Thursday, December 18, 2008

Sniff the Sniffer in your Network !!!

Have you ever puzzled with question that how you are going to detect the network sniffer in your Network ?
Yes I did..
Till yesterday it was my assumption that to detect a sniffing device that only collects data and does not respond to any of the information, requires physically checking all your Ethernet connections by walking around and checking the ethernet connections individually. It is also impossible to remotely check by sending a packet or ping if a machine is sniffing.
Question is quite obvious but never strike in my mind. Because I always see sniffing tool as a helping hand for me to troubleshoot and detect the problem. But what about the bad guys mind. Tool is so powerful think what all different kind of damage it can make to business?
So as soon as someone strikes my mind how you can detect the network sniffer logical answer came on my mind is tune Honey pot or Tools of KNOPPIX to detect the sniffer in network.
I know you might be thinking How and why ?
Even though I was also not clear how I am going to do this but quite confident that ICMP packets analysis will do something for me ..

Yes I was correct and when I did the research on topic got following information. The first example is the method which strikes my mind immediately. Other method I learned while doing a research on subject. I got reference of some of the readymade tools too. Hope you are going use this information.

Determining Sniffer with the Help of ICMP
Their are various test can be performed on ICMP Packet to Identify the sniffing capability.
**ICMP Time Delta test
This test uses baseline results to determine network and machine latency. AntiSniff probes the host by sending ICMP echo request messages with microsecond timers to determine the average response time. After the baseline has been created, it floods the local network with non-legitimate traffic.During the flood of traffic, it sends another round of ICMP echo request probes to determine the average response time. Hosts in promiscuous mode have a much higher latency time.
**Echo test
This test is actually an option for the ICMP Time Delta test. The user has the option to use the ECHO service for time deltas, if it’s available on the remote host.
**Ping Drop test
This test is also run during the flood of traffic. It involves sending a large amount of ICMP echo request messages to the host. It keeps track of the number of dropped ping responses. When a host is in promiscuous mode it will have a much higher level of network traffic to process leading to network latency which causes the host to drop packets because it can’t keep up.
I found that apart from ICMP there are some other factors of machine which can help to detect the Sniffers.

##Network and machine latency tests
These last sets of tests are here because hosts in promiscuous mode don’t have low level hardware filtering. This dramatically increases network traffic not meant for the host leading to the OS kernel
to do the filtering. The increased filtering done by the kernel causes more latency. The following tests will be explained: ICMP Time Delta test, Echo test, and the Ping Drop test.

##Ether Ping test
In older Linux kernels there is a specific condition that allows users to determine whether a host is in promiscuous mode or not. When a network card is placed in promiscuous mode every packet is passed on to the OS. Some Linux kernels looked only at the IP address in the packets to determine whether they should be processed or not. To test for this flaw, AntiSniff machine sends a packet with a bogus
MAC address and a valid IP address. Vulnerable Linux kernels with their network cards in promiscuous mode only look at the valid IP address. To get a response, an ICMP echo request message is sent within the bogus packet leading to vulnerable hosts in promiscuous mode to respond.

##ARP test
This test is to exploit the flaw found in they way Microsoft operating systems analyze broadcast ARP packets. This is found in Microsoft Windows 95, 98, and NT. When in promiscuous mode the driver for the network card checks for the MAC address being that of the network card for unicast packets, but only checks the first octet of the MAC address against the value 0xff to determine if the packet is broadcast or not. Note that the address for a broadcast packet is ff:ff:ff:ff:ff:ff. To test for this flaw,AntiSniff sends a packet with a MAC address of ff:00:00:00:00:00 and the correct destination IP address of the host. After receiving a packet, the Microsoft OS using the flawed driver will respond while in promiscuous mode. It should be noted that this flaw is based on the default Microsoft driver shipped with the OS.

##DNS test
This test is here because many packet sniffing tools perform IP address to name lookups to provide DNS names in place of IP addresses. This information is useful to attackers because most of the time hosts are named for what they provide. An example would be a mail server being named mail.keekar.com. Hosts not watching traffic destined to them will not attempt to resolve the IP addresses in the packets. To test this, AntiSniff places the network card into promiscuous mode and sends packets out onto the network aimed to bogus hosts. If any name lookups from the bogus hosts are seen, a sniffer might be in action on the host performing the lookups.

I know above detailing is kind of boring for lots of people because they believe in practical and some time does not have time to look on to the concepts. Because they are not interested to build such tool. So good news for all those people. There are ready made tools available and one of them is from Microsoft employee. Don't be septic with Microsoft Name.
It's a project by Tim Rains and he named it Promqry. According to Tim Rains many network sniffer detection tools rely on bugs in the operating system and sniffer behavior for their discovery work. Promqry is different in that it can query systems to learn if any have a network interface operating in promiscuous mode, which as you know is a mode commonly use by network sniffing software. A command line version and a version with a GUI of Promqry 1.0 is available at Microsoft’s site.

A command line version:
http://www.microsoft.com/downloads/details.aspx?FamilyID=4df8eb90-83be-45aa-bb7d-1327d06fe6f5&DisplayLang=en

A version with a GUI:

http://www.microsoft.com/downloads/details.aspx?FamilyID=1a10d27a-4aa5-4e96-9645-aa121053e083&DisplayLang=en

Wednesday, December 17, 2008

Open Source Software ! Uhh !!!!! Blessing for devloper's Curse for Security and Business Executive..

GPL, Open Source, Source Forged , Shareware, freeware, code applets, open source api's etc. Etc .. So many scary jargon for security experts.. No its not like that but the mismanagement of development activity and time pressure makes it scary.

Definitely every one is quite happy with SOA , Web 2.0 and many more such kind of technological development. Think what could be a reason for such a fast development of applications, quick delivery, immediate ROI ?

Yes its a miracle in development project provided by Open Source Foundation. Their are millions of readily available codes available on WWW which developers quickly fine tune and use to deliver desired output in any application. Collection of such codes is very well known as framework.

Now above statements is from business executive point of view. If you ask me as security expert yes its boon but take a example of RIM Law Suit case these are the cases which is kind of shame for such a big organizations. Reason in development phase some of the developers used a readily available code on Google search and after 5 year real owner of code filed a law suite that his Idea was stolen without paying a royalty ..

Till yesterday it was my assumption that its very difficult to find weather developers used a open source foundation codes in their application or its written from scratch. If some thing is already available it does not make a sense to rewrite but yes its organization duty to pay a developer payment if its commercially viable solution. So now be happy their is one software in market which will scan your source code and will report all the open source codes and application or API's used in the application development cycle. Remember before posting some nasty comments locks are met for gentleman not for thief.

Palamida, a vendor that sells software and services around open-source software security and legal compliance. Palamida thought it wise to distribute the 25 projects over a number of categories, since open source "has permeated up and down the stack," . Today, Palamida's software scans a customer's code base, determines which open-source software is in use, and provides information about associated licenses, known vulnerablities and available patches.

Overall Palamida and its competitor Black Duck Software "have been moving into providing a tool for software development," said Redmonk analyst Michael Coté. "Instead of making sure your open-source code use is healthy from only a legal perspective ... the idea is to make sure that your overall use of OSS is healthy."

What would you say now .. Any excuse .. :)

Wednesday, November 26, 2008

Know your organization's stratergy to play a role in organization.

In today’s Indian corporate environment I found the operational strategy is missing. People are not concern and looking a vision what they are interested to achieve. 80 % of the security professional thinks that security is a cost center till the time you are not working in consulting assignment. And if it’s a consulting assignment they are there to make money from clients. Resources are qualified but not committed reason being they think they are not able to make a difference, they are here to do a routine work and present in security arena because it’s highly paying job and much more in demand. What could be impact of such strategy in long term for security professional? Uff !!! If I think in that line it’s quite scary for me. Take an example of recent event of World Bank. Where is personal commitment to justify your role?

Recently I joined a organization as a Security Architect and somehow one of my college commented that it’s just a fancy title to attract a resource because manager, VP, AVP and many more are already out dated. But I like to differ a point this is a new role popping up in the security market because business need a people who can transform the business need in to the security tech jargons. They should understand the business need and accordingly design the solution. But how many of us really mean that and committed to excel is a big question.

Security architect s should understand the strategy of organization (They should not limit themselves to technology only) go in depth what is required by business. Because time and money are the prime factor for any business to survive in market so by understanding the priority architects usually design solutions. In this regards I have gone through some of the good books out of which one in Strategy Maps . So putting some of the points how business has to look from eyes of architect.

Generally strategy maps can be evolved from 4 simple perspective model of balance score card (Balance scorecard is model to evaluate organization metrics and very popular among the accounting professional because it evaluate the intangible assets too). It will also add a level of granularity that improves clarity and focus. The 4 basic pillars of Balance Scorecard drive the business. Finance, Customer, Internal, Learning and Growth.

And definitely strategy is required to balance the contradictory forces like investment in intangible assets for long term revenue growth usually conflict with cost for short-term financial performance. As per the balance scorecard taxonomy classification internal process are broadly divided into 4 clusters and their outcome drives the internal process improvement plans.

a) Operational Management : Give a short term result and easily drive metrics in organizations account

b) Customer Management: Is having a 6-12 Months gestation period to give good or bad outcome.

c) Innovation: Gives output in very long run some time vary between 5-50 Years.

d) Regulatory and Social: Even though take longer than innovation.

So understand your business define the objective as per above 4 cluster and then seek a solution or derive a solution. For example if you are interested to come for solution of compliance metrics calculation software weather you want to develop in house , outsource development or interested to deploy the customizable product or readymade solution is suitable for you. You can easily get the one as per your organization taxonomy.

Usually learning & growth describes the organization or service intangible assets and can be classified in to 3 categories.

· Human Capital: Employees Skill, Talent and Knowledge.

· Information Capital: Databases, Information systems, Networks & Technology Infrastructure.

· Organizational Capital: Culture, leadership, employee’s alignment, knowledge management.

Hope above extract will help you to derive an appropriate solution based on the strategy of your organization.

Saturday, October 25, 2008

Me and We

Some people feel that if a person is taking with word "We" he is good team player. Recently my analysis and research proved something else. It’s happened when I was conducting IV’s for new candidates. It’s quite interesting experience and eye opener observation.

I am not saying it’s bad but I found that people who take individual responsibility usually talk me, myself, I and mine. These people are good leaders and take things too personally. And that’s a mantra for success. I know there are lots of people who are not going to convinced with my thought so explaining certain artifacts.

Imagine Mahatma Gandhi think that it’s our country and we have to make our country independed. Then in this "Our"; who will take initiative... Just read “My Experiment with truth” and observe he mentioned that it’s my country and I am interested to understand the country first. It’s (My and I) not we/our...
Yes we are one country but at last it’s my country and I have to do something for my country... If I think that we have to do something then initiative will never begin. (Quite interesting)

Ratan Tata mentioned it’s my promise and promise is promise is promise to give 1L car to world.

If everyone thinks that it’s our then where is ownership and responsibility?

Take one more example; It’s our city and we have to keep it clean... Everyone thinks it; but at last we just crib that government and municipal are not keeping city clean... And again we keep on poring cigarettes buds, plastics and garbage on road... because it’s our city and not mine. (Observe that in this sentence I used We and somehow I am convinced that it’s not me who is making city dirty, But quite possible that several time I did same thing which I am explaining above)

Similarly I saw there are 4 guys staying together in one flat and their room/ flat is quite dirty.
I asked them whose flat is this.
Answer: Is ours,
Who cleans’ house?
Answer: We
Then why flat was so dirty?
Answer: Because XYZ did this and ABC is lazy he doesn’t contribute is cleaning.

I called up one responsible guy from this group and asked him just for one month think other three guys are guest and it’s your house... You have to keep it clean!!! (Initially it was quite difficult for me to convince him because his tough was if I start cleaning my own I would be labor and other will just watch him and not going to contribute.
He started a drive and as soon as he started a cleaning activity other three joined him; week after week this fellow start cleaning house on weekend and other three start helping him. Some by shame, some really wanted to help him and some thinking other should not criticize him.
So that’s a power of me and I/myself...

Not sure this article is enough to convince you to give respect to people who think I, Me are myself. They are initiators, innovators and leaders who give direction, path and way to move people who thing we...

Since from decade it’s a myth that people who use us in their communication are good team player. And 80% of people think that way. Which is vice versa? People are good for driving a accelerated project but not good as leaders.

I don’t know from where this myth was adopted by us but trying to figure out the origin and motive making this myth, truth. As soon as I will get some clue will update my blog.

Friends I am thinking to create a voice blog because not getting enough time to write articles... But most of the time Ideas are boggling in my mind and I am interested to keep it on record. What would you think?
Please post comment if like my Idea which is kind of encouragement for me to do things which I am doing.

Monday, September 29, 2008

The Five Fundamentals to be a Good Consultant

As we know, from working with auto mechanics and plumbers, dentists, and tax advisors, that technical expertise alone doesn’t make one a good and trusted advisor. We’ve all had experiences with good and poor consultants. I’ve had doctors who walked in the room staring at a clipboard, asked a couple of questions in a mechanical tone, ticked off a checklist, and only then glanced up to see who the subject of the interview was. I often wonder whether these advisors cared whether I was a man, a woman, or a horse. I’ve also had experience with doctors who took the time to know me, my preferences and personality, and the way I feel about my medical condition, and then prescribed therapies that I might actually implement. Good and poor advisors may be equally competent in their subject matter. It’s their ability to give personalized advice that influences the client’s perception of the experience and the ultimate success of the relationship.

All professionals, whether lawyer, doctor, or architect, must use some process of interviewing, documenting, analyzing, recommending, and communicating to be an effective advisor. Many professionals have learned this process through trial and error, as it is not typically a subject covered in depth as part of their training and certification. For the skilled practitioner, advising becomes an ingrained and instinctual skill that is rarely thought of as a separate process.

For the less skilled, it is a hit-or-miss process that often leaves crucial factors undiscovered, or critical decision criteria poorly understood by the client. I see in my practice as an advisor to IT consulting firms an epidemic of unstructured, inconsistent, uncoordinated activities that are called

IT consulting. Both the IT professionals and their clients are often left wondering how a simple technical project could get so fouled up. Everyone understood the technology, but nobody managed the relationship or the delivery process.


The Five Funda,s of Consulting

Five basic concept which build the advisory process in IT field

-->Focus on the relationship: Identifying who the client is, and understanding the motivations, culture, history, fears, and goals of both the human being and the organization he or she represents, is one of the most difficult tasks in consulting. Your success in this task has much more bearing on the success or failure of your engagements than the technical discipline involved.

-->Clearly define your role: Setting the expectation with the client regarding exactly what you are there to accomplish, what tasks you are making a commitment to perform, what tasks you expect the client to perform, and where the boundaries of the relationship lie, is a key success factor for consultants.

-->Visualize success: It is the consultant’s central role to help the client draw a mental picture of the desired result of the engagement. Failure to do so results in the dreaded scope creep, in which the engagement never concludes because the expectations keep changing. Visualizing a successful result creates a common goal that all participants can agree upon and strive for together. Like the championship ring for a sports team, it is an unambiguous and motivational endpoint that clarifies the effort and helps clear away extraneous issues and barriers.

-->You advise; they decide: One of the most difficult tasks for consultants is to cast aside emotional attachment to their own advice. Many technicians fall in love with a particular solution or technology, and then lose interest in, or respect for, the client if he decides to take another approach. We must always remember that the client understands the complexities of his own environment, and that he lives with the result of his decision, while we move on to the next assignment.

-->Be oriented toward results:Consulting is more than advising, it is assisting clients to reach a goal. While some advisory relationships are strictly informational, most clients want us to not only recommend solutions, they want us to help implement them. Politics is often described as “the art of the possible,” a good definition for results-oriented consulting as well. By considering implementation issues throughout the engagement, such as corporate culture, readiness to change, training requirements, and corporate communications channels, we keep our eye on the realm of possibility, avoid getting sidetracked into the theoretical, and prepare the client for the real-world issues of implementation and system operation.


Tuesday, August 26, 2008

Linux and Swap Space

Few day back I heard that Linux does not use swap space and some of the critical services are getting crashed due to insufficient memory space and then my research started and found some interesting facts which is enclosed below.

Recently, some experimental improvement to the 2.6 Linux kernel have been made by Con Kolivas , published in his popular -ck patchset . The improvement, called "swap prefetch", employs a mechanism of prefetching previously swapped pages back to physical memory even before they are actually needed, as long as the system is relatively idle (so as not to impair performance) and there is available physical memory to use. This applies to a situation when a "heavy" application has been temporarily used, causing other processes to swap out. After it is closed, both freeing large areas of memory and reducing disk load, prefetch of other processes starts, reducing their initial user response time.


Within Linux®, you can adjust the swappiness of the system when using the 2.6 kernel by setting the vm.swappiness value in /etc/sysctl.conf.
Higher values lead to more pages being swapped and lower values lead to more applications being kept in memory, even if they are idle. The Linux
2.6 kernel added a new kernel parameter called swappiness to let administrators tweak the way Linux swaps. It is a number from 0 to 100.

In essence, higher values lead to more pages being swapped, and lower values lead to more applications being kept in memory, even if they are idle. Kernel maintainer Andrew Morton has said that he runs his desktop machines with a swappiness of 100, stating that "My point is that decreasing the tendency of the kernel to swap stuff out is wrong. You really don't want hundreds of megabytes of BloatyApp's untouched memory floating about in the machine. Get it out on the disk, use the memory for something useful."

There are two aspects to monitoring swap space and how it is used:
Current usage and active usage. You can find an array of different tools across the UNIX variants that report available free memory and VM usage with current usage.
$ swapon -s (Is very common tool to monitor the Swap use)

There are a number of different points of view and rules on how you should configure VM, and how much disk space you should allocate. Some of these approaches have been summarized below:

* Some administrators believe you should never have less swap space than physical RAM. This was a requirement with older versions of UNIX (particularly SunOS) because of the way in which VM was used. In theory, having more VM than physical RAM enables the operating system to swap out all current processes to disk when the system becomes idle, and it can speed up performance for systems because new processes can be loaded directly into RAM without having to swap applications beforehand.

* For development systems, many administrators agree that you should have as much VM as you have RAM. The reason for this approach is that swap space is also used during a system failure as the location where the active memory is dumped; the stored memory dump is then reloaded during boot and saved as a kernel core file. If the configured swap space is less than the physical RAM, such dumps are not possible.

* In high-performance deployment environments, you can configure as little VM as possible, on the basis that you want to keep the applications active in memory and don't need a lot of swap. Crash recovery is not required, and the ability to identify a potential lack of physical RAM (through running out of swap space) provides a warning that your application environment is not optimized, or that you need to upgrade your RAM.

* For desktop environments, having a very large VM allocation can
be to your advantage, as it enables you to run a large number of applications (many of which will probably be idle and easily swapped) making more RAM available for the active applications.

Choosing the right amount of swap space is highly dependent on the platform you are configuring -- it's intended use and how you want to cope with a lack of available VM.

For some conservative values:
* On a desktop system, allocate at least as much swap space as physical RAM.
* On a server, allocate at least 50 percent of your available RAM as swap space. Once you have a figure in mind, you need to configure the swap space.


OOM (Out-of-Memory) killer

If the Linux VM can't find memory to allocate when it's needed, it puts in-use user data pages on the swap-out queue, to be swapped out. If the VM can't allocate memory and can't swap out in-use memory, the Out-of-memory killer may begin killing current userspace processes. The rationale for OOM killing is described in the Linux-MM docs.


Conclusion


Managing swap space is an essential aspect of system administration. With good planning and proper use swapping can provide many benefits.Don't be afraid to experiment, and always monitor your system to ensure you are getting the results you need.

Monday, August 04, 2008

Monday, July 28, 2008

Configure IIS 6.0 operating modes

Recently one of my friend has some trouble in IIS hosted application. To identify the RCA I got to know the advance feature of IIS 6.. Enclosed the extract of that knowledge..

Windows Server 2003 introduced some significant changes from Windows 2000 Server, and Internet Information Services (IIS) 6.0 is a good example. Not only is IIS' architecture considerably different in IIS 6.0, but the management interface has also changed. For example, IIS 6.0 provides two operating modes: IIS 5.0 Isolation Mode and IIS 6.0 Worker Process Isolation Mode.
In IIS 5.0 Isolation Mode, all in-process applications run inside Inetinfo.exe. Out-of-process applications run in separate instances of DLLHost.exe. Inetinfo.exe handles HTTP request queuing, IIS services (FTP, SMTP, NNTP, etc.), and worker processes. Svchost.exe runs the WWW service.
The primary purpose for IIS 5.0 Isolation Mode is to mimic the behavior of IIS 5.0 and earlier versions, and it provides compatibility for Web applications designed specifically for IIS 5.0 or earlier.
IIS 6.0 Worker Process Isolation Mode, also called native mode, provides better performance, reliability, and fault tolerance. In native mode, the kernel-mode driver http.sys handles all HTTP request processing and queuing. Inetinfo.exe handles IIS administration and configuration as well as the IIS services, including SMTP, NNTP, and FTP. Svchost.exe handles the WWW service, and multiple instances of W3wp.exe handle worker processes.
Separating worker processes in this way isolates those worker processes from the core IIS services for better reliability overall and better recoverability for individual processes. This process isolation, combined with the fact that the core IIS services prevent the loading of third-party code, means an errant Web application will have a tough time crashing the WWW service and bringing down the server.
In a clean installation of IIS 6.0, native mode is the default mode. A system upgraded from a previous IIS 6.0 installation assumes the mode of the previous installation. Systems upgraded from IIS 5.0 or IIS 4.0 run in IIS 5.0 Isolation Mode to provide compatibility for the existing Web applications on the server.
One aspect of managing an IIS 6.0 server is setting the mode in which the server runs. For example, you might be installing a Web application that won't run in native mode and need to switch the server to IIS 5.0 Isolation Mode. Or you may have upgraded an existing server and now want to switch it from IIS 5.0 Isolation Mode to native mode. Note that the server as a whole runs in a given mode; you can't run specific sites on the server in different modes.
To configure IIS 6.0's operation mode, open the Internet Information Services Manager from the Administrative Tools folder, or run %systemroot%\system32\inetsrv\iis.msc. When the IIS console opens, right-click the Web Sites branch in the left pane, choose Properties, and select the Service tab. Selecting the Run WWW Service In IIS 5.0 Isolation Mode option configures the server to run in IIS 5.0 Isolation Mode. Deselect this option if you want to run the server in native mode.

Thursday, July 03, 2008

Listen to these original songs of most popular Hindi Tracks

Dhoom song DHoom Macchale Inspired by Jesse Cook's 'Mario takes a walk'

Original:
http://youtube.com/watch?v=e3iTfEF52kw

INSPIRED:
http://youtube.com/watch?v=CvhPvxmD3mI





Race Song Pehli Nazar Inspired by Chinese Kim Hyung Song Sarang Hae Yo

Original:
http://youtube.com/watch?v=8KoS3weBxAg

INSPIRED:
http://youtube.com/watch?v=ffp5h_FGEJY



Race Song Zara Zara Touch Me Inspired by Lee-Hom Wang's 'Zhu Lin Shen Chu'

Original:
http://youtube.com/watch?v=wdTrPI3mumU

INSPIRED:


http://youtube.com/watch?v=kLU76W2qbPs&feature=related



Jab we met's 'Yeh ishq kya' Inspired by Anggun's Être Une Femme

Original:
http://youtube.com/watch?v=T4poevqspsI

INSPIRED:


http://youtube.com/watch?v=TQyU6EqWh_o&feature=related



Jab We Met Aao milo chale Inspired Indonesian band, Peterpan's 'Di Belakangku'

Original:
http://youtube.com/watch?v=EGXniVSfSZE

INSPIRED:


http://youtube.com/watch?v=7jpUic8hWD8&feature=related



Woh Lamhe 'Kya mujhe pyaar hai'Inspired by Indonesian Band 'Tak bisakah'

Original:
http://youtube.com/watch?v=EZTqg1MgkTY

INSPIRED:


http://youtube.com/watch?v=2EoblYYvLsE&feature=related



Bhool Bulaiya Halla Hafiz Inspired by Amr Diab's Awedony

Original:
http://youtube.com/watch?v=8Xi_xOmmsRY

INSPIRED:


http://youtube.com/watch?v=UtVerSkccgo&feature=related



Dhol Dil Liya Inspired by Dania Khatib's 1999 hit, 'Leiley'

Original:
http://www.itwofs.com/audio/Leiley-DaniaElKhateeb.rm

INSPIRED:
http://youtube.com/watch?v=xBkp57nRE5A



Life in a Metro song Baatein kuch ankahee Inspired by Korean song, 'Ah Reum Dah Oon Sa Ram' by Seo Yu Seok!

Original:
http://youtube.com/watch?v=KCTGuhPcC4Y

INSPIRED:


http://youtube.com/watch?v=Ura4grIiF90&feature=related



Bhool Bhulaiyya Hare ram hare ram Inspired by Bill Hailey's Oriental Rock

Original:
http://www.itwofs.com/audio/OrientalRock-BillHaleyComets.rm

INSPIRED:
http://youtube.com/watch?v=4lu3EorpiQ4



Life in a Metro song O Meri jaan Inspired by Queensryche's Silent Lucidity and Amr Diab's Ba'ed el Layali

Original 1:
http://youtube.com/watch?v=-2ohGF0K4AI

Original 2:
http://youtube.com/watch?v=P2y_Vbev5zs

INSPIRED:
http://youtube.com/watch?v=3g2ICCQNQ-w



Pyar ke side effects song Jaane kya Inspired by 'Mahi' by Hadiqa Kiyani

Original:
http://youtube.com/watch?v=mokJJsRfP6Q

INSPIRED:
http://www.youtube.com/watch?v=V5fEHdP-5Dc



Woh Lamhe song Chal Chale Inspired by a 1965 track called 'A World of our own' by the band, The Seekers

Original:
http://www.youtube.com/watch?v=S9oaXzrsV3Q

INSPIRED:
http://www.youtube.com/watch?v=KeJ2tqPjnps



Dhoom Song DHOOM AGAIN Inspired by a song called 'Dudu' from Tarkan

Portions edited appropriately

Original:
http://www.itwofs.com/audio/Dudu_ver2-Tarkan.rm

INSPIRED:
http://www.itwofs.com/audio/DhoomAgain-Dhoom2.rm





Speed song Tikki Tikki Inspired by Turkish pop superstar Tarkan's 2003 hit, 'Dudu'

Original:
http://youtube.com/watch?v=KoJ34jPX3WM

INSPIRED:
http://www.itwofs.com/audio/TikhiTikhi-Speed.rm



Agnipankh song Janmabhoomi & Zindagi hai Inspired by Abrar-ul-haq's 'December

Original:
http://www.itwofs.com/audio/December-AbrarUlHaq.rm

INSPIRED 1:
http://www.itwofs.com/audio/Janmabhoomi-Agnipankh.rm

INSPIRED 2:
http://www.itwofs.com/audio/ZindagiHaiTo-Agnipankh.rm



Bhagam Bhag songs Signal & Afreen Inspired by Trinidadian Soca hit, 'Signal for Lara' by Superblue & Cheb Mami's 2001 track, 'Viens Habibi'

Original 1:
http://www.itwofs.com/audio/SignalForLara-SuperBlue.rm

Original 2:
http://www.itwofs.com/audio/ViensHabibi-ChebMami.rm

INSPIRED 1:
http://youtube.com/watch?v=G31riHQjvDI

INSPIRED 2:
http://youtube.com/watch?v=b-65fajmsC8



Life in a Metro In dino Inspired by Waqar Ali's 'Mera naam hai mohobbat'

Original:
http://youtube.com/watch?v=89wB3og_yXQ

INSPIRED:
http://youtube.com/watch?v=aQ52IJjbNg4



Raqueeb songs 'Jaane kaise' Inspired by Amr Diab's 2003 track, 'Allem albi' and song 'Channa ve channa' Inspired by Pashto singer Rahim Shah.

Original 1:


http://youtube.com/watch?v=NqoXaLHFTik&feature=related

Original 2:
http://youtube.com/watch?v=JplIDBi6wZE

Inspired 1:
http://youtube.com/watch?v=rjwMsYnEJ58

Inspired2:


http://youtube.com/watch?v=33EJLt-NMDQ&feature=related



Kya Love Story Hai Song 'Miss you everyday' Lift of Lebanese singer Karina's 2006 chartbuster 'Alatoul'

'Jab se tum mile ho' is a lift from Pakistani singer Hadiqa Kiyani's 1996 number (album: Raaz), 'Jab se tum milay ho'!

Original 1:
http://youtube.com/watch?v=snIA9iR0b-0

Original 2:
http://www.itwofs.com/audio/JabSeTumMilay-Hadiqa.rm

INSPIRED:
http://youtube.com/watch?v=FJ_w0HDh0N0



Kya Love Story Hain song 'Deewana teri aankhon ka' Inspired by Black Eyed Peas' 'Bebot'

Original:
http://youtube.com/watch?v=gQAGh3JViyI

INSPIRED:
http://youtube.com/watch?v=Nr0ASdmHF40



Kya Love Story Hai song Gum sum hai dil mera Inspired by Thai song, 'Oh la nor...my love' by Bird Thungchai.

Original:
http://youtube.com/watch?v=tJjrJIh8c8k

INSPIRED:
http://www.itwofs.com/audio/GumSumHaiDil-KLSH.rm



Ankahee song Aa paas aa Inspired by Ottmar Liebert's 'Starry nite (March of Kings)

Original:
http://www.itwofs.com/audio/StarryNite-OttmarLiebert.rm

INSPIRED:
http://youtube.com/watch?v=KbsUBqQxygY



Apna sapna money money song Dil mein baji guitar Inspired by song, 'Sheloha shela' by the Middle Eastern group, Miami Band

Original:
http://www.itwofs.com/audio/ShelohaShela-MiamiBand.rm

INSPIRED:
http://youtube.com/watch?v=pCPA80elJlY



Woh Lamhe song 'Tu Jo nahi' Inspired by 'Tu Jo Nahi SB John

Original:


http://youtube.com/watch?v=HWoKJMnMRSQ&feature=related

INSPIRED:
http://youtube.com/watch?v=br_RJ0-rlbY



Bas ek Pal song 'Hai ishq' Inspired by Yuri Mrakadi's 'Arabiyon Ana'

Original:
http://youtube.com/watch?v=c8gt6agxYN0

INSPIRED:
http://youtube.com/watch?v=qoHtiN4rWJo



Pyaar Ke Side Effects song 'Is this love' Inspired by Paul Anka's 1969 track 'A-mi-manera'

Original:
http://www.itwofs.com/audio/A-mi-manera_MyWay.rm

INSPIRED:
http://youtube.com/watch?v=CGzMwPzc1VY



Ankahee Title song Inspired by Boney M's 1984 track, 'Somewhere in the world'

Original:
http://youtube.com/watch?v=68hPjUoAk4E

INSPIRED:
http://www.itwofs.com/audio/Ankahee-TitleSong.rm



Gangster

Song 'Ya ali' Inspired by Arabic band Guitara's 'Ya ghaly'

Original:
http://youtube.com/watch?v=ZJi50826cu4

INSPIRED:


http://youtube.com/watch?v=dpl9o_0Dtb4&feature=related





SOng 'Lamha lamha' lifted form Waris Baig's 1998 track, 'Kal shab dekha maine'

Original:
http://youtube.com/watch?v=0wfe0u-7DpI

INSPIRED:
http://youtube.com/watch?v=dJscz7bJ080



Song 'Bheegi bheegi' lift from Mohiner Ghoraguli's Bangla jibhonmuki gaan

Original:
http://youtube.com/watch?v=xAkzopTMXHc

INSPIRED:


http://youtube.com/watch?v=_wwsyz2YBUg&feature=related



Song Tu hi meri shab hai Inspired by 'Sacral Nirvana' by Oliver Shanti & Friends

Original:
http://youtube.com/watch?v=5JXrmUD0EK0

Inspired:


http://youtube.com/watch?v=BklekKJPjlI&feature=related





Ek Hasina Thi

Song Akhiyaan Na Maar Inspired by Pakistani singer Waris Baig's 2004 track, 'Challa'

Original:
http://www.itwofs.com/audio/Challa-WarisBaig.rm

INSPIRED:
http://youtube.com/watch?v=BuFQ0aZLP8E



Song Jal Jal Ke Inspired by Yuri Mrakadi's 2001 track, 'Arabiyon Ana'

Original:
http://youtube.com/watch?v=gmmToe4TJw8

INSPIRED:
http://youtube.com/watch?v=F_MYsiA3YY0



Fight Club Song Chorein ki Batein Inspired by Pakistani singer Ali Zafar's 'Channo ki aankhen'

Original:
http://youtube.com/watch?v=lLhylAWQgo8

INSPIRED:
http://youtube.com/watch?v=NrVm2NEoatY



Ek Khiladi Ek Hasina song 'Jhoom' Lifted from Britney Spears' commercial for Pepsi, 'Joy of Pepsi'

Original:
http://youtube.com/watch?v=HSZaif6xlWc

INSPIRED:
http://youtube.com/watch?v=wKpYRUI3o4M



Garam Masala

Songs 'Dil samundar' Inspired by Turkish singer Tarkan's 'Kuzu kuzu'

Original:
http://youtube.com/watch?v=u4kncVrjaQk

INSPIRED:
http://youtube.com/watch?v=4SHSxTBT4D0



Song 'Chori Chori' Inspired by Balwinder Safri's 'Hai rabba'

Original 1:
http://www.itwofs.com/audio/ChoriChori2-GaramMasala.rm

Original 2:
http://www.itwofs.com/audio/HaiRabba-DrZeus.rm

INSPIRED:
http://youtube.com/watch?v=xT5-NxdawRI



Song'Ada' Inspired by song Amr Diab's Ana

Original:
http://www.itwofs.com/audio/AmrDiab-Ana.rm

INSPIRED:
http://www.itwofs.com/audio/HaiRabba-DrZeus.rm



Dhoom song Shikdum Inspired by Tarkan's 'Sikidim'

Original:
http://youtube.com/watch?v=g2uy7Cfl6kU

INSPIRED:
http://youtube.com/watch?v=i2xThHWuM9A



Chocolate

Song 'Zahreeli raatein' Inspired by Jal's 'Aadat'

Original:
http://youtube.com/watch?v=FdZDRZTf67Y

INSPIRED:
http://youtube.com/watch?v=XyZEth7A0aw



Song 'Bheega bheega sa' Inspired by Abrar-ul-Haq's 'December'

Original:
http://www.itwofs.com/audio/December-AbrarUlHaq.rm

INSPIRED:


http://youtube.com/watch?v=LCZhMHUFabI&feature=related



Song 'Halka halka sa' Inspired by 'Breeze from Saintes Maries'

Original:
http://www.itwofs.com/audio/BreezeFromSaintesMaries-JesseCoo k.rm

INSPIRED:
http://youtube.com/watch?v=xcaog3CT6Fs