2009年9月26日 星期六

僅用隨身碟就可以去除win XP管理員密碼

有許多朋友還在為忘記XP登陸密碼不能進入系統而煩惱,筆者現在將給用戶介紹一個小方法,解決忘記密碼給你帶來的煩惱。

一、所需工具

1.U盤一個

2.USBoot(U盤啟動製作軟件)

3.winRAR(壓縮軟件)

首先聲明,此方法是在文件格式為FAT32的狀態下進行的!

二、思路

方法很簡單,當你的機器出現登陸框,要求輸入密碼時,你按下windows鍵+U,是否出現了輔助工具管理工具,既然可以運行輔助工具,那就意味著可以 運行放大鏡。我們把放大鏡程序換成其他的程序是不是也可以運行呢?想一下如果我們加入用戶添加項目會怎樣?思路就是這樣的了!現在我們開始製作。

三、步驟

①製作U盤啟動盤。先運行Usboot,然後插入U盤,選中U盤然後點開始。格式化U盤,然後它會提示你再插入,插入U盤1分後就可以了!我的U盤是1G的,用的HDD格式。

②製作替換文件。要製作一個XX.EXE的文件來替換原文件,但是這個XX.EXE執行後又要達到添加用戶的要求。我首先想到的是寫一個批處理文件:

@net user hack 123456 /add

@net localgroup administrators hack /add

@exit

然後保存為XX.bat就可以了!

又有人要問,我們要的是XX.EXE為什麼卻弄個XX.bat?

其實我們讓它運行XX.EXE就等同運行了XX.bat就可以了!要達到這樣的目的,就要用到winrar,用winrar製作一個自解壓文件,不就把XX.bat變成XX.EXE了嗎?運行XX.EXE就等同運行了XX.bat.(把XX.EXE拷到 U 盤上去)

③替換文件.到COMS裡去把第一啟動換到USB-HDD,保存----插入U盤,進入系統的c:\windows\systaem32下 去. copy magnify.exe 007magnify.exe (對magnify.exe進行備份,magnify.exe為放大鏡執行程 序).在把U盤上的XX.EXE拷到system32下,並該為 magnify.exe就可以了!

然後從硬盤啟動就可以了!再到XP登陸密碼時,你只要運行放大鏡就可以了!按下Ctrl+Alt+Del(按2次)用你新建的hack用戶就可以進去了!進去把管理員密碼改過來吧!

這樣就成功的繞過了XP的登陸密碼,只要了一個U盤,是否很方便?

註: 本文轉載自網路 非原創
轉載自 葉子'sBlog 原文

2009年9月20日 星期日

Web安全工具大匯聚

Test sites / testing grounds

SPI Dynamics (live) – http://zero.webappsecurity.com/
Cenzic (live) – http://crackme.cenzic.com/
Watchfire (live) – http://demo.testfire.net/
Acunetix (live) – http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com
WebMaven / Buggy Bank – http://www.mavensecurity.com/webmaven
Foundstone SASS tools – http://www.foundstone.com/us/resources-free-tools.asp
Updated HackmeBank – http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html
OWASP WebGoat – http://www.owasp.org/index.php/OWASP_WebGoat_Project
OWASP SiteGenerator – http://www.owasp.org/index.php/Owasp_SiteGenerator
Stanford SecuriBench – http://suif.stanford.edu/~livshits/securibench/
SecuriBench Micro – http://suif.stanford.edu/~livshits/work/securibench-micro/

HTTP proxying / editing

WebScarab – http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
Burp – http://www.portswigger.net/
Paros – http://www.parosproxy.org/
Fiddler – http://www.fiddlertool.com/
Web Proxy Editor – http://www.microsoft.com/mspress/companion/0-7356-2187-X/
Pantera – http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project
Suru – http://www.sensepost.com/research/suru/
httpedit (curses-based) – http://www.neutralbit.com/en/rd/httpedit/
Charles – http://www.xk72.com/charles/
Odysseus – http://www.bindshell.net/tools/odysseus
Burp, Paros, and WebScarab for Mac OS X – http://www.corsaire.com/downloads/
Web-application scanning tool from `Network Security Tools'/O'Reilly – http://examples.oreilly.com/networkst/
JS Commander – http://jscmd.rubyforge.org/
Ratproxy – http://code.google.com/p/ratproxy/

RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools

Wfuzz – http://www.edge-security.com/wfuzz.php
ProxMon – http://www.isecpartners.com/proxmon.html
Wapiti – http://wapiti.sourceforge.net/
Grabber – http://rgaucher.info/beta/grabber/
XSSScan – http://darkcode.ath.cx/scanners/XSSscan.py
CAL9000 – http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project
HTMangLe – http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm
JBroFuzz – http://sourceforge.net/projects/jbrofuzz
XSSFuzz – http://ha.ckers.org/blog/20060921/xssfuzz-released/
WhiteAcid's XSS Assistant – http://www.whiteacid.org/greasemonkey/
Overlong UTF – http://www.microsoft.com/mspress/companion/0-7356-2187-X/
[TGZ] MielieTool (SensePost Research) – http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz
RegFuzzer: test your regular expression filter – http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter
screamingCobra – http://www.dachb0den.com/projects/screamingcobra.html
SPIKE and SPIKE Proxy – http://immunitysec.com/resources-freesoftware.shtml
RFuzz – http://rfuzz.rubyforge.org/
WebFuzz – http://www.codebreakers-journal.com/index.php?option=com_content&task=view&id=112&Itemid=99999999
TestMaker – http://www.pushtotest.com/Docs/downloads/features.html
ASP Auditor – http://michaeldaw.org/projects/asp-auditor-v2/
WSTool – http://wstool.sourceforge.net/
Web Hack Control Center (WHCC) – http://ussysadmin.com/whcc/
Web Text Converter – http://www.microsoft.com/mspress/companion/0-7356-2187-X/
HackBar (Firefox Add-on) – https://addons.mozilla.org/firefox/3899/
Net-Force Tools (NF-Tools, Firefox Add-on) – http://www.net-force.nl/library/downloads/
PostIntercepter (Greasemonkey script) – http://userscripts.org/scripts/show/743

HTTP general testing / fingerprinting

Wbox: HTTP testing tool – http://hping.org/wbox/
ht://Check – http://htcheck.sourceforge.net/
Mumsie – http://www.lurhq.com/tools/mumsie.html
WebInject – http://www.webinject.org/
Torture.pl Home Page – http://stein.cshl.org/~lstein/torture/
JoeDog's Seige – http://www.joedog.org/JoeDog/Siege/
OPEN-LABS: metoscan (http method testing) – http://www.open-labs.org/
Load-balancing detector – http://ge.mine.nu/lbd.html
HMAP – http://ujeni.murkyroc.com/hmap/
Net-Square: httprint – http://net-square.com/httprint/
Wpoison: http stress testing – http://wpoison.sourceforge.net/
Net-square: MSNPawn – http://net-square.com/msnpawn/index.shtml
hcraft: HTTP Vuln Request Crafter – http://druid.caughq.org/projects/hcraft/
rfp.labs: LibWhisker – http://www.wiretrip.net/rfp/lw.asp
Nikto – http://www.cirt.net/code/nikto.shtml
twill – http://twill.idyll.org/
DirBuster – http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
[ZIP] DFF Scanner – http://security-net.biz/files/dff/DFF.zip
[ZIP] The Elza project – http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled – http://sf.net/projects/hackfox

Browser-based HTTP tampering / editing / replaying

TamperIE – http://www.bayden.com/Other/
isr-form – http://www.infobyte.com.ar/developments.html
Modify Headers (Firefox Add-on) – http://modifyheaders.mozdev.org/
Tamper Data (Firefox Add-on) – http://tamperdata.mozdev.org/
UrlParams (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1290/
TestGen4Web (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1385/
DOM Inspector / Inspect This (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/
LiveHTTPHeaders / Header Monitor (Firefox Add-on) – http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/

Cookie editing / poisoning

[TGZ] stompy: session id tool – http://lcamtuf.coredump.cx/stompy.tgz
Add'N Edit Cookies (AnEC, Firefox Add-on) – http://addneditcookies.mozdev.org/
CookieCuller (Firefox Add-on) – http://cookieculler.mozdev.org/
CookiePie (Firefox Add-on) – http://www.nektra.com/oss/firefox/extensions/cookiepie/
CookieSpy – http://www.codeproject.com/shell/cookiespy.asp
Cookies Explorer – http://www.dutchduck.com/Features/Cookies.aspx

Ajax and XHR scanning

Sahi – http://sahi.co.in/
scRUBYt – http://scrubyt.org/
jQuery – http://jquery.com/
jquery-include – http://www.gnucitizen.org/projects/jquery-include
Sprajax – http://www.denimgroup.com/sprajax.html
Watir – http://wtr.rubyforge.org/
Watij – http://watij.com/
Watin – http://watin.sourceforge.net/
RBNarcissus – http://idontsmoke.co.uk/2005/rbnarcissus/
SpiderTest (Spider Fuzz plugin) – http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin
Javascript Inline Debugger (jasildbg) – http://jasildbg.googlepages.com/
Firebug Lite – http://www.getfirebug.com/lite.html
firewaitr – http://code.google.com/p/firewatir/

RSS extensions and caching

LiveLines (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/324/
rss-cache – http://www.dubfire.net/chris/projects/rss-cache/

SQL injection scanning

0×90.org: home of Absinthe, Mezcal, etc – http://0×90.org/releases.php
SQLiX – http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project
sqlninja: a SQL Server injection and takover tool – http://sqlninja.sourceforge.net/
JustinClarke's SQL Brute – http://www.justinclarke.com/archives/2006/03/sqlbrute.html
BobCat – http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html
sqlmap – http://sqlmap.sourceforge.net/
Scully: SQL Server DB Front-End and Brute-Forcer – http://www.sensepost.com/research/scully/
FG-Injector – http://www.flowgate.net/?lang=en&seccion=herramientas
PRIAMOS – http://www.priamos-project.com/

Web application security malware, backdoors, and evil code

W3AF: Web Application Attack and Audit Framework – http://w3af.sourceforge.net/
Jikto – http://busin3ss.name/jikto-in-the-wild/
XSS Shell – http://ferruh.mavituna.com/article/?1338
XSS-Proxy – http://xss-proxy.sourceforge.net
AttackAPI – http://www.gnucitizen.org/projects/attackapi/
FFsniFF – http://azurit.elbiahosting.sk/ffsniff/
HoneyBlog's web-based junkyard – http://honeyblog.org/junkyard/web-based/
BeEF – http://www.bindshell.net/tools/beef/
Firefox Extension Scanner (FEX) – http://www.gnucitizen.org/projects/fex/
What is my IP address? – http://reglos.de/myaddress/
xRumer: blogspam automation tool – http://www.botmaster.net/movies/XFull.htm
SpyJax – http://www.merchantos.com/makebeta/tools/spyjax/
Greasecarnaval – http://www.gnucitizen.org/projects/greasecarnaval
Technika – http://www.gnucitizen.org/projects/technika/
Load-AttackAPI bookmarklet – http://www.gnucitizen.org/projects/load-attackapi-bookmarklet
MD's Projects: JS port scanner, pinger, backdoors, etc – http://michaeldaw.org/my-projects/

Web application services that aid in web application security assessment

Netcraft – http://www.netcraft.net
AboutURL – http://www.abouturl.com/
The Scrutinizer – http://www.scrutinizethis.com/
net.toolkit – http://clez.net/
ServerSniff – http://www.serversniff.net/
Online Microsoft script decoder – http://www.greymagic.com/security/tools/decoder/
Webmaster-Toolkit – http://www.webmaster-toolkit.com/
myIPNeighbbors, et al – http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address
PHP charset encoding – http://h4k.in/encoding
data: URL testcases – http://h4k.in/dataurl

Browser-based security fuzzing / checking

Zalewski's MangleMe – http://lcamtuf.coredump.cx/mangleme/mangle.cgi
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan – http://metasploit.com/users/hdm/tools/
Peach Fuzzer Framework – http://peachfuzz.sourceforge.net/
TagBruteForcer – http://research.eeye.com/html/tools/RT20060801-3.html
PROTOS Test-Suite: c05-http-reply – http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html
COMRaider – http://labs.idefense.com
bcheck – http://bcheck.scanit.be/bcheck/
Stop-Phishing: Projects page – http://www.indiana.edu/~phishing/?projects
LinkScanner – http://linkscanner.explabs.com/linkscanner/default.asp
BrowserCheck – http://www.heise-security.co.uk/services/browsercheck/
Cross-browser Exploit Tests – http://www.jungsonnstudios.com/cool.php
Stealing information using DNS pinning demo – http://www.jumperz.net/index.php?i=2&a=1&b=7
Javascript Website Login Checker – http://ha.ckers.org/weird/javascript-website-login-checker.html
Mozilla Activex – http://www.iol.ie/~locka/mozilla/mozilla.htm
Jungsonn's Black Dragon Project – http://blackdragon.jungsonnstudios.com/
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) – http://ha.ckers.org/mr-t/
Vulnerable Adobe Plugin Detection For UXSS PoC – http://www.0×000000.com/?i=324
About Flash: is your flash up-to-date? – http://www.macromedia.com/software/flash/about/
Test your installation of Java software – http://java.com/en/download/installed.jsp?detect=jre&try=1
WebPageFingerprint – Light-weight Greasemonkey Fuzzer – http://userscripts.org/scripts/show/30285

PHP static analysis and file inclusion scanning

PHP-SAT.org: Static analysis for PHP – http://www.program-transformation.org/PHP/
Unl0ck Research Team: tool for searching in google for include bugs – http://unl0ck.net/tools.php
FIS: File Inclusion Scanner – http://www.segfault.gr/index.php?cat_id=3&cont_id=25
PHPSecAudit – http://developer.spikesource.com/projects/phpsecaudit

PHP Defensive Tools

PHPInfoSec – Check phpinfo configuration for security – http://phpsec.org/projects/phpsecinfo/
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey
Php-Brute-Force-Attack Detector – Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip
PHP-Login-Info-Checker – Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip
php-DDOS-Shield – A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/
PHPMySpamFIGHTER – http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar

Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources

APIDS on Wikipedia – http://en.wikipedia.org/wiki/APIDS
PHP Intrusion Detection System (PHP-IDS) – http://php-ids.org/ http://code.google.com/p/phpids/
dotnetids – http://code.google.com/p/dotnetids/
Secure Science InterScout – http://www.securescience.com/home/newsandevents/news/interscout1.0.html
Remo: whitelist rule editor for mod_security – http://remo.netnea.com/
GotRoot: ModSecuirty rules – http://www.gotroot.com/tiki-index.php?page=mod_security+rules
The Web Security Gateway (WSGW) – http://wsgw.sourceforge.net/
mod_security rules generator – http://noeljackson.com/tools/modsecurity/
Mod_Anti_Tamper – http://www.wisec.it/projects.php?id=3
[TGZ] Automatic Rules Generation for Mod_Security – http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz
AQTRONIX WebKnight – http://www.aqtronix.com/?PageID=99
Akismet: blog spam defense – http://akismet.com/
Samoa: Formal tools for securing web services – http://research.microsoft.com/projects/samoa/

Web services enumeration / scanning / fuzzing

WebServiceStudio2.0 – http://www.codeplex.com/WebserviceStudio
Net-square: wsChess – http://net-square.com/wschess/index.shtml
WSFuzzer – http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project
SIFT: web method search tool – http://www.sift.com.au/73/171/sift-web-method-search-tool.htm
iSecPartners: WSMap, WSBang, etc – http://www.isecpartners.com/tools.html

Web application non-specific static source-code analysis

Pixy: a static analysis tool for detecting XSS vulnerabilities – http://www.seclab.tuwien.ac.at/projects/pixy/
Brixoft.Net: Source Edit – http://www.brixoft.net/prodinfo.asp?id=1
Security compass web application auditing tools (SWAAT) – http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project
An even more complete list here – http://www.cs.cmu.edu/~aldrich/courses/654/tools/
A nice list that claims some demos available – http://www.cs.cmu.edu/~aldrich/courses/413/tools.html
A smaller, but also good list – http://spinroot.com/static/
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/

Static analysis for C/C++ (CGI, ISAPI, etc) in web applications

RATS – http://www.securesoftware.com/resources/download_rats.html
ITS4 – http://www.cigital.com/its4/
FlawFinder – http://www.dwheeler.com/flawfinder/
Splint – http://www.splint.org/
Uno – http://spinroot.com/uno/
BOON (Buffer Overrun detectiON) – http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net
Valgrind – http://www.valgrind.org/

Java static analysis, security frameworks, and web application security tools

LAPSE – http://suif.stanford.edu/~livshits/work/lapse/
HDIV Struts – http://hdiv.org/
Orizon – http://sourceforge.net/projects/orizon/
FindBugs: Find bugs in Java programs – http://findbugs.sourceforge.net/
PMD – http://pmd.sourceforge.net/
CUTE: A Concolic Unit Testing Engine for C and Java – http://osl.cs.uiuc.edu/~ksen/cute/
EMMA – http://emma.sourceforge.net/
JLint – http://jlint.sourceforge.net/
Java PathFinder – http://javapathfinder.sourceforge.net/
Fujaba: Move between UML and Java source code – http://wwwcs.uni-paderborn.de/cs/fujaba/
Checkstyle – http://checkstyle.sourceforge.net/
Cookie Revolver Security Framework – http://sourceforge.net/projects/cookie-revolver
tinapoc – http://sourceforge.net/projects/tinapoc
jarsigner – http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html
Solex – http://solex.sourceforge.net/
Java Explorer – http://metal.hurlant.com/jexplore/
HTTPClient – http://www.innovation.ch/java/HTTPClient/
another HttpClient – http://jakarta.apache.org/commons/httpclient/
a list of code coverage and analysis tools for Java – http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html

Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET


Threat modeling

Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) – http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&displaylang=en
Amenaza: Attack Tree Modeling (SecurITree) – http://www.amenaza.com/software.php
Octotrike – http://www.octotrike.org/

Add-ons for Firefox that help with general web application security

Web Developer Toolbar – https://addons.mozilla.org/firefox/60/
Plain Old Webserver (POW) – https://addons.mozilla.org/firefox/3002/
XML Developer Toolbar – https://addons.mozilla.org/firefox/2897/
Public Fox – https://addons.mozilla.org/firefox/3911/
XForms Buddy – http://beaufour.dk/index.php?sec=misc&pagename=xforms
MR Tech Local Install – http://www.mrtech.com/extensions/local_install/
Nightly Tester Tools – http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html
IE Tab – https://addons.mozilla.org/firefox/1419/
User-Agent Switcher – https://addons.mozilla.org/firefox/59/
ServerSwitcher – https://addons.mozilla.org/firefox/2409/
HeaderMonitor – https://addons.mozilla.org/firefox/575/
RefControl – https://addons.mozilla.org/firefox/953/
refspoof – https://addons.mozilla.org/firefox/667/
No-Referrer – https://addons.mozilla.org/firefox/1999/
LocationBar^2 – https://addons.mozilla.org/firefox/4014/
SpiderZilla – http://spiderzilla.mozdev.org/
Slogger – https://addons.mozilla.org/en-US/firefox/addon/143
Fire Encrypter – https://addons.mozilla.org/firefox/3208/

Add-ons for Firefox that help with Javascript and Ajax web application security

Selenium IDE – http://www.openqa.org/selenium-ide/
Firebug – http://www.joehewitt.com/software/firebug/
Venkman – http://www.mozilla.org/projects/venkman/
Chickenfoot – http://groups.csail.mit.edu/uid/chickenfoot/
Greasemonkey – http://www.greasespot.net/
Greasemonkey compiler – http://www.letitblog.com/greasemonkey-compiler/
User script compiler – http://arantius.com/misc/greasemonkey/script-compiler
Extension Developer's Extension (Firefox Add-on) – http://ted.mielczarek.org/code/mozilla/extensiondev/
Smart Middle Click (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/3885/

Bookmarklets that aid in web application security

RSnake's security bookmarklets – http://ha.ckers.org/bookmarklets.html
BMlets – http://optools.awardspace.com/bmlet.html
Huge list of bookmarklets – http://www.squarefree.com/bookmarklets/
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide rich functionality – http://www.blummy.com/
Bookmarklets every blogger should have – http://www.micropersuasion.com/2005/10/bookmarklets_ev.html
Flat Bookmark Editing (Firefox Add-on) – http://n01se.net/chouser/proj/mozhack/
OpenBook and Update Bookmark (Firefox Add-ons) – http://www.chuonthis.com/extensions/

SSL certificate checking / scanning

[ZIP] THCSSLCheck – http://thc.org/root/tools/THCSSLCheck.zip
[ZIP] Foundstone SSLDigger – http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip
Cert Viewer Plus (Firefox Add-on) – https://addons.mozilla.org/firefox/1964/

Honeyclients, Web Application, and Web Proxy honeypots

Honeyclient Project: an open-source honeyclient – http://www.honeyclient.org/trac/
HoneyC: the low-interaction honeyclient – http://honeyc.sourceforge.net/
Capture: a high-interaction honeyclient – http://capture-hpc.sourceforge.net/
Google Hack Honeypot – http://ghh.sourceforge.net/
PHP.Hop – PHP Honeynet Project – http://www.rstack.org/phphop/
SpyBye – http://www.monkey.org/~provos/spybye/
Honeytokens – http://www.securityfocus.com/infocus/1713

Blackhat SEO and maybe some whitehat SEO

SearchStatus (Firefox Add-on) – http://www.quirk.biz/searchstatus/
SEO for Firefox (Firefox Add-on) – http://tools.seobook.com/firefox/seo-for-firefox.html
SEOQuake (Firefox Add-on) – http://www.seoquake.com/

Footprinting for web application security

Evolution – http://www.paterva.com/evolution-e.html
GooSweep – http://www.mcgrewsecurity.com/projects/goosweep/
Aura: Google API Utility Tools – http://www.sensepost.com/research/aura/
Edge-Security tools – http://www.edge-security.com/soft.php
Fierce Domain Scanner – http://ha.ckers.org/fierce/
Googlegath – http://www.nothink.org/perl/googlegath/
Advanced Dork (Firefox Add-on) – https://addons.mozilla.org/firefox/2144/
Passive Cache (Firefox Add-on) – https://addons.mozilla.org/firefox/977/
CacheOut! (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1453/
BugMeNot Extension (Firefox Add-on) – http://roachfiend.com/archives/2005/02/07/bugmenot/
TrashMail.net Extension (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1813/
DiggiDig (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/2819/
Digger (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1467/

Database security assessment

Scuba by Imperva Database Vulnerability Scanner – http://www.imperva.com/scuba/

Browser Defenses

DieHard – http://www.diehard-software.org/
LocalRodeo (Firefox Add-on) – http://databasement.net/labs/localrodeo/
NoMoXSS – http://www.seclab.tuwien.ac.at/projects/jstaint/
Request Rodeo – http://savannah.nongnu.org/projects/requestrodeo
FlashBlock (Firefox Add-on) – http://flashblock.mozdev.org/
CookieSafe (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/2497
NoScript (Firefox Add-on) – http://www.noscript.net/
FormFox (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1579/
Adblock (Firefox Add-on) – http://adblock.mozdev.org/
httpOnly in Firefox (Firefox Add-on) – http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html
SafeCache (Firefox Add-on) – http://www.safecache.com/
SafeHistory (Firefox Add-on) – http://www.safehistory.com/
PrefBar (Firefox Add-on) – http://prefbar.mozdev.org/
All-in-One Sidebar (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/1027/
QArchive.org web file checker (Firefox Add-on) – https://addons.mozilla.org/firefox/4115/
Update Notified (Firefox Add-on) – https://addons.mozilla.org/en-US/firefox/addon/2098/
FireKeeper – http://firekeeper.mozdev.org/
Greasemonkey: XSS Malware Script Detector – http://yehg.net/lab/#tools.greasemonkey

Browser Privacy

TrackMeNot (Firefox Add-on) – https://addons.mozilla.org/firefox/3173/
Privacy Bird – http://www.privacybird.com/

Application and protocol fuzzing (random instead of targeted)

Sulley – http://fuzzing.org/
taof: The Art of Fuzzing – http://sourceforge.net/projects/taof/
zzuf: multipurpose fuzzer – http://sam.zoy.org/zzuf/
autodafé: an act of software torture – http://autodafe.sourceforge.net/
EFS and GPF: Evolutionary Fuzzing System – http://www.appliedsec.com/resources.html

註: 本文轉載自網路 非原創
轉載自 素包子 原文

2009年9月15日 星期二

十二問讓你全面瞭解跨站腳本攻擊

作為網站的業務管理者,在欣賞自己為客戶提供的豐富業務和趣味性體驗時,你是否曾經想過網站會成為攻擊者攻擊第三方的媒介,從而導致公信度大為受損?作為一個網站的訪客,你是否曾經想過在訪問這個自己再熟悉不過的網站時,你的私密信息已經被他人竊取?

這些都與跨站腳本攻擊有關。下面讓我們詳細瞭解這類攻擊。

Q1:什麼是跨站腳本?

跨站腳本(Cross-site scripting,簡稱XSS),是一種迫使Web站點回顯可執行代碼的攻擊技術,而這些可執行代碼由攻擊者提供、最終為用戶瀏覽器加載。不同於大多數攻擊(一般只涉及攻擊者和受害者),XSS涉及到三方,即攻擊者、客戶端與網站。XSS的攻擊目標是為了盜取客戶端的cookie或者其他網站用於識別客戶端身份的敏感信息。獲取到合法用戶的信息後,攻擊者甚至可以假冒最終用戶與網站進行交互。

XSS漏洞成因是由於動態網頁的Web應用對用戶提交請求參數未做充分的檢查過濾,允許用戶在提交的數據中摻入HTML代碼(最主要的是「>」、「<」),然後未加編碼地輸出到第三方用戶的瀏覽器,這些攻擊者惡意提交代碼會被受害用戶的瀏覽器解釋執行。

Q2:XSS縮寫來源?

依照英文縮寫習慣,簡稱跨站腳本為CSS。這樣會引起它和另一個名詞「層疊樣式表」(Cascading Style Sheets,CSS)的混淆。此CSS非彼CSS。為了以示區別,一些安全人士就習慣將跨站腳本簡稱為XSS。[2]

Q3:XSS存在哪些威脅?

攻擊者可以利用XSS漏洞、借助存在漏洞的Web網站攻擊其他瀏覽相關網頁的用戶,竊取用戶瀏覽會話中諸如用戶名和口令(可能包含在cookie 裡)的敏感信息、通過插入惡意代碼對用戶執行掛馬攻擊。XSS漏洞還可能被攻擊者用於網頁篡改,只是多數情況為了經濟利益最大化,攻擊者不會直接進行篡改。

Q4:XSS漏洞的普及率有多高?

國際Web應用安全組織WASC(Web Application Security Consortium)最新數據[4]表明,採樣分析了10297個網站,其中有31.47%站點存在XSS漏洞,且XSS在發現的漏洞中佔到總數的41.41%,高居榜首。

Q5:能否列舉XSS實例?

2005年,一位叫Samy的MySpace用戶自創了一種XSS蠕蟲,24小時內,其網絡空間朋友數目成功從73上升到1百萬。[5]

2006年,PayPal遭到XSS攻擊,攻擊者將PayPal站點的訪問者重定向到一個新的頁面,上面警告用戶他們的帳號已經不再安全,需要重新設置,並提示輸入PayPal的登錄信息、用戶社保信息及信用卡信息。[6]

2008年5月,eBay承認其PayPal頁面存在XSS漏洞,該漏洞會被攻擊者用於盜取用戶證書或cookie。[7]

Q6:攻擊者如何通過XSS攻擊偷取cookie?

在此,僅做舉例說明,幫助讀者理解XSS攻擊的思路。本文中的例子來自[1]。

首先,讓我們假設:存在一個網站www.vulnerableexample.com。該網站上有一個腳本welcome.cgi,參數設定為name。此腳本會讀取HTTP請求的部分,然後未做任何安全性驗證,就將請求內容部分或全部回顯到響應頁面。

通常,如果用戶端發送以下請求:

GET /welcome.cgi?name=Sammi HTTP/1.0

Host: www.vulnerableexample.com

服務器將會有如下響應:

Hi Sammi
Welcome!

...

彈出Alert窗口示例

上述機制將如何為攻擊者所利用呢?我們先列舉一個直觀的方法。通常,攻擊者會應用社會工程學(Social Engineering)設法誘騙受害者點擊由攻擊者精心構造的鏈接,如發送一封標題為「免費聽林肯公園北京現場演唱會」的郵件J。

攻擊者構造的惡意鏈接如下:

http://www.vulnerableexample.com/welcome.cgi?name=

受害者一旦點擊了惡意鏈接,會發送如下請求到www.vulnerableexample.site站點:

GET /welcome.cgi?name= HTTP/1.0

Host: www.vulnerableexample.com

...

站點將返回如下響應:

Hi

Welcome!

...

因為服務器端返回的HTML頁面包含一段JavaScript代碼,受害者瀏覽器會解釋執行。這段代碼被執行後,將被允許訪問瀏覽器中屬於www.vulnerableexample.com站點的cookie。此時,用戶側瀏覽器上會彈出一個alert窗口。

網站收集cookie示例

真實的攻擊步驟中,這些cookie會被發送給攻擊者。攻擊者為此會搭建一個網站(我們稱為www.attackerexample.com),還會應用一個腳本負責接收盜取的cookie。攻擊者會寫一段惡意代碼,用於實現訪問攻擊者站點、並能調用接收cookie的腳本。最終,攻擊者可以從www.attackerexample.com站點獲取到cookie。

構造的惡意鏈接如下:

http://www.vulnerableexample.com/welcome.cgi?name=

服務器響應內容顯示為:

Hi

Welcome!

...

瀏覽器會加載服務器端返回頁面,執行內嵌的JavaScript,並發送一個請求到www.attackerexample.com站點上的collect.cgi腳本,瀏覽器中保存的www.vulnerableexample.com站點的cookie值也會一起發送過去。攻擊者獲取到客戶在www.vulnerable.site站點的cookie,還可以假冒受害者。

Q7:加密是否能有效防護XSS攻擊?

通常大家會認為如果網站使用了HTTPS,提供更有保障的安全,可以倖免於XSS攻擊。其實這是一種誤解。HTTPS僅提供傳輸層的安全,在應用層仍然面臨XSS的威脅。[2]

Q8:XSS漏洞是否可能引起非法執行命令?

如果瀏覽器設置安全性不夠時,XSS漏洞允許插入JavaScript,也就意味著攻擊者可能獲取受限的客戶端執行權限。如果攻擊者進而利用瀏覽器的漏洞,就有可能在客戶端非法執行命令。簡言之,XSS漏洞有助於進一步利用瀏覽器漏洞。[2]

Q9:從網站開發者角度,如何防護XSS攻擊?

來自應用安全國際組織OWASP的建議[3],對XSS最佳的防護應該結合以下兩種方法:驗證所有輸入數據,有效檢測攻擊;對所有輸出數據進行適當的編碼,以防止任何已成功注入的腳本在瀏覽器端運行。具體如下:

·輸入驗證:某個數據被接受為可被顯示或存儲之前,使用標準輸入驗證機制,驗證所有輸入數據的長度、類型、語法以及業務規則。

·強壯的輸出編碼:數據輸出前,確保用戶提交的數據已被正確進行entity編碼,建議對所有字符進行編碼而不僅侷限於某個子集。

·明確指定輸出的編碼方式(如ISO 8859-1或 UTF 8):不要允許攻擊者為你的用戶選擇編碼方式。

·注意黑名單驗證方式的侷限性:僅僅查找或替換一些字符(如"<" ">"或類似"script"的關鍵字),很容易被XSS變種攻擊繞過驗證機制。

·警惕規範化錯誤:驗證輸入之前,必須進行解碼及規範化以符合應用程序當前的內部表示方法。請確定應用程序對同一輸入不做兩次解碼。

Q10:從網站用戶角度,如何防護XSS攻擊?

當你打開一封Email或附件、瀏覽論壇帖子時,可能惡意腳本會自動執行,因此,在做這些操作時一定要特別謹慎。建議在瀏覽器設置中關閉JavaScript。如果使用IE瀏覽器,將安全級別設置到「高」。具體可以參照瀏覽器安全的相關文章。[2]

這裡需要再次提醒的是,XSS攻擊其實伴隨著社會工程學的成功應用,需要增強安全意識,只信任值得信任的站點或內容。

Q11:如果修補XSS漏洞對網站來說困難較大,不修補會怎樣?

如果不能及時修補XSS漏洞,網站可能成為攻擊者攻擊第三方的媒介,公信度受損;網站用戶成為受害者,敏感信息洩漏。現實中,確實存在某些無法修補漏洞的客觀原因,如Web應用開發年代久遠或者整改代碼需要付出過於高昂的代價。這種情況下,選擇Web安全網關會是一種合理選擇。正確應用這類安全工具,會極大緩解XSS攻擊,降低安全風險。

Q12:下一代XSS會是怎樣的?

隨著AJAX(Asynchronous JavaScript and XML,異步JavaScript和XML)技術的普遍應用,XSS的攻擊危害將被放大。使用AJAX的最大優點,就是可以不用更新整個頁面來維護數據,Web應用可以更迅速地響應用戶請求。AJAX會處理來自Web服務器及源自第三方的豐富信息,這對XSS攻擊提供了良好的機會。AJAX應用架構會洩漏更多應用的細節,如函數和變量名稱、函數參數及返回類型、數據類型及有效範圍等。AJAX應用架構還有著較傳統架構更多的應用輸入,這就增加了可被攻擊的點。

註: 本文轉載自網路 非原創
轉載自 51CTO.com 原文

存儲型XSS

 如果把瀏覽器看作WEB2.0後時代的操作系統,那麼客戶端腳本就相當於傳統的應用程序,而XSS的攻擊方式其實就相當於在被攻擊者的系統上執行了一個木馬程序。但這種「木馬」有個很大的缺點,就是無法像傳統木馬那樣在操作系統中安家,以後還能自動執行。

前幾個月發現了一種有趣的XSS漏洞,這種漏洞攻擊一次後XSS代碼就會被存儲下來,以後每次訪問被XSS的網站這個「木馬」都會再自動執行。我在網上沒有找到相關的資料,這裡姑且稱之為「存儲型XSS」(如果有朋友之前看到過類似的文檔,歡迎指教)。

原理其實也很簡單,流程如下:

XSS 代碼被提交給網站-->網站把XSS代碼SetCookie給瀏覽器-->瀏覽器再次請求網站時提交包含XSS代碼的 Cookie-->網站從Cookie中取出包含XSS代碼的某變量並將該變量作為頁面內容的一部分返回給客戶端-->客戶端執行XSS代碼

XSS代碼除了存儲在客戶端的Cookie中,也可能存儲在服務器端,不過這種情形應該比較少。

比較常見的例子是提供多種語言支持的網站。用戶在網站上設定要使用的語言,然後這個語言變量會被存儲在Cookie或服務器端數據庫。如在一些網頁中可以看到類似這樣的函數:

function getLocal() {
    var local;
    local = 'zh_CN';
    return local;
}

其中的local變量可能就是從客戶端提交的Cookie或服務器數據庫中取出的。客戶端請求如下URL:

http://tk.xfocus.org/setlocale.php?locale=zh_CN';return local;}alert("XSS");function dummy(){a='

「zh_CN';return local;}alert("XSS");function dummy(){a='」就會被作為語言信息存儲下來。瀏覽器再去請求網站頁面時,上面的函數就會變成這樣:

function getLocal() {
    var local;
    local = 'zh_CN';return local;}alert("XSS");function dummy(){a='';
    return local;
}

由於語言信息是需要全局使用的,所以一般網站的每個頁面都會包含上面的代碼。這樣,「木馬」就長存於「操作系統」中了。以後被攻擊者每次訪問該網站的每一個頁面,都會執行這些XSS代碼。

註: 本文轉載自網路 非原創
轉載自 YeZi 原文

Mozilla Firefox MFSA 2009-47、-48、-49、-50和-51修補了

安全漏洞:CN-VA09-89
發佈日期:2009年9月14日
漏洞類型:拒絕服務
漏洞評估:嚴重
受影響的軟件:
Ubuntu Linux 9.04 sparc
Ubuntu Linux 9.04 powerpc
Ubuntu Linux 9.04 lpia
Ubuntu Linux 9.04 i386
Ubuntu Linux 9.04 amd64
Ubuntu Linux 8.10 sparc
Ubuntu Linux 8.10 powerpc
Ubuntu Linux 8.10 lpia
Ubuntu Linux 8.10 i386
Ubuntu Linux 8.10 amd64
Ubuntu Linux 8.04 LTS sparc
Ubuntu Linux 8.04 LTS powerpc
Ubuntu Linux 8.04 LTS lpia
Ubuntu Linux 8.04 LTS i386
Ubuntu Linux 8.04 LTS amd64
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux Desktop Workstation 5 client
RedHat Enterprise Linux Desktop 5 client
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux Desktop version 4
RedHat Enterprise Linux 5 server
RedHat Desktop 3.0
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5
Mozilla Firefox 3.0.13
Mozilla Firefox 3.0.12
Mozilla Firefox 3.0.11
Mozilla Firefox 3.0.10
Mozilla Firefox 3.0.9
Mozilla Firefox 3.0.8
Mozilla Firefox 3.0.7 Beta
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.5
Mozilla Firefox 3.0.4
Mozilla Firefox 3.0.3
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.1
Mozilla Firefox 3.1 Beta 3
Mozilla Firefox 3.1 Beta 2
Mozilla Firefox 3.1 Beta 1
Mozilla Firefox 3.0 Beta 5
Mozilla Firefox 3.0

不受影響的軟件:
Mozilla Firefox 3.5.3
Mozilla Firefox 3.0.14

漏洞描述:
    Mozilla發佈的多個安全公告中修復了Firefox存在的多個安全漏洞,攻擊者可以利用這些漏洞獲取用戶敏感信息、執行任意代碼、提升用戶權限或者導致拒絕服務攻擊。由於代碼共享,Mozilla Thunderbird和Mozilla SeaMonkey也受這些漏洞的影響。CNCERT提醒廣大用戶及時下載更新。

參考信息:
http://www.doecirc.energy.gov/bulletins/t-229.shtml
http://www.securityfocus.com/bid/36343/info
http://www.mozilla.org/security/announce/2009/mfsa2009-47.html
http://www.mozilla.org/security/announce/2009/mfsa2009-48.html
http://www.mozilla.org/security/announce/2009/mfsa2009-49.html
http://www.mozilla.org/security/announce/2009/mfsa2009-50.html
http://www.mozilla.org/security/announce/2009/mfsa2009-51.html
http://secunia.com/advisories/36671/
https://www.redhat.com/support/errata/RHSA-2009-1432.html
https://www.redhat.com/support/errata/RHSA-2009-1431.html
https://www.redhat.com/support/errata/RHSA-2009-1430.html

信息提供者:
    Mozilla

其它信息:

相關CVE編號:
    CVE-2009-3079、CVE-2009-3078、CVE-2009-3077、CVE-2009-3076、CVE-2009-3069、 CVE-2009-3070、CVE-2009-3071、CVE-2009-3072、CVE-2009-3073、CVE-2009-3074、 CVE-2009-3075

漏洞報告文檔編寫:

CNCERT/CC

安全公告文檔編寫:

CNCERT/CC
-----------------------------------------------------------------------------------

CNCERT/CC在發佈安全公告信息之前,都力爭保證每條公告的準確性和可靠性。然而,採納和實施公告中的建議則完全由用戶自己決定,其可能引起的問題和結果也完全由用戶承擔。是否採納我們的建議取決於您個人或您企業的決策,您應考慮其內容是否符合您個人或您企業的安全策略和流程。

在任何情況下,如果您確信您的計算機系統受到危害或是攻擊,我們鼓勵您及時告知國家計算機網絡應急技術處理協調中心:http://www.cert.org.cn/servlet/Incident

同時,我們也鼓勵所有計算機與網絡安全研究機構,包括廠商和科研院所,向我們報告貴單位所發現的漏洞信息。我們將對所有漏洞信息進行驗證並在CNCERT/CC網站公佈漏洞信息及指導受影響用戶採取措施以避免損失。

註: 本文轉載自網路 非原創
轉載自 CNCERT/CC 原文