Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

How Can We Detect Fake E-mails

In my last posts i shared the method to send fake e-mail to any one from any email id. There is a methods to check if your e-mail is fake or original. In this post i will share to check weather your email is fake or original. This is an anti-hacking or security trick to check the information of your received E-mail.

2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details".

3. Something you must know:









When google will send you email it will content the following details:
  • mailed by
  • signed by
Also, most of the times, "Mailed by" field will have value:
bounces.google.com or
google.com
 depending on the type of your mail. This is true for every genuine email from every mail provider.

4. But, these two fields will not be present in the details of Fake Mail. Also, if the mail details contain these fields, the value of these fields will not be google.com

Fake Mail without "Mailed by" field:
 









Fake Mail with "Mailed by" field.









 As you can see, the "mailed by" field shows the hosting server's name and not the Google server. This means, this server is used to send you the fake email and most probably, the fake mailer is hosted on the same server.


You can also check out the header field to detect fake mails. Follow the steps:

- Open the mail. Hit on down arrow next to "Reply" and click on "Show Original".




















- Now, check out "Received" fields. This field will show you the name of server from which the mail is sent. As you can see, we have used "emkei.cz" as our fake mailer. So, it has appeared in "Received" field.



-----------------------------
use the method and beware from the hacker & being phishing...1

Be Secure from Phishing Scams

Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.

With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.

Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.

How To Identifying a Phishing Scam

1. Beware of emails that demand for an urgent response from your side. Some of the examples are:

    * You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
    * In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.

2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.

3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:

  • papyal.com
  • paypal.org
  • verify-paypal.com
  • xyz.com/paypal/verify-account/
How To Avoid From Being Phishing

1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.



In most cases, unlike a legitimate website, a phishing website or a spoofed webpage will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the webpage before entering any of your personal information.

4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.

5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:

You can directly send an email to spam@uce.gov or reportphishing@antiphishing.org reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.

What Is SandBoxie?


What is Sandboxie?

Generally, if you are visiting hacking forums or various forums of free software downloads, some of these free downloads are affected or are attached viruses and trojans for malicious purposes. So, if victim installs them on his computer, the malicious scripts get installed on computer causing various problems depending on script. So, the better way is to install such applications on your PC but using Sandboxie.

Sandboxie will allow you to run your software downloads in a sandbox (in a separate memory area) to check whether or not they're what you were expecting. This can be great if you don't trust a download or freeware.











The red arrows indicate changes flowing from a running application program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.

Sandboxie features:
  • Secure Web Browsing:
Running your Web browser under the security protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox of Sandboxie and can be discarded trivially.
  • Enhanced Privacy:
Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows OS (Operating system).
  • Windows Stays Clean:
Prevent wear-and-tear in Windows by installing software into an isolated sandbox provided by Sandboxie.

Requirements for Sandboxie:


Sandboxie supports windows 2000, windows XP, windows Vista and windows Server 2003.
Sandboxie does not work on Windows 95, 98 or ME, or on Mac operating systems.
There are no particular hardware requirements. Sandboxie needs only a small amount of memory and should have a very small impact on performance.

How To chcek If you are Trageted by Any RAT or KeyLogger

Here i will show you How to find if you are infected by and RAT or KeyLogger.
RAT and Keyloggers are hacking methods to spy any computer or mobile phones also. This type of softwares normally send by to the target computer through any image or in some kind of softwares. When our computer is get start they starts automatically, Using startup option. If you have any doubt that there is some keylogger or RAT then in this post i will teach you how to find them and remove from spying or hack your system.

HERE WE GO:

1. Now every program has their own process which can be seen on task manager. So the first thing to do is to find out which process the Trojan is being attached to. If you see some unknown process search that on google. A good hacker will always makes sure he hides its process with a Windows based Process, for eg. svchost.exe or something like that.

2. If you cant find, then the next thing you can do is use cmd (to open cmd prompt, Click on Start--->Accessories-->Command prompt).

3. Once Command Prompt is opened, use this command: netstat -an |find /i "listening"

Note: The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool!

Now we wonder What this Command does? This command will show all the opening ports. Now check for any unknown port.

4. You can skip step 3 if you want, and can do this instead.

Open command prompt and type netstat -b
















Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.

Look out for SYN Packets and the Foreign address its been connecting with , check the process its been associated with, check the ports also. If you find that its connecting to some unknown ports, then you can say you have been backdoored (hidden ports to get administrative command on your system).

5. Go to your task manager. On the top of it, click on View---> select Column---> Tick on PID (Process Identifier).

Match the suspicious Process with the Processes In task manager, check PID also. Now make a list of suspicious Programs in task manager and find that if they are key-logger or RAT or not? and now you have to switch of them to start on startup.


























How to delete them from start up? I have two methods here.
I) Go to regedit ---> HKLM\Software\Microsoft\Windows\Current version\Run
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at
HKCU\Software\Microsoft\Windows\Current Version\Run

II) Open Cmd prompt & type start msconfig. Go to Startup tab, you can check the startup process there.

That's all hope this post will work for you be safe from RAT, Key-Loggers and other Trojans also.

Dos Trick To Lock Your Folder

Dos Hack Trick To Lock Folders.

You may using many Folder locking software in your computer.
And you you have to pay for it and after all that some softwares come to break those lockers and you dont have any new idea very soon.

Here is a dos hack trick to lock folder with out using any software.
so that no one can crack the password and can not have access to your folders data.

To use it you need to create a dos batch file for your computer. It has a collection of codes which can make a password protected folder for your computer. And the good news is that it wont cost you. Just need to create a file with you.


So here We go: Copy the giving codes into a notepad file and save it as lock.bat file.

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==pwd goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


These are the magical codes to make you a Dos folder locker.
After saving it double click on it it. If it will ask for password type pwd and press enter.
The radio staggers against the backspace!

How To Hack Into WiFi Network?


These days the concept of wireless network is getting popular. The best and powerfull way is to use WiFi network in LAN. If you are working in WiFi and you don’t have permission to access the network then this post is only for you. Hear you will learn how hack into a wifi?

Before you must have:
  1. Mozilla Firefox
  2. Firesheep - A Firefox extension that demonstrates HTTP session hijacking attacks.
  3. WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library.

Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.

Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.

A very simple way to get access in to a WiFi network and also to hack any E-mail account.

Other wifi hacking softwares.
1.) NetStumbler
2.) Kismet
3.) Airsnort
4.) Cowpatty
5.) Wireshark

Mozilla Hack to Speed it up


Hey Friends Before this I shared you how to speed up internet of your system and how to speed up the your tube videos. And today i am going to teach you about increasing the speed of your mozilla.

This tricks is specillay for those who works on a low speed internet (cell phone or data cards).



Here we go


type about:config in the address bar, It will a new window then click on i'll be careful, i promise. Then look for the following entries, and make the corresponding changes.  

network.http.max-connections-per-server =32
network.http.max-persistent-connections-per-proxy =16
network.http.max-connections = 64
network.http.max-persistent-connections-per-server = 10
network.http.pipelining = true
network.http.pipelining.maxrequests = 200
network.http.request.max-start-delay = 0
network.http.proxy.pipelining = true
network.http.proxy.version = 1.0


Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it receives. That's all.
blog ping

Passwod Reset Disk

Cant you remember Your Password?
                        or
Want to reset Windows Password?

Then this post is really for you only. In this post i am going to tel about creating password reset disk for your Windows OS. A password reset disk have ability to change the password without Login your system, no need to format you system, no need to get tensed. Just Follow the simple links.



Step 1: Open your Control panel.

Step 2: Click on User Account

Step 3: Now click on Create a Password reset disk left Side of the Open Window. It Will open the Password reset Wizard.

Step 4: now click on next then select the Disk you want to Use(it could be your pen drive Also)

Step 5: Now Verify Your Current password and click next.

it will store a file there and store its id in memory.

How To Use Password Reset Disk?

Its very simple whenever you forget you admin password simply insert you password reset disk and it will open a wizard where it will ask for a new password with asking the old one. Now reset the password and Enjoy your system.

What are Key Loggers? How They Work..?

What is key logger?

It is a type of software by which any one can know your password or other information. This software is basically works for all the keys you hit on your keyboard. Generally when we enter our password in password box it will never show you what you entered there. but the keyboard have function to know the hidden data. and the key logger can save it in an .txt or other files.

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data.
Below are some methods through which you can protect your computer from keyloggers:

Use a Good Antivirus

This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

Use a Good Antispyware

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware.

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.

Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi Engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Sandboxie

Sandboxi is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.
To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

Keyscrambler

Keyscammer is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a key logger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.

How Firewalls Work

If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network. Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator.



PERSONAL FIREWALLS
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks.

Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration

Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

Hardware vs Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall?

Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

Tips for safe Net-Banking


Now it's time for moving our all work online. But as you know internet is not totally safe.
Cheating and hacking is increasing day by day after a lot of security.
One of my friend got cheat by a net cheater if you are going to use Net Banking Them its my request to read this.


1. Never use your Bank account at any public place such as cyber cafe or any other places. Because there may be some of key logger installed by which any one can get the user id and password of your bank account so that he/she can use you money.
2. If you got the mail from you bank then please first check the URL of the given links. It may some of hacker trying to make you fool so that can gain your personal information to reset you password.
3. If you are requested for resubmitting your information for net banking then be safe and not give your all information any where.
4. Before Online Shopping check the web site registration and before paying the money just check the bank of gateway you are paying your money.
5. All update you new mobile number to your bank and if you get any message that your account is using from another place the go to near of your branch or can contact to customer care to know the the name of that place or other information.
By using these simple steps you are safe form the hackers, waiting to use you hard work.
Regards:
Prem Singh