Showing posts with label Security Flaw. Show all posts
Showing posts with label Security Flaw. Show all posts

Saturday, December 3, 2011

XSS vulnerability in Babylon search



Recently I installed a software which changed my default search of firefox to Babylon search. It is a popular search engine and ranks high in alexa. The search engine can be reached at http://search.babylon.com/home

The search engine is vulnerable to a perticular type of XSS attack. Since no one has ever reported about a vulnerability in this search engine so I can take the credit

The search engine can be XSSed by first adding a normal string at the beginning and then add the script. Since the search engine has implemented XSS filtering so it can be bypassed by crafting a different vector.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZFicSMvqeLQxFj4h9npSUMrGh2-P1QtNkgzWqAONITQCcdKi7M7nQsKBc2VOKofOvVjqxnrCUmfuxJ4fr-AVd4909bOUkLE3keKOMyzyzolTTdcI87xTNJQW985sVj3-Lu04urT-M08E/s400/xss.PNG


Notice the search term that I have used here. On executing the script, an alert box will be displayed notifying the successful execution of script.
Here is the complete vulnerable url :

http://search.babylon.com/?q=helloworld%3Cscript%3Ealert%28%27hackingalert%27%29%3B%3C%2Fscript%3Ehelloworld&babsrc=home&s=web&as=0&t=0

Sunday, October 23, 2011

Smart Cover security flaw for any iPad 2 using iOS5


First Siri starts doling out personal info when your phone is locked, now comes an even bigger security oversight in iOS5 for iPad 2 owners.
Anyone with a Smart Cover can get into your iPad 2, reports 9to5Mac, even if you've been careful and locked it with a password. That sound you hear is a thousand Apple programmers facepalming at once

Monday, October 10, 2011

Computer virus hits US drone station

Los Angeles: A stubborn computer virus has reportedly hit the US Nevada control station that remotely pilot US military drone aircraft on missions in Afghanistan and other war zones, Xinhua reported. The virus has infected the cockpits of American Predator and Reaper drones, logging pilots' every keystroke.
According to Wired magazine, the virus, first detected about two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. However, the virus has proven very difficult to eradicate. "We keep wiping it off, and it keeps coming back," <>iWired quoted a source as saying. "We think it's benign. But we just don't know."
The virus has infected both classified and unclassified machines at the base, but it was reported that no classified information has been lost or transmitted outside, the report said Friday. The US uses the unmanned aircraft to conduct surveillance and carry out strikes on enemy targets. They are used particularly in remote and mountainous areas of Afghanistan, Pakistan and Yemen. The affected US drones used to kill Anwar al-Awlaki and other Al Qaeda chiefs.
In 2009, US forces discovered drone footage on the laptops of Iraqi insurgents, Wired said. The incident has again sounded an alarm on US military network security.

Friday, October 7, 2011

Stanford computer scientists find Internet security flaw

Stanford researchers have found an audible security weakness on the Internet.

If you've ever registered for online access to a website, it's likely you were required as part of the process to correctly read a group of distorted letters and numbers on the screen.

That's a simple test to prove you're a human, not a computer program with malicious intent.

Though computers are good at filling out forms, they struggle to decipher these wavy images crisscrossed with lines, known as captchas (short for Completely Automated Public Turing test to tell Computers and Humans Apart).

Saturday, October 1, 2011

Hidden dangers of Facebook

Over the last few years, Facebook's growth has been phenomenal. The world's no. 1 social networking site also sometime back beat Google to become the most visited Web site in the US for an entire week at a stretch. However, the site has also lately being receiving lot of flak for its privacy policies.
An expert in online privacy drew attention to the five dangers of sharing information on social networking site Facebook. Joan Goodchild, senior editor of CSO (Chief Security Officer) Online, said that marketing efforts by the company often results in a compromise on account holders' privacy.
Goodchild noted five risks of using Facebook. They are:
1. According to Facebook policy last updated on April 2010, "When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends' names, profile pictures, gender, user IDs, connections, and any content shared using the Everyone privacy setting. ... The default privacy setting for certain types of information you post on Facebook is set to "everyone." ... Because it takes two to connect, your privacy settings only control who can see the connection on your profile page. If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection."
2. In March, private e-mail according to a Gawker report, private email addresses that many Facebook users wanted to keep hidden were revealed publicly on a multitude of Facebook profiles. The glitch was later resolved by Facebook.
3. Recently, a Facebook event invitation was reportedly sent to some over 2,300 friends of Jim Breyer, Accel Partners venture capitalist who sits on Facebook's board of directors, asking "Would you like a Facebook phone number?" However, the message was actually a scam and the users who entered their passwords in response to the message in turn sent the whole thing to their friends lists too.
"This was a phishing scam and Jim's account appears to have been compromised," read a statement from Facebook as provided to venture industry news site PEHub.
4. On May 6th, the popular social network patched a major security bug that allowed users to snoop on their friends' private chats, and view their pending friend requests. The exploit forced Facebook to temporarily disable chat.
5. Earlier this week, 15 privacy and consumer protection organizations filed a complaint with the Federal Trade Commission, alleging that the site manipulates privacy settings to make users' personal information available for commercial use.

See, what hackers eyeing now

Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. But what about the rest of us, who might not have particularly salacious photos or voice messages stored in our phones, but nonetheless have e-mails , credit card numbers and records of our locations?

Thursday, September 29, 2011

For hackers, mobile security is the next lock to pick as McAfee, Symantec, Sophos and AVG gear up to provide solutions

Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. But what about the rest of us, who might not have particularly salacious photos or voice messages stored in our phones, but nonetheless have e-mails, credit card numbers and records of our locations?

A growing number of companies, including start-ups and big names in computer security like McAfee,Symantec, Sophos and AVG, see a business opportunity in mobile security - protecting cellphones from hacks and malware that could read text messages, store location information or add charges directly to mobile phone bills. 

On Tuesday, McAfee introduced a service for consumers to protect their smartphones, tablets and computers at once, and last week the company introduced a mobile security system for businesses. Last month, AT&T partnered with Juniper Networks to build mobile security apps for consumers and businesses. The Defense Department has called for companies and universities to come up with ways to protect Android devices from malware. 

In an indication of investor interest, one start-up, Lookout, last week raised $40 million from venture capital firms, including Andreessen Horowitz, bringing its total to $76.5 million. The company makes an app that scans other apps that people download to their phones, looking for malware and viruses. It automatically tracks 700,000 mobile apps and updates Lookout whenever it finds a threat. 

Still, in some ways, it's an industry ahead of its time. Experts in mobile security agree that mobile hackers are not yet much of a threat. But that is poised to change quickly, they say, especially as people increasingly use their phones to exchange money, by mobile shopping or using digital wallets like Google Wallet. 

"Unlike PCs, the chance of running into something in the wild for your phone is quite low," said Charlie Miller, a researcher at Accuvant, a security consulting company, and a hacker who has revealed weaknesses in iPhones. "That's partly because it's more secure but mostly because the bad guys haven't gotten around to it yet. But the bad guys are going to slowly follow the money." 

Most consumers, though they protect their computers, are unaware that they need to secure their phones, he said, "but the smartphones people have are computers, and the same thing that can happen on your computer can happen on your phone." 

Cellphone users are more likely than computer users to click on dangerous links or download sketchy apps because they are often distracted, experts say. Phones can be more vulnerable because they connect to wireless networks at the gym or the coffee shop, and hackers can surreptitiously charge consumers for a purchase. 

There have already been harmful attacks, most of which have originated in China, said John Hering, co-founder and chief executive of Lookout. For example, this year, the Android market was hit by malware called DroidDream. Hackers pirated 80 apps, added malicious code and tricked users into downloading them. Google said 260,000 devices were attacked.

Wednesday, September 28, 2011

Hacker Finds Quora-like Q&A Features in Google Plus Code

A curious hacker named Matt Mastracci was diving into the Google Plus code yesterday, trying to turn on access to the new Circle-sharing feature, when he uncovered several new features apparently in the works. One, referred to in the source as 'Google Experts,' appears to be a Quora-like question and answer feature with the same posting, commenting and sharing features as regular Plus posts.
Mastracci also uncovered Google Voice integration, which will not require phone numbers; new photo browsing options including photos from Messenger; new, clearly labeled privacy presets and a feature like Facebook's wall, letting users post on each other's profile without showing up in others' streams.