Every thing can be Hacked . If we are Noops

Every thing can be Hacked . If we are Noops
Powered by Blogger.

Latest Updates

Saturday, October 22, 2016

How To protect your Website From DDoS Attack

Posted By: Lawrence Amer - 8:06 AM

according to last attack on many big sites and manufactured , especially DDOS Attack on @Dyn which is the most stable with full security against these types of attacks .

today i will write some tips to how secure your sites with following tips :

1. Stop SYN flood attacks

nano /etc/sysctl.conf
and add the following line:

net.ipv4.tcp_syncookies = 1
After that save the file and either reboot your server or issue the following command to apply the changes:
sysctl -p
When you have the SYN Cookies enabled, you may see the following in your messages log (tail -f /var/log/messages):
“possible SYN flooding on port 80. Sending cookies”

2. Protect Your Wordpress against Pingback  

million of sites running wordpress which is vulnerable to this type of DDOS attack . by default pingback feature is enabled in wordpress site.which allow anyone to initiate request from website based wordpress to any other site. which affects badly on it
in order to stop this type , you should disable wordpress user agent from visiting your site .

all you do is some lines on .htaccess file .

BrowserMatchNoCase WordPress bad_bot
Order Deny,Allow
Deny from env=bad_bot

3.Stop HTTP Flood DDoS attack . 

while your site have alot of visitors . attackers can cause harm by send alot of http flood requests
using many tools which is available on internet . these causing some limitation if you are on VPS or sharehosting package .
to stop this attack all you do is using vanish or other cashing service . but my advise is
to use Nginx as webserver . or hiawatha web server .

4. if you are using cpanle with nginxcp  

this plugin allow you to use customized nginx modules with your apache and works together
to high performance . all you can do is install it via command line . but before you install it . make sure to enable cluster in your whm .

cd /usr/local/src
wget http://nginxcp.com/latest/nginxadmin.tar
tar xf nginxadmin.tar
cd publicnginx
./nginxinstaller install

it is only compatible with easy apache 3

5. use Load balancer with high traffic sites . 

since in sometimes it is hard for service to distinguish between ddos in high traffic sites ,
It is wise to prepare for traffic spike using a load balancer like HAproxy which will allow you to add more servers in case of a traffic spike.

Haproxy Link

Haproxy is a free tool which can also be used to counter some DDoS attacks like Syn Flood.

6. Capture and inspection

this type is done by security support team on any hosting provider . allows them to inspect packets on the network using tcpdump tool .in order to capture all packets coming to your network interface and then inspecting the captured packets for potential patterns

7. always use servers with KVM 

this feature allows you to manage sites which is under DDOS attack , and help you to resolve any 
issue using this Remote console feature . 


Thursday, September 29, 2016

tiny shell backdoor | connect over protocol

Posted By: Lawrence Amer - 12:03 PM

since many pentesters needs some php shells to do some testing on servers and so one ,
they go and use some old types of these .

in this topic , we will discuss how could i make this mission is simple with small size backdoor
and besides doesn't need Netcat for making a reverse connection . because every thing
is done through the terminal using httplib version 2 in python .

so no need for browser to execute commands

Features : 

1. Direct commands using requests
2. small size tiny php shell.
3. protected by password .

upcoming features : 

1. support encoding base 64
2. Generate tiny php with one click
3. bypassing some functions to do it .

ask via email for download link

Sunday, July 31, 2016

Europ CERT- Hall of Fame

Posted By: Lawrence Amer - 4:45 AM

Since Eurpo CERT has Released a Hall of Fame program to handle reported issue by Security Researchers.
 Lawrence Amer has reported Cross Site scripting Vulnerability into Europ CERT Security Team . and got Confirmation Response via email with name included in
Hall of Fame .

after confirming A fix , A vulnerability Description  is Disclosed via Security Researcher Official Site
to discuss it .

Vulnerability Description :

The security issue allows remote attackers to inject own malicious script codes to the application-side of the vulnerable service module. 
the vulnerability is located in the module "/scripts/wa-enisa.exe" in the affected domain "lists.enisa.europa.eu" . the vulnerable parameter is "A0" allow remote attacker to execute xss payload through the vulnerable parameter 

Vulnerable Request 
[+] GET 

Vulnerable module 
vulnerable parameter 
[+] A0 

proof of concept : 

attacker are able to successfully produce the issue by using the following url : 

Vulnerability State : Patched 

Monday, April 25, 2016

Microsoft MSDN CSRF Vulnerability

Posted By: Lawrence Amer - 2:40 PM

Remote attackers are able to perform a cross site request forgery on MSDN users to force them
to do unwanted action.

the vulnerability is located in the module for personal user information . allowing hackers to do reset email address .lead to comprise MSDN Account .

Microsoft Development Team push a Fix for this issue . and my name as Lawrence Amer will be Added to April 2016 Hall of Fame

video POC is listed below :

Wednesday, March 23, 2016

Yahoo Sender Email spoofing Vulnerability by Lawrence Amer

Posted By: Lawrence Amer - 3:35 AM

Product & Service Introduction:
Yahoo Inc. (styled as Yahoo!) is an American multinational technology company headquartered in Sunnyvale, California. It is globally known 
for its Web portal, search engine Yahoo! Search, and related services, including Yahoo! Directory, Yahoo! Mail, Yahoo! News, Yahoo! Finance, 
Yahoo! Groups, Yahoo! Answers, advertising, online mapping, video sharing, fantasy sports and its social media website. It is one of the most 
popular sites in the United States.[9] According to third-party web analytics providers, Alexa and SimilarWeb, Yahoo! is the highest-read news 
and media website, with over 7 billion readers per month, being the fourth most visited website globally, as of June 2015.[8][10][11] According 
to news sources, roughly 700 million people visit Yahoo websites every month. Yahoo itself claims it attracts "more than half a billion consumers 
every month in more than 30 languages. Yahoo was founded by Jerry Yang and David Filo in January 1994 and was incorporated on March 1, 1995. Marissa 
Mayer, a former Google executive, serves as CEO and President of the company.

(Copy of the Homepage: https://en.wikipedia.org/wiki/Yahoo! )

About founder : 

Lawrence Amer is Syrian Ethical Hacker . known for helping many companies across cyberspace 
to secure their online services . to ensure closing every vulnerability Disclosed by Him 

for more information about the vulnerability 

Video POC : 

Monday, February 1, 2016

AOL Vulnerability | Lawrence Amer

Posted By: Lawrence Amer - 12:01 PM

Abstract information
Discoverd and reported by Lawrence Amer


Technical Description

Remote attackers are able to bypass the verification process of signup functionality at AOl registration page .
considered as a security flow described the affected parameter [human verification by replacing it with blankfield .
ffurthermore the current module [reg/signup] is submitted over [POST Request] without a current CSRF token to prevent the damage
of Cross site request frogery

Affected module

[+] [reg/signup]
[+] Domain : i.aol.com

proof of concept :

1. attacker user POST request

POST /reg/signup HTTP /1.1
HOST : i.aol.com

------- -------
parameters : firstname + lastname + security question + username + password + birth +gender + zip+av=[Expired one works fine ]

statue :

disclosed :

follow me :

Friday, December 18, 2015

Hauwei Vulnerability | Lawrence Amer

Posted By: Lawrence Amer - 5:22 PM

wiki :

Huawei Technologies Co. Ltd. (/ˈhwɑːˌw/) is a Chinese multinational networking and telecommunications equipment and services company headquartered in ShenzhenGuangdong.[3] It is the largest telecommunications equipment manufacturer in the world, having overtaken Ericsson in 2012.[4]
Huawei was founded in 1987 by Ren Zhengfei, a former engineer in the People's Liberation Army. At the time of its establishment Huawei was focused on manufacturing phone switches, but has since expanded its business to include building telecommunications networks; providing operational and consulting services and equipment to enterprises inside and outside of China; and manufacturing communications devices for the consumer market.[5][6] Huawei has over 170,000 employees as of September 2015, around 76,000 of whom are engaged in research and development (R&D).[7][8] It has 21 R&D institutes in countries including China, the United States,[9] Canada,[10] the United Kingdom,[11] PakistanFranceBelgiumGermany,ColombiaSwedenIrelandIndiaRussia, and Turkey,[12][13] and in 2013 invested US$5 billion in R&D,[14] increased to $6.4bn in 2014.
In 2014, Huawei recorded profit of 34.2 billion CNY (5.5 billion USD).[15] Its products and services have been deployed in more than 140 countries and it currently serves 45 of the world's 50 largest telecoms operators.[16]

Description of Exploit : 
Attacker is able to inject a malicious code in the parameters of registration page . so the user of email registered in Site of Hauwei got an infect Email of redirection . 

Discovered by : Lawrence Amer 


Copyright © Lawrence Amer | Ethical Hacker ™ is a registered trademark.

Designed by Templateism. Hosted on Blogger Platform.