Sniffing Networks Using Wireshark

September 20, 2008 at 9:14 am (Gadgets, General, New Technologies, Security, Tips n Tricks)

Here is an excellent sniffer tool which allows you to sniff all the packets flowing in the network and even helps on usability by adding filters to the process. This gives and exact knowledge of how information is transferred over the network. Information like DHCP requests, ARP packets, TCP, UDP transmissions etc. Apart from that this is really useful for hacking on to machines. Information such as ip address of the communicating party at the time of file sharing or any transfer can provide lots of information about the location and the network type.
This tool is available at www.wireshark.org
Snapshot of sniffing from wireshark

Snapshot of sniffing from wireshark

Permalink Leave a Comment

Gather Information About Other System using NMAP

September 18, 2008 at 9:20 am (Gadgets, Security, Tips n Tricks)

Actually this is an ancient tool but really updated. This tool allows you to watch out the information about any other system on internet. This information could be one of the following
1. Getting the OS
2. Routing Information
3. Active ports
4. Port scanning using different methods
This tool is extremely usefull for catching use of information on the net. Some firewalls block the scan, so it may not work everytime.
You can get it on following site :http://www.insecure.org
Nmap Tool Use

Nmap Tool Use

Permalink Leave a Comment

Making Word Documents Really Read-Only

April 3, 2008 at 11:48 am (Security, Tips n Tricks)

If you want the information to be read-only in word or any other MS Office software, there is a facility which makes this thing happen.

The trick lies in the tools menu. Go to Tools > Protect Document. There will be a menu asking of the kind of protection. If you give it as “Track Changes” then that will mark the changes in red. “Comment” will make the document read-only and wont allow any kind of changes after that.

The same option gets converted to “Unprotect” after protection is imposed. But this intern asks the same password.

Try your hands on the following document, and you will find another security trick in there. 🙂

Sample Document

Permalink Leave a Comment

Defeat Java Script Protected Password

December 11, 2007 at 7:11 am (Security, Tips n Tricks)

There are many ways to defeat java-script protected web sites. Some are very simplistic, such as hitting ctl-alt-del when the password box is displayed, to simply turning off java capability, which will dump you into t he default page. 🙂

Permalink Leave a Comment

Access FTP through your browser

December 4, 2007 at 12:01 pm (Security, Tips n Tricks)

If you have all ftp things blocked, here is something that gives the gateway for ftp. Web2ftp and Net2ftp. Both of them allow SSL and anonymous FTP. And they allow you to change permissions and all the other things you do with your FTP app, including making a directory, renaming a directory, uploading in both ASCII and binary modes. Both of them even allow you to edit files and automatically unbundle any archived files (tar, tgz, zip, tar.gz) in the directory you upload them to.

With web-based FTP, you can FTP even if you use a browser that doesn’t support that protocol. So Firefox, Opera and Safari can use these services.

http://web2ftp.com/
http://net2ftp.com/

Permalink 2 Comments

Spoof Identity By Changing MAC Address

October 19, 2007 at 7:16 am (Security, Tips n Tricks)

If you want to change your logical and physical identity on network, this is possibly the best way of doing that. Let me introduce you to some basic terms before I explain the trick.

Spoofing – Introducing the network with some other identity. Like changing MAC address

DHCP – This is a protocol which is responsible for allocating IP addresses to terminals for a network. It polls continously and alots an IP for exchange of MAC address

MAC & IP address – These are also called physical and logical address which represent the identity on intranet and internet respectively. MAC address is corresponding to the ethernet card which is used for the connection.

Requirements – MAC address of the machine to be spoofed with.

Spoofing Trick – The trick is to change the MAC address with a machine with higher permissions (like your boss’s terminal) . In this way DHCP will allocate an IP and permissions which are registered for changed MAC address. You can get this by typing ipconfig \all on command prompt.

Windows XP/2000 – There are two ways of doing this in windows platform.  This is depending on the type of Ethernet  Card (NIC) you have. If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
Method1

a) Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.

b) Right click on the NIC you want to change the MAC address and click on properties.

c) Under “General” tab, click on the “Configure” button

d) Click on “Advanced” tab

e) Under “Property section“, you should see an item called “Network Address” or “Locally Administered Address“, click on it.

f) On the right side, under “Value“, type in the New MAC address you want to assign to your NIC. Usually this value is entered without the “” between the MAC address numbers.

g) Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes. If the changes are not materialized, then use the second method.

h) If successful, reboot your system.

Some versions show the option in LAN properties.

Method 2 – This needs a little manipulation in registry

This should work on all Windows 2000/XP systems

a) Go to Start -> Run, type “regedt32” to start registry editor. Do not use “Regedit“.

b) Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}“. Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 0001, 0002, 0003 and so on.

c) Find the interface you want by searching for the proper “DriverDesc” key.

d) Edit, or add, the string key “NetworkAddress” (has the data type “REG_SZ“) to contain the new MAC address.

e) Disable then re-enable the network interface that you changed (or reboot the system).

Linux

1) Bring down the interface: “ifconfig eth0 down

2) Enter new MAC address: “ifconfig eth0 hw ether 00:00:00:AA:AA:AA

3) Bring up the interface: “ifconfig eth0 up

BSD

1) Bring down the interface: “ifconfig xl0 down

2) Enter new MAC address: “ifconfig xl0 link 00:00:00:AA:AA:AA

3) Bring up the interface: “ifconfig xl0 up

Permalink Leave a Comment

Encrypting Files In Windows XP

October 2, 2007 at 2:49 am (Operating Systems, Security)

Windows XP supports an asymmetric key encryption which is collaborated with the working of NTFS file system. This makes the process of encryption extremely efficient and transparent.

The file/ folder is encrypted using public key and can be opened with only private key of the same pair. Since, user is not taken as aware of these techniques, the process is made transparent to user. Where keys are made automatically and encryption and decryption happens on simple key. There is absolutely no need to maintain keys.

You may think if I dont remember key than what is the use of encrypting… The answer is the file will not be available to any other instance of the operating system. This is good when you are on a network.

Procedure

Goto the folder you want to encrypt and make a right click.

Go to properties and select Advanced from General tab.

There is a check box asking for encryption process, check it.

The color of your folder will be changed if it is done.

Permalink Leave a Comment

Breaking Unix Root Password

September 30, 2007 at 8:23 am (Operating Systems, Security, Tips n Tricks)

Well if you come to the real sense, this is not exactly called as hacking. The trick is just removing root password without administrator login.

This is a way to clear the root password when you don’t have access to the vi editor.

Example

Flavors: AT&T, BSD

If no one has access to the root password on a system and it is a matter of urgency to get into that system, you can boot miniroot and clear the password out of the root account. This can be done even when the vi editor is inaccessible. To do this on a system using the /etc/shadow file, use the ed editor with 13 dots and your problems are solved:

# cp /etc/shadow /etc/shadow.bak

# ed /etc/shadow
1p
s/:………….:/::/
1p
w
q

Line 1: While in the ed editor, go to the first line of the file.

Line 2: Switch the first occurrence of a field that has 13 characters with nothing. This is the password field.

Line 3: Write out the file.

Line 4: Quit.

You’re finished! You swapped out the 13 characters of root’s password field with nothing and cleared the password. You can now bring the system to single user and change the root password. The same basic commands can be used on the /etc/passwd file for those platforms that don’t support shadow passwords. The result is the same. 😀

Permalink Leave a Comment

RSA Crypto Challenge For Indians

September 27, 2007 at 3:27 am (General, Security)

If you are interested in security stuff, here is an interesting news for you. RSA India has launched a crypto challenge wherein we need to code an attack for given security mechanism. The algorithm to be cracked makes use of simple substitutions, permutations and hashes.

So try the code at http://www.rsa.com/go/india/cryptocombat/

and see if you can make it. Exciting prizes like HP pavilion laptop, MS X-Box and T-shirts. 🙂

Permalink 1 Comment

Secure Your Call Identity Using Jaxtr

September 20, 2007 at 7:03 am (Gadgets, Security)

Sometimes blocking and barring calls don’t give you freeness from being socially secure. People chose to change contact numbers that creates much more havoc.

Here is an alternative method that links your physical contact with a digital personality. That means your identity is not disclosed even when somebody talks to you.

Note – doesn’t need you to have headphone

Jaxtr Gadget

How it works – Registered Jaxtr users are given a gadget that they can post anywhere (blog, webpage etc.) The person willing to call need to feed his own number in that and identity. Jaxtr calls the person who tried this thing, when he receives, the required person is called and the line is connected.

It even provides you options for barring and fixed calling. Local rates apply for the process and the service is free of cost..

So follow the adjacent link and get going..
http://www.jaxtr.com
Even jaxtr provide some extent of free calling within jaxtr users..

Permalink Leave a Comment

Next page »