-
Nslookup is a program to query Internet domain name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure.
-
Helps find additional IP addresses if authoritative DNS is known from whois.
-
MX record reveals the IP of the mail server.
-
Both Unix and Windows come with a Nslookup client.
-
Third party clients are also available - E.g. Sam Spade
Nslookup employs the domain name delegation method when used on the local domain. For instance, typing 'hr.targetcompany.com' will query for the particular name and if not found, will go one level up to find 'targetcompany.com'. To query a host name outside the domain, a fully qualified domain name (FQDN) must be typed.
The attacker can use dig and host command to obtain more information on UNIX systems.
Share This Post With Your Friends
Thursday, April 2, 2009
What is Nslookup
Wednesday, April 1, 2009
Footprinting - Attack Methods
- A web page (save it offline, e.g. using offline browser such as Teleport pro
- Yahoo or other directories. (Tifny is a comprehensive search tool for USENET newsgroups.
- Multiple search engines (All-in-One, Dogpile), groups.google.com is a great resource for searching large numbers of news group archives without having to use a tool.
- Using advanced search (e.g. AltaVista),
- Search on publicly trade companies (e.g. EDGAR).
- Dumpster diving (To retrieve documents that have been carelessly disposed)
- Physical access (False ID, temporary/contract employees, unauthorized access etc)
There are four RIRs, each maintaining a whois database holding details of IP address registrations in their regions. The RIR whois databases are located at:
-
ARIN (North America and sub-Saharan Africa)
-
APNIC (Asia Pacific region)
-
LACNIC (Southern and Central America and Caribbean)
-
RIPE NCC (Europe and northern Africa)
Tools There are tools available to aid a whois lookup. Some of them are Sam Spade (downloadable from www.samspade.org). Smart Whois (downloadable from www.tamos.com). Netscan (downloadable from www.netscantools.com) and GTWhois (Windows XP compatible) (www.geektools.com) etc.
---
Amarjit Singh
What is Footprinting
-
Footprinting is the blueprinting of the security profile of an organization, undertaken in a methodological manner.
-
Footprinting is one of the three pre-attack phases. The others are scanning and enumeration.
-
Footprinting results in a unique organization profile with respect to networks (Internet / Intranet / Extranet / Wireless) and systems involved.
There is no single methodology for footprinting, as a hacker can choose several routes to trace the information. Footprinting therefore, needs to be carried out precisely and in an organized manner. The information unveiled at various network levels can include details of domain name, network blocks, network services and applications, system architecture, intrusion detection systems, specific IP addresses, access control mechanisms and related lists, phone numbers, contact addresses, authentication mechanisms and system enumeration.
The information gathering activity can be broadly divided into seven phases:
-
The attacker would first unearth initial information (such as domain name),
-
locate the network range of the target system (using tools such as Nslookup, whois etc),
-
ascertain the active machines (for instance by pinging the machine),
-
discover open ports or access points (using tools such as port scanners),
-
detect operating systems (for instance querying with telnet),
-
uncover services on ports and
- ultimately map the network.
This not only speeds up the real attack process, but also aids in helping the attacker prepare better for covering his tracks and thereby leave a smaller or minimal footprint.
Initial Information:
Commonly includes:
-
Domain name lookup
-
Locations
-
Contacts (Telephone / mail)
Information Sources:
-
Open source
-
Whois
-
Nslookup
Hacking Tool:
-
Sam Spade
Open Source Footprinting is the easiest and safest way to go about finding information about a company. Information that is available to the public, such as phone numbers, addresses, etc. Performing whois requests, searching through DNS tables are other forms of open source footprinting. Most of this information is fairly easy to get, and within legal limits. One easy way to check for sensitive information is to check the HTML source code of the website to look for links, comments, Meta tags etc
-
The attacker would first unearth initial information (such as domain name),
Tuesday, March 31, 2009
What do Ethical Hackers do?
-
"If you know the enemy and know yourself, you need not fear the result of a hundred battles." - Sun Tzu, Art of War
-
Ethical hackers tries to answer:
-
What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)
-
What can an intruder do with that information? (Gaining Access and Maintaining Access phases)
-
Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)
-
-
If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.
Hacktivism
-
Refers to 'hacking with / for a cause'.
-
Comprises of hackers with a social or political agenda
-
Aims at sending across a message through their hacking activity and gaining visibility for their cause and themselves.
-
Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals.
-
It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.
Most hacktivists aim at sending across a message through their hacking activity and gaining visibility for their cause and themselves. Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals. It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.
Hacker Classes - Black hats, White Hats, Gray Hats,
-
Black hats
-
Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as 'Crackers.'
-
-
White Hats
-
Individuals professing hacker skills and using them for defensive purposes. Also known as 'Security Analysts'.
-
-
Gray Hats
-
Individuals who work both offensively and defensively at various times.
-
-
Ethical Hacker Classes
-
Former Black Hats
-
Reformed crackers
-
First-hand experience
-
Lesser credibility perceived
-
-
White Hats
-
Independent security consultants (maybe groups as well)
-
Claims to be knowledgeable about black hat activities
-
-
Consulting Firms
-
Part of ICT firms
-
Good credentials
-
-
Hacking Phase 5 - Covering Tracks
-
Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.
-
Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.
-
Examples include Steganography, tunneling, altering log files etc.
-
Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.
Hacking Phase 4 - Maintaining Access
-
Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.
-
The hacker has exploited a vulnerability and can tamper and compromise the system.
-
Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.
-
Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.
Hacking Phase 3 - Gaining Access - The hacker exploits the system
-
Gaining Access refers to the true attack phase. The hacker exploits the system.
-
The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.
-
Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.
-
Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network level.
Hacking Phase 2 - Scanning
-
Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
-
Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
-
Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.
Hacking Phase 1 - Reconnaissance
-
Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization
-
Business Risk - To see if someone is watching and responding. Could be future point of return when noted for ease of entry for an attack when more is known on a broad scale about the target.
-
Passive reconnaissance involves monitoring network data for patterns and clues.
-
Examples include sniffing, information gathering etc.
-
-
Active reconnaissance involves probing the network to detect
-
accessible hosts
-
open ports
-
location of routers
-
details of operating systems and services
-
Essential Terminology
-
Threat - An action or event that might prejudice security. A threat is a potential violation of security.
-
Vulnerability - Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.
-
Target of Evaluation - An IT system, product, or component that is identified/subjected as requiring security evaluation.
-
Attack - An assault on system security that derives from an intelligent threat. An attack is any action that attempts to or violates security.
-
Exploit - A defined way to breach the security of an IT system through vulnerability.
---
Amarjit Singh
Can Hacking Be Ethical?
-
The noun 'hacker' refers to a person who enjoys learning the details of computer systems and stretch their capabilities.
-
The verb 'hacking' describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.
-
The term 'cracker' refers to a person who uses his hacking skills for offensive purposes.
-
The term 'ethical hacker' refers to security professionals who apply their hacking skills for defensive purposes.
Now its all upon you, how you wanna to take it.
---
Amarjit Singh
Monday, March 30, 2009
Chinese cyber spies hack Indian embassy in US
Test your hacking Skills
http://www.hellboundhackers.org
The ultimate song search engine!
-artist
-albums
-song titles
and it brings back thousands of results and not only can you download them but you can stream them first if you want
Code:
http://www.iwantmuzik.com
Learning the system loop hole
OH NO! MY SYSTEM’S INFECTED
- Run the firewall programs to block out intruders.
- Monitor your system for unusual happenings (CD Rom opening for no reason)
- Use the Netstat command to see what ports are being used if you get suspicious
- The ultimate goal is not to be paranoid about the use of your computer. It’s about being smart about how you use your computer.