Wednesday 28 August 2013

Ethical Hacking

Virtualization

Sunday 4 August 2013

WHY CAPTCHA???

Many of us many times visited many web pages filled many web forms in the Websites filled many CAPTCHA challenges but do you know why CAPTCHA ?
Okay , lets know it

What is CAPTCHA?

CAPTCHA, an acronym that stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart. They're also known as a type of Human Interaction Proof (HIP).
CAPTCHA is used to make sure that the entity filling out a form, commenting on a blog, or registering for a website is an actual person instead of a bot trying to spam the site.
clip_image002

Types of CAPTCHAs

1. The Standard Distorted Word CAPTCHA with an Audio Option
clip_image004
This comes from the most popular CAPTCHA company out there, ReCAPTCHA.  It is reliable, but some of the distorted word images are rather hard to solve.  To get past that it allows you the option to “reCAPTCHA,” in order to receive a new one.  There is also an audio option if you are unable to visually make out the word.
2. Picture Identification CAPTCHA
clip_image006
This CAPTCHA by Picatcha provides the user with an elementary choice of choosing the correct image that they are asked to identify.  They never get harder than basic images so you won’t have to worry too much about your users not being able to depict the difference between them and the incorrect images.
3. Math Solving CAPTCHA
clip_image008
If your users can’t solve these basic math problems then maybe you don’t want them commenting on your threads anyways.  These provide you with easy to read numbers that must be added in order to get past the CAPTCHA.
4. 3D CAPTCHA
clip_image010
This one may  be one of the more difficult ones to solve, but it is sure to keep out robotic predators.  There are several types of three dimensional CAPTCHAs including both images and words.  They call it the “super-CAPTCA.”
5. Ad-Injected CAPTCHA
clip_image011
If your users are spending a few seconds everyday on CAPTCHAs why not earn some extra cash for your website?  This may seem iffy for the brand as they are associating themselves with a rather annoying process, but it does make sense in terms of brand recognition.  This particular example is of the main company providing this known as Solve Media.  Publishers get paid on a 60/40 split with Solve Media (Solve Media taking 60%) on a per solve/impression basis.

Applications of CAPTCHAs

CAPTCHAs have several applications for practical security, including (but not limited to):
· Preventing Comment Spam in Blogs. Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost!
· Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated scripts.
· Protecting Email Addresses From Scrapers. Spammers crawl the Web in search of email addresses posted in clear text. CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address.
· Online Polls. In November 1999, http://www.slashdot.org released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote.
· Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. This is better than the classic approach of locking an account after a sequence of unsuccessful logins, since doing so allows an attacker to lock accounts at will.
· Search Engine Bots. It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed.
· Worms and Spam. CAPTCHAs also offer a plausible solution against email worms and spam: "I will only accept an email if I know there is a human behind the other computer." A few companies are already marketing this idea.
references
-http://www.findexamples.com
Many of us many times visited many web pages filled many web forms in the Websites filled many CAPTCHA challenges but do you know why CAPTCHA ?
Okay , lets know it

What is CAPTCHA?

CAPTCHA, an acronym that stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart. They're also known as a type of Human Interaction Proof (HIP).
CAPTCHA is used to make sure that the entity filling out a form, commenting on a blog, or registering for a website is an actual person instead of a bot trying to spam the site.

clip_image002[4]

Types of CAPTCHAs

1. The Standard Distorted Word CAPTCHA with an Audio Option
clip_image004[4]
This comes from the most popular CAPTCHA company out there, ReCAPTCHA.  It is reliable, but some of the distorted word images are rather hard to solve.  To get past that it allows you the option to “reCAPTCHA,” in order to receive a new one.  There is also an audio option if you are unable to visually make out the word.
2. Picture Identification CAPTCHA
clip_image006[4]
This CAPTCHA by Picatcha provides the user with an elementary choice of choosing the correct image that they are asked to identify.  They never get harder than basic images so you won’t have to worry too much about your users not being able to depict the difference between them and the incorrect images.
3. Math Solving CAPTCHA
clip_image008[4]
If your users can’t solve these basic math problems then maybe you don’t want them commenting on your threads anyways.  These provide you with easy to read numbers that must be added in order to get past the CAPTCHA.
4. 3D CAPTCHA
clip_image010[4]
This one may  be one of the more difficult ones to solve, but it is sure to keep out robotic predators.  There are several types of three dimensional CAPTCHAs including both images and words.  They call it the “super-CAPTCA.”
5. Ad-Injected CAPTCHA
clip_image011[4]
If your users are spending a few seconds everyday on CAPTCHAs why not earn some extra cash for your website?  This may seem iffy for the brand as they are associating themselves with a rather annoying process, but it does make sense in terms of brand recognition.  This particular example is of the main company providing this known as Solve Media.  Publishers get paid on a 60/40 split with Solve Media (Solve Media taking 60%) on a per solve/impression basis.

Applications of CAPTCHAs

CAPTCHAs have several applications for practical security, including (but not limited to):
· Preventing Comment Spam in Blogs. Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost!
· Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated scripts.
· Protecting Email Addresses From Scrapers. Spammers crawl the Web in search of email addresses posted in clear text. CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address.
· Online Polls. In November 1999, http://www.slashdot.org released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote.
· Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. This is better than the classic approach of locking an account after a sequence of unsuccessful logins, since doing so allows an attacker to lock accounts at will.
· Search Engine Bots. It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed.
· Worms and Spam. CAPTCHAs also offer a plausible solution against email worms and spam: "I will only accept an email if I know there is a human behind the other computer." A few companies are already marketing this idea.
references
-http://www.findexamples.com
-http://www.CAPTCHA.net/
-http://c2.com/cgi/wiki?CAPTCHATest
-http://www.howstuffworks.com
-http://en.wikipedia.org/wiki/CAPTCHA
-http://www.CAPTCHA.net/
-http://c2.com/cgi/wiki?CAPTCHATest
-http://www.howstuffworks.com
-http://en.wikipedia.org/wiki/CAPTCHA

Ethical hacking

Contents:

1. What is hacking?

2. What is Ethical hacking?

3. History of Hacking

4. Types of hackers

5. Hacking methods

6. What do Ethical hackers do?

7. Ethical hacking process

8. The pros of ethical hacking

9. The cons of ethical hacking

1. What is hacking?

The simple definition of hacking is the unconventional way of using system which we are not supposed to use. It means hacking is to expand the capabilities of any electronic device to use them beyond the original intentions of the manufacturer.

clip_image001 The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

2. What is ethical hacking?

The work of ethical hacking is still considered hacking because it uses knowledge of computer systems in an attempt to in some way penetrate them or crash them. This work is ethical because it is performed to increase the safety of the computer systems.

3. History of hacking

As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it.

During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. John Draper, built a blue box that could do this and the Esquire magazine published an article on how to build them. Fascinated by this discovery, two kids, Steve Wozniak and Steve Jobs, decided to sell these blue boxes, starting a business friendship which resulted in the founding of Apple.
By the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems (BBS) appeared. BBS are like the yahoo groups of today, were people posted messages of any kind of topics. The BBS used by hackers specialized in tips on how to break into computers, how to use stolen credit card numbers and share stolen computer passwords.

During the 1990's, when the use of the internet widespread around the world, hackers multiplied, but it wasn't until the end of the decade that system's security became mainstream among the public.

Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques we need to follow to combat them.

4. Types of hackers

clip_image003White hat hackers:

Also referred as Ethical Hacker or sometimes called as Sneakers. A White Hat Hacker mainly focuses on securing corporate Network from outsider threat. They are with good intention who fight against Black Hat.

clip_image005Black hat hackers:

Also referred as Cracker. A Black Hat Hacker's intention is to break into others Network, and wish to secure his own machine. They often uses different techniques for breaking into systems which can involve advanced programming skills and social engineering.

clip_image007Grey hat hackers:

They are Skilled Hacker who sometimes act legally and sometime not. In simple word you may call a Grey Hat hacker as Hybrid between White Hat and Black Hat hacker

5. Hacking methods

Phishing Method

Phishing is the method that you are familiar with. You create a Fake Account and ID in yahoo and fool your friends by telling them to send the victim's ID, their own ID and their own Password in your Fake Yahoo Account.

Brute Force Hack

Brute Force Hack is a Hacking which takes much time to get Password of the Victim and it needs a Hacker to learn about Java Scripts and all the non-sense.

Fake Login Hack

Fake Login Hack is the Hacking used by most of you for your goal by creating a Fake Login Page and telling your friends to login there and the Password would come to you. Cookie Steal Hack- Cookie Steal Hack is somewhat similar to Fake Login Hack as you prepare a Cookie Stealer and tell your friends to open your Cookie so that his Password would come to you.

Web Mail Hack

Web Mail Hack is the toughest method to learn for Hacking as it also needs a Hacker to learn about Java Scripts, Computer Tricks and much more and there is also a software for this type of hack.

6. What do ethical hackers do?

An ethical hacker's evaluation of a system's security seeks answers to three basic questions:

· What can an intruder see on the target systems?

· What can an intruder do with that information?

· Does anyone at the target notice the intruder's attempts or successes?

While the first and second of these are clearly important, the third is even more important: If the owners or operators of the target systems do not notice when someone is trying to break in, the intruders can, and will, spend weeks or months trying and will usually eventually succeed.

7. Ethical hacking process

Ethical hacking process involves as follows

ü Preparation.

ü Foot printing.

ü Enumeration and fingerprinting.

ü Identification of vulnerabilities.

ü Attack-exploit the vulnerabilities.

8. The pros of ethical hacking

1. It enables you to find out the problem: Ethical hacking enables you to get beyond the numbers. By this I mean, you can truly figure out what is going wrong, if at all. Are there any breaches in your network? Can a hacker get through them? Which breach is the one that should be seen to and rectified first. Ethical hacking, if done correctly can answer all these questions and more.

2. Helps you build up a risk management program: Ethical hacking is becoming popular because it can help people to set up a proper and informative risk management program. Once you or your company conducts such tests you can make more informed decisions about what changes you need to make in technology. You need to think of ethical hacking in terms of it being a security tool. Test the most crucial systems first such as database or email servers etc.

3. Helps you to think like the enemy: This is probably one of the biggest advantages ethical hacking has to offer. It helps you to think and try and figure out.

9. The cons of ethical hacking

1. It provides only a snapshot of what is happening: This is one of the biggest disadvantages that ethical hacking has. Ethical hacking provides only a snapshot of your company’s security. You may hire a hacker to find out potential threats, but at the end of the day, you are not really safe from these threats. Yes, the hacker may tell you that the security you have in place will ward off new threats. However, no one can predict what these threats might be.

2. Losing data: There is always the chance of data being lost and servers crashing while hacking is being carried out. Anything can go wrong during hacking and you should be prepared for any eventuality. A system that is unstable or overloaded might crash while the testing is being carried out.

3. Being given a false sense of security: This is closely linked to the snapshot you get after ethical hacking is carried out. You may have the best hackers but they might just overlook a critical point. A rogue hacker will then definitely be able to get in and breach the system.

Conclusion

ü Testing is an essential part of any data security program.

ü An ethical hack can reduce the potential exposure of the company to criminal hackers.

ü “It takes a Thief to Catch a Thief”.

ü The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.

Reference:

Wisegeek.com

Whatisthehacking.com

Wikipedia.com

Wednesday 2 January 2013

who is a ethical hacker?

An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known aspenetration testingintrusion testing and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.

simple definition of HACKING...

Hacking it is unconventional way
of interacting with system which
we are not supposed to do.

OPEN SOURCE


OPEN SOURCE

                                Open source it is a simple word which mean a lot to software programmers and developers. Open source software is computer software that is freely available with source code to the general public with relaxed or non-existent copy right restrictions. It is often developed in a public collaborative manner. Users have the access over the source code so that they can fine tune, report bugs, distribute it, submit additions to software, code fixes for the software. It is an explicit feature of open source that it may put no restrictions on the use or distribution by any organization or user.

HISTORY OF OPEN SOURCE SOFTWARE

                                Although all stories related to software are obviously short, that of open source is one of longest among them. In fact it could be said that in the beginning, there was only free software. Later on, proprietary software was born, and it quickly dominated. Recently free software is considered as an option again. In 1960 when IBM sold large scale commercial computers some software was free and later the situation changed after unbundling IBM software and in mid 1970ss it was usual to find proprietary software. In late 1970s and early 1980s, two different groups were establishing the roots of current open source software movement. On the US east coast Richard stall man programmer at MIT AI LAB resigned and started GNU project and free software foundation the ultimate goal was to build free operating system. On the philosophical side Richard stall man wrote GNU manifesto, stating that availability of code and freedom to redistribute and modify are fundamental righta. And similarly open BSD on US west. During 1980s and 1990s open source software continued it development initially in severally relatively isolated groups.

OPEN SOURCE LICENCE

                                A license defines the rights and obligations that a licensor grants to licensee. Open source licenses grant licensees to copy modify and redistribute source code. The ownership of copyright  is separate and distinct from  the ownership of the work, a person can own a copy of a piece of code without the rights to copy modify or redistribute copies of it. Some examples open source software licences include Apache license, BSD license, GNU general public license, GNU lesser general license, MIT license, Eclipse public license and Mozilla public license. The proliferation of open source licenses is one of the few negative aspects of open source movement because it is often difficult to understand the legal implications of licenses with more than 180,000 open source projects available and its more than 1400 unique licenses and how to organize open source  software in commercial way.

PROPRIETARY SOFTWARE AND OPEN SOURCE SOFTWARE

                                Free or open source software and closed source are two approaches to the distribution of software. Closed source software is also proprietary software, it comes with restrictive copyright licenses, code is not released to the public. Proprietary software is maintained by a team who produces their product in a compiled executable state, which is what the market is allowed access to. The free open source model allows for able users to view modify a product’s source code. The top four reasons individuals or organizations choose opens source software are 1.lower cost, 2.security, 3.no vendor lock in and 4.better quality. Since innovative companies no longer rely heavily on software sales, proprietary software has become less of a necessity. As such things like open source.

 0PEN SOURCE SOFTWARE FREE SOURCE SOFTWARE

                                Open source software and free software are different terms for software which comes with certain rights, or freedoms, for the user. They describe two approaches and philosophies towards free software. Open source software and free source software both describe software which is free from licensing restrictions. The definition of open source software and free source software was written to be almost identical to the free software definition. There are few cases of software that is free software but not open source software and vice versa.

BENEFITS OF OPEN SOURCE SOFTWARE

                                Usually the first perceived advantage of open source is fact that open source software is  made available at low cost or free. Now let us see how do characteristics turn into advantages:  The availability of source code and right to modify, it enables unlimited fine tuning and improvement. It is also possible to port code to new hardware, to adapt it to changing conditions, and to reach detailed understanding of how system works. Source code availability makes it much easier to isolate bugs and for a programmer to fix them. The right to redistribute modifications and improvements to code permits all advantages due to modifiability of software to be shared by large communities , in substance the fact that redistribution rights cannot be revoked, and they are universal, is what attracts a substantial crowd of developers to work around open source projects. There is no one to restrict in a unilateral way how software is used. There is always possibility of creating an alternative code base if the current one is some way perceived or wrongly managed. Because of such benefits open source has become so powerful.

DRAWBACKS OF OPEN SOURCE SOFTWARE

                                The disadvantages of open source software include that these are not reliable, due to the fact that there is little money put into development, anyone can view, edit and redistribute. There is often no qualified support available the only support if any is usually via forums. Another drawback is the open source applications are in compatible with present day gadgets. No guarantee of updates since we are not paying to open source no body are bound to give updates. Apart fro tese the open source software was so useful.

SUCESSFUL STORIES

                                There are wide range of projects and organizations in open source. Some of more prominent organizations involved in open source software development include Apache software foundation creators of apache web server; Linux foundation a non profit which as of 2012 employed Linus Torvalds, the creator of Linux operating system kernel; the eclipse foundation, home of eclipse software development platform; Debian project creators of influential Debian  Linux distribution; the Mozilla foundation, home of fire fox web browser; Android integrated mobile operating system. Several open source programs have become defining entries in their space including GIMP image editing system; Sun’s java programming language and environment; the MySQL database system; Sun’s openoffice.org office productivity suite; Wireshark  network packet sniffer and analyser and many  more projects and companies are emerging day by day.