SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
http://nullcon.net




  NEW CONCEPTS
  DEFEATING
  WEB ATTACKS
(secure) SiteHoster
   Family Named:       AbhishekKr
    Friends Call:       ABK
    g33k Handle:        aBionic

   IndependentSecurity Enthusiast/Researcher
   Also a Member of „EvilFingers‟ (other than ‘NULL’)



   Application-Developer in ThoughtWorks Inc.
   OpenSource Lover

    http://null.co.in        http://nullcon.net   aBionic@twitter,linkedin,FB
   Other than expanding to (secure)SiteHoster




                 A Fresh               A Lab            (s)SH
                Approach                RAT




                http://sourceforge.net/projects/sitehoster

    http://null.co.in      http://nullcon.net   aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      It‟s The Same Old Problem



aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Same Old Problem

                      With A New Perspective To Solve It
aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      offensive security to secure



aBionic@
                      ATTACK THE ATTACKER
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Major Threats for Web Applications

                      Stats are not same     (of 2009)   …
aBionic@
twitter,linkedin,FB
                      But t h r e a t s             are
XSS Defeating Concept
    always aim the strongest opponent first,
    makes you win battle easily




http://null.co.in   http://nullcon.net   aBionic@twitter,linkedin,FB
IT IS JUST A PIECE OF CODE




                   aBionic@twitter,linkedin,FB
<TAGS/> R GooD




                 aBionic@twitter,linkedin,FB
And if it’s Code…




                    aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      !dea is to



aBionic@
                      BUG
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      3 Major XSS Attack Patterns
                      All Effect From Options of User Input, a Web2.0 Gift


aBionic@
twitter,linkedin,FB
+ Karthik calling Karthik…
http://null.co.in
                      + User (tricked) Input…



http://nullcon.net




                      Included or injected <script/>
                      What You See Is (*NOT*) What You Get


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Who calls, or who injects
                      What finally happens is unwanted <script/>


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Disarm <script/>
                      Take away all its POWER!!!!!


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Dis-Infect Entire Body
                      To kill all unwanted „Creepy-Living‟ Beings


aBionic@
twitter,linkedin,FB
Generated HyperText
                              <html>
  <head><script>function h(){alert(“some dev-script in HEAD
                    Tag”);}</script></head>
                              <body>
           <script DEFER>heavy_stuff=true;</script>
         name: <div id=”fromDB” onMouseOver=”h();”>
<script>alert(„attacker injected it, could do anything‟);</script>
                              </div>
                             </body>
                             </html>
                                             aBionic@twitter,linkedin,FB
Server Patched View
<html>
<head>
<script> function h(){alert(“this is dev-scripts in HEAD Tag”);}</script>
</head>
<BD>
<BODY >
<script DEFER>heavy_stuff=true;</script>
<script type='text/javascript'>
x=document.getElementsByTagName("BODY");
x[0].innerHTML = "name:<div id="fromDB" onclick="h();">
<script>alert('attacker injected it, could do anything');</script></div>“;
</script>
</BODY>
</BD>
</html>



                                                          aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      But… still 
                      …other two monkeys got a chance


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      „javascript:‟ may effect as



aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      So „javascript:<bugMe/>‟



aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      1 Monkey can wreck havoc
                      2 are pwn3d… but 3rd is powerful enough


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      „Be Kind‟ on Entropy
                      -says „JS-Events‟


aBionic@
twitter,linkedin,FB
http://null.co.in   http://nullcon.net   aBionic@twitter,linkedin,FB
Ninja Parse User Input




                         aBionic@twitter,linkedin,FB
Bug-it-su pwn JS-Events




                      aBionic@twitter,linkedin,FB
hardcore ‘js-events’ pwnage




                         aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      XSS Attack gets bugged
                      <TAGS/> go Green


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Innocence Is Saved
                      Normal User Input Matching Attack aint Filtered


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      All Monkeys Defeated
                      And so are Script-Junkies


aBionic@
twitter,linkedin,FB
CURRENTLY JUST DEV PERSPECTIVE




                    aBionic@twitter,linkedin,FB
For Un-Privileged AXNs




                         aBionic@twitter,linkedin,FB
Old Wine, Why Not Always Used


           DB

                          all                 boss
                                Read on                Read,write.*
                                Table T1


                                Read,Write
                                on Table t2

   User-        Web-App
  Mapper



                                 aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      & For Condition Match
                      An A Apple Hash A An Day Input
                      Keeps The Doctor Attacker Away
aBionic@
twitter,linkedin,FB
   I Tweet Tech:       http://www.twitter.com/aBionic
   I Blog Tech:        http://abhishekkr.wordpress.com/

   I OpenSource
       GitHub:         https://github.com/abhishekkr
       SourceForge:    http://sourceforge.net/users/abhishekkr

   I Socialize:        http://www.facebook.com/aBionic
   I Techalize:        http://in.linkedin.com/in/abionic
   I Deviantize:       http://abhishekkr.deviantart.com/


    http://null.co.in   http://nullcon.net   aBionic@twitter,linkedin,FB

Más contenido relacionado

La actualidad más candente

Who Wants to Use QR Codes
Who Wants to Use QR CodesWho Wants to Use QR Codes
Who Wants to Use QR Codes
Judy Horn
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
Prathan Phongthiproek
 
Free highpr backlinks
Free highpr backlinksFree highpr backlinks
Free highpr backlinks
eridesktop
 
Everything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to askEverything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to ask
Bill Slawski
 

La actualidad más candente (20)

Pr7 8 clubwear-and-party-wear
Pr7 8 clubwear-and-party-wearPr7 8 clubwear-and-party-wear
Pr7 8 clubwear-and-party-wear
 
Workshop : Facebook JavaScript SDK
Workshop : Facebook JavaScript SDKWorkshop : Facebook JavaScript SDK
Workshop : Facebook JavaScript SDK
 
Facebook Coin
Facebook CoinFacebook Coin
Facebook Coin
 
#Smx London SEO & Social Power tools
#Smx  London SEO & Social Power tools#Smx  London SEO & Social Power tools
#Smx London SEO & Social Power tools
 
Prashant Sridharan
Prashant SridharanPrashant Sridharan
Prashant Sridharan
 
Introduction to Facebook Javascript SDK (NEW)
Introduction to Facebook Javascript SDK (NEW)Introduction to Facebook Javascript SDK (NEW)
Introduction to Facebook Javascript SDK (NEW)
 
Facebook Connect Integration
Facebook Connect IntegrationFacebook Connect Integration
Facebook Connect Integration
 
Использование социальных сетей и микроблогов для бизнеса
Использование социальных сетей и микроблогов для бизнесаИспользование социальных сетей и микроблогов для бизнеса
Использование социальных сетей и микроблогов для бизнеса
 
API Design - 3rd Edition
API Design - 3rd EditionAPI Design - 3rd Edition
API Design - 3rd Edition
 
How to use blogging for an allergist's practice
How to use blogging for an allergist's practiceHow to use blogging for an allergist's practice
How to use blogging for an allergist's practice
 
Who Wants to Use QR Codes
Who Wants to Use QR CodesWho Wants to Use QR Codes
Who Wants to Use QR Codes
 
Pragmatic RESTful API Design: Apigee Webinar
Pragmatic RESTful API Design: Apigee WebinarPragmatic RESTful API Design: Apigee Webinar
Pragmatic RESTful API Design: Apigee Webinar
 
The duck soup link building guide
The duck soup link building guideThe duck soup link building guide
The duck soup link building guide
 
Online Reputation Management presentation
Online Reputation Management presentationOnline Reputation Management presentation
Online Reputation Management presentation
 
I phone by tanbircox
I phone by tanbircoxI phone by tanbircox
I phone by tanbircox
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
 
Free highpr backlinks
Free highpr backlinksFree highpr backlinks
Free highpr backlinks
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
Everything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to askEverything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to ask
 
Happy facebook developer
Happy facebook developerHappy facebook developer
Happy facebook developer
 

Similar a Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'

Getting Stuff In And Out Of Buzz (1)
Getting  Stuff In And Out Of  Buzz (1)Getting  Stuff In And Out Of  Buzz (1)
Getting Stuff In And Out Of Buzz (1)
Paul Kinlan
 
MozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social Design
Mat Clayton
 
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin DevelopmentAtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
mrdon
 

Similar a Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011' (20)

Fabian Williams SharePoint Saturday New York BCS Deck
Fabian Williams SharePoint Saturday New York BCS DeckFabian Williams SharePoint Saturday New York BCS Deck
Fabian Williams SharePoint Saturday New York BCS Deck
 
Getting Stuff In And Out Of Buzz (1)
Getting  Stuff In And Out Of  Buzz (1)Getting  Stuff In And Out Of  Buzz (1)
Getting Stuff In And Out Of Buzz (1)
 
Introduction to Facebook JavaScript & Python SDK
Introduction to Facebook JavaScript & Python SDKIntroduction to Facebook JavaScript & Python SDK
Introduction to Facebook JavaScript & Python SDK
 
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
 
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware TriageЭкспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
 
Let's Build a Chatbot
Let's Build a ChatbotLet's Build a Chatbot
Let's Build a Chatbot
 
Grand Rapids PHP Meetup: Behavioral Driven Development with Behat
Grand Rapids PHP Meetup: Behavioral Driven Development with BehatGrand Rapids PHP Meetup: Behavioral Driven Development with Behat
Grand Rapids PHP Meetup: Behavioral Driven Development with Behat
 
How to Build Innovative Technologies
How to Build Innovative TechnologiesHow to Build Innovative Technologies
How to Build Innovative Technologies
 
How i hacked programer computer
How i hacked programer computerHow i hacked programer computer
How i hacked programer computer
 
Introduction to python scrapping
Introduction to python scrappingIntroduction to python scrapping
Introduction to python scrapping
 
REST API Pentester's perspective
REST API Pentester's perspectiveREST API Pentester's perspective
REST API Pentester's perspective
 
Building Facebook Apps
Building Facebook AppsBuilding Facebook Apps
Building Facebook Apps
 
Introduction to Social Networking Sites and websites
Introduction to Social Networking Sites and websitesIntroduction to Social Networking Sites and websites
Introduction to Social Networking Sites and websites
 
Idea2app
Idea2appIdea2app
Idea2app
 
Android.AntiSpam Lab
Android.AntiSpam LabAndroid.AntiSpam Lab
Android.AntiSpam Lab
 
10 Evil(ish) Things and how they relate to Features Engineering at the WMF
10 Evil(ish) Things and how they relate to Features Engineering at the WMF10 Evil(ish) Things and how they relate to Features Engineering at the WMF
10 Evil(ish) Things and how they relate to Features Engineering at the WMF
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
 
MozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social Design
 
twitter ppt .pptx
twitter ppt                                  .pptxtwitter ppt                                  .pptx
twitter ppt .pptx
 
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin DevelopmentAtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
 

Más de Abhishek Kumar

An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring
Abhishek Kumar
 

Más de Abhishek Kumar (17)

Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
DevOps?!@
DevOps?!@DevOps?!@
DevOps?!@
 
xml-motor ~ What,Why,How
xml-motor ~ What,Why,Howxml-motor ~ What,Why,How
xml-motor ~ What,Why,How
 
XML-Motor
XML-MotorXML-Motor
XML-Motor
 
DevOps with Sec-ops
DevOps with Sec-opsDevOps with Sec-ops
DevOps with Sec-ops
 
Syslog Centralization Logging with Windows ~ A techXpress Guide
Syslog Centralization Logging with Windows ~ A techXpress GuideSyslog Centralization Logging with Windows ~ A techXpress Guide
Syslog Centralization Logging with Windows ~ A techXpress Guide
 
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress GuideSquid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
 
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress GuideEthernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
 
Solaris Zones (native & lxbranded) ~ A techXpress Guide
Solaris Zones (native & lxbranded) ~ A techXpress GuideSolaris Zones (native & lxbranded) ~ A techXpress Guide
Solaris Zones (native & lxbranded) ~ A techXpress Guide
 
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidthAn Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
 
An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring
 
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & GraphingAn Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
 
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAn Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
 
XSS Defeating Concept - Part 2
XSS Defeating Concept - Part 2XSS Defeating Concept - Part 2
XSS Defeating Concept - Part 2
 
XSS Defeating Trick ~=ABK=~ WhitePaper
XSS Defeating Trick ~=ABK=~ WhitePaperXSS Defeating Trick ~=ABK=~ WhitePaper
XSS Defeating Trick ~=ABK=~ WhitePaper
 
FreeSWITCH on RedHat, Fedora, CentOS
FreeSWITCH on RedHat, Fedora, CentOSFreeSWITCH on RedHat, Fedora, CentOS
FreeSWITCH on RedHat, Fedora, CentOS
 

Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'

  • 1. http://nullcon.net NEW CONCEPTS DEFEATING WEB ATTACKS (secure) SiteHoster
  • 2. Family Named: AbhishekKr Friends Call: ABK g33k Handle: aBionic  IndependentSecurity Enthusiast/Researcher  Also a Member of „EvilFingers‟ (other than ‘NULL’)  Application-Developer in ThoughtWorks Inc.  OpenSource Lover http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 3. Other than expanding to (secure)SiteHoster A Fresh A Lab (s)SH Approach RAT http://sourceforge.net/projects/sitehoster http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 4. http://null.co.in http://nullcon.net It‟s The Same Old Problem aBionic@ twitter,linkedin,FB
  • 5. http://null.co.in http://nullcon.net Same Old Problem With A New Perspective To Solve It aBionic@ twitter,linkedin,FB
  • 6. http://null.co.in http://nullcon.net offensive security to secure aBionic@ ATTACK THE ATTACKER twitter,linkedin,FB
  • 7. http://null.co.in http://nullcon.net Major Threats for Web Applications Stats are not same (of 2009) … aBionic@ twitter,linkedin,FB But t h r e a t s are
  • 8. XSS Defeating Concept always aim the strongest opponent first, makes you win battle easily http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 9. IT IS JUST A PIECE OF CODE aBionic@twitter,linkedin,FB
  • 10. <TAGS/> R GooD aBionic@twitter,linkedin,FB
  • 11. And if it’s Code… aBionic@twitter,linkedin,FB
  • 12. http://null.co.in http://nullcon.net !dea is to aBionic@ BUG twitter,linkedin,FB
  • 13. http://null.co.in http://nullcon.net 3 Major XSS Attack Patterns All Effect From Options of User Input, a Web2.0 Gift aBionic@ twitter,linkedin,FB
  • 14. + Karthik calling Karthik… http://null.co.in + User (tricked) Input… http://nullcon.net Included or injected <script/> What You See Is (*NOT*) What You Get aBionic@ twitter,linkedin,FB
  • 15. http://null.co.in http://nullcon.net Who calls, or who injects What finally happens is unwanted <script/> aBionic@ twitter,linkedin,FB
  • 16. http://null.co.in http://nullcon.net Disarm <script/> Take away all its POWER!!!!! aBionic@ twitter,linkedin,FB
  • 17. http://null.co.in http://nullcon.net Dis-Infect Entire Body To kill all unwanted „Creepy-Living‟ Beings aBionic@ twitter,linkedin,FB
  • 18. Generated HyperText <html> <head><script>function h(){alert(“some dev-script in HEAD Tag”);}</script></head> <body> <script DEFER>heavy_stuff=true;</script> name: <div id=”fromDB” onMouseOver=”h();”> <script>alert(„attacker injected it, could do anything‟);</script> </div> </body> </html> aBionic@twitter,linkedin,FB
  • 19. Server Patched View <html> <head> <script> function h(){alert(“this is dev-scripts in HEAD Tag”);}</script> </head> <BD> <BODY > <script DEFER>heavy_stuff=true;</script> <script type='text/javascript'> x=document.getElementsByTagName("BODY"); x[0].innerHTML = "name:<div id="fromDB" onclick="h();"> <script>alert('attacker injected it, could do anything');</script></div>“; </script> </BODY> </BD> </html> aBionic@twitter,linkedin,FB
  • 20. http://null.co.in http://nullcon.net But… still  …other two monkeys got a chance aBionic@ twitter,linkedin,FB
  • 21. http://null.co.in http://nullcon.net „javascript:‟ may effect as aBionic@ twitter,linkedin,FB
  • 22. http://null.co.in http://nullcon.net So „javascript:<bugMe/>‟ aBionic@ twitter,linkedin,FB
  • 23. http://null.co.in http://nullcon.net 1 Monkey can wreck havoc 2 are pwn3d… but 3rd is powerful enough aBionic@ twitter,linkedin,FB
  • 24. http://null.co.in http://nullcon.net „Be Kind‟ on Entropy -says „JS-Events‟ aBionic@ twitter,linkedin,FB
  • 25. http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 26. Ninja Parse User Input aBionic@twitter,linkedin,FB
  • 27. Bug-it-su pwn JS-Events aBionic@twitter,linkedin,FB
  • 28. hardcore ‘js-events’ pwnage aBionic@twitter,linkedin,FB
  • 29. http://null.co.in http://nullcon.net XSS Attack gets bugged <TAGS/> go Green aBionic@ twitter,linkedin,FB
  • 30. http://null.co.in http://nullcon.net Innocence Is Saved Normal User Input Matching Attack aint Filtered aBionic@ twitter,linkedin,FB
  • 31. http://null.co.in http://nullcon.net All Monkeys Defeated And so are Script-Junkies aBionic@ twitter,linkedin,FB
  • 32. CURRENTLY JUST DEV PERSPECTIVE aBionic@twitter,linkedin,FB
  • 33. For Un-Privileged AXNs aBionic@twitter,linkedin,FB
  • 34. Old Wine, Why Not Always Used DB all boss Read on Read,write.* Table T1 Read,Write on Table t2 User- Web-App Mapper aBionic@twitter,linkedin,FB
  • 35. http://null.co.in http://nullcon.net & For Condition Match An A Apple Hash A An Day Input Keeps The Doctor Attacker Away aBionic@ twitter,linkedin,FB
  • 36. I Tweet Tech: http://www.twitter.com/aBionic  I Blog Tech: http://abhishekkr.wordpress.com/  I OpenSource  GitHub: https://github.com/abhishekkr  SourceForge: http://sourceforge.net/users/abhishekkr  I Socialize: http://www.facebook.com/aBionic  I Techalize: http://in.linkedin.com/in/abionic  I Deviantize: http://abhishekkr.deviantart.com/ http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB