Menu

Aug 31, 2009

Invasion of the botnets: Cyberattacks on the rise

For the past year, the cyber threat landscape has been dominated not by new vulnerabilities and exploits so much as by the sheer number of attacks against information technology systems and the growing professionalization of the bad guys behind them. 
--------------
“The sexiness of the threat has not increased,” said one industry observer who met with a multiagency task force on intrusion. “But the exposure in terms of the number of exploits is growing exponentially.”

The numbers are sobering.

“Malware is at the highest point we’ve ever seen it,” said Dave Marcus, director of security research at McAfee Avert Labs. “2008 was the biggest year so far. The first half of 2009 has eclipsed all of 2008,” with 8,000 new variants appearing each day. “It’s easier to create new malware than ever before.”

Symantec reports similar activity. The company created 1.6 million new threat signatures in 2008, or about one new signature every 20 seconds. It has created 2 million signatures in the first half of this year, or about one every eight seconds. 

 

SSH Tunneling in Firefox set up your SOCKS5 host to "localhost" and port "8080"

For those who may not already know, SSH is a very handy tool to, not only remotely connect to a server, but also forward traffic through it.

This may be useful for many reasons: bypass firewalls, create your own proxy-like connection, etc.

The requirements are to have (if you're Windows) PuTTY.exe and a server running the SSH Daemon with forwarding enabled (by default). If you're Linux you only need the server with the SSHD and forwarding.

Once you have downloaded your PuTTY.exe, open the command prompt and browse to the directory the executable resides in. Enter in this command:


putty -D 8080 -P 22 -ssh yourhost.com

Where it says -P 22, substitute it for your server's port and yourhost.com for your host URL (IPs are ok too).

"OK," you say, "I have this connection established... It looks like a normal SSH terminal." WRONG! It can now also accept forwarding of traffic on your machine's local port 8080. This can be used for anything, even other ssh connections! For example, in Firefox set up your SOCKS5 host to "localhost" and port "8080", this will tunnel the traffic through your SSH connection... encrypted.. Allowing many useful things



Simple. Brief. And hopefully useful. 


Secure : 
http://suso.org







Get Terminal from Shell in Windows using Metasploit


/* IT Security ® 
Pesents : 
[VIDEO] How to get Terminal from Shell in Windows using metasploit

*/
------------------------------
# Author : 7h3-bi0w0rm
# web : www.security-sh3ll.com
# greetZ : Pentest,sp1r1t,Xylitol & all Security-Shell Members
------------------------------
i use :
Exploit : windows/smb/ms08_067_netapi
Payload : windows/shell/bind_tcp
------------
victim pc :
Microsoft Windows XP [ Version 5.1.2600 ]
------------
the paper you can fund in www.security-sh3ll.com just regsiter & search
-----------------
hello all i makead e vid tutorial based in this paper =D
ok lets start :D
--------------------
first we enable telnet & create a tln user
done !
-----------------------
now we use set opmode mode = DISABLE exceptions = ENABLE to disable firewall
and to allow incoming exeptions
------
now enable RDP done !!ok bey :D