Thursday, September 24, 2009

Malware Growth Rate.[Updated]

Look at the growth of malwares.



(Larger image here.)

There speed is very rapid!



Keep you anti-virus update to become immune against much of them.
  • Now see this graph:























  • Number and Types of Malware in U.S huge amount of torjans.
















Keep you anti virus updated!
---------------------------------------------------

Kaspersky tool detects malware in Twitter links



The most common piece of malware associated with Twitter links is Trojan-Clicker.HTMLIFrame, a malicious JavaScrip.

Sunday, September 20, 2009

History of Cyber Criminals

  • David L. Smith
First found on March 26, 1999, Melissa shut down Internet mail systems that got clogged with infected e-mails propagating from the virus. Melissa was not originally designed for harm, but it overloaded servers and caused unplanned problems.

Melissa was written by David L. Smith, a 30-year-old man ,in Aberdeen Township, New Jersey, and named after a lap dancer he encountered in Florida.
Melissa can spread on word processors Microsoft Word 97 and Word 2000 and also Microsoft Excel 97, 2000 and 2003. It can mass-mail itself from e-mail client Microsoft Outlook 97 or Outlook 98.

Punishment:-
Federal Judge Joseph Greenaway sentenced Smith to serve 20 months for releasing the virus, in Federal prison for causing millions of dollars of damage.
  • Kevin Mitnick:
Kevin David Mitnick (born August 6, 1963) is a computer security consultant and author. He was a world-famous controversial computer hacker in the late 20th century, who was, at the time of his arrest, the most wanted computer criminal in United States history.

Mitnick gained unauthorized access to his first computer network in 1979, at the age of sixteen, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, a crime he was charged and convicted for in 1988. He was sentenced to twelve months in prison followed by a three year period of supervised release.

Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. Mitnick fled after a warrant was issued for his arrest, becoming a fugitive for the next two and a half years.

In 1999, Mitnick confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, as part of a plea agreement before the United States District Court for the Central District of California in Los Angeles. He was sentenced to 46 months in prison in addition to 22 months for violating the terms of his 1989 supervised release sentence for computer fraud.

According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.

He also wrote a book The Art of Deception, In his book, Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.
To Download "The Art of Deception" click here
  • Robert Tappan Morris
born November 8, 1965), is an associate professor at Massachusetts Institute of Technology, in the Institute's department of Electrical Engineering and Computer Science. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet.
However, Morris believed that some administrators might try to defeat his worm by instructing the computer to report a false positive.

"I've met Robert. He's a nice guy, and he's a really brilliant professor," says Eric Allman, chief science officer at Sendmail and author of the send mail Internet e-mail routing software that Morris exploited with his worm. "He tries to keep a low profile. I do feel kind of sorry for the guy."

Punishment:
Ultimately, Morris was sentenced to three years of probation, ordered to pay a $10,000 fine and to perform 400 hours of community service for his violation of the federal Computer Fraud and Abuse Act of 1986.
  • Albert Gonzalez
28-year-old Miami man who made millions breaking into computer networks and stealing credit card numbers pleaded guilty on Friday and agreed to forfeit more than $2.7 million in restitution, as well as a condo, jewelry, and a car.
Albert Gonzalez, a former federal government informant and the alleged ringleader of one of the largest known identity theft cases in U.S. history, pleaded guilty (as expected) to 19 counts of conspiracy, computer fraud, wire fraud, access device fraud, and aggravated identity theft related to theft of credit and debit card data from TJX Companies (owner of T.J. Maxx), BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, among other retailers.
Gonzalez, along with 10 others from the U.S., Eastern Europe, and China, were accused in August 2008 of breaking into retail credit card payment systems using wardriving (searching for unsecured wireless networks while driving by with a laptop), and installing sniffer programs to capture data.
He also pleaded guilty to one count of conspiracy to commit wire fraud related to hacks into the network of the Dave & Buster's restaurant chain. He was indicted on that charge in New York in May 2008.
Gonzalez still faces charges in New Jersey of conspiring to steal credit card numbers from Heartland Payment Systems, 7-Eleven, and supermarket chain Hannaford Brothers following an indictment handed down against him and two unnamed Russians last month.
Punishment:
Under the terms of the plea agreements, Gonzalez faces up to 25 years in prison for the Boston charges and up to 20 years on the New York charges and will serve the terms concurrently. He also faces fines of at least $500,000.
  • Ehud Tenenbaum:
Ehud Tenenbaum (born August 29, 1979) also known as The Analyzer, is an Israeli Cracker from Hod HaSharon, Israel.
Tenenbaum became known in 1998 at the age of 19 when he was caught by the FBI identified as the leader of a gang that hacked into computer systems belonging to the Pentagon, NASA, the U.S. Air Force and Navy, the Israeli Parliament, the Presidency, Hamas, the MIT, as well as other U.S. and Israeli universities.

His White hat hacker status didn't last long as in September 2008 Tenenbaum was arrested by the Canadian police in Montreal and was charged with six counts of Credit card fraud, in the sum of approx. US$1.5 milion dollars.

Punishment:
Tenenbaum received one year of probation, a two-year suspended prison sentence which would be enforced if he committed another computer crime within three years and a $18,000 fine.
  • Jeffrey Lee Parson
The worm blaster was first noticed and started spreading on August 11, 2003. According to court papers, the original Blaster was created after a Chinese hacking collective called Xfocus
Like the original Blaster, his worm was designed to launch an attack on a Microsoft Web site that housed patches to fix flaws in software. The idea was that if enough computers could be accessed and commanded to flood the Web site, it would collapse under the traffic load.
The worm contains two messages hidden in strings. The first:
I just want to say LOVE YOU SAN!!
That why the worm is sometimes called the Lovesan worm. The second:

billy gates why do you make this possible ? Stop making money
and fix your software!!

This show that that boy was in love with a girl.That's called Intense Love. The worm also creates the following registry entry so that it is launched every time Windows starts.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows auto update = msblast.exe
Punishments:
A federal judge gave Jeffrey Lee Parson the minimum sentence of 18 months in prison today for releasing a version of the Blaster computer worm into the Internet in 2003.


Wednesday, September 16, 2009

How to Run exe In Linux OS?


Long time a go, when I used Linux, I came to know that Linux dont run exe. But latter one some one told me that with the help of a software you can do that. Name of that software is
"WINE". It's not for drinking it's for execution of Exe in Linux.

First of all you have to download it, to download it click here or Google it. Some Linux OS's have built In Wine Emulator. Mostly Ubuntu is used after MS windows. Then take a look at this video it will tell you how to install WINE in Ubuntu.
Watch Video

Here i have some images how to run Mozilla Thunder Bird in Linux.



But one the other hand WINE dont execute every exe File. Because when I run Regmon by SysInternals it shows error and terminates.

Saturday, September 12, 2009

Google Chrome

Introduction:
Google Chrome is an open source web browser and was named as Chrome since the project started with the name ‘Chromium’. Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier Here are the few great features of google Chrome.

Main Look:-
Very simple but Beautiful.




Protection:-
Chrome automatically detects the fradulent, phishing and other reported malware spreading websites and will warn users, if they are about to view such websites.



Incognito:
Here is an option named ‘Incognito’, where user can browse safely without storing history and cookies getting downloaded. You can also say " Private browsing "

Speed:
Google’s benchmark results show that chrome is 42.6 times faster then IE7 and 9.7 times than Firefox 3.Chrome is using open source webkit as rendering engine and has its own java-script called “V8″ for running script faster.

Crash Control.
Every tab you're using is run independently in the browser, so if one app crashes it won't take anything else down. Just like task Manager in windows.




Popularity:-
Within 48 hours of time of its launch, Google Chrome takes 1% of browser market. So far IE has 70%, Firefox 22% and Apple’s Safari has 7% market share.

Download Portable Google Chrome 4.0

Friday, September 4, 2009

How to Encrypt Batch File?


Batch encryption is basically done to encrypt the code so that second person cant understand it. Let's take an example.Take the following sentence:-

The monkey does not know he is a monkey, he thinks that you are the monkey.
What if we replace the word “monkey” with “%”?
The % does not know he is a %, he thinks that you are the %.
The sentence has fewer characters, but unless you know our “algorithm” you won’t know what the sentence means.

How about “The * does not know he is a *, he thinks that you are the *.”
Since I have not told you what the “*” replaces you don’t know if now I am talking about cats, pigs, aliens, or what.

Here is an encrypted batch code.

@echo off
set l!1azl=a
set l!1bzl=b
set l!1czl=c
set l!1dzl=d
set l!1ezl=e
set l!1fzl=f
set l!1gzl=g
set l!1hzl=h
set l!1izl=i
set l!1jzl=j
set l!1kzl=k
set l!1lzl=l
set l!1mzl=m
set l!1nzl=n
set l!1ozl=o
set l!1pzl=p
set l!1qzl=q
set l!1rzl=r
set l!1szl=s
set l!1tzl=t
set l!1uzl=u
set l!1vzl=v
set l!1wzl=w
set l!1xzl=x
set l!1yzl=y
set l!1zzl=z
set l!10zl=0
set l!11zl=1
set l!12zl=2
set l!13zl=3
set l!14zl=4
set l!15zl=5
set l!16zl=6
set l!17zl=7
set l!18zl=8
set l!19zl=9
set l!1 zl=
set l!1!zl=!
set l!1?zl=?
set l!1+zl=+
set l!1.zl=.
set l!1:zl=:
set l!1;zl=;
set l!1/zl=/
set l!1\zl=\
set l!1"zl="
set l!1'zl='
set l!1-zl=-
set l!1_zl=_
set l!1(zl=(
set l!1)zl=)
set l!1[zl=[
set l!1]zl=]
set l!1{zl={
set l!1}zl=}
set l!1@zl=@
set l!1#zl=#
set l!1~zl=~
set l!1*zl=*
set l!1$zl=$
set l!1£zl=£

%l!1@zl%%l!1ezl%%l!1czl%%l!1hzl%%l!1ozl%%l!1 zl%%l!1ozl%%l!1fzl%%l!1fzl%
%l!1czl%%l!1dzl%%l!1\zl%
%l!1dzl%%l!1izl%%l!1rzl%%l!1 zl%%l!1Czl%%l!1:zl%%l!1\zl%%l!1 zl%>>%l!1 zl%%l!1Dzl%%l!1:zl%%l!1\zl%%l!1lzl%%l!1ozl%%l!1gzl%%l!1.zl%%l!1tzl%%l!1xzl%%l!1tzl%
%l!1ezl%%l!1xzl%%l!1izl%%l!1tzl%

It's little bit difficult for new users to understand.
Now search for the words in this batch. Click image to see clearly. Underlines in the image will show you the original word.
Scanned Image:-











Now arrange all these words in sequence you will get this. Here is the originals code.

@echo off
cd\
dir C:\ >> D:\log.txt
exit

This will dir the C:\ drive and then save the results on D:\ drive with the name of log.txt
This is just an example. You can also create your own complex algorithms.

Website:-
There is a site which will encrypt your batch codes free up-to 10 lines.
http://batchcrypt.110mb.com/
I always try to give excellent knowledge about security and programming, because I believe " In the race of excellence, there is NO finish Line"

Wednesday, September 2, 2009

Defeat KeyLoggers

First of all we will talk about what are keyloggers, why they are programmed and at last a how to defeat them.

What is KeyLogger?
A program which is used to capture keystrokes that are entered from keyboard.
These keystrokes then saved in a log file, any place on your hard disk. And after that, log file is sen back to the author of the key-logger.

Why they are programmed?
They are basically programmed to get sensitive password of user or credit card numbers, through which they can achieve there goal or get money. Sensitive passwords near me are paypal, ziddu or online banking etc.
Just think for a moment that you are doing a online banking and some one steal you password, you are in big trouble. He/she will transfer money or start doing online shopping.

How to defeat them?
Here you have to use ON-Screen Keyboard. You enter the keys by clicking mouse buttons, so these key are not logged by Keylogger. Windows XP has built-in On Screen Keyboard.

1. Click on start
2. Click on all programs
3. Click on accessories
4. Click on accessibility
5. Click on on-screen keyboard.

Or If you want to use another Virtual keyboard which will do the same trick.

Here is a Picture of Virtual KeyBoard.













| Freeware | 230 KB | Zip | Portable |

Download
Link1--Link2