Monday, July 28, 2014

Social Security Awareness : How are you possibly get hacked?

YOU ARE BEING HACKED!



So? What up viewers? I am Budhaditya here again with some discussion about social security awareness. Today I will discuss about how newbie and less experienced internet users, or even the experienced ones, get "Hacked" . You guys are important to me, So I felt to write some lines about how can you possibly protect yourself from loosing your personal information, your Bank accounts, your Facebook, Gmail, Twitter accounts. And how you are possibly get trapped.

So lets start about newbies a bit. :- When someone gets internet first, everything comes with the white RJ45 Cable or the wifi tower is the universe. That writing on a white page called G O O G L E is everything you ever wanted. Now before getting internet connection, every one has a a mega list about how and what to download. And Whenever you get the connection, its like "what the hell I thought about?" Any ways. Lets say the first you write is "google chrome free download" And as soon as you hit the enter button, you are listed with a big number of links to download it. For the truth let me say, the first 5 links may have nothing harmful, because they are most probably hosted by very legitimate websites. Now after 5 or 6 links? you may get stuff like : "Ultra Speed Google Chrome Available for Free download, /or a crossed 30$ as free, available for download for today only. 100% discount" You hopefully go for that, download a 456 KB, or even 15 or 100 MB of file instead of just 26 MB, double click it, May a google chrome installer really opens OR the file just vanishes from the desktop? You know you are dead man. Now you see a series of hangs and crashes, Your friends tell that its a virus and you have to format? you do it and never download chrome from that link, or go for modded Chromes again. What you gained here is a little bit of experience. Now what was that? This is called "SOCIAL ENGINEERING" The uploader knew that newbies like you will open it. Now what has the Hacker got and what can he do with it. 1st of all, He will make a permanent connection to your Computer, so no matter what, He gets a connection commenced automatically when you start your PC. In this case he will make his virus run at start up. Now as he is secured of his connection, he will try to make sure that you are not trying or installing any security measure to detect whats wrong with Victim's PC. Now he is kind of an owner of your PC. He can make guest account enable, grab or change your OS Login passwords, Make a new account for himself, Transfer files, Steal every single data you have in your PC. And the most important is, he can even use your computer to hack other big things, so he is not in the process directly. So the security would have a hard time finding him. This activity is called "PIVOTING" . He can also use it for "DDoS" i.e "Distributed Denial of Service" attacks. So you guys got a Hint right? about what these people can do?

Lets state some examples now to demonstrate how you are trapped every time.

Suppose, for the most common one, you simply type on google, "abcd.mp3 free download" you will find many links as well. Any links will have many fake download buttons now a days. One will be genuine or even not one. You will/or already have seen, that, when you click the "Download Now" button, They redirect you to a page where you have to download a downloader first to download the song. Who knows if that page doesn't have a Virus? Also, these adverts may have browser hacks, which will lead all of your browser data to be stolen by Hacker.

Again,  you see a video on Facebook stating, "The cancer you may already have", you click the link, either you are being re directed to a downloader, or an advert, or a "fake facebook page" (Talking about this later), wanting you to log in. And the most common, as soon as you open that video, you will see a confirmation box for saving the video file. Majority of the users will download the file, and Boom. you are down. Actually what happens is, majority of people have "show file extensions" feature turned off, so if you see the video as ABCD.mp4 ? its actual form is ABCD.mp4.exe that mp4 is just a decoy. So I prefer not to even go to that page which states "The cancer you may already have" until shared by a science alert or a medical page.

Phishing - One of the oldest techniques and the most foolish techniques. I am here to aware you how can you avoid this simple foolishness just by staying aware. Either your friend will send you a link like - 223.223.xxx.xxx and say new facebook for 2015 Theme preview. You went there, logged in, Kaboom. your username and password is in Hacker's hand. More professional and efficient hackers can even make a domain to hack you. They may send you an email from and like - security.facebook.com - your password is way too vulnerable, So we advice you to change your password now. you went there, entered login credentials, Kaboom. In this case, I advice you to give wrong information first in the suspicious link. because the phishing page have nothing to do with your right or wrong info. If the page goes back to the same login section, or displays "Page not available", then you will know thats a phishing page. If it states wrong username/password. Then you are sure its a real page.

Another big and the most popular Hacking mechanism is Pirated GAMES and SOFTWARES. Saying as me myself a gamer, I may trust big Game uploaders, But there are uploaders too who inject backdoors into the exe file of a Game or a software. This is a kind of illusion, where gamers are bound to execute the Virus. And Kaboom.

Self Defense : I always prefer to have an original copy of Internet security software like Kaspersky, Quickheal to detect viruses. Though advanced Backdoor Mechanisms will simply bypass the Security. In this context I will advice you to install Firewalls. I will advice everyone here to study about ports and what services they normally Run. When you scan yourself, Any Suspicious port you see open? TERMINATE. When a virus gets executed, it opens a doorway ie. port for hackers to come in. I will also advice to install a very efficient free tool called Malwarebytes Anti malware, which is actually very capable of catching malwares and viruses which Anti Viruses can't detect. Bitcoin Miner is one example of Malwarebytes detection.

So these are some easy steps for anyone who sits on computers and want to be free when surfing the internet. I felt to post this because, Being a Computer geek, sitting all day long, Loving her like hell, I still don't trust her. So I thought of this Awareness post.....

Thank you for bearing with me and reading this. Highly Obliged.

 THANK YOU

Tuesday, July 22, 2014

Recording sounds of off The Internet, Computer, anywhere with Windows Default Sound Recorder.....

Hi People :D .There are lots of software available on the Internet to record sound of off the Internet, Computer, and anywhere coming out of the computer speakers without holding a mobile phone in front of speakers :D LoLxD . But why download them, see tutorials, use options when there are easy steps just in your computer by default? So lets cut to the point. There is a little tweak we have to do in the sound recording devices available in Windows as default. I have made screen shots in Which I described it all. Here it goes.

:-





  This is how, the simplest in-computer sound recording can be done.

Request of this was made my bro Arya.

THANK YOU


Wednesday, July 9, 2014

What an MiTM attack actually is? - Detailed


MiTM is an Synonym for Man in The Middle. This a Hacking technology for a long time network flaw which still now haven't been patched up. This is a technology, where the Hacker poisons the whole network for grabbing usernames and passwords for any Login Form sites, Injects malicious code, Does phishing.etc. So you can see that This is a very powerful attack where may be even passwords of a social networking site to bank account passwords or very hi-level intelligence information can be gained. 'Please Note', that in this Information of today, I will not be explaining any guide on doing an MiTM attack. This is just a knowledgeable post about what MiTM actually is.

Okay, We will first illustrate this in real world hacking. Let us assume that we have 3 persons. A, B and C. A is a very rich man, or your enemy :p , B is a Life insurance agent, or a Bank agent who carries a lot of A's money. And C, thats you, is trying to ROB important documents and money of A. Now lets assume you have already done trying with Robbing his house, But A's Security is very high, The guards kick you out as soon you went infront of the house. Now what? Think what you dressed up and disguise yourself exactly like A, go in, take the documents, Bank A/C and stuff, come in, make a Xerox of everything, Then Disguise as A and go to B and say that I am A came today to give you a documents. So You acted here as Man In the middle. You poisoned both of them with an illusion that all things are right, and you managed to steal his documents.

The exact same thing happens to computers in a Network. Let me first demonstrate what is an ARP or Address Resolution Protocol, what is an IP address and What is a MAC address. An Internet Protocol Address. IP is a logical address of your Digital Device which is connected to the internet. Any thing digitally connected to the internet has an unique IP address. This Protocol is the main purpose of packet delivery through internet to another computer connected to the internet any where in the world. MAC address is the synonym for Media Access Control. It is the physical existence or address of a connected terminal. This address is unique to every device which is hard coded into the hardware device. In this case, its a Network Interface Card - NIC, which lies in the motherboard, or can externally be placed. Ex - A netgear Ethernet card. Now What is ARP? ARP converts a logical IP to a Physical MAC address to transmit data in a TCP/IP system. For Example When I send a DOC to be printed in a network, This happens. My terminal sends a broadcast message like this " Who is IP xxx.xxx.xxx.201? Then Every terminal ignores but the Printer replies with Hey Server? I am the IP address with xxx.xxx.xxx.201. Then again the Server sends a Reverse ARP request asking is Who have the MAC Address with XX:XX:XX:XX:A2? Then Again the printer says, This is my MAC address. After all these confirmations, The signal is finally send to the printer to print the document. This is how ARP works. There is a diagram of the above said words.

Typical Topography of an ARP
Now I will show How this ARP is poisoned to grab Login informations of off a network.

For example, When you login into www.facebook.com, or mail.google.com or www.mylocalbank.com, You login into a GET login form which is sent from the Domain Server, then by many means, it comes to your router, and then your switch/gateway, and finally to you. When you give your username and password, and hit 'ENTER' , Then the POST form goes to the route, then to the Domain Server by many means again. Now As that Top example like Mr A, B, and C, Lets say A is the User, B is Facebook, and C is the attacker. What C does, is it poisons the ARP so that A that is user's terminal thinks that C the hacker is router B. And Router B thinks that C hacker is user A. So when A logs into Facebook, or any login forms, First, the packets are all transferred to C hacker, and the hacker interprets, and analyzes every data in clear text form, and resends the packets to the router again so that the original connection doesn't fail. Thus An attacker can gain all the informations and passwords of off a network. This is what a Man in The Middle attack is all about. Diagram bellow v
A Successful MiTM attack
  I am still researching about this Attack and the protocol. So I don't know much myself. Just felt to Share what I know.

Dedicated to a Bro of mine - Arya Sengupta.

THANK YOU.