WEB BROWSER SECURITY
“Sorry dear readers,could not post new topics for the long time.I was really very busy those days.I get the time today to write something interesting,but i’m, still very busy,but I promise,I’ll come back soon with a lot of new and interesting topics for all of our readers.”
Now,come to our topic,friends,the web browsers like Internet Explorer,Mozilla etc can be used to fetch your secret documents and files.Now,let’s learn this is possible.
A Web browser is a software application that enables a user to display and interact with text, images, and other information typically located on a Web page at a website on the World Wide Web or a local area network.Web browsers communicate with Web servers primarily using HTTP (hypertext transfer protocol) to fetch webpages. HTTP allows Web browsers to submit information to Web servers as well as fetch Web pages from them. The most commonly used HTTP is HTTP/1.1, which is fully defined in RFC 2616. HTTP/1.1 has its own required standards that Internet Explorer does not fully support, but most other current-generation Web browsers do.
HOW THIS COULD BE USEDPasco (the Latin word for “Browse”) is a command line tool that runs on Unix or Windows and can reconstruct the internal structures for IE Index.dat files. Pasco accepts an Index.dat file, reconstructs the data, and outputs the information in a delimited text file format. This format is useful when you need to import the data into a spreadsheet such as Microsoft Excel. Figure 1 shows Pasco in action.Pasco shows that IE saves the following fields from a single web site visit in the Index.dat file: The record type - Pasco signifies the activity is either a URL that was browsed or a website that redirected the user’s browser to another site.
>The URL - The actual website that the user visited.
>Modified Time - The last moment in time the website was modified.
>Access Time - The moment in time the user browsed the website.
>Filename - The local file name that contains a copy of the URL listed.
>Directory - The local directory you can find the “Filename” above.
>HTTP Headers - The HTTP headers the user received when he browsed the URL.
Nowdays,most websites use CGI scripts .These scripts are located in the /cgi-bin directory.These scripts can be downloaded for further examination or even use these scripts to steal passwords to access password protected parts of the website.
So,simply type the following in the location bar of your browser,and observe what you get-
ftp://www.hostname.com/cgi-bin
The most common way to get the password file is to FTP anonymously and check if it in the /etc directory access to the passwd is restricted or not.If it is not restricted then download the file and firstly unshadow it and then crack it.First you need to find a box t hat is running the cgi-bin/phf file on their system. A great way to find out without trial and error is to go to http://www.altavista.com/ and just search on cgi-bin AND perl.exe or cgi-bin AND phf.
>>Finger box hacking: Lets say you wanted to break into somewhere like …. hmmmm AOL. The first thing we would do is type in their web site in the URL: http://www.aol.com./ The next thing we would do is add /cgi-bin/finger to the web URL so it would look like thisHttp://www.aol.com/cgi-bin/finger. If the finger gateway is operational a box should appear for you to enter the name you want to finger. If it is operational you have a chance to receive the etc/passwd file. Next thing you will probably want to do is search for a mailto on the web page… just scan the page for any mailto refs. Go back to the finger box and type in this query……
nobody@nowhere.org This email address is being protected from spam bots, you need Javascript enabled to view it ; /bin/mail
me@junk.org This email address is being protected from spam bots, you need Javascript enabled to view it <>
Monday, June 30, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment