Friday, November 27, 2020
Regarding Zoom Conference call
You have used Zoom recently. And I have very unfortunate news for you.
I'll give you some background on what happened.
There was a zero day security vulnerability on Zoom app, that allowed me a full time access to your camera and some other metadata on your account.
Basically, you were hacked.
And as you can imagine in your worst dreams, I have made a footage with you as a main actor.
Where you work on yourself (perform sex act to be clear). Having fun is ok with me, but is not ok with your reputation.
Please dont blame me or yourself for this. You couldn't know that the camera was working.
I'm sure you don't want to be the next Jeffrey Toobin and get embarrassed in front of all your friends, family and colleagues.
You should get this very clear, I will send this video to all your contacts if I dont get paid.
Are you wondering how I got your contacts and emails? Through the same exploit, zoom app allowed me to extract all sensitive info from your device.
So here is what we will do. You pay me $2000 in bitcoin, and nothing of this will happen. You have 2 days to make the payment.
After I get the money, I will delete the footage and information about you. The amount is not negotiable.
Send 0.11 Bitcoin (less than 2k USD at the current exchange rate) to my wallet 15AKuZPGMkdrpTGJwb87tnaqSyp91JSeeB
Having trouble with buying bitcoin? Just google on how to buy it, it's very easy to use and anonymous.
P.S. Don't try to report this to the police, I use TOR and bitcoin can't be traced. Do not email me back. If you do something stupid, I will distribute the video.
Good luck. Don’t stress.
Tuesday, November 24, 2020
Commercial offer
Unfortunately, I have some bad news for you.
Several months ago, I got access to the device you are using to browse the internet.
Since that time, I have been monitoring your internet activity.
Being a regular visitor of adult websites, I can confirm that it is you who is responsible for this.
To keep it simple, the websites you visited provided me with access to your data.
I've uploaded a Trojan horse on the driver basis that updates its signature several times per day, to make it impossible for antivirus to detect it. Additionally, it gives me access to your camera and microphone.
Moreover, I have backed-up all the data, including photos, social media, chats and contacts.
Just recently, I came up with an awesome idea to create the video where you cum in one part of the screen, while the video was simultaneously playing on another screen. That was fun!
Rest assured that I can easily send this video to all your contacts with a few clicks, and I assume that you would like to prevent this scenario.
With that in mind, here is my proposal:
Transfer the amount equivalent to 1350 USD to my Bitcoin wallet, and I will forget about the entire thing. I will also delete all data and videos permanently.
In my opinion, this is a somewhat modest price for my work.
You can figure out how to purchase Bitcoins using search engines like Google or Bing, seeing that it's not very difficult.
My Bitcoin wallet (BTC): 14X4HmqJKQWCrNY9gthXVyPRa6KZhEkkmT
You have 48 hours to reply and you should also bear the following in mind:
It makes no sense to reply me - the address has been generated automatically.
It makes no sense to complain either, since the letter along with my Bitcoin wallet cannot be tracked.
Everything has been orchestrated precisely.
If I ever detect that you mentioned anything about this letter to anyone - the video will be immediately shared, and your contacts will be the first to receive it. Following that, the video will be posted on the web!
P.S. The time will start once you open this letter. (This program has a built-in timer).
Good luck and take it easy! It was just bad luck, next time please be careful.
Monday, November 23, 2020
Re:(4) The base of businessmen from all over the world. / База бизнесменов со всего Мира.
And only we have only a few days![zrojszt]
A unique base of businessmen from 170 countries of the world[eliwdo]
at a symbolic price of only $500 + bonus.[hjiohgx]
The database contains 300million e-mail addresses.[qmuqqtrp]
Write to us. We agree. email.business.group@gmail.com [hozwtmng]
With respect to you.[lwvyz]
Business groups. [qdqra]
[cqpzcl]
[zpyxm]
Только для Вас [hwwxrpwp]
И только у нас и только несколько дней![wwvrr]
Уникальная база бизнесменов со 170 стран Мира[psmnjoq]
по символической цене всего за $500 + bonus.[luzyyu]
База содержит 300миллионов e-mail адресов.[wzmmn]
Пишите нам. Договоримся. email.business.group@gmail.com [uqspor]
С уважением к Вам.[pllmzrvm]
Бизнес групп.7753191 [zyruprur]
Sunday, November 15, 2020
Regarding Zoom Conference call
Hi. You will find this important.
You have used Zoom some time ago. And I have very unfortunate news for you.
I'll give you some background on what happened.
There was a zero day security vulnerability on Zoom app, that allowed me a full time access to your camera and some other metadata on your account.
I had access to your camera ALL the time, even when Zoom app was closed. Basically, your device was hacked and remotely controlled.
And as you can imagine in your worst dreams, I have made a footage with you as a leading actor.
In the video you can be seen performing sexual act.
Having fun is ok with me, but is not ok with your reputation.
Please dont blame me or yourself for this. You couldn't know that the camera was working.
I'm sure you don't want to be the next Jeffrey Toobin and get embarrassed in front of all your friends, family and colleagues.
You should get this very clear, I will send this video to all your contacts if I dont get paid.
Are you wondering how I got your contacts and emails? Through the same exploit, zoom app allowed me to extract all sensitive info from your device.
So here is what we will do. You pay me $2000 in bitcoin, and nothing of this will happen. You have 2 days to make the payment.
After I get the money, I will delete the footage and information about you. The amount is not negotiable.
Send 0.13 Bitcoin (less than 2k USD at the current exchange rate) to my wallet 1KJ3ZrhrkXBVjGyAU635sapjLpLSFgpqYe
Having trouble with buying bitcoin? Just google on how to buy it, it's very easy to use and anonymous.
P.S. Don't try to report this to the police, I use TOR and bitcoin can't be traced. Do not email me back. If you do something stupid, I will distribute the video.
Good luck. Don’t stress.
Sunday, September 20, 2020
Commercial offer
Unfortunately, I have some bad news for you.
Several months ago, I got access to the device you are using to browse the internet.
Since that time, I have been monitoring your internet activity.
Being a regular visitor of adult websites, I can confirm that it is you who is responsible for this.
To keep it simple, the websites you visited provided me with access to your data.
I've uploaded a Trojan horse on the driver basis that updates its signature several times per day, to make it impossible for antivirus to detect it. Additionally, it gives me access to your camera and microphone.
Moreover, I have backed-up all the data, including photos, social media, chats and contacts.
Just recently, I came up with an awesome idea to create the video where you cum in one part of the screen, while the video was simultaneously playing on another screen. That was fun!
Rest assured that I can easily send this video to all your contacts with a few clicks, and I assume that you would like to prevent this scenario.
With that in mind, here is my proposal:
Transfer the amount equivalent to 1500 USD to my Bitcoin wallet, and I will forget about the entire thing. I will also delete all data and videos permanently.
In my opinion, this is a somewhat modest price for my work.
You can figure out how to purchase Bitcoins using search engines like Google or Bing, seeing that it's not very difficult.
My Bitcoin wallet (BTC): 16EuKQaCEEeba1Us68P9RwKjc8HTT4zWRR
You have 48 hours to reply and you should also bear the following in mind:
It makes no sense to reply me - the address has been generated automatically.
It makes no sense to complain either, since the letter along with my Bitcoin wallet cannot be tracked.
Everything has been orchestrated precisely.
If I ever detect that you mentioned anything about this letter to anyone - the video will be immediately shared, and your contacts will be the first to receive it. Following that, the video will be posted on the web!
P.S. The time will start once you open this letter. (This program has a built-in timer).
Good luck and take it easy! It was just bad luck, next time please be careful.
Sunday, August 30, 2020
Save Your Cloud: DoS On VMs In OpenNebula 4.6.1
All previous posts of this series focused on XSS. This time, we present a vulnerability which is connected another Cloud Management Platform: OpenNebula. This Infrastructure-as-a-Service platform started as a research project in 2005. It is used by information technology companies like IBM, Dell and Akamai as well as academic institutions and the European Space Administrations (ESA). By relying on standard Linux tools as far as possible, OpenNebula reaches a high level of customizability and flexibility in hypervisors, storage systems, and network infrastructures. OpenNebula is distributed using the Apache-2 license.
OpenNebula offers a broad variety of interfaces to control a cloud. This post focuses on Sunstone, OpenNebula's web interface (see Figure 1).
![]() |
Figure 1: OpenNebula's Sunstone Interface displaying a VM's control interface |
Before OpenNebula 4.6.2, Sunstone had no Cross-Site Request Forgery (CSRF) protection. This is a severe problem. Consider an attacker who lures a victim into clicking on a malicious link while being logged in at a private cloud. This enables the attacker to send arbitrary requests to the private cloud through the victims browser. However, we could find other bugs in OpenNebula that allowed us to perform much more sophisticated attacks.
Denial-of-Service on OpenNebula-VM
At its backend, OpenNebula manages VMs with XML documents. A sample for such an XML document looks like this:<VM>OpenNebula 4.6.1 contains a bug in the sanitization of input for these XML documents: Whenever a VM's name contains an opening XML tag (but no corresponding closing one), an XML generator at the backend automatically inserts the corresponding closing tag to ensure well-formedness of the resulting document. However, the generator outputs an XML document that does not comply with the XML schema OpenNebula expects. The listing below shows the structure that is created after renaming the VM to 'My <x> VM':
<ID>0</ID>
<NAME>My VM</NAME>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</VM>
<VM>The generator closes the <x> tag, but not the <NAME> tag. At the end of the document, the generator closes all opened tags including <NAME>.
<ID>0</ID>
<NAME>My <x> VM</x>
<PERMISSIONS>...</PERMISSIONS>
<MEMORY>512</MEMORY>
<CPU>1</CPU>
...
</NAME>
</VM>
OpenNebula saves the incorrectly generated XML document in a database. The next time the OpenNebula core retrieves information about that particular VM from the database the XML parser is mixed up and runs into an error because it only expects a string as name, not an XML tree. As a result, Sunstone cannot be used to control the VM anymore. The Denial-of-Service attack can only be reverted from the command line interface of OpenNebula.
This bug can be triggered by a CSRF-attack, which means that it is a valid attack against a private cloud: By luring a victim onto a maliciously crafted website while logged in into Sunstone, an attacker can make all the victim's VMs uncontrollable via Sunstone. A video of the attack can be seen here:
This bug has been fixed in OpenNebula 4.6.2.
This result is a collaborative work together with Mario Heiderich. It has been published at ACM CCSW 2015. The paper can be found here.
Read more
- Hacker Tool Kit
- Nsa Hack Tools
- Hacker Tools Online
- New Hack Tools
- Best Pentesting Tools 2018
- Best Pentesting Tools 2018
- Android Hack Tools Github
- Hack Apps
- Tools Used For Hacking
- Ethical Hacker Tools
- Hack Website Online Tool
- Hacking Tools 2019
- New Hack Tools
- Hacking Tools Pc
- Pentest Tools Subdomain
- New Hacker Tools
- Hacker Tools For Ios
- Hack Tools For Games
- Hacker Tools For Windows
- Pentest Tools Windows
- Top Pentest Tools
- Hack Tools
- Hacking Tools For Windows
- Hacker Tools For Mac
- How To Hack
- Best Pentesting Tools 2018
- Hacker Tools Free
- Hacking Tools And Software
- Tools 4 Hack
- Usb Pentest Tools
- Hacking Tools Mac
- Free Pentest Tools For Windows
- Hacker Tools
- Pentest Tools Free
- Hacker Tools For Pc
- Hacker Tools For Pc
- Beginner Hacker Tools
- Ethical Hacker Tools
- Hack Tools For Pc
- Android Hack Tools Github
- Pentest Tools For Android
- Pentest Tools Website Vulnerability
- How To Make Hacking Tools
- Easy Hack Tools
- Hacking Tools Online
- Pentest Tools Android
- Hacker Tools Apk Download
- Best Pentesting Tools 2018
- How To Install Pentest Tools In Ubuntu
- Hacker Techniques Tools And Incident Handling
- New Hacker Tools
- Hackrf Tools
- Hacking Tools Download
- Pentest Tools Subdomain
- Black Hat Hacker Tools
- Hacker Tools Apk
- Hack Tools
- Hacking Tools For Windows 7
- Hacks And Tools
- Pentest Tools Open Source
- Physical Pentest Tools
- Hack Rom Tools
- Ethical Hacker Tools
- Hacker Tools Github
- Termux Hacking Tools 2019
- Pentest Tools Online
- Pentest Tools Alternative
- Pentest Tools Tcp Port Scanner
- Hacking Tools Software
- Pentest Tools Subdomain
- Hacker Tools Software
- Best Hacking Tools 2020
- Hacking Tools Free Download
- Pentest Tools Open Source
- Free Pentest Tools For Windows
- What Is Hacking Tools
- Hacker Tools Apk Download
- Hackrf Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Nmap
- Hacker Security Tools
- Tools For Hacker
- Pentest Tools Android
- Physical Pentest Tools
- Pentest Tools Apk
- Hacking Tools For Kali Linux
- Hak5 Tools
- Hacking Tools 2019
- Hack Tools For Ubuntu
- Nsa Hacker Tools
- Beginner Hacker Tools
- Pentest Tools Nmap
- Ethical Hacker Tools
- Hacking Tools Free Download
- Hacker
- Hack Website Online Tool
- Hacker Tools For Windows
- Pentest Tools Kali Linux
- Hack Tools For Ubuntu
- Hacker Tools Software
- Pentest Tools Framework
- Pentest Tools For Android
- Install Pentest Tools Ubuntu
- Hacker Tools Windows
- Hack Tools For Games
- Blackhat Hacker Tools
- Github Hacking Tools
- Hacker Tools
- How To Hack
- Hacks And Tools
Ethical Hackers Platform: How To Install A bWAPP In Windows 2018
bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects.
What makes bWAPP so unique? Well, it has over 100 web vulnerabilities!
It covers all major known web bugs, including all risks from the OWASP Top 10 project. bWAPP is for web application security-testing and educational purposes only.
Have fun with this free and open source project!
bWAPP is a PHP application that uses a MySQL database. It can be hosted on Linux/Windows with Apache/IIS and MySQL. It can also be installed with WAMP or XAMPP. Another possibility is to download the bee-box, a custom Linux VM pre-installed with bWAPP.
First of all you have need to install a local server over system that may be XAMPP, WAMP or LAMP. These servers are totally free of cost you can freely download from the internet. Mostly XAMPP is used because it has more functionalities than others on the other hand WAMP is also a simple platform for PHP while, LAMP is used over the Linux distributions. After downloading any one of them you have need to install that first after that you'll be able to configure bWAPP over your system.
Why we use the software application for configuring this bWAPP? As we know PHP is a server side language and there must be a server to read the PHP script. Without using any server we can't do programming with PHP. If you have a little piece of code of PHP you must install a server in your system for running that PHP script.
Ethical Hackers Platform: How to Install a bWAPP In Windows 2018. Free source for exploring things related to an Ethical Hacking.
Related articles
- Hack Tools For Windows
- Game Hacking
- Termux Hacking Tools 2019
- Free Pentest Tools For Windows
- Hacker Tools 2019
- Pentest Tools For Android
- Hack Tools 2019
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Windows
- Hack Tools
- Hacker Tools Mac
- Hack Tools For Windows
- Hackrf Tools
- Hack Tools Download
- Blackhat Hacker Tools
- Hack Tool Apk
- Pentest Tools Tcp Port Scanner
- How To Make Hacking Tools
- Hack Tools
- Hacking Tools Online
- Hack And Tools
- Pentest Tools Online
- Game Hacking
- Tools Used For Hacking
- Pentest Tools Url Fuzzer
- Pentest Tools Subdomain
- Hacking Tools For Games
- Pentest Tools For Mac
- Hacking Tools For Kali Linux
- Hacking Tools For Kali Linux
- Hacker Security Tools
- Physical Pentest Tools
- Hack Tools 2019
- Hacking Tools Github
- Hacks And Tools
- Hacking Tools Pc
- Hacking Tools Download
- Pentest Tools For Mac
- Black Hat Hacker Tools
- Hacker Tool Kit
- Hack Website Online Tool
- Hack Tools For Windows
- Github Hacking Tools
- Pentest Tools Url Fuzzer
- Physical Pentest Tools
- Ethical Hacker Tools
- Pentest Tools For Ubuntu
- Hacking Tools Name
- Easy Hack Tools
- Hack Tools Github
- Physical Pentest Tools
- Hacking Tools Name
- Nsa Hack Tools Download
- Hacking Tools Download
- Pentest Reporting Tools
- Pentest Tools Github
- Hack Tools Online
- What Are Hacking Tools
- Hacker Tools 2020
- Hak5 Tools
- Hacker Tools For Ios
- Hacker Tools Github
- Best Pentesting Tools 2018
- Nsa Hacker Tools
- Black Hat Hacker Tools
- Hack Tools For Games
- Pentest Tools Subdomain
- Hacking Tools Windows
- World No 1 Hacker Software
- Nsa Hacker Tools
- Hacker Tools 2020
- Hack Tool Apk
- Hacker Tools Windows
- Hack Tools
- Hacking Tools 2020
- Pentest Tools Tcp Port Scanner
- Hacker Tools Apk Download
- Wifi Hacker Tools For Windows
- Hacking Tools For Games
- Pentest Tools Url Fuzzer
- Hacking Tools For Windows 7
- Game Hacking
- Pentest Recon Tools
- Pentest Reporting Tools
- Pentest Reporting Tools
- Pentest Tools Free
- Pentest Tools Find Subdomains
- Hacker Tools Online
- Hacking Tools Software
- Hacker Tools Free
- New Hacker Tools
- Hacker Tools For Ios
- Pentest Tools Download
- Hacking App
- What Is Hacking Tools
- Pentest Tools Review
- Hack Tools Online
- Install Pentest Tools Ubuntu
- Nsa Hacker Tools
- Android Hack Tools Github
- Pentest Tools Free
- Pentest Tools Online
- Hacking Tools Software
- How To Hack
- Pentest Tools Online
- Pentest Box Tools Download
- Hackers Toolbox
- Hacker Tools
- Hacking Tools For Windows Free Download
- Tools Used For Hacking
- Pentest Tools
- Top Pentest Tools
- Hacker
- Hacker Security Tools
- Pentest Tools
- Nsa Hack Tools
- Pentest Tools Subdomain
- Hack Tools For Ubuntu
- Github Hacking Tools
- Hacking Tools Software
- Hack Tools Pc
- Pentest Tools Subdomain
Blockchain Exploitation Labs - Part 1 Smart Contract Re-Entrancy
Why/What Blockchain Exploitation?
In this blog series we will analyze blockchain vulnerabilities and exploit them ourselves in various lab and development environments. If you would like to stay up to date on new posts follow and subscribe to the following:Twitter: @ficti0n
URL: http://cclabs.io
http://consolecowboys.com
As of late I have been un-naturally obsessed with blockchains and crypto currency. With that obsession comes the normal curiosity of "How do I hack this and steal all the monies?"
However, as usual I could not find any actual walk thorough or solid examples of actually exploiting real code live. Just theory and half way explained examples.
Note: As usual this is live ongoing research and info will be released as it is coded and exploited.
Background Info:
- In client server we generally have the following:
- Front End - what the user sees (HTML Etc)
- Server Side - code that handles business logic
- Back End - Your database for example MySQL
A Decentralized Application Model:
- Smart contracts are your access into the blockchain.
- Your smart contract is kind of like an API
- Essentially DAPPs are Ethereum enabled applications using smart contracts as an API to the blockchain data ledger
- DAPPs can be banking applications, wallets, video games etc.
A blockchain is a trust-less peer to peer decentralized database or ledger
Consensus:
Proof of stake is simply staking large sums of coins which are at risk of loss if one were to perform a malicious action while helping to perform consensus of data.
Things to Note:
- So, the thing to note is that our smart contracts are located on the blockchain
- And the blockchain is immutable
- This means an Agile development model is not going to work once a contract is deployed.
- This means that updates to contracts is next to impossible
- All you can really do is createa kill-switch or fail safe functions to disable and execute some actions if something goes wrong before going permanently dormant.
- If you don't include a kill switch the contract is open and available and you can't remove it
- Smart Contracts are generally open source
- Which means people like ourselves are manually bug hunting smart contracts and running static analysis tools against smart contract code looking for bugs.
- Kill the current contract which stays on the blockchain
- Then deploy a whole new version.
- If there is no killSwitch the contract will be available forever.
- Many contracts and projects do not even think about and SDLC.
- They rarely add penetration testing and vulnerability testing in the development stages if at all
- At best there is a bug bounty before the release of their main-nets
- Which usually get hacked to hell and delayed because of it.
- Things are getting better but they are still behind the curve, as the technology is new and blockchain mostly developers and marketers. Not hackers or security testers.
- If sensitive data is placed on the blockchain it is there forever
- Which means that if a cryptographic algorithm is broken anything which is encrypted with that algorithm is now accessible
- We all know that algorithms are eventually broken!
- So its always advisable to keep sensitive data hashed for integrity on the blockchain but not actually stored on the blockchain directly
Exploitation of Re-Entrancy Vulnerabilities:
Example Scenario:
Example Target Code:
Example Attacking Code:
Setting up a Lab Environment and coding your Attack:
Coding your Exploit and Interfacing with a Contract Programmatically:
Conclusion:
Continue reading
- Black Hat Hacker Tools
- Best Hacking Tools 2020
- Pentest Tools Find Subdomains
- New Hacker Tools
- Hack Rom Tools
- Pentest Tools Framework
- Hack Tools For Mac
- Hack Tools For Mac
- Game Hacking
- Hacker Search Tools
- Pentest Tools Framework
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Kali Linux
- World No 1 Hacker Software
- Hacking Tools For Windows Free Download
- Hacker Tools For Windows
- Hack Tools For Mac
- Hacker Tools For Mac
- Hack Rom Tools
- Pentest Tools List
- Hack Tools For Mac
- Hack Website Online Tool
- Growth Hacker Tools
- Hacker Tools Free
- Ethical Hacker Tools
- Hacking Tools Kit
- Pentest Tools Website
- Pentest Tools For Mac
- Tools 4 Hack
- Hacking Tools For Beginners
- Game Hacking
- Pentest Tools Free
- Hack Tools For Games
- Hacking Tools For Beginners
- Best Pentesting Tools 2018
- Tools Used For Hacking
- Hacking Tools Name
- Pentest Tools For Ubuntu
- Pentest Tools Port Scanner
- Pentest Tools
- Hacking Tools Pc
- Hacking Tools Name
- Hack Tools For Games
- Pentest Tools Github
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Kali Linux
- Hacking Tools Windows 10
- Pentest Tools Bluekeep
- Hacker Tools Github
- Hacking Tools Name
- Hacker Tools For Windows
- Hacker Tools Apk
- Black Hat Hacker Tools
- Beginner Hacker Tools
- Beginner Hacker Tools
- Bluetooth Hacking Tools Kali
- Hack Tool Apk No Root
- Pentest Tools Kali Linux
- Hacker Tools For Windows
- Hacker Tool Kit
- Hackrf Tools
- Hack App
- Pentest Tools List
- Usb Pentest Tools
- Hacking Tools For Beginners
- Hacker Tools Apk Download
- Hackers Toolbox
- Hacker Tools
- Game Hacking
- Pentest Tools Framework
- Hacker Tools Apk
- Pentest Tools Bluekeep
- Hacker Tools Linux
- Hacker Tools For Windows
- What Are Hacking Tools