Remote Connectivity and VoIP Hacking

Remote Connectivity and VoIP Hacking :

OVERVIEW :-

With the writing of the fifth edition of this series, not much has changed when it comes to the technology aspect of those plain-old telephone system (POTS) lines, and yet many companies still have various dial-up connections into their private networks or infrastructure. In this chapter, we'll show you how even an ancient 9600-baud modem can bring the Goliath of network and system security to its knees.


It may seem like we've chosen to start our section on network hacking with something of an anachronism: analog dial-up hacking. The advent of broadband to the home through cable modems and DSL continues to make dial-up destined for retirement, but that trip to the old-folks home has yet to begin. The public switched telephone network (PSTN) is still a popular and ubiquitous means of connecting with most businesses and homes. Similarly, the sensational stories of Internet sites being hacked overshadow more prosaic dial-up intrusions that are in all likelihood more damaging and easier to perform.


In fact, we'd be willing to bet that most large companies are more vulnerable through poorly inventoried modem lines than via firewall-protected Internet gateways. Noted AT&T security guru Bill Cheswick once referred to a network protected by a firewall as "a crunchy shell around a soft, chewy center." The phrase has stuck for this reason: Why battle an inscrutable firewall when you can cut right to the target's soft, white underbelly through a poorly secured remote access server? Securing dial-up connectivity is still probably one of the most important steps toward sealing up perimeter security. Dialup hacking is approached in much the same way as any other hacking: footprint, scan, enumerate, exploit. With some exceptions, the entire process can be automated with traditional hacking tools called war-dialers or demon dialers . Essentially, these are tools that programmatically dial large banks of phone numbers, log valid data connections (called carriers ), attempt to identify the system on the other end of the phone line, and optionally attempt a log on by guessing common usernames and passphrases. Manual connection to enumerated numbers is also often employed if special software or specific knowledge of the answering system is required.


The choice of war-dialing software is therefore a critical one for good guys or bad guys trying to find unprotected dial-up lines. This chapter will first discuss two of the most popular war-dialing programs available for free on the Internet (ToneLoc and THCScan) and one commercial product: Sandstorm Enterprises' PhoneSweep. As of this edition, Secure Logix's TeleSweep Secure has been discontinued (January 22, 2003). All that is left of TeleSweep Secure is a web link: http://applications.securelogix.com/tss_information.htm.


Following our discussion of specific tools, we will illustrate manual and automated exploitation techniques that may be employed against targets identified by war-dialing software, including remote PBXs and voicemail systems.

PREPARING TO DIAL UP :

Dial-up hacking begins with the identification of a range of numbers to load into a wardialer. Malicious hackers will usually start with a company name and gather a list of potential ranges from as many sources as they can think of. Next, we discuss some of the mechanisms for bounding a corporate dial-up presence.

Phone Number Footprinting
Popularity: 9
Simplicity: 8
Impact: 2
Risk Rating: 6

The most obvious place to start is with phone directories. Many companies now sell libraries of local phone books on CD-ROM that can be used to dump into war-dialing scripts. Many websites also provide a similar service as the Internet continues to become one big massive online library. Once a main phone number has been identified, attackers may war-dial the entire "exchange" surrounding that number. For example, if Acme Corp.'s main phone number is 555-555-1212, a war-dialing session will be set up to dial all 10,000 numbers within 555-555-XXXX . Using four modems, this range can be dialed within a day or two by most war-dialing software, so granularity is not an issue.

Another potential tactic is to call the local telephone company and try to sweet-talk corporate phone account information out of an unwary customer service rep. This is a good way to learn of unpublished remote access or datacenter lines that are normally established under separate accounts with different prefixes. Upon request of the account owner, many phone companies will not provide this information over the phone without a password, although they are notorious about not enforcing this rule across organizational boundaries.

Besides the phone book, corporate websites are fertile phone number hunting grounds. Many companies caught up in the free flow of information on the Web will publish their entire phone directories on the Internet. This is rarely a good idea unless a valid business reason can be closely associated with such giveaways.

Phone numbers can be found in more unlikely places on the Internet. One of the most damaging places for information gathering has already been visited earlier in this book, but deserves a revisit here. The Internet name registration database found at http://www.arin.net will dispense primary administrative, technical, and billing contact information for a company's Internet presence via the WHOIS interface. The following (sanitized) example of the output of a WHOIS search on "acme.com" shows the do's and don'ts of publishing information with InterNIC:
Registrant: Acme, Incorporated (ACME-DOM) Princeton Rd. Hightstown, NJ 08520
US Domain Name: ACME.COM
Administrative Contact: Smith, John (JS0000) jsmith@ACME.COM 555-555-5555 (FAX) 555-555-5556
Technical Contact, Zone Contact: ANS Hostmaster (AH-ORG) hostmaster@ANS.NET
(800)555-5555

Not only do attackers now have a possible valid exchange to start dialing, but they also have a likely candidate name (John Smith) to masquerade as to the corporate help desk or to the local telephone company to gather more dial-up information. The second piece of contact information for the zone technical contact shows how information should be established with InterNIC: a generic functional title and 800 number. There is very little to go on here.

Finally, manually dialing every 25th number to see whether someone answers with "XYZ Corporation, may I help you?" is a tedious but quite effective method for establishing the dial-up footprint of an organization. Voicemail messages left by employees notifying callers that they are on vacation is another real killer here—these identify persons who probably won't notice strange activity on their user account for an extended period. If an employee identifies their organization chart status on voicemail system greetings, it can allow easy identification of trustworthy personnel, information that can be used against other employees. For example, "Hi, leave a message for Jim, VP of Marketing" could lead to a second call from the attacker to the IS help desk: "This is Jim, and I'm a vice president in marketing. I need my password changed please."

You can guess the rest.

Leaks Countermeasures :-

The best defense against phone footprinting is preventing unnecessary information leakage. Yes, phone numbers are published for a reason—so that customers and business partners can contact you—but you should limit this exposure. Work closely with your telecommunications provider to ensure that proper numbers are being published, establish a list of valid personnel authorized to perform account management, and require a password to make any inquiries about an account. Develop an information leakage watchdog group within the IT department that keeps websites, directory services, remote access server banners, and so on, sanitized of sensitive phone numbers. Contact InterNIC and sanitize Internet zone contact information as well. Last but not least, remind users that the phone is not always their friend and to be extremely suspicious of unidentified callers requesting information, no matter how innocuous it may seem.

Add or remove nofollow from Blogger comments and links

Add or remove nofollow from Blogger comments and links :

Nofollow is an HTML attribute given as instruction to search engine crawlers ,not to crawl the hyperlinks specified by the nofollow tags. So if are inserting a nofollow tag after a hyperlink , then the target will not carry any value for that link in search engine positions . They are widely used by blogs and forums to avoid spam comments and posts for getting backlinks.Similarly in Blogger , the comment section is nofollow by default .You can add or remove nofollow from blogger comments by changing its value in blogger template . Removing nofollow will invite more people to comment on your blog and also more fame in webmaster forums.Well , this can be in few stepsGo to edit HTML ,click on Expand Widget Template , Press Ctrl+F and search for nofollow ..Find code secrion ,So by this line , the author URL in comment section is made nofollow . Change the nofollow attribute to follow and save the template .Add nofollow in blogger post sectionDownloadDownloadThis is an example download link for yahoo messenger in Compose and edit HTML view in blogger. Here i have added a nofollow tag just after the quotes closing the download link. It should be done always if you have download link which is not hosted on your on server ( well I am not dragging the topic by explaining the theory behind it ).



PN: You can check nofollow/dofollow by using a Firefox addon called

" nodofollow."





nodofollow.

Improve Blogger PageRank by optimizing post page title



Blogger blogs are having an SEO issue with the post page tittle, which can diminish SERPs and PageRank . Have a look at the following example from Google results for a particular blog .Funny thing is that its a blog about SEO.


In the results for each pages, post page tittles are shown only after the blog headings which separates them with a " :" sign ( hope the point is clear ) . To get in top results for a particular post , you need to remove the repetitive blog heading from post tittle .See the results that i am getting for my blog which uses a blogger custom domain .
As each post is having its own title , chances are there for the results to be in top pages.Now we can do this by performing a simple edit on blogger template .Open edit HTML section .Now press Ctrl+F and search for <data:blog.pagetitle/> .Replace that code with the code in the
following box and save your template.
"
<data:blog.title/></div><div><data:blog.pagename/> "
Well it does not mean that this trick will improve blogger PageRank to a great level . It depends on quality of your backlinks, content and many other factors .




Search Similar Images in Google Image Search:



Google Labs is the experimental lab of famous search engine where user can try new upcoming features which currently are in development stage.

Today, Google has launched a new feature in their labs with the name “”. is an upcoming feature for Google which can recognize images and can lets you search images using pictures instead of words.


Similar Images feature is way to easy to use, just click on the link under the images and it will show up all the similar image results.


In the example above I search for Ronaldo and then first click on the similar image link under Cristiano Ronaldo image and then on Ronaldo Luis Nazário de Lima, so the results are here, it recognizes the faces correctly and bring up results accordingly.


Previously Google launched color filter feature, and now , all these functions are making more powerful and useful.