Saturday, 5 October 2013

BIOMATRIC ATM


BIOMATRIC ATM Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. ntroduction -Biometric Micro-ATMImage
Biometric Micro-ATMs from Bioenable are latest biometric authentication enabled handheld device.Micro-ATMs are also known as a Point of Transaction Terminal(PoT).pplication – Biometric Micro-ATM
Micro-ATMs will primarily perform the following functions:
1. Cash withdrawal
2. Cash deposit
3. Balance inquiries
4. Remittances
Micro-ATM’s Need
In the rural area it is not feasible for the banks to availing ATMs for following reasons
1. High ATM Set up cost
2. Low Rural population
3. Transaction volume is low
4. Low transaction value
Micro ATMs from BioEnable Technology is a one stop solution for banks bring ATM services to the unbanked rural areas in a secure manner.
Micro-ATM works
Micro-ATM will be operated by the Bank appointed Business correspondents (BC )The Bank appointed BC handle the physical currency , not like a regular ATM machine.All transactions will require online biometric authentication with the UIDAI authentication server in order to be processed.
This Biometric Micro ATMs will allow customers to perform basic financial transactions using only their AADHAAR number and their fingerprint as identity proof (along with a Bank Identification Number for inter-bank transactions). Unlike an ATM, the cash-in / cash-out functions of the micro ATM will be performed by an operator, thus bringing down the cost of the device and the cost of servicing the customer. The micro ATM will support the following financial transactions:
Cash Transaction :-
1.Cash Deposit ,Cash Withdrawal
2.Funds transfer
3.Balance inquiry for Bank Account
4.fHigh Accuracy
5. Give strong authentication
6. Biometric authentication is used instead of PIN
Cost Reduction :-
Hidden costs of ATM card management like card personalization, delivery, management, re-issuance, PIN generation, help-desk, and re-issuance can be avoided
Sutaible for Indian rural area
Flexible account access allows clients to access their accounts at their convenience
Low operational cost No Component Specification 1 Processor Intel Atom processor Z510 and US15W System controller hub.2 Memory 512 MB 3 Storage 8 GB compact ,Flash upto 32 GB 4 Display 5 inch TFT color LCD,4-wire Resistive touch screen with stylus 5 Printer 2 inch high speed thermal printer ,paper roll with 57*35mm diameter ,length 13 M 6 Battery life Li-Polymer Battery, 4000mAh/8000mAh ,operating time 4hrs/8hrs 7 Dimension 140*32*292 mm 8 Weight 900g 9 Operating temp. 0- 40 degree centigrade
Fingerprint scanner specification
enBioScanc1 Single fingerprint scanner for authentication:
No Component Specification 1 Fingerprint Sensor NITGEN OPU08 2 Image Size 260 (x) x 330 (y) 3 Image Resolution 500 [PPI] 4 Image Scale 256 Level Grayscale (8-bit)
5 Interface USB 2.0, Plug & Play 6 Operating Humidity RH 10~90 % 7 Compliance STQC Certified,KC,CE,FCC,WHQL, RoHS, FBI (IAFIS)
Issues in current ATM networks
Why we use it :-
 ATM Card frauds
 Use of ATM card duplicators
 Card sharing by family and friends
 Inability to trace the wrongful users
IT’S IMPORTANCE 
ATM PINs can be shared on phone or recorded using secret cameras.
Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face, Pal vein
Multifactor Authentication: Card + PIN + Biometrics
Online or offline Authentication using smart cards
Card less Authentication
Biometrics is combination of card or PIN
where we can use it :-
Banking & Finance
Food coupons / Tickets / Canteen ATM
Membership Verification ATM
Transaction / Check Deposit ATM
Self Service ATM
Retail ATM IRIS DETECTION:-
Iris detection is a process of analyzing various patterns of human iris using iris recognition device, and storing the image in the database. To make iris detection process work faster, iris recognition system uses certain
algorithms. Iris detection process in iris recognition device automatically detects human iris and snaps a photo of it.
In Iris detection process, image of the iris is captured. Once captured, iris detection system determines the outer and inner borders of iris. Iris detection system then filters the usable structures for analysis, and calculates the iris code which is saved into the database. Iris detection system verifies the identity of a person by comparing the code with the one that exists in it.Introduction
BioEnable is offering Iris recognition based Time Attendance & Access control system. Recognition ?
Iris recognition technology offer Dual or Single eye capture and automatic identification again large databases in just 1-2 seconds.
Iris recognition is considered more secure compared to fingerprint and other biometric technologies.
Many people have improper fingerprints that are not suitable for fingerprint recognition systems. Iris is second best alternative to fingerprint.
Children fingerprints are difficult to scan and can go thru changes overtime, making it not a suitable biometric identification. Iris is suitable for all ages.
Eyes are highly protected part of the body and does not go thru much changes over the complete lifespan and good for long terms biometric recognition
Iris recognition technology is worldwide used in National ID, Visa entry exit applications
Model :-
Dual Eye Iris capture camera
10 inch spill proof touchscreen
Enhanced graphical user interface
Store upto 10000 users (2 eyes each) and over 500000 logs
Advanced access control mechanism with Door sensors, Fire alarm, Multiple Door lock controls
Optional Face Recognition & Fingerprint recognition addons
Benefits
Why we use it :-
High security identification
Touchscreen multi-lingual interface
Large user database
wApplications
where we can use it :-
Time Attendance recording in offices
Access control at office, Banks
Canteen management & Food coupon system
Visitor management
Members management at events
NAC5000 face recognition system :-
NAC-5000 Face is a multi-modal biometric solution enable with Fingerprint, Face Recognition system, RFID & Password that comes with accurate and rapid matching speed for stable Time Attendance and Door Access control.
NAC5000 face recognition system is designed to be performed on the 5.7 inches TFT touch screen which is convenient to display the important notice and OEM logo and user friendly interface includes R232/485, TCP/IP, and optional WiFi and USB.
NAC5000 Face offers you enterprise level of Entry and Time Attendance management with its LAN communication-based network infrastructure enabling integrated monitoring and systematic management of multiple terminals operated independently on a remote location and SDK to be easily integrated with customer’s application.
Features – NAC5000 Face Recognition System
5.7 inch true Color LCD with Touch Screen
-> Large LCD enable for company logo, important notice.
-> Fingerprint and Face quality display
Face Technology
-> Face Detection
-> Face Recognition
-> Multi-modal enhanced security
Auto-on function with Live Finger Detection
-> Recognizes fake fingerprint
-> Silicon & rubber fingers detected, distinguished from real human fingers
-> Automatically activated when finger placed on sensor
Wireless LAN (optional)
-> Easy to install in anywhere
USB Memory Slot
-> User Information & Log data Up/Download
-> Firmware Upgrade
Built-in Camera (optional)
-> Takes picture every time log event occurs
-> Face recognition
Large scale system
-> Max 2,000 terminals connected in one network
Specification – NAC5000 Face Recognition System CPU 32-bit / 620MHz Memory 8MB Flash + 256 DRAM Display 5.7inch VGA Color / Touch-screen 1:N fingerprint identification time Less than 1 sec (4,000 templates) Fingerprint template capacity 40,000 fp. Templates Face template capacity 3,000 templates Log capacity up to 100,000 Network interface TCP/IP, RS-485, Wireless LAN (option) PC Interface USB, RS-232 USB memory slot Supports Camera Embedded Fake/latent fingerprint recognition Available
Size 167 x 146 x 52 (W x H x D) mm Certificate KCC, CE, FCC
Models – NAC5000 Face Recognition System
Different models :-
NAC5000 S – Standard Model with Fingerprint & Passwords options
NAC5000 M – Model with Fingerprint, Password & Mifare 13.56Mhz Cards options
NAC5000 R – Model with Fingerprint, Password & HID/EM Card 125Khz options
NAC5000 Face – NAC5000 + Face Recognition (NAC5000 S Face/ NAC5000 M Face/ NAC5000 R Face.
Advantages of Biometrics:-
•Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly.
•Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) & sometime our ATM cards are also missed .
•Automated biometric identification can be done very rapidly and uniformly, with in a minimum of time. It’s a rapid process.
•Your identity can be verified without resort to documents that may be stolen, lost or altered.
Disadvantages of BIOMETRICS :-
•The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
•For people affected with diabetes, the eyes get affected resulting in differences. Sometimes people have some eyes problems also.
•Biometrics is an expensive security solution.
Conclusion :-
Security personnel look for biometric data that does not change over the course of your life; still for this you can feel more secure . This is the final processImage

EMAIL HACKING

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong…

Ur Email-ID Can Be Hack… But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID’s But Truth Is Their Is No Software Present For Hacking Ur Mail ID’s..
Email Hacking can be possible to many ways like:-
 
1. Social Engineering
2.Phishing Attacks
3. Cookie Hijacking
4. By Keyloggers
Social Engineering:
This Process is defined as Hack the human mind without any tools…
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want. 
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions. 
With the increase in use of Instant Messengers, any anonymous person may have a 
chat with another any where in the world. The most crucial part of this attack is to 
win the trust of the victim.
Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password then there is no need to
 attacker for again hack Email- ID of victim. And it would take you to inbox of victim’s yahoo account without asking for any password of victim account.
Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log 
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because 
these programs and hardware devices monitor the keys typed in a user can easily 
find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitted to an unknown third party.
Phishing Attacks
Here we tells about PHISHING & How can we protect from it.~! 
>>WHAT IS PHISHING:-
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. 
>>MOBILE PHISHING:
Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.
like Iphone,Apple ,iTunes n more…By SMS
EXAMPLE:- 
>>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number…
The phisher can ask like it They want your personal Information.
 Some people do the reply to phisher then after he/she can be target of Phisher… so never be reply these type of Messages or Mail. 
In a phishing attack, the attacker creates a situation wherein people believe that they are dealing with an authorized party, like their bank or another service provider. The attacker will ask the victim for sensitive information such as credit card information. 
>>Phishing attacks generally target:
    * Bank information – e.g. VISA and PayPal accounts.
    * Username and password information.
    * Social Security numbers.
    * Information which can be used to retrieve forgotten or lost credentials.
                                                                                                          >>Follow the tips below to protect yourself against these threats:

· Your bank will never ask you to divulge account information or passwords via email. Never give out this information, especially via email.
· Don’t open emails that come from untrusted sources.
· Don’t run files that you receive via email without making sure of their origin.
· Don’t click links in emails. If they come from a known source, type them on the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.
· Keep your computer protected. Install a security solution and keep it up-to-date.

>>Protect yourself from Phishing scams that could lead to identity theft. I cannot stress this enough. Phishing scams are a hot topic lately that have grown with the popularity of online banking and social networking sites like MySpace, Facebook and Friendster.

The term Phishing comes from the analogy to “fishing”. The phisher uses a bait to lure victims into giving out personal information like passwords and credit card numbers. The bait is typically and urgent plea from one of the victims friends or trusted websites, asking for information to resolve some sort of problem with their account.  
>>Anti-phishing software is a must for anyone that accesses the internet. Most of the internet service providers have some safety measures included as part of their online security software. Most web browsers also have add-ons that can detect most phishing scams. Unfortunately, these measures are not enough. Some of the more clever phishers have found ways to trick the anti-phishing software so you need to be cautious of suspicious emails and messages.

WHAT DO ETHICAL HACKERS DO?

What Do Ethical Hackers Do?Image

Ethical hackers are motivated by different reasons, but their purpose is usually the same as that of crackers: they’re trying to determine what an intruder can see on a targeted network
or system, and what the hacker can do with that information. This process of testing the security of a system or network is known as a penetration test, or pen test.
Hackers break into computer systems. Contrary to widespread myth, doing this doesn’t usually involve a mysterious leap of hackerly brilliance, but rather persistence and the dogged
repetition of a handful of fairly well-known tricks that exploit common weaknesses in the security of target systems. A pen test is no more than just performing those same steps with
the same tools used by a malicious hacker to see what data could be exposed using hacking tools and techniques.
Many ethical hackers detect malicious hacker activity as part of the security team of an organization tasked with defending against malicious hacking activity. When hired, an ethical
hacker asks the organization what is to be protected, from whom, and what resources the company is willing to expend in order to gain protection. A penetration test plan can
then be built around the data that needs to be protected and potential risks. Documenting the results of various tests is critical in producing the end product of the
pen test: the pen test report. Taking screenshots of potentially valuable information or saving log files is critical to presenting the findings to a client in a pen test report. The pen test
report is a compilation of all the potential risks in a computer or system.
Who are ethical hackers?
Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy. While testing the security of a client’s systems, the ethical hacker may discover information about the client that should remain secret. In many cases, this information, if publicized, could lead to real intruders breaking into the systems, possibly leading to financial losses. During an evaluation, the ethical hacker often holds the “keys to the company,” and therefore must be trusted to exercise tight control over any information about a target that could be misused. The sensitivity of the information gathered during an evaluation requires that strong measures be taken to ensure the security of the systems being employed by the ethical hackers themselves: limited-access labs with physical security protection and full ceiling-to-floor walls, multiple secure Internet connections, a safe to hold paper documentation from clients, strong cryptography to protect electronic results, and isolated networks for testing.
Ethical hackers typically have very strong programming and computer networking skills and have been in the computer and networking business for several years. They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., UNIX or Windows NT) used on target systems. These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors. It should be noted that an additional specialization in security is not always necessary, as strong skills in the other areas imply a very good understanding of how the security on various systems is maintained. These systems management skills are necessary for the actual vulnerability testing, but are equally important when preparing the report for the client after the test.

Top 10 Hacker Tools and Techniques 
By understanding how hackers gain access to systems, organizations can stay a step ahead and ensure information availability, integrity, and confidentiality. Listed below is Altius IT’s list of the Top 10 Hacker Tools and Techniques:
  • Reconnaissance. Hackers use tools to get basic information on your systems. Tools like Netcraft and PCHels to report on your domain, IP number, and operating system.
  • Network Exploration. The more information the hacker knows about your system the more wanys he can find vulnerabilities. Tools such as NMap identify your host systems and services.
  • Probe Tools. Some tools were initially designed to be used by system administrators to enhance their security. Now, these same tools are used by hackers to know where to start an attack. Tools like LANguard Network Scanner identify system vulnerabilities.
  • Scanners. Internally, sniffer tools analyze network performance and applications. Hacker reconnaissance tools such as AET Network Scanner 10, FPort 1.33, and Super Scan 3 scan your devices to determine ports that are open and can be exploited.
  • Password Cracker. Password tools are used by security administrators to find weak passwords. These tools may also be used by hackers. Password crackers include LC5, John The Ripper, iOpus Password Recovery XP, and LastBit.
  • Remote Administration Tools. Tools such as AntiLamer and NetSlayer are used by hackers to take partial or complete control of the victim’s computer.
  • Backdoor. Backdoor tools and Trojan Horses exploit vulnerabilities and open your systems to a hacker. KrAIMer and Troj/Zinx-A can be used by hackers to gain access to your systems.
  • Denial of Service (DoS). Denial of service attacks overload a system or device so it can’t respond or provide normal service. Hackers use tools such as Coldlife and Flooder overload a system.
  • Recover deleted files. Once hackers are inside your perimeter, they can use tools like Deleted File Analysis Utility to scan your hard drive partitions for deleted files that may still be recoverable.
  • Web Site Tools. Hackers use tools such as Access Diver and IntelliTamper to index your web site pages and directories. These tools can download your site to the hacker’s local hard drive. Once on his system, the hacker analyzes the web site to identify and exploit security vulnerabilities.

HACK WINDOWS ADMIN



Today, i am going to show you many aspects of the Windows Password Storage
path, Method of Encryption, and breaking into Windows by cracking
the admin password. We need this often for many reasons:
1) Sometime we have forgotten our old password and Hint isn’t helping out.
2) We want to break into someone computer to get the information.
3) Just want to take revenge from someone.
4) Stealing computer data.
Lets, take a deep dive in Cracking Windows password and also where these are
stored and in which format.
SAM file and Password Hashes~Place where these passwords are stored 
in Hashes:
Password Hashes – When you type your password into a Windows NT, 2000, or
XP login Windows Seven, Vista etc Windows encrypts your password using
a specific encryption scheme that turns your password into something that looks
like this:
                    7524248b4d2c9a9eadd3b435c51404eddc5
This is a password Hash. This is what is actually being checked against
when you type your password in. It encrypts what you typed and bounces it
against what is stored in the Registry and/or SAM File.
You can break this hash password from
SAM File – Holds the user names and password hashes for every account
on the local machine, or domain if it is a domain controller.
Location of SAM/Hashes:
You can find what you’re looking for in several locations on a given machine.
It can be found on the hard drive in the folder %systemroot%system32config
(i-eC:\windows\system32\config). However this folder is locked to all accounts
including Administrator while the machine is running. The only account that can
access the SAM file during operation is the “System” account. 
The second location of the SAM or corresponding hashes can be found in the
registry. It can be found under HKEY_LOCAL_MACHINESAM.
This is also locked to all users, including Administrator,
while the machine is in use.(GO to Run and Type Regedit and Hit enter,
Now scroll to HKEY_LOCAL_MACHINESAM, However you may not access to it.)
So the two (Some other also) locations of the SAMHashes are:
- %systemroot%system32config
- In the registry under HKEY_LOCAL_MACHINESAM
Cracking or Breaking Into Admin Account:
How to get Hashes form SAM file?
Well, Below are the methods to do so:
1) Well, the easiest way to do this is to boot your target machine to an alternate
OS like NTFSDOS or Linux and just copy the
SAM from the %systemroot%system32config  folder.  
It’s quick, it’s easy, and it’s effective. You can get a copy of NTFSDOS
from Sysinternals(http://www.sysinternals.com)
The regular version of NTFSDOS is freeware, which is always nice,
but only allows for Read-Only access. This should be fine for what you want to do,
 however, if you’re the kind of person that just has to have total control and has
some money to burn. NTFSDOS Pro, which is also by Sysinternals has read/write
access but it’ll cost you $299.
2) You can also get password hashes by using pwdump2
(Google It to get software ~ Search at openwall.com). pwdump uses .
DLL injection in order to use the system account to view and get the password
hashes stored in the registry. It then obtains the hashes from the registry and stores
them in a handy little text file that you can then  paste them into a password cracking
utility like l0phtcrack or John the ripper (Linux Based works well)
also cain and abel can be used.  
3) Import Hashes directly from l0phtcrack, and let them open to you by cracking.
Obtained Hashes? Now crack them:
Well, as i have said that these can’t be reversed but somehow automated famous '
cracking softwares can be used to achieve the target.
Yes, it is possible, All we have to do is to have a bit patience.
The software will use a lot of strings and will compare these hashes also,
Inshort it will decode them.
1) John the Ripper - John the Ripper is to many, the old standby password cracker.
 It is command line which makes it nice if you’re doing some scripting, and best of
all it’s free and in open source. The only real thing that JtR is lacking is the ability
to launch Brute Force attacks against your password file. But look at it this way,
even though it is only a dictionary cracker, that will probably be all you need.
I would say that in my experience I can find about 85-90% of the passwords in
a given file by using just a dictionary attack.
2) L0phtCrack - Probably the most wildly popular password cracker out there.
L0phtCrack is sold by the folks at @Stake. And with a pricetag of $249 for a
single user license it sure seems like every one owns it.
This is probably the nicest password cracker you will ever see.
With the ability to import hashes directly from the registry pwdump and dictionary,
hybrid, and brute-force capabilities. No password should last long.
Well, I shouldn’t say “no password”. But almost all will fall to L0phtCrack given
enough time.
Making Your Own Password in Windows: 
Injecting Password Hashes into the SAM:
Easiest ways to gain Administrator privileges on a machine, is by injecting your own
password hashes into the SAM file. In order to do this you will need physical access
 to the machine and a brain larger than a peanut. Using a utility called “chntpw” by
Petter Nordhal-Hagen you can inject whatever password you wish into the SAM file
of any NT, 2000, or XP machine thereby giving you total control, just burn the .
iso on a disk and use it. I would give a tip like backing up the SAM file first by
using an alternate OS.Make a USB disk of linux or
Windows Live dsik can also work. Go in, inject the password of your choosing.
Login using your new password. Do what you need to do.
Then restore the original SAM so that no one will know that i was hacked.

WI-FI HACKING TOOLS

      WI-FI HACKING TOOLS
I am going to share with you some of my favorite wireless tools that can be used to hack Wi-Fi password using Ubuntu or any other Linux distribution:
Netcut: 
Disconnect any wifi devices from network. Support windows OS . The driver and Install package has been upgrade. tested working under windows 7 both 32 bit and 64 bit OS. Its change MAC address on any adapter, including wireless. Details at How to change MAC. Also support Clone MAC address from any PC that NetCut monitored. 
Whereas Wifikill use for Android applications to disable internet connections for a device on same network. Disconnect wifi connection and get full network on your device.

Aircrack-ng
Aircrac-ng (a fork of aircrack) is my main tool for cracking Wi-Fi passwords. It has a wireless network detector, a packet sniffer, WEP and WPA/WPA2-PSK cracker, and an analysis tool for 802.11 wireless LANs. Aircrack-ng works with any wireless card whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.

Kismet  
Kismet is a really good network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. It will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. Kismet works in passive mode, which means it is capable of detecting the presence of both wireless access points and wireless clients without sending any log-gable packets.
ismet – does a little more than just detecting networks. Aside from providing every detail about a network except the encryption key, Kismet is a packet sniffer and intrusion detection system.


NetStumbler

Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.

SWScanner
SWScanner is specifically designed to make the whole wardriving process a lot easier. It is also intended to manage many tasks related to wireless networking. SWScanner is compatible with NetStumbler files and can be integrated with GPS devices.
These are only three of the many wireless tools that can get you going in no time, so feel free to explore.

WI-FI NETWORK HACKING


Wireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network? 
I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. Many sources said it was easy, few said it was hard.  
How a wireless network works 
A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients.
Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with  every NIC. For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range. Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access to the network or its wires to pick up these packets, just the right tools. It is with the transmission of these packets that pose the largest security threat to any wireless network.
Wireless Encryption 
The majority of home and small business networks are encrypted using the two most popular methods:
  1. WEP & WPA
WEP – Wired Equivalent Privacy – comes in 3 different key lengths: 64, 128, and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively.  WEP provides a casual level of security but is more compatible with older devices; therefore, it is still used quite extensively. Each WEP key contains a 24 bit Initialization Vector (IV), and a user-defined or automatically generated key; for instance, WEP 128 is a combination of the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128)
WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.
WPA – WiFi Protected Access – comes in WPA and WPA2, and was created to resolve several issues found in WEP. Both provide you with good security; however, they are not compatible with older devices and therefore not used as widely. WPA was designed to distribute different keys to each client; however, it is still widely used in a  (not as secure) pre-shared key (PSK) mode, in which every client has the same passphrase.
To fully utilize WPA, a user would need an 802.1x authentication server, which small businesses and typical home users simply cannot afford. WPA utilizes a 48 bit Initialization Vector (IV), twice the size of WEP, which combined with other WEP fixes, allows substantially greater security over WEP.
Packets and IVs 
It’s all in the packets. The bottom line is – while you may be able to employ several security features on your WLAN – anything you broadcast over the air can be intercepted, and could be used to compromise the security on your network. If that frightens you, start stringing wires throughout your home.
Every encrypted packet contains a 24 or 48 bit IV, depending on the type of encryption used. Since the pre-shared key is static and could be easily obtained, the purpose of the IV is to encrypt each packet with a different key. For example, to avoid a duplicate encryption key in every packet sent, the IV is constantly changing.  The IV must be known to the client that received the encrypted packet in order to decrypt it; therefore, it is sent in plaintext.
The problem with this method is that the Initialization Vectors are not always the same. In theory, if every IV was different, it would be nearly impossible to obtain the network key; this is not the case. WEP comes with a 24 bit IV; therefore, giving the encryption 16 million unique values that can be used. This may sound like a large number, but when it comes to busy network traffic, it’s not.
Every IV is not different; and this is where the issues arise. Network hackers know that all the keys used to encrypt packets are related by a known IV (since the user entered WEP part of the key is rarely changed); therefore, the only change in the key is 24 bits. Since the IV is randomly chosen, there is a 50% probability that the same IV will repeat after just 5,000 packets; this is known as a collision.
If a hacker knows the content of one packet, he can use the collision to view the contents of the other packet. If enough packets are collected with IV matches, your network’s security can be compromised.
The crack 
Two of the most popular programs used for actually cracking the WEP key are Airsnort and Aircrack. Airsnort can be used with the .dump files that Kismet provides; and Aircrack can be used with the .cap files that Airodump provides.
Airsnort can be used on it’s own without any other software capturing packets; although, it has been reported to be extremely unstable in this state, and you should probably not chance loosing all your captured data. A better method would be to let Airsnort recover the encryption key from your Kismet .dump file. Kismet and Airsnort can run simultaneously.
For this demonstration, we’ll be using Aircrack. You can use Airodump to capture the packets, and Aircrack to crack the encryption key at the same time.
With Airodump running, open a new command window and type:
aircrack -f 3 -n 64 -q 3 george.cap
The -f switch followed by a number is the fudgefactor; which is a variable that the program uses to define how thoroughly it scans the .cap file. A larger number will give you a better chance of finding the key, but will usually take longer. The default is 2.
The -n switch followed by 64 represents that you are trying to crack a WEP 64 key. I knew because it was a setup; In the real world there is no way to determine what WEP key length a target access point is using. You may have to try both 64 and 128.
The -q 3 switch was used to display the progress of the software. It can be left out altogether to provide a faster crack; although, if you’ve obtained enough unique IVs, you should not be waiting more than a couple minutes.
-m switch can be used, followed by a MAC address, to filter a specific AP’s usable packets; this would come in handy if you were collecting packets from multiple APs in Airodump.
Aircrack recovered my WEP 64 key within 1 minute using 76,000 unique IVs; the whole process took around 34 minutes.
The same experiment was repeated with WEP 128 and it took about 43 minutes. The reason it was not substantially longer is because I simply let Airplay replay more packets. Sometimes you can get lucky and capture an ARP Request packet within a few minutes; otherwise, it could take a couple hours.

WHAT IS A COMPUTER VIRUS ?





A potentially damaging computer programme capable of reproducing itself 
causing great harm to files or other programs without permission or knowledge of the user.
Virus - A program that when run, has the ability to self-replicate by infecting
other programs and files on your computer. These programs can have many
effects ranging from wiping your hard drive, displaying a joke in a small box, or
doing nothing at all except to replicate itself. These types of infections 
tend to be localized to your computer and not have the ability to spread to 
another computer on their own. The word virus has incorrectly become a general 
term  that encompasses trojans, worms, and viruses.


Types of viruses :-

The different types of viruses are as follows-


1) Boot Sector Virus :- Boot sector viruses infect either the master boot record

of the hard disk or the floppy drive.
The boot record program responsible for the booting of operating system is replaced
by the virus. The virus either copies the master boot program
to another part of the hard disk or overwrites it.
They infect a computer when it boots up or when it accesses the infected floppy
disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus,
 any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :-Some files/programs, when executed, 
load the virus in the memory and perform predefined functions to infect the system. 
They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :-A multipartite virus is a computer virus that infects
multiple different target platforms, and remains recursively infective in each target.
 It attempts to attack both the boot sector and the executable, or programs, files at the same time. 
When the virus attaches to the boot sector, it will in turn affect the system’s files, 
and when the virus attaches to the files, it will in turn infect the boot sector. 
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :-These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :-Polymorphic viruses have the ability to mutate implying
 that they change the viral code known as the signature each time they spread
or infect. Thus an antivirus program which is scanning for specific virus codes
unable to detect it’s presense.
6) Macro Viruses :- A macro virus is a computer virus that “infects” a
Microsoft Word or similar application and causes a sequence of actions to be
 performed automatically when the application is started or something else triggers 
it. Macro viruses tend to be surprising but relatively harmless.
A macro virus is often spread as an e-mail virus. Well known examples are 
Concept Virus and Melissa Worm.
If you use a computer, read the newspaper, or watch the news,
 you will know about computer viruses or other malware. 
These are those malicious programs that once they infect 
your machine will start causing havoc on your computer. 
What many people do not know is that there are many 
different types of infections that are categorized in the general category of Malware.

Malware - Malware is programming or files that are developed for the purpose of doing harm. 
Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware. 
This article will focus on those malware that are considered viruses, trojans, worms,
 and viruses, though this information can be used to remove the other types of malware
 as well. We will not go into specific details about any one particular infection, 
but rather provide a broad overview of how these infections can be removed. 
For the most part these instructions should allow you to remove a good deal of infections,
 but there are some that need special steps to be removed and these won’t be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that 
you will be reading about.

Backdoor- A program that allows a remote user to execute commands 
and tasks on your computer without your permission. 
These types of programs are typically used to launch attacks on other computers, 
distribute copyrighted software or media, or hack other computers. 

Hijackers- A program that attempts to hijack certain Internet functions 
like redirecting your start page to the hijacker’s own start page, redirecting 
search queries to a undesired search engine, or replace search results 
from popular search engines with their own information.
Spyware- A program that monitors your activity or information on your computer
 and sends that information to a remote computer without your Knowledge. 

Adware- A program that generates popups on your computer 
or displays advertisements. It is important to note that not all adware programs 
are necessarily considered malware. 
There are many legitimate programs that are given for free that display ads 
in their programs in order to generate revenue. 
As long as this information is provided up front then they are generally not 
considered malware. 
Dialler - A program that typically dials a premium rate number that has 
per minute charges over and above the typical call charge. 
These calls are with the intent of gaining access to pornographic material. 
Trojan- A program that has been designed to appear innocent but 
has been intentionally designed to cause some malicious activity or to provide a backdoor to your system. 
Worm- A program that when run, has the ability to spread 
to other computers on its own using either mass-mailing techniques 
to email addresses found on your computer or by using the Internet 
to infect a remote computer using known security holes.

 

FACEBOOK PAGE

SKETCHES & PAINTINGS