Showing posts with label hackerbaz. Show all posts
Showing posts with label hackerbaz. Show all posts

Thursday, 9 June 2016

Wireless Hacking

Wireless Hacking

Hello Friends, Today we are going to study "Wireless Hacking". Wireless networks are all around , from home to corporate server farms. They make our lives by avoiding physical connectivity to networks via cables while providing guaranteed consistent network connectivity of devices. It is an advantage with a certain danger attached to it . Wireless network are prone to hacking attacks. We will examine a couple of strategies to secure wireless networks to accomplish satisfactory security.


How do Wireless Network Work ?

Before we discuss wireless network security and weakness, we must understand the fundamental radio transmission and the IEEE 820.11 protocol, regularly known as the WLAN protocol. This protocol connects two or more devices within the short range, Using radio signals. to set up a wireless network, you require a wireless access point and a wireless network card for every device to be connected. The access point is also referred as a Hotspot. It consists of a radio transmitter which is used for transmitting and receiving signals, additionally it also contains hardware which converts data signals to radio signals & vice versa.

we can access a wireless network using wireless network enabled device such as a laptop, tablet, smartphones etc. within the transmission range of a wireless point. most of the device have the wireless network option enabled by default.

you can connect to any wireless network if it is not password protected. if it is password protected then you will need the password to gain access.

Wireless network Authentication 

As the wireless network network is open to every body who has a wireless network enabled gadget, most network are now configured with some kind of encryption and authentication mechanisms.

Let's take a look at some of the commonly used wireless authentication techniques.

WEP

WEP is the acronym for wired equivalent privacy. It was developed for IEEE 802.11 WLAN standards. Its objective was to provide data protection similar or equivalent to that provided by wired networks. WEP encrypts the data, When transmitted over the networks to keep it safe.

WEP Weakness

WEP has significant design flaws and vulnerabilities 

  • WEP is based on passwords which makes it vulnerable to dictionary based attacks.
  • WEP uses R encryption algorithm to create stream ciphers. The stream Cipher input is made of an initial value (iv) and a secret key. The length of the initial value (iv) is 24 bits long while the secret key can either be 40 bits or 140 bits long. The total length of both the initial value and secret can either be 64 bits or 128 bits long. The lower possible value of the secret key makes it easy to crack it.
  • Weak initial values combination don't encrypt adequately.
  • Initial values can be reused.

WPA

WPA stands for WI-FI Procted access. It is A security Protocol developed through The WI-FI alliance in response to the weakness found in WEP. It is used to encrypt data on 802.11 WLAN's. It uses higher initial values 48 bits as an alternative to the 24 bits that WEP uses. It uses temporary Keys to encrypt packets.

WPA Weakness

  • The collision avoidance implementation can be broken.
  • It is vulnerable to DoS attacks.
  • Pre-shared keys Use passphrases. Weak passphrases are vulnerable to dictinary based attacks.
If you like my post & my Blog Please Comment and review it 
______________Thank You________________

Finding The location Of a Server

Finding The location Of a Server

Hello Friends, Today i am going to Show to How to Find the location of a Server. This is very Important step in hacking a Server. In a Case you got caught by Cyber Police you can get rid out of the case from the loopholes in Cyber Laws of that country. It will Only happen when you know the Cyber law of that Country this is only possible when you know the location of the server.


  

Pre-requisite

  • A Computer installed with OS
  • Internet Connection 

What is a Web server ?

web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer to the entire system, or specifically to the software that accepts and supervises the HTTP requests.

The primary function of a web server is to store, process and deliver web pages to clients. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents, which may include imagesstyle sheets and scripts in addition to text content.

Steps to Find The Location Of a Server

1- Open Your Web Browser.

2- Search For "www.iplocation.org".

3- "iplocation.org" Looks like This


4- Give the Target Domain or IP Address.


5- Click on IP lookup.

6- It will show you Result Like This.

You can See that It shows the IP Address Of the Target & Country, Region, City .

[Note]
This Tutorial Is Only for Educational Purpose.

If you like my Blog, My Post's Please leave a Comment 
____________________________________Thank You ____________________________________

Friday, 27 May 2016

Basics OF Networking

Basics OF Networking 


What is Network ?

A computer Network or data Network is a Telecommunications Work which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.

  • Interconnection of two or more devices is called as a Network.
  • The Communication between two or more interconnected devices is called networking.
  • An internetwork is a connection of two or more network.
  • Internetworking means communication between different networks.

Types of Network ?

  • LAN-  Local Area Networks are used to connect networking devices that are in a very close geographic area such as a floor of a building, a building itself or with in a campus.
  • MAN- Metropolitan Area Network are used to connect networking devices that may span around the entire city.
  • WAN- Wide area networks which connects two or more LANs present at different geographical locations.

LAN Network

Man Network


WAN Network

Basic Requirements to Form a Network.

  • NIC ( Network Interface Card ) also called as LAN card.
  • Media 
  • Networking device like ( Hub,Switch,Router etc. )
  • Protocols 
  • Logical Address ( IP Address )

NIC(Network Interface Card)

  • NIC is the interface between the computer and the network.
  • It is also known as the LAN card or Ethernet Card.
  • Ethernet Card have a unique 48 bit address called as MAC (Media access Control) Address. MAC Address is also called as physical address or hardware address. The 48bit MAC address is represented as 12 Hexa-decimal digits. Example :0 0 1 6.D 3 F C. 6 0 3 F
  • Network card are available in Different Speed.
  • Ethernet ( 10 Mbps)
  • Fast Ethernet ( 100 Mbps)
  • Gigabit Ethernet (1000 Mbps)

Media

The purpose of media is to transport bits from one machine to another.

Media Is of 2 type:-
  • Guided 
  • Unguided

Guided media Is also of 3 types :-
  1. Co-axial 
  2. Twisted pair 
  3. Fiber
Unguided Media is of 2 types :-
  1. Infrared 
  2. RF

Types of twisted Pair Cables

Category                                DTR                       Purpose                          Connector

CAT1                                    1 Mbps                  Telephones                            RJ11
CAT2                                    4 Mbps                                                                RJ11
CAT3                                   10 Mbps                 Ethernet                                RJ45
CAT4                                   16 Mbps                                                               RJ45
CAT5                                   100 Mbps               Fast Ethernet                        RJ45
CAT5                                   500 Mbps                                                             RJ45
CAT6                                  1000 Mbps              Gigabit Ethernet                    RJ45

Topology

Topology is a physical layout of the system connected in a network.

Different types of Topology are:
  • Bus
  • Ring
  • Mesh
  • Star

Bus Topology

  • In bus topology all devices are connected to a single cable or backbone.
  • It support half duplex communication.
  • A break at any point along the backbone will result in total network Failure.
Ex:

Ring Topology

  • In Ring topology each computer or device is connected to its neighbor forming a Loop.
  • Failure of a single Device or a break anywhere in the cable cause the full network to stop communicating.
                                                                     Ex:

Mesh Topology

  • In mesh topology each device is directly connected to all other device.
  • The disadvantage is the number of NIC's required on each device and the complex cabling.
Ex:

Start Topology

  • The most commonly used topology.
  • It consist of one centralized device which can be either a switch or a hub.
  • The device connect to the various ports on the centralized devices.
Ex:

Networking Devices 

The various types of Networking Devices are:
  • Hub
  • Switch
  • Router

Hub / Repeater

  • It is not an Intelligent device.
  • It works with bits.
  • Uses broadcast for communication.
  • Bandwidth is shared.
  • Half-duplex communication.
Ex:

Switch

  • It is an Intelligent Device.
  • It maintains MAC address table ( Hardware address )
  • Each port of the switch has fixed bandwidth.
  • It works with flooding and Unicast
  • Supports full duplex communication. 
Ex:

Router

  • It is an Intelligent device.
  • It works with logical addressing (i.e IP, IPX, Apple Talk)
  • It work with Fixed bandwidth. 
Ex:
 If You Like My post Please Review My Blog In Comments .

________________________________Thank You ________________________________

Tuesday, 3 May 2016

How to Find Information of a Website

How to Find Information of a Website

Hello Friends, I am Mahak Bhawsar a Ethical Hacker. I am Back with some New Hacking Tutorials. In this post we are Going to Study How we can Find Information of Website. As u all knows that Foot printing is first step for a Hacker. Foot Printing mean gathering information of our target.



In this Tutorial we Gonna Find Information of Website like :-
  • Its Domain  
  • Its Name server 
  • IP of Server
  • IP of Name Server
  • Its Hosting Company
  • Its Domain Registrar
  • Which Web server they are using 
  • OS of Web server

Pre-requisite

Steps

1. Select the target Website & copy the Domain of the website. Ex www.microsoft.com 
2. Go the www.netcraft.com & paste the domain.


3. After Pasting Domain Click arrow & wait for Result. 
4. You will get Result like this




5. You will get some Information Through this Website & for some more Information we will use a tool called DNS Data View.
6. Download the tool from Internet and Install it.
7. Run the application as Administration.


8. When you start application you will see this Window.


9. Give the target Domain Ex zoomgroup.com & click OK.


10. Wait for some time you will get Result like this.

_________________Thank You_________________


How to Find Available Ports on a IP

How to Find Available Ports on a IP

Hello Friends, Today we are going to Find the Available pots On a IP. This is most important step for hacking a Web Server. After doing this we are able to see What services are On on a IP.


What are Ports ?

In programming, a port is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.

A port is always associated with an IP address of a host and the protocol type of the communication and thus completes the destination or origination address of a communication session. A port is identified for each address and protocol by a 16-bit number, commonly known as the port number.

Specific port number are often used to identify specific services. Of the thousand of enumerated ports, 1024 well-known port number are reserved by convention to identify specific service type on a host. The protocol that primarily use ports are the transport layer protocol, such as the transmission Control Protocol (TCP) and the user Datagram prot (UDP) of the Internet protocol suite.

Pre-requisite


Steps :-

1. Select an Target IP which you want to Scan.
2. Download & Install Advance Port Scanner Tool.
3. Run Advance Port Scanner Tool as Administrator you will Find Tool in start menu after Installation.



4. After Opening Tool you will Get this Window. This Window is for Scanning range of IP's if you want to Scan only One IP Please Un-check Use range option.


5. After Un-checking Use range option you will get this Window.


6. Give the target IP & click on Scan Option to start Scanning.


7. It shows Scanning in bottom. We have to wait for some time.
8. After Scanning It shows Result like this.

If you like My Blog-Spot, My Tutorials Please give me your Feed Back as a Comment.
___________________Thank You___________________

Sunday, 1 May 2016

Countermeasure Technique For Malware

Countermeasure Technique For Malware

Hello Friends, Today We are going to Study the Countermeasure technique for Malware. How can we protect our Computer from Malware. What Countermeasure Techniques we need to Protect our self.

It is always a cat and mouse game between malicious hackers hackers and security administrators. The one who is netter equipped has a greater chance of winning.

This post deals with some of the tools are absolutely necessary protect host in risky environments.



Anti-Virus

We all know this - antivirus is essential. Antivirus software installed on a client scans all the local files to check for virus infections. The antivirus has a database of all known virus which will be used to determine the virus infections on the device

Anti-Worm

Anti-worm is a software that can installed on a client device which scans all the local files to check for worm infection . This too relies on a database of known worms to find out infection.

Anti-Trojan

Anti-Trojan software scans all the local files to check for Trojans. Trojans are hidden programs which latch on to legitimate programs.

These Trojans can be detected by the Anti-Trojan software which maintains a database of all known Trojans.

Internet Security Suit

Internet security suit is an application that inspects a device (Laptop, Desktop, Mobile, Tablet) for different kinds of malware like Viruses, Worms, Trojans, Adware etc. Different vendors also include a personal firewall in the suit which can be used to control the traffic flow to and the device and also to control which application can get network access.

Host-based Intrusion detection system

A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the network of a computing system as well as (in some cases) the network packets on its network interfaces. A host-based IDS monitors all or parts of the dynamic behaviour and the state of a computer system A. HIDS might look at the state of a system, Its stored information whether in RAM in the file system, log files or else where and check that contents of these appear as expected.

Host Based Intrusion Prevention System

A host based intrusion prevention system (HIPS) is an intrusion prevention system that monitors and analyses the internals of a computing system as well as (in some cases) the network packets on its network interface for any malicious traffic or attacks targeted to the host and attempts to block it.

KALI Linux

KALI Linux

Hello Friends, Today we are going to Study KALI Linux. KALI Linux is very important to become a Good hacker. Kali Linux is widely used by Hacker to Hack device.


What is KALI Linux ?

KALI Linux is a Debian based distribution specifically Designed foe Penetration testing and Digital Forensics. KALI Linux is an update distribution of the ever popular Backtrack Linux Distribution. It is developed by Offensive security and contains useful tool useful for penetration testing.

How is KALI Linux is different from other Distribution ?

KALI Linux is a specialized Linux Distribution designed for penetration testing and most of the tools in KALI Linux requires running them as "root". Installing and running application as a root user is not recommended as there is a serious security threat if the user isn't aware of what activities are being performed.

What are the use of KALI Linux ?

Kali Linux can be used to perform penetration testing on a network or a host or can also br used by hackers to launch attacks on vulnerable host.

What is Metasploit Framework ?

Metasploit Framework is an open source tool used to develop and execute exploit on a vulnerable host. It was initially written by HD MOORE in the year 2003 using Perl. In 2007 it was re-written using Ruby.

Metasploit Framework can be used to identify vulnerabilities and exploit vulnerable hosts. Metasploit Framework contains over 500 exploits for window, Linux, Unix, Mac, OS, Android etc.

Metasploit Frame work can be used via the command line interface. There is also an application called 'Amritage' that can be used as a Graphical User Interface for Metasploit.

Penetration Testing

Penetration Testing
Hello Friends, Today i am going to teach you what is Penetration Testing, types of penetration Testing, What is to be Tested 


What is Penetration Testing ?

A penetration test, also known as pen test is a legal attempts at gaining access to your protected computer system or network often conducted by a third party organisation.

The purpose of the test is to identify security vulnerabilities and them attempt to successfully exploit them in order to gain some form of access to the network or computer system.

Penetration tests are carried out by using manual or automated software to safely compromise server endpoint, web application, wireless network, network device, mobile device and other potential risk points. if a tester is able to successfully exploit the vulnerabilities on a target system. they may attempt to use the vulnerable system to launch further attacks ? exploits on other internal resources, by getting deeper access and information via privilege escalation.

 A pen tester will generated a detail reported about successful exploited security vulnerabilities via penetration testing. The generated reports is then given to network & security administrators of organization to take necessary remediation steps for enhancing security by security and patching vulnerabilities.

The main purpose f penetration testing is to verify the impact on the resources and operation of the network in case of any hacking and how to minimize the affect of the same

Types of Penetration Tests

Penetration test can be classified into various types.

1. Network Services test 

This is the most common type of penetration test, Used for finding target system on a network, Finding loopholes / vulnerabilities in the operating system and network services and later exploiting them remotely. Networking service penetration test is done from a remote location through the internet targeting the organization's perimeter network. Sometime these tests are done from the local network to assess the security of the internal network from the perspective of the internal user.

2.Client-side Test

This kind of penetration test is used ti find and exploit vulnerabilities on client-side application like web browser, media player, etc. On a target network.

3. Web application test

This kind pf penetration test is used to find security vulnerabilities in the web server, web based application and programs on a target network 

4. Remote dial-up war dial

This kind of penetration test is used to discover modems. It ites to get connected to the modem by password guessing or brute forcing the target network.

5. Wireless security test

This kind of penetration test is used to discover wireless access points with in range and finding and exploiting the security weakness of access points on a target network.

6. Social Engineering test

This kind of Penetration test is used to gather sensitive information such as a password or other important and confidential data directly from a user. This is old style conning, trying to fool users into revealing their personal information. this type of test may be conducted over the phone or email, targeting-organization users or employee and evaluating security procedures and process.

________________________________Thank You________________________________

Saturday, 30 April 2016

SQL Injection

SQL Injection

Hello Friends, Today we are going to study SQL injection. What they are ? How they Work ? Who can Use them ?


What is SQL Injection ?

SQL injection attacks have been around for more than a decade and they remain popular with hackers.

SQL injection is an exploit used by hackers to steal data from Organizations. It is used to target web application Which generates Content based on user input.

Most Website have a database on the backend which Contains User data, Personal details of Customers, Credit card information, etc. A language called Structured Query Language (SQL) is used to enter and retrieve the data from the database as well as to manipulate it. This language is universal. Almost all database Support SQL, Including Oracle, MS SQL Server, My SQL.

Web application query the backend database to display custom content on the web page. The website presents a form to be filled in by users before serving them appropriate content. The web application assumes that users will provide simple text inputs to the form. Instead, hacker enter SQL queries in the form as input. If user input is not properly validated or sanitized, the SQL query gets executed. Hacker may get the whole database to dump itself on the web page, using a well crafted SQL query.

dynamic script language like PHP, .NET, ASP are susceptible to SQL injection attacks. The tools required by the hacker are very simple - some knowledge of SQL queries , a web browser and a little smarts for guessing table name and field names. there are also tools available online which automates most of the process for hacker.

This is one of the most popular attacks due to its sheer simplicity. Through SQL injection vulnerability has been known for a number of years, many website still remain susceptible.

Firewalls offers almost no protection against SQL injection. That is because all http data is passed on the wen application which in turn has "full access" to the backend database , so that it can present relevant data to the user. Nowadays , we have web application firewalls which provide some degree of protection. However , it is best to safeguard against this attacks by validating and sanitizing all user inputs before passing it to the database.

Effects of SQL Injection ?

An SQL Injection attacks can have a huge impact on the organization.

The hacker gets complete control of the server and all the data on that server. Also , Since this is an internal Server, an attacked server may be used to cpmpromise all the elements on the network. If the intension of the hacker is to steal confidential data , Them he goes about this attacks with great stealth. As we often see in the news orgnization seem to know nothing about the attacks , till all the credit card information of their customers is stolen and gone ! The attacks on target (Holiday season , 2014) is a classic example of this. This wasnahuge loss of face for target , and caused customer to stay away even after repeated assurance that not a data was lost.

Types Of SQL Injection Attacks

SQL injection attacks can be classified based on the injection mechanism.

1.Injection through User Input

This is the simplet form of an SQL injection attacks.SQL queries are sent as users inputs in forms submitted to web application.OIf no user input is done by the web application , the query is executed and the attacks gets underway.

2.Injection Through Cookies

web application store stae information on clients in the form of cookies. since these are stored on the user's system . malicious hacker can tamper with cokie and put SQL queries inside the cookie. When the hacker accesses the website again , the web application inadvertenly uses the tamperes cokkie to construct SQL queries which may have disastrous consequences. 

3.Injection Through Server Variables

Http headres , IP geadres , enviroment variable are all server variables and may be stored in databases for logging and determining usage statistics. It is quite easy for hacker to midify http headers and insert SQL queries in them. If these headers are stored without any sanitization or validation , then the attacks is triggered when the command is issued to log them to the database.

All the above are comsidered first order attacks which means that the attack is executed immediately on initial contact with the database.

4.Second Order SQL Injection Attacks

This is also knows as the stored SQL injection attacks. This attacks is not executed when the malicious inputs in initially entered in the database. It is triggered when the web application later tries to use that stored input by retrieving it with a legitimate query

The second order SQL injection attacks is inherently more complex than first order attacks as the sttacker has to guess how the input will be used later by the application. Web application usually trust data retrived from database and use it as"as is " with out validation> This is when the attack kicks in.

The best safeguard against SQL injection attacks is to validate all the input-whether from user or the database.

Friday, 29 April 2016

Understanding Firewall & IDS

Understanding Firewall & IDS

Business try to protect Their resources with a number of tools and devices. It is the Job of the Ethical Hacker to understand how they so that they can be fortified , if found vulnerable after an ethical hacking attack.

Firewall



What is Firewall ?

Firewall is an appliance or an application that controls the flow of traffic from private network to public network based on the rules configured. The Firewall acts a a barrier between secured internal network and public networks.
Newer Generation firewall can do much more than just controlling network traffic they can block unwanted websites, stop viruses from being download and also filter spam massages.

What are the functions of a Firewall ?

The Primary Function of a Firewall is to control the Flow of Traffic between different Network.

It also does Network Address Translation (NAT) for all requests coming from local (LAN) Networks going to the Internet and also checks whether this user or host is allowed to access the Internet.
For example, If a web page is requested by a local PC , then that requested has to be Natted to a public IP address and approve by the Firewall to reach the Internet. The response coming back from the webserver has to be accepted by the Firewall. Only then can the web page be displayed on the host.

Firewall can also handle Virtual Private Network (VPN) Connections to establish a secure communication channel between different network.

User authentication is also Firewall feature , used to verify users before giving access to resources on other networks.

Intrusion Prevention System


What is IDS ?

Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.
There are network based (NIDS) and host based (HIDS) intrusion detection systems. 

How does an IDS work

An Intrusion detection system (IDS) has attack signatures provided by the vendor. Every request Received by the IDS will be Compared against all the signature to identify a know attacks.

IDS also does a heuristic analysis to identify any malicious traffic patterns, but this requires the IDS to learn the normal traffic patterns, but this requires the IDS to learn the normal traffic patterns to a specific server or a specific service.

Span

Switched port Analyser (SPAN) also called as a port mirroring is a method of transmitting a copy of all packets received on one port of a network switch to another port for analysis.

Span has to be configured on the network switch to capture traffic On IDS for inspection.

IDS Tools

There are different IDS tools available, the most popular ones are Snort, OSSIM (Open Source Security Information Management) and Sguil.


How To Surf Anonymously & Access Blocked Content

How To Surf Anonymously & Access Blocked Content

Hello Friends, Today I gonna Show you How to Surf Anonymously on Internet & Also How to Access Blocked or Censored Content on Internet. We are Going to use Tools to Surf anonymously on Internet.


How To Surf Anonymously

What is surfing Anonymously on Browser ?

Surfing Anonymously on Browser means Surfing on Internet without Showing user's identifiable Information like IP etc. This can be done with the help of Proxy server, Virtual Private Networks & other Anonymity Program such as "Tor".
Surf Anonymously


Pre-requisite


  • Computer Installed with OS
  • Internet Connection (BroadBand, Dial-up)
  • Cyberghost (Tool)

 What is Cyberghost ?

Cyberghost is a fast, simple & efficient way to protect our Online Privacy, Surf Anonymously and Access Blocked or Censored Content. It offers top-notch Security and Anonymity Without Being Complicated to use or Slowing down your Internet Connection.

Cyberghost is an application which allow you to encrypt your Internet Connection.

You Can Download The Cyberghost Tools link is given below.
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------

Steps to Use Cyberghost


1. Go to the Link Given and Download the Cyberghost tool.

2.  After Download, Install the Cyberghost & Download the Required Component.

3. After Installation Go on www.whatismyipaddress.com & See your IP address.


Now you can See that my IP is "49.206.206.89" & I belong Hyderabad, India.

4. Start the Cyberghost Application You will see this window.


5. Now Click on Power button to Start the Tool.

6. After Starting the Tool you will Get this Window.


7. Now you can See that I got new IP address which is 199.115.115.209 & This IP belong to Pristina Serbia U.S.A.

8. Now Go Again to www.whatismyipaddess.com to see What is your IP address.


I got new IP address which is 199.115.115.209 & This IP belong to Pristina Serbia U.S.A.

How to Access Blocked Content & Censored Content




At Some Places Some website are blocked to Access. The restrictions that are actually dependent on your location. This is all Because of your server Geo location. For Eg If you are in China you can't Access the Facebook Because in China Facebook is blocked. The server from which you are Requesting to open Facebook is Located in China So you can't Access the Facebook If you want to Access it First you have to change your Server Use Cyberghost application to Get Connected to new Server Which is Located in Another Country & Than request the Server to open the Facebook you can Access the Facebook 

___________________________________Thank You___________________________________