1337day.com – Security Exploit Archive Back Online!

I am pleased to see one of my favorite security vulnerability, exploit and 0day sites back online, 1337day.com.

In the last year, various agencies and government bodies have become increasingly aggressive in their take downs of exploit and vulnerability resources. In most cases, domain names are confiscated and hosting provides are advised of terms of service (TOS) violate. Websites such as Milw0rm and Inj3ct0r were taken down earlier this year and 1337day’s old domains including: inj3ct0r.com , inj3ct0r.org , inj3ct0r.net , 0xr00t.com , 0x0day.com, 1337db.com were also shut down.

1337day.com is now back online and hosted at volia.com in the Ukraine. In the event their new domain name (1337day.com), registered at moniker.com is suspended, the site will be accessible at:

SHODAN – Computer Search Engine

SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners.

Web search engines, such as Google and Bing, are great for finding websites. But what if you’re interested in finding computers running a certain piece of software (such as Apache)? Or if you want to know which version of Microsoft IIS is the most popular? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don’t let you answer those questions.

So what does SHODAN index then? Good question. The bulk of the data is taken from ‘banners’, which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client would like to know before interacting with the server. For example, following is a FTP banner:

220 kcg.cz FTP server (Version 6.00LS) ready.

This tells us a potential name of the server (kcg.cz), the type of FTP server (Solaris ftpd) and its version (6.00LS). For HTTP a banner looks like:

HTTP/1.0 200 OK
Date: Tue, 16 Feb 2010 10:03:04 GMT
Server: Apache/1.3.26 (Unix) AuthMySQL/2.20 PHP/4.1.2 mod_gzip/ mod_ssl/2.8.9 OpenSSL/0.9.6g
Last-Modified: Wed, 01 Jul 1998 08:51:04 GMT
ETag: “135074-61-3599f878”
Accept-Ranges: bytes
Content-Length: 97
Content-Type: text/html

You can find out more about Shodan here.

THC-Hydra 5.8 Released – Extremely Fast Multi-Threaded Login/Password Cracker

The number one biggest security hole is passwords, as every password security study shows. Hydra is a parallelized (multi-threaded) login cracker which supports attacking/cracking numerous protocols. New modules are easy to add, beside that, it is flexible and very fast.

Currently this tool supports:

          Postgres, Teamspeak, Cisco auth, Cisco enable, AFP, LDAP2,
          Cisco AAA (incorporated in telnet module).

Recent changes for v5.8

  • Added Apple Filing Protocol
  • Fixed a big bug in the SSL option (-S)

Additions prior to public release (v5.7 and before)

  • Added ncp support plus minor fixes (by David Maciejak @ GMAIL dot com)
  • Added an old patch to fix a memory from SSL and speed it up too from kan(at)dcit.cz
  • Removed unnecessary compiler warnings
  • Enhanced the SSH2 module based on an old patch from aris(at)0xbadc0de.be
  • Fixed small local defined overflow in the teamspeak module. Does it still work anyway??
  • Moved to GPLv3 License (lots of people wanted that)
  • Upgraded ssh2 module to libssh-0.4.x (thanks to aris (at) 0xbadc0de.be for the 0.2 basis)
  • Added firebird support (by David Maciejak @ GMAIL dot com)
  • Added SIP MD5 auth patch (by Jean-Baptiste Aviat jba [at] hsc [dot] `french tld’)
  • Removed Palm and ARM support
  • Fix for cygwin which falsely detected postgres library when there was none.

You can download Hydra v5.8 here.