Showing posts with label Monitor. Show all posts
Showing posts with label Monitor. Show all posts

What is DNS Rebinding Attack? It's Work And Protection

What is DNS Rebinding Attack? It's Work And Protection







what's DNS Rebinding attack? it's paintings And safety


what's DNS Rebinding attack?
DNS rebinding is a shape of pc attack or can say domain call laptop based totally attack. on this assault, a malicious net web page reasons traffic to run a client-facet script that assaults machines somewhere else on the network.



DNS rebinding attack may be used to breach a private network by using causing the victim's internet browser to get admission to machines at private IP addresses and return the results to the attacker. it could also be employed to use the sufferer system for spamming, allotted denial-of-provider attacks or other malicious sports.



Cybercriminal also can do DNS rebinding assault via Malicious advertising and marketing after which they are able to get right of entry to non-public facts on the network.

How DNS rebinding works?
The attacker registers a domain (consisting of anydomain.com) and delegates it to a DNS server underneath the attacker's manage. The server is configured to reply with a totally quick time to stay (TTL) report, preventing the response from being cached. while the sufferer browses to the malicious area, the attacker's DNS server first responds with the IP deal with of a server website hosting the malicious purchaser-side code.


 





as an instance, they might point the sufferer's browser to a internet site that incorporates malicious JavaScript or Flash scripts which are meant to execute at the victim's laptop.



The malicious customer-facet code makes additional accesses to the authentic domain name (along with attacker.com). these are accepted by way of the identical-beginning coverage. however, whilst the sufferer's browser runs the script it makes a new DNS request for the domain, and the attacker replies with a new IP address. for instance, they might reply with an inner IP deal with or the IP address of a goal somewhere else at the internet.



How can we guard Themselves?
the following strategies try and prevent DNS rebinding assaults:
 always use a robust password on your router. 
To Disable admin get right of entry to console in your router from any outside community.
internet browsers can put into effect DNS pinning: the IP cope with is locked to the cost obtained in the first DNS reaction. This technique may also block a few valid makes use of of Dynamic DNS, and might not work in opposition to all attacks. however, it is essential to fail secure (stop rendering) if the IP address does alternate, because the use of an IP address past the TTL expiration can open the other vulnerability whilst the IP address has legitimately changed and the expired IP address may additionally now be controlled via an attacker.
personal IP addresses may be filtered out of DNS responses.
outside public DNS servers with this filtering e.g. OpenDNS.
neighborhood sysadmins can configure the enterprise's neighborhood nameservers to block the resolution of external names into internal IP addresses. This has the downside of allowing an attacker to map the internal deal with tiers in use.
DNS filtering in a firewall or daemon e.g. dnswall.
net servers can reject HTTP requests with an unrecognized Host header.
The Firefox NoScript extension provides partial safety (for non-public networks)
It become first determined in 1996 and affected Java digital gadget.

Wireshark 2.2.0 Announced With New Features And Bug Fixes

Wireshark 2.2.0 Announced With Bug Fixes

Wireshark is a free and open source packet analyzer. 


It is used for network troubleshooting, analysis, software and communications protocol development.
It formely known as Ethereal, Wireshark allows the user to put the network interface controllers for using Sniffing and can see all the live traffic on the Wireshark Interface.

New Bug Fixes



  • Upgrading to latest version uninstalls Microsoft Visual C++ redistributable. (Bug 12712)
  • Extcap errors not reported back to UI. (Bug 11892)

The following features are new (or have been significantly updated) since version 2.2.0rc2:


No major changes since 2.2.0rc2.

The following features are new (or have been significantly updated) since version 2.2.0rc1:


"Decode As" supports SSL (TLS) over TCP.


The following features are new (or have been significantly updated) since version 2.1.1:


Invalid coloring rules are now disabled instead of discarded. This will provide backward compatibility with a coloring rule change in Wireshark 2.2.

The following features are new (or have been significantly updated) since version 2.1.0:

  • Added -d option for Decode As support in Wireshark (mimics TShark functionality)
  • The Qt UI, GTK+ UI, and TShark can now export packets as JSON. TShark can additionally export packets as Elasticsearch-compatible JSON.
  • The Qt UI now supports the -j, -J, and -l flags. The -m flag is now deprecated.
  • The Conversations and Endpoints dialogs are more responsive when viewing large numbers of items.
  • The RTP player now allows up to 30 minutes of silence frames.
  • Packet bytes can now be displayed as EBCDIC.
  • The Qt UI loads captures faster on Windows.
  • proto_tree_add_checksum was added as an API. This attempts to standardize how checksums are reported and filtered for within *Shark. There are no more individual "good" and "bad" filter fields, protocols now have a "checksum.status" field that records "Good", "Bad" and "Unverified" (neither good or bad). Color filters provided with Wireshark have been adjusted to the new display filter names, but custom ones may need to be updated.

The following features are new (or have been significantly updated) since version 2.0.0:



  • The intelligent scroll bar now sits to the left of a normal scroll bar and provides a clickable map of nearby packets.
  • You can now switch between between Capture and File Format dissection of the current capture file via the View menu in the Qt GUI.
  • You can now show selected packet bytes as ASCII, HTML, Image, ISO 8859-1, Raw, UTF-8, a C array, or YAML.


You can now use regular expressions in Find Packet and in the advanced preferences.

Name resolution for packet capture now supports asynchronous DNS lookups only. Therefore the "concurrent DNS resolution" preference has been deprecated and is a no-op. To enable DNS name resolution some build dependencies must be present (currently c-ares). If that is not the case DNS name resolution will be disabled (but other name resolution mechanisms, such as host files, are still available).

The byte under the mouse in the Packet Bytes pane is now highlighted.


  • TShark supports exporting PDUs via the -U flag.
  • The Windows and OS X installers now come with the "sshdump" and "ciscodump" extcap interfaces.
  • Most dialogs in the Qt UI now save their size and positions.
  • The Follow Stream dialog now supports UTF-16.
  • The Firewall ACL Rules dialog has returned.
  • The Flow (Sequence) Analysis dialog has been improved.
  • We no longer provide packages for 32-bit versions of OS X.
  • The Bluetooth Device details dialog has been added.
Source: Wireshark




Analysis of TeleBots’ cunning backdoor

Analysis of TeleBots’ cunning backdoor

On the 27th of June 2017, a new cyberattack hit many computer systems in Ukraine, as well as in other countries. That attack was spearheaded by the malware ESET products detect as Diskcoder.C (aka ExPetr, PetrWrap, Petya, or NotPetya). This malware masquerades as typical ransomware: it encrypts the data on the computer and demands $300 bitcoins for recovery. In fact, the malware authors’ intention was to cause damage, so they did all that they could to make data decryption very unlikely
we attributed this attack to the TeleBots group and uncovered details about other similar supply chain attacks against Ukraine. This article reveals details about the initial distribution vector that was used during the DiskCoder.C outbreak.

Tale of a malicious update

The Cyberpolice Department of Ukraine’s National Police stated, on its Facebook account, as did ESET and other information security companies, that the legitimate Ukrainian accounting software M.E.Doc was used by the attackers to push DiskCoder.C malware in the initial phase of the attack. However, until now, no details were provided as to exactly how it was accomplished.
During our research, we identified a very stealthy and cunning backdoor that was injected by attackers into one of M.E.Doc’s legitimate modules. It seems very unlikely that attackers could do this without access to M.E.Doc’s source code.
The backdoored module has the filename ZvitPublishedObjects.dll. This was written using the .NET Framework. It is a 5MB file and contains a lot of legitimate code that can be called by other components, including the main M.E.Doc executable ezvit.exe.
We examined all M.E.Doc updates that were released during 2017, and found that there are at least three updates that contained the backdoored module:
  • 01.175-10.01.176, released on 14th of April 2017
  • 01.180-10.01.181, released on 15th of May 2017
  • 01.188-10.01.189, released on 22nd of June 2017
The incident with Win32/Filecoder.AESNI.C happened three days after the 10.01.180-10.01.181 update and the DiskCoder.C outbreak happened five days after the 10.01.188-10.01.189 update. Interestingly, four updates from April 24th 2017, through to May 10th 2017, and seven software updates from May 17th 2017, through to June 21st 2017, didn’t contain the backdoored module.
Since the May 15th update did contain the backdoored module and the May 17th update didn’t, here is a hypothesis that could explain low infection Win32/Filecoder.AESNI.C ratio: the release of the May 17th update was an unexpected event for the attackers. They pushed the ransomware on May 18th, but the majority of M.E.Doc users no longer had the backdoored module as they had updated already.
The PE compilation stamps of analyzed files suggest that these files were compiled on the same date as the update or the day before.
Figure 1 – Compilation timestamp of the backdoored module pushed in May 15th update.
Figure 2 shows difference between list of classes of backdoored and non-backdoored version of module, using the ILSpy .NET Decompiler:
Figure 2 – List of classes in backdoored module (at left) and non-backdoored (at right).
The main backdoor class is named MeCom and it is located in the ZvitPublishedObjects.Server namespace as shown in Figure 3.
Figure 3 – The MeCom class with malicious code, as shown in ILSpy .NET Decompiler.
The methods of the MeCom class are invoked by the IsNewUpdate method of UpdaterUtils in the ZvitPublishedObjects.Server namespace. The IsNewUpdate method is called periodically in order to check whether a new update is available. The backdoored module from May 15th is implemented in a slightly different way and has fewer features than the one from June 22nd.
Each organization that does business in Ukraine has a unique legal entity identifier called the EDRPOU number (Код ЄДРПОУ). This is extremely important for the attackers: having the EDRPOU number, they could identify the exact organization that is now using the backdoored M.E.Doc. Once such an organization is identified, attackers could then use various tactics against the computer network of the organization, depending on the attackers’ goal(s).
Since M.E.Doc is accounting software commonly used in Ukraine, the EDRPOU values could be expected to be found in application data on machines using this software. Hence, the code that was injected in the IsNewUpdate method collects all EDRPOU values from application data: one M.E.Doc instance could be used to perform accounting operations for multiple organizations, so the backdoored code collects all possible EDRPOU numbers.
Figure 4 – Code that collects EDRPOU numbers.
Along with the EDRPOU numbers, the backdoor collects proxy and email settings, including usernames and passwords, from the M.E.Doc application.
Warning! We recommend changing passwords for proxies, and for email accounts for all users of M.E.Doc software.
The malicious code writes the information collected into the Windows registry under theHKEY_CURRENT_USER\SOFTWARE\WC key using Cred and Prx value names. So if these values exist on a computer, it is highly likely that the backdoored module did, in fact, run on that computer.
And here is the most cunning part! The backdoored module does not use any external servers as C&Cs: it uses the M.E.Doc software’s regular update check requests to the official M.E.Doc server upd.me-doc.com[.]ua. The only difference from a legitimate request is that the backdoored code sends the collected information in cookies.
Figure 5 – HTTP request of backdoored module that contains EDRPOU number in cookies.
We have not performed forensic analysis on the M.E.Doc server. However, as we noted in our previous blogpost, there are signs that the server was compromised. So we can speculate that the attackers deployed server software that allows them to differentiate between requests from compromised and non-compromised machines.
Figure 6 – Code of backdoor that adds cookies to the request.
And, of course, the attackers added the ability to control the infected machine. The code receives a binary blob official M.E.Doc server, decrypts it using the Triple DES algorithm, and, afterwards, decompresses it using GZip. The result is an XML file that could contain several commands at once. This remote control feature makes the backdoor a fully-featured cyberespionage and cybersabotage platform at the same time.
Figure 7 – Code of backdoor that decrypts incoming malware operators’ commands.
The following table shows possible commands:
CommandPurpose
0 – RunCmdExecutes supplied shell command
1 – DumpDataDecodes supplied Base64 data and saves it to a file
2 – MinInfoCollects information about OS version, bitness (32 or 64), current privileges, UAC settings, proxy settings, email settings including login and password
3 – GetFileCollects file from the infected computer
4 – PayloadDecodes supplied Base64 data, saves it to as executable file and runs it
5 – AutoPayloadSame as previous but the supplied file should be a DLL and it will be dropped and executed from Windows folder using rundll32.exe. In addition, it makes attempt to overwrite dropped DLL and delete it.
It should be noted that command number 5, named by malware authors as AutoPayload, perfectly matches the way in which DiskCoder.C was initially executed on “patient zero” machines.
Figure 8 – AutoPayload method that was used to execute DiskCoder.C malware.

Conclusions

As our analysis shows, this is a thoroughly well-planned and well-executed operation. We assume that the attackers had access to the M.E.Doc application source code. They had time to learn the code and incorporate a very stealthy and cunning backdoor. The size of the full M.E.Doc installation is about 1.5GB, and we have no way at this time to verify that there are no other injected backdoors.
There are still questions to answer. How long has this backdoor been in use? What commands and malware other than DiskCoder.C or Win32/Filecoder.AESNI.C has been pushed via this channel? What other software update supply chains might the gang behind this attack have already compromised but are yet to weaponize?
Special thanks to my colleagues Frédéric Vachon and Thomas Dupuy for their help in this research.

Indicators of Compromise (IoC)

ESET detection names:
MSIL/TeleDoor.A
Legitimate servers abused by malware authors:
upd.me-doc.com[.]ua
SHA-1 hashes:
7B051E7E7A82F07873FA360958ACC6492E4385DD7F3B1C56C180369AE7891483675BEC61F3182F273567434E2E49358E8210674641A20B147E0BD23C

ELSA: New CIA Tool Revealed By Wikileaks Which Was Used To Track PCs Via WI-Fi

ELSA: New CIA Tool Revealed By Wikileaks Which Was Used To Track PCs Via WI-Fi


ELSA: New CIA Tool Revealed By Wikileaks Which Was Used To Track PCs Via WI-Fi.



Wikileaks released latest Vault7 series of CIA Hacking tools. ELSA, the malware used to track Wi-Fi enabled devices on running Microsoft Windows operating system. ELSA allows to gather location data on the victim device and able to monitor remotely.


"WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a Geo-location malware for WiFi-enabled devices like laptops running the Microsoft Windows operating system. Once persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals. To perform the data collection the target machine does not have to be online or connected to an access point; it only needs to be running with an enabled WiFi device.

If it is connected to the internet, the malware automatically tries to use public Geo-location databases from Google or Microsoft to resolve the position of the device and stores the longitude and latitude data along with the timestamp. The collected access point/geo-location information is stored in encrypted form on the device for later exfiltration. The malware itself does not beacon this data to a CIA back-end; instead the operator must actively retrieve the log file from the device - again using separate CIA exploits and backdoors.

The ELSA project allows the customization of the implant to match the target environment and operational objectives like sampling interval, maximum size of the logfile and invocation/persistence method. Additional back-end software (again using public geo-location databases from Google and Microsoft) converts unprocessed access point information from exfiltrated logfiles to Geo-location data to create a tracking profile of the target device."





Last week Wikileaks Published Brutal Kangaroo project of the CIA.  Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumb drives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executable.

Top five (5) apps that's turns your Android device into hacking phone

zANTI - Mobile Security Rise Assessment: zANTI is a penetration testing toolkit for cyber security professionals.its
also allows you to simulate malicious attacks on a network.you can use zANTI
in creating a malicious WiFi hotpot,Hijacking HTTP sessions,Modifying HTTP requests and responses.
Exploiting routers,checking a device for shell shock and SSL poodle vulnerability,capturing downloads,changing
device's MAC address etc

WiFi Kill: this another powerful tool,basically its controls the WiFi network,it can also disable
the internet connection of other devices connected to same WiFi network...it is a useful tool for
WiFi internet users, using the powerful tool can prevent others off from a common WiFi network and set aside all the bandwidth
to yourself.this very up is for rooted Android app only.to use this app
mark the tic on "unknown source" in settings of the phone and open the downloaded app and install it,ready to use
Whats-app Sniffer: Whats-app Sniffer is an Android app that allows you to receive the conversations from whats-app application from
phones that uses the same WiFi  with you with this app you can receive text messages , videos pictures as well this app only works with rooted phones its a free app you can download from place-store it used be use for educational and personal use only.
Download WhatsAppSniffer

cSploit: is an Android app that opens Android network analysis and penetration suite,it is the best and advanced professional toolkit for internet
security assess in mobile phones. it works rooted Android version 2.4 or newer vision with this app you can

  •  map your local network
  •  integrated trace rout
  •  adjust exploit settings,lunch and create shell console on exploited system
  • capturing pcap network  traffic files etc


Face Niff : is an Android app for hackers (newbies) who wants to sniff and 
analyse web session profiles over WiFi connection.which simply means you
can use this app only when you are on the same WiFi connection

NOTE: there are thousands of hacking app out there but we have only worked on this five app for now......

How To Cyber Perform Forensic Investigation In 3 Easy Steps

A Forensic investigation helps the organisation collecting and analyzing the data as evidence. The data collected by forensic investigation can be used as a proof in a court. Because of this, data must be protected in a safe way and needs to be prevented  from modification.


What do you mean by forensic investigation?

Forensic investigation means to analyse the data from the computer and collect it as a proof if any incident happens. This is ever growing domain and lots of institutes are providing a specialised degree in this particular area.

There are mainly three steps in a forensic investigation:

1. Collecting the data
2. Analysing the data
3. Prevent from modification 

Forensic investigators use a different forensic procedure to collect the data and their primary task is to protect that data from modification so that, it can be shown as an evidence in a court.

Now I will explain how to perform forensic investigation:

Step 1

Forensic investigators have special kind of tools to collect the data, for example, you can use …. data include images, email, message, etc. They collect in specified format by following the order of volatility concept. So the volatility concept says, collect the data from most volatile to least volatile. Generally, the sequence of volatility concept is cache memory, RAM, Swap or paging file, hard drive data, logs stored on archived media.

Step 2: Capture the image

Capturing the image means to copy the exact data without any modification. A forensic capture image uses bit by bit tool to capture the data so that it can copy the data without any single modification and try to connect some hardware devices to the drives. Therefore, it can be write protected during the copy process. Encase and forensic toolkit are the most popular forensic tools used by the forensic experts.

Step3: Prevent from modification

Hashing is an important concept which is generally used to prevent the data from modification. Hashing is used by most of the forensic experts to provide proof of the collected data that it has not been modified. So, to maintain the integrity i.e., to prevent from modification we need to take hash. You can take hash as many times you require and it will remain same as long as the data is same.

For example: After capturing an image of the disk, an expert can create a hash of the image and keep it safe and can also enable write protection mechanism to prevent the image from modification. Later, when that evidence is required they again take the hash and matches the later hash with the previous hash if it is same then it means data has not been modified and it is good to use as evidence in a court.

These were the basic three steps which sum up the whole forensic investigation process.

Apart from that, forensic investigation often includes analyses of network traffic and logs of the incident and also maintain a chain of custody. Chain of custody is a process that gives an assurance that evidence is collected in a proper way and handled properly.

Popular Posts