Thursday, January 28, 2010
SOME SECURITY TOOLS yOU MAY NEED TO HACK !!!!
• Nmap
• EtherPeek
• SuperScan
• QualysGuard
• WebInspect
• LC4 (formerly called L0phtcrack)
• LANguard Network Security Scanner
• Network Stumbler
• ToneLoc
Here are some other popular tools:
• Internet Scanner
• Ethereal
• Nessus
• Nikto
• Kismet
• THC-Scan
THESE are some security tools which u may need to protect your system to discovered vulnerabilities PLz dont misuse these
check my posts for latest updates on these tools
Wednesday, January 27, 2010
Ethical Hacking 101
If you perform ethical hacking tests for customers or simply want to add another certification to your credentials, you may want to consider the ethical hacker certification Certified Ethical Hacker, which is sponsored by EC-Council. See http://www.eccouncil.org/CEH.htm for more information.
Ethical hacking and also known as penetration testing or white-hat hacking and involves the same tools, tricks, and techniques that hackers use, but with one major difference: Ethical hacking is legal. Ethical hacking is performed with the target's permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. It’s part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.
To hack your own systems like the bad guys, you must think like they think. It’s absolutely critical to know your enemy
Monday, January 25, 2010
History of India & Republic Day
The whole subcontinent was conquered by the Maurya Empire during the 4th and 3rd centuries BCE. It subsequently became fragmented, with various parts ruled by numerous Middle kingdoms for the next 1,500 years. This is known as the classical period of India, during which India is estimated to have had the largest economy of the ancient and medieval world controlling between one third and one fourth of the world's wealth up to the 18th century.
Much of India was once again united in the 4th century CE, and remained so for two centuries thereafter, under the Gupta Empire. This period, of Hindu religious and intellectual resurgence, is known among its admirers as the "Golden Age of India." During the same time, and for several centuries afterwards, Southern India, under the rule of the Chalukyas, Cholas, Pallavas and Pandyas, experienced its own golden age, during which Indian civilization, administration, culture, and religion (Hinduism and Buddhism) spread to much of Asia.
The southern state of Kerala had maritime business links with the Roman Empire from around 77 CE. Islam was introduced in Kerala through this route by Muslim traders. Muslim rule in the subcontinent began in 712 CE when the Arab general Muhammad bin Qasim conquered Sindh and Multan in southern Punjab,[1] setting the stage for several successive invasions between the 10th and 15th centuries CE from Central Asia, leading to the formation of Muslim empires in the Indian subcontinent such as the Delhi Sultanate and the Mughal Empire.
Mughal rule came to cover most of the northern parts of the subcontinent. Mughal rulers introduced middle-eastern art and architecture to India. In addition to the Mughals and various Rajput kingdoms, several independent Hindu states, such as the Vijayanagara Empire, the Maratha Empire and the Ahom Kingdom, flourished contemporaneously in Southern, Western and North-Eastern India respectively. The Mughal Empire suffered a gradual decline in the early eighteenth century, which provided opportunities for the Afghans, Balochis and Sikhs to exercise control over large areas in the northwest of the subcontinent until the British East India Company gained ascendancy over South Asia.[2]
Beginning in the mid-18th century and over the next century, India was gradually annexed by the British East India Company. Dissatisfaction with Company rule led to the First War of Indian Independence, after which India was directly administered by the British Crown and witnessed a period of both rapid development of infrastructure and economic decline. During the first half of the 20th century, a nationwide struggle for independence was launched by the Indian National Congress, and later joined by the Muslim League. The subcontinent gained independence from the United Kingdom in 1947, after being partitioned into the dominions of India and Pakistan.
Although India obtained its independence on August 15, 1947, it did not yet have a permanent constitution; instead, its laws were based on the modified colonial Government of India Act 1935, and the country was a Dominion, with George VI as head of state and Earl Mountbatten as Governor General. On August 29, 1947, the Drafting Committee was appointed to draft a permanent constitution, with Bhimrao Ramji Ambedkar as chairman.
A draft Constitution was prepared by the committee and submitted to the Assembly on November 4, 1947. The Assembly met, in sessions open to public, for 166 days, spread over a period of 2 years, 11 months and 18 days before adopting the Constitution. After many deliberations and some modifications, the 308 members of the Assembly signed two hand-written copies of the document (one each in Hindi and English) on January 24, 1950. Two days later, the Constitution of India became the law of all the Indian lands. The Constitution of India came into effect only on January 26, 1950. Following elections on January 21, 1950, Rajendra Prasad was elected as the president of India. The Indian National Congress and other parties had been celebrating January 26th as a symbol of Independence, even before India actually became independent. Thus, signing the constitution on January 26, to mark and respect January 26 and the freedom struggle and the freedom fighters.
Granville Austin has described the Indian Constitution drafted by Ambedkar as 'first and foremost a social document.' ... 'The majority of India's constitutional provisions are either directly arrived at furthering the aim of social revolution or attempt to foster this revolution by establishing conditions necessary for its achievement.'
The amending mechanism was lauded even at the time of introduction by Ambedkar in the following words: "We can therefore safely say that the Indian federation will not suffer from the faults of rigidity or legalism. Its distinguished feature is that it is a flexible federation."(CAD VII : 36).
"The three mechanisms of the system derived by the Assembly, contrary to the predictions, have made the constitution flexible at the same time protected the rights of the states. They have worked better than the amending process in any other country where Federalism and the British Parliamentary system jointly formed the basis of the constitution" -- Granville Austin, 1966, 321.
Rashtrapati Bhavan and adjacent buildings, illuminated for the Republic Day, 2008.
What Sir Anthony Eden, the Prime Minister of Britain (April 1955 to January 1957), said at the time of the emergence of Indian Republic is relevant in this context. He said, ‘Of all the experiments in government, which have been attempted since the beginning of time, I believe that the Indian venture into parliamentary government is the most exciting. A vast subcontinent is attempting to apply to its tens and thousands of millions a system of free democracy... It is a brave thing to try to do so. The Indian venture is not a pale imitation of our practice at home, but a magnified and multiplied reproduction on a scale we have never dreamt of. If it succeeds, its influence on Asia is incalculable for good. Whatever the outcome we must honour those who attempt it.’
Even more meaningful was the opinion expressed by an American Constitutional authority, Granville Austin, who wrote that what the Indian Constituent Assembly began was ‘perhaps the greatest political venture since that originated in Philadelphia in 1787.’
"During recent years, it has become fashionable among some citizens to disparage the founders and their document. These individuals disappointed by the developments in the country since 1950, have called for changing the constitution explaining that it has not 'worked'. Such thinking, in my view, is misguided. Constitutions do not 'work', they are inert, dependent upon being 'worked' by citizens and elected and appointed leaders" -Granville Austin
head of state as the chief guest on this day. The strategic importance of any nation as associated by India can be easily seen in this list.
1978 President Dr.Patrick Hillery Ireland
1980 President Valery Giscard d'Estaing France
1985 President Raul Alfonsin Argentina
1986 Prime Minister Andreas Papandreou Greece
1987 President Alan Garcia Peru
1988 President Junius Jayewardene Sri Lanka
1992 President Mário Soares Portugal
1993 Prime Minister John Major United Kingdom
1995 President Nelson Mandela[1] South Africa
1996 President Dr. Fernando Henrique Cardoso Brazil
1997 Prime Minister Basdeo Panday Trinidad and Tobago
1998 President Jacques Chirac France
1999 King Birendra Bir Bikram Shah Dev Flag of Nepal.svg Nepal
2000 President Olusegun Obasanjo Nigeria
2001 President Abdelaziz Bouteflika Algeria
2002 President Cassam Uteem Mauritius
2003 President Mohammed Khatami Iran
2004 King Jigme Singye Wangchuk Bhutan
2006 King Abdullah bin Abdulaziz al-Saud Saudi Arabia
2007 President Vladimir Putin Russia
2008 President Nicolas Sarkozy France
2009 President Nursultan Nazarbayev Kazakhstan
2010 President Lee Myung bak Republic of Korea
Are you going to think about this Really !!
How Hackers Beget Ethical Hackers
We’ve all heard of hackers. Many of us have even suffered the consequences of hacker actions. So who are these hackers? Why is it important to know about them? The next few sections give you the lowdown on hackers.
Defining hacker
Hacker is a word that has two meanings:
• Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically.
• Recently, hacker has taken on a new meaning and someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers). Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable.
The good-guy (white-hat) hackers don’t like being in the same category as the bad-guy (black-hat) hackers. (These terms come from Western movies where the good guys wore white cowboy hats and the bad guys wore black cowboy hats.) Whatever the case, most people give hacker a negative connotation.
Many malicious hackers claim that they don’t cause damage but instead are altruistically helping others. Yeah, right. Many malicious hackers are electronic thieves.
Ethical Hacking
· Understanding hacker objectives
· Outlining the differences between ethical hackers and malicious hackers
· Examining how the ethical hacking process has come about
· Understanding the dangers that your computer systems face
· Starting the ethical hacking process
This book is about hacking ethically and the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them.
Although ethical is an often overused and misunderstood word, the Merriam-Webster dictionary defines ethical perfectly for the context of this book and the professional security testing techniques that I cover and that is, conforming to accepted professional standards of conduct. IT practitioners are obligated to perform all of the tests covered in this book aboveboard and only after permission has been obtained by the owner(s) of the systems and hence the disclaimer in the introduction.