latest articles

Facebook Open Redirect and Reflected XSS Vulnerability

Facebook Open Redirect and Reflected XSS vulnerability in one shot, pretty cool isn't it?



Vulnerability was in Mobile site i.e m.facebook.com, haven't checked on mobile application. And one more thing i don't have xss snapshot but I'll share that vector in this post.

Okay Open Redirect vulnerability was in mobile "Page Manager Application" download link. 

Vulnerable link: https://m.facebook.com/pages/pages_manager_app_link/?page_id=462697283768657&app_store_url=

All we have do is to manipulate the app_store_url parameter with malicious link. But that's not it, it was more than open redirect vulnerability. While redirecting, Facebook will tell the user that "Redirecting to Pages Manager App.."



So to better exploit this vulnerability all attacker have to do is to code malicious Pages Manager App and make the victim to use that malicious application and then Bingo! Account Compromised!


Now lets come to the Reflected XSS vulnerability, the same parameter was vulnerable to xss but unfortunately I don't have snapshot of that. Vector was javascript:alert(1)) 


So now you may be wanted to how know much Facebook Rewarded me for these two vulnerabilities? 

Well they rewarded me 15K USD. Usually they reward 5K usd for xss and 1-1.5K USD for open redirect but I guess they rewarded me 15K USD Because I was able to bypass Facebook Linkism.

Open Redirect POC:




Reward



Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Facebook Application Or Spam?

Recently I have been seeing and getting tons of notification of "Find Who Will Be Your Valentine In 2014 @ xyz.com" on Facebook. Its look something like this:

Find Who Will Be Your Valentine In 2014 @ ==>

Well this is nothing more than a shitty spam and it will post on group you joined, your wall and friend's wall without your acknowledgement. These types of application may lead to account compromise. So better have an eye on what you giving permissions to these 3rd party application. 

How to prevent From these types of application?

  •  First of all, always have an eye on what permission you giving to that particular application and only give it if you trust that application. Some trusted Facebook applications are Twitter, Intel and many more. 

Note: Application having name like "Microsoft" doesn't always means that the application belongs to Microsoft. Like this one 
Find Who Will Be Your Valentine In 2014 @ xyz.com


  • Always click on "Skip" button, when it asks for "Post on you behalf" until and unless its a trusted Facebook application.

So what I do now? I already given permission!

Don't panic, just go under account section and then App Tab from there remove that application. 

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Google's Open Redirect Vulnerability

What I have done is that, that I redirected accounts.google.com to sites.google.com/sites/malicious-site/home/. Which was my own created site, and there I added a "redirect" code to www.computerkorner.org site.

An attacker can use this vulnerability to redirect the victim any malicious site. This could lead to account compromise.

PS: Always have a eye on your address bar for prevention :P

POC: 


Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

DNS Leaking and Prevention Paper

 If u are using proxy or vpn for hacking, u think that u are 100% anonymous, right? But u might be wrong.

What is Dns leak?
Ans) When you visit a site even using proxy/vpn you may give info about your dns provided by your ISP to that site.
And they will be one step ahead to trace u.

*** You can check whether you are leaking your dns info or not at www.dnsleaktest.com

Now you may think that, this is no big deal. Because u can change dns address manually, so no one would be able to
see your activity.
Here comes another story of the "Transparent Dns Proxy".

What is transparent dns proxy?
Ans) This is also a kind of dns servers provided by your ISP(not all ISP). When u change your dns address manually your
dns requests goes to and resolved by your desired dns server, but these requests goes through those dns server set
by your ISP (which sits between your pc and your desired dns server), and keep all logs of yourrequests.

Please note: I dont know about other ISPs. but I am confirmed about BSNL.

*** To check whether your ISP has transparent dns proxy or not, at first check your dns server's ip @ www.dnsleaktest.com.
Then change ur dns address to some other like 8.8.8.8 or 8.8.4.4 (googles dns). After this change use 'tracert' or
'traceroute' command to trace node's ip between your pc and your  desired site.
for example:
c:\>tracroute www.google.com
 If you find address of your ISPs dns or the network part of that ip, your ISP is using transparent dns proxy, to log your request.

 Solution:
 1) if you are using proxy chains configure to use with tor.
 Here is how https://www.youtube.com/watch?v=d91w9D1FPIk

 Or configure it to resolve dns requests by your proxys.
 Here is how http://proxychains.sourceforge.net/howto.html

 2) Use dnscrypt (freely available) to make an encrypted channel (from your pc to Opendns or any other dnscrypt enabled dns)
 so your all dns requests are encrypted and resolved only by opendns or that you have set to use.
 *You can use it with proxy/vpn but if your vpn is not leaking info. You don't have to worry.

 Here is how to install in ubuntu http://askubuntu.com/questions/330589/how-to-compile-and-install-dnscrypt



-Written by Chris Angel!

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Setting Backdoor in Windows | Command Prompt On Logon Screen




 Lets assume that you have just cracked victim's windows password. or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?





Simply Can we set a backdoor in windows ?
Yes we can .

Backdoor actually means maintaining access.

Okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

Type the following command :

Syntax : net user account.name *
Example: net user administrator *
and hit enter. Set any password for that account.

Hopefully your new password must have been set. did you notice one thing ? It didn't ask you to confirm old password. Now suppose if anyhow we manage to access command prompt at logon screen (without logging in), we can easily change/clear password.

Okay lets move on.

Now press shift key five times and you must have got a dialog box "sticky keys" on screen.

Sticky keys is a feature that makes it easy for users who have physical disabilities to press multiple keys at time. This is the only feature which can be used before logging in at logon screen ( as per my knowledge). I repeat this feature can be used at logon screen by pressing shift key five times.

Whenever we start an application like paint, we are actually running mspaint.exe placed in C:\windows\system32. or command prompt, we are running cmd.exe placed in system32 directory, similary

When we press shift key 5 times or use sticky keys feature, system actually starts the executable file sethc.exe placed in system32 directory.

This means if we rename cmd.exe to sethc.exe and press shift 5 times, system would again start sethc.exe but instead of sticky keys the command prompt will be opened.

Article Written By Nishanth

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!

Read more

CyberROAM Auto Connector


A small Python Program for Windows users to auto login into CyberROAM network.
Coded By: Subir Sutradhar
This is coded for my personal use, in my work place, as i had to Login to network, every now and then, so this will spare me from that task of manually login in everytime it disconnects. This might be helpful for other system administrators or network administrators, hence sharing it.



Note: Antivirus may warn as suspicious process.. Do not download if you have doubts.
Online Scan Result : Click Here

Download Link :
Click Here

Usage Steps:

1. Enter the username
2. Enter The password
3. Enter The Login URL
This can remember the credentials for using next time
Next, you will get the shell prompt, just type "connect" and minimize the window

To disconnect press CTRL+C, and to close type "exit"

Note: if you choose to remember the credentials, and later if you want to change the settings, at the shell prompt type, flush, and restart the application.
Download Link : Click Here

Comment Below, for Any Bugs
Feel Free To Leave A Comment
If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Site to Site VPN in Router over Internet Configuration

Site to Site VPN in Router over Internet
Site to Site VPN in Router over Internet Paper

Paper by Karan Puri.

Donload Link :- Click Here



Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Computer Korner Application blocker



Description:-   It will Block Any Application from running and take care of it as long as u want.

How to use:-  
  • Run cmd with admin privilages.
  • Go where the app is downloaded
  • And type : ckab.exe -a <process name>.exe

Download Link: Click here

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more