Jul 30, 2009

All abt Phishing attack ...

   Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.Recent phishing attempts have targeted the customers of banks and online payment services.Social networking sites such as Orkut are also a target of phishing.Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack.In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.TECHNIQUES BEHIND PHISHING ATTACK1.Link ManipulationMost methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL -  www.micosoft.comwww.mircosoft.comwww.verify-microsoft. coming instead of http://www.microsoft.com/2. Filter EvasionPhishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails.This is the reason Gmail or Yahoo will disable the images by default for incoming mails.How does a phishing attack/scam look like?As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows.They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.How to identify a fraudulent e-mail?Here are a few phrases to look for if you think an e-mail message is a phishing scam.“Verify your account.”Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.“If you don’t respond within 48 hours, your account will be closed.”These messages convey a sense of urgency so that you’ll respond immediately without thinking.“Dear Valued Customer.”Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.“Click the link below to gain access to your account.”HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.

   So the Bottom line to defend from phishing attack is -
1.   Never assume that an email is valid based on the sender’s email address.
2.  A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.  An email from trusted organization will never contain any software.

10 Reasons why Web-Sites get hacked ...

1. Cross site scripting (XSS)
The problem: The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks.Attacks are usually executed with JavaScript, letting hackers manipulate any aspect of a page. In a worst-case scenario, a hacker could steal information and impersonate a user on a bank’s Web site.Real-world example: PayPal was targeted last year when attackers redirected PayPal visitors to a page warning users their accounts had been compromised. Victims were redirected to a phishing site and prompted to enter PayPal login information, Social Security numbers and credit card details.How to protect users: Use a whitelist to validate all incoming data, which rejects any data that’s not specified on the whitelist as being good. This approach is the opposite of blacklisting, which rejects only inputs known to be bad. Additionally, use appropriate encoding of all output data. Validation allows the detection of attacks, and encoding prevents any successful script injection from running in the browser.
2. Injection flaws
The problem: When user-supplied data is sent to interpreters as part of a command or query, hackers trick the interpreter which interprets text-based commands into executing unintended commands. Injection flaws allow attackers to create, read, update, or delete any arbitrary data available to the application. In the worst-case scenario, these flaws allow an attacker to completely compromise the application and the underlying systems, even bypassing deeply nested firewalled environments.Real-world example: Russian hackers broke into a Rhode Island government Web site to steal credit card data in January 2006. Hackers claimed the SQL injection attack stole 53,000 credit card numbers, while the hosting service provider claims it was only 4,113.How to protect users: Avoid using interpreters if possible. If you must invoke an interpreter, the key method to avoid injections is the use of safe APIs, such as strongly typed parameterized queries and object relational mapping libraries.
3. Malicious file execution
The problem: Hackers can perform remote code execution, remote installation of rootkits, or completely compromise a system. Any type of Web application is vulnerable if it accepts filenames or files from users. The vulnerability may be most common with PHP, a widely used scripting language for Web development.Real-world example: A teenage programmer discovered in 2002 that Guess.com was vulnerable to attacks that could steal more than 200,000 customer records from the Guess database, including names, credit card numbers and expiration dates. Guess agreed to upgrade its information security the next year after being investigated by the Federal Trade Commission.How to protect users: Don’t use input supplied by users in any filename for server based resources, such as images and script inclusions. Set firewall rules to prevent new connections to external Web sites and internal systems.
4. Insecure direct object reference
The problem: Attackers manipulate direct object references to gain unauthorized access to other objects. It happens when URLs or form parameters contain references to objects such as files, directories, database records or keys.Banking Web sites commonly use a customer account number as the primary key, and may expose account numbers in the Web interface.References to database keys are frequently exposed. An attacker can attack these parameters simply by guessing or searching for another valid key. Often, these are sequential in nature.Real-world example: An Australian Taxation Office site was hacked in 2000 by a user who changed a tax ID present in a URL to access details on 17,000 companies. The hacker e-mailed the 17,000 businesses to notify them of the security breach.How to protect users: Use an index, indirect reference map or another indirect method to avoid exposure of direct object references. If you can’t avoid direct references, authorize Web site visitors before using them
5. Cross site request forgery
The problem : simple and devastating this attack takes control of victim’s browser when it is logged onto a Web site, and sends malicious requests to the Web application. Web sites are extremely vulnerable, partly because they tend to authorize requests based on session cookies or “remember me” functionality. Banks are potential targets.Ninety-nine percent of the applications on the Internet are susceptible to cross site request forgery.Real-world example: A hacker known as Samy gained more than a million “friends” on MySpace.com with a worm in late 2005, automatically including the message “Samy is my hero” in thousands of MySpace pages. The attack itself may not have been that harmful, but it was said to demonstrate the power of combining cross site scripting with cross site request forgery. Another example that came to light one year ago exposed a Google vulnerability allowing outside sites to change a Google user’s language preferences.How to protect users: Don’t rely on credentials or tokens automatically submitted by browsers. The only solution is to use a custom token that the browser will not ‘remember'.
6. Information leakage and improper error handling
The problem: Error messages that applications generate and display to users are useful to hackers when they violate privacy or unintentionally leak information about the program’s configuration and internal workings.Web applications will often leak information about their internal state through detailed or debug error messages. Often, this information can be leveraged to launch or even automate more powerful attacks.Real-world example: Information leakage goes well beyond error handling, applying also to breaches occurring when confidential data is left in plain sight. The ChoicePoint debacle in early 2005 thus falls somewhere in this category. The records of 163,000 consumers were compromised after criminals pretending to be legitimate ChoicePoint customers sought details about individuals listed in the company’s database of personal information. ChoicePoint subsequently limited its sales of information products containing sensitive data.How to protect users: Use a testing tool such as OWASP’S WebScarab Project to see what errors your application generates. Applications that have not been tested in this way will almost certainly generate unexpected error output.
7. Broken authentication and session management
The problem: User and administrative accounts can be hijacked when applications fail to protect credentials and session tokens from beginning to end. Watch out for privacy violations and the undermining of authorization and accountability controls.Flaws in the main authentication mechanism are not uncommon, but weaknesses are more often introduced through ancillary authentication functions such as logout, password management, timeout, remember me, secret question and account update .Real-world example: Microsoft had to eliminate a vulnerability in Hotmail that could have let malicious JavaScript programmers steal user passwords in 2002. Revealed by a networking products reseller, the flaw was vulnerable to e-mails containing Trojans that altered the Hotmail user interface, forcing users to repeatedly reenter their passwords and unwittingly send them to hackers.How to protect users: Communication and credential storage has to be secure. The SSL protocol for transmitting private documents should be the only option for authenticated parts of the application, and credentials should be stored in hashed or encrypted form.Another tip: get rid of custom cookies used for authentication or session management.
8. Insecure cryptographic storage
The problem: Many Web developers fail to encrypt sensitive data in storage, even though cryptography is a key part of most Web applications. Even when encryption is present, it’s often poorly designed, using inappropriate ciphers.These flaws can lead to disclosure of sensitive data and compliance violations.Real-world example: The TJX data breach that exposed 45.7 million credit and debit card numbers. A Canadian government investigation faulted TJX for failing to upgrade its data encryption system before it was targeted by electronic eavesdropping starting in July 2005.How to protect users: Don’t invent your own cryptographic algorithms. Only use approved public algorithms such as AES, RSA public key cryptography, and SHA-256 or better for hashing.Furthermore, generate keys offline, and never transmit private keys over insecure channels.
9. Insecure communications
The problem: Similar to No. 8, this is a failure to encrypt network traffic when it’s necessary to protect sensitive communications. Attackers can access unprotected conversations, including transmissions of credentials and sensitive information. For this reason, PCI standards require encryption of credit card information transmitted over the Internet.Real-world example: TJX again. Investigators believe hackers used a telescope-shaped antenna and laptop computer to steal data exchanged wirelessly between portable price-checking devices, cash registers and store computers, the Wall Street Journal reported.“The $17.4-billion retailer’s wireless network had less security than many people have on their home networks,” the Journal wrote. TJX was using the WEP encoding system, rather than the more robust WPA.How to protect users: Use SSL on any authenticated connection or during the transmission of sensitive data, such as user credentials, credit card details, health records and other private information. SSL or a similar encryption protocol should also be applied to client, partner, staff and administrative access to online systems. Use transport layer security or protocol level encryption to protect communications between parts of your infrastructure, such as Web servers and database systems.
10. Failure to restrict URL access
The problem: Some Web pages are supposed to be restricted to a small subset of privileged users, such as administrators. Yet often there’s no real protection of these pages, and hackers can find the URLs by making educated guesses.The attacks targeting this vulnerability are called forced browsing, which encompasses guessing links and brute force techniques to find unprotected pages.Real-world example: A hole on the Macworld Conference & Expo Web site this year let users get “Platinum” passes worth nearly $1,700 and special access to a Steve Jobs keynote speech, all for free. The flaw was code that evaluated privileges on the client but not on the server, letting people grab free passes via JavaScript on the browser, rather than the server.How to protect users: Don’t assume users will be unaware of hidden URLs. All URLs and business functions should be protected by an effective access control mechanism that verifies the user’s role and privileges. Make sure this is done … every step of the way, not just once towards the beginning of any multistage process.

Jul 29, 2009

Add the Links toolbar to My Computer ...

   You know what would make a great tool bar???  One where you could put your favourite applications and documents so that you could open them from any window at any time. Guess what? You can and here's how: click Start, then My Computer. Now right-click the tool bar and then click Links. You now have the Links tool bar on your windows, just like in Internet Explorer. Note: Make sure that "Lock the Tool bars" is not checked. Click on it to deselect it if it is.The really cool thing about the Links tool bar is that it's completely customizable. Try this : Navigate to your favourite application and drag and drop its icon to the Links tool bar. You just created a short cut  Do this again and again for as many applications as you want to appear on the tool bar.

Make your own icons ...

It's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.Now add type,color, or do whatever you'd like to your image. I like to shrink photos(headshots work best) to 32x32 and simply paste them into my Paintdocument. When you're finished, open the File menu and click Save As.Use the dialog box to choose where you want to save your file, thengive it a name followed by ".ico" (without the quotes), and click Save.(The extension ".ico" tells Windows that it's an icon file.) You justcreated an icon! Now you can change any shortcut or folder to your ownicon—just browse to it on your hard drive.Make your own iconsIt's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.Now add type,color, or do whatever you'd like to your image. I like to shrink photos(headshots work best) to 32x32 and simply paste them into my Paintdocument. When you're finished, open the File menu and click Save As.Use the dialog box to choose where you want to save your file, thengive it a name followed by ".ico" (without the quotes), and click Save.(The extension ".ico" tells Windows that it's an icon file.) You justcreated an icon! Now you can change any shortcut or folder to your ownicon—just browse to it on your hard drive.

Auto-close non-respondin applications while Shutingdown ...i

HKEY_USERS.DEFAULTControl PanelDesktopValue Name:
AutoEndTasks, Data
Type: REG_SZ (String Value), Value Data: (0 = disabled, 1 = enabled).Modify the value of 'AutoEndTasks' to equal '1' to automatically end tasks or '0' to prompt for action.
Note: This change will affect all users but the value can also bechanged on a user-by-user basis by modifying [HKEY_CURRENT_USERControlPanelDesktop] with the same values

Clone ur Hard Disk ...

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all you needed, was already set up on your current system? Well, it is, and if you follow this tutorial, you shouldn't have much of a problem.Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.If you receive an error message, then remove the space from between XCOPY and C:\Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master,then check your new Master out.

Detect ur invisible Frnds. in Yahoo Messenger...

There are several tricks available in the Internet to find the yahoo messenger friend’s original status. Here is the one more simple way to find the user’s real status.The following site will tell you the real status of the yahoo id in the messenger.You just need to give your friends id. Your yahoo userid is not required.
http://detectinvisible.com/
http://www.ydetector.com/
http://www.vizgin.com/
http://www.invisible-scanner.com/

Multiple Yahoo messenger ...

To open two or more instance for logging in to multiple accounts perform the following registry edit.
Copy the text below:
REGEDIT4[HKEY_CURRENT_USER\Software\yahoo\pager\Test]“Plural”=dword:00000001
Then paste it in NOTEPAD and save it in “reg” extension,Open the saved registry file
Now you will be able to open multiple yahoo messenger.

Jul 7, 2009

Funny trick ...

   Try this naughty trick on your friends PC. Close all the open applications. While you are on the Desktop,
press Print Sceen key. Open Paint and then paste the captured image. Save it as BMP, right - click on the
desktop and change the wallpaper to the newly saved image. Go to the "Web" tab of the Display propeties dialog and turn on Active Desktop. Make sure that the "Hide icons when desktop is viewed as Web-page" is turned on. From now on, your friend wont be clicking an application icon on the desktop, just a picture of it. See their face when this happens! :

Want to hide your secret document? ...

Use the following steps to make a protected
folder that cannot be accessed from the Windows Explorer: Open MS-DOS prompt,
type mkdir followed by a space, then hold ALT key and type 251. Then release
ALT. Now you can save there anything you want to hide. Windows Explorer cannot
display the content of this folder. You can use these numbers instead of 251:
158, 159, 169, 176 to 224, 226 to 229, 231 to 240, 242 to 245, 247, 249, 252,
254 and 255.
For me, only 176, 249, 251 and 254 worked. To access this folder from windows,
just rename it into a normal name. To do so, open MS-DOS, enter the directory,
where your folder is placed and type ren followed by a space, then hold alt and
type the number, that you used when you created your folder. Press space again
and then type the new name of your folder. Press enter.