Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Friday, March 27, 2009

Stop Joking On Sardar ..Contd part-II

Friends,

On march 19, 2009 I had posted  the topic "Stop Joking On Sardar". Before continuing this, request you to go thro that post first @ http://9911245670.blogspot.com/2009/03/stop-joking-on-sardar.html

Continuing to that, today I will post a small story regarding the cited topic. I found this somewhere on net and its absolutely true. Pls post your comments after reading this post.

Here is Real Story to read:


some frnds were going frmdelhi 2 jaipur in a taxi whose driver was a sardar. All of the frnd were making jokes on sardar, sharing wid each other and laughed at on d journey. The sardar driver dnt speak anything during d whole journey. He just listened to them politely and remained patient. at the end of the journey,he called 1 of them & said "Iwil not stop u o making jokes on sardar neither i will tell u the stories of their bravery. Just take dis 1 re coin and give it 2 any poor sardar beggar."


6 months have passed dat 1 re coin is still wid those frnd.


U knw y?????


Coz he hasnt found any sikbegging anywhere sikhs never give up. They earn with there hardwork and never beg till there last breath. Still pppl do not stop making jokes on them. Some of us have realized. Let the whole World knw it!!!!!!


Wahe Guru Ji ka khalsa 
Wahe Guru Ji ki Fateh

---
Regards,

Amarjit Singh

Tuesday, March 24, 2009

ACCESS GRANTED....To hackers on my System ?????

Quite often I hear comments like “so what if they hack into my system there’s nothing on my system of interest.” I can’t tell you how more wrong you can be. The only thing I can think of when I hear someone say that is that person is not aware of just what type of information they have access to. I’ll show you exactly what type of information a “hacker” has access to once your system has been broken into. Try to remember this is not meant to scare you, it is meant to inform you. Keep in mind you are reading this to gain a better understanding of how to protect your-self.

Bank Account Information
I’m sure if you’re like most people you have web banking of some kind. Most banks require you to use 128bit encryption browsers to do your banking online. This form of banking online does encrypt your information and protect it from otherwise prying eyes of the world that may wish to gain access to such vital information. This should further illustrate how powerful the encryption method is:

• 40-bit encryption, means there are 2 possible keys that could fit into the lock that holds your account information. That means there are many billions (a 1 followed by 12 zeroes) of possible keys.
• 128-bit encryption, means there are 288 (a three followed by 26 zeroes) times as many key combinations than there are for 40-bit encryption. That means a computer would require exponentially more processing power than for 40-bit encryption to find the correct key.
Unfortunately it’s useless to you once your computer has been compromised.

Question: How? One of the features of a “Trojan” is a key logger. The principle behind this is all keystrokes pressed will be recorded and sent back to the “hacker.”

You’re probably asking yourself well “How do they know what bank I’m with?” This information is easily achieved by doing what is called a screen shot. This gives the “hacker” a picture of your desktop and all windows currently open at the time.

As you can see although you are on a secure web site, it still doesn’t protect your information once your computer is compromised.
Email
Simply put all emails sent to you are accessible to a “hacker” once your system has been compromised. They can read them and possibly check your mail before you do.
Pictures
If you have pictures of yourself or family members on your system, they are also available to the “hacker.” I don’t think I need to explain the danger here. Not only has the individual compromised your computer system, they also know what you look like.

Resume
This may not sound like a priority file for a “hacker” but stay with me for a second. How many of you have resumes typed up on your computers? I’m sure a lot of you do. If a “hacker” were to download your resume they now have access to:
Name:
Address:
Phone:
Workplace:

It doesn’t stop there either. Those are just a few of the things that can happen when your system is compromised. This is no science fiction these are real life possibilities. The extent of that information was gathered just from files on your system.

Seven Rs of Change Management


Seven Rs of Change Management is a quick check list of what should be covered when raising a request for change. Change Management is a core process of the ITIL version 3 Service Transition volume.

The Seven Rs of Change Management is used as part of the change assessment activity.

Who RAISED the Change?
What is the 
REASON for the change?
What 
RETURN will the change deliver?
What 
RISKS are there is we do or do not carry out the change?
What 
RESOURCES will be required to perform this change?
Who is 
RESPONSIBLE for this change being performed?
What 
RELATIONSHIPS are there between this and other changes?

1. Who raised the change?

Unauthorized change is the scourge of IT. One way to address authorization is to develop a system for centrally recording all changes. Such a system must incorporate appropriate controls to address change handoffs across functional areas. This single “system of record” is especially useful during audits.

2. What is the reason for the change?

Answer this question so you can avoid changes that introduce risk without offering any corresponding business benefits. This assessment will ensure appropriate prioritization of change and expose gross potential misalignments before they sap IT resources.

3. What return is required from the change?

While ITIL recognizes two key inputs into the change management process (problems and innovation), guidance about how innovation should be regulated is sparse. “ITIL Financial Management for IT Services” can provide useful cost-related information but needs to be supplemented with value-based metrics to objectively measure the true financial impact of change.

4. What are the risks involved in the change?

All change involves risk. The question is how much risk. Some risks can be avoided or mitigated and some have to be accepted. You must make every effort to assess the likely impact of change on your infrastructure. Identify a regression strategy should the worst happen. Make sure that you also consider the risk of not making a change.

5. What resources are required to deliver the change?

Both people and IT assets are needed. From a people perspective, mechanisms need to be in place to determine what skills are needed to make the change, as well as whether those skills are actually available. Assets require a similar analysis.

6. Who is responsible for the “build, test, and implement” portion of the change?

Responsibilities for each of these three functions must be appropriately segregated, especially in light of compliance and auditing requirements. Segregation of responsibilities, however, should not be restricted to application development.

7. What is the relationship between this change and other changes?

Change relationships need to be determined from within and across functional boundaries. Failing to do so will result in longer periods of planned downtime due, for example, to incorrect or sub-optimal change sequencing. Shared scheduling of planned changes can help here, as can change impact analysis and relationship mapping from an integrated configuration management database (CMDB).

---

Regards,

Amarjit Singh

WHO ARE HACKERS?

The definition of a hacker has been influenced and tainted over the years. There have been various computer related activities attributed to the term “hacker”, but were greatly misunderstood. Unfortunately for the people who are truly defined within the underground tech world as a “hacker” this is an insult to them.There are various types of “hackers”, each with their own agenda. My motto is to help protect you from the worst of them.

Anarchist Hackers

These are the individuals who you should be weary of. They are more likely to be interested in what lies on another person’s machine for example yours. Mostly you’ll find that these individuals have slightly above computer skill level and consider themselves hackers. They glorify themselves on the accomplishments of others. Their idea of classing themselves as a hacker is that of acquire programs

and utilities readily available on the net, use these programs with no real knowledge of how these applications work and if they manage to “break” into someone’s system class themselves as a hacker. These individuals are called “Kiddie Hackers.” They use these programs given to them in a malicious fashion on anyone they can infect. These individuals are usually high school students.

Hackers

A hacker by definition believes in access to free information. They are usually very intelligent people who could care very little about what you have on your system. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker.” They have attributed any computer related illegal activities to the term “hacker.”

For real hackers, the higher the security the better the challenge. The better the challenge the better they need to be. They don’t particularly care about bragging about their accomplishments as it exposes them to suspicion. They prefer to work from behind the scenes and preserve their anonymity. Not all hackers are loners, often you’ll find they have a very tight circle of associates, but still there is a level of anonymity betweenthem.

Crackers

For definition purposes I have included this term. This is primarily the term given to individuals who are skilled at the art of bypassing software copyright protection. They are usually highly skilled in programming languages. They are often confused with Hackers. As you can see they are similar in their agenda. They both fight security of some kind, but they are completely different “animals.” Being able to attribute your attacks to the right type of attacker is very important. By identifying your attacker to be either an Anarchist Hacker or a Hacker you get a better idea of what you’re up against.

“Know your enemy and know yourself and you will always be victorious...”

Monday, March 23, 2009

THE TROJAN “HORSE”

Trojan’s are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each more cleverly designed that the other. In my studies I have found that Trojans are primarily responsible for almost all Windows Based machines being compromised.

For those of you who do not know what Trojans are I’ll briefly explain. Trojans are small programs that effectively give “hackers” remote control over your entire Computer.

Some common features with Trojans are as follows:
• Open your CD-Rom drive
• Capture a screenshot of your computer
• Record your key strokes and send them to the “Hacker”
• Full Access to all your drives and files
• Ability to use your computer as a bridge to do other acking related activities.
• Disable your keyboard
• Disable your mouse…and more!

Generally Trojan has two parts to it. There is a Client and a Server. The server is the file that would have to get installed on victims system. Here’s how the hack would go. After the Trojan installs on victims computer, it will then send a message to the hacker telling him the following information.

Username: (A name they call you)
IP Address: (Your IP address)
Online: (Your victim is online)

So it doesn’t matter if you are on dial up. The potential hacker will automatically be notified when you log on to your computer.

Listed below are some other ways they can get the infected file to you.

News Groups: By posting articles in newsgroups with file attachments like (mypic.exe) in adult newsgroups are almost guaranteed to have someone fall victim.

Grapevine: Unfortunately there is no way to control this effect. You receive the file from a friend who received it from a friend etc. etc.

Email: The most widely used delivery method. It can be sent as an attachment in an email addressed to you.

Unsafe Web sites: Web sites that are not “above the table” so to speak. Files downloaded from such places should always be accepted with high suspicion.

Chat Sites: Chat sites are probably one of the primary places that this sort of activity takes place. The sad part to that is 80% are not aware of it.
Newer Posts Older Posts Home