Sunday, 27 December 2015

Shortcut Virus

Overview

USB Drives, especially those which we used on public computers such as in schools, Internet cafes, hotels etc. are very susceptible to contamination by viruses present on other users of the machine devices. One of the most common is the “shortcut virus” that creates many unwanted icons on your USB device while hidden files that really matter; hindering or even preventing, the access to them.
The first thing to notice if you had installed the shortcut virus in your system is that it will be not get removed by your normal antivirus scanning it’s somehow stubborn. Shortcut virus usually creates the shortcut files, for example, Notepad. Shortcut etc. So if you see such shortcut files in your Computer or Pen drive then this are the sure signs that your computer or pen drive contains the stubborn Shortcut virus. This is a kind of virus which will not get detected by normal antivirus.

So how to remove shortcut virus

You can remove Short virus by using you command prompt or by installing a software.

  • Using CMD to remove shortcut virus.

1. In order to remove your shortcut virus with the help of your command prompt system, you need to follow the steps ahead

Wifi Hacking With Pixie Dust Attack

Overview

In this tutorial we are going to do a pixie dust attack using Reaver 1.5.2, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When a wireless router is vulnerable for this attack retrieving the passphrase can be done in seconds. A link to the list of pixie dust vulnerable routers is included at the bottom of this tutorial.

Let's Start Pixie Dust Attack

Wi-Fi interface in monitoring mode using airmon-ng start wlan.

If necessary kill the processes Kali is complaining about:


For anyone getting the following error in Kali Linux 2.0 Sana:
[X] ERROR: Failed to open ‘wlan0mon’ for capturing

Try the following as a solution:

Sql Injection

Overview

A "SQL injection" attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.

History

Ever since the advent of the computer, there have always been people trying to hack them.  William D. Mathews of MIT discovered a flaw in the Multics CTSS password file on the IBM 7094 in 1965; John T. Draper ("Captain Crunch") discovered a cereal toy whistle could provide free phone calls around 1971; The Chaos Computer Club, the Cult of the Dead Cow, 2600, the infamous Kevin Mitnick, even computing godfather Alan Turing and his World War II German Enigma-cipher busting Bombe, all and more have participated in hacking computers for as long as computers have existed.

Monday, 21 December 2015

Buffer Overflow

 

Overview

A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer. In this case, a buffer is a sequential section of memory allocated to contain anything from a character string to an array of integers. Writing outside the bounds of a block of allocated memory can corrupt data, crash the program, or cause the execution of malicious code. 

Description

Buffer overflow is probably the best-known form of software security vulnerability. Most software developers know what a buffer overflow vulnerability is, but buffer overflow attacks against both legacy and newly-developed applications are still quite common. Part of the problem is due to the wide variety of ways buffer overflows can occur, and part is due to the error-prone techniques often used to prevent them.