Tuesday 12 August 2014

How to deface the whole server

There are two type of server
1-shared server
2-independent server
in shared server there are lot of website
running on that server .that's why hacking all
websites is easier.
for mass deface firstly we can find the vuln
website(sqli, rfi,lfi)
after that you can upload your shell
(c99 ,r57)
then if it is Linux server then you can
symlink the server or rooted the server by
using net cat
if it is windows server then you can use
metasploit
for that you can create vuln file and
executed by the shell.after that you got
meterpreter and by using that you have fully
access on all websites for deface

What is the difference between a domain, a workgroup, and a homegroup? Domains, workgroups, and homegroups

They represent different methods for organizing
computers in networks. The main difference
among them is how the computers and other
resources on the networks are managed.
Computers running Windows on a network
must be part of a workgroup or a domain.
Computers running Windows on home
networks can also be part of a homegroup,
but it's not required.
Computers on home networks are usually
part of a workgroup and possibly a
homegroup, and computers on workplace
networks are usually part of a domain.
In a workgroup:
============
All computers are peers; no computer has
control over another computer.
Each computer has a set of user accounts. To
log on to any computer in the workgroup,
you must have an account on that computer.
There are typically no more than twenty
computers.
A workgroup is not protected by a password.
All computers must be on the same local
network or subnet.
In a homegroup:
=============
Computers on a home network must belong
to a workgroup, but they can also belong to
a homegroup. A homegroup makes it easy to
share pictures, music, videos, documents,
and printers with other people on a home
network.
A homegroup is protected with a password,
but you only need to type the password
once, when adding your computer to the
homegroup.
In a domain:
==========
One or more computers are servers. Network
administrators use servers to control the
security and permissions for all computers
on the domain. This makes it easy to make
changes because the changes are
automatically made to all computers. Domain
users must provide a password or other
credentials each time they access the
domain.
If you have a user account on the domain,
you can log on to any computer on the
domain without needing an account on that
computer.
You probably can make only limited changes
to a computer's settings because network
administrators often want to ensure
consistency among computers.
There can be thousands of computers in a
domain.
The computers can be on different local
networks.
==========================================
Note : - Info Based and copied from MS
official Website , For more u can visit &
learn From Microsoft Website
===========================================

Asymmetric digital subscriber line ( ADSL ) & Digital subscriber line (DSL )

Asymmetric digital subscriber line (ADSL) is a
type of digital subscriber line (DSL)
technology, a data communications
technology that enables faster data
transmission over copper telephone lines
than a conventional voiceband modem can
provide. It does this by utilizing frequencies
that are not used by a voice telephone call. A
splitter, or DSL filter, allows a single
telephone connection to be used for both
ADSL service and voice calls at the same
time. ADSL can generally only be distributed
over short distances from the telephone
exchange (the last mile),
Note :- typically less than 4 kilometres (2
mi), but has been known to exceed 8
kilometres (5 mi) if the originally laid wire
gauge allows for further distribution.
At the telephone exchange the line generally
terminates at a digital subscriber line access
multiplexer (DSLAM) where another
frequency splitter separates the voice band
signal for the conventional phone network.
Data carried by the ADSL are typically routed
over the telephone company's data network
and eventually reach a conventional Internet
Protocol network.
ADSL (Asymmetric Digital Subscriber Line)
uses an ordinary phone line to deliver a
high-speed Internet connection. It does this
by converting the data from your computer
into high-frequency signals. These high-
frequency signals can travel along a
telephone cable at the same time as a voice
call because the ADSL and voice signals use
different frequency ranges
Digital subscriber line (DSL; originally digital
subscriber loop) is a family of technologies
that provide internet access by transmitting
digital data using a local telephone network
which uses the Public switched telephone
network. In telecommunications marketing,
the term DSL is widely understood to mean
asymmetric digital subscriber line (ADSL), the
most commonly installed DSL technology.
DSL service is delivered simultaneously with
wired telephone service on the same
telephone line. This is possible because DSL
uses higher frequency bands for data. On the
customer premises, a DSL filter on each non-
DSL outlet blocks any high frequency
interference, to enable simultaneous use of
the voice and DSL services.
The bit rate of consumer DSL services
typically ranges from 256 kbit/s to over 100
Mbit/s in the direction to the customer
(downstream), depending on DSL technology,
line conditions, and service-level
implementation. Bit rates of 1 Gbit/s have
been reached in trials. In ADSL, the data
throughput in the upstream direction, (the
direction to the service provider) is lower,
hence the designation of asymmetric service.
Note:- In symmetric digital subscriber line
(SDSL) services, the downstream and
upstream data rates are equal.
Researchers at Bell Labs have reached
broadband speeds of 10Gbps, while
delivering 1Gbit/s symmetrical ultra-
broadband access services using traditional
copper telephone lines. These speeds can be
achieved with existing telephone lines and
can be used to deliver broadband where
fiber optic cables can't be installed to the
premise.
A 2007 book described DSL as "the most
globally prolific broadband access
technology, yet it is only available to around
60–75 percent of the population in many
developed countries." A 2012 survey found
that "DSL continues to be the dominant
technology for broadband access" with 364.1
million subscribers worldwide

Voice-over-Internet Protocol (VoIP)

Voice over IP
Voice-over-Internet Protocol (VoIP) is a
methodology and group of technologies for
the delivery of voice communications and
multimedia sessions over Internet Protocol
(IP) networks, such as the Internet. Other
terms commonly associated with VoIP are IP
telephony, Internet telephony, voice over
broadband (VoBB), broadband telephony, IP
communications, and broadband phone
service.
The term Internet telephony specifically
refers to the provisioning of communications
services (voice, fax, SMS, voice-messaging)
over the public Internet, rather than via the
public switched telephone network (PSTN).
The steps and principles involved in
originating VoIP telephone calls are similar
to traditional digital telephony and involve
signaling, channel setup, digitization of the
analog voice signals, and encoding. Instead
of being transmitted over a circuit-switched
network, however, the digital information is
packetized, and transmission occurs as IP
packets over a packet-switched network.
Such transmission entails careful
considerations about resource management
different from time-division multiplexing
(TDM) networks.ternet Protocol (VoIP) is a
methodology and group of technologies for
the delivery of voice communications and
multimedia sessions over Internet Protocol
(IP) networks, such as the Internet. Other
terms commonly associated with VoIP are IP
telephony, Internet telephony, voice over
broadband (VoBB), broadband telephony, IP
communications, and broadband phone
service.
The term Internet telephony specifically
refers to the provisioning of communications
services (voice, fax, SMS, voice-messaging)
over the public Internet, rather than via the
public switched telephone network (PSTN).
The steps and principles involved in
originating VoIP telephone calls are similar
to traditional digital telephony and involve
signaling, channel setup, digitization of the
analog voice signals, and encoding. Instead
of being transmitted over a circuit-switched
network, however, the digital information is
packetized, and transmission occurs as IP
packets over a packet-switched network.
Such transmission entails careful
considerations about resource management
different from time-division multiplexing
(TDM) networks.

Target website hacking

>firstly you can use the scanner like
acuenetix,netsparker,nikto,nessus etc
and you can check the known vuln like the
sqli,rfi,lfi,web dav etc
>if this attack can not success then you can
use this awesome trick
-firstly by using http://www.yougetsignal
.com/ that website you can find the all
website which is running on that server
- after that you can by using bing search
engine
-and check target website is on shared ip
-on the bing search ip:server ip adress
-ip:server ip adress .php?id= (for checking
sqli vuln website on that server)
-ip:server ip adress admin (for checking the
admin of that website in that server and use
sql injection)
-ip:server ip adress upload (for upload the
shell on website)
>if you get any vuln(like -sqli,rfi,web dav etc)
you can upload your shell on that website by
using that shell you can get access on the
target website.once you get access on target
website you can deface the whole website
******************************
**********************************
there are several dork for finding vuln
you can create your own dork and use that
for hacking all the website on that server

Prominent world founders

*Founder of facebook-Mark zuckerburg
*Founder of Apple Computers – Steve Jobs
*Founder of Artificial Intelligence – John
McCarthy
*Founder of Bluetooth – Ericsson
*Father of Computer – Charles Babbage
*Father of ‘C’ Language – Dennis Ritchie
*Founder of Email – Shiva Ayyadurai
*Founder of Google – Larry Page and Sergey
Brin
*Founder of Internet – Vint Cerf
*Father of ‘Java’- James Gosling
*Father of JQuery – John Resig
*Founder of Keyboard – Christoper Latham
Sholes
*Founder of Linux – Linus Torvalds
*Founder of Microsoft – Bill Gates and Paul
Allen
*Founder of Mobile Phones – Martin Cooper
*Founder of Mouse – Douglas Engelbart
*Founders of Oracle – Ed Oates, Larry
Ellison, Bob Miner
*Founder of Php – Rasmus Lerdorf
*Founder of USB – Ajay V.Bhatt
*Founder of WWW – Tim Berners-Lee
*Founder of Yahoo – Jurry Yang and David
Filo