Social Icons

Showing posts with label tracing back. Show all posts
Showing posts with label tracing back. Show all posts

Tuesday, July 23, 2013

Treat your E-Mail address classified : ADVISORY

1.    Do you know that simply your E-MAIL disclosure to a person with malicious intent can be a key to disclosing your E-mail content and other personal attributes of life?...I mean it can invade your privacy...and just for info this is an active organised crime in the cyber world.

2.   What is the most important first thing that a hacker desires to know?....and the answer is the IP Address of the victim..and all it takes to know the IP address is to send a dummy mail at the victims id.. that's it....strange it may sound but there are so many websites offering you free solutions on how to get not only the IP address but also the browser and OS system details of the victim.One of the leading sites offering a free solution is SPYPIG...this site facilitates to let you know when your email has been read by the recipient! ...this happens in form of a intimation by SPYPIG as and when the e-mail is read by the recipient.

3.   Now some thing about SpyPig ....is a simple email tracking system that sends you a notification by email when the recipient opens your message.It works with virtually all modern email programs: Outlook, Eudora, Yahoo Email, Gmail, Hotmail, AOL Email and many others.In addition to the notification it actually sends you additional but undesired details also which can be exploited by malicious intent person.Thde details that can be used and exploited are shown here in the screen shot below in one test mail....

Red Encircled are the Critical Info

4.     But sadly,the recipient will never know of the fact that he is being tracked and so much of critical info has already swapped hands with unknown guys...I mean the OS,the browser with their respective versions etc....so in the state today the following preventions can be taken to avoid such a hijack :

-           Avoid opening E-mails from unknown sources

-      Disable Image display by default in E-Mail settings.This is important because this works on the funda of a hidden script in the image sent along with the mail.So if you disable the images display by default,it is unlikely that this will be executed.

-           Avoid sharing and disclosing your E-Mail addresses openly.

5.     To know about spypig visit : http://www.spypig.com

Wednesday, February 03, 2010

CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!!

1. The earlier mention on IP Spoofing and the pleothra of options and techniques available for attack,hack,sniff,crashing a network etc are well known for not reaching out to the origin of the person or hacker with the malaecious intention. DARPA (...please google or bing if u wish to know more on DARPA)has finally come out with the ‘Cyber Genome Program’ which will allow any digital artifact either in form of a document, or a piece of malware - to be poked into its very origins.

2. In in principle, it appears that almost any data fished from a relevant network, a computer, a pen drive, someone's phone or whatever is to be studied much as like a human genetic material. The code or document's relationships with other "digital artifacts" will be revealed, perhaps its origins, and other info of interest to a Pentagon admin defending military networks or a military/spook investigator tracing online adversaries.In other words, any code you write, perhaps even any document you create, might one day be traceable back to you - just as your DNA could be if found at a crime scene, and just as it used to be possible to identify radio operators even on encrypted channels by the distinctive "fist" with which they operated their Morse keys. Or something like that, anyway.

3. The concept is a cyber-equivalent of human finger-prints or DNA. The project will thus seek to develop a digital genotype as well as any inferred or observed phenotype in order to determine the identity of such digital artifacts and thus the users who left them behind.

4. DARPA is now looking for technologists to develop and use the cyber-equivalent of DNA to target the people behind cyber attacks. They are looking for geniuses in the fields of Cyber Genetics, Cyber Anthropology and Sociology and Cyber Physiology who can jointly work out the practical solutions to this project.The research involves creating lineage tree for digital artifacts, gaining better understanding of software evolution, and automatic analysis of social relationships between users and malware. Each of these researches will jointly develop the cyber equivalent of fingerprints or DNA.DARPA believes that this can identify the best-of-the-best hackers.

Powered By Blogger