Facebook hack or application

Discussion in 'Ethical hacking' started by shabbir, Mar 6, 2009.

  1. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,375
    Likes Received:
    388
    Trophy Points:
    83
    Is there any Facebook hack or application to know who viewed your profile?

    :D
     
  2. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    I don't think that's possible unless it's released by facebook themselves.
     
  3. indiansword

    indiansword Security Expert

    Joined:
    Oct 19, 2008
    Messages:
    491
    Likes Received:
    37
    Trophy Points:
    0
    Occupation:
    Operation Planner for 3 Australia
    Home Page:
    http://www.Secworm.net
    i agree
     
  4. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    There is a bunch of vulnerabilities that some still is and some was useful that you can or could use on the website but I haven't seen any that can actually gain admin rights on the server, the ssh port 22 is open but what are the odds of cracking in there unless you know the username of the ssh server that is a valid admin/root user. There should be ways and if there isn't yet then there will eventually be, but those methods will just be countered with security patches and stuff like that.
     
  5. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    Why would you even run a port scan on facebook? I hope you went through a proxy.
    I don't think this is what the original post was about. It was about a "hack" to be able to see who viewed your profile.
     
  6. indiansword

    indiansword Security Expert

    Joined:
    Oct 19, 2008
    Messages:
    491
    Likes Received:
    37
    Trophy Points:
    0
    Occupation:
    Operation Planner for 3 Australia
    Home Page:
    http://www.Secworm.net
    huh?
     
  7. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    Exactly my thoughts. lol
     
  8. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    I did not use a proxy as there is no need, and facebook hack can mean anything from hacking the actual server or the website. I prefer to play around with the server but as I said the only possible way I can see that a person will successfully gain access to the server is called smashing the stack. About seeing who checked your profile and how often I don't believe there is a app for that, so if your thoughts for that is huh? then go do some reading. I was only discussing it more in depth.
     
  9. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    First, there is a need for a proxy, even if you don't intend to break in. Think of it like you going to your local government branch after closing and trying all the doors and rattling all the windows. It doesn't matter if you don't intend to get in, the people watching the security tapes will still take you for a thief.
    lol the terminology of "smashing the stack" isn't used much except in literature, like the original publication that first notified the public of the concept, titled "Smashing the Stack for Fun and Profit". Most hackers just call it a buffer overflow. And no, not all exploits/vulnerabilities depend on buffer overflows. Many don't.
    nice way to talk to the admin.
    There can't be an app unless facebook admins grant it access to their logs.
     
  10. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    Fisrt off, I wasnt talikng to the admin as I have great respect for shabbir, secondly buffer overflow or smashing the stack causes a program to crash or operate incorrectly, the aim is then to inject executable code into the running program and then to try and take control of the process. It is a very old method but it still works on some systems. All I meant by that is to try that with the facebook server which is very dangerous in my eyes as you are very likely to get caught. I hope you understand me now?
     
  11. indiansword

    indiansword Security Expert

    Joined:
    Oct 19, 2008
    Messages:
    491
    Likes Received:
    37
    Trophy Points:
    0
    Occupation:
    Operation Planner for 3 Australia
    Home Page:
    http://www.Secworm.net
    i've haerd some XSS bug which was fixed real quick by facebook guyz, it was the same bug found in orkut it was something as follows:

    inserting malicious javascript into the "captions" of your pitcure
     
  12. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    :p The aim isn't to inject executable code into the program. It's to overwrite a pointer/return address on the runtime stack so that it points to the memory address where your instructions are stored, so when the program pops its last method/function off the stack, it returns to your instructions and executes them instead of returning to where the method was called from.
    Most buffer overflows are used for local privilege escalation, but every now and then they can be exploited remotely on web applications (like what you're talking about) or other connected programs (like p2p clients or internet browsers). They mostly work on programs that were coded in c/c++.
    You don't try them on servers themselves. You look for them in applications/OS's the servers are running. Finding a site that uses a web application that is vulnerable to buffer overflow is pretty rare, so if you meant hack facebook by buffer overflow on a web application, you can pretty much forget about it. They'll have all their applications updated. If you meant root their server with a buffer overflow, that's more possible, but incredibly stupid to try without taking many precautions first, and not worth the trouble just to see who viewed your profile.
    The best way to hack a social networking site is by using xss/js injections in vectors they haven't thought to filter or social engineer/keylog an admin.

    @indiansword, I remember hearing about that. If I'm correct, it was not even a matter of days before it was fixed, but several hundred thousand accounts were still compromised because of it. I wonder how long it would have gone undetected if whoever found it hadn't made it so obvious.
     
  13. indiansword

    indiansword Security Expert

    Joined:
    Oct 19, 2008
    Messages:
    491
    Likes Received:
    37
    Trophy Points:
    0
    Occupation:
    Operation Planner for 3 Australia
    Home Page:
    http://www.Secworm.net
    the person who found i think was probably new to XSS so experienced users understood it so quickly.

    The founder directly put the script to steal the cookies, instead of that he should have injected an IFRAME and hide the script and steal the cookies with it.

    If he'd have done as i said then he'd have got chance to hack many more accounts and facebook people wouldnt even come to know about it.
     
  14. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
  15. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    I don't see the idea of injecting executable code anywhere in that article. It just says you inject code that is designed to execute code, which is what I said above.
     
  16. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    this is what I qoute from that article: "inject executable code into the running program"

    now I see that as injecting executable code, maybe I have it wrong... Help me on the right path as to what that means please. Don't get me wrong as I came to this site for the purpose of learning.
     
  17. indiansword

    indiansword Security Expert

    Joined:
    Oct 19, 2008
    Messages:
    491
    Likes Received:
    37
    Trophy Points:
    0
    Occupation:
    Operation Planner for 3 Australia
    Home Page:
    http://www.Secworm.net
    I think as far as facebook is concerned there is one more vulnerability in while adding some user as a friend to inject XSS into it. I am not really sure but i think there is some. I m in office so cant open facebook right now.
     
  18. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    I see what you mean. The difference is that while injecting executable code by way of writing past an array can be done, it is not essential to the process, and you still need to overwrite the return address of the current method to point back to that executable code in order for it to run. In general, all you need to do in order to declare a buffer overflow is overwrite that address to point to whatever you want. For instance, you can make it point to code or a shell script you've got somewhere else on the box (assuming the vulnerable program is written in a language like C so it can access any memory address it's pointed to) and you'll still have a working bof exploit. That's why I said injecting executable code wasn't the goal of a buffer overflow. It's just a way of using a buffer overflow, not an essential component of one. Sorry if I wasn't very clear earlier.
     
  19. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
  20. fourthdimension

    fourthdimension New Member

    Joined:
    Jan 8, 2009
    Messages:
    144
    Likes Received:
    11
    Trophy Points:
    0
    Home Page:
    http://www.easygeek.org
    Nice find. December of 08? Not valid anymore. Facebook usually fixes holes within a few days of their discovery.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice