The Technical Avenue

Going through The Technical Avenue you will understand and explore the facts of computer related technologies.

Why Information Security ?

Some years ago information security is not a hot topic. Because in that time organizations did not heavily depend on computer based system. Internet was not there and few people had the technical knowledge. But nowadays, the situation got changed.

37H1cAl Hacking

Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks

Computer Virus Analysis

Types of Computer Viruses, Infection Strategies, Antivirus Defense Development.

Usefull Softwres and Tools.

Contains an abbreviated list of very useful software tools for different purposes.

Pages

Please leave a comment as often as you see fit.. :)

Friday, August 31, 2012

CurrPorts Port Scanner (Ethical Hacking Toolz)

Port Scanners are important to network security technicians because they can reveal possible security vulnerabilities on the targeted system.

CurrPorts is a portable executable that list down all currently opened TCP/IP and UDP ports on local computer. And also it displays  information about the process that ports are opened for, including the process name, full path of the process, version information of the process, the time that the process was created, and the user that created it.


And also you can close unwanted TCP connections, kill the process that opened the ports, and save the TCP/UDP ports information to HTML file, XML file, or to tab-delimited text file.

CurrPorts also automatically mark with pink color suspicious TCP/UDP ports owned by unidentified applications(Applications without version information and icons).

Download CurrPorts
Download CurrPorts for 64bit

Please let me know if anything is not working properly. See you all in next post. Good Luck. ;)


Thursday, August 30, 2012

Track Your Stolen Laptop, Smart Phone



What would you do if someone steals your notebook or smart phone with its precious or sensitive data that comprises your digital, personal and work life?

Prey is a lightweight tracking software that helps you find, lock and recover your device when stolen or missing. It is open-source and available for Windows, Mac OS X, Linux and Android.


How Prey works:

Prey tracking software runs in the background processes of your notebook. It "wakes" at a specified interval, goes online (if your laptop isn't already connected to the Internet, Prey tries to connect to the nearest open Wi-Fi access point) and checks in with a specified Web address to see what you have ordered it to do. If said address doesn't issue a command to the laptop (such as telling your computer that it is considered stolen), the Prey software returns to sleep and will wake up again at the next time interval.

If your laptop is stolen, you can use another computer to sign in to the Prey Web site, mark the laptop as missing, and follow the whereabouts of your purloined system through a control panel -- assuming the thief takes your notebook online or the software manages to connect to a Wi-Fi access point. 
(Read More: preyproject.com)

Video Guide: vimeo.com/18728980
Download Prey: Official Site

Saturday, August 4, 2012

Hide Files Inside of Image Files

1. Create a new folder on your HDD,
   Example: I create a folder in my D: drive and rename it as "Lesson". ( D:\Lesson )
* It better you follow my blue colored examples if you are a n00b.

2. Then drop the file(s) that you need to hide, into that folder. And also, place the image that you'll be using to hide the files in. In my case I have want to hide a text file ( Test.txt ) file inside a image file( Image.jpg ). So I put both files into D:\Lesson folder.

3. Now select the file(s) that you want to hide. Only select the files you want to hide, not the picture. (In my case I select only the Text.txt file.) Right-click on them; and choose the option to add them to a compressed RAR file. In order to accomplish this task, you will need to have either archiving or compression program such as WinRAR installed on your computer.

Name this RAR file whatever you want. I renamed it as “Secret.rar”.

4. Now click on Start, and then click on Run ( or press Windows Key + "r" ). It will open-up the run dialog box. In there type “CMD” without the quotes and press Enter.
It will pop-up the command prompt window.
Use "cd" command on command prompt to change the current working directory of the CMD in to your folder that contain the secret files. As my example I type cd D:\Lesson to get to the "Lesson" directory in D: drive.

5. If you successfully move to your folder on CMD, then type the following line:
"copy /b NameOfTheImage.JPG + NameOfZIPorRAR.rar NameOfNewSecretImage.jpg" ( without "s ) and press Enter.

In my example;
copy /b Image.JPG + Secret.rar SecretImage.jpg

If you success it will say "1file(s) copied.".

And that’s it! The image file will have been updated with the compressed archive inside! You can actually check the file size of the picture and see that it has increased by the same amount as the size of the archive. Now You can delete all other files except the SecretImage.jpg ( Newly build secret image. ).

You can access your hidden file(s) by simply change the extension to .RAR and open the file using WinRAR.
Then your hidden files show up and you can extract them out.
It may sound like a lot of work, but it's a pretty simple. That is all it takes to hide files inside JPG picture files! It’s a great way simply because not many people know it’s possible and no one even thinks about a picture as having to the ability to “hide” files. This is only a tiny trick. A kind of a foolproof method. But if you want to get really serious about encryption, you'll want to encrypt your data with TrueCrypt.

Good luck and keep exploring..!! ;)

Anonymous Browsing - An Introuduction to Tor

Surfing the internet securely through VPN or web proxy might do the tactic for some individuals who concern about the online privacy. Tor is a tool bundle for organizations and individuals that want to improve their safety & security on the web. It is enable online anonymity. You can perform anonymous web surfing,  publishing, instant msging, and any other utility that use the TCP protocol.

Tor design to maintain safeguard against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Tor short for The Onion Router. It is free and open source for Windows, Mac, Linux/Unix, and Android. Download Tor from Tor official web site and assure your privacy.