~V~ Pass it On!!

5 09 2007

V Seal

Why?  Cause I thought it was kewl!!!





Tutorial: “Unlock” Your iPhone With SuperSim via Hackint0sh

6 08 2007

So far this hack is only reported to work in Europe.  Basically all you need is a blank SIM card and a SIM card reader/writer, oh and the instruction posted at the link below:

Tutorial: “Unlock” your iPhone with SuperSim – Hackint0sh

Sure its old news, but I just thought some peeps would like to know.





Point n’ Click Gmail hacking With Wi-Fi (via) TG Daily and Blackhat

3 08 2007

For everyone out there that keeps commenting on “How To Hack Gmail, Hotmail, Yahoo, etc etc”  (MOM), here’s a great article on hacking into a gmail account WITHOUT using fake login screens or any of that pesky hard work.  TG Daily has this great article, “Point and click Gmail hacking at Black Hat” that gives you a peek into the latest and greatest way to get into someone else’s email account.

Here’s an excerpt:

[…] The attack is actually quite simple. First Graham needs to be able to sniff data packets and in our case the open Wi-Fi network at the convention fulfilled that requirement. He then ran Ferret to copy all the cookies flying through the air. Finally, Graham cloned those cookies into his browser – in easy point-and-click fashion – with a home-grown tool called Hamster.

[…] But if that wasn’t scary enough, Graham told us that he can even log in the next day or possibly several days later into the Gmail account.  “I can just copy the data to a file and replay it later.  I’ve been able to log into Gmail accounts one day later,” said Graham.

Since the attack relies on sniffing traffic, using SSL or some type of encryption (like a VPN tunnel) would stop Graham in his tracks.  However, many people browsing at public wireless hotspots don’t use such protections.

“You’re an idiot if you use T-Mobile hotspot,” said Graham.

I personally love the last comment there from Graham… just sayin.

In my mind I see this type of hack working on any web based email client that uses cookies to auto-login.  Also, you can probably just use FireFox’s “Add-n-Edit” cookies, instead of Grahams app called Hamster.  As for Wi-Fi sniffing, if you don’t know how to do this or what apps to do it with, just use Google to search it out, or visit Remote Exploit and grab a copy of BackTrack2.

One last note, read the friggin article. CLICK THE SOURCE – PLZ kthx.

There, let’s hug it out bitches!!!





Mac OS X Hacking: InfoSecSellout’s “Rape.osx” Worm and ExploitingiPhone.com “iPhone Exploits”

24 07 2007

If you haven’t read about the latest (as of 7.23.07) Mac exploit/s then you either don’t care or haven’t looked at the intarwebs lately. I’ll give you the short version, with LOTS of links:

Engadget is aflame with comments on their posts, so far THREE, about the alleged “rape.osx” worm that a group of hackers, who call themselves “InfoSecSellOut“, posted some hints about on their blogspot blog as well as a link to a securityfocus.com notice about the “worm”, oh and a hint that they want money for having created the worm. There’s been way too much drama to map out here (death threats much?!?!), but lets just say its gotten out of hand and TMBBITW is totally neutral, we’re strictly grey hat and ALL homegrown Linux. No plans to release the code for the rape.osx worm have been revealed, not even a little bit.
HackZine has a little blurb up about a video that has popped up on www.exploitingiphone.com, which is really a redirect to a slashed Independent Security Evaluators URL. Obviously, ISE has an iPhone exploit on their hands, however they have notified Apple and have some good info up. There’s a truncated white paper out and they plan to reveal their code on August 2nd, at the Black Hat convention in Vegas.

For the Windows folks out there, you haven’t been left out. A win32 version of Safari was released, but hacked in ONE day.

And that’s everything in a nutshell since last wednessday. Now I’ll go on to explain all the information I could gather on all of these, what we like to call, Mac Hacks.

ALL of the malware/exploits/worms/whatever you wanna call them are executed via Safari. That means all three versions (mobile, desktop and Win32).

First is the most interesting, the iPhone exploit. Basically ISE has done a buttload of work, not to mention a bang up job creating this:

If you read the white paper that they have on their site, which is pretty exhaustive, you’ll find out the level of knowledge that this hack took to find and make into a shell script.

Here’s how they started, and what will probably be THE way to find new exploits for the iPhone:

Using jailbreak and iPhoneInterface, the binaries can be extracted from the device and statically analyzed, using a disassembler. Additionally, since the MobileSafari and MobileMail applications are based on the open source WebKit project, a source code audit of that package can be performed. Finally, dynamic analysis, or fuzzing, can be executed against the device. This involves sending malformed data to the device in an effort to cause a fault and make it crash. Such fuzzing can be performed against applications such as MobileSafari or against the WiFi or BlueTooth stack. (you can download the tools mentioned in the above excerpt by clicking on them, as for fuzzers and debuggers just use BACKTRACK and DBG)

NOTE: For a quick tut on how to “activate” an iPhone go HERE: http://www.pqdvd.com/blog/iphone/category/unlock-iPhone/

Get the one click “unlock” kit, via DVD Jon, for yer iPhone HERE: http://therealdonquixote.files-upload.com/393766/iphoneunlocktoolkit.zip.html

Now this is where it gets a bit tricky:

[…] in order to view memory and discover the way the execution flows in the application. However, in this case we were able to utilize the Mac OS X crash reporter. This daemon runs and monitors any programs for crashes. When one is detected it records a log of the crash, including relevant register values. These reports can then be transported to a desktop computer when syncing. The crash reports can also be downloaded directly off the iPhone using jailbreak and iPhoneInterface. While the CrashReporter provides register values and basic memory mapping information, it does not include direct access to the memory. In order to obtain this crucial information, it is possible to modify the iPhone in such a way that the applications will dump core files when they crash. This is accomplished by adding the file /etc/lauchd.conf containing the line “limit core unlimited”
to the iPhone using iPhoneInterface. Core files can be retrieved off the iPhone from the /cores directory, again using iPhoneInterface.

In order to generate valid opcodes for the iPhone, we first installed a Linux x86 to ARM cross compiler. This would compile our ARM assembly to bytecode which we could then extract into shellcode. Besides not having a debugger, developing iPhone shellcode also presented other challenges. Since we didn’t have access to an ARM processor with a debugger, we had absolutely no real way to test the shellcode besides trying it and using the core files obtained.

That’s pretty much where I gave up on trying to go at this on my own. ISE actually has two hacks for the iPhone where one collects data and the other can actually make your phone do whatever they want, dial, ring whatever. That’s all I got, but anyone is welcome to give iPhone hacking a whirl. All the files are linked up there.

Now on to InfoSecSellOut’s “Rape.osx”. To start it is supposed to be a worm which is deployed via Safari. From what securityfocus.com says, it seems to be based on mDNSresponder (yes, click to download). All that I can find out about it is that ISSO (InfoSecSellOut) was able to download a text file using their exploit. However, in reading the white paper for the iPhone hack, I saw that the real problem with Mac OS X (pick one) security is that all applications are run as “root” or with “admin” privilages. So that means that once you are in a Mac OS X machine, you can do whatever you want.

NOTE: Many linux OS’s use mDNSresponder as well, so be on the lookout. However, most people do know not to login as root on their linux machine, right?

I have no code, no apps, nothing on rape.osx other than the code for mDNSresponder. I do have some code for the first Mac virus, the Leap.A virus, as well as some other info I gathered in order to further the purposes of writting worms/viri/malware for Mac OS X.

DOWNLOAD HERE: MAC_osX_Malware_Data_Sourc_codes_papers..zip

The file contains the following:

macosxhacklist

As for the Win32 version of Safari, what were people thinking?!?!? Porting, what is essentially an open source Mac app to Windows? Yeah, no one is going to hack that. Stick to FireFox with all the JS, Flash, AD, PopUp, bad shit blocking extensions that you can shake a stick at.

And that’s all she wrote for now folks.

Keep on keepin on hackers of all hats. I’ll keep you updated.

*Sources – Noted and linked throughout the article, accepting VX CHAOS FILE SERVER where I get ALL my super sweet viri source codes and all the best viri, malware, trojans, RATs, you name it and AZAG has got it!!





Mashable Strikes Again: 400+ Tools for Photographers, Videobloggers, Podcasters & Musicians

23 07 2007

Yet again, Mashable has compiled one of, if not the best list of tools for any type of online media.   Some of the links may be repeats from their previous list “Video Toolbox: 150+ Online Video Tools and Resources“.  However, with a title like this:

ONLINE MEDIA GOD: 400+ Tools for Photographers, Videobloggers, Podcasters & Musicians

One expects to find pretty much any link related to online media tools.

Check the intro:

Online media is exploding…and with it, a new class of creative people producing their own music, podcasts, professional-level photography and video shows. We’ve compiled the largest list so far of useful tools for self-made photographers, videobloggers, podcasters and musicians.

Keep em comin Mashable!!





Mashable’s Video Toolbox: 150+ Online Video Tools and Resources

27 06 2007

Mashables does it again and comes up with this kick ass list. “Video Toolbox: 150+ Online Video Tools and Resources

Check the intro:

Online video is a huge trend – so huge that’s it’s proving hard to keep track. From video sharing sites to video mixers, mashups and converters, we’ve brought together more than 150 of our favorite sites in this category. Enjoy.

Follow the link to read the list silly: Video Toolbox





16 Ways To Get Fired, And How To Avoid Them (Office 2007 Edition)

23 06 2007

After reading 11 Causes and Cures for Procrastination over at johnplaceonline.com, I thought it might be helpful to write a small list of things that seem to piss people off at the office and how to avoid them.  I know it may seem unprofessional to say “piss people off” in a fairly professional article on how not to get fired, but its the only phrase that seems to capture the idea with any accuracy.  So, please forgive the language, because it was indeed pertinent to the article.

Getting yourself “fired” from an office bureaucracy is actually kind of hard to do these days.  No one wants to go through all the paper work and red tape that it takes to get someone terminated with cause, but it can be done with the greatest of ease if you really piss people off.  You can be the most worthless employee since that guy who has an IQ of 80 and not get fired, but piss people off and you WILL get fired.  You’d be amazed at the extent a company will go in order to get you GONE, just for being a bit of a nuisance to the wrong person.

This list may seem trite or even funny, but its not a joke.  All of these “ways to get fired” have been tested and combined with the result of termination.  I am making this list as much for some old friends of mine as for myself or anyone.  I hope it can help.

16 Ways To Get Fired, And How To Avoid Them:

  • Sitting In Weird Positions at Your Desk/Cube: Sit like a “normal” person and people will not notice you.
  • Looking “Bored” at Meetings/In General: Sit up straight, walk tall and take notes.  Doesn’t matter what everyone else is doing, you are trying to escape being singled out.
  • Wearing Headphones/iPod While Walking Around:  Only wear headphones at your desk if its even politically OK at your office.
  • Asking Questions When People Say “Any Questions?”: Just keep you trap shut.  Everyone wants out of the meeting/presentation ASAP and the higher ups don’t like to be questioned.
  •  Animated GIFs in Your Email Signature: Don’t even think about it.  You have no idea what people can be offended by and they make the email’s larger in size which fills up Windows Exchange servers in minutes.
  • Using The ‘Net Send’ CMD To Say “Hello World” To Everyone in Your Network’s Domain:  It’s fun, but it is just a bad idea.  However, in hindsight its hilarious, of course you’ll be fired by then anyway.
  • Coming In Late:  Always be on time and call before you are supposed to be there if you are going to be UNAVOIDABLY late.  People hate waiting and someone is always watching/waiting.
  • Frequently Calling In Sick:  Yes you are allowed to be ill every once in a while, but all those sick days you accrued aren’t for frivolous use.  People get all weird if you are sick alot, even if you have a legitimate illness AND a doctor’s note in with HR.  You have to be visibly reliable or else you run the risk of being labeled as the opposite.
  • Calling in Sick…Two Hours Late: Not a good idea.  If you even think you are probably going to be sick, call the night before.  Oh and calling in sick does NOT make up for having slept in.
  • Taking 2 Hour Lunches/Naps In Your Car:  You may very well need that nap in the car, but someone is always watching you and you WILL eventually get caught.
  • Automating ALL Your Repettitive Tasks, Then Goofing Off:  Even if you have all your work done, do SOMETHING to look busy.  They’re still watching.  I once read that you should carry a piece of paper wherever you are walking just to look like you are going somewhere.
  • Saying “I’m Bored”: Even if you have all your work done, just never say this out loud or write it down.
  • Wearing an Eye Patch, or Getting A “FauxHawk”: Just don’t.  Trust me on this one.
  • Writting “KILL” As Many Times As You Can In Your Meeting Notebook:  Even if you hide secret “happy messages” in the giant list of “KILL”, its not funny to anyone else.  Yes they are YOUR notes, but people can see them and tell on you.  No “Tic Tac Toe” either.  Sorry.
  • Reading a Book At Your Desk:  Even if its a programming book that will help you save the company millions of dollars, people want you to look like you are working on COMPANY work.  If need be, take the book home and finish your code there.
  • Asking Anyone to “Back You Up”:  This is a persons JOB you are putting on the line here, even if you really are in the “right”, that’s what people will see it as.  No one has your back.  First rule of business, “Cover Thine OWN Posterior At All Times”.

If your wondering, yes I know the people who did these acts and which combinations got them fired, a few have high paying office jobs right now after recovering from getting fired.  You also may notice that I use the phraise “someone is always watching YOU” several times.  That’s because its true.  Even if you don’t know it, somebody hates you at your office.  They hate you and they are watching you ALL THE TIME, just so they can tell “the boss” or a high powered friend about how much YOU piss them off and why.

Its all horribly true.  You may feel like you can’t be YOU at the office after reading this, but you can.  The key is to stay off everyone’s radar.  If your cube is in a high traffic area, try to get moved.  If you need to express yourself, do it with office toys and other knick knacks that stay in your cube and don’t offend or bother anyone.  If you get bored, that means you need a better challenge, perhaps a bigger assignment or task bosses love people who ask for a bigger chunk of work.  It may also be time to move on to a new job.  Who knows, your dream job may be just around the corner, but you can’t get that dream job while trying to collect unemployment insurance.  Jobs are like houses or girlfriends, you don’t want to lose your current one until you have another one in your grasp or at least in your sights, and you never want to leave the old one in a poor disposition.  You never know who you’ll wind up needing in the future.

Playing along with the political games that go on at the office, or “playing ball”, may seem like a waste of energy and time, probably because these games are wastes of time and effort, but they must be paid lip service at the least.  “Playing ball” is the equivalent of cleaning your toilet at home, it sucks big time, but it has to be done in order for life to move on.

One last thing, turn your IM notification sounds OFF!