Ad

Sunday, July 11, 2021

Bug-Bytes Cors Vulnerabilities

CROSS-ORIGIN RESOURCE

SHARING CROSS-ORIGIN RESOURCE SHARING IS A MECHANISM WHERE ONE WEBSITE/DOMAIN CAN SHARE RESOURCES/WEB FILES OVER SUBDOMAINS OR THIRD PARTY

VENDORS WITH A SYNCHRONISED ALLOWANCE POLICY, IF THERE IS ANY POLICY RESTRICTING THE SHARING OF RESOURCE

BY A GENERAL SHARING POLICY.



MISCONFIGURED CORS

IF THE FOLLOWING ONE FINDS IN THE

  •  ACCESS-CONTROL-ALLOW-ORIGIN : 
  • NULL RESPONSE: ACCESS-CONTROL-ALLOW CREDENTIALS: TRUE

IT MEANS THAT WEBSITE IS POORLY



CHECKING FOR CORS MISCONFIGURATION


1ST METHOD 

FOR CHECKING CORS MISCONFIGURATION, ONE

HAS TO CHECK THE RESPONSE FOR :

  1. ACCESS-CONTROL-ALLOW ORIGIN: HTTP://DOMAIN1.COM 
  2. "ACCESS-CONTROL ALLOW-ORIGIN : *


2ND METHOD 

ONE CAN USE THE FUNCTION OF SPIDER/CRAWLING IN BURP SUITE AND AFTER SPIDERING THE

DOMAIN, VISIT THE SEARCH TAB (IN TOPMOST TAB OF

BURPSUITE) AND THEN SEARCH FOR KEYWORD

': ACCESS-CONTROL-ALLOW ORIGIN. SEND THAT PAGE IN

REPEATER



CHECKING FOR CORS MISCONFIGURATION (ANOTHER METHOD)

ANOTHER WAY TO FIND CORS VULNERABILITY:


  • -> CURL HTTPS://DOMAIN.COM -H "ORIGIN :  HTTP://DOMAINZ.COM" /



TESTING FOR INSECURE CORS

IF ONE HAS TO TEST FOR CORS MISCONFIGURATION, HE/SHE SHOULD :


  1.  INTERCEPT THE REQUEST IN BURP SUITE, AND THEN FOLLOW UP WITH 1ST OR 2ND METHOD EXPLAINED ABOVE 
  2. NEXT, SEND THE REQUEST TO THE REPEATER TAB IN
  3. BURPSUITE 
  4. NOW, BEFORE COOKIE OR CONNECTION PARAMETER IN
  5. REQUEST, ADD THE FOLLOWING HEADER -> ORIGIN: HTTP://DOMAIN2.COM NULL ||
  6. NOW, OBSERVE THE RESPONSE IN RESPONSE PART



OBSERVATION

NOW IN REPEATER, IN THE REQUEST TAB, IF ONE GETS THIS RESPONSE :


ACCESS-CONTROL-ALLOW-ORIGIN :

DOMAIN2.COM * NULL THIS SHOWS THAT THE WEBSITE IS

VULNERABLE TO CORS MISCONFIGURATION,



THE VULNERABILITY


BY RESPONDING WITH ACCESS-CONTROL-ALLOW-ORIGIN : *, THE REQUESTED RESOURCE ALLOWS SHARING WITH EVERY ORIGIN. THIS MEANS THAT ANY SITE CAN BE SEND AN XHR REQUEST TO YOUR SITE AND ACCESS THE SERVERS RESPONSE WHICH WOULD NOT BE THE CASE IF YOU HADN'T IMPLEMENTED THIS CORS RESPONSE. SO ANY SITE CAN MAKE A REQUEST TO YOUR SITE ON BEHALF OF THEIR

VISITOS AND PROCESS ITS RESONSE. IF ONE HAVE SOMETHING IMPLEMENTED LIKE AN AUTHENTICATION OR AUTHORIZATION SCHEME THAT IS BASED ON SOMETHING THAT IS AUTOMATICALLY PROVIDED BY

THE BROWSER (COOKIES, COOKIE-BASED SESSIONS, ETC), THE REQUEST TRIGGERED BY THE THIRD-PARTY SITES WILL USE THEM TOO.

THIS INDEED POSES A SECURITY RISK, PARTICULARLY IF YOU ALLOW RESOURCE SHARING NOT JUST FOR SELECTED RESOURCES BUT FOR

EVERY RESOURCE.



Share it with The People Who Need to Get Started in This Field and Get Yourself Started With Cybersecurity and Ethical Exploitation.

Hope this article helps you. If you have any suggestions Drop them in Comment Section and Join Our Family by Clicking Subscribe Button and For More Articles/Post Like this Join us on:-

Thursday, September 24, 2020

Free Downloading Resources Links | Hacking Books - Cracked Applications - Programming | Website

Cracking EBook For Newbies

Worth: 500$
Size: 5.7MB


240+ Database Collection With Email: Pass Combination

Password: D&ELmio0Gs85tXB%pSo7



Freesoff.com All Courses [ C / C++ / HTML / CSS / C# / Java / JavaScript ]

Password:- bC25Q_-4KJ6PfAzp-EOHZQ


Grow Your Business with Digital Marketing: Social Media Marketing, Facebook, Content, YouTube, Email Marketing, Websites



A course that’ll kick you're a**, teach you how to complete real-world projects, and make a living as a modern JavaScript and React web developer.



Cracking Full Course by BlackHat Pakistan

Friday, September 11, 2020

How to Find And Remove Malware from Android? | Virus Protection

Attackers are day by day finding new ways to break the security of your smartphones. The main reason is, these attackers convince the user to install the malicious apps on your smartphone. Once it is done, then all the personal information in your smartphone is at stake. So, let’s take a look at How To Remove Malware From Android. 

How to know that your Android Phone is infected with Malware? It is important to know the normal behavior of your smartphone to understand its anomalous behavior in case of a Malware attack.

It is obvious that your smartphone won’t be getting to operate normally just in case of any malware residing in it.

So, understanding anomalous behavior and drawing a conclusion from it plays an important role. In this case, we have listed a few of the things that can lead you to know that your smartphone is infected with malware

1. Ads and Pop-ups

If you begin getting multiple ads and pop-ups while using your smartphone, it's quite obvious that any malware resides on your smartphone.

These ads and pop-ups cab be bind to a particular app or can display while using other system apps also. You can try to restrict these ads, but they are never going to stop following you.

Every time, you will get a new ad. Pop-ups are also designed very cleverly, as the hackers know how to play with the user’s brain and manipulate him to click on these pop-ups.

2. Battery life decreases repeatedly

When any malware resides in your smartphone, you won’t be able to see this malware in action. All you can sense is that the battery life of your smartphone is decreasing gradually.

Even though you are running a certain application that requires minimum battery power, yet at that time malware keeps executing in the background. Hence battery consumption is fast.

You can check the battery settings to understand this. It will display the battery consumed by all the apps since the last time the device was charged fully.

If it shows a particular app with not so proper noun and outline consuming maximum battery resource, then it's the malware that's installed on your smartphone. 

3. Automatic Third-party apps installation

Malware is supposed to execute the remote code that the hacker has designed. In most cases, you will see that multiple new apps are installed on your device and you won’t even remember when you installed them on your smartphone.

This is probably the case because you never downloaded these apps, they're automatically being downloaded and installed on your smartphone due to the code execution of malware.

Hackers use such malware to put in random third-party apps on your smartphone, which are mostly Spywares. In most cases, these apps go undetected by the user because of several already installed apps on the device which are seldom used by them. 

4. Sudden Increase in Data Usage

When the malware is executing in your smartphone, it needs data to perform some of its tasks.

In case it is spyware then it needs the data to send the spied information to the hacker over the internet who is sitting might be 1000 miles away.

Also, these malware download add-ons for his or her functioning that needs data. So, it is obvious that they will be using data from your ISP.

When you start observing your daily data is running out, its probable thanks to the malware residing in your smartphone.

You can monitor it by navigating to the Data Usage Settings. Her you can see certain third-party application consuming most of the data. It is malware.

How to fix a hacked Android Phone

We, humans, tend to believe that cure is the best option rather than prevention. All of us know that we should secure our smartphone to prevent it from getting hacked, but little we care about it.

So once the smartphone is infected with malware, you run for the solution to fix it.

Let’s see the ways to fix a malware-infected Android Phone.

1. Using Antivirus or Antimalware Program

The best you can do is, use a trusted antivirus or antimalware program to clean out your smartphone. The reason I use the word Trusted, is because you will see several antivirus programs, that offer services free of cost.

Don’t fall for these schemes. Most of the time this free antivirus software does nothing about the security but in turn, harms your smartphone more. 

There are various antivirus or antimalware programs available to choose from. We will see the two best of them here. 

Malwarebytes Security:

It is the best application when it comes to malware scanning and cleaning. It scans the smartphone to detect almost all types of malware.

Once it finds any malware and adware, it uninstalls and removes all its associated data from your smartphone. It also identifies the app that can provide potential harm to the device.

It provides a free 30-day trial and then comes with a paid, premium version. I must say, this app is worth paying.

McAfee Security:

If you are a PC user, you already know about this. It also provides services for the android platform. McAfee monitors the working of all the factors that are to be looked out for any malware existence on the smartphone.

It identifies the malware and removes it from your device to ensure security and also scans the existing apps as well as newly downloaded apps for the malware. 

2. Factory Data Reset

In most of the case, the Factory Data reset is the best thing you can do for your smartphone’s safety. You will see this option in the settings menu of your smartphone.

When you reset your smartphone, it will wipe out all the data from the smartphone, this includes media on your smartphone along with the malware.

Once the smartphone is reset, you can now adopt safety measures to not let any malware affect your smartphone.

3. Changing security credentials

When a malware resides in your smartphone, it aims at stealing your personal details. It includes Important Documents, Email conversations, Call logs, and the most important your Login Credentials.

So, you must set a backup mechanism to login back to your account in case if you are locked out due to a change in the credentials.

If you still have access to your account, then as soon as you clear the malware from your smartphone, you should change the credentials of your account. 

Ways to Prevent Android Phone from Malware Infection
Always download apps from legitimate sites, these include, Google Play Store and other reputed app stores.
Using a Trusted Antivirus or Antimalware software.
Monitoring the Application Manager section on a regular basis.
Not clicking on the pop-ups.

Share To Your Friends And Learn Together With Us

Hope this article helps you. If you have any suggestion Drop it in Comment Section and Join Our Family by Clicking Subscribe Button and For More Article/Post Like this Join us on:-


Similar Topics:-