Hard to digest, but true. The leading anti-virus website provider Kaspersky’s support website got hacked and details are published at this blog.

Kasperksy admitted that it’s their fault and blamed an ‘external’ developer for the vulnerable code. Though it’s unlikely that the developer intentionally created the vulnerable code, but it slipped the normal review process of kasperksy.

Kaspersky became aware of the situation after being informed by one of its employee about the data breach. Though SQL injection method, hacker was able to hack the support website and posted so many screenshots of the support page. Hackers listed all the table names, but didn’t post any personal information from the database.

“They could have gotten access to some data that was stored on our servers, including 2500 email addresses of customers who signed up for a product trial and 25,000 activation codes belonging to our products but that didn’t contain personal customer references. The vulnerability found on usa.kaspersky.com did not affect any other Kaspersky Lab Internet resources, including www.kaspersky.com, the official website of the company’s headquarters”. – Kaspersky

Screenshot and other hacking details here:

http://hackersblog.org/2009/02/07/usakasperskycom-hacked-full-database-acces-sql-injection/

Explore More

Tutorials (overflow, using debugers, exploits coding…)

* Stack based overflows (direct RET overwrite) : (Tutorial Part 1) http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ * Jumping to shellcode : (Tutorial Part 2) http://www.corelan.be:8800/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ * Stack based overflows – SEH (Tutorial Part 3)

Dyne’s Hackers List v1.10

0x01 – Definitions: Hacker vs Cracker The New Hacker’s Dictionary defines Hacker as: “A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as

Hacking with Google, Is it Possible

Hacking with Google, Is it Possible Every hacker needs to develop his abilities if he wants to maintain up to date. That’s why he will use every tool he can