Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, August 12, 2009

Crack Windows Password With LC5 ( cont. )

How to crack Windows local password?

  • After complete installation, run LC5 at start menu.
  • A wizard display & just click Next.









  • Select "Retrieve from a remote machine" to choose where to get the encryption password.












  • Then select "Strong Password Audit" to choose auditing method that you want to use.











  • This wizard show how you want to view your reporting style.













  • Click Finish to finishing you wizard setup.
















  • Select Local Machine to get Windows password for user that exist in the Windows. Click Ok after that.








  • Finally, Windows user's password will be reveal to you.

Crack Windows Password With LC5

LC 5 is the latest version of L0phtCrack, the award-winning password auditing and recovery application used by thousands of companies worldwide.

Using multiple assessment methods, LC 5 reduces security risk by helping administrators to:
  • Identify and remediate security vulnerabilities that result from the use of weak or easily guessed passwords
  • Recover Windows and Unix account passwords to access user and administrator accounts whose passwords are lost or to streamline migration of users to another authentication system
  • Rapidly process accounts using pre-computed password tables* that contain trillions of passwords

How it works:

Windows NT, 2000 and XP passwords are stored as encrypted hashes. LC5 attacks these hashes with hundreds of passwords per minute.

Eventually the correct password will be sent and then displayed to the screen.

Good intentions:

  • System administrators can find weak passwords within minutes. Sys admins can then change the passwords to make them more secure.
  • LC5 can be used to access computers of users who forget passwords.
  • In companies, it can be used to access computers of employees who have left the company.

Bad intentions:

  • Hackers can use LC5 to sniff passwords over networks.
  • Hackers can install this application onto a primary domain controller and steal hundreds of passwords within minutes.

Please note that I am not the author of this software. Be advised that if you use this software, you do so at your own risk without any warranty expresses or implied.

Download LC5 (v5.04):

Software License: LCP is a freeware program. The program may be distributed under condition of saving all files contents and structure of installation package.

Thursday, August 6, 2009

UltraVNC Remote Control Software


UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location. If you provide computer support, you can quickly access your customer's computers from anywhere in the world and resolve helpdesk issues remotely! With addons like SingleClick your customers don't even have to pre-install software or execute complex procedures to get remote helpdesk support.

This software are same as Real VNC but its much easy to use & its FREE.

Click here to download

VNC Remote Control Software

Its provides remote control software which lets you see and interact with desktop applications across any network. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location. If you provide computer support, you can quickly access your customer's computers from anywhere in the world and resolve helpdesk issues remotely!

Where to download it?
Visit this website to download it. Real VNC Homepage.
Then execute the program to install.

How to use VNC server?
  1. Go to VNC Server ( User-Mode ) program at Start Menu & click on Run VNC Server.
  2. VNC Server will run & appear at system tray.
  3. Right click on the tray icon & select Option. Change the setting you want & click Ok.
  4. Please note to configure the Authentication tab or you won't able to connect into your server.
  5. If you didn't setup authentication password, your server probably been attack by unknown/unwanted user.
  6. In Authentication tab, enable Prompt local user ... so that everytime you or other user need to keyin password to view the server.
  7. You can setup Connections tab for access control which IP address allowed to access.
  8. In Inputs tab, configure which hardware you want to enable remote control.
  9. Close after finish setup.

For more help, please visit Real VNC Free Documentation.
Enjoy...

Saturday, August 1, 2009

Man in The Middle Attack ( MiTM / MIM )

Definition

The man-in-the-middle attack (often abbreviated MITM), or bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within a few miles of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

A man-in-the-middle attack can only be successful when the attacker can impersonate each endpoint to the satisfaction of the other. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL authenticates the server using a mutually trusted certification authority.

For more information, please click link below :-

  1. Wikipedia
  2. Search Security
  3. Wise Geek
  4. Security Focus
  5. owasp

How does the MiTM attack?

Man in the middle attacks are one of the several devices that are used to gain access to proprietary information, such as pass codes, login credentials, and credit card numbers. The process essentially involves establishing a virus that acts as the interface between two points. Neither party in the exchange is aware that the information that is exchanged is intercepted and captured by the intermediate virus.

The concept of a man in the middle attack predates the inception of the personal computer and widespread use of the Internet. Even in earlier days, intelligence operations would employ the idea of establishing a third party who would in effect initiate a dual interface with two other parties. Each of the other two parties would assume they were involved in a direct connection with one another, not realizing that the third party was intercepting, interpreting and then passing on the communication.

Click here to download on how to defend yourself from Man In The Middle Attack.

Click here to download documentation concepts of Man In The Middle Attack.

Thursday, July 30, 2009

SQL Injection

Definition


SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.


There are many forms of vulnerability which is :-


1. Incorrectly filtered escape character
  • occurs when user input is not filtered for escape characters and is then passed into an SQL statement. This results in the potential manipulation of the statements performed on the database by the end user of the application.

2. Incorrectly type handling
  • occurs when a user supplied field is not strongly typed or is not checked for type constraints. This could take place when a numeric field is to be used in a SQL statement, but the programmer makes no checks to validate that the user supplied input is numeric.

3. Vulnerabilities inside the database server
  • MySQL server's mysql_real_escape_string() function. This would allow an attacker to perform a successful SQL injection attack based on bad Unicode characters even if the user's input is being escaped.

4. Blind SQL injection
  • used when a web application is vulnerable to SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered.


Magic code / words for SQL Injection.




hi' or 1=1--

' or 'a'='a

' or 1=1--

" or 1=1--



or 1=1--

' or 'a'='a

" or "a"="a

') or ('a'='a


Protection from SQL Injection


Set parameters are either strings or integers and the form input is all text.

1. if magic quotes is on run strip slashes.

2. if its an integer convert to integer type.

3. if its a string replace AND, OR

4. Remove special characters not needed like = and ; (any others?)

5. use the sscape function for mysql.

6. quote variables in the query string.

7. use double quote

8. avoid dynamic SQL

9. validate all input

10. principle of least privilege


For more details, click link below :-

· Wikipedia

· SecuriTeam

· Microsoft

· Digitalpoint forum

Phishing ( cont )


Phishing + Social Engineering


    1. Open site
    2. Save as
    3. Modify login form
    4. Modify action parameter
    5. Create fake action ( store password )
    6. Done

Phishing

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Phishing Technique
  • Social engineering
  • Link manipulation
  • Filter evasion
  • Website forgery
  • Phone phishing

For more details, click here

PC Security

Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.


Computer security

  • Secure operating systems
  • Security architecture
  • Security by design
  • Secure coding

Computer insecurity

  • Vulnerability

Social engineering
Eavesdropping

  • Exploit

Trojan

viruses and worms
Denial of service

  • Payload

Backdoor
Rootkit
Keylogger


Read more at Wikipedia


E-book for PC Security & Maintenance. download

Tuesday, June 16, 2009

Monday, June 15, 2009

Keylogger

Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware- and software-based to electromagnetic and acoustic analysis.

Software-based keyloggers

These are software programs that are designed to work on the target computer’s operating system. From a technical perspective there are four categories:

  • Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched, except that it effectively becomes a virtual machine. See Blue Pill for a conceptual example.
  • Kernel based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware which makes them very powerful. A keylogger using this method can act as a keyboard driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.
  • Hook based: Such keyloggers hook the keyboard using functionality provided by the operating system for applications to subscribe to keyboard events legitimately. The operating system notifies the keylogger each time a key is pressed and the keylogger simply records it.
  • Passive Methods: Here the coder uses operating system APIs like GetAsyncKeyState(), GetForegroundWindow(), etc. to poll the state of the keyboard or to subscribe to keyboard events. These are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage and can miss the occasional key. A more recent example simply polls the BIOS for preboot authentication PINs that have not been cleared from memory.[1]
  • Form Grabber based logs web form submissions by recording the web browsing .onsubmit event functions. This records form data before it is passed over the internet and bypasses https encryption.

Remote access software keyloggers

These are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:

  • Data is uploaded to a website or an ftp account.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
  • It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine.

Hardware-based keyloggers

Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.

  • Firmware-based: BIOS-level firmware that handles keyboard events can be modified to record these events as they are processed. Phyical access or root-level access is required to machine, and the software loaded into the BIOS needs to be created for the specific hardware that it will be running on.
  • Keyboard hardware: Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboards and the computer, typically inline with the keyboard's cable connector. More stealthy implementations can be installed or built into standard keyboards, so that there's no device visible on the external cable. Both types logs all keyboard activity to their internal memory, which can subsequently be accessed, for example, by typing in a secret key sequence.[2] A hardware keylogger has an advantage over a software solution; because it is not dependent on installation on the target computer's operating system, it will not interfere with any program running on the target machine and also cannot be detected by any software. However its physical presence may be detected, for example if it's installed outside the case as an inline device between the computer and the keyboard. Some of these implementations have the ability to be controlled and monitored remotely by means of a wireless communication standard.[citation needed]

Wireless keyboard sniffers

These are passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked before if the transmissions are to be read.

Keyboard overlays

Criminals have been known to use keyboard overlays on ATM machines to capture people's PINs. Each keypress is registered by the keyboard of the ATM as well as the criminal's keypad that is placed over it. The device is designed to look like an integrated part of a the machine so that bank customers are unware of its presence.[3]

Acoustic keyloggers

Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each character on the keyboard makes a subtly different acoustic signature when stroked. It is then possible to identify which keystroke signature relates to which keyboard character via statistical methods such as frequency analysis. The repetition frequency of similar acoustic keystroke signatures, the timings between different keyboard strokes and other context information such as the probable language in which the user is writing are used in this analysis to map sounds to letters. A fairly long recording (1000 or more keystrokes) is required so that a big enough sample is collected.[citation needed]

Electromagnetic emissions

It is possible to capture the electromagnetic emissions of a keyboard, without being physically wired to it.[4]

Optical surveillance

Not a keylogger in the classical sense, but an approach that can nonetheless be used to capture passwords or PINs. A strategically placed camera, such as a hidden surveillance camera at an ATM, can allow a criminal to watch a PIN or password being entered.[5]