Cybercriminals use a variety of bots to conduct DDoS attacks on Internet servers. One of the most popular tools is called Black Energy. To date, Kaspersky Lab has identified and implemented detection for over 4,000 modifications of this malicious program. In mid-2008 malware writers made significant modifications to the original version, creating Black Energy 2 (which Kaspersky Lab detects as Backdoor.Win32.Blakken). This malicious program is the subject of this article.
Websites using software from vBulletin have been stung by a critical vulnerability that makes it trivial to steal credentials needed to administer site panels.
The flaw in version 3.8.6 of vBulletin makes it possible for anyone with a web browser to infiltrate a forumās back end, where sensitive data about users is often stored. The forumware giant issued a patch on Wednesday, but a simple Google search on Friday revealed that scores of users have yet to apply it, meaning their administrative user names and passwords are wide open.
Exploiting the bug is as easy as entering ādatabaseā (minus quotes) in the search box of a forumās FAQ page. Vulnerable sites respond by returning everything thatās needed to view sensitive user information or make administrative changes.
The patch updates users to version 3.8.6 PL1. Users who want to make sure the fix has worked should check for the string ādatabase_ingo,ā which is removed once the new version has correctly been installed.
Stay alert of hidden iFrame injection attacksā¦
* In the past, it was common for attackers to inject their malicious Iframes at the bottom / end of the webpage. Attackers are now injecting malicious Iframes anywhere in the webpage.
* Many websites which were found to be infected in past months by malicious hidden Iframes appear to still be infected with them. Meaning most web site owners or hosting providers are not policing the content that they are serving on the web.
Our data shows many previously infected websites are still infected with hidden malicious Iframes today. Due to different obfuscation techniques detection by a majority of the Antivirus vendors remains poor, avast has very good detection with the shields, and webbrowser users can get protected with the use of extensions like NoScript abd RequestPolicy in thr Mozilla browser types (like Firefox and Flock etc.), see for the latest of these attacks http://twitter.com/dasient_new_mal
well the thing is that all LAN communication is also encrypted in Win7, which already excludes the stealing of data, even if WPA2 was broken. edit after further reading: >>> Remains a possible access to the router, and the stealing of the connectionā¦live examples and reports needed here ;D
okay: the attack is āmay beā only possible from an insider, someone on your LAN, not from the outside ⦠waiting for a demo ;D
and now:
The vulnerability will be presented at BlackHat Arsenal by AirTight Networks senior wireless security researcher Md Sohail Ahmadā¦
ā¦
Ahmad claims that this behavior is to spec (page 196 of the IEEE 802.11 standard, hence āHole 196ā) and that thereās nothing to fix in the implementation. The only way to protect your network is to monitor all wireless traffic for it. AirTight networks, incidentally, sells Wireless Intrusion Prevention Systems.
;D
Just fire up Fiddler 2.0 in a browser and see what is being sent chunked, whenever that what is encrypted, with one click we will make it is unchunked and de-compressed and readable. If a machine can render something then someone somehow can show what is to be rendered for human eyes to be decipheredā¦just logical,Logos, just logical and you just need the rendering tool, sniffer whatever,
hmmā¦Polonusā¦seems a bit more complicated then that : ⦠as Fiddler2 will only allow you to decrypt your own traffic, the one that your browser already decrypts ;D
back to topicā¦we already know from the article links I posted I that the potential flaw in WPA2 only affects the LAN if an insider is originating the procedure. And Asyn: read again the end of my last post
It appears from these revelations that all comes pre-backdoored by design then, the uninformed to find out about this,
only after it has been revealed,
the company who ārevealsā the flaw, and is supposed to demonstrate it, is also a company selling wi-fi monitoring software, and they already advise to use that, saying that the protocol canāt be patched anyway and the only way out is to acquire >>> full time monitoring software.