Monday, May 17, 2010
Unsecured wifi and we--------Part-6
Dear friends,
This is the second part of one of our readers, valuable comment for making the series more easily understandable and as this is valuable command I am publishing it in front page for all of you.
Sitanshu said...
Dear All,
This is second part of the previous article I posted. Consider is the next page of the same article.
TKIP Message Integrity Check (MIC)
Similar to TKIP, the Message Integrity Check (MIC) had also many versions before 802.11i defined it as a single standard. Once this was done, MIC became known as Michael although the acronym MIC still remains. Today with 802.11i, ratified MIC is Michael and vice versa. The protocol itself was created to help fight against the many message modification attacks that were prevalent in the WEP protocol. The IEEE 802.11i standard describes the need for MIC in the following quote: “Flaws in the IEEE 802.11 WEP design cause it to fail to meet its goal of protecting data traffic content from casual eavesdroppers. Among the most significant WEP flaws is the lack of a mechanism to defeat message forgeries and other active attacks. To defend against active attacks, TKIP includes a MIC, named Michael.” The MIC was created as a more secure method of handling integrity checking compared to the IVC in WEP.
The MIC is a hash that is calculated on a per-packet basis. This means a single MIC hash could span multiple frames and handle fragmentation. The MIC is also on a per-sender, per-receiver basis. This means that any given conversation has a MIC flowing from sender A to receiver B and a separate MIC flowing from sender B to receiver A.
The MIC is based on seed value, destination MAC, source MAC, priority, and payload. Unlike IC, MIC uses a hashing algorithm to stamp the packet, giving an attacker a much smaller chance to modify a packet and have it still pass the MIC. The seed value is similar to the WEP protocol’s IV. TKIP and MIC use the same IV space, although they have added an additional four octets to it. This was done to make the threat of using the same IV twice in a short time period less likely.
The MIC is also encrypted inside the data portion, which means it is not obtainable through a hacker’s wireless sniffer. To add to this, the TKIP also left the WEP IVC process, which then adds a second, less secure method of integrity checking on the entire frame. To combat message modification attacks, the TKIP and MIC went a step further and introduced the TKIP countermeasures procedures. This is a mechanism designed to protect against modification attacks. It works by having an access point shut down its communications if two MIC failures occur in 60 seconds. In this event, the access point would shut down for 60 seconds. When it comes back up, it would require that all clients trying to reconnect change their keys and undergo a re-keying. Some vendors allow one to define these thresholds, although the MIC standard calls out these values.
To prevent noise from triggering a TKIP countermeasure procedure, the MIC validation process is performed after a number of other validations. The validations performed before the MIC countermeasure validation are the frame check sum (FCS), integrity check sum (ICV), and TKIP sequence counter (TSC). If noise was to interfere with the packet and modify it, one of these other checks would be able to find it first, thus preventing the frame from incrementing the MIC countermeasure counter.
Pl keep in touch for more interesting articles on this topic.
Thanking you
Urproblemmysolution Team
Sunday, May 16, 2010
Unsecured Wifi and we---------Part-5
Dear Friends,
The topic has become interesting here as one of my valuable reader has shared his valuable knowledge with us for explaining more easily about some codes which are used in Wi-fi. TKIP is one of them and for that I have decided to post that technical term in front page for all of us and making this topic more attractive. So lets have a look on that comment
Sitanshu said...
Dear Sujit/Sudipto,
Thank you for a fantastic article on WLAN Security.
I thought that our readers deserve a bit more. There are many advanced users who would like to know more about TKIP, MIC, WPA, WPA2.
I'm therefore posting this article to explain to our valuable advanced readers the inner details of TKIP and MIC.
TEMPORAL KEY INTEGRITY PROTOCOL (For upgrading a WEP based Wi-Fi Network)
The (TKIP) Temporal key Integrity Protocol was an interim solution developed to fix the key reuse problem of WEP. By key reuse we mean that a single key was used to encrypt all packets in the transmission. Once you examined enough packets as mentioned in an earlier posting you could build the key using XOR operations (WEP Key Builder uses that concept)
TKIP later became part of the 802.11i and subsequently part of WPA and WPA2 standards. I have mentioned in a previous posting that both WPA and WPA2 are interim steps towards moving to 802.11i.
TKIP was included in the 802.11i standards for backwards compatibility. The 802.11i standard did not want to use a cipher based RC4, so they chose AES (Advanced Encryption Standard). TKIP was put into 802.11i for the sole reason of helping older devices transition to 802.11i. To do this, 802.11i needed to support a protocol that could easily upgrade WEP to something safe enough to include in 802.11i.. WEP as we all know was weak and flawed. Using TKIP protected against attacks and reduced the overall risk of operating a wireless network.
Today, Cisco differentiates its versions of TKIP and the standard one by calling it the Cisco Key Integrity Protocol (CKIP).
The TKIP encryption portion works in a two-phase process. The first phase generates a session key from a temporal key, TKIP sequence counter (TSC), and the transmitter’s MAC address. The temporal key is made up of a 128-bit value similar to the base WEP key value. The TKIP sequence counter (TSC) is made up of the source address (SA), destination address (DA), priority, and the payload or data. Once this phase is completed, a value called the TKIP-mixed transmit address and key (TTAK) is created. This value is used as a session-based WEP key in the second phase.
In the second phase, the TTAK and the IV are used to produce a key that encrypts the data. This is similar to how WEP is processed. In WEP the first 24 bits of the IV are added in front of the WEP key and then used to create an encryption key that is applied to the data. Then the IV is inserted into the packet header.
The basis of TKIP came from the WEP protocol. In the 802.11i standard, TKIP is referred to as a cipher suite enhancing the WEP protocol on pre- RSNA hardware. This is espoused because RC4 is still used as a cipher, although the technique in which it is used has improved greatly.
The article continues.....
Thanking you
Urproblemmysolution Team
Wednesday, December 23, 2009
How to stop Credit Card Fraud Physically
After long interval I am going to post a valuable comment of one of my valuable reader for you about how to stop Credit Card fraud physically i.e from clonning or skimming. Here it is for you:-
Sitanshu said...
Dear Sujit,
I wanted to post an article on countering Counterfeit Credit/Debit Card Fraud.
A world class security expert Mr. Tom Patterson has developed a technology that will stop Counterfeit credit/debit card fraud. The technology uses the fact that the Magnetic Sripe on a card is unique like DNA. No two cards have the same microstructure on the magnetic stripe.
MagTek Inc. where Mr. Patterson is the CSO has used this fact to combine the Personal Data of the Card holder and the uniqueness of the Magnetic Stripe holding that data to create a unique DIGITAL ID for each card holder. This way even you duplicate someone's card the Duplicate Produced will never match the original card's digital signature created by this Technology. The Technology is called "MagnePrint".
As long as any card uses Magnetic Stripe on the back using standard format (3 Lines) is concerned this technology will counter duplication. The Technology could be used for "Driver's License", "Credit Cards", "Debit Cards", University Exam Cards etc. It is cheaper than RFID and very very easy to use.
Hope your viewers will enjoy the article.
Warm Regards,
Sitanshu Ray
He also sent me a link from you tube about credit card skimming. I checked it and for that I would request you to visit the link and enjoy the video in the following link
http://www.youtube.com/watch?v=U0w_ktMotlo
paste it on your browser and visit
With Thanks
Urproblemmysolution Team
Thursday, August 13, 2009
For The Help of Police Officers
Gautam said...
PayPal is pleased to collaborate with the Government judicial authorities for repression of crimes committed by or to the detriment of their users.
Requests for information from law enforcement and the orders of
acquisitions data the court should be directed to PayPal (Europe)
s.àr.l. et Cie S.C.A, 5th Floor 22-24 Boulevard Royal L-2449. These
can be sent to the Fraud Investigation Team
Requests for information by the police include:
• Send by fax on letterhead of the applicant
• Sign in charge of the investigation
• Direct to PayPal (Europe) s.àr.l. et Cie S.C.A.
Each request for information should include the following information:
• The e-mail address.
• All addresses and telephone numbers of the person you investigated.
• Your name, address, department, telephone and fax.
• Specific details about the information you need and how they are
needed for your investigation
*** Please note that PayPal has more than 70 million users and thus
more details
you provide will be more easy for us to identify the information you
have requested ***
PayPal (Europe) Ltd is an institution for the issuance of electronic
money regulated by the Financial Services Authority of the United
Kingdom and must abide by the Data Protection Act in accordance with
the laws. Therefore, for the release of financial details or
information on transactions carried out by our members, you must order
expressed by the court.
So many many thanks to Mr. Sanjoy Goutam from the heart of Urproblemmysolution Team.
Tuesday, August 4, 2009
Fake SSL

Thursday, July 23, 2009
Best Cyber Security Expert Says
Dear Friends,
Today is our most happiest day for our blog as one of the bset Cyber Security Expert of the World Mr. Gunnar has made his comment on one of our posting on blog and that is on the topic "Pay Pal member beware from phishers and and cyber criminals". This is the most valuable comment of our blog so far and so we have decided to post it on the front page for your kind notice and future guideline. And here it is for you:-
Gunnar said...
Hi there,
I am a friend of Sitanshu Ray who forwarded me that link of your interesting blog.
Phishing mails like this will never stop in a principal way and of cause they can be danger like in this case.
This Phishing mail you posted looks like an "invitation" of a (so called) drive-by-infection. This means, if you open the link from this mail, your computer might get infected by a virus/trojan in a second without interaction. They might use unfixed or new vulnerabiliys in the browser and/or plugins to do that and its very possible that your antivirus didnt "know" that used virus/trojan. In worst case, your computer is after this a part of a botnet or they "only" steal data out of your computer like passwords, banking data etc.
If you check the main URL of this like, you will see that the owner of the domain is "inContact Inc." - a call center. Call Center often act like this and offer there service to "normal" companys i.e. to send out spam etc.
On the inContact Website you can also see the address of them: 7730 South Union Park Avenue, Suite 500 Salt Lake City, UT 84047 or check the nic.com with the whois data.
But the problem is: It's hard to attest them, that they send the phishing mail by themself. They can easily say someone (unknown) did it. But there are also some possibility to make traps for them that could it be possible to sue them ... ;-)
Kind regards
Gunnar
July 22, 2009 10:16 AM
Monday, July 6, 2009
Why do we need SHTTP
Why do we need SHTTP
Explanation given by Mr, Sitangshu on his earlier comment
Sitanshu said...
I posted a comment on yet another secured protocol called SHTTP as opposed to HTTPS (The more widely known secure protocol). However I failed to mention why SHTTP? when we already have HTTPS...
The answer is not that simple. You have to be an Architect to appreciate this. Still I think - I may have a way to explain this.
Please remember that the Internet Bandwidth (total spectrum) is limited. So even if we need added services such as "Secured Transmissions", we must try our best to minimize the use of that bandwidth. SHTTP allows you to just secure what should be secured rather than the entire transmission. In a banking transaction you have thousands of messages (Client Name, Address, Sex, Account Number, Father's name, Account Start Date, Starting Balance, Ending Balance, Credit Card number, etc.etc.)...
Why do I need to secure all this information. Just securing the "Credit card number" is enough. I do not even need to secure my "Bank Account Number". So what if someone knows my "Bank Account Number". SHTTP will make sure that I secure just the "Credit Card Number", whereas HTTPS will secure everything...Too much is wasted securing everything...
That is where SHTTP is handy. Secure what you need, not the entire transmission...
Hope I made my point...
Will give a few real examples in my next post.
Warm Regards,
Sitanshu
Saturday, June 27, 2009
Comment on Kind attention
June 27, 2009 6:59 AM
Reader Comment
I wanted to present some interesting statistics on this subject for your readers:
Pornography Time Statistics (As of 2006)
Every second - $3,075.64 is being spent on pornography
Every second - 28,258 Internet users are viewing pornography
Every second - 372 Internet users are typing adult search terms into search engines
Every 39 minutes: a new pornographic video is being created in the United States
Another interesting comment:
Countries where Laws against Pornography are strictest, the revenue from Pornography is highest. China has the strictest Pornography laws in the world including "Execution", yet has the highest revenue from Pornography - a whopping 27 Billion Dollars annually, followed by South Korea, Japan, United States and Australia.
Another interesting statistic:
The Pornography industry is larger than the revenues of the top technology companies combined: Microsoft, Google, Amazon, eBay, Yahoo!, Apple, Netflix and EarthLink
And finally: As an IT specialist having over 28 years experience in the Industry in many countries, I know for certain that the best "Software Developers" are those who have built porn sites. In fact all new trends in "Software Development" first show up in Porno films.....
Finally an important point and fact:
In general all countries ban "Child Pornography", and all countries barring a few allow people (adults) to possess Pornographic Material, but do not allow unlicensed sale. Selling is "unlawful".
Thanks for the wonderful blog. Keep writing
June 27, 2009 6:24 AM
Thanks to you Mr Sitangshu for enriching us.We hope please keep in touch with our blog and give your valueable comments.
Sunday, June 14, 2009
Valuable comment
Reader’s Comment
Hi Friends,
One of the readers of this blog has shared his valuable experience and has given a valuable comment about credit card here and I think I should publish this in my blog which will enrich all of us about credit card fraud. Thanks to you Mr. Sitangshu Ray.
His Valuable Comment here:-
Dear Sujit,
This is one of kind Blog that impressed me a great deal. Thanks for hosting this blog. I can see that a blog like this will go a long way in solving crimes, specially cyber crimes.
Just for your information, in the Western World, specially in USA,Canada and Europe, Hotel keys designed like credit card contain valuable personal information about the person staying in that hotel room. When you check into the hotel and give your credit card number for payment in advance, the room key (also a card with a magnetic strip) contains that information. When you leave the hotel, you return the room key, which is then stolen by criminal hotel employees to get your credit card information. This type of fraud happens a lot, but few people know about it.
Just a small tip...
Thanks for the wornderful site. Will continue watching its information and progress.
Great Job...
Sitanshu Ray