More

Pages

Saturday, 25 May 2013

Types of Attacks on Web Servers

Types of Attacks on Web Servers

Some of the more popular attack methods are described below.

FTP Bounce Attack

FTP (File Transfer Protocol) is used to transfer documents and data anonymously from local machine to the server and vice versa. All administrators of FTP servers should understand how this attack works. The FTP bounce attack is used to slip past application-based firewalls.

In a bounce attack, the hacker uploads a file to the FTP server and then requests this file be sent to an internal server. The file can contain malicious software or a simple script that occupies the internal server and uses up all the memory and CPU resources.

To avoid these attacks, the FTP daemon on the Web servers should be updated regularly. The site FTP should me monitored regularly to check whether any unknown file is transferred to the Web server. Firewalls also help by filtering content and commands. Some firewalls block certain file extensions, a technique that can help block the upload of malicious software.

Port Scanning Attack

A port scan is when someone is using software tosystematically scan the entry points on other person’s machine. There arelegitimate uses for this software in managing a network.

Mosthackers enter another’s computer to leave unidentifiable harassing messages,capture passwords or change the set-up configuration. The defense for this isthrough, consistent network monitoring. There are free tools that monitor forport scans and related activity.

Ping Flooding Attack

Pinging involves one computer sending a signal to anothercomputer expecting a response back. Responsible use of pinging providesinformation on the availability of a particular service. Ping Flooding is theextreme of sending thousands or millions of pings per second. Ping Flooding cancripple a system or even shut down an entire site.

APing Flooding Attack floods the victim’s network or machine with IP Pingpackets. At least 18 operating systems are vulnerable to this attack, but themajority can be patched. There are also numerous routers and printers that arevulnerable. Patches cannot currently be applied throughout a global networkeasily.

Smurf Attack

A Smurf Attack is modification of the "ping attack"and instead of sending pings directly to the attacked system, they are sent to abroadcast address with the victim’s return address. A range of IP addressesfrom the intermediate system will send pings to the victim, bombarding thevictim machine or system with hundreds or thousands of pings.

One solution is to prevent the Web server from being usedas a broadcast. Routers must be configured to deny IP-Directed broadcasts fromother networks into the network. Another helpful measure is to configure therouter to block IP spoofing from the network to be saved. Routers configured assuch will block any packets that donor originate in the Network.To be effective this must be done to all routers on the network.

SYN Flooding Attack

This attack exploits vulnerability in the TCP/IPcommunications protocol. This attack keeps the victim machine responding back toa non-existent system. The victim is sent packets and asked to response to asystem or machine with an incorrect IP address. As it responds, it is floodedwith the requests. The requests wait for a response until the packets begin totime out and are dropped. During the waiting period, the victim system isconsumed by the request and cannot respond to legitimate requests.

When a normal TCP connection starts, a destination hostreceives a SYN (synchronize/start) packet from a source host and sends back aSYN ACK (synchronize acknowledge) response. The destination host must the hearan acknowledgement, or ACK packet, of the SYN ACK before the connection isestablished. This is referred as the "TCP three-way handshake”.

Decreasingthe time-out waiting period for the three way handshake can help to reduce therisk of SYN flooding attacks, as will increasing the size of the connectionqueue (the SYN ACK queue). Applying service packs to upgrade older operatingsystems is also a good countermeasure. More recent operating systems areresistant to these attacks.

IPFragmentation/Overlapping Fragment Attack

To facilitate IP transmission over comparatively congestednetworks. IP packets can be reduced in size or broken into smaller packets. Bymaking the packets very small, routers and intrusion detection systems cannotidentify the packets contents and will let them pass through without anyexamination. When a packet is reassembled at the other end, it overflows thebuffer. The machine will hang, reboot or may exhibit no effect at all.

Inan Overlapping Fragment Attack, the reassembled packet starts in the middle ofanother packet. As the operating system receives these invalid packets, itallocates memory to hold them. This eventually uses all the memory resources andcauses the machine to reboot or hang.

IPSequence Prediction Attack

Usingthe SYN Flood method, a hacker can establish connection with a victim machineand obtain the IP packet sequence number in an IP Sequence Prediction Attack.With this number, the hacker can control the victim machine and fool it intobelieving it’s communicating with another network machines. The victim machinewill provide requested services. Most operating systems now randomize theirsequence numbers to reduce the possibility of prediction.

DNSCache Poisoning

DNS provides distributed host information used for mappingdomain names and IP addresses. To improve productivity, the DNS server cachesthe most recent data for quick retrieval. This cache can be attacked and theinformation spoofed to redirect a network connection or block access to the Web sites),a devious tactic called DNS cache poisoning.

The best defense against problems such as DNS cachepoisoning is to run the latest version of the DNS software for the operatingsystem in use. New versions track pending and serialize them to help preventspoofing.

SNMP Attack

Most network devices support SNMP because it is active bydefault. An SNMP Attack can result in the network being mapped, and traffic canbe monitored and redirected.

The best defense against this attack is upgrading toSNMP3, which encrypts passwords and messages. SinceSNMP resides on almost all network devices, routers, hubs, switches, Servers andprinters, the task of upgrading is huge. Some vendors now offer an SNMP Managementtool that includes upgrade distribution for global networks.

UDP Flood Attack

AUDP Flood Attacks links two unsuspecting systems. By Spoofing, the UDP floodhooks up one system’s UDP service (which for testing purposes generates aseries of characters for each packet it receives) with another system’s UDPecho service (which echoes any character it receives in an attempt to testnetwork programs). As a result a non-stop flood of useless data passes betweentwo systems.

Send Mail Attack

In this attack, hundreds of thousands ofmessages are sent in a short period of time; a normal load might only be 100 or1000 messages per hour. Attacks against Send Mail might not make the front page,but downtime on major websites will.

For companies whose reputation dependson the reliability and accuracy of their Web-Based transactions, a DoS attackcan be a major embarrassment and a serious threat to business.

Conclusion

Frequent denial-of-service attacks and achange in strategy by "Black-Hat Hackers" are prompting enterprises todemand technology that proactively blocks malicious traffic.

Tools and services that reflectapproaches to combat such DoS attacks have been introduced with time. These arenormally upgrades to what was produced before. No solution is ever said to be anultimate solution to defend DoS attacks. Despite the new technology coming everyday, the attacks are likely to continue. 

List of Free VPN Service Providers

Why You Need VPN ?

  • To protect privacy, either on a LAN or a public hotspot.
  • Anonymous Internet Surfing
  • Full anonymity by hiding your real IP address.
  • Bypass geographical blocks from certain websites
  • Unlike a proxy, you get secured connection for all programs you are using
  • Quality Network ensures your VPN service will be fast wherever you are in the world
  • Protection against your ISP
  • Bypass ISP Blocking for VOIP Applications like Skype

1. UltraVPN

It is a free VPN client/server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection making your connection safe and secure.
You need to download nad install the client and create a (username, password) to use this service.

2. AloneWeb

AloneWeb is a completely free VPN service thru which you can access your favorite sites which are blocked by system admin or someone. If you use Internet in unsecured Wi-Fi area, then you can use these VPN services to hide your IP address and access sites securely. This is a free of charge service which is also reliable.

3. FreeVPN

With FreeVPN, you can access Sites from USA, UK, Canada, Germany, Italy, Sweden, France, China without any issue. Access blocked sites like hulu.com, pandora.com, ABC.com, BB.co.uk and much more even when you are in other country. Blocked sites are accessible without any problem.

4. CyberGhost

CyberGhost offers 1 GB per month free access of Internet, even for blocked sites. You can try CyberGhost because 1 GB is also good amount of traffic space. You can upgrade to premium version which stats from 14.26 USD.

5. Hotspot

Hotspot Shield is a free VPN service which can be used for accessing Internet even by hiding your own IP address. It is available for PC (Windows XP, Vista, Windows 7) as well as Mac. For anonymous use of Internet, you can use Hotspot Shield VPN service.

6. JAP aka JonDo

Jap is a research project which offers free VPN service. You can use this service to connect thru Internet and access your favorite sites. The service is not much reliable but you can use this one in case other doesn’t work.

7. GPass

Another great yet free VPN service. GPass is a really cool VPN where you can stream audio/video, email, instant messaging line Window messenger etc without any problem. Even you can use Download Manager to download stuffs from your favorite place.

8. LogMeIn Hamachi

LogMeIn is a well known remote desktop support provider. They also offer free VPN service under Hamachi name thru which you can access blocked sites from your office area or blocked area. Use this VPN service in Wi-Fi area to access sites securely.

9. Its Hidden

Another free VPN service provider. You don’t need any software to install. Use the secured connection on Its Hidden to access your favorite sites without any issue. They offer

10. Packetix.NET

This VPN technology is developed by SoftEther Corporation. You can use this test server for free access of your favorite sites and blocked sites in different geographic locations. You can access Internet from Unsecured locations like Wi-Fi enabled Hotels, Airports and even on untrustworthy ISPs.

11. HideipVPN

It is a free VPN service for US / UK sites. You can stat browsing anonymously by using this free service. HideipVPN offers limited number of free accounts every month. Currently they are offering 100 free accounts every month starting from 1’st of each month at 10:00AM GMT+2. So get ready to have a free account on 1‘st of this month.
Do you use VPN clients for Internet access or accessing your favorite sites blocked on certain locations? Share your favorite free VPN service which you use frequently.

12. Your Freedoom

This one is basically not a VPN service but its performs almost the same function with great ease, hence i included this in this list.
It provides both a free and paid service. Free service limits to six hours of usage per day (up to 18 hours per week). You need to install a client on your system and a user name & password to use this.

13. Loki Network Project

Loki Network Project is free VPN service and SSL based free VPN server. It is an opportunity to protect your private data (IP address, e-mail/FTP/HTTP passwords, web-sites visited, uploaded/downloaded files and etc…) and bypass certain Internet access limitations you may have at your location.
You need to download and install its free VPN Client software to create your own security schema.

14. ACEVPN

Ace VPN allows you to privately and securely surf and download on the internet without leaving a trace and/or being tracked. Ace VPN is the lowest cost VPN service provider allowing access to the gateway servers in multiple locations at no extra cost.

15. SecurityKiss

SecurityKiss is a tunnel service which ensures security and privacy once your data leaves your computer. It redirects all your traffic through an impenetrable tunnel to our security gateway. Everything in the tunnel is encrypted.

16. USA IP

For free user, you don’t need to register, just download the USAIP.pbk file, and then double-click on the file and select one of the USAIP PPTP connections. After that, you can access the USA IP free VPN services with the username demo and the password demo. But you will need to reconnect the USA IP network after every 7 minutes.

17. MacroVPN

A new player in the VPN field. MacroVPN does provide a Free VPN service, but it is more like an extended trial. There is a limit of 2GB traffic and 256kbps speed.
Do you know any other Free VPN service? Do share it by commenting below. If you see that any of the above services is down or closed, do let us know.

18. FREEDUR

19. LINKIDEO

Just a word of caution for everyone here. The free VPN services may not be as good as the paid ones. You may experience slow speed, downtimes etc. But its all like, you dont need them everytime. Just check them out and leave your feedback here. I would love to hear from you.

How to Compress your videos 50% without losing quality

many people ask me to compress their  video  so here is what you need

Most of the time when we compress any video file we loos the quality of video.

Today i am going to show how easily you can compress videos 50% without losing quality.

Download and Install Handbrake software.

Select your Source videos and choose the output destination folder. and click on the start

How to See if Your Hard Drive is Dying

Hard drives use S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) to gauge their own reliability and determine if they’re failing.  You can view your hard drive’s S.M.A.R.T. data and see if it has started to develop problems.
Unfortunately, Windows doesn’t have an easy-to-use built-in tool that shows your hard disk’s S.M.A.R.T. data.  We will need a third-party tool to view this information, though there is a way to check your S.M.A.R.T. status from the command prompt.
Mehtod 1 :- use HDDScan freeware utility, it will give you full report of your hard-disk status.

Method 2 :- In the Command prompt (Run > cmd) type the following command
Wmic
"Diskdrive get status"

Free Network Inventory Software for IT Professional

Today my company management ask me to make network inventory of entire network. if i am going to collect all all computer information like how many computers are there in my network ? Which operating system is installed there ? processor , model information of all computers. it will take approx 7 days in my normal work hour. 
Lots of paid software are available on the internet for this work like Solarwinds for network inventory.
Today i am going to show how easily you will get network inventory with Lan-Sweeper freeware version.


What is Network Inventory Management
Network Inventory Management tools allow an administrator to maintain up-to-date records about the number, type and status of devices on a network. Network Inventory Management software ranges from network discovery tools to network configuration management utilities. Network Inventory Management software automates routine tasks and allows an administrator to remotely manage large numbers of networked devices simultaneously.
Lansweeper will give you information like :-
  • ·         Software inventory
  • ·         Network inventory
  • ·         License compliance
  • ·         Compliance reporting
  • ·         Active directory integration
  • ·         Eventlog integration
  Download and install Lansweeper on your network, it will ask your administrator credentials. and it will give you full report.


Get the complete Domain Report of any Website

If you want to Find out the information of Registered domain information of any site, Registered Owner name , Hosting company name , Domain creation date , Domain Expiration date, IP-address information & Raw domain information.


You will easily get all the information with DomainHostingView Tool

Suppose you want to get the full information of facebook.com, just enter the website name.

 

 DOWNLOAD

How to Earn Money With Facebook

Facebook is Social Media site witch is Launch in February 2004 and in one year 1 million people are join this site, and in these days 1110 millions people are active and open daily. So this way we collect a huge network of People and traffic. Any one who collect traffic he will become a Famous and Earn From Facebook. This is Easy and Very Short cut method of income.



Our Team try to discus Proper Way to earn money with Facebook there are some steps that you use to Earn Money

  • Collect Traffic From any Source Like Friend, Page Like, Tabs, Grouping , Application and any other way that you use fro take traffic.
  • There are Two way to use this traffic one 
    • Direct and 
    • other In-Direct
  •  Direct Method is that you use Following Affiliates and attach your Friend and page Viewer to these affiliates
    • Fanslave.com
    • Google Affiliate( Some Google adds are not attach with Facebook) 
    • Amazon Associates
    • Click Bank
    • Commission Junction
    • HostGator.com (Affiliates Program)
  • Use above Program along with attach your Facebook traffic and earn money with this Easy Program.