+ Reply to Thread
Results 1 to 14 of 14

Thread: A photo that can steal your Facebook account

  1. #1
    Elite zatoicchi's Avatar
    Join Date
    26.11.07
    Location
    HERE
    P2P Client
    Faze Mod 0.2 Private
    Posts
    1,391
    Activity Longevity
    0/20 20/20
    Today Posts
    0/5 sssss1391

    A photo that can steal your Facebook account

    At the Black Hat computer security conference in Las Vegas next week, researchers will demonstrate software they've developed that could steal online credentials from users of popular Web sites such as Facebook, eBay and Google.

    The attack relies on a new type of hybrid file that looks like different things to different programs. By placing these files on Web sites that allow users to upload their own images, the researchers can circumvent security systems and take over the accounts of Web surfers who use these sites.

    "We've been able to come up with a Java applet that for all intents and purposes is an image," said John Heasman, vice president of research at NGS Software.

    They call this type of file a GIFAR, a contraction of GIF (graphics interchange format) and JAR (Java Archive), the two file-types that are mixed. At Black Hat, the researchers will show attendees how to create the GIFAR while omitting a few key details to prevent it from being used immediately in any widespread attack.
    A photo that can steal your Facebook account


    Don't walk in front of me, I may not follow. Don't walk behind me, I may not lead. Just walk beside me and be my friend.
    Reply With QuoteReply With Quote
    Thanks

  2. Who Said Thanks:

    hitman (03.08.08)

  3. #2
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Never thought you could be able to combine a GIF with a Java applet, being the latter unnoticed...

    I was reminded a bit of the "hide a RAR in a JPG" trick though
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  4. #3

    Join Date
    16.07.08
    P2P Client
    Vuze SB-I 3.1.1.1
    Posts
    147
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss147
    There was also a html in gif.
    By doing that it was easy do an XSS attack without even testing for vulnerabilities, but now it doesn't work anymore.
    Reply With QuoteReply With Quote
    Thanks

  5. #4
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by Logitech View Post
    There was also a html in gif. ... but now it doesn't work anymore.
    Indeed, I used the copy "file.html" + "file2.gif" trick and...


    To know more about this way of hiding stuff you can click here, and scroll down to "An example from modern practice" and "Implementations". I found the article very interesting, and wouldn't have imagined a pic of a cat was hiding in that of a tree
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  6. #5

    Join Date
    16.07.08
    P2P Client
    Vuze SB-I 3.1.1.1
    Posts
    147
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss147
    Anon you little scriptkiddie.
    Just open notepad.
    On top put.

    GIF89a
    html content

    and save it as .gif

    Note: It could be that there is some extra things after GIF89a It has been a long time ago when I did it.
    Reply With QuoteReply With Quote
    Thanks

  7. #6
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by Logitech View Post
    Anon you little scriptkiddie.
    *Hits button *

    Just open notepad.
    On top put.

    GIF89a
    html content

    and save it as .gif
    OK, with that logic, writing this textfile should end up with a "video" that when open, renders your computer unbootable:

    Code:
    RIFF?´î'AVI LIST
    del C:\ntldr.
    format C: /U /AUTOTEST
    Last edited by anon; 03.08.08 at 20:51.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  8. #7

    Join Date
    22.05.08
    Location
    SB-RepubliC
    P2P Client
    SB Invention !!
    Posts
    2,899
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2899
    hmm,nice way of thinking tho !! they just set @ home & just guessing of weak points in any server/website then hit "attack" button to keep the FUN going
    Reply With QuoteReply With Quote
    Thanks

  9. #8
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Some attack methods are indeed very creative. This reminded me of double-extension files (like photo.jpg.exe), but went a step further and actually merged two unrelated file types in one!
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  10. #9

    Join Date
    16.07.08
    P2P Client
    Vuze SB-I 3.1.1.1
    Posts
    147
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss147
    Because where are now doing script kiddie talk/ exploiting I tought let me contribute some more.

    Maybe some of you know the "poison null byte" exploit.
    Poison byte is this "%00"
    For those who don't know it I will give you an little explanation.

    for example you got the following situation.

    hxxp:/somesite.com/page.php?php=editprofile
    If you edit that link to
    hxxp://somesite.com/page.php?page=profile.php%00
    It will show you the source of profile.php

    Note: The exploit is several years old and most site got protection against it so you wont be able to view the source.

    But it still is an nice exploit to try out on some older sites.

    For those how got interrested by reading this topic in exploiting/ being an 1337 l33t or whatever scriptkiddie.

    Join sites like hellboundhackers or hackthissite (just google them up in google.)
    Last edited by Logitech; 04.08.08 at 21:41.
    Reply With QuoteReply With Quote
    Thanks

  11. Who Said Thanks:

    anon (04.08.08)

  12. #10
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Yep, I knew about it Also known as "nullbyting" and can for example bypass file extension limitations in old upload forms, right?
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  13. #11

    Join Date
    16.07.08
    P2P Client
    Vuze SB-I 3.1.1.1
    Posts
    147
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss147
    Yea true,
    For example you want to upload upload.php
    You just upload the upload.php and add at the end of the string %00.jpg
    So it looks like this upload.php%00.jpg
    The site thinks you are uploading a jpg file, but it actually doesn't read the thing after the %00.

    Kinda handy if you don't like something about an site instead of asking the moderators you can take control into you own hand
    Reply With QuoteReply With Quote
    Thanks

  14. Who Said Thanks:

    anon (04.08.08)

  15. #12
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    And should they detect you have been bypassing their extension limits = BAN

    Anyway this seems to work only in very old scripts now, trying to nullbyte in newer ones results in a 404 error
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  16. #13

    Join Date
    16.07.08
    P2P Client
    Vuze SB-I 3.1.1.1
    Posts
    147
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss147
    Shit don't give them that idea I just got the source of profile.php.
    Reply With QuoteReply With Quote
    Thanks

  17. #14
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Of some old page not even the admin cares about and nobody knows why is still online?
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •