field, type your account password and in the UGradeID, type in your account grade.

Quote:

Account Grades
Administrator - 255
Developer - 254
Banned - 253
Normal User - *Leave Blank*

After you have typed all of that in, press enter and on the SQL Editor toolbar click ‘Execute’ (The exclamation mark symbol).

Step 5 - Configuring ‘config.xml’ to connect to your server:

With that all done, go to the folder where you installed GunZ/Legacy Gamers Patch and find the file ‘config.xml’. Right click on it and open with notepad, or similar. You will see this portion of code:

Quote:

<SERVER>
<IP>legacygamers.com</IP>
<PORT>6000</PORT>
</SERVER>

You are going to need to change the ‘legacygamers.com’ section to the IP you wrote in the ‘Locator.ini’, if you wrote the localhost IP just change it to read:

Quote:

<SERVER>
<IP>127.0.0.1</IP>
<PORT>6000</PORT>
</SERVER>

Then save the file, File> Save and close it.

Step 6 - Unpacking ’system.mrs’:

Extract ‘mrs.rar’ into your GunZ directory. Create a folder called ‘MRS’ inside your GunZ directory and place the files ‘mrs.exe, zlib.dll and system.mrs’ into that folder.

Now, you will need to open WinRAR, direct yourself to the ‘MRS’ folder in your hard drive. Highlight ’system.mrs’ and click the ‘Add’ button. A window will pop-up, select RAR for the archive format and click ‘OK’. Now go back to your ‘MRS’ folder and create a new ‘Text File’ with any name you like, but in the file type:

Quote:

mrs.exe d system.mrs

Now save it and change the file extension to ‘.bat’ from ‘.txt’. Now run that file and a folder named ’system’ should come up. Go into that folder and copy the file ‘zitem.xml’.

Go back to your ‘MatchServer’ folder and paste the ‘zitem.xml’ over the one that is in there. You might need to run your MatchServer.exe again for it to take changes.

Step 7 - Logging in

Run your GunZ client and type the account ID and account password that you used when you made your account in SMSE, you should login.

Congratulations, you have made your GunZ server, enjoy!

Posted by CEOinIRVINE
l

Every speciality has his/her own definition for following terminology.

I will try to do my best how I got those.
Maybe I can give you some examples to understand more.
Especially in computer security field, a lot of confusing stuffs are going on.
Make it sure to keep thinking more and more.

Endurance
Passion
Efforts
lead you close to your goal.

I am still pursuing my dream/my final destination.

Let me show you more......


Terminology:

 

 

  1. Confidentiality - Ensures secrecy or privacy of information
  2. Integrity - Gurantees unauthorized modifcation of data
  3. Availability - Keep availability of data when a legitimate user want to access


 

 


Risk : Possibility! (so it should be related to ASSET, economic value, ex.. Server/Hard disk/Router/Profit)
Vulnerability : Weakness!
Threat : An event or activity! (Denial of Service, Malware, Acquisition of high sensitive data and etc.)

All the above is related to the possibility to cause harm/loss to information system/networks/assets/service/any thing else.




Hacking History
1960 MIT John Draper hacked  2600 Hz tone that allowed access to the AT&T long distance network.

1980 hackers began to share information and stolen passwords 
 e.x.) German “Chaos Computer Club.”

1982 teen ager, 414 Gang, launched attacks into the Sloan-Kettering Cancer Hospital’s medical records systems

1986 attacks were launched against U.S. classified computer systems by Germans affiliated with the Chaos Computer Club and working for the KGB
(see the movie, The Cuckoo’s Egg)

1988 Morris Worm : Hugh DOS attack over the world (he was cornel doctoral student)

1990 Kevin Poulson, with some associates, hacked a radio station’s phone system to ensure they won a call-in contest for Porsches and other prizes

1993 First defcon hacking conference in Las Vegas

1995 Kevin Mitnick (hero/notorious hacker) was convicted in 1989 for computer and access device fraud but eluded police and the FBI for more than two years while he was on probation

1995 Russian hacker Vladimir Leven and associates performed electronic transfers of $10 million to a number of international banks
(from CITIBANK!! ^_^)

2000, hackers launched Distributed DoS attacks against Yahoo!, Amazon.com, and ZDNet. Microsoft Corporation’s network was hacked in October 2000 by an attacker who gained access to software under development.





Posted by CEOinIRVINE
l