Social Icons

Wednesday, October 09, 2013

Dual Boot Mobile Phone : Ubuntu and Android

1.   Any time we speak about dual boot,it is a understood fact that we are speaking about a desktop or a laptop device...but what if there is a third answer to this....a MOBILE Phone!!!!!surprise surprise surprise..:-)...read on for what’s  in store ahead...

2.    Well...the first time I read about this concept...that says like you have the typical android OS for being used as a smart phone but in addition you can boot the same device with UBUNTU to get the desktop experience as u insert it in the dock....I was excited to know more and few facts after googling have emerged out as bought out below.


3.  The first Ubuntu smartphone has been announced by Canonical . Under the project code named Ubuntu Edge,the phone has almost everything that we don’t normally see.But first, Canonical wants to raise $32 million (21.5 million pounds) on Indiegogo to build this. The company is asking prospective consumers to put in money for it to make an Ubuntu phone and it is hoping to do it in 31 days.  At the time of writing this, it had already raised over $12,814,196.Details at http://www.indiegogo.com/projects/ubuntu-edge



4.  The phone is likely to go on sale in May 2014 and the brief specs out are as follows :

    Dual boot Ubuntu mobile OS and Android
    Fully integrated Ubuntu desktop PC when docked
    Fastest multi-core CPU, 4GB RAM, 128GB storage
    4.5in 1,280 x 720 HD sapphire crystal display
    8MP low-light rear camera, 2MP front camera
    Dual-LTE, dual-band 802.11n Wi-Fi, Bluetooth 4, NFC
    GPS, accelerometer, gyro, proximity sensor, compass, barometer
    Stereo speakers with HD audio, dual-mic recording, Active Noise Cancellation
    MHL connector, 3.5mm jack
    Silicon-anode Li-Ion battery
    Form Factor : 64 x 9 x 124mm



3.   Not just Android with Ubuntu,infact Microsoft has approached HTC with a plan to load Windows Phone 8 onto its Android handsets as a way to give consumers more than one platform option on their devices. In exchange for loading Windows Phone onto Android handsets, Microsoft would consider waiving licensing fees for using the mobile operating system, Amazingly, HTC is apparently warm to the idea and is pondering the logistics of making a dual-boot Windows-Android handset.

4.  So it is a welcome concept overall.But then from a security point of view the user will have to handle two attack surfaces in form of the two boot options.More details at the following links :

http://www.indiegogo.com/projects/ubuntu-edge


Saturday, October 05, 2013

My Blog Reaches 1,00,000 ie 1 Lakh hits : STATISTICS here

1.   I have been blogging for around 6 years now and the journey has been amazing.I got into blogging without knowing any thing about traffic and readers and then maintaining a blog when you are working also is at times difficult.This actually means the time you could have spent with your family is being spent on blogging.But then as we say "Purpose is the reason you journey and Passion is the fire that lights your way."...and so has been applicable to me.Simply the passion to study and share IT and experiment with tools and researches has been the force for my energies being put in here.I bring out the stats here of the 1 Lakh hits from Google Analytics.

ALL STATS HERE HAVE BEEN TAKEN FROM GOOGLE ANALYTICS

COUNTRY WISE HITS RECORDED
 
BROWSER STATS OF THE USERS WHO HIT IT


 OPERATING SYSTEM DETAILS OF USERS WHO HIT IT



  THE ASCEND OF OVERALL HITS SEEN RISING 2007 ONWARDS


THE GOOGLE ANALYTICS INTERFACE



BLOG SCREEN SHOT SHOWING THE VISITANTS

Friday, October 04, 2013

BACKTRACK 5 R3 : ReverseRaider

1.   This post will brief on a tool known as Reverse Raider available in the information gathering menu drop down in Backtrack 5

About the Tool 

2.   ReverseRaider is a domain scanner that uses various techniques, such as wordlist scanning to find target's subdomains or reverse resolution for a range of ip.It's fully multi-threaded and supports permutation on wordlist, IPv6 and various DNS options (e.g. no-recursion).

3. Developed by  Acri Emanuele at crossbower@gmail.com

Usage: reverseraider -d domain | -r range [options]
 
Options:

  -r    range of ipv4 or ipv6 addresses, for reverse scanning
        examples: 208.67.1.1-254 or 2001:0DB8::1428:57ab-6344
  -f    file containing lists of ip addresses, for reverse scanning
  -d    domain, for wordlist scanning (example google.com)
  -w    wordlist file (see wordlists directory...)
 
Extra options:
  
  -t    requests timeout in seconds
  -P    enable numeric permutation on wordlist (default off)
  -D    nameserver to use (default: resolv.conf)
  -T    use TCP queries instead of UDP queries
  -R    don't set the recursion bit on queries

4.   Most of the  DNS enumeration scripts available in backtrack focus on typical DNS but reverseraider does what it sounds like it might do which is enumerate reverse DNS names. Enumerating reverse DNS on an IP or set of IP’s can sometimes reveal information you did not previously have. It is possible to be targeting a web server that has a bunch of virtual hosts and you prefer to track down primary web site on the web server which is where reverseraider may provide the results necessary as it is more likely that the most important site on the virtual web server has reverse DNS configured on the host itself. 


This post gives an excellent description with details of three methods of using reverseraider.


Thursday, October 03, 2013

BACKTRACK 5 R3 : LBD [ Load Balancing Detector ]

1.   Before we start working on this tool,we need to first get clear of what exactly is Load Balancing?

2.    Load balancing is a method to distribute workload over multiple computers , network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid overload. So before any one performs a penetration test, some recon work needs to be done on the target domain to make sure it does not have the ability to misdirect any probes and attacks.

About the Tool : LBD


3.   LBD (Load Balancing Detector) is a small script that tells if a given domain uses DNS and/or HTTP Load-Balancing (via Server: and Date: header and diffs between server answers). The main purpose of the tool is to check if the given domain uses load balancing.In other words when a server uses load balancing to distribute its work load over multiple systems, it should not get clogged up with excessive requests that prevents disruptions. This will mostly be applicable to renowned websites to reduce their system workload and to prevent malicious DOS attacks.

Usage : ./lbd [Domain]

4.    I could not find any switch option that can be used with the command ....so the usage is simple....I have tried this on two sites : certifiedhacker.com and dvwa.co.uk.Screen shots of the results obtained are seen below :




Wednesday, October 02, 2013

BACKTRACK 5 R3 : FIERCE

1.  What's in a name ? But here when the name of the tool is FIERCE...it has the potential to grab eyeballs....about FIERCE first....Fierce is a perl script written by RSnake and helps at the first steps of a pentesting ie the reconnaissance. The focus of any pentester  is to gather as much info as possible about the target before starting the attack.Exactly like earlier tools discussed in the Information Gathering drop down of Backtrack 5 R3,FIERCE is used for DNS Enumeration and is a great tool for discovering non-contiguous IP address for a certain company. It is difficult to discover and gather information about a company network which is non-contiguous using traditional tools. Though we can use a normal scanner against an IP range, but if the IP ranges are nowhere near one another there may be chance of missing chunks of networks. For this type of situation FIERCE is used.The following is the working process of FIERCE.

First it asks DNS for the DNS servers of the target. If DNS server of target is misconfigured then fierce attempts to dump the SOA records for the domain. If it fails then it attempts to "guess" names that are common amongst different companies using bruteforce.

2.   The info gained from this tool FIERCE can be used by subsequent tools to be used like nmap, unicornscan, nessus, nikto, etc, since all of those require that you already know what IP space you are looking for.  This does not perform exploitation and does not scan the whole internet indiscriminately.  It is meant specifically to locate likely targets both inside and outside a corporate network.  Because it uses DNS primarily you will often find mis-configured networks that leak internal address space. That's especially useful in targeted malware.

SYNTAX :  perl fierce.pl [-dns example.com] [OPTIONS]  

3.  The switches that can be used with this command are shown in the screen shot below :
(Click on the Image to enlarge)
4.    So I tried running the tool on certifiedhacker.com & dvwa.co.uk and the output is shown below vide a screen shot :

certifiedhacker.com
(Click on the Image to enlarge)
dvwa.co.uk

(Click on the Image to enlarge) 
(Click on the Image to enlarge)
This info will be good enough to march ahead from a pen tester point of view!!!!!!

BACKTRACK 5 R3 : dnswalk

1.   In this post I am going to show how the dnswalk works.Before you use this tool...there is a small twist to the tale...almost all users who use this command will invariably get the message " You will have to enable the component called 'universe'"....and for this..so to resolve refer my immediate earlier post here.First lets see what are the features of this tool...what actually it does and what is the syntax ?

Main Features :
 
2.    Dnswalk is a DNS debugger. It performs zone transfers of specified domains, and checks the database in numerous ways for internal consistency, as well as accuracy. Dnswalk should NOT be used without a firm knowledge of the DNS RFC's. The warnings and errors must be interpreted within the context they are being used. Something may be flagged as a warning, but in reality it is a really bad error. Conversely dnswalk will flag things as warnings and possibly even errors, but they may actually be perfectly "legal" or normal in your specific situation. Dnswalk is not an AI engine. It just provides useful information which you need to interpret.

3.   Another important thing about the tool is w.r.t the syntax.The domain name specified on the command line MUST end with a '.' ie a dot.If u simply type in man dnswalk at the terminal,you will most of the info than I have bought here...The syntax and the switch functions are briefly bought out here :

SYNTAX : dnswalk [ -adilrfFm ] domain.

-r = Recursively descend sub-domains of the specified domain. Use with care.
-a = Turn on warning of duplicate A records. (see below)
-d = Print debugging and ‘status’ information to stderr. (Use only if redirecting stdout) See DIAGNOSTICS section.
-m = Perform checks only if the zone has been modified since the previous run.
-F = perform “forced” checking. When checking an A record, compare the PTR name for each IP address with the forward name and report mismatches.
-i = Suppress check for invalid characters in a domain name. (see below)
-l = Perform “lame delegation” checking. For every NS record, check to see that the listed host is indeed returning authoritative answers for this domain.

Below I have bought out few screen shots on how the command may be used and what it brings out.I have used two domains for practise here.One is certifiedhacker.com and iitk.ac.in.The former does not bring out much but the latter brings out more info that I find amazing......so the first command tries to find zone transfer records of the target domain.

Command : dnswalk -r iitk.ac.in.
(Click on the Image to Enlarge)
(Click on the Image to Enlarge)
This command with other switches can be used in the same manner as shown above with the following switch combinations :

dnswalk -i iitk.ac.in.

Turns on warning of duplicate A records

dnswalk -a iitk.ac.in.

Performs debugging on the site

dnswalk -d iitk.ac.in.

Checks whether the domains are been modified are not

dnswalk -m iitk.ac.in.

If you wish to perform all the above things through single command line argument you can type the following.The same is shown in the screen shot subsequently

dnswalk -riadmfl iitk.ac.in.

(Click on the Image to Enlarge)
(Click on the Image to Enlarge)
....and for a website that shows no result like certifiedhacker.com.....the screen shows the answer
(Click on the Image to Enlarge)



[SOLVED] : You will have to enable the component called 'universe' backtrack

1.  In my attempts to try few tools like dnswalk and fierce...I used to see these messages that read like :

you will have to enable the component called 'universe'

Click on the image to Enlarge
So after many attempted failures that I am not going to share here...I am bringing out steps on how to resolve and start using the tools....
Click on the image to Enlarge
So the first command is to install synaptic that you can simply do by typing the following command as shown in the screen shot above :

apt-get install synaptic

Click on the image to Enlarge
After synaptic is installed you need to install gdebi by typing in the following command as shown in the screen shot above :

apt-get install gdebi

Click on the image to Enlarge

Click on the image to Enlarge
 Now after installing these two tools synaptic and gdebi,you have to follow the screen shots..Go to Systems > Administration > Synaptic Package Manager

Click on the image to Enlarge
 As the Synaptic Package Manager window opens up...go to Settings > Repositories
Click on the image to Enlarge
Then you see this...all the check boxes will be disabled as default as seen in the screen shots below :
Click on the image to Enlarge
 Just check all of them and click close
Click on the image to Enlarge
 Then click on Reload and you will see the downloading Package Information window as seen below :
Click on the image to Enlarge
 Then you simply reboot and try installing dnswalk...no issues...and you see going ahead with success...
Click on the image to Enlarge