Advertisement
Guest User

pax

a guest
May 15th, 2011
2,390
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.32 KB | None | 0 0
  1. Me & Cheater presented a Yahoo Self Spreading Worm with an ALIVE XSS attached to it. Our team was called "Screw Tinkode the Skiddie" and we are part of the Romanian Security Team ( rstcenter.com ). We found the XSS hole in the first day of OpenHack ( 10 minutes to find it, 6 hours to craft the injection for filter evasion ) and took us 15 hours to develop the worm. The worm was self spreading via instant messaging on Yahoo Messenger. The contacts were reciving IMs with a link appended to them; if they had opened the malicious web page their cookies had have been stolen and given to the worm. Having new victims, the worm uses their cookies to spread more IMs with malicious content. Besides the automated process, we also had a control panel with the following functions ( all based on cookie authentication and manipulation, no password required ) :
  2.  
  3. - list all the victims by their Yahoo IDs
  4. - log in on a victim's email account
  5. - fetch a victim's contact list
  6. - mass send a message to all of a victim's contacts
  7.  
  8. I didn't have enough time to present the control panel due to weak internet signal.
  9.  
  10. After my incomplete short presentation of the full potential of the worm, in the break between the software and hardware presentation, the Yahoo Jury ( formed by big shot guys ) had a little talk with me and Cheater ;).
  11.  
  12. pax, 2011.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement