Saturday, October 8, 2011

Elcomsoft Phone Password Breaker

Elcomsoft Phone Password Breaker (EPPB) is a forensic tool which provides access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the latest iPhone 4 and iOS 4.3.

Thursday, September 8, 2011

FraudSense: Anti-phishing Platform

FraudSense is a provider of the cloud-based anti-phishing software platform, featuring its proprietary real-time anti-phishing detection algorithms.
FraudSense’s next-generation anti-phishing technology is an innovative weapon in the fight against the ever growing threat of phishing attacks as it enables FraudSense-powered applications and services to identify, target and remove forged websites in real time.
FraudSense identifies and disables fraudulent websites in real-time which are routinely deployed by phishers to lure unsuspecting users to submit their credentials and are key to most online scams.
 Thus minimizing and even completely eliminating financial losses and integrity damage.

Sunday, June 19, 2011

FaceNiff : Sniffer for Android mobiles.

FaceNiff is an Android app which requires rooted phone. It sniffs and intercepts web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK).
It’s kind of like Firesheep for android, the only difference is it's bit easier to use & it works on WPA2.

Tuesday, June 7, 2011

Peepdf v0.1 : Analyze Malicious PDF files.

Peepdf v0.1 has been released recently. peepdf is a Python tool to investigate pdf files & detect whether it's harmful or not. The tool provides all the necessary components that a security researcher could need in a PDF analysis. It shows all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files.

Thursday, May 5, 2011

Findind Hidden files in ADS (Alternate Data Streams) in Windows

In the previous post, we have known, how to hide files in ADS of files/folder in NTFS file format. In this post we will study ways to find hidden files in ADS. Sysinternals is a tools suite which contains a whole lot of tools meant for manipulating/adding/observing  various features of OS.

Anti arp-poisoning attack tool - ArpON

ARP handler inspection (ArpON) is a portable tool that defends the Man In The Middle (MITM) through ARP Spoofing/Poisoning attacks. It detects and blocks also derived attacks by it for more complex attacks, such as: DHCP Spoofing, DNS Spoofing, WEB Spoofing, Session Hijacking and SSL/TLS Hijacking & co attacks.

Monday, April 25, 2011

SQLmap 0.9 is out.

sqlmap is an open source penetration testing tool developed in Python that automates the process of detecting and exploiting SQL injection and taking over of database servers.  This makes the tool independent from the operating system. sqlmap relies on the Metasploit Framework for some of its post-exploitation takeover features.

Saturday, April 23, 2011

Hiding files in ADS (Alternate Data Streams) in Windows

Alternate Data Streams exists in NTFS file streams which can be used to hide sensitive information, even worms, trojans etc. We can hide files in ADS of folders & files. Using ADS required little skill & this security issue is relatively unknown to people. To begin, open cmd & make a folder.
#mkdir C:\folder
#echo this is hidden text > folder:secret
Now, open the folder & check whether there is any file. You will find no file there. The file is in ADS of directory 'folder'.

Friday, April 1, 2011

Knowing QR code.

QR code

QR code stands for Quick Response code which is a 2D bar code, readable by dedicated QR barcode readers and camera phones. The code consists of black modules arranged in a square pattern on a white background. The information encoded can be text, URL or other data.
You can have an idea about QR code from this link 

Friday, January 14, 2011

Researchers Hack GSM phones.

Researchers have shown a simple technique for eavesdropping on individual GSM mobile calls without the need to use expensive, specialized equipment. This kind of GSM snooping has been possible for a long time, but it’s always been very expensive.
During a session at the Chaos Computer Club Congress (CCC) in Berlin, Karsten Nohl and Sylvain Munaut used cheap Motorola handsets running a replacement firmware based on open source code to intercept data coming from a network base station.