DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


DNS Poisoning Tutorial 3 | Proxy Server DNS Poisoning

DNS Poisoning Tutorial 3 | Proxy Server DNS Poisoning


For this type of DNS poisoning method an attacker sets up a proxy server on his/her system. Then he/she sets up a rouge DNS and keeps its IP address as primary DNS entry in proxy server system. Now he/she has to convince victim to use proxy server set by him/her. Since proxy server has set up a rouge DNS as its primary DNS all requests will pass through it. Since all traffic passes from your system as proxy server you can sniff all traffic between

Andrew Wins BitDefender Anti-Virus

Few days ago I had announced Win An Anti-Virus contest. I am glad to declare that the winner of contest is Andrew. Sorry but Andrew's email address doesn't specify anything about his surname. An email has been sent to Andrew last day but haven't yet got any reply. By the way Andrew have 15 days from today to claim his prize. A BitDefender Anti-Virus would be delivered to his doorsteps when he will reply to email sent to him yesterday. I wish you all best luck for your future. Thanks for reading DEVIL'S BLOG ON SECURITY have a nice time.

DNS Poisoning Tutorial - 2 | Internet DNS Poisoning

DNS Poisoning Tutorial - 2 | Internet DNS Poisoning


Following is our second tutorial on DNS Poisoning which is Internet DNS Poisoning, also known as Remote DNS Poisoning. This type of DNS poisoning can be done over a single or multiple victims and no matter where your victim is in world, the primary DNS entries of his/her system can be poisoned using this method. For this type of DNS poisoning attack you'll have to setup a rouge DNS server somewhere with static IP address and please note that it should be in working condition. Methods of poisoning are different for Windows and Linux systems but happens with help of same entity that is Trojan file.

DNS Poisoning Tutorial - 1 | Intranet DNS Poisoning

DNS Poisoning Tutorial - 1 | Intranet DNS Poisoning


In this post we will discus our very first method of poisoning DNS i.e Intranet DNS poisoning. Intranet DNS poisoning attack is done over a LAN which has been ARP poisoned. Since I 'll not repeat how to poison ARP, please read my previous tutorial on ARP poisoning. For performing this DNS poisoning attack you'll need at least three computers connected in LAN for which a same router, switch or computer should act as gateway and any man-in-the-middle attack tool, for this tutorial I am using Cain And Abel

DNS Poisoning

DNS Poisoning


Before we proceed to DNS Poisoning lets have some look on basics. So lets take look on what is DNS first. You already know internet runs on TCP/IP model or you can say internet protocol stack. TCP/IP stack specifies and uses IP addresses (example : 204.87.98.34) to route data between source and destination computer. Every computer in the world that is connected in network have an IP address. Since remembering IP addresses are difficult each IP address is associated with a name like www.google.com which is also known as domain name. Domain names are easy to remember but original TCP/IP stack needs IP address for communication not the domain name

Packet Sniffing Countermeasures

Packet Sniffing Countermeasures


As told earlier a hub network is more prone to sniffing so its better to use switch instead of hub. Switch will not only reduce chances of sniffing but will also increase performance of network. But switch merely can't act as countermeasure against packet sniffing. As you know if hacker uses ARP spoofing he/she can easily sniff packets from switched network. So a switch can never be a complete solution to packet sniffing. Countermeasure against sniffing also depends upon size of network I.e is your network small as 20-50 computers or its large as 1000-2000 computers or more

Your Safety Over LAN Is Compromised

Your Safety Over LAN Is Compromised


You might be surprised by title of post safety over LAN is compromised. The fact I am revealing here is more surprising than title itself. You work for a company with high reputation in its quality of service and security over network and you feel the LAN you use for communication is safe then sorry you are mistaken. No LAN connection in world is safe enough to protect your privacy. The reason is not hackers using sniffing tools to collect information from network but the network itself is problem since it can be monitored. Network monitoring tools, IDS and firewalls all can sniff packets from network and the worst part they all work from desk of system administrator I.e from main station that provides LAN connectivity to all computers.

Book Review | Object Oriented Programming In C++

Book Review | Object Oriented Programming In C++


Product: Book
Subject: Programming Language C++
Name: Object Oriented Programming In C++
Pages: 1040
Writer: Robert Lafore
Publisher: SAMS
Level: Beginner to Experienced

Want to learn programming skipping C then this book will be really a good choice for you. I don't usually praise any book but this book is worth praise. It can act as both reference as well as tutorial. The book has been designed to make a beginner a crafted programmer. You 'll not just learn C++ but will also learn how to program like a true programmer.

Hack A Hacker Using Sniffer

Hack A Hacker Using Sniffer



Hackers usually use software like RATs and keystroke loggers to hack victim's password. To get logs of victim while being offline, attacker uses a ftp server and if you have read my previous tutorials on sniffing then you might be already knowing that ftp protocol is susceptible to sniffing using this weakness of protocol you can hack a hacker using sniffer.

Book Review | An Intoduction To Keyloggers RATs And Malware

Book Review | An Intoduction To Keyloggers RATs And Malware


Product: Book
Subject: Malware
Name: An Introduction To Keyloggers RATS And Malware
Pages: 75
Writer: Rafy Baloch

I think this is third product from Rafay. If you have been online for searching about hacking you might already be knowing about Rafay's blog which is one of the well known blog's on security online and have page rank 4. As a hacker when I read any book I love to read deeper descriptions and brief detailing but that was not this book was all about. The book aims complete beginners, so if you are a pro thinking you'll find algorithms and details about how to code malware then you'll surely meet disappointment because book is not for experienced or seasoned coders.

Book On C Programming Language

Book On C Programming Language


As a hacker there is real hot need for you to know programming. And there's no better programming language to start than C programming language which is still considered as mother of all other programming languages. But I am still confused to suggest from which book you should start your journey since the books I have read so far on C programming languages aren't that complete to give a novice a good start.

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security