Showing posts with label Hacking and Security. Show all posts
Showing posts with label Hacking and Security. Show all posts

Saturday, 6 September 2014

THE BEST HACKING RESOURCES

Security Links

A totally HUGE security archive http://neworder.box.sk/
THE best security forums http://www.security-forums.com/
Current and archived exploits http://www.securiteam.com/exploits/
'Underground' search engine http://www.warez.com/
Default login for all sorts of devices http://www.governmentsecurity.org
One of the top mainstream security sites http://www.securityfocus.com/
TESO Computer security http://teso.scene.at/
Asian security group, lots of advisories http://www.shadowpenguin.org/
w00w00 Security development http://www.w00w00.org/
USSR a strong security group http://www.ussrback.com/
Good all around security site http://www.packetstormsecurity.nl
Exploits, backdoors, Trojans and more http://www.tlsecurity.net
SANS Security Institute with articles on EVERYTHING http://www.sans.org/
A Fairly immense WWW security FAQ http://www.w3.org/Security/Faq/
Computer Security Encyclopedia http://www.itsecurity.com/
Java Security information http://java.sun.com/security/
Help Net Security http://www.net-security.org/
Security Search Engine http://searchsecurity.techtarget.com/
Free BSD security information http://www.freebsd.org/security/
Netscape security information http://home.netscape.com/security/
Linux security community centre http://www.linuxsecurity.com/
Dutch Security Information Network http://www.dsinet.org/
Network Security Library http://secinf.net/
Infamous happy hacker http://www.happyhacker.org/
A once great site from a white hat hacker http://www.antionline.com/
Infosec papers and articles http://www.infosecwriters.com/
Security/privacy/crypto software archive http://www.wiretapped.net/
ISB - Info Sec Bible http://www.securityflaw.com/bible
Security tool’s Http://foundstone.com/

Privacy and Anonymity

All about privacy http://www.privacy.net
Anonymity, privacy and security http://www.stack.nl/~galactus/remailers/
Free, anonymous web surfing http://www.anonymizer.com/
IDSecure service http://www.idzap.com/
News, information and action http://www.privacy.org/
Sam Spade Tools http://www.samspade.org/t/
International PGP homepage http://www.pgpi.org
Encryptable web-mail http://www.hushmail.com/
Anonymity software http://www.skuz.net/potatoware/
Anonymous access http://www.safeproxy.org/
A list of web anonymisers http://mikhed.narod.ru/

Cryptography & Encryption

Cryptography Archives http://www.kremlinencrypt.com/
DriveCrypt http://www.e4m.net/
Cryptography resource http://www.crypto.com/
Bruce Schneier's operation http://www.counterpane.com/
Huge Crypto archive http://www.cryptome.org
A list of Crypto links http://www.security-forums.com/crypto
Source: http://www.darknet.org.uk/

Viruses /Trojans & Firewalls

Up to date Trojan archive http://www.trojanforge.net/
Fearless, everything Trojan http://www.areyoufearless.com/
A good archive with info on each one http://www.dark-e.com
(I'm a moron)'s official Home Page http://www.(I'm a moron).net/
The BO2k project http://bo2k.sourceforge.net/
Another comprehensive Trojan archive http://www.tlsecurity.net/amt.htm
Home of BackOrifice http://www.cultdeadcow.com/
Huge Trojan removal database http://www.anti-trojan.org/
Excellent Anti-Viral software and Virii Database http://www.sophos.com/
Mcafee's Searchable Virus Information Library http://vil.mcafee.com/

Virus Writing

Nice find Strader...

Excellent virus news and info http://www.antivirus-online.de/english/
The ULTIMATE IPTables resource http://www.linuxguruz.org/iptables/

Programming

Scripts, Source and Books http://www.scriptsearch.com/
Java & Internet Glossary http://www.mindprod.com/jgloss.html
Java homepage http://java.sun.com/
Absolute Java FAQ http://www.javafaq.nu/
JavaScript Resource http://www.javascript.com
JavaScripts,tutorials & references http://javascript.internet.com/
PostgreSQL home http://www.postgresql.org/
PHP from hotscripts http://www.hotscripts.com/PHP/
PHP resource index http://php.resourceindex.com/
PHP Developer resources http://www.phpbuilder.com/
Building dynamic sites with PHP http://www.phpwizard.net
PHP Developer network http://www.evilwalrus.com/
ASP Codes and techniques http://www.asptoday.com/
ASP, HTML, SQL and more http://www.w3schools.com/
Think ASP think... http://www.4guysfromrolla.com/
ASP developers site http://haneng.com/
Old school PERL programming http://www.cgi101.com/
Windows programming tools http://www.programmerstools.org/
Python homepage http://www.python.org/
Object Oriented Programming http://www.oopweb.com/
Dev-X XML zone http://www.devx.com/xml/
Loads of tutorials http://www.echoecho.com
Plenty of Web Development scripts http://www.hotscripts.com
The definitive Assembly resource http://webster.cs.ucr.edu/ASM

'Legal' Hacking

Hack3r/Roothack http://roothack.org/

News Groups

A great source of information, discussion and answers to questions Depending how you put them
alt.hacking.
alt.binaries.hacking.beginner.
alt.computer.security.
alt.security.
alt.os.security.
alt.security.pgp.
alt.security.pgp.patches.
comp.os.linux.security.
comp.os.ms-windows.nt.admin.security.
comp.security.unix.
comp.security.pgp.backdoors.
comp.security.unix.
microsoft.public.security.
microsoft.public.sqlserver.security.
microsoft.public.win2000.security.

Tools, Google it:

THE ultimate port scanner nmap.
The one and only NT password cracker L0phtcrack.
Get the latest version of john the ripper.
Windows process listener Inzider.
The best packet assembler/analyzer hping.
Hackers swiss army knife netcat.
A tool for network monitoring and data acquisition TCPDump.
The ONLY packet sniffer Ethereal.
An active reconnaissance network security tool Firewalk.
Grep your network traffic NGrep.
NIDS tester from NIDSbench fragrouter.
The best OS fingerprinter Xprobe.
Port mapper fport.
File Integrity checker Tripwire.
Check for rootkits chkrootkit.
OSS instrusion detection Snort.
Security Scanner Nessus.
TCP/IP Toolkit Paketto.

Nice find Strader........

"don't do anything illegal"


Practice:


Programs applications and other need tools

Browsers


Anti Virus programs Free

Free antivirus listing page http://www.freebyte.com/antivirus/
Anti Trojan applications - http://www.emsisoft.com/en/software/free/

Firewalls free


Test sites for firewall security

Gibson Research Corporation http://www.grc.com/default.htm

Misc. sites that have been posted over the years

How to read NETSTAT Dshield Distributed Intrusion Detection System -http://www.dshield.org/index.php
Hackers watch - http://www.hackerwatch.org/
Hacking text files (older stuff but still useful ) - http://www.textfiles.com/hacking/INTERNET/
Secunia Security pages virus alerts and such - http://secunia.com/

Anti spyware apps

Here are some tools posted by my friend Splabster(thank you for taking the time typing those tools) :

General System & Network Probing:


Enumerating & Compromising Windows

Ldp LDAP query tool available in the windows 2000 server cd-rom

Ettercap address above


Enumerating & Compromising UNIX

Netcat
Zebedee
Desproxy
Ettercap
John
Brutus
Hydra
VNCcrack
SQLdict

Enumerating & Compromising Novell


Enumerating & Compromising Wireless


General System & Network Vulnerability Checking


System Forensics Tools


Web Hacking tools


Remote Command Shell/Remote Access Trojans/Rootkits

(I'm a moron) Trojan http://(I'm a moron).net/

Miscellaneous Tools


Secure hard disk wiping and deletion 


Host Lockdown/Protection/Assessment Tools

UNIX/Windows/router assessment tools http://www.cisecurity.org/
Secure Remote Password http://srp.stanford.edu/




Tuesday, 27 May 2014

Registry Hack: Get Windows XP Security Updates until 2019

Microsoft ended its support for Windows XP officially more than a month ago on April 8, 2014. This made a large number of users to switch to the latest version of Windows, but still a wide portion of users are using Microsoft oldest and most widely used operating system, despite not receiving security updates
While some companies and organizations who were not able to migrate their operating system’s running Windows XP to another operating system before the support phase ended, are still receiving updates by paying Microsoft for the security patches and updates.
Now a relatively simple method has emerged as a trick for the XP users which makes it possible to receive Windows XP security updates for the next five years i.e. until April 2019.

It makes use of updates for Windows Embedded POSReady 2009 based on Windows XP Service Pack 3, because the security updates which are being released for POSReady 2009 are inevitably the same updates Microsoft would have rolled out for its Windows XP, if it was still supporting XP Operating System.

Windows Embedded POSReady 2009 is the operating system installed in "point-of-sale" (POS) systems such as restaurant machine, ticket machines or other customized version of Windows Embedded systems. POS machine most likely uses the XP operating system, therefore receives the same updates that are delivered by Microsoft for the officially unsupported version of Windows XP.

You are not allowed to directly install these Windows updates for your OS. In order to download new security updates for your Windows XP, you just need to perform a simple intervention into the Windows registration database.

STEPS TO FOLLOW:

Open Notepad and create a new file.Add Below given code to it:

Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady] "Installed"=dword:00000001

Save file as .reg extension and run it by double clicks.
Once executed, you will find lots of pending updates in your Windows Action Center.
Because the extended support for Windows Embedded POSReady 2009 systems ends after 5 years, Microsoft will continue to deliver new security updates and patches for this version of its embedded operating system till April 9th, 2019, so users can use this trick to get security updates of Windows XP for another five years.


Important Note for our Readers - Despite receiving security updates for Windows XP by using such tricks, it is not possible to secure the complete system appropriately. So we highly recommend all of you to upgrade your operating system to the latest versions, i.e. Windows 7 or 8 or any Linux Distro.

Tuesday, 31 January 2012

AN INTRODUCTION TO RATS - REMOTE ADMINISTRATION TOOLS


WHATS A TROJAN  HORSE

TROJAN IS A MALICIOUS PROGRAM/CODE WHICH IS USED FOR REMOTE ACCESS TO TARGET COMPUTER AND THEN ATTACK USING UNAUTHORIZED ACCESS TO TARGET OR VICTIM'S COMPUTER AND CAUSES DAMAGE TO THE SYSTEM. TROJAN IS A SMALL HIDDEN CODE INSIDE ANOTHER PROGRAM THAT'S WHY IT EASILY ENTERS SYSTEM WITHOUT KNOWLEDGE OF COMPUTER USER.THE TERM IS DERIVED FROM THE TROJAN HORSE STORY IN GREEK MYTHOLOGY.


IN THE 12TH CENTURY B.C., GREECE DECLARED WAR ON THE CITY OF TROY. THE DISPUTE ERUPTED WHEN THE PRINCE OF TROY ABDUCTED THE QUEEN OFSPARTA AND DECLARED THAT HE WANTED TO MAKE HER HIS WIFE, WHICH MADE THE GREEKS AND ESPECIALLY THE QUEEN OF SPARTA QUITE FURIOUS.

THE GREEKS GAVE CHASE AND ENGAGED TROY IN A 10-YEAR WAR, BUT UNFORTUNATELY FOR THEM, ALL OF THEIR EFFORTS WENT DOWN THE DRAIN. TROY WAS SIMPLY TOO WELL FORTIFIED.

IN A LAST EFFORT, THE GREEK ARMY PRETENDED TO BE RETREATING, LEAVING BEHIND A HUGE WOODEN HORSE. THE PEOPLE OF TROY SAW THE HORSE, AND, THINKING IT WAS SOME KIND OF A PRESENT FROM THE GREEKS, PULLED THE HORSE INTO THEIR CITY, WITHOUT KNOWING THAT THE FINEST SOLDIERS OF GREECE WERE SITTING INSIDE IT, SINCE THE HORSE WAS HOLLOW.

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDc0lQOjDe_53RbnTgZrV9wXFHdtGjMOM0IEVKSWcfCUGrQhV53BqLO6hkqfSdRp6OqL0I_Q81xr2pb0t0KwIvYLU8brOFf5WD6u5kBu8dJCVC_5o8o2epUkVCKDKSbDZpwJ31Vq4loFE/s200/1.jpgUNDER THE COVER OF NIGHT, THE SOLDIERS SNUCK OUT AND OPENED THE GATES OF THE CITY, AND LATER, TOGETHER WITH THE REST OF THE ARMY, KILLED THE ENTIRE ARMY OF TROY.

THIS IS WHY SUCH A PROGRAM IS CALLED A TROJAN HORSE - IT PRETENDS TO DO SOMETHING WHILE IT DOES SOMETHING COMPLETELY DIFFERENT, OR DOES WHAT IT IS SUPPOSED TO BE AND HIDES IT'S MALICIOUS ACTIONS FROM THE USER'S PRYING EYES.

THERE ARE MANY TYPES OF  TROJAN HORSE ,SOME OF THE COMMON ONES ARE AS FALLOWS

·         RATS (REMOTE ADMINISTRATION TOOLS )
·         PRIVILEDGES-ELEVATING TROJANS
·         DENIAL OF SERVICE (DOS)
·         FILE SENDING TROJANS(FTP TROJAN)
·         DESTRUCTIVE TROJANS
 AND MANY MORE..


RATS - REMOTE ADMINISTRATION TOOLS
REMOTE ADMINISTRATION TOOL ALSO KNOWN AS
 RAT IS USED TO REMOTELY CONNECT AND MANAGE SINGLE OR MULTIPLE COMPUTERS. RAT IS ONE OF THE MOST DANGEROUS TROJAN BECAUSE IT COMPROMISES FEATURES OF ALL TYPES OF TROJANS. IT PROVIDES AN ATTACKER WITH NEARLY UNLIMITED ACCESS TO HOST COMPUTER ,THE FOLLOWING ARE SOME OF THE COMMON FEATURES FOUND IN A RAT (REMOTE ADMINISTRATION TOOL)

·         SCREEN/CAMERA CAPTURE OR CONTROL
·         FILE MANAGEMENT (DOWNLOAD/UPLOAD/EXECUTE/ETC.)
·         SHELL CONTROL (USUALLY PIPED FROM COMMAND PROMPT)
·         COMPUTER CONTROL (POWER OFF/ON/LOG OFF)
·         REGISTRY MANAGEMENT (QUERY/ADD/DELETE/MODIFY)
·         OTHER PRODUCT-SPECIFIC FUNCTION

HOW RATS WORK
REMOTE ADMINISTRATION TROJANS OPEN A PORT ON YOUR COMPUTER AND BIND THEMSELVES TO IT (MAKE THE SERVER FILE LISTEN TO INCOMING CONNECTIONS AND DATA GOING THROUGH THESE PORTS). THEN, ONCE SOMEONE RUNS HIS CLIENT PROGRAM AND ENTERS THE VICTIM'S IP, THE TROJAN STARTS RECEIVING COMMANDS FROM THE ATTACKER AND RUNS THEM ON THE VICTIM'S COMPUTER.

SOME TROJANS LET YOU CHANGE THIS PORT INTO ANY OTHER PORT AND ALSO PUT A PASSWORD SO ONLY THE PERSON THAT INFECT THIS SPECIFIC COMPUTER WILL BE ABLE TO USE THE TROJAN. HOWEVER, SOME OF THESE PASSWORD PROTECTIONS CAN BE CRACKED DUE TO BUGS IN THE TROJAN (PEOPLE WHO PROGRAM RATS USUALLY DON'T HAVE MUCH KNOWLEDGE IN THE FIELD OF PROGRAMMING), AND IN SOME CASES THE CREATOR OF THE TROJAN WOULD ALSO PUT A BACKDOOR(WHICH CAN BE SOMETIMES DETECTED, UNDER CERTAIN CONDITIONS) WITHIN THE SERVER FILE ITSELF SO HE'LL BE ABLE TO ACCESS ANY COMPUTER RUNNING HISTROJAN WITHOUT THE NEED TO ENTER A PASSWORD. THIS IS CALLED "A BACKDOOR WITHIN A BACKDOOR".


ARE RATS  ILLEGAL ?
WELL, IT IS ACTUALLY BOTH. THERE ARE 
RATS THAT ARE LEGAL AND THAT ARE ACTUALLY ILLEGAL. THE DIFFERENCE BETWEEN THEM BOTH ARE THE FACT THAT, LEGAL RATS INFORM THE CONNECTED REMOTE THAT YOU ARE ON THE COMPUTER, AND ILLEGAL RATS DO NOT INFORM THE REMOTE THAT YOU ARE ON THE COMPUTER.

LEGAL :- 
LEGAL MEANS THE PERSON HAS FULL CONTROL AS WELL, THEY CAN KILL THE CONNECTION ANY TIME THEY PLEASE, NO BACKDOOR IS LEFT ON THEIR PC, AND IT IS IN YOUR NETWORK.

ILLEGAL:-
ILLEGAL MEANS THE PERSON DOES NOT KNOW YOU ARE CONNECTED AND THEY HAVE NO KNOWLEDGE YOU ARE TILL YOU TAKE ACTION, THEY HAVE NO CONTROL TOKILL THE CONNECTION (UNLESS THEY UNPLUG THE INTERNET), BUT EVEN THEN, A BACKDOOR IS LEFT ON THE COMPUTER MEANING ANYTIME THE COMPUTER IS ON AND THE INTERNET IS UP, YOU CAN CONNECT ANYTIME YOU WANT. YOU CAN DESTROY FILES, DOWNLOAD FILES, STEAL INFORMATION, BASICALLY MAKE THEIR LIFE MISERABLE.


How to Make your Web cam as Survilence Camera

Using some softwares you can change your web camera as spy or survilence camera.  here i give you some  softwares links.


Rise Sun(Complete  Free Software)
  • Adjustable Motion Detection Sensitivity
  • Adjustable Webcam Performance
  • Automatically takes a snapshot when movement is detected
  • Automatically logs a record when movement is detected
  • Automatically sounds an audible alarm when movement is detected
  • Automatically displays a silent message when movement is detected

Screen Shots:

Download:


http://www.reohix.com/risesun.htm
TeboWeb(Freeware)

  • Set the sensitivity of movement detection.
  • Detection motion within or outside a specified area .
  • Receive emails with images of any movement detected.
  • Publish movement images to your website.
  • Publish webcam images at regular intervals.
  • Timestamp your images (choice of colours and position within image)
  • Graph of movement over time (with calendar facility).
  • Start movement detection at a specified time.
  • Command line startup options.
  • Save your individual settings to different profiles.
  • Receive notification of new versions as they become available.
  • New versions autoinstall on one mouseclick(so you only need to install TeboCam once).    
Screen Shots:


Download:


http://www.teboweb.com/TeboWebDownload.html 

Saturday, 26 November 2011

PROXY CHAINING USAGE - BE ANONYMOUS ONLINE



  • THIS IS TUTORIAL HAS BEEN RETURN TO SHOW U HOW U CAN UTILIZE THE INTERNET  BY HIDDING UR IP - ADDRESS BY BEING ANONYMOUS BY USING THE PROXY.
  • WHAT IS PROXY CHAINING AND WHAT IS THE PURPOSE OF IT ?
    A PROXY IS AN IP - ADDRESS OF A SERVER(PROXY SERVER) THAT IS PLACED BETWEEN YOUR COMPUTER AND THE INTERNET.



  • THE ADVANTAGE OF A PROXY IS THAT YOUR REAL IP ADDRESS IS HIDDEN SO WHEN YOU HACK  ANY SYSTEM YOUR GIVING THE IP ADDRESS OF   THE PROXY SEVER AND NOT YOUR REAL IP ADDRESS. SAME  WAY IF YOUR A NORMAL INTERNET USER THE HACKER WON'T GET YOUR REAL IP BUT THE IP OF THE PROXY SERVER.
PROXY CHAINING :
  • PROXY CHAINING IS BASICALLY THE IDEA OF USING MORE THAN ONE PROXY TO CONNECT TO THE INTERNET, THE MAIN USE OF PROXY CHAINING IS TO HIDE YOUR IDENTITY .YOU CAN CONNECT TO AS  MANY PROXIES YOU WANT. THE MORE YOU CONNECT, THE MORE ANONYMOUS YOU WILL BE, PROXY CHAINS MAKES IT VERY DIFFICULT TO TRACE YOU BACK FOR.

  • EG:- LETS TAKE PROXY CHAIN WHICH PASSES THROUGH VARIOUS COUNTRIES
     <--------------  PROXY ------->
URPC >INDIA -> USA -> CHINA -> UK -> WEB SITE

  • ITS VERY DIFFICULT TO TRACE  BACK SUCH PROXIES SINCE IT PASSES THROUGH VARIOUS COUNTRIES, THUS PROXY CHAINING IS GENERALLY A TECHNIQUE USED BY HACKERS TO HIDE THEIR IDENTITY ONLINE, HOW EVER THAT BEING SAID ITS NOT IMPOSSIBLE TO TRACE PROXY CHAINS  BUT  STILL  IT  MAKES  HARD  TO  FIND  THE  ORIGINAL  IP - ADDRESS.

THERE R MANY TUTORIALS AVAILABLE FOR PROXY CHAINS IN YOUTUBE.

THANK  Q
D.B.V  RUTHWIZ


Friday, 28 October 2011

Windows 7 exploit via hosted network, a security threat to enterprises


Windows 7 boasts of a new feature known as the wireless hosted network, available on all Windows 7 and Windows Server 2008 R2 systems with an installed wireless LAN. The MSDN developer resource documentation for hosted networks can be read here.
With the hosted network feature, using a single Wi-Fi adapter on a Windows 7 machine, a software-based access point (AP) can be created by virtualizing the physical adapter, making it possible to host multiple interfaces on the same physical adapter. The hosted network works with all wireless cards that are Windows 7 ready, with no extra installation.


Figure 1: Active hosted network and client interface
In a hosted network setup, one would be designated as the regular client interface, and the second as a software-based access point. The device can operate in both modes simultaneously (access point as well as client). One obvious advantages of this hosted network setup is Internet connection sharing (ICS) through Wi-Fi. Windows 7 systems can thus effectively act as Wi-Fi relays or share connectivity from a wired interface. While this is a legitimate feature, it has the potential of becoming a Windows 7 exploit.


Figure 2: Aerodump-ng monitoring for available networks
To study this scenario we shall use the following setup: Windows 7 PC with built-in or external Wi-Fi adaptor, Wi-Fi adaptor with packet injection capability, and Backtrack 5 running in VirtualBox. This demo is conducted using a Windows 7 system that is up to date as of August 2011. We will monitor the air using a utility called aerodump-ng.
We first connect to a regular AP and create a soft AP or hosted network on the same Windows 7 machine by issuing the following command:
Netsh wlan set hostednetwork mode=allow ssid=”YourHostedNetwork” key =YourHostedNetworkKey
A soft AP under Windows 7 must be at least WPA2 PSK secured. The hosted network needs to be explicitly enabled by issuing the following command:
Netsh wlan start YourHostedNetwork
The hosted network can be disabled by substituting ‘start’ in the previous command with ‘stop’. Note that the client connection to the client network “OfficeNetworkAP” is still up (Figure 1). Secondly, unlike regular wireless connections that are reported via a blurb, the OS gives no indication whatsoever that a network profile has been created or that a hosted network is up and running.

Figure 3: Virtual interface created under network connections
Aerodump-ng shows that the hosted network is up and running in conjunction with the active client interface (Figure 2). This simultaneous functioning is the most important aspect of this feature, but adds to the exploitability of Windows 7, since the lack of any warning/blurb coupled with the fact that there is no loss of connectivity means that the user would be completely unaware of what is happening. All that is needed is shell access to the system to turn the hosted network feature on.
Note that the hosted network is started on the same channel as the client device. This is because the Wi-Fi adapter has only one radio interface, which enables it to tune into one channel at a time. It might be possible to multiplex between two channels at a very fast rate, akin to multi-processing with a single CPU. This adversely affects factors like switching-time and throughput.
Since the hosted network ships with its own DHCP server, as soon as a network is available one can connect and get assigned a DHCP generated IP. No alerts are received even when a device connects to a hosted network.


The key take-away from this exercise is that the client aspect of the device is totally unaffected by the soft AP aspect of the same device. The only indication of a hosted network could possibly be the creation of a virtual wireless miniport interface that handles the soft AP portion of the hosted network (Figure 3). This is passive at best, considering the user would not be prompted. This is possibly because the user is expected to explicitly enable the hosted network. It becomes a problem when a system gets targeted. This feature thus becomes a Windows 7 exploit.
From the perspective of a malware author, there are full-blown APIs to do all this. If an attacker is able to activate the soft AP and install a backdoor on the system, this Windows 7 exploit will enable complete remote access, and rogue APs can be created. Each node has a client and AP functionality, and is a potential Wi-Fi repeater. Nodes can be daisy chained by hopping from one machine to another once one machine is compromised. Rogue APs are the bane of every network administrator; considerable effort goes into finding and protecting against them.
Since the attacker connects to the victim over a private wireless network when used as a Windows 7 exploit, there are no wired-side network logs for firewall, IPS or IDS. As a Windows 7 exploit, this is difficult to detect even during an ongoing attack. The stealth factor could be further increased with tools such as Metasploit.
If the attacker can obtain the network key for a corporate network from the victim — this is possible since WPA2-PSK keys can be decrypted — the hosted network feature can also be used to impersonate the legitimate AP with this Windows 7 exploit to lure other Windows 7 systems into connecting to the compromised system. Since this is an abuse of a legitimate feature, a worm using this Windows 7 exploit to propagate over a private Wi-Fi network will not be detected by anti-virus or anti-malware programs.

Disclaimer: This tip is based exclusively on inputs from Vivek Ramachandran’s talk at SecurityByte 2011, held in Bangalore last month. This is purely a proof-of-concept and is not intended to encourage criminal abuse of this feature.
About the author: Vivek Ramachandran is the founder of SecurityTube.net, and has been working with Wi-Fi Security for eight years. He is the discoverer of the Caffe Latte attack, and is also credited with breaking WEP Cloaking, a WEP protection schema publicly at Defcon 2007. Vivek has recently authored a book titled: “Wireless Penetration Testing using BackTrack 5" released by Packt publications in September.

Sunday, 16 October 2011

INSTALLATION OF WIRESHARK IN WINDOWS XP



1.    GO  TO  http://www.wireshark.org/download.html  AND  DOWNLOAD  THE  WIRESHARK  ACCORDING  TO  UR  OPERATING  SYSTEM.

2.    NOW  DOUBLE  CLICK  ON  THE  DOWNLOADED  WIRESHARK  FILE  >  CLICK  NEXT  ON  THE  WELCOME  SCREEN.



3.    CLICK  ON  I  AGREE  >  CLICK  NEXT  >  NEXT  >  SPECIFY  THE  LOCATION  WHERE  U  WANT  TO  INSTALL  THE  WIRESHARK  >  CLICK  NEXT.





4.    SELECT  INSTALL  WINPCAP  OPTION  >  CLICK  INSTALL. 



NOTE  :  -  WINPCAP  IS  NECESSARY  FOR  WIRESHARK  TO  WORK  PROPERLY  FOR  SNIFFING.

5.    NOW  CLICK  NEXT  TO  INSTALL  WINPCAP  >  NEXT  >  CLICK  ON  I  AGREE  >  NOW  CLICK  INSTALL  >  CLICK  FINISH.






6.    NOW  CLICK  NEXT  >  NOW  CLICK  FINISH  TO  COMPLETE  THE  INSTALLATION  PROCEDURE  OF  WIRESHARK.



THANK Q
D.B.V RUTHWIZ