Archive for January 2011

GSM Security

I have decided to write on GSM security structure so that you people about the telecommunication world security, well before going to the main topic it is good to introduce the GSM. 

GSM or Global System For Mobile Communication is a digital cellular communication system that works on TDM(time-division multiplexing) and FDM(frequency division multiplexing) multiplexing technique, i will not discuss all the technique deeply because it is a another topic to be discussed, but it is necessary to review the design or structure of the system to whom we analyze.

Create Your Own VPN Using Windows XP

Before reading this article it is recommended to read the first episode of Virtual Private Network (VPN) click here to read.

As we have described on previous article that VPN is secure and uses encryption technique and create a virtual tunnel for communication, Windows XP provides a certain level of security by using Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP). They are both considered tunneling protocols – simply because they create that virtual tunnel.

Best Linux Distro For Pen-Tester

Penetration testing is a method to enter into a network or computer without the knowledge of user-name and password, in short penetration testing means to check the IT infrastructure for various vulnerability that an attacker may use to gain access into the network.

The person who do this test known as Pen-tester, normally penetration testing is done by Linux distribution with a multiple tools. Now there are many Distro that can perform penetration testing with the powerful tools, which one is the best is depend on the tester or the test that going to be held.   

Web Browser Attack-TabNapping

We are living in the jungle of web, we have different web-browser to view internet websites. Different vulnerability on browser's arising every day and you have to be aware these new attack to protect your infrastructure.

As you know in the phishing attacker send a URL to the victim and victim has to click on URL to go on phishing page, now the thing is change a new term has been discovered that is TabNapping, tabnapping is a web-browser attack and the new way of phishing attack in which victim not require to click any URL.

Virtual Private Network


Let us a scenario in which a company has offices in the US and Europe, the head office are in US while three regional offices are in Europe, now the company has to connect their three offices to the head office. One solution is to use leased lines in which the company has to connect the local ISP(Internet Service Provider) via T1(North American Standard) or E1(European Standard) lines,
for good performance the company need high speed connection means high data rate. 

Change Text On Windows XP Start Button

This article will teach you how to change text on your windows xp start button, you have to do this very carefully. We are going to change explorer.exe so read all the stuff and implement it but be careful. I am not responsible if you screw up you explorer.exe by doing this.

If you think that your windows start button is so boring and you want to change this text by your means than you can, it involve some tricks to edit registry and than you will done.


Protect YourSelf From ClickJacking

On a previous article we have briefly discussed about ClickJacking with video demonstration, now after reading previous article you have an idea about clickjacking means click+hijacking.

In this article we will only discuss about the defend side as on previous article i have explained about protection but some people send me the request to write a detail tutorial on it.


FaceBook Hacking Course

There is no need to introduce facebook, facebook is one of the leading social network in the world, how to hack facebook? How the hackers hack it? Most of the user's asking these question but now hacking a facebook account is not a secrete any more.

As you know that the only way to stop a hacker is to think like one, so this course will tell you how the hacker hack into your account so that you can secure yourself and to whom you care about.


WiFi Killer-FireSheep

Security researcher always warned people about the bug and vulnerability of public networks and unencrypted services, life changes every day the new day come with some new vulnerability.

As you know that when you logging into a website your enter your user-name and password and then the server check your submitting user-name and password with their record and than assign you a cookies for your browser to get connected with server, what happen when you are logging and someone will get your cookies and use it on his browser, yes this is called session hijacking.

Protect YourSelf From ATM Fraud

We are living in the age of technology and whole world has become dependent on plastic money to an impressive degree.There is no doubt that the use of a credit card and ATM it is safer to go with large amounts of cash, but you have to keep your eyes on the skimming.

Skimming fraud is an act to obtain card information illegally and use without the permission of card holder.
This can be done by using various method but in this article i will try to cover about ATM skimmer.

ClickJacking

There are different web-based threat present and in this article i will discuss about ClickJacking, the growing threat that has been discussed at the OWASP NYC AppSec 2008 Conference.

The word ClickJacking is simply derived from Click+Hijacking. In short ClickJacking is a web-based coding technique that present user's to buttons and images to click it on and do something different.


My Computer Is Infected By Malware-Now What

So many people asking these question like [hay i think i am infected now what i do?] [I have mistakenly clicked on a keylogger now what?]

So many miscellaneous user's spread their Malware (RAT.keylogger.worm) via different techniques may be you are the victim of them, so the question is how to find that your computer infected and the third party watching your action and stealing your data. 


My Website Has Been Hacked- Now What

I will write this article because there are lot of miscellaneous user's or black hat hacker's working out. They are trying to hack your website and this is the truth that there is no security in the world, for what if someone get access into your website and your website got hacked.
If your site got hacked  so what, it happens to many webmaster now the time to track and find the way that the hacker used to got in.

How To Make Interesting Viruses

On different episode of malware you have learned a lot of things about viruses and worms and after reading episode 3 have able to make your own virus by eh-virus maker.
Now at this time i will show you how make some interesting and little bit funny viruses to make fun with your friends and other people.




Virtual Machine

Introduction
 
A virtual machine is a program that run in an isolated partition on real computer(machine). As the name suggest virtual means it is not real, operating system install on VM do not run on real hardware.

When you install an operating system on a virtual machine and that OS tries to communicate with the hardware,




Create Your Own Virus: Malware[Episode 3]


Welcome my friends with the new episode of Malware as i told you on previous episode that i will tell you how to create your own virus so the time is on head, in this tutorial i will going to share a video tutorial that i have made and uploaded for you. Sorry for late episode but i was busy to making virus maker tool and now everything is fine.

How To Enable Cookies (IE,FireFox,Opera)

A cookie is a piece of data which often includes an unique identifier, that is sent to your browser from a web site you visit, stores as a file on your computer, identifies you as a unique user and track your web usage.






Protect YourSelf From USB Sniffing

As you are very well aware about your pen drive or USB (Universal serial bus) drive and your are using your pen drive for transferring a data and so on, have you ever think that your usb might catch the passwords from a computer? If no than you should think like that and you should do something to avoid password theft and usb sniffing below is the example that tell you how the miscellaneous user (Hacker) can steal you sensitive data.


 

Viruses: Malware [Episode 2]



On a previous article you have learned from basis about malware now in this episode you will learn more deeply about viruses worms and their types with respect to its construction. later on, on the third episode i will show you how to make your own simple and harm virus/worm. 


Once a virus is active, it loads into your computer's memory and copies itself to applications or system files on disks you use.

Steps To Make Your Linux Boot Faster

Here are the steps that can make your Linux system boot faster. I did this on my friends pc which has 512 RAM , an Intel dual core processor with RHEL5.1.

Step 1 :
Decide on the unnecessary services and stop them. I stopped these using the following commands :






Malware [Episode 1]

Malware is short for malicious software or a malicious program designed to a cause of damage into a system and makes your system to do something that an attacker wants it to do.
Malware may design to do the following stuffs or it depends upon an attacker.

● By using malware an attacker can steal your sensitive information, your personal information, credit card or etc from your computer.

Denial Of Service Attack [Episode 2]

On a previous article you have read the basic idea and basic denial of service attack and their defense, as i described on previous article that we will share a code for SYN flooding attack.
Here is an example of exploit code written by Zakath that creates a SYN flood, the code is presented here for educational purpose only, this code is available on many web sites.