Subscribe For Free Updates!

We'll not spam mate! We promise.

Friday 24 February 2017

Bug reveals Delicate Data From Websites Sitting Behind Cloud Flare


A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data.

CloudFlare, a content delivery network (CDN) and web security provider that helps optimize safety and performance of over 5.5 Million websites on the Internet, is warning its customers of the critical bug that could have exposed a range of sensitive information, including passwords, and cookies and tokens used to authenticate users.

Dubbed Cloudbleed, the nasty flaw is named after the Heartbleed bug that was discovered in 2014, but believed to be worse than Heartbleed.

The vulnerability is so severe that it not only affects websites on the CloudFlare network but affects mobile apps as well.

What exactly is "Cloudbleed," how it works, how are you affected by this bug, and how you can protect yourself? Let's figure it out.


What is Cloudbleed?

Discovered by Google Project Zero security researcher Tavis Ormandy over a week ago, Cloudbleed is a major flaw in the Cloudflare Internet infrastructure service that causes the leakage of private session keys and other sensitive information across websites hosted behind Cloudflare.

CloudFlare acts as a proxy between the user and web server, which caches content for websites that sits behind its global network and lowers the number of requests to the original host server by parsing content through Cloudflare’s edge servers for optimization and security.

Almost a week ago, Ormandy discovered a buffer overflow issue with Cloudflare's edge servers that were running past the end of a buffer and were returning memory containing private data like HTTP cookies, authentication tokens, and HTTP POST bodies, with some of the leaked data already cached by search engines.


Here's How Serious is Cloudbleed:

"I'm finding private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings," Ormandy wrote in a blog post that was also published Thursday. "We're talking full HTTPS requests, client IP addresses, full responses, cookies, passwords, keys, data, everything."
According to Ormandy, Cloudflare had code in its "ScrapeShield" feature that did something similar to this:

int Length = ObfuscateEmailAddressesInHtml(&OutputBuffer, CachedPage);
write(fd, OutputBuffer, Length);
But the company was not checking if the obfuscation parsers returned a negative value because of malicious HTML.

The Cloudflare's "ScrapeShield" feature parses and obfuscates HTML, but since reverse proxies are shared among customers, it would affect all CloudFlare customers.

Ormandy contacted Cloudflare and reported it about his findings. The company identified the cause of the issue, and immediately disabled 3 minor Cloudflare features — Email obfuscation, Server-side Excludes, as well as Automatic HTTPS Rewrites — that were using the same HTML parser chain, which was causing the leakage.

Ormandy observed encryption keys, passwords, cookies, chunks of POST data, and HTTPS requests for the other leading Cloudflare-hosted websites from other users and immediately contacted Cloudflare.

Since CloudFlare patched the issue but did not notify customers by Wednesday of the data leak issue, Ormandy made public his findings on Thursday, following Project Zero's seven-day policy for actively exploited attacks.

Following Ormandy's public disclosure of the vulnerability on Thursday, CloudFlare confirmed the flaw, ensuring its customers that their SSL private keys were not leaked.

"Cloudflare has always terminated SSL connections through an isolated instance of NGINX that was not affected by this bug," Cloudflare CTO John Graham-Cumming wrote in a blog post. "The bug was serious because the leaked memory could contain private information and because it had been cached by search engines."
"We are disclosing this problem now as we are satisfied that search engine caches have now been cleared of sensitive information," he added. "We have also not discovered any evidence of malicious exploits of the bug or other reports of its existence."


The Root Cause of Cloudbleed:

The root cause of the Cloudbleed vulnerability was that
 "reaching the end of a buffer was checked using the equality operator and a pointer was able to step past the end of the buffer." 

"Had the check been done using >= instead of == jumping over the buffer end would have been caught,"
 said Cumming.

Cloudflare has also confirmed that the greatest period of impact was between February 13 and February 18 with almost one in every 3,300,000 HTTP requests via Cloudflare potentially resulting in memory leakage, which is about 0.00003% of requests.

However, the researcher argued that the DNS provider was double-dealing, claiming that the Cloudbleed vulnerability had existed for months, based on Google's cached data.


How Does Cloudbleed Affect You?

There are a large number of Cloudflare's services and websites that use parsing HTML pages and modify them through the Cloudflare's edge servers.

Even if you do not use CloudFlare directly, that does not mean that you are spared. There is always a chance that websites you visit and web services you use may have been affected, leaking your data as well.

Of course, if you are using Cloudflare services in front of your site, the flaw could impact you, exposing sensitive information that flowed between your servers and end-users through CloudFlare's proxies.

While CloudFlare's service was rapidly patched the bug and has said the actual impact is relatively minor, data was leaking constantly before this — for months.

Some of this leaked data were publicly cached in search engines such as Google, Bing, Yahoo, who now removed it, but some engines like DuckDuckGo still host those data.

Also, other leaked data might exist in other services and caches throughout the Web, which is impossible to delete across all of these locations.


Cloudbleed Also Affects Mobile Apps

Cloudbleed also affects mobile apps, because, in many cases, the apps are designed to make use of the same backends as browsers for content delivery and HTTPS (SSL/TLS) termination.

Users on YCombinator have confirmed the presence of HTTP header data for apps like Discord, FitBit, and Uber by searching through DuckDuckGo caches with targeted search terms.

In an analysis conducted by NowSecure, the researchers have discovered some 200 iOS apps that identified as using Cloudflare services from a sampling of some 3,500 of the most popular apps on the app store.

There is always a possibility of someone discovering this vulnerability before Tavis, and may have been actively exploiting it, although there is no evidence to support this theory.

Some of the Cloudflare's major customers affected by the vulnerability included Uber, 1Password, FitBit, and OKCupid. However, in a blog post published by 1Password, the company assured its users that no sensitive data was exposed because the service was encrypted in transit.

However, a list of websites that have potentially been impacted by this bug has been published by a user, who go by the name of 'pirate,' on GitHub, which also included CoinBase, 4Chan, BitPay, DigitalOcean, Medium, ProductHunt, Transferwise, The Pirate Bay, Extra Torrent, BitDefender, Pastebin, Zoho, Feedly, Ashley Madison, Bleeping Computer, The Register, and many more.

Since CloudFlare does not yet provide the list of affected services, bear in mind that this is not a comprehensive list.


What should You do about the Cloudbleed bug?

Online users are strongly recommended to reset their passwords for all accounts in case you have reused the same passwords on every site, as well as monitor account activity closely as cleanup is underway.

Moreover, customers who are using Cloudflare for their websites are advised to force a password change for all of their users.

Update: Uber representative reached out to me via an email and said their investigation revealed that the CloudBleed bug exposed no passwords of their customers. Here's the statement provided by Uber:

"Very little Uber traffic actually goes through Cloudflare, so only a handful of tokens were involved and have since been changed. Passwords were not exposed."

Meanwhile, DuckDuckGo spokesperson also reached out to The Hacker News and said the search engine has removed the leaked data from DuckDuckGo.






Wednesday 1 June 2016

Yu Yunicorn

Hi Friends,
Sheersh this side as we all know Yu televentures  launched a new device  THE YU YUNICORN  The Yunicorn device was launched yesterday by Rahul Sharma at Hyatt Regency club me and my fellow friends were there and we witnessed the awesome event let get to the Review.


So lets start with the specifications of Yunicorn

  • The Yu Yunicorn is packed with Mediatek Helio P10 processor that means a 4 x 2 octacore processor based device.
  •  A powerful processor demands for a powerful Ram So 4 gb ram and 32 GB internal memory. expandable.
  • According to the Yu surveys the battery can for 18 hours of Rash Usage and will not lag and hang at all.
  • AOS or you can say "Android on steroids"  this OS is highly tweaked to provide users a great experience and lag free performance.this time 
  • AOS or Android on steroids operation OS is integrated with Around Yu you dont have to install some additional and essential apps like UBER,OLA,Taxi For Sure these types of apps are integrated in it Yunicorn is packed with DTS audio System and captures great images with 13 MP back camera and 5 MP of Front Camera.
here is my own captured images of Yunicorn using Yureka plus





Sunday 6 September 2015

Yu YuPix Compact Printer for Android, iOS Launched at Rs, 6,999


YUPIX-OVERVIEW

Micromax's Yu Televentures, after launching few smartphones and a fitness band under its 'Yu' brand, over the weekend launched a portable printer, the YuPix. The portable compact printer will be available to purchase from Amazon India starting Monday at Rs. 6,999.The YuPix pocket sized printer, as per the firm, can print an image under 60 seconds and has an image transfer speed 10 times faster due to the inbuilt Wi-Fi and NFC connectivity. Compatible with both Android and iOS devices, the printer is said to feature a 'unique' cartridge which does not require a cleaning roll and has an integrated ink ribbon and photo paper. It can print up to 10 continuous copies. The device is also claimed to be water and fingerprint resistant.The compact printer can print photos in 2.1x3.4-inch size with a printing resolution of 291 dpi. The device is said to use Dye Sublimation technology to print photos. Measuring 2.99x6.01x0.94 inch, the YuPix weighs 273 grams and is backed by a 750mAh battery. Android users can also download the YuPix app from Google Play to wirelessly sync their devices with the printer.Although it is good to see the smartphone maker entering new markets other than smartphones and fitness bands, there are chances that YuPix might fail to gain some traction and see less demand as in this modern times most of the work is done using soft copies and documents. Also, a print out of 2.1x3.4 inch might hardly be
used somewhere.

[REDMI 1S] CYNOGENMOD 12.1 [LP 5.1.1] BY ARMANI DEVS + KERNELS



Unofficial CyanogenMod 12.1 ROM for Redmi 1s is OUT !!! Lollipop 5.1.1
It is based on Cyanogenmod the Android Open Source Project with extra contributions from many people within the Android community. It can be used without any need to have any Google application installed. Linked below is a package that has come from another Android project that restore the Google parts. CyanogenMod does still include various hardware-specific code, which is also slowly being open-sourced anyway.

All the source code for CyanogenMod is available in the CyanogenMod Github repo. And if you would like to contribute to CyanogenMod, please visit outGerrit Code Review. You can also view the Changelog for a full list of changes & features.
                      https://github.com/armani-dev/androi...12.1-Changelog

Download Links With Mirrors :- 
Click here to Download [ROM] From | Google Drive | Mediafire | Dev-host | Usercloud |
Click here To Download Gapps From  | Dev-Host | Direct-Download |  

Kernels :-

Click here To Download | Xcelerate R-14 | Monster Kernel | Beast RC-6 |





Wednesday 26 August 2015

How To Install MIUI V7 Global Rom in Xiaomi Devices

INTRODUCTION
Dear MIUI users around the world,
We are extremely excited and proud to announce that we are entering a new phase of our global beta program. As Hugo announced in the MIUI 7 Global Launch Premiere on Aug 19, starting from today we will support Redmi 1S, Redmi 2, Mi 4i, Mi 3, Mi 4, Redmi Note 3G and Redmi Note 4G. MIUI 7 Global beta ROM is now available via OTA. And here are the links to download all the global beta builds!
Moving forward, we will push out global beta releases every 2 weeks on Monday before 7 pm Beijing time and we will continue to optimise our global beta program. 

ABOUT MIUI V7 ROMS AND CHANGELOGS
New - Added four new system UIs (08-14, for India only)
New - XXL text  (08-14)
New - Showtime: Set profile picture/video to show in your contacts' device when you call them (08-14, for India only)
New - Baby album: Group all baby images in one place, supports sending all images as a package and set the album as daily lockscreen.  (08-14, For India only)
Optimization - System response speed increased by 30%, battery life improved by 10%. 
New - Quick OTP(For India only)
New – Smart SMS Filter (For India only)
System
Optimization - System response speed increased by 30%, battery life improved by 10%.  
Contacts
New - Contact cards: Exchange contact cards with your friend to view his/her profile picture and detailed information (08-14)
New - Showtime: Set profile video to show in your contact's device when you call them (You need to exchange contact cards with the contact first) (08-14, For India only)
Messaging

New - Added XXL text for the app (08-14)
Optimization - Searching results display the newer messages on top (08-17)
Lockscreen, Status Bar, Notification Bar
New - Added notification page fold/unfold animated effects (08-07)
New - Block notifications in notification shade by one press (08-18)
Optimization - Optimized Notification shade brightness bar interactive style (08-07)
Optimization - Optimized battery icon on status bar (08-07)
Optimization - Optimized status bar display effects when using large font (08-10)
Optimization - Optimized notifications' height when using large font (08-10)
Optimization - Optimized 'Manage notifications' page display effect when using large font (08-10)
Optimization - MiHome app icon does not show in lockscreen in Parental controls mode (08-11)
Fix - Roaming icon did not disappear in some situations (08-10)
Fix - Block button in some featured themes overlapped with clock widget (08-12)
Fix - Notes widget display error when using large font (08-12)
Fix - Pressing on toggles did not fold notification shade in Performance mode (08-19)
Home screen
New - Child mode (08-14)
Optimization - Optimized display effect of live blur (08-07)
Optimization - Optimized built-in widgets display effect when using large font (08-10)
Optimization - Optimized One-handed mode launching speed (08-10)
Optimization - Removed Settings and Security from Parental controls - Accessible apps list (08-11)
Optimization - Assistant and Google Now cannot be launched in Parental controls mode (08-11)
Optimization - Optimized prompt text when setting wallpaper in home screen editing mode (08-12)
Fix - Home screen reloaded after deep cleaning (08-11)
Fix - A specific icon displayed repeatedly when using some themes (08-21)
Themes
New - Added four default themes (08-14)
Gallery
New - Baby album: Group all baby images in one place, supports sending all images as a package and set the album as daily lockscreen. Optimization - Optimized start page images grouping method (08-19)
Optimization - Optimized baby albums' UI details (08-19)
Fix - 'No images or videos' icon showed for a moment when entering baby album (08-19)
Fix - The baby's age did not show under baby album cover when he/she is under 1 month old (08-19)
Fix - Sometimes, shared album creator's avatar did not show (08-19)
Music
Optimization - Optimized playing status bar style in playing page (08-18)
Fix - Audio settings background display error in some devices (08-18)
Settings
Fix - Sound settings page texts were cut off when using XXL text (08-18)
Browser
Optimization - Improved app cold start speed (08-14)
Optimization - Background RAM usage decreased by 15% - 30% (08-14)
Notes
New - Added XXL text for apps (08-14)
Others
New - XXL text  (08-14)
Clock / Calculator
New – When it's your birthday, the ringtone of morning alarm will change to “Happy Birthday "
Mi Credit
Optimization - Updated Mi Credits center homescreen shortcut icon (08-20)
Optimization - Optimized display effect when using XXL text (08-20)

DOWNLOAD LINKS OF BOTH RECOVERY AND FASTBOOT FLASHABLE ROMS :



SCREENSHOTS -CLICH HERE

HOW TO FLASH ROM (RECOVERY METHOD)
1) If you're using MIUI global beta ROM, please open 'Updater' app on your phone and check for the update! 
2) This OTA has not been pushed for stable ROMs yet. So if you're using stable ROM, you need to download the ROM first and flash it by yourself. 

4) Do remember to make a backup before flashing.

HOW TO FLASH ROM (FASTBOOT METHOD)
1.Download Mi Phone Flasher From here -  click to download your file
 2.Turn off the device. Press the Volume– key and the Power button at the same time to enter Fastboot mode. Then connect the device to the Windows PC/laptop via a micro USB cable.
3.Double click on the downloaded ROM file to decompress it. Open the file folder for the decompressed ROM pack, and copy its path on the computer.
4.Decompress the MIUI ROM flashing tool downloaded in Step 1, and double click on it to install (if there is security warning, select 'Run'). After installation is completed, open MiFlash.exe and paste into the address bar the ROM file folder path copied in the last step.
5.Click on the first button (circled out in yellow) to Refresh, and MiFlash should automatically recognize the device. Then click the second button (circled out in red) to flash the ROM file to the device.
7.Wait until the progress bar inside MiFlash turns fully green, which means the ROM has been successfully installed. Then your device should automatically boot to the new version.




Monday 1 June 2015

[Tool]Advanced ApkTool v4.1.0[Windows]

Advanced ApkTool v4.1.0
Introduction

The tool is not made by and i am not stealing someone's credit Advance APKTOOL is user friendly program which allows you to recompile or de-compile apks without errors this tool is for windows. i am just presenting the work to you i will give the link to his thread at end.

Main Features

1.Based on Apktool 2.0.0-RC3
2.User friendly
3.Automated Decompiling APK/JAR.
4.Automated Recompiling APK/JAR.
5.Automated Sign APK/JAR.
6.Automated Zipalign APK/JAR.
7.No need to copy META-INF folder after recompiling.
8.Sony Xperia owners won't face bootloop after recompiling framework-res.apk.
9.Lollipop  Supported. 

How To Use This Tool :-
1.Extract the downloaded file anywhere in your pc.
2.Double click on "Advanced ApkTool.exe" to start the tool.
3.Copy your framework files to the "2-In" folder & also the apk files you want to decompile.
4.Install Framework first (Install OEM specfic framework also).
5.Decompile apk, the decompiled folder can be found inside "3-Out" folder.
6.After editing Recompile it, recompiled file should be found inside "4-Done" folder.
7.If needed sign the recompiled file, it will replace the recompiled file inside "4-Done" folder.
8.You can also zipalign the recompiled file, it will replace the recompiled file inside "4-Done" folder.
9.You can wipe any folder easily by wipe folder option.
10.You can find more in more menu option.

LINKS
| Link To Developers Thread Click here |  Link To APKTOOL Click here |
| APKTOOL For Android Click here |
| Link To My Profile Click here |

Just Ping Me if u need help ;) 

Monday 25 May 2015

How To Port Rom For Mediatek devices [JELLY BEAN]

SO LETS PORTING ROMs  [JELLY BEAN]
                                      
Requirements
1.Windows based operating system
2.Kitchen [For Boot.img unpacking Repacking]
3.Notepad++
4.Stock and Port Roms

Overview 
Please Choose port rom which is of same chip-set like mt6572 to Mt6572 and same android version.. :)

Procedure:-
1.Replace these from your Stock ROM to the ROM u want to PORT!! Lets Call it "PORT"
*system/vendor
 *system/usr
 *system/lib/modules
 *system/lib/hw
 *system/lib/libncurses.so
 *system/etc/firmware
 *system/etc/vold.fstab
 *system/etc/vold.fstab.nand
 *system/etc/bluetooth

2.For Fixing Problems...
 *system/etc/permissions
 *system/etc/security
 *system/etc/audio
 *system/etc/wifi
 *system/lib/drm
 *system/lisystem/lib/soundfx
3.Now Replace the Stock Boot.img to Port ROM!
Now Open The Port ROM folder and go to META-INF/google/android and open updater-script in Notepad++
Do the same for the Stock ROM
Now In the Port ROM's Updater Script, find a line that starts with this...
format(".......
and only replace the mmcblk0p.. with the stock one!
Do the same for this line...
mount("...
For Example 

This Is Port one
format("ext4", "EMMC", "/dev/block/mmcblk0p5", "0", "/system");
mount("ext4", "EMMC", "/dev/block/mmcblk0p5", "/system");

This Is Stock One
format("ext4", "EMMC", "/dev/block/mmcblk0p3", "/system");
mount("ext4", "EMMC", "/dev/block/mmcblk0p3", "/system");Now just Replace the "mmcblk0p3" from STOCK to PORT!! 
4.Now go back to the Folder of Port ROM and You'll see 2 folders & 1 file named
-META-INF
-system
-boot.img

Now Select these three and Click Right Mouse Button and Click on 7-Zip ->> Add to Archive
Now a dialouge box should appear! Configure the Format like This:

Archive format: ZIP

Compression Level : Normal

Compression Method: Deflate

Dictoioany Size: 32k

Word Size 32

 Now Start Zipping and Push the ZIP to your Memory Card  Go to Recovery >> Install ZIP & Wipe Data

Credits
XDA DEVELOPER | LINK TO HIS THREAD |
Ace Aggarwal :P 

Thanks For Reading This