1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT
We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.
A big Slute to Our Indian Armies
Freedom is not free Our Soldiers Donates theirs lifes for us
We are Indians and We are Proud to be Indians
India is great.Because their is one place in the world where Peoples Recpect all Religious.
Kali is good OS for Hacking
Peoples Says this OS is best This OS is best but no one OS like Kali Linux .
MOM and DAD
I can't saw God but When i see my MOM and DAD then i think God in there they are My Gods Love You MOM DAD.
Monday, 4 November 2013
Protect Your Computer Against ARP Poison Attack
I wonder how many of you tried netCut after reading yesterday’s
article? Don’t you find it kind of hard to believe that netCut has been
available for so long yet so many computers is affected by this attack
just because of the standard of ARP. Attacking computers with netCut
seemed to be fun for script kiddies but the person who got cut is no fun
at all.
If you felt that your Internet connection that is shared on network being cut off when others is working fine, then here is how you can determine whether if someone is really poisoning your ARP cache. Other than that, if you’re connected to a public wi-fi, you should protect your computer against these attacks. Even when you think you are on a paid wifi which seems to be safer, you’re wrong because someone could cut off your Internet and then spoof their computer as your computer to get free internet on a paid wifi.
I did some research on how to protect against netCut and here are a few working ones. Not all can protect against netCut, for example Anti Netcut by tools4free and StopCut. Both of these anti netcut tools doesn’t work and annoying as well because every once in a while, an advertisement window will popup. In fact I even got a warning from Comodo Firewall that Anti Netcut is trying to secretly connect to a FTP server. In the Arcai’s netcut Software 2.0, there is a checkbox “Protected My Computer” which supposedly to protect your computer against Arcai’s netcut Software but it didn’t work on my Windows XP SP3 computer.
A working third party software that can intercept ARP spoofing/ARP attacks/ARP poisoning, intercept IP Address conflict, prevent Dos attack, safety mode, ARP flow analysis, protect ARP cache, active defense, locate attacker and ARP virus cleaner is AntiARP.
There are 2 version of AntiARP which is the Personal Edition and the Server Edition. Unfortunately both versions are shareware. The Personal edition can only work on desktop operating system such as Windows 2000, XP and Vista. If you want to use it on Windows server based OS, then you have to go for the Server edition which cost more. It can automatically block netCut’s attack and also let you know who is the attacker.
So far I found out that the free Comodo Firewall is able to protect your computer against ARP poisoning but you have to enable it as it is disabled by default. Click on Firewall at the top bar and then click Advanced button at the left pane. Go to Attack Detection Settings and check “Protect the ARP Cache”.
As for Kaspersky Internet Security 2010 users, sorry to let you know that it doesn’t block netCut attacks.
If you felt that your Internet connection that is shared on network being cut off when others is working fine, then here is how you can determine whether if someone is really poisoning your ARP cache. Other than that, if you’re connected to a public wi-fi, you should protect your computer against these attacks. Even when you think you are on a paid wifi which seems to be safer, you’re wrong because someone could cut off your Internet and then spoof their computer as your computer to get free internet on a paid wifi.
I did some research on how to protect against netCut and here are a few working ones. Not all can protect against netCut, for example Anti Netcut by tools4free and StopCut. Both of these anti netcut tools doesn’t work and annoying as well because every once in a while, an advertisement window will popup. In fact I even got a warning from Comodo Firewall that Anti Netcut is trying to secretly connect to a FTP server. In the Arcai’s netcut Software 2.0, there is a checkbox “Protected My Computer” which supposedly to protect your computer against Arcai’s netcut Software but it didn’t work on my Windows XP SP3 computer.
A working third party software that can intercept ARP spoofing/ARP attacks/ARP poisoning, intercept IP Address conflict, prevent Dos attack, safety mode, ARP flow analysis, protect ARP cache, active defense, locate attacker and ARP virus cleaner is AntiARP.
There are 2 version of AntiARP which is the Personal Edition and the Server Edition. Unfortunately both versions are shareware. The Personal edition can only work on desktop operating system such as Windows 2000, XP and Vista. If you want to use it on Windows server based OS, then you have to go for the Server edition which cost more. It can automatically block netCut’s attack and also let you know who is the attacker.
So far I found out that the free Comodo Firewall is able to protect your computer against ARP poisoning but you have to enable it as it is disabled by default. Click on Firewall at the top bar and then click Advanced button at the left pane. Go to Attack Detection Settings and check “Protect the ARP Cache”.
As for Kaspersky Internet Security 2010 users, sorry to let you know that it doesn’t block netCut attacks.
Sunday, 3 November 2013
What is VOIP
What is VOIP
Introduction
VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company.
Some people use VOIP in addition to their traditional phone service, since VOIP service providers usually offer lower rates than traditional phone companies, but sometimes doesn't offer 911 service, phone directory listings, 411 service, or other common phone services. While many VoIP providers offer these services, consistent industry-wide means of offering these are still developing.
How does VOIP work?
A way is required to turn analog phone signals into digital signals that can be sent over the Internet.This function can either be included into the phone itself (See: VOIP Phones) or in a separate box like an ATA .
VOIP Using an ATA
Ordinary Phone ---- ATA ---- Ethernet ---- Router ---- Internet ---- VOIP Service Provider
VOIP using an IP Phone
IP Phone ----- Ethernet ----- Router ---- Internet ---- VOIP Service Provider
VOIP connecting directly
It is also possible to bypass a VOIP Service Provider and directly connect to another VOIP user. However, if the VOIP devices are behind NAT routers, there may be problems with this approach.IP Phone ----- Ethernet ----- Router ---- Internet ---- Router ---- Ethernet ---- IP Phone
Applications using VOIP
Traditional telephony applications, such as outbound call center applications and inbound IVR applications, normally can be run on VOIP.Why use VOIP?
There are two major reasons to use VOIP- Lower Cost
- Increased functionality
Lower Cost
In general phone service via VOIP costs less than equivalent service from traditional sources. This is largely a function of traditional phone services either being monopolies or government entities. There are also some cost savings due to using a single network to carry voice and data. This is especially true when users have existing under-utilized network capacity that they can use for VOIP without any additional costs.In the most extreme case, users see VOIP phone calls (even international) as FREE. While there is a cost for their Internet service, using VOIP over this service may not involve any extra charges, so the users view the calls as free. There are a number of services that have sprung up to facilitate this type of "free" VOIP call. Examples are: Free World Dialup and Skype for a more complete list see: VOIP Service Providers
Increased Functionality
VOIP makes easy some things that are difficult to impossible with traditional phone networks.- Incoming phone calls are automatically routed to your VOIP phone where ever you plug it into the network. Take your VOIP phone with you on a trip, and anywhere you connect it to the Internet, you can receive your incoming calls.
- Call center agents using VOIP phones can easily work from anywhere with a good Internet connection.
BadBIOS Malware: Reality or Hoax?
On Thursday, Ars Technica ran a story about badBIOS,
a nasty piece of malware allegedly discovered three years ago by
security consultant Dragos Ruiu on an Apple laptop. The malware is so
sophisticated that some wonder if the story is real or just a hoax.
The rootkit appears to be advanced and highly persistent, with
“self-healing” capabilities. It can infect computers running almost any
operating system by changing the device’s firmware, including the Basic
Input/Output System (BIOS) and the Unified Extensible Firmware Interface
(UEFI).
It can spread even if the computer’s power cords and Ethernet cables are
unplugged, and even if Wi-Fi and Bluetooth communications are disabled.
It can even “jump air gaps” via computer speakers and microphones.
The initial infection vector appears to be through USB drives, but this
hasn’t been confirmed.
The facts
Dragos Ruiu is a reputable researcher. He is the organizer of CanSecWest
and PacSec and the founder of Pwn2Own, the renowned hacking
competition. Several other respected infosec professionals have vouched
for him regarding badBIOS.
Furthermore, Ars’ Dan Gooding, the editor who ran the story, says it’s
not a Halloween hoax.
“I have tried to make clear that many of the details of this article
sounded far-fetched to me. They still do. I have also tried to be
transparent that no one has independently corroborated Ruiu's findings.
That said, these same details have been publicly available for more than
two weeks, and a large number of Ruiu's peers find them believable,”
Gooding noted.
The story could also be true since the malware’s behavior and
capabilities are technologically possible. Hackers can overwrite the
BIOS flash memory, infection via USB is clearly plausible because there
are numerous threats that use this method.
In addition, covertly transmitting data across the network via IPv6 even
when the protocol is disabled is also plausible. Communications via
high definition audio is also possible. Errata Security’s Robert Graham provides details
on each of these technical aspects.
The questions
While this could very well be a true story, there are several things
that don’t add up. Researchers have seen advanced pieces of malware used
in state-sponsored espionage operations, such as Flame or Stuxnet.
However, the story as a whole simply sounds like something from Trend
Micro’s 2020 web series.
For one, Ruiu hasn’t presented any concrete evidence to demonstrate the existence of the badBIOS malware.
Users on MetaFilter and Reddit
have analyzed the claims and many of them point to a lot of
questionable things.
For instance, security expert Igor Skochinsky, who has dedicated much of
his work to investigating rootkits, says he has analyzed the BIOS dump
provided by Ruiu and he hasn’t found anything suspicious.
Another suspicious thing is related to the USB infection. Ruiu says he
will analyze the USB traffic more thoroughly once he gets his hands on
some “expensive equipment.” As many point out, USB protocol analyzers
are not very expensive.
Jacob Kaplan-Moss, co-creator of Django, makes an interesting point
on MetaFilter regarding communications via audio channels as described
by Ruiu.
“The theoretical bandwidth for audio-based networking is something like
600 bytes per second. (And I think to get that rate you'd need to send
data in using audible frequencies, so you'd hear your speakers squealing
like a modem),” Kaplan-Moss noted.
“That's two seconds for a single TCP packet. It would take quite a long
time to distribute anything, especially a virus as sophisticated as the
one he's alleging,” he added.
“If the ‘virus’ is really communicating over audio, the equipment
necessary to detect this is even cheaper: a freaking microphone. He
hasn't made any attempt to capture the ‘networking’; that's
super-suspect.”
So is badBIOS real or a hoax? Time will tell. Ruiu will either have to
provide some concrete evidence or allow others to take a crack at the
allegedly infected computers, or he’ll have to come forward with a
confession.
As some point out, another possible scenario is that Ruiu is not making
this up. However, he might have simply misinterpreted the results of his
research.
Subscribe to:
Posts (Atom)