Skip to main content

Posts

Showing posts from February, 2016

HTTP & HTTPS

HTTP (Hypertext Transfer Protocol) HTTP is an client-server protocol that allows clients to request web pages from web servers. It is an application level protocol widely used on the Internet. Clients are usually web browsers. When a user wants to access a web page, a browser sends an HTTP Request

FTP & TFTP

FTP (File Transfer Protocol) FTP is a network protocol used to transfer files from one computer to another over a TCP network. Like Telnet, it uses a client-network arhitecture, which means that a user has to have an FTP client installed to access an FTP server running on the remote machine. After

Telnet & SSH

Telnet Telnet is a network protocol that allows a user to communicate with a remote device. It is a virtual terminal protocol used mostly by network administrators to remotely access and manage devices. Administrator can access the device by “telnetting” to the IP address or hostname of a remote device.

DHCP & DNS

DHCP (Dynamic Host Configuration Protocol) DHCP is a network protocol that is used to assign various network parameters to a device. This greatly simplifies administration, since there is no need to assign static network parameters for each device separately. DHCP is a client-server protocol. A client is a device

ARP

ARP (Address Resolution Protocol) is a network protocol used to find out the hardware (MAC) address of a device from an IP address. It is used when a device wants to communicate with some other device on a local network (for example on an Ethernet network that requires physical addresses to be known before sending packets). The sending

TCP/IP suite of protocols

The TCP/IP suite is a set of protocols used on computer networks today (most notably on the Internet). It provides an end-to-end connectivity by specifying how data should be packetized, addressed, transmitted, routed and received on a TCP/IP network. Th

Subnet mask

An IP address is divided into two parts: network and host parts. For example, an IP class A address consists of 8 bits identifying the network and 24 bits identifying the host. This is because the default subnet mask for a class A IP address is 8 bits long. (or, written in dotted decimal

Classes of IP addresses

TCP/IP defines five classes of IP addresses: class A, B, C, D, and E. Each class has a range of valid IP addresses. The value of the first octet determines the class. IP addresses

Cisco three-layer hierarchical model

Because networks can be extremely complicated, with multiple protocols and diverse technologies, Cisco has developed a layered hierarchical model for designing a reliable network infrastructure. This three-layer model helps you design, implement, and maintain a scalable

Network devices

Hubs   A hub serves as a central point to which all of the hosts in a network connect to. It is an OSI layer 1 device. It receives a signal from one port and sends it out to all other ports.

Unicast, multicast, and broadcast addresses

There are three types of Ethernet addresses: unicast addresses  – represent a single LAN interface. A unicast frame will be sent to a specific device, not to a group of devices on the LAN.

MAC & IP addresses

MAC address A Media Access Control (MAC) address is a 48-bit address that is used for communication between two hosts in an Ethernet environment. It is a hardware address, which means that it is stored in the firmware of the network card.

Encapsulation

The term “encapsulation” is used to describe a process of adding headers and trailers around some data. For example, when you send an email using your favourite email program (like Outlook or Thunderbird) that email is sent from the Application layer to the

OSI & TCP/IP models

OSI model OSI (Open Systems Interconnection) model was created by the International Organization for Standardization (ISO), an international standard-setting body. It was designed to be a reference model for describing the functions of a communication system. It has seven

The best Hacking tools of 2016 for hackers and pentesters

Here are the top hacking tools for 2016 used by hackers and pentesters worldwide: Nmap  : Nmap is an abbreviation of ‘Network Mapper’, which is a very well known free open source hackers tool. Nmap is used for network discovery and security auditing.

Run Windows 98 And Linux In Your Web Browser, Thanks To JavaScript And NodeJS

A coder, known as Fabian on GitHub, has created x86 architecture based emulations that allow you to run Windows 98, Linux, KolibriOS etc. inside your browser. Read more about the same and find the links below to try it out.

TUTORIAL FOR INSTALLING AND RUNNING KALI LINUX ON ANDROID SMARTPHONES AND TABLETS

Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox.

15 features that Samsung’s Galaxy S7 has that the Apple’s iPhone 6S doesn’t

iPhone 6S vs Samsung Galaxy S7 : List of features that Galaxy S7 has and iPhone 6S doesnt Samsung, the South Korean technology giant on Sunday evening officially announced the ‘Galaxy S7’ family of devices during an awesome event at MWC (Mobile World

Dont see the new Facebook reactions, here is how to enable them

Here’s how to get the new Facebook reactions if you don’t see them yet After a year long development cycle, Facebook yesterday updated its ‘Like’ button to allow FB users to respond with six reactions. Henceforth you can Love, say Haha or Wow, be Sad or Angry when you see a Facebook post.

Google Develops AI Technology That Can Tell You Where Your Photos Was Taken

Google New Neural Network With “Superhuman” Can Tell The Location of Almost Any Image As of today if your image location is revealed only if you have enabled geo-tagging in the camera settings. Not any more, if the new AI works well, Google may soon not

Top ten operating systems for ethical hackers and security researchers

A comprehensive list of most popular operating systems among hackers all around the world. This time it is about operating systems, which have almost every necessary tool provided within. But before we dive deep, it would be great to know why a

10 Incredibly Useful Tips and Shortcuts For Your Samsung Galaxy S5

The Galaxy S5 has secret passage ways and shortcuts all over the place.  There’s back doors and hidden entrances all designed to get you to your  stuff  quicker and easier.

iPhone e-mail settings

In order to initiate the e-mail setup procedure on your iPhone appliance click on the Settings button located on the main screen.

How to configure the e-mail settings on Android

The clients that have mobile phones working with the Android OS can use the default mail application called: Email (In some Android releases the application name is Mail).

How hackers hack your Paypal account

Today when I was checking my Inbox I got this mail from Service Paypal saying that, ” Your account has been limited until we hear from you.”

TCPdump - Sniffing , Capturing and Analysing Networking Traffic

If one truly wants to discover how specific network application works, want to know where and what kind of data it sends, or where the data is coming from, than "sniffing" of netwroking packets is absolute necessity. It's a mandatory method

Nmap Tutorial - Discover Your TCP/IP Network

Nmap , also (Network Mapper), is a free and open source port and security scanner for network security professionals, and apparently also for world’s IT hijackers. Although there are similar tools like  portqry  for scanning ports, they are not as much capable as  Nmap . It is used to discover hosts, services and network resources on

Pathping Tutorial

PathPing  is probably the most useful tool for checking network connectivity , latency, data loss and reachability between different resources on IP networks. It combines features of  Ping  and  Tracert  but provides additional informatio

Tracert Tutorial

Tracert  is a Windows based TCP/IP utility that allows you to determine the route that packets take while traversing through a network to certain destination. It can help You to test intermediate hops and determine possible problems on your network. The same tool can be also found on Linux/Unix like operating syste

Ping Tutorial

Ping  is a simple yet very useful tool for checking network connectivity and reachability between different hosts and other resources on IP networks. It can be used to check out whether the peer, host, gateway or some network resource is alive and reachable. Although by default it is installed on all modern operating systems, from Windows, Apple to Linux/Unix like, linux version of a tool has most options. 

Smart Bathroom Mirror Runs Android To Bring Weather Forcast And News

A Google engineer, Max Braun creates one of the best innovative gadget – a smart bathroom mirror. Using a two-way mirror, an ultra thin display and an Amazon Fire TV Stick, Max Braun created a bathroom mirror which subtly shows the date, time, weather forecast and news headlines. The thin display is embedded between the mirror an

Changing Time and Date setting to Jan 1, 1970 will brick your iPhone

A simple bug in iPhone founded by  Zach Straley  on YouTube shows that if you set the time and date to January 1, 1970 will brick your iPhone.

Bohatei – Free DDoS defense tool

Bohatei, a free DDoS defense tool that works using SDN and NFV. This tool defense 500Gbps DDoS attack and successfully handle any dynamic attack scenarios.

Gping – Ping, but with a graph

Gping, a free open source tool to test your network speed, but with a graph.

CronJob - Schedule Tasks and Execute Jobs

Linux CronJob tutorial Cron  is a deamon (program that runs as a background process) used to automatically execute scheduled jobs or scripts at regular and predefined intervals without user intervention. Cron is primarily use

Installing New Linux Programs and Packages

APT is very popular and easy to use linux tool for installing or managing already installed packages on linux machines. It can also download, install and upgrade already compiled packages from the internet. APT uses a file  /etc/apt/sources.list  that lists the 'sources' from which packages can be obtained: 

Linux Network Configuration

This tutorials shows how to set up network and configure network parameters from command line interface on Linux systems. Since one should not have hard time configuring it from graphical user interface (few mouse clicks once You find the right tool) this tutorial will orient on configuration from cli. Also notice that various linux systems have slightly different configuration methods. 

VI Text Editor Tutorial

The  VI  or  VIM  is a terminal text editor used on many unix/linux systems. It is widely used and very useful. With little expirience and few learned tricks, It can enhance Your productivity. It has some very interesting features that

Basic Linux Commands

Here are explained some basic linux commands and command line syntax. To run some of the commands presented here, You may be logged in as  root  user.  Root  is the highest and most privileged user account on Linux system. 

Linux Installation Guide

Linux  as free and open source operating system comes in many flavours or distributions. Distributions oriented toward  desktop usage  will typically use  X Window System  as graphical interface and an accompanying desktop environment such as  GNOME ,  KDE ,  LXDE  or  Xfce . Distributions intended t

DHCP Installation and Configuration Tutorial

DHCP  or  Dynamic Host configuration Protocol  is a  network infrastructure service that provides IP addressing information  to PC clients and other TCP/IP-based machines and network devices. 

DNS Installation Tutorial

DNS or Domain Name System  is a hierarchical distributed naming system of resources on a computer networks. It's purpose is to translate alpha numerical domain names (names meaningful to humans) into logical IP addresses  (addresses meaningful to computers) that allows computers

Active Directory - working with users , groups and organizational units (WS 2008)

Probably the most noticeable part of Active Directory administration is managing objects and resources within the  Users and Computers snap-in .  Users and Computers mmc snap-in  enables

Active Directory Tutorial (Windows Server 2008)

Active Directory (AD)  is a Microsoft technology, directory service structure or database created for Windows networks and domains for the purpose of storing informations about users, printers, and other network resources. It also allows or denies access according to permissions of the entity who is requesting specific resource.  AD  runs on servers called  domain controllers  which as a platform use Windows server Operating sy

File and Folder Network Sharing

Since earliest days, computer systems are designed with an indea that data can be easily accessed and shared over network. Windows operating system therefore is not an exception. In fact, on windows OS, this can be achieved quite easily. If You have 2 or more PC-s in Your network, it's possible to share your files and folders between different computers and folders. Data from 1st computer or device connected to another can be easily accessed from 2nd device, and other way around. 

Speed Up Your Computer

It's a well known fact that over time of usage the  speed of a computer  with Microsoft Windows installed can decrease. Eventualy it takes more and more time to respond to a user’s actions like opening files and folders and other documents, surfing the Internet and doing all other tasks. The end result is a slow PC. 

Site-to-Site VPN Configuration Tutorial (Cisco ASA 8.3 , 8.4 and Newer)

This is continuation of  Site to site VPN configuration  tutorial but with focus on 8.3, 8.4 and newer Cisco Asa software images. Configuration concept is pretty much the same as already explained on older Asa software, with a few exception. It's because newer Cisco Asa has some new possibilities but also some new configuration rules. 

New Cisco NAT Configuration (on 8.3.x and newer Software)

As already explained,  Network address translation  or  NAT  allows You to translate private to public addresses.  This tutorial explaines how to configure Nat on software 8.3 and newer. As many Cisco admins probably already know, newer Asa's have some changes and new possibilities, but configuration command syntax did not preserve older configuration style. One of those changes is NAT configuration. 

IPsec VPN video tutorial

IPsec site-to-site vpn Video Tutorial 2

Debugging on Cisco ASA

Most of debuging on Cisco ASA can be done with simply entering  "debug"  in front of command for which we want to do debugging. For example if wanted to see/capture icmp traffic from user enter: 

Cisco ASA Packet Capturing

Cisco ASA firewall has a very useful traffic capturing feature. Captured traffic that goes through firewall can be saved in pcap files that later can be downloaded, viewed and analysed in most of live capturing programs like tcpdump  or  wireshark .