Thursday, February 18, 2010






New Picture Update:-

Culture & Heritage Malaysia People

Having had an interesting past and being a part of the international spice route many hundreds of years ago, Malaysia has turned into a mosaic of cultures. Everything from its people to its architecture reflect a colourful heritage and an amalgamated culture. To understand Malaysian culture, you must first get to know its people.

DISCOVER A LAND OF INTRIGUING DIVERSITY

Malays, Chinese, Indians and many other ethnic groups have lived together in Malaysia for generations. All these cultures have influenced each other, creating a truly Malaysian culture.
The largest ethnic groups in Malaysia are the Malays, Chinese and Indians. In Sabah and Sarawak, there are a myriad of indigenous ethnic groups with their own unique culture and heritage.

MALAY
Today, the Malays, Malaysia's largest ethnic group, make up more than 50% of the population. In Malaysia, the term Malay refers to a person who practices Islam and Malay traditions, speaks the Malay language and whose ancestors are Malays. Their conversion to Islam from Hinduism and Theravada Buddhism began in the 1400s, largely influenced by the decision of the royal court of Melaka. The Malays are known for their gentle mannerisms and rich arts heritage.

CHINESE
The second largest ethnic group, the Malaysian Chinese form about 25% of the population. Mostly descendants of Chinese immigrants during the 19th century, the Chinese are known for their diligence and keen business sense. The three sub-groups who speak a different dialect of the Chinese language are the Hokkien who live predominantly on the northern island of Penang; the Cantonese who live predominantly in the capital city Kuala Lumpur; and the Mandarin-speaking group who live predominantly in the southern state of Johor.

INDIAN
The smallest of three main ethnic groups, the Malaysian Indians form about 10% of the population. Most are descendants of Tamil-speaking South Indian immigrants who came to the country during the British colonial rule. Lured by the prospect of breaking out of the Indian caste system, they came to Malaysia to build a better life. Predominantly Hindus, they brought with them their colourful culture such as ornate temples, spicy cuisine and exquisite sarees.
INDIGENOUS ETHNIC GROUPS

Orang Asli
Orang Asli is a general term used for any indigenous groups that are found in Peninsular Malaysia. They are divided into three main tribal groups: Negrito, Senoi and Proto-Malay. The Negrito usually live in the north, the Senoi in the middle and the Proto-Malay in the south. Each group or sub-group has its own language and culture. Some are fishermen, some farmers and some are semi-nomadic.
SARAWAK

Collectively known as the Dayaks, the Iban, Bidayuh and Orang Ulu are the major ethnic groups in the state of Sarawak. Dayak, which means upstream or inland, is used as a blanket term by the Islamic coastal population for over 200 tribal groups. Typically, they live in longhouses, traditional community homes that can house 20 to 100 families.

Iban
The largest of Sarawak's ethnic groups, the Ibans form 30% of the state's population. Sometimes erroneously referred to as the Sea Dayaks because of their skill with boats, they are actually an upriver tribe from the heart of Kalimantan. In the past, they were a fearsome warrior race renowned for headhunting and piracy. Traditionally, they worship a triumvirate of gods under the authority of Singalang Burung, the bird-god of war. Although now mostly Christians, many traditional customs are still practised.

Bidayuh
Peace-loving and easy-going, the gentle Bidayuh of Sarawak are famous for their hospitality and tuak or rice wine. Making their homes in Sarawak's mountainous regions, they are mostly farmers and hunters. In their past headhunting days, their prized skulls were stored in a 'baruk' a roundhouse that rises about 1.5 metres above the ground. Originally animists, now most of them have converted to Christianity.

Orang Ulu
Also known as upriver tribes of Sarawak. Forming roughly 5.5% of Sarawak's population, there are over 100,000 different Orang Ulu tribes. Arguably Borneo's most artistic people, their large longhouses are ornately decorated with murals and superb woodcarvings; their utensils are embellished with intricate beadwork; and aristocratic ladies cover their bodies with finely detailed tattoos.
SABAH

The largest indigenous ethnic groups of Sabah's population are the Kadazan Dusun, the Bajau and the Murut.

Kadazan Dusun
The largest ethnic group of Sabah, the Kadazan Dusuns form about 30% of the state's population. Actually consisting of two tribes; the Kadazan and the Dusun, they were grouped together as they both share the same language and culture. However, the Kadazan are mainly inhabitants of flat valley deltas, which are conducive to paddy field farming, while the Dusun traditionally lived in the hilly and mountainous regions of interior Sabah.

Bajau
The second largest ethnic group in Sabah, the Bajaus make up about 15% of the state's population. Historically a nomadic sea-faring people that worshipped the Omboh Dilaut or God of the Sea, they are sometimes referred to as the Sea Gypsies. Those who chose to leave their sea-faring ways became farmers and cattle-breeders. These land Bajaus are nicknamed 'Cowboys of the East' in tribute to their impressive equestrian skills, which are publicly displayed in the annual Tamu Besar festival at Kota Belud.

Murut
The third largest ethnic group in Sabah the Muruts make up about 3% of the state's population. Traditionally inhabiting the northern inland regions of Borneo, they were the last of Sabah's ethnic groups to renounce headhunting. Now, they are mostly shifting cultivators of hill paddy and tapioca, supplementing their diet with blowpipe hunting and fishing. Like most indigenous tribes in Sabah, their traditional clothing is decorated with distinctive beadwork.

Saturday, February 06, 2010

-: Password Hacking :-

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Wednesday, February 03, 2010

-: Network Hacking :-

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in



Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.
Related Posts Plugin for WordPress, Blogger...