Showing posts with label Information Security. Show all posts
Showing posts with label Information Security. Show all posts

Wednesday, 16 December 2015

Subdomain Takeover by claiming expired domains

On many websites it was seen that the DNS entries contains bucket to aws S3 which is not taken or has expired which allows an attacker to claim the bucket and this host malicious page on sub domain legitimate site.

For example:
media.vine.co is an alias for vines.s3.amazonaws.com.


Here media.vine.co is legitimate site with sub domain media which is pointing to vines bucket in aws S3. So now if this vines.s3.amazonaws.com is not claimed by the site owner and still present in DNS record of vine.co then this can lead to sub domain takeover.


Some POC's
VIMEO - status.vimeo.com CNAME hosted.statuspage.io.

Twitter - media.vine.co CNAME vines.s3.amazonaws.com.


How to fix:

Just remove all those DNS entries which are active and unused or pointing to external services which you do not support anymore.

Read more at Detectify

Tuesday, 15 December 2015

Directory Listing: Hackers can steal data stored on your server

How to download movies, songs, games and software for free by using google. There are some google dorks which can expose your paid content directly to hackers or anybody for free.

Google dorks:

intitle:index.of./"Interstellar" (mp4|avi|mkv|wmv)


intitle:index.of./software


intitle:index.of./games

intitle:index.of./songs (mp3|wav|aac)

or suppose you are looking for Call of Duty

intitle:index.of./ "Call of Duty"

As seen above, you can directly mention the keyword in double quotes, it can be song title, movie name, software name, etc.

Friday, 20 November 2015

History of websites - Internet Way Back Machine

How to view and access any website on past date. 
The Internet Way Back Machine(http://archive.org) allows you to visit any website on past date for which it has captured snapshot. This allows you to access old data which may not be present website on date. 

Go to back date and see how was your favourite website looks like.

Find IP address or Network owned by any company

How to find IP addresses or IP Network of any company.

 APNIC- https://www.apnic.net/

 ARIN- https://whois.arin.net


Email Tracking - Get Notified when receiver reads your email

How to get notification when the receiver opens or reads email you sent using your email address registered on READNOTIFY(www.readnotify.com).

How to Send Self Destructive emails

How to send self destructive emails from your email address registered on READNOTIFY(www.readnotify.com). 

Just add (dot)selfdestructive.readnotify.com after receiver's email address. 

This email expires after 60 seconds.

https://www.youtube.com/watch?v=qTWwJJeriCk

Wednesday, 11 November 2015

How I hacked your Facebook Account - Password Stealing

How many times we let somebody to work on our computer. When your best friend asks for it, you can't refuse.

So here is how he can steal your Facebook password, gmail or google account password, passwords of banking sites.





DO NOT Save password in your browser, Nothing is secure, even the master password can be cracked.


Saturday, 7 November 2015

virustotal: Scan file and URL with multiple antivirus in one go


Scan downloaded file on "virustotal[dot]com" with multiple antivirus engine in one go without installing it on your system. 

Check if the download link or any webpage is malicious by URL Scan.


https://www.youtube.com/watch?v=5hKocX5lmmc

Email Spoofing - Stop trying to crack his password

Email spoofing is sending email by changing the FROM email to any email address that doesn't belong to you. The victim thinks the mail has arrived from spoofed id, but actually you sent it. No need to hack or crack his email account. Send email from your friends email id to any email address without hacking his account.

website: emkei[dot]cz

It is being detected as Spam by Google, but it may work on your school/college/company email address.

https://www.youtube.com/watch?v=LEVe0zHW0fE
 

Tuesday, 20 October 2015

Exploiting DNS Zone Transfer

Exploit DNS Zone Transfer Vulnerability to find out internal domains and Network Information like webserver, dns servers, mail servers, etc.


My Channel :https://www.youtube.com/user/learnsecurityvideos

Cracking Password in Linux using John The Ripper

Here is my new video on YouTube demonstrating password cracking using John the Ripper.


Saturday, 28 June 2014

How to collect information about any website

Here is the video to show how we can use various online and offline tools to gather information related to any website which may include but not limited to the owner, address, contact details, servers information, operating system on the server, secret directories,etc.
You can collect network information, company details like no of employees, their contact persons, etc

Email tracking: Trace any email to verify the actual sender

Here is the video to demonstrate, how you can trace any email that you have received to confirm or verify the sender. There lots of free online email tracking service. You can track the fake mailer targeting you.

This email tracking makes use of email headers,

Google as a tool for hackers : Hidden Googling tricks

Google Search Engine is very popular among hackers. For them Google is not only a search engine but also an effective harvesting tool. Using Google on can view your security camera, the files storing user login details, find vulnerable website, login pages,etc.
Even Google can be used to browser blocked websites.
See How in following video.

Tuesday, 24 June 2014

Nmap for fining open ports and OS of remote PC

The way to find out system information of any remote computer using vary popular tool "Nmap".



The result of scan may include following details depending on options you set in nmap

  1. IP Address and MAC
  2. Open and filtered ports
  3. Services and its version
  4. OS and Architecture
  5. System Name
First you need to download and install nmap in your computer.



Monday, 23 June 2014

Folder lock using cmd

Easy way to lock any folder in windows using command prompt.

COMMAND:
to lock:
cacls secret /p everyone:n

to unlock:
cacls secret /p everyone:f

Friday, 20 June 2014

Ways to Hide Drives in Windows

Hiding drives form my computer using registry editing.

  1. Open Registry Editor ( Run - > regdit )
  2. Now Browse the following entry from the left side panel. {HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer}
  3. Now check the ride side panel after selecting Explorer. The NoDrives key most likely does not exist by default, so you’ll need to create it with   ( right-click - > New 32-bit DWORD ) and name it NoDrives.
  4. The value is obtained by arranging drive letters A to H in reverse order, with 1 for hiding that drive and 0 for unhidden. 
  5. Set the value by converting the Binary to Decimal or Hex.


For example, if we wanted to hide drives D and F we would arrange it like this:

       F  E  D  C  B  A
       1  0  1  0  0  0
So, 101000 will hide drives D and F

You can also refer this table.
Drive       Decimal         Hex
A              1            1
B              2            2
C              4            4
D              8            8
E              16          10
F              32          20
G              64          40
H              128         80

To hide multiple drives add its corresponding values(here 8+20=28 in hex)

Monday, 16 June 2014

Free Mobile location tracking service by Samsung

Samsung is providing free mobile tracking service to its customers

If you own a Samsung smartphone, you can track the location of your phone on Samsung Website.

Enabling Samsung Mobile location Tracking Service:
1. Add Samsung account on your phone.
2. Enable location tracking options on your phone from settings.

Tracking your mobile:
1. Visit Find My Mobile- Samsung
2. Login with the same samsung account you added on your phone.
3. Under registered Device, you will find your mobile number and model after login.
4. Click on Locate my device Button, it will turn on your phone GPS and locate your mobile on map.


List of free and open source tools for Information security practices

Here is the huge list of tool for information security that are freely available and open source.


Open Source/Free Tools:
  1. OllyDbg - Reverse Engineering
  2. Ntop - Network Probing
  3. MBSA - Vulnerability assessment
  4. OSSIM - Complete InfoSec Product
  5. Medusa - Password Cracking
  6. OpenSSL - SSL and TLS
  7. fgdump/pwdump - Password Cracking
  8. Tor - Proxy
  9. OpenVPN - VPN
  10. SET - Social Engineering
  11. Yersinia - Protocoal attack
  12. sslstrip - HTTP/HTTPS convert
  13. EtherApe - Network activity

Sunday, 15 June 2014

Online mobile location tracking

Tracking location of your mobile

Enable location tracking in your mobile
1. Download and Install Copy 10 application on your mobile from here

2. Sign Up at Copy 10

3. Now login inside Copy 10 in your mobile

4. Reboot your mobile and hide the copy 10 app.

Locate your mobile
1.  Login to website www.copy10.com

2. Now click on "Sync Now" button from GPS History