«
Expand/Collapse
173 items tagged "email"
Related tags:
third party [+],
drupal [+],
cross site scripting [+],
zero day [+],
wordpress [+],
scanner [+],
lotus [+],
field [+],
facebook [+],
sql [+],
password [+],
marketer [+],
interspire [+],
hacks [+],
buffer overflow [+],
address [+],
site [+],
php email [+],
php [+],
pass [+],
mimedefang [+],
mime message [+],
mime email [+],
mail processing [+],
information disclosure vulnerability [+],
emailarchitect [+],
email attachment [+],
vulnerability [+],
version 6 [+],
vendors [+],
username [+],
tripwire [+],
system integrity checker [+],
sophos [+],
site5 [+],
server version [+],
server [+],
secure [+],
printer [+],
multiple [+],
list [+],
hash [+],
hacked [+],
enterprise [+],
email spoofing [+],
email address [+],
domain name [+],
barracuda [+],
address maps [+],
xss [+],
wifi [+],
webmail v3 [+],
webmail [+],
vulnerabilities [+],
virus scanners [+],
valid email address [+],
user [+],
united states [+],
uebimiau webmail [+],
uebimiau [+],
txt [+],
toy [+],
tgz [+],
technical cyber security alert [+],
system [+],
sql injection [+],
security advisory [+],
qmail [+],
protection functions [+],
proof of concept [+],
phishing scams [+],
pdf [+],
passwords [+],
palin [+],
name [+],
misc [+],
malware [+],
liferay [+],
integrity [+],
html email [+],
html [+],
europe [+],
email server [+],
email password [+],
email addresses [+],
disclosure [+],
day [+],
cybsec [+],
cyber security alert [+],
creator [+],
com [+],
china [+],
broadcast email [+],
broadcast [+],
blunder [+],
big [+],
ascii string [+],
arbitrary code [+],
antispam [+],
anti virus protection [+],
activity [+],
activecampaign [+],
security appliance [+],
your [+],
xeams [+],
wpa [+],
worm [+],
wierd [+],
west coast labs [+],
west coast [+],
website [+],
webapps [+],
web campaign [+],
web based email [+],
voting [+],
virtual switchboard [+],
usa [+],
upload [+],
undead [+],
twitter [+],
trojan [+],
transformers [+],
tom [+],
tis [+],
ticketweb [+],
threewp [+],
thomas akin [+],
testifies [+],
t mobile [+],
symantec [+],
surveillance camera [+],
surveilance [+],
subject field [+],
struggle [+],
stoke [+],
sql query [+],
spreading [+],
sorter [+],
slurped [+],
slip [+],
simon says [+],
shock [+],
server appliance [+],
separator [+],
sensor readings [+],
sensitive [+],
scheme [+],
scammer [+],
same rights [+],
sachs [+],
russia [+],
rudolph [+],
romney [+],
richard [+],
reg in [+],
reflector [+],
recruit ireland [+],
recruit [+],
reading machine [+],
read [+],
rce [+],
privat [+],
postal mail [+],
postal [+],
police [+],
plz [+],
plugs [+],
plugin [+],
piwigo [+],
picture [+],
phishing [+],
persistent web [+],
perfect sound [+],
pdf versions [+],
paper shredder [+],
paper [+],
pa [+],
outgoing mail [+],
otrs [+],
one million [+],
notification [+],
nick mcclanahan [+],
nice [+],
newsletter [+],
newscoop [+],
news [+],
new project [+],
new mail [+],
mybb [+],
murdoch email [+],
murdoch [+],
muppet [+],
multiple buffer overflow [+],
multi [+],
misdirected [+],
million [+],
marketing software [+],
manpower [+],
man [+],
mail flag [+],
mail [+],
magazine group [+],
lulzsec [+],
loopp [+],
logger [+],
link [+],
limny [+],
leaks [+],
knut [+],
kickstarter [+],
k over [+],
jury [+],
jay [+],
ireland [+],
input validation [+],
information disclosure [+],
information [+],
india [+],
incoming email [+],
image upload [+],
image [+],
ids [+],
hotmail [+],
hornswoggled [+],
hijacks [+],
heydays [+],
header email [+],
header [+],
hamas [+],
hackers [+],
hacker [+],
hack [+],
group test [+],
gov [+],
goldman sachs [+],
goldman [+],
goatee beard [+],
gnu emacs [+],
gnu [+],
gets [+],
gerix [+],
fresh [+],
free email list [+],
forensics [+],
flag [+],
fined [+],
file upload [+],
fights [+],
felony [+],
farm toy [+],
farm [+],
fancy shmancy [+],
extractor [+],
exposes [+],
exploits [+],
evuln [+],
email passwords [+],
email newsletter [+],
email access [+],
emacs [+],
electromagnet [+],
dump [+],
dubai [+],
dropbox [+],
details [+],
denies [+],
deathstar [+],
death threats [+],
data logger [+],
data [+],
darknet [+],
darkc [+],
cybercrims [+],
cybercop [+],
creation vulnerability [+],
country [+],
council data [+],
council [+],
coughs [+],
control panel [+],
collect [+],
click [+],
christmas spirit [+],
chinese hackers [+],
chinese [+],
change [+],
campaign [+],
buffer overflow vulnerabilities [+],
bristol [+],
botnets [+],
body field [+],
blackberry [+],
black hat [+],
big rise [+],
bell [+],
basil [+],
audible notification [+],
attiny2313 [+],
atmail [+],
assassins [+],
arduino [+],
aquariums [+],
apple ipad [+],
anonymous [+],
anna kournikova [+],
amp [+],
airmen [+],
addresses section [+],
addresses [+],
acc [+],
Release [+],
Pentesting [+],
Idiots [+],
General [+],
Corner [+],
15 minutes [+],
web security [+],
web [+],
security [+],
mcafee [+],
email security [+],
sonicwall [+],
security version [+]
-
-
16:00
»
SecuriTeam
Newscoop is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
-
-
8:01
»
Hack a Day
My kids have a plastic farm toy. It moos, it oinks, it neighs, it baas, and frankly, it grates. But since I tricked it out with an attiny2313, at least it can play “Simon Says”. This is what [Tom] said in his email to us. We love that when the toy annoyed [Tom], he [...]
-
-
17:00
»
SecuriTeam
OTRS is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
-
-
17:00
»
SecuriTeam
Multiple Web Vulnerabilities in Interspire Email Marketer 6.0.1, Email Marketing Software.
-
-
17:00
»
SecuriTeam
Xeams Email Server is prone to an HTML-injection vulnerability because it fails to sanitize user-supplied input.
-
-
17:00
»
SecuriTeam
EmailArchitect Email Server is prone to multiple HTML-injection vulnerabilities because it fails to properly validate user-supplied input.
-
17:00
»
SecuriTeam
Wordpress ThreeWP Email Reflector Plugin is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
-
-
14:01
»
Hack a Day
[Richard] and [Jay] needed a WiFi connected data logger for remotely monitored aquariums. After working diligently for three years, they’re finally finished. While the Knut was originally designed to keep tabs on a few huge aquariums, it’s more than capable to log all sorts of data and send those sensor readings to your email address. Knut [...]
-
-
14:01
»
Hack a Day
We gave you a side view because we really like the red new-mail flag. Sure it works the opposite of how USPS boxes do (where the flag tells the letter carrier there is outgoing mail to be picked up) but it’s still a fun touch. What you can’t see here is that this physical email box has [...]
-
-
15:16
»
Packet Storm Security Exploits
Liferay version 6.1 suffers from a vulnerability where it is possible to retrieve the names and email addresses of all users. Proof of concept code included.
-
15:16
»
Packet Storm Security Misc. Files
Liferay version 6.1 suffers from a vulnerability where it is possible to retrieve the names and email addresses of all users. Proof of concept code included.
-
-
10:22
»
Packet Storm Security Exploits
This is a brief paper that describes how sending external email to an account automatically maps things like a graphic if a person's personal email address maps to it. We tested this and it does work, but Facebook does add a little icon saying the sender isn't verified. However, the average user will probably overlook this.
-
10:22
»
Packet Storm Security Recent Files
This is a brief paper that describes how sending external email to an account automatically maps things like a graphic if a person's personal email address maps to it. We tested this and it does work, but Facebook does add a little icon saying the sender isn't verified. However, the average user will probably overlook this.
-
10:22
»
Packet Storm Security Misc. Files
This is a brief paper that describes how sending external email to an account automatically maps things like a graphic if a person's personal email address maps to it. We tested this and it does work, but Facebook does add a little icon saying the sender isn't verified. However, the average user will probably overlook this.
-
-
17:09
»
Packet Storm Security Advisories
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a file download vulnerability.
-
17:09
»
Packet Storm Security Recent Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a file download vulnerability.
-
17:09
»
Packet Storm Security Misc. Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a file download vulnerability.
-
17:08
»
Packet Storm Security Advisories
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a password cracking vulnerability.
-
17:08
»
Packet Storm Security Recent Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a password cracking vulnerability.
-
17:08
»
Packet Storm Security Misc. Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a password cracking vulnerability.
-
17:07
»
Packet Storm Security Advisories
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a token disclosure vulnerability.
-
17:07
»
Packet Storm Security Misc. Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a token disclosure vulnerability.
-
17:06
»
Packet Storm Security Advisories
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from an access bypass vulnerability.
-
17:06
»
Packet Storm Security Recent Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from an access bypass vulnerability.
-
17:06
»
Packet Storm Security Misc. Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from an access bypass vulnerability.
-
16:55
»
Packet Storm Security Advisories
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a session hijacking vulnerability.
-
16:55
»
Packet Storm Security Misc. Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a session hijacking vulnerability.
-
16:53
»
Packet Storm Security Advisories
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a cross site scripting vulnerability.
-
16:53
»
Packet Storm Security Misc. Files
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a cross site scripting vulnerability.
-
8:03
»
SecurityFocus Vulnerabilities
NGS00158 Patch Notification: McAfee Email and Web Security Appliance v5.6 - Arbitrary file download is possible with a crafted URL when logged in as any user
-
-
21:03
»
Packet Storm Security Recent Files
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
-
21:03
»
Packet Storm Security Misc. Files
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
-
-
10:01
»
Hack a Day
Tis the season for hacking, and [Nick McClanahan] at the GadgetGangster is certainly showing off his Christmas spirit with his most recent creation. He had an animatronic Rudolph the Red Nosed Reindeer toy sitting around and thought it would be fun to convert him into an email reading machine. He tore open the toy, removing [...]
-
-
16:42
»
Packet Storm Security Recent Files
Tripwire is a very popular system integrity checker, a utility that compares properties of designated files and directories against information stored in a previously generated database. Any changes to these files are flagged and logged, including those that were added or deleted, with optional email and pager reporting. Support files (databases, reports, etc.) are cryptographically signed.
-
16:42
»
Packet Storm Security Tools
Tripwire is a very popular system integrity checker, a utility that compares properties of designated files and directories against information stored in a previously generated database. Any changes to these files are flagged and logged, including those that were added or deleted, with optional email and pager reporting. Support files (databases, reports, etc.) are cryptographically signed.
-
16:42
»
Packet Storm Security Misc. Files
Tripwire is a very popular system integrity checker, a utility that compares properties of designated files and directories against information stored in a previously generated database. Any changes to these files are flagged and logged, including those that were added or deleted, with optional email and pager reporting. Support files (databases, reports, etc.) are cryptographically signed.
-
-
12:16
»
Packet Storm Security Recent Files
Qmail-Scanner, (previously known as scan4virus) is an addon that enables a Qmail Email server to scan all gatewayed Email for certain characteristics. It is typically used for its anti-virus protection functions, in which case it is used in conjunction with commercial virus scanners, but also enables a site to react to Email (at a server/site level) that contains specific strings in particular headers, or particular attachment filenames or types.
-
12:16
»
Packet Storm Security Misc. Files
Qmail-Scanner, (previously known as scan4virus) is an addon that enables a Qmail Email server to scan all gatewayed Email for certain characteristics. It is typically used for its anti-virus protection functions, in which case it is used in conjunction with commercial virus scanners, but also enables a site to react to Email (at a server/site level) that contains specific strings in particular headers, or particular attachment filenames or types.
-
-
11:30
»
Hack a Day
Instructables user [meseta] wanted an audible notification whenever he received an email, but must have thought that his computer’s built-in sounds were lacking in some regard. To get the perfect sound that he desired, he built himself a USB-powered notification bell. Using an off the shelf “front desk bell” and a hand made electromagnet, he [...]
-
-
18:01
»
Packet Storm Security Recent Files
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
-
18:01
»
Packet Storm Security Misc. Files
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
-
-
10:39
»
Hack a Day
This deathstar like ball is actually an autonomous surveillance camera. [Basil] wrote in to tell us about it. The body is custom designed for the project, then 3d printed. It can be dropped anywhere, as it is battery powered for up to a month, and communicates via cellar networks. It checks an email folder once [...]
-
-
14:56
»
Carnal0wnage
So new job gets me new fun toys. Figured i'd try the fancy shmancy tools and do a phish campaign with metasploit pro.
1. Go click on campaigns and star filling stuff out like what you want to call it

2. Set up your web campaign. With the web campaign you can actually host a webpage along with your exploit instead of just getting the typical "please wait" stuff.

3. Fill out your name of the template and the html of what you want it to say

4. By default it will run browser autopwn

5. Lets just pick an exploit to throw at them instead of all of them

6. Once you click save, it should look something like this:

7. After that you can set up the email portion of the phish

8. Fill out the sending server options

9. Then fill out the text for the body of your email

10. After you click save, you'll go to the add email addresses section where you can import a list, or type them in

11. Kinda looks like this when its all filled out. To start click the start campaign button

12. You can see the status of your sent emails and as people click them the percentage will change

13. I guess what the email could look like if you werent trying too hard :-)

14. And the web page serving up the exploit

15. You can now see that a user clicked the link and our percentage has changed

I'll cover hosts and sessions later. Only gripe is the lack of configuration ability in the exploit payload section. I've been told this will be addressed shortly even though a lot of work has been put into smart defaults the ability to change it when necessary would be nice.
-CG
-
-
18:47
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 10-156 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed Word document. The application will copy an arbitrarily sized ASCII string representing the font name into a constant sized buffer located on the stack. If large enough this will lead to a buffer overflow and can lead to code execution under the context of the application.
-
18:47
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 10-157 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a Word document containing a malformed shape. The application will calculate a length incorrectly when using it to copy data into an allocated buffer. This can lead to code execution under the context of the application.
-
18:47
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 10-159 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed .wk3 document. The application will trust a length specified in the file in order to read a number of bytes into a statically allocated buffer. This leads to a buffer overflow and can lead to code execution under the context of the application.
-
18:47
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-156 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed Word document. The application will copy an arbitrarily sized ASCII string representing the font name into a constant sized buffer located on the stack. If large enough this will lead to a buffer overflow and can lead to code execution under the context of the application.
-
18:47
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-157 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a Word document containing a malformed shape. The application will calculate a length incorrectly when using it to copy data into an allocated buffer. This can lead to code execution under the context of the application.
-
18:47
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-159 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed .wk3 document. The application will trust a length specified in the file in order to read a number of bytes into a statically allocated buffer. This leads to a buffer overflow and can lead to code execution under the context of the application.
-
18:00
»
Packet Storm Security Exploits
When providing a valid email address to Facebook, it appears that there are multiple ways to extract a person's real name and picture.
-
-
13:05
»
remote-exploit & backtrack
Note: I haven't made 15 posts yet so the pictures can be found in the distorted URLs.
There is no such thing as irrelevant information ~ Muts
During the information gathering stage (if possible) I visit the target for some reconnaissance work in a process that involves exploration and inference. In this case I examined a telecommunications centre which houses a base transceiver station(cell site) and a virtual switchboard. All of this was done with permission. This is a simple overview of my methodology and the purpose of it is to demonstrate how trifles can turn out to be useful pieces of information.
Gear
1) Gloves: I don't need to explain this one?
2) Knife: For cutting bags
3) Torch: A portable light with a magnifying glass(good for poorly written scribbles)
4) Folder, backpack or plastic bag(I prefer the latter)
5) Digital camera: Indispensable.
h ttp://i41.tinypic.com/16lidko.jpg
Appearance
I usually put on clothes which give me the air of a vagrant but I don't exaggerate it. I'll wear a cheap rain jacket, torn jeans, a hood and I'll remove my glasses and mess up my goatee beard. This will avail against prying eyes since I'll just look like a bum rummaging the garbage for recyclable materials and/or food. Why is this important? because I don't want to produce the impression of an document/identity thief.
Garbage
Even in the days of the paper shredder it's very likely you'll find whole documents, letters and all sorts of memorandums. From this we can collect names of employees and customers, phone numbers, email addresses, material on office routines, schedules and so on and so forth. I addition to useful info I can also deduce recent activities. Let's take a look.
h ttp://i41.tinypic.com/k51nao.jpg
Note the abundance of twisted pair cabling that is on top; could this be just old wires? or perhaps a change in equipment?
Lying below the bag of wiring on the left side I found a box--- on it is an address of a seller and manufacturer of computer equipment and in addition on the post label there is a content description stating "modular connectors". From this I can deduce that they have indeed been improving their network and this could be fodder for a social engineering attack.
h ttp://i44.tinypic.com/2rdztjc.jpg
And finally paper, white gold. I always stress my search for crumpled and/or torn notes.
From all this I found the following:
9 Employee names
More assorted names and phone numbers to count. Customers perhaps?
3 work schedules
A paper with the IPs of local hosts scribbled on them, as well as other connection config info.
A document with electronic consumption measurements.
An employment application.
A crumpled post-it-note with a username and password from a web-app of their site.
An internal "staff only" URL
h ttp://i43.tinypic.com/14nzjte.jpg
The Building
I have an eye open for aberrations, I view this as fodder for social engineering attacks. I also peek inside for anything that could be of use.
h ttp://i39.tinypic.com/s4wi9f.jpg
Trouble with your antenna? Here I'm allowed to draw the conclusion that their TV reception is poor. This could be useful fodder for an SE attack; I could ascertain who's behind their TV service and impersonate a service rep stating that he detects that their television converter box or set-top box is receiving a sub-par signal and thus send them an email containing guidelines on improving their signal. This email could be a vehicle for a backdoor payload or contain links to sham sites on improving the signal or maybe even a manual of whatever set-top unit they are using. Remember, being elaborate is a key element.
h ttp://i43.tinypic.com/8zpahg.jpg
May not be clear on photo but they are all running Win XP Pro. Earlier that evening I saw that the monitor at the anterior was displaying the latest version of Internet Explorer and MSN messenger.
h ttp://i44.tinypic.com/140ygi1.jpg
Now I know who is providing security.
h ttp://i42.tinypic.com/35d2rmb.jpg
Hmm... vandalism? maybe they are not doing such a good job. Here I can make a telephone call or send a sham email from a competing security guard services provider or maybe even send an email from Securitas themselves and use the vandalism examples as a basis for a proposition for increased patrolling and in the process implement an attack similar to the one with the antenna problem.
h ttp://i42.tinypic.com/9idyk4.jpg
The lights are turned on at 3:00 in the morning?
Nice, a whiteboard. Here I learnt important topics which are evidently under discussion at this business. In this case they were looking for buyers for a telephone directory service. This is something which I could avail myself of, such as shammed interest in this product as a pretext to gain more info or maybe even access(which I eventually did).
Conclusion
In just 30 minutes I acquired a good chunk of information without any key strokes, which aided me very well latter on in the attack. I am happy to announce that I successfully penetrated several computers at this company using mostly what I observed on the physical site. I did proposed to them the following solutions:
1. Use
paper shredders
2. Turn your damn lights off.
3. Be more circumspect with phonecalls and emails pertaining to problems visible from the outside.
If you live in the same or an adjacent city you could give this a try. It's quite a thrill.
-
6:51
»
Sophos security news
Sophos Email Security Appliance Receives Five Star Rating and Named 'Best Buy' in SC Magazine Group Test
-
-
0:00
»
Packet Storm Security Recent Files
Technical Cyber Security Alert 2010-55A - Malicious activity detected in mid-December targeted at least 20 organizations representing multiple industries including chemical, finance, information technology, and media. Investigation into this activity revealed that third parties routinely accessed the personal email accounts of dozens of users based in the United States, China, and Europe. Further analysis revealed these users were victims of previous phishing scams through which threat actors successfully gained access to their email accounts.
-
-
23:00
»
Packet Storm Security Advisories
Technical Cyber Security Alert 2010-55A - Malicious activity detected in mid-December targeted at least 20 organizations representing multiple industries including chemical, finance, information technology, and media. Investigation into this activity revealed that third parties routinely accessed the personal email accounts of dozens of users based in the United States, China, and Europe. Further analysis revealed these users were victims of previous phishing scams through which threat actors successfully gained access to their email accounts.