18 Year Old Hacker Helps Pentagon in Hacking Their Servers
Ghost HeX
An 18 year old hacker, David Dworken, who recently graduated from high school, helped the Pentagon by hacking its servers. The Pentagon, in return, warmly welcomed and received the hacker. The Pentagon recently launched the bug bounty program, inviting all skilled hackers to participate in the “Hack The Pentagon.” Over 1400 hackers participated in the program, out of which 138 legimate bugs were found, allowing hackers to steal sensitive information.
Dworken was welcomed by the secretary of defense at the Pentagon, promising to hack the Pentagon again.
The Hack The Pentagon program was invested with $150,000. This program was introduced to avoid any further cyber attacks from the black hat hackers. During this, 1189 reports were submitted and a total bounty paid was $71,200. The most common bug found during the hack program was cross site scripting (Xss). Regards, Ghost HeX
The flaws could have allowed hackers to execute malicious code on computers with no user interaction
Ghost HeX
A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.
Symantec released patches for the affected products, but while some products were updated automatically, some affected enterprise products could require manual intervention.
The flaws were found by Tavis Ormandy, a researcher with Google’s Project Zero team who has found similar vulnerabilities in antivirus products from other vendors. They highlight the poor state of software security in the antivirus world, something that has been noted by researchers.
Most of the new flaws found by Ormandy are in the Decomposer component of the Symantec antivirus engine. This component handles the parsing of various file formats, including archive files like RAR and ZIP. Furthermore, the Decomposer runs under the system user, the most privileged account on Windows systems.
Symantec didn’t immediately respond to a request for comments on the vulnerabilties.
Security researchers have criticized antivirus vendors many times for performing risky operations like file parsing with unnecessarily elevated privileges. Historically, such operations have been a source of many arbitrary code execution vulnerabilities in all sorts of applications.
Ormandy found vulnerabilities in the Symantec code used to handle ZIP, RAR, LZH, LHA, CAB, MIME, TNEF and PPT files. Most of these flaws can lead to remote code execution and are wormable, meaning they can be used to create computer worms.
“Because Symantec uses a filter driver to intercept all system I/O [input/output operations], just emailing a file to a victim or sending them a link to an exploit is enough to trigger it—the victim does not need to open the file or interact with it in anyway,” Ormandy said in a blog post.
Even more surprising is the fact that Symantec appears to have used code from open source libraries, but failed to import patches released by those projects over the years.
For example, Ormandy determined that Symantec products were using version 4.1.4 of an open-source unrar package that was released in January 2012. The most current version of that code is 5.3.11. A similar situation was also observed for another library called libmspack.
“Dozens of public vulnerabilities in these libraries affected Symantec, some with public exploits,” Ormandy said. “We sent Symantec some examples, and they verified they had fallen behind on releases.”
The failure to keep track of vulnerabilities patched in the third-party code used by software vendors and developers in their own projects is a widespread problem. However, there’s a natural expectation that security vendors would not make that mistake. After all, they often preach secure software development and vulnerability management to others.
Unfortunately, “when looking at how even a behemoth of a security product vendor like Symantec is bundling ancient code in their products, clearly hasn’t subjected this code to security reviews and testing, and to top it off runs this old, unsafe code with SYSTEM/root privileges, it is clear that security vendors don’t hold themselves to very high standards,” Carsten Eiram, the chief research officer of vulnerability intelligence firm Risk Based Security, said by email.
According to RBS’ data, 222 vulnerabilities have been reported this year in security products, representing 3.4 percent of all vulnerabilities seen in 2016 so far.
“It may not sound like much, but it’s actually quite significant,” Eiram said.
Symantec has published a security advisory that lists the affected products and contains instructions on how to update them. All Norton products—the consumer line—should have been updated automatically .Regards, Ghost HeX
"A nice speech By #RafayBaloch hope u will like it"
Ever heard about "US Cyber Army", "Israel Cyber Army", "UK Cyber Army"? Probably not, but you would surely know about "Pakistan Cyber Army", "Indian Cyber Army", "Bangladesh Cyber Army". Have you ever wondered why these countries don't have a cyber army to defend their websites? It is because they don't like to waste their time in painting walls and defacing websites and are more focused in doing some real research.
On the other hand, all we do is fight with each other, use hacking techniques that others invented and use exploits that others created without knowing how they really work. While we in the subcontinent are spending time in uselessly fighting for our nations and defacing one and other country's websites, these people on the other hand have built malware which were never seen before. For Instance: Stuxnet, DUQU,Flame etc used to compromise PLC's. While, we are busy in taking down websites of another country just to add more entries to zone-h mirror, they are advancing their research into extensive domains like hacking into cars, hacking into ATM machines, compromising smart TV's and Internet of things for mining bitcoins etc.
They are doing all this to make their systems more secure. Take an example of Chinese hackers, they hack into networks and stay there forever without tripping IDS, SIEM's etc and extract data and cover their tracks so no one is really aware of what has really happened. As far as Russian hackers are concerned, they are developing world class malware and using new techniques for evading anti-viruses.
Even though I agree to the fact that technology should be used for surveillance purposes, but my point here is that we need to promote and fund real research. Our obsession with taking down websites will not make Pakistan a better place to live. We don't make our country a better place by defacing websites, buy we make it by educating our people. It can only be done by a vision of focused excellence.
It's time to think, It's time to change. Share it if you support my idea. #rafaybaloch #wakeupcall Regards, Ghost HeX
Hacking facebook account is one of the essential queries at the net today. it’s hard to discover — a way to hack fb account, but researchers have simply demonstrated by using taking manipulate of a facebook account with simplest the goal’s smartphone variety and a few hacking abilties.
sure, your fb account can be hacked, irrespective of how strong your password is or how plenty greater security measures you’ve got taken. No shaggy dog story!
Hackers with abilities to take advantage of the SS7 network can hack your fb account. All they want is your cellphone number.
The weaknesses within the part of global telecom community SS7 not handiest allow hackers and spy companies listen to personal smartphone calls and intercept SMSes on a potentially large scale however additionally allow them to hijack social media bills to that you have furnished your phone wide variety.
SS7 or Signalling gadget number 7 is a telephony signaling protocol this is being used by extra than 800 telecommunication operators global to exchange information with each other, cross-provider billing, permitting roaming, and other features.
but, an issue with the SS7 community is that it trusts textual content messages sent over it regardless of their beginning. So, malicious hackers ought to trick SS7 into diverting text messages in addition to calls to their own devices.
All they want is the target’s smartphone wide variety and a few information of the goal’s tool to provoke the silent snooping.
The researchers from fantastic technologies, who these days showed how they might hijack WhatsApp and Telegram debts, now gave the demonstration of the facebook hack using similar hints, Forbes reported.
SS7 has lengthy been recognised to be vulnerable, in spite of the most superior encryption used by mobile networks. The designing flaws in SS7 were in circulate since 2014 whilst the group of researchers at German protection studies Labs alerted the sector to it.
here’s how to Hack Any fb Account:
The attacker first desires to click on the “Forgot account?” link on the fb.com homepage. Now, while asked for a phone variety or e mail address connected to the target account, the hacker wishes to provide the valid phone number.
The attacker then diverts the SMS containing a one-time passcode (OTP) to their personal computer or telephone, and might login to the goal’s facebook account.
you may watch the video demonstration that indicates the hack in action.
the problem affects all fb users who’ve registered a telephone variety with facebook and feature authorized facebook Texts.
except facebook, researchers’ paintings indicates that any carrier, together with Gmail and Twitter, that uses SMS to confirm its person accounts has left open doors for hackers to target its clients.
although the community operators are unable to patch the hole someday quickly, there’s little the phone users can do.
It has been reported and checked that the official websites of Pakistan People’s Party (PPP) and Pakistan Muslim League (PML-N) US are hacked at the same time.
This action could well be triggered because of passive response from judiciary regarding the Panama Leaks. Things usually go out of control especially when there is constant delay in the justice. This is probably one of the reasons the hackers tried to deface the official websites of PPP and PML-N.
The hackers, who exhibited their identity as ‘Cyber Haxors’, have left a very strong message on both the websites. It is pertinent to mention here that the official website of PPP is hacked while PML-N official website for United States is vandalized.
At present, there are no details or reports about any data being breached, however, it could be said that the server data may have been compromised.
The URL of the 2 websites that are hacked is ppp.org.pk (for PPP) and pmln.us (for PML-N US). Both websites are still hacked with a message that is apparently written by a ‘Hurt Pakistani.’
PML(N) Website Hacked (Ghost HeX)
The hacker called the former President of Pakistan, Mr. Asif Ali Zardari, as:
‘Probably the most corrupt person in Pakistan right now’
While expressing his anger, the hacker sounded pretty upset when he explained the reason of hacking the official websites of PML-N. The hacker, in the message that he left at the website, stated that:
‘You and your political friends are scums of our society’
Time frame is still not communicated about how much time it will take for the websites to be restored but this is generally not an appropriate manner to record your statement. In the future, there are chances that the websites will take strict security measures to make sure that such incidents do not take place.
Regards, Ghost HeX