Posted: October 23rd, 2009 | Author: xanda | Filed under: IT Related | Tags: canadian pharmacy, spam, viagra | No Comments »
McAfee Lab Blog in their latest entry said that they saw Balloon Boy spam and what I saw is NOTHING.. 😛




Anyway, both Ballons and NOTHING leading to the same fake “Canadian” pharmacy sites

Posted: October 20th, 2009 | Author: xanda | Filed under: IT Related | Tags: email, honeynet, malware, spam, ssl, zbot | 2 Comments »

Here is my short writeup on the latest ZBot malware..
Nothing much with the malware, but nice trick on the way of spreading it
Link: Honeynet Blog
Posted: October 13th, 2009 | Author: xanda | Filed under: IT Related | Tags: convert, ow.ly bit.ly, ruby, shorten url, tinyurl | 4 Comments »
You might worry to visit directly to a shorten URL because who knows it may contain some malicious script/code
I’ve found a solution “Python: Convert those TinyURL (bit.ly, tinyurl, ow.ly) to full URLS” in stackoverflow.com but the code is in Python.
Here is how you can perform the conversion in Ruby
#!/usr/bin/ruby
require 'net/http'
def ConvertToFull(tinyurl)
url = URI.parse(tinyurl)
host, port = url.host, url.port if url.host && url.port
req = Net::HTTP::Get.new(url.path)
res = Net::HTTP.start(host, port) {|http| http.request(req) }
return res.header['location']
end
puts ConvertToFull('http://bit.ly/rgCbf') #here is how you can call the function. Thank you Captain Obvious! |
#!/usr/bin/ruby
require 'net/http'
def ConvertToFull(tinyurl)
url = URI.parse(tinyurl)
host, port = url.host, url.port if url.host && url.port
req = Net::HTTP::Get.new(url.path)
res = Net::HTTP.start(host, port) {|http| http.request(req) }
return res.header['location']
end
puts ConvertToFull('http://bit.ly/rgCbf') #here is how you can call the function. Thank you Captain Obvious!
**UPDATED on 19/10/2009**
I’ve work on a more complete version which can determine Shorten URL or Full URL and return the full URL for the shorten URL.. email for for the code 😉
Posted: October 9th, 2009 | Author: xanda | Filed under: IT Related | Tags: 2009, crayon, ctf, d3ck4, hitb, hitbsecconf | No Comments »

First of all, congrats to d3ck4, crayon and the team..
Hurm.. HITBSecConf 2009.. Personally, nothing much.. I was disappointed with Mark Dowd and Saumil’s presentation (yeah.. maybe i’m expecting too much) but somehow Wes Brown, METASM and Google’s guy fixed my day..
Enjoy spending some time outside of the office, meeting people (and old friends), (_NOT_ really) learn new stuff..
Anyway.. Itu lah apa yang berlaku..
Posted: October 9th, 2009 | Author: xanda | Filed under: IT Related | Tags: 0day, acrobat, adobe, clientside, CVE-2009-3459, javascript, pdf | No Comments »

Nothing much but YES to agree with Didier Stevens with his statement:
PDF + JS = OMG
Yerp.. there is another vulnerability (CVE-2009-3459) in Adobe Reader and Acrobat today (GMT +8) and so far it is still 0 day..
*panic panic* What to do?
- Disable JavaScript support in Adobe Reader and Acrobat
- Enable DEP (for Windows)
- Use NoScript
- Use alternative PDF reader like Foxit, Gnome Document Viewer, yada yada..
- Don’t be a lame by opening unknown PDF attachment