This blog is fully devoted to Cyber Space and it's Security. We will try to give you the latest development in Cyber Space and Security Field.
Sunday, March 30, 2014
CYBER SECURITY........All at one place !: THE BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARF...
CYBER SECURITY........All at one place !: THE BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARF...: THE BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARFING These attacks are made through Bluetooth and target laptops, mob...
Wednesday, March 26, 2014
CYBER SECURITY........All at one place !: BUFFER OVERFLOW:
CYBER SECURITY........All at one place !: BUFFER OVERFLOW:: BUFFER OVERFLOW: In this type of attacks, the extra data may contain codes designed to trigger specific actions, sendin...
BUFFER OVERFLOW:
BUFFER
OVERFLOW:
In
this type of attacks, the extra data may contain codes designed to trigger
specific actions, sending new instructions to the attacked computer which in
turn could damage the user’s files; change data or disclose confidential
information.
A
BUFFER OVERFLOW occurs when a program or process tries to store more data in a
buffer (temporary data storage area) that it is intended to hold. Since,
buffers are created to contain a limited amount of data; the extra information
can overflow into adjacent buffers, corrupting or overwriting the valid data
held in them. These attacks are said to arisen because “the C Programing
language supplied the framework and poor programing practices supplied the
vulnerability.”
A
programing flaw made it possible for an attacker to compromise the integrity of
the target computer by simply sending an e-mail which was discovered several
years ago, in Microsoft’s Outlook and Outlook Express program. Here, users
could not protect themselves by not opening attached files; in fact, the user
did not have to open the message as well, to enable the attack. The program’s
message header mechanism had a defect that made it possible for senders to
overflow the area with extraneous data allowing attacker to execute whatever
type of code they desired on the recipient’s computers. This process is
activated as soon as the recipient downloaded the message from the server. This
type of Buffer Overflow attack was very difficult to defend. Therefore, since
then, Microsoft has created a patch to eliminate the vulnerability.
Wednesday, March 19, 2014
CYBER SECURITY........All at one place !: CYBER CROOKS ATTACKING MOBILE PHONES
CYBER SECURITY........All at one place !: CYBER CROOKS ATTACKING MOBILE PHONES: CYBER CROOKS ATTACKING MOBILE PHONES Previously, computer was the only medium to browse the Internet. Cyber Attackers o...
Tuesday, March 18, 2014
CYBER SECURITY........All at one place !: KNOW YOUR RIGHTS (IN INDIA) IN FRAUDELENT CARD TRA...
CYBER SECURITY........All at one place !: KNOW YOUR RIGHTS (IN INDIA) IN FRAUDELENT CARD TRA...: KNOW YOUR RIGHTS (IN INDIA) IN FRAUDELENT CARD TRANSACTION/S Indian Newspaper, The Times of India’s View: “The sheer frequ...
CYBER SECURITY........All at one place !: ARP (Address Resolution Protocol) CACHE POISONING
CYBER SECURITY........All at one place !: ARP (Address Resolution Protocol) CACHE POISONING: ARP (Address Resolution Protocol) CACHE POISONING This is also known as ARP SPOOFING. Through this attacker sends fake...
Monday, March 17, 2014
THE BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARFING
THE
BLUES – BLUEBUGGING; BLUEJACKING AND BLUESNARFING
These
attacks are made through Bluetooth and target laptops, mobile phones, PDAs as
well as every device with BLUETOOTH capability.
BLUEBUGGING:
Blue
bugging allows a virtual takeover of the target phone; manipulating the phone
into compromising its security, so as to create a BACKDOOR attack without
notifying or alerting the phone user; allowing attacker to “take control” of a
victim’s phone. After taking control of the phone, BLUEBUGGER can make calls,
send messages, read phonebooks, examine calendars as well as eavesdrop on phone
conversations also.
BLUEBUGGEER
also has the capability to create call forwarding application , whereby he
receives calls intended for the targeted phone and listen to any conversation
is victim is having , in real time. Earlier, the range for this type of attack
was 10 to 20 meters, but recently, due to advancement in technology its
operational range has been increased tremendously with the help of directional
antennas.
BLUEJACKING:
This
is a minor version of BLUEBUGGING which involves sending anonymous, unwanted
messages to other users with Bluetooth enabled mobile phones or laptops.
BLUEJACKING depends on the ability of Bluetooth Phones to detect and contact
other Bluetooth phones or devices nearby. This Bluejacking feature was
originally intended for exchanging contact details or electronic business
cards, adds new entry in the phone’s address book, types in messages and sends
it through Bluetooth, searches for other phones and if finds one, sends the
messages.
Bluejacking
is essentially harmless, since the Bluejacker does not steal personal information
or take control of your phone, but it can be a problem, if it is used to send
obscene or threatening messages by criminal minded attacker.
BLUESNARFING:
The
theft of data from the Bluetooth phone is called BLUESNARFING. Here, attacker
can discover a nearby phone/laptop by just using the right type of software on
his laptop or phone, and connect to it
without user’s confirmation and can download essentials such as phonebook,
e-mails, pictures and private videos, calendar and even the mobile phone’s
serial no. to clone the entire phone information. The potential victims is not
safe here even though his Bluetooth is off. He can be Bluesnarfed. As a device in “hidden” status may also be
Bluesnarfed by guessing the device’s MAC address via a BRUTE FORCE ATTACK.
BT
(Bluetooth) CRAWLER is a scanner for Windows Mobile based devices that
implements Bluejacking and Bluesnarfing.
Sunday, March 16, 2014
CYBER SECURITY........All in one place !: WHAT IS ARP (ADDRESS RESOLUTION PROTOCOL)?
CYBER SECURITY........All in one place !: WHAT IS ARP (ADDRESS RESOLUTION PROTOCOL)?: What is ARP (Address Resolution Protocol)? ARP is same as Roll Call in school. ARP (Address Resolution Protocol) is how network device...
Saturday, March 15, 2014
CYBER SECURITY........All in one place !: HOW TO PROTECT YOURSELF FROM IDENTITY THEFT
CYBER SECURITY........All in one place !: HOW TO PROTECT YOURSELF FROM IDENTITY THEFT: HOW TO PROTECT YOURSELF FROM IDENTITY THEFT WHAT IS TO BE LOOK OUT FOR IN THE WORLD OF CYBER CRIME I) E-mail Phish...
Friday, March 14, 2014
WHAT IS BACKSCATTER?
WHAT
IS BACKSCATTER?
It
is also known as OUTSCATTER, having side effects of email spam, worms and
viruses. Worm can send millions of spam emails using X’s email address as the
sender. This type of spam messages thousands in nos., are addressed to
non-existent email addresses.
Thursday, March 13, 2014
WHAT IS BACKDOOR?
WHAT
IS BACKDOOR?
It
is a means of access to a computer program which bypasses security mechanisms.
These Backdoors are often used by attackers, who detect and/or install it
themselves. A Backdoor poses security risk, whether installed as an
administrative tool or a means of attack. It also helps crackers or attackers,
who are looking for vulnerable systems.
Once
the Backdoor has been established by Cyber Crooks or Criminals, they gain
system entry, giving them complete access to all kind of our sensitive
information, such as financial details, account nos.; passwords etc. enabling
them to maliciously vandalize, alter, move or delete files from the infected
computer system.
Wednesday, March 12, 2014
ARP (Address Resolution Protocol) CACHE POISONING
ARP
(Address Resolution Protocol) CACHE POISONING
This
is also known as ARP SPOOFING. Through this attacker sends fake or spoofed ARP
(Address Resolution Protocol) messages to the LAN (Local Area Network) and aims
at attacker’s MAC Address with IP Address of another host. This mean sending
traffic meant for any gateway to the attacker’s website.
This
ARP Spoofing allows him to intercept data such as passwords, credit/debit card
details etc. being transmitted on his network, with which he can easily access
our details referred as above.
Sunday, March 9, 2014
WHAT IS ARP (ADDRESS RESOLUTION PROTOCOL)?
What is ARP (Address Resolution Protocol)?
ARP is same as
Roll Call in school. ARP (Address Resolution Protocol) is how network devices
associate MAC (Media Access Control) Addresses with IP (Internet Protocol)
addresses. It enables devices on a local computer network to find each-other.
Every networked computer has two
addresses known as:
1) MAC Address
2) IP Address
MAC (Media Access Control) ADDRESS
This address is unique
identifier e.g. 00-00-0c-36-12-5d that is usually hard-coded into a NIC
(Network Interface Card) by its manufacturer, which is permanent and does not
change.
Friday, March 7, 2014
Cyber
Security Related……..
Q.: What
is Anonymizer?
A.: An
Anonymizer or Anonymous Proxy is a tool which makes activities
untraceable on the Internet. It empower us to surf the web without revealing
our personal information. This hide our IP (Internet Protocol) Address as well
as Internet History. It also unblocks the restricted websites and lets us
navigate past web-filters.
DONT’S
1 Do not engage in online criminal,
disruptive or socially unacceptable activities.
For example: Sending out fraudulent e-mails.
TWO POPULAR ANONYMIZER WEBSITES
1) Hidemyass.com
2) Anonymouse.org
Subscribe to:
Posts (Atom)