BTemplates.com

Search This Blog

Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Wednesday, 29 July 2015

Social Engineering


This is a technique where we use brain rather than tools. We obtain critical information from victim’s ignorance or lack of knowledge.

How a password should be??
A password must be a combination of small letters, block letters, numbers and symbols with a minimum of 12 characters. Most of the time one set his passwords related to his personal life like flowers, actor/actress names, mobile numbers, date of birth, pet name, mother’s or father’s name, lover’s name or common words like 123456 etc.

If your passwords are in this category then it’s very easy to compromise your account within a short time interval. So never set password related to your personal life and make sure to categorise your password into five types.
  • Confidential Password
  • Financial Password
  • Useless Password
  • Average Password
  • Normal Password


Confidential Password:
Is it required for everyone to know what you are chatting at midnights with your personals??? If your answer is “NO” then set confidential passwords to those specific websites like Facebook, Gmail, Yahoo etc. And don’t use those confidential passwords anywhere else.

Financial Password:
Set a very strong password for websites where you do financial transactions and never use that password anywhere else.

Useless, Normal, Average Password:
Based upon the priority of the site set useless, normal, average passwords.

Wrong is always right:

Never set a correct answer for your recovery questions. Always set a wrong answer for it and don’t forget what you set.

Sunday, 26 July 2015

How To Hide Files Behind Image


This technique is called as Stenography. It involves hiding data behind images so that only the intended recipients can read the message being sent. I will show you how to hide files inside a picture file. They are almost undetectable, and can be made very hard to get. You can not only hide files in pictures, but music files, videos, and just about anything else.





There are so many S-tools available to hide data behind images. But here you don't need any tool for this. You will need these things:
1) A picture to hide stuff in
2) Files to be hidden
3) A file compression software (I’m using Winrar)
4) Command Prompt

So here we go.

Step 1: Add the data files to a single .rar file and place a image file in the directory containing the rar file.

Step 2: Open Black Box (Command Prompt). [Press windows key + r. Type cmd and press enter. It will open black box.]

Step 3: Select the Disk Drive by writing drive_name: and peress enter. E.g. desktop: or c: or d:

Step 4: Now type the command copy /b <Image.jpeg> + <File.rar> <New_name.jpeg>. And press enter and its done.

Note: Don't include < > while running the command. These sign(s) are only enclosing a file_name with it's extension.
Now you would like to know how to excess that hidden file.

What you have to do is only to open that image file with winrar. It will open the rar file hidden behind image file.
For that:
1. Right click on image file containing the hidden rar file.
2. Goto Open with and chose Winrar. And the hidden rar file is opened.

Note: Don't make winrar a default program to open that file. Else it will open the hidden rar file whenever you open it by double clicking on it.

Tuesday, 21 July 2015

SysKey-SAM Lock Tool


The SysKey utility, also called the SAM lock tool, is a built-in Windows tool that allows you to secure the Security Accounts Management (SAM) Database. It can be helpful for preventing hackers from cracking Windows passwords.


I will first show you what you can do with the SysKey utility and then discuss how much extra security SysKey protection really brings.

The SAM database is part of the Windows Registry and stores information about user accounts such as user names and password hashes. The corresponding Registry file is located in c:\windows\system32\config. Since Windows NT 4 SP3, the SAM file is partly encrypted. The SysKey utility allows you to move the SAM encryption key off the computer and/or configure a startup password.

Using the SysKey utility

To launch the SysKey utility, type “syskey” at the Start Search prompt of Windows Vista or Windows 7, or use the “run” option of the Windows XP Start Menu.
SysKey

To move the SAM encryption key off the computer, you have, click “Store Startup Key on Floppy Disk.” The tool claims that you will need to insert a floppy disk on startup, which is not really true. Modern computers no longer have floppies, and this storage medium isn’t reliable enough anyway. You can also store the SAM encryption key on a USB flash drive.
Configure Ssyskey

However, the USB stick has to be mounted on drive “A:”. You can assign this drive letter to your thumb drive in Windows Disk Management. If the drive letter A is not available, you have to first disable the floppy disk in the computer BIOS.

The SysKey utility will then allow you to store a file with the name StartKey.Key on your USB drive. This file contains the SAM encryption key. Without it, you won’t be able to log on in the future. Thus, whenever you boot up your computer, you have to insert this USB stick. Windows will always automatically load the encryption key from drive A:, and if you set a password with the SysKey utility, you will have to enter this password whenever you boot up the computer.
SysKey startup key SysKey Startup password

What extra security does the SysKey utility bring

First of all, neither storing the SAM encryption key on an external drive nor protecting it with a password can prevent tools such Kon-Boot or the Trinity Rescue Kit from manipulating the SAM database. These tools are still able to set an empty password on all accounts. However, after such a manipulation, it is not possible to boot up Windows without the encryption key on the USB drive or without the startup password.

Hence, this method will prevent the majority of wannabe hackers from logging on to the computer with administrator privileges. It won’t, however, stop real hackers. As long as an attacker has physical access to an unencrypted system drive, everything is doable. If you secure the SAM encryption key then an attacker wouldn’t be able to reach the logon screen without access to the encryption key.

So does it make sense to protect all your PCs with the SysKey utility? I don’t think so. The fact that the tool tries to store the encryption key on a floppy disk shows that this method is a bit outdated. It is too much hassle for your users to mess with a USB stick or to use an additional password compared to the extra protection the tool offers.

However, I think, the SysKey utility is still useful in some environments. For instance, you can use the tool to protect laptops or servers where you don’t want to disable booting from external drives or where many people would have the time to open the PC and access the system drive. It might also make sense to protect your own PC this way. Wouldn’t it be embarrassing if your colleague’s eight-year-old daughter hacks your PC while you take a coffee break?

The point is that 99% of all kids out there who call themselves hackers know about Kon-Boot and the myriad of similar tools, but they don’t know how to handle SysKey. SysKey was originally introduced to prevent hackers from cracking passwords in the SAM database with brute force attacks. And popular hacking tools such SAMInside still can’t handle a protected SAM encryption key.

Sunday, 19 July 2015

Steganography


This technique is called as Stenography. It involves hiding data behind images so that only the intended recipients can read the message being sent. I will show you how to hide files inside a picture file. They are almost undetectable, and can be made very hard to get. You can not only hide files in pictures, but music files, videos, and just about anything else.

 







There are so many S-tools available to hide data behind images. But here you don't need any tool for this. You will need these things:
1) A picture to hide stuff in
2) Files to be hidden
3) A file compression software (I’m using Winrar)
4) Command Prompt

So here we go.

Step 1: Add the data files to a single .rar file and place a image file in the directory containing the rar file.

Step 2: Open Black Box (Command Prompt). [Press windows key + r. Type cmd and press enter. It will open black box.]

Step 3: Select the Disk Drive by writing drive_name: and peress enter. E.g. desktop: or c: or d:

Step 4: Now type the command copy /b <Image.jpeg> + <File.rar> <New_name.jpeg>. And press enter and its done.

Note: Don't include < > while running the command. These sign(s) are only enclosing a file_name with it's extension.
Now you would like to know how to excess that hidden file.

What you have to do is only to open that image file with winrar. It will open the rar file hidden behind image file.
For that:
1. Right click on image file containing the hidden rar file.
2. Goto Open with and chose Winrar. And the hidden rar file is opened.

Note: Don't make winrar a default program to open that file. Else it will open the hidden rar file whenever you open it by double clicking on it.

Keylogger


Keylogger is hacker’s and script kiddies’ favorite tool. Keylogger can be a hardware or a software (computer program). It is capable of recording each and every keystroke you enter including mouse clicks and even captures screenshots.

It hardly takes a minute to install this software/hardware in victim’s system and from next second onwards attacker will get each and every activity going on victim’s computer. What they are chatting, which site they are browsing, victim’s username, passwords what’s not? Each and every activity happening in victim’s system with screenshots will be recorded. This activity will be saved on victim’s system or it can be mailed to attacker’s email.

Hardware keylogger: This is a thumb size device. It records all the keystrokes you enter from the keyboard then saves it in its memory. Later this data will be analysed. The drawback of this device is that it can’t record mouse clicks, can’t take screenshots and even can’t mail and it requires physical access to the machine. Logs are stored in system's local memory.

Software keylogger: This can be installed in victim’s system even if they use updated antiviruses. There are a lot of softwares available in market which make a keylogger undetectable by latest antiviruses.
 
 How to fool a keylogger?

Yes we can fool a keylogger. Keylogger’s job is to record all the key strokes we enter. So to fool a keylogger, enter unnecessary keys along with passwords. Confused?

Say your password is 1234. Now how will you enter it. Enter 1 then any unnecessary character say jksfh then 2 then again "£%mygb then 3 then &^%% then 4 then £fsg$^ then 5. Now remove unnecessary characters.

If it is a Hardware Keylogger use Onscreen Keyboard. To open this go to run and type “osk”.

There is also a software tool called "KeyScrambler" which encrypts the plain keystrokes into some hash code. The keylogger will still record the keystrokes but actually it is recording the hash code but not the actual words. E.g.: keyscranmeber : --> password-->@#!@$-> keylogger.

Tuesday, 7 July 2015

Bluetooth Hacking


One of the most popular ways to transfer data between two mobile devices, in range, is via Bluetooth. But Bluetooth just like any other wireless network is prone to attackers. Bluetooth Hacking could be classified into following three categories:













1. Classifications of Bluetooth Hacking

Bluejacking, though classified in Bluetooth hacking, isn't exactly harmful to the user in any way. It involves sending  of unsolicited messages by an attacker to other Bluetooth enabled devices. The messages are sent in such a way, that the other user HAS to see the message. This is usually done by creating a new contact with the contact namefield as message, which the attacker want to send to the victim. This does not cause any changes to the victim's phone, except getting him confused about what has happened.

This method, as already said, not being harmful, may for some period of time confuse the user which may lead to think that their phone has been hacked.

Bluesnarfing is an advanced Bluetooth hacking technique, which is done with the help of advanced equipment, and at the same time, being in a certain range of target. A successful exploitation lead the attacker to gain full control of the hacked device, with the ability to make phone calls, eavesdrop phone conversations, read and write messages, and even perform  network activities. The attacker uses OBEX push profile to attempt to send an OBEX GET command to retrieve known filenames such as telecom/pb.vcf. The enhancement to this Bluesnarf++ connects to the OBEX FTP server to transfer the files.

Bluebugging is similar to Bluesnarfing, but the attacker gets full control of the device in Bluebugging. This is similar to Trojans used in computers. The attacker also gets to execute remote commands on the victim's device.

2. Tools used for Bluetooth Hacking

Bluescanner: The first thing one would need to know in Bluetooth hacking, is to identify the devices having their Bluetooth turned on. Bluescanner is a tool for windows XP SP2, which helps in discovering the Bluetooth devices as well as tries to get all the information  possible about each and every devices found. You can get this tool here.

Bloover: Bloover is a mobile application that runs on J2ME based handsets. It is an audit tool, which could be used by mobile users, in order to find out, if their phone or the phones in the nearby are vulnerable to Bluetooth attackers.

Since, it is just on audit tool, after finding out the vulnerability, it doesn't allows the attacker to send sms using the compromised phone.

BT Browser: It is a J2ME mobile application, which offers the same functionality similar to that of Bluescanner. This application works on phone, which supports JSR-82 such as Nokia 6600 and Sony Ericsson P900.

BTAudit: It has a set of two tools dedicated to Bluetooth hacking. The division is done on the basis of protocol scanned. The two protocols are L2CAP PSMs (Protocol Service Multiplexer) and the RFCOMM Channels. You can get it here.

BTCrack: BTCrack is a software to break bluetooth pass phrase by bruteforcing. It captures the pairing exchanges and then bruteforces the passkey and the link key.

BTCrawler: It is a Bluetooth device scanner for windows Based mobiles. It could also perform other bluetooth hacking techniques, namely BuleSnarfing and Bluejacking, to the vulnerable devices in range.

Monday, 6 July 2015

Unblock Blocked Sites Cum Become Anonymous On Internet


This question revolves around a single term called "IP ADDRESS". Hackers know that they are doing a crime and will be traced if they perform an attack directly with their original IP address. So they hide their original IP address. It becomes difficult for the investigators to trace them if an attacker hides his original IP address.

Hiding The Identity
This is possible with some wonderful tools called Proxies and VPNs. There are a number of services available to hide our identity online. It can be a free service or paid service. In paid services, since we pay some money, it will be more reliable.

1. Basic concepts about Proxies

Proxy Servers: A Proxy acts as an intermediary between our computer and the target server. It means we are not directly interacting with the servers. Instead, we will interact with the proxy server which in turn interacts with the target server. All the requests sent from our computer will go to the server via proxy server. Similarly, all the responses from the server will come back to our computer via proxy server.

2. Types of Proxy Server

Web Based Proxy: When we use websites which give a facility to user to change the online identity through their web proxy servers then we say its known as WBPS. For Example: www.ninjaproxy.com www.kproxy.com www.anonymzier.ru

Application Based Proxy Servers: These are the proxy servers in which we try to use application software of the proxy servers which directly connect us to the pool table of proxy servers and gives us a fake IP address to surf internet hence the banning policy will not work much as we are not traveling the content directly through the HTTP and port number 80. For Example, UltraSurf, HotSpot Security Shield.

VPNs: Virtual Private Network: A VPN is a private network that connects remote networks through a public network such as the internet. VPNs are also very similar to proxies. VPN provides security by using some tunneling protocols and encryption mechanisms. For Example, OpenVPN, Proxpn, Cyberghost, Hotspotshield, Logmein Hamachi

Plug-In Based Proxy Server: AnonymoX.


3. What makes the difference?
If you will browse the target website without any proxy, then your original IP will be visible to that website. If you browse the internet with proxy then your original IP will be hidden and proxy's IP will be visible to target website.

4. TOR- The Onion Routing
TOR is one more beautiful tool to hide your identity. As the name represents, it contains too many router layers (nodes) like an onion. Using TOR is one of the best way to hide your identity online since it uses a chain of nodes where each node doesn't know any information about the traffic path except the details of next receiver node and previous sender node from which it is receiving the data.

How to use TOR
First download the TOR bundle here. It contains a client application you need to run. It gets the information about the node available when executed(run). Then it selects a random path through which the traffic will be passed towards the destination. 

Note: The TOR browser is specially intercepted by Indian Govt. in India.