'분류 전체보기'에 해당되는 글 537건

  1. 2010.07.22 State of the art in CRiMEPACK Exploit Pack
  2. 2010.07.22 외국 사이트 -해킹 툴
  3. 2010.06.14 dos 프로그램
  4. 2010.06.11 sql 인젝션 ppt 발표 자료
  5. 2010.06.10 my sql 인젝션
  6. 2010.06.10 sql injection 프로그램
  7. 2010.06.10 좋은 내용이 많은 블러그
posted by 블르샤이닝 2010. 7. 22. 09:32
728x90

CRiMEPACK exploit pack is a widespread and accepted in the crime scene in this area came under the slogan “Highest Lowest rates for the price“.

He is currently In-the-Wild 3.0 version is being developed as alpha (the first of this version). That’s, is in the middle stage of evaluation, perhaps in the next few days will go on sale in underground forums, at which time it will know your actual cost.

Like any pack exploit, it also consists of a set of pre-compiled exploits to take advantage of a number of vulnerabilities in systems with weaknesses in some of its applications, then download and run (Drive-by-Download & Execute) codes malicious and convert that system into a zombie, and therefore part of the apparatus crime.

And I mean … “criminal” because those behind the development of this type of crimeware do for this purpose. And judging by the pictures (a washcloth, a handgun, a wallet, money and what appears to be cocaine, own scenario of all mafia) observed in the authentication interface your control panel, this definition is very evident.

The first time I found this package was in 2009, when version In-the-Wild was version 2.1 and later expressed his “great leap” to one of the most popular: version 2.8 (still active) which in early 2010 had incorporated into its portfolio of exploits CVE-2010-0188 y CVE-2010-0806; in addition to adding an iframe generator and function “Kaspersky Anti-emulation“, at a cost of USD 400.

In this first stage of the evaluation version 3, CRiMEPACK incorporates a total of 14 exploits, which are:

  • name=”mdac”
  • desc=”IE6 COM CreateObject Code Execution” CVE-2006-0003

  • name=”msiemc”
  • desc=”IE7 Uninitialized Memory Corruption” CVE-2010-0806

  • name=”java”
  • desc=”JRE getSoundBank Stack BOF” CVE-2009-3867

  • name=”iepeers”
  • desc=”IEPeers Remote Code Execution” CVE-2010-0806

  • name=”pdfexpl”
  • desc=”PDF Exploits [collectEmailInfo (CVE-2007-5659), getIcon (CVE-2009-0927), util.printf (CVE-2008-2992)]”

  • name=”opera”
  • desc=”Opera TN3270″ CVE-2009-3269

  • name=”aol”
  • desc=”AOL Radio AmpX Buffer Overflow” CVE-2007-5755

  • name=”iexml”
  • desc=”Internet Explorer 7 XML Exploit” CVE-2008-4844

  • name=”firefoxdiffer”
  • desc=”Firefox 3.5/1.4/1.5 exploits” CVE-2009-355

  • name=”libtiff”
  • desc=”Adobe Acrobat LibTIFF Integer Overflow” CVE-2010-0188

  • name=”spreadsheet”
  • desc=”OWC Spreadsheet Memory Corruption” CVE-2009-1136

  • name=”activexbundle”
  • desc=”Bundle of ActiveX exploits” CVE-2008-2463

For all the exploits incorporates a feature that can be enabled or disabled from the control panel called “Aggressive Mode“, which is a JAVA Applet that emerge through a pop-up window asking the victim whether to accept potential the applet. If so, reload the payload (the malware).

Furthermore, within the constantly evolving experience this type of crimeware, incorporates self-defensive measures such as avoiding desofuscación scripts and techniques anti Wepawet and Jsunpack.

In addition to automatically check if the domain used is listed in the services:

  • Norton SafeWeb
  • My WebOfTrust
  • Malc0de
  • Google Safe Browsing
  • MDL
  • McAfee SiteAdvisor
  • HpHosts
  • MalwareURL

Brian Kreb few days ago on his blog an article about the implication that this package was in the process of propagation and exploitation of a vulnerability, so far, the type 0-Day through JAVA, and certainly was exploited vulnerability through a class.

However, it was also associated with another exploit pack called SEO Sploit Pack and although it is not the same once more evidence is in complete business processes representing crimeware has a very high demand, offering low-applications costs within a competitive business model … and increasingly aggressive!

Related information
State of the art in Eleonore Exploit Pack
Siberia Exploit Pack. Another package of explois I…
RussKill. Application to perform denial of service…
JustExploit. New Exploit kit that uses vulnerabili…
DDoS Botnet. New crimeware particular purpose
T-IFRAMER. Kit for the injection of malware In-the…
Fragus. New botnet framework In-the-Wild
Liberty Exploit System. Alternatively crimeware to…
TRiAD Botnet III. Remote administration of multi-p…

MalwareIntelligence

---------------------------------------------------------------------------------------------------
reference = http://ef.kaffenews.com/

728x90
posted by 블르샤이닝 2010. 7. 22. 09:29
728x90
728x90

'해킹 프로그램' 카테고리의 다른 글

바이러스 소스코드 모음 사이트  (0) 2022.07.21
SekurLSA module - 윈도우 패스워드 탈취  (0) 2015.03.19
gh0st 소스코드  (0) 2014.01.24
dos 프로그램  (0) 2010.06.14
sql injection 프로그램  (0) 2010.06.10
2010. 6. 14. 04:13

보호되어 있는 글입니다.
내용을 보시려면 비밀번호를 입력하세요.

posted by 블르샤이닝 2010. 6. 11. 20:30
728x90
728x90
posted by 블르샤이닝 2010. 6. 10. 23:12
728x90
728x90
2010. 6. 10. 22:46

보호되어 있는 글입니다.
내용을 보시려면 비밀번호를 입력하세요.

posted by 블르샤이닝 2010. 6. 10. 22:45
728x90
728x90

'일상' 카테고리의 다른 글

오렌지 마말레이드의 bgm  (0) 2011.07.09
'허민'  (0) 2010.10.25
vm mac 설치.....될까???ㅋㅋ  (0) 2010.08.02
인생 굴곡 표  (0) 2010.03.31
정보처리기사 필기 합격 훗~ 걱정은 역시 없군.....ㅋ  (0) 2010.03.19