This idea popped in my head a while back and is still on my todo list (note: my todo list never shrinks). The following context/problem applies.
Suppose you want to steal information but the server you want to backdoor has got all ports ip restricted on an application level. Like a IIS instance which restricts users based on their ip address. How could this be bypassed without adjusting the IIS configuration or using a complicated rootkit. I thought of the following (note: this can also be implemented in ring0):
Continue reading “Bypassing ip restrictions with a backdoor”
abusing the trust people have in signed applets.
It’s been blogged before but oh well I always learn by example so here is an example. The thing I’m talking about is trusting signed java applets. In short when you trust a java applet it can do whatever it wants. So what could you do with a java applet? The java source code will steal your mac address, rather useless but it serves the example purpose good enough. The stolen mac address get’s submitted to a page in this case it will be google which will look like this:
Continue reading “Trusting Java Applets”
Please bare with me, english is not my native language and I am way to lazy to rewrite old papers and tools. So I hope you can all forgive me for that.
I promise that I will try and write better english from now on.
Using timing mechanisms to detect rootkits.
Well my old website used to have a single page dedicated to affiliates and people I have met during my online time spent on irc, forums, etc…
On this blog I will maintain a list of friends. So just contact me to update this list. Please don’t be offended if your website isn’t on thislist I probably forgot some…still trying to sort things out.
Welcome to my new blog.
Like some of you know I used to have my own website http://www.kd-team.com. Unfortunatly life goes on and everyone heads for a new direction in life. Because of time restraints and the work it took to manage the website we decided to cancel it.
Most of the old content will be published here, just for archive purposes. The rest of the posts will be about daily security problems I struggle with or just random ideas I get in the middle of the night.
I’m off for some sleep, I’ll continue later on.