Tuesday 12 August 2014

Acunetix

Acunetix has a free and paid version. This
hacking tool has many uses but in essence it
tests and reports on SQL injection and Cross
Site scripting testing. It has a state of the art
crawler technology which includes a client
script analyzer engine. This security tool
generates detailed reports that identify
security issues and vulnerabilities. The latest
version, Acunetix WVS version 8, includes
several security features such as a new
module that tests slow HTTP Denial of
Service. This latest version also ships with a
compliance report template for ISO 27001.
This is useful for penetration testers and
developers since it allows organizations to
validate that their web applications are ISO
27001 compliant

Aircrack-ng

Aircrack-ng is a comprehensive set of
network security tools that includes,
aircrack-ng (which can cracks WEP and WPA
Dictionary attacks), airdecap-ng (which can
decrypts WEP or WPA encrypted capture
files), airmon-ng (which places network cards
into monitor mode, for example when using
the Alfa Security Scanner with rtl8187),
aireplay-ng (which is a packet injector),
airodump-ng (which is a packet sniffer),
airtun-ng (which allows for virtual tunnel
interfaces), airolib-ng (which stores and
manages ESSID and password lists),
packetforge-ng (which can create encrypted
packets for injection), airbase-ng (which
incorporates techniques for attacking clients)
and airdecloak-ng (which removes WEP
cloaking). Other tools include airdriver-ng (to
manage wireless drivers), airolib-ng (to store
and manages ESSID and password lists and
compute Pairwise Master Keys), airserv-ng
(which allows the penetration tester to
access the wireless card from other
computers). Airolib-ng is similiar to easside-
ng which allows the user to run tools on a
remote computer, easside-ng (permits a
means to communicate to an access point,
without the WEP key), tkiptun-ng (for WPA/
TKIP attacks) and wesside-ng (which an an
automatic tool for recovering wep keys).
Like most of the security tools in our list,
Aircrack also has a GUI interface – called
Gerix Wifi Cracker. Gerix is a freely licensed
security tool under the GNU General Public
License and is bundled within penetration
testing Linux distributions such a kali linux ,
BackTrack And Backbox. The Gerix GUI has
several penetration testing tools that allow
for network analysis, wireless packet
capturing, and SQL packet injection.

Wireshark

Wireshark has been around for ages and is
extremely popular. Wireshark allows the
pentester to put a network interface into a
promiscuous mode and therefore see all
traffic. This tool has many features such as
being able to capture data from live network
connection or read from a file that saved
already-captured packets. Wireshark is able
to read data from a wide variety of
networks, from Ethernet, IEEE 802.11, PPP,
and even loopback. Like most tools in our
2013 Concise Courses Security List the
captured network data can be monitored and
managed via a GUI – which also allows for
plug-ins to be inserted and used. Wireshark
can also capture VoIP packets and raw USB
traffic can also be captured.

How to deface the whole server

There are two type of server
1-shared server
2-independent server
in shared server there are lot of website
running on that server .that's why hacking all
websites is easier.
for mass deface firstly we can find the vuln
website(sqli, rfi,lfi)
after that you can upload your shell
(c99 ,r57)
then if it is Linux server then you can
symlink the server or rooted the server by
using net cat
if it is windows server then you can use
metasploit
for that you can create vuln file and
executed by the shell.after that you got
meterpreter and by using that you have fully
access on all websites for deface

What is the difference between a domain, a workgroup, and a homegroup? Domains, workgroups, and homegroups

They represent different methods for organizing
computers in networks. The main difference
among them is how the computers and other
resources on the networks are managed.
Computers running Windows on a network
must be part of a workgroup or a domain.
Computers running Windows on home
networks can also be part of a homegroup,
but it's not required.
Computers on home networks are usually
part of a workgroup and possibly a
homegroup, and computers on workplace
networks are usually part of a domain.
In a workgroup:
============
All computers are peers; no computer has
control over another computer.
Each computer has a set of user accounts. To
log on to any computer in the workgroup,
you must have an account on that computer.
There are typically no more than twenty
computers.
A workgroup is not protected by a password.
All computers must be on the same local
network or subnet.
In a homegroup:
=============
Computers on a home network must belong
to a workgroup, but they can also belong to
a homegroup. A homegroup makes it easy to
share pictures, music, videos, documents,
and printers with other people on a home
network.
A homegroup is protected with a password,
but you only need to type the password
once, when adding your computer to the
homegroup.
In a domain:
==========
One or more computers are servers. Network
administrators use servers to control the
security and permissions for all computers
on the domain. This makes it easy to make
changes because the changes are
automatically made to all computers. Domain
users must provide a password or other
credentials each time they access the
domain.
If you have a user account on the domain,
you can log on to any computer on the
domain without needing an account on that
computer.
You probably can make only limited changes
to a computer's settings because network
administrators often want to ensure
consistency among computers.
There can be thousands of computers in a
domain.
The computers can be on different local
networks.
==========================================
Note : - Info Based and copied from MS
official Website , For more u can visit &
learn From Microsoft Website
===========================================

Asymmetric digital subscriber line ( ADSL ) & Digital subscriber line (DSL )

Asymmetric digital subscriber line (ADSL) is a
type of digital subscriber line (DSL)
technology, a data communications
technology that enables faster data
transmission over copper telephone lines
than a conventional voiceband modem can
provide. It does this by utilizing frequencies
that are not used by a voice telephone call. A
splitter, or DSL filter, allows a single
telephone connection to be used for both
ADSL service and voice calls at the same
time. ADSL can generally only be distributed
over short distances from the telephone
exchange (the last mile),
Note :- typically less than 4 kilometres (2
mi), but has been known to exceed 8
kilometres (5 mi) if the originally laid wire
gauge allows for further distribution.
At the telephone exchange the line generally
terminates at a digital subscriber line access
multiplexer (DSLAM) where another
frequency splitter separates the voice band
signal for the conventional phone network.
Data carried by the ADSL are typically routed
over the telephone company's data network
and eventually reach a conventional Internet
Protocol network.
ADSL (Asymmetric Digital Subscriber Line)
uses an ordinary phone line to deliver a
high-speed Internet connection. It does this
by converting the data from your computer
into high-frequency signals. These high-
frequency signals can travel along a
telephone cable at the same time as a voice
call because the ADSL and voice signals use
different frequency ranges
Digital subscriber line (DSL; originally digital
subscriber loop) is a family of technologies
that provide internet access by transmitting
digital data using a local telephone network
which uses the Public switched telephone
network. In telecommunications marketing,
the term DSL is widely understood to mean
asymmetric digital subscriber line (ADSL), the
most commonly installed DSL technology.
DSL service is delivered simultaneously with
wired telephone service on the same
telephone line. This is possible because DSL
uses higher frequency bands for data. On the
customer premises, a DSL filter on each non-
DSL outlet blocks any high frequency
interference, to enable simultaneous use of
the voice and DSL services.
The bit rate of consumer DSL services
typically ranges from 256 kbit/s to over 100
Mbit/s in the direction to the customer
(downstream), depending on DSL technology,
line conditions, and service-level
implementation. Bit rates of 1 Gbit/s have
been reached in trials. In ADSL, the data
throughput in the upstream direction, (the
direction to the service provider) is lower,
hence the designation of asymmetric service.
Note:- In symmetric digital subscriber line
(SDSL) services, the downstream and
upstream data rates are equal.
Researchers at Bell Labs have reached
broadband speeds of 10Gbps, while
delivering 1Gbit/s symmetrical ultra-
broadband access services using traditional
copper telephone lines. These speeds can be
achieved with existing telephone lines and
can be used to deliver broadband where
fiber optic cables can't be installed to the
premise.
A 2007 book described DSL as "the most
globally prolific broadband access
technology, yet it is only available to around
60–75 percent of the population in many
developed countries." A 2012 survey found
that "DSL continues to be the dominant
technology for broadband access" with 364.1
million subscribers worldwide