Monday, September 27, 2010

Twitter onMouseOver XSS Exploit Causes Chaos


The big news yesterday was an epic XSS flaw on Twitter that sent the micro-blogging service into chaos. They actually made an announcement during the hack that users should stay off the web-site and use 3rd party services through the API (Software such as Tweetdeck, Seesmic, Gravity etc).
They posted an update on the status blog pretty fast that the XSS had been identified and they were in the midst of patching it.



Hackers have exploited a flaw in Twitter, which results in pop-ups and third-party websites being opened despite users simply hovering over links with their mouse.
Hundred of Twitter users, including Sarah Brown – wife of the former Labour Prime Minister Gordon Brown – have fallen victim to the attack. In some cases the third-party websites that are open are pornographic. The malicious links containJavascript code, called onMouseOver, which allows users to redirected, even if they haven’t clicked on the link.
Graham Cluely from security firm Sophos said in a blog that at present the flaw is being exploited for “fun and games” although “there is obviously the potential for cybercriminals to redirect users to third-party websites containing malicious code, or for spam advertising pop-ups to be displayed”.
Cluley advised Twitter users to avoid using the Twitter website and instead rely on a third-party client such as Tweetdeck to access the service.

Sunday, September 26, 2010

wifite – Mass Wifi WEP/WPA Key Cracking Tool

Found this really cool tool through another site.

Cool Stuff:


  • sorts targets by power (in dB); cracks closest access points first
  • automatically deauths clients of hidden networks to decloak SSIDs
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • customizable settings (timeouts, packets/sec, channel, change mac address, etc)
  • all WPA handshakes are backed up to wifite.py's current directory
  • smart WPA deauthentication -- cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C -- options: continue, move onto next target, skip to cracking, or exit
  • switching WEP attack methods does not reset IVs
  • SKA support (untested)
  • displays session summary at exit; shows any cracked keys
  • all passwords saved to log.txt
  • built-in updater: "./wifite.py -upgrade" not automatic 
Note: this is for backtrack4

Hope you like it :)

Hello

I just started posting today, and hopefully I can get plenty of posts. I'm going to be writing a lot about current security flaws, and linking to a lot of other sites. hopefully I can help others out.