Wednesday, March 26, 2014

CYBER SECURITY........All at one place !: BUFFER OVERFLOW:

CYBER SECURITY........All at one place !: BUFFER OVERFLOW:: BUFFER OVERFLOW:                 In this type of attacks, the extra data may contain codes designed to trigger specific actions, sendin...

BUFFER OVERFLOW:

BUFFER OVERFLOW:

                In this type of attacks, the extra data may contain codes designed to trigger specific actions, sending new instructions to the attacked computer which in turn could damage the user’s files; change data or disclose confidential information.
                A BUFFER OVERFLOW occurs when a program or process tries to store more data in a buffer (temporary data storage area) that it is intended to hold. Since, buffers are created to contain a limited amount of data; the extra information can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. These attacks are said to arisen because “the C Programing language supplied the framework and poor programing practices supplied the vulnerability.”

                A programing flaw made it possible for an attacker to compromise the integrity of the target computer by simply sending an e-mail which was discovered several years ago, in Microsoft’s Outlook and Outlook Express program. Here, users could not protect themselves by not opening attached files; in fact, the user did not have to open the message as well, to enable the attack. The program’s message header mechanism had a defect that made it possible for senders to overflow the area with extraneous data allowing attacker to execute whatever type of code they desired on the recipient’s computers. This process is activated as soon as the recipient downloaded the message from the server. This type of Buffer Overflow attack was very difficult to defend. Therefore, since then, Microsoft has created a patch to eliminate the vulnerability. 

Wednesday, March 19, 2014

Monday, March 17, 2014

THE BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARFING

THE BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARFING

                These attacks are made through Bluetooth and target laptops, mobile phones, PDAs as well as every device with BLUETOOTH capability.

BLUEBUGGING:
                Blue bugging allows a virtual takeover of the target phone; manipulating the phone into compromising its security, so as to create a BACKDOOR attack without notifying or alerting the phone user; allowing attacker to “take control” of a victim’s phone. After taking control of the phone, BLUEBUGGER can make calls, send messages, read phonebooks, examine calendars as well as eavesdrop on phone conversations also.
                BLUEBUGGEER also has the capability to create call forwarding application , whereby he receives calls intended for the targeted phone and listen to any conversation is victim is having , in real time. Earlier, the range for this type of attack was 10 to 20 meters, but recently, due to advancement in technology its operational range has been increased tremendously with the help of directional antennas.
BLUEJACKING:
                This is a minor version of BLUEBUGGING which involves sending anonymous, unwanted messages to other users with Bluetooth enabled mobile phones or laptops. BLUEJACKING depends on the ability of Bluetooth Phones to detect and contact other Bluetooth phones or devices nearby. This Bluejacking feature was originally intended for exchanging contact details or electronic business cards, adds new entry in the phone’s address book, types in messages and sends it through Bluetooth, searches for other phones and if finds one, sends the messages.
                Bluejacking is essentially harmless, since the Bluejacker does not steal personal information or take control of your phone, but it can be a problem, if it is used to send obscene or threatening messages by criminal minded attacker.

BLUESNARFING:
                The theft of data from the Bluetooth phone is called BLUESNARFING. Here, attacker can discover a nearby phone/laptop by just using the right type of software on his laptop or phone,  and connect to it without user’s confirmation and can download essentials such as phonebook, e-mails, pictures and private videos, calendar and even the mobile phone’s serial no. to clone the entire phone information. The potential victims is not safe here even though his Bluetooth is off. He can be Bluesnarfed.  As a device in “hidden” status may also be Bluesnarfed by guessing the device’s MAC address via a BRUTE FORCE ATTACK.

                BT (Bluetooth) CRAWLER is a scanner for Windows Mobile based devices that implements Bluejacking and Bluesnarfing.

Saturday, March 15, 2014

Friday, March 14, 2014

WHAT IS BACKSCATTER?

WHAT IS BACKSCATTER?


                It is also known as OUTSCATTER, having side effects of email spam, worms and viruses. Worm can send millions of spam emails using X’s email address as the sender. This type of spam messages thousands in nos., are addressed to non-existent email addresses.

Thursday, March 13, 2014

WHAT IS BACKDOOR?

WHAT IS BACKDOOR?
               
                It is a means of access to a computer program which bypasses security mechanisms. These Backdoors are often used by attackers, who detect and/or install it themselves. A Backdoor poses security risk, whether installed as an administrative tool or a means of attack. It also helps crackers or attackers, who are looking for vulnerable systems.


                Once the Backdoor has been established by Cyber Crooks or Criminals, they gain system entry, giving them complete access to all kind of our sensitive information, such as financial details, account nos.; passwords etc. enabling them to maliciously vandalize, alter, move or delete files from the infected computer system.

Wednesday, March 12, 2014

ARP (Address Resolution Protocol) CACHE POISONING

ARP (Address Resolution Protocol) CACHE POISONING

                This is also known as ARP SPOOFING. Through this attacker sends fake or spoofed ARP (Address Resolution Protocol) messages to the LAN (Local Area Network) and aims at attacker’s MAC Address with IP Address of another host. This mean sending traffic meant for any gateway to the attacker’s website.


                This ARP Spoofing allows him to intercept data such as passwords, credit/debit card details etc. being transmitted on his network, with which he can easily access our details referred as above.

Sunday, March 9, 2014

WHAT IS ARP (ADDRESS RESOLUTION PROTOCOL)?

What is ARP (Address Resolution Protocol)?

ARP is same as Roll Call in school. ARP (Address Resolution Protocol) is how network devices associate MAC (Media Access Control) Addresses with IP (Internet Protocol) addresses. It enables devices on a local computer network to find each-other.

Every networked computer has two addresses known as:
1)      MAC Address
2)      IP Address

MAC (Media Access Control) ADDRESS
               

This address is unique identifier e.g. 00-00-0c-36-12-5d that is usually hard-coded into a NIC (Network Interface Card) by its manufacturer, which is permanent and does not change.

Friday, March 7, 2014

Cyber Security Related……..

Q.:       What is Anonymizer?
A.:       An Anonymizer or Anonymous Proxy is a tool which makes activities untraceable on the Internet. It empower us to surf the web without revealing our personal information. This hide our IP (Internet Protocol) Address as well as Internet History. It also unblocks the restricted websites and lets us navigate past web-filters.

DONT’S

      Do not engage in online criminal, disruptive or socially unacceptable activities.
For example:     Sending out fraudulent e-mails.

TWO POPULAR ANONYMIZER WEBSITES

1)      Hidemyass.com

2)      Anonymouse.org