- සංස්කරණය කරන ලද ශ්රව්ය-දෘශ්ය දර්ශන - Video Editing
- සංස්කරණය කරන ලද ශ්රව්ය කොටස් - Audio Editing
- සංස්කරණය කරන ලද ඡායාරූප - Image Editing
Friday, September 30, 2011
පරිඝනක නිර්මාණ කරන්න කැමතිද?
Anonymizers - ඇත්තටම ඇනෝවෙක් වෙන්න
- Anonymouse - මෙය ඉතා හොඳ ඇනොනිමයිසරයක් සහ මෙය නොමිලයේ බාගත කරන්න පුලුවන් . මේකෙ පාවිච්චි වෙන්නෙ CGI proxy එකක්, එයින් ඔබට anonymously වෙබ් පිටුවල සැරිසරන්න, anonymous e-mails යවන්න හැකියාව ලබා දෙනවා.
- ProxyKing.net - මේ ඇනොනිමයිසර සේවාව වෙබ් අඩවි වලට ඔබව හසු (track) කිරීමට වැලකීම සහ ඔබගේ පරිගනකයේ cookies ස්තාපනය කිරීමේ හැකියාව වලකනවා.
- AnonymousIndex.com - මෙය IP ලිපිනය සැඟවීම, වෙබ් පිටුවල දිස් වන දැන්වීම්, referrers සහ cookies කලමනාකරණය කරන අන්තර්ජාලයේ නොමිලයේ පවතින ප්රොක්සි සර්වර් එකක්.
- HideMyAss.com - නොමිලයේ ලබා දෙන ඇනොනිමයිසර සේවාවක්.
- ProxyFoxy.com - නොමිලයේ ලබා දෙන ඇනොනිමයිසර සේවාවක් සහ මෙමඟින් cookies, spyware සහ වෙනත් අනතුරුදායක scripts මඟහැරීම සිදුකරනවා.
Wednesday, September 14, 2011
Acunetix Web Vulnerability Scanner - Demostration
You can download this software form Acunetix website.
Security of Internet Banking (Part 3) - Countermeasures to Reduce Risks in Internet Banking
These are some countermeasures I have identified to reduce the risk in Internet banking for each attacks.
· User Surveillance
o Having a security policy regarding token and password handling.
· Theft of token and handwritten notes
o Having a security policy regarding token and password handling.
o Giving passwords that are easy to remember still hard to guess such as combing dictionary word with symbols and numbers.
· Hidden code
o Operating System/browser patching
o Code installation blockers
o Anispyware software
o Antiphishing software (URL inspection)
o Firewall for blocking inbound and outbound connections to unauthorized ports
o Intrusion/anomaly detection
o Best practices for browser security (cookies, window pop-ups, java support, etc)
· Worms and bots
o Operating System/browser patching
o Code installation blockers
o Anispyware software
o Custom application secure coding
o Firewall for blocking inbound and outbound connections to unauthorized ports
o Intrusion/anomaly detection
o Best practices for browser security (cookies, window pop-ups, java support, etc)
· E-mails with malicious code
o E-mail policy
o Code installation blockers
o Attachment blocking
o HTML code blocking
o Antispam software
o Anispyware software
o Antiphishing software (URL inspection)
o Firewall for blocking inbound and outbound connections to unauthorized ports
o Intrusion/anomaly detection
· Smartcard analyzers
o Noise generators
o Power and time neutral code designing
· Smartcard reader manipulator
o Secure smartcard interface design and implementation
· Brute force attacks with PIN calculations
o Increasing number of digits (at least eight digits)
· Social engineering
o Increasing security awareness
o Simple URLs that are easy to remember
o Antiphishing software (URL inspection)
· Web page obfuscation
o Monitoring the domain name server (DNS)
o Prohibiting the IP addresses instead of URLs.
o Using predetermined list of valid URLs.
· Pharming
o Monitoring the server
o Patch management
o Intrusion/anomaly detection
o Firewall
· Active man in the middle attacks
o Using predetermined SSL certificates
o Mutual authentication and encryption through client-server SSL
· Session hijacking
o State management to prevent session ID specification in the message, session ID rotation and life cycle management
· Brute force attacks
o Monitoring the server
o Patch management
o Intrusion/anomaly detection
o Firewall
· Bank security policy violation
o Security policy implementation according to standards such as ISO 17799
· Website manipulation
o Monitoring the server
o Patch management
o Intrusion/anomaly detection
o Firewall
Tuesday, September 13, 2011
Thumbs.db කියන්නෙ මොනවාද?
- User Configuration
- Administrative Templates
- Windows Components
Thursday, September 8, 2011
Security of Internet Banking (Part 2) - Possible Attacks against an Internet Banking System
An attacker can target on user equipment such as tokens (smart cards), password generators and actions of the user himself. These types of attacks include:
Procedural Attacks
- Hidden code - A hidden code within a web page that installs malicious software in user’s terminal. The exploit may target Java runtime support, ActiveX support, multimedia extensions and automated download and running of software through the browser.
- Worms and bots – Worms usually search for vulnerabilities and exploit those automatically. This may be an exploitation of instant messaging and chatting communication software which may automatically be deployed using bots.
- E-mails with malicious code – This is e-mail with malicious content such as executable files or HTML code with embedded applets.
- Smartcard analyzers – These expose the security of the smartcard by revealing cryptographic keys and passwords. These include analyzing power consumption of the smart card or time analyzing. These attacks are not easy to implement but very effective.
- Smartcard reader manipulator – This attack is applicable to noncertified smartcard readers with insecure interfaces, which may expose the contents of the smartcard.
- Brute force attacks with PIN calculations – These attacks mainly focused on breaking the security of tokens that generate random PINs.
Phishing
- Social engineering – These attacks are based on manipulating user to give up the password, login information or sensitive information through phone calls and other social hangouts.
- Web page obfuscation – These are links that are not directing the user to corresponding destination that it describes or the using Internet Protocol (IP) addresses instead of universal resource locator (URL) to confuse the user. And this maybe a hidden frames in a web page by using several frames with malicious content, while user only sees the URL of the master frameset. Other method of this is using graphics that spoof the interface of a web browser like the address bar.
Attacks focuses on communication links
- Pharming: This is compromising of domain name servers (DNSs), altering DNS tables and connecting the user to another site other than the banks official web site and user will perform all tasks in the fraudulent site and give all information such as login details.
- Sniffing: This attack can be used to capture information such as user name and password. This is masquerading of communication between user client and the bank server).
- Active man-in-the-middle attacks: The attacker sends malformed user packets or make more traffic to the web site such as transfer commands, from one account to other.
- Session hijacking: session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer.
IBS attacks: These are offline attacks against the servers that Internet banking applications hosted
- Brute force attacks: Brute force attack is based on distributed zombie personal computers, hosting automated programs for username or password based calculation.
- Bank security policy violation: Changing the banks security policy such as making access control and logging mechanisms weak.
- Web site manipulation: Exploiting the vulnerabilities of of bank’s web server and permit the alternation of its contents such as links to the login page and redirect user to a fraudulent web site and capture users credentials.