1.)Open “Run” from the start menu (or press WinKey + r). Just copy paste the following path and hit ENTER.
notepad %windir%\system32\drivers\etc\hosts
Alternately, go to C:\Windows\System32\Drivers\Etc and find the file “hosts”. Open that file in Notepad.
2.) When this hosts file is opened in Notepad, at the end of the file you will see something like “127.0.0.1 localhost”.
3.) Under “127.0.0.1 localhost” just add another website URL that you want to block.
For Example:-
127.0.0.1 localhost
127.0.0.2 www.rakshitk.com
127.0.0.3 www.whoismadhur.com
4.) Make sure every time you add another website, the last digit of the address 127.0.0.x should not be the same.
5.) Save the file and exit.
So, here you go. Restart your browser if it is opened and changes will take place immediately.
The good thing is that no message, no pop ups nothing will be displayed when someone tries to open a blocked website. Your browser will just fail to open those websites without any error messages.
Know your enemy and know yourself; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant both of your enemy and of yourself, you are sure to be defeated in every battle." This maxim applies to the battlefield that is today's modern network, just as it has to all of the battlefields throughout humanity's long and strife ridden history.
Monday, October 25, 2010
Thursday, October 14, 2010
Linux Security Tools
System Auditing
- Chkrootkit (YoLinux tutorial) - Scan system for trojans, worms and exploits.
- checkps - detect rootkits by detecting falsified output and similar anomalies. The ps check should work on anything with /proc. Also uses netstat.
- Rootkit hunter - scans for rootkits, back doors and local exploits
- Rkdet - root kit detector daemon. Intended to catch someone installing a rootkit or running a packet sniffer.
- Tripwire : The grand-daddy of file integrity checkers
- RKHunter : An Unix Rootkit Detector
- chkrootkit : Locally checks for signs of a rootkit
- fsaudit - Perl script to scan file systems and search for suspicious looking directories
- - UNIX security checks. Programs and shell scripts which perform security checks. Checks include file and directory permissions, passwords, system scripts, SUID files, ftp configuration check, ...
- SARA - Security Auditor's Research Assistant - network security vulnerability scanner for SQL injections, remote scans, etc. (follow-on to the SATAN analysis tool)
- - Texas A&M University developed tools
- Tiger - Scan a Unix system looking for security problems (Similar to COPS) -
- Tiger Analytical Research Assistant (TARA Pro) - Commercial support
- Netlog - TCP and UDP suspicious traffic logging system
- Drawbridge - Firewall package (Free BSD)
- Dsniff : A suite of powerful network auditing and penetration-testing tools
- P0f : A versatile passive OS fingerprinting tool
- BASE : The Basic Analysis and Security Engine
- Nessus - Remote security scanner - This is my favorite security audit tool!! Checks service exploits and vulnerabilities.
- ISIC - IP Stack Integrity Checker
- Argus - IP network transaction auditing tool. This daemon promiscuously reads network datagrams from a specified interface, and generates network traffic status records
- Argus 2
- SAINT - Finds computers on the network, port scans and does a vulnerability check and outputs a report. - Commercial product.
- InterSect Alliance - Intrusion analysis. Identifies malicious or unauthorized access attempts.
- Linuxforce: AdminForce CGI Auto Audit - CGI script analyzer to find security deficiencies.
- Core Impact : An automated, comprehensive penetration testing product
- Canvas : A Comprehensive Exploitation Framework
- SolarWinds : A plethora of network discovery/monitoring/attack tools
- Yersinia : A multi-protocol low-level attack tool
Wireless Vulnerability Audit Tools
- AirSnort - wireless LAN (WLAN) tool that recovers encryption keys.
- WEPCrack
- Kismet - Wireless Sniffer
- Aircrack : The fastest available WEP/WPA cracking tool
- nmap - Port scanner and security scanning and investigation tool
- NmapFe - GUI front-end to NMAP
- KNmap - KDE front-end
- pbnj - Diff nmap scans to find changes to systems on the network.
- nmap3d - nmap post processing to 3-d VRML
- nmap-sql - log scans to database
- portscan - C++ Port Scanner will try to connect on every port you define for a particular host.
- pof - passive OS fingerprinting.
- NetCat - This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections
- Scanrand : An unusually fast stateless network service and topology discovery system
- Web/http scan:
- Nikto - web server scanner. CGI, vulnerability checks. Not a stealthy tool. For security tests.
- Paros Proxy - A web application vulnerability assessment proxy
- Web Scarab - A framework for analyzing applications that communicate using the HTTP and HTTPS protocols
- Whisker/libwhisker : Rain.Forest.Puppy's CGI vulnerability scanner and library
- Burpsuite : An integrated platform for attacking web applications
- SPIKE Proxy : HTTP Hacking
- DSniff - network tools for auditing and penetration testing.
- Wireshark - full network protocol sniffer/analyzer
- (Ethereal - legacy. Now Wireshark)
- IPTraf - curses based IP LAN monitor
- TcpDump - network monitor and data acquisition
- VOMIT - Voice Over Misconfigured Internet Telephones - Use TCP dump of VOIP stream and convert to WAV file.
- Cisco Call Manager depends on MS/SQL server and are thus vulnerable to SQL Slammer attacks.
- KISMET - 802.11a/b/g wireless network detector, sniffer and intrusion detection system.
- DISCO - Passive IP discovery and fingerprinting tool. Sits on a segment of a network to discover unique IPs and identify them.
- Yersina - Framework for analyzing and testing the deployed networks and systems. Designed to take advantage of some weakness in different Layer 2 protocols: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
- EtterCap - Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.
- Ntop : A network traffic usage monitor
- Ngrep : Convenient packet matching & display
- EtherApe : EtherApe is a graphical network monitor for Unix modeled after etherman
- Argus : A generic IP network transaction auditing tool
- Ike-scan : VPN detector/scanner
- Arpwatch : Keeps track of ethernet/IP address pairings and can detect certain monkey business
Password crackers
- John the Ripper - weak password detection. crypt, Kerberos AFS, MS/Windows LM, ...
- lCRACK - password hacker, dictionary, brute force incremental, ...
- THC Hydra : A Fast network authentication cracker which supports many different services
- Aircrack : The fastest available WEP/WPA cracking tool
- Airsnort : 802.11 WEP Encryption Cracking Tool
- RainbowCrack : An Innovative Password Hash Cracker
Exploits:
- bobkit
- woot-project
-
MetaSploit - Exploit launcher, test and development tool
- SNORT - This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine
- OSSEC HIDS : An Open Source Host-based Intrusion Detection System
- Fragroute/Fragrouter : A network intrusion detection evasion toolkit
- BASE : The Basic Analysis and Security Engine
- Sguil : The Analyst Console for Network Security Monitoring
- GnuPG / PGP : Secure your files and communication w/advanced encryption
- OpenSSL : The premier SSL/TLS encryption library
- Tor : An anonymous Internet communication system
- Stunnel : A general-purpose SSL cryptographic wrapper
- OpenVPN : A full-featured SSL VPN solution
- TrueCrypt : Open-Source Disk Encryption Software for Windows and Linux
- AWStats
- Webalyzer
- Calamaris - parses logfiles from Squid, NetCache, Inktomi Traffic Server, Oops! proxy server, Novell Internet Caching System, Compaq Tasksmart or Netscape/iplanet Web Proxy Server and generates a report
- fwlogwatch - fwlogwatch is a packet filter / firewall / IDS log analyzer written by Boris Wesslowski originally for RUS-CERT. It supports a lot of log formats and has many analysis options. It also features incident report and realtime response capabilities, an interactive web interface and internationalization.
- LogCheck - Logcheck is a simple utility which is designed to allow a system administrator to view the logfiles which are produced upon hosts under their control.
- Logwatch - Logwatch analyzes and reports on system logs. It is a customizable and pluggable log-monitoring system and will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
- syslog-ng is a flexible and highly scalable system logging application that is ideal for creating centralized and trusted logging solutions.
- LogAnalysis.org has multiple application specific log analyzers
- Swatch can assist with logfile analysis, providing immediate notification if log entries matching a regular expression are spotted, or to review logfiles for unknown data.
- Nagios : An open source host, service and network monitoring program
- Argus : A generic IP network transaction auditing tool
- Sguil : The Analyst Console for Network Security Monitoring
- ClamAV : A GPL anti-virus toolkit for UNIX
- AVG- AVG Internet Security for Linux
- F-PROT AntiVirus for Linux
- Avast!
- McAfee
- Avira AntiVir Personal
- Bastille : Security hardening script for Linux, Mac OS X, and HP-UX
Thursday, October 7, 2010
Folder bug in windows and its solution
Nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and incredible.
solution:
There is a way to create that.TRY IT NOW, IT WILL NOT CREATE “CON ” FOLDER
1.go to start-->run--->cmd
2.in the CLI type
cd\
mkdir\\.\c\:\con (note: we can create it in any location bye navigating to the desired location by using 'cd' command)
if u wana delete it than go
rmdir\\.\c\:\con
solution:
There is a way to create that.TRY IT NOW, IT WILL NOT CREATE “CON ” FOLDER
1.go to start-->run--->cmd
2.in the CLI type
cd\
mkdir\\.\c\:\con (note: we can create it in any location bye navigating to the desired location by using 'cd' command)
if u wana delete it than go
rmdir\\.\c\:\con
Thursday, September 23, 2010
Top 10 Network Security Tools
#1![]() ![]() ![]() ![]() ![]() ![]() | ![]() Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. See all vulnerability scanners |
#2![]() ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences). See all packet sniffers |
#3![]() ![]() ![]() ![]() ![]() ![]() ![]() | ![]() This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts. Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort. See all intrusion detection systems |
#4![]() ![]() ![]() ![]() ![]() ![]() | ![]() This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its immense popularity. It can sometimes even be hard to find nc110.tgz. The flexibility and usefulness of this tool have prompted people to write numerous other Netcat implementations - often with modern features not found in the original. One of the most interesting is Socat, which extends Netcat to support many other socket types, SSL encryption, SOCKS proxies, and more. It even made this list on its own merits. There is also Chris Gibson's Ncat, which offers even more features while remaining portable and compact. Other takes on Netcat include OpenBSD's nc, Cryptcat, Netcat6, PNetcat, SBD, and so-called GNU Netcat. See all Netcats |
#5![]() ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses. See all vulnerability exploitation tools |
#6![]() ![]() ![]() ![]() ![]() ![]() | ![]() This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rulesets. It is also great for learning more about TCP/IP and experimenting with IP protocols. See all packet crafting tools |
#7![]() ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating, ... See all wireless tools, and packet sniffers |
#8![]() ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools. See all packet sniffers |
#9![]() ![]() ![]() | ![]() UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. See all password crackers, and packet sniffers |
#10![]() ![]() ![]() ![]() ![]() ![]() ![]() | ![]() John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here. See all password crackers |
Subscribe to:
Posts (Atom)