Monday, March 11, 2013

Back track 5R3

Hello Guys

From last couple of days I was using BT5R3 Linux as my host machine. And I found that its very fantastic OS for Pen test.

I m sharing some of latest tool which is used for pen test.
This has been a great experience for me.

BT5r3 was released on August 2012.
Some tools added into this OS is mobile penetration testing, GUI based wifi-tools, and some physical exploitation.

List of new tools introduced in BT5r3 :-

dnamp
websploit
wifite
dhcpig
smart-phone-pentest
fern-wifi-cracker
powersploit
apktool
android-sdk
urlcrazy
web-handler
jigsaw, etc....

Lots of tools has been added into this new version.

I used many of this tools and discuss some out of them.

Fem-Wifi-cracker :- 

This tool is written in python which provides GUI interface for cracking wireless network. Generally, you need to run some command to do this like airplay-ng, airodump-ng, aircrack-ng for cracking wireless network. but this tool provide you GUI base environment to crack the wireless network.






Sunday, March 10, 2013

My Favorites

My Favorites 
*******************************************************************

Favorites Hero and Heroine :- 
My Parents. Love u mummy and Papa.


*******************************************************************
My favorite Songs :-
--




*********************************************************************
Favorites Serial :- 
-- Bade Acche Lagte hai....
-- Kya hua tera vada...
-- Devon k dev mahadev



*********************************************************************
Favourite Quate :-

-- "When you wait for someone for a few minutes, its you "NEED". for a few hours, its your "TRUST". For few weeks, its your "FRIENDSHIP" But when you wait ever though you know they won't come its "TRUE LOVE"

-- "Love has nothing to do with what you are expecting to get - only with what you are expecting to give - which is everything."

-- Jab sapne tut te hai tab Jindgi ki shuruaat hoti hai....
Strange but true....

-- "Every Problem in life has a gift inside...So don't get upset when you face problem.. It may have more beautiful ending than your expectation..." 

-- "Everyone says you only fall in love once, but that's not true because ever time i see you I fall in LOVE all over again.."




Script for Mid sem Review


Good morning sir and all

My self Bhadreshsinh Gohil Enrollment number is 111060751030.
I m going to present my thesis on Federated Network Security Administration Framework.
My guide is Dr. Sandeep K. Joshi, Rishi K. Pathak, Swarup sir from C-DAC, Pune.

I m stating my speech with Introduction of Web application.
Now a days Web applications are the heart of all business. We can see that most of the business in the world are depend on web. All the field in the world connected with some web application like hospital, government web site, all businesses, banks, education, Multi national corporation, ISP, Defenses.
So we can says that web application is the heart of all the field.

But due to increase of internet into this world. Now a days security is the major concerns for this all web sites which is public ally hosted.
Now I m going to show you last year web attack on web site.
Attacks in 2012.
I m going fast in this attacks because of time limit.
The first news is FB helps FBI shut down Butter fly botnet.

Next one is Yahoo mail haijacking explits. Next one......

So this all are the latest attack which was occurred in 2012.

For this reason hosting a web application into public zone it is very risky. To resolve this risk, It is good to develop one framework to remove all this vulnerability and than hosting this web application into public zone[DMZ zone].The proposed system is designed for finding vulnerability into web application using OWASP (Open Web Application Security Project).

This is my objective of thesis.

Now I m going to show you Literature survey of this thesis.



















This all are my references.
And This is my acknowledgment to my guide for help me during this semester.

Thank you.
Any question ???

Thursday, March 7, 2013

report for DP 2

Hi

This section contain my report skelton and presentation for my Dissertation.

Exam related :-

Students should present :
 Concise Literature Review
 Justification for their topic
 Objective and Scope
 Previous Review comments
 Work Done; Results; conclusions if any
 PhD students: Work Plan; ME Students: Submission plan
 Presentation time per student : 15 min. & Question Answer time : 10 min




Title page :- 
Federated Network Security Administration Framework

Certificate :-

Industry Certificate :-

Declaration :-
:

Dedicated to :- My parents

Acknowledgments :-

Table of content :- 

Abstract :-


In today’s world, Internet is now ubiquitous. Internet-based services touch all aspects of our daily life in modern society. Since the Internet and World Wide Web enabled an information explosion, security issues of websites that publish the online information become more and more crucial.  So As per above motivation of hosting a website in Public IPs resulted in implementation of security devices and controls like firewalls, routers etc. 

To resolve this security issue, it is proposed to build a framework which contain vulnerability assessment of web application and after fixing all this vulnerability, this web service ready to host into public environment. This thesis presents the process of how to put web application into secure zone means put website into DMZ after fixing all vulnerability.The proposed system is designed for finding vulnerability into web application using OWASP (Open Web Application Security Project).

Introduction :-
-- Chapter overview
-- Defination and abbreviations
-- Research motivation
-- Overview of research model
-- Overview of research approach
INPUT >>> PROCESS >> OUTPUT
-- Outline of thesis chapters

Chapter            Chapters                         Chapter Outline


No.



Litrature survey :-

Analysis :-
-- OWASP Top 10 vulnerability for 2013
--

Project Planning :-
-- Project scheduling
Table :-
ID              Task                                                     Duration          Start                 End
1                 Preparing Problem statement                                       17 Sep 2012 |  22 Sep 2012
2                 Understanding general requirement                             24 Sep 2012 |  6 Oct 2012                                      
3                 Meeting with guide                                                      8 Oct 2012   |  13 Oct 2012                            
4                 Literature Review                                                        15 Oct 2012 |  1 Nov 2012                          
5                 Implementation                                                             5 Nov 2012 |  5 Feb 2013                              
6                 Testing                                                                          6 Feb  2013 |  30 March 2013                                
7                 Writing project report                                                    1 April 2013 | 25 April 2013                                          
8                 Preparing Presentation                                                   26 April 2013 | 10 May 2013                                        

-- Project Plan
-- Refining the Project
-- Controlling the project
-- Project Diary
--

Project management :-

Implementation strategy :-
-- Implemantation tools and Environement
-- Customization
-- Work flow
-- Testing

Methodology and Proposed system :-
-- Overview
-- Project Scheduling - Gantt chart [ First Draft]
-- Project Scheduling - Gantt chart [ Revised]
-- Project Scheduling - Gantt chart [ Showing task's progress]
-- Project Scheduling - Gantt chart [ with milestone]
-- Use Case Sample [ Diagram ]
-- Use Case Model [ Sample 1]
-- Testing process Activity diagram


Tables
-- Project Prioritization Template
-- Project Prioritization Sample
-- Project Scheduling - Bottom up - First attempt
-- Project scheduling - bottom up - continued
-- Chosing a method
-- Choosing a implementation tool
-- Test case sample


Exploit diagram :-



Conclusions :-

References :- 

Appendix A :- 

Appendix B :- 

http://ijcsmc.com/docs/papers/March2013/V2I3201315.pdf :- Published paper in jounals.











Rough work :-

Steps for making Gantt chart :-
- understanding the problem area
- Litrature review
- Requirements managements
- Analysis 
- Design
- Implementation
- Test
- Project report
- Presentation





Scanning tools :-

Netsparker, SQLMap, Nikto, Burp suit, NMAP, NESSUS, Metasploit, OpenVAS, OSSIM, NTO objective,W3af[web application attack and audit framework], IBM app ratinal scan, Pantera, Wikto, Retina, Microsoft base analyzer, SAINT, hack alert, 


Abstract from IEEE :- 

This paper first investigates and analyzes security holes concerning the use of server-side includes (SSI) in some of the most used Web server software packages. We show that, by exploiting features of SSI, one could seriously compromise Web server security. For example, we demonstrate how users can gain access to information they are not supposed to see, and how attackers can crash a Web server computer by having an HTML file execute a simple program. Such attacks can be made with no trace left behind. We have successfully carried out all the attacks described in this paper on dummy servers we set up for this investigation. We then suggest several practical security measures to prevent a Web server from such attacks

Today's combat zone for both ethical and unethical hackers is the web. Rapid growth of web sites and web applications gives way to deliver complex business applications through the web. As the web dependency increases, so do the web hacking activities. Web applications are normally written in scripting languages like JavaScript, PHP embedded in HTML allowing connectivity to the databases, retrieving data and putting them in the WWW site. A web application is vulnerable to many kinds of threats and attacks. In order to detect known attacks, some set of attack rules and detections are needed. In this paper, a negative security model based on misuse of web applications is used. This negative security model provides a Web Application Firewall(WAF) engine with a rule set, to ensure critical protection across every web architecture. WAFs are deployed to establish an increased external security layer to detect and/or prevent attacks before they reach web applications. This paper has been tested with apache web server's log file. We have tested successfully almost all the common attacks. This paper also allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.

Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom Web-based applications may introduce vulnerabilities that are overlooked even by the most security-conscious server administrators. Consequently, Web servers are a popular target for hackers. To mitigate the security exposure associated with Web servers, intrusion detection systems are deployed to analyze and screen incoming requests. The goal is to perform early detection of malicious activity and possibly prevent more serious damage to the protected site. Even though intrusion detection is critical for the security of Web servers, the intrusion detection systems available today only perform very simple analyses and are often vulnerable to simple evasion techniques. In addition, most systems do not provide sophisticated attack languages that allow a system administrator to specify custom, complex attack scenarios to be detected. We present WebSTAT, an intrusion detection system that analyzes Web requests looking for evidence of malicious behavior. The system is novel in several ways. First of all, it provides a sophisticated language to describe multistep attacks in terms of states and transitions. In addition, the modular nature of the system supports the integrated analysis of network traffic sent to the server host, operating system-level audit data produced by the server host, and the access logs produced by the Web server. By correlating different streams of events, it is possible to achieve more effective detection of Web-based attacks.

http://projects.webappsec.org :- references for web application security.


Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability."




Important website

http://about.me/bhadu.gohil
*******************************************************
https://code.google.com/p/pentest-bookmarks/wiki/BookmarksList :-

http://learninglinuxkernel.in/

http://www.cs.bgu.ac.il :-

http://nptel.iitm.ac.in/ :-

http://www.youtubetopmovie.com :-

http://viooz.co/ :-

http://bhushan.quora.com/50-Top-Sources-Of-Free-eLearning-Courses

http://learninglinuxkernel.in/ :-

http://tldp.org/LDP/lkmpg/2.6/html/lkmpg.html#AEN189 :-

http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/ :-

http://anaturb.net/C/string_exapm.htm :-



http://www.og150.com/tutorials.php :-

https://www.udemy.com/ccna-boot-camp/ :-

https://www.defcon.org/html/links/dc-torrent.html :-



http://www.symantec.com/connect/blogs/2013-first-quarter-zero-day-vulnerabilities  :-

http://www.hackersonlineclub.com/

http://www.svpublishers.co.uk/

http://www.1337day.com/



http://bitcyber.wordpress.com/2013/04/22/the-internet-security-threat-report-2013/

http://www.cppinstitute.org/

https://hackmiami.com/

http://www.gyaanexchange.com/ :-

http://www.gyaanexchange.com/offline/new-delhi/technology/development/python-course/ :-

http://openbookproject.net/thinkcs/python/english3e/ :-



http://vsphere-land.com/tag/security :-

http://www.athcon.org/archive.php

http://www.infosecinstitute.com/ :-

http://www.shodanhq.com :-

http://www.techgig.com/ :-

http://www.infosecurity-magazine.com :-



http://www.coresecurity.com/grid/index-corelabs-projects :-

http://www.leettips.org/2013/02/top-10-free-python-pdf-ebooks-download.html :-

hacksys.vfreaks.com/research/shellcode-of-death.html :-






http://www.apress.com/ :- for books.



http://labs.securitycompass.com  :-

https://www.hacking-lab.com/caselist/  :-

http://www.crypt.gen.nz/papers/infosec_guides.html :-

http://www.filmhill.com/ :- for movies.

http://www.osalt.com/ :-

http://gns3vault.com :-




http://www.isecom.org :-

http://resources.infosecinstitute.com :-

http://www.ijceronline.com/ :- For paper submision.

http://www.ijoart.org :- paper submussion

http://seternity.com/ :- Blog for linux kernel.

http://www.linuxforu.com :- Magazines.

http://wordpress.com :- For posting blogs.

http://www.ijcsmc.com :- international journal for paper.

https://www.trustwave.com/sae_sample/owasp-top-10/CourseFiles/Player.htm :- OWASP video for learning.

https://www.trustwave.com/sae_sample/owasp-top-10/Start.htm :- OWASP video.

http://pentestlab.wordpress.com/ :- Pen test lab.

http://resources.infosecinstitute.com/ :- latest tutorial used for practical purpose.
http://resources.infosecinstitute.com/backtrack-5-r3-walkthrough-part-2/ :-

http://searching-eye.com./ :- IIT student web site.


http://www.chmag.in/article/mar2013/ironwasp-series-part-%E2%80%93-1 :-


https://pentesterlab.com/web_for_pentester.html :-


http://www.upsc.gov.in/questionpaper/2012.htm :-

http://www.techzoom.net/publications/0-day-patch/index.en :-

 http://johnny.ihackstuff.com/ :-

http://www.exploit-db.com/webapps/ :-


https://www.us-cert.gov :-

http://www.muppetlabs.com/~breadbox/txt/rsa.html
This website is used for :-
Prime Number Hide-and-Seek: How the RSA Cipher Works


http://emkei.cz/
This is used for send fake e-mail to anyone from any e-mail ID

http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines :-

http://www.anobii.com :- this website is used for e-book searching. :-

http://pentestlab.wordpress.com/2013/01/13/detecting-web-application-firewalls/ :- used for detecting web application firewall.



http://www.oissg.org/issaf :- The Information Systems Security Assessment Framework (ISSAF) 


http://www.linuxjournal.com/content/python-scripts-replacement-bash-utility-scripts :-

https://www.coursera.org/course/sdn :- learning video.

http://www.windowsecurity.com :- for windows security.

http://www.windowsnetworking.com/  :- For windows networking.

http://www.virtualizationadmin.com/ :- for virtualization.

http://www.msexchange.org/ :- Microsoft exchange server.

http://securitytube-training.com :- For  security trainig.

http://yehg.net/ :- Security research group.


http://www.scmagazine.com.au/News/329525,pen-tester-launches-infosec-bootcamp.aspx





https://www.coursera.org/courses :- online university.

http://cyfor.isis.poly.edu :- learning for all hacking stuff.

https://www.brighttalk.com :- Bright talk for web seminar.

http://labs.alienvault.com/labs/index.php/2007/tutorial-3-first-recommended-steps-after-installation/ :- OSSIM doc.

http://www.certificationking.com/ :- for all doc.


http://www.manvswebapp.com/ :- mAN VS WEB.

http://www.visatvs.in :- used for showing live tv.
http://live-online-tv.net :- for live tv.


http://www.hackthissite.org/pages/index/index.php :- Training for hackers.

http://en.wikipedia.org/wiki/Aaron_Swartz :- view from one hacker.

http://www.alienvault.com/AV1/solutions/unified-security-management-platform/index.html :- used for uni

http://jobs.nullcon.net/ :- searching for jobs in security filed.

http://www.websoleducation.com/ :- Websol Education provides professional training for ASP.NET, VB.NET, C#.NET, SQL on live projects.

http://cocss.svitvasad.ac.in/index.html :- SVIT,Vasad for paper publication in Master.

https://www.corelan.be

https://www.virustotal.com/en/

http://www.desirulez.net/



https://github.com/ikotler/pythonect/wiki/Pythonect-Tutorial:-Learn-By-Example :-

https://pentesterlab.com/exercises :-

http://www.hackersh.org/ :-


http://blackhat.com/us-13/training/ios-application-hacking%E2%80%93pentesting-mobile-apps.html :-