Thursday, July 19, 2012

CCTNS - Crime and Criminal Tracking Network & Systems | P. Chidambaram




The Cabinet Committee on Economic Affairs extends the term of the Crime and Criminal Tracking Network & Systems (CCTNS) project in New Delhi.



CCTNS vs Amarjit Singh OR Rajasthan Police vs Tulip Telecom Ltd ? 

These days I am at Jaipur, working as Team Lead Change Management & Capacity Building for Rajasthan Police on Crime and Criminal Tracking Network & Systems ( CCTNS ) project. Tulip secured this three-year order worth Rs 48.88 crore from the Rajasthan government under the central government-funded Rajasthan State Crime and Criminal Tracking Network and Systems (CCTNS) project.


Crime & Criminals Tracking Network and Systems (CCTNS) project is a Mission Mode Project under the National e- Governance Plan (NeGP). This is an effort of the Government of India to modernize the police force giving top priority to citizen services, information gathering, and its dissemination among various police organizations and units across the country.

CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level through adoption of principles of e-Governance, and creation of a nationwide networked infrastructure for evolution of IT-enabled state- of-the-art tracking system around"investigation of crime and detection of criminals" in real time, which is a critical requirement in the context of the present day internal security scenario.


Monday, July 16, 2012

CCTNS vs Amarjit Singh OR Rajasthan Police vs Tulip Telecom Ltd ?

CCTNS vs Amarjit Singh OR Rajasthan Police vs Tulip Telecom Ltd ? 

These days I am at Jaipur, working as Team Lead Change Management & Capacity Building for Rajasthan Police onCrime and Criminal Tracking Network & Systems ( CCTNS ) project. Tulip secured this three-year order worth Rs 48.88 crore from the Rajasthan government under the central government-funded Rajasthan State Crime and Criminal Tracking Network and Systems (CCTNS) project.


Crime & Criminals Tracking Network and Systems (CCTNS) project is a Mission Mode Project under the National e- Governance Plan (NeGP). This is an effort of the Government of India to modernize the police force giving top priority to citizen services, information gathering, and its dissemination among various police organizations and units across the country.

CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level through adoption of principles of e-Governance, and creation of a nationwide networked infrastructure for evolution of IT-enabled state- of-the-art tracking system around "investigation of crime and detection of criminals" in real time, which is a critical requirement in the context of the present day internal security scenario.

About CCTNS

Crime and Criminal Tracking Network & Systems (CCTNS) is a plan scheme conceived in the light of experience of a non-plan scheme namely - Common Integrated Police Application (CIPA). CCTNS is a Mission Mode Project under the National e-Governance Pan of Govt of India. CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effectiveness of policing through adopting of principle of e-Governance and creation of a nationwide networking infrastructure for evolution of IT-enabled-state-of-the-art tracking system around 'Investigation of crime and detection of criminals'. An allocation of Rs. 2000 crores has been made for CCTNS Project. Cabinet Committee on Economic Affairs (CCEA) has approved the project on 19.06.2009. Expression of Interest (EOS) has been invited from the Software developers by 17.08.2009. We are in the process of finalizing an MoU between NCRB on behalf of Government of India and the Software Developing Agency.

Objectives of 'CCTNS'

The objectives of the Scheme can broadly be listed as follows:
1. Make the Police functioning citizen friendly and more transparent by automating the functioning of Police Stations.
2. Improve delivery of citizen-centric services through effective usage of ICT.
3. Provide the Investigating Officers of the Civil Police with tools, technology and information to facilitate investigation of crime and detection of criminals.
4. Improve Police functioning in various other areas such as Law and Order, Traffic Management etc.
5. Facilitate Interaction and sharing of Information among Police Stations, Districts, State/UT headquarters and other Police Agencies.
6. Assist senior Police Officers in better management of Police Force
7. Keep track of the progress of Cases, including in Courts
8. Reduce manual and redundant Records keeping

Under the CCTNS Project, approx. 14,000 Police Stations throughout the country has been proposed to be automated beside 6000 higher offices in police hierarchy e.g. Circles, Sub-Divisions, Districts, Range, Zones, Police Headquarters, SCRBx including scientific and technical organizations having databases required for providing assistance and information for investigation and other purposes e.g. Finger Print Bureaux, Forensic Labs etc. by 2012.
CCTNS- Important Guidelines / Templates/ Information on CCTNS from MHA / NCRB

 



CCTNS – Important Guidelines

CCTNS - Monitoring Formats
1.
2.
3.
4.
5.

CCTNS – Useful information for SPMC
1. PIM template
2. Model Request For Proposal (RFP) for Selection of System Integrator (SI) at the States
3. Functional Requirements Specification (FRS) for the Core Application Software (CAS):            01 Registration Module            02 Investigation Module            03 Prosecution Module            04 Search Module            05 Citizen interface Module            06 Navigation Module            07 Configuration Module
CCTNS – Training related Information
        a. EOI for CCTNS          b. EOI for CCTNS in Hindi        c. Corrigendum


CCTNS in Media



1.
2.
3.
4.
5.
6.
7.
8.
9.
10.


IT BASIC COURSE FOR CCTNS IN HINDI



Friday, May 18, 2012

Why Kindle App Decided to Go for Fresh New Look, New High Resolution Graphics for New iPad


Introduction

Recently, the new iPad was launched. Apple has high hopes from their latest device and the sales indicate that their expectations will be fulfilled. There has been much hype and hoopla surrounding the new features that have been incorporated into the new iPad. The most prominent feature is the new high resolution retina display. It provides outstanding picture clarity and makes the iPad the ideal device for reading a book on. In keeping with the upgraded display, the Kindle app has been modified as well. It is has adopted a fresh new look complete with high resolution graphics. Amazon’s move to make the Kindle app suitable to the new iPad has caught the attention of everyone including industry insiders, market experts and broadband plans providers. They are musing over why they went to the trouble of upgrading their app.

The Background

Around the time of the new iPad’s launch, Amazon also launched a new version of its Kindle Fire. As you know, the Kindle is a reading tablet. People can download, read and store their books on the Kindle. However, the Kindle Fire was initially crushed by the strong sales of the new iPad. Because their gadget didn’t work out, Amazon wasted no time in putting out an app for the iPad. While this is a strong reason for their decision, there are some other reasons why Kindle app decided to go for a fresh new look and new high resolution graphics for new iPad.

Why the Kindle App Was Upgraded

Compatibility

As mentioned above, the new iPad comes with a superior display that provides clearer images. Apple itself has worked on the iBooks app to improve it for the new iPad. Hence, it is no surprise that Amazon followed suit with the Kindle app. It was obvious that unless they make an effort to improve the existing app, there was no way people are going to download it.


User Friendliness

This point ties in with the previous one. People have an alternative eBook reading app with iBooks. The Kindle is considered to be better than that because of the number of books on offer. However, iBooks is much more user friendly for the owners of the new iPad. It has been upgraded and modified to suit the new device. The older version of the iBooks app has been discarded in favor of the new one.

Competition

The iBooks app is not the only competition for the Kindle app. There are various other reading apps available for free to the iPad users. If they are not satisfied with any one, they can switch to another one. That being said, the other e-reading apps (Nook and Kobo) have not yet been upgraded. It is expected that the makers will adapt them to become suitable for the new iPad in the near future. Till then, the users have to make do with iBooks or the Kindle app.

No Links for Buying Books

One thing the Kindle app sorely misses is a direct link to the Amazon store so that people can purchase the books directly. As they were unable to find a way to make this work, they had to target another area, which they did. By enhancing the quality of their app, they have ensured that the users won’t be turned off by not having a direct link through to the Amazon website. As for users who want access, they can bookmark the link to the Amazon store in the Safari browser.

A Touch of Kindle Fire

Amazon has shrewdly included some features in the app that make it work as if the user was reading on a Kindle Fire. The dwindling demand for their gadget has affected the sales badly. By providing the iPad users some experience of what they gain by buying the Kindle Fire, they might be able to convince a few to buy their gadget. It is a subtle yet smart move on part of Amazon to somehow boost the sales of the Kindle Fire.

Conclusion

Industry experts and broadband plans providers know the Kindle Fire stands no chance in comparison to the new iPad. The only option left to Amazon was to enhance the Kindle app which they have done. You can download the new look Kindle app with high resolution graphics to get access to their library which has over a million eBooks for your reading pleasure.

Friday, May 4, 2012

Exclusive Interview of Rahul Tyagi: Author of “Hacking Crux 2

Exclusive Interview of Rahul Tyagi: Author of “Hacking Crux 2 

Source: Softpedia 

Rahul Tyagi, a respected ethical hacker from India, is about to release his latest work, a book called “Hacking Crux 2.” This is meant as a guide to anyone who wants to learn about hacking and defending themselves and others against cybercriminal plots. 


Because the book looks very promising, we have decided to interview the author to find out more about his work and his new creation. Besides discussing his contributions to the IT security industry, Tyagi also shared his insight regarding the fact that many Indian ethical hackers are called fakes. 

Softpedia: Please introduce yourself for our readers.

Rahul Tyagi: My name is Rahul Tyagi and I am 24 years old. I am a person for whom work is more important than anything in the world. I was born in a middle class family in Gurdaspur, a small city in Punjab. My father is an accountant and my mother is a housewife. I love to interact with new people and share knowledge.

At the age of 17 my father brought the first PC to my home for his accounting work. I remember spending hours on my father's computer, getting in trouble for messing things up. It occurred to me that the only way you really learn about something is by breaking it, then fixing it. 

I am Lapi-Worm kinda person who works 24/7 on a laptop for many days without sleep. My mind always thinks of something, my mind never stays free. Because one thing I learnt in my life: a free mind is the house of Ghost. I admire Steve Jobs and I want to contribute to the cyber society just like him. 

Softpedia: What qualifies you as an ethical hacker? Tell us about your previous experience and studies.

Rahul Tyagi: Well, first I will try to explain the meaning and responsibility of an ethical hacker. According to me, an ethical hacker is a computer geek, who obviously thinks more out of the box than other computer lovers. The main responsibility of an ethical hacker is to protect people from the cyber space attacks. 

Protection can be at corporate level by securing their servers, by patching the web vulnerabilities or maybe securing a common man’s Gmail account by adding two-step verification on his/her account. 

I think I have trained more than 10,000 people from all around the world physically and online in the last 7 years, and today if they are using their computers and internet freely without any problems then I think my work is done. 

I did my pre schooling from my hometown. I have obtained a bachelor’s degree in Computer Applications at the Punjab Technical University. After my three year graduation I got admitted to India’s largest university, the Lovely Professional University (LPU) for my masters, i.e, Master in Computer Applications (MCA), and that was my life’s best decision. 

At LPU I learned a lot because there I found the best infrastructure required for penetration testing. I hacked into LPU’s University Management System twice and found much vulnerability in the network, but instead of doing harm I reported the vulnerability to the authorities there. 

In my 5th semester of masters I got placed in TCIL-IT Chandigarh as their brand ambassador and that was something big for me. Later I was selected as Vice-President of Cyber Security and Anti-Hacking Org India. Last, but not least, I am working as the Technical Head at the News Paper Association of India. 

For the past two years I have been associated with DEF CON India meets and I was one of the leading speakers in DEF CON Chennai, where I presented my paper named “Busting Windows in Backtrack 5” and DEF CON Rajasthan, where I presented my paper called “The Endless Fight with Global Cyber Crime”. 

This month you can see my article in one of the reputable security magazines named Pen Test. 

Softpedia: Tell us a little bit about your new book “Hacking Crux 2”. What IT security topics does it cover?

Rahul Tyagi: Hacking Crux 2 is a book which is like a mirror of me. Everything that I learned in the past I’ve put into this book. I had many issues with the content of the book, but after 8 months of “blood burn effort” from my part and my publisher, Mr. Dev, I am happy to present Hacking Crux 2. 

Initially I wanted to publish it in January, but after that I decided to make it more knowledgeable and I tried to cover every aspect related to computer security in it. We tried to make this a lively book, having 90% screenshots for the readers so that it will be easy for them to implement testing by just watching the pictures, rather than reading theory.

Here are the chapters of the book:

1. Introduction to Ethical Hacking
2. Information Gathering
3. Advance Google Hacking
4. Trojan and Backdoors
5. Binder and Crypters
6. Website Hacking Techniques 
7. Spamming Techniques
8. Email Hacking and Countermeasures 
9. Advance System Hacking 
10. Steganography Terrorist’s Way
11. Basics of Python for Coders
12. Virus and Worms
13. Proxy Servers ad VPN
14. Exploit Launching with Perl
15. Advance Mobile Hacking 
16. Wireless Attacks
17. Penetration Testing With Backtrack 5 R1 

We have a total of 17 chapters covering every possible ethical hacking module. The main highlighted topics of the book are Binder and Crypters, Advance System Hacking, Email Hacking and Countermeasures, Exploit Launching in Perl, Advance Mobile Hacking , Penetration Testing With Backtrack 5, and, last but not least, my favorite, Basics of Python. 

This is the first book on ethical hacking ever published in India having so many chapters at such a small price, i.e. INR150 , under 5 USD. 

I tried to make this book as informative as possible so that after reading this book no one will need to join any expensive ethical hacking courses. If you believe my words, then Hacking Crux 2 contains all you ever need and wish to know about the so-called “Ethical Hacking”. 

Softpedia: When will the book be released and where will it be available?

Rahul Tyagi: We are trying to publish it worldwide through eBay, Amazon, Flipkart, Snapdeal to our international readers before May 15. Indian readers can get this book from any nearby bookstore starting with the last week of May or the first week of June. Also, online purchasing options like Flipkart and Snapdeal will be available. 

And if someone is facing any problems then they can send an order to hackingcrux2@gmail.com. 

Softpedia: In the past period many Indian ethical hackers have been named fakes and mere marketing stunts. On the other hand, we have white hats, such as Himanshu Sharma, who try to wash away this stained reputation gained by many Indian security experts. What makes you different from the fakes? What do you hope to achieve with this book and with your work?

Rahul Tyagi: If you talk about Himanshu, then yes, he is like my younger brother. Even though he is younger than me, I still respect his talent from the bottom of my heart. 

Now, let’s talk about some fake hackers. According to me, there are some reasons why people call some Indian ethical hackers fake.

The first reason is that many ethical hackers claim to be great in their work, but if you talk about statistics, then they are ZERO. You can take a look at attrition.org. 

They exposed many ethical hackers who were just fooling people with ethical hacking courses, but in reality the things they teach are just internet filtering techniques and tricks, which, from my point of view, are not going to help any person get a reputed job in any company. 

That’s why those who have done the ethical hacking certification from these kinds of hackers later abuse them and say that they were fake hackers, who cheated them.

The second reason is that people from the cyber world these days are becoming smarter day by day. They are bored with traditional hacking tricks, hacking websites with SQL Injection, NETBUS, Proxy servers and other “noobish” things, which today anyone can do even at the age of 10. So if you are repeating the same and same thing from 2000 to 2012, then obviously you deserve the tag of fake hacker.

As far as I am concerned, it’s not that I don’t have critics, but today almost all white hat and black hat communities know me, respect me and motivate me. I have many friends from both black and white hat communities who from time to time help me upgrade myself. 

This is why I was the first white hat ethical hacking trainer who spoke at DEF CON meets in India. My paper is there in Exploit-DB and Packetstorm Security and if you compare this fact with the ethical hackers tagged as fakes, they don’t submit any papers and they never dare to enter into conferences like DEF CON and NULLCON.

The only thing that makes me different from other ethical hackers is that I do not forget my past, from where I rose. Even though I have 38k followers on Twitter and 5k friends on Facebook , I reply to every possible query they ask me. 

I also believe in contributing with new stuff to cyber space, hence a few months back, I released a full Python language-learning course on YouTube and it was the first ever basic Python video lectures series made by an Indian ethical hacker. 

With all this I don’t think anyone can say I am a fake hacker. If anyone wants to say that, I ask him/her to compare my contribution with the ones of other fake ethical hackers and, they will get their answer automatically.

Finally, I hope my new book Hacking Crux 2 will help you to learn all the hidden areas of ethical hacking, especially ones that are never revealed by any ethical hacker, ever. I promise that if you trust me and buy this book you will thank me for sure.

You can contact me on: FacebookTwitter or by e-mail. 

Monday, April 30, 2012

Learn How to Establish a NULL Session

  1. The NULL session is used on Windows computers via the Inter-Communication Process (IPC$) to allow the viewing of shared resources. 
  2. This connection is made without a username or password.
  3. An attacker will use the NULL session to enumerate user information from the target.
  4. From command prompt enter the following syntax: net use \\Target IP Address\IPC$ ""/u:""
  5. When successful, the result will show The command completed successfully and this is not logged in the System Event Log.

Learn How to Scan all open TCP and UDP ports using VISION

Vision, a host based Forensic Utility is the GUI successor to the well-known freeware tool, Fport. This innovative new product from Foundstone shows all of the open TCP and UDP ports on a machine, displays the service that is active on each port, and maps the ports to their respective applications. Vision allows users to access a large amount of supplementary information that is useful for determining host status by displaying detailed system information, applications running, as well as processes and ports in use.

Key Features
  • Interrogate ports and identify potential "Trojan" services by using the "Port Probe" command in the port mapper. Using "Port Probe", Vision will enable you to send a customized string of information to the port. Based on the response from the port, a determination can be made to either kill the port, using the "Kill" command, or leave it as is.
  • View system events by sorting by application, process, service, port, remote IP, and device drivers in ascending or descending order.
  • Identify and review detailed information about Services and Devices to determine if they are Running or Stopped.
List Applications Running

List Services Running


List Devices Running


Faq

Q. Will Vision work on Windows 9x, Me, or XP?
A. Vision will not work on Windows 9x, or Me. It will work with Windows XP.

Q. I get “Must be Admin” error when trying to launch. I am the Administrator, so what’s the problem?
A. Check to ensure that nbt binding is enabled. In NT 4 this is done in your network interface bindings. Under Win2k check to ensure that you have the TCP/IP Netbios helper enabled.

System Requirements
  • NT 4/ Win 2000
  • NT 4 needs psapi.dll
  • 800x600 res. minimum
  • 256 colors min
  • 32MB

SOURCE: http://www.foundstone.com

Sunday, April 29, 2012

Simple security audit & Penetration test tool HackBar 1.4.2 download for free: Its Add-ons for Firefox

Version 1.4.2
Works with Firefox: 1.5 – 3.6.*
Updated May 13, 2009
Developer Johan Adriaans
Rating Rated 5 out of 5 stars

# In general
This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster. If you want to learn to find security holes, you can also use this toolbar, but you will probably also need a book, and a lot of google :)

# The advantages are:
- Even the most complicated urls will be readable
- The focus will stay on the textarea, so after executing the url (ctrl+enter) you can just go on typing / testing
- The url in textarea is not affected by redirects.
- I tend to use it as a notepad :)
- Useful tools like on the fly uu/url decoding etc.
- All functions work on the currently selected text.


# Load url ( alt a )
This loads the url of the current page into the textarea.

# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character

# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter

# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.

# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.

# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))

# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))

# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.

# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or --

And lots more ;) Go test it!


Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.