Donate to us via Paypal!
You cannot teach a man anything; you can only help him find it within himself. - Galileo
Wednesday, June 16, 2021
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 156
Guests Online: 153
Members Online: 3

Registered Members: 137391
Newest Member: Construction Material
Latest Articles

Welcome to HellBound Hackers

Welcome to HellBound Hackers. The hands-on approach to computer security.
Learn how hackers break in, and how to keep them out.
Please register to benefit from extra features and our simulated security challenges.




Latest Features:

Latest Challenges:

Stegano 27 by Euforia33.
Stegano 26 by Euforia33.
Stegano 25 by Euforia33.
Application 17 by 4rm4g3dd0n.

Information:



: : Website News : :

A few HBH Updates

We have pushed some fixes out to some of the broken challenges.

Real7 is now back online!

Please check the status page before asking if a challenge is down.

We will have some big news about HBH coming soon, If you want to help out with beta testing this big news please let rex_mundi know so we can add you to the list.

Any EM members are already on the list :)


If you have questions about this big news feel free to post them in the following thread.

~ Mordak

Forward Secrecy & Strict Transport Security

Today we implemented Forward Secrecy in order to improve the security and privacy of HBH. Forward Secrecy "should" make it "impossible" to eavesdrop on data being transmitted from your browser to HBH's servers. We also have Strict Transport Security enabled.

You can check the report on our SSL here. The SSL report is provided by Qualys SSL Labs

Also we have updated PHP so a few page may be offline, if you find any please report them here.

We have also updated the Development page so you can all see what we are working on and things we would like to do. Feel free to post your thoughts on the current projects.

Also we have updated the Change Log to reflect these changes.

Points for Creating Challenges & Points for Hall of Fame entries have been returned to the accounts that lost them.

Ranking System Changes

Since the points reset, We have had a lot of complaints about administrators being in the top ten on the rankings page. The current Admin staff have been here for a while and had already completed the challenges BUT to keep everyone happy, Administrators will no longer be included in the points rankings and will be unranked in their profiles.

On another note Real 15 IS up and running fine.

UPDATE: Real 9 an 10 are also now back up.

korg

Changes to HBH

All Members Read This!

There has been a few changes to HBH over the past few weeks. Here are a list of changes and some reason why:

We have removed the old database tables and reset the points. This is due to old and corrupted accounts and no way for other members to get on the score board, Points cannot and will not be reinstated. We have also removed user accounts that haven\'t logged in in over a year.

We have two new staff members Euforia33 & rex_mundi they have been a great help to HBH over the years!

We also have improved the forum and replaced some old code which should make things faster.

Thanks

HBH Staff

PHP Upgrade and New Challenges

Due to the recent upgrade in the PHP on the server, Some pages may not display properly and a few challenges will be offline. Basic 26, Real 7, 9 Will be Offline till I get them recoded.

Realistic 17 is back up and running.

On the other hand, The Application page is completely redone to make it easier to submit your answers.

I\'m going to upload a few new challenges to keep everyone occupied while I work on the site.

Any bugs you see please submit them, Any Vulnerabilities Pm me them directly.

UPDATE: Application 17 by 4rm4g3dd0n released today.

UPDATED UPDATE: Stegano 25, 26 and 27 by Euforia33 released also!

UPDATED UPDATE UPDATE: Mordak has bought HBH a proper SSL Cert.

UPDATED UPDATED UPDATE UPDATE: HBH Change log is now active.

korg

: : Computer News : :

Pavel Sitnikov arrested for sharing malware source code

Russian authorities have detained earlier this month a popular figure on the Russian hacking scene on charges of distributing malicious software via his Telegram channel.

Pavel Sitnikov, known primarily for operating the now-suspended @Flatl1ne Twitter account and the Freedom F0x Telegram channel, was raided by law enforcement officials on May 20 at his home in the town of Velikiye Luki, in the Pskov region in Eastern Russia.

He was charged the next day under Article 273, Part 2 of Russian criminal law, and forbidden to leave the town or use any electronic devices until his trial.

Sources close to Sitnikov have told Recorded Future analysts that the Russian hacker was allegedly charged for posting the source code of the Anubis banking trojan on Freedom F0x, a Telegram channel where Sitnikov often posted data leaks and malware source code under the pretense of helping the security community.

But in a video interview with Russian news site Readovka, which first reported on the arrest, Sonia Sitnikov, the suspects wife, claimed the arrest was actually related to a post her husband made on December 9, last year, when he shared a download link to the personal data of more than 300,000 COVID-19 patients that registered with the Moscow Department of Health.

The data, which contained names, phone numbers, addresses, and COVID-19 status, sparked an outcry at the time, but Moscow officials eventually confirmed that the leak occurred because of a human error and not because of a malicious intrusion.

Nevertheless, despite high-ranking officials admitting their mistake, Sitnikovs wife believes the investigation and the Anubis-related charges are payback for publicizing the leak last December.

In an interview with The Record last year, Sitnikov touched on the sensitive nature of leaking data from Russian companies, such as banks, and the reason he did it.

This data is obtained either from the banks themselves, or fraudulently by various cybercriminal groups or researchers. Either sold or leaked publicly. As long as the knowledge about the leak is hidden and not publicized, people affected by the leak continue to suffer. As soon as it is announced, the most important thing is that at least for the moment those who are mentioned in the leak think about their security.

Sitnikov, who at one point claimed to have connections to Russian state-sponsored hacking group APT28 (Fancy Bear), has a long and muddled history on the cybercrime underground.

A member of multiple underground hacking communities, Sitnikov previously sold and shared the source code of multiple malware strains, such as Carberp, Dexter, Alina, Rovnix, and Tinba; hence the reason why the recent charges did not surprise those who followed his past activity.

Under Article 273, Part 2 of Russian criminal law, Sitnikov risks up to five years in prison.

Consensual Cookies: When No Really Means Yes.

One of the most visible manifestations of the EU General Data Protection Regulations (GDPR) is the cookie banner that pops up when you visit many sites for the first time. These are designed to give visitors the opportunity to decide whether they want to be tracked, and if so by whom.

Any business operating Internet sites in the EU should theoretically use them or something similar, or risk a GDPR fine of up to 4% of global turnover. Cookie banners may be tiresome, but at least they give users some measure of control over how much they are tracked online. But do they?

Malicious Python libraries discovered in repo

Two Python libraries containing malicious code were recently removed from the Python Package Index (PyPI), Pythons official repository for third-party packages.

It is the latest incarnation of a problem faced by many modern software development communities, raising an important question for all developers who rely on open source software: How can you make it possible for people to contribute their own code to a common repository for re-use, without those repos becoming vectors for attacks?

By and large, the official third-party library repositories for languages run as open source projects, like Python, are safe. But malicious versions of a library can spread quickly if unchecked. And the fact that most such language repositories are overseen by volunteers means that only so many eyes are on the lookout and contributions do not always get the scrutiny needed.

A Fatal Exception.

Alright HBH its time for a shameless plug for our very own ynori7, long time member and former admin, who has recently published a novel, A Fatal Exception, that includes a lot of security and hacking-related content and additionally a fair bit of IT-related humor. And is available in ebook and paperback format here: https://www.amazon.com/dp/B07TV8MLHR

It is a great story which catches you straight from the get-go with its witty humor and unusual protagonist, the cheeky android detective Seven Sinclair. With its fun humor, fast-paced mystery, and unusually accurate technical details which you can even learn from, A Fatal Exception is definitely worth checking out.

You can also find more information and updates on his author page here: https://www.scottfinlayauthor.com/

----------

New Mirai Uses 18 Exploits to Target IoT Devices

Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices, including set-top boxes, smart home controllers and even software-defined wide-area networking equipment.

Samples of the latest version of the botnet virus, which was first discovered in 2016, were initially disclosed in a blog post published by Palo Alto Networks. Researchers suggested that cybercriminals working with the Linux open-source operating system are trying to take over an increasingly wide range of IoT devices and use them to run distributed denial-of-service (DDoS) attacks. Eight of the exploits in the latest Mirai malware variant are new, the researchers added.

Cisco: Patch routers now against massive security hole.

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical flaw that remote attackers can exploit to break into a network.

 The vulnerability allows any attacker with any browser to execute code of their choice via the web interface used for managing Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router.

The networking giant has assigned the bug, tagged as CVE-2019-1663, with a severity score of 9.8 out of a possible 10 under the Common Vulnerability Scoring System (CVSS).

More Play Store Apps Found To Be Malware

As many as 13 games available to download in the Google Play Store were actually Android malware and downloaded more than 560,000 times.

The apps, listed as car and truck simulators and racing games, are no longer on the store, after an Android security researcher found that the games were just a cover to download malware in the background.

A Google spokesperson confirmed the apps were removed from the store.  Providing a safe and secure experience for our users is our top priority. We appreciate the researchers report and their efforts to help make Google Play more secure. The apps violated our policies and have been removed from the Play Store.

The apps all came from a developer named Luiz O Pinto. A page on app discovery portal Softonic lists all the apps the researcher says were infecting users and that Google has since removed. On that site, every app lists zero downloads.

But, if the 560,000 installs is an accurate number, this is one of the biggest breaches the Google Play Store has experienced.