Showing posts with label hacking tools. Show all posts
Showing posts with label hacking tools. Show all posts

Sunday, 20 November 2011

1

Cryptography and steganography

  • Sunday, 20 November 2011
  • PRABH KARAN SINGH
  • irst of all start with the difference between these two. In simple words cryptography is a process of securing a message so that message is visible to everyone but no one can read it without authorized key and steganography is the process of hiding a message such that no one can see the message but once if message is found then anyone can read it without any key or password. So lets start with introduction of the above mentioned two terms.

    Cryptography:
    Basically cryptography is a technique to communicate securely between two person in presence of third party without their interference. More generally it is constructing protocols that overcome the influence of adversaries and which are related to various aspects such as data confidentiality, data integrity and authenticity. Application of cryptography includes ATM cards, password etc. key is needed to perform cryptography, this key is used as a password to encrypt and decrypt.
    Cryptography is based on encryption and decryption of data. Encryption basically means converting simple text form into unintelligible form. Simple form of data is referred as plain textand encrypted data is called cipher/cypher text. Whereas converting cipher text into plain text is termed as decryption. An authorized rypt data. sender uses his key to encrypt data and reciever use the key to read the message.

    -Modern cryptography:

    Symmetric key cryptography-
    It refers to the type of cryptography in which sender and receiver both uses same key. Symmetric key ciphers are implemented as either block cipher or stream cipher. A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher. The Data Encryption Standard (DES) and the Advance Encryption standard (AES) are block cipher designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple- DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access.
    Stream ciphers, in contrast to the 'block' type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the one time pad. In a stream cipher, the output stream is created based on a hidden internal state which changes as the cipher operates.

    Public Key cryptography-
    Symmetric-key cryptosystems use the same key for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as well. The number of keys required increases as the square of the number of network members, which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret key between two communicating parties, when a secure channel does not already exist between them.

    Tools for cryptography:
    1.TrueCrypt
    2.PEncrypt
    3.CECrypt
    These are few good tools for cryptography. In my opinion trueCrypt is best among all. Here is the video tutorial for TryeCrypt: http://www.youtube.com/watch?v=nemmSS5mqDA

    Steganography:
    Steganography is the art and science of writing hidden message in such a way that no one can judge the presence of a message. Normally a file will look like an image or a song or a simple text file but in fact a special message is hidden below it. Hiding of such messages is the art of steganography. Advantage of steganography over cryptography is that these messages don't attract people to themselves. Every message is hack-able, doesn't matter how secure it is, so cryptographed message can be hacked but stagenographed message is better because no one knows that there is a message.

    Tools for steganography:
    1.Pict Encrypt(Mac)
    2.Hide i picntures
    3.S-Tools 4.0
    Normaly anyone can use tools for doing steganography but here i am teaching you a simple cmd prompt trick by which you can hide your secret message in some image or any document.
    go to command prompt and type 
    copy \B original.jpg+hidden.txt new.jpg (press enter)
    [original is a image in which you want to hide your message and hidden is a text message which you want to hide]
    Now when you will normally open new.jpg it will show you the image but when you open new.jpg in notepad you can read your message. 

     Subscribe us via E-mail and Add us on Facebook for daily updates and Plz also do click once on the ads displaying below or above the post for us.. :)

    Read more...

    Monday, 11 July 2011

    0

    sslsniff v0.7 – SSL Man-In-The-Middle (MITM) Tool

  • Monday, 11 July 2011
  • saurav garg
  • This tool was originally written to demonstrate and exploit IE’s vulnerability to a specific “basicConstraints” man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes.
     
    It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide.


    The three steps to get this running are:
    1. Download and run sslsniff-0.7.tar.gz
    2. Setup iptables
    3. Run arp-spoof



    Download Here:

     
    http://www.thoughtcrime.org/software/sslsniff/sslsniff-0.7.tar.gz
    Read more...

    Thursday, 7 July 2011

    0

    Hacking Tools for WINDOWS OS

  • Thursday, 7 July 2011
  • saurav garg
  • 1. Cain & Abel - Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

    2. SuperScan - SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

    3. GFI LANguard Network Security Scanner - GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

    4. Retina - Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

    5. SamSpade - SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

    6. N-Stealth - N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

    7. Solarwinds - Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

    8. Achilles - The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com...OOPS!

    9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

    10. Netcat (The Network SwissArmy Knife) - Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.

    For more details on these tools please search them on google.... :)
    Read more...
    0

    Hacking Tools for LINUX OS

  • saurav garg
  • 1. nmap - Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.

    2.
    Nikto - Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

    3.
    THC-Amap - Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.

    4.
    Ethereal - Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.

    5.
    THC-Hydra - Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.

    6.
    Metasploit Framework - The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.

    7.
    John the Ripper - John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

    8.
    Nessus - Nessus is the world's most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world's largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

    9.
    IRPAS - Internetwork Routing Protocol Attack Suite - Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.

    10.
    Rainbowcrack - RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table".



    For more information on these tools search on google.... :)
    Read more...