<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Second Life Avatars To Be United With Cross Site Scripting Exploits &#8211; Again???</title>
	<atom:link href="http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/feed" rel="self" type="application/rss+xml" />
	<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html</link>
	<description>Always Fairly Unbalanced</description>
	<lastBuildDate>Tue, 04 Oct 2016 13:18:56 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: Say It Ain’t So, D3adly &#8212; Avatars United Takes A Hit, Yet Again &#124; The Alphaville Herald</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-59787</link>
		<dc:creator>Say It Ain’t So, D3adly &#8212; Avatars United Takes A Hit, Yet Again &#124; The Alphaville Herald</dc:creator>
		<pubDate>Sun, 23 May 2010 21:48:49 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-59787</guid>
		<description>[...] in February, Alphaville Herald had reported on the security holes of this newfangled social networking site for avatars. Some residents even questioned the necessity [...]</description>
		<content:encoded><![CDATA[<p>[...] in February, Alphaville Herald had reported on the security holes of this newfangled social networking site for avatars. Some residents even questioned the necessity [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymous</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-306</link>
		<dc:creator>Anonymous</dc:creator>
		<pubDate>Fri, 19 Feb 2010 21:48:20 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-306</guid>
		<description>Meh, these guys need a pen tester for srs son.

Another one (reflected, not persistent XSS):
&lt;a href=&quot;http://www.avatarsunited.com//utility/render_popup?locals[token_url]=%22%3e%3c%2f%69%66%72%61%6d%65%3e%3c%53%63%52%69%50%54%3e%61%6c%65%72%74%28%22%48%41%49%20%44%41%52%22%29%3c%2f%53%63%52%49%70%54%3e%3c%61%20%68%72%65%66%3d%22&amp;partial=%2Fshared%2Frpx&quot; rel=&quot;nofollow&quot;&gt;http://www.avatarsunited.com//utility/render_popup?locals[token_url]=%22%3e%3c%2f%69%66%72%61%6d%65%3e%3c%53%63%52%69%50%54%3e%61%6c%65%72%74%28%22%48%41%49%20%44%41%52%22%29%3c%2f%53%63%52%49%70%54%3e%3c%61%20%68%72%65%66%3d%22&amp;partial=%2Fshared%2Frpx&lt;/a&gt;


Also, nice cross domains xml. These guys have a trusted host relationship with meebo.com. Weird eh?







</description>
		<content:encoded><![CDATA[<p>Meh, these guys need a pen tester for srs son.</p>
<p>Another one (reflected, not persistent XSS):<br />
<a href="http://www.avatarsunited.com//utility/render_popup?locals[token_url]=%22%3e%3c%2f%69%66%72%61%6d%65%3e%3c%53%63%52%69%50%54%3e%61%6c%65%72%74%28%22%48%41%49%20%44%41%52%22%29%3c%2f%53%63%52%49%70%54%3e%3c%61%20%68%72%65%66%3d%22&#038;partial=%2Fshared%2Frpx" rel="nofollow">http://www.avatarsunited.com//utility/render_popup?localstoken_url=%22%3e%3c%2f%69%66%72%61%6d%65%3e%3c%53%63%52%69%50%54%3e%61%6c%65%72%74%28%22%48%41%49%20%44%41%52%22%29%3c%2f%53%63%52%49%70%54%3e%3c%61%20%68%72%65%66%3d%22&#038;partial=%2Fshared%2Frpx</a></p>
<p>Also, nice cross domains xml. These guys have a trusted host relationship with meebo.com. Weird eh?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: isoz</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-305</link>
		<dc:creator>isoz</dc:creator>
		<pubDate>Thu, 18 Feb 2010 00:36:25 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-305</guid>
		<description>&quot;Hi isoz,

thanks again for finding these vulnerabilities and reporting them to us.

We&#039;ve deployed new versions of the apps that had the XSS vulnerabilities.

Please do let us know if should you find other security related issues!


Regards,...&quot;

&lt;&lt;&lt; SURE! &lt;

The exploits shown in the videos are now &#039;Fixed&#039;...Guess they been reading the blog.. lol Theres more exploits on the &#039;Groups&#039; and others, which ill keep secret for now...

deadlycodec mind sharing contact details? if so send it to isoz@null.net, thx!
</description>
		<content:encoded><![CDATA[<p>&#8220;Hi isoz,</p>
<p>thanks again for finding these vulnerabilities and reporting them to us.</p>
<p>We&#8217;ve deployed new versions of the apps that had the XSS vulnerabilities.</p>
<p>Please do let us know if should you find other security related issues!</p>
<p>Regards,&#8230;&#8221;</p>
<p>< << SURE! <</p>
<p>The exploits shown in the videos are now 'Fixed'...Guess they been reading the blog.. lol Theres more exploits on the 'Groups' and others, which ill keep secret for now...</p>
<p>deadlycodec mind sharing contact details? if so send it to <a href="mailto:isoz@null.net">isoz@null.net, thx!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: deadlycodec</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-304</link>
		<dc:creator>deadlycodec</dc:creator>
		<pubDate>Wed, 17 Feb 2010 09:38:02 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-304</guid>
		<description>BTW, that&#039;s pretty impressive haxin there. Wouldn&#039;t have thought they would introduce such a gaping hole, but they&#039;re always in places where people are far less likely to look. Good job on finding that.
</description>
		<content:encoded><![CDATA[<p>BTW, that&#8217;s pretty impressive haxin there. Wouldn&#8217;t have thought they would introduce such a gaping hole, but they&#8217;re always in places where people are far less likely to look. Good job on finding that.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: deadlycodec</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-303</link>
		<dc:creator>deadlycodec</dc:creator>
		<pubDate>Wed, 17 Feb 2010 09:36:16 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-303</guid>
		<description>&quot;deadly... &quot;Kevin Mitnick&quot; ... hmm right lol :3 he got hacked several times last year...&quot;

Could be wrong, but I believe it was actually his phone company that got hacked several times, because they were only using 4 digit pins for authentication which means there was only a few thousand possible combinations. The company actually terminated his account because hackers kept targeting him. Even if I&#039;m wrong, even the best can be hacked. Pit the minds of thousands of ambitious hackers against a single mind, and even great minds like Mitnick&#039;s won&#039;t match up. A lot of hackers targeted him because he was so famous, and for a hacker, being able to say &#039;I owned mitnick&#039; was (still is in many circles) pretty leet. But it&#039;s always easier to break into computers than it is to secure them. With the latter, you have to take every possibility into account. With the former, you only need to find a single solitary weakpoint.

&quot;Completely agree with that comment, they are a company being paid to support and secure the site...If they can&#039;t do it then GTFO... I&#039;m not giving them my knowledge for free... In the end of the day, they are happy and getting paid for my work...&quot;

Depends on whether you hack with profit in mind, or you genuinely enjoy doing it. Another thing, there is a reason why some companies hand out free samples - it&#039;s a great marketing tactic, and keeps everyone happy. They might be standoffish, but the next time they have a security problem, they&#039;ll prob think of you. You&#039;ll be more likely to get business that way. If you get arrested and convicted of computer crimes, no one will ever pay you to do security work.

Just trying to give you some friendly advice.


</description>
		<content:encoded><![CDATA[<p>&#8220;deadly&#8230; &#8220;Kevin Mitnick&#8221; &#8230; hmm right lol :3 he got hacked several times last year&#8230;&#8221;</p>
<p>Could be wrong, but I believe it was actually his phone company that got hacked several times, because they were only using 4 digit pins for authentication which means there was only a few thousand possible combinations. The company actually terminated his account because hackers kept targeting him. Even if I&#8217;m wrong, even the best can be hacked. Pit the minds of thousands of ambitious hackers against a single mind, and even great minds like Mitnick&#8217;s won&#8217;t match up. A lot of hackers targeted him because he was so famous, and for a hacker, being able to say &#8216;I owned mitnick&#8217; was (still is in many circles) pretty leet. But it&#8217;s always easier to break into computers than it is to secure them. With the latter, you have to take every possibility into account. With the former, you only need to find a single solitary weakpoint.</p>
<p>&#8220;Completely agree with that comment, they are a company being paid to support and secure the site&#8230;If they can&#8217;t do it then GTFO&#8230; I&#8217;m not giving them my knowledge for free&#8230; In the end of the day, they are happy and getting paid for my work&#8230;&#8221;</p>
<p>Depends on whether you hack with profit in mind, or you genuinely enjoy doing it. Another thing, there is a reason why some companies hand out free samples &#8211; it&#8217;s a great marketing tactic, and keeps everyone happy. They might be standoffish, but the next time they have a security problem, they&#8217;ll prob think of you. You&#8217;ll be more likely to get business that way. If you get arrested and convicted of computer crimes, no one will ever pay you to do security work.</p>
<p>Just trying to give you some friendly advice.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: isoz</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-302</link>
		<dc:creator>isoz</dc:creator>
		<pubDate>Tue, 16 Feb 2010 18:53:29 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-302</guid>
		<description>deadly... &quot;Kevin Mitnick&quot; ... hmm right lol :3 he got hacked several times last year...

The worst in the hacking scenario is that people don&#039;t understand you... they think we/I am a criminal for being curious about how things work, and to take the challenge to break-in something, not to steal data, but to test myself into it.

People only hear what the Media tell them...

&quot;&gt;Please continue to function as an unpaid security consultant to our company.&quot;

Completely agree with that comment, they are a company being paid to support and secure the site...If they can&#039;t do it then GTFO... I&#039;m not giving them my knowledge for free... In the end of the day, they are happy and getting paid for my work...


By the way theres a new video.. me uploading an .html file into the profile picture... it accepts several extensions, such as PHP.

&lt;a href=&quot;http://vimeo.com/9485913&quot; rel=&quot;nofollow&quot;&gt;http://vimeo.com/9485913&lt;/a&gt;
</description>
		<content:encoded><![CDATA[<p>deadly&#8230; &#8220;Kevin Mitnick&#8221; &#8230; hmm right lol :3 he got hacked several times last year&#8230;</p>
<p>The worst in the hacking scenario is that people don&#8217;t understand you&#8230; they think we/I am a criminal for being curious about how things work, and to take the challenge to break-in something, not to steal data, but to test myself into it.</p>
<p>People only hear what the Media tell them&#8230;</p>
<p>&#8220;>Please continue to function as an unpaid security consultant to our company.&#8221;</p>
<p>Completely agree with that comment, they are a company being paid to support and secure the site&#8230;If they can&#8217;t do it then GTFO&#8230; I&#8217;m not giving them my knowledge for free&#8230; In the end of the day, they are happy and getting paid for my work&#8230;</p>
<p>By the way theres a new video.. me uploading an .html file into the profile picture&#8230; it accepts several extensions, such as PHP.</p>
<p><a href="http://vimeo.com/9485913" rel="nofollow">http://vimeo.com/9485913</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: deadlycodec</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-301</link>
		<dc:creator>deadlycodec</dc:creator>
		<pubDate>Tue, 16 Feb 2010 13:07:34 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-301</guid>
		<description>&quot;Start checking setuid binaries for bof, if you can nab passwords from server configs, break the encryption if they&#039;re encrypted, rule of password re-use. They might just have a privileged account using the same password. More common than I had thought that first.&quot;

Just want to clarify that I am not encouraging computer crime here. Was talking about procedures for escalation after getting a shell. IMO you should uninstall that and report the vulnerability. If you&#039;re in the US, and they can track you, they&#039;re prob going to prosecute you. Not worth the trouble, and you can get more cred (and maybe a career) by reporting vulns, instead of using them for nefarious ends. These days, convicted blackhats seldom find work in the security community, with the most recent exception being Kevin Mitnick. I guess you could say Max Vision too, but he was getting $100/hr before he got convicted and sent to prison for 18 months for breaking into the Pentagon and other various computer systems. After he got out, he begged and begged for work, and was completely destitute. Later, someone did give him work, for minimum wage in SoCal of all places. He ended up getting involved in this credit card scam with some guys he met in prison and now he&#039;s going away for 13 years with a fine in excess of $25 million. His life is basically ruined, and he&#039;s a shining example for us as to just how broken our system is. The guy is a victim of the system. The punishment didn&#039;t fit the crime, and it seldom does these days.

Hacking is fascinating, and I, of all people, can understand how difficult it can be to learn at a certain point, without being able to experiment in &#039;real-world&#039; scenarios. This is a common problem during the evolution of a hacker, and sadly, it&#039;s where many end up getting into trouble.

Whatever you do though, just don&#039;t damage anything or do anything malicious. Keep a clear conscience.
</description>
		<content:encoded><![CDATA[<p>&#8220;Start checking setuid binaries for bof, if you can nab passwords from server configs, break the encryption if they&#8217;re encrypted, rule of password re-use. They might just have a privileged account using the same password. More common than I had thought that first.&#8221;</p>
<p>Just want to clarify that I am not encouraging computer crime here. Was talking about procedures for escalation after getting a shell. IMO you should uninstall that and report the vulnerability. If you&#8217;re in the US, and they can track you, they&#8217;re prob going to prosecute you. Not worth the trouble, and you can get more cred (and maybe a career) by reporting vulns, instead of using them for nefarious ends. These days, convicted blackhats seldom find work in the security community, with the most recent exception being Kevin Mitnick. I guess you could say Max Vision too, but he was getting $100/hr before he got convicted and sent to prison for 18 months for breaking into the Pentagon and other various computer systems. After he got out, he begged and begged for work, and was completely destitute. Later, someone did give him work, for minimum wage in SoCal of all places. He ended up getting involved in this credit card scam with some guys he met in prison and now he&#8217;s going away for 13 years with a fine in excess of $25 million. His life is basically ruined, and he&#8217;s a shining example for us as to just how broken our system is. The guy is a victim of the system. The punishment didn&#8217;t fit the crime, and it seldom does these days.</p>
<p>Hacking is fascinating, and I, of all people, can understand how difficult it can be to learn at a certain point, without being able to experiment in &#8216;real-world&#8217; scenarios. This is a common problem during the evolution of a hacker, and sadly, it&#8217;s where many end up getting into trouble.</p>
<p>Whatever you do though, just don&#8217;t damage anything or do anything malicious. Keep a clear conscience.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: At0m0 Beerbaum</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-300</link>
		<dc:creator>At0m0 Beerbaum</dc:creator>
		<pubDate>Tue, 16 Feb 2010 10:58:51 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-300</guid>
		<description>very few companies write code with security in mind. They just write it as to get it up and working quickly, security and efficiency be damned. Just look at SL.
</description>
		<content:encoded><![CDATA[<p>very few companies write code with security in mind. They just write it as to get it up and working quickly, security and efficiency be damned. Just look at SL.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: deadlycodec</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-299</link>
		<dc:creator>deadlycodec</dc:creator>
		<pubDate>Mon, 15 Feb 2010 21:25:22 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-299</guid>
		<description>@isoz

File inclusion eh? Or code injection? Assuming file inclusion, as that&#039;s one of the most common means for installing PHP shells. Yeah, they&#039;re pretty insecure if you&#039;re able to use that. Man, I set my disable_functions directive in php.ini to disable most php functions that can be used to interact with the underlying OS....keep those open and someone finds a code injection vuln or file inclusion, and you&#039;re owned. After that escalating to root isn&#039;t difficult in most situations. Start checking setuid binaries for bof, if you can nab passwords from server configs, break the encryption if they&#039;re encrypted, rule of password re-use. They might just have a privileged account using the same password. More common than I had thought that first.

Yeah RFI is still pretty common and SQLi is going to become even more common because certain functions for filtering input are going to be removed in PHP 6.

&gt;Please continue to function as an unpaid security consultant to our company.

Nothing wrong with that if you enjoy doing it. God knows I do it, when I have the time &lt;3. Hell, I found some XSS vulns in typepad awhile back. It doesn&#039;t effect blogs using typepad, just their domain. Might have been the sixapart domain. I&#039;ll see if I can dig up the details and send them to Pix in the next week or two, if she wants them. Busy right now working on my server, when I&#039;m not too tired to use a computer.
</description>
		<content:encoded><![CDATA[<p>@isoz</p>
<p>File inclusion eh? Or code injection? Assuming file inclusion, as that&#8217;s one of the most common means for installing PHP shells. Yeah, they&#8217;re pretty insecure if you&#8217;re able to use that. Man, I set my disable_functions directive in php.ini to disable most php functions that can be used to interact with the underlying OS&#8230;.keep those open and someone finds a code injection vuln or file inclusion, and you&#8217;re owned. After that escalating to root isn&#8217;t difficult in most situations. Start checking setuid binaries for bof, if you can nab passwords from server configs, break the encryption if they&#8217;re encrypted, rule of password re-use. They might just have a privileged account using the same password. More common than I had thought that first.</p>
<p>Yeah RFI is still pretty common and SQLi is going to become even more common because certain functions for filtering input are going to be removed in PHP 6.</p>
<p>>Please continue to function as an unpaid security consultant to our company.</p>
<p>Nothing wrong with that if you enjoy doing it. God knows I do it, when I have the time &lt;3. Hell, I found some XSS vulns in typepad awhile back. It doesn&#8217;t effect blogs using typepad, just their domain. Might have been the sixapart domain. I&#8217;ll see if I can dig up the details and send them to Pix in the next week or two, if she wants them. Busy right now working on my server, when I&#8217;m not too tired to use a computer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: isoz</title>
		<link>http://alphavilleherald.com/2010/02/second-life-avatars-to-be-united-with-cross-site-scripting-exploits.html/comment-page-1#comment-298</link>
		<dc:creator>isoz</dc:creator>
		<pubDate>Mon, 15 Feb 2010 13:42:36 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=20#comment-298</guid>
		<description>Lol deadlycodec, you would find much funnier the php shell I got on AU :D

&#039;SQL DUMP&#039; NAW?
</description>
		<content:encoded><![CDATA[<p>Lol deadlycodec, you would find much funnier the php shell I got on AU <img src='http://alphavilleherald.com/site/wp-includes/images/smilies/icon_biggrin.gif' alt=':D' class='wp-smiley' /> </p>
<p>&#8216;SQL DUMP&#8217; NAW?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

