Skip to main content

Zoom App how "HACKED" with use of One small TOOL 😅

zWARdail - This is the Tool name Using to hack the "ZOOM" meeting application

Something about zwaredail:)

As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom. But without the protection of a password, there’s a decent chance your next Zoom meeting could be “Zoom bombed” — attended or disrupted by someone who doesn’t belong. And according to data gathered by a new automated Zoom meeting discovery tool dubbed “zWarDial,” a crazy number of meetings at major corporations are not being protected by a password.


This is tool image 😁

Each Zoom conference call is assigned a Meeting ID that consists of 9 to 11 digits. Naturally, hackers have figured out they can simply guess or automate the guessing of random IDs within that space of digits.

Security experts at Check Point Research did exactly that last summer, and found they were able to predict approximately four percent of randomly generated Meeting IDs. The Check Point researchers said enabling passwords on each meeting was the only thing that prevented them from randomly finding a meeting.

Zoom responded by saying it was enabling passwords by default in all future scheduled meetings. Zoom also said it would block repeated attempts to scan for meeting IDs, and that it would no longer automatically indicate if a meeting ID was valid or invalid.

Nevertheless, the incidence of Zoombombing has skyrocketed over the past few weeks, even prompting an alert by the FBI on how to secure meetings against eavesdroppers and mischief-makers. This suggests that many Zoom users have disabled passwords by default and/or that Zoom’s new security feature simply isn’t working as intended for all users.

New data and acknowledgments by Zoom itself suggest the latter may be more likely.

Earlier this week, KrebsOnSecurity heard from Trent Lo, a security professional and co-founder of SecKC, Kansas City’s longest-running monthly security meetup. Lo and fellow SecKC members recently created zWarDial, which borrows part of its name from the old phone-based war dialing programs that called random or sequential numbers in a given telephone number prefix to search for computer modems.

Comments

Popular posts from this blog

REMOTE CODE EXECUTION😱

SIGRed: Another Critical Wormable Remote Code Execution Vulnerability Attackers often abuse Windows DNS servers to gain access to targeted networks. The recent discovery of SIGRed, a critical, wormable remote code execution (RCE) vulnerability in the Windows DNS server can probably prove to be a jackpot for threat actors. This is not just another vulnerability Check Point security researcher Sagi Tzaik found the vulnerability ( CVE-2020-1350 ) that existed in the operating system's code for 17 years. The successful exploitation of such a vulnerability could have a severe impact. Microsoft  has warned that the vulnerability (CVSS base score of 10.0) could allow an attacker to craft malicious DNS queries for Windows DNS servers (versions from 2003 to 2019), and achieve arbitrary code execution that could lead to the breach of an organizations’ entire infrastructure. When triggered by a malicious DNS query, the vulnerability leads to a heap-based buffer overflow, allowing the attacker...