WHAT IS IP SPOOFING

Wednesday, February 20, 2013
Pull in traffic, get likes and followers, generate leads, get customers, increase profits using Facebook http://bit.ly/1c6awK7

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.


Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.

Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.

As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.

TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.

TCP packets can be manipulated using several packet crafting softwares available on the internet.

The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.

Spoofing can be implemented by different ways as given below -

Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.

Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.

Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.

IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.

CounterMeasures
1) Filtering at the Router :- Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense. You will need to implement an ACL (access control list)

2) Encryption and Authentication :- Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats.

3) Initial Sequence Number Randomizing.
Read more ...

computer virsuses for dummies book

Wednesday, February 20, 2013
Viruses for Dummies

It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book\92s value price and compact size will make it irresistible to people who need to protect their home PC or network.
  Download  (Size :- 2.33 MB) 
Read more ...

farmville secrets

Tuesday, February 19, 2013

FarmVille Secrets Guide Review

Original FaceBook FarmVille Game Guide With All The Secrets

FarmVille Secrets Guide is going to help if you have piles of rotted vegetables and wondering what to plant to bring in the biggest profits. Are looking at neighbors who have ten times the resources as you yet are dreaming of owning a villa and the best vehicles FarmVille Secrets guide will get you there. This guide works for FarmVille on Facebook, MSN, MySpace, iPhone – where do you play?

farmville secrets cheat guide pfd FarmVille Champ Secrets Our rating: 5 Stars For FarmVille Secrets by http://newgameguides.com

Fully updated in 2010 this is the original guide for the FarmVille game. This is not a guide to show you how to start playing FarmVille, this guide is for players who know the basics and want to advance to the higher levels. It is easy to see why it has quickly become one of the largest, and ultimate guides for anyone looking to achieve the perfect Farm on FarmVille. It is not full of bots, hacks or cheats, but all 100% legal Secrets to get you to the top levels.

What can FarmVille Secrets do for your FarmVille game?

In our opinion, FarmVille Secrets will most definitely change how you play the game forever. The information in this guide is not what you will find laying around on the internet – this guide is for players who really want to know this game inside out. You will learn how to quickly move up the levels, while raising the best crops and earning all the cash to get you to the top. Packed with all the secrets to master the FarmVille game. It is well written, easy to follow and includes free updates. Written by game guru T.Dubbs.
Click here to go to FarmVille Secrets

We put Farmville Secrets in the hands of our Farmville players to see what they think.

Some of our players have been playing for a while now and others were quite new to the game after migrating from Mafia Wars. All admitted that they were struggling in some areas. Having enough coins, keeping crops alive, getting neighbors and obtaining villas were some of their biggest struggles.We were amazed at how quickly we moved up the levels with coins to spare! It is very easy to read, lots of valuable information and think it is a great guide for FarmVille players on all levels.
Read more ...

Instantly Get Free 100 Likes on your Facebook Status Update

Friday, December 14, 2012
Do you love to share moments with friends expressing your thoughts on facebook and you wish that they like and share with other guys. Well everyone needs to have a high liking society that respect their status updates comments on them and mostly like them. Well still after having a huge list of friends you miss a lots of likes from them as many of them are not keen enough to show interest in your status update, well for right that time we have an excellent online tool that can automate your liking process and gain you upto 100 likes for free on your update.
FB-Hack.com provides an easy to use online tool that can easily gain you likes from real genuine people all over the world fro free. Well obviously their service is free if your wish is upto 100 likes but if you want to gain some more likes than you have to pay for their premium package. Check below steps on how you can also start gaining free likes for your status updates.
  1. Visit FB-Hack.com and you will see something like below just click on the link saying click to get access-id.
  2. Now you will be promoted to install an application from Samsung, so just click on Install and than click on Allow All.
  3. Now as soon as you will click on Allow All you will see a page saying Success, with URL something like below, now you just need to copy the access_token from url which you will get in your own browser.

    fb hack likes
  4. That’s it now return to the FB-Hack.com homepage and paste the access id in the field provided and click on Submit.
  5. Now you will see another page displaying your name and other information with your last updated status on which you are going to get instant likes.
  6. Just fill out the captcha and press submit, now just see your likes gaining live and make sure not to close the captcha page till its fully loaded.
Note It has been reported that this app tries to comment on that post whenever your genuine friend comments on that status like gain more likes using their website, well the easiest thing to fix it out is to remove app from facebook as soon as you have completed the likes for your status update.

likermooLikerMoo.com Another Similar Website for Getting Instant Likes :

LikerMoo.com is another website that claims to be the same as FB-Hack and I think its pretty more easy to be used and fast too. Well if you think that FB-Hack is not good than you can give this website a try maybe this works for you well.
Well using this site is same you just have to click on the Get Token button and than a app will open on Facebook and you can allow permissions, after you get your access id paste it and enter your photo id on which you want get instant likes. Well after your work is done just remove the app from the privacy settings and that’s it.
Read more ...