Cyber Security
Cyber Security
~ THE PEOPLE'S
~ UNIVERSITY CYBER SECURITY
Indira Gandhi National Open University
School of Vocational Education and Training
Information Gathering 1
''fm1T Cfit ~ ~ ~ ~ t am: ~
*~ "I{RCf
- Indlra Gandhi
(
)
MSEI-023
:~ignOU .
t:) Cyber Security
~ THE PEOPLE'S
UNIVERSITY
Indira Gandhi National Open University
School of Vocational Education and Training
Block
1
INFORMATION GATHERING
UNIT 1
Social Engineering 5
UNIT 2
E-mail Crime and Investigation 35
UNIT 3
Reverse Engineering 69
UNIT 4
Cracking Methodology 102
Programme ExpertlDesign Committee of Post Graduate
Diploma in Information Security (PGDIS)
Prof. K.R. Srivathsan Mr. Anup Girdhar, CEO, Sedulity Solutions &
Pro Vice-Chancellor, IGNOU Technologies, New Delhi
Mr. B.J. Srinath, Sr. Director & Scientist Prof. A.K. Saini, Professor, University School
'G',CERT-In, Department of Information of Management Studies, Guru Gobind Singh
Technolo.gy, Ministry of Communication and Indraprastha University, Delhi
Information Technology, Govt of India
Mr. C.S. Rao, Technical Director in Cyber
Mr. A.S.A Krishnan, Director, Department of Security Division, National Informatics Centre
Information Technology, Cyber-Laws and E- Ministry of Communication and Information
Security Group, Ministry of Communication and Technology
Information Technology, Govt of India
Prof. e.a Naidu, Director, School of Vocational
Mr. S. Balasubramony, Dy. Superintendent of Education & Training, IGNOU
Police, CBI, Cyber Crime Investigation Cell
Prof. Manohar Lal, Director, School of Computer
Delhi.
and Information Science, IGNOU
Mr. B.V.e. Rao, Technical Director, National
Prof. K. Subramanian, Director, ACIIL, IGNOU
Informatics Centre, Ministry of Communication
Former Deputy Director General, National
and Information Technology
Informatics Centre, Ministry of Communication
Prof. M.N. Doja, Professor, Department of and Information Technology, Govt of India
Computer Engineering, Jamia Milia Islamia
Prof. K. Elumalai, Director, School of Law
New Delhi
IGNOU
Dr. D.K. Lobiyal, Associate Professor, School
Dr. A. Murali M Rao, Joint Director, Computer
•I
of Computer
New Delhi
and Systems Sciences, JNU
Division, IGNOU !
Mr. P.V. Suresh, Sr. Assistant Professor
Mr. Om veer Singh, Scientist, CERT-In,
School of Computer and Information Science
Department of Information Technology, Cyber-
IGNOU
Laws and E-Security Group, Ministry of
Communication and Information Technology Ms. Mansi Sharma, Assistant professor, School
Govt of India of Law, IGNOU
Block Preparation
Unit Writers Block Editor Proof Reading
Mr. Anup Girdhar, CEO Prof. K.R. Srivathsan Ms. Urshla Kant
Sedulity Solutions & Pro Vice-Chancellor Assistant Professor
Technologies, New Delhi IGNOU School of Vocational
(Unit 1, 2, 3 & 4) Ms. Urshla Kant Education & Training
Assistant Professor, School IGNOU
of Vocational Education &
Training, fGNOU
Production
Mr. B. Natrajan Mr. Jitender Sethi Mr. Hemant Parida
Dy. Registrar (Pub.) Asstt. Registrar (Pub.) Proof Reader •
MPDD, IGNOU, New Delhi MPDD, IGNOU, New Delhi MPDD, IGNOU, New Delhi
July, 2011
© lndira Gandhi National Open University, 2011
ISBN-978-8l-266-S443-7
All rights reserved. No part of this work may be reproduced in any form, by mimeograph or any
other means, without permission in writing from the Indira Gandhi National Open University.
Further information about the School of Vocational Education and Training and the Indira Gandhi
National Open University courses may be obtained from the University's office at Maidan Garhi,
New Delhi-l10068, or the website of IGNOU www.ignou.ac.in
Printed and published on be"half of the Indira Gandhi National Open University, New Delhi, by
the Registrar, MPDD .
Laser typeset by Mctronics Printographics, 27/3 Ward No. 1, Opp. Mother Dairy, Mehrauli,
New Delhi-3D
Printed by: A-One Offset Printers, 5/34, Kirti Nagar Indl.Area, New Delhi-llOO15
COURSE INTRODUCTION
This course of Cyber Security discusses in detail the concepts and terms of
technologies, processes and practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized access. In this age of
technology and communication convergence, you can not help but be impacted by
technologies and innovations that center on computers, cell phones and the Internet.
But as we revolve our daily lives with these technologies, there are times that we
set out to feel truly paranoid about our own safely.
This course helps to understand the process for protecting your personal information
or any form of digital asset stored in your computer or in any digital memory
device. The first thing that you'll have to realize is the forms of threats that you
could encounter in cyber space. There are different forms of threats and' each one
has their own levels of seriousness which require their own levels of solutions.
The higher degree the terror, the' more advanced or complicated· the approach to
enforce safety measures to protect yourself.
This course concerns about the mal ware and spyware and define them properly
for treating virus that can ,erase the whole contents of your computer and hackers
that can access and use your personal data for their own personal gain. These are
the dangers that are addressed in this course.
On the basis of these concepts and terminology relevant to cyber security, this
course deals and highlight about these malevolent codes or mal ware which pass
through your security system when you access a particular website or even when
you open an email. These codes, exploit the loopholes in assorted applications and
insert themselves within the computer system which enable them to copy and infect
additional computers by attaching themselves to the emails that you send or through
your local network. These malevolent' codes are occasionally quite tricky. They
claim to do something but instead they'll go on an altogether different path in
infecting your system. These malevolent codes are not isolated to mal ware and
spyware but as well refer to virus and worms which are deadlier and cause a lot of
harm.
Even though those malicious codes are rather harmful, this course also explains
another dangerous intruder which is none other than hackers or attackers. Regardless
how you consider it, virus and worms can merely do what the original programmer
has designated it to do. But hackers are people and they can get the information
they want and utilize it for their own benefit. Sometimes hackers are just trying
out their skills and intentionally invade your system not because they want your
info for personal gain but because they're just plain curious or are just doing some
mischief.
It is essential to know about cyber security in order to deal with such situations
that you need to avoid and further to address the various threats. Students need to
know how vulnerable computers are. This course is helpful to keep you ascertain
in keeping check into firewall and virus protection software to see if your current
system can prevent attacks. This course suggests students to continuously update
software since new threats are being produced everyday and having an updated
system could help protect computer from being attacked. Additional precautionary
measures would be to make passwords. The passwords will serve as a deterrent
and help you keep your entire system protected.
Further, with proper protection installed, you will be able to keep your files and
data safe. It's very important that you keep in mind cyber security. Cyber security
is all about keeping your data safe from those who wish to access them. It's an
important facet of our lives and should never be dismissed above all in today's
computer age.
This course includes the following blocks:
Block 1 - Information Gathering
Block 2- Database Security
Block 3 - Web Technology
Block 4 - Internet technology
BLOCK INTRODUCTION·
INFORMATION GATHERING is an Art of gathering the Information to determine
the security posture of the target Profile of internet, remote access and intraneti
extranet, which is the first step of hacking. Information Gathering is being done in
two major ways which are Foot Printing and Scanning. In Foot Printing and
scanning, a cracker tries to gather the critical information of any enterprise/
organization like, Domain name, Network blocks, IP address reachable via internet,
TCP and UDP services in each system, System architecture, Access control
mechanisms, Intrusion detection systems, whois records, Location, contact names
and email address, Security policies indicating the types of security mechanisms,
Security configuration options for their firewall Comments in HTML source code,
to identify the OS, TCP packets, Access Control Devices, to identify the versions
of application and services, Port scanning etc. However, it should be noted that
such kind of information could be gathered not only for the security purpose. In
fact, it could also be gathered to make an external CrackinglHacking attempts for
misusing somebody's information using various techniques. This block comprises
of four units and is designed in the following way;
The Unit One helps you by explaining the importance of Social Engineering in
this Internet world. It states that along with the convenience and easy access to
information, how does an attacker uses human interaction to obtain or compromise
information about an organization or its computer systems. This unit continues by
explaining with the countermeasures that will be benefitted for all the online users.
It also, covered briefly about the Security Policies and Procedures for the
organizations that should be implemented in order to fight against the social
engineering attacks.
The Unit two covers that how the E-mail crimes are committed and what are the
techniques to investigate whether a mail is a true or a fake mail. This unit will also
explain the process of E-mail system i.e. how Email works and which protocols
are responsible behind the E-Mail system. This unit explains that how could you
trace a fake E-mail, its location and the IP as well. It will help you to understand
the E-Mail header analysis and how the E-mail accounts could be secured from
the external hacking attempts. By the end of this unit you'll learn major E-Mail
related crimes and will be able to hands on various E-Mail tracing tools.
Reverse Engineering is a process where, a researcher gathers the technical data
necessary for the documentation of the operation of a technology or component of
a system. With the help of this research method researchers are able to examine
the strength of the softwares, applications, systems etc. and identify their weaknesses
in terms of performance, security, and interoperability. Unit three focuses on
different types of stages Involved in the Reverse Engineering Process. It also
explained the various tools & techniques that how Reverse Engineering could be
implemented.
Unit four explains, about the various Cracking Methodologies and different
techniques through which you could recover your passwords. This unit is meant to
bring you closer to understand passwords in Windows operating system by
addressing common password myths. This unit focuses the key elements of different
password theft techniques and the process to recover Operating Systems and
different application passwords in case if you forget or lost them due to any reason.
Hope you benefit from this block.
ACKNOWLEDGEMENT
The material we have used is purely for educational purposes. Every effort has
been made to trace the copyright holders of material reproduced in this book.
Should any infringement have occurred, the publishers and editors apologize and
will be pleased to make the necessary corrections in future editions of this book.
Social Engineering
UNIT 1 SOCIAL ENGINEERING
Structure
1.0 Introduction
1.1 Objectives
1.2 What is Social Engineering?
1.3 Behaviours Vulnerable to Social Engineering Attacks
1.3.1 Targets
1.3.2 The Social Engineering Attack Cycle
1.3.3 Adaptive Attacks
1.4 Types of Social Engineering
1.4.1 Human-based Social Engineering
1.4.2 Computer-based Social Engineering
1.5 Designing Defences against Social Engineering Threats
1.5.1 Developing a Security Management Framework
1.5.2 Risk Assessment
1.5.3 Social Engineering in the Security Policy
1.6 Implementing Defences against Social Engineering Threats
1.6.1 Employee Education Is the Key
1.6.2 The Defence-in-Depth Layered Model
t.7 Countermeasures
1.7.1 Training
1.7.2 Password Policies
1.7.3 Operational Guidelines
1.7.4 Physical Security Policies
1.7.5 Classification of Information
1.8 Policies and Procedures
1.S.1 Security Policies - Checklist
LS.2 Prevention Techniques for Personal Defence
1.S.3 Counter Measures for the Organizations
1.9 Impersonation
1.9.1 Impersonating on Orkut
.1.9.2 Impersonating on Facebook
1.9.3 Impersonating on MySpace
1.9.4 What is "Identity Theft"?
1.10 Let Us Sum Up
1.11 Check Your Progress: The Key
1.0 INTRODUCTION
The Internet boom had its share of industrial engineering attacks during its initial
phase, but now attacks generally focus on larger entities. In a social engineering,
an attacker uses human interaction to obtain or compromise information about an
organization or its computer systems.
An attacker may seem unassuming and respectable, possibly claiming to be a new Social Engineering
employee, repair person, or researcher and even offering credentials to support
that identity. However, by asking questions, he or she may be able to piece together 5
enough information to infiltrate an organization's network.
Information Gathering If an attacker is not able to gather enough information from one source, he or she
may contact another source within the same organization and rely on the information
from the first source to add to his or her credibility. The basic goals of social
engineering are the same as hacking in general: to gain unauthorized access to
systems or information in order to commit fraud, network intrusion, industrial
espionage, identity theft, or simply to disrupt the system or network. Typical targets
include telephone companies and answering services, big-name corporations and
financial institutions, military and government agencies, and hospitals.
In this Unit we'll understand the key elements that comprise a successful Social
engineering and eventually apply these concepts to their own efforts.
Hacker utilizes social engineering many times because the human weakness factor
is much easier to penetrate than the network weaknesses. Most of the times hackers
"win" when it comes to the battle because they are not limited by time or lack of
motivation. An IT Director/ or CTO of every organization works during the official
working hours, however the hacker works 24 hours a day to accomplish his/her
targets. As they spent the time and due attentiveness to research every aspect of
the target, Hackers can launch every possible type of attack which also includes
the Social Engineering. Obtaining personal information, password, remote user
accounts etc. an attacker generally use such confidential information to launch
technical attacks on the target.
1.1 OBJECTIVES
After going through this Unit, you should be able to:
Security is all about trust. The weakest link in the security chain is, the natural
human willingness to accept someone at his or her word leaves many of us
vulnerable to attack. The Internet is a fertile ground for all social engineers looking
to harvest passwords. The primary weakness is that many users often repeat the
use of one simple password on every account like Yahoo, Gmail, rediff, Facebook,
and even for their corporate Ids.
So once the hacker has got one password, he or she can probably get into multiple
6
,
accounts. One way through which hackers have been known to obtain this kind of Social Engineering
password is through an on-line form which they can send and ask the user to put
in their User name, password & other important details. These forms can be sent
through E-mail and seems to be the legitimate from the genuine source.
Every time you try to get someone to do something in your interest, you are
engaging in social engineering ..From children trying to get a toy from their parents
to adults trying to land a job or score the big promotion, all of it is a form of social
engineering in a way. Social engineering is a term that describes a non-technical
kind of intrusion that relies heavily on human interaction and often involves
deceiving other people to break normal security procedures. A person using social
engineering to break into a computer network would try to gain the confidence of
someone who is authorized to access the network in order to get them to reveal
information that compromises the network's security. They might call the authorized
employee with some kind of urgent problem; social engineers often rely on the
natural helpfulness of people as well as on their weaknesses.
The goal of a Social Engineer is to trick someone into giving them what they
want. The Social Engineer targets on qualities of human nature, such as:
• The fear of getting into trouble: Most of us have seen negative situations in
our life and want to get rid of such kind of situationsi This is very common
entry point of the Social Engineers to say something which might take you
towards negative and troublesome situation and on the basis of that they try to
fetch out the details.
• The careless nature: Sometimes we get lazy or careless and post the passwords
on the screen in front of others or leave important material lying out, which
ultimately help the Social Engineer to access the information.
Studies show that humans have certain behavioural tendencies that are exploitable
via careful manipulation. Some individuals possess a natural ability to manipulate,
while others develop the skill through practice using positive (and negative)
reinforcement. Social engineering attackers play on these tendencies and motivators
to elicit certain responses in the target. For example:
• Overworked and tired employees tend to make mistakes, and it's often possible
to predict when people are more likely to be susceptible to manipulation (e.g.,
end of month, end of quarter or lunch hour).
Most often, people are not even aware of a security lapse on their part. Chances
are that they divulge information to a potential hacker inadvertently. Attackers
take special interest in developing social engineering skills, and can be so proficient
that their victims might not even realize that they have been scarnmed. Despite
having security policies in place, organization can be compromised because social
engineering attacks target on the human tendency to be helpful.
Attackers are always looking for new ways to gather information, they ensure that
they know the perimeter and the people on the perimeter-security guards,
receptionists, and help desk workers-in order to exploit human oversight. People
have been conditioned not to be overJy suspicious; they associate certain behaviour
and appearances with known entities.
For instance, upon seeing a man dressed in a uniform and carrying a stack packages
for delivery, any individual would take him to be a delivery person. Companies
list their employee lDs, names and email• addresses on their official websites.
Alternatively, a corporation may put advertisements in the paper for high-tech
workers who trained on Oracle databases or UNIX servers. These bits of information
help attackers know what kind of system they're tackling. This overlaps with the
reconnaissance phase.
1.3.1 Targets
The basic goals of social engineering are same as hacking in general to gain
unauthorized access to systems or information in order to commit fraud, network
intrusion, industrial espionage, identity theft, or simply to disrupt the system or
network. Typical targets include telephone companies and answering services, big-
name corporations and financial institutions, military and government agencies,
and hospitals.
-+
••
r +
phone list may not seem dangerous in itself however, the attacker can use this Social Engineering
information to develop a relationship by showing "inside" knowledge as a way of
gaining short-term trust. Electronic systems are subject to direct attack or probing.
Learning a system name or IP number may allow an attacker to present himself or
herself as a network technician, and a large amount of information on your enterprise
or personnel is probably available on the Internet in public or private databases.
Social engineering attackers can often gain at least limited access to enterprise
systems, even if it's just by looking over someone's shoulder during an on-site
visit.
Fig. 1
• Ping Command
• Netstat
• Whois
• http://visualroute.visualware.com
• Nmap
• Port Scan
9
•• Shadow Scan etc .
I
Information Gathering • Domain name lookup
• NSlookup
A series of small, apparently unrelated successes can form the base of a more-
serious attack. As in our example, if hacking a web site is a target, then all the
information that you gather will be useful to make a solid attack in order to hack
the web site.
The gathered information can then be used to explore deeper into the enterprise,
until finally attackers convince their targets to release the information they need to
compromise the enterprise's security.
Although we can't list every possibility, there are some overarching methods
commonly employed:
• Identity theft: This is a rising problem for individuals and enterprises. Much
of the information we use to identify ourselves to the world is easily available.
It's not uncommon these days for criminals to obtain enough information about
you to "steal" your identity, creating new bank or credit card accounts and
accessing existing accounts.
• Research: In the information age, there's very little about ourselves or who
we work for that a good researcher can't find out. Everything from personal
driving and credit history to corporate financial reports, and even network
topography, are at risk.
Check Your Progress 1
................................................................................... : .
Employees help one another, expecting a favour in return. Social engineers try to
take advantage of this social trait via impersonation.
For Example:
"Hi! This is Anup, from HR Department. I have forgotten my password. Can I get
it please?"
Frequently people will do something outside their routine for someone they perceive
to be in authority. An attacker posing as an important individual such as a Director
or Vice-President, can often manipulate an unprepared employee. This technique
assumes greater significance when considering that the attacker may consider it a
challenge to get' away with impersonating an authority figure.
For example, a help desk employee is less likely to turn down a request from a
vice president who says he/she is pressed for time and needs to get some important
information needed for a meeting. Social engineer may use authority to intimidate
or may even threaten to report employees to their supervisor if they do not provide
the requested information.
Example:
"Hi! This is Anup, CFO Secretary. I'm working on an urgent project, and lost the
system password. Can you help me out - it's very urgent?"
• In person
Attackers might try to visit a target site and physically survey the organization for
information. A great deal of information can be gleaned from the tops of desks,
the trash, or even phone directories and nameplates. Hackers may disguise
themselves as a courier or delivery person, a custodian, or they may hang out as a
visitor in the lobby. Hackers can pose as a businessperson, client, or technician.
Once inside, attackers can look for passwords on terminals, important papers lying
on desks, or they may even try to overhear confidential conversations.
Even though there might be a hint of suspicion on the authenticity of the request,
people tend to stumble on the side of being helpful in the workplace. People tend .
to believe that others are expressing their true attitudes when they make a statement.
"Mr. Anup, our Finance Manager, asked that I pick up the audit reports he needs
for his report. Will you please provide them to me?"
• Tailgating
• Piggy backing
• Sabotage
Once the attacker gains access, the workstation will be corrupted or will appear to
be corrupted. Under such circumstances, users seek help as they face problems.
• Marketing
In order to ensure that the user calls the attacker, the attacker must advertise. The
attacker can do this by either leaving hislher business cards around the target's
office and/or by placing hislher contact number on the error message itself.
~ Support
Although the attacker has already acquirf"d· ne9ded Information, he or she may
continue to provide assistance to users-so th(t they remain ignorant about the
hacker's identity. 13
Information Gathering • Service Desk
The service desk or Help Desk is one of the support defences against hackers, but
it is, conversely, a target for social engineering hackers. Although support staff is
often aware of the threat of hacking, they also train to help and support callers,
offering them advice and solving their problems. Sometimes the enthusiasm
demonstrated by technical support staff in providing a solution overrides their
. commitment to adherence to security procedures and presents service desk staff
with a dilemma: If they enforce strict security standards, asking for proofs that
validate that the request or question comes from an authorized user, they may
appear unhelpful or even disruptive. Production or sales and marketing staffs who
feel that the IT department is not providing the immediate service that they require
are apt to complain, and senior managers asked to prove their identities are often
less than sympathetic to the support staffs thoroughness.
Electronic media can be even more useful. If companies do not have waste
management rules that include disposal of redundant media, it is possible to find
all sorts of information on discarded hard disk drives, CDs, and DVDs. The robust
nature of fixed and removable media means that' those responsible for IT security
must stipulate media management policies that include wiping or destruction
instructions.
• Personal Approaches
The simplest and cheapest way for a hacker to get information is for them to ask
for it directly. This approach may seem crude and obvious, but it has been the
bedrock of confidence tricks since time began. Four main approaches prove
successful for social engineers:
• Assistance: In this approach, the hacker offers to help the target. The
assistance will ultimately require the target to divulge personal information
that will enable the hacker to steal the target's identity.
Most people assume that anyone who talks to them are being truthful, which is
interesting because it is a fact that most people admit that they will tell lies
themselves.
• Virtual Approaches
Social engineering hackers need to make contact with their targets to make their
14 attacks. Most commonly, this will take place through some electronic medium,
such as an e-mail message or a pop-up window. The volume of junk and spam Social Engineering
mail that arrives in most personal mailboxes has made this method of attack less
successful, as users become more skeptical of chain mail and conspiratorial requests
to take part in "legal" and lucrative financial transactions. Despite this, the volume
of such mail and the use of Trojan horse mail engines mean that it remains attractive,
with only a minimal success rate, to some hackers. Most of these attacks are personal
and aim to discover information about the target's identity. However, for businesses,
the widespread abuse of business systems, such as computers and Internet access,
for personal use means that hackers can enter the corporate network.
• Insider Attack
60% of attacks in organization are done by insiders. Insiders are employees of a
company or person who has some trusted relation with that company. In this kind
of attack the attacker uses some other person to implement the attack.
For eg:
• Pop-up Windows
In this type of social engineering, a window appears on the screen informing the
user that he/ she has lost his/her network connection and needs to re-enter his/ her
username and password. A program that the intruder had previously installed will
then email the information to a remote site. This type of attackis mainly done by
using virus and trojans. The spyware can also perform this type of attack. The
spyware will pretend to be an antivirus and will pop up a message to user that his/
her machine contains virus & in order to remove them, it needs username &
password etc. When user enters that information it will then give a fake reply like
virus removed and in backend it will send information to attacker.
15
Information Gathering • Chattingllnstant Messaging
Now a day, Chatting is quite popular medium of communication. People of almost
all ages chat online. Usually it is very popular among the teenagers. Performing
social engineering via chatting is quite easy.
Attacker just needs to chat with someone and then try to elicit the information. As
chatting is informal way of communication which means attacker is not directly
communicating with the person. Now due to this attacker can even tell lie to other
person about his/ her identity etc., because victim can't see attacker without using
webcam.
For instance: Usually what attacker does is, he/she chats with boys by behaving as
a girl & vice-versa. By using fascinating picture during chatting attacker can lure
any .one. Display picture usually works like bait. Then slowly attacker will ask
certain questions by which he/she can elicit information about the victim. This
method is very dangerous because you would not even know when you got victim
to social engineer.
• Malicious Websites
This involves a trick to get an unwitting user to disclose potentially' sensitive data,
such as the password used at work. Some methods include using advertisements
that promote and display messages offering free gifts and holiday trips, and then
asking for a respondent's contact email address, as well as asking the person to
create a password. This password may be one that is similar, if not the same, as
the one that the target user utilizes at work. Many employees enter the same
password that they use at work, so the social engineer now has a valid username
and password to enter into an organization's network.
Nowadays many websites ask you to use your E-mail ID as Username while
registering a new account. Then it asks to create a new password. Many times
some peoples (newbies) get fooled they enter the same password that they are
using with that email account..!! Beware about this; some attacker can fool you by
Phishing.
Each of these goals is a variation on a theme, with the hacker calling the company
and attempting to get telephone numbers that provide access directly to a PBX or
through a PBX to the public telephone network. The hacker term for this is
phreaking. The most common approach is for the hacker to pretend to be a telephone
engineer, requesting either an outside line or a password to analyze and resolve
the problems reported on the internal telephone system.
Requests for information or access over the telephone are a relatively risk-free
form of attack. If the target becomes suspicious or refuses to comply with a request,
the hacker can simply hang up. But realize that such attacks are more sophisticated
than a hacker simply calling a company and asking for a user ID and password.
The hacker usually presents a scenario, asking for or offering help, before the
request for personal or business information happens, almost as an afterthought.
16
r
Social Engineering
1.5 DESIGNING DEFENCES AGAINST SOCIAL
ENGINEERING THREATS
Prevention includes educating people about the value of information, training them
to protect it, and increasing people's awareness, of how social engineers operate.
After understanding the wide range of threats that exists, three steps are necessary
to design a defence against social engineering threats against the staff within your
company. An effective defence is a function of planning. Often defences are
reactive-you discover a successful attack and erect a barrier to ensure that the
problem cannot reoccur. Although this approach demonstrates a level of awareness,
the solution comes too late if the problem is a major or expensive one. To pre-
empt this scenario, you must take the following three steps:
The requirement is to make sure that a group of people take on the key
responsibilities of the following security roles:
I,
Information Gathering
Attack vector Describe company usage Comments
On line
Pop-up applications
PBX
Waste management
Personal approaches
~
Physical Security •
Office security All offices remain 25 percent of staff works
unlocked throughout the from home. We have no
day. written standards for home
worker security.
Other/Company-
specific
18
When the Security Steering Committee has a good understanding of the Social Engineering
vulnerabilities, it can develop a Company Social Engineering Attack Vector
Vulnerabilities table (shown in the previous example). The table outlines the
company's protocols in potentially vulnerable areas. Knowledge of the
vulnerabilities enables the cominittee to develop a blueprint for the potential policy
requirements.
The Security Steering Committee needs to first identify areas that may pose a risk
to the company. This process should include all of the attack vectors identified
within this paper and company-specific "elements, such as use of public terminals
or office management procedures.
• Confidential information
• Business credibility
• Business availability
• Resources
• Money
You set priorities by identification of the risk and calculation of the cost of
mitigating the risk-if mitigating the risk is more expensive than the occurrence of
the risk, it may not be justifiable. This risk assessment phase can be very useful in
the final development of the security policy. For a company that expects no more
than 10-15 visitors in an hour, there is no need to consider having anything more
sophisticated than one receptionist, a sign-in book, and some numbered visitor
badges.
But for a company that expects more than 100 visitors per hour, more reception
staff or self-service registration terminals are necessary. Although the smaller
company could not justify the costs of self-service registration terminals, the large
one could not justify the cost of lost business due to lengthy delays.
Alternatively, a company that never has visitors or contract staff may feel that
there is a minimal risk in leaving printed output in a central location while it
awaits collection. However, a company with a large number of non-employee staff
may feel that it can only circumvent the business risk presented by potentially
confidential information lying in a printer by installing local print facilities at every
desk. The company can obviate this risk by stipulating that a member of staff
accompanies a visitor throughout their visit. This solution is far less expensive,
except, possibly, in terms of staff time.
The Security Steering Committee has the core security areas and risk assessment
for which it must delegate the development of procedure, process, and business
documentation. The following table shows how the Security Steering Committee,
with the assistance of interest groups, may define the documentation required to
support the security policy.
b) Compare your answer with the one given at the end of the Unit.
• Establish a standard that passwords are never to be spoken over the phone.
The telephone offers a unique attack vector for social engineering hackers. It
is a familiar medium, but it is also impersonal, because the target cannot see
the hacker. The most common approach is for the hacker to pretend to be an
engineer, requesting password to analyze and resolve the problems reported
on the internal system. When contacting the help desk to have a password
reset, the organization should establish a set of phrases or words which should
21
Information Gathering be known only by the user. The help desk should then reset the password to
one of those words. If the organizations strict security standards, asking for
proofs over the phone that validate whether the request or question comes
from an authorized user or not, the hackers may appear unhelpful or even
obstructive.
• Implement caller ID technology for the Help Desk and other support functions.
Many facilities have different ring tones based on inter-office phone calls as
opposed to calls that originate from outside. Employees need to be trained to
not forward outside calls. Take down the name and number of the call and
forward the message on to the proper person. The service desk needs to balance
security with business efficiency, and as such security policies and procedures
must support them; Proof of identification, such as providing an employee
number, department, and manager name, will not be too much for a service
desk analyst to request, as everyone knows these. But this proof may not be
completely secure, because a hacker may have stolen this information.
• Invest in shredders and have one on every floor: Your staff must fully
understand the implications of throwing waste paper or electronic media in a
bin. After this waste moves outside your building, its ownership can become a
matter of legal obscurity. Dumpster diving may not be deemed illegal in all
circumstances, so you must ensure that you advise staff how to deal with
waste materials. Always shred paper waste and wipe or destroy magnetic media.
If any waste is too large or tough to put in a shredder, such as a telephone
directory, or it is technically beyond the ability of a user to destroy it, you
must develop specific protocol for disposal. You should also place trash
dumpsters in a secure area that is inaccessible to the public.Every work area
should have shredder in order to destroy all the papers completely. The size of
the shredder should be based on how much confidential information is present
in the office area. Eliminate confidential information collection bins.
Another method to keep employees informed and educated is to have a web page
dedicated to security. It should be updated regularly and should contain new social
engineering ploys. It could contain a "security tip of the day" and remind employees
to look for typical social engineering signs. These signs might include such
behaviors as:
22 • Name-dropping
-
• Intimidation Social Engineering
• Small mistakes
The overarching defenses in the model are security policies, procedures, and
awareness. These defenses target staff within an organization, explaining what to
do, when, why, and by whom. The remaining layers may fine-tune your defenses,
but the essential protection comes from having a well-structured and well-known
set of rules that protect your IT environment.
• Policies, procedures, and awareness. The written rules that you develop to
manage all areas of security, and the education program that you put in place
to help ensure that staff members know, understand, and implement these rules.
An effective defense is a function of planning. Often defenses are considered
to be re-active however, you discover a successful attack and erect a barrier to
ensure that the problem cannot reoccur. Although this approach demonstrates
a level of awareness, the solution comes too late if the problem is a major or
expensive one. To prevent this scenario, a strong planning is required which
could be implemented in case of any attack.
• Physical security. The barriers that manage access to your premises and
resources. It is important to remember this latter element; if 'you place waste
containers outside the company, for example, then they are outside the physical
security of the company.
• Data. Your business information, account details, mail, and so on. When you
consider social engineering threats, you must include both hard and soft copy
materials in your data security planning.
• .Application. The programs run by your users. You must address how social
engineering hackers may subvert applications, such as e-mail or instant
messagmg.
• Host. The servers and client computers used within your organization. Help
ensure that you protect users against direct attacks on these computers by
defining strict guidelines on what software to use on business computers and
how to manage security devices, such as user IDs and passwords.
I
Information Gathering and mobile working gaining in popularity. So, you must make sure that users
understand what they must do to work securely in all networked environments.
• Perimeter. The contact point between your internal networks and external
networks, such as the Internet or networks that belong to your business partners,
perhaps as part of an extranet. Social engineering attacks often attempt to
breach the perimeter to launch attacks on your data, applications, and hosts
through your internal network.
~at are the practices that could be implemented to protect an enterprise against
social engineering?
1.7 COUNTERMEASURES
1.7.1 Training
Periodic training sessions must be conducted to increase awareness on social
engineering. An effective training .program must include security policies and
techniques for improving awareness.
• answers to social engineering questions such as, "Where were you born?"
"What is your favourite movie?" or "What is the name of your pet?"
• Never using the same password for more than one account.
• Old documents that might still contain some valuable information must be
disposed off by using equipment such as paper shredders and burn bins. This
can prevent dangers posed by such hacker techniques as dumpster diving
Access privileges
Access privileges must be created for groups such as administrators, users and
guests with proper authorization required. Access privileges are provided with
respect to reading, writing, accessing files, directories, computers and peripheral
devices.
Increasing employee awareness by laying down clear policies decreases the chance
of an attacker wielding undue influence over an employee. Security policies should
address such processes as access information control, account setup, approval
access, changing passwords, and any other areas that might be susceptible to social
engineering attempts. Additional areas to consider include methods for dealing
with locks, lDs, the shredding of paper, etc.
The policy must have discipline built-in and, above all, it must be enforced. The
policies must have a balancing effect so that the user approached will not go out
of his/her way to assist the attacker or assume a different role when interacting
with the attacker in person or on the phone. Users must be able to recognize what
kind of information a social engineer can use and what kinds of conversations
should be considered suspicious. Users must be able to identify confidential
information and understand their responsibility towards protecting it. They also
need to know when and how to refuse to divulge information from an inquirer
with the assurance that management will support them.
• Password Change Policy: The password policy should explicitly state that
employees are required to use strong passwords and are encouraged to change
them frequently.
They should be made aware of the security implications, in case their password
is compromised due to their negligence.
·2) Unless the e-mail is digitally signed, you can't be sure it wasn't forged or
"spoofed." because anyone can mail it by any name hence when it is stating
some important better to check for the full headers.
4) Phisher e-mails are typically not personalized, while valid messages from your
bank or ecommerce company generally are.
"Phisher e-mails start sorpething like "Dear customer" but there are some
attacks which are customized or more advance which uses your personal
information and if the attack is specifically for you then it will be customize
Iike our case study.
5) When contacting your financial institution, use only channels that you know
from independent sources. (e.g., information on your bank card, hard-copy
correspondence, or monthly account statement), and don't rely on links
contained in e-mails, even if the sites looks genuine.
6) Always ensure that you're using a secure website when submitting credit card
or other sensitive information via your Web browser. Check in the address bar
URL must start with https:// instead of http://
7) Regularly log into your online accounts and change password frequently.
8) Regularly check your bank, credit and debit card statements to ensure that all
transactions are legitimate.
27
I
Information Gathering 9) Don't assume that you can correctly identify a website as legitimate just by
looking at its general appearance.
10) Avoid filling out forms in e-mail messages or pop-up windows that ask for
personal financial information because it might be used by spammers as well
as phisher for future attack.
2) Acceptable usage Policy: The corporate security policy should address how
and when accounts are set-up and terminated, how often passwords are changes,
who can access, what information and how violations or the policies are to be
handled. Also, the help desk procedures for the previous tasks as well as
identifying employees. For example using an employee number or other
information to validate a password change. The destruction of paper documents
and physical access restrictions are additional areas the security policy should
address. Lastly, the policy should address technical areas such as use of modems
and virus control.
Automated password reset and synchronization tools can lift the responsibility
of managing password from tech support and help desk without placing an
undo burden on end user.
5) Protection from Malware: It is also one of the most important part of security
which has to be provided by the technical team in their infrastructure like
Spyware, virus, adware, Trojan etc using software systems. It is always
recommended to implement strong security policies with the help of firewalls,
antispyware and anti-virus software with regular updating of patches so that
the data would not be stolen or misused by any anonymous person.
28
6) Awareness and Education: Giving education to the user about the common Social Engineering
techniques employed and used by the social engineer is an important part of
security system. For example, a knowledgeable user can be advised that hel
she should never give out any information without the appropriate authorization
and that he/she should report any suspicious behaviour. A good training and
awareness program focusing on the type of behaviour required will undoubtedly
pay for itself. By providing real incident example, social engineering can be
implemented effectively in the system.
7) Audits and compliance: Policy gets effective only when it gets implemented
and everyone conforms to the policy. Hence auditing the security policy usage
and to make sure that everyone compliance to the rules as well.
b) Compare your answer with the one given at the end of this Unit.
Why password security is an important issue? Why the security policies should
have the balancing effect?
1.9 IMPERSONATION
Impersonation is committed when an individual impersonates another and does an
act in such assumed character with intent to obtain a benefit or to injure or defraud
another. Impersonation is a part of a criminal act such <is identity theft. This is
usually happened where the criminal is trying to assume the identity of another, in
order to commit fraud, such as accessing confidential information, or to gain
property not belonging to them. It is also known as social engineering and impostors.
I
Information Gathering information and create the account on other's name. There are two common methods
to hack a person's Orkut accounts:
• Phishing (Fake Page): Fake Pages look like pages of Orkut; when user name
and password is inserted into relevant fields, they are transferred to the email
ID of the hacker.
• MW.Orc worm: The MW.Orc worm propagates through Orkut account and
. steals important information such as banking details, usemames, and passwords.
After entering into the victim's machine, the worm launches an executable
file. When the user clicks on this file, it installs two more files, i.e.
winlogon_.jpg and wzip32.exe on the user's computer. Banking details and
passwords are transmitted via e-mail to the worm creator when the victim
user clicks on "My Computer" icon.
Apart from stealing victim's personal information, the mal ware enables the hacker
to remotely control the victim's PC and make it a part of the infected PCs network.
This network uses bandwidth to distribute large pirated movie files and thus brings
down the connection speed. The victim is added to an XDCC Botnet that helps in
file sharing and then the infected link is also sent to other users on Orkut network.
• Talk online.
Many people post their profiles on MySpace to gain exposure. Most of the profiles
posted on MySpace are not genuine.
30
1.9.4 What is."Identity Theft"? Social Engineering
Identity theft has become an epidemic in US, while in India the cases of identity
theft are relatively low given the less number of online transactions and use of
internet. While in India there is no reliable statistics .available on the .extent of .
identity theft, however it would be safe to assume a rapidescalation in identity .
theft cases with increase in the number of on line banking andecommerce
transactions like online share transactions and.owing to the fact that the customers
are not technically adept with virtual world. . ' ,
Nowadays, if you are associated with the stock market and make sometransactions ..
for buying and selling of shares then you must be aware of the online Shares !k
Commodity transactions, where you get a unique User Name & Password from
your broker and you make the transactions online. - -
There are lot cases/ complainant registered where it has been found that' their
online share/commodity account has been compromised and fraudulent transactions
has been executed by unknown fraudster which resulted in huge loss; The fraudster
who are generally software experts or the executives (core dealers) at the broker'
office try to acquire the Client ID's from the-broker office itself, and try hit& trial
methods or social engineering for accessing the accounts. After acquiring the client
Id & password, the fraudster makes unauthorized access to the Client account and
.also accesses their own account in which the profits are to' be transferred from the
victim Client account. The fraudster executes the transactions into the client accounts
at unrealistic prices and match these transactions into their own account
simultaneously. In this way, he shifts the profit to his own account and losses to
the account of the unsuspecting Clients.
There has been number of Cyber-Crime cases reported where the perpetrators of
the fraud send E-Mail or a letter to the victim E-mail id or address requesting the
help of the victim for retrieving huge blocked funds due to some problems and
offer a healthy percentage of these funds as commission. The victim believing the
fraudster in lure of receiving huge funds and pass on his credit card information,
bank account details to fraudster which results in financial loss.
31
I
Information Gathering Defamation or posting of porn or obscene material on social networking sites
There are many cases registered, in which the victim have reported that their profile
and personal information has been stolen and a fake & vulgar profile in his or her
name containing pornography & obscene material along with the victims contact
details like phone numbers & address has been posted on the social networking
site like ORKUT.
Legal measures
Though in India Identity Theft has still not been made a standalone crime unlike
USA, however there are various legal measures which has been taken by the India
which are well defined in IPS and IT Act 200 as well. The offence of identity theft
is committed by a series of act which attracts many penal provisions of present
IPC & IT Act, 2000 which are as follows;
Section 420 IPC When the fraudster deceive people into disclosing
valuable personal data in the nature of identifiable
information which is used later to swindle money from
victim account.
Section 468 IPC When the fraudster commits forgery of website which is
in the nature of electronic record to lure the victims to
pass their identifiable information in order to cheat them.
For example, an employee may ask about how this problem has affected
particular files, servers, or equipment. This provides relevant information to
the social engineer. Many different skills and experiences are required to carry
out this tactic successfully
• ,Establish astandard that passwords are never to be spoken over the phone .
• ' .Irnplernerrt a standard that forbids passwords from being left lying about.
Because employees now average around eight access accounts and
'passwords, it is no longer possible to forbid the writing down of accounts
and passwords. ,
• Implement caller ID technology for the Help Desk and other support
functions. Many facilities have different ring tones based on inter-office
phone calls as opposed to calls that originate from outside. Employees
need to be trained to not forward outside calls. Take down the name and
number of the call and forward the message on to the proper person.
• Invest in shredders and have one on every floor. Every work area needs a
shredder. Eliminate confidential. information collection bins. Require
shredding, not storing.
• Passwords must be changed frequently so that they are not easy to guess.
The policies must have a.balancing effect so that the user approached will
not go out of hislher way to assist the attacker or assume a different role
when interacting with the attacker in person or on the phone.
• Phishing (Fake Page): Fake Pages look like pages of Orkut; when user
name and password is inserted into relevant fields, they are transferred to
the email ID of the hacker.
34
E-Mail Crime & Investigation
UNIT 2 E-MAIL CRIME &
INVESTIGATION
Structure
2.0 Introduction
2.1 Objectives
2.2 What Is Electronic Mail?
2.3 How E-Mail Works?
2.3.1 Operations
2.3.2 Sending E-Mail
2.0 INTRODUCTION
In today's electronic world, E-Mail is critical to any business being competitive'.
In most cases it now forms the backbone of most organisations' day-to-day activities,
and its use will continue to grow, E-Mails have enabled an efficient means of
communication, without the limitations of time zones, speed or cost, usually
associated with many of the other forms of communication. Though it has lot of
advantages, however; E-Mails can easily be used for the negative purposes as
well, making SPAM and virus E-Mails a problem especially by the hackers. In this
Unit, we'll understand the key elements that comprise a successful E-Mail Crime
& its Investigation and eventually work out on securing the E-Mails ..
I
Information Gathering there are different types of viruses, mal ware and other harmful items that may
cause your computer.
Now-a-days, most of the companies implement on line transactions and not only
the companies but an individual also reap the benefits of the internet. They shop
online and also carry out other financial transactions online and somehow keep
their personal, financial, and credit card information, Bank Statements etc. in their
E-Mail. So, the risk of hacking has also gone up significantly. Due to this reason
sufficient assurance for a network, software, and PC are no longer enough. In
order to protect the information and data, it has become the need of the hour to
adopt new methods, techniques and various tools to implement the optimum level
of security. This unit will provide all of measures to be taken for the E-Mail
investigation and how to trace the fake E-Mails.
2.1 OBJECTIVES
After going through this Unit, you should be able to understand:
• What is E-Mail;
• Structure of E-Mail;
• E-Mail Crimes;
• E-Mail Investigation;
• Tracking an E-Mail;
An electronic mail message consists of two components, the message header, and
the message body, which is the E-Mail's content. The message header contains
control information, including, minimally, an originator's E-Mail address and one
or more recipient addresses. Usually additional information is added, such as a
subject header field.
The foundation for today's global Internet E-Mail services reaches back to the
early ARPANET and standards for encoding of messages were proposed as early
as 1973 (RFC 561). An E-Mail sent in the early 1970s looked very similar to one
sent on the Internet today. Conversion from the ARPANET to the Internet in the
36 early 1980s produced the core of the current services.
I
r
Network-based E-Mail was initially exchanged on the ARPANET in extensions to E-Mail Crime & Investigation
the File Transfer Protocol (FTP), but is today carried by the Simple Mail Transfer
Protocol (SMTP), first published as Internet standard 10 (RFC82l) in 1982. In
the process of transporting E-Mail messages between systems, SMTP communicates
delivery parameters using a message envelope separately from the message (header
and body) itself.
The recipient's MTA then delivers the E-Mail to the incoming mail server (called
the MDA, for Mail Delivery Agent), which stores the E-Mail as it waits for the
user to accept it. There are two main protocols used for retrieving E-Mail on an
MDA:
• POP3 (Post Office Protocol), the older of the two, which is used for retrieving
E-Mail and, in certain cases, leaving a copy of it on the server.
For this reason, incoming mail servers are called POP servers or IMAP servers,
depending on which protocol is used.
To use a real-world analogy, MTA act as the post office (the sorting area and mail
carrier, which handle message transportation), while MDA act as mail boxes, which
store messages (as much as their volume will allow) until the recipients check the
box. This means that it is not necessary for recipients to be connected in order, for
them to be sent E-Mail.
To keep everyone from checking other users' E-Maiis, MDA is protected by a user
name called a login and' by a password.
Retrieving mail is done using a software program called an MUA (Mail User
Agent). When it is a web interface used for interacting with the incoming mail
server, it is called webmail.
The MUA is the application, which an originating sender uses to compose, and
read E-Mail, such as Outlook, Thunderbird, Eudora etc.
The sender's MUA transfers the E-Mail to a Mail Delivery Agent (MDA).
Frequently, the sender's MTA also handles the responsibilities of an MDA. Several
of the most common MTA's do this, including sendmail, postfix, exim, qmail etc.
The MDAIMTA accepts the E-Mail, then routes it to local mailboxes or forwards
it if it isn't locally addressed.
An E-Mail can encounter a network cloud within a large company or ISP, or the
largest network cloud in existence: the Internet. The network cloud may encompass
a mass of mail servers, DNS servers, routers, and other devices and services too
numerous to mention. These are likely to be slow when processing an unusually 37
Information' Gathering
How EmailAppears to Work
In figure 1.0, MDA
forwards the email to
I-----~
an MTA and it enters
the first of a series of
How Emai
"network clouds,"
Really Works
'. Fig. 1
heavy load, temporarily unable to receive an E-Mail when taken down for
maintenance, and sometimes may not have identified themselves properly to the
Internet through the Domain Name System (DNS) so that other MTAs in the
network cloud are unable to deliver mail as addressed. These devices may be
protected by firewalls, spam filters and mal ware detection software that may bounce
or even delete an E-Mail. When an E-Mail is deleted by this kind of software, it
tends to fail silently, so the sender is given no information about where or when
the delivery failure has occurred.
When transferring an E-Mail, the sending MTA handles all aspects of mail delivery
until the message has been either accepted or rejected by the receiving MTA. As
the E-Mail clears the queue, it enters the Internet network cloud, where it is routed
along with a host-to-host chain of servers. Each MTA in the Internet network cloud
needs to "stop and ask directions" from the Domain Name System (DNS) in order
to identify the next MTA in the delivery chain. The exact route depends partly on
server availability and mostly on which MTA can be found to accept E-Mail for
the domain specified in the address. Most E-Mail takes a path that is dependent on
server availability, so a pair of messages originating from the same host and
addressed to the same receiving host could take different paths. These days, it's·
mostly spammers that specify any part of the path, deliberately routing their message
through a series of relay servers in an attempt to obscure the true origin of the
message.
To find the recipient's IP address and mailbox, the MTA must drill down through
the Domain Name System (DNS), which consists of a set of servers distributed
across the Internet. Beginning with the root name servers at the top-level domain
(.tld), then domain name servers that handle requests for domains within that .tld,
and eventually to name servers that know about the local domain. The MTA
38
contacts the MX servers on the MX record in order of priority until it finds the E-Mail Crime & Investigation
designated host for that address domain. The sending MTA asks if the host accepts
messages for the recipient's username at that domain (i.e., [email protected])
and transfers the message.
An E-Mail may be transferred to more than one MTA within a network cloud and
is likely to be passed to at least one firewall before it reaches it's destination. An
E-Mail encountering a firewall may be tested by spam and virus filters before it is
allowed to pass inside the firewall. These filters test to see if the message qualifies
as spam or malware. If the message contains malware, the file is usually quarantined
and the sender is notified. If the message is identified as spam, it will probably be
deleted without notifying the sender.
Spam is difficult to detect because .it can assume so many different forms, so spam
filters test on a broad set of criteria and tend to misclassify a significant number of
messages as spam, particularly messages from mailing lists. When an E-Mail from
a list or other automated source seems to have vanished somewhere in the network
cloud, the culprit is usually' a spam filter at the receiver's ISP or company.
In the figure, the E-Mail makes it past the hazards of the spamtrap ...er...filter, and
is accepted for delivery by the receiver's MTA. The MTA calls a local MDA to
deliver the mail to the correct mailbox, where it will sit until it is retrieved by the
recipient's MUA.
,: .
:le.:m Up
: .. C:.t '~. Delete t:: .1'1) ReI'l Fell, dl,j
:: . ~II
Fig. 2
3) Enter the recipients' E-Mail addresses or names in the To.Cc, or Bee box (To,
Cc, and Bee boxes: A message is sent to the recipients in the To box. Recipients
in the Cc (carbon copy) and Bee (blind carbon copy) boxes also get the
message; however, the names of the recipients in the Bee box aren't visible to
other recipients.). Separate multiple recipients with a semicolon.
To select recipients' names from a list in the Address Book, click To, Cc, or
Bee and then click the names you want.
To display the Bee box for this and all future messages, on the Options tab, in
the Show Fields group, click Bee.
- '.
Fig. 3
b) Compare your answer with the one given at the end of the Unit.
What are the components of E-Mail? What is the use of Mail transfer agent?
• From: The E-Mail address, and optionally the name of the author(s). In man:'
E-Mail clients not changeable except through changing account settings.
• Cc: Carbon copy; many E-Mail clients .will mark E-Mail in your inbox
differently depending on whether you are in the To: or Cc: list.
• Bcc: Blind Carbon Copy; addresses added to the SMTP delivery list but not
(usually) listed in the message data, remaining invisible to other recipients.
. Congratulations.
Sedulity Solutions & Technologies has recently launched its 64 bit operating
system.
Team Sedulity
Sedulity Solutions & Technologies .
The header consists of lines beginning with a keyword followed by a colon (:),
followed by information on each line. A brief explanation of each field of the
header is given below. This header contains most of the common fields.
41
Information Gathering . e Received: These lines indicate the route that the E-Mail has taken and which
systems have handled it and the times that it was handled.
• . Date: The date and time. at which the message was sent including time zone.
eFrom: The sender. The part in angle brackets is a real electronic mail address.
This field may be user settabJe, so may not reflect the true sender. In this
case, it shows the original sender of the message.
• Sender: The sender. This is inserted by some systems if the actual sender is
. different from the text in the From; field. This makes E-Mail more difficult to
forge, although this too can be set by the sender. There are other uses for a
sender field .:In the example above, the sender is set to the list owner by the
mailing list system. This allows error messages to be returned to the list owner
rather than the original sender of the message
.e To: Who the mail is sent to. This may be a list or an individual. However it
.. may bear no relation to the person that the E-Mail is delivered to. Mail systems
. used a different mechanism for determining the recipient of a message.
• Reply-to: Where any reply should be sent to (in preference to any electronic
mail address in the From: field if present). This may be inserted by the sender,
usually when they want replies to go to a central address rather than the address
of the system they are using. It is also inserted automatically by some systems
• X-Mailer: Any field beginning with X can be inserted by a mail system for
any purpose.
When using a reply facility it is important to check where the reply is going by
looking at the header of the outgoing message displayed on your screen. If the
message has been forwarded to you, the reply will often go to the original sender
and not the person who sent it to you.
I) E-Mail spoofing
3) E-Mail bombing
5) Defamatory E-Mails
6) E-Mail frauds
E-Mail spoofing
A spoofed E-Mail is the one that appears to originate from one source however,
has emerged from another source in reality. In other words, E-Mail spoofing is the
forgery of an E-Mail header so that the message appears to have originated from
someone or somewhere other than the actual source. To send spoofed E-Mail,
42
r
senders insert commands in headers that will alter message information. It is possible E-Mail Crime & Investigation
to send a message that appears to be from anyone, anywhere, saying whatever the
sender wants it to say. Thus, someone could send spoofed E-Mail that appears to
be from you with a message that you didn't write.
Although most spoofed E-Mail falls into the "nuisance" category and requires
little action other than deletion, the more malicious varieties can cause serious
problems and security risks. For example, spoofed E-Mail may import to be from
someone in a position of authority, asking for sensitive data, such as passwords,
credit card numbers, or other personal information -- any of which can be used for
a variety of criminal purposes. One type of E-Mail spoofing, self-sending spam,
involves messages that appear to be both to and from the recipient. E-Mail spoofing
is surely possible because, Simple Mail Transfer Protocol (SMTP), is the main
protocol used in sending E-Mail.do~s not include an authentication mechanism.
In order to send a spoofed EJMail, the sender has to enter the following information
mentioned below:
• E-Mail addressees) of the person(s) who will recc.. ., copy of the E-Mail
(referred to as.CC for carbon copy)
• E-Mail addressees) 'of the person(s) who will receive a copy of the E-Mail
(referred to as CC for carbon copy, but whose identities will not be known to
the other recipients of the E-Mail (known as BCC for blind carbon copy)
• Message
There are certain web-based E-Mail services like, www.SendFakE-Mai1.com.
www.anonymailer.net which offers a facility, wherein in addition to the above, a
sender can also enter the E-Mail address of the supposed sender of the E-Mail.
E-Mails are often the fastest and easiest ways to propagate malicious code over
the Internet. The Love Bug virus, for instance, reached millions of computers within
36 hours of its release from the Philippines thanks to E-Mail. Hackers often bind
Trojans, viruses, worms and other computer contaminants with E-greeting cards
and then E~Mail them to unsuspecting persons. Such contaminants can also be
bound with software that appears to be an anti-virus patch. E.g. a person receives
an E-Mail from 'Compose From To CC BCC SUbject
Message
[email protected] (this is a spoofed E-Mail but the victim does not know
this). The E-Mail informs him that the attachment contained with the E-Mail is a
security patch that must be downloaded to detect a certain new virus. Most
unsuspecting users would submit to such an E-Mail (if they are using a registered
copy of the McAffee anti-virus software) and would download the attachment,
43
which could be a Trojan or a virus itself!
..
Information Gathering E-Mail bombing
E-Mail bombing refers to sending a large amount of E-Mails to the victim resulting
in the victim's E-Mail account (in case of an individual) or servers (in case of a
company or an E-Mail service provider) crashing. A simple way of achieving this
would be to subscribe the victim's E-Mail address to a large number of mailing
lists. Mailing lists are special interest groups that share and exchange information
on a common topic of interest with one another via E-Mail. Mailing lists are very
popular and can generate a lot of daily E-Mail traffic - depending upon the mailing
list. Some generate only a few messages per day others generate hundreds. If a
person has been unknowingly subscribed to hundreds of mailing lists, his incoming
E-Mail traffic will be too large and his service provider will probably delete his
account. The simplest E-Mail bomb is an ordinary E-Mail account. All that one
has to do is compose a message, ente~ the E-Mail address of the victim multiple
times in the "To" field, and press the "Send" button many times.
Writing the E-Mail address 25 times and pressing the "Send" button just 50 times
(it will take less than a minute) will send 1250 E-Mail messages to the victim! If
a group of 10 people do this for an hour, the result would be 750,000 E-Mails!
There are several hacking tools available to automate the process of E-Mail
bombing. These tools send multiple E-Mails from many different E-Mail servers,
which make it very difficult, for the victim to protect himself.
Threatening E-Mails
This is another type of E-Mail crime, where an E-Mail is send to a person for the
purpose of threatening. It is a useful tool for technology savvy criminals as it
becomes fairly easy for anyone with even a basic knowledge of computers to
become a blackmailer by threatening someone via E-Mail.
Defamatory E- Mails
b) Compare your answer with the one given at the end of the Unit.
Explain the structure of an E-Mail. What are the major E-Mail related crimes?
• Return-path: the header tells that if you reply to this E-Mail message, the
reply will be sent to ydcdd ... @yahoo.com. Would you use such an E-Mail
address for real?
• Received tags: As on web blogs, read them from the bottom to top. The header
says the E-Mail was originally sent from 206.85 ... and it was sent to 217.225 ...
(which is the namelIP of the first mail server that got involved into transporting
this message). Then- suddenly, the next Received tag says the message was
received from root@localhost, by mailv.fx.ro. You can also notice that so far,
the Received tags do not contain any information about how the E-Mail was
transmitted (the "with" tag is missing: this tag tells the protocol used to send
the E-Mail).
In reality, this is the common case of a spammer pretending to be the root user of
mailv.fx.ro and sending the E-Mail from 206.85 ..., through 217.225 ... and telling
217.225 ... to act as the root user of mailv.fx.ro, in order to use the SMTP server of
mailv.fx.ro to send the E-Mail. Since more and more mail servers are not allowing
open-relay connections, the spammer can only use the mail server of the receiver,
in order to send the message. If the spammer will try to send the E-Mail to
support@E-Mailaddressmanager.com.throughexactlythesamerouteasabove.it
wouldn't work, because [email protected] not a network user
of mailv.fx.ro. This is the reason why you may have received spam E-Mails
appearing to be sent through an E-Mail address of your own ISP.
Going deeper with the analysis, you can use an IP tracing tool, like Visual Route,
in order to see to whom the IP belongs to. As in most of the spamming cases, the
starting IP (206.85 ...) is unreachable, which means that the spammer could have
routed the real IP or he could have used a dynamic IP (a normal case for dial-up
users). However, by tracing 217.225 ..., you will get to the ISP used by the spammer,
a German provider. The ISP has nothing to do with the spam' itself, but it was
simply used by the spammer to connect to the Internet.
• The X-IP tag (also named X-Originating-IP) is probably the most important
one and it should give precise information about the sender (from where the
E-Mail was actually sent). Unfortunately, this tag is optional for E-Mail
protocols, so some spam messages will not include it. As you can see, the
originating IP is not even close to the sender's lP, from the Received tags .
•. The X-UIDL tag is another unique ID, but this one is used by the POP3 protocol
when your E-Mail client is receiving the E-Mail. This is an optional E-Mail
tag, but the rule of thumb says spammers love to include it.
The ~60k and feel for both the mail header is almost same but, the major difference
is tht IP address from the mail which was originated, In the above case, Regular
mail was received from their Private IP i.e. 193.231.. ..(localhostJocaldomain) of
the Company where the Spam mail was received from the Anonymous IP address
i.e. 206.85.220.156 which belongs to some other country. And there are many
validations nowadays placed in the new release of the good MTA's which detects
the SPAM mails like the DNS of the mail originator, Time frame, Key words
placed in the mail, Attachments, Blacklisted lP's etc. So these are the ways by
which we can scan whether the mail is the original or the Spam one.
46 b) Compare your answer with the one given at the end of this Unit.
Explain the function of received tags? What is message ID? E-Mail Crime & Investigation
.................................................. ~ .
Netwonr. C'ontilct triformatfom 'The fo1lowlng detailS reter to the netwod< tt1at the system IS on.
o hostmastdrtlC,ad.1!)
~ +&1·3·5291·2312
~ol«JlHIJ-j(ougyou-~n<J\i 1Jid961", 2-~-4 Vcor-l(anda (lvyoda-I«J, tol<)<o 101-0041, )apa"
• To. ~ql'1Q f cl un to bo 9IJryi v rlzon.net, but \hII1$ V"IV <I••'" fQlrSl'ld od ,n suc;h not l'IO<us"riIt
reJoabfe.
• At the time of sending, one emall server (identdied on the lntemEt by 211.125.211.2' to which this en>all
W4l$~lI"'fltlV Iihll$lIedeilIlmed ~()be known 411Vtki:tIHl.I'lii.t, but tt do.._ I'I()t eoo~i!Iy IIltv. th.tt O~" Itll
name <;;ouldbav~ dlanglld, but this lIS 11common 'method used by ~ and $paMmers to mlsdlr<.lc;tusers
~o ~II' tI'uo location,
Tracing an E-Mail address: If you do not have an actual E-Mail message, but
only have an E-Mail address, you can trace the address through its E-Mail server.
However, it should be noted that E-Mail addresses can be easily forged, the results
from tracing an E-Mail address may not be related to the true sender.
Every received E-Mail has Internet Headers. Using Microsoft Outlook as an example
(other mail programs are very similar), just follow these steps to view the headers:
1
Information Gathering Right-click in the 'Internet Headers' field and click on 'Select All' in the popup
menu (or type ctrl-A). Then right-click again and click on 'Copy' in the popup
menu (or type ctrl-C). Finally, paste all the Internet Headers into your favourite
text editor for full examination (such as 'Notepad', included with Windows).
Example: What you see will be very similar to the following (with 'line numbers'
added for clarity and discussion in following sections):
2: Message-Id: <[email protected]>
6: To: <>
9: X-Sender: [email protected]
12: X-Priority: 3
15: Status: U
Header Line Syntax: The Internet Header Fields are just a series of text lines,
where each line looks like:
And if a line starts with a tab or spaces, like line 4 above, that line is a continuation
of the previous Header-Value line. So, the Header-Name Received in line 3 has a
Header- Value that spans lines 3 and 4.
'Received' Headers'
The most important header field for tracking purposes is the Received header field,
which usually has syntax similar to:
Where from, by, via, with, id, and for are all tokens with values within a single
Header-Value, which may span multiple lines. Note: Some mail servers may not
include all of these tokens -- or additional tokens/values may be added to this
field, but now you are prepared to break it apart and understand it.
Every time an E-Mail moves through a new mail server, a new Received header
line (and possibly other header lines, like line 2 above) is added to the beginning
48
of the headers list. This is similar to FedEx package tracking, when your package E-Mail Crime & Investigation
enters a new sorting facility and is 'swiped' through a tracking machine.
This means that as you read the Received headers from top to bottom, that you are
gradually moving closer to the computer/person that sent you the E-Mail.
But please note that as you read through the Received header fields and get closer
to the computer/person that sent you the E-Mail, you need to consider the possibility
that the sender added one or more false Received header lines to the list (at the
time, the senders beginning of the list) in an attempt to redirect you to another
location and prevent you from finding the true sender. But, now that you know
false header lines are possible, just stay alert.
You will probably find it very useful to break a single Received line into multiple
lines, with one token per line. Namely, the header line:
is much easier to read and understand when formatted so that each token is on a
new line, as in:
Received:
by visualroute.com (8.11.6)
id f9CIVSk24480
For tracking purposes, we are most interested in the from and by tokens in the
Received header field. In general, you are looking for a pattern similar to:
In other words, mail server AAA received the E-Mail from BBij and provides as
much information about BBB, including the IP Address BBB used to connect to
AAA. This patterns repeats itself on each Received line. The syntax of the from
token most times looks like:
Where: name is the name the computer has named itself. Most of the time we
never look at this name because it can be intentionally misnamed in an attempt to
foil your tracking (but it may leak the windows computer name). dns-name is the
reverse dns lookup on the ip-address. ip-address is the ip-address of the computer
used to connect to the mail server that generated this Received header line. So, the
ip-address is gold to us for tracking purposes.
The by token syntax just provides us with the name that the mail server gives
itself. But since the last mail server could be under the control of a spammer, we
should not trust this name.
So, what is crucial for tracking, is to pay attention to the trail of ip-address in the
from tokens and not necessarily the host name provided to us in the by tokens.
Hopefully an example will make the reason why very clear: 49
I
r Information Gathering 1: Received: from tes1a623.0nE-Mail.com.sg ([203.127.89.129]) by
visualroute.com (8.11.6) id f9CIVSk24480; Tue, 12 Oct 2004 12:31:29 -0600
(MDT)
If you ignore line 1, you would conclude from line 3 that mail server tes1a623.0nE-
Mail.com.sg sent you an E-Mail, but this would be wrong. When you trace to the
host name tes1a623.0nE-Mail.com.sg. you are actually tracing to the IP Address
lookup on that host name, which is 192.9.200.230. But as you can see from line 1,
the IP Address used was really 203.127.89.129. Do not be fooled by this attempted
misdirection by spammers and fraudsters.
Determine the IP Address of the Sender: Using the example E-Mail headers above
and analyzing the Received header lines we can conclude:
So, we have just tracked this E-Mail to the source -- IP Address 203.127.89.138.
The Internet Headers for an E-Mail message may contain some really interesting
information about the sender.
Where we can clearly see the IP'Address of the sender, but we can also see the
computer name of hanksdell. While the computer name can be named anything, in
this case, I might assume that the person is named Hank and uses a Dell computer.
5.5.2448.0)
So, according to +0800, the server is 8 hours east of GMT. TIP: Go into the
Windows Control panel and enter into the Date/Time dialog, where there is a
Time Zone list. This time zone appears to be in Singapore. Then, the .sg in
tesla623.0nE-Mail.com.sg means Singapore, which is one more confirmation of
this information. A final confirmation comes from performing a VisualRoute trace
203.127.89.129 (the IP Address for tesla623.0nE-Mail.com.sg). TIP: Trace to the
IP Address, not the host name.
C) X-Mailer: This will usually tell you the mailer software used by the sender of
the E-Mail. Consider:
This mayor may not be immediately useful, but it can be very useful if there is a
follow-up investigation by authorities.
6: X-Originating-IP: [202.156.2.147]
However, notice that we could have obtained the same IP Address information by
examining the Received header fields. But it is nice to have this extra confirmation.
tra k
ernaiet
'i ur
ReadNotify is the most powerful and reliable E-Mail tracking service that exists
today. In short - ReadNotify tells you "when" the E-Mail you sent gets read / re-
opened / forwarded and so much more. The Salient features are: Certified email
with delivery Receipts, Silent Tracking, Proof of Opening History, Security and
Timestamps etc.
OR
Testing? If you send tracked E-Mails to yourself, your anti-spam filters may block
them (people don't usually write to themselves) - so we recommend you test by
sending to other people.
• Recipients IP address
• URL clicks
To adminl'iVtechnobhez.com
Froml ·_'';df!illl!!lJlil.com
Subject TechnoBltez. Teollng
·Sont on 21·06C·l0 at 20 32.51pm AsialKolkata time
1.t Open 21.0ec-10 at 20:38:14pm "0530 (86%) Bangalore Kamataka India
Tracking Details
Opened
Opened 21·Doc-l0 at 20 38 14pm (UTC .•05 30) 5mins23secs after sending
Location Bangalor. Karnataka India (86% likelihoo~)
Opened on ABTS·KK·Dynamic-205.3, 167, 122.airtelbroadband)n {122.167 ))0560995,
Language of recipient. PC en·US (EnglishlUnrted States) en q=O 8 (Engtish)
B used by recipient MozlS 0 (Win U Windows NT 6·0 en·US) AppleWebKitJ53-1 10 (KKfML like Gecko)
rowser Chrome/8 0 552 224 Safaril534 10
!click MtEt for up-to-date (live) tracking information. P" cc-n-e-sue •. '''·'0.00'''' ..-to, <1·C,,.,,,,=O? "<m
All messages sent via ReadNotify benefit from our SPF compliant and Sender-ID
compliant mail servers. This confirms safe transmission of your messages, and
also enables us to report delivery status to you (including: bounce-backs, delays
and success notifications). Delivery information is listed in your Personal Tracking
Page.
Try hovering your mouse over the sections in our Live Sample Receipt for more
information.
Note: ReadNotify.com does not use or contain any Spyware, Malware, nor viruses,
it is not illegal to use, and does not breach any privacy regulations in any countries.
52
What else does ReadNotify do? E-Mail Crime & Investigation
There are lots of great features available to you - these include the following
sending options:
• Certified E-Mail
• Invisible tracking
• Self-Destructing E-Mails
• Block printing
• E-Mail ReadNotifications
• Instant Messenger
These options are available to you from "My Account" in Member Utilities.
b) Compare your answer with the one given at the end of this Unit.
I
Information Gathering Advanced CallerIP Advanced Edition (inc. all Standard features) allows you to
run it as a server! This allows you to monitor the connections made to and from
your machines from a remote location! Automated Alerts are also available to you
.are notified the moment something suspicious attempts a connection to your
server(s).
~fI9~~~
:J c-~~·::-..w:~'!l'llt)"O~('''''!I.\M ~ AI'~~
)'outreondsyl (II'fI)(lr15 d.,; lrial" ••• 4<J U(k loOUl'crla9E'OI!.'!llP:'_1o
eMe'vourhte, Iart'
_
ha,r'(j"~'~\Of~1)r
.....
~.~
II>.!-'~ ~~,,""~\lK.IIOII.~~!(J~
JIjf~~"'-IJcMI[~!W~~ •.
~~ h4ll<
The new look table includes gradient fills. This means the colour of the row
in the table depends on the threat of the connection. If the connection being
made to your machine is harmless then the gradient will be green. It is another
quick and easy way to identify the threat of a connection.
• Condensed CallerIP
CallerIP now allows you to minimize it to a very small and detailed dialog
box. The small window gives' you everything you need to know but stays in
the background.
CallerIP monitors all connections to and from your system and actively scans
ports for possible back doors that allow unauthorized access.
See the contact and abuse reporting information for the company providing
internet access for an IP address or website, so you can easily report hackers
or Internet abuse.
54
• Worldwide Whois reports E-Mail Crime & Investigation
2.9.2 StnartWhois
. SmartWhois is a useful network information utility that allows you to look up all
the available information about an IP address, hostname or domain, including
country, state or province, city, name of the network provider, administrator and
technical support contact information. It helps you find answers to these important
questions:
With SmartWhois you can focus on your work; the program will unmistakably
choose the right database from over 100 whois databases all over the world and
fetch the most complete results within a few secondsvSmartwhois supports
Internationalized Domain Names (IDNs), so you can query domain names that use
55
I
Information Gathering non-English characters, like German umlauts, French accent grave, or fully consist
of the letters from Chinese, Hebrew, Russian, and other alphabets. It 3lso fully
supports IPv6 addresses.
Features:
• Smart operation: The program always looks up whois data in the right database;
you don't have to waste your time trying them all.
• Saving results into an archive: you can build your own database that can be
viewed offline.
• Wildcard queries.
• Customizable interface.
• Everyone who uses standard Whois utilities: SmartWhois saves a lot of time
and does things standard Whois utilities can't do.
• People who hate spam or want to identify the origin of suspicious E-Mail
messages: check the message header and locate the real sender! You can also
send E-Mail to the network administrator with a mouse click.
• Webmasters who want to study the logs more carefully and are unable to
identify many IP addresses.
• Online vendors who want to learn exactly where an order comes from.
2.9.3 VisualRoute
VisualRoute Features and Benefits
Results from several essential network diagnostic tools are integrated into an overall
connectivity report, providing a graphical view of connection performance report.
including packet loss and latency for each network hop. Drill-down detail is easily
visible with a mouse over any network hop.
56
I
mrfaMi(olitt"O.wWJ"kC'~.com E-Mail Crime & Investigation
•. 48.$ 1P/i ee Ti*" "' s
.t
50
1921680.62
Itl1~801
n ,~, ~1,J:10-1I!ff91 PifljRliJ;'ft$j "al\~aet'tl If ~. h ••1..N
•
I
11
'I.t U'I'~
,')
ijU UI{t>
ge·t~5-y~9JPlO;ffl!ctMt ParniM~i$ttf earfl.'t.ut
1e-9-1·u.O~P9n!¥JJ'@~R""".,.(.1;>' •.. 1.16.'
$
It
81 ntH.,n to-!:!,,'!)ljl·loj!l!la$·tJ!' 'f I • ..,~,n.,I!tA I~
81 HUH !«-q-II-IH-p!!ll56mW" •.."'••••• ""'. s
IIS's-3-\-j).()."Q! aIIa!)IU -ll600 li
"
81
U
~UUH6}
.u~ ....,OA,IJS"-
po!j-!-,2.0-@pOI "Win b Oilllas, 1'i.1JeA )$
n u~u'I~~ eosA)-'-!l-().peGII!SQ$!e ~L_ csa 39
U 15,f~·1·ljUUij· l<
es lq"f~n( ~.e-l-W_tH(U,tw .t!bItwne- lf>
a§ 16Ho.n6 gt-3-q-I)WQ1 s"
tjb.JWV<. S6
ss HHHIiI1!~ .'I.drll2 mU!!Imw nee 1$
85 lur911 1115 '!u-1Ui'~'HIl!" FI> 1~
as .~.fU..n lW'"!.¥lri!oWu,m P;;o 1» •••• " 11
IP Location Reporting
, ~1}1,IIot.,1rJioVf'W
~'" '<9R' OD
"r~11 P>; :OO~ IW'_"'" fz<'u 'lIS e~,;;oh tt ..
,
Ij
l 63
192.1680.92
l~t.J!:IH
rH.'2t4··
l>
I
~
~
I-
63 1iJf>, l#i' t~;t 1
63 ~U'H$Jl"<;' le
,~ &6
6&
~Ulll;fUf
9H~!If ~~
.$,;0 I
31
I 66 I;n;;~iill u
~ 66 }'l-'~:!"iI!lf~4· ~3$
It 66 'ti<'},4',~
r•• 66 t~iUU,m 3<'
11 66 F'N:~,!lTS ·!l$oo .e
fs 66 1<W~'-"f ·jl.~OO 5.4
fj 66 n~
f~! •... ·\i51lO 'iti
f..•
1~
66
66
fM"I;>1 Tr~
:!S'~,!I!"~
·0600
,jl.SOO
4'.;:
ss 6~ W~H}~ -,j)!) $ji
11 SO ~l!I.III1'L"" ·1)&00 ss
Get instant lookups of domain information from worldwide databases, so you can
see the registered 'owner' of an IP address or domain. See the contact information
for the company providing Internet access for each hop of a network route, so you
can easily report network problems.
Get real-time views of all possible routes to a destination and easily compare the
performance of different routes. The common use of load-balancers creates multiple
paths that data packets may travel between the source and destination. OmniPath
discovers the various paths, enables you to easily see which routes are the fastest!
slowest, have the highest!lowest packet loss, or have the highest probability. More
info. 57
Information Gathering Netvu" Multiple Route Topology Graph
See a high-level view of all network routes for open trace reports, enabling easily
identification of network nodes that are common to multiple routes, and network
routes that have multiple path options due to load balancers or router configurations.
NetVu enables you to consistently monitor all possible paths between the source
and. destination for mutiple routes in a single diagram, view the common nodes,
and locate single points of failure. The diagram updates when even a new trace is
performed, when used with the continuous trace option you can easily check the
health of your network by viewing changes in the diagram.
Test from Visual ware servers in Washington and London to test connectivity to
your servers or network devices. This capability provides additional testing points
to help identify network routes and network providers causing poor performance.
Try a traceroute test now.
The SupportPro Edition enables support staff to test connectivity in both directions:
to/from the VisualRoute desktop and to/from remote systems. This capability
provides visibility to connectivity problems that occur in one direction only, such
as from the customer location to your server -- problems that are otherwise very
difficult to pinpoint without imposing on the customer or traveling to .the remote
location. The SupportPro Edition utilizes remote agents to make reverse tracing a
quick and easy process.
IPv6 Compatibility
IPv6 is the next generation of the Internet Protocol, the system by which data is
transferred across the Internet. VisualRoute 2009 enables traces to IPv6 addresses,
including IPv6 domain and network provider lookups.
You can trace any computer on the internet simply by entering an E-Mail, IP address
or URL. The display shows you the route between you and the remote site including
all intermediate nodes and their registrant information.
McAfee NeoTrace is the world's most popular Internet tracer, used by law
enforcement, ISPs, and network professionals, yet easy enough for the home user.
Explore the powerful new features designed to make our most popular product
.•58 even easier to use!
~NeoTrace www cnn corn , " rs '" "-~~
E-Mail Crime & Investigation
file f;dit 'liew l:!elp
~ ~ : I!l E~ternalApps •
Name: frpar308-tc-p2-0.ebone.net
Hamburg 110111\ IP Address: 213.174.70.214
BERLIN WARSZAWA Location: PARIS (48.858N. 2.325E)
LONDON Network: EBONE-8ACK80NE
Qfrankfurt am Main
g,;;;"m"O'~IJtN Registrant:
Ebone consortium (E80NE-DOM)
Milano Royallnslilute ofTechnology SUNET-KTf
QBUCU Stockholm. S-10044
SE
Barcelona ROMA
Izmi
AlGER
Features:
• Internet Explorer Integration Website tracing is just a click away with our lE
browser integrated Trace Button.
• Detailed Map View Map View shows most detailed available map for current
view using expanded regional information.
• Mail Server Tracing E-Mail address entry allows McAfee NeoTrace to locate
the mail server for that address.
• Many Save Formats Allows trace data, maps or both to be saved in formats
such as JPG, PNG, BMP, HTML, RTF, and plain text
I shall not elaborate on this, since many sites have already discussed this in great
detail. In a nutshell, a strong Password must constitute the following:
• It must not have any common words such as "123", "Password", your birth
date, your login name and any words that can be found in the dictionary.
Even if your Password consists of the above, it is still not secure enough. Your
Password needs to be totally unique and different for each and every one, of your
on line accounts. This is to make sure that in the event that one account is hacked
into, your other accounts will not get affected.
You must be wondering that how you are going to remember so many Passwords
when you have a problem remembering your existing one. Here are some steps
that could be used as they are very powerful. Here it is;
1) First, think of a thing, date, phrase, event, place or anything that is unique
only to you. It must be of at least 8 characters long. For demonstration purpose,
a name "Darnien Oh" will be used as the term throughout this topic. Note that
the capital letters and the space in between the name are part of this term. For
your own account, please select a term that is difficult for others to guess.
2) Use the following rules to replace the regular characters with special characters.
You could even form your own rules.
3) Now go to Password Meter (see "MakeUseOf" review here) and test the
strength of your term. This is the result of the above term. If your term is not
strong enough, you will see a list of items that you can improve on.
NU"'~O .,
!>ytnbOl
C01l4Jl"trt .((II''''~'')ll)
., , --,---=-"--"
COna,I'lCr
CQf'ld
t I ((fl_'" ,..")••_"•••
+(1'1"''''')
' ~_':
t.14t ~
60
4) Once you are happy with your term and are sure that only you.can decipher it, E-Mail Crime & Investigation
go to any of your online accounts now. To set a Password <for that account,
append the name of the site, or the URL of the site to the. end of your term.
"
Is that enough?
That is just the beginning. To really make it secure and hard for others to guess,
you must change your Passwords on frequent basis. Some of you may find it an
assignment to come up with new Passwords every month. Here is what you can
do:
Instead of appending the site name to the end, you can now append it to the front,
in the middle or even split the site name out into few parts. For example:
• M@keD@m!enU$eOhOf
• M@keU$eD@m!en%Oh
You can also change the replacement characters such as @ for - and whatsoever.
You can also do a complete changeover of your term to come up with a totally
different Password.
:J ~ urity
••••••••• 1 • fa«
~_.~<i.
10
1I'Jqj
NWlShlTPPIO'oeCl
lo.w.,1W
61
I
Information Gathering Do you know that when you send your E-Mail messages, they do not go directly
to recipient mailboxes? Do you know that your Internet Service Provider (ISP) ,
stores copies of all your E-Mail messages on its mail servers before it tries to
deliver them? Do you know that someday all the information kept on the servers
. can be easily used against you? E-Mail Security is a system-tray local SMTP server
program for Windows that lets you send E-Mail messages directly from your PC
to recipient mailboxes ensuring your E-Mail security and privacy by means of
bypassing your ISP's mail servers where your relevant information can be stored
and viewed. Do you also know that when you send an E-Mail message to a list of
E-Mail addresses, the respondents can see each other in the E-Mail message header?
You think it is secure? While sending, E-Mail Security always breaks E-Mail
messages addressed to a group of people to individual messages to ensure your
security and security of your respondents. Also, E-Mail Security does not leave
any traces on your PC because it just gets your E-Mail messages from your
E-Mail client and puts them in the recipient mail boxes at the same time without
making any temporary files on your PC. E-Mail Security supports all E-Mail
programs like Outlook Express, Outlook, Eudora, etc. The E-Mail program you
already use for sending and receiving messages can be connected to E-Mail Security
in a very easy way - just by using the word "localhost" instead of your current
SMTP host. Having done so, you can send messages in a usual manner. Install
E-Mail Security on your PC before it is too late!
2~10.3SuperSecret
UHf
j .!.J
\~.,,: .••• '.".' I.. •..• • •...•.•••. ~••• ··.1: .• ••..••. • ••• •.•• ' •.. ".·"~. ' .•••.••• :50
.•.• ,1..•.• I .•• '.I!.t. •. :·•• :::':',(.~
.•,.' .•'.•.••. ".;' .\.-\. ...;..•••.•. r"" .J.,') ... :,.... \' .1.,_
rn a new ~
62
SuperSecret provides secure storage for all of your logins and Passwords so that E-Mail Crime & Investigation
you only have one Password to remember from now on. SuperSecret supports
multiple users on the same computer using different SuperSecret login names so
that you can keep your Passwords private, even if you share a computer with
others at work or home. Now with version 2 SuperSecret supports filtering
Passwords by the login name, Password, or the entry description so that you can
quickly find the Password you need. You can also store a URL for each entry so
you never forget where you need to go to access your online accounts. SuperSecret
can generate secure, random Passwords for you.
Only one Password is required to use SuperSecret. All of your other account and
Password information is stored securely in an encrypted format on your computer
and can be accessed only with your one and only Password. SuperSecret allows
each family member or eo-worker to have hislher own storage area for Passwords.
Your confidential information is· safe even if prying intruders are sitting at your
computer, because SuperSecret's data can only be accessed by your one secret
Password.
Select the entry you need the Password for and the Password will be displayed;
deselect the entry and the Password will be hidden again to protect you from
anyone who may look over your shoulder.
You can keep SuperSecret open to save time by minimizing it to the taskbar for
easy access. SupenSecret runs on Windows 95, Windows 98, Windows ME,
Windows NT, Windows 2000, and Windows XP.
b) Compare your answer with the one given at the end of this Unit.
What are the different ways of tracing ip address? Expalin anyone. Highlights the
points of securing E-Mail accounts?
63
I
Information Gathering
2.11 LET US SUM UP
This unit throws light on ••E-MAIL CRIME AND INVESTIGATION". E-Mail.as
simple as it is to use, relies on a more complicated set of operating procedures
than that of the Web. For most users, its operation is transparent, which means
-that it is not necessary to understand how email works in order to be able to use it.
This' unit help users to understand its basic principles, give them an idea of how to
best configure their em ail clients and inform them about the underlying mechanisms
of spam. This unit also provides useful background information on E-Mail security
issues. It will help you to examine the security threats facing by your corporate
E-Mail system and determine what kind of E-Mail security solution your company
needs. A variety of different elements weaken your corporate email system and
while some are widely known - such as email viruses - others tend to be ignored.
Emails carrying offensive messages or confidential corporate information can create
immense inconvenience and expense for a company that has not equipped its mail
server with the appropriate tools. The same goes for spammers who use the email
system at work to send thousands of unsolicited email messages.
The user Mail User Agent formats the message in E-Mail format and uses the"
SimpleMail Transfer Protocol (SMTP) to send the message to the local mail
transfer agent (MTA) , in this case smtp.a.org, run by user's internet service
provider (ISP).
The MTA looks at the destination address provided in the SMTP protocol
(not from the message header), in this case [email protected]. An Internet E-Mail
address is a string of the form localpart@exampledomain. The part before the
@ signis the local part of tl1e address, often the username of the recipient,
and the part after the @ sign is a domain name or a fully qualified domain
name. The MTA resolves a domain name to determine the fully qualified
domain name of the mail exchange server in the Domain Name System (DNS).
• From: The E-Mail address, and optionally the name of the author(s). In
many E-Mail clients not changeable except through changing account
settings.
• Bcc: Blind Carbon Copy; addresses added to the SMTP delivery list but
not (usually) listed in the message data, remaining invisible to other
recipients.
• Received: These lines indicate the route that the E-Mail has taken and
which systems havehandled it and the times that it was handled.
• Date: The date and time at which the message was sent including time
zone.
• From: The sender. The part in angle brackets is a real electronic mail
address. This field may be user settable, so may not reflect the true sender.
In this case, it shows the original sender of the message.
• Sender: The sender. This is inserted by some systems if the actual sender
is different from the text in the From: field. This makes E-Mail more difficult
to forge, although this too can be set by the sender. There are other uses
for a sender field. In the example above, the sender is set to the list owner
by the mailing list system. This allows error messages to be returned to
the list owner rather than the original sender of the message
• To: Who the mail is sent to. This may be a list or an individual. However
it may bear no relation to the person that the E-Mail is delivered to. Mail
systems used a different mechanism for determining the recipient of a
message.
i) E-Mail spoofing
I
Information Gathering iv) Sending threatening E-Mails
v) Defamatory E-Mails
3) Received tags: as on web blogs, reading from the bottom to top. The header
says the E-Mail was originally sent from 206.85 ... and it was sent to 217.225 ...
(which is the namelIP of the first mail server that got involved into transporting
this message). Then suddenly, the next Received tag says the message was
received from root@localhost, by mailv.fx.ro. One can also notice that so far,
the Received tags do not contain any information about how the E-Mail was
transmitted (the "with" tag is missing: this tag tells the protocol used to send
the E-Mail).
4) For tracking purposes, the user is most interested in the from arid by tokens in
the Received header field. The pattern similar to:
In other words, mail server AAA received the E-Mail from BBB and provides
as much information about BBB, including the IP Address BBB used to connect
to AAA. This pattern repeats itself on each Received line. The syntax of the
from token most times looks like: name (dns-name [ip-address])
Where: name is the name the computer has named itself. Most of the time
user never look at this name because it can be intentionally misnamed in an
attempt to foil your tracking (but it may leak the windows computer name).
dns-name is the reverse dns lookup on the ip-address. ip-address is the ip-
address of the computer used to connect to the mail server that generated this
Received header line. So, the ip-address is gold to us for tracking purposes.
The by token syntax just provides us with the name that the mail server gives
itself. But since the last mail server could be under the control of a spammer,
one should not trust this name.
So, what is crucial for tracking, is to pay attention to the trail of ip-address in
the from tokens and not necessarily the host name provided to us in the by
tokens. For Example;
If one ignores line 1, one would conclude from line 3 that mail server
tesla623.0nE-Mail.com.sg sent you an E-Mail, but this would be wrong. When
one trace to the host name tesla623.0nE-Mail.com.sg. you are actually tracing
to the IP Address lookup on that host name, which is 192.9.200.230. But as
one can see from line 1, the IP Address used was really 203.127.89.129. Do
66 not be fooled by this attempted misdirection by spammers and fraudsters.
Determine the IP Address of the Sender: Using the example E-Mail headers E-Mail Crime & Investigation
above and analyzing the Received header lines we can conclude:
ii) SmartWhois
iii) VisualRoute
iv) McAfee NeoTrace Professional
CallerIP Standard Edition allows real time monitoring of any machine that
it is installed on. This allows you to detect suspicious activity such as spyware
and see where in the world they are connecting from. Worldwide whois reports
and network provider reports are also available for any connection!
• Condensed CallerIP
CallerIP now allows you to minimize it to a very small and detailed dialog
box. The small window gives you everything you need to know but stays
in the background.
• Real-time monitoring instantly identifies suspect activity and spyware
CallerIP monitors all connections to and from your system and actively
scans ports for possible back doors that allow unauthorized access.
67
I
Information Gathering • Identifies the country of origin for all connections
A connection to/from a high-risk country is a key indicator of suspect
activity and could likely be someone looking to steal your confidential
information or compromise your system. CallerIP shows you the country
location of connections so you can identify suspect activity and protect
your information.
.::.:-"
• Network Provider reporting with abuse reporting information
See the contact and abuse reporting information for the company providing
internet access for an IP address or website, so you can easily report
hackers or Internet abuse.
b) E-Mail Protector
c) SuperSecret
68
Reverse Engineering
UNIT 3 REVERSE ENGINEERING
Structure
3.0 Introduction
3.1 Objectives
3.2 What is Reverse Engineering?
3.2.1 Software Reverse Engineering
3.2.2 Hardware Reverse Engineering
3.3 Need of Reverse Engineering
3.4 Stages Involved in the Reverse Engineering Process
3.5 Disassembly or Decompilation
3.6 Cracking Software Protection
3.7 Tools
3.7.1 Resource Hacker
3.7.2 HEX Workshop
3.7.3 IDA Pro
3.7.4 PE Explorer
3.7.5 Boomerang (Machine Decompiler)
3.7.6 REC Decompiler
3.7.7 Andromeda Decompiler
3.7.8 Remotesoft .Net Explorer
3.7.9 Spices .Net Decompiler
3.8 . Let Us Sum Up
3.9 Check Your Progress: The Key
3.0 INTRODUCTION
Reverse engineering is the general process of analyzing a technology specifically
to ascertain, how it was designed or how it operates. This kind of inquiry engages
individuals in a constructive learning process about the operation of systems and
products. Reverse engineering as a method, is not confined to any particular purpose,
However it is often an important part of the scientific method lind technological
development. The process of taking something apart and revealing the way in
which it works is often an effective way to learn how to build a technology or
make improvements to it. In this unit, you'll establish a thorough knowledge about
the various aspects of reverse engineering and how is it useful in the today E-
World.
In this Unit we'll understand the key elements that comprise a successful reverse
engineering program and eventually apply those concepts for better productivity.
Reverse-engineering is used for many purposes: as a learning tool; as a way to
make new, compatible products that are cheaper than what's currently on the market;
for making software interoperate more effectively or to bridge data between different
operating systems or databases; and to uncover the undocumented features of
commercial products. 69
I
Information Gathering
3.1 OBJECTIVES
After going through this Unit, you should be able to:
• What is a Disassembler?;
• Make hands on various tools which are very important in reverse Engineering.
There are two types of Reverse Engineering, which are mentioned as below:
•
•
Hardware Reverse Engineering.
I
all but some very obscure theoretical points) to what the computer reads. Indeed, Reverse Engineering
reverse engineering is essentially debugging in advance of having a bug to debug.
The process is implemented in few of the scenarios like;
• To fix a bug (co~ect an error in the program when the source code is not
available),
Any researcher who is doing reverse engineering on software may use several
tools to disassemble a program which are mentioned as below;
• Disassembler. This is another important tool which helps to reads the binary
code and then displays each executable instruction in text form. A disassembler
cannot tell the difference between an executable instruction and the data used
by the program so a debugger is used, which allows the disassembler to avoid
disassembling the data portions of a program. These tools might be used by a
cracker to modify. code and gain entry to a computer system or cause other
harm.
This is not as easy as one might think. First, the program embodied by the firmware
is simply a collection of binary digits (1 's and O's). In order to decipher this machine
specific program code it ~ecessary not only to convert the binary data into a
readable form, but, te("assigh meaning to the data. Thus, reverse engineering of
71
I
Information Gathering microcontroller software or firmware requires program disassembly via a
disassembler or decompiler.
Any researcher who is doing reverse engineering on hardware may use several
tools to disassemble a product which are mentioned as below;
There are various important factors which influence the Reverse Engineering which
are mentioned as below:
• Digital update! correction: To update the digital version (e.g. 3D/CAD model)
of an object to match an "as-built" condition.
• Learning: learn from others' mistakes. Do not make the same mistakes that
others have already made and subsequently corrected.
L
Information Gathering • Determining whether an application contains any undocumented functionality.
'c ~, e,
......................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
, .
In the first stage, the process, sometimes called "pre-screening," Reverse Engineers
determine the candidate product for their project. Potential candidates for such a
project include singular items, parts, components, units, subassemblies, some of
which may contain many smaller parts sold as a single entity. The second stage,
disassembly or decompilation of the original product, is the most time-consuming
aspect of the project. In this stage, Reverse Engineers attempt to construct a
characterization of the system 'by accumulating all of the technical data and
instructions of how the product works. In the third stage of Reverse Engineering,
Reverse Engineers try to verify that the data generated by disassembly or
decompilation is an accurate reconstruction of the original system. Engineers verify
the accuracy and validity Of their designs by testing the system, creating prototypes,
and experimenting with the results.
The final stage. of the Reverse Engineering process is the introduction of a new
product into the marketplace. These new products are often innovations of the
original product with competitive designs, features, or capabilities. These products
may also be adaptations of the original product for use with other integrated systems,
such as different platforms of computer operating systems. Often different groups
of engineers perform each step separately, using only documents to exchange the
information learned at each step. This is to prevent duplication of the original
technology, which may violate copyright. By contrast, Reverse Engineering creates
a different implementation with the same functionality.
75
Information Gathering Source Code and Object Code
_.
Source code is the category of computer language instructions that is most frequently
written and read by software programmers. A computer cannot generally run a
- program in source code form though. The source code is translated, with the use
of an assembler or compiler, into a language form that contains instructions to the
computer known as object code.
Object code consists of numeric codes specifying each of the computer instructions
that must be executed, as well as the locations in memory of the data on which the
instructions are to operate. While source code and object code are commonly
referred to as different classes of computer language, these terms actually describe
the series of transformations a program goes through when being converted from
a higher level language more easily comprehensible to humans to the lower level
language of computer operations.
b) Compare your answer with the one given at the end of the Unit.
Which stage is the most time-consuming aspect of the project in the reverse
engineering? Explain .
......................................................................................................................................
Another method is the use of special software such as CloneCD to scan for the
use of a commercial copy protection application. After discovering the software
used to protect the application, another tool may be used to remove the copy
protection from the software on the CD or DVD. This may enable another program
such as Alcohol 120%, CloneDVD, Game Jackal, or Daemon Tools to copy the
protected software to a user's hard disk. Popular commercial copy protection
applications which may be scanned for include SafeDisc and StarForce.
b) Compare your answer with the one given at the end of this Unit.
................................................... ~ .
..................................... .....................................•...........................................................
,
....................................................................................................................................
.
....................................................................................................................................
3.7 TOOLS
3.7.1 Resource Hacker
Resource Hacker is a utility to view, modify, add, rename and delete resources in
Windows executable and resource files. Furthermore, Resource Hacker also includes
an integrated resource compiler and decompiler. Here are some key features of
"Resource Hacker":
• It helps to view resources in Win32 executable files (* .exe, *.dll, *.cpl, *.ocx)
and in Win32 resource files (*.res) in both their compiled and decompiled
formats.
• Resources can also be replaced with resources from a *.res file as long as the
replacement resource is of the same type and has the same name.
• Delete resources. Most compilers add resources into applications which are
never used by the application. Removing these unused resources can reduce
an application's size.
• 32bit Resource Files (* .res) can now also be viewed and edited.
• Added support for the following Dialog extended style flags:
WS_EX_LAYERED,WS_EX_NOINHERITLAYOUT,WS_EX_LAYOUTRTL
and WS_EX_NOACTIVATE.
• All resource language ids (except those for cursors and icons) can now be
easily changed.
• Bug Fix:
LBS_NOINTEGRALHEIGHT and LBS_MULTICOLUMN listbox style flags
in dialogs previously could not be combined.
78
Reverse Engineering
Fig. 1
Key Features:
Rich Feature Set
Highly Customizable User Interface
Data Interpretation and Parsing
Integrated Binary Comparison
~N'-~
• 't'il Lt - h •.• ', >0 ,
!'lain pr ac near
p= dlJord ~lr (
"' , - _SrnRTIJPIHFOIl Vir
"hll
Php, '-".(1
f'e;p, .1
.b~
so,,", tAir rune
GHcD.tnanalin.R
ebx. eilx
esp. 11' 11 1 ,
eax. l.bp. t 1nl J
ea. ; lpStartuplnto
::J
n
~"tn.rtuplAtOA
esp , \:'ll ,
.b ••• bx
short 1." ltll3FF8
HL'!
" short loc ~9SFA1
Fig. 2
3.7.4 PE Explorer
PE Explorer is the most feature-packed program for inspecting the inner workings
of your own software, and more importantly, third party Windows applications
and libraries for which you do not have source code. PE Explorer lets you open,
view and edit a variety of different 32-bit Windows executable file types (also
called PE files) ranging from the common, such as EXE, DLL and ActiveX Controls,
to the less familiar types, such as SCR (Screensavers), CPL (Control Panel Applets),
SYS, MS STYLES , BPL, DPL and more (including executable files that run on
MS Windows Mobile platform).
PE Explorer gives you the power to look inside these PE binary files, perform
static analysis, reveal a lot of information about the function of the executable,
and collect as much information about the executable file as possible, without
executing it. PE Explorer leaves you with only minimal work to do in order to get
an analysis of a piece of software. Once you have selected the file you wish to
examine, PE Explorer will analyze the file and display a summary of the PE header
information, and all of the resources contained in the PE file. From here, the tool
80 allows you to explore the specific elements within an executable file.
Besides being an effective Resource Editor, PE Explorer also provides several Reverse Engineering
tools that elevate it to Power Coder status: an API Function Syntax Lookup,
Dependency Scanner, Section Editor, UPX Unpacker, and a powerful yet easy-to-
use Disassembler. With PE Explorer you can view and inspect unknown binaries,
examine and edit the properties of EXE and DLL files, and correct and repair the
internal structures of any PE (portable executable) files with the click of a button.
PE Explorer is intended to be used in various scenarios such as software
development, Forensics practice, Reverse Engineering extensive binary security
analysis and binary auditing processes.
• Track down what a program accesses and which DLLs are called
• Understand the way a program works, behaves, and interacts with others
• Verify the publisher and the integrity of the signed executable files
• Say good bye to digging through bloated help files just to hash out an API
reference
• UPX Unpacker.
• UPack Unpacker.
• NSPack Unpacker.
PE Header Viewer
PE Explorer makes it easy to analyze PE file structure, correct errors, fix
compilation bugs, repair damaged resources or modify the internal arrangements
of PE files. With PE Explorer file headers, data directories, section headers and
export tables are ready and waiting for your command. Use it for serious
development projects, for restoring lost information, for keeping damaged files
intact, to reverse engineer projects with missing source code, or to view the imports/
exports of the standard DLL's. 81
Information Gathering Viewers
• Headers Info Viewer displays the EXE header information contained in the
PE file header.
• Dependency Scanner traces the dependency chain for the program's libraries.
Ctrl+N
82 Fig. 5
The Dependency Scanner tool allows you to recursively scan all modules linked Reverse Engineering
to by a particular PE file. Use the Dependency Scanner to make it crystal clear
which libraries an application depends on, so you know exactly which files you
need to package into your application's installation program. Or which files to
copy when moving a 3'd party application from one computer to another.
Dependency Scanner also detects delay-load dependencies.
Editors
• Application Manifest Wizard. for adding the manifest resource into existing
applications and marking applications with a requested execution level to tell
Vista to run the applications elevated.
• Characteristics Editor 'to 'view or set flag bits in the. PE file header
Characteristics field.
• Section Editor to change all the fields in the section header, or repair and
restore the damaged section headers settings.
• Time Date Stamp Adjuster to modify all the timestamps in the PE file header
to one uniform value.
MUI
Language
Type
LANG ENGLISH US
Vista Icon Entry' 256.256
1
Bitffiap Raw Size 59908 bytes
ICOn~hlijl '-----
L:Jl
bJ2
W3
t£j4
bJ5
I£JB
id?
~il
Fig. 6
PE Explorer offers one of the most convenient and easy-to-use resource editors
available for Windows. Visual editing features let you quickly browse and modify
executable file resources from within the file. Dialog boxes, menus, string tables,
icons, bitmaps, manifests and more are right at your fingertips.
83
Information Gathering Disassembler
• It Supports the Intel 80x86, Pentium family, and other compatible processors.
• IT has X86 instruction sets and extensions (MMX, SSE, SSE2 and SSE3),
AMD K6-2 3D-Now! extensions.
• It provides easy browsing using Found Data panes, search options and address/
. offset jumps history.
• It pulls ASCII text strings and VCL Objects out the data portion of the file.
• It saves and loads the disassembly listing and all the changes made to continue
on later.
". +.
Fig. 7
I
won't recreate the original source file; probably nothing like it. It does not matter Reverse Engineering
if the executable file has symbols or not, or was compiled from any particular
language.
The intent is to create a re-targetable decompiler (i.e. one that can decompile
different types of machine code files with modest effort, e.g. X86-windows, spare-
solaris, etc). It was also intended to be highly modular, so that different parts of
the decompiler can be replaced with yxperimental modules. It was intended to
eventually become interactive, because some things (not just variable names and
comments, though these are obviously very important) require expert intervention.
Whether the interactivity belongs in the decompiler or in a separate tool remains
unclear.
i~t .L-~J i-i 'j~ .I.,. I. _='. fit 1 j I!i go~ I!IU~<'b( :LOC').:Jta O1~.,~-COt OJ(){I1;,Hio.) ir..t .1.111'1. {l~ 1•. i, ::1 :., s, 1, 1I~ 9.,
- Q}; 04t>3(1C()(1 ·c );
8G';9 •• 70 '~O{H)\l(.l!J OEiCOOO!)t 07tJOOJCi)
1)\j(I)(JoM
8t4837c; leave
804B37d; rei
/. aOdteSS: C:-:e8-LS37f
int ma I~nt argc. char ~5fQ";' char -err<lp) ~
t localS; . If f2~
.: addi'css: ::<e~-83S~
int test~)nt param1, in! param2. inl parorn3;:
In! locell: /i m[r18· e:
Irrt local:: t.' r28
Fig.8 85
r Information Gathering What Boomerang can do?
An attempt has been made to line up equivalent original source, binary, and
decompiled source code lines; this is not always possible. Comments in red ~e
not generated by the decompiler; those in black are.
86
I
Reverse Engineering
printf("Sum is 8048364: sub printf("Sum is
%d\n", sum); $Ox8,%esp %d\n ", locall);
8048367: pushl
Oxfffffffc( %ebp)
804836a: push
$Ox804842c
804836f: call
8048268 <printf@plt>
8048374: add
$OxlO,%esp
return 0; 8048377: mov return 0;
$OxO,%eax
} 804837c: leave }
804837d: ret
804842c 53756d20
69732025 Sum is %
8048434
640aOO d..
• Source that is fairly readable, compiles with no warnings and runs correctly.
• Conversion of stack locations to local variables
• Detection, declaration, use, and initialisation of an array
• Correct handling of a C string through the use of the string as a parameter to
a library function
• .The output from sumarray-04 (same program compiled with -04 optimisation)
looks much the same (as of September 2004), except that the pretested while
loop is replaced by a posttested do while loop.
• Untangles the "delay slot" instructions (after every call and branch instruction)
To activate an option, precede its name with a + (plus) sign. To disable an option,
precede it with a - (minus) sign. To get the list of all the options and their current
value, type:
rec +help
The minimum input to REC is the binary executable file. For example:
rec file.exe
If file.exe is in one of the recognized formats, it will be read, and a file.rec will be
produced using the default options, without further intervention from the user.
• Full screen interactive mode: In this mode, the user can interactively analyze
88 the input file by disassembling or decompiling individual procedures. The
I
user has also access to a hexadecimal viewer, and he or she can view some of Reverse Engineering
the data that REC uses internally, such as the list of strings, labels, procedures
etc. REC enters interactive mode when invoked from the command line with
the +interactive option.
• HTML generation mode: In this mode REC reads the standard input for
commands, and generates an HTML page as the result of each command typed.
This mode is used on UNIX to allow a web browser like Netscape to act as
the user interface of the decompiler.
The other options are used to debug the program, or to tune its output. A complete
list of the options requires an understanding of the algorithms and phases that
REC performs to transform an executable file in a source file. If you don't know
the meaning of one option, you can experiment by enabling it and check if the
output is clearer. Note that some option is only valid if another option is enabled.
Interactive mode
Interactive mode is used to analyze the program being decompiled. This mode is
useful to access the hexadecimal viewer, and to inspect many of the internal lists
maintained by REC, such as the strings list, the labels list, etc.
To use REC in interactive mode, the user must invoke it with the following
command line:
REC will start analyzing file.exe to find which area contains strings, code and
data. It will also build the list of labels and branches, and then will try to build a
list of the procedures contained in the program.
r : show regions
d : dump regions
I : show labels
b : show branches
s : show strings
y : show symbols
p : show procedures
o : show options
Q : quit program
89
I
Information Gathering REC's user interface is based on a simple list browser. The user can type the
following keys while in the list browser:
Down arrow or Enter key : moves the cursor one line down
Right arrow when cursor is on a highlighted word: executes the command associated
with the word. If there is a menu, typing any highlighted letter from the menu
executes the command associated with the letter. Left arrow or 'Q' or ESC key
exits the current screen and returns to the previous screen. The exclamation mark
'!' is used to request the evaluation of numeric expressions.
The forward slash 'I' character is used to search a string in the current list. The
question mark '?' character searches a string backwards, The on' character repeats
the last search in the same direction. The 'N' character repeats the last search in
the opposite direction.
Region List
The region list shows how the input file is organized. Structured files formats, like
COFF and ELF have separate areas for code, data and auxiliary information. The
region list shows which area REC will consider for decompilation (marked with
the text type), and which areas will be searched for ASCII strings (marked with
the data type).
The user can force REC to consider a file region to be text or data via the command
file region: command.
Labels List
The labels list shows all the addresses that are the destination of a branch or call
instruction. This list is used when building the procedure list. If REC incorrectly
treats a data area as a text area, it can create labels that are not part of any text
region. This usually causes an incorrect procedure list. The user can then change
the region list until all incorrect labels are eliminated.
Branch List
The branch list shows all the addresses that have a branch, call or return instruction.
This list is used when building the procedure list. If REC incorrectly treats a data
area as a text area, it can create branches whose destination is not part of any text
region. This usually causes an incorrect procedure list. The user can then change
the region list until all incorrect branches are eliminated.
The jump table list shows all those areas that may contain a table of addresses
inside a text region. These are usually generated when compiling switchr)
statements. It is important that REC recognizes these tables because the control
flow analyzer depends on this data to identify all the instructions of a procedure,
and also to avoid treating data bytes as instructions.
Strings List
The string list shows those portions of data regions that may have ASCII strings.
These strings will then be used as parameter to functions like printf() and strcpyt),
90 among the others.
Symbols List Reverse Engineering
This list shows every symbolic name associated with addresses. These are usually
names of procedures (belonging to a text region) or names of global variables
(belonging to a data region). The symbol names and addresses are taken from the
file's symbol table, if available. The symbol list also shows the list of imported
symbols (from a types: or prototype file), and the list of user specified symbols
(entered via the symbol: command in a .cmd file).
Procedure List
The procedure list shows all the addresses where REC has identified a user
procedure. Some of these addresses may come from the Symbols List, in which
case the name of the procedure is also shown. For static 'functions and for files
without a symbol table, the entry point of the procedure is used as its name,
Options List
The option list allows the user to enable or disable each option. Some options are
used to produce a better output, some to enable alternative' analysis algorithms,
and some enable internal debugging features.
Hexdump .Viewer
The hexdump viewer shows the content of the input file in hexadecimal, one page
at a time. The usual cursor movement characters can be used to navigate through
the dump. This mode is very useful to look at areas that REC has not recognized
as code or data.
,,-,.. .,
.•......,..
z:
-, <0-
-..-- L 1'1
LiIJ
L JU~~~-.oP:i....l."'f(~E", ,"'-"P'tl[~> 1J."-bIO..¥jJ, n~, ,.[~ ..wmi~ •.• XI, OX-I,
.-
.- •• lJUlt•.•.4d.l..~t.pJ>-~j.!(~.tr, f.lIM1ptJ'->:U41J,1P"d), .r,Pt, U"t.Y.9lt~, 0, 9¥1'$:
• ao.uoo. o. lWt .J,..d4.l1,lU)Jlul-5 (Jr4pt~. ~~tr->_
~ "J5OCC9'
.-
21 •• lub ((UIIlUZj (UIRtn) It (UJp,tl' •
{
.,..•..
oe-
7332 ~ 1Jl.Is,t~"'''d&utoDiU2(~t~,
LO)l:116~ &44.Ptr- ~~b;-===~~::J~~J!l
¥to\llrU'\lWt$ 0..
-1 --~"""'#!I ,f
e••.•• O)l:lO_51~~"l.t~
c -ee O)J:.l0 ..•.~
Il:lJIt•.add&utoDiU2~-.d.ptC. '~tr~
~~:8
?3Z~.C
..
I/If~ ~~
t..QCM,.
t ,
.:11 Iut.& ••••.•t •• iu2~.op.tc.
lAOt••.•••• t •• ial2(~tc.
U!dptr-
'~tr-
'''''''~-2L-==~
~
I.•. ~.AddJ.~toDl...l5(~r. '-~tt"- I
O:JI08:
OXUt:
IQllt.••.••• t. •• :iU2C~U:. '~t.r-
"",,_.-;0-
lo:It..a.aa.t.•••.
:i~(~tr .• ~pt.r- ""_0
IUt.~.t..,iU2:(e4,Pt-r. (~ptr-
....,.
.._r
Iu.t..~ •• i&l2(.a,pt.r,
lO:It.AlllllAutd:i&l2(.m>t.r.
f$c4ptr-
,.opt.r- fl'U",,_r
••••••
1\_ ••
Fig. 9 91
Information Gathering At present the project is in stages of development and its application is limited to
the purposes of demonstration and estimation. Universality of the AD means; its
ability to perceive input files from various target platforms and to give out a source
code in desirable language of a high level. Though at present the program is intended
only for 32-bit Intel x86-compatible frontend and C/C++ backend, its kernel is
developed with this opportunity in mind. AD is an interactive decompiler. It means
that the user takes active participation in the decompilation process. AD is not an
automatic analyzer of programs. AD will hint you of suspicious situations, unsolved
problems etc. It is your job to inform AD how to proceed. All the changes made
by you are saved to disk. When you start AD again all the information about the
file being decompiled is read from disk and you can continue your work.
New features:
• Visual Studio .NET Addin - launch from Tools> Remotesoft .NET Explorer
Upcoming features:
• Easier navigation.
1) Disassembler
92
Reverse Engineering
•
.testtm IL_OOOO ldarg.O
Ldorg.l
• testV.tl IL_OOOI
• testVirtl IL_OOOZ: call instance void Test.. SiJlpleTes
a
--=---.._
+ Simple€xC"l' Qbfuscate F7 It_0007: <et
+
•
a MyAttribute
E ~
I,
- •••••.
_'""'- __ 1-
+ ,ByteEnun C. DecOf11Rie F6 ·-.et.hod 85se.hly hidebysi.g spect.e.tneae ct.spect.e.tnea
+ (J 5impIelnterf
+ a[Externald •••
a
.aaaaA
<Private!mplem
D:\Remotesdt\obf
!:;ustomize... IL_OOOO: ldorg.O
IL_OOOL
IL_0002:
IL_0007.:
ldarg.l
call
ldstr
instance void Test. SiapleTes
"tb.:is.w!Ucb = (O)"
IL_OOOc: ldarg.O
~-----
+ .6
.A Test
CIossView"Met.o.i. PEFormot
<
IL_OOOd: ldfld
IL_00l2:
IL_0017'
box
call
int32 Test. ChildClass
.ascox:lih _SysteJt. Int32
which
Fig. 10
2) Decompiler
Remotesoft .NET Explorer can be integrated with our decompiler for easy access
to any methods of any assemblies. The following is a screen shot with the
decompiler enabled. The left panel is the ILDASM-like class tree of an assembly,
while the right panel shows the C# code of the selected class.
D 5 r.I I l'';
~esoft\5inpleTest.exe
a <Mo<i.je>
Test
+ a
ChangedEventHandler
us'i...ng System.·
+ aSimpleTest
- • ChildClass
naaespace Test
name: string
{
which: int
class ChildCl"". SiJapleT es t
.etor : void(int,int)
•. ctor: void(int) private into which
.1
testilla public st:nng naae
testl/irt
testVirt
+ a SlmpieExce
Qbfuseate F7
inte.r:nal ChildClas$ l.n.c i
+ • MyAttributo I[ !lis~ssemble F5
+ E SimpleEnun" Console.lJr1teLine,"t:.b..:1s.lJlll.ch -= {Ol" which
6yteEnum ' Console VtiteLine ffba::se.wbich. ". {O}" which
Simplelntet
+ • ExternaiCl<
a <PrivatelmPer !:;ustomize...
int.emal ChildClas.s int i i.n~ j ba.a.e i
D:\Remotesoft\obfU>l..ot.cu\"""ItJIC=,~.c: .•ce
a
aa in~eIll8.1 Qve:n:id.e vc'i d te~tLodr.
A
Test "CluldCl""". tIOstLockO caUed"
+ "A B
Console.lIrueLllle
b e. tesclock . •
Fig. 11
3) Metadata Viewer
Remotesoft .NET Explorer has built-in support for viewing low level .NET
metadata. The following is a screen shot that shows the string heap of the selected
assembly. A hex dump of the file is display in the lower right pane. 93
Information Gathering
.:::Jrabies ! 22 System
I 29 !o\I;icastOeleQate
li!li!IBII I 313 Change<£ventHandler
Ii!l Userstmgs I iF Test
Ii!I GlJIDs 54 Object
li!llllcbs
- ..., D:~Romotesofticibfuscoted\SimpleTest.exe I se
66
SinpIeTest
myMethodDelegate
Ii!I ClR tieader
Il!l Met_.Root I 77
82
NestedType
ChidClass
• 2J ·5treomlieader.
• rabies
I 110
97
A7
Exception
SinpleException
AttriW:e
Il!lstmgHeap
Ii!IUserSl:ri:lgs
I 81
, 110
MyAttribute
Erun
Ii!I GI.JIOs ,Cl SinpIeEnum
6 !!Idbs , (!o ByteEnum
1)6 5irqjiIeIrterface
E6 £xtemaICIass
.~~
, R
lOB
~
,dtor
IAsvncResUt v
0001BCO 5B 00 00 00 01 00 00 00 !:4 DC 00 00 00 00 00 00 [A
0001800 01 00 19 00 00 00 00 00 04 00 03 00 05 00 03 00 •
~OOOlBEO DE 00 DD 00 00 00 00 00 00 3C 4D 6F 64 75 6C 65 .
~OOOlBro 3E 00 53 69 60 70 6C 65 54 65 73 74 2!: 65 78 65 >
I ~OOOlCOO 00 6D 73 63 6F 72 6C 69 62 00 53 79 73 74 65 6D •
r-zrz-r-rr-r-' ~OOOlCIO 00 4D 75 6C 74 69 63 61 73 74 44 65 6C 65 67 61 •
~. Qou'l/low,,_!~ v
foH,*,,_R Ln1.CdO DOS 08.07. 20:26:47
Fig. 12
4) PE Format Explorer
Remotesoft .NET Explorer has built-in support for viewing low level PE (Portable
Executable) format. It recognizes both .NET images and native images that are
compiling from C/C++. The following is a screen shot shows the CLl header of
the selected assembly. A hex dump of the file is displayed in the lower right pane.
[Q Ild.inethodpriyotehid :3 2' •
o,~Id._
rm fill!HMdet .. Header Size 'IS Sizecl the header ~
rm~HMdet 2 Mojar
_11.Rlrtlne_
__ 2 The nriIun venior
-:...._~r .••• 2 o The ninor portion cl
~T_
im~r •••• 8 Motedol:a 1lWett<lfy 2D3C(ICCC] RVAcl the physical
6_T .•••• .. fIaos 1 Flags deoiJi'og this ,
.. ~T"'" 6OOOIXJ' r-'furtheMetk
"W_IR~T"" 8 ResooKeS 1lWett<lfy 0(0] L.cnIion (RVA)cl Q
JAT 8 :StrmiI •••••• Sl!J>Ohn: 0(0] RVAcl the hash dat
fi 8 0(0] RVAcl the Code Ma
- CJ iIIp3I!:- 8 VToIIIeFil<ups 1lWett<lfy 0(0] RVAcl ••••••.ay cl.
~~ 8 Elqlart Mhss r•••• 0(0] RVArlan_ayclF
~header
"'-l_T6
-",~r _ 8
"""""""- 0[0]
mlifileHeader .
fi ~"Header .
_~T~
••••'u••••
6_1.,.
•. £..js..,;,M.<:_r..".
61\\1
Imm~
•.W~-
-::.:JJ_1••••
D..a- lED00 OIl00 OIlOIlOIl00 00 00 00 00 00 4D 00 00 42 • A
0.-< ~ooooooooooooooooOOooooOllOllOlloooo.
IIm..." ~~OOooOOooOllOO.ooOlloo~ooooOll@
~X~OIl00ttKooooMooOlloo~~ooM<
~ooooooooooooOOooOOooooOlloooooooo.
~ooooooooOOooOOooOOOlloooooooooooo •..,
Fig. 13
5) Resource viewer
Remotesoft .NET Explorer has built-in s~I?port for viewing managed resources
When a managed resource is double clicked, an external viewer will be launched.
A managed resource can also be saved into a file. Shown below is a screen shot
that illustrate the features. Support for unmanaged resources will be gradually
94 added into the product.
Reverse Engineering
DePiil Q6!
C:" S<'iJble'l:i1\<>.erE.", sett:;; ""
• H!l.!!rcs:
+ ~ t:'Jq...--ender.cES
~~;::ur:::es
-.S~.410Ju>;>
"' yJtbii?: Scrt:CeV"E .•
.'·llilWOd::,-,
.Scrt±;e"):x
• SGt:!:.eV;e,',
rEK:1Jr::'e£
• S:rckf
Fig. 14
6) Dependency Walker
Remotesoft .NET Explorer has built-in support for viewing all dependencies of an
assembly, including managed assembly/module references, unmanaged DLLs and
mise file references. Shown below are two screen shots that illustrate the features.
• Dependencies can be viewed in a controlled manner: you can show only the
managed references, or all dependencies recursively,
• A reference, such as unmanaged DLL, can e. -.;il.' be loaded into the .NET
Explorer for browsing and exploring.
C:\prc'!:e<:C'8r ::e5.-:\SO'-1pie"Te:::::.exe
H"-'JIF:"S-
- .!.=!l
'-' He,cCS.d
.•-.J '-'15::..:::;--tJ:::
. UnrH'ln::tged "'1~dulE:5
--.J ;L."'·:J' •..•(~.=:32.dft
-.J Fus':::.n d
--.J kernet32..dl
--.J '-'ls.r:8 .....
ee et
----.J cle32 Of
--.J CL=.A.U-32 dll
--.J st;fc: der d
--.J US:: =<'32 d
~ r~l;~< Frc~
..=l t..::::g5I-,i~
-"'l t::c~cl-'c:fc: r,,~
.=i:lCharlnf~ n,::
..n1 l,-=':lr::evn~
Zl ,:uJ::un= .n1s:::
::!l ksc r;1~
.=:l f~exl:e~,: n!~
.:!.J I_!n-:,.n.~
.:r£l pr:: n p
.:::l t::n:~ niJ:: /
.::::I reQicn.nlr:;:
..:G 5cf""::ke":.>.n1J::.
.:r..::l s:cr-::::t:: s n';::=:
..:nl XJi5 nl~
< (-'l::::Liule :.
• -c :::;;f"i"4·'a-:e:l-l~ierlEI-,:~:::t:;n·:')e::a;js;::.
Te-s:.
/
/o
Cf e e Vf e- ••.•.1 klet<?lDats PE F'o rrri e t
Fig. 15 95
Information Gathering fie fdlt ~ ActIOns 100ts Jjelp
Cl roj IiiI I:. CII VB r-.;:: G® t [Q Igd~s
~~.le!.£.~r\test~~Test.e.!.
• t-lANIFEST
~ ~ Dependencies
Q HeIoCS.dl
.,.;;j mscorlb
- ~ Un managed Modules
ADVAP132.dl
FUsbn.dl
..J kernel32.dl
Fig. 16
Spices.Net next generation set of tools that helps .NET developers increase .NET
?ode security, safety and productivity, quality and efficiency of .NET software,
that continues to offer wide range of features for developers and many more new
possibilities.
I
r Spices.Net Obfuscator Reverse Engineering
Provides solutions to increase .NET code security and protect your .NET code and
make it tamper resistant, localization, analysis and software lifecyc1e management
tools and services. Make sure to keep your intellectual properties secure! Using
the Spices.Net Obfuscator, you can put your code within a concentrically protective
belt of security. Misinformation, blind alleys that lead to dead ends, and obtuse
gibberish will greet the hacker, and send them packing for greener pastures.
_~ 9Rays Spices et
, B ·0 n.QM)Test
y
sk n.OM>T•• t••••
'" () n.OM>Tost N•••• p.(le.~ 3 1 33. 3~ ,
Ii~ A881g'lrl'IInta TYP··I ?5 17 22.67 I
8~ Calls
u ridden 50 17 34 .00 •
ethod~: 320 61 19.06 •
•• ,ctorO: ,oid
Properties: 1? o 0.00 ,
.+ aoo_C.ll(booB. booB) : boot Events: o o 0.00 lA
.,·ii~.ilEIll.~
". GetBytesO : \l\S1gned "ta[J
Mane.gedResource:
ssem.b.lyRefs:
o
4
o
o
0.00
0.00
,
,
". ().jtBytaArrayCal1(u'ls1!;roOd "tB[j9.j 'lypeRefs: n o 0.00 ,
j. Tes lCal~O : void em.berRefs: 103 o 0.00 ,
ijj 4:t Comlntef'q:l
o
•• '*$ ForwardorsUsage 66
ti 4'-.$ I-tlklerClass 68
6J "'$ lhherltante
iTask List
" Document
D:\Net\ILOMD\ILOM>Test\I1 "
T'"
'Sp ees ,a,Ii.osc.tor
I'ro9'eSS
lOO,.._tG'mal
PrbrIt,f
F,,_
Stall! Sta"1!!d
11:07:38 AM
FIn_
11:01:50 AM
D:\Net\ILOMO\ILOM>Test\II", Sp"""a,Ii.osc,,"" 100% _ Ncrmal Termmted I1:Q7:3O AM
Fig. 17
Spices.Net Decompiler
Provides tools to recover source code and convert binaries to C#, VB.Net, J#,
Delphi.Net and managed C++, code flow visual representation tools.
Spices. Model er
EExpIorer
{3 ...) 1LQM)Test
9 ~ IlCM)Testexe
S () 'n.OMlTest DateTime Now IDateTime.Now
11iI"~ Assignments if B001BOO1-""'''-'-~'''-''~''''''-~'~-I' e Now
SI"';!. calls Seve~
",ClDrO: void Debug. W SeleC1~1
". __ K:all(booB.booa) : bool '
Outlining
." aoo_K:all(bool, bcof : boot if Boo1800
," GetBy1»sO : cnslgned .,ta[] '" I!1form:BooIBooICell(bool. booQ: boof
•• OU1IlyIl!AtrayC.ll(cnslgned nta[]a) follow BooIBooIC51I(bool •.booll.: bool
:.:'~TestCallsO : void
lii :J',t Comlnterop
p.cLveee bool Boo1BoolCal1 bcoj, one bool two
ftl.vt ForwardersUsage
fil Jlt HoIderCIass
lil ~t Irtlerttance I return one two
1Task tist
o Document Task Pr"'TO$S PrbrIty sta"1!!d 'FnlShed
n.OMlTest,cal. Decoll'!llie \Il CSharp 100% ~ Normal 11:15:49 AM 11:15:50 AM
D:\Not\ILOMD\ILOMlTest\Il., Splcos,a,f\Jsl:."" 100% _ Normal 11:07:38 AM 11,01:50 AM
Fig. 18
97
Information Gathering Spices.Investigator
Provides .NET metadata and assembly structure browsing tools to get detailed
information about any item at low level.
Spices. Informer
Special module that deeply integrates Spices. Net tools with Microsoft's Visual
Studio IDE, MSBuild and NAnt build environments.
This package delivers full set of Spices. Net features intp Microsoft Visual Studio
~nd expand Visual Studio development environment functionality.
Spices. VSIP offers integration with Microsoft Visual Studio 200312005/2008 and
2010 and MSBuild build environments.
< • x
"'os
~ IlQM)Test
IlOlY'ClTestexe
(} IlQM)Test
Assig"lments
.--.:t. .._.._
cal~ <ore•.••.........
"""'tiT9",>--
~. .. True
.cuo: vokj False
Boo&oICaIl(booS,
Boo&oICaIl(booI,
booS) , boot
booj) , boo!
•
~ GeIBytesO : LIlSk}1ed ntB[]
""'-ere
• ou,"y, •• rrayCall(unsig1ed ""'[]a)
TostCallsO ' ",d
+' ComlntErq)
ForwardersUs.age
" HoIderCIass
t liilerit;rce
" IhherltanceJmplelTlentatlOn
+ "' IteratIOns
+ Stdr"id.:M"d
to., Statk:ClassUsage
U'lmanaged
Fig. 19
Spices.Decompiler features the unique functionality that lets you easily see how
your code is working.
Code Flow diagrams give you the complete picture of how this or that method is
called or used.
b) Compare your answer with the one given at the end of this Unit.
List 5 tools used for reverse engineering? Which tool is the most feature-packed
program for inspecting the inner 'workings of your software? Explain the workirig
of that tool.
98
Reverse Engineering
3.8 LET US SUM UP
This unit deals with the concept of "Reverse Engineering" which is the general
process of analyzing a technology specifically to ascertain how it was designed or
how it operate~. This kind of inquiry engages individuals in a constructive learning
process about the operation of systems and products. Reverse engineering as a
method is not confined to any particular purpose, but is often an important part of
the scientific method and technological development. The process of taking
something apart and revealing the way in which it works is often an effective way
to learn how to build a technology or make improvements to it.
There are two types of reverse engineering i.e. Software Reverse Engineering and
Hardware Reverse Engineering. Software reverse engineering is done to retrieve
the source code of a program because the source code was lost, to study how the
program performs certain operations, to improve the performance of a program.
Hardware reverse engineering involves taking apart a device to see how it works.
In order to Reverse Engineer, a product or component of a system, engineers and
researchers generally follow the four-stage process: l.Identifying the
product.2.0bserving or disassembling the information 3.Implementing the technical
data 4.Creating a new product.
This section deals with the disassembling. In the development of software, the
source code in which programmers originally write is translated into object (binary)
code. Another concept is software crack. It is the modification of an application's
binary to cause or prevent a specific key branch in the program's execution. This
is accomplished by reverse engineering the compiled program code using a debugger
until the software cracker reaches the subroutine that contains the primary method
of protecting the software or by disassembling an executable file.
Moreover, various tools are explained thoroughly which are used to perform the
reverse engineering.
I
Information Gathering seem to have been designed on obsolete, proprietary systems, which means
that the only way to incorporate the functionality into new technology is to
reverse-engineer the existing chip and then re-design it.
• Learning: learn from others' mistakes. Do not make the same mistakes
that others have already made and subsequently corrected.
i) IDA Pro
iv) PE Explorer
v) REC Decompiler
P:E Explorer is the most feature-packed program for inspecting the inner
workings of your own software, and more importantly, third party Windows
applications and libraries for which you do not have source code. PE Explorer
lets you open, view and edit a variety of different 32-bit Windows executable
file types (also called PE files) ranging from the common, such as EXE, DLL
and ActiveX Controls, to the less familiar types, such as SCR (Screensavers),
CPL (Control Panel Applets) , SYS, MSSTYLES, BPL, DPL and more (including
executable files that run on MS Windows Mobile platform).
PE Explorer gives you the power to look inside these PE binary files, perform
static analysis, reveal a lot of information about the function of the executable,
and collect as much information about the executable file as possible, without
executing it. PE Explorer leaves you with only minimal work to do in order to
get an analysis of a piece of software. Once you have selected the file you
wish to examine, PE Explorer will analyze the file and display a summary of
the PE header information, and all of the resources contained in the PE file.
From here, the tool allows you to explore the specific elements within an
100 executable file.
Besides being an effective Resource Editor, PE Explorer also provides several Reverse Engineering
tools that elevate it to Power Coder status: an API Function Syntax Lookup,
Dependency Scanner, Section Editor, UPX Unpacker, and a powerful yet easy-to-
use Disassembler. With PE Explorer you can view and inspect unknown binaries,
examine and edit the properties of EXE and DLL files, and correct and repair the
internal structures of any PE (portable executable) files with the click of a button.
PE Explorer is intended to be used in various scenarios such as software
development, Forensics practice, Reverse Engineering extensive binary security
analysis and binary auditing processes.
• Track down what a program accesses and which DLLs are called
• Understand the way a program works, behaves, and interacts with others
• Verify the publisher and the integrity of the signed executable files
• Say good bye to digging through bloated help files just to hash out an API
reference
101
I
Information Gathering
UNIT 4 CRACKING METHODOLOGY
Structure
4.0 Introduction
4.1 . Objectives
4.2 Password Theft
4.3 Operating System Password Recovery
4.3.1 Ophcrack
4.3.2 Lophtcrack 6
4.3.3 Password Recovery Tools
4.0 INTRODUCTION
Before testing any system, planning a basic methodology is very important. Ethical
hacking involves more than just perletrating and patching. Proven techniques can
help and guide you along the hacking highway and also ensure that you, end up at
the right destination. Planning a methodology that supports your ethical hacking
goals is what separates the professionals from the amateurs.
With all of our advances in security technology, one aspect remains constant:
passwords still play a central role in system security. The difficulty with passwords
is that, they are the easiest security mechanism to defeat. Although we can use
technology and policy to make passwords stronger, we are still fighting the weakest
point in any system i.e. the human element.
Ultimately the goal is to get users to choose better passwords. However, itis not
always clear how to achieve that goal. The problem is that as creative as humans
are, we are way too predictable. If it is asked to make a list of totally random
words, inevitably some sort of pattern, will emerge in your list automatically.
Selecting good passwords requires sound security education. System administrators
need to be educated and that education needs to be passed on to the end users as
well. This unit is meant to bring you closer to understanding passwords in Windows
operating system by addressing common password myths.
102
Cracking Methodology
4.1 OBJECTIVES
After going through this Unit, you should be able to understand:
• Man-In-The-Middle Attacks.
The problem lies with the ever -increasing abilities of computers to process larger
amounts of data in a smaller amount of time. A password is just a string of
characters, typically only keyboard characters, which a person must remember
and type into a computer terminal when required. Unfortunately, passwords that
are too complex for a person to remember easily can be discovered by a cracking
tool in a frighteningly short period of time. Dictionary attacks, brute force attacks,
and hybrid attacks are all various methods which are freequently used to guess or
crack passwords,
Password Cracking
Password cracking is a term used to describe the penetration of a network, system,
or resource with or without the use of tools to unlock a resource that has been
secured with a password. Passwords and "pass phrases" are used for everything
ranging from logging into terminals to checking email accounts, from protecting
Excel spreadsheets to securing the encryption keys for PKI-enabled enterprise
networks. The use of the passwords in the enterprise is widespread and to provide
security over and above is the biggest challenge.
Password crackers are the programs that aid in the discovery of protected passwords,
usually through some method of automated guessing. Although some applications
and poorly designed infrastructure equipment will encrypt or encode passwords,
where most of the modem day operating systems and devices create a hash of the
password instead.
Although some poor encryption mechanisms can be easily reversed, modem day
hashing methods are one-way-that is, they can not be reversed and therefore
decryption is not an option. Although the use of one-way algorithms can sound
like a rock-solid solution, it simply makes the task at hand a little more time
consuming. To circumvent the challenges created by hashing, password crackers
simply employ the same algorithm used to en crypt the original password. The
tools perform comparative analysis, and simply try to match their guesses with the
original encrypted phrase or password hash.
Many people said the only way to reset your lost windows password is just to
re-install the systems. However, this is not the better one. The best way for you is
finding a program to help you recover Windows password.
4.3.1 Opbcrack
Ophcrack is an open source program that recovers passwords in a free way which
is based on a time-memory trade-off using rainbow tables done by the inventors of
the method. Just log into a computer and download the tool from the website and
follow it's instructions to recover windows vista password.
Ophcrack will locate the users on your Windows system and begin cracking their
passwords. The process is automatic - you don't usually need to type or click
anything. When the passwords are displayed on screen, write them down.
On most computers, ophcrack can crack most passwords within a few minutes
which mean it doesn't guarantee your password can be 100% recovered. It's just
99%, anyhow, just have a try. The disadvantage of the program is that, you may
take a lot of time to download as it is very big.
Features:
• It runs on Windows, LinuxlUnix, Mac OS X, ...
• Loads hashes from encrypted SAM recovered from a Windows partition, Vista
included.
~ij' Q.e5!1.leOC1
erxy """.cn2
~ptM.w" :t:'".1p5P1~~
ew-;tr'l If]
e~ no
c'
104 Fig. 1
r
4.3.2 LophtCrack 6 Cracking Methodology
• Password Scoring
LophtCrack 6 provides a scoring metric to quickly assess password quality.
Passwords are measured against current industry best practices, and are rated
as Strong, Medium, Weak, or Fail.
• Scheduled Scans
System administrators can schedule routine audits with LophtCrack 6. Audits
can be performed daily, weekly, monthly, or just once, depending on the
organization's auditing requirements.
• Remediation
LophtCrack 6 offers remediation assistance to system administrators on how
to take action against accounts that have poor passwords. Accounts can be
disabled, or the passwords can be set to expire from within the LophtCrack 6
interface. Remediation works for Windows user accounts only.
• Updated GUI
The user interface is improved and updated. More information is available
about each user account, including password age, lock-out status, and whether
the account is disabled, expired, or never expires. Information on LophtCrack·
6's current session is provided in an "immediate window" with a reporting tab
providing up-to-the-minute status of the current auditing session.
• Improved reporting
LophtCrack 6 includes improved reporting. LophtCrack 6 now has real-time
reporting that is displayed in a separate, tabbed interface. Auditing results are
displayed based on auditing method, risk severity, and password character
sets.
~ W.1~d
CII,JtiI ~
1 C I"
., It.f)~' t
gH'Ao
1
J f~ • I4fi
z' __ "
~, . ,p ~'~."#H
j1Mo.l~""'" ! f'iphlr<Woftlt;i'>' ~. UO/.
~ w."'}~ n PIJm~I'ItI.~n;tlf1lnVt"'NM'_ o J'I'.
~ 1~,tlf'u.'1 1L.1'~
~ ij;tn4 "",~I~.
I) !"QW'P'J'M ),/,(.;"
n f)!'J"$illllJ7, (J.y ,
Fig. 2
•, LophtCrack 6 sniffs the network for password hashes that are traversing it.
LophtCrack 6 audits passwords in four methods. The more rigorous and involved
the audit, the longer the audit requires.
• The Quick Password Audit requires a few minutes to perform and tries every
106
word in a 26,000 word dictionary file included with LophtCrack 6 to find Cracking Methodology
words matching the passwords you examine.
• The Custom Audit configures your audit more precisely. For example, you
can change word files, change the hybrid mode parameters, or choose a
different character set for the brute force audit.
LophtCrack 6 displays reports on the audit discoveries. Choose the reporting style
to customize your report.
• Display how long... reports the length of time LophtCrack 6 took to find a
password.
• Display auditing method reports the method used to find each password.
• Make visible notification when auditing is done displays an alert dialog
when the audit completes, even if you're working in another application.
To import remote machines to the audit list, use the Import dialog box from the
Session menu, and click on Remote Machine. Use the Add and Browse buttons 107
Information Gathering to add the remote machines. Retrieving password files from remote machines
requires administrative access.
I lor..al m¥Jine
passwords from netwoJt"ed Windows NT {20oo/2003
madlnes or Lnx machines running ssh.
o Remote macf"ine
'IT I
19f1OJ'eCad"led Credentials
1-7'1 -I
Fig. 3
To save the audited group of remote machines, click Save As in the Import dialog
box. Click Open from within the Import dialog box to retrieve a stored group ..
LophtCrack 6 audits Unix password files from within the same interface. You are
required to have.an account on the remote Unix machine with access to the shadow
file to perform this type of audit. LophtCrack recommends creating an auditing
account on the remote machine to be used only by LoophtCrack 6. The Unix
system must have the SSH (secure shell) service running for LophtCrack 6 to be
able to retrieve the password hashes.
Passwords can be obtained remotely from both Windows and Unix machines, and
contained in a single session. If they are both in a single session, auditing order is
as follows: •
• Windows Dictionary
• Unix Dictionary
• Windows Hybrid
• Unix Hybrid
• Windows Pre-computed
• Unix Pre-computed
• SAM File
On systems that do not use Active Directory, or SYSKEY, you may obtain password
hashes directly from a password database file stored on the system, the SAM file.
108
Note: This approach does not obtain password hashes from most Windows 2000 Cracking Methodology
and Windows XP systems, as Windows 2000 and XP use SYSKEY by default.
SYSKEY hashes cannot be found using a password cracker, due to the strong
encryption Windows 2000 and XP use.
Password hashes cannot be read from the file system while the operating system is
running, since the operating system holds a lock on the SAM file where the
password hashes are stored. Copy the SAM file by booting another operating system
such as DOS (running NTFSDOS), or Linux (with NTFS file system support) and
retrieving it from the target system, where it is typically stored in
C:\WinN1\system32\config.This is especially useful if you have physical access
to the machine and it has a floppy drive.
You may also retrieve a SAM from a Windows NT Emergency Repair Disk, (I,
repair directory on the system hard drive, or from a backup tape. Windows 2000
does not normally store a SAM file on the repair disks it generates.
Load the password hashes from a "SAM" or "SAM._" file into LophtCrack 6
using the Import dialog. Select to Import from file, From SAM File and specify
the filename. LophtCrack 6 will automatically expand compressed "SAM._" files
on NT.
., [nabled
!;;rack NTLM Passwords
The Dictionary Clad< _ Jar passwOfdslhat are the seme as the words hsted ,n the
wotdlile Thi.lest is very last and finds the weakest passwords
The DJdia1ary.i8nJe Hyt:nj Clack tests ler passwotds that are vanatlOf\1 cl the word' ,n
the ....cJIdlie. It Ii1ds pauwaIIlS ...rn '" .1).....99" 01·~eysf •• Ttn lest,. ~astand
hnds weak passwards
[n<Dle<J
The I'recomputed Clack _tor pa~agaoM" preeomputed hashes COfIIa,ned In
"lite Clfliles. ThislelII is vet:!' fa"t and fro. passWOlds crealed from the ..,.,..,-riharact",
set ••• the·~ed haOOes. n••",ack only _Kt .~st"""'"""",", LMp"ss.JOfd.
o...<ICIeI Set
~
Custom o...odef Setlliot each char_J
Fig. 4 109
L
Information Gathering • Import LC4 Files
LophtCrack 6 can import previously saved sessions from LC4, allowing for a
smooth upgrade to LophtCrack 6, as all of your LC4 session files can be used.
LophtCrack 6 also has improved reporting capabilities to open previously
completed sessions.
• PWDUMP3
LophtCrack 6 dumps password hashes from the SAM database (and from
Active Directory) of a system with Administrator privileges, regardless if
SYSKEY is enabled or disabled on the system.
After choosing your interface, the 5MB Packet Capture Output dialog box appears
to capture any 5MB authentication sessions that your network device can capture.
Switched network connections only allow you to see sessions originating from
your machine or connecting to your machine.
As 5MB session authentications are captured, they are displayed in the 5MB Packet
Capture Output window. The display shows:
• The challenge
The capture can be imported at any time using the Import button. You can capture
and crack other passwords at the same time; however, password hashes captured
after initiating an audit are not attempted in the running audit.
The cracking process that generates password values provides several options that
balance audit rigor against the time required to crack. Effective auditing, therefore,
requires an understanding the underlying business goals, and the security thresholds
necessary to meet them.
To con figure the cracking methods for your session, choose Session Options under
LlO the Session menu or click the Session Options button on the toolbar to open the
Auditing Options For This Session dialog box. The options for this dialog box are Cracking Methodology
detailed below.
LophtCrack 6 first checks to see if any accounts have used the username as a
password. These are weak passwords that you need to know about right away.
This crack is performed first in every audit, because it is very quick.
Dictionary Crack
The fastest method for retrieving simple passwords is a dictionary crack. LophtCrack
6 tests all the words in a dictionary or word file against the password hashes.
Once LophtCrack 6 finds a correct password, the result is displayed. The dictionary
crack tries words up to the 14 character length limit (set by Windows NT, but not
Windows 2000).
Hybrid Crack
A Hybrid Crack builds upon the dictionary method (and its results display in the
Dictionary Status area) by modifying existing dictionary words to generate
additional password attempts. Many users choose passwords such as "bogus 1!",
or "1 !bogus" in an attempt to create a memorable, yet harder to crack password,
based on dictionary words slightly modified with additional numbers and symbols .
•
Another common password substitutes numbers and symbols for letters, such as 3
for E, or $ for S. These types of passwords pass through many password filters
and policies, yet still pose organizational vulnerability because they can easily be
cracked.
The most comprehensive cracking method is the brute force method, which recovers
passwords up to 14 characters (Windows NT's password length limit).
NTLM, DES, and MD5 passwords are case-sensitive, and LophtCrack 6 tries both
upper and lower case characters.
111
Information Gathering The difference between the strengths of weak versus strong passwords demonstrates
the value of strong passwords in protecting your organization or machine. Using a
real-world password auditing tool helps discover the strength of passwords in your
organization, and gauge policy decisions such as:
4) Openwall's John the Ripper - Good boot floppy with cracking capabilities.
112
Cracking Methodology
4.4 APPLICATION PASSWORD RECOVERY
Do you wonder how vulnerable word-processing, spreadsheet, and zip files are as
users send them into the wild blue yonder? Wonder no more, Some great utilities
can show how easily Passwords could be cracked.
Cracking files
Most Password-protected files can be cracked in seconds or minutes. You can
demonstrate this security Vulnerability to users and management. Here's a real-
world scenario:
• For good measure, he uses WinZip to compress the file, and adds another
Password to make it.really secure.
• The CFO sends the spreadsheet as an e-mail attachment, assuming that it will
reach its destination securely.
• The financial advisor's network has content filtering, which monitors incoming
e-mails for keywords and file attachments. Unfortunately, the fmancial advisory
firm's network administrator is looking in the content filtering system to see
what's coming in.
• This rogue network administrator finds the e-mail with the confidential
attachment, saves the attachment, and realizes that it's Password-protected.
• Exploits all known backdoors and tricks in the Office family for instant
recovery 113
Information Gathering • Completely automatic preliminary attack may recover documents in less than
10 minutes
Selecting a file
To' select a file you want to recover the password(s) for simply press the "Open
File" button (or select the "File I Open File" menu item) and browse for the
appropriate file (or press on a small arrow at the right to load a file you have been
working with recently).
You can clear the Recent Files list selecting the "File I Clear Files History" menu
item.
~
Open e •. , MS Passport MS Outlook ',;'BABackdoor
De·.ice manager
Log ·;,indo·i.
Available hardware:
Date, Time Event ..•.•.• ~ •.• ,#."", •••.
» 18,0)3,2010 9: 52:07 AOPR 5.00 Tnel leunched ./ Intel(R) Core~n..,) 17CPU 920 G 2.67GHz
» 18,03,20109:52:07 OS ••.'ersion: ,·:indo·,.,s 7 [6. 1. 7600] InteltR) CoreCTTYI}i7 CPU 920 & 2.67GHz
» 18.08,2010 9: 52:07 CPU: 3, r j'",dia CUDA: 1. An (AL: 0 I tel(R) CoreCTT·1)i7 CPU 92G ~ 2,6iGHz
J Inte!(R) Core, ") i7 CPU 920 ~ V"iGHz
J InteltR) Core, ·1),7 CPU 920 ~ VS7GHz
Current password:
Pmgress U1dic<ltor
J Intel(R) Core, .r, 17C? 929 ~ 2,1,;7SHI
Fig. 5
Result
After the File selection, the dialog box with results will be displayed automatically,
The following situations may occur as the result of the File Processing:
All or some Passwords were recovered. The dialog box with Passwords is displayed.
Password fields may contain those auxiliary messages:
114
..'
• None - the Password is not set; Cracking Methodology
• Error - an error occurred while Password Recovery process. The error message
box is displayed to explain the error.
Any found Password can be copied to the Clipboard. Simply press the "Copy to
Clipboard" button located at the right of the corresponding Password. You can
insert the copied Password to any field by pressing the "Ctrl- V" buttons combination
(usually the Paste menu item is disabled, but the keyboard shortcut always works).
A Password which contains international symbols can be displayed incorrectly on
Windows® 95, 98 and Me. These Windows® versions don't support Unicode and
therefore we recommend using Windows® NT, 2000 or XP to recover Passwords
with international symbols. Path to the selected File is displayed under "File Path:"
caption. You can open the File simply clicking the "Open ..." button.
Creating a project
If you need to recover the "open" password for a document and this password
cannot be recovered instantly, you may create a project. Project file contains all
information about the source File, selected Options and Character Set. You can
simply copy the Project File to another computer and you don't need to copy the
source File -- the Project contains all information needed to recover a Password.
When you open the file for password recovery and this Password cannot be
recovered instantly, the program creates a new Project automatically. Project files
have an ".AOPR" extension. By default the Project name is equal to the source
File name. For example if you're opening the "test.doc" file, the Project name is
"test.opr" .
Saving a project
When the file is loaded, you can save your project ~- all the changes you've made
will be reflected in the project file. The name for the project is selected
automatically based on the name of the file. If you want to give an alternative
name - use "File I Save Project As ..." menu item. If you don't want to change the
name, just use the "File I Save Project" menu item.
If a Project was created and you're trying to quit AOPR, the Saving Project Prompt
will be displayed. You can disable this Prompt unckecking the "Prompt if project
was changed" checkbox at the Options tab.
Type of Attack
If a Password cannot be recovered instantly you must use one of the Attack Types.
The following Attack Types are available in AOPR:
115
Information Gathering • Brute-Force Attack. This Attack will try all possible characters combinations
in the specified Range. The Range is defined by Password Length and Brute-
Force Range Options.
Password length
This is one of the most important options affecting checking time. You can check
all d-character (and shorter) passwords in a few minutes. But for longer passwords
you have to have patience and/or some knowledge about the password (including
the character set which has been used, or even better - the mask).
AOPR allows you to set a Password Length range by defining the Minimal and
Maximal Length. These values can be set using the "Password Length" controls at
the "Brute-Force" tab. The minimal length cannot be set to a value greater than
maximal one. In this case the appropriate error message will be displayed.
If the Minimal and Maximal Lengths are not the same, the program tries the shorter
passwords first. For example, if you set Minimale I and Maximal='Z, the program
will start from 3-character Passwords, then try 4-character ones and so on -- up to
7. While AOPR is running, it shows the current Password Length, as well as the
current Password, Average Speed, Elapsed and Remaining Time, and Total and
Processed number of passwords (some of these Parameters are displaying in the
"Extended Statistics" Dialog. All of this information except average speed and
elapsed time, which are global, is related only to the current length.
Password mask
If you already know some characters in the Password, you can specify the Mask to
decrease the total number of passwords to be verified. At the moment, you can set
the Mask only for fixed-length Passwords, but doing this can still help.
For example, you knowthat the Password contains 8 characters, starts with 'x',
and ends with '99'; the other symbols are small or capital letters. So, the Mask to
be set is "x?????99", and tl e chars et has to be set to All caps and All small.
With such options, the total number of the passwords that AOPR will try will be
the same as if you're working with 5-character passwords which don't contain
digits; it is much less than if the length was set to 8 and All Printable options
were selected. In the above example, the '?' chars indicate the unknown symbols.
If you know that the password contains character '?', you can choose a different
Mask Character to avoid having one character, '?', represent both an unknown
116 pattern position and a known character. In this case, you could change the Mask
I
Symbol from'?" to, for example, '#' or '*", and use a mask pattern of "x######?" Cracking Methodology
(for mask symbol '#') or "x******?" (for mask symbol '*').
The Mask and Mask Symbol can be defined in the "Mask / Mask Character" control
at the "Brute-Force" tab.
Custom Charset
You can define your own Character Set for the Brute-Force Attack. Click the
"Define Custom Charset" button at the "Brute-Force" tab. The following Dialog
will appear:
custom_charset
You can enter the Custom charset either in text and HEX format. In HEX format
the Unicode symbols must be separated by Spaces. You can Load, Save, Clear and
Add Charset by pressing the corresponding buttons. After entering the Charset
AOPR checks for duplicate characters and removes them automatically.
• Armenian
• Hebrew
• Japanese (Katakana)
• Japanese (Hiragana)
• Russian (Cyrillic)
If the "Additional char sets" option was selected in installation, ,these char sets are
placed in the "\char sets" directory.
• Brute-Force with Mask. This Attack is useful when you remember a part of
Password. For example if you remember that length of your password was 5
characters and password begins from "A", you can define the mask "A????"
and save the time by trying 4 symbols instead of 5. A Password Mask must be
defined to use this Attack.
• Dictionary Attack. This Attack verifies the words stored in the specified
Dictionary File. The dictionary is just a Unicode text file with one word at a
line; lines are separated with line breaks. You can set additional Dictionary
Options for this Attack. A Dictionary Attack is much faster than Brute-Force
so we recommend to run it first. AOPR has supplied with one small Dictionary
File containing English words. Additional Dictionaries can be obtained on a
CD with any Elcomsoft program.
117
Information Gathering Dictionary Options
At first you have to select the desired Dictionary File. Click the "Select Dictionary
File ..." button at the ""Dictionary" tab and select the needed file.
In that Attack the program will try all words from it as passwords for the selected
Document. It really helps when the Password has some meaning, i.e. the whole
word. You can select an option "Smart mutations" or "Try all possible upper/
lower' case combinations" - it may really help if you're not sure about the register
the Password has been typed in. For example, let's assume that the next word in
dictionary is "PASSword" (the case, actually, doesn't matter here). With the second
option enabled, the program will just try all possible combinations, like:
password
passworD
passwoRd
passwoRD
passwOrd
Default Dictionary
Default Dictionary is used when the Preliminary Attack is running. To select the
Default Dictionary click the "Select Default Dictionary ..." at the "Dictionary" tab.
Please note, this Dictionary Attack is running with "Smart Mutations" Option and
a long Dictionary File may slow down the Preliminary Attack.
• Preliminary Attack
Preliminary Attack is the set of predefined Attacks which are tried when a
password cannot be recovered instantly. When this Attack is running the
following dialog is displayed:
Fig. 6
Preliminary Attack consists of four independent attacks which can be enabled!
disabled in program options.
• Password Cache Attack. This attack checks the Password Cache (all
118 passwords found in other documents by AOPR). This attack can be enabled!
disabled by "Password Cache Preliminary Attack" checkbox at the "Options" Cracking Methodology
tab.
• Other options
The "Device Manager" button allows selecting a hardware that will be used for
password searching. By default AOPR uses all available CPU cores and graphic
cards to achieve the best performance. But you can' disable some CPU s or GPU s
using the Device Manager.
Folder for log files: select the folder where "axpprdebug Iog.txt'' and other log
files files will be created.
If you select the Minimize to tray option, the program will hide itself from the
screen when being minimized (so you will not see an appropriate button on
'Windows® toolbar), but small icon will be created in the tray (near the system
tray). Double-click on it to restore.
By disabling the Prompt if project was changed option, you instruct AOPR not to
display the messages like "The project has been changed. Save?", when you've
changed some options and open an another project, or creating a new one.
fti ·GJ
•••• Still!.' 'P~ IIJpgoade ••••. _ OUt
~-----_._- _.-
E~P!)F.Jie Type01aIlack
;;~-?~£':j
I _ ••••tiIId:,
; ~"'"
...
IH4CaHi.-- .. ·~=··~--.:-.
&d •• 1:IIa!:t: .•
~=·-~~~_=_::._l
J. pc". ••• =1Hil5I
' #}
=--=--=-_ ~~=-
I 0u...~ •.••••
WJIoo· .
L L~~~----~-~~~-~-
1II.10JllllW182lt111-MIlR'R "'OOlMillm~
01nOJllllWla21M-"'''C'\II4t.l~''''' __
0I!.10aw1l82l:"-IIIIoIrmII!I:AanlmllSIiImiaod~4IMiIt~ ••.1_
OI!.l~~!~~_:~.,,~nd!lfiTldlhingP'l!!'C~~ ~'-'
o.....r............. ~_~
T"",,'I'IIll""t. Tiine~.
1I'IIDgooos~
AFIlR'R__
•
"'l1OOIIlltll_.;mJlIW~I:i!>IJtJ!I.
Fig. 7 119
Information Gathering Features and Benefits
• Instantly unlocks PDP documents with printing, copying and editing restrictions
• Supports 40-bit and 128-bit RC4 encryption as well as 128-bit and 256-bit
AES encryption
This is by far the most common protection found in PDP files. If you can open a
document without a password, but cannot print it at all or are restricted to low-
quality output, or if you cannot copy data to clipboard or cannot edit the document,
read no further and get Advanced PDP Password Recovery Standard edition!
Passwords to Open
What if you can't open a PDP. document at all without knowing the correct
password? In that case, you'll need the password recovery feature found in the
Professional and Enterprise editions of Advanced PDP Password Recovery.
The PDP format specifies two types of protection: the weak 40-bit and the strong
128-bit encryption. Advanced PDP Password Recovery guarantees the recovery of
40-bit keys by attacking the encryption key instead of attempting to guess the
password. While the Professional edition takes up to several days to recover a
PDP document protected with a 40-bit key, the Enterprise edition can unlock an
encrypted PDP in a matter of minutes!
120 If the PDP is protected with a strong 128-bit or 256-bit key, Advanced PDP
Password Recovery performs a range of attacks on the PDF file document in order Cracking Methodology
to obtain the original password. But even then you're not left without options!
Dictionary Attack
Most passwords used by living beings are based on a word or phrase. Performing
a dictionary attack by attempting different combinations of cases and variations of
words and characters before reverting.to a comprehensive brute-force attack allows
for considerate time savings.
If the password does not fall into any dictionary, Advanced PDF Password Recovery
attempts all possible combinations of passwords by performing the brute force
attack. The highly optimized low-level code provides the best-in-class performance
for the brute-force password recovery. Multi-threaded optimization ensures optimum
performance on the modem multi-core CPUs.
Additional Notes
Mac Computers: Advanced PDF Password Recovery may not run on Mac running
Windows 2000/XPNista on a virtual machine (using Virtual PC, VMWare, Parallels
or other virtualization software).
DRM and Third-Party Security Plug-ins: Advanced PDF Password Recovery does
not support PDF files protect using Digital Rights Management (DRM) technology
or any third-party party security plug-ins such as FileOpen (FOPN_fLock).
Version 5.0 works with PDF files created in Adobe Acrobat 9 (with 256-bit AES
encryption), with multi-core and multi-processor support and hardware acceleration
using NVIDIA cards.
o Always use Win ZIP optimized attack engine if probability is greater than
Status window
L__ ~
Current password: Average speed:
Time elapsed: Time remaining:
Progress indicator
0%
Fig. 8
121
Information Gathering 4.4.3 Advanced Archive Password Recovery
Advanced Archive Password Recovery recovers protection passwords or unlocks
encrypted ZIP and RAR archives created with all versions of popular archivers.
Recover passwords for plain and self-extracting archives created with PKZip and
WinZip,RAR and WinRAR automatically or with your assistance. Guaranteed
unlocking of archives created with WinZip 8.0 and earlier in under one hour is
possible by exploiting an implementation flaw.
Mask symbol: D
o Always use WinZIP optimized attack engine if probability is greater than ~
Status window
19.02.2008 15:48:21 - ARCHPR 4.00 build 393 launched
-------------------------------'
Current password: Average speed:
Time elapsed: Time remaining:
Progress indicator
0%
Fig. 9
• Supports strong AES encryption found in WinRAR and the new versions of
WinZip
I
• Supports background operation by utilizing idle CPU cycles only Cracking Methodology
Universal Compatibility
Certain ZIP and ARJ archives can be unlocked and decrypted in just minutes,
provided that you have' at least one unprotected file from that archive at your
discretion. It does not matter how long and complex the password is! If you have
a file from the encrypted ZIP archive in your hands, the whole archive can be
usually unlocked in minutes by applying the known-plaintext attack. Similar ARJ
archives are unlocked instantly. Fast recovery available only in case of "classical"
encryption, not AES.
Most passwords used by human beings are based on a single word or a combination
of words from a certain language. Before reverting to the brute force attack,
Advanced Archive Password Recovery performs a full-scaled comprehensive attack
based on a dictionary.
Use .a small built-in dictionary or specify your own dictionaries no matter the
language, and Advanced Archive Password Recovery will attempt single words
and word combinations in different cases and variations.
If you're blank about the password, Advanced Archive Password Recovery will
revert to the last resort: the brute force attack. Thanks to the highly optimized
low-level code, Advanced Archive Password Recovery provides the best-in-class
performance for the brute-force password recovery, attempting millions different
password combinations per second on a typical ZIP archive with a modern CPU.
As many people tend to choose short, simple passwords, the brute-force attack
remains a viable option for password recovery.
Advanced Mailbox Password Recovery instantly retrieves the locally stored login
and password information protecting email accounts and profiles, and supports
many popular email clients. With the help of the included POP3/IMAP Server
Emulator, Advanced Mailbox Password Recovery retrieves passwords to POP3
and IMAP accounts from all email clients in existence.
[ Remove server\s) I
Load list 1
Save ~st 1
Se~log_
Waiting for IMAP connection ...
Opening POP3 session ... \28·Q4·2004 09:37:11)
Assigned socket port: 11 0
Waiting for POP3 connection ...
Starting POP3 session ...
Connected ...
Sending answer ...
Got Iogin name:
Got password: • _:.~'~~
v
----
Oear Save 11 Print J[ Copy
Oplions
H~
I~~ I
Connect -ence
El(~
Ready
Fig. 10
I
• Recovers passwords to all accounts Cracking Methodology
Universal Compatibility
Advanced Mailbox Password Recovery can recover login and password information
to POP3 and IMAP accounts from any email client in existence. The included
POP3IIMAP Server Emulator intercepts the login and password information sent
to an email server.
Mobile Clients
Forgetting a POP3 or IMAP password on a mobile client such as a cell phone or
Windows Mobile communicator may be impossible to recover without Advanced
Mailbox Password Recovery, but could not be easier with it. Just replace the POP3/
IMAP server on the mobile device with the address of POP3IIMAP Server Emulator,
and Advanced Mailbox Password Recovery will intercept and display the password
the moment your mobile device connects to the server to check for new messages.
Instant Recovery
Run Advanced Mailbox Password Recovery and see all email passwords at once!
Advanced Mailbox Password Recovery scans your system and retrieves all types
of passwords to supported email clients in just seconds.
• Eudora
• Pegasus mail
• Calypso mail
• FoxMail
• Phoenix Mail
• IncrediMail
• @nyMail 12')
I
Information Gathering e QuickMail Pro
e MailThem
·e Opera mail
eBecky!
e Internet Mail
Please note that Advanced Mailbox Password Recovery can recover lost or forgotten
password from the local account only, and requires you to be logged in to the
system. This product cannot be used to retrieve somebody else's passwords.
pen=»
'.
r-, i -T ••• ] 1....- ]1 Caneel
126 Fig. 11
Unlock Apple and BlackBerry Backups Cracking Methodology
The new tool recovers the original plain-text passwords protecting encrypted
backups for Apple and BlackBerry devices. The backups contain address books,
call logs, SMS archives, calendars and other organizer data, camera snapshots,
voice mail and email account settings, applications, Web browsing history and
cache.
• Read and decrypt keychain data (email account passwords, Wi-Fi passwords,
and passwords you enter into websites and some other applications)
• Save time with cost-efficient GPU acceleration when one or several AT! or
NVIDIA video cards are installed*
• Compatible with all versions of iTunes (incl. 10.0) and iOS (3 and 4, incl.
4.1) and BlackBerry Desktop Software
Advanced Attacks
I
Information Gathering Extract and Decrypt Stored Passwords
In Apple iPhone devices, -passwords to email accounts, Web sites, and certain third-
party software are stored securely in key chains that are encrypted with hardware
keys unique to each individual device.
Prior to the release of iOS 4, key chains remained encrypted with a device-specific
hardware key; but with the release of Apple iOS4, the key chains are stored
encrypted only with backup's master password. E1comsoft Phone Password Breaker
is able to instantly read and decrypt all keychain data including stored passwords
if a backup password is known or recovered.
Offline Backups
E1comsoft Phone Password Breaker does not use Apple iTunes or BlackBerry
Desktop Software; and does not need to have those products installed. All password
recovery operations are performed offline.
Advanced EFS Data Recovery decrypts the protected files, and works in all versions
of Windows 2000, XP, 2003, Vista, Windows Server 2008 and Windows 7. The
recovery is still possible even when the system damaged, is not bootable, or when
some ehcryption keys have been tampered with.
Advanced EFS Data Recovery is a powerful data recovery tool that helps recovering
the encrypted files under various circumstances. ' -.
I
Recovering Encrypted Files Cracking Methodology
Advanced EFS Data Recovery decrypts files protected with EFS quickly and
efficiently. Scanning the hard disk directly sector by sector, Advanced EFS Data
Recovery locates the encrypted files as well as the available encryption keys, and
decrypts the protected files. The direct access to the file system allows Advanced
EFS Data Recovery to recover encrypted files in the most difficult cases even if
the disk with data is only available without a valid user account to login into
system, or when some encryption keys have been tampered with.
Instant Access
With Advanced EFS Data Recovery, instant access to EFS-protected files is often
possible. The product is well aware of the EFS encryption weakness present in
Windows 2000, allowing quickest recovery of the encrypted files. Supplying a
valid password to the user account (or a previously used password if the password
has been reset by a system administrator, causing EFS-protected files to become
inaccessible) or an account that serves as a data recovery agent (Administrator
account by default) can often provide on-the-fly decryption of the protected files.
The Professional edition locates master and private keys in the deleted files as
well, scanning the disk sector by sector and using patterns to locate the keys,
allowing the recovery of re-formatted disks and overwritten Windows installations.
• Save time with patent-pending GPU acceleration technology when one or more
compatible NVIDIA or AT! video cards are present
• Supports all versions of Microsoft Internet Explorer, including lE7 and lE8
• Reveals stored POP3, !MAP, SMTP and NNTP passwords for all supported
applications
b) Compare your answer with the one given at the end of the Unit.
•
How Advanced Office Password Recovery is useful in passwords protecting
documents created with Microsoft Office applications? What are the attacks
available in Advanced Office Password Recovery?
........................................................................................ ~ .
130
Cracking Methodology
4.5 TROJAN HORSES
A Trojan horse is a continuing threat to all forms of IT communication. Basically,
a Trojan horse is a malicious payload surreptitiously delivered inside a benign
host. You are sure to have heard of some of the famous Trojan horse malicious
payloads such as Back Orifice, NetBus, and SubSeven. But the real threat of Trojan
horses is not the malicious payloads you know about, its ones you don't. A Trojan
horse can be built or crafted by anyone with basic computer skills. Any malicious
payload can be combined with any benign software to create a Trojan horse. There
are countless ways of crafting and authoring tools designed to do just that. Thus,
the real threat of Trojan horse attack is the unknown.
The malicious payload of a Trojan horse can be anything. This includes programs
that destroy hard drives, corrupt files, record keystrokes, monitor network traffic,
track Web usage, duplicate e-mails, allow remote control and remote access, transmit
data files to others, launch attacks against other targets, plant proxy servers, host
file sharing services, and more. Payloads can be grabbed off the Internet or can be
just written code authored .by the hacker. Then, this payload can be embedded into
any benign software to create the Trojan horse. Common hosts include games,
screensavers, greeting card systems, admin utilities, archive formats, and even
documents.
All a Trojan horse attack needs to be successful is a single user to execute the host
program. Once that is accomplished, the malicious payload is automatically
launched as well, usually without any symptoms of unwanted activity. A Trojan
horse could be delivered via e-mail as an attachment, it could be presented on a
Web site as a download, or it could be placed on a removable media (memory
card, CDIDVD, USB stick, floppy, etc.). In any case, your protections are automated
malicious code detection tools, such as modern anti-virus protections and other
specific forms of Malware scanners, and user education.
Fig. 12
131
r
• Unicode support, you can see fo ders, windows, text, in any world language,
that windows can support. Tested with Korean, Japanese, Arabian, Vietnamese,
Chinese, Portuguese, Spanish, Russian. and more! (check the screenshot)
• Very fast and secure listings (for windows, me manager, network manager,
etc). Navigate through the remote c01iDpoterlike if you were opening on your
local computer! Use the "go to" cmmrumds to reach the folder you want,
perfectly fast. The same applies to the registry!
• Improved key logger, get a smooth IeslJllitnum the key logger, and easy to
read text.
• Network manager allows you to browse the other computers in the same LAN
(that are already authenticated), up oad" dowolDad and delete files from those
other computers in LAN, no need for installing a serser on another pc Gust to
browse the lan shares)
• Hybrid support for both direct and revetrse cmmection modes. you can receive
connections on your client at the same time you coaaeet to direct connection
servers
• Huge list of possibilities for process. injection, decide where to inject your
server, where to install, startup methods, and have full control over your server
creation. inject to default browser. custom windows, start any type of program,
inject to winsock enabled applications" inject to all applications, etc
• Very powerful plug-in system. where you may add anything your mind could
think of. Add net limiters, socks, clICI'JPbon. root kits, compression, password
stealers, cd key stealers, offline key loggeIS. anytbing!
• Intrinsic help system, clicking the ....,. will help you mlderstand certain functions
from the program.
• Multi-language support for the client. see 1.he program on your primary language
(should be available soon). •
• File manager with quick edit fcatme: edit plain text files without having to
download them and upload again. 'There's a new "create new file" feature,
makes you able to create new files quickly. without baving to upload a new
file!
• All transfers have "resume" feature. even ne.twmk transfers. resume folder
downloads, uploads, downloads and network oploa:ds and downloads.
• Very fast ip scanner, use the remote machine to' execute ip range scans for
you
• Two other new revamped features: cmUlection bouncer and remote service
reacher. those improved functions wilJ help you to reach the remote computer
services that doesn't allow direct cmmectioDs from wan
4.5.2 NetBus
NetBus or Netbus is a software pTOgrnm for Temotely controlling a Microsoft
Windows computer system over a network. It was created in 1998 and has been
very controversial for its potential of being used as a backdoor.
132
Cracking Methodology
• There are two components to Ihe clieot-:senre£ architecture. The server must be
installed and run on the computer that:5bould be remotely controlled. The filename
is "patch.exe" which we need to deploy the target computer. Where "Netbus.exe"
is the file which we need to ron on the backen; computer. Onces, the server would
install on the host computer, whioh modify Ibe Wmdows registry so that it starts
automatically on each system starmp, Tbe er is a faceless process, listening
for connections on port 12345 (m some vemons, the port number can be adjusted).
The client was a separate program presenting a graphical user interface that allowed
the user to perform a number of activities on the remote computer.
• Keystroke logging
• Keystroke injection
• Screen captures
• Program launching
• File browsing
• Opening/closing CD-tray
b) Compare your answec with . one given at the end of the Unit.
133
I
r
Information Gathering
4.6 MAN-IN-THE-MIDDLE ATTACKS
A Man-In-The-Middle (MITM) attack occurs when an attacker is able to fool a
user into establishing a communication link with a server or service through a
rogue entity. The rogue entity is the system controlled by the hacker. It has been
set up to intercept the communication between user and server without letting the
user become aware that the misdirection attack has taken place. A MITM attack
works by somehow fooling the user, their computer, or some part of the user's
network into re-directing legitimate traffic to the illegitimate rogue system.
MITM attacks can also be waged using more complicated methods, including MAC
(Media Access Control) duplication, ARP (Address Resolution Protocol) poisoning,
router table poisoning, fake routing tables, DNS (Domain Name Server) query
poisoning, DNS hijacking, rogue DNS servers, HOSTS file alteration, local DNS
cache poisoning, and proxy re-routing. And that doesn't mention URL obfuscation,
encoding, or manipulation that is often used to hide the link misdirection.
To protect yourself against MITM attacks, you need to avoid clicking on links
found in e-mails. Furthermore, always verify that links from Web sites stay within
trusted domains or still maintain SSL encryption. Also, deploy IDS (Intrusion
Detection System) systems to monitor network traffic as well as DNS and local
system alterations.
4.6.1 Wireshark
Wireshark is a network packet analyzer.
~~:m
~ Q.l!9nl9
11-- _","3;-0;.:;_:
5 1.044366
1~<l.16e.o.1.
192.168.0.2
rn.16a.Q.~
192.168.0.2
1~~.16a.o.~
192. r68.
~~~.O.O.~~~
192.168.0.1
NeNS
o~.il===-.:::rcMP
I~P
DN;
N'lIn~ QY~ry N6HA, • ~OOHOOHOOH(X
DHt-fna'tTbtnJrfrea-.:h"bTe
I/j M~mti~r.fii
Standard
B R~p§rt
""..
6 1.048652 192.168.0.2 ~~9. 2~~. 2S~. 250 UQr ~u.rce ggrt: 3191 Des't t n4tign Q.Qt
7 1. 050784 192.168.0.2 192.l66.0.1 DNS Standard qu~ry SOA n~1OQ61d.""'IOO4.
8 1.055053 l.96·168,O.1 19,),108.0.2 uop sour-ce pgrt: 1900: nes.t i ngtion PQt
9 l.Oel!ele l~~.l~e.o. a 19~.1§a.0. ass NaN~ R~Qj.tN;;i §n Na N610Q§lQ'OQ~
10 1.111945 192. ~68.0. 2 192.168.0.1 DN'> S.tanda.rd quel)' & _prgxyconf .WAOO4. ~
134 Fig. 14
A network packet analyzer will try to capture network packets and tries to display Cracking Methodology
that packet data as detailed as possible. You could think of a network packet analyzer
as a measuring device used to examine what's going on inside a network cable,
just like a voltmeter is used by an electrician to examine what's going on inside an
electric cable (but at a higher level, of course). In the past, such tools were either
very expensive, proprietary, or both. However, with the advent of Wireshark, all
that has changed. Wireshark is perhaps one of the best open source packet analyzers
available today.
Features
• Data can be captured "from the wire" from a live network connection or read
from a -file that recorded already-captured packets.
• Live data canbe read from a number of types of network, including Ethernet,
IEEE 802.11, PPP, and loopback.
• Captured network data can be browsed via a GUI, or via the terminal (command
line) version of the utility, tshark.
Wireshark's native network trace file format is the libpcap format supported by
libpcap and WinPcap, so it can read capture files from applications such as tcpdump
and CA NetMaster that use that format, and its captures can be read by applications
that use libpcap or WinPcap to read capture files. It can also ;ead captures from
other network analyzers, such as snoop, Network General's Sniffer, and Microsoft
Network Monitor.
b) Compare your answer with the one given at the end of this Unit.
How MITM attack helps the attacker to fool a user by establishing a communication
link with a server?
135
I
Information Gathering
••••••••••••••••••••••••••••••••••••••••••••• ~••••••••••••••••••••• ; •••••••••••••••••••••• ~••••••••••• -••••••••••• !' •••••••••••••••••
....................................................................................................................................
. .
........... ",. . ~ .
The tool that will not cause any harm to EFS-encrypted files.on ~ourhard disk
is the Windows Password recovery system. Here are 5 of these tools:
ii) Brute-Force with Mask: This Attack is useful when 'you remember a
part of Password. For example if you remember that length of your
password was 5 characters and password begins from "A", you can define
the mask itA????" and save the time by trying 4 symbols instead of 5. A
Password Mask must be defined to use this Attack.
iii) Dictionary Attack: This Attack verifies the words stored in the specified
Dictionary File. The dictionary is just a Unicode text file with one word at
a line; lines are separated with line breaks. You can set additional Dictionary
Options for this Attack. A Dictionary Attack is much faster than Brute-
Force so we recommend to run it first. AOPR has supplied with one small
Dictionary File containing English words. Additional Dictionaries can be
obtained on a CD with any Elcomsoft program.
I
/
Information Gathering skills. Any malicious payload can be combined with any benign software to
create a Trojan horse. There are countless ways of crafting and authoring
tools designed to do just that. Thus, the real threat of Trojan horse attack is
the unknown.
All a Trojan horse attack needs to be successful is a single user to execute the
host program. Once that is accomplished, the malicious payload is automatically
launched as well, usually without any symptoms of unwanted activity. A Trojan
horse could bedelivered via e-mail as an attachment, it could be presented on
a Web site as a download, or it could be placed on a removable media (memory
card, CD/DVD, USB stick, floppy, etc.). In any case, your protections are
automated malicious code detection tools, such as modem anti-virus protections
and other specific forms of Malware scanners, and user education.
4) A MITM attack occurs when an attacker is able to fool a user into establishing
a communication link with a server or service through a rogue entity. The
rogue entity is the system controlled by the hacker. It has been set up to
intercept the communication between user and server without letting the user
become aware that the misdirection attack has taken place. A MITM attack
works by somehow fooling the user, their computer, or some part of the user's
network into re-directing legitimate traffic to the illegitimate rogue system.
138
Student atisfactio e THE PEOPLE'S
UNIVERSITY
Please indicate how much you are satisfied or dissatisfied with the following statements
SI. . Questions Very Satisfied Average Dissati- Very
No. Satisfied !f1ed Dissati-
sfied
1. Concepts are clearly explained in the printed learning
material c=J c=J CJ CJ CJ
2. The learning materials were received in time CJ c=J CJ [==:J D
3. Supplementary study materials (like video/audio) available D D D D D
4. Academic counselors explain the concepts clearly CJ CJ CJ CJ CJ
5. The counseling sessions were interactive CJ CJ CJ CJ D
CJ c=J D D
Changes in the counseling schedule were communicated to
6.
you on time CJ
7. Examination procedures were clearly given to you CJ D CJ CJ D
8. Personnel in the study centers are helpful
CJ D c=J CJ D
9. Academic counseling sessions are well organized
CJ CJ CJ D D
Studying the programme/course provide the knowledge of
10.
the subject CJ CJ CJ CJ CJ
11. Assignments are returned in time
0 CJ CJ CJ CJ
Feedbacks on the assignments helped in clarifying the
12.
concepts CJ CJ CJ CJ CJ
13. Project, proposals are clearly marked and discussed CJ CJ 0 CJ CJ
14,
Results and grade card of the examination were provided on
time [=:1 CJ CJ CJ c=J
15. Overall, I am satisfied with the programme CJ CJ CJ CJ c:=J
Guidance from the programme coordinator and teachers
16.
from the school CJ CJ 0 CJ CJ
After filling this questionnaire send it to:
Programme Coordinator, School of Vocational Education and Training,
Room no. 19, Block no. 1, IGNOU, Maidangarhi, New Delhi- 110068
I
1I
4
/ ,
ISBN-978-81-266-5443-7