INDIAN

http://groups.google.com/group/nforceit/about

Monday, 30 May 2011

GMAIL Bypass - Corporate Filter

Scenario: Security Lab with NetGear Modem (added Basic Filter feature) with GMAIL blocked

My Manager want to mayer employee performance after blocking GMAIL so, he used NetGear Modem Wireless and added GMAIL to his blocking Filter.

So, everytime anyone does a Google search or directly browses Gmail an Page opens saying " Blocked GMAIL!!! :) " by NetGear.....

Bypassing Technique:
1. Type https://gmail.com
2. Go to iGoogle and login to GMAIL

These both worked and now we are on same Pace....!!!! but HaPpY!!! :)

Monday, 4 April 2011

How To Know Phishing Attack


We Heared lot many times about Banking Fraud's ,Stealing Credential's, credit card fraud's etc......

Have u People any time thinked about this ,How this Happen's ?
Let Me Explain:

In Secuirty Language We call this attack as Phishing;

Phishing It is the way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a TrustWorthy ,Using this technique attacker's target the victim's

Here some Techniques that attacker use to fool the victim Like:

1)Attacker send's an Email Link Saying Verify your account By Visiting the given Link,
Link's appear to be legitamate but Which is not

2)I Hope Many of u experienced This Saying "You have won the lottery."
   It's a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no    work on your part. The lottery scam often includes references to big companies, such as Microsoft,Cococola Company etc...
Which is not in real No Company Will send Email's Like This.

3) Some messages convey a sense of urgency saying that u r account has to modify due to some security reason so that you'll respond immediately without thinking.


Need To Remeber This:Businesses should not ask you to send passwords, logon information or user names, Social Security numbers, or other personal information through email.

How To Identify :

Attacker's use web addresses that resemble the names of well-known companies but are slightly altered by adding, omitting, or transposing letters.

For example,http://www.google.com/ this the actual site but attacker alter this as gogle.com or go0gle.com observe the name u find some difference,

similarly mail.google.com this might modify like gogle.mail.it.com

When  Your Visiting any site Beware of this untill and unless u r not sure about site name exactly

Wanted to Remove any Installed softwares ?

I Have seen many people who install softwares and after installing it, they wanted to remove permanently , for them i will give some tips to remove softwares from your pc's Just go through this.
In cmd type regedit and follow this process
HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
It is for educational purpose only before removing any software you need to Know complete idea about that software. so that you could not remove any legetimate one

Saturday, 2 April 2011

Do You Think That Airlines are Secure ?

Most Of Us Think That Aeroplanes Are Going in certain range higher so, that No One could guess it's speed and location, But Actually It is there MisConception
Some critics develop the Application called Plane Finder AR app for the Apple iPhone and Google’s Android allows users to point their phone at the sky and see the position, height and speed of nearby aircraft. It also shows the airline, flight number, departure point, destination and even the likely course.

What Happen's If It Goes to the Hands's Of terriorist group they could be used to target an aircraft with a surface-to-air missile, or to direct another plane on to a collision course.

What Do You Think Developing that application is a Boon or Bane ?

Latest Attack's of 2010

Let's us know, what are the latest malware's which has Shown high Impact on Social Networking site's ,social media etc....

1)Zeus Botnet :It Is designed to steal information during banking transactions and also expanded its scope by targeting mobile devices as well as launching email campaigns to spread the botnet.

2)Stuxnet :It is revealed that it was created to sabotage power plants and cause physical damage to certain equipment;

3)cutwail :It is used to launched distributed denial-of-service (DDoS) attacks and hit more than 300 major web sites.

AutoRun malware and Koobface may have lessened their impact but will likely be a threat as long as individuals and businesses continue to use social media and networking sites.

CyberCriminals are doing their research and are aware of what is popular, what is insecure ,they are taking leverage of this thing's to launch severe attack's

How to Identify Your System Is Infected (or) any Intruder Entering into Your System

How do i know that my system is infected or How do i know that an attacker is entered into my system,this is the thing that always baffle us..Here, I will give u some tips where u can find an intruder if he is entering into u r system ,these are the basic details you need to perform, even there are more steps in security forensics but for your information i will give some tips which u might know or may not.

1)Go for the Taskmanager check the process ,services & applications that are running in your system

2)Go for wmic process in cmd type "wmic" and then type process ,Here you will find all the details of the services that are running in you system

3)Go FOr Logs type in run box eventvwr ,Here You find all logs what ever u have done in your system & if any intruder attemted to entered in your system his log also created here but u need to do some studies on this

4)For Malicious Software to identify in u r system go for process explorer tool

5) netstat command just type in cmd,it will give statistics of your Network 

Sunday, 20 March 2011

Mobile Forensic's

People Think that they can do anything using Moblie Phones, Mostly It Happens When Sending Some fervour Msg's During Revolt's and after sending they delet it from the mobiles thinking that no one could get that 
But Actually It's Different

Some Cyber forensic researchers designed a device to extract the memory of a mobile phone for crime scene evidence. The phone's memory card is placed in the device where computer software extracts and decodes the information--revealing call history, text messages, emails, images, video and the calendar.
This information is then used by police as evidence in crimes. The Device Is Called Flasher Box Than Question Raises What Is Flasher Box ?

It's a device that transfers data from a cell phone to a computer, To help dig up digital evidence and catch criminals, 
A phone's memory card is removed and plugged into a flasher box. Computer software extracts the phone's coded information and decodes the information to reveal the phone's call history, text messages, e-mails, calendar, images and videos. This information is then used by cops as clues to solve crimes.

How To Identify Your USB Is Infected


Before Connecting USB device to u r computer ,How to know that you are USB is infected with malware ,some studies shown that 25% of malware are designed in such a way that it spread through USB storage devices connected to computers.These types of threats can copy themselves to any device capable of storing information such as cell phones, external hard drives, DVDs, flash memories and MP3/4 players.

How it Work ?

The basic technique used is as follows: Windows uses the Autorun.inf file on these drives or devices to know which action to take, whenever they are connected to a computer. This file, which is on the root directory of the device, offers the option to automatically run part of the content on the device when it connects to a computer.

By modifying Autorun.inf with specific commands, attacker can enable malware to stored on the USB drive to run ,automatically when the device connects to a computer, it Start Infecting You Computer.

How to Identify ?

Once you connect you are USB Device to a computer , using cmd go through the drive (that u find in mycomputer when u conect it to the system with some identity )

and in cmd type "attrib" command there u will get the properties of the drive and then check autorun.inf file is in drive by typing that file in the cmd, if it is executing (Or) Just type a button and use tab buttton,if it is showing autorun.inf file it means you are USB is Infected