Friday, September 5, 2008

Showing Only Presentation on External Display

Doing presentation is not liked by most of the techies, But there are times in life where you have to do presentations. When I started giving presentations from lots of days I was thinking is there any way I can see my notes on my laptop and my audience will only see the presentation. Because it is very frustrating if you forgot any point and need to see the notes, all the audience will see those notes. I didnt like that. At last today I have found a way by which I can to that. Lots of you might be already knowing this. But I thought I would share this in case some of you dont know it.

Steps


Step 1: Right click on desktop select properties, select settings

Step 2: Check if Multiple Monitors option is available if not you need to check your graphics drivers.


Step 3. Right click on second monitor, click on attached












Step 4: Go to power point click on Slide Show -> Setup slide show


step 5: In the multiple monitors section select Monitor 2

Step 6: Press F5 to start slide show ..... Valllaaa only your slide show is shown on your external monitor / projector.

You can see your notes , do any thing on you laptop that will not be shown in the external monitor.

Monday, July 28, 2008

Hacker and Security Consultant

Some days ago when I was viewing a video from the shmoocon 2008, Hackajar told a very interesting difference between a hacker and security professional, he said
"Under the Age of 25 you are a hacker you are over the age of 25 you are a security professional"
So I was thinking about this statement like and I was like "Waw" how true !! Like when we are in our young age we dont have responsibilities on us. Most probably parents are paying for our education and for our living. At those time we can go on and on doing hacking stuff but we dont get any pay for that. They say White Hat, black hat are there black hat dont like white hats but there is one important statement made by simple nomad in this talk that was


"The basic different between Black hat and white hat hacker is that White hat has Mortgage."
So when you get little older responsibilities come, you need to earn for living. At that time one will think and I like to hack things, if I get a money to hack things then why I shouldn't take this opportunity ? Yes there are some restrictions on the you when you become white hat but every thing has its plus and minus. So its so true that as hackers become old they might go to the security scene. So whats bad in that ?

Monday, July 7, 2008

Packet Freagmentation Attack against Firewalls

For those who dont know what is packet fragmentation: you dont belong here, Dont read this article.


Legal Bullshit
DISCLAIMER
This artical is provided for general informational purposes only, without warranty, either expressed or implied. How you use this information is upto you and author is not liable for that.
(F*ing B@$# S**t)


As we know due to differnet MTU (Maximum Transmission Unit) size in the different networks the TCP/IP packets need to be fragmented some times.
If you are RFC junky then RFC 791 - Internet Protocol is reffernce for you.

3 fields are involved in the fragmentation Identification,Flags,Fragment Offset

1. Identification: 16 bits

An identifying value assigned by the sender to aid in assembling the fragments of a datagram.

2. Flags: 3 bits

Various Control Flags.

Bit 0: reserved, must be zero
Bit 1: (DF) 0 = May Fragment, 1 = Don't Fragment.
Bit 2: (MF) 0 = Last Fragment, 1 = More Fragments.
0 1 2
+---+---+---+
| | D | M |
| 0 | F | F |
+---+---+---+


3. Fragment Offset: 13 bits

This field indicates where in the datagram this fragment belongs.

The fragment offset is measured in units of 8 octets (64 bits). The first fragment has offset zero.


Bellow is the idea of how packet fragmentation can be used to get around rules in some firewalls. To do this the main idea is to set the offset of the second packet is so low that the second packet will actually overlap on the first packet and the data of the first packet will be overwritten.

For Example.
Suppose there is a firewall rule that only allows port 80 to be connected from internet to inside server and say you want to do a ssh (port 22) connectoin to that server.
Then the first packet would be sent to the server with the port number 80 and
with the DF bit = 0 (May Fragment) and the MF bit = 1 (More Fragments). Since the firewall is configured to allow the port 80 connection it will allow this packet.

The second packet should be sent with the DF bit=0 and MF bit =0 (Last Fragment), port will be 22 and the Fragment Offset is given as 1. This will over write the first packet except the first 1byte(8bits) of the packet.

This second packet will be accepted by the firewall since it is part of the first packet and first packet has been already accepted by the firewall. So final assembled packet will have port 22. This packet will be forwarded to the server's port 22 this way.



Tuesday, April 8, 2008

Instant Hacking / Security

If one see the graph of the computer attackers knowledge from 80s to today then there will be a big big drop down in attackers knowledge. I have seen some people who want knowledge with less or no effort. Worst case others don't want knowledge. Thats why there are lot and lots of Script kiddies these days.
There are lots of cases where a Microsoft Windows Exploit are being used on a linux/unix server by these script kiddies. I dont know why know one is ready to search a little bit , read a little bit. I think all are locked in to the instant phase created by media (instnat noodles, instant food, instant banking) So they want instant hacking also. But how do we say to them that hacking is not a instant packet. That just keep in oven / microwave and ready to serve. Even the people in the information security are exception for this. Lots of people in Information Security area also want to download Nessus, click on All the Plugins and hit on the target. They dont want to take some time to understand the tool, understand its working. Hell they dont even want to learn about the target against which they are using these tools. I think now is the time to follow the old school techiniques. It is very important if devlopement of the information security personal is concerned. I dont get how come person in the security also dont want to learn things about the network and tools that they use. I think lots of person are security area also only interested in showing some dumb nessus report to the user and get work done. What they dont understand is this is going to harm them in the future than the Client to which they are giving these reports. Their personal growth will affect from this kind of working. So atleast for personal interest try to learn / get information.