Posts

Meeting with Dr. Jamie Saunders

Image
Met Dr. Jamie Saunders, Director of UK's National Cyber Crime Unit at the London office of National Crime Agency .Had a good knowledge sharing session and also I presented him my Book on Cyber Crime & Cyber Law. Prashant Mali 

Fast Flux Networks An Introduction

Image
A Fast Flux Network is a network of compromised computers and some public DNS records that change frequently. As a result, the IP address associated with the corresponding domain name changes frequently. This technique is often used by the attackers to hide their malicious websites from detection. Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other web scams). To protect the identity and to maximise the availability of the core components of their business, miscreants have recently started to use fast-flux service networks, large groups of bots acting as front-end proxies to these components. Motivated by the conviction that prompt detection and monitoring of these networks is an essential step to contrast the problem posed by botnets, Attackers typically compromise one or more victim computer systems with malware and exploit those to establish a fraud

Prashant Mali Chevening TCS Cybersecurity fellowship images

Image

Black Software List

This List is Public 😇 🔵 Password Hacking Software  1.haviz 2.metasploit 3.hydra 4.wireshark 5.Dsniff 6.InSSIDer 7.Aircrack-ng 8.Aircrack 9.Brutus 10.Cain And Abel 11.IKECrack 🔴Wireless Hacking Software 12.Kismet 13.KisMAC 14.Firesheep 15.NetStumbler 16.WepLab 🔵Network Hacking Software 17.Map 18.SuperScan 19.Angry IP Scanner 🔴Packet Crafting To Exploit Firewall Weaknesses software 20.Hping 21.Scapy 22.Netcat 23.Yersinia 24.Nemesis 25.Socat 🔵Traffic Monitoring for Network Related Hacking software 26.Splunk 27.Nagios 28.P0f 29.Ngrep 🔵Packet Sniffers To Analyze Traffic software 30.Wireshark 31.Tcpdump 32.Ettercap 33.Dsniff 34.EtherApe 35.Paros 36.Fiddler 37.Ratproxy 38.Sslstrip 39.SSL/TLS Security  🔴Test By High-Tech Bridge Rootkit Detectors To Hack File Systemsoftware 40.Netfilter 41.PF: OpenBSD Packet Filter 42.Skipfish 43.Wfuzz 44.Wapiti 45.W3af 46.Sleuth Kit 47.Helix 48.Maltego 49.Encase 🔴Debuggers To Hack Running Programs software 50.Immunity Debugger 51.Netcat 52.Traceroute

Case Laws for CCTV as Best Evidence

CCTV Footage- Primary Evidence-  CCTV footage directly & immediately stored in hard drive of computer is original media, self generated & created without human intervention- Not secondary evidence & does not require certification u/s 65B of Evidence Act. Kishan Tripathi v. State, Crl.A.108/13, 12.2.16 DHC -—-–—–-—––—-–— : Procedure to be followed by Magistrate when CCTV footage and video recordings is produced by police at the time of filing of chargesheet?            During the hearing of the case, we noticed that the trial Court had not played the DVR (MO-2) and seen the CCTV footages in the presence of the accused. In this regard we propose to dispel misgivings, if any, in the mind of trial Judges about their power to view such evidences. There will be instances where, by the time the case comes up for trial in one court, the electronic record would have had a natural death for want of proper storage facilities in the Court property room. To obviate these difficulties, w

Trojan targeting your bank codes sent on Mobile

Image
A new Android trojan has the ability to intercept text messages and bypass the SMS-based two-factor authentication system protecting customers' bank accounts. The trojan, detected as   "Android/Spy.Agent.SI"   is currently targeting customers of large banks via their mobile apps. The malware tricks users into downloading it onto their devices by masquerading as Adobe Flash Player. Upon installation, it requests that the user grant the malicious app administrator rights, before seemingly disappearing from view. Rest assured, however, that while the Flash Player icon might no longer be visible, the trojan is just getting started.At this point, Android/Spy.Agent.SI contacts a remote server hosting malicious APK files whose corresponding URL paths are regenerated hourly in a bid to avoid detection by anti-virus software. The trojan uses this connection to send information about the infected device, along with the package names of installed applications, to its opera

Stages of Cyber Civil Cases in Indian

Image
STAGES IN a Cyber CIVIL Case / Suit in India- (Plaintiff Means whoever files the case ) By Advocate Prashant Mali(@CyberMahaGuru) 1. Plaintiff has to file the plaint complying the provisions in all respect as contemplated under Order 4 r/w Order 6 and 7 of the code. 2. Plaintiff  has to issue summons within 30 days from the institution of suit. 3. After the service of summons defendant has to file his written statement within 30 days from the receipt of summons as per Order 8 R 1 of the code 4. No further time exceeding 90 days after date of service of summons be extended for filing written statement as per proviso to Order 8 R 1 of the code. 5. Within 10 days from the filing of written statement court has to examine the parties so as to explore the possibilities of compromise in between the parties and to refer the matter of settlement under section 89 of the code. 6. If parties fail to compromise the matter then court has to keep the matter for d