Hey everyone,
so scriptfish and I participated in a "hackerchallenge" which took place at the end of march. It was organized by a german company in the field of IT security. They put up a page and the goal was to acquire some sort of tokens by using vulnerabilities on the website (6 in total). During our process, we decided to write down our thought process for those who are interested in how we solved the challenge.
You can find our writeup here:
http://s000.tinyupload.com/index.php?file_id=60136847504251943130
Thanks to everyone in the IRC who tried to help us out with some of our dumb questions.
Enjoy!
kiwi
I recently wrote a very basic HID attack but I decided to take it a step further. I designed USB HID Attack that opens up a gnome terminal(using alt+f2 since Ctrl+alt+t is no longer default on Kali boxes) and runs several commands....
Currently the attack changes the background of the user's wallpaper and shells them using a python shell I wrote that is encoded into Base64. I decided against a reverse shell because if you can plug into the computer with a USB Device you can get on the network...
Here is a demo of an attack. The delays on the attack are set REALLY long because I was having issues with the laptop being too slow.
https://vid.me/e/D7W9?autoplay=1
The attack will eventually overwrite the MBR of the kali install but I'm trying to figure out the best way to handle it. If you're interested in the bootloader's code just ask me and I'll share it with you.
The Python Shell
The Python Encoder
The Arduino Sketchup
# Note remove the spaces from the wget line. They were added to the URL to prevent image formatting.
There was a discussion about Xen VM exploitation in IRC and this link - https://www.nccgroup.com/en/blog/2015/02/adventures-in-xen-exploitation/ was mentioned. Is a really good overview of one man's work at exploiting an old bug (Xen SYSRET bug (CVE-2012-0217)). Regardless of age, should be a good read for anybody wanting to learn more about this topic.
Hi
Im struggling to get this to work and not sure what i am doing wrong or if im even going in the right direction.
Below is the code and this is what I have so far - data=o:4:"AUTH":1:{s:5:"query";s:4:"id=1";}
Im working on getting a POC set up for this sploit. If anyone wants to help let me know.
I would like to warn everyone about a group called blackshades. because of them I have been in prison for nearly 2 years, plus another 2 years on parole. while using their VPN server they assured us they DO NOT track IPs or keep logs. As soon as the US govnt asked them for some logs they immediately gave up my info. If you would like I would be more than happy to post my court papers here showing this. I do want others to be warned. I don't know what they are doing these days, this was over to years ago. (first chance I have had to post since I just got out of prison a month ago and am allowed back on a computer).
Felony
HELLO, PLS ANY BODY TO HELP ME ABOUT HOW TO USE SQL INJECTION TO GET A GOOD VULNERABLE RESULT I MEAN TO SCAN A SPECIFIC SITE FOR THE HAVIJ TO WORK
AND ALSO IF THE TARGET IS XXS HOW CAN I GET THE VULNERABLE OF THE SITE BECUS I USE HAVIJ TO EXPLOIT ON WINDOWS 8
I figured out I would just share this repo for educational purposes:
Could somebody please hack a private photobucket account for me?
I've asked around on other hacking forums and the people there either refuse or want me to pay them.
If someone could do this for me, I would forever be in their debt, you have no idea what it would mean to me!
This is being maintained at https://github.com/lattera/exploits/blob/master/bash/CVE-2014-6271.zsh