add2

How To Stop Brute Force Attack Using Neo4j


How To Stop Brute Force Attack Using Neo4j

 Brute force attacks are most common attacks used by hackers. This type of attack has compromised many online user credentials.

Hackers are using brute force attack to target any website they could get, ranging from Fortune 500 companies to very small websites.

The aim of such attacks is mainly to compromise user information (including Social Security numbers, credit card data and bank account details) and commit financial frauds using identity theft. Once information is obtained by hackers it can be misused by them for selling in black market, spamming and more unethical means to exploit it.

In this article we are going to discuss the use of graph database for stopping the brute force attack.


What Is Brute Force Attack?

In cryptography, Brute force attack is defined as a approach of systematically checking all possible passwords until the correct one is found. This type of attack may take time proportional to the complexity of password.

Brute force attacks are typically performed with the help of dictionary containing most common usernames, passwords and english words and variants.

For example some of the most commonly used passwords are listed below


  1. 123456
  2. password
  3. 12345678
  4. qwerty
  5. abc123

and most common user names are

  1. admin
  2. root

How To Identify A Brute Force Attack Is In Progress?

There can be multiple approaches to identify brute force attacks.


  • Most common way is to track failed login attempts. If there are many failed login attempts from an IP within short period of time it may be sign of a brute force attack.
  • Too Many Login attempts with easy passwords that are not allowed on website. This can be a easy catch for your website since in case your password policy does not allow easy passwords. An easy password list can be maintained for identifying attack is being made with a password dictionary.

How Neo4j Can Help In Detecting Brute Force Attack?

Neo4j is a highly scalable graph database where multiple complex relations can be easily stored and retrieved. The ability to do complex query in real time can prove really helpful in identifying a brute force attack must faster.
We have used Neo4j 2.1.4 in this article, however this should be achievable with any version of Neo4j and other popular graph databases.

Information To Capture In Neo4j Graph Database

The most important thing to do in identifying such attacks is to capture enough information about each request. Some of the required information is


  • Client IP Address - Remember to get the real client IP address not proxy IP.
  • Login Attempt Success or Failure information
  • Timestamp

Setting Up The Structure Of Graph

The graph structure for this is going to be really simple with just 2 types of nodes and 1 type of relationship

brute force graph setup

  • User Nodes
  • IP Nodes
  • WrongPasswordAttempt Relations (with two attributes timestamp & weakPass)

Neo4j Cypher Queries To Create The Graph

Neo4j database uses Cypher query language to manipulate data on Neo4j. Below are some queries you can use to setup and retrieve data from graph database.

Create unique constraint on the attribute value level to avoid any duplicate nodes.

CREATE CONSTRAINT ON (n:User) ASSERT n.uid IS UNIQUE;
CREATE CONSTRAINT ON (n:IP) ASSERT n.ip IS UNIQUE;


Use merge command to create nodes since this will ensure you do not create if it already exists.

MERGE (u:User {uid:'JohnDoe'}) return u

MERGE (i:IP {ip:'1.2.3.4'}) return i


Cypher statement to create WrongPasswordAttemept relation between existing IP address and user node.

MATCH (i:IP {ip:'1.2.3.4'}), (u:User {uid:'JohnDoe'})
MERGE (i)-[r:WrongPasswordAttempt {timestamp:timestamp(), weakPass:'Y'}]->(u)




Using Cypher Queries In Identifying The Attack In Progress

Query to identify number of failed login attempts in last 5 minutes from the ip (1.2.3.4)

MATCH (n:IP {ip:'1.2.3.4'})-[r:WrongPasswordAttempt]->(b)
WHERE r.timestamp > (timestamp() - 300000)
RETURN count(r)


Query to identify number of failed login attempts with weak password in last 5 minutes from the ip (1.2.3.4)

MATCH (n:IP {ip:'1.2.3.4'})-[r:WrongPasswordAttempt]->(b)
WHERE r.timestamp > (timestamp() - 300000) and r.weakPass='Y'
RETURN count(r) as WPACount


In above query following identification parameters are used.


  • Value 300000 is equivalent to 5 mins in milliseconds.
  • WPACount - is the Wrong Password Attempt count in 5 minutes duration

The time duration and number of failed attempts (WPACount) need to be analyzed based on application usage and load. In a ideal application it must be kept configurable value that can be modified at run time when needed.

This may sound trivial, however once your application is created your most time will be spent in analyzing and changing these parameters.

The attackers are typically using bots to launch brute force attacks and once they learn your detection speed them may reduce the speed to attack to stay below the radar.

Taking Action To Stop The Brute Force Attack

After the identification of attack action may become very obvious however you may want to choose it wisely and there may be multiple actions required.


  • Temporary Blocking of IP Address The quickest way to stop attack will be to block the IP address from accessing you website. Permanently blocking the IP address may not be a good idea since it may be a common IP. Therefore you may also want to do the blocking for a time duration (lets say 1 day) and do more research on the IP address in mean time.
  • Permanent Blocking of IP Address If the IP is constantly involved in such attacks you may want to block it permanently. To identify the IPs that are constantly involved in brute force attack you can run the query with a longer duration and notice the failed password attempt counts over a much longer period (lets say a week or a month)
  • Further tuning the identification parameters. This may involved analyzing the speed of attack and changing the values for time duration and WPACount. You may want to increase or decrease these values based on your detailed research on the IP address and attack pattern.
  • Resetting users that are compromised - This may sound weird, however once you have successfully identified an IP address that was doing brute force attack on your system you must also take action to gain the compromised users back. This can be done by looking at any successful login attempts by the client IP address in the attack duration. You must take some action to gain the accounts back from hackers. Some of the things you can do are
  • Easiest way to do it will be resetting the password for user and notifying them with a change password link.
  • Another way will be to lock the account and notify users to reset password and activate.

Scope For Improvement

This is just a preliminary setup for brute force attack detection. You may use same idea and improve on it to get better detection and accuracy. This design may lead to some false positives therefore a manual analysis is recommended before taking strong actions. The attackers are smart and they learn from your actions, therefore your system may need to be unpredictable and must be constantly tuned to detect and stop attacks.

Blocking the IP sounds like an obvious action however it may not always be the best choice if the attack is launched from common service providers like Amazon EC2 cloud. Blocking such IP may result in blocking many other good clients who are trying to reach you from same IP.

We have not accounted for IP Geo location information in this solution. May be a lot more complex and efficient detection can be done using Geo location identification. Lets say a user is typically accessing your website from USA. All of a sudden you notice a login from another country. This may be a sign of suspicious activity and you may want to take action on it. Such attack can be identified much faster if you have enough Geo information and user behavior details in your graph.

Summary

The recent decade has been full of security threats and attacks on websites and online products. With increasing computing power attackers have become really powerful. This makes job of a security professional even more difficult since we need to be constantly looking for ways to prevent our systems.

10 Performance Tips to Speed Up Your Android Tablet

Performance Of Android Tablets

The concept of “get what you pay for” holds true for Android based applications, and many aspects of Android would need separate payouts. Unfortunately, Android users may not be able to gain access to the numerous apps available for iOS owners, although Apple App Stores currently contain more than 90,000 apps for iPad and over 400,000 for iOS.

As far as Android devices are concerned, users or potential users could use any app created for Android which is available in the Android market. Another positive feature of Android is that it is compatible with applications being loaded from other sources too, although the risks of malwares are indeed very high.

Tip #1

Do Not Keep Applications Which You Seldom Or Rarely Use

Downloading apps, because tying up memory, so the least volume of memory tie up, especially for non use apps, the better speed and performance of your Android.

Tip #2

Make It A Point To Immediately Close Applications After Their Use

Devices perform less efficiently if there are many apps working in the background. Thus, it is important that currently-not in –use applications are switched off to gain more working spaces and also to unlock locked memories. It is better to download an app that could kill all apps with just one click.

Tip #3

Different Applications Have Diverse Memory And Space Size

The benefits of downloading apps with large sized must be justified and minimum space use must always be encouraged. Besides, as is a common misconception, apps cannot be downloaded to SD cards and so will remain put in its internal memory. Memory and file size optimization needs to be gained.

Tip #4

Avoid Live Wallpaper

While live wall paper looks beautiful, it does make the device work slower, and this needs to be avoided. It is best to go for regular wallpaper as this could save battery life too. So best to avoid use of external wall paper and screen saver apps and stick only to default supported apps.

Tip #5

It Is Best To Turn Off Maps:

The moment the device is turned on, the Map would start working especially when internet is on. This, along with GPS, is a big drain on memory. These are dual edged sword which cuts both into battery life and slower performance

Tip #6

It Is Best To Turn Off Wi-Fi And Cell Data When Not In Range

Both these are capable of reducing battery life and slowing down the performance. Besides, it is also better to keep empty space on phone memory.

Tip #7

It Is Necessary To Be Strategic About Updates

Automated updates should be used only on limited apps and for others, it is best to use manual updates.

Tip #8

Cut Back On Animation

While these look excellent, they do reduce computer performance, especially on long term. It is also necessary to deactivate animations on tablet settings in order to gain better performance.

Tip #9

It Is Necessary To Remove Superfluous Widgets

Widgets take up memory and so the less of only useful widgets running, the better for long term performance of your device.

Tip #10

Make Use Of Application Cleaner/Manager

An App Cleaner could delete file cache, browse History and other superfluous files. It could also help in removal of dead apps. Therefore regular cleaning and managing of tablets could greatly and dramatically improve its performance.

Our favorite free app for this task is - Clean Master Phone Boost

Summary

In Short, It is necessary to know what exactly you want from your tablet. The fact is that performance of Android 3.0 tablet is dependent on several hardware and software factors. What apps are needed and how these could be availed are also major aspects that need to be considered. Android tablet improvements could indeed be in terms of more advanced and improved versions of software and operating systems in the future.

Top 6 Things You Must Know About Domain Names

Top 6 Things You Must Know About Domain Names

 Domain. In the English language, it means an area or territory wherein control is wielded by a ruling entity, which can be an individual (as in royalty) or an entity (as in a government).

In the Internet sphere, the domain is main part of a URL or website address. Similar to the literal meaning of the word, the domain is also a virtual “territory” and has authority over the subdomains under it. It basically represents the IP address of the website’s server.

Instead of a long string of alphanumeric characters, domain creators and providers use words and phrases that are easy to remember and describe the main theme or content of the website or server.

 

 

Top 6 Things You Must Know About Domain Names

Things You Must Know About Domain Names
Domain. In the English language, it means an area or territory wherein control is wielded by a ruling entity, which can be an individual (as in royalty) or an entity (as in a government).

In the Internet sphere, the domain is main part of a URL or website address. Similar to the literal meaning of the word, the domain is also a virtual “territory” and has authority over the subdomains under it. It basically represents the IP address of the website’s server.

Instead of a long string of alphanumeric characters, domain creators and providers use words and phrases that are easy to remember and describe the main theme or content of the website or server.


The World’s First Network

The practice of using domain names began in 1969 when the US government set out to find a means to share and access information throughout the country even if one of its main computers (which used to be as large as rooms) get damaged in the event of a catastrophe. The ARPA or Advanced Research Projects Agency awarded the bid to create the first computer network in history to BBN Technologies, and the resulting network was then known as ARPANET.

It worked this way: telephone networks and IMPs or Interface Message Processors connected four main computers situated in different locations in the United States. By hooking up to the IMP, each of the four computers could then begin exchanging information within days.

By 1985, the network had grown bigger and the number of computers connected to ARPANET multiplied. It then became difficult to use the centralized numerical system that was implemented to identify each computer host (the numeric addresses were basically the IP addresses of the computers connected to the network). In that same year, to simplify the naming of computers connected to any network, the DNS or Domain Name System—which had been already created in 1983—was implemented. “.Arpa” became the first top level domain (TLD) listed in the DNS. Host names belonging to ARPANET were then given labels plus the “.arpa” domain name.

Thanks to the progression from numeric labelling to using simple words, people today are able to easily recall URLs and access websites with far less—even zero—hassle thanks to domain names.


Top Facts You Must Know About Domain Names


Along with “.arpa,” there were other TLDs that were also registered in the DNS. These are still widely used today, and are truncated versions of the entities for which they were originally created.

.com Truncated from the word “commercial,” this TLD was initially controlled by the US Department of Defense. At present, it is being managed by VeriSign. It was intended for commercial entities and in 1995, the NSF or National Science Foundation, which is responsible for its maintenance, started selling the domain for an annual fee ranging from $50-$100. The commercial distinction quickly became irrelevant though ever since registration for .com (and also .org and .net) soon became unrestricted.

The very first registered .com domain was Symbolics.com (on March 15, 1985).

.org – This is known as the first generic TLD and was truncated from “organization.” Like .com it was created to distinguish non-defense interests, except that .org was intended for non-profit entities, such as Greenpeace.org. Nevertheless, the PIR or Public Interest Registry—which manages the domain—currently charges $7.70 per domain name registered.

Mitre.org of the MITRE Corporation was the first to be registered under the .org domain on July 10, 1985.

.mil – This is the domain reserved for the United States Department of Defense. It is short for “military.” The Department still makes use of .com and .edu for its recruitment, general information, and service academies websites, though.

.net – This is another generic TLD. “.Net” was intended for organizations involved in networking technologies. Many believe that a .net is not "brandable" and should not be used to build an online business. But take the example of Oversee.net, one of the most successful domain buying/selling company, founded by a very young entrepreneur, Lawrence Ng.

Interesting facts:

  • .net is also currently managed by VeriSign.
  • The oldest and still existing .net domain is Nordu.net.

How To Install Zen Cart On Your eCommerce Server

 

How To Install Zen Cart On Your eCommerce Server

 

Zen Cart is a very popular ecommerce website management system. Thousands of businesses are using Zen Cart for their online stores. Hey are you too looking to build your online shopping store with Zen Cart? If yes then this post of mine will surely be a helping pill for you.

It is very affordable now to convert any format website design to Zen Cart engine if you hire Professional Zen Cart Developer. In this post I am briefly explaining the process of installing Zen Cart on a local host. Icing the cake; I had also explained the process of installing a new template for the Zen Cart website interface. To make it easy for everyone to follow the steps; I had incorporated the snapshot of the installation process.



Quickest Way To Install Zen Cart System And Zen Cart Template On Local Host

Installing Zen Cart Management System


  • Download the Zen Cart engine installation file from the website and then copy that zip file to the local host directory with Ryan/ZenCart subfolder. After copying the installation file unzip the package with the help of unzip software.
  • Now go to your Database Management tool. The database management tool can be searched by the name phpmyadmin. Moreover you can directly open the tool by following the http://localhost/phpmyadmin/. Go to the Database Menu.
  • Create a new database.
  • Now open the links to your installation files. As we had save the host directory with Ryan/Zen Cart subfolder; the link to the installation files will be http://localhost/Ryan/ZenCart/. Now the Zen cart welcome window will appear on the screen; click on “click here” to start a fresh CMS installation.
  • In the next screen; you will see the software license window. Select ‘I agree’ checkbox and click ‘Next’.
  • Now the software will check the system configuration and if your system fulfills the software installation requirement you will see green marks. Now scroll down the page and click ‘Install’ button.
  • In the next step you will be asked to provide the database access details. Creating the database is a very crucial stage so follow the below provided instructions carefully.
  • Enter the database access information. In the Database Username field; provide the username that you want for the database. Next field asks for the database password; Leave it blank as per now. Click on the ‘Save Database Settings’ button provided at the down of the page to confirm the changes.
  • In the next step of installation process; you don’t need to perform any action. Just click on the ‘Save System Setting’ Button and move to the next step.
  • Now you will be asked to provide store information. In this step you have to choose ‘Store Demo’ option and then click Save Store Settings.
  • At this step you will be asked to provide the Zen Cart Aceess Details. Enter the Username & Password and Log in to jump to the next step.
  • Got to the root and delete the zc_Install folder from there and also rename the admin folder so security concerns.
  • Till this step you had successfully installed the Zen Cart on your local host. Now you can access the Admin Panel of the application by simply adding the admin folder name. In this example we had save the solder with the name admin123. You can directly access the folder by following the below provided link http://localhost/Ryan/ZenCart/admin123/
  • After accessing the account; you are advised to change the current password with a much stronger and safe password.

Installing The Template For Zen Cart Website


Done with the Zen Cart installation process? Now you may require adding some beautiful template to your ecommerce website design.

  • Download the template from the source and then unzip the package. The unzipped files will look like the below provided snapshots.
  • Now got to the theme folder which is named as theme613 in this example. Rename the Admin folder with the actual name of your Admin folder. As for now we are taking the folder name as Admin123 (as in the installation process).
  • Now copy all the content of the theme folder into the root folder of your Zen Cart package. If System asks for the permission to copy; accept the conditions.
  • Login to the admin panel of your Zen Cart website and TOOLS‡TEMPLATE SELECTION. Click on the edit button and select the theme you want to upload. Click update to confirm the action.
  • Open TOOLS‡ INSTALL SQL PATCHES and then upload the SQL files from the source. You are also advised to backup the database before inserting any installation file.
  • Open the Theme Configuration window and tweak the layout as per you. After doing the edits; click on update button to save the changes.

Websites For Security Related Articles And News

Websites For Security Related Articles And News

80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker

Hacking, Tutorials
A+ A-
Email Print
List of Best Free Hacking Tutorials and Resources to Become Pro Hacker
Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques.

Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. You must have a passion and positive attitude towards problem solving. The security softwares are constantly evolving and therefore you must keep learning new things with a really fast pace.

If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. I hope these free resources will help you speed up on your learning. If you decide you pursue ethical hacking as a career option, you may also want to read some in depth ethical hacking books.

A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Its true that some common types of hacking can be easily done with help of tools, however doing it does not really make you a hacker. A true hacker is the one who can find a vulnerability and develop a tool to exploit and/or demonstrate it.

Hacking is not only about knowing "how things work", but its about knowing "why things work that way" and "how can we challenge it".

Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack

Advertise Here

Hacking For Dummies - Beginners Tutorials

These tutorials are not really simple for anyone who is just starting to learn hacking techniques. However, these should be simple starting point for you. I am sure you have different opinion about complexity of each tutorial however advanced hacker are going to be calling this a job of script kiddie (beginner hacker). Even to acquire the skills of a script kiddie you need to have good understanding of computer fundamentals and programming.

  1. Cybrary - For those looking to learn ethical hacking skills online, Cybrary provides the perfect platform to do so. Cybrary is a free online IT and cyber security training network that provides instruction in the form of self-paced, easy-to-follow videos. Featuring courses on topics such as Penetration Testing and Ethical Hacking, Advanced Penetration Testing, Post Exploitation Hacking and Computer and Hacking Forensics, Cybrary provides instruction from the beginner to the highly-advanced level of hacking. Additionally, Cybrary offers supplemental study material along with their courses free of charge. With their in-depth training videos and study guides, Cybrary ensures that users develop the best hacking skills.
  2. Hacking Tutorials for Beginners - By BreakTheSecurity.com
  3. How to learn Ethical hacking - By Astalavista.com
  4. Penetration Testing Tutorial - By Guru99.com
  5. Backtrack Penetration Testing Tutorial
  6. Introduction to Penetration Testing
  7. Information Gathering with Nmap
  8. Simple How To Articles By Open Web Application Security
  9. The Six Dumbest Ideas in Computer Security
  10. Secure Design Principles
  11. 10 steps to secure software

Cryptography Related Tutorials

Cryptography is must know topic for any aspiring security professional or a ethical hacker. You must understand how encryption and decryption is done. You must understand why some of the old encryption techniques do not work in modern computing world.

This is a important area and a lot of software programmers and professional do not understand it very well. Learning cryptography involves a lot of good understanding of mathematics, this means you also need to have good fundamentals on discrete mathematics.

  1. Introduction to Public Key Cryptography
  2. Crypto Tutorial
  3. Introduction to Cryptography
  4. An Overview of Cryptography
  5. Cryptography Tutorials - Herong's Tutorial Examples
  6. The Crypto Tutorial - Learn How to Keep Secret Secret
  7. Introduction to cryptology, Part 1: Basic Cryptology Concepts

Websites For Security Related Articles And News

These are some websites, that you may find useful to find hacking related resources and articles. A lot of simple tricks and tips are available for experimenting through these sites for improving yourself to become advanced hacker.

In recent years, many people are aspiring to learn how to hack. With growing interest in this area, a lot of different types of hacking practices are evolving. With popularity of social networks many people have inclined towards vulnerability in various social networks like facebook, twitter, and myspace etc.

Continuous learning about latest security issues, news and vulnerability reports are really important for any hacker or a security professional. Some of the sites that keep publishing informative articles and news are listed here.

  1. http://www.astalavista.com/
  2. http://packetstormsecurity.com/
  3. http://www.blackhat.com/
  4. http://www.metasploit.com/
  5. http://sectools.org/
  6. http://www.2600.com/
  7. DEF CON - Hacking conference
  8. http://www.breakthesecurity.com/
  9. http://www.hacking-tutorial.com/
  10. http://www.evilzone.org/
  11. http://hackaday.com/
  12. http://www.hitb.org/
  13. http://www.hackthissite.org/
  14. http://pentestmag.com
  15. http://www.securitytube.net/
  16. https://www.ssllabs.com/

 

whatsup hack

hi feiends happy diwali today i give you one trick that is whats up hacking now follow me


 2.Whatsapp hack to use it without using your
number !!
This hack works by tricking the WhatsApp
Verification Servers by sending a spoofed request
for an authorisation code intended for an
alternative phone.
1.Install WhatsApp on your device WhatsApp now
starts a counter where it sends a verification
message to its servers.
2.Block the messeage service it can be blocked by
changing the message center number or pushing
the phone into Airplane mode.
3.WhatsApp now offers an alternative method of
verification Choose verify through SMS and fill in
your email address. Once you click to send the
SMS click cancel to terminate the call for
authorisation to the WhatsApp server.
4.Now You have to do sms Spoofing
You can do it using this link https://
play.google.com/store/apps/details?
id=com.gtrsolutions.spoof&hl=en
Check your outbox and copy the message details
into the spoofer application and send the spoofed
verification.
-Iphone users can use this :To: +447900347295
From: +(Country code)(mobile number) —-victims
Message: (your email address)
5. You will now receive messages intended for the
spoofed number on your mobile device and you
can communicate with people under the spoofed
number whats up hack




..................thank you.....................

Bypass Cybroame Security Without Login Or Password

........................................hi friends i am parker ................................



today i give you one tricks that trick is how to bypass cybrome security without any loging page or password

 first you download tunnalguru you download this on www.tunnalguru.com than follow me
 
  extract file on desktop than right click on tunnalguru icon than run as administatore

 than you have need one account in tunnalguru so you register on tunnalguru site

 than enter your register id and password and enter r port and l port  R port :53 L port:0
 than chooes demo server2 thant click on start button  oohhh than finally you get bypass cybroame page on tunnalguru and you can also use youtube or facebook ............... enjoy


..........................thank you.....................................