Search



Categories

News

Videos

Underground

Vblogs

Hacking Challenges

Underground – VMWare

December 14th, 2008 by Patchy
In this Underground video Awali, explains how to manually create Virtual Machines that can be used by the free VMWare Player. Also, Awali explains some of VMWare’s basic functions and features. In the past year, VMWare has make VMWare Server free for personal use; therefore, you no longer need to manually create the .VMX Virtual Machine file. However, it is still usefully to know how VMWare works and to understand how the .VMX file is structured so that you can troubleshoot and fixes problems when they occur. Full Scale Video Here
Download Here

VMWare Server
VMWare Player
Awali’s VMX File

If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com

Posted in Underground | 6 Comments

Episode 23 – Cracking WEP Update

December 10th, 2008 by Patchy
In this episode of Full Disclosure, Nox and I describe four improved methods of cracking WEP encryption: the ARP Request Replay Attack, Fragmentation Attack, Caffe Latte Attack, and Hirte Attack. The ARP Request Replay Attack and the Fragmentation Attack are known as clientless attacks because they do not require a client to be connected to the wireless AP. To initiate the attack, these two attacks only require one data packet. The Caffe Latte Attack and the Hirte Attack are client-based attacks because they specifically target clients to increase the IVs. Also, we show an improved method of cracking the IVs called the PTW cracking method. With the PTW method, WEP encryption can be cracked 80% of the time with only 60,000 IVs. For more information on the insecurities of WEP encryption watch Episode 2.

Live Stream Here
Download Here

Posted in Videos | 3 Comments

Underground – Fix Google Mail Enumerator

December 4th, 2008 by Patchy
In Backtrack 3 there is a Python script, goog-mail.py, which enumerates email addresses of a specific domain name through Google.  However, since the program has been released, Google has modified the way results are displayed.  In this Underground video, Overide explains how to fix the Python script, so that email addresses can be harvested.  Also, he explains the process that he took to find the source of the error. Full Scale Video Here
Download Here

If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com

Posted in Underground | No Comments

Underground – Home Made Lock Picks

November 22nd, 2008 by Patchy
In this Underground video, Crash explains how to make some very simple lock picks utilizing house hold items. He shows how to convert a bobby pin into a short hook pick, and a paper clip or pen clip into a tension wrench. Check out Crash’s YouTube page to watch him pick locks with his home made lock picks. Full Scale Video Here
Download Here

If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com

Posted in Underground | No Comments

Installing Backtrack 3

November 14th, 2008 by Patchy
In this Vblog, I explain how to manually install Backtrack 3 to your hard drive. This demonstration assumes that you have a single blank hard drive, and you want to install BT3 to the entire drive. Any data stored on the hard drive will be overwritten, so backup any files you want to keep! Unlike most tutorials on install BT3, I explain each command and its purpose, so that way you can learn a little about the Linux OS. Hope you enjoy the video! Full Scale Video Here
Download Here

Posted in Vblog | 1 Comment

Underground – Downfalls of Anti-Virus Software Part 2

November 7th, 2008 by Patchy
In the second part of Overide’s Underground Video, he explains how to encode an executable so that it is not detected by most Anti-Virus Software. Overide expands the NetCat executable to allow him to add a few extra lines of code which will encode/decode the program. He encodes the executable by XORing (Exclusive OR) each instruction with a specific value. Once encoded, NetCat’s Assembly code does not make any sense; therefore, it is difficult for Anti-Virus Software to identify the executable as a threat. Whenever the encoded NetCat program is executed, the Instructions are first decoded with the exact same code that Overide used to encode the program. This is possible because when you XOR data with a specific value, you can retrieve the original data by XORing the encode data with the same value. After the Instructions are decoded NetCat will run normally. Full Scale Video Here
Download Here

NetCat
LordPE
OllyDbg

If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com

Posted in Underground | 2 Comments

Happy Halloween!

October 31st, 2008 by Patchy
Tux Jack-O-Lantern!
Now obviously the Tux pumpkin that my girlfriend and I made wasn’t scary; however, what we witness in line at Jewel when we were buying the pumpkins was horrifying … Dun Dun Dun … The Blue Screen of Death!!

Posted in News | 2 Comments

Underground – Downfalls of Anti-Virus Software

October 29th, 2008 by Patchy
In this Underground video, Overide explains a major downfall of many Anti-Virus Software. Anti-Virus Software detects viruses by searching an executable program for specific signatures; signatures basically are a string of code that the Anti-Virus Software considers malicious. Overide describes how to locate this signature, and how to manipulate the executable’s assembly code so that the Anti-Virus Software does not flag the executable as a virus. In this video, Overide modifies the NetCat signature by changing NOP (No Operation) instructions to INT3 (software interrupt used by debuggers) instructions. For those of you that don’t know, Netcat is a networking utility which reads and writes data across network connections, using the TCP/IP protocol. Anti-Virus software flags NetCat as a virus because it can be used to open a backdoor on a computer. Full Scale Video Here
Download Here

NetCat

If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com

Posted in Underground | 3 Comments

DNS Spoofing with Virtual Hosts

October 24th, 2008 by Patchy
DNS Spoofing is an attack where a person forges fake DNS Responds to trick a victim computer into accessing a different website. Whenever you visit a website such as www.infinityexists.com the domain name is translated to the IP address of the web server. To do this your computer makes a DNS request to a DNS Server, and the server returns a DNS Respond which contains the IP address of the web server. Therefore, during a DNS Spoofing attack the victim computer receives an Spoofed IP address and attempts to connect to that web server. However, often times a web server hosts multiple website by utilizing Virtual Hosting. Virtual hosting is a method that allows a web server to host more than one domain name on the same computer and the same IP address. If an Attacker wants to DNS Spoof a website which is a virtual host on a web server the IP address is not sufficient information for the web server to determine which website the victim computer wants to access. Therefore, the DNS Spoofing attack will not work correct. The way a web server determines which website a person wants to access is with the Host Header contained in the Get Request. Consequently, an Attack needs to modify the victim’s Get Request to have the correct Host Header before it reach the web server. To do this I combined an Ettercap Filter that will Log and Drop the Get Requests from the victim, and a C program which will change the Host Header. After the Host Header is modified, the Ettercap Filter submits the new Get Request to the web server. This process will allow an attacker to perform DNS Spoofing attack with a Virtual Host. [Watch the video it will make more sense =D]. Full Scale Video Here
Download Here

Download Host.filter
Download Change_Host.c

Posted in Vblog | 1 Comment

Underground – Evilgrade

October 20th, 2008 by Patchy
Copy and Spitfire of LCN_Crew explain how to use Evilgrade in this Infinity Exists Underground Video. Evilgrade is a modular framework that allows an attacker to take advantage of poorly implemented software upgrades. An attacker can use Evilgrade in combination with DNS spoofing or a MITM attack to spoof a software update and trick the victim computer into executing arbitrary code such as a Metasploit’s Payload. Currently, the Evilgrade framework supports the following software: Java plugin, Winzip, Winamp, MacOS, OpenOffices, iTunes, Linkedin Toolbar, Download Accelerator, notepad++, and speedbit. In this video, Copy and Spitfire illustrate how to use Evilgrade with a DNS Spoofing attack to execute a reverse shell on a target computer. Full Scale Video Here
Download Here

infobyte
Download Evilgrade

If you would like to submit a video to Infinity Exists Underground send a email describing your video to underground@infinityexists.com

Posted in Underground | No Comments

<< Previous Entries Next Entries >>