Category: Security

Computer Security

  • List of services to find out what company is hosting a website

    List of services to find out what company is hosting a website

    The most common way to find out who is hosting a website is by doing a whois on the domain name and looking at the Domain Name System (DNS) which often leads to the hosting provider, but in occasions some webhost do not use an obvious NS name making it difficult to find out who the host is, it is also possible for those on a dedicated server to create their own custom DNS name throwing off the trail anyone investigating them, or to use a free DNS provider that helps hide the real hosting company.

    HostLogr.com: This free service will show you a website data centre physical location, can be useful to troubleshoot ping rates and latency as well, it will also the website IP with a list of websites sharing the same IP, a common happening in shared hosting, but this does not mean that all those sites belong to the same owner, just that they are on the same server.

    Who-Hosts.com: This service will name the webhosting company behind a website. If you are going to report abuse this is much more useful than finding out about the data centre since abuse reports should be send to the hosting company and not the data centre.

    Who-Hosts finds out who is hosting a website
    Who-Hosts finds out who is hosting a website

    Whois.Domaintools.com: A very complete domain name information tool, with details about domain name registrar changes, IP history, whois history changes and DNS changes. This data will not tell you who is hosting a domain name but domain ownership and registration dates can help you work out what a website has been up to in the past. You will need the paid for version of Domaintools to get access to the most advanced features..

    Ishostedby.com: A simple report tool showing a map with the exact geographical location of the server, the IP and the data centre where the server resides, a data centre is also the ISP for that server/website, if a hosting company ignores an abuse report it might be worthwhile try to send an abuse complaint to the data centre as a last resort.

  • Monitor network bandwidth and perfomance with PRTG Network Monitor

    Monitor network bandwidth and perfomance with PRTG Network Monitor

    PRTG (Paessler Router Traffic Grapher) Network Monitor is a Windows only free monitoring tool to scrutiny network traffic and evaluate performance (i.e. availability and usage), it enables network administrators to find out the CPU and memory load providing live readings. This network tool displays very detailed information with easy to understand graphs allowing you to see what traffic is roaming through your network, PRTG Network Monitor comes preconfigured with templates for various devices, it can analyze any device attached to your computer network, including routers, servers and firewalls.

    PRTG Network Monitor software
    PRTG Network Monitor software

    Understanding network usage is fundamental to optimize it and avoid bandwidth bottlenecks, network monitoring software helps you discover traffic jams and troubleshoot network problems. The software is comprehensive, it has an intuitive multilingual interface that can be password protected, access is possible using an Internet browser locally or over the Internet, using an iPhone/iPad app (called iPRTG) or using a Windows GUI. A system tray balloon will immediately notify you of problems when they occur, if you are away from your computer just set up notifications to your email or mobile phone via SMS, the free version comes with 10 sensor types (over 100 sensors in the commercial version) looking at TCP/IP connectivity, HTTP, SMTP, FTP, SSH, etc.

    PRTG Network monitor includes a packet sniffer that makes for a good alternative to Wireshark, it can monitor network users capturing packets and find out what websites they visit in real time, if you suspect an unauthorized person is using your wireless network this home network software will help you find out their hardware MAC address and what they are doing, once you choose the network adapter you would like to monitor (i.e. wireless or Ethernet) you can instruct PRTG to log all captured traffic to review it later on.You will need some basic understanding of network protocols before using this tool, other than that, it is very easy to manage.

    Visit PRTG Network Monitor homepage

  • Hide Firefox bookmarks encrypting them with Link Password

    Hide Firefox bookmarks encrypting them with Link Password

    Link Password is a Firefox addon to encrypt your Firefox browser bookmarks using the symmetric AES cipher, you could combine Firefox Private Browsing mode that runs in RAM memory and does not save anything to your hard disk, with this privacy Firefox addon that will hide what your favourite sites are, it can be useful for those sharing computer at home or an Internet cafe, library, etc.

    If you already have bookmarked link you can choose to encrypt them, Link Password can encrypt individual links or the folders containing them, it uses its own protocol “linkpassword“, the links can be renamed and rolled back if necesary,  when you click on a link you will be asked for the password before it can be opened, decryption and encryption of bookmarks can be done with using a right click.

    Link Password Firefox privacy addon
    Link Password Firefox privacy addon

    An alternative to Link Password would be to create an encrypted container and store Firefox Portable inside (including bookmarks), but encryption software like Truecrypt requires administrator rights and can not be used at libraries and Internet cafes where you are logged in as a user.

    Visit Link Password Firefox addon

  • Review Mozilla Persona authentication system

    Review Mozilla Persona authentication system

    Mozilla Labs, the makers of Firefox browser and Thunderbird, have come up with an experimental browser based single login system called Mozilla Persona. After a user has verified his email address by visiting a link sent to his inbox he can claim ownership and use that email address and a chosen password to login at any site supporting Mozilla Persona, very few at the moment, you will know if a site supports Mozilla Persona when they show the logo.

    The main advantages of Mozilla Persona are that it saves surfers from having to remember dozens of different usernames and passwords across sites, it does not leak information to the website you log in and it works across browsers, site authentication only needs Javascript enabled to work .

    The Mozilla Persona website is used as authentication backend server holding user’s email details, but anyone can run their own verification server, Mozilla Persona is a decentralized login system. When a user logs into a Mozilla Persona identity provider a set of public/private encryption keys will be created inside the browser using javascript, the public encryption key is then sent to the Mozilla Persona identity provider where it will be used to sign an identity certificate before sending it to the user’s browser for storage.

    Any website requiring a user to login using Mozilla Persona will use javascript to prompt the user if wishes to login, if he agrees the browser will send the previously stored browser identity certificate, digitally signed with that user’s private encryption key, the login server will verify the signature asking the Mozilla Persona identity provider for the user’s public encryption key, making sure the digital signature is valid.

    The disadvantages of Mozilla Persona are that websites need to support it and since many already support OpenID, Google Account login, Twitter and Facebook connect, they will be wondering if they really need to add even more login plug-ins, another downside is that if your Mozilla Persona provider goes down you will be unable to login to dozens of sites. This is what happened to my OpenID provider some time ago and it was then that I made the decision not to use OpenID anymore, failure of the authentication server or a denial of service attack against the server constitutes a huge risk.

    How Mozilla BrowserID works
    How Mozilla Persona works

    Mozilla Persona vs OpenID

    OpenID is a more seasoned one click authentication system that shares some common ground with Mozilla Persona, both systems need a single username and password to login across multiple sites and act like a third party authentication server working across browsers, the main differences are:

    • Mozilla Persona does not involve the identity provider in the login process whereas OpenID identity providers are part of the authentication process, this means that OpenID identity providers are aware of  the sites you are a member of, Mozilla Persona protects your login activities from identity providers, OpenID does not.
    • Mozilla Persona has been designed to tightly integrate with the browser with the login process taking part within it, a Firefox add-on is in the making, OpenID redirects you to a website for the login process to take place.
    •  Mozilla Persona always identifies users with their email address, OpenID authentication process does not always implicate a user email address.

     Conclusion Mozilla Persona

    I fail to see how Mozilla Persona is any better than a password manager, Mozilla Persona simplifies login across multiple sites by only needing a single password and a password managers will automatically fill in your username/password, not having to type it in, all you need to know is the masterpass, just like with Mozilla Persona ID.

    Mozilla Persona can be a good replacement for those endangering their privacy using Facebook connect and Twitter accounts to login at other sites, by using Facebook connect you are giving third party companies access to private data,  Mozilla Persona, like OpenID, will stop that, but I am not seeing myself using Mozilla Persona any time soon.

    I am very happy with my offline password manager and I believe it is a much more secure login system than using a server that I have never seen or audited to manage my login credentials for dozens of sites.

    Note: Mozilla Persona used to be called BrowserID, this post has been updated accordingly.

    Visit Mozilla Persona homepage

  • Delete locked files and folders with FilExile

    Delete locked files and folders with FilExile

    Windows File Protection (WFP), first introduced with Windows Millennium, (Windows Vista uses something called Windows Resource Protection) is a built system that detects the replacement and overwriting of system files, caused by malware or badly written software, if system files where to be erased it would cause continuous operating system crashes and even prevent it from booting up. Windows File Protection can not be turned off by users (unless using a kernel debugger).

    After uninstalling a program you will find junk files left behind due to a substandard uninstaller, many times those files can not be manually erased with Windows complaining that they are locked, another explanation for locked files is corrupted files or changed file permissions, it is also possible that folders pointing to an invalid name or to an extremely long path can give you an error when you attempt to erase them, and there are malware files locking themselves in to prevent you from erasing infected files.

    FilExile erase locked files
    FilExile erase locked files

     Erasing locked files

    FileExile is an easy to use open source program that will get rid of hard to erase folders and files, all you have to do is to locate the hard to erase file or folder, select it and click on “Delete“, you will not even need to reboot your computer. FileExile allows you to log all operations to keep track of what has been erased.

    I have also managed to erase locked files using a simple secure data shredding application this gets around Windows File Protection most times and circumvents Windows recycle bin.

    Visit FilExile homepage

  • Track changes in computer files with WinPatrol

    Track changes in computer files with WinPatrol

    This lightweight system monitoring software (802Kb) supervises the programs running in your PC, it will create a snapshot of the critical files in your operating system and warn you if anything has changed, it uses heuristics, based on file behaviour, to detect zero day attacks. WinPatrol has a tabbed easy to navigate interface. Inside the “StartUp Programs” tab you will see a list of the software that starts at boot time, double clicking on any of  the program names will give you further information on them, with another click you can disable a start up program or decide to delay its launch, this can speed up your Windows boot up time.

    WinPatrol will stop changes without your permission in the registry, scheduled tasks, IE Addons, ActiveX controls and more, hidden files will be exposed and if a program has changed a file association, WinPatrol can restore it. Unlike other antispyware software WinPatrol does not scan your hard disk for malicious files it monitors the system files behaviour instead, this will minimize conflicts with other computer security software you are running. WinPatrol also has a privacy feature to stop Internet tracking cookies allowing you to manage your cookies and erase them based on cookie name using keyword filtering.

    WinPatrol system monitoring tool
    WinPatrol system monitoring tool

    If you suspect you have malware in your computer or notice a sluggish PC, you can use WinPatrol to look at the software running and kill unwanted background processes, WinPatrol it is a good complimentary tool to stop malware. Together with a good antivirus and firewall, this software will help you control how your computer system files work, some of the features like real time monitoring and access to a database with information about cryptic files and what they do are only available with the non free Plus version of WinPatrol.

    Visit WinPatrol homepage

  • Learn computer forensics with OSForensics

    Learn computer forensics with OSForensics

    Computer forensics is a branch of digital forensic science associated with investigations to recover, identifying and analysing data stored in digital devices (PC, iPhone, CDs, etc), the process a computer forensics investigation follows resembles that of data recovery but the evidence is subject to guidelines to document an audit trail and preserve the extracted data so that it can be used in a court of law if necessary.

    Computer forensic experts are the people who have been trained in extracting and analysing evidence from digital media , a computer forensics expert should be able to tell what happened, how it happened and who/what was involved, computer forensic experts take part in child pornography investigations, identity fraud cases, malicious hacking incidents, etc. To become a computer forensic expert it is necessary to have a background in computer science, some universities offer certification in computer forensics, you will also need work experience as a computer forensics analyst or IT Security (i.e. internship).

     How to Perform Computer Forensics and Data Recovery

    OSForensics is a collection of computer forensics tools, some of them used by law enforcement, providing you with information about computer configuration and activities.

    After creating a case with OSForensics you will be able to see the computer’s recent activities like connected USB devices, recently browsed websites or downloaded images, another option allows you to recover passwords stored in the browser, if a file has been erased by Windows this forensic tool can recover it as long as it has not been overwritten, a time line lets you see a graph with a good overview of what and when it happened, the results can be exported in CSV or HTML format for further processing, e.g. printing, email.

    OSForensics free computer forensics software
    OSForensics free computer forensics software

    The OSFMount tool allows you to mount all kind of disk images ( .iso, .bin, .nrg, .sdi, .vmd,etc) and view them without having to burn it to a CD-Rom. The Mismatch File Search tool can scan the hard disk searching for files which default extension has been changed in order to disguise them, for example renaming a .jpg file as .txt (which can be reversed), the Mistmatch File Search tool will look at the file headers bytes where the file type is specified and make sure it corresponds with the file extension it represents.

    The Memory Viewer allows you to view the computer RAM memory running processes while the computer is on, useful to find malware in RAM if you detect anomalies. Another very useful feature is the indexing of files, OSForensics can search a hard drive much quicker than the built-in Windows search and show a preview with thumbnails inside a pane. Keyword and date filtering search are on the menu just like email messages indexing, Microsoft Outlook, Thunderbird, Windows live mail, Eudora and many others are all supported (.pst, .mbox, .msg, .eml, .dbx), email message headers with the sender’s IP, can be viewed.

    OSForensics can run on a live system but a real computer expert will avoid doing so until the hard drive has been cloned first, a running operating system changes data while functioning, e.g. timestamps, running malware, logs. The first thing a computer forensic expert does before seizing a compromised system is to pull the machine’s plug off the wall to cut the power as logging off a computer using the shut down process will modify many logs and processes.

    OSForensics free version main features

    • Memory viewer and dumper
    • Raw disk viewer
    • Verify & create hash values
    • Disk imaging & drive zeroing
    • Install and run from USB stick
    • Collect system information, settings, environment

    This free forensics software can be copied to a USB device to be used onsite, it will make for a good tool in triage cases quickly determining if a digital device has anything of interest that justifies taking it away to the lab. OSForensics makes for a great appliance for those wanting to get in the computer forensics field and learn on their own, the free version has some missing features but still useful.

    Typical law enforcement agencies computer forensics software like Encase is much more complex to use, with no free version and very expensive for an individual, beginners should start learning with a cut down version such as this one.

     Visit OSForensics homepage

    Note: You can download example rainbow tables and hash sets from the OSForensics website (password cracking).