Jump to content

IOS share going down while Android is Surging ahead in US!!!


Recommended Posts

  • Replies 78
  • Created
  • Last Reply

Top Posters In This Topic

  • bhrami

    23

  • krldr871

    20

  • Deletedid1

    19

  • Ara Gundu

    15

Popular Days

Top Posters In This Topic

Posted

duvva aka ara gundu vaste bavuntadi  sAni_monkey sAni_monkey sAni_monkey

Posted

[quote author=bhrami link=topic=95904.msg1021503#msg1021503 date=1283634375]
then go for Range rover baa, nuvu chepina dagara nuchi nenu tivramaga tempt avuthunaaa kakapothe koncham price ekuva vundhi  sCo_hmmthink sCo_hmmthink
[/quote]

aite pada baa...iddaram kalisi kondam.................iddaru konte discount istademo........... sSc_hiding2 sSc_hiding2  mee chantily lo ne undi show room kuda

Posted

[quote author=Leader871 link=topic=95904.msg1021508#msg1021508 date=1283634507]
duvva aka ara gundu vaste bavuntadi  sAni_monkey sAni_monkey sAni_monkey
[/quote]
ante memu vunte baledhaaa  Dr@w@ Dr@w@ Dr@w@

Posted

[quote author=Leader871 link=topic=95904.msg1021508#msg1021508 date=1283634507]
duvva aka ara gundu vaste bavuntadi  sAni_monkey sAni_monkey sAni_monkey
[/quote *7*^ *7*^ *7*^

Posted

[b][size=12pt]SSL Hack based on null character in X.509 Certificates[/size][/b]

Two researchers examining the processes for issuing web certificates have uncovered vulnerabilities that would allow an attacker to masquerade as any website and trick a computer user into providing him with sensitive communications.

Normally when a user visits a secure website, such as Bank of America, PayPal or Ebay, the browser examines the website’s certificate to verify its authenticity.

However, IOActive researcher Dan Kaminsky and independent researcher Moxie Marlinspike, working separately, presented nearly identical findings in separate talks at the Black Hat security conference on Wednesday. Each showed how an attacker can legitimately obtain a certificate with a special character in the domain name that would fool nearly all popular browsers into believing an attacker is whichever site he wants to be.

The problem occurs in the way that browsers implement Secure Socket Layer communications.

[b]“This is a vulnerability that would affect every SSL implementation,” Marlinspike told Threat Level, “because almost everybody who has ever tried to implement SSL has made the same mistake.”

Certificates for authenticating SSL communications are obtained through Certificate Authorities (CAs) such as VeriSign and Thawte and are used to initiate a secure channel of communication between the user’s browser and a website. When an attacker who owns his own domain — badguy.com — requests a certificate from the CA, the CA, using contact information from Whois records, sends him an email asking to confirm his ownership of the site. But an attacker can also request a certificate for a subdomain of his site, such as Paypal.com\0.badguy.com, using the null character \0 in the URL.

The CA will issue the certificate for a domain like PayPal.com\0.badguy.com because the hacker legitimately owns the root domain badguy.com.

Then, due to a flaw found in the way SSL is implemented in many browsers, Firefox and others theoretically can be fooled into reading his certificate as if it were one that came from the authentic PayPal site. Basically when these vulnerable browsers check the domain name contained in the attacker’s certificate, they stop reading any characters that follow the “\0″ in the name.

More significantly, an attacker can also register a wildcard domain, such as *\0.badguy.com, which would then give him a certificate that would allow him to masquerade as any site on the internet and intercept communication.
[/b]
Marlinspike said he will be releasing a tool soon that automates this interception.

It’s an upgrade to a tool he released a few years ago called SSLSniff. The tool sniffs traffic going to secure web sites that have an https URL in order to conduct a man-in-the-middle attack. The user’s browser examines the attacker’s certificate sent by SSLSniff, believes the attacker is the legitimate site and begins sending data, such as log-in information, credit card and banking details or any other data through the attacker to the legitimate site. The attacker sees the data unencrypted.

A similar man-in-the-middle attack would allow someone to hi-jack software updates for Firefox or any other application that uses Mozilla’s update library. When the user’s computer initiates a search for a Firefox upgrade, SSLSniff intercepts the search and can send back malicious code that is automatically launched on the user’s computer.

Marlinspike said Firefox 3.5 is not vulnerable to this attack and that Mozilla is working on patches for 3.0.

With regard to the larger problem involving the null character, Marlinspike said since there is no legitimate reason for a null character to be in a domain name, it’s a mystery why Certificate Authorities accept them in a name. But simply stopping Certificate Authorities from issuing certificates to domains with a null character wouldn’t stop the ones that have already been issued from working. The only solution is for vendors to fix their SSL implementation so that they read the full domain name, including the letters after the null character.



Read More [url=http://www.wired.com/threatlevel/2009/07/kaminsky/#ixzz0yb64uxoa]http://www.wired.com/threatlevel/2009/07/kaminsky/#ixzz0yb64uxoa[/url]

Posted

[quote author=bhrami link=topic=95904.msg1021511#msg1021511 date=1283634566]
ante memu vunte baledhaaa  Dr@w@ Dr@w@ Dr@w@
[/quote]
disco cheyadaniki baa..meedi ee field kaadu kada  sSc_hiding2 sSc_hiding2

Posted

[quote author=Leader871 link=topic=95904.msg1021517#msg1021517 date=1283634754]
disco cheyadaniki baa..meedi ee field kaadu kada  sSc_hiding2 sSc_hiding2
[/quote]
andhukee general topic ayn rand nuchi oka quote pedithe disco cheyochu, miridharu chatting sesukochu kada  Dr@w@ Dr@w@ idarikeee ayithe disco endhuku

Posted

[quote author=bhrami link=topic=95904.msg1021523#msg1021523 date=1283635025]
andhukee general topic ayn rand nuchi oka quote pedithe disco cheyochu, miridharu chatting sesukochu kada  Dr@w@ Dr@w@ idarikeee ayithe disco endhuku
[/quote]
memu ikkada disco chestene effect untadi baa..for example memu maaku telisina simple vishayanne high level lo build up istu disco cheste meeku inferior ga anipistadi..though it is not related to ur field..so aa effect kosame ikkada disco cheyalani fix ayya  @3$% @3$% @3$%  sSc_hiding2

Posted

[quote author=BENZBABU link=topic=95904.msg1021510#msg1021510 date=1283634563]
aite pada baa...iddaram kalisi kondam.................iddaru konte discount istademo........... sSc_hiding2 sSc_hiding2  mee chantily lo ne undi show room kuda
[/quote]
Kothadaaa rape ayipotam baa, na bmw load next april ki avuthundhi apudu shop setha,  eee lopulo nuvu koni reveiw ivvu  sAni_monkey3 sAni_monkey3

Posted

[quote author=bhrami link=topic=95904.msg1021523#msg1021523 date=1283635025]
andhukee general topic [color=red]ayn rand[/color] nuchi oka quote pedithe disco cheyochu, miridharu chatting sesukochu kada  Dr@w@ Dr@w@ idarikeee ayithe disco endhuku
[/quote] sSc_hiding2 sSc_hiding2

Posted

leader baa...and brahmi maama.....sitti ee roju online ki vastada...

Posted

[quote author=Leader871 link=topic=95904.msg1021529#msg1021529 date=1283635199]
memu ikkada disco chestene effect untadi baa..for example memu maaku telisina simple vishayanne high level lo build up istu disco cheste meeku inferior ga anipistadi..though it is not related to ur field..so aa effect kosame ikkada disco cheyalani fix ayya  @3$% @3$% @3$%  sSc_hiding2
[/quote]

edisav............... *7*^ *7*^ los@r

Posted

[quote author=bongule link=topic=95904.msg1021532#msg1021532 date=1283635258]
leader baa...and brahmi maama.....sitti ee roju online ki vastada...
[/quote]
ippudu busy anta..vasta annadu kasepu aagi..enduku baa emanna pirated windows lantivi kaavala  @3$% @3$%

Posted

[quote author=BENZBABU link=topic=95904.msg1021534#msg1021534 date=1283635293]
edisav............... *7*^ *7*^ los@r
[/quote]
LoL.1q LoL.1q LoL.1q

×
×
  • Create New...