Menu

Tuesday, August 19, 2008

How to access blocked websites?? -Torpark, the anonymous browser

I would like to introduce to you guys a something more useful and powerful which can use for the anonymous internet surfing. I received so many mails by asking how to unblock restricted websites. I explained in my previous posts about proxy sites and also listed some proxy sites which you can use to browse the internet anonymously. But it seems all those proxy sites have been blocked on your network. So what to do if the firewalls on your network block all your favorite websites and proxy sites as well??

Don’t worry still you have a solution.. That is the Torpark.

So what the hell is that and how does it do it huh??
First of all how your firewall blocks websites?
Basically it blocks websites by specified website URLS and by looking at keywords which has given by network administrator. For example FortiGate firewall has web filtering features such as URL/Keyword/Phrase Block, URL Exempt List, Content Profiles, Blocks Java Applet, Cookies, Active X, etc. In the FortiGate firewall content blocking enables you to specify file types and words that should have to block. With web content block enabled, every requested web page is checked against the content block list. The score value of each pattern appearing on the page is added, and if the total is greater than the threshold value set in the protection profile, the page is blocked.

That can be happened if the firewall can read and understand the content of incoming data packets. So what if the firewall can’t understand the content of incoming data packets?? That means the firewall can’t find out any specific URLs or keywords within that web content…

So that’s what exactly happened when we are browsing internet using Torpark. So let’s go in to the subject….

The Torpark is a combination of Mozilla FireFox browser and the Tor(Onion Router).
So what the hell is Tor??
Tor is an Internet based system which enables users to communicate anonymously on the Internet. The Tor network encrypts traffic between a computer and the Tor network of routers. The client side Torpark browser connects out to Tor, periodically negotiating a virtual circuit through the Tor network. Tor provides a way for two parties - a connection initiator and a connection responder to communicate with each other anonymously. Which protects its communications against traffic analysis attacks. The all data packets are encrypted in a tunnel between your PC and the Tor network. After sending encrypted data to the Tor network, it will change the tunnels until it reach the internet as unencrypted. Also Tor network will be passing back data to your computer as encrypted and your Torpark browser is used to decrypt them and render it to user. So it will be bit slowly specially when establishing the circuit.

So now you see how hard it is for network observers (such as crackers, companies, and governments) to reliably learn who is talking to whom and for what purpose, by examining data packets flowing over the network since which used to communicate all data in an encrypted and anonymous way. And another good thing is Torpark browser is portable and you can run it in a USB drive as well.

So I think I am done with this post. Hope you all got the idea. So good luck you all.

You can Download Torpark using following Urls:-
http://www.download.com/Torpark/3000-2356_4-10586817.html?hhTest=1
Click here to Direct Download

For More Info:-
http://security.ngoinabox.org/ScreenShots/Torpark/manual.html
http://security.ngoinabox.org/Documentation/Manuals/chapters/Torpark.pdf
http://advosys.ca/viewpoints/2006/09/torpark-quick-look/
http://www.linux.com/articles/53394
http://news.softpedia.com/news/Anonymous-Portable-Web-Browsing-Via-Torpark-36123.shtml

Friday, February 29, 2008

Find Hackers and Security Holes Using WIRESHARK!!

Hi Guys,

Up to now I have done few posts regarding hacking.. On this post I would like to introduce you a great tool called "Wireshark" in order to find out security vulnerabilities in your network, in other word find out hackers who accessing your computer or the network .... huh
The scenario is like this;
Think you are currently working on a computer network. There are thousands of computers. You feel someone is monitoring on you or someone is accessing your PC or someone is sniffing your yahoo chats or else you need to know which sites, IPs and Ports you are currently connected through your PC.

Test this command on your Windows Command Prompt:-

C:\>netstat -a

If you type that command on you Windows Command Prompt you could find out all the sites, IPs and Ports and people who currently accessing you computer. But if there is a serious hacking is going on its not enough to find out the bugger.

So lets move on to the topic.
Wireshark (formerly known as Ethereal) is an extremely valuable tool which capable to scan Wireless and Ethernet data and comes with some robust filtering capabilities. In another words Wireshark is a network protocol analyzer, or “packet sniffer”, that captures and shows contents of network frames. It runs on Unix/Linux, and Windows. Wireshark uses the WinPcap project to capture packets (lipcap on Linux).

If you are a network administrator it would be really useful to control your network interface and find security holes. Even the Linux platform is vulnerable to attacks. This is an open source network packet sniffing product that would watch on DNS, TCP, UDP, HTTP and most the known network protocols.

You can see the content of the captured data packets as well. If some other data packets going though your network location that would be captured as well. For example you can see the data packets received to the PCs that next to you. By looking at the content of data packets you can read their chat records as well.


Download Wireshark:-
http://www.wireshark.org/download.html
http://sourceforge.net/projects/wireshark/


Website:-
http://www.wireshark.org

Basic User Guides:-
http://portforward.com/networking/wireshark.htm
http://zone.ni.com/devzone/cda/tut/p/id/6746


Advanced User Guides:-
http://www.wireshark.org/docs/wsug_html_chunked/
http://ftp.uni-kl.de/pub/wireshark/docs/user-guide-us.pdf


Other References:-
http://www.willhackforsushi.com/books/377_eth_2e_06.pdf

Note:- This is an extremely powerful tool. If you are not a Network Administrator, be careful when you use this tool. Because if you run this tool on your machine which connected to a network, your Network Administrator can find out that you are using a Sniffing Tool. Because when you run it always there is a network traffic comes to your computer.

Thursday, January 24, 2008

Windows Management Instrumentation! Its coool! :-)

hi guys,

I just like to give you a brief idea about WMI interface. Actually it’s a kind of efficient way to access OS resources using programming modules. In another words it’s a bridge between your Windows OS and programming interface. Using WMI interface you can programmatically change computer settings as well as do many operations which your administrator can do on your computer.

Actually it was very helpful for me once my PC infected with a damn virus and all administrative settings were disabled coz of it. So what I have done was I used WMI interface to access to OS resources including registry entries to change some settings. As well as if you are a developer it’s wide area you need to study.

Basically WMI used WMI Query Language (WQL) to manipulate system resources. It’s just like SQL queries; if you are familiar with SQL it’s easy to make adjustment to WQL. Actually it’s hard to give a clear definition on this, but try to think like WMI as a repository of properties and methods related to the system environment that you canaccess like a database.

You need a few different objects to perform WMI queries in .Net. They include the following:

(all within System.Management namespace)
ConnectionOptions
ManagementScope
ObjectQuery
ManagementObjectSearcher
ManagementObjectCollection
ManagementObject

Here is a sample program that I used to search folders

public static void FindFoldersByName(string strName)
{

try
{
// Execute WMI Query and wait for result
WqlObjectQuery wqlObjectQuery = new WqlObjectQuery
("SELECT Name FROM CIM_Directory WHERE FileName = '" + strName + "'");
ManagementObjectSearcher searcher = new ManagementObjectSearcher(wqlObjectQuery);
ManagementObjectCollection collFolders = searcher.Get();

// Display each folder path...
foreach (ManagementObject folder in collFolders)
{
string strCurrentPath = folder.Properties["Name"].Value.ToString();
MessageBox.Show(strCurrentPath);
}
}
catch (Exception ex)
{
MessageBox.Show(ex.ToString());
}
}

More on this:-
http://msdn2.microsoft.com/en-us/library/aa394582%28VS.85%29.aspx
http://msdn2.microsoft.com/en-us/library/aa510211.aspx
http://www.codeguru.com/csharp/csharp/cs_network/wmi/article.php/c6035/#WMI