Retrieve Windows 8 Key encrypted in BIOS

Microsoft moves Windows 8 OEM Product Key to BIOS embedded. The product keys are no more sticked on the computer. You will only see a Windows 8 logo sticker and nothing else. So if you reinstall Windows 8, no need to hunt for the key, the installation will automatically pick up the key from BIOS, provided you install the same version of Windows 8 OEM that came along with the laptop.

So how to retrieve the key from the BIOS.

1. Download 32 or 64-bit version of RWEverything

2. Click ACPI and then MSDM to view Key encrypted in BIOS



How to hack using Havij

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. But now it is most commonly used by hackers community as said in an interesting article Cybercrime’s Love Affair With Havij Spells SQL Injection Trouble in dark reading by Ericka
“So when I sat and read chat logs from Anonymous IRC rooms where they do hacker training, the only thing I ever see mentioned is Havij,” Shaul says. “The reason for that is Havij is awesome. And it’s as powerful and easy to use as could be.”
The amazing thing with this tool is that you just need to click buttons to let the tool work for you and no other programming stuff is required. Cool one…right!
Note: I have executed Havij in my own lab of vulnerable website. I take no responsibility for whatever you do using this tutorial
  • Download Free edition from Havij (In the same page, you can see the difference between free and professional edition). It is matter of what your target is.
  • Now you google with below options to find websites  vulnerable for targetting SQL Injection with Havij


Once you choose a website, type ‘ at the end like shown below and press enter. If you get an error, then the website is vulnerable to SQL Injection.


1. Retrieve DB Information:
Copy and paste the target url in ‘Target’ column and click ‘Analyze’
Once Havij is successful in retrieving DB name, it will stop and you can see the database details either at the log window or ‘Info’ option. Havij will retrieve Web Server Type (Apache, IIS or other), DB Type (My SQL, MS SQL or other) and DB Name
Once this is successful, you can make sure that you are in right path i.e; your target is vulnerable to SQL Injection Attack.
2. Retrieve Tables:
Now you need to retrieve all table that contains user name and password to login to the website. Choose the db and Click ‘Get Tables’ option.
Here you go, now all the tables are retrieved from DB. You can either wait till it retrieves all the tables or you can just stop the top when you see any suspected table like one below. I stopped the processing when Havij found a table that I suspected to be containing user names and passwords for the website.
3. Retrieve Table Columns:
Before you start retrieving data of a specific table, you need to get the columns. So mark the suspected password table and click ‘Get Columns’ 
I am really sorry for marking all website specific details with red mark, I must do that to safeguard.
4. Retrieve User name and Password:
You are at final stage of hacking . Mark the database, table and columns to be retrieved and you have option of retrieving only one row. Choose ‘Get Data’  to let Havij give you member access to the site.
I am done now, luckily my target website didn’t store passwords encrypted and I have their website’s admin password. That’s it!
If the password is encrypted, Havij has inbuilt MD5 option where you can specify the MD5 hash to be cracked.  Havij will look for hash in several sites in mul thread mode and displays the result.
If you need additional information, download PDF Manual from ITSecTeam

JBoss Worm Perl.Bossworm Infection

Let me provide you some of the my network analysis and IPS reports, soon after I found that my test JBoss Server has been infected by Perl.Bossworm.

Perl.Bossworm is a malignant worm that exploits the JBoss Enterprise Application Platform Multiple Vulnerabilities (BID 39710) in order to copy itself to unpatched JBOSS servers. When Perl.Bossworm sets up to a vulnerable server, it finds and infects more vulnerable servers. Perl.Bossworm connects to predetermined domains for downloading and installing other malware threats. Remove Perl.Bossworm before it harms your PC system.

How to find out JBoss Worm Infection on your network :-

Perl.Bossworm symptoms on JBoss Server is discussed and very well explained  in JBoss Community. Where as, below are the symptoms on the network side from my lab:

Symptom 1:

  • the connectivity  between Network Switch and Firewall would be very unstable. I had frequent disconnections – request timeout even when I ping the Inside interface of Firewall from the Switch Telnet console. So obviously, you will have either slow Internet connection or no connectivity at all.
Telnet to your Network Switch and ping to Inside LAN interface of Firewall to check the response (PING) status.
Symptom 2:
  • Network Switch utilization has gone up and reached 99% 🙁
Commands to execute and verify on Network Switch:
1. sh proc cpu sorted (Cisco Switch Command)
You could see that my switch utilization has gone very high within 5 seconds statistics
2. show platform cpu packet statistics  (Cisco Switch Command)
Port GI 7/9 on Network Switch is where JBoss Server was connected, finally found to be transmitting huge number of packets in few seconds

Firewall and IPS (Intrusion Prevention System) Worm Infection Report:-

The IPS reports shown below will clarify the doubts of what has really caused to utilize so high CPU of Network Switch and Firwall disconnectivity

  • The next day after worm infection,  it has established nearly 17000 irc-base sessions to Outside Internet.

  • 342 GB of Bandwidth has been utilized on day 2 of infection
  • Finallywe have the IRC IPs to which infected JBoss server was communicating
Solution to remove JBoss Worm:

Facebook Scam: See who is viewing your facebook profile


Again, another fake application from Profile Spy which claims to let facebook users know who has viewed their facebook profile. This is one of the most wanted feature but found missing in the Number  1 rated social networking website (2011 Social Networking Websites Review).

This fake Profile Spy was earlier spreaded under different website names as,, but now with a different domain name

As per, this website is registered under on 05-Nov-2010. Within few weeks of hosting, the website gained popularity and reached maximum hits of 270 users in a day (statistics form

Map shows different locations in the world fromwhere the visitors are accessing this scam website.

Share this facebook scam alert to your friends and help them to protect their facebook accounts.

URL redirection flaw unpatched by Microsoft

This is a kind of phishing attack, that confuses user to think that URL  (Web address) specified in their email is a legitimate but actually redirecting them to a fake website. This is well explained in this URL Redirection Flaw link. What we are going to refer now is an unpatched URL redirection flaw in Microsoft Product,  Microsoft Outlook Web Access in short OWA.


This weakness is because of the design flaw of OWA using parameter URL= to redirect the website to inner pages after successful authentication.So a malicious person can use this trick to redirect the user to a fake website. This is reported to Microsoft on 2005 and no patches are released so far.

Ref: secunia-SA14144