Thursday, March 31, 2011

Password Based Attack (THC Hydra)

Password is a secret word that is used for authentication or proves your identity, password is a foundation of security for most computer or computer networks. Usually a normal user do not know the importance of password, many users choose the simplest
password such as a pet’s name to help them remember it.

Nowadays, many services use cryptography technique to secure their information, cryptography is the art of secret communication, by using cryptography techniques you can secure your password and make your password difficult to crack.

his is an old but simplest method that an attacker used to crack passwords, as i told earlier that a normal user do not know the importance of password and a normal user do not care about passwords, many of the people use very weak passwords such as their pet’s name, lover name, friend or relative, phone numbers or passport numbers etc.
If your password is so weak than an attacker who knows you personally can easily guess your password, so be careful while choosing your passwords. If an attacker does not you personally so he/she uses some of social engineering technique to get your personal information.

Dictionary Based Attack
Dictionary attack happen when an attacker create a wordlist(a dictionary) which contains some commonly used passwords, name of places, common names, and other commonly used words. To avoid this type of attack you must choose a strong password.
There is various password cracking tools present on the internet like:

. cain & able
● John the Ripper
● THC hydra
● Aircrack (WEP/WPA cracking tool)
● L0phtcrack
● Brutus
● Or more.

THC hydra
THC hydra is a network authentication cracker which supports many different services, click here for more information.

command NMap

kat sini mari kite bersama - sama blejar serba sedikit untuk menggunakan Nmap
1. first kita install nmap

root@ubuntu:/# apt-get install nmap
Reading package lists... Done
Building dependency tree
Reading state information... Done
nmap is already the newest version.
The following packages were automatically installed and are no longer required:
libclucene0ldbl libts-0.0-0 kdelibs4c2a libqca2 libqt4-opengl libxine1-x
libkjsembed4 oxygen-icon-theme libxine1-misc-plugins kdelibs-data
libkdecore5 phonon libqtwebkit4 docbook-xsl libcdt4
shared-desktop-ontologies linux-headers-2.6.35-22 liblualib50 libxine1-bin
odbcinst libsolid4 virtuoso-minimal libnepomuk4 libkdewebkit5
linux-headers-2.6.35-22-generic libsoprano4 libpolkit-qt-1-0
libdirectfb-1.2-9 libkdnssd4 libkparts4 libqapt1 kdelibs5-data kdoctools
libkdecorations4 libvirtodbc0 libdbusmenu-qt2 odbcinst1debian2
libavahi-qt3-1 libxcb-shape0 libkrossui4 icoutils docbook-xsl-doc-html
libthreadweaver4 libkmediaplayer4 libkfile4 libknewstuff3-4 libqapt-runtime
libqt4-svg netpbm libkpty4 libstreamanalyzer0 libphonon4 libgvc5
libknotifyconfig4 libkntlm4 libplasma3 libqt4-network phonon-backend-xine
compizconfig-backend-kconfig libxdot4 kdelibs-bin libmagickcore3-extra
libktexteditor4 libattica0 tsconf libnetpbm10 libkio5 libkjsapi4 libstreams0
imagemagick libgraph4 libqt3-mt liblua50 virtuoso-opensource-6.1-common
libqt4-script plasma-scriptengine-javascript libssh-4 soprano-daemon
kdebase-runtime-data libreadline5 libiodbc2 libkhtml5 libkdeui5 libkdesu5
libpathplan4 virtuoso-opensource-6.1-bin libkutils4 libkrosscore4
libnepomukquery4a libxine1-console libhildon-1-0 libxine1
Use 'apt-get autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

2. kita try test dh install ke lum

root@ubuntu:/# nmap
Nmap 5.21 ( http://nmap.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
-iL : Input from list of hosts/networks
-iR : Choose random targets
--exclude : Exclude hosts/networks
--excludefile : Exclude list from file
HOST DISCOVERY:
-sL: List Scan - simply list targets to scan
-sP: Ping Scan - go no further than determining if host is online
-PN: Treat all hosts as online -- skip host discovery
-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
-PO[protocol list]: IP Protocol Ping
-n/-R: Never do DNS resolution/Always resolve [default: sometimes]
--dns-servers : Specify custom DNS servers
--system-dns: Use OS's DNS resolver
--traceroute: Trace hop path to each host
SCAN TECHNIQUES:
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
-sU: UDP Scan
-sN/sF/sX: TCP Null, FIN, and Xmas scans
--scanflags : Customize TCP scan flags
-sI : Idle scan
-sY/sZ: SCTP INIT/COOKIE-ECHO scans
-sO: IP protocol scan
-b : FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
-p : Only scan specified ports
Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080
-F: Fast mode - Scan fewer ports than the default scan
-r: Scan ports consecutively - don't randomize
--top-ports : Scan most common ports
--port-ratio : Scan ports more common than
SERVICE/VERSION DETECTION:
-sV: Probe open ports to determine service/version info
--version-intensity : Set from 0 (light) to 9 (try all probes)
--version-light: Limit to most likely probes (intensity 2)
--version-all: Try every single probe (intensity 9)
--version-trace: Show detailed version scan activity (for debugging)
SCRIPT SCAN:
-sC: equivalent to --script=default
--script=: is a comma separated list of
directories, script-files or script-categories
--script-args=: provide arguments to scripts
--script-trace: Show all data sent and received
--script-updatedb: Update the script database.
OS DETECTION:
-O: Enable OS detection
--osscan-limit: Limit OS detection to promising targets
--osscan-guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
Options which take

Thursday, March 24, 2011

OWASP Top 10 Tools and Tactics

A tool for each of the OWASP Top 10 to aid in discovering and remediating each of the Top Ten vulnerabilities!

Introduction: If you’ve spent any time defending web applications as a security analyst, or perhaps as a developer seeking to adhere to SDLC practices, you have likely utilized or referenced the OWASP Top 10. Intended first as an awareness mechanism, the Top 10 covers the most critical web application security flaws via consensus reached by a global consortium of application security experts. The OWASP Top 10 promotes managing risk via an application risk management program, in addition to awareness training, application testing, and remediation. Yet, to manage such risk as an application security practitioner or developer, an appropriate tool kit is necessary.

RISK TOOL
A1: Injection ……………………………………………………. sQL Inject Me
A2: Cross-Site Scripting (XSS)……………………………… ZAP
A3: Broken Authentication and Session Management. HackBar
A4: Insecure Direct Object References ………………….. Burp
A5: Cross-Site Request Forgery (CSRF) …………………. Tamper Data
A6: Security Misconfiguration …………………………….. Watobo
A7: Insecure Cryptographic Storage…………………….. N/A
A8: Failure to Restrict URL Access……………………….. Nikto/Wikto
A9: Insufficient Transport Layer Protection…………… Calomel
A10: Unvalidated Redirects and Forwards……………… Watcher

for full article! go this website : http://resources.infosecinstitute.com/owasp-top-10-tools-and-tactics/

configure switch 3com

dah lama simpan p tak upload kat blog

ka sini nak share command2 die:


1. create ip address
== == == === === ==

[switch] interface vlan 1
[switch interface vlan-1] ip address 10.x.x.n 24
[switch] display ip interface

test: ping 10.0.0.x


2. enable telnet
==================

[switch] server enable
[switch] user interface vty 0 4
[switch-ui-vty0-4] authentication-mode passwd
[switch-ui-vty0-4] user privilage level 0
[switch-ui-vty0-4] exit

3. create vlan

create accsess port 1
=====================

[switch] interface vlan 1
[switch-vlan1] ip address 10.0.1.g 24
[switch-vlan1] quit


creater accsess port 2
======================

[switch] interface vlan 2
[switch-vlan2]port gig s/0/5
[switch-vlan2] quit

configure port gig s/0/10 as trunk and configure its Vlans
==========================================================

[switch] interface interface gig s/0/10
[switch-gigs/0/10] port link-type trunk
[switch-gigs/0/10] port trunk permit vlan all
[switch-gigs/0/10] quit


verify the configuration
=========================

[switch] dis interface gig s/0/5
[switch] dis interface gig s/0/10
[switch] dis vlan all

nak undo kan balik port dgn vlan itu
====================================

[switch] undo port link-type
[switch] undo vlan2


dis saved configuration
reset saved configuration
dis interface br
dis current
reset arp -all : untuk melihat ip ape yg lalu kat switch

News of security

dah lama tak post dalam bahasa melayu..hu..kat sini nak share majalah HITB.kat website ni

http://magazine.hackinthebox.org/

selamat membaca :)

Thursday, March 17, 2011

How Antivirus Software identifies threats!

Most of us are aware how Antivirus Works and updates. As ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works and updates.

An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs.

Signature-based detection – Dictionary based
Heuristic-based detection – Suspicious behavior based
1. Signature-based detection – Dictionary based

This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk.

As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants, so that the virus can be analyzed and the signature can be added to the dictionary.
More and regular the updates more secure we are.

2. Heuristic-based detection Suspicious behavior based
Heuristic-based detection involves identifying suspicious behavior from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus software’s to identify new malware and variants of known malware. Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.

File emulation- This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.

ow to check your anti virus weather it does the work you haired it for?

European Institute of Computer Antivirus Research – EICAR Test makes it easy. It is a common test and most of us can perform it right now!
1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
EICAR Test Code:

1 X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from New Text Document.TXT to mynewfile.com
3. Now run the antivirus scan on this mynewfile.com file.

If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise find a new one.

DOMXSS Scanner: An Online Tool to find Potential DOM Based XSS Vulnerabilities!

DOMXSS Scanner is an online tool that helps you find potential DOM based XSS security vulnerabilities. Enter a URL to scan the document and the included scripts for DOMXSS sources and sinks in the source code of Web pages and JavaScript files.

What is DOM Based XSS?
“DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner. That is, the page itself (the HTTP response that is) does not change, but the client side code contained in the page executes differently due to the malicious modifications that have occurred in the DOM environment.”

DOMXSS Scanner is what we would like to call a cloud-based web security scanner. It can be considered as a next generation scanner not exactly in performance and report wise but in community edition web security.

BufferZone Pro as a Freeware!

Recently, Trustware gave away free license keys of the Pro version of BufferZone and now the company has decided to make it completely FREE! BufferZone Pro is security software which creates a virtual environment aka “Virtual Zone”, where users can run browsers or other applications in a completely isolated mode, so in case of a malware infection the applications running inside the “Virtual Zone” will not damage the real system. BufferZone Pro can run alongside a antivirus, firewall, or internet security suite and is compatible with 32-bit OS only.

We find it very useful while testing web based malwares.
Key Features of BufferZone Pro:

Safely download anything in an isolated (virtualized) zone
Safely browse in an isolated zone
Safely chat with IM in an isolated zone
Schedule periodic “flushes” of the Virtual zone
Safely share with P2P applications in an isolated zone
Safely use USB devices in an isolated zone
Lock your personal files (in confidential folders) inside a trusted zone
Take a “snapshot” of the Virtual Zone for one- step restore
It is compatible with 32-bit version of Windows XP, Windows Vista and Windows 7.

Comitari : Web Protection Suite for Internet Explorer

Comitari welcomes you to the next generation of Web Security solutions – protecting you in real-time as you surf the web, from within your browser applications. Comitari does not rely on blacklists but rather uses patent-pending algorithms that cover 0-day phishing and identity theft attempts – and is the only solution of its kind in the market today. Offering complete protection against client-side attacks, identity theft and online frauds, Comitari Web Protection Suite is a complementary must to existing End Point Security and Web Gateway solutions.

What does Comitari protect you from?

Identity theft
Phishing & pharming
Web site impersonation
Session riding attacks (CSRF, aka XSRF)
User impersonation
Intranet network equipment attacks
DNS rebinding
Cross-Site Scripting (XSS) attacks
ClickJacking (aka UI Redressing)
Buffer Overflow (browser & plugin exploits)
File Stealing

We have published about browser protection tools last week, As browser protection is very important for everyone who uses internet here another tool Comitari. Currently it only suuports internet explorer hope later it supports most of the browsers.

download in http://www.pentestit.com/page/2/