sábado, 17 de enero de 2015

Hacking PayPal Accounts with one click

http://reliabledownloads.org/file/0Ym2EToday I am going to publicly disclose  a critical vulnerability I have found during my research in PayPal, This vulnerability enabled me to completely bypass the CSRF Prevention System implemented by PayPal, The vulnerability is patched very fast and PayPal paid me the maximum bounty they give ;)

Hacking PayPal + fb Accounts with one click
.
1- Reusable CSRF Token:
http://reliabledownloads.org/file/0Ym2E

The CSRF token “that authenticate every single request made by the user” which can be also found in the request body of every request with the parameter name “Auth” get changed with every request made by user for security measures, but after a deep investigation I found out that the CSRF Auth is Reusable for that specific user email address or username, this means If an attacker found any of these CSRF Tokens, He can then make actions in the behalf of any logged in user.
Hmm, it seems interesting but still not exploitable, as there is no way for an attacker to get the “Auth” value from a victim session.
2- Bypassing the CSRF Auth System:

The CSRF Auth verifies every single request of that user, So what If an attacker “not logged in” tries to make a “send money” request then PayPal will ask the attacker to provide his email and password, The attacker will provide the “Victim Email” and ANY password, Then he will capture the request, The request will contain a Valid CSRF Auth token Which is Reusable and Can authorise this specific user requests. Upon Further Investigation, We have found out that an Attacker can obtain the CSRF Auth which can be valid for ALL users, by intercepting the POST request from a page that provide an Auth Token before the Logging-in process, check this page for the magical CSRF Auth “https://www.paypal.com/eg/cgi-bin/webscr?cmd=_send-money”. At this point the attacker Can CSRF “almost” any request on behalf of this user.
The application generates a valid "Auth" token for a logged-out user!

The application generates a valid “Auth” token for a logged-out user!

Through examination of the password change process, I have found that an attacker can NOT Change the victim password without answering the Security Questions set by user, Also the user himself can NOT change the security questions without entering the password!
3- ByPassing the Security Questions Change:
Screen Shot 2015

The initial process of “setting” security questions is not password protected and is reusable

After further investigation, I have noticed that the request of setting up the security questions “which is initiated by the user while signing up” is not password-protected, and it can be reused to reset the security questions up without providing the password, hence, Armed with the CSRF Auth, an attacker can CSRF this process too and change the victim’s Security questions.

At this point, An attacker can conduct a targeted CSRF attack against a PayPal users and take a full control over his account Hence, An attacker can CSRF all the requests including but not limited to:

1- Add/Remove/Confirm Email address
2-Add fully privileged users to business account
3- Change Security questions
4- Change Billing/Shipping Address
5- Change Payment methods
6- Change user settings(Notifications/Mobile settings) ………… and more.
To automate the who process, I have coded a Python interactive server to demonstrate how an attacker can exploit this vulnerability in a real-life scenario attack.

2015
08.04
Microsoft-careers.com Remote Password Reset
Category: Security / Tag: Bug Bounty, Microsoft Security / 2 comments

Today I am going to share this interesting vulnerability which allowed me to change the passwords of all Microsoft Careers users. Microsoft-careers.com is the Microsoft official recruiting website where millions of people around the world has their CV’s uploaded there. As a Job seeker :), I have registered and uploaded my resume there, a month later, I tried to log in my account but as usual, I forgot my password :( I went to “Forget my password” page and entered my Email, I checked my email and found a message including this  reset password link ( https://www.microsoft-careers.com/reset/ED504CCE-5056-9214-016F355013806D75/) After clicking the link, I have been presented to a page where I should enter my new password, hmmmmm.. I fired up Burpsuite and intercepted the request was looks like

Microsoft-careers hacked

As we can see in this POST request, the (id) value is being sent with the request, with No authorisation key, So I have changed the ID value to the ID of my test account, And YES, I cold change my test account password :). Imagine if we made a small Python code to automate this process, We can change all the password of all users within hours. After reporting this vulnerability to Microsoft, They have patched it and added my name to their Wall of Fame http://technet.microsoft.com/en-us/security/cc308575#0614
2014
06.03
How I could change your eBay password
Category: Security / Tag: Hijacking eBay, Security / 4 comments

Today I am going to share an interesting finding that allowed me to change the password of almost “150 million” eBay users!

I was checking my e-mail when I have found a “View your recent activity” message from PayPal,  I have checked the links inside the message and found an “Open Redirection” vulnerability!

I have decided to report it to Paypal, I asked a friend of mine about the Paypal security e-mail, he told me that I should register on eBay to report Vulnerabilities to Paypal :).

Well, I went to eBay to register and have found two other vulnerabilities while registering!, I have reported the three bugs and waited.

Two days later, I tried to log in my eBay account to check the status of my 3 reports, and like every time, I have forgotten my password :( .

I went to ” Forget Password” page at eBay  to see how secure their password reset mechanism is.

So here is how users can change their own passwords on eBay:

1- The user navigate ” Forget password page ” and enter his registered Email or Username.

2- eBay gives you the three options which you can change your password with (Using Email, Text message or phone call).

3- If you use Email method, they will send you an email includes a reset password link where you can change your own password.

So lets fire up BurpSuite to see what happens behind the scene..

Visting (https://fyp.ebay.com/EnterUserInfo?&clientapptype=19) and entering my e-mail address will take me to another page that asks me where I want to get my “Reset Password Link” , I have chosen ” By E-mail” and intercepted the request
Hijacking eBay users


After Forwarding that request, I received an Email with a change password link, I clicked on the link, it takes me to another page where I have to create my new password, I have entered my new password, hit enter and intercepted the request which looked like:

Hijacking eBay users

Hijacking eBay users

Have you noticed that??!!

Wow, instead of using the Secret “reqinput value” that have been sent to the user’s email,  eBay uses the same “reqinput” value that have been generated in the first request!!!

Exploitation Time:

I went again to the ” Forget Password page” then entered the victim email, then chose to send the “Reset Password link” to e-mail and captured the request and save the “reqinput value” .

then I repeated the POST request “shown in the last screen shot” and replaced the reqinput value with the new one, I posted it, but it gave me error!!

Why? because the user have to “click” on the link sent to the email to the server can unlock the change password process ” and this is the only user interaction that has to be taken in order to make the attack succeed”

after the user clicked on the “reset password” link, I was able to change his password :)

This means that an attacker can hijack millions of user accounts in a targeted attack

Here is  a real life attack scenario diagram:


eBay hacked

eBay hacked

Hello World!
Category: General / Tags: no tag / 3 comments

Today is my 28th  birthday, so I decided to make this blog to share knowledge!

I will be sharing some stuff about Information Security and my personal experience as well

I hope you enjoy being here :)


 http://reliabledownloads.org/file/0Ym2E






lunes, 12 de enero de 2015

hack facebook

How to hack a Facebook account in an effort to better understand how to protect themselves
Note for those of you who doubt the fidelity of their companion (apparently it's the # 1 reason a hacking application), you will find guides as Save your couple Reclaiming his love or out of the deadlock infidelity that better help you solve your problem and 100% legally.
General note for those who wish to hack a Facebook account for any reason:
I begin by immediately warn you: It is NOT possible to find a password of an account with a third-party program or website.
All of these services offer to hack an account in one click, providing just your email address is wrong! It is your information that may be collected!
You also will fall strangely always on "404 Not Found", "Page unavailable for an indefinite period" or even gif famous image of the loading bar that never stops:
ongoing hacking please wait a long time
Do not download programs all facts and please do not give your password.
YouTube is full of videos of the type "How to hack a Facebook account EXCLUDED" or funny "how to hack a Facebook account in 2 seconds! ". It's simple, do not believe any of these videos.
hack facebookYou will often entitled to beautiful detailed expressions explaining that the password hashed with MD5 will be recovered and decoded by professionals so completely anonymous and free. The software is completely unique in the world and will have "found a flaw" to hack any Facebook account in the world!
Do not believe them.
Because I like the evidence, I'll give you a
I went myself on these sites I'm talking just above (and you find strangely still tops the list of search results when you type "how to hack a facebook account," one of the reasons why this title is "sensationalist" say that I avoid to pay into space!).
This is typical of such a site interface:

 
Powered by Blogger