tag:blogger.com,1999:blog-43003098447741410682024-03-14T13:21:33.106+05:30forum 4 hackersLearn to browser internet in a better way!Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.comBlogger15125tag:blogger.com,1999:blog-4300309844774141068.post-52992258304965144432015-04-19T23:22:00.001+05:302019-03-27T05:14:36.804+05:30InCTF 2015 Qualification Crypto Writeup - Crypto1<div dir="ltr" style="text-align: left;" trbidi="on">
Before even jumping to challenges, get to know a little about <a href="http://inctf.in/" target="_blank">InCTF</a>. Do read my previous <a href="http://forum4hackers.blogspot.in/2013/06/inctf13-amrita-cyber-security.html" target="_blank">blog post about InCTF</a>.<br />
<br />
There was totally 4 cryptography challenges, but writing write up only for crypto-1, 2 and 4 as I was not the developer/designer for crypto-3.<br />
<br />
<h3 style="text-align: left;">
<b>Crypto1: 100 Points</b></h3>
<b><br /></b><b>Challenge: </b><br />
<b><br /></b>
I found this sheet lying on the railway tracks and it seems to be encrypted in some form. Can you reveal the right intended text?<br />
<div>
<br /></div>
<b></b>
<br />
<pre class="brush: python">Text on sheet -
<div class="code">
mgisd_fd_iuprhnedmfo5svqma_ureeer(eeeehl_sta_tYn__n_ustasyseoentenearlh)l_ar_ccxn-yclwsesnhodx_totib_i
</div>
</pre>
<div>
<br /></div>
<div>
<b>Solution:</b></div>
<div>
<b><br /></b></div>
<div>
Looking at the cipher we can observe that it has only readable ascii character, so the characters are jumbled in some pattern or substituted with other characters.<br />
<br />
There was hint in the Question itself: 'sheet lying in railway track'. So it might be <b>Rail Fence Cipher aka ZigZag cipher</b>.<br />
<br />
Now the only challenge is to figure out the number of rails (key length) used in the cipher. Well it was easy brute forcible. Trying from 2-10 would have got the flag.<br />
<br />
<b>The key length was: 9</b><br />
<br />
Plain text after decoding would be:<br />
<pre class="brush: python">Plain text:
<div class="code">
md5(Yellow_ones_give_eastern_equipment_since_harsh_lunchboxes_understand_x-rated_measly_itchy_efforts)
</div>
</pre>
<br />
<b>So the Flag would be : 58a1b42e43bff262735766c384033fe6</b><br />
<b><br /></b>
<b>Python code for Rail Fence Cipher or Zig-Zag cipher:</b><br />
<b><br /></b>
<br />
<pre class="brush: python">def fence(lst, numrails):
fence = [[None] * len(lst) for n in range(numrails)]
rails = range(numrails - 1) + range(numrails - 1, 0, -1)
for n, x in enumerate(lst):
fence[rails[n % len(rails)]][n] = x
if 0: # debug
for rail in fence:
print ''.join('.' if c is None else str(c) for c in rail)
return [c for rail in fence for c in rail if c is not None]
def encode(text, n):
return ''.join(fence(text, n))
def decode(text, n):
rng = range(len(text))
pos = fence(rng, n)
return ''.join(text[pos.index(n)] for n in rng)
'''
Brute forcing through the keylength:
<div class="code">
cipher = "mgisd_fd_iuprhnedmfo5svqma_ureeer(eeeehl_sta_tYn__n_ustasyseoentenearlh)l_ar_ccxn-yclwsesnhodx_totib_i"
</div>
print [decode(cipher, i) for i in range(2, 10)]
'''
</pre>
<i>Thanks for reading through the post. </i><br />
<i>Any suggestions/comments about this post, please let me know the comments section below. Looking forward for the suggestions.
</i></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-26441320740093540572014-09-22T10:13:00.001+05:302019-03-27T05:15:39.483+05:30<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
CSAW CTF 2014 Quals write-up</h2>
<div>
<br />
team r00t, we ended scoring 1250. None of the team members worked for more than half a day, and our team is small, containing 3 members. All lazy people :D<br />
<br /></div>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
Exploitation - 1: bo</h3>
<div>
<br /></div>
<div>
<a href="https://ctf.isis.poly.edu/static/uploads/ad7532d5b3860a408fbe01f9455dca36/bo" target="_blank">Download the file from here</a>.</div>
<div>
<br /></div>
<div>
This was a simple problem, or we didn't know how to solve in the way it was meant to be.</div>
<div>
As usual as soon as we saw a executable follow the usual procedure -<br />
<br />
<b>First, file type</b><br />
<br />
<pre class="brush: python">> file bo
<div class="code">
bo; ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, not stripped
</div>
</pre>
<b>Second, look for strings-</b></div>
<div>
<br /></div>
<div>
<pre class="brush: python">> strings bo
</pre>
When we look at the strings. Oh wait is it the flag. Hell Yeah :D<br />
<br />
<pre class="brush: python">Welcome to CSAW CTF!
Time to break out IDA Demo and see what's going on inside me. :]
flag{exploitation_is_easy!}</pre>
</div>
<div>
</div>
<br />
<div>
<h3>
Exploitation - 2: pybabbies</h3>
</div>
<div>
<div>
<br /></div>
<div>
<pre class="brush: python">nc 54.165.210.171 12345</pre>
</div>
</div>
<div>
<br /></div>
<div>
Connect the server with that particular port, We found python console showing up.</div>
<div>
Afterwards we opened the <a href="https://ctf.isis.poly.edu/static/uploads/a72f1d1cf1dbc250dd0b9f5d8a14eab3/pyshell.py" target="_blank">source file</a> </div>
<div>
<br /></div>
<div>
As we played around with the console</div>
<div>
- Found its <a href="https://www.python.org/" target="_blank">Python 3.x</a></div>
<div>
- It does not show any returned value.</div>
<div>
workaround: Just print the return value.</div>
<div>
- Any error the execution will close the connection.</div>
<div>
<br /></div>
<div>
Time to analyse the source code. All the cool module and functions where banned :'(</div>
<div>
<br /></div>
<div>
Checked if there is already a variable with flag or key etc having the flag. And obviously it wasnt that easy. So, maybe there is a file with flag.txt or key.txt where the flag is and we have to open it.</div>
<div>
<br /></div>
<div>
As I have already read few blog posts about escaping Python sandbox, It was easy.</div>
<div>
<br /></div>
<div>
Playing around with tuple. Ended with an interesting part -</div>
<div>
<br /></div>
<div>
<pre class="brush: python">>>> print(().__class__.__bases__[0].__subclasses__()[40])
<type 'file'></pre>
</div>
<div>
<br /></div>
<div>
Now its obvious try opening flag.txt key.txt etc</div>
<div>
<br /></div>
<div>
<pre class="brush: python">>>> print(().__class__.__bases__[0].__subclasses__()[40]("flag.txt"))
<open file 'flag', mode 'r' at 0x.....></pre>
</div>
<div>
</div>
<br />
<div>
Wow!!! It worked. Now just go ahead and read the file</div>
<div>
<br /></div>
<div>
Welcome to my Python sandbox! Enter commands below!</div>
<div>
<pre class="brush: python">>>> print(().__class__.__bases__[0].__subclasses__()[40]('flag.txt').read())
flag{definitely_not_intro_python}</pre>
</div>
<div>
<br /></div>
<div>
<pre class="brush: python">>>> exit</pre>
</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<b><i>Thanks for reading through the write-up. If any thing wrong or can be added to this post. Please put them in the comments :)</i></b><br />
<br />
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-33670294366158714122014-07-19T19:33:00.000+05:302014-07-19T19:33:32.666+05:30Volga CTF quals 2014<div dir="ltr" style="text-align: left;" trbidi="on">
<b>Team r00t</b> managed only 700 points and secured 80th position<br />
<br />
This was 1 really son of a difficult CTF<br />
<br />
<b><span style="color: red;">Web100-</span></b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-0PlK8UmuHzI/UzfQyMHet7I/AAAAAAAAAzY/X7GsScpvGyE/s1600/web-1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-0PlK8UmuHzI/UzfQyMHet7I/AAAAAAAAAzY/X7GsScpvGyE/s1600/web-1.JPG" height="142" width="320" /></a></div>
<br />
If login successful, You will be given a particular phpsession.<br />
Login was easy. you enter random name and it will get registered and access will be given.<br />
<br />
Task was Session fixation.<br />
<br />
After login in. In source we can see help.php<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/--0dSa4jnnvk/UzfRW9JWhEI/AAAAAAAAAzg/KJbrhFxlbjA/s1600/web100-2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/--0dSa4jnnvk/UzfRW9JWhEI/AAAAAAAAAzg/KJbrhFxlbjA/s1600/web100-2.JPG" height="188" width="320" /></a></div>
<br />
In link place give your link to the page where the session id is assigned.<br />
<br />
and refresh the loged in page.<br />
<br />
flag: Easy_task_on_Session_Fixation<br />
<br />
Comments are welcomed...<br />
Question solving skill: x7r0n<br />
<br />
<span style="color: red;">Web200-</span><br />
<span style="color: red;"><br /></span>Guess they where using strcmp function to password.<br />
Change password to array elements.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-Q-2Q9tj94ec/UzfnvnrCg5I/AAAAAAAAAzw/8LCazwt3eCI/s1600/web-2.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-Q-2Q9tj94ec/UzfnvnrCg5I/AAAAAAAAAzw/8LCazwt3eCI/s1600/web-2.jpg" height="125" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
response for the above request [image]<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-e75ClO2VFoc/UzfoEDo0vXI/AAAAAAAAA0A/RVyhwFA0_BE/s1600/web-2-2.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-e75ClO2VFoc/UzfoEDo0vXI/AAAAAAAAA0A/RVyhwFA0_BE/s1600/web-2-2.jpg" height="171" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
I don't know whether this is how challenge was made to be solved. But this shit worked :D</div>
<br />
Comments are welcomed :)<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-36613249972892708672013-09-30T20:46:00.000+05:302013-09-30T20:46:29.731+05:30Facebook CTF - ACCESS LEVEL 1 WriteUP<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
Facebook CTF 2013 - NcN 2013</h2>
<div>
There where only 3 access levels - web, android apk, and Linux executable. All where reverse engineering only.</div>
<h3 style="text-align: left;">
<a href="http://ctf.noconname.org/4cbe48a830c4cd2d4ac9e6e9373e3055/index.html" target="_blank">Access Level - 1</a></h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-aMbAIz-odMo/Ukad5KPltuI/AAAAAAAAAus/OWkzhZqSgts/s1600/ScreenHunter_40+Sep.+28+10.56.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="121" src="http://1.bp.blogspot.com/-aMbAIz-odMo/Ukad5KPltuI/AAAAAAAAAus/OWkzhZqSgts/s320/ScreenHunter_40+Sep.+28+10.56.jpg" width="320" /></a></div>
<br />
Whatever input 'key' is given you get a alert saying <a href="javascript:alert('Invalid Password!');" target="_blank">'Invalid password!'.</a><br />
<br />
Tools -> browser with JavaScript console. I used <a href="https://www.google.com/intl/en/chrome/browser/" target="_blank">Google Chrome</a> :p<br />
<br />
Analysing the source code we get -<br />
<span style="font-family: Courier New, Courier, monospace;"><form action="login.php" method="POST" onsubmit="return encrypt(this);"></span><br />
<br />
So onsubmit a "encrypt" function is called. So using the browser JavaScript console lets take a look at the script running behind.<br />
<br />
<span style="font-family: Courier New, Courier, monospace;">function encrypt(form)</span><br />
<span style="font-family: Courier New, Courier, monospace;"> {</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> var res;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> res=numerical_value(form.password.value);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> res=res*(3+1+3+3+7);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> res=res>>>6;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> res=res/4;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> res=res^4153;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> if(res!=0)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> {</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>alert('Invalid password!');</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> }</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> else</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> {</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>alert('Correct password :)');</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> }</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> form.key.value=numerical_value(form.password.value);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span> form.verification.value="yes"+simpleHash(form.password.value);</span><br />
<span style="font-family: Courier New, Courier, monospace;"> return true;</span><br />
<span style="font-family: Courier New, Courier, monospace;"> }</span><br />
<br />
That's it. our work is simple - just to make the condition inside IF as FALSE. That can be achieved by making the <span style="font-family: Courier New, Courier, monospace;">var res = 0</span>. So the reverse engineering work starts NOW.<br />
<br />
Time to analyse the code and start reversing it.<br />
- Before if we have XOR. so res should be equal to 4153 to make res=0<br />
- res * 4 [ 4153*4 = 16612]<br />
- >>> right shift so we have 16612 = X>>>6.<br />
16612 - 100000011100100<br />
we have no idea about the lost rightmost 6 bits. Taking it to 0's lets proceed.<br />
100000011100100+000000 - 1063168 But it can vary with +0 to +63.<br />
- 1063168/(3+1+3+3+7) = 62539.2941176 ~ 62540.<br />
- now a weird function numerical_value<br />
<br />
<span style="font-family: Courier New, Courier, monospace;"> function numerical_value(str)</span><br />
<span style="font-family: Courier New, Courier, monospace;"> {</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>var i,a=0,b;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>for(i=0;i<str.length;++i)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>{</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>b=ascii_one(str.charAt(i));</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>a+=b*(i+1);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>}</span><br />
<span style="font-family: Courier New, Courier, monospace;"> return a;</span><br />
<span style="font-family: Courier New, Courier, monospace;"> }</span><br />
<br />
observe one more function ascii_one<br />
<br />
<span style="font-family: Courier New, Courier, monospace;">function ascii_one(foo)</span><br />
<span style="font-family: Courier New, Courier, monospace;">{</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>foo=foo.charAt(0);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>var i;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>for(i=0;i<256;++i)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>{</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>var hex_i=i.toString(16);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>if(hex_i.length==1)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>hex_i="0"+hex_i;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>hex_i="%"+hex_i;</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>hex_i=unescape(hex_i);</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>if(hex_i==foo)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><span class="Apple-tab-span" style="white-space: pre;"> </span>break</span><br />
<span style="font-family: Courier New, Courier, monospace;">}</span><br />
<br />
But here no need to analyse. Just manual brute force of the var str; to get a appx value of 62540. I got 62545.<br />
var str="zzaaaaaaaaaaaaaaaaaaaaaaddaaaaaspea";<br />
<br />
start with random number of a's then modify here and there with the logic of starting strings have less weight-age and ending char's have the most!<br />
<br />
so for me this is the key - <span style="font-family: Courier New, Courier, monospace;">"zzaaaaaaaaaaaaaaaaaaaaaaddaaaaaspea"</span>. It will vary from person to person.<br />
<br />
After submiting the key -<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<span style="font-family: Courier New, Courier, monospace;">Congrats! you passed the level! Here is the key: 23f8d1cea8d60c5816700892284809a94bd00fe7347645b96a99559749c7b7b8</span><br />
<br />
<span style="font-family: inherit;">*** Note this was easy because without knowing much of JavaScript i could solve it.<br />-> And a rough screenshot of manual brute force. So you can get a rough idea -<br />Please download OR open the image for clear view :D :D</span><br />
<span style="font-family: inherit;">-> Any one solved it in a much simpler way please comment your way for solving problem.</span><br />
<span style="font-family: inherit;">-> Suggestions/Comments are most </span>welcomed<span style="font-family: inherit;"> !!! :)</span><br />
<a href="http://2.bp.blogspot.com/-Dsav0Ij9Y-Y/Ukakhy2n3MI/AAAAAAAAAu8/nsWTd8bWxfg/s1600/ScreenHunter_39+Sep.+28+09.49.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="321" src="http://2.bp.blogspot.com/-Dsav0Ij9Y-Y/Ukakhy2n3MI/AAAAAAAAAu8/nsWTd8bWxfg/s640/ScreenHunter_39+Sep.+28+09.49.jpg" width="640" /></a><br />
<span style="font-family: inherit;"><br />Thanks for reading through<br /><br />Happy hacking! Happy coding!!<br /><br /></span></div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com3tag:blogger.com,1999:blog-4300309844774141068.post-12868798174151626432013-06-17T11:46:00.004+05:302013-08-09T16:30:34.571+05:30Defcon 2013 3dub - 1, 2 and 4. Web WriteUp<div dir="ltr" style="text-align: left;" trbidi="on">
<h2>
DefCon 2013 3dub - Web based challenges.<br /><br /><div style="text-align: left;">
<span style="font-family: inherit;"><span style="font-weight: normal;">This is the first time 'm writing Wiriteup for any ctf [</span></span><span style="font-weight: normal;">practice].</span><span style="font-family: inherit;"><span style="font-weight: normal;"> So </span></span><span style="font-weight: normal;">please</span><span style="font-family: inherit;"><span style="font-weight: normal;"> bare with it :D</span></span><br />
<span style="font-family: inherit;"><span style="font-weight: normal;"><br /></span></span></div>
</h2>
<h3 style="text-align: left;">
3dub - 1</h3>
<div>
What ever name to enter in the username field will be accepted and you be logged in with that name.<br />
After logging in you will get a message that LOGIN as admin.</div>
<div>
<br /></div>
<div>
but if give "admin" in the username field , You will get a message saying admin login disabled.</div>
<div>
<br /></div>
<div>
But for every login with different usernames the cookies where changing.</div>
<div>
<br /></div>
<div>
<b>Observation --></b></div>
<div>
<b>username cookie </b></div>
<div>
<div style="font-weight: bold;">
<br /></div>
<div style="text-align: left;">
a - 09<br />
b - 0a<br />
ab - 09ce<br />
ba - 0acd<br />
abc - 09cd29<br />
aaaaaa - 09cd2994af</div>
<div style="text-align: left;">
its just a hex based addition with the base "aaaaa". But no need to do the hex addition also.</div>
<div style="text-align: left;">
get cookie for </div>
<div style="text-align: left;">
<b>admi - <span style="color: red;">09c8259c</span></b></div>
</div>
<div>
<b>aaaan</b>- 09cd2994<span style="color: red;">a0</span></div>
<div>
<span style="color: red;"><br /></span></div>
<div>
<span style="color: red;">=> </span>admin<span style="color: red;"> </span>-<span style="color: red;"> 09c8259ca0</span></div>
<div>
<span style="color: red;"><br /></span></div>
<div>
save cookie and refresh, you get the key.</div>
<div>
<span style="color: red;">the key is The key is: who wants oatmeal raisin anyways twumpAdby</span></div>
<div>
<br /></div>
<div>
Easiest challenge in DefCon 2013.</div>
<div>
<br /></div>
<h3 style="text-align: left;">
3dub - 2</h3>
<div>
Login page.<br />
<br />
Obviously tried SQL injection first. WORKED!<br />
but i could login as root but no use because no key.</div>
<div>
<br /></div>
<div>
Tried analysis the GET and POST requests in ZAP.<br />
X-SQL : SELECT name FROM users WHERE name =' ' and pasword=' ' limit 1;</div>
<div>
<br /></div>
<div>
waste time crafting requests wrt to MySQL.<br />
I could login as root and anynumber from 0 yo +Inf :D</div>
<div>
<br /></div>
<div>
Afterwards i found it was SQLite. The done -<br />
<br />
<ul style="text-align: left;">
<li><b>asd'OR'1'='1' UNION SELECT name FROM sqlite_master WHERE type = "table"--</b>I logged in as <b>keys</b>.</li>
<li><b>asd'OR'1'='1' UNION SELECT name FROM keys --</b></li>
</ul>
<div>
<b>got the key-</b></div>
</div>
<div>
<span style="color: red;">logged in as The key is: literally online lolling on line WucGesJi</span></div>
<div>
<span style="color: red;"><br /></span></div>
<h3 style="text-align: left;">
3dub - 4</h3>
<div>
Was a easy one but wasted more than 6 hours in this still managed NOT to get the key. Like a BOSS XD</div>
<div>
<br /></div>
<div>
File name and the access code..</div>
<div>
it opened for usernmaes.txt with accesscode - <span style="font-family: Courier New, Courier, monospace;">60635c6862d44e8ac17dc5e144c66539</span>.<br />
But no access fro passwords.txt with the same accesscode.<br />
<br />
Found that <span style="font-family: Courier New, Courier, monospace;">accesscode=md5(filename)</span><br />
<br />
Opened the passwords.txt i was shocked to see everything was SHA-512/SALT hashing.<br />
Thought i would move on to next one than decrypting these passwords.<br />
But that would be lame to hash to that extent. That was a distraction. :p<br />
<br />
Time to brute force the filename. Found<br />
key.txt with accesscode - <span style="font-family: Courier New, Courier, monospace;">65c2a527098e1f7747eec58e1925b453</span></div>
<div>
<br /></div>
<div>
Content of key.txt-<br />
<span style="font-family: Courier New, Courier, monospace;">2GXuC0wS4O1MI8OpuoV1NkjsMM6zkzLpcQfOpMKniiogUoCS3yhTyZbm8a9BCEgHdl19bWEMziZiZDbLI+V2dQ==</span></div>
<div>
By looking at the content of key.txt it was base64. Decoded with online base64 deocder. Got invalid ascii code not the key!<br />
<br />
content of key.txt was changing with time. Suspected functions - time() and rand().<br />
Major time waste here.</div>
<div>
<br /></div>
<div>
Afterwards i gave the getfile.php which was helping us to opne the file.<br />
getfile.php with accesscode- <span style="font-family: Courier New, Courier, monospace;">0701593e23e676eaba834916a6ac7272</span>.<br />
<br />
<div style="text-align: left;">
<b>Contents of getfile.php-</b></div>
<div style="text-align: left;">
<b><br /></b></div>
<div style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">Acces granted to getfile.php!<br /><br /><br />$value = time();<br />$filename = $_GET["filename"];<br />$accesscode = $_GET["accesscode"];<br />if (md5($filename) == $accesscode){<br />echo "Acces granted to $filename!<br /><br />";<br />srand($value);<br />if (in_array($filename, array('getfile.php', 'index.html', 'key.txt', 'login.php', 'passwords.txt', 'usernames.txt'))==TRUE){<br />$data = file_get_contents($filename);<br />if ($data !== FALSE) {<br />if ($filename == "key.txt") {<br />$key = rand();<br />$cyphertext = mcrypt_encrypt(MCRYPT_RIJNDAEL_128, $key, $data, MCRYPT_MODE_CBC);<br />echo base64_encode($cyphertext);<br />}<br />else{<br />echo nl2br($data);<br />}<br /><br />}<br />else{<br />echo "File does not exist";<br />}<br />}<br />else{<br />echo "File does not exist";<br />}<br /><br />}<br />else{<br />echo "Invalid access code";<br />}<br />?></span></div>
<div>
<br /></div>
<div>
```````````````````````````````````````````````````<br />
***k it! 'm going to sleep. But i dint. Because I have wasted a lot of time on this..<br />
This needed a Brute force. No way for manually doing that.</div>
<div>
<br />
Brute force script in PHP -</div>
</div>
<div>
<div>
<span style="font-family: Courier New, Courier, monospace;"><?php</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">error_reporting(0); </span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">for ($key = 0; $key <= getrandmax(); $key++) </span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">{</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">$text="5HHOwWMXYH5UxvzIzxqMY3vuwyCJ5BVdzwm5puqduZrsPTxfsFNKXXMlwhZj5W/1o Sv3ENrCpbIMF9cJQ5Gndg==";</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">$data=mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $key, base64_decode($text), MCRYPT_MODE_CBC);</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">echo $data;</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">echo "<br>";</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">}</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">?></span></div>
</div>
<div>
<br /></div>
<div>
Dump of brute force.</div>
<div>
<br /></div>
<div>
Search for the string with starting "the key is".<br />
No match found. No idea WHY?<br />
<br />
Waiting for other Writeups from pros to find my mistake.</div>
<div>
<br /></div>
<div>
Any suggestions, please comment.<br /><br />Update on 18-06-2013--><br /><br />
With the help of the comment by CĂ©lestin Perdu got to know where i had missed the point.<br />
<br />You can use ZAP or Burp Suite anything. Get the date and time of the response, convert it to linux timestamp.<br />
<br />
<span style="color: red; font-family: Courier New, Courier, monospace;">$ date -d "which you got from the tool" +% s</span><br /><br />Use this value as key. And you should get the flag.<br /><br />Thanks for reading. Suggestion and comments welcomed!<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com4tag:blogger.com,1999:blog-4300309844774141068.post-76806154853018104852013-06-12T17:26:00.001+05:302014-02-05T10:39:23.850+05:30InCTF'13 [Amrita Cyber Security]<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-2I8mkNu1v-s/UbNR5R3ZxXI/AAAAAAAAAqM/MyRRdnOBEdw/s1600/598489_10200218486213514_733244699_n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-2I8mkNu1v-s/UbNR5R3ZxXI/AAAAAAAAAqM/MyRRdnOBEdw/s640/598489_10200218486213514_733244699_n.jpg" height="235" width="640" /></a></div>
<br />
<b>National level Capture the flag contest</b> targeting only for Undergraduate, graduate and post-graduate level students.<br />
<br />
This CTF is meant just for learning and getting more good teams from India into world finals in CTF contest.<br />
FYI: CTF means capture the flag.<br />
<br />
I would recommend any one interested in computer's to give this CTF a try. They teach you through the process. But yeah! HARD WORK is expected from you. And you should have some programming knowledge. Doesn't matter from which branch/stream of specialisation you are doing. Don't think its meant only for geeks from computer science branch. I'm from Electronics and Communication background still took a respectable position in InCTF'13 --> <b>second position</b>. Even if you are from mechanical background still fascinated about these computer stuff. Then go ahead start off with InCTF.<br />
<br />
As i have said earlier InCTF aims more on learning.<br />
This is how InCTF works-><br />
<br />
<b>1st round</b> -<br />
<br />
<ul style="text-align: left;">
<li>Purely meant for learning.</li>
</ul>
<ul style="text-align: left;">
<li>Designed smartly by the admins/organisers of InCTF, to divide the work between the team members. Everyone can't be good in everything so you got to stick the topics which you choose to take in this round. And become good at it.</li>
<li>Topics- Basics of Linux, SQL [ Web Based ], secure programming, Reverse Engineering, Cryptography.</li>
</ul>
<div>
This round is not mandatory but I STRONGLY RECOMMEND to take this round seriously and use it to learn. Because the organisers are ready to help to any time during 1st round.</div>
<div>
<br /></div>
<div>
The tool needed to finish this round successfully is <a href="https://www.google.com/" target="_blank">GOOGLE</a>.</div>
<div>
<br /></div>
<div>
<b>2nd round</b> - Jeopardy type.</div>
<div>
<br />
<b>Qualification round</b> for <b>National level finals</b> i.e main CTF game.<br />
<br /></div>
<div>
This time they gave us 1 week time duration UNLIKE other CTF's which has 1-2days.</div>
<div>
This round is damn interesting because for noobs like US, we need to learn and then use that knowledge to complete the tasks. So utilized this round also for learning.<br />
<br />
I saw that many teams where giving up because they had NO CLUE about how to even look at the tasks. Even when we opened the task, we were BLANK. But according to me what you need is just PATIENCE and DETERMINATION. That's all, you can solve 80% of tasks in all categories. What you need is just patience and determination. Any time you can walk into their IRC and query them if you are on your right path for solving a particular task or not.</div>
<div>
<br />
<br />
<b>3rd round - Capture the flag</b></div>
<br />
<input :d="" and="" anything="" are="" by="" click="" code="" flag.="" for="" get="" id="btn" of="" page="" source="" the="" to="" type="button" value="FLAG is h3r3" viewing="" wait="" waiting="" what="" wont="" you="" />
<script>
document.getElementById('btn').onclick = function() {
alert('cd6ad07c840923478b74effcaf8d7729');
}
</script>
<br />
<br />
<div>
Time to implement! Time to test what you have learnt!<br />
<br />
1st day you will have a mock round, which gives an idea about what to do the next day. Basically aimed at not wasting the time on the contest day. Every minute matters in the finals.<br />
<br />
Basically you will have to exploit the different types of services to get the flag.<br />
<br />
Your team will be scored/valued on your<br />
<br />
<ol style="text-align: left;">
<li>Defence - your patching work.</li>
<li>Offence - exploiting other team services and submitting their precious flags :p</li>
<li>Ethical - reporting advisories.</li>
</ol>
<div>
That's all about <b>InCTF</b>.</div>
<div>
<br /></div>
<div>
We participated with the team name <b>r00t. </b></div>
<div>
Team members-</div>
<div>
<ul style="text-align: left;">
<li>y0g1337h - Yogeesh Seralthan,</li>
<li>vn4v1n - Movnavinothan V &</li>
<li>x7r0n - Adithya Naresh.</li>
</ul>
<div>
1st round we divided the work and learnt.</div>
</div>
<div>
2nd round. LANing up is very important. We LANed up in our college hostel [ <b>Amrita School of Engineering </b>] :p</div>
<div>
3rd round. We had awesome fun exploiting services, patching them, and reporting the vulnerabilities.</div>
<div>
<br /></div>
<div>
Thanks for organising such a awesome event -<br />
Arvind S Raj, Seshagiri Prabhu, Bithin Alangot.</div>
<div>
They represent the team bi0s. One of the 1337 team in INDIA.</div>
<div>
<br /></div>
<div>
<b>Pic of the trophy we earned in InCTF'13</b></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-ifvsaWSkl-c/UbNoZu2TZ6I/AAAAAAAAAqc/QHPZxv2XLWA/s1600/InCTF.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-ifvsaWSkl-c/UbNoZu2TZ6I/AAAAAAAAAqc/QHPZxv2XLWA/s640/InCTF.jpg" height="640" width="592" /></a></div>
<br />
<br />
So what are you waiting for. Form a team and start working. earn the <b>trophy + good cash prize + respect + knowledge + recognition.</b><br />
<b><br /></b>
<b>http://inctf.in/gallery/inctf13.html</b>
<br />
<h3 style="text-align: left;">
<b>
Useful link-</b></h3>
<br />
<b>mailto</b>: contact@inctf.in<br />
http://www.inctf.in<br />
<b>Google groups</b>- <span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px; white-space: nowrap;"> </span><span email="secure-codein@googlegroups.com" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px; white-space: nowrap;">secure-codein@googlegroups.com</span><br />
<span email="secure-codein@googlegroups.com" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px; white-space: nowrap;"><br /></span><b>Feel free to comment.</b><br />
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-81480015184053399092013-05-27T18:59:00.002+05:302013-05-27T19:00:32.317+05:30XSS Testing<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<br /></div>
<script>alert("y0g1337h's blog! Dare to enter. Hacker's Welcomed :)");</script>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com22tag:blogger.com,1999:blog-4300309844774141068.post-87997556488756243692013-03-31T18:13:00.004+05:302013-03-31T18:13:42.776+05:30MAC address on android, Windows and iOS phones/Tablets<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<span style="font-family: Verdana, sans-serif; font-size: small;">
Finding MAC address on android ,Windows and iOS[Apple] phones/Tablets.</span></h2>
<div>
<span style="font-family: Verdana, sans-serif;"><br /></span></div>
<h3 style="text-align: left;">
<span style="font-family: Verdana, sans-serif; font-size: small;">
Brief Introduction on "<i>MAC address</i>"</span></h3>
<div>
<span style="font-family: Verdana, sans-serif;">A <b>media access control address (MAC address)</b> is a unique identifier assigned to network interfaces for communication on the physical network segment.</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;">MAC address is a hard coded/embedded in your device which cant be changed.|</span><br />
<span style="font-family: Verdana, sans-serif;">But there's always a way ;-)</span><br />
<span style="font-family: Verdana, sans-serif;">Yeah! It can be SPOOFED!</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;">Any ways this POST is just going to cover "how to find MAC Address". Before knowing how to spoof or how to get others[Victim's] MAC address, we should know what it is. Why is it SO important!</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;">How a MAC address looks like-</span><br />
<span style="font-family: Verdana, sans-serif;">It is in the form of six groups of t2o hexadecimal digits, separated by hyphens (-) or colons (:)</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<b style="font-family: Verdana, sans-serif;">Ex- </b><span style="font-family: Courier New, Courier, monospace;">01-23-45-67-89-ab or 01:23:34:45:67:89:ab</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;">Let's GET STARTED!</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><b>ANDROID --></b></span><br />
<span style="font-family: Verdana, sans-serif;">Finding <b>MAC address</b> on a <b>Android Phones</b></span><br />
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;">1. </span><span style="line-height: 19.1875px;">On your </span><span style="line-height: 19.1875px;"><b>HOME</b></span><span style="line-height: 19.1875px;"> screen, click on </span><span style="line-height: 19.1875px;"><b>MENU</b></span><span style="line-height: 19.1875px;">, goto </span><span style="line-height: 19.1875px;"><b>SETTINGS</b></span><span style="line-height: 19.1875px;">.</span></span><br />
<span style="font-family: Verdana, sans-serif;">2. click on <b> About Phone.</b></span><br />
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;">3. Click on </span><span style="line-height: 19.1875px;"><b>Status</b>.</span><span style="line-height: 19.1875px;"><b> </b></span></span></div>
<div style="text-align: left;">
<span style="font-family: Verdana, sans-serif; line-height: 19.1875px;">And VIEW your </span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"><b>Wi-Fi MAC address</b>!</span><br />
<span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"><b><br /></b></span></div>
<div style="text-align: left;">
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;">View your <b>MAC address</b> under <b>Wi-Fi MAC address.</b><br /><i>Or,</i></span><span style="line-height: 19.1875px;">1. </span><span style="font-weight: normal; line-height: 19.1875px;">On your </span><span style="line-height: 19.1875px;"><b>HOME</b></span><span style="font-weight: normal; line-height: 19.1875px;"> screen, click on </span><span style="line-height: 19.1875px;"><b>MENU</b></span><span style="font-weight: normal; line-height: 19.1875px;">, goto </span><span style="line-height: 19.1875px;"><b>SETTINGS</b></span><span style="font-weight: normal; line-height: 19.1875px;">.<br />2. Select </span><span style="line-height: 19.1875px;"><b>Wireless & network</b></span><span style="font-weight: normal; line-height: 19.1875px;">.<br />3. Select </span><span style="line-height: 19.1875px;"><b>Wi-Fi Settings</b></span><span style="font-weight: normal; line-height: 19.1875px;">.</span></span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><span style="font-weight: normal; line-height: 19.1875px;">You will find </span><span style="line-height: 19.1875px;"><b>MAC Address</b><span style="font-weight: normal;"> under </span><b>Advanced section</b><span style="font-weight: normal;">.</span></span></span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;"><i>Or,</i></span><span style="line-height: 19.1875px;"><i><br /></i></span><span style="line-height: 19.1875px;">1. </span><span style="font-weight: normal; line-height: 19.1875px;">On your </span><span style="line-height: 19.1875px;"><b>HOME</b></span><span style="font-weight: normal; line-height: 19.1875px;"> screen, click on </span><span style="line-height: 19.1875px;"><b>MENU</b></span><span style="font-weight: normal; line-height: 19.1875px;">, goto </span><span style="line-height: 19.1875px;"><b>SETTINGS</b></span><span style="font-weight: normal; line-height: 19.1875px;">.<br />2. Select </span><span style="line-height: 19.1875px;"><b>Wireless & network</b></span><span style="font-weight: normal; line-height: 19.1875px;">.<br />3. Select </span><span style="line-height: 19.1875px;"><b>Wi-Fi Settings</b></span><span style="font-weight: normal; line-height: 19.1875px;">.</span></span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><span style="font-weight: normal; line-height: 19.1875px;">You will find </span><span style="line-height: 19.1875px;">MAC Address<span style="font-weight: normal;"> under </span><b>Advanced section.</b></span></span><br />
<span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"><b><br /></b>Finding <b>MAC address</b> on an <b>Android Tablet</b><br />1. </span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;">On your </span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"><b>HOME</b></span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"> screen, click on </span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"><b>MENU</b></span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;">, goto </span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;"><b>SETTINGS</b></span><span style="font-family: Verdana, sans-serif; line-height: 19.1875px;">.</span></div>
<div>
<span style="font-family: Verdana, sans-serif;">2. click on <b> About Tablet.</b></span><br />
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;">3. Click on </span><span style="line-height: 19.1875px;"><b>Status</b>.</span><span style="line-height: 19.1875px;"><b> </b></span></span></div>
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;"><span style="font-weight: normal;"><br /></span></span><span style="line-height: 19.1875px;"><span style="font-weight: normal;">And VIEW your </span><b>Wi-Fi MAC address</b>!<br /><br /><b>iOS [ iPad, i pod or iPhone Touch]</b></span></span><br />
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;"><b><br /></b></span></span>
<span style="font-family: Verdana, sans-serif;"><span style="line-height: 19.1875px;">Finding <b>MAC address</b> on in <b>iPad, iPhone </b>or <b>iPod Touch</b>-.</span><span style="line-height: 19.1875px;"><br /></span><span style="line-height: 19.1875px;">1. <span style="font-weight: normal;"> Click on </span><b>Settings</b>.</span></span><br />
<span style="font-family: Verdana, sans-serif; line-height: 19.1875px;">2. Select <b>General -> About</b>.</span><br />
<span style="font-family: Verdana, sans-serif; line-height: 19.1875px;">MAC address <span style="font-weight: normal;">can be seen in </span><b>Wi-Fi Address</b>.</span><br />
<h3>
Windows Phones<br /><br /><div style="text-align: left;">
<span style="font-weight: normal;">Finding </span> MAC address <span style="font-weight: normal;"> on a windows phone.</span>1. <span style="font-weight: normal;">On </span>Start, <span style="font-weight: normal;"> flick left to </span>App <span style="font-weight: normal;"> list.</span></div>
<div style="text-align: left;">
2.<span style="font-weight: normal;"> Tap </span>Setting, <span style="font-weight: normal;">then </span>About, <span style="font-weight: normal;">then </span>More info.<br />3.<span style="font-weight: normal;"> </span>MAC Address <span style="font-weight: normal;"> can be seen.</span></div>
<div style="text-align: left;">
<span style="font-weight: normal;"><br /></span></div>
<div style="text-align: left;">
<span style="font-weight: normal;">*** I have </span>not added screenshot's<span style="font-weight: normal;">! Screen shot's would make the post very big.</span><br /><span style="font-weight: normal;">***Use this Like a </span>cheat sheet to find MAC Address on Phone's<span style="font-weight: normal;">.</span><br /><span style="font-weight: normal;">*** Any difficulty </span>feel free to leave a comment in the comment section.<br />***<span style="font-weight: normal;">Advises on </span>improving my post<span style="font-weight: normal;"> is also accepted. </span><br /></div>
</h3>
<h3 style="text-align: left;">
No 1 is perfect :-)</h3>
<br />
<h3>
<br /><span style="font-weight: normal;">Happy hacking!</span><br /><span style="font-weight: normal;">Happy coding :-)</span></h3>
<div>
<span style="font-weight: normal;"><br /></span></div>
<div>
<span style="font-weight: normal;">-y0g1337h<br />Yogeesh Seralathan</span></div>
<div>
<span style="font-family: Verdana, sans-serif; font-size: small;"><span style="font-weight: normal; line-height: 19.1875px;"><br /></span></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com26tag:blogger.com,1999:blog-4300309844774141068.post-22293831400911139492013-03-30T17:33:00.001+05:302013-03-30T17:33:25.537+05:3025000!!!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-lhLxc3JrXi8/UVbJFT5uskI/AAAAAAAAAlU/8pAzMNjJWzE/s1600/screenshot01+2013-03-28+06.23.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="http://2.bp.blogspot.com/-lhLxc3JrXi8/UVbJFT5uskI/AAAAAAAAAlU/8pAzMNjJWzE/s640/screenshot01+2013-03-28+06.23.jpg" width="640" /></a></div>
<br />
<br />
My blog reached 25000 views on 27-03-2013...<br /><br />Thanks for the support folks. I'm a newbie hacker. Trying a learn and share whatever i know.<br />
<br />
SHARING is CARING!<br />-yogeesh seralathan<br />-y0g1337h<br />
<br />Happy c0d1ng.<br />Happy h4ck1ng!! :-)</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-59272250269954894792013-02-20T09:07:00.002+05:302013-02-20T09:07:43.277+05:30How to Hack Whatsapp <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-JBu4FWjmQBE/USOZk4A4sdI/AAAAAAAAAio/Bi-atWbXplM/s1600/whatsapp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="257" src="http://1.bp.blogspot.com/-JBu4FWjmQBE/USOZk4A4sdI/AAAAAAAAAio/Bi-atWbXplM/s400/whatsapp.jpg" width="400" /></a></div>
<h2>
</h2>
<h2>
An theoretical approach to hack whatsapp</h2>
<div>
<br /></div>
<h3 style="text-align: left;">
Whatapp</h3>
<div>
Many of my friends were like "Dude u on whatsaap?".</div>
<div>
<br /></div>
<div>
I got that question from many of my friends. So finally decided to download "whatsapp".</div>
<div>
Even u guys should try it out, if u haven't tried it yet!</div>
<div>
<br /></div>
<div>
<h4 style="text-align: left;">
<a href="http://www.whatsapp.com/download/" target="_blank"><span style="color: red;">Download Whatsapp</span></a></h4>
<h4 style="text-align: left;">
</h4>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="http://www.whatsapp.com/" target="_blank"><img alt="" border="0" height="340" src="http://4.bp.blogspot.com/-a5aEFFI_a8s/USOZ9gkJhVI/AAAAAAAAAiw/W0LFh8OMMNQ/s400/whatsappscreen.jpg" title="Hack Whatsapp" width="400" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://www.whatsapp.com/" target="_blank">Whatsapp</a></td></tr>
</tbody></table>
<h4 style="text-align: left;">
<b><br /></b></h4>
</div>
<div>
<br />
<h4>
<a href="http://www.whatsapp.com/download/" target="_blank"><b><span style="color: red;">Download Whatsapp</span></b></a></h4>
</div>
<div>
So i have been using this app from past 3 days, and i got value idea about how it works and how it authenticates You as You.<br />
<br /></div>
<div>
<h3 style="text-align: left;">
<b>If you people would have observed</b> -</h3>
</div>
<div>
1. You can read all the messages Offline o.O</div>
<div>
2. You can access all d profile pictures offline.</div>
<div>
<br /></div>
<div>
But Whatsapp encrypts all d DATA. But guys "hold on". Obviously it can be decrypted or any other way to access all d messages..</div>
<div>
<br /></div>
<div>
"" There's always a way "" :D</div>
<div>
<br /></div>
<div>
Here what 'm going to talk about is not just getting there messages which can be accessed offline.</div>
<div>
'll add that with video or screenshot in my next post :p</div>
<div>
<br /></div>
<div>
The method which i thought about when i was writing my "exams in coll 2day" is interesting..</div>
<div>
And YA while writing exam.. Lol :D Cant help it ...</div>
<div>
That's ME :p</div>
<div>
<br /></div>
<div>
Enough of Stories and background on whatsapp and Myself :p</div>
<div>
<br /></div>
<div>
<h3 style="text-align: left;">
<b>Lets Get into Tech stuff</b></h3>
</div>
<div>
<b><br /></b></div>
<div>
Its theoretical because i haven't tried it.</div>
<div>
I'll try it and post with video or screenshots s00n :-)</div>
<div>
<br /></div>
<div>
<h3 style="text-align: left;">
Ohk guys, <b>lets get busy</b></h3>
</div>
<div>
<br /></div>
<div>
So if you people have observed you can not have your whatsapp account logged in in two devices. Means session is given to only 1 mac address. If the <a href="http://en.wikipedia.org/wiki/MAC_address" target="_blank">MAC [ <span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;">Media Access Control </span>] address</a> of the device requesting access changes then whatsapp asks you to re-verify your account! </div>
<div>
<br /></div>
<div>
And common, "whatsapp people" you think Mac address cant be spoofed. But yeah Nice try whatsapp developer's :p</div>
<div>
<br /></div>
<div>
So here d point you will have to get access to the phone to get the victims phone "MAC address + the verifying massage" which is received to verify your device.</div>
<div>
<br /></div>
<div>
Simple you code a app to get the user's MAC address and checking the message from whats app in the victims inbox. Very easy in case of android devices.</div>
<div>
<br /></div>
<div>
As soon the message s received Push the "MAC address" + "Verifying code" to your server or mail it your ID. That depends on your convince.</div>
<div>
<br /></div>
<div>
That's it guys.</div>
<div>
<br /></div>
<div>
Spoof your phone's MAC address to your Victims address and install whatsapp and type the "verify code".</div>
<div>
<br /></div>
<div>
And done guys. You get complete access to the victims whatsapp ID..</div>
<div>
where as you can keep spying/watching your victims movements :D<br />
i.e 2 people - U + ur victim are using the same ID from different devices.</div>
<div>
<br /></div>
<div>
But its very LAME to spy on other people's private messages. So try not to.</div>
<div>
<br /></div>
<div>
This article is just an theoretical approach and only for understanding and knowledge purpose.</div>
<div>
And 'm not responsible for any thing you do after reading this post :D :p</div>
<div>
<br /></div>
<div>
I have no clue up-to which extent the approach will work.</div>
<div>
<br /></div>
<div>
Any ways Thanks for reading this post.</div>
<div>
Hope you people enjoyed it..<br />
<br /></div>
<div>
I look forward for your comments so that the flaws in method can be found out and rectify because even 'm not a gr8 hacker :p</div>
<div>
Even 'm a beginner .</div>
<div>
<br /></div>
<div>
<h4 style="text-align: left;">
<span style="color: red;">Happy Hacking..<br />Happy Coding :-)</span></h4>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com211tag:blogger.com,1999:blog-4300309844774141068.post-1177500875666602972012-12-12T21:32:00.000+05:302012-12-12T15:38:11.496+05:30How to Download YouTube videos using VLC<div dir="ltr" style="text-align: left;" trbidi="on">
Ok guys...<br />
This tutorial gives 1 of the method on how to download YouTube videos using VLC player...<br />
<br />
YouTube does not let you directly access the video data which they are stored. They move a copy of video into their cache ( not the cache memory :D .. I mean a separate server which acts like cache memory ) and share the data with you...<br />
<br />
So its NOT possible to download the video directly from YouTube. If we get the "cache link" from YouTube, then you can download the video using any of ur download accerelerator's if u have any :p<br />
There are few add on's for sum browser to get this download ( cache link which i referred earlier ) link...But here we are going to see to download using VLC. i.e to get the download link using VLC..<br />
<br />
There are many YouTube downloaders are there in internet. But all are not good, and you cant download the videos in original quality. But the best idea to download youtube videos with original quality you can use VLC player as youtube downloader. Here is the way to do --><br />
<br />
<div style="text-align: justify;">
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">1. Go to the specific video page and copy the desired URL which you are planing to download.</span></span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">2. Open VLC Player, and goto Media>> Open Network Stream.</span></span></div>
<div style="text-align: justify;">
<span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div style="text-align: justify;">
<span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-cLX328XSR_4/UIqZTzGeEzI/AAAAAAAAAco/NMiRNn0mgtg/s1600/screenshot01+2012-10-26+19.34.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="285" src="http://3.bp.blogspot.com/-cLX328XSR_4/UIqZTzGeEzI/AAAAAAAAAco/NMiRNn0mgtg/s400/screenshot01+2012-10-26+19.34.jpg" width="400" /></a></div>
<div style="text-align: justify;">
<span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div style="text-align: justify;">
<span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">3. Now you will get following window, just paste the URL in that window.</span></span></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-4EHmCLHYocI/UIqZeg_4TEI/AAAAAAAAAcw/BGb42_lXWl8/s1600/screenshot02+2012-10-26+19.35.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="305" src="http://4.bp.blogspot.com/-4EHmCLHYocI/UIqZeg_4TEI/AAAAAAAAAcw/BGb42_lXWl8/s400/screenshot02+2012-10-26+19.35.jpg" width="400" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br />
<br /></div>
<div style="text-align: justify;">
4. Now you will get video thumbnail in video player. Now click play on play button. The video will stream now.<br />
<br />
Problem -<br />
Video not streaming?<br />
-> <a href="http://www.videolan.org/vlc/download-windows.html" target="_blank">Click here to get the latest version of VLC !.</a>.<br />
<br />
5.Now click goto "Tools>>Codec Information". You get a new window and you will see some information about the video. At the end you will "Location". Click on that link and press "Ctrl+A" OR right click and select all. This is only to ensure you have copied the whole link.<br />
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-x9Vx75CYkik/UIqeLM9ttZI/AAAAAAAAAdA/Bhs1gz1o0dM/s1600/screenshot03+2012-10-26+19.36.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="335" src="http://3.bp.blogspot.com/-x9Vx75CYkik/UIqeLM9ttZI/AAAAAAAAAdA/Bhs1gz1o0dM/s400/screenshot03+2012-10-26+19.36.jpg" width="400" /></a></div>
<div style="text-align: justify;">
<span style="background-color: white; color: #575757; font-family: Georgia, 'Times New Roman', Times, serif; font-size: 15px; line-height: 24.366666793823242px;"><br /></span></div>
<div style="text-align: justify;">
<a href="http://1.bp.blogspot.com/-9NHwZmR6gUg/UIqlfvumfXI/AAAAAAAAAdQ/NWPsSdSXN1U/s1600/screenshot04+2012-10-26+20.28.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="287" src="http://1.bp.blogspot.com/-9NHwZmR6gUg/UIqlfvumfXI/AAAAAAAAAdQ/NWPsSdSXN1U/s400/screenshot04+2012-10-26+20.28.jpg" width="400" /></a><a href="http://1.bp.blogspot.com/-9NHwZmR6gUg/UIqlfvumfXI/AAAAAAAAAdQ/NWPsSdSXN1U/s1600/screenshot04+2012-10-26+20.28.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><br /></a><br />
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span><br />
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span><span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">6. a. 1st the lame way -></span></span><br />
<br />
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">Paste the location link in the browser and press "enter".<br />Just right click on the video and "video save as"...<br />Give what ever name you want and save it as "<i>name</i>.mp4"</span></span><br />
<br />
<br />
<br />
<span style="background-color: white; color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div style="text-align: justify;">
<span style="background-color: white;"><span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></div>
<div style="text-align: justify;">
<span style="background-color: white;"><span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span></div>
<div style="text-align: justify;">
<br /></div>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">6. b. Smarter way -></span></span><br />
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">Paste the link in any download accelerator you have. For example - Idm, orbit, Dap etc...</span></span><br />
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span>
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">example for idm -> in the pic below</span></span><br />
<span style="color: #999999;"><span style="background-color: #999999; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-XmsN6BkXduw/UIqlnCvHpvI/AAAAAAAAAdY/gKdkRHCm7gs/s1600/screenshot05+2012-10-26+20.29.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="132" src="http://2.bp.blogspot.com/-XmsN6BkXduw/UIqlnCvHpvI/AAAAAAAAAdY/gKdkRHCm7gs/s400/screenshot05+2012-10-26+20.29.jpg" width="400" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div style="text-align: justify;">
<span style="color: #575757; font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;"><br /></span></span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia, Times New Roman, Times, serif;"><span style="font-size: 15px; line-height: 24.366666793823242px;">And enjoy the video offline....<br /><br />Adios \m/</span></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com15tag:blogger.com,1999:blog-4300309844774141068.post-27063331983111398802012-05-23T12:53:00.004+05:302012-05-23T13:06:36.723+05:30<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: -webkit-auto;">
<span style="color: white; font-family: arial, sans-serif; font-size: large;"><b>4g3n71337 Hacking activity --></b></span><br />
<span style="color: white; font-family: arial, sans-serif; font-size: large;"><b><br /></b></span><br />
<span style="color: white; font-family: arial, sans-serif; font-size: large;"><b>23 - 5 - 2012</b></span><br />
<span style="color: white; font-family: arial, sans-serif; font-size: large;"><b><br /></b></span><br />
<span style="color: white; font-family: arial, sans-serif;"><b>Targeted website - blogs.hackersdemocrazy.com</b></span><br />
<span style="color: white; font-family: arial, sans-serif;"><b>Targeted by - </b></span><b style="color: white; font-family: arial, sans-serif;">4g3n71337</b><br />
<b style="color: white; font-family: arial, sans-serif;"><br /></b><br />
<b><span style="color: white; font-family: arial, sans-serif;">A pretty famous hackers blog "hackers democracy" was pwned by 4g3n71337 today.</span><br /><span style="color: white; font-family: arial, sans-serif;">The mentioned reason of the site to be hacked was that all posts in the blog was just copy paste from other website's.</span></b><br />
<b style="color: white; font-family: arial, sans-serif;">So 4g3n71337 say's --</b></div>
<div style="text-align: -webkit-auto;">
<b style="color: #222222; font-family: arial, sans-serif;"><br /></b></div>
<div style="text-align: -webkit-auto;">
<b style="color: #222222; font-family: arial, sans-serif;"><br /></b></div>
<div style="text-align: -webkit-auto;">
<span style="color: #222222; font-family: arial, sans-serif;"><br /></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #222222; font-family: arial, sans-serif; font-size: x-small;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-0BAZtLGN_bo/T7yQBdcXQ1I/AAAAAAAAAFA/7Ayrj5J9q4M/s1600/screenshot01+2012-05-23+12.46.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="183" src="http://4.bp.blogspot.com/-0BAZtLGN_bo/T7yQBdcXQ1I/AAAAAAAAAFA/7Ayrj5J9q4M/s400/screenshot01+2012-05-23+12.46.jpg" width="400" /></a></div>
<span class="kn" style="background-color: white; color: #222222; cursor: default; font-family: arial, sans-serif; font-size: 13px; font-weight: bold; margin-left: -1em; text-align: -webkit-auto; zoom: 1;" title="4g3n71337@gmail.com"><br /></span></div>Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-37528758047210279232012-02-10T19:36:00.000+05:302012-03-18T19:34:11.993+05:30Fight For The Future<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<span style="font-size: x-large;">This Saturday i.e 11-02-2012 --></span><br />
<span style="font-size: large;"><br /></span><br />
<span style="font-size: large;"><span style="font-family: Arial,Helvetica,sans-serif;">Hi--</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">Together, we beat SOPA in a huge victory for internet freedom. But this Saturday, internet freedom protests are breaking out in over 200 cities across Europe. Why?</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">Because the companies behind SOPA are using international trade agreements as a backdoor to pass SOPA-style laws</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">SOPA's supporters are pushing two agreements: ACTA and TPP1. ACTA would criminalize users, encourage internet providers to spy on you, and make it easier for media companies to sue sites out of existence and jail their founders. Sound familiar? That's right, ACTA is from the same playbook as SOPA, but global. Plus it didn't even have to pass through Congress.</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">TPP goes even farther than ACTA, and the process has been even more secretive and corrupt. Last weekend (we wish this was a joke) trade negotiators partied with MPAA (pro-SOPA) lobbyists before secret negotiations in a Hollywood hotel, while public interest groups were barred from meeting in the same building.</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">Trade agreements are a gaping loophole, a secretive backdoor track that--even though it creates new laws--is miles removed from democracy. Trade negotiators are unelected and unaccountable, so these agreements have been very hard for internet rights groups to stop.</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">But now the tide is turning. Fueled by the movement to stop SOPA, anti-ACTA protests are breaking out across the EU, which hasn't ratified ACTA. The protests are having an impact: leaders in Poland, the Czech Republic, and Slovakia have backtracked on ACTA. Now a massive round of street protests in over 200 cities is planned for this Saturday February 11th.</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">Can you take part? Click here to get the code to run on your site!</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">We just built an ACTA & TPP contact tool, and it's not just a petition. It's code for your site that figures out the visitor's country and lets them email all their Members of European Parliament--the politicians who will be voting on ACTA in June--or the trade negotiators behind TPP. This direct contact between voters and their officials, driven by websites of all sizes, was instrumental in the fight against SOPA.</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">We can use the same tactics to defeat ACTA & TPP, but there is a need your help!</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">This is just the beginning,</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">--Holmes Wilson, Tiffiniy Cheng, Joshua Blount & the whole Fight for the Future team.</span><br style="font-family: Arial,Helvetica,sans-serif;" /><br style="font-family: Arial,Helvetica,sans-serif;" /><span style="font-family: Arial,Helvetica,sans-serif;">This map of ACTA street protests in Europe is amazing. The largest has almost 50,000 RSVP's!</span></span></div>Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0tag:blogger.com,1999:blog-4300309844774141068.post-43588507685229339592012-01-22T19:40:00.000+05:302012-03-18T19:32:57.918+05:30Protect internet<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-family: Times,"Times New Roman",serif; font-size: x-large;">SOPA and PIPA</span><div style="font-family: Times,"Times New Roman",serif;">
<span style="font-size: x-large;"><b style="background-color: #666666;"><br /></b></span></div>
<span style="font-family: sans-serif;"><span style="font-size: large;">The <b>PROTECT IP</b> Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) is a proposed law with the stated goal of giving the US government and <b>copyright holders</b> additional tools to curb access to "rogue websites dedicated to infringing or counterfeit goods", especially those registered outside the U.S. The bill was introduced on May 12, 2011, by Senator Patrick Leahy (D-VT) and 11 bipartisan co-sponsors. TheCongressional Budget Office estimated that implementation of the bill would cost the federal government $47 million through 2016, to cover enforcement costs and the hiring and training of 22 new special agents and 26 support staff. The Senate Judiciary Committee passed the bill, but Senator Ron Wyden (D-OR) placed a hold on it<br /><br />The <b>Stop Online Piracy Act</b> (SOPA) is a <b>United States bill </b>proposed by U.S. Representative Lamar S. Smith (Republican) to expand the ability of U.S. law enforcement to fight online trafficking in copyrighted intellectual property andcounterfeit goods. Provisions include the requesting of court-orders to bar advertising networks and payment facilities from conducting business with infringing websites, and search engines from linking to the sites, and court orders requiring Internet service providers (ISP) to block access to the sites. The law would expand existing criminal laws to include streaming of copyright material, imposing a maximum penalty of five years in prison. </span></span><div style="font-family: Times,"Times New Roman",serif;">
<span style="background-color: #666666; line-height: 19px;"><br /></span></div>
<span style="font-family: sans-serif;"><i><b>Can we allow it ??<br /><br />--> YES or No. decide after reading the above info.</b></i></span><div style="font-family: Times,"Times New Roman",serif;">
<span style="line-height: 19px;"><b><i style="background-color: #666666;"><br /></i></b></span></div>
<span style="font-family: Times,"Times New Roman",serif; font-size: large;">according to me :<br /><br />It will affect us the user of internet only. Never bring extreme politics into internet fields.<br /><br />The Internet went silent on Wednesday, and Washington noticed.<br /><br />OK, not the whole Internet, but on Wednesday several of its biggest players -- Google, Wikipedia and Reddit, to name just a few -- took part in a protest over two bills designed to protect copyright holders from Internet piracy, particularly in instances in which the piracy takes place overseas. The bills, which are heavily backed by entertainment industry trade groups like the Motion Picture Association of America and the Recording Industry Association of America, would give copyright holders and prosecutors the ability to pursue international websites that steal content.<br /><br />Since the Stop Online Piracy Act in the House and the Protect IP Act in the Senate were introduced last year, tech companies and many of their users have been complaining that the bills were too broad. The protests reached a peak on Wednesday, when several major sites, like Wikipedia and Reddit, shut down for 24 hours while others, like Google, blacked out portions of their home pages; most of those sites also offered links to sign petitions or email Congress to express their outrage over the proposals.</span><div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<b><br /></b><br />
<b><br /></b><br />
<b><br /></b><br />
<span style="font-size: large;"><b>What the bills do:</b></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;">The entertainment industry was looking for ammunition to go after international content thieves, and SOPA/PIPA would have given them a way to do it. Because direct enforcement is tough, even in countries with whom the United States has strong trade agreements, the bills would have focused on ad networks and payment facilitators -- credit card companies and others, like PayPal, that process payments for online goods -- preventing them from doing business with violators. The bills also would have forced search sites, like Google or Yahoo, to stop listing violators.</span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;"><b>Who liked them:</b></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;">The entertainment industry, mostly. Movie and music giants say they lose huge amounts of potential revenue because of the sale and distribution of pirated content. Pharmaceutical companies also supported the bills, as they could have helped stop the flow of bootleg drugs into the United States. And the bills had the enthusiastic support of the U.S. Chamber of Commerce.</span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;"><b>Who did not:</b></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;">Pretty much the entire Internet. Opponents said the bills made it too easy to for content producers to bring legal action against domestic interests -- search sites or aggregators with user-submitted content -- even if the source of the pirated material was from another country. The management of sites that featured user-submitted content said they would be forced to closely monitor their submissions, a situation that would quickly become impossible for a large site like YouTube, which receives 48 hours worth of video every minute. Search sites said de-listing violators could force those companies to re-write the code that drives the searches, a change that could have far-reaching consequences for the basic operation of the Internet. Finally, the Internet companies continued to be concerned about being held liable should other enforcement actions fail. And the broader concerns? Those dealt with freedom of expression, halting development and potentially stunting business growth.</span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;"><b>What's next:</b></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;">It's hard to say whether SOPA/PIPA will be amended or scrapped in favor of new legislation, but even as the bill's authors announced they were being pulled on Friday, they said the efforts to protect intellectual property would continue.</span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;"><br /></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;">As you read the above stuff now decide you want<b><i> SOPA/PIPA ..</i></b></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; line-height: 15px; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;"><b><i>-information taken from wikipedia and few other website.</i></b></span></div>
<div style="border-width: 0px; font-family: Times,"Times New Roman",serif; outline-width: 0px; padding: 0px 0px 18px; vertical-align: baseline;">
<span style="font-size: large;"><b><i><span style="line-height: 15px;">-Thanks for reading through the blog. Please follow the blog by singing in guys.</span></i></b></span></div>
<br /></div>Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com1tag:blogger.com,1999:blog-4300309844774141068.post-19242823715573513582012-01-08T08:40:00.000+05:302013-05-17T21:57:38.101+05:30Iptables<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-size: x-large;"><b>Iptables
</b></span><br />
<br />
<b>operating system</b> - Linux
<br />
<b>type</b> - filter
<br />
<b>license</b> - GNU general public license
<br />
<br />
<span style="font-size: large;">How to convert your Linux box into <b>firewall</b> ?
</span><br />
<br />
<span style="font-size: large;"><span style="font-size: small;">what are <b>Iptables</b> ?
<br />- Iptables is used to set up, maintain, and inspect the tables of Ipv4 packet filtering rules in the Linux kernel. Several different tables may be defined. Each table contains number of built-in chains and may also contain user defined chains.</span></span><br />
<span style="font-size: large;"><span style="font-size: small;">Basically Linux firewall is called <b>Iptables</b><br /> </span></span><br />
<span style="font-size: large;"><span style="font-size: small;"><br />OK know you have a doubt what are <b>chains</b>
<br />-Each <b>chain</b> is a set of rules which can match a set of packets.</span></span><br />
<span style="font-size: large;"><span style="font-size: small;">
<br />-Each rule specifies what to do with a packet that falls into our rule list. </span></span><br />
<span style="font-size: large;"><span style="font-size: small;">Those packets are called the '<b>target</b>'</span>,</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-YyPO7vXbPEk/TwkI3J5_69I/AAAAAAAAACg/BYMvk34RtoE/s1600/iptables_overview.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="http://2.bp.blogspot.com/-YyPO7vXbPEk/TwkI3J5_69I/AAAAAAAAACg/BYMvk34RtoE/s400/iptables_overview.jpg" width="235" /></a></div>
<br />
<span style="font-size: large;"><b>Features of Iptables</b> </span><br />
<br />
<span style="font-size: large;"><span style="font-size: small;">1. <b>Filtering</b> - </span></span>blocking unwanted traffic). You can filter
incoming and outgoing traffic by user, group, time/date, or service
(application).<span style="font-size: large;"><br /></span><br />
<br />
2. <b>NAT (Routing)</b> - If your computer has two or more network
cards (or if you
are using virtualization ) you can use a spare computer as a router, one
network card connected to the Internet and the other to your LAN with
iptables monitoring and filtering traffic.<br />
<br />
3. <b>Logging</b> (monitoring) network traffic.<br />
<br />
if you are interested check <a href="http://en.wikipedia.org/wiki/Comparison_of_firewalls" target="_blank">Wikipedia - Comparison of firewalls</a> ..<br />
<br />
Your
firewall, Iptables, is configured either from the command line (usually
with a script) or a configuration tool ( UFW, GUFW, Firestarter, guard
dog, Shorewall, etc). Unfortunately many of the graphical configuration
tools do not offer all the available options, let alone explain the
options (Guard dog is an exception to this generalization).<br />
<br />
Configuring
iptables requires at least a basic understanding of network protocols, that is one must
know a little about networking protocols, servers, and ports to grasp
iptables. So that you can build a strong firewall !!<br />
<br />
<i>Believe me friends working with Iptables is real fun! Its m<span id="goog_1553398492"></span><span id="goog_1553398493"></span><a href="http://www.blogger.com/"></a>y own experience !</i><br />
<i>even you people will experience it !</i><br />
<br />
If you simply wish to maintain a blacklist you can look at tools such as
denyhosts and fail2ban. There is also a GUI tool "iplist".<br />
<br />
<a href="http://ubuntuforums.org/showthread.php?t=530183" target="_blank">How to iplist </a>--> thanks <a href="http://ubuntuforums.org/member.php?u=335776" target="_blank">uljanow</a><br />
<br />
<i>You should know the basics of networking concept to build a strong firewall.</i><br />
<br />
<i> </i>Like knowing TCP, UDP, ICMP protocols and about services ( /etc/services ).<br />
<br />
Check out links for networking basic concepts !<br />
<br />
<ul style="text-align: left;">
<li> <a href="http://en.wikipedia.org/wiki/Transmission_Control_Protocol" target="_blank">Wikipedia - TCP</a></li>
<li> <a href="http://www.inetdaemon.com/tutorials/internet/tcp/3-way_handshake.shtml" target="_blank">Three way handshake</a></li>
<li> <a href="http://www.erg.abdn.ac.uk/users/gorry/course/inet-pages/icmp.html" target="_blank">Internet Control Message Protocol (ICMP)</a></li>
</ul>
<br />
You can see all services in your linux machine by<br />
<br />
<span style="background-color: yellow;"><span style="background-color: black;"> <span style="color: white;"> gedit /etc/services </span> </span></span><br />
<br />
<br />
Obviously the list be very long, so use the knowledge of Linux cmd "grep to see about a particular port <br />
<br />
grep telnet /etc/services <br />
<br />
<br />
And use the scanning tool to grasp whatever information you want.<br />
<br />
Tool -<br />
<a href="http://nmap.org/download.html" target="_blank">Nmap,</a> <a href="https://www.grc.com/x/ne.dll?bh0bkyd2" target="_blank">Shields up</a><br />
netstat, lsof (scanning local machine)<br />
<br />
<b style="color: black;">Shields Up </b>is a web based scanner
you may use to scan for open ports. One common source of confusion,
if you have a router you will be scanning your router and not your computer(s) behind the router.<br />
<br />
Now we are done with the prerequisite. Now lets roll to the the main topic !!<br />
<br />
<br />
<h1>
Anatomy of iptables</h1>
<h1 style="font-weight: normal;">
<span style="font-size: small;"> Iptables
is nothing more then a set of rules for processing network packets
coming and going to and from your computer (firewall). These rules are
organized into tables and chains. A packets fate is determined by
following the rules, one at a time, like links in a chain.</span></h1>
note this guys : <i>tables are named in small letters and all the chains are in CAPS</i><br />
<b><br /></b>
<b>Filter</b> : As the word specifies, it filters packets.<br />
<b><br /></b>
<b>Nat - </b><i>Network allocation table : </i>Network Allocation Table : Think
router or forwarding packets to other machines.<br />
<br />
<b>Mangle - </b>Alteration off quality of service bits in the TCP header.<br />
<br />
<b>Raw</b> - This table is used less frequently then Mangle is to allow exception to iptables.<br />
<br />
<br />
<span style="font-size: large;"><b>Chains : </b></span><br />
<br />
<h3>
filter : <span style="font-size: small;"><b><span style="font-weight: normal;">Used to filter or block packets </span></b></span></h3>
<h3>
<span style="font-size: small;"><b><span style="font-weight: normal;"> FORWARD - </span></b><span style="font-weight: normal;">Filters packets accessible by another NIC on the firewall (ie
packets moving from eth0 [Internet] to eth1 [LAN].</span></span></h3>
<h3>
<span style="font-size: small;"><span style="font-weight: normal;"> INPUT - Filters inbound traffic (packets
going to the firewall).</span></span></h3>
<h3>
<span style="font-size: small;"><span style="font-weight: normal;"> OUTPUT - Filters outbound traffic (packets leaving the firewall).</span></span></h3>
<h3>
<span style="font-weight: normal;"><b>nat (network Allocation Table):</b></span></h3>
<div style="text-align: justify;">
<b style="font-weight: normal;"> </b><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">PREROUTING - Inbound packets to be routed (via NAT) to your clients.</span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> </span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> Output -</span><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> Outbound packets for your firewall.</span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> POSTROUTING - Outbound packets routed from pther computers.</span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">In addition to these default chains we can even use custom, or user defined chain :-)</span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><b>Actions</b> : <b>What to do if a packet is matched in any of the rules ?</b></span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><b><br /></b></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><b> </b>If a packet matches a rule, the action is called a target.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> NOTE: <i>Actions are specified with the</i> -j <i>flag, i.e</i> -j ACTION</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> <b>ACCEPT</b> - The packet is approved, or accepted.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> <b>REJECT</b> - the packet is blocked, and an error message is returned.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> <b>DROP</b> - The packet is blocked, no error message is returned.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> <b>LOG</b> - The packet is logged. After a packet is logged processing continues along the chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> <b>JUMP</b> - Just to "jump" to another chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">In addition to the defaults you may direct iptables to another (user defined) chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: x-large;"><b>Using iptables for Filtering</b> </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: x-large;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">It is very important to understand that the order of your rule is very critical. Iptables starts as usual from the top of the chain, with the rule of more priority i.e the !st rule, and proceeds down the chain until the <i>first</i> instance of DROP, REJECT, ACCEPT.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> The <b>basic syntax</b> is </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"> iptables -option [Chain] [Rule] -j [Target] </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">the term 'Target' is the action to be taken if there is any match to the rule specified by us, for example say Accept, Reject, Drop or send the packet to another, possibly user defined chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> </span><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: large;"><b>Options</b></span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: large;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-P [chain] sets default Policy (target or action) for the packet if no rule in a chain is macthed.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"> iptables -P INPUT DROP # Will drop (block) all incoming packets. </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">Note: the above policy will immediately terminate your telnet or ssh session if you have not allowed ssh connections in your INPUT chain. Very bad if you are managing your server remotely and do not have physical access.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><b>Note:</b> SSH is more preferred more telnet because the security in SSH i.e the data is encrypted so to some extent SSH is secure compared to telnet. </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">Want to know more about encryption, guys just Google it out !</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-A [chain] Appends a rule to the bottom, or end of the specified chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"> Least preferred ..</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-I [chain] Inserts a rule into chain (you specified the location). If no position is specified the default is #1 (first rule).</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -I INPUT 3 [RULE] # Will insert the [RULE] at the second position of the INPUT chain</span><span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"> . </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">See here the rank is specified as 3.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-D [chain] deletes a rule that matches its argument.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">the rule may be specified with the number in the chain or rule itself would do the same.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -D INPUT 2 # Will delete the second rule in the INPUT chain. </span><br />
<br />
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -D INPUT [RULE] # Will delete the [RULE] from the input chain. </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br />-F [chain] flushes (removes or deletes a rule that matches its argument.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">By default, in no arguments are given, this will flush the chains in the filter table.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">You may specify a table and/or chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -F INPUT # Clears the INPUT chain in the filter table. </span><br />
<br />
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -t nat -F PREROUTING # Clears the PREROUTING table in the nat table. </span><br />
<br />
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -F # Clears all the chains in the filter table (INPUT, OUTPUT, and FORWARD).</span><br />
<br />
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;">iptables -t nat -F # Clears all the chains in the nat table. </span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: x-large;"><br /></span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-L [chains] a New, user defined chain (blasklist for example).</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">By default this will list the chains in the filter table. You may specify a table with -t ( -t nat ).</span><br />
<span style="font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"><br /></span></div>
<div style="text-align: justify;">
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-N creates a New, user defined chain (blacklist for example).</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"> iptables -N blacklist </span><br />
<span style="background-color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-X delets a user defined chain.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="background-color: black; color: white; font-family: 'Liberation Mono', 'DejaVu Sans Mono', 'Courier New', monospace;"> iptables -X blacklist </span><br />
<div style="text-align: left;">
<b><br /></b></div>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">Before a chain must be deleted, it must be empty (contains no rules). To remove the rules from a table, make use of the option "-F" to flust out all the rules.</span><br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><br /></span>
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><span style="font-size: large;">Target</span></span><br />
<br />
<span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;"><span style="font-size: large;"> </span></span><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif; font-size: medium;">-j</span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> specifies target (action) default targets are LOG, ACCEPT, DROP and REJECT. You may also send processing of a packet to another chain.</span></span><br />
<br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables INPUT -j DROP # it will drop all the packets.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables INPUT -j blacklist # Will process the packets according to the blacklist chain(user defined).</span></span><br />
<br />
<br />
<span style="font-size: large;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> Rules</span></span><br />
<br />
<i><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Some rules can be changed reversed with a '!'</span></span></i><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Will take the reverse of what the rules tells.h</span></span><i><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br />
</span></span></i><i><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span></i><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">ipatbles -A INPUT -p tcp ! --dport 22 -j DROP # </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Will <i><b>not</b></i> drop any tcp packet to destination port 22</span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">-p specifies he ip protocol </span></span><i><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">(tcp, udp and icmp)</span></span></i><br />
<i><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span></i>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A INPUT -p icmp -j DROP # Block ping </span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">-s specifies the source ip address (where the packet was sent from).</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A INPUT -s 117.5</span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">2.12.23 -j DROP # drop all the packets <b>from </b></span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">117.52.12.23</span></span></div>
<div style="background-color: black; color: white;">
<br /></div>
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A blacklist -s </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">117.5</span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">2.12.23 -j DROP </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"># drop all the packets <b>from </b></span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">117.52.12.23 using a user defined chain, "blacklist"</span></span></div>
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span></div>
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A INPUT -s 192.168.0.0/24 </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">-p tcp --dport 22 -j DROP # drop all the packets for ssh( port 22 )<b> from</b> outside the LAN.</span></span></div>
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">-d specifies the source ip address (where the packet are sent to).</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> <br />
</span></span><br />
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A INPUT -s 117.5</span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">2.12.23 -j DROP # drop all the packets <b>to </b></span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">117.52.12.23</span></span></div>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br />
</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><i><b>NOTE: </b>source and destination IP address can be IP address, or with a netmask, or with a host name. But guys prevent using host names because it should query the DNS to resolve the host name, which will slow the process and DNS can be spoofed. </i></span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"></span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><i><b>tcp options </b></i>( to be used with -p tcp )</span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> -<b>-sport </b>specifies source port number or range </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">if using a range, the syntax is <b>LOW:HIGH</b></span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">LOW: the port specified + the ports higher than the specified port</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> <b>:HIGH</b> = the port specified and below it.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> <b>--dport </b>specifies the destination port, similar fromat to --sport above.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<b><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">- -tcp-flags</span></span></b><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Ah ! --tcp-flag will be 1 elaborate topic and bit complex and requires an understanding of the tcp protocol and the headrers.</span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Ex : the following are the examples which has the same effect over the packets :</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A INPUT --p tcp --syn --dport 22 -j ACCEPT # short version </span></span></div>
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span></div>
<div style="background-color: black; color: white;">
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">iptables -A INPUT --p tcp --tcp-flag SYN, ACK, RST SYN --syn --dport 22 -j ACCEPT # LONG version </span></span></div>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Meaning for the above rule is "" Matches all incoming packets with SYN flag set, but the ACK and RST flags must be cleared as well.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Multiple tcp flags can be set on a packet.</span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">The options "--tcp-flag" takes two arguments. The above command (long format) matches when its second flagged, and the rest of the flags specified in its first arguments are cleared.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">note: using "ALL" as an argument is the same as using "SYN, ACK, RST, PSH, URG, FIN"</span></span><br />
<br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">If you do not specify flags when using --tcp-flags, any SYN packet and SYN-ACK packet s accepted.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">next comes the </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><i><b>udp options</b></i>( to be used with -p udp)</span></span><br />
<br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> <b>--sport </b>specifies source port number or range </span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> <b>--dport </b>specifies the destination port, similar fromat to --sport above.</span></span><br />
<br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><i><b>icmp options</b></i>( to be used with -p ICMP)</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"> </span></span><span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">--icmp-type this option specifies the icp type of the packet to be matched.</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;">Use iptables -p --help to list the various options here (without arguments with default to all, which is what most of us want).</span></span><br />
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span>
<span style="font-size: medium;"><span style="font-family: Ubuntu, 'URW Gothic L', Veranda, Tahoma, sans-serif;"><br /></span></span></div>
<h3>
<span style="font-weight: normal;"><b>THANK YOU</b></span><span style="font-weight: normal;"></span></h3>
<div>
<span style="font-weight: normal;"><b>-ADMIN</b></span></div>
<div>
<span style="font-weight: normal;"><b><br /></b></span></div>
<div>
<b><span style="font-size: large;">Happy h4ck1ng</span></b></div>
<h3>
<span style="font-weight: normal;"></span><b><span style="font-weight: normal;"> </span></b></h3>
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/12430893112078558685noreply@blogger.com0