Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

Friday, 9 January 2015









INTRODUCTION

Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti, although recently it has become a means to spread messages by politically motivated "cyber protesters" or hacktivists.


Why Do They Deface? 

Websites around the Web are being defaced on a large scale. They aren't being defaced to earn money or some personal profit. In most of the cases, Hacktivists around the Globe target random websites of particular group or country to show their protest against them. What they actually do is replace the Existing page on website with their own Page which often shows the Pseudoname Of the Hacker with a protesting / defacement reason.

Who Is a Defacer?

A defacer is someone who doesn't really care which site they attack; their main aim is simply to find and exploit a vulnerability on a server and then either replace the website content, or upload a file indicating that they were there. No one really knows why defacers do this, as there is no monetary gain. However, a look at some of the exploit archives indicates that different defacements groups are competing against each other. I would say that "real" hackers don't attack random sites, but rather use their knowledge to conduct targeted attacks.



How Is it done?

As I have mentioned, the defacers aren't selective in their targets; in most cases they just use automated tools to find vulnerable servers, and automatically exploit them. The exploit automatically uploads a backdoor to the compromised server which will provide, for example, shell access to the compromised server. The defacer can launch further attacks via the backdoor, such as trying to escalate privileges using local kernel exploits, or reporting the compromised server to a defacement archive. These backdoors are also sold on the black market, enabling buyers to, for example, turn a compromised server into a node in a DDoS network, or use it as spam relay host.

They have scanners that will find vulnerable servers to exploit and then will upload backdoors and some of the scanners also report the defacements to Sites like zone-h.org...


What are the tools they use?

The tools defacers use to find new vulnerable servers mainly check for two types of vulnerabilities: Remote or Local File Include vulnerabilities. Here's a partial list of such free tools, all of which are publically available:
  • LFI intruder
  • VopCrew IJO Scanner v1.2
  • Single LFI vulnerable scanner
  • SCT SQL SCANNER
  • Priv8 RFI SCANNER v3.0
  • PITBULL RFI-LFI SCANNER
  • Osirys SQL RFI LFI SCANNER
  • FeeLCoMz RFI Scanner Bot v5.0 By FaTaLisTiCz_Fx

How To Prevent Defacement?

The reason behind defacement is not just weak security, but also the ignorance. Many Admins doesn't know the importance of keeping a system up to date and secured.Another major issue is that administrators automatically assume that Linux/Unix is more secure than Windows, and simply don't do any local hardening, or configuration.Proper configuration can more or less eliminate certain types of exploits. For instance, many of the exploits mentioned in this article are "File Include" type vulnerabilities, which enable an attacker to include any arbitrary file he wants; in some cases these files can be from external websites. Simply specifying which directory a specific web application or website is allowed to include files from will effectively protect against this type of exploitation.

               For Educational Purpose Only | I don't support unethical activities :)

Read More

Friday, 28 November 2014

   SHOPPING ADDICTS BE CAREFUL !!! 








Christmas is near. Holidays are near. Great Deals are near. It's the best time for shoppers and the retailers. But unfortunately it's a great time for Cyber Criminals too.

With Black Friday (28th November 2014) and Cyber Monday (1st December 2014) coming up, you need to be more careful while shopping. These are the two very busy shopping days where shoppers spend a lot of their time online.



Every eye will be on retailers to ensure that consumers' online shopping experiences are straightforward and, most importantly, Secure. So, at the major part, retailers need to pay attention to extra security measures in order to prevent themselves from massive data breaches, like Target data breach that occurred last year during the Black Friday sales in which over 40 million Credit & Debit cards were stolen.

To prevent yourselves from getting in a trap like that, you must know about the top scams.

1. COPYCAT & FAKE WEBSITES


In order to get an account holder's financial information, Hackers will try all the ways possible. They might set up a fake site that will just look like a genuine site. They will have fake security seals and will show up high ratings, but in reality they are getting your attention towards them and forcing you to enter your details. So to prevent these type of scams, go for the the famous sites or which are run by some famous company. Most importantly check that the website is running over HTTPS. 


2. PHISHING WEBSITES


This scam is a very famous one. It's like you get an E-mail from somebody with a URL asking you to open and register an account. The advertisement will be very attractive. You open the page. The page just looks like a real site but unfortunately it's not real. The design is same but the source code or the functions defined are different. Once you provide your details, It won't login, Instead It will send your details to the hacker. So to protect these type of attacks, always check the URL of the site you are visiting. And for double check, check the name of the site on GOOGLE search.

3. Gifts Scam


This works in most cases as they attract many people by providing exciting deals. Customers will be given many free coupons and gift vouchers for visiting a page and registering to their site. So, most of the shoppers will get attracted and will want to get the best deals to get free gift or save money. But this free gift will cost very costly. It will take you to a Phishing site or will force you to download some dangerous unwanted Trojans to record your activities... 



So at last, I just want to conclude that It's time to shop people. Go on. But be smart, be safe. You must expect them anywhere, anytime. :) 


♥♥♥Find me On Facebook♥♥♥ 

Read More