After reading this news article by The Register:

I had a thought about how often this is starting to happen – often dumps are released to the public via torrents or other downloads.


We’re not talking about a small number of passwords here either – that’s 6.5 million accounts, were you one of these users?

Now, to the hackers these accounts probably didn’t mean anything because they have no association with these people. But perhaps YOU know someone on this list?

More importantly maybe you know someone who was on this list perhaps?

Before I continue, if you’d like to check if your account has ever been dumped as part of a large hack – you can check here (or if you want to see if your victims/friends has had this fate):

Hmm, I wonder if my friends have been hacked?

Pwned by Pwnedlist?

Moving on, it’s very possible that you or someone you know has had their password leaked in hash form (god forbid cleartext form!). If you’re like most human beings you reuse passwords all over the net and if someone took the time to crack your password hash on the dumped site then they may have a valid password for your other sites!

So this opens up a whole new level of cracking. Anyone could simple take your email and put it into Pwnedlist and check to see if it was leaked at some point. If it was it’d be just a simple derivation of what sites have had leaks compared against sites that the target uses. Chances are the password is reused in many other places across the web!

Even if your target/you haven’t been apart of a dump yet it would be trivial to write a script to check daily for this type of thing. (You can’t use their internal monitoring service because it asks you to verify emails in order to do that.)

Bam, easy (and not to technical) hacking!

Till next time,


So I recently had a thought about how browsers have natural looks to them and what makes people click buttons without thinking.

For example if I was a Vista user I might get annoyed by the constant string of “Do you want to allow this program to make changes to your computer?” dialogues, and will probably heed this warnings less and less every time.

So taking this idea into practice, what other warnings are we very likely to deem “meh” and just click past? What “styles” of access controls do we just trust by default?

Legit Firefox Warning

For example the “Server not found” dialogue is very common to a Firefox user if he uses the browser at all.

So what happens if we just copy the HTML source of this page and modify it slightly?


Looks maybe legit? OK. So not perfect but it looks pretty good right? (Also on a weird note this page was hosting on my server but could reference locally stored browser CSS pages which is neat!)

Of course technical people might not fall for this but I’d be pretty sure that most computer users wouldn’t think twice about this type of thing.

It brings up the question of just how many attacks could leverage this idea – are their any dialogues you trust? Muscle memory “oh that’s a dumb dialogue *click*” can really come back to haunt you in many situations!

I’ll probably revisit this idea later when I can think of more dialogues that can be attacked this way but until then it’s a very interesting idea to consider.


After having a personal interest in DNS tunneling I tried setting up iodine and quickly found out that it’s not a fun process (it involves a user controlled server and some DNS configurations). The idea, however, is definitely super cool.

So what the hell is useful about DNS tunneling?

Many pay for wifi services will block all types of traffic unless you pay an often insane amount. Why would I pay $10.00 for a one day pass for wifi? That’s insanity! DNS tunneling comes in handy here because these services often do not block DNS traffic so you can “hide” your normal traffic in DNS queries and evade their blocks altogether.


In a simplified way, your computer does DNS something like this:

*Your computer checks to see if it has the DNS record in it’s cache…Nope!*

PC -> Root Nameserver: “I need the IP for”

Root Nameserver -> PC: “Ah .com I see. My buddy TLD has that I think, check with him man.”

PC -> TLD: “I need the IP for”

TLD -> PC: “Yea man my friend ‘Authoritative Nameserver’ has that I think!”

PC -> Authoritative Nameserver: “Yea boy I got what you crave! The IP for that is!”

*PC puts that down in it’s cache so it doesn’t have to deal with those ghetto nameservers again*

So that’s how it normally works (granted it may be a little less “ghetto”) but I wonder how it’d work if the wifi service redirected all DNS to it’s own servers?

*Your computer checks to see if it has the DNS record in it’s cache…Nope!*

PC -> Root Namerserver: “What’s the IP for”

*The wifi service intercepts this request and responds with it’s own server*

WIFI SERVER -> PC: “Yes, that IP is *cough* (the WIFI SERVER’S IP)”

*PC thinks this is pretty legit and adds it to it’s cache*

So now when you try to go to your computer will not go to but rather their own server because the computer’s record shows that the IP address is This seems great for the time being but imagine that you do pay for the expensive wifi server and they let you use their precious interweb service.

Now your DNS will work something like this:

*Your computer checks to see if it has the DNS record in it’s cache…Yep! is at*

Uh oh! Now the poor little PC thinks that the domain is at the wrong IP! This will end up confusing the end user for sure! Especially because this IP is probably an internal IP address so it will probably just show a connection error.

Not good, because of this, the pay-for wifi services usually allow DNS requests but modify the TCP/UDP data to redirect your browser to their pay page.

**Good news everyone!


This is good because it means we can communicate with the outside world over DNS! How exciting!

As much as I’d love to have a cute explanation how to hide information in DNS requests suffice to say that it’s possible and can be done (and is being done!).

(If you are interested in what a DNS packet would look like see here:

The nice thing is you can do the same thing over ICMP via a ping tunnel. This basically works in the same general way – you shove your requests inside ICMP packets and then send them off to your server who decodes/processes it and sends you data back in even more stuffed ICMP packets.

Sounds complicated, but I don’t want to have to set all this stuff up!

Glad you say that, it’s a pain in the butt to do, but you’re in luck!

Their is a service called “Wi-free” that actually provides this cool tunneling for a reasonable charge.

Their plans are pretty reasonable and if you travel a lot you’ll end up saving a good amount, not to mention it works as a normal VPN as well. They have been around for years and are a very reputable company.



So if you’re like me you’d prefer this service over setting up a complicated tunneling scheme for this sort of thing.

But if you’d prefer the geek route be my guest!