Quantcast
Channel: Zicutake USA Comment ®
Viewing all articles
Browse latest Browse all 2733

#Technology

$
0
0

#Technology


How to write a bug report

Posted: 19 Sep 2015 08:43 AM PDT

How to write a  bug report !!!

1) Report the problem immediately:

Well If you found any
bugs while testing the website or web applications, do not wait to write detail bug report later.
write the bug report immediately as soon as possible. This will may ensure a good and
reproducible bug report. If you decide to write the bug report later on
then chances are high to miss the important steps in your report.so always be fast on your work

2) Reproduce the bug three/four times before writing a bug report:

Your bug should be reproducible. Make sure your steps are robust enough to reproduce the bug without any ambiguity.

Your bugs should always be reproducible. Make sure your steps are most robust enough to
reproduce the bugs  without any ambiguity. If your bugs is not reproducible
every time you can still file a bug mentioning the periodic nature of the bug.

 

 

3) Test the same bugs occurrence on other similar module

Sometimes developer use same code for different similar modules. So
chances are more  higher that bug in one module can occurs in other similar
modules as well. Even you can try to find more severe version of the bug
you found.

4) Write a good bugs summary for Bug reports

Bug summary will help developers to quickly analyze the bug nature.Bugs summary will help developers/programmers to quickly analyze the bugs nature. Poor
quality report will unnecessarily increases the development and testing
time. Communicate well through your bug report summary. Keep in mind bug
summary is used as a reference to search the bug in bug inventory.

5) Read bugs report before hitting Submit button

Read all sentences, wording, steps used in bug reports. See if any
sentence is creating ambiguity that can leads to misinterpretation.
Misleading words or sentences should be avoided in order to have a clear
bug reports.

6) Do not use Abusive languages on bug report

It is nice that you did a good work and found a bug but do not use this
credit for criticizing developer/programmer or to attack any individuals.

Conclusion

No doubt that your bugs report should be a high quality documents. Focus
on  writing good bug reports, spend some time on this tasks because this
is main communication point between tester,programmer, developer and manager.
Managers should make aware to their team that writing a good bug report
is primary responsibility of any tester
. Your efforts should towards writing
good bug report will not only save company resources but also create a
good relationship between you and developers/programmers

For better productivity write a better bug report

The post How to write a bug report appeared first on Madhnw0rm.

Hacker search engine Shodan is the Scariest Search Engine on Internet

Posted: 18 Sep 2015 12:16 AM PDT

Shodan  is the Scariest Search Engine on Internet


Shodan also allows users to filter their searches based on a range of criteria such as location, IP address and even searches which identify those devices with little or no security settings.


Shodan, named after the main antagonist of the cyberpunk-horror video game System Shock, has been called the “scariest search engine on the internet” but  has said his pet project is about highlighting the problem, not allowing people to take advantage of it.


 Shodan is more of a prying eye across the world through the IoT rather than just a simple search engine


Shodan is living up to his name. Already designated as 'world's scariest search engine', it is commonly called the hacker search engine.

Shodan  is the Scariest Search Engine on Internet



Shodan works by collecting and stacking HTTP addresses from various devices linked over the Internet across the world. The indexing is done on the basis such as country, OS and brand.


Hackers can breach into your system if your IoT hub is exposed on the Internet using this hacker search engine. It won't be easy, however, it is not impossible either.

There are a number of devices out there that still run on their default passwords or no passwords at all





There are a number of devices out there that still run on their default passwords or no passwords at all. Shodan crawls through the Internet for such accessible devices

The post Hacker search engine Shodan is the Scariest Search Engine on Internet appeared first on Madhnw0rm.

Samsung Launches Samsung Pay Which May beat Android Pay to market

Posted: 16 Sep 2015 11:13 PM PDT

Samsung Launches Samsung Pay Which May beat Android Pay to market


Coming to new S6 EDGE+, Galaxy Note 5 , along with Galaxy S6 and S6 Edge


Samsung Pay is expected to be available in the US on September 28 and will come bundled with the Galaxy S6 Edge+ and the Galaxy Note 5; it will also be downloadable to two older but-still-new Galaxy devices: the S6 and S6 Edge

Samsung Pay seems to have going for it is its ability to send payment information over MST (Magnetic Secure Transmission), a technology that predates NFC and is supported by a much larger subset of older card readers. This could potentially boost Samsung Pay's acceptance rate, since it could be used in places without the NFC-equipped readers required for Android Pay to work.

Samsung Pay seems to have going for it is its ability to send payment information over MST

Samsung's presentation highlighted the universal acceptability of Samsung Pay (leaning on MST). The company also claims that it's the first mobile payment solution to come to market with support for store-branded credit cards, store membership cards, and gift cards. Card information is protected with Samsung's “KNOX” technology (the same tech Samsung has been toying with for dual-role work/home devices for years) and is accessed with a fingerprint scan

Simple Steps to Pay

  • Swipe up from the home button. Or, select the Samsung Pay app icon from your home screen or app tray
Swipe up from the home button. Or, select the Samsung Pay app icon from your home screen or app tray
  • Authorize payments by simply scanning your finger on the home key
  • Hover your phone over the in-store card reader. Congratulations! You just paid!
Samsung Pay is accepted virtually anywhere you can swipe or tap your card.* Samsung Pay makes transactions super easy — Swipe. Secure. Hover. Pay. And it's safe; your purchases remain yours alone; Samsung Pay doesn't store or share your payment information, so you can pay without worry. *Only compatible with select cards and Samsung devices; check back soon for compatibility list.

The post Samsung Launches Samsung Pay Which May beat Android Pay to market appeared first on Madhnw0rm.

Kali Linux Commands

Posted: 16 Sep 2015 10:17 PM PDT

Kali Linux (Formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions.

An A-Z Index of the Bash command line for LinuxKali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below.

All commands (A-Z) for Kali Linux here:

A
apropos : Search Help manual pages (man -k)
apt-get : Search for and install software packages (Debian/Ubuntu)
aptitude : Search for and install software packages (Debian/Ubuntu)
aspell : Spell Checker
awk : Find and Replace text, database sort/validate/index
B
basename : Strip directory and suffix from filenames
bash : GNU Bourne-Again SHell
bc : Arbitrary precision calculator language
bg : Send to background
break : Exit from a loop
builtin : Run a shell builtin
bzip2 : Compress or decompress named file(s)
C
cal : Display a calendar
case : Conditionally perform a command
cat : Concatenate and print (display) the content of files
cd : Change Directory
cfdisk : Partition table manipulator for Linux
chgrp : Change group ownership
chmod : Change access permissions
chown : Change file owner and group
chroot : Run a command with a different root directory
chkconfig : System services (runlevel)
cksum : Print CRC checksum and byte counts
clear : Clear terminal screen
cmp : Compare two files
comm : Compare two sorted files line by line
command : Run a command – ignoring shell functions •
continue : Resume the next iteration of a loop •
cp : Copy one or more files to another location
cron : Daemon to execute scheduled commands
crontab : Schedule a command to run at a later time
csplit : Split a file into context-determined pieces
cut : Divide a file into several parts
D
date : Display or change the date & time
dc : Desk Calculator
dd : Convert and copy a file, write disk headers, boot records
ddrescue : Data recovery tool
declare : Declare variables and give them attributes •
df : Display free disk space
diff : Display the differences between two files
diff3 : Show differences among three files
dig : DNS lookup
dir : Briefly list directory contents
dircolors : Colour setup for `ls'
dirname : Convert a full pathname to just a path
dirs : Display list of remembered directories
dmesg : Print kernel & driver messages
du : Estimate file space usage
E
echo : Display message on screen •
egrep : Search file(s) for lines that match an extended expression
eject : Eject removable media
enable : Enable and disable builtin shell commands •
env : Environment variables
ethtool : Ethernet card settings
eval : Evaluate several commands/arguments
exec : Execute a command
exit : Exit the shell
expect : Automate arbitrary applications accessed over a terminal
expand : Convert tabs to spaces
export : Set an environment variable
expr : Evaluate expressions
F
false : Do nothing, unsuccessfully
fdformat : Low-level format a floppy disk
fdisk : Partition table manipulator for Linux
fg : Send job to foreground
fgrep : Search file(s) for lines that match a fixed string
file : Determine file type
find : Search for files that meet a desired criteria
fmt : Reformat paragraph text
fold : Wrap text to fit a specified width.
for : Expand words, and execute commands
format : Format disks or tapes
free : Display memory usage
fsck : File system consistency check and repair
ftp : File Transfer Protocol
function : Define Function Macros
fuser : Identify/kill the process that is accessing a file
G
gawk : Find and Replace text within file(s)
getopts : Parse positional parameters
grep : Search file(s) for lines that match a given pattern
groupadd : Add a user security group
groupdel : Delete a group
groupmod : Modify a group
groups : Print group names a user is in
gzip : Compress or decompress named file(s)

H
hash : Remember the full pathname of a name argument
head : Output the first part of file(s)
help : Display help for a built-in command
history : Command History
hostname : Print or set system name

I
iconv : Convert the character set of a file
id : Print user and group id's
if : Conditionally perform a command
ifconfig : Configure a network interface
ifdown : Stop a network interface
ifup : Start a network interface up
import : Capture an X server screen and save the image to file
install : Copy files and set attributes

J
jobs : List active jobs
join : Join lines on a common field

K
kill : Stop a process from running
killall : Kill processes by name
L
less : Display output one screen at a time
let : Perform arithmetic on shell variables
ln : Create a symbolic link to a file
local : Create variables
locate : Find files
logname : Print current login name
logout : Exit a login shell
look : Display lines beginning with a given string
lpc : Line printer control program
lpr : Off line print
lprint : Print a file
lprintd : Abort a print job
lprintq : List the print queue
lprm : Remove jobs from the print queue
ls : List information about file(s)
lsof : List open files

M
make : Recompile a group of programs
man : Help manual
mkdir : Create new folder(s)
mkfifo : Make FIFOs (named pipes)
mkisofs : Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod : Make block or character special files
more : Display output one screen at a time
mount : Mount a file system
mtools : Manipulate MS-DOS files
mtr : Network diagnostics (traceroute/ping)
mv : Move or rename files or directories
mmv : Mass Move and rename (files)

N
netstat : Networking information
nice Set : the priority of a command or job
nl Number : lines and write files
nohup : Run a command immune to hangups
notify-send : Send desktop notifications
nslookup : Query Internet name servers interactively
O
open : Open a file in its default application
op : Operator access

P
passwd : Modify a user password
paste : Merge lines of files
pathchk : Check file name portability
ping : Test a network connection
pkill : Stop processes from running
popd : Restore the previous value of the current directory
pr : Prepare files for printing
printcap : Printer capability database
printenv : Print environment variables
printf : Format and print data •
ps : Process status
pushd : Save and then change the current directory
pwd : Print Working Directory
Q
quota : Display disk usage and limits
quotacheck : Scan a file system for disk usage
quotactl : Set disk quotas
R
ram : ram disk device
rcp : Copy files between two machines
read : Read a line from standard input
readarray : Read from stdin into an array variable
readonly : Mark variables/functions as readonly
reboot : Reboot the system
rename : Rename files
renice : Alter priority of running processes
remsync : Synchronize remote files via email
return : Exit a shell function
rev : Reverse lines of a file
rm : Remove files
rmdir : Remove folder(s)
rsync : Remote file copy (Synchronize file trees)

S
screen : Multiplex terminal, run remote shells via ssh
scp : Secure copy (remote file copy)
sdiff : Merge two files interactively
sed : Stream Editor
select : Accept keyboard input
seq : Print numeric sequences
set: Manipulate shell variables and functions
sftp : Secure File Transfer Program
shift : Shift positional parameters
shopt : Shell Options
shutdown : Shutdown or restart linux
sleep : Delay for a specified time
slocate : Find files
sort : Sort text files
source : Run commands from a file `.'
split : Split a file into fixed-size pieces
ssh : Secure Shell client (remote login program)
strace : Trace system calls and signals
su : Substitute user identity
sudo : Execute a command as another user
sum : Print a checksum for a file
suspend : Suspend execution of this shell
symlink : Make a new name for a file
sync : Synchronize data on disk with memory

T
tail : Output the last part of file
tar : Tape Archiver
tee : Redirect output to multiple files
test : Evaluate a conditional expression
time : Measure Program running time
times : User and system times
touch : Change file timestamps
top : List processes running on the system
trace route : Trace Route to Host
trap : Run a command when a signal is set
tr : Translate, squeeze, and/or delete characters
true : Do nothing, successfully
tsort : Topological sort
tty : Print file name of terminal on stdin
type : Describe a command

U
ulimit : Limit user resources
umask : Users file creation mask
umount : Unmount a device
unalias : Remove an alias
uname : Print system information
unexpand : Convert spaces to tabs
uniq : Uniquify files
units : Convert units from one scale to another
unset : Remove variable or function names
unshar : Unpack shell archive scripts
until : Execute commands (until error)
uptime : Show uptime
useradd : Create new user account
userdel : Delete a user account
usermod : Modify user account
users : List users currently logged in
uuencode : Encode a binary file
uudecode : Decode a file created by uuencode

V
v : Verbosely list directory contents (`ls -l -b')
vdir : Verbosely list directory contents (`ls -l -b')
vi : Text Editor
vmstat : Report virtual memory statistics

W
wait : Wait for a process to complete
watch : Execute/display a program periodically
wc : Print byte, word, and line counts
whereis : Search the user's $path, man pages and source files for a program
which : Search the user's $path for a program file
while : Execute commands
who : Print all usernames currently logged in
whoami : Print the current user id and name (`id -un')
wget : Retrieve web pages or files via HTTP, HTTPS or FTP
write : Send a message to another user

x
xargs : Execute utility, passing constructed argument list(s)
xdg-open : Open a file or URL in the user's preferred application.

 Run a command script in the current shell ! Run the last command again 

The post Kali Linux Commands appeared first on Madhnw0rm.

Chennai Bloggers ShoutMeet – My Experience

Posted: 16 Sep 2015 09:32 AM PDT

        Attended the first Blogger meet With Harsh Agarwal


                              #ShoutMeet


On 16th September 2015 . I attended an Bloggers meet In Chennai . Called as ShoutMeet . Which is an Initiative by Harsh Agarwal from Shoutmeloud . And in this Intiative .He has travelled around 6400 Kms across India . To Meet Bloggers of Different Cities . And know them . And help them out with their Blogging queries
Bloggers meet Shout me loud

And Met Top #Bloggers ( S.Pradeep Kumar , Nirmala Santha Kumar ) and others bloggers 


So on the Chennai meet we had around 20 members . in which some were Pro bloggers and some were Budding bloggers .  First we had the intro of All of the bloggers .

And then we continued with  we had many questions about blogging and its Techniques and he answered all of them . We had a lot of Fun . I learned many thing from him about this field .

                                                             

The post Chennai Bloggers ShoutMeet – My Experience appeared first on Madhnw0rm.

Clash of clans mod apk v7.156.10 september 2015 Unlimited Gems Gold Elixr

Posted: 16 Sep 2015 12:02 AM PDT

Clash of clans mod apk september 2015


 ROOT NEEDED!


The application of Clash of Clans Private Server Switcher allows you to connect to Clash of Clans Private Servers. It  automatically modifying your hosts file. 

As well  I remember in addition that the status of the server is not updated automatically, so if you try to log on and the game don’t load it may be possible that the server is offline. I’ll try to update the list of servers as much as possible, other information can be found in the relevant section of the app. 

The application Clash of Clans Private Server Switcher allows you to connect to Clash of Clans Private Servers, made with Ultra power, automatically modifying your hosts file.

The list currently contains 10 servers and was created using the information shared by users 

IMPORTANT NOTES :


If Clash of Clans start crashing don’t worry, just go to Settings->Applications->Clash of Clans and click Delete Data, and then restart the game, this should work!

Requirements:


Compatible with all Android mobiles. Requires Android OS 2.3+. Network connection required to update the list.

REMEMBER TO LINK THE GAME ON GOOGLE PLAY GAMES TO AVOID YOUR VILLAGE TO BE LOST!


 https://goo.gl/lF6Pac

Screenshots :-

clash of clan mod

The post Clash of clans mod apk v7.156.10 september 2015 Unlimited Gems Gold Elixr appeared first on Madhnw0rm.

Malicious text messages can hack android phones

Posted: 15 Sep 2015 10:39 PM PDT

900 million android phones can be hjacked by malicious text messages

We Know that Almost All Android mobile devices available today are suspectible to hacks that can be execute malicious code when they are sented as an malformed text message or the user is lured to a malicious website, a security researcher reported.


About 900 to 950 millions Android phones and tablets are affected vulnerabilities, an android code library that processes several widely used media formats.


The malicious message will execute malicious code on the vulnerable device with no action required to the end user and no indication

About 900 to 950 millions Android phones and tablets are affected vulnerabilities

A fully weapon ized successful attack could even delete the message before you see it. You will only see the notification. These vulnerabilities are extremely dangerous because they do not require that the victim take any action to be exploited. Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised and you will continue your day as usual—with a trojan ed phone.


“Well vulnerability can be exploited using other attack techniques,targets to malicious websites”


Vulnerable devices running Android versions prior to 4.3 (Jelly Bean) are at the greatest risk, since earlier Android versions lack some of the more recent exploit mitigations

Android is designed with a security sandbox that prevents most apps from being able to access data used by other apps. That goes a long way to containing the damage Stage fright and similar code-execution exploits can do. In theory, for instance, it should prevent  exploits from sniffing login credentials used by a properly designed banking app.

Vulnerabilities

The attacker would have remote arbitrary code execution and thus escaping the sandbox is only a small step away,” Drake said. He said existing root exploits, including those known PingPongRoot, Towelroot, and put_user, would likely help an attacker break free of the sandbox and gain much wider control over a vulnerable device

The post Malicious text messages can hack android phones appeared first on Madhnw0rm.

How to report bug ?

Posted: 15 Sep 2015 08:28 AM PDT

WHAT IS A BUG ?

If your bug report is effective, chances are higher or more higher that it will get fixed, So fixing a bug is depended on how effectively reporting it

Reporting a bug is a not a hobby or a skill ,It will tell you how to achieve our skill on finding bugs on web applications or websites.

THE POINT OF WRITING BUG REPORT IS TO GET BUGS FIXED

If tester is not reporting bug correctly programmer will most likely reject the bug as irreproducible,This can hurt testers ability and time also.

If tester is not reporting bug correctly programmer will most likely reject the bug as irreproducible,This can hurt testers ability and time also.

What are the qualities of a good or evil software bug report ? 

Anyone can write a bug report even script kindle can also write a bug report,But not everyone can write a effective bug report,The average bug report and a good bug report


How to distinguish a bad or good bug report ?

It is simple ,apply techniques and characteristics to report a bug

  • Having clear and uniform specified bug 

Always try to assign a unique number to each bug report,This will help to identify the bug record,if you are finding bugs manually ,you have to assign your itself.If you are using any automated bug reporting tool then the unique number will be generated automatically each time you report the bug

  • Reproducible

Well describe step by step about the bug problem is easy to reproduce and fix,If your bug is not reproducible it will never get fixed,Do not assume or skip any reproducible step.

  • Be Specific

Do not combine multiple problems even they seem to be similar.Do not write a essay about the problem. Be Specific and to the point.
Try to summarize the problem in minimum words yet in effective way. Always write different reports

How to Report a Bug To Companies?

Use Always Simple Bug report Template :

Well This is a simple bug report format, if you are writing bug report manually then some fields should need to specifically mention like bug number which should be assigned manually… For bug reporting use Bug report Tool.

Bug Reporting

Reporter : Your Name and mail address.
           Ex : Madhan Raj M and M*****7@gmail.com

Product : In which product you found this bug
          Ex : Facebook,Twitter,Google,etc…

Version : The product version if any

Component : These are the major sub modules of the product

Platform : Mention the hardware platform where you found this bugs.The Various platforms like Mac,HP,PC,Sun etc…

Operating System:

Mention all operating systems where you found the bug. operating systems like Linux,Unix,SunOs,Mac os,Windows.

bug report

Mention the different OS versions also if applicable like windows NT, Windows 2000, Windows XP etc..

Priority :

  When bug should be fixed ? Priority is generally set from P1 to P5 as fix the bug with highest priority and P5 as Fix when time permits.

Severity :    This describes the impact of the Bug

Types of Severity

  1. Blocker : No further testing work can be done 
  2. Critical : Application crash/Loss of data
  3. Minor : Minor loss of function
  4. Trivial : Some UI enhancements
  5. Major : Major loss of function
  6. Enhancement : Request for new feature or some enhancement in exisiting one

 Status:

When you are logging the bug in any bug tracking system then by default the bug status is new

Later on bug goes through various stages like FixedmReopen,Verified,Won’t Fix etc..

Assign to:

If you know which developer is responisible for that particular module in which bug occured,else keep it blank this will assign bug to module owner or manager will assign bug to developer,possibly add the manager email address in cc list,then you can specify email address of that developer.

URL:

The page url on which bug occured

Summary:

A brief summary of the bug mostly in 80 or below words. Make sure your summary is reflecting what the problem is and where it is.


Description:

A detailed description of bug, Use following fields for description field:

 Actual result : What is the actual result on running above steps
Expected result: How application should behave on above mentioned steps
Reproduce steps: Clearly mention the steps to reproduce the bug

These are the important steps in bug report, You can also add the report type as one more field which will describe the bug type.

The report Types are Typically

  • Coding error
  • Design error
  • Hardware problem
  • Documentation issue
  • New suggestion

The post How to report bug ? appeared first on Madhnw0rm.

Moto X play review

Posted: 15 Sep 2015 04:50 AM PDT

Motorola is here with another wonderful mid-range smartphone in Moto X series, the Moto X Play. They have launched the product few hours ago into the market through the ecommerce giant Flipkart. The first official sale is going to start this 16/09/2015 mid-night on Flipkart and thanks to Motorola for not bringing up a flash-sale system.


This Moto device looks way better than the Moto G3 (3rd generation) and has some exciting features compared to it. Let's take a peek through of specifications of this product and see if it is worthy to buy at the price point.
The screen quality would be great as it is bigger, sharper and hope it would be non-yellowish unlike Moto G3





DISPLAY


The screen quality would be great as it is bigger, sharper and hope it would be non-yellowish unlike Moto G3


Moto X Play sports a 5.5. inch full HD 1080p display with 403 ppi and is protected by Corning Gorilla Glass 3

DESIGN


Moto X Play looks as same as Moto  X (2nd generation) on the front side but on the back it reminds me One Plus Two with a camera position connecting the groovy logo. The flash was engraved on the connecting strip only. The body is made up of hard plastic with a textured back panel and a bezel around the perimeter.

Motorola took the concerns over the battery life seriously with Moto X Play


Carved 8.9-10.9mm thinner, with 75mm horizontal width and 148mm length, Moto X Play weighs 169gms i.e., 5.96oz. It feels lighter than some other mid-range phones in the market.
It is available in two colors, black & black and while & winter white as for now.
STORAGE

Moto X Play comes with 16 GB & 32 GB internal memory on board of which user can use only8.2 GB & 23 GB respectively and the rest is occupied by the operating system. Memory can be expanded through microSD card up to 128 GB
OPERATING SYSTEM

Moto X Play comes with latest Android 5.1.1 Lollipop operating system on board. This helps in conserving the RAM and battery better than the previous 5.0 Lollipop version. Motorola always encourages pure Android experience on their devices and so they would be in the first row to take the upgrades.

BATTERY

Motorola took the concerns over the battery life seriously with Moto X Play. They've added 3630mAh Li-ion battery that lasts long almost 2 days on moderate usage. The operating system, Lollipop 5.1.1 helps in managing the battery juice well.

NETWORK & CONNECTIVITY

Moto X Play is announced at the price of 18,499 INR for 16 GB version and 19,999 INR for 32 GB version
X Play comes supports 4G LTE SIM in both the slots. It comes with common connectivity features like Bluetooth v4.0, Wi-Fi 802.11 a/g/b/n, 3G HSPA+, micro USB, USB and Wi-Fi Tethering and GPS (A-GPS, GLONASS, BeiDou, with Google Maps). It also have NFC unlike many other mid-range smartphones in the market today.

PRICE

Moto X Play is announced at the price of 18,499 INR for 16 GB version and 19,999 INR for 32 GB version




The post Moto X play review appeared first on Madhnw0rm.

IDS,Firewalls & Honeypots

Posted: 15 Sep 2015 02:26 AM PDT

IDS,Firewalls & Honeypots


Intrusion Detection System


An intrusion detection system is a device or software application that monitors network and or system activities for malicious activities or policy violations and produce reports to a management station

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. NIDS is a network security system focusing on the attacks that come from the inside of the network (authorized users). When we classify the designing of the NIDS according to the system interactivity property, there are two types: on-line and off-line NIDS. On-line NIDS deals with the network in real time and it analyses the Ethernet packet and applies it on the some rules to decide if it is an attack or not. Off-line NIDS deals with a stored data and pass it on a some process to decide if it is an attack or not.

An intrusion detection system is a device or software application that monitors network and or system activities for malicious activities or policy violations and produce reports to a management station

 Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPS es for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization

Evasion techniques

There are a number of techniques which attackers are using, the following are considered 'simple' measures which can be taken to evade IDS:

  • Fragmentation: by sending fragmented packets, the attacker will be under the radar and can easily bypass the detection system’s ability to detect the attack signature.
  • Avoiding defaults: The TCP port utilised by a protocol does not always provide an indication to the protocol which is being transported. For example, an IDS may expect to detect a trojan on port 12345. If an attacker had reconfigured it to use a different port the IDS may not be able to detect the presence of the trojan.
If an attacker had reconfigured it to use a different port the IDS may not be able to detect the presence of the trojan.
  • Coordinated, low-bandwidth attacks: coordinating a scan among numerous attackers (or agents) and allocating different ports or hosts to different attackers makes it difficult for the IDS to correlate the captured packets and deduce that a network scan is in progress.
Insertion Attack

  •   An IDS blindly believes and accepts a packet that an end system rejects
  •    This attack occurs when NIDS is less strict in processing packets
  •   The IDS gets more packets than the destination
Obfuscating

  •    An IDS can be evaded by obfuscating or encoding the attack payload in a way that the great target understood but the IDS will not
  • Attackers manipulate the path referenced the signature to fool the HIDS
Session Splicing
A technique used to bypass ids where an attacker splits the packets that has no single packet triggers the IDS

UNicode Evasion Technique

Unicode is a character coding system to support the worldwide interchange processing and display of the written texts

Overlapping Fragments

An IDS evasion technique is to craft a series of packets with TCP sequence numbers configured to overlap

TIME TO LIVE ATTACKS

These attacks requires the attacker to have a prior knowledge of the topology of the victim network

This Information can be obtained using tools such as trace route which gives information on the number of routes between the attacker and the victim

The post IDS,Firewalls & Honeypots appeared first on Madhnw0rm.


Viewing all articles
Browse latest Browse all 2733

Trending Articles