Wednesday, August 5, 2015

What is Social Engineering



Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.

“Social engineering” as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.

Example 1: You receive an e-mail where the sender and the manager or someone on behalf of the support department of your bank.

In the message he says that the Internet Banking service is presenting a problem and that this problem can be corrected if you run the application attached to this message.

The implementation of this application presents a screen similar the one you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the bank account and sends it to the attacker.

skip to methods of Social Engineering

Some Examples 

Example 1: You receive an e-mail where the sender and the manager or someone on behalf of the support department of your bank.

In the message he says that the Internet Banking service is presenting a problem and that this problem can be corrected if you run the application attached to this message.

The implementation of this application presents a screen similar the one you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the bank account and sends it to the attacker

Example 2: You receive an e-mail saying that your computer is infected by a virus. The message suggests that you install a tool available on an Internet site, to eliminate the virus from your computer.

The real function of this tool and does not eliminate a virus, but I give someone access to your computer and all data stored on it.

Example 3: a stranger calls your house and says it is the technical support of your ISP.
In this connection he says that his connection to the Internet is presenting a problem and then, ask your password to fix it. If you give your password, this so-called technical can perform a multitude of malicious activities, using your access account
Internet and therefore such activities relating to its name.

Practical Examples :

Retail Paging Systems
———————
Wal-Mart store phones have clearly marked buttons for the paging system. Wal-Mart is
the exception, not the rule. So how do you get on the paging system to have a little
fun when you’re bored out of your mind shopping with your girlfriend? Social
engineering, my whipped friend. Find a phone and dial an extension, preferably the
store op. The key here is to become a harried employee, saying something similar
to…”This is Bill in shoes. What’s the paging extension?” More often than not,
you’ll get the extension without another word. Now, get some by saying something
sweet over the intercom.

Airport White Courtesy Phones
—————————–
Imagine you’ve already been stripped searched and you’re waiting for your delayed
flight. Naturally, you gravitate to a phone. Is it white? Then you’ve got a free
call right in front of you. Just pick up to get the op. “This is Bill at Southwest,
Gate A5. We’re swamped and our phones are tied. Can I get an outside line?” If
the phone does not have DTMF , or the op wants to dial the call for you, do not call
a number related to you.

Hotels
——
Hotels hold such promise. Some hotels have voice mail for each room, guests
receiving a PIN when they check in. Hotels also have “guest” phones; phones outside
of rooms that connect only to rooms or the front desk. Pick up a guest phone, make
like a friendly guest and say, “I forgot my PIN. Could I get it again? Room XXX.”
Knowing the registered name of the target room helps, for the Hotel and Restaurant
Management Degree Program graduate may ask for it.

Do not follow through with the next social engineering example. Or, like the author,
try it on a friend. Go to the front desk and tell the attendant that you’ve locked
your key (card) in the laundromat, in your room, lost it, etc. Do not try this with
the attendant that checked you in. And again, do not enter someone’s room without
permission.

Calling Technical Support
————————-
So you’ve found a new-fangled computerized phone and you want to learn more about it.
Do the same thing you do when you have trouble with your AOL – call tech support.
First, do a little planning (after getting the tech support number off of the phone
or the web). Get some info on the phone, like phone number, model number, other
identifying numbers, etc. Also, know the name of the facility in which the phone is
located. Now that you’ve got some ammo, you’re ready to make the call. Posing as an
employee of the facility, call tech support and make up a problem for the phone
you’ve identified. Act a little dumb and be apologetic, acting like you don’t want
to waste their time. All the while, pumping them for information – “I hate to bug
you for this, but <insert problem here>.” <You’ll get some info from tech support
here.> <Build on what you’ve learned and curiously ask another question.> And so
on until you reach the point where you can feel that it’s time to end the call.
Occasionally acting amazed at their knowledge may be helpful.

Methods of Social Engineering

Phishing : 

Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business — a bank, or credit card company — requesting “verification” of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate — with company logos and content — and has a form requesting everything from a home address to an ATM card’s PIN.

For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless a link provided was clicked to update a credit card (information that the genuine eBay already had). Because it is relatively simple to make a Web site resemble a legitimate organization’s site by mimicking the HTML code, the scam counted on people being tricked into thinking they were being contacted by eBay and subsequently, were going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who already had listed credit card numbers with eBay legitimately, who might respond.

Vishing or Phone Phishing :

This technique uses an Interactive Voice Response (IVR) system to recreate a legit sounding copy of a bank or other institution’s IVR system. The slave is prompted to call in to the “bank” via a phone number provided in order to “verify” information.

Baiting
Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the slave. In this attack, the attacker leaves a malware infected floppy disc, CD ROM, or USB flash drive in a location sure to be found, gives it a legitimate looking and curiosity-piquing label, and simply waits for the slave to use the device.

                       Quid pro quo
Quid pro quo means something for something:

* An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will “help” solve the problem and in the process have the user type commands that give the attacker access or launch malware.

* In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen. Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.

 Hacking Tutorials, Social Engineering

Antivirus Software Works



I hope you know what is computer Anti Virus. But you may not know how the anti virus works.  Here i am sharing how the antivirus software works. 
What you know about Anti Virus software?
Antivirus software gives protection against the viruses and Malware. Antivirus can detect the malicious software ,then delete or put it in quarantine. 
The process behind the Anti Virus
The Antivirus follows two methods to detect the malicious software. They are
  • Virus Dictionary Based Detection
  • Suspicious Activity Detection
Virus Dictionary Based Detection
In this method, Antivirus manage a dictionary file which has the identified virus signatures. Whenever an executable is running, antivirus will check the executable file source code with the dictionary.  If the source code match with any virus signature, then antivirus will immediately inform you that the virus is found.
Antivirus will check the executable file whenever file is opened or created or emailed or downloading.

Example:
Let us assume the malicious code is “11010011” and this code is in dictionary file.  If any executable file runs with the above malicious code, the antivirus immediately block and alerts the user. 
Day to day the hackers can create new viruses, the source code of virus will vary.  The antivirus can not detect the virus with old Signature of viruses.  You have to update the virus signature so that it can detect new viruses.

Drawback of this Method
Hackers found a hacking trick to bypass this security method, The Crypter.  Yes,  hackers can encrypt the source code into different source code such that it will look like safest source code.  So if the antivirus checks for the source code, it won’t find the malicious code (because it is another form). 
 The drawback can be solved by including the crypted malicious code to dictionary file. 
 Suspicious Activity Detection
The suspicious activity detection method is more effective than the Dictionary based approach.  It can detect even a new virus. Antivirus observes the behavior of the executable file. If the executable file does any illegal process or create any executable file, the antivirus will block the executable file and alert the user . 

Drawback
It is annoying process.  The accuracy is less so it may detect any safe executable file as virus.


Friday, July 24, 2015

Reasons : Ethical Hacking Is the Only Effective Way to Test

The Bad Guys Think Bad Thoughts, Use
Good Tools, and Develop New Methods

If you’re going to keep up with external attackers and malicious insiders,
you have to stay current on the latest attack methods and tools that they’re
using. 

IT Governance and Compliance Are More
Than High-Level Checklist Audits

With all the government laws and industry regulations in place, your business
likely doesn’t have a choice in the security matter. The problem is that being
compliant with these laws and regulations doesn’t automatically mean you’re
secure. PCI DSS comes to mind. You have to take off the check-list audit
blinders. Using ethical hacking tools and techniques enables you to dig
deeper into your business’s true vulnerabilities.

Ethical Hacking Complements Audits
and Security Evaluations

No doubt, someone in your organization understands higher-level security
audits better than this ethical hacking stuff. However, if you can sell that
person on ethical hacking and integrate it into existing security initiatives
(such as internal audits and compliance spot checks), the auditing process
can go much deeper and improve your outcomes. Everyone wins.

Clients and Partners Will Ask, “How
Secure Are Your Systems?”

Many businesses now require in-depth security assessments of their business
partners. The same goes for certain clients. The bigger companies might
want to know how secure their information is on your network. The only way
to definitively know where things stand is to use the methods and tools .


The Law of Averages Works
against Businesses

Information systems are becoming more complex by the day. Literally. It’s
just a matter of time before these complexities work against you and in the
bad guys’ favor. A criminal hacker needs to find only one flaw to be successful
in his efforts. Security professionals have to find them all. If you’re going to
stay informed and ensure that your critical business systems and the sensitive
information they process and store stay secure, you have to look at
things with a malicious mindset .

Ethical Hacking Improves Understanding
of Business Threats

You can say passwords are weak or patches are missing, but actually
exploiting such flaws and showing the outcome are quite different matters.
There’s no better way to prove there’s a problem and motivate management
to do something about it than by showing the outcomes of ethical hacking.

If a Breach Occurs, You Have
Something to Fall Back On

In the event a malicious insider or external attacker still breaches your
security, your business is sued, or your business falls out of compliance with
laws or regulations, the management team can at least demonstrate that it
was performing due diligence to uncover security risks on a periodic and
consistent basis. A related area that can be problematic is knowing about a
problem and not fixing it. The last thing you need is a lawyer and his expert
witness pointing out how your business was lax in the area of information
security testing or follow-through.

Ethical Hacking Brings Out
the Worst in Your Systems

Someone walking around with a checklist can find security “best practices”
you’re missing, but he isn’t going to find most of the in-depth security flaws
that ethical hacking is going to uncover. You know, the ones that can get you 
into the worst trouble. Ethical hacking brings out the warts and all.

Ethical Hacking Combines the Best
of Penetration Testing and
Vulnerability Assessments

Penetration testing is rarely enough to find everything in your systems
because the scope of traditional penetration testing is simply too limited. The
same goes for vulnerability assessments that mostly involve security scans.
Ethical hacking combines the best of both and gets you the most bang for your luck.

Ethical Hacking Can Uncover
Weaknesses That Might Go
Overlooked for Years

        Ethical hacking not only uncovers technical, physical, and human weakness
but it can also reveal problems with IT and security operations, such as
        patch management, change management, and lack of awareness, which may
not be found otherwise.

IP THEFT RAMIFICATIONS


While not all IP has clearly definable value, a significant proportion of the value of many
companies today rests in their IP. As such, IP theft can have a detrimental impact on a
company’s success. As the digital age blossomed, companies began turning their attention
to the value of their IP and in protecting that IP. At the same time, related IP theft and the
accompanying investigations and litigation also increased proportionately.

  In many ways, the theft of customer data, technology, or other proprietary information may be
difficult to measure because it may not have an immediate or direct impact on a company.
Unlike the theft of cash or other physical assets, IP theft, as well as the results of IP theft,
can be more difficult to see. Eventually, however, the loss of customers, the company’s
competitive position, and loss of profits can be unmistakable signs of stolen IP.

   IP is typically a source, and sometimes the key, to a company’s competitive advantage
in the marketplace, and its ultimate success. Stolen IP can be used by a company’s
competitors to equalize the playing field or gain unfair advantage, or by former employees
interested in establishing a foothold in the market through competing interests. The
impact to the IP owner can be negligible, but it can be worth hundreds of millions to
billions of dollars.                                                        
                                                                                                              BY   Aaron Philipp

Saturday, June 27, 2015

Simple Step To Become Hacker





Steps to become a hacker



Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and  new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look.



1. Learn UNIX/LINUX


linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

2. Code in C language 

c programming
   C programming is the base of learning UNIX/LINUX as this operating system is coded in
 C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know thedifferences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.


8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems.

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.


This Site Is Secure

 There is a widespread awareness that security is an issue for web applications.
Consult the FAQ page of a typical application, and you will be reassured that
it is in fact secure.
   
*  Most applications state that they are secure because they use SSL.

For example:
   
       This site is absolutely secure. It has been designed to use 128-bit Secure Socket
 Layer (SSL) technology to prevent unauthorized users from viewing any of your
 information. You may use this site with peace of mind that your data is safe with us.
 Users are often urged to verify the site’s certifi cate, admire the advanced cryptography
 protocols in use, and, on this basis, trust it with their personal information.

*  Increasingly, organizations also cite their compliance with Payment Card
   Industry standards to reassure users that they are secure.

For example:

We take security very seriously. Our web site is scanned daily to ensure that we
remain PCI compliant and safe from hackers. You can see the date of the latest scan
on the logo below, and you are guaranteed that our web site is safe to use.

     In fact, the majority of web applications are insecure, despite the widespread
 usage of SSL technology and the adoption of regular PCI scanning. The authors
of this book have tested hundreds of web applications in recent years. Figure 1-3
shows what percentage of applications tested during 2007 and 2011 were found
to be affected by some common categories of vulnerability:

1. Broken authentication (62%) — This category of vulnerability encompasses
various defects within the application’s login mechanism, which
may enable an attacker to guess weak passwords, launch a brute-force
attack, or bypass the login.

2. Broken access controls (71%) — This involves cases where the application
fails to properly protect access to its data and functionality, potentially
enabling an attacker to view other users’ sensitive data held on the server
or carry out privileged actions.

3. SQL injection (32%) — This vulnerability enables an attacker to submit
crafted input to interfere with the application’s interaction with back-end
databases. An attacker may be able to retrieve arbitrary data from the
application, interfere with its logic, or execute commands on the database
server itself.

4. Cross-site scripting (9 4%)— This vulnerability enables an attacker to
target other users of the application, potentially gaining access to their
data, performing unauthorized actions on their behalf, or carrying out
other attacks against them.

5. Information leakage (78%) — This involves cases where an application
divulges sensitive information that is of use to an attacker in developing
an assault against the application, through defective error handling or
other behavior.

6. Cross-site request forgery (92%) — This fl aw means that application
users can be induced to perform unintended actions on the application
within their user context and privilege level. The vulnerability allows a
malicious web site visited by the victim user to interact with the application
to perform actions that the user did not intend.

Friday, June 26, 2015

The Monsters of Education Technology


        The Monsters of Education Technology

                     A Hack Education Project

  I spent much of 2014 on the road, traveling and speaking
extensively about education technology’s histories, ideologies,
and mythologies.
The Monsters of Education Technology is a collection of
fourteen of those talks on topics ranging from teaching
 machines to convivial tools, from ed-tech mansplaining to
information justice.

Print and e-book versions are available for purchase via Amazon.
You can also purchase e-book versions via Smashwords.
                                                 Or
You can buy from me directly. (I guess it depends on who you
want to give a cut.) I’ve also made the files freely available to
download here (right click to save the file):
MOBI (BuyDownload)
EPUB (BuyDownload)
PDF (BuyDownload)
Thank you for supporting my work.