Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Fri, 27 May 2022 16:37:24 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 Exploit code to hack VMware products is publicly disclosed. PoC for CVE-2022-22972 https://www.securitynewspaper.com/2022/05/27/exploit-code-to-hack-vmware-products-is-publicly-disclosed-poc-for-cve-2022-22972/ Fri, 27 May 2022 16:37:11 +0000 https://www.securitynewspaper.com/?p=25334 A proof of concept (PoC) code for CVE-2022-22972, a critical vulnerability in some VMware products such as Workspace ONE Access, Identity Manager, and vRealize Automation, has been publicly disclosed. ThisRead More →

The post Exploit code to hack VMware products is publicly disclosed. PoC for CVE-2022-22972 appeared first on Information Security Newspaper | Hacking News.

]]>
A proof of concept (PoC) code for CVE-2022-22972, a critical vulnerability in some VMware products such as Workspace ONE Access, Identity Manager, and vRealize Automation, has been publicly disclosed.

This PoC was published by researchers at security firm Horizon3, in conjunction with technical analysis, after VMware released corresponding updates: “This script can be used by circumventing authentication in vRealize Automation,” the researchers report.

A scan with Shodan shows a limited number of potentially compromised VMware devices, most used by industry organizations, hospitals, and government entities. Horizon3 experts mention that this header manipulation vulnerability is relatively simple and threat actors should not have great difficulty exploiting unpatched deployments.

In this regard, the Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive in which federal agencies in the U.S. are ordered to immediately update vulnerable VMware products, and even eliminate them if necessary.

While this flaw has not been exploited in the wild, threat actors have begun to attack corrected implementations to try to inject a cryptocurrency miner: “CISA expects threat actors to quickly develop the ability to exploit these vulnerabilities.”

This has been a difficult year for VMware. In April, the company fixed two critical remote execution and privilege escalation vulnerabilities tracked as CVE-2022-22954 and CVE-2022-229600 in VMware Workspace ONE Access and VMware Identity Manager.

Feel free to access the International Institute of Cyber Security (IICS) websites to learn more about information security risks, malware variants, vulnerabilities, and information technologies.

The post Exploit code to hack VMware products is publicly disclosed. PoC for CVE-2022-22972 appeared first on Information Security Newspaper | Hacking News.

]]>
17 critical vulnerabilities affect 16,000 F5 BIG-IP security products https://www.securitynewspaper.com/2022/05/05/17-critical-vulnerabilities-affect-16000-f5-big-ip-security-products/ Thu, 05 May 2022 16:24:45 +0000 https://www.securitynewspaper.com/?p=25239 A report by F5 Networks points to the detection of a critical vulnerability that would allow threat actors with access to an exposed network to execute arbitrary commands, deploy fileRead More →

The post 17 critical vulnerabilities affect 16,000 F5 BIG-IP security products appeared first on Information Security Newspaper | Hacking News.

]]>
A report by F5 Networks points to the detection of a critical vulnerability that would allow threat actors with access to an exposed network to execute arbitrary commands, deploy file actions, and disable services on BIG-IP. Tracked as CVE-2022-1388, the flaw received a score of 9.8/10 according to the Common Vulnerability Scoring System (CVSS) and its exploitation could prove critical.

In total, the company fixed 17 severe vulnerabilities, many of which could result in severe compromise of the affected systems.

The bug resides in the iControl REST component and would allow malicious hackers to send requests capable of evading iControl REST authentication on BIG-IP products. The report was taken up by the Cybersecurity and Infrastructure Security Agency (CISA).

Among the affected products are:

  • BIG-IP between v16.1.0 and v16.1.2
  • BIG-IP between v15.1.0 and v15.1.5
  • BIG-IP between v14.1.0 and v14.1.4
  • BIG-IP between v13.1.0 and v13.1.4
  • BIG-IP between v12.1.0 and v12.1.6
  • BIG-IP between v11.6.1 and v11.6.5

The company released the corrected versions v17.0.0, v16.1.2.2, v15.1.5.1, v14.1.4.6 and v13.1.5. The derived versions of 12.x and 11.x will not receive updates, as F5 considers that they have reached the end of their useful life; on the other hand. BIG-IQ Centralized Management, F5OS-A, F5OS-C and Traffic SDC are not affected by the flaw.

For deployments that cannot be updated immediately, F5 listed a number of workarounds to mitigate the risk of exploitation based on blocking any access to the iControl REST interface through its own IP addresses, as well as restricting access only for trusted users, and modifying the BIG-IP httpd configuration.

F5 BIG-IP devices are used in all kinds of organizations worldwide, so vulnerabilities like this represent severe security risks. As if that were not enough, corporate network administrators still do not pay enough attention to this attack vector, so attacks against these devices have increased significantly since 2020.

A quick scan at Shodan shows that there are nearly 16,200 F5 BIG-IP devices on display online, most in the United States, Australia, China, India and Japan.

Given the latent risk of exploitation, it is best for threat actors to address these flaws as soon as possible.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post 17 critical vulnerabilities affect 16,000 F5 BIG-IP security products appeared first on Information Security Newspaper | Hacking News.

]]>
TOP 10: The best web browsers for cybersecurity specialists https://www.securitynewspaper.com/2022/01/08/top-10-the-best-web-browsers-for-cybersecurity-specialists/ Sat, 08 Jan 2022 18:15:00 +0000 https://www.securitynewspaper.com/?p=24645 Search engines are one of the most widely used computer tools worldwide, since any user can access the Internet regardless of their level of computer knowledge. Although tools such asRead More →

The post TOP 10: The best web browsers for cybersecurity specialists appeared first on Information Security Newspaper | Hacking News.

]]>
Search engines are one of the most widely used computer tools worldwide, since any user can access the Internet regardless of their level of computer knowledge. Although tools such as Chrome, Edge or Firefox are the best known, other web browsers offer other kinds of functions and protections.

This time, cybersecurity awareness experts from the International Institute of Cyber Security (IICS) will show you the 10 search engines most used by cybersecurity professionals and even by some hacking groups.

As usual, we remind you that this article was written for informational purposes only and should not be taken as a call to action, so IICS is not responsible for the misuse of the information contained herein. With this in mind, let’s start looking at web browsers.

Shodan

Cybersecurity awareness experts consider Shodan to be one of the best search engines today. This tool allows getting information about any device connected to the Internet, including webcams, alarms, servers, routers, traffic lights and many other devices.

Shodan may collect information such as IP addresses, HTTP server headers, location, and device type, which can be used to find security flaws and fix them, or even exploit them.

Censys

Censys is a tool similar to Shodan in general terms as it also allows you to monitor devices connected to the Internet, collect their information and provide detailed reports to users.

According to cybersecurity awareness specialists, Censys can also be used to view real-time information about the various attacks to which computer systems are exposed, being able to detect services vulnerable to known failures.

Greynoise

Greynoise is somewhat different from the tools listed above, as it allows you to identify servers and users who scan networks for vulnerabilities using tools such as Shodan. Using this tool, it is possible to get information about malicious websites, types of attacks, and security breaches by simply entering an IP address or related words.

Wigle

This is a search engine for finding wireless networks and used to map wireless networks. Using this tool shows a map where we can enter a certain latitude and longitude in order to find all the networks of access points, WiFi devices and telecommunications antennas available in that area.

Zoomeye

Zoomeye is a navigation map to find vulnerabilities and active threats in networks and systems. It was developed mainly for the Chinese market and records numerous amounts of data collected from multiple sources, always ready for user consultation.

The tool can present statistics for all devices that can be accessed over the Internet from different countries, web browsers or servers.

Hunter

This is an internet search engine widely used by hacking groups to find unsecured email addresses. Hunter Search Engine can be used to search and retrieve all email addresses associated with a specific domain or organization.

During use, Hunter displays a list of email addresses that belong to the target domain, including their activity, as well as the public resources that were used for those addresses. The developers also created an API to test email ID deliverability and learn more about the organization.

PIPL

This is a useful Search Engine on the Internet to find information about a certain person, using as a reference general data associated with the person, such as phone numbers and email addresses, mention experts in cybersecurity awareness.

PublicWWW

This is a search engine designed to analyze any website for source code in HTML, CSS, JavaScript and other formats. Using PublicWWW, cybersecurity awareness experts can search websites based on their source code by simply providing a small piece of code; in response, the search engine will return a list of all websites that use similar code, which can prove very useful in subsequent analysis.

Have I Been Pwned

This tool is useful for both ethical hacking specialists and the general public, as it allows users to verify if an email address has been compromised in a cybersecurity incident.

The platform collects and identifies various database dumps and identifies exposed accounts, alerting the user to their compromised information or confirming that the email address or phone number is safe.

OSINT Framework

Open Source Intelligence Framework is capable of collecting information available from public sources, which is very useful for analysis and pentesting processes. This tool has a large number of menus and submenus, which allow you to obtain the desired results according to the goals of the research.

This cybersecurity framework is mainly employed by law enforcement and intelligence agencies in multiple countries, so it is constantly maintained and updated.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post TOP 10: The best web browsers for cybersecurity specialists appeared first on Information Security Newspaper | Hacking News.

]]>
Critical vulnerabilities in VMware vCenter expose thousands of users; update now https://www.securitynewspaper.com/2021/06/15/critical-vulnerabilities-in-vmware-vcenter-expose-thousands-of-users-update-now/ Tue, 15 Jun 2021 16:05:04 +0000 https://www.securitynewspaper.com/?p=23685 A recent report notes that thousands of VMware vCenter servers exposed on the Internet are affected by a set of severe security flaws even after patches were released to addressRead More →

The post Critical vulnerabilities in VMware vCenter expose thousands of users; update now appeared first on Information Security Newspaper | Hacking News.

]]>
A recent report notes that thousands of VMware vCenter servers exposed on the Internet are affected by a set of severe security flaws even after patches were released to address these issues. These flaws reside in vCenter Server, VMware’s centralized management interface.

The most severe flaws were identified as CVE-2021-21985 and CVE-2021-219896 and were corrected at the end of May.

The first flaw lies in a vSAN plugin enabled by default and its exploitation would allow remote code to run in deployments with access to port 443. The flaw impacted VMware vCenter Server and VMware Cloud Foundation and received a score of 9.8/10 on the Common Vulnerability Scoring System (CVSS) scale.

In a security alert, the company mentions that the flaw can be exploited by a threat actor to access the adjacent operating system with high privileges.

On the other hand, CVE-2021-21986 resides in the vSphere Client and the vSphere authentication mechanism, including Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability.

The flaw received a CVSS score of 6.5/10 and its exploitation would allow malicious hackers with access to port 443 to deploy actions allowed by the affected plugins without the need for authentication on the target system.

Early analyses indicate that there are thousands of servers connected to the Internet exposed to these flaws. This week, Trustwave researchers noted that a subsequent analysis revealed the detection of more than 5 thousand instances available online, most of them running port 443.

Using the IoT Shodan search engine, the researchers were able to find data from at least 4 thousand compromised instances, demonstrating that security patches have not been adopted by all affected version managers. Researchers estimate that nearly 20% of deployments available on the Internet are still exposed to flaws.

During the release of the updates, the provider company pointed out that the vulnerabilities require the immediate attention of users, so they must be updated as soon as possible. More information about the flaws and the update can be found on the company’s official platforms.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post Critical vulnerabilities in VMware vCenter expose thousands of users; update now appeared first on Information Security Newspaper | Hacking News.

]]>
OSINT/OSINV WEBSITES FOR SHIPS AND BOATS IN THE SEA https://www.securitynewspaper.com/2020/09/02/osint-osinv-websites-for-ships-and-boats-in-the-sea/ Wed, 02 Sep 2020 14:00:08 +0000 https://www.securitynewspaper.com/?p=21165 INTRODUCTION We are always curious to see boats and ship in the sea. Today we will show the websites that are used for OSINT (Open Source Intelligence) or OSINV (Open Source Investigation) ofRead More →

The post OSINT/OSINV WEBSITES FOR SHIPS AND BOATS IN THE SEA appeared first on Information Security Newspaper | Hacking News.

]]>
INTRODUCTION

We are always curious to see boats and ship in the sea. Today we will show the websites that are used for OSINT (Open Source Intelligence) or OSINV (Open Source Investigation) of ships and boats in the sea. Earlier researcher of International Institute of Cyber Security demonstrated ways to find ships & boats in the sea using tools like Shodan.

Marine Traffic

Marine traffic
Marine traffic

Marine traffic is an open-source application to track the movement of ships in the sea. Here, we can view the ships/boats and seaports on the live map. We can also search for the weather routing. We can access this tool through the website or install this application on any android mobile.

Shipfinder

Ship finder
Ship finder

Ship finder is another website to track any ship’s live location by simply searching with the ship’s name. This website shows complete details about the ship like latitude and longitude, destination port, speed, and estimated time to reach.

AIShub

AIShub
AIShub

 AIShub is another website for tracking vessel tracking and data sharing, this website shows complete details about the vessel by selecting a particular vessel. Information includes Port calls position & voyage data, map position & weather, vessel particular, History about the vessel, and related news.

Myshiptracking

Myshiptracking
Myshiptracking

Myshiptracking is another website for a free vessel tracking system in real-time, this can detect any vessel and displays complete information like location, distances, estimated time, and port details. We can select a particular vessel to track.

Boatnerd

boardnerd
boardnerd

Boardnerd is another website for tracking vessel live. This application shows the vessel name, when we click on the vessel name on the map it shows details like screen location, ship type, position (lat/lon), destination, Estimated time (ETA), speed, dimensions, and status.

Openseamap

Openseamap
Openseamap

Openseamap is another website to add tourism information for sailors, this application build in the year 2009. Around 1,000,00 people worldwide collected and stored in the openseamap database.

Shipping explorer

Shipping explorer
Shipping explorer

Shipping explorer is another open-source website to track any vessel in real-time. Here, we can view the different ships, ports, location with photos. We can also view the port names with country name and the number of ships available.

The post OSINT/OSINV WEBSITES FOR SHIPS AND BOATS IN THE SEA appeared first on Information Security Newspaper | Hacking News.

]]>
Two Critical vulnerabilities in Sophos Cyberoam firewall can allow network takeover https://www.securitynewspaper.com/2020/05/14/two-critical-vulnerabilities-in-sophos-cyberoam-firewall-can-allow-network-takeover/ Thu, 14 May 2020 19:11:28 +0000 https://www.securitynewspaper.com/?p=19839 Researchers from vpnMentor have released a report on two critical vulnerabilities in Cyberoam firewall and VPN solutions. The flaws affect the company’s “email quarantine system”, to which threat actors couldRead More →

The post Two Critical vulnerabilities in Sophos Cyberoam firewall can allow network takeover appeared first on Information Security Newspaper | Hacking News.

]]>
Researchers from vpnMentor have released a report on two critical vulnerabilities in Cyberoam firewall and VPN solutions. The flaws affect the company’s “email quarantine system”, to which threat actors could access without authentication.

The first of these flaws was reported in December 2019, while the second vulnerability was reported to vpnMentor by an anonymous ethical hacker in January 2020. By analyzing these security issues, vpnMentor discovered a third vulnerability affecting Cyberoam products. The flaws could be exploited by sending a malicious request that would allow hackers to execute arbitrary commands.

Indian-based Cyberoam was founded in 1999 and currently has 550 employees worldwide, working for more than 65,000 customers and 5,000 technology and software partners in 120 different countries.

The main problem is two vulnerabilities that affect how an email is released from the quarantine process on a Cyberoam device. The two flaws could be exploited by hackers to access compromised computers and facilitate the exploitation of Cyberoam firewall deployment. In addition, during the review of these flaws, experts discovered that the company’s solutions support default passwords, which was also reported as a security issue.

  • The first flaw allows access to any Cyberoam device by exploiting the email quarantine release system. Multiple banks and private organizations employ Cyberoam solutions, so they could be exposed to these attacks
  • The second report refers to a remote code pre-execution vulnerability and was discovered when implementing the security patch for the first flaw

By exploiting these security flaws, threat actors could access any Cyberoam security appliance via the firewall operating system web interface. These flaws exist due to a flaw in the way the service configured user account accesses on devices. Its exploitation does not require authentication and all attackers require is to know the IP address of the target device, in addition to a reliable shell.  

If attackers were able to remotely access the CyberoamOS shell, they could access any file on the server and maintain network-wide monitoring. When scanning using Shodan, experts detected at least 170,000 firewall implementations vulnerable to this attack. Of these, at least 86,000 IP addresses belong to Cyberoam devices, although the number of exposed deployments of this company could be much larger.

Like other flaws discovered in security software solutions, successful exploitation of these vulnerabilities could lead to scenarios such as theft of sensitive information, network hijacking, and malware packet manipulation to make them look legitimate. In addition, experts believe the flaw could be present in Cyberoam implementations launched over the past eight years.

The vulnerability has already been resolved. However, Cyberoam could still face subsequent cyberattack campaigns in search of other security flaws in the affected products, as it is a behavior associated with large groups of threat actors.

The post Two Critical vulnerabilities in Sophos Cyberoam firewall can allow network takeover appeared first on Information Security Newspaper | Hacking News.

]]>
Top Web Browser Extensions for Hackers and Security Researchers https://www.securitynewspaper.com/2020/01/23/top-web-browser-extensions-for-hackers-and-security-researchers/ Thu, 23 Jan 2020 13:25:45 +0000 https://www.securitynewspaper.com/?p=18377 Web browser extensions gives additional features to any normal web browser. Extensions are capable of giving functionality from capturing web pages to downloading videos from restricted websites. Most web browserRead More →

The post Top Web Browser Extensions for Hackers and Security Researchers appeared first on Information Security Newspaper | Hacking News.

]]>
Web browser extensions gives additional features to any normal web browser. Extensions are capable of giving functionality from capturing web pages to downloading videos from restricted websites. Most web browser extensions runs in background and continuously helps users to use extensions features efficiently. According to ethical hacking researcher of international institute of cyber security while doing pentesting/ vulnerability assessment many web browser extensions can be used for finding basic info of any website. Extensions are also refers as web browser addons. There are numerous web browser extensions which are used by pentesters like extracting information from any image or check web site information.

Privacy Badger

While making any financial or any other transactions, no user wants to share their details. Users can opt out for privacy badger which has capability of blocking unnecessary tracking. Now days most website uses tracker cookies to make an site preference for different users. This helps companies to collect data regarding preferences which user makes. According to privacy badger developers, privacy badger sends Do Not Track Signals to different websites. Privacy Badger removes outgoing links on third party sites and click tracking on social networking websites.

Privacy Badger Blocking Trackers
Privacy Badger Blocking Trackers on Chrome

With its continuously usage of privacy badger, learns to block ads more efficiently. Download link privacy badger.

Ublock Origin

Ublock Origin is used for content-filtering, ad-blocking. It can blocks malicious web sites, block different ads, popus, tracker sites. Ublock Origin helps to surf on different sites by disabling the trackers. Mostly eCommerce platforms uses trackers to know their consumer preferences. Below shows how youtube.com trackers are blocked. The Red one indicates that trackers blocked and blue, white indicates that trackers allowed.

  • Ublock works automatically, users don’t need to click on any icon.
Ublock_Origin
Ublock_Origin on FireFox

Download Ublock_origin.

Go_Back_In_Time

Go back in Time is used to open archived web pages. This extension helps in viewing old web pages in its earlier version. Go back in time provides different search engines to view web pages in its earlier version.

  • After installing extension. Open any web page, right click anywhere on web page. Click on Go Back In Time then click on any search engine for opening desired web page.
  • We have used Google cache for opening YouTube old version. Other options are: CoralCDN, The Internet Archive, Yahoo! Cache, MSN Cache, Gigablast Cache, WebCite
Go_Back_In_Time
Go_Back_In_Time on Chrome

Download Go Back In Time.

User-Agent-Switcher

User agent Switcher is a extension can be used by hacker or cyber security research for modifying the User Agent. User can use user agent switcher to confuse servers in impersonating its browser and OS details.

  • For changing agent switcher. Download the chrome extension and click on Agent Switcher icon. Then select your desired agent switcher and click on apply.
Changing Agent Switcher
Changing Agent Switcher on Chrome
  • After changing agent switcher refresh web page & you will see that agent switcher will change
Agent Switcher
Agent Switcher on Chrome

Exif-Data Information Extractor

Exif-data information shows meta data about any image. Capturing image also captures many more information than only an image. Image contains camera settings like – aperture, ISO, shutter speed, white balance, date, time, image histogram and other information. Stenography is an another process used in hiding files behind any image. But this extension only shows the exif-data information.

  • For using this extension. Download exif-data viewer, then open any image which contains exif-data information. Right click on image then click on Show Exif Data.
Exif-Data Viewer
Exif-Data Viewer
  • Above shows the exif-data with its date, time F.Length, Metering Mode, Flash, White balance. Above exif-data information can be used in initial part of information gathering of ethical hacking.

Wappalyzer

Gathering information about any website before starting penetration testing. Wappalyzer shows web servers details which helps security testers to move on next phases.

  • Download and install the wappalyzer. Then open any website and click on below icon which shows the front-end and back-end languages which are used in information gathering.
wappalyzer on mozilla
wappalyzer on mozilla
  • Above shows that certifiedhacker.com is using libraries and Apache web server.

Connect Remotely Using SSH

SSH (Secure Remote Login) helps users connect remotely with other machines. For connecting with SSH users have to enter the IP address and port 22. Then enter the username. Users can also use web browsers for connecting with another machines. For using SSH on Google Chrome. Download the extension.

  • Open chrome browser, type chrome://apps, Click on Secure Shell App.
SSH (Secure Shell APP)
SSH (Secure Shell APP) on chrome
  • Then click on enter. Now it will ask for password. Enter password.
Secure Shell App Login
Secure Shell App Login
  • Above shows that SSH has login successfully in web browser. Now pentester can run different shell scripts from here.
  • This extension comes in handy in ethical hacking courses offered by International Institute of Cyber Security

Traffic Masking – Chaff

Chaff helps in generating random sites traffic to confuse trackers or network traffic monitors. Chaff generates random fake network traffic. Users can configure different sites in Chaff settings on which sites users wants to generate fake traffic.

  • Download Chaff and install. Then click on its icon. After then chaff will start generating fake network traffic. Chaff will open a new tab and will open another web page as per configured in chaff settings.
Chaff
Chaff on Chrome
  • For configuring Chaff settings, Go to sources for configuring site settings.
Chaff_Settings
Chaff_Settings
  • Above settings are used for starting point for generating fake network traffic.

Nimbus_Screenshot

Many times while researching, pentester needs to download file. Some sites prohibit downloading option to stop spamming. There are numerous extensions which are used for taking screenshots. We will use Nimbus Screenshot. Nimbus creates, shares screenshots of any website. Nimbus also gives option for creating entire web page screenshot. Like any other snipping tools. Nimbus offers capturing particular part of web page, selected area or selected scroll and different options for capturing web pages.

  • Download Nimbus Screenshot and install. Open any web page, right click on Nimbus icon.
Nimbus Screenshot
Nimbus Screenshot
  • Select any options as per requirement for capturing screenshots.
Nimbus_Screenshot_Options
Nimbus_Screenshot_Options
  • Above shows the Nimbus screenshot options shows image editing options.

Shodan

Shodan is very popular engine for finding information regarding devices on Internet. With shodan pentester can gather different information like hosted country, open ports, top CVE, vulnerabilities and other databases which are available online. Shodan also shows open servers, scada systems, open IOT devices. But today we will show you Shodan chrome extension which tells the open ports of any website user visits.

  • Download Shodan and add to chrome. After that open website and click on shodan icon. You will find open ports of any website.
Shodan
Shodan
  • Above shows the open ports, of testphp.vulnweb.com

The post Top Web Browser Extensions for Hackers and Security Researchers appeared first on Information Security Newspaper | Hacking News.

]]>
Find Webcams, Databases, Boats in the sea using Shodan https://www.securitynewspaper.com/2018/11/27/find-webcams-databases-boats-in-the-sea-using-shodan/ Tue, 27 Nov 2018 12:02:05 +0000 https://www.securitynewspaper.com/?p=12930 SHODAN:- Shodan is a scanner which finds devices connected over the internet. Shodan can finds devices like traffic lights, security cameras, home heating devices and baby monitors, ethical hacking consultantsRead More →

The post Find Webcams, Databases, Boats in the sea using Shodan appeared first on Information Security Newspaper | Hacking News.

]]>
SHODAN:- Shodan is a scanner which finds devices connected over the internet. Shodan can finds devices like traffic lights, security cameras, home heating devices and baby monitors, ethical hacking consultants assure. This web scanner can also finds the SCADA system like -gas stations, nuclear power plants. Shodan tells the physical location of connected devices over the internet.

Ethical hacking researcher says that shodan can creates violation on users privacy because it ping almost on any device connected over the internet without taking users permission.

For using shodan go to: https://www.shodan.io/

  • For creating an account go to https://account.shodan.io/register
  • Shodan search engine can also be used without signing up. Signing up is not compulsory.

  • Enter the necessary details- your username,password and email for signing up in shodan.
  • After creating an account sign in with your credentials.

  • After singing in, shodan will open. Now you can explore shodan.

  • After creating your account in shodan. Sign in to your account and shodan will show your account api key. For security reasons the key has been hided (ZoxxxxxxPFmYHJvSWhKixxxxxxxxxxHmT).
  • You can also use the API key in recon-ng for reconnaissance.

  • You can also search any website/IP address simply enter the your target name and as you see below it will show the details of the target, mention ethical hacking investigators.

Fun with SHODAN:-

  • The below site in the screen shot is most popular for testing your hacking skills.(hackthissite.org)

  • After typing the target website, open ports and the IP address has found which can be used in footprinting and reconnaissance.

SHODAN FEATURES:-

Shodan offers many great features to search. Normal user can easily explore shodan. Most of the pentesters use shodan for finding vulnerabilities, according to ethical hacking courses.

There are many keywords to search in shodan and here are some of the keywords which have been used to show you how shodan works:-

  • VSAT – Mainly works in boats/ship tracker to detect boats/ship location.
  • Cameras – Shows the open IP’s of the web-cameras which are used in surveillance.
  • Exploring the other like – databases, video game servers, Industrial Control System.
    • Databases – show the databases with lack of security.
    • Video Game Servers – shows the running open servers of the games.
    • ICS (Industrial Control System) – shows the open ICS systems which are vulnerable.

SEARCHING BOATS/SHIPS ON SHODAN:-

Boats/ships uses VSAT (Very-Small-Aperture Terminal) which uses satellite communication to communicate with the outer world. VSAT uses IPv4 for the communication. As shodan ping all the IP addresses over the internet, so in this pinging process shodan also list’s the IP’s associated with VSAT communication on the boat. Now in the below screens you will see how a normal internet user can search the boats in the sea.

===================SNIP=================

  • if you type VSAT in the search engine of shodan you will find there are many unprotected IP’s of the ship.

  • You can see in the above screen shots, open ports and IP address of the ship which can be used in other hacking activities.
  • You can also check the location of the ship by typing the longitude and latitude of the ship in the google search engine.

SEARCHING LIVE CAMS:-

You can search the live cameras with open ports.For searching the live webcams. go to shodan search engine and type webcams.

For example :-

  • For searching webcams, you can type webcams or the query of the webcam which mostly URL path used by IP camera
  • So we will search /cgi-bin/guestimage.html 
  • The above URL path is normally used by Mobotix company which makes IP surveillance camera.

===================SNIP================

  • After searching through the query, there is an IP – 166.161.197.253 which we will examine further.

  • After clicking on the IP, You can see open port and the IP address of the myvzw.com from the organisation verizon wireless.
  • Now to open IP address type the above IP address with the port into your browser 166.161.197.253:5001 as shown below.

  • As you can see the targeted IP camera is working but it is night over there. Now we will try to find some previous recording to check if the camera is working.
  • Click on the menu market red in the above screen shot.

  • Go to the event list.

  • As there are many previous records.One of the record we will show you the day mode.

  • One of the previous record as you can see that this surveillance camera is open to exploit.

Another surveillance camera which is found in the list.

  • When we open the IP address with the listed ports we found that:-

  • Beach surveillance camera.

  • Above screen shots, are from the Hotel wellness resort (riva degli etruschi).

Another example:-

  • Opening the IP address 89.203.117.200 shows live surveillance.

  • Above screen shot is from Czec Rpublic. A local street location from live cam.

OTHER FEATURES IN  SHODAN:-

Shodan gives many options to explore.

  • By clicking on the explore, you can find the most popular searches which has been done in shodan by other users. And shows the most common and recent searches.
  • These common searches can be used easily used to exploit them as they have lack of security.

SEARCHING VIDEO GAMES:-

  • You can open listed game servers to check IP addresses.

  • Here we have chosen the target.

==================SNIP====================

  • Minecraft server can be used in port scanning and in other hacking activities.
  • The above listed vulnerabilities can be used can be used by remote attackers to cause denial-of-service attack. And the vulnerability could allow to get into the directories, as per ethical hacking specialists.

SEARCHING DATABASES:-

  • Choose the database.

  • Selecting the target.

  • In the above screen shot, you can use the IP address with listed ports to open the db page.

  • It shows the graph of the memory process which can be used in initial phase of penetration testing.

  • As you can see the above screen shots, the above admin details can be used in other hacking activities.

SEARCHING ICS (INDUSTRIAL CONTROL SYSTEM):-

  • Select the target.

===================SNIP==================

  • The above IP address and open ports can be used in port scanning.
  • In the above screen shots, the listed vulnerabilities can cause a massive attacks to the target. Denial-of-service attack can be used by attackers. Remote execution can also be done on this vulnerable website.

USING THE GOOGLE CHROME EXTENSION:-

    • For quick and fast information, you can also use the google chrome addon which is available in the google chrome appstore. For installing shodan addon in google chrome go to: https://chrome.google.com/webstore/detail/shodan/jjalcfnidlmpjhdfepjhjbhnhkbgleap?utm_source=chrome-ntp-icon
  • After installing the addon, whenever you open the target site. Shodan addon will start its query and will show the target website open ports/IP address.

MOST POPULAR SEARCHES:-

Shodan offers many features like searching any open cams, searching for routers with default security methods.

============SNIP============

  • In the above screen shot, here are some of the listed open devices which can be used in hacking activities. The most popular searches are easy to find and can be exploited by script kiddie also.

PAID PLANS:-

  • You can also use the paid plans if you working as professional pentester because shodan provides detailed information for the target.

OTHER RESOURCES:-

You can also use the some other resources to check ship latitude and longitude.

  • https://shiptracker.shodan.io
  • https://www.vesselfinder.com
  • https://www.marinetraffic.com

These websites provide AIS (Automatic Identification System) that uses transponder device to receive the signal to satellite and then transmit those signals to receiver to tell their location, but shodan ship tracker is more than that.

  • As you can see in the above screen shots, there are two websites who shows the ship location by using AIS system. Normal user can check to know the location of the website. These two websites shows the  longitude and latitude of the ship.

The post Find Webcams, Databases, Boats in the sea using Shodan appeared first on Information Security Newspaper | Hacking News.

]]>
New Shodan Tool Can Find Malware Command and Control (C&C) Servers https://www.securitynewspaper.com/2017/05/02/new-shodan-tool-can-find-malware-command-control-cc-servers/ Tue, 02 May 2017 17:51:30 +0000 https://www.securitynewspaper.com/?p=8097 Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine forRead More →

The post New Shodan Tool Can Find Malware Command and Control (C&C) Servers appeared first on Information Security Newspaper | Hacking News.

]]>

Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices.

Malware Hunter works via search bots that crawl the Internet looking for computers configured to function as a botnet C&C server.

In order to trick a C&C server to reveal its location, the search bot uses various predefined requests to pretend to be infected computer that’s reporting back to the C&C server. If the scanned computer responds, Malware Hunter logs the IP and makes it available via the Shodan interface.

Malware Hunter

Malware Hunter is powered by technologies from Shodan and Recorded Future. For its part, Shodan is providing the ability to quickly and efficiently probe every IP address on the Internet, while Recorded Future is contributing the technical information needed to mimic infected computers (malware bots).

“This methodology is the first to use Shodan to locate RAT controllers before the malware samples are found,” said Levi Gundert, vice president of intelligence and strategy at Recorded Future. “By doing it this way – signature scans for RAT controller IP addresses, observing malware through our API, and cross-correlating it with a variety of sources – we are able to locate RAT controllers before the associated malware begins spreading or compromising targeted victims.”

More details about the technical details behind the process of searching and identifying C&C servers is available in this 15-page report released by Recorded Future.

Currently, Malware Hunter can identify a wide range of RAT C&Cs

Currently, the Malware Hunter engine comes with support for identifying a wide range of C&C servers for RATs (Remote Access Trojans), such as Dark Comet, njRAT, Poison Ivy, Ghost RAT, and more.

In the future, hopes are that the Malware Hunter search engine will be able to uncover other types of malware botnets, such as those for backdoor trojans, cyber-espionage malware, cryptominers, or DDoS malware.

You can directly access Malware Hunter results by searching for “category:malware” on Shodan. An initial set of results — at the time of writing — lists over 5,700 C&C servers.

 Source:https://www.bleepingcomputer.com/news/security/new-shodan-tool-can-find-malware-command-and-control-candc-servers/

The post New Shodan Tool Can Find Malware Command and Control (C&C) Servers appeared first on Information Security Newspaper | Hacking News.

]]>