Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Thursday, April 2, 2009

What is Nslookup

  • Nslookup is a program to query Internet domain name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure.

  • Helps find additional IP addresses if authoritative DNS is known from whois.

  • MX record reveals the IP of the mail server.

  • Both Unix and Windows come with a Nslookup client.

  • Third party clients are also available - E.g. Sam Spade


    Nslookup employs the domain name delegation method when used on the local domain. For instance, typing 'hr.targetcompany.com' will query for the particular name and if not found, will go one level up to find 'targetcompany.com'. To query a host name outside the domain, a fully qualified domain name (FQDN) must be typed.

    The attacker can use dig and host command to obtain more information on UNIX systems.


Wednesday, April 1, 2009

Footprinting - Attack Methods

Attack Methods  

The attacker may choose to source the information from:

  • A web page (save it offline, e.g. using offline browser such as Teleport pro 
  • Yahoo or other directories. (Tifny is a comprehensive search tool for USENET newsgroups. 
  • Multiple search engines (All-in-One, Dogpile), groups.google.com is a great resource for searching large numbers of news group archives without having to use a tool.
  • Using advanced search (e.g. AltaVista),
  • Search on publicly trade companies (e.g. EDGAR).
  • Dumpster diving (To retrieve documents that have been carelessly disposed)
  • Physical access (False ID, temporary/contract employees, unauthorized access etc)

There are four RIRs, each maintaining a whois database holding details of IP address registrations in their regions. The RIR whois databases are located at:

  • ARIN (North America and sub-Saharan Africa)

  • APNIC (Asia Pacific region)

  • LACNIC (Southern and Central America and Caribbean)

  • RIPE NCC (Europe and northern Africa)


    Tools 

    There are tools available to aid a whois lookup. Some of them are Sam Spade (downloadable from www.samspade.org). Smart Whois (downloadable from www.tamos.com). Netscan (downloadable from www.netscantools.com) and GTWhois (Windows XP compatible) (www.geektools.com) etc. 


    ---

    Amarjit Singh

What is Footprinting

Defining Footprinting
  • Footprinting is the blueprinting of the security profile of an organization, undertaken in a methodological manner.

  • Footprinting is one of the three pre-attack phases. The others are scanning and enumeration.

  • Footprinting results in a unique organization profile with respect to networks (Internet / Intranet / Extranet / Wireless) and systems involved.

    There is no single methodology for footprinting, as a hacker can choose several routes to trace the information. Footprinting therefore, needs to be carried out precisely and in an organized manner. The information unveiled at various network levels can include details of domain name, network blocks, network services and applications, system architecture, intrusion detection systems, specific IP addresses, access control mechanisms and related lists, phone numbers, contact addresses, authentication mechanisms and system enumeration.

    The information gathering activity can be broadly divided into seven phases: 

    • The attacker would first unearth initial information (such as domain name), 

    • locate the network range of the target system (using tools such as Nslookup, whois etc),

    •  ascertain the active machines (for instance by pinging the machine), 

    • discover open ports or access points (using tools such as port scanners), 

    • detect operating systems (for instance querying with telnet), 

    • uncover services on ports and 

    • ultimately map the network.

    This not only speeds up the real attack process, but also aids in helping the attacker prepare better for covering his tracks and thereby leave a smaller or minimal footprint.

    Initial Information:

    Commonly includes:

    • Domain name lookup

    • Locations

    • Contacts (Telephone / mail)

    Information Sources:

    • Open source

    • Whois

    • Nslookup

    Hacking Tool:

    • Sam Spade

      Open Source Footprinting is the easiest and safest way to go about finding information about a company. Information that is available to the public, such as phone numbers, addresses, etc. Performing whois requests, searching through DNS tables are other forms of open source footprinting. Most of this information is fairly easy to get, and within legal limits. One easy way to check for sensitive information is to check the HTML source code of the website to look for links, comments, Meta tags etc

Tuesday, March 31, 2009

What do Ethical Hackers do?

What do Ethical Hackers do?
  • "If you know the enemy and know yourself, you need not fear the result of a hundred battles."                                           - Sun Tzu, Art of War

  • Ethical hackers tries to answer:

    • What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)

    • What can an intruder do with that information? (Gaining Access and Maintaining Access phases)

    • Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)

  • If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.

Hacktivism

Hacktivism
  • Refers to 'hacking with / for a cause'.

  • Comprises of hackers with a social or political agenda

  • Aims at sending across a message through their hacking activity and gaining visibility for their cause and themselves.

  • Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals.

  • It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.

    Most hacktivists aim at sending across a message through their hacking activity and gaining visibility for their cause and themselves. Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals. It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.

Hacker Classes - Black hats, White Hats, Gray Hats,


Continuing to my  old post http://9911245670.blogspot.com/2009/03/who-are-hackers.html

Hacker Classes
  • Black hats

    • Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as 'Crackers.'

  • White Hats

    • Individuals professing hacker skills and using them for defensive purposes. Also known as 'Security Analysts'.

  • Gray Hats

    • Individuals who work both offensively and defensively at various times.

  • Ethical Hacker Classes

    • Former Black Hats

      • Reformed crackers

      • First-hand experience

      • Lesser credibility perceived

    • White Hats

      • Independent security consultants (maybe groups as well)

      • Claims to be knowledgeable about black hat activities

    • Consulting Firms

      • Part of ICT firms

      • Good credentials

Hacking Phase 5 - Covering Tracks

Phase 5 - Covering Tracks
  • Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.

  • Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.

  • Examples include Steganography, tunneling, altering log files etc.

  • Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.

Hacking Phase 4 - Maintaining Access

Phase 4 - Maintaining Access
  • Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.

  • The hacker has exploited a vulnerability and can tamper and compromise the system.

  • Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.

  • Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.

Hacking Phase 3 - Gaining Access - The hacker exploits the system

Phase 3 - Gaining Access
  • Gaining Access refers to the true attack phase. The hacker exploits the system.

  • The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.

  • Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.

  • Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network level.

Hacking Phase 2 - Scanning

Phase 2 - Scanning
  • Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.

  • Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.

  • Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.

Hacking Phase 1 - Reconnaissance

  • Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization

  • Business Risk - To see if someone is watching and responding. Could be future point of return when noted for ease of entry for an attack when more is known on a broad scale about the target.

  • Passive reconnaissance involves monitoring network data for patterns and clues.

    • Examples include sniffing, information gathering etc.

  • Active reconnaissance involves probing the network to detect

    • accessible hosts

    • open ports

    • location of routers

    • details of operating systems and services

Essential Terminology

Essential Terminology
  • Threat - An action or event that might prejudice security. A threat is a potential violation of security.

  • Vulnerability - Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.

  • Target of Evaluation - An IT system, product, or component that is identified/subjected as requiring security evaluation.

  • Attack - An assault on system security that derives from an intelligent threat. An attack is any action that attempts to or violates security.

  • Exploit - A defined way to breach the security of an IT system through vulnerability.


    ---

    Amarjit Singh

Can Hacking Be Ethical?

Can Hacking Be Ethical?
  • The noun 'hacker' refers to a person who enjoys learning the details of computer systems and stretch their capabilities.

  • The verb 'hacking' describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.

  • The term 'cracker' refers to a person who uses his hacking skills for offensive purposes.

  • The term 'ethical hacker' refers to security professionals who apply their hacking skills for defensive purposes.


    Now its all upon you, how you wanna to take it.

    ---

    Amarjit Singh

Monday, March 30, 2009

Chinese cyber spies hack Indian embassy in US

1300 Systems In 103 Countries Breached: Report
NYT & AGENCIES 


Toronto: A vast electronic spying operation from China has infiltrated computers and stolen documents from hundreds of government and private offices around the world, including those of the Indian embassy in the US and the Dalai Lama’s organization, Canadian researchers have concluded.
In a report to be issued shortly, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved.

The researchers, based at the Munk Center for International Studies at the University of Toronto, had been asked by the office of the Dalai Lama in India to examine its computers for signs of malicious software, or malware.

Their sleuthing opened a window into a broader operation that, in less than two years, has infiltrated at least 1,295 computers in 103 countries, including the Indian embassy in Washington as well as the Dalai Lama’s Tibetan exile centres in India, Brussels, London and New York.
The researchers believed that the system, which they called GhostNet, had hacked into systems at embassies of countries like Pakistan, Germany, Indonesia, Thailand and South Korea. What Is GHOSTNET? 

E-spying Operation: Hacks into computers, steals files from govt and pvt offices around the world

Targets: Computer systems in 103 countries, including Indian embassy in Washington, Dalai Lama’s offices, Tibetan exile centres

Controlled: From computers in China. Canadian researchers stop short of naming Chinese govt but a Cambridge group says Beijing involved

Has Big Brother-Style Capacities. Can turn on camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room

Impact: After an e-mail invite was sent by Dalai Lama’s office to a foreign diplomat, the Chinese govt called the diplomat discouraging the visit ‘WHALING’ FOR TARGETS Biggest attack: Dozens of PCs 
hacked every week 

Toronto: Canadian experts have found computer networks at foreign ministries of Bhutan, Bangladesh, Latvia, Indonesia, Iran and the Philippines, have been hacked. The spying operation is by far the largest to come to light in terms of countries affected.

This is also believed to be the first time researchers have been able to expose the workings of a computer system used in an intrusion of this magnitude.

Still going strong, the operation continues to invade and monitor more than a dozen new computers a week, the researchers said in their report, ‘Tracking GhostNet: Investigating a Cyber Espionage Network’. They said they had found no evidence that US government offices had been infiltrated, although a Nato computer was monitored by the spies for half a day.

The malware is remarkable both for its sweep in computer jargon — it has not been merely ‘phishing’ for random consumers information but ‘whaling’ for particular important targets — and for its big brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.

Working with the Tibetans, the researchers found that specific correspondence had been stolen and that the intruders had gained control of the electronic mail server computers of the Dalai Lama’s organization.

The electronic spy game has had at least some real-world impact. For 
example, experts said, after an email invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities. A spokesman for the Chinese consulate in New York dismissed the idea that China was involved. NYT & AGENCIES 

---
Amarjit Singh

Test your hacking Skills

Test your hacking Skill at

http://www.hellboundhackers.org

The hands-on approach to computer security. Learn how hackers break in, and how to keep them out.

---
Amarjit Singh

The ultimate song search engine!

New site where you can search:

-artist
-albums
-song titles

and it brings back thousands of results and not only can you download them but you can stream them first if you want

Code:

http://www.iwantmuzik.com

---
Amarjit Singh

Learning the system loop hole

Learning the system loop holes and tricks that “hackers” use is only half the process.  Protecting your privacy is 90% up to you, the rest can be handled by software. You have the means and ability to protect yourself. You may think to yourself that you’re out gunned on the Internet, don’t.  We all have to start learning from somewhere.  Even hackers and so called “hackers” had to start learning somewhere.  No one was born with the knowledge of how a computer works. The Internet is a tool by which many of these “hackers” educate themselves.  You can do the same.  It remains the most powerful tool for information and development there is. More and more businesses and services are migrating to the 
online world.  You can either, sit back and watch it go, or jump on the bandwagon and ride it out.  It’s all up to you. 
Exercise caution when dealing with people online, but don’t be too paranoid.  Enjoy the power of the Internet it can be a great asset to you or your business. 


The online population is growing exponentially.  With the recent growth of dedicated access your computer is connected to the 
Internet 24hrs a day. We primarily care about getting our daily activities done and enjoying the power of the Internet.  We want to be able to Log online talk to our friends and family and use the Internet as tool for our benefit. 


The Internet connects you to the world where if a friends from Australia wishes to talk to you live one on one they can flip on their webcams turn on their mics and have a video conference.  It’s a cut above a phone call for a fraction of the price.  Don’t let “hackers” turn future advancements into unwanted nightmares. You as a user can prevent this by being careful.  Take the extra necessary steps to protect yourself.  When compared to the benefits you can have it definitely is worth an extra 1hr-2hrs of your time. Don’t stop learning, read all you can.  Why not?  You’ve got the world at your fingertips and information at every turn.  But most importantly when all is said and done, take back your privacy from those who may seek to compromise it. 

---
Amarjit Singh

OH NO! MY SYSTEM’S INFECTED

Hope-fully this is not the case for the majority of you, but I know there will be a few people who are going to be infected. The only way you are really going to know if you are infected is diagnosing your computer properly. I recommend getting Lockdown 2000 for this. Install it on your system and run a full system scan on your machine.

After running Lockdown 2000, run your anti virus scanner just in case Lockdown missed anything. You may ask yourself why I suggest such redundancy? Computers are built on the principle of redundancy. One program will always compensate for the short-comings of the other. This should reveal most if not all Trojans currently residing on your machine. Until you are absolutely sure about not possessing any Trojans on your machine I suggest being alert of the happenings on your computer.
  • Run the firewall programs to block out intruders.
  • Monitor your system for unusual happenings (CD Rom opening for no reason)
  • Use the Netstat command to see what ports are being used if you get suspicious
  • The ultimate goal is not to be paranoid about the use of your computer. It’s about being smart about how you use your computer.

SURVELLANCE VIA INTERNET CONNECTION

This is very real. Depending on how much you read and how much you know about Trojans you are probably aware of what I am talking about. If you are not aware, then I am referring to the ability to effectively turn your computer into an audio/video survellance unit without you knowing.

Question: How?
Answer: How many of you have Webcams? How many of you have Microphones?
Not all Trojans have the ability to access your Web Cam and Microphone. The ones that do, have the ability to turn your

computer into a video/audio survellance camera. The Trojan records the sounds in a room via your microphone and then sends the file back to the “hacker.” The hacker then plays the file back and can hear any sounds recorded in the room. Add to that since the recording is a file they can play it back whenever they want to who ever they want. By the same method they access your Web Cam effectively getting both a video and audio feed from your house of what is currently going on in that room.

That sounds crazy, but I can assure you it is not. I don’t think I need to tell you what type of security hazard this represents to you and your family. By now you are probably worried/scared of the possible vulnerabilities of your computer. Don’t be.

Shivlu Kavita


Chitr
-----

Gaadi ke us dibe mai thi bhid niranter badti jaati,
ik aata pir dusra aata, ik aata pir dusra aata,
Vo ayi, Vo gira, chadaa vo,
shorr tha bhi-shan, kola hal tha,
sabki isha thi ki pahunche nitya gantvya per jaldi,
Isi bhidd mai, isi bhid mai, jan samudai mai,
In udti umadti lehro mai,
ek dhimi si, mithi si dhawni sunai di,
ki jaise monn tod ker bol pada ho koi jogi, 
sahsa, akasmaat, achanaak, 10-10 paise ka ek packet, 
lo bibi ji lo babuji, lelo sahib 10 paise mai,
sheeth ritu ka tohfa laya, lo sahib ji 10 paise mai,
mastak uska jaise gita ka koi pawan panaa raha ho,
hont the uske jaise maano koi kamal khila ho,
sabkuch sunder tha, kintu tha bhagya heen vo balak,
jisko dekh ker laga mere ko kaise,
chitr-kaar ne chitr bana ker roop rank akar diya,
aur uske badle mai us pawan, manmohak chitr kaa ek koona hi faad diya!!!!!

---
Shivlu Jain
Newer Posts Older Posts Home