Archive for 2014

IT Security Skills and Certification map





Friday, December 5, 2014

THE TOP ANDROID APPS FOR HACKING

1. SpoofApp:- SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.
2. Andosid:- The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.
3.Faceniff:- Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.
4.Nmapper:- (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmapper sends specially crafted packets to the target host and then analyses the responses.
5. Anti-Android Network Toolkit:- zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
6. SSHDroid:- SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).
7. WiFi Analyser:- Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
8. Network Discovery:- Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.
9. ConnectBot:- ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.
10. dSploit:-Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device.
11. Hackode:- The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.
12.Androrat:- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
13.APKInspector:- APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.
14.DroidBox:- DroidBox is developed to offer dynamic analysis of Android applications.
15.Burp Suite:- Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
16. Droid Sheep:- DroidSheep can be easily used by anybody who has an Android device and only the provider of the web service can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the web service.
17. AppUse:– Android Pentest Platform Unified Standalone Environment:- AppSec Labs recently developed the AppUse Virtual Machine. This system is a unique, free, platform for mobile application security testing in the android environment, and it includes unique custom-made tools created by AppSec Labs.
18. Shark for Root:- Traffic sniffer, works on 3G and WiFi (works on FroYo tethered mode too). To open dump use WireShark or similar software, for preview dump on phone use Shark Reader. Based on tcpdump.
19. Fing:- Find out which devices are connected to your Wi-Fi network, in just a few seconds.
Fast and accurate, Fing is a professional App for network analysis. A simple and intuitive interface helps you evaluate security levels, detect intruders and resolve network issues.
20.Drozer:- drozer enables you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps’ IPC endpoints and the underlying OS. drozer provides tools to help you use and share public Android exploits. It helps you to deploy a drozer agent by using weasel – MWR’s advanced exploitation payload.
21. WifiKill:- Second app, developed also by B.Ponury is an app which can kill connections and kick site-hoggers from the site. This app definitely kick then net user from the site so he cannot use it anymore. The app also offers the list of viewed sites by the hogger.
22. DroidSniff:- Similar to DroidSheep but with a newer and nicer interface is DroidSniff – sniffing app not only for Facebook. This app shows you what is the hogger looking for and then you can “take” his control, steal the cookies and rock’n’roll. Works perfectly.
23. Network Spoofer:- The last app, called NetWork Spoofer is very similar to dSploit but it’s more easier to use. Only hitch is that you need to have at least 500MB of free data. It offers you a lot of troll features – change Google searches, flip images, redirect websites, swap YouTube videos and others.
24. Droid SQLI:- allows you to test your MySQL based web application against SQL injection attacks. DroidSQLi supports the following injection techniques: Time based injection, blind injection, error based injection, normal injection.
25. sqlmapchik:- is a cross-platform sqlmap GUI for the extremely popular sqlmap tool

LEARN CYBER SECURITY FUNDAMENTALS (FREE COURSE)

SANS Cyber Aces Online makes available, free and online, selected courses from the professional development curriculum offered by The SANS Institute, the global leader in cyber security training. SANS goal in making these courses available as open courseware is to help grow the talent pool and accelerate the rate at which skilled cyber professionals can enter the information security industry – filling mission critical jobs currently going unfilled.
The open courses are the same as those offered to information security professionals around the world and are focused on the fundamentals of cyber security.
Our hope is that individuals, schools, teachers, businesses, and more will benefit from this offering and, ultimately, help strengthen the security of our nation.
For anyone with an interest in learning more about making online information more secure, this course teaches the core concepts needed to understand, assess, and protect information security systems.
view all their FREE tutorials here

HOW TO BECOME AN ETHICAL HACKER

AN ESSENTIAL GUIDE TO BECOMING AN ETHICAL HACKER

I often get a number of people ask for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker

Ethical hacker

  1. a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.
So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!.
You need essential prerequisite knowledge

If you want to get into the IT  security world as a white hat you must be competent in the following areas:
§  Networking
§  Programming
§  Databases

Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about hacking. So now you have a good understanding of the fundamentals of IT, you can now understand how to break some of the underlying vulnerabilities within computer architecture. The following activities should help you with this:

What areas to concentrate on in order to build a foundation
Networking – Cisco courses seem to be really good. I undertook all the CCNA courses available.

Programming – Focus on learning C++, Python/Ruby and PHP.
Databases – Play around with MySQL and MSSQL and make your own database to understand how it works.

Read books about hacking (Here are some good examples of some) -
§  Hacking: The Art of Exploitation, 2nd Edition
§  The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
§  Metasploit: The Penetration Tester’s Guide
§  BackTrack 5 Wireless Penetration Testing Beginner’s Guide
§  CEH Certified Ethical Hacker All-in-One Exam Guide
§  Google Hacking for Penetration Testers
§  The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws

Undertake various online courses
§  CEH
§  OSCP
§  CISSP

Communicate and follow other fellow IT security enthusiasts through the following mediums
§  Facebook (https://www.facebook.com/selvasharing )
§  Google+
§  Twitter

Self learn by reading and watching online tutorials
§  www.securitytube.net
§  youtube.com

Download practice environments to practice and hone newly learned skills
§  DVWA (Dam Vulnerable Web Application)
§  Metasploitable
§  Samurai WTF

10 Free Hacking Tools

1. Nmap Security Scanner
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts areRead more...

2. Tor:anonymity online
Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Read more...

3. Net
Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.Read more...


4. sol Editer
A flash hacking alternative to variable editing and cheat engine, you can change values saved by the game in a “.sol” file. You will find the .SOL files in x:\Documents and Settings\[account-name]\Application Data\Macromedia\Flash Player\#SharedObjects\ followed by the name of the website. If the game was running from your computer, the .SOL will be in the “localhost” folder. Replace ‘x’ with your main drive, the one with your OS, and the account-name with the currently logged in user.Download...

5. Cain & Abel 
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any softwareRead more...


6. Wireshark
Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on diskRead more...


7. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).Read more...

8. DollarDNS Whois
DollarDNS Whois Direct allows users to make advanced WHOIS queries against a domain, including raw queries Read more...





9. Firebug
Firebug integrates with Firefox to put a wealth of web development tools at your fingertips while you browse. You can edit, debug, and monitor CSS, HTML, JavaScript, and network activity live in any web page.Download...



10. Tamper Data
Use tamperdata to view and modify HTTP/HTTPS headers and post parameters... Download...





11. Add N Edit Cookies
Cookie Editor that allows you add and edit "session" and saved...Download..

Saturday, November 22, 2014

Top 9 Firewall Devices

There are some malicious people in this world that gain enjoyment or financial benefit from harming other people's computers or by stealing their personal information. One way to protect against this is to place a firewall between the computer and the connection to the Internet. A firewall is a great security feature for computer networks, as well as for individual computers. Having the right firewall in place keeps a computer safe from hackers, as well as prying eyes.

1Dell SonicWall TZ 215 Firewall Device
The SonicWall appliance is made by Dell Computers. It features what they call a UTM or "Unified Threat Management" firewall that aids in delivering effective protection against malware and intrusions, providing superior content or URL filtering. It performs comprehensive deep packet inspection that doesn't diminish network performance at all. It ensures that there is alwaysavailable bandwidth when needed. The company boasts that the TZ 215 is the only UTM firewall that is available on the market that provides a native SSL VPN remote access client for all iOS, Android, Windows, Mac OS, and Linux operating systems.

Specifications

* Interface: 7 GbE, 1 Console Interface, 2 USB
* Throughput: 110 Mbps
* VPN: PPPoE
2Fortinet FortiWifi 40C
This is very ideal for small businesses and retail stores, offering many of the security functions that the larger firewall devices have, but is condensed into a smaller package at a lower price than some of the bigger devices cost. It is enterprise grade security at entry level pricing.

Specifications

* Interface: 2 x 10/100/1000 WAN port, 5 x 10/100/1000 switch port
* Throughput: 60 Mbps
* VPN: IPSec
3Juniper SSG 140 Firewall Device
The SSG firewall device by Juniper is considered to be a fairly middle of the road appliance. It delivers phenomenal performance for small to medium sized businesses, offering security to stop both internal and external attacks on the network. The other standout aspect about this device is the number of I/O expansion slots for such a small device. It is built to be modular so it easily expands to provide all the security needed for a growing business with relative ease.

Specifications

* Interface: USB with 4 Physical Interface Module or PIM Expansion Slots
* Throughput: 350 Mbps
* VPN: IPSec
4WatchGuard XTM 25-W Firewall Device
The WatchGuard XTM series 2 firewall appliances delivers a high level of performance driven security. Two features that stick out about the WatchGuard XTM are that it has both full HTTPS inspection and VoIP support to go along with its other security features. It has built in wireless security capabilities utilizing the latest dual-band 802.11n technology. It offers an affordable solution for small businesses.

Specifications

* Interface: 5 x 10/100/1000, 1 Serial, 1 USB
* Throughput: 240 Mbps
* VPN: IPSec
5Netgear ProSecure UTM10 Firewall Device
This firewall device is another one that offers Unified Threat Management or UTM to provide comprehensive security coverage. It features a proprietary technology from Netgear called Stream Scanning Technology. It utilizes Netgear's own extensive database of antivirus and anti-malware code to thwart attacks faster. This allows for up to five times the scanning speed as data packets are transferred. It uses cloud technology to set up filters that speeds up performance even more.

Specifications

* Interface: 4 x 10/100/1000 and 1 USB
* Throughput: 133 Mbps
* VPN: IPSec
6Cisco ASA 5510
This particular Cisco firewall device features what they classify as an adaptive security appliance. It is one of the more powerful firewall devices from Cisco, featuring some of the best security and VPN services that Cisco has to offer. The firewall stops attacks immediately and keeps them from spreading to the rest of the network. It gives maximum flexibility and protection using a flexible VPN connectivity. It is one of the least costly to deploy within its class of firewall devices.

Specifications

* Interface: 4 x 10/100/1000 and 2 USB
* Throughput: 170 Mbps
* VPN: IPSec
7Barracuda Web Filter Firewall 210 Firewall Device
This is one of the lower-end of the Web Filter Firewallsfrom Barracuda. There are seven different models in this lineup. The 210 features content filtering, application control, advanced policy creation, network threat protection, spyware removal, and a whole lot more. It offers a lot of customizable security solutions and is very affordable, making it perfect for any small to medium sized business. The best feature about the Web Filter Firewalls is that it is stackable, meaning that it is very easy to expand when needed.

Specifications

* Interface: 1 x 10/100 and 2 USB
* Throughput: 10 Mbps
* VPN: SSL VPN
8Juniper ISG 1000
This is ideal for enterprise and service provider networks. The Integrated Security Gateways or ISG offers more than just the firewall with VPN, IDS, and Web filtering features. It has an optional IPS and virtual systems support. The ISG 1000 is the smaller version of the ISG 2000, but certainly packs quite a punch. It is robust enough to handle 10,000 policies and 500,000 sessions. This is a very powerful appliance that takes care of most needs.

Specifications

* Interface:
  • 4 x 10/100/1000 or
  • up to 8 mini GBIC TX, LX, or SX or
  • up to 8 10/100/1000 or
  • up to 20 10/100 or
  • up to 2 10GE
* Throughput: 2 Gbps
* VPN: 1G 3DES/AES
9Cisco ASA 5555-X Firewall Device
Most advanced firewall device that Cisco has made to date. It is more than just the firewall, featuring integrated and market-leading security services for the networks of small to medium sized businesses and even on the enterprise level as well. It is flexible and has modular scalability, meaning that the appliances can be stacked together in a network to provide security as the company grows. The deployment is very cost effective with the ASA series.

Specifications

* Interface: 6 x 10/100/1000, 6-port GE SFP SX, LH, LX
* Throughput: 4 Gbps
* VPN: 3DES/AES

Finding Firewall Devices 

To find the right firewall device , start by determining the needed throughput and the desired VPN technology. Both of these specifications vary quite drastically from one model to another. The throughput is basically the amount of data that the firewall device can handle at one time. The larger the network traffic, the larger the throughput needs to be. The VPN is just the software and architecture that controls the security measures on the firewall device. AES stands for Advanced Encryption Security and is considered one of the most secure ways of protection.
The other component to consider searching for is scalability. Not all firewall devices are capable of being able to become part of a larger network. If expansion might be needed in the future, then perform a search for a modular firewall device. These are the ones that are mounted on a server rack and they are easily networked together to create an even larger firewall to protect the network as the business expands.

Conclusion

A person can spend as much or as little as they want when it comes to firewall devices. The important consideration to remember is that buying the cheapest one is not always the best choice. Look for a firewall device that is solidly built to withstand the rigors of high-speed internet traffic. Flexibility, power, and speed are the key components to consider for a secure firewall. 
Tuesday, November 18, 2014
Tag :

Pageviews

Followers

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -