<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3047728298161844542</id><updated>2024-11-08T21:00:26.108+05:30</updated><category term="Security"/><category term="Networking"/><title type='text'>Network Solutions</title><subtitle type='html'>Provide Full Network Solutions..</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://netconfigration.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default?start-index=26&amp;max-results=25'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>39</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-5472240239616697418</id><published>2018-04-21T16:08:00.004+05:30</published><updated>2018-04-21T16:12:25.740+05:30</updated><title type='text'>CCNA books by todd lammle</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Download CCNA books in one click.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://drive.google.com/open?id=1_2opU6QQ2O1v14YHuWKmZWb4Rs8nzJGR&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;232&quot; data-original-width=&quot;958&quot; height=&quot;96&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgutP7shBiIRPXjbDfaZYg6Y7Y2xZzuQ4hWVR2lw_d0v7mXad3A5_b3JtB9hHRT73-_5MoTRubHlIy0OW-EFt_w2bx3RS2yLGZbzsZsLXgKrcB-eAz-lNig3_0niGbTrGurHFwLf5nAvwI/s400/16235-illustration-of-a-green-download-button-pv.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://drive.google.com/open?id=1_2opU6QQ2O1v14YHuWKmZWb4Rs8nzJGR&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/5472240239616697418'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/5472240239616697418'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/04/ccna-books-by-todd-lammle.html' title='CCNA books by todd lammle'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgutP7shBiIRPXjbDfaZYg6Y7Y2xZzuQ4hWVR2lw_d0v7mXad3A5_b3JtB9hHRT73-_5MoTRubHlIy0OW-EFt_w2bx3RS2yLGZbzsZsLXgKrcB-eAz-lNig3_0niGbTrGurHFwLf5nAvwI/s72-c/16235-illustration-of-a-green-download-button-pv.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-2179369288642070356</id><published>2018-03-15T16:38:00.000+05:30</published><updated>2018-03-16T15:28:46.217+05:30</updated><title type='text'>Types of routing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
It is a very very very important topic in networking whether you are looking for career in security then also you have to have knowledge of routing and its protocols.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once you create an inter network by connecting your WAN and LAN to a router, you will need to configure logical network address, such as IP address to all hosts on the inter network so that they communicate across network.&lt;br /&gt;
&lt;br /&gt;
The term routing is used for taking a packet from one device and sending to another across the network.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;To be able to route a packets a route must know at a minimum the following:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Destination address&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Neighbor routers from which it can learn about remote networks&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Possible routes to all network&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;The best route to each network&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;How to maintain and verify routing information&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: blue;&quot;&gt;Routing are of three types :&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
1) &lt;span style=&quot;color: #a64d79;&quot;&gt;Static Routing&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
2) &lt;span style=&quot;color: #a64d79;&quot;&gt;Dynamic Routing&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
3) &lt;span style=&quot;color: #a64d79;&quot;&gt;Default Routing&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #a64d79;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #a64d79;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #a64d79;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #a64d79;&quot;&gt;Static Routing: &lt;/span&gt;In This Type of routing all the routes are assigned to the routers by administrator&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;manually. Each route is known by System admin. if network is large then it is&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;difficult to remember all the path and most important thing is if any network is down&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;then it took lots of time of admin to find out which network is down and what is the&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;issues.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #351c75;&quot;&gt;Dynamic Routing:&lt;/span&gt; In dynamic routing best path to reach network is selected by router. There are&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;different routing protocols to calculate best path to reach network. Best path is&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;calculated on hop count , bandwidth ,delay etc.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #a64d79;&quot;&gt;Default Routing:&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Default route which is also known as the gateway of last resort, is used in forwarding packets whose destination address does not match any route in the routing table. In IPv4 the CIDR notation for a default route is 0.0.0.0/0 and ::/0 in IPv6. Now since the both the host/network portion and the prefix length is zero a default route is the shortest possible match. In previous lessons in which we discussed basics of IP Routing we know that a router when performing a route lookup will select a route with longest possible match based on CID specifications,&amp;nbsp; however if packet does not match any route in the routing table it will match a default route, the shortest possible route, if it exists in the routing table. A default route is very useful in network where learning all the more specific routes is not desirable such as in case of stub networks. A default is immensely useful when a router is connected to the Internet as without a default route the router must have the routing entry for all networks on the Internet which are in numbers of several hundred thousand, however with single route configured as the default the router will only need to know the destinations internal to the administrative domain and forward IP packets for any other address towards the Internet using the default router.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;The default gateway is a device such as a router that serves as the edge devices providing an access point to other networks and is used to forward IP packets which does not match any routes in the routing table. We usually encounter the concept of default gateways in our daily computer life. The LAN configuration in our windows requires us to specify the IP address, Subnet Mask and the Default Gateway to access the Internet. The default gateway IP address is the IP address of the CPE or Internet modems which provide the connectivity to the Internet, now since the Internet has several hundred thousand routes which we cannot install in our table, we simply tell our computer to forward all packets destined to the Internet to this device. Again the CPE will itself have a default route and gateway configured which will point to the ISP access device.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #a64d79;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2179369288642070356'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2179369288642070356'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/03/routing-protocols.html' title='Types of routing'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-1646297606955930291</id><published>2018-03-13T15:45:00.000+05:30</published><updated>2018-03-13T15:45:54.026+05:30</updated><title type='text'>STP</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;The&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;Spanning Tree Protocol&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;(&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;STP&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;) is a&amp;nbsp;&lt;/span&gt;network protocol&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;that builds a loop-free&amp;nbsp;&lt;/span&gt;logical topology&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;for&amp;nbsp;&lt;/span&gt;Ethernet networks&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;. The basic function of STP is to prevent&amp;nbsp;&lt;/span&gt;bridge loops&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;and the&amp;nbsp;&lt;/span&gt;broadcast radiation&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;that results from them. Spanning tree also allows a&amp;nbsp;&lt;/span&gt;network design&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;to include backup links to provide&amp;nbsp;&lt;/span&gt;fault tolerance&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px;&quot;&gt;&amp;nbsp;if an active link fails.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;Protocol Operation:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbd_EYBFw6cZgNABYdYqc5md4j_mx2l7jZPNCF8zyQ6bvSsrV_Qe_X5mpDRqly15RiOG7W4pVY6H7zYRrBk4EUQFbyRDXPHurtdq8tIeAXzgH8AR2qnDMbDYx9cP0tWSiCCzeBP8oFO9M/s1600/591px-Spanning_tree_protocol_at_work_6.svg.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;591&quot; data-original-width=&quot;591&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbd_EYBFw6cZgNABYdYqc5md4j_mx2l7jZPNCF8zyQ6bvSsrV_Qe_X5mpDRqly15RiOG7W4pVY6H7zYRrBk4EUQFbyRDXPHurtdq8tIeAXzgH8AR2qnDMbDYx9cP0tWSiCCzeBP8oFO9M/s320/591px-Spanning_tree_protocol_at_work_6.svg.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The need for the Spanning Tree Protocol (STP) arose because&amp;nbsp;switches&amp;nbsp;in&amp;nbsp;local area networks&amp;nbsp;(LANs) were often interconnected using redundant links to improve resilience should one connection, called a&amp;nbsp;&lt;i&gt;link&lt;/i&gt;, fail. However, this was found to create transmission loops,&amp;nbsp;broadcast storms&amp;nbsp;and MAC address table trashing. If redundant links are used to connect switches, then transmission loops need to be avoidedbecause&amp;nbsp;data link layer&amp;nbsp;2&amp;nbsp;Ethernet frames&amp;nbsp;do not expire. Potentially an Ethernet frame with a destination&amp;nbsp;MAC address&amp;nbsp;that is not in the MAC address table of the immediate switch can be bounced around between switches in the local area network. Redundant links between these switches could result in the Ethernet frame never reaching a Switch that has the destination MAC address in its MAC address table. In such cases switches also broadcast the Ethernet frames to all ports, except the one from which it entered. This can create a broadcast storm. However, if only one link between switches exists, entire segments of the local area network would become unavailable should this one link fail. Thus it has become best practice to establish a second redundant link between critical switches.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-5&quot; style=&quot;font-size: 11.2px; line-height: 1; unicode-bidi: isolate; white-space: nowrap;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Spanning_Tree_Protocol#cite_note-5&quot; style=&quot;background: none; color: #0b0080; text-decoration-line: none;&quot;&gt;[5]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;If more than one link between two switches are used to transmit Ethernet frames, a switch will receive Ethernet frames with the same source MAC address through two ports, resulting in what is known as MAC address table trashing.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
To avoid the problems associated with redundant links in a switched LAN the Spanning Tree Protocol (STP) is implemented on switches to monitor the network topology. Every link between switches, and in particular redundant links, are catalogued. STP then disables redundant links by setting up one preferred and optimized link between switches in the LAN. This preferred link is used for all Ethernet frames unless it fails, in which case the non-preferred redundant link is enabled. When implemented in a network, STP designates one layer 2 switch as&amp;nbsp;&lt;i&gt;root bridge&lt;/i&gt;. On this root bridge the preferred and non-preferred links are calculated. The root bridge switch constantly communicates with the other switches in the LAN that implement STP, called&amp;nbsp;&lt;i&gt;non-root bridges&lt;/i&gt;, using&amp;nbsp;Bridge Protocol Data Units(BPDUs).&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
Provided there is more than one link between two switches, the STP root bridge calculates the cost of each path based on bandwidth. STP will select the path with the lowest cost, that is the highest bandwidth, as the preferred link. STP will enable this preferred link as the only path to be used for Ethernet frames between the two switches, and disable all other possible links by designating the switch ports that connect the preferred path as&amp;nbsp;&lt;i&gt;root port&lt;/i&gt;.The STP path cost default was originally calculated by the formula&amp;nbsp;&lt;span class=&quot;texhtml&quot; style=&quot;font-family: &amp;quot;nimbus roman no9 l&amp;quot; , &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , serif; font-size: 16.52px; line-height: 1; white-space: nowrap;&quot;&gt;&lt;span class=&quot;sfrac nowrap&quot; style=&quot;display: inline-block; font-size: 14.042px; text-align: center; vertical-align: -0.5em;&quot;&gt;&lt;span style=&quot;display: block; line-height: 1em; margin: 0px 0.1em;&quot;&gt;1 Gigabit / second&lt;/span&gt;&lt;span class=&quot;visualhide&quot; style=&quot;height: 1px; left: -10000px; overflow: hidden; position: absolute; top: auto; width: 1px;&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;border-top: 1px solid; display: block; line-height: 1em; margin: 0px 0.1em;&quot;&gt;bandwidth&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;. When faster speeds became available, the default values were adjusted as otherwise speeds above 1&amp;nbsp;Gbit/s would have been indistinguishable by STP. Its successor RSTP uses a similar formula with a larger numerator:&amp;nbsp;&lt;span class=&quot;texhtml&quot; style=&quot;font-family: &amp;quot;nimbus roman no9 l&amp;quot; , &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , serif; font-size: 16.52px; line-height: 1; white-space: nowrap;&quot;&gt;&lt;span class=&quot;sfrac nowrap&quot; style=&quot;display: inline-block; font-size: 14.042px; text-align: center; vertical-align: -0.5em;&quot;&gt;&lt;span style=&quot;display: block; line-height: 1em; margin: 0px 0.1em;&quot;&gt;20 Terabit / second&lt;/span&gt;&lt;span class=&quot;visualhide&quot; style=&quot;height: 1px; left: -10000px; overflow: hidden; position: absolute; top: auto; width: 1px;&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;border-top: 1px solid; display: block; line-height: 1em; margin: 0px 0.1em;&quot;&gt;bandwidth&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;. These formulas lead to the sample values in the table on the right.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
After STP enabled switches in a LAN have elected the root bridge, all non-root bridges assign one of their ports as root port. This is either the port that connects the switch to the root bridge, or if there are several paths, the port with the preferred path as calculated by the root bridge. Because not all switches are directly connected to the root bridge they communicate amongst each other using STP&amp;nbsp;Bridge Protocol Data Units&amp;nbsp;(BPDUs). Each switch adds the cost of its own path to the cost received from the neighboring switches to determine the total cost of a given path to the root bridge. Once the cost of all possible paths to the root bridge have been added up, each switch assigns a port as root port which connects to the path with the lowest cost, or highest bandwidth, that will eventually lead to the root bridge&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;STP Switch Port States:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 14px; list-style-image: url(&amp;quot;data:image/svg+xml,%3Csvg xmlns=%22http://www.w3.org/2000/svg%22 width=%225%22 height=%2213%22%3E %3Ccircle cx=%222.5%22 cy=%229.5%22 r=%222.5%22 fill=%22%2300528c%22/%3E %3C/svg%3E&amp;quot;); margin: 0.3em 0px 0px 1.6em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;b&gt;Blocking&lt;/b&gt;&amp;nbsp;- A port that would cause a switching loop if it were active. No user data is sent or received over a blocking port, but it may go into forwarding mode if the other links in use fail and the spanning tree algorithm determines the port may transition to the forwarding state. BPDU data is still received in blocking state. Prevents the use of looped paths.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;b&gt;Listening&lt;/b&gt;&amp;nbsp;- The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state. It does not populate the MAC address table and it does not forward frames.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;b&gt;Learning&lt;/b&gt;&amp;nbsp;- While the port does not yet forward frames it does learn source addresses from frames received and adds them to the filtering database (switching database). It populates the MAC address table, but does not forward frames.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;b&gt;Forwarding&lt;/b&gt;&amp;nbsp;- A port receiving and sending data in Ethernet frames, normal operation. The Forwarding port monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;b&gt;Disabled&lt;/b&gt;&amp;nbsp;- A network administrator has manually disabled a switch port&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1646297606955930291'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1646297606955930291'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/03/stp.html' title='STP'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbd_EYBFw6cZgNABYdYqc5md4j_mx2l7jZPNCF8zyQ6bvSsrV_Qe_X5mpDRqly15RiOG7W4pVY6H7zYRrBk4EUQFbyRDXPHurtdq8tIeAXzgH8AR2qnDMbDYx9cP0tWSiCCzeBP8oFO9M/s72-c/591px-Spanning_tree_protocol_at_work_6.svg.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-1438053409344442749</id><published>2018-03-12T17:50:00.004+05:30</published><updated>2018-03-12T18:00:05.975+05:30</updated><title type='text'>Subnetting</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
In simple words subnetting means divide a large or huge network into a small and simple network. A large network is complicated to manage or if any fault occur in&amp;nbsp; the network it consume lots of time of network administrator to find out exact location of the issue.&lt;br /&gt;
&lt;br /&gt;
In Subnetting you have to answer 5 question specifically while you designing a network for any enterprises.&lt;br /&gt;
&lt;br /&gt;
Here are the 5 question you have to keep in your mind.&lt;br /&gt;
&lt;br /&gt;
Firstly client provide you pool of addresses then as per client requirement you have to design the LAN network at customer&#39;s office.&lt;br /&gt;
&lt;br /&gt;
These are the basic question you have to answer .&lt;br /&gt;
&lt;br /&gt;
1) How many subnet does the choosen&amp;nbsp; subnet mask produce?&lt;br /&gt;
&lt;br /&gt;
2) How many Valid host / subnet will be availble ?&lt;br /&gt;
&lt;br /&gt;
3) What are the valid Subnet ?&lt;br /&gt;
&lt;br /&gt;
4) What does the network and broadcast address of each subnet ?&lt;br /&gt;
&lt;br /&gt;
5) What are the valid host in each subnet ?&lt;br /&gt;
&lt;br /&gt;
Lets do the subnetting of class C IP address.&lt;br /&gt;
&lt;br /&gt;
For class C ip address for practice is 192.168.1.0&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184; width: 668px;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;height: 44.5pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;
  &lt;td style=&quot;border: solid black 1.0pt; height: 44.5pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Subnet Mask&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-left-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;How Many Subnet 2^x&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Where x is mask bit&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-left-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Host per subnet 2^y-2&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Where y is unmask bit&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-left-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Valid Subnet&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;256-subnet mask&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-left-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Broadcast address of
  each subnet&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-left-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;Valid host&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 28.6pt; mso-yfti-irow: 1;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 28.6pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.0&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/24&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;1&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;254&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;256-0=256&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.255&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.1to&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.254&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 28.6pt; mso-yfti-irow: 2;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 28.6pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.128&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/25&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;2&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;126&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;256-128=128&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.128&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.255&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.1 to 192.168.1.127&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.129 to 192.168.1.254&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 28.6pt; mso-yfti-irow: 3;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 28.6pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.192&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/26&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;4&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;62&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;256-192=64&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.63&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.127&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;192.168.1.191&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.255&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.1 to 192.168.1.62&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.64 to 192.168.1.126&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.128 to 192.168.1.190&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.192 to&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.254&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 28.6pt; mso-yfti-irow: 4;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 28.6pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.224&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/27&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;8&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;30&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;256-224=32&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.31&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.63&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.95&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.127&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.159&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.191&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.223&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.255&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.1 to 192.168.1.30&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.33 to 192.168.1.62&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.65 to 192.168.1.94&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.97 to 192.168.1.126&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.129 to 192.168.1.158&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.161&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;To 192.168.190&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.193 to&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.222&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.225 to 192.168.254&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 28.6pt; mso-yfti-irow: 5;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 28.6pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.240&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/28&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;16&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;14&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;256-240=16&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;192.168.1.15&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.31&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.47&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.63&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.79&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.95&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.111&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.127&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.143&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.159&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.175&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.191&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.207&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.223&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.239&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt;&quot;&gt;192.168.1.255&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;192.168.1.1 to 192.168.1.14&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.17 to 192.168.1.30&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.33 to 192.168.1.46&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.49 to 192.168.1.62&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.65 to 192.168.1.78&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.81 to&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.94&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.97 to
  192.168.1.110&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.113 to 192.168.1.126&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.129 to 192.168.1.142&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.145 o 192.168.1.158&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.161 to 192.168.174&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.177 to 192.168.1.190&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.193 to 192.168.1.206&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.209 to 192.168.1.222&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.225 to
  192.168.1.238&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;192.168.1.241&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;to 192.168.1.254&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;br /&gt;
  &lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
  &lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 28.6pt; mso-yfti-irow: 6;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 28.6pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.248&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/29&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;32&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;for practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 28.6pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 30.3pt; mso-yfti-irow: 7; mso-yfti-lastrow: yes;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 30.3pt; mso-border-top-alt: solid black 1.0pt; padding: 0in 5.4pt 0in 5.4pt; width: 91.8pt;&quot; valign=&quot;top&quot; width=&quot;122&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;255.255.255.252&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;/30&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 30.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 66.6pt;&quot; valign=&quot;top&quot; width=&quot;89&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;64&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 30.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.0in;&quot; valign=&quot;top&quot; width=&quot;96&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 30.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 76.5pt;&quot; valign=&quot;top&quot; width=&quot;102&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 30.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 1.25in;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 30.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 104.05pt;&quot; valign=&quot;top&quot; width=&quot;139&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;serif&amp;quot;; font-size: 12.0pt;&quot;&gt;&amp;nbsp;practice&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-yfti-tbllook: 1184; width: 654px;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;height: 44.5pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;
  &lt;td style=&quot;border: solid black 1.0pt; height: 44.5pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 81.7pt;&quot; valign=&quot;top&quot; width=&quot;109&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 81.7pt;&quot; valign=&quot;top&quot; width=&quot;109&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 81.7pt;&quot; valign=&quot;top&quot; width=&quot;109&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 81.7pt;&quot; valign=&quot;top&quot; width=&quot;109&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 81.7pt;&quot; valign=&quot;top&quot; width=&quot;109&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 44.5pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 81.7pt;&quot; valign=&quot;top&quot; width=&quot;109&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
We will learn Class B and Class A subnetting in coming posts on our blog so stay tune...&lt;br /&gt;
&lt;br /&gt;
If You have any doubt our requirement you can comment on our &lt;a href=&quot;https://www.facebook.com/Netconfiguration&quot; target=&quot;_blank&quot;&gt;fb&lt;/a&gt;&amp;nbsp;page.&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1438053409344442749'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1438053409344442749'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/03/subnetting.html' title='Subnetting'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-443906456847903150</id><published>2018-02-28T15:22:00.003+05:30</published><updated>2018-02-28T15:22:56.904+05:30</updated><title type='text'>cisco ios</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;background: white; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Cisco IOS&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;&amp;nbsp;(originally&amp;nbsp;&lt;b&gt;Internetwork
Operating System&lt;/b&gt;) is a family of software used on most&amp;nbsp;Cisco Systems&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;routers&lt;/span&gt;&amp;nbsp;and current Cisco&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;network switches&lt;/span&gt;.&amp;nbsp;&lt;i&gt;(Earlier
switches ran&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/CatOS&quot; title=&quot;CatOS&quot;&gt;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;CatOS&lt;/span&gt;&lt;/a&gt;.)&lt;/i&gt;&amp;nbsp;IOS
is a package of routing, switching, internetworking and telecommunications
functions integrated into a&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;multitasking&lt;/span&gt;&amp;nbsp;operating system. Although
the IOS code base includes a&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;cooperative multitasking&lt;/span&gt;&amp;nbsp;kernel, most
IOS features have been ported to other kernels such as&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/QNX&quot; title=&quot;QNX&quot;&gt;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;QNX&lt;/span&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;Linux&lt;/span&gt;&amp;nbsp;for use in
Cisco products or simulators such as Cisco VIRL.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background: white; font-variant-caps: normal; font-variant-ligatures: normal; line-height: inherit; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; orphans: 2; text-align: start; text-decoration-color: initial; text-decoration-style: initial; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Not
all Cisco products run IOS. Notable exceptions include&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;ASA&lt;/span&gt;&amp;nbsp;security
products, which run a Linux-derived operating system, and carrier routers which
run&amp;nbsp;&lt;span style=&quot;color: #0b0080; text-decoration: none; text-underline: none;&quot;&gt;IOS-XR&lt;/span&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; border-bottom: solid #A2A9B1 1.0pt; border: none; mso-border-bottom-alt: solid #A2A9B1 .75pt; mso-element: para-border-div; padding: 0in 0in 0in 0in;&quot;&gt;

&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; border: none; line-height: normal; margin-bottom: 3.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt; mso-border-bottom-alt: solid #A2A9B1 .75pt; mso-outline-level: 2; mso-padding-alt: 0in 0in 0in 0in; padding: 0in;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 18.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Interface&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The IOS command line interface provides a fixed set of
multiple-word&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;commands&lt;/span&gt;. The set available
is determined by the &quot;mode&quot; and the privilege level of the current
user. &quot;Global configuration mode&quot; provides commands to change the
system&#39;s configuration, and &quot;interface configuration mode&quot; provides
commands to change the configuration of a specific interface. All commands are
assigned a&amp;nbsp;&lt;i&gt;privilege level&lt;/i&gt;, from 0 to 15, and can only be accessed
by users with the necessary privilege. Through the CLI, the commands available
to each privilege level can be defined.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Most builds of IOS include a&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/Tcl&quot; title=&quot;Tcl&quot;&gt;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;Tcl&lt;/span&gt;&lt;/a&gt;&amp;nbsp;interpreter.
Using the&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;Embedded event manager&lt;/span&gt;&amp;nbsp;feature,
the interpreter can be scripted to react to events within the networking
environment, such as interface failure or periodic timers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Available command modes include:&lt;/span&gt;&lt;sup&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;User EXEC Mode&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Privileged EXEC Mode&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Global Configuration
Mode&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;ROM Monitor Mode&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Setup Mode&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;More than 100
configuration modes and submodes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;span style=&quot;background-color: white; font-family: Georgia, serif; font-size: 18pt;&quot;&gt;Versioning&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Cisco IOS is versioned using three numbers and some letters, in
the general form&amp;nbsp;&lt;i&gt;a.b(c.d)e&lt;/i&gt;, where:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l1 level1 lfo2; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;a&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;is the major version number.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l1 level1 lfo2; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;b&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;is the minor version number.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l1 level1 lfo2; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;c&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;is the release number, which begins at
one and increments as new releases in a same way&amp;nbsp;&lt;i&gt;a.b&lt;/i&gt;&amp;nbsp;train are
released. &quot;Train&quot; is Cisco-speak for, &quot;...a vehicle for
delivering Cisco software to a specific set of platforms and features..&quot;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l1 level1 lfo2; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;d&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;(omitted from general releases) is the
interim build number.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 1.2pt; margin-left: 19.2pt; mso-list: l1 level1 lfo2; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #222222; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;e&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;(zero, one or two letters) is the&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;software release train&lt;/span&gt;&amp;nbsp;identifier,
such as none (which designates the mainline, see below),&amp;nbsp;&lt;i&gt;T&lt;/i&gt;&amp;nbsp;(for
Technology),&amp;nbsp;&lt;i&gt;E&lt;/i&gt;&amp;nbsp;(for Enterprise),&amp;nbsp;&lt;i&gt;S&lt;/i&gt;&amp;nbsp;(for
Service provider),&amp;nbsp;&lt;i&gt;XA&lt;/i&gt;&amp;nbsp;as a special functionality train,&amp;nbsp;&lt;i&gt;XB&lt;/i&gt;&amp;nbsp;as
a different special functionality train, etc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Rebuilds&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;–
Often a rebuild is compiled to fix a single specific problem or vulnerability
for a given IOS version. For example, 12.1(8)E14 is a Rebuild, the 14 denoting
the 14th rebuild of 12.1(8)E. Rebuilds are produced to either quickly repair a
defect, or to satisfy customers who do not want to upgrade to a later major
revision because they may be running critical infrastructure on their devices,
and hence prefer to minimise change and risk.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Interim releases&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;– Are usually produced on a weekly basis, and form a
roll-up of current development effort. The Cisco advisory web site may list
more than one possible interim to fix an associated issue (the reason for this
is unknown to the general public).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Maintenance releases&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;– Rigorously tested releases that are made available and
include enhancements and bug fixes. Cisco recommend upgrading to Maintenance
releases where possible, over Interim and Rebuild releases.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; border-bottom: solid #A2A9B1 1.0pt; border: none; mso-border-bottom-alt: solid #A2A9B1 .75pt; mso-element: para-border-div; padding: 0in 0in 0in 0in;&quot;&gt;

&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; border: none; line-height: normal; margin-bottom: 3.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt; mso-border-bottom-alt: solid #A2A9B1 .75pt; mso-outline-level: 2; mso-padding-alt: 0in 0in 0in 0in; padding: 0in;&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 18.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Architecture&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;In all versions of Cisco IOS,&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;packet routing&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;forwarding&lt;/span&gt;&amp;nbsp;(&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;switching&lt;/span&gt;) are distinct functions. Routing and other protocols
run as Cisco IOS processes and contribute to the Routing Information Base
(RIB). This is processed to generate the final IP forwarding table (FIB,
Forwarding Information Base), which is used by the forwarding function of the
router. On router platforms with software-only forwarding (e.g., Cisco 7200)
most traffic handling, including&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;access control list&lt;/span&gt;&amp;nbsp;filtering
and forwarding, is done at interrupt level using&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;Cisco Express
Forwarding&lt;/span&gt;&amp;nbsp;(CEF) or dCEF (Distributed CEF). This means IOS does
not have to do a process&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;context switch&lt;/span&gt;&amp;nbsp;to forward a packet. Routing functions
such as&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;OSPF&lt;/span&gt;&amp;nbsp;or&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;BGP&lt;/span&gt;run at
the process level. In routers with hardware-based forwarding, such as the Cisco
12000 series, IOS computes the FIB in software and loads it into the forwarding
hardware (such as an&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;ASIC&lt;/span&gt;&amp;nbsp;or
network processor), which performs the actual packet forwarding function.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Cisco IOS has a &quot;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;monolithic&lt;/span&gt;&quot; architecture, which means that it runs as a
single image and all processes share the same memory space. There is no memory
protection between processes, which means that bugs in IOS code can potentially
corrupt data used by other processes. It also has a&amp;nbsp;&lt;i&gt;run to completion&lt;/i&gt;&amp;nbsp;scheduler,
which means that the kernel does not pre-empt a running process — the process
must make a kernel call before other processes get a chance to run. For Cisco
products that required very high availability, such as the&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;Cisco CRS-1&lt;/span&gt;, these limitations were not acceptable. In
addition, competitive router operating systems that emerged 10–20 years after
IOS, such as&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;Juniper&lt;/span&gt;&#39;s&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;JUNOS&lt;/span&gt;,
were designed not to have these limitations.&lt;/span&gt;&lt;sup&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Cisco_IOS#cite_note-5&quot;&gt;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;[5]&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;Cisco&#39;s
response was to develop a new version of Cisco IOS called&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/Cisco_IOS_XR&quot; title=&quot;Cisco IOS XR&quot;&gt;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;IOS XR&lt;/span&gt;&lt;/a&gt;&amp;nbsp;that offered modularity and memory protection
between processes, lightweight threads, pre-emptive scheduling and the ability
to independently restart failed processes. IOS XR uses a 3rd party&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;real-time operating
system&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;microkernel&lt;/span&gt;&amp;nbsp;(&lt;a href=&quot;https://en.wikipedia.org/wiki/QNX&quot; title=&quot;QNX&quot;&gt;&lt;span style=&quot;color: #0b0080; mso-bidi-font-size: 11.0pt; text-decoration: none; text-underline: none;&quot;&gt;QNX&lt;/span&gt;&lt;/a&gt;),
and a large part of the current IOS code was re-written to take advantage of
the features offered by the new kernel. But the microkernel architecture
removes from the kernel all processes that are not absolutely required to run
in the kernel, and executes them as processes similar to the application
processes. Through this method, IOS XR is able to achieve the high availability
desired for the new router platform. Thus IOS and IOS XR are very different
codebases, though related in functionality and design. In 2005, Cisco
introduced IOS XR on the Cisco 12000 series platform, extending the microkernel
architecture from the CRS-1 to Cisco&#39;s widely deployed core router.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;In 2006, Cisco has made available IOS Software Modularity which
extends the QNX microkernel into a more traditional IOS environment, but still
providing the software upgrade capabilities that customers are demanding. It is
currently available on the Catalyst 6500 enterprise switch.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/443906456847903150'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/443906456847903150'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/cisco-ios.html' title='cisco ios'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-9173143540825822425</id><published>2018-02-27T19:44:00.001+05:30</published><updated>2018-03-14T14:12:04.298+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><title type='text'>IP ADDRESSING</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
IP Addressing Is very important topic in networking. IP address is an identifier for any machine which is use in communication. It designates the specific location of device on the network.&lt;br /&gt;
&lt;br /&gt;
An IP address is software address, not a hardware address. The address codes on NIC(Network Interface Card) is konwn as MAC address and it is used to find host on local network, but IP address is used to communicate between network and it is used to locate host in different network.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: red; font-size: x-large;&quot;&gt;IP Terminology:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Bit : A bit is one digit, either a 1 or a 0.&lt;br /&gt;
&lt;br /&gt;
Byte: A byte is 7 or 8 bits depending upon on whether parity is used.&lt;br /&gt;
&lt;br /&gt;
Octet: An octet is made up of just 8 bits and it is binary number combination of 1s or 0s.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;Network Address :&lt;/span&gt; This is the designation or notation used in routing to send packets across network.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;For e.g.&amp;nbsp; 10.0.0.0 172.16.0.0 and 192.168.10.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #0b5394;&quot;&gt;Broadcast address:&lt;/span&gt; The address used by applications and hosts to send information to all nodes on a&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;network is called the broadcast address.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; For e.g. 10.255.255.255 172.16.255.255 and 192.168.255.255&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: x-large;&quot;&gt;The Hierarchical IP Addressing Scheme&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
An IP address is consist of 32 bits . These&amp;nbsp; bits divided into four parts referred as octet.&lt;br /&gt;
&lt;br /&gt;
you can depict an IP address using one of the three methods .&lt;br /&gt;
&lt;br /&gt;
Dotted-decimal as 172.16.0.0&lt;br /&gt;
&lt;br /&gt;
Binary as in 11000000.00010000.00000000.00000000&lt;br /&gt;
&lt;br /&gt;
Hexadecimal, as in AC.10.1E.38&lt;br /&gt;
&lt;br /&gt;
The 32-bit IP address is structured or hierarchical address, as opposed to flat or non hierarchical address. Although&amp;nbsp; either type of addressing scheme could have been used, hierarchical addressing was chosen for good reason.&lt;br /&gt;
&lt;br /&gt;
By this scheme we have nearly 4.3 billion ip addresses.&lt;br /&gt;
&lt;br /&gt;
The Disadvantage of of the flat addressing scheme, and the reason its not used for IP addressing, relates to routing . If every address were unique, all the routers on the internet would need to store the address of each and every machine on the internet . This would make efficient routing impossible , even if only a fraction of the possible address were used.&lt;br /&gt;
&lt;span style=&quot;color: #741b47; font-size: x-large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #741b47; font-size: x-large;&quot;&gt;Classification Of IP Addresses&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
IP address is divided or classified in&amp;nbsp; 5 classes based on host bit and network bit.&lt;br /&gt;
&lt;br /&gt;
Lets understand what is Host bit and Network bit by an example.&lt;br /&gt;
Suppose you want to call your friend who is living in another city so you have your friends contact number but when you make a call you fist dial area code followed by friends contact number.&lt;br /&gt;
&lt;br /&gt;
For e.g 011-22087213 here 011 is area code and rest digits are specific host number. From anywhere&amp;nbsp; in the world you dial this number you will able to talk to you friend.\&lt;br /&gt;
&lt;br /&gt;
Network bit is like area code and host bits are like contact number.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;left&quot; border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; margin-left: 6.75pt; margin-right: 6.75pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-table-anchor-horizontal: margin; mso-table-anchor-vertical: paragraph; mso-table-left: left; mso-table-lspace: 9.0pt; mso-table-rspace: 9.0pt; mso-table-top: -1.35pt; mso-yfti-tbllook: 1184;&quot;&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style=&quot;border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 52.85pt;&quot; valign=&quot;top&quot; width=&quot;70&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: -1.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Class A&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 55.15pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: -1.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #00b050; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.25pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: -1.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #e36c0a; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Host&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.25pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: -1.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; text-align: center; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #e36c0a; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Host&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.25pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: -1.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #e36c0a; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Host&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;left&quot; border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; margin-left: 6.75pt; margin-right: 6.75pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-table-anchor-horizontal: page; mso-table-anchor-vertical: paragraph; mso-table-left: 43.35pt; mso-table-lspace: 9.0pt; mso-table-rspace: 9.0pt; mso-table-top: 38.35pt; mso-yfti-tbllook: 1184;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;height: 13.0pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0; mso-yfti-lastrow: yes;&quot;&gt;
  &lt;td style=&quot;border: solid black 1.0pt; height: 13.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 52.85pt;&quot; valign=&quot;top&quot; width=&quot;70&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: page; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-left: 43.4pt; mso-element-top: 38.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Class B&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 13.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 55.15pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: page; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-left: 43.4pt; mso-element-top: 38.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #00b050; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 13.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 55.15pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: page; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-left: 43.4pt; mso-element-top: 38.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #00b050; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 13.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.25pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: page; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-left: 43.4pt; mso-element-top: 38.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #e36c0a; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Host&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 13.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.25pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 21.4pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-element-anchor-horizontal: page; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-left: 43.4pt; mso-element-top: 38.35pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: top;&quot;&gt;
&lt;span style=&quot;color: #e36c0a; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Host&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;table align=&quot;left&quot; border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; margin-left: 6.75pt; margin-right: 6.75pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-table-anchor-horizontal: margin; mso-table-anchor-vertical: paragraph; mso-table-left: left; mso-table-lspace: 9.0pt; mso-table-rspace: 9.0pt; mso-table-top: 9.45pt; mso-yfti-tbllook: 1184;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;mso-yfti-firstrow: yes; mso-yfti-irow: 0; mso-yfti-lastrow: yes;&quot;&gt;
  &lt;td style=&quot;border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 53.4pt;&quot; valign=&quot;top&quot; width=&quot;71&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 12.0pt; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: 9.45pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Class C&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 55.15pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 12.0pt; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: 9.45pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #00b050; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 55.15pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 12.0pt; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: 9.45pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #00b050; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 55.15pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 12.0pt; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: 9.45pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #00b050; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.25pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 12.0pt; mso-element-anchor-horizontal: margin; mso-element-anchor-vertical: paragraph; mso-element-frame-hspace: 9.0pt; mso-element-top: 9.45pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #e36c0a; font-family: &amp;quot;arial&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 10.5pt;&quot;&gt;Host&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: red;&quot;&gt;Class D&lt;/span&gt; is used for multi casting&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Class E&lt;/span&gt; is used for Research purpose.&lt;br /&gt;
&lt;br /&gt;
.........In Next post I will xplain you range of IP address and its uses.&amp;nbsp; stay tune...........&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/9173143540825822425'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/9173143540825822425'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/ip-addressing.html' title='IP ADDRESSING'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-2538280094501209654</id><published>2018-02-24T13:26:00.001+05:30</published><updated>2018-02-24T13:26:06.913+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Penetration Testing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
what will be the time of penetration test,&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
where will be the IP source of the attack, and&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
what will be the penetration fields of the system.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Types of Penetration Testing&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We have five types of penetration testing −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Black Box&lt;/span&gt;&amp;nbsp;− Here, the ethical hacker doesn’t have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Grey Box&lt;/span&gt;&amp;nbsp;− It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;White Box&lt;/span&gt;&amp;nbsp;− In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;External Penetration Testing&lt;/span&gt;&amp;nbsp;− This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Internal Penetration Testing&lt;/span&gt;&amp;nbsp;− In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead with penetration testing. The risk is calculated as follows and it is a management risk.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: center; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;RISK = Threat × Vulnerability&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You have an online e-commerce website that is in production. You want to do a penetration testing before making it live. Here, you have to weigh the pros and cons first. If you go ahead with penetration testing, it might cause interruption of service. On the contrary, if you do not wish to perform a penetration testing, then you can run the risk of having an unpatched vulnerability that will remain as a threat all the time.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Before doing a penetration test, it is recommended that you put down the scope of the project in writing. You should be clear about what is going to be tested. For example −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Your company has a VPN or any other remote access techniques and you want to test that particular point.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Your application has webservers with databases, so you might want to get it tested for SQL injection attacks which is one of the most crucial tests on a webserver. In addition, you can check if your webserver is immune to DoS attacks.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Before going ahead with a penetration test, you should keep the following points in mind −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
First understand your requirements and evaluate all the risks.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Hire a certified person to conduct penetration test because they are trained to apply all the possible methods and techniques to uncover possible loopholes in a network or web application.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Always sign an agreement before doing a penetration test.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2538280094501209654'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2538280094501209654'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/penetration-testing.html' title='Penetration Testing'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-74783735400946939</id><published>2018-02-24T13:19:00.003+05:30</published><updated>2018-02-24T13:19:44.227+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>SQL injection</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
SQL injection is a set of SQL commands that are placed in a URL string or in data structures in order to retrieve a response that we want from the databases that are connected with the web applications. This type of attacks generally takes place on webpages developed using PHP or ASP.NET.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
An SQL injection attack can be done with the following intentions −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To dump the whole database of a system,&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To modify the content of the databases, or&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To perform different queries that are not allowed by the application.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
This type of attack works when the applications don’t validate the inputs properly, before passing them to an SQL statement. Injections are normally placed put in address bars, search fields, or data fields.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The easiest way to detect if a web application is vulnerable to an SQL injection attack is to use the &quot; ‘ &quot; character in a string and see if you get any error.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example 1&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Let’s try to understand this concept using a few examples. As shown in the following screenshot, we have used a &quot; ‘ &quot; character in the Name field.&lt;/div&gt;
&lt;img alt=&quot;Name Field&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/name_field.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Now, click the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Login&lt;/span&gt;&amp;nbsp;button. It should produce the following response −&lt;/div&gt;
&lt;img alt=&quot;Login&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/login.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It means that the “Name” field is vulnerable to SQL injection.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example 2&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We have this URL −&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;http://10.10.10.101/mutillidae/index.php?page=site-footer-xssdiscussion.php&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
And we want to test the variable “page” but observe how we have injected a &quot; ‘ &quot; character in the string URL.&lt;/div&gt;
&lt;img alt=&quot;Variable Page&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/variable_page.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
When we press Enter, it will produce the following result which is with errors.&lt;/div&gt;
&lt;img alt=&quot;Result With Errors&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/result_with_errors.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
SQLMAP&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
SQLMAP is one of the best tools available to detect SQL injections. It can be downloaded from&amp;nbsp;&lt;a href=&quot;http://sqlmap.org/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;http://sqlmap.org/&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It comes pre-compiled in the Kali distribution. You can locate it at − Applications → Database Assessment → Sqlmap.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
After opening SQLMAP, we go to the page that we have the SQL injection and then get the header request. From the header, we run the following command in SQL −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;./sqlmap.py --headers=&quot;User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:25.0) 
Gecko/20100101 Firefox/25.0&quot; --cookie=&quot;security=low;
PHPSESSID=oikbs8qcic2omf5gnd09kihsm7&quot; -u &#39;
http://localhost/dvwa/vulnerabilities/sqli_blind/?id=1&amp;amp;Submit=Submit#&#39; -
level=5 risk=3 -p id --suffix=&quot;-BR&quot; -v3
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The SQLMAP will test all the variables and the result will show that the parameter “id” is vulnerable, as shown in the following screenshot.&lt;/div&gt;
&lt;img alt=&quot;SQL Map&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/sql_map.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
SQLNinja&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
SQLNinja is another SQL injection tool that is available in Kali distribution.&lt;/div&gt;
&lt;img alt=&quot;SQLninja&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/sqlninja.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
JSQL Injection&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
JSQL Injection is in Java and it makes automated SQL injections.&lt;/div&gt;
&lt;img alt=&quot;JSQL Injection&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/jsql_injection.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Punch Line :&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To prevent your web application from SQL injection attacks, you should keep the following points in mind −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Unchecked user-input to database should not be allowed to pass through the application GUI.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Every variable that passes into the application should be sanitized and validated.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The user input which is passed into the database should be quoted.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/74783735400946939'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/74783735400946939'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/sql-injection.html' title='SQL injection'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-1369694343978284735</id><published>2018-02-24T13:17:00.004+05:30</published><updated>2018-02-24T13:17:56.696+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>cross site</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious JavaScript in another user&#39;s browser.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The attacker does not directly target his victim. Instead, he exploits a vulnerability in a website that the victim visits, in order to get the website to deliver the malicious JavaScript for him. To the victim&#39;s browser, the malicious JavaScript appears to be a legitimate part of the website, and the website has thus acted as an unintentional accomplice to the attacker. These attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash, but the most used XSS is malicious JavaScript.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
These attacks also can gather data from account hijacking, changing of user settings, cookie theft/poisoning, or false advertising and create DoS attacks.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Let’s take an example to understand how it works. We have a vulnerable webpage that we got by the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;metasploitable&lt;/span&gt;&amp;nbsp;machine. Now we will test the field that is highlighted in red arrow for XSS.&lt;/div&gt;
&lt;img alt=&quot;Metasploitable&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/metasploitable.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
First of all, we make a simple alert script&lt;/div&gt;
&lt;pre class=&quot;prettyprint notranslate prettyprinted&quot; style=&quot;background-color: #eeeeee; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 13px; line-height: 16px; margin-bottom: 10px; margin-top: 15px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;&lt;span class=&quot;tag&quot; style=&quot;box-sizing: border-box; color: #000088;&quot;&gt;&amp;lt;script&amp;gt;&lt;/span&gt;&lt;span class=&quot;pln&quot; style=&quot;box-sizing: border-box;&quot;&gt;  
   alert&lt;/span&gt;&lt;span class=&quot;pun&quot; style=&quot;box-sizing: border-box; color: #666600;&quot;&gt;(‘&lt;/span&gt;&lt;span class=&quot;pln&quot; style=&quot;box-sizing: border-box;&quot;&gt;I am &lt;/span&gt;&lt;span class=&quot;typ&quot; style=&quot;box-sizing: border-box; color: #7f0055;&quot;&gt;Vulnerable&lt;/span&gt;&lt;span class=&quot;pun&quot; style=&quot;box-sizing: border-box; color: #666600;&quot;&gt;’)&lt;/span&gt;&lt;span class=&quot;pln&quot; style=&quot;box-sizing: border-box;&quot;&gt;  
&lt;/span&gt;&lt;span class=&quot;tag&quot; style=&quot;box-sizing: border-box; color: #000088;&quot;&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It will produce the following output −&lt;/div&gt;
&lt;img alt=&quot;Simple Alert&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/simple_alert.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Types of XSS Attacks&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
XSS attacks are often divided into three types −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Persistent XSS,&lt;/span&gt;&amp;nbsp;where the malicious string originates from the website&#39;s database.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Reflected XSS,&lt;/span&gt;&amp;nbsp;where the malicious string originates from the victim&#39;s request.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DOM-based XSS,&lt;/span&gt;&amp;nbsp;where the vulnerability is in the client-side code rather than the server-side code.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Generally, cross-site scripting is found by&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;vulnerability scanners&lt;/span&gt;&amp;nbsp;so that you don’t have to do all the manual job by putting a JavaScript on it like&lt;/div&gt;
&lt;pre class=&quot;prettyprint notranslate prettyprinted&quot; style=&quot;background-color: #eeeeee; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 13px; line-height: 16px; margin-bottom: 10px; margin-top: 15px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;&lt;span class=&quot;tag&quot; style=&quot;box-sizing: border-box; color: #000088;&quot;&gt;&amp;lt;script&amp;gt;&lt;/span&gt;&lt;span class=&quot;pln&quot; style=&quot;box-sizing: border-box;&quot;&gt;  
   alert&lt;/span&gt;&lt;span class=&quot;pun&quot; style=&quot;box-sizing: border-box; color: #666600;&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;str&quot; style=&quot;box-sizing: border-box; color: #008800;&quot;&gt;&#39;XSS&#39;&lt;/span&gt;&lt;span class=&quot;pun&quot; style=&quot;box-sizing: border-box; color: #666600;&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;pln&quot; style=&quot;box-sizing: border-box;&quot;&gt; 
&lt;/span&gt;&lt;span class=&quot;tag&quot; style=&quot;box-sizing: border-box; color: #000088;&quot;&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Burp Suite&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;acunetix&lt;/span&gt;&amp;nbsp;are considered as the best vulnerability scanners.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To prevent XSS attacks, keep the following points in mind −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Check and validate all the form fields like hidden forms, headers, cookies, query strings.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Implement a stringent security policy. Set character limitation in the input fields.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1369694343978284735'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1369694343978284735'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/cross-site.html' title='cross site'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-2891264361569634667</id><published>2018-02-24T13:13:00.003+05:30</published><updated>2018-02-24T13:13:27.316+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>ddos attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service or a website unavailable by overloading it with huge floods of traffic generated from multiple sources.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Unlike a Denial of Service (DoS) attack, in which one computer and one Internet connection is used to flood a targeted resource with packets, a DDoS attack uses many computers and many Internet connections, often distributed globally in what is referred to as a&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;botnet&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A large scale volumetric DDoS attack can generate a traffic measured in tens of Gigabits (and even hundreds of Gigabits) per second. We are sure your normal network will not be able to handle such traffic.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
What are Botnets?&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Attackers build a network of hacked machines which are known as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;botnets&lt;/span&gt;, by spreading malicious piece of code through emails, websites, and social media. Once these computers are infected, they can be controlled remotely, without their owners&#39; knowledge, and used like an army to launch an attack against any target.&lt;/div&gt;
&lt;img alt=&quot;DDOS System&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/ddos_system.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A DDoS flood can be generated in multiple ways. For example −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Botnets can be used for sending more number of connection requests than a server can handle at a time.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Attackers can have computers send a victim resource huge amounts of random data to use up the target&#39;s bandwidth.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Due to the distributed nature of these machines, they can be used to generate distributed high traffic which may be difficult to handle. It finally results in a complete blockage of a service.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Types of DDoS Attacks&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
DDoS attacks can be broadly categorized into three categories −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Volume-based Attacks&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Protocol Attacks&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Application Layer Attacks&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Volume-Based Attacks&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Volume-based attacks include TCP floods, UDP floods, ICMP floods, and other spoofedpacket floods. These are also called&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Layer 3 &amp;amp; 4 Attacks&lt;/span&gt;. Here, an attacker tries to saturate the bandwidth of the target site. The attack magnitude is measured in&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Bits per Second&lt;/span&gt;&amp;nbsp;(bps).&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;UDP Flood&lt;/span&gt;&amp;nbsp;− A UDP flood is used to flood random ports on a remote host with numerous UDP packets, more specifically port number 53. Specialized firewalls can be used to filter out or block malicious UDP packets.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ICMP Flood&lt;/span&gt;&amp;nbsp;− This is similar to UDP flood and used to flood a remote host with numerous ICMP Echo Requests. This type of attack can consume both outgoing and incoming bandwidth and a high volume of ping requests will result in overall system slowdown.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;HTTP Flood&lt;/span&gt;&amp;nbsp;− The attacker sends HTTP GET and POST requests to a targeted web server in a large volume which cannot be handled by the server and leads to denial of additional connections from legitimate clients.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Amplification Attack&lt;/span&gt;&amp;nbsp;− The attacker makes a request that generates a large response which includes DNS requests for large TXT records and HTTP GET requests for large files like images, PDFs, or any other data files.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Protocol Attacks&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Protocol attacks include SYN floods, Ping of Death, fragmented packet attacks, Smurf DDoS, etc. This type of attack consumes actual server resources and other resources like firewalls and load balancers. The attack magnitude is measured in&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Packets per Second&lt;/span&gt;.&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DNS Flood&lt;/span&gt;&amp;nbsp;− DNS floods are used for attacking both the infrastructure and a DNS application to overwhelm a target system and consume all its available network bandwidth.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;SYN Flood&lt;/span&gt;&amp;nbsp;− The attacker sends TCP connection requests faster than the targeted machine can process them, causing network saturation. Administrators can tweak TCP stacks to mitigate the effect of SYN floods. To reduce the effect of SYN floods, you can reduce the timeout until a stack frees memory allocated to a connection, or selectively dropping incoming connections using a firewall or&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;iptables&lt;/span&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Ping of Death&lt;/span&gt;&amp;nbsp;− The attacker sends malformed or oversized packets using a simple ping command. IP allows sending 65,535 bytes packets but sending a ping packet larger than 65,535 bytes violates the Internet Protocol and could cause memory overflow on the target system and finally crash the system. To avoid Ping of Death attacks and its variants, many sites block ICMP ping messages altogether at their firewalls.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Application Layer Attacks&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Application Layer Attacks include Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. Here the goal is to crash the web server. The attack magnitude is measured in&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Requests per Second&lt;/span&gt;.&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Application Attack&lt;/span&gt;&amp;nbsp;− This is also called&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Layer 7 Attack&lt;/span&gt;, where the attacker makes excessive log-in, database-lookup, or search requests to overload the application. It is really difficult to detect Layer 7 attacks because they resemble legitimate website traffic.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Slowloris&lt;/span&gt;&amp;nbsp;− The attacker sends huge number of HTTP headers to a targeted web server, but never completes a request. The targeted server keeps each of these false connections open and eventually overflows the maximum concurrent connection pool, and leads to denial of additional connections from legitimate clients.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;NTP Amplification&lt;/span&gt;&amp;nbsp;− The attacker exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted server with User Datagram Protocol (UDP) traffic.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Zero-day DDoS Attacks&lt;/span&gt;&amp;nbsp;− A zero-day vulnerability is a system or application flaw previously unknown to the vendor, and has not been fixed or patched. These are new type of attacks coming into existence day by day, for example, exploiting vulnerabilities for which no patch has yet been released.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
How to Fix a DDoS Attack&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
There are quite a few DDoS protection options which you can apply depending on the type of DDoS attack.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Your DDoS protection starts from identifying and closing all the possible OS and application level vulnerabilities in your system, closing all the possible ports, removing unnecessary access from the system and hiding your server behind a proxy or CDN system.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
If you see a low magnitude of the DDoS, then you can find many firewall-based solutions which can help you in filtering out DDoS based traffic. But if you have high volume of DDoS attack like in gigabits or even more, then you should take the help of a DDoS protection service provider that offers a more holistic, proactive and genuine approach.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You must be careful while approaching and selecting a DDoS protection service provider. There are number of service providers who want to take advantage of your situation. If you inform them that you are under DDoS attack, then they will start offering you a variety of services at unreasonably high costs.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We can suggest you a simple and working solution which starts with a search for a good DNS solution provider who is flexible enough to configure A and CNAME records for your website. Second, you will need a good CDN provider that can handle big DDoS traffic and provide you DDoS protection service as a part of their CDN package.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Assume your server IP address is AAA.BBB.CCC.DDD. Then you should do the following DNS configuration −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Create a&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;A Record&lt;/span&gt;&amp;nbsp;in DNS zone file as shown below with a DNS identifier, for example,&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ARECORDID&lt;/span&gt;&amp;nbsp;and keep it secret from the outside world.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Now ask your CDN provider to link the created DNS identifier with a URL, something like&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;cdn.someotherid.domain.com&lt;/span&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You will use the CDN URL cdn.someotherid.domain.com to create two CNAME records, the first one to point to&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;www&lt;/span&gt;&amp;nbsp;and the second record to point to @ as shown below.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can take the help from your system administrator to understand these points and configure your DNS and CDN appropriately. Finally, you will have the following configuration at your DNS.&lt;/div&gt;
&lt;img alt=&quot;DNS Configuration&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/dns_configuration.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Now, let the CDN provider handle all type of DDoS attacks and your system will remain safe. But here the condition is that you should not disclose your system&#39;s IP address or A record identifier to anyone; else direct attacks will start again.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
DDoS attacks have become more common than ever before, and unfortunately, there is no quick fix for this problem. However, if your system is under a DDoS attack, then don’t panic and start looking into the matter step by step.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2891264361569634667'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2891264361569634667'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/ddos-attack.html' title='ddos attack'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-2991138952639391516</id><published>2018-02-24T13:11:00.002+05:30</published><updated>2018-02-24T14:06:53.201+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>social engineering</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Let us try to understand the concept of Social Engineering attacks through some examples.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example 1&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You must have noticed old company documents being thrown into dustbins as garbage. These documents might contain sensitive information such as Names, Phone Numbers, Account Numbers, Social Security Numbers, Addresses, etc. Many companies still use carbon paper in their fax machines and once the roll is over, its carbon goes into dustbin which may have traces of sensitive data. Although it sounds improbable, but attackers can easily retrieve information from the company dumpsters by pilfering through the garbage.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example 2&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
An attacker may befriend a company personnel and establish good relationship with him over a period of time. This relationship can be established online through social networks, chatting rooms, or offline at a coffee table, in a playground, or through any other means. The attacker takes the office personnel in confidence and finally digs out the required sensitive information without giving a clue.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example 3&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A social engineer may pretend to be an employee or a valid user or an VIP by faking an identification card or simply by convincing employees of his position in the company. Such an attacker can gain physical access to restricted areas, thus providing further opportunities for attacks.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example 4&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It happens in most of the cases that an attacker might be around you and can do&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;shoulder surfing&lt;/span&gt;&amp;nbsp;while you are typing sensitive information like user ID and password, account PIN, etc.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Phishing Attack&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A phishing attack is a computer-based social engineering, where an attacker crafts an email that appears legitimate. Such emails have the same look and feel as those received from the original site, but they might contain links to fake websites. If you are not smart enough, then you will type your user ID and password and will try to login which will result in failure and by that time, the attacker will have your ID and password to attack your original account.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line :&lt;/span&gt;&lt;/h2&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You should enforce a good security policy in your organization and conduct required trainings to make all the employees aware of the possible Social Engineering attacks and their consequences.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Document shredding should be a mandatory activity in your company.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Make double sure that any links that you receive in your email is coming from authentic sources and that they point to correct websites. Otherwise you might end up as a victim of Phishing.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Be professional and never share your ID and password with anybody else in any case.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2991138952639391516'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2991138952639391516'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/social-engineering.html' title='social engineering'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-8355001886144772883</id><published>2018-02-23T16:45:00.001+05:30</published><updated>2018-02-23T19:40:20.263+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>wireless attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A wireless network is a set of two or more devices connected with each other via radio waves within a limited space range. The devices in a wireless network have the freedom to be in motion, but be in connection with the network and share data with other devices in the network. One of the most crucial point that they are so spread is that their installation cost is very cheap and fast than the wire networks.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Wireless networks are widely used and it is quite easy to set them up. They use&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/IEEE_802.11&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;IEEE 802.11&lt;/a&gt;&amp;nbsp;standards. A&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;wireless router&lt;/span&gt;&amp;nbsp;is the most important device in a wireless network that connects the users with the Internet.&lt;/div&gt;
&lt;img alt=&quot;Wireless Router&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/wireless_router.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In a wireless network, we have&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Access Points&lt;/span&gt;&amp;nbsp;which are extensions of wireless ranges that behave as logical switches.&lt;/div&gt;
&lt;img alt=&quot;Access Point&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/access_point.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Although wireless networks offer great flexibility, they have their security problems. A hacker can sniff the network packets without having to be in the same building where the network is located. As wireless networks communicate through radio waves, a hacker can easily sniff the network from a nearby location.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Most attackers use network sniffing to find the SSID and hack a wireless network. When our wireless cards are converted in sniffing modes, they are called&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;monitor mode&lt;/span&gt;.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Kismet&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Kismet is a powerful tool for wireless sniffing that is found in Kali distribution. It can also be downloaded from its official webpage −&amp;nbsp;&lt;a href=&quot;https://www.kismetwireless.net/index.shtml&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://www.kismetwireless.net/index.shtml&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Let’s see how it works. First of all, open a terminal and type&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;kismet&lt;/span&gt;. Start the Kismet Server and click Yes, as shown in the following screenshot.&lt;/div&gt;
&lt;img alt=&quot;Kismet&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/kismet.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
As shown here, click the Start button.&lt;/div&gt;
&lt;img alt=&quot;Start Button&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/start_button.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Now, Kismet will start to capture data. The following screenshot shows how it would appear −&lt;/div&gt;
&lt;img alt=&quot;Capture Data&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/capture_data.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
NetStumbler&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
NetStumbler is another tool for wireless hacking that is primarily meant for Windows systems. It can be downloaded from&amp;nbsp;&lt;a href=&quot;http://www.stumbler.net/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;http://www.stumbler.net/&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It is quite easy to use NetStumbler on your system. You just have to click the Scanning button and wait for the result, as shown in the following screenshot.&lt;/div&gt;
&lt;img alt=&quot;Scanning&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/scanning.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It should display a screenshot as follows −&lt;/div&gt;
&lt;img alt=&quot;Network Stumbler&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/network_stumbler.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It is important to note that your card should support monitoring mode, otherwise you will fail to monitor.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Wired Equivalent Privacy&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Wired Equivalent Privacy (WEP) is a security protocol that was invented to secure wireless networks and keep them private. It utilizes encryption at the data link layer which forbids unauthorized access to the network.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The key is used to encrypt the packets before transmission begins. An&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;integrity check mechanism&amp;nbsp;&lt;/span&gt;checks that the packets are not altered after transmission.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Note that WEP is not entirely immune to security problems. It suffers from the following issues −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
CRC32 is not sufficient to ensure complete cryptographic integrity of a packet.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It is vulnerable to dictionary attacks.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
WEP is vulnerable to Denial of Services attacks too.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
WEPcrack&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
WEPcrack is a popular tool to crack WEP passwords. It can be downloaded from −&amp;nbsp;&lt;a href=&quot;https://sourceforge.net/projects/wepcrack/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://sourceforge.net/projects/wepcrack/&lt;/a&gt;&lt;/div&gt;
&lt;img alt=&quot;WEP Crack&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/wep_crack.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Aircrack-ng&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Aircrak-ng is another popular tool for cracking WEP passwords. It can be found in the Kali distribution of Linux.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The following screenshot shows how we have sniffed a wireless network and collected packets and created a file RHAWEP-01.cap. Then we run it with aircrack-ng to decrypt the cypher.&lt;/div&gt;
&lt;img alt=&quot;Air Crack&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/air_crack.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: #121214; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
Wireless DoS Attacks&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In a wireless environment, an attacker can attack a network from a distance and therefore, it is sometimes difficult to collect evidences against the attacker.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The first type of DoS is&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Physical Attack&lt;/span&gt;. This type of attack is very basic and it is in the base of radio interferences which can be created even from cordless phones that operate in 2.4 GHz range.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Another type is&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Network DoS Attack&lt;/span&gt;. As the Wireless Access Point creates a shared medium, it offers the possibility to flood the traffic of this medium toward the AP which will make its processing more slow toward the clients that attempt to connect. Such attacks can be created just by a&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ping flood DoS attack&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Pyloris is a popular DoS tool that you can download from −&amp;nbsp;&lt;a href=&quot;https://sourceforge.net/projects/pyloris/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://sourceforge.net/projects/pyloris/&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Low Orbit Ion Cannon (LOIC) is another popular tool for DoS attacks.&lt;/div&gt;
&lt;img alt=&quot;DOS Attacks&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/dos_attacks.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To secure a wireless network, you should keep the following points in mind −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Change the SSID and the network password regularly.&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Change the default password of access points.&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Don’t use WEP encryption.&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Turn off guest networking.&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Update the firmware of your wireless device.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/8355001886144772883'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/8355001886144772883'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/wireless-attack.html' title='wireless attack'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-1759228455640779564</id><published>2018-02-23T16:35:00.004+05:30</published><updated>2018-02-23T19:41:38.400+05:30</updated><title type='text'>Password Hacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We have passwords for emails, databases, computer systems, servers, bank accounts, and virtually everything that we want to protect. Passwords are in general the keys to get access into a system or an account.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In general, people tend to set passwords that are easy to remember, such as their date of birth, names of family members, mobile numbers, etc. This is what makes the passwords weak and prone to easy hacking.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
One should always take care to have a strong password to defend their accounts from potential hackers. A strong password has the following attributes −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Contains at least 8 characters.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A mix of letters, numbers, and special characters.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A combination of small and capital letters.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Dictionary Attack&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In a dictionary attack, the hacker uses a predefined list of words from a dictionary to try and guess the password. If the set password is weak, then a dictionary attack can decode it quite fast.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Hydra&lt;/span&gt;&amp;nbsp;is a popular tool that is widely used for dictionary attacks. Take a look at the following screenshot and observe how we have used Hydra to find out the password of an FTP service.&lt;/div&gt;
&lt;img alt=&quot;Dictionary Attack&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/dictionary_attack.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Hybrid Dictionary Attack&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Hybrid dictionary attack uses a set of dictionary words combined with extensions. For example, we have the word “admin” and combine it with number extensions such as “admin123”, “admin147”, etc.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Crunch&lt;/span&gt;&amp;nbsp;is a wordlist generator where you can specify a standard character set or a character set.&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Crunch&lt;/span&gt;&amp;nbsp;can generate all possible combinations and permutations. This tool comes bundled with the Kali distribution of Linux.&lt;/div&gt;
&lt;img alt=&quot;Hybrid Attack&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/hybrid_attack.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Brute-Force Attack&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In a brute-force attack, the hacker uses all possible combinations of letters, numbers, special characters, and small and capital letters to break the password. This type of attack has a high probability of success, but it requires an enormous amount of time to process all the combinations. A brute-force attack is slow and the hacker might require a system with high processing power to perform all those permutations and combinations faster.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;John the Ripper&lt;/span&gt;&amp;nbsp;or&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Johnny&lt;/span&gt;&amp;nbsp;is one of the powerful tools to set a brute-force attack and it comes bundled with the Kali distribution of Linux.&lt;/div&gt;
&lt;img alt=&quot;Brute Force&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/brute_force.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Rainbow Tables&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A rainbow table contains a set of predefined passwords that are hashed. It is a lookup table used especially in recovering plain passwords from a cipher text. During the process of password recovery, it just looks at the pre-calculated hash table to crack the password. The tables can be downloaded from&amp;nbsp;&lt;a href=&quot;http://project-rainbowcrack.com/table.htm&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;http://project-rainbowcrack.com/table.htm&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
RainbowCrack 1.6.1 is the tool to use the rainbow tables. It is available again in Kali distribution.&lt;/div&gt;
&lt;img alt=&quot;Rainbow Table&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/rainbow_table.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Don’t note down the passwords anywhere, just memorize them.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Set strong passwords that are difficult to crack.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Use a combination of alphabets, digits, symbols, and capital and small letters.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Don’t set passwords that are similar to their usernames.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1759228455640779564'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1759228455640779564'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/password-hacking.html' title='Password Hacking'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-4178198586411062323</id><published>2018-02-23T16:33:00.003+05:30</published><updated>2018-02-23T19:42:47.212+05:30</updated><title type='text'>Email Spoofing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Email Hijacking, or email hacking, is a widespread menace nowadays. It works by using the following three techniques which are email spoofing, social engineering tools, or inserting viruses in a user computer.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Email Spoofing&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In email spoofing, the spammer sends emails from a known domain, so the receiver thinks that he knows this person and opens the mail. Such mails normally contain suspicious links, doubtful content, requests to transfer money, etc.&lt;/div&gt;
&lt;img alt=&quot;Example&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/example.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Social Engineering&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Spammers send promotional mails to different users, offering huge discount and tricking them to fill their personal data. You have tools available in Kali that can drive you to hijack an email.&lt;/div&gt;
&lt;img alt=&quot;Social Engineering&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/social_engineering.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Email hacking can also be done by&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;phishing techniques&lt;/span&gt;. See the following screenshot.&lt;/div&gt;
&lt;img alt=&quot;Phishing&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/phishing.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The links in the email may install malware on the user’s system or redirect the user to a malicious website and trick them into divulging personal and financial information, such as passwords, account IDs or credit card details.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Phishing attacks&lt;/span&gt;&amp;nbsp;are widely used by cybercriminals, as it is far easier to trick someone into clicking a malicious links in the email than trying to break through a computer’s defenses.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;
Inserting Viruses in a User System&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The third technique by which a hacker can hijack your email account is by infecting your system with a virus or any other kind of malware. With the help of a virus, a hacker can take all your passwords.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
How to detect if your email has been hijacked?&lt;/span&gt;&lt;/h3&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-position: 0px 4px; background-repeat: no-repeat; box-sizing: border-box; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The recipients of spam emails include a bunch of people you know.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-position: 0px 4px; background-repeat: no-repeat; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You try to access your account and the password no longer works.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-position: 0px 4px; background-repeat: no-repeat; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You try to access the “Forgot Password” link and it does not go to the expected email.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-position: 0px 4px; background-repeat: no-repeat; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Your Sent Items folder contains a bunch of spams you are not aware of sending.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Punch Line:&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In case you think that your email got hijacked, then you need to take the following actions −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Change the passwords immediately.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Notify your friends not to open links that they receive from your email account.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Contact the authorities and report that your account has been hacked.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Install a good antivirus on your computer and update it.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Set up double authentication password if it is supported.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4178198586411062323'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4178198586411062323'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/email-spoofing.html' title='Email Spoofing'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-4282807608358495170</id><published>2018-02-23T16:32:00.002+05:30</published><updated>2018-02-23T19:43:45.980+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>TCP/IP Hijacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In theory, a TCP/IP connection is established as shown below −&lt;/div&gt;
&lt;img alt=&quot;TCP/IP&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/tcp_ip.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To hijack this connection, there are two possibilities −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Find the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;seq&lt;/span&gt;&amp;nbsp;which is a number that increases by 1, but there is no chance to predict it.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;network sniffing&lt;/span&gt;. For sniffing, we use tools like&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Wireshark&lt;/span&gt;&amp;nbsp;or&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Ethercap&lt;/span&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Example&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Shijack&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In practice, one of the best TCP/IP hijack tools is Shijack. It is developed using Python language and you can download it from the following link −&amp;nbsp;&lt;a href=&quot;https://packetstormsecurity.com/sniffers/shijack.tgz&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://packetstormsecurity.com/sniffers/shijack.tgz&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Here is an example of a Shijack command −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;root:/home/root/hijack# ./shijack eth0 192.168.0.100 53517 192.168.0.200 23
&lt;/pre&gt;
&lt;img alt=&quot;Shijack&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/shijack.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Here, we are trying to hijack a Telnet connection between the two hosts.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Hunt&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Hunt is another popular tool that you can use to hijack a TCP/IP connection. It can be downloaded from −&amp;nbsp;&lt;a href=&quot;https://packetstormsecurity.com/sniffers/hunt/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://packetstormsecurity.com/sniffers/hunt/&lt;/a&gt;&lt;/div&gt;
&lt;img alt=&quot;Hunt&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/hunt.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;tahoma&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 27.2px; letter-spacing: -1px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;tahoma&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;color: red; font-size: 27.2px; letter-spacing: -1px;&quot;&gt;Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #121214; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;tahoma&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 27.2px; letter-spacing: -1px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
All unencrypted sessions are vulnerable to TCP/IP session hijacking, so you should be using encrypted protocols as much as possible. Or, you should use double authentication techniques to keep the session secured.&lt;/div&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4282807608358495170'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4282807608358495170'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/tcpip-hijacking.html' title='TCP/IP Hijacking'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-4210508253823192885</id><published>2018-02-23T16:01:00.001+05:30</published><updated>2018-02-23T19:45:28.841+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Trojans</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgacbFM166XXbrGyDKSJY1H-o7dT0XBBZtv2l6EdDo7zTwVYexmEdLV8e6z-oqELliL8IEkPC36wHUoLb3xgjnrU6ODs4mTPeKNiK_artWfmLJ87mkfITSkl4c9vvlhhbsMRN56AwNxbsc/s1600/trojan.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;200&quot; data-original-width=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgacbFM166XXbrGyDKSJY1H-o7dT0XBBZtv2l6EdDo7zTwVYexmEdLV8e6z-oqELliL8IEkPC36wHUoLb3xgjnrU6ODs4mTPeKNiK_artWfmLJ87mkfITSkl4c9vvlhhbsMRN56AwNxbsc/s1600/trojan.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Trojans are non-replication programs; they don’t reproduce their own codes by attaching themselves to other executable codes. They operate without the permissions or knowledge of the computer users.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Trojans hide themselves in healthy processes. However we should underline that Trojans infect outside machines only with the assistance of a computer user, like clicking a file that comes attached with email from an unknown person, plugging USB without scanning, opening unsafe URLs.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Trojans have several malicious functions −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
They create backdoors to a system. Hackers can use these backdoors to access a victim system and its files. A hacker can use Trojans to edit and delete the files present on a victim system, or to observe the activities of the victim.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Trojans can steal all your financial data like bank accounts, transaction details, PayPal related information, etc. These are called&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Trojan-Banker&lt;/span&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Trojans can use the victim computer to attack other systems using Denial of Services.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Trojans can encrypt all your files and the hacker may thereafter demand money to decrypt them. These are&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Ransomware Trojans&lt;/span&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
They can use your phones to send SMS to third parties. These are called&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;SMS Trojans&lt;/span&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Trojan Information&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
If you have found a virus and want to investigate further regarding its function, then we will recommend that you have a look at the following virus databases, which are offered generally by antivirus vendors.&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Kaspersky Virus database&lt;/span&gt;&amp;nbsp;−&amp;nbsp;&lt;a href=&quot;https://www.kaspersky.com/viruswatchlite?hour_offset=-1&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://www.kaspersky.com&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;F-secure&lt;/span&gt;&amp;nbsp;−&amp;nbsp;&lt;a href=&quot;https://www.f-secure.com/en/web/labs_global/threat-descriptions&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://www.f-secure.com&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Symantec – Virus Encyclopedia&lt;/span&gt;&amp;nbsp;−&amp;nbsp;&lt;a href=&quot;https://www.symantec.com/security_response/landing/azlisting.jsp&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://www.symantec.com&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Install a good antivirus and keep it updated.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Don’t open email attachments coming from unknown sources.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Don’t accept invitation from unknown people in social media.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Don’t open URLs sent by unknown people or URLs that are in weird form.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4210508253823192885'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4210508253823192885'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/trojans.html' title='Trojans'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgacbFM166XXbrGyDKSJY1H-o7dT0XBBZtv2l6EdDo7zTwVYexmEdLV8e6z-oqELliL8IEkPC36wHUoLb3xgjnrU6ODs4mTPeKNiK_artWfmLJ87mkfITSkl4c9vvlhhbsMRN56AwNxbsc/s72-c/trojan.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-3198381140977654225</id><published>2018-02-23T15:56:00.001+05:30</published><updated>2018-02-23T19:45:11.121+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Metasploit</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Metasploit is one of the most powerful exploit tools. Most of its resources can be found at:&amp;nbsp;&lt;a href=&quot;https://www.metasploit.com/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://www.metasploit.com&lt;/a&gt;. It comes in two versions −&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;commercial&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;free edition&lt;/span&gt;. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
As an Ethical Hacker, you will be using “Kali Distribution” which has the Metasploit community version embedded in it along with other ethical hacking tools. But if you want to install Metasploit as a separate tool, you can easily do so on systems that run on Linux, Windows, or Mac OS X.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The hardware requirements to install Metasploit are −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;2 GHz+ processor&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;1 GB RAM available&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;1 GB+ available disk space&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Matasploit can be used either with command prompt or with Web UI.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To open in Kali, go to Applications → Exploitation Tools → metasploit.&lt;/div&gt;
&lt;img alt=&quot;Exploitation Tools&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/exploitation_tools.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
After Metasploit starts, you will see the following screen. Highlighted in red underline is the version of Metasploit.&lt;/div&gt;
&lt;img alt=&quot;Highlighted Metaspolit&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/highlighted_metaspolit.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Exploits of Metasploit&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
From Vulnerability Scanner, we found that the Linux machine that we have for test is vulnerable to FTP service. Now, we will use the exploit that can work for us. The command is −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;use “exploit path”
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The screen will appear as follows −&lt;/div&gt;
&lt;img alt=&quot;Exploit Path&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/exploit_path.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Then type&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;mfs&amp;gt; show options&lt;/span&gt;&amp;nbsp;in order to see what parameters you have to set in order to make it functional. As shown in the following screenshot, we have to set RHOST as the “target IP”.&lt;/div&gt;
&lt;img alt=&quot;Show Options&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/show_options.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We type&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;msf&amp;gt; set RHOST 192.168.1.101 and msf&amp;gt;set RPORT 21&lt;/span&gt;&lt;/div&gt;
&lt;img alt=&quot;Set Report&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/set_report.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Then, type&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;mfs&amp;gt;run&lt;/span&gt;. If the exploit is successful, then it will open one session that you can interact with, as shown in the following screenshot.&lt;/div&gt;
&lt;img alt=&quot;Open Session&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/open_session.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Metasploit Payloads&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Payload, in simple terms, are simple scripts that the hackers utilize to interact with a hacked system. Using payloads, they can transfer data to a victim system.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Metasploit payloads can be of three types −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Singles&lt;/span&gt;&amp;nbsp;− Singles are very small and designed to create some kind of communication, then move to the next stage. For example, just creating a user.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Staged&lt;/span&gt;&amp;nbsp;− It is a payload that an attacker can use to upload a bigger file onto a victim system.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Stages&lt;/span&gt;&amp;nbsp;− Stages are payload components that are downloaded by Stagers modules. The various payload stages provide advanced features with no size limits such as Meterpreter and VNC Injection.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: #4c1130;&quot;&gt;
Payload Usage − Example&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We use the command&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;show payloads&lt;/span&gt;. With this exploit, we can see the payloads that we can use, and it will also show the payloads that will help us upload /execute files onto a victim system.&lt;/div&gt;
&lt;img alt=&quot;Payload&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/payload.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;/div&gt;
&lt;img alt=&quot;Payload Usage&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/payload_usage.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To set the payload that we want, we will use the following command −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;set PAYLOAD payload/path
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Set the listen host and listen port (LHOST, LPORT) which are the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;attacker IP&lt;/span&gt;and&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;port&lt;/span&gt;. Then set remote host and port (RPORT, LHOST) which are the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;victim IP&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;port&lt;/span&gt;.&lt;/div&gt;
&lt;img alt=&quot;Victim IP&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/victim_ip.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Type “exploit”. It will create a session as shown below −&lt;/div&gt;
&lt;img alt=&quot;Create Session&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/create_session.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Now we can play with the system according to the settings that this payload offers.&lt;/div&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/3198381140977654225'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/3198381140977654225'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/metasploit.html' title='Metasploit'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-6453689923932141233</id><published>2018-02-23T15:54:00.003+05:30</published><updated>2018-02-23T19:46:23.993+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Enumeration</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Enumeration belongs to the first phase of Ethical Hacking, i.e., “Information Gathering”. This is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible, which can be used to exploit the systems further.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Enumeration can be used to gain information on −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Network shares&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;SNMP data, if they are not secured properly&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;IP tables&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Usernames of different systems&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Passwords policies lists&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Enumerations depend on the services that the systems offer. They can be −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;DNS enumeration&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;NTP enumeration&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;SNMP enumeration&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Linux/Windows enumeration&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;SMB enumeration&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Let us now discuss some of the tools that are widely used for Enumeration.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
NTP Suite&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
NTP Suite is used for NTP enumeration. This is important because in a network environment, you can find other primary servers that help the hosts to update their times and you can do it without authenticating the system.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Take a look at the following example.&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;ntpdate 192.168.1.100 01 Sept 12:50:49 ntpdate[627]: 
adjust time server 192.168.1.100 offset 0.005030 sec 

or 
ntpdc [-ilnps] [-c command] [hostname/IP_address] 
  
root@test]# ntpdc -c sysinfo 192.168.1.100 
***Warning changing to older implementation 
***Warning changing the request packet size from 160 to 48 
system peer: 192.168.1.101 

system peer mode: client
leap indicator: 00 
stratum: 5  

precision: -15 
root distance: 0.00107 s 
root dispersion: 0.02306 s 
reference ID: [192.168.1.101] 
reference time: f66s4f45.f633e130, Sept 01 2016 22:06:23.458 
system flags: monitor ntp stats calibrate 
jitter: 0.000000 s 
stability: 4.256 ppm 
broadcastdelay: 0.003875 s 
authdelay: 0.000107 s
&lt;/pre&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
enum4linux&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
enum4linux is used to enumerate Linux systems. Take a look at the following screenshot and observe how we have found the usernames present in a target host.&lt;/div&gt;
&lt;img alt=&quot;enum4linux&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/enum4linux.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
smtp-user-enum&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
smtp-user-enum tries to guess usernames by using SMTP service. Take a look at the following screenshot to understand how it does so.&lt;/div&gt;
&lt;img alt=&quot;SMTP&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/smtp.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It is recommended to disable all services that you don’t use. It reduces the possibilities of OS enumeration of the services that your systems are running.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/6453689923932141233'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/6453689923932141233'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/enumeration.html' title='Enumeration'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-3865995919583640628</id><published>2018-02-23T15:52:00.000+05:30</published><updated>2018-02-23T19:47:39.585+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Exploitation</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Exploitation is a piece of programmed software or script which can allow hackers to take control over a system, exploiting its vulnerabilities. Hackers normally use vulnerability scanners like Nessus, Nexpose, OpenVAS, etc. to find these vulnerabilities.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Metasploit is a powerful tool to locate vulnerabilities in a system.&lt;/div&gt;
&lt;img alt=&quot;Metasploit&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/metasploit.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Based on the vulnerabilities, we find exploits. Here, we will discuss some of the best vulnerability search engines that you can use.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Exploit Database&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;a href=&quot;https://www.exploit-db.com/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;www.exploit-db.com&lt;/a&gt;&amp;nbsp;is the place where you can find all the exploits related to a vulnerability.&lt;/div&gt;
&lt;img alt=&quot;Exploit&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/exploit.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: #121214; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
Common Vulnerabilities and Exposures&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Common Vulnerabilities and Exposures (CVE) is the standard for information security vulnerability names. CVE is a dictionary of publicly known information security vulnerabilities and exposures. It’s free for public use.&amp;nbsp;&lt;a href=&quot;https://cve.mitre.org/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://cve.mitre.org&lt;/a&gt;&lt;/div&gt;
&lt;img alt=&quot;CVE&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/cve.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
National Vulnerability Database&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
National Vulnerability Database (NVD) is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance. You can locate this database at −&amp;nbsp;&lt;a href=&quot;https://nvd.nist.gov/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;https://nvd.nist.gov&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics.&lt;/div&gt;
&lt;img alt=&quot;National Vulnerability&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/national_vulnerability.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In general, you will see that there are two types of exploits −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Remote Exploits&lt;/span&gt;&amp;nbsp;− These are the type of exploits where you don’t have access to a remote system or network. Hackers use remote exploits to gain access to systems that are located at remote places.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Local Exploits&lt;/span&gt;&amp;nbsp;− Local exploits are generally used by a system user having access to a local system, but who wants to overpass his rights.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Vulnerabilities generally arise due to missing updates, so it is recommended that you update your system on a regular basis, for example, once a week.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In Windows environment, you can activate automatic updates by using the options available in the Control Panel → System and Security → Windows Updates.&lt;/div&gt;
&lt;img alt=&quot;Windows Environment&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/windows_environment.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In Linux Centos, you can use the following command to install automatic update package.&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;yum -y install yum-cron
&lt;/pre&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/3865995919583640628'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/3865995919583640628'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/exploitation.html' title='Exploitation'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-2643006538142497703</id><published>2018-02-23T15:50:00.003+05:30</published><updated>2018-02-23T19:48:36.296+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>DNS Poisoning</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
DNS Poisoning is a technique that tricks a DNS server into believing that it has received authentic information when, in reality, it has not. It results in the substitution of false IP address at the DNS level where web addresses are converted into numeric IP addresses. It allows an attacker to replace IP address entries for a target site on a given DNS server with IP address of the server controls. An attacker can create fake DNS entries for the server which may contain malicious content with the same name.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
For instance, a user types www.google.com, but the user is sent to another fraud site instead of being directed to Google’s servers. As we understand, DNS poisoning is used to redirect the users to fake pages which are managed by the attackers.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
DNS Poisoning − Exercise&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Let’s do an exercise on DNS poisoning using the same tool,&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Ettercap&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
DNS Poisoning is quite similar to ARP Poisoning. To initiate DNS poisoning, you have to start with ARP poisoning, which we have already discussed in the previous chapter. We will use&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DNS spoof&lt;/span&gt;&amp;nbsp;plugin which is already there in Ettercap.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 1&lt;/span&gt;&amp;nbsp;− Open up the terminal and type “nano etter.dns”. This file contains all entries for DNS addresses which is used by Ettercap to resolve the domain name addresses. In this file, we will add a fake entry of “Facebook”. If someone wants to open Facebook, he will be redirected to another website.&lt;/div&gt;
&lt;img alt=&quot;Terminal&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/terminal.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 2&lt;/span&gt;&amp;nbsp;− Now insert the entries under the words “Redirect it to www.linux.org”. See the following example −&lt;/div&gt;
&lt;img alt=&quot;Redirect&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/redirect.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 3&lt;/span&gt;&amp;nbsp;− Now save this file and exit by saving the file. Use “ctrl+x” to save the file.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 4&lt;/span&gt;&amp;nbsp;− After this, the whole process is same to start ARP poisoning. After starting ARP poisoning, click on “plugins” in the menu bar and select “dns_spoof” plugin.&lt;/div&gt;
&lt;img alt=&quot;Plugins&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/plugins.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 5&lt;/span&gt;&amp;nbsp;− After activating the DNS_spoof, you will see in the results that facebook.com will start spoofed to Google IP whenever someone types it in his browser.&lt;/div&gt;
&lt;img alt=&quot;Activating&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/activating.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It means the user gets the Google page instead of facebook.com on their browser.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In this exercise, we saw how network traffic can be sniffed through different tools and methods. Here a company needs an ethical hacker to provide network security to stop all these attacks. Let’s see what an ethical hacker can do to prevent DNS Poisoning.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Defenses against DNS Poisoning&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
As an ethical hacker, your work could very likely put you in a position of prevention rather than pen testing. What you know as an attacker can help you prevent the very techniques you employ from the outside.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Here are defenses against the attacks we just covered from a pen tester’s perspective −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Use a hardware-switched network for the most sensitive portions of your network in an effort to isolate traffic to a single segment or collision domain.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Implement IP DHCP Snooping on switches to prevent ARP poisoning and spoofing attacks.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Implement policies to prevent promiscuous mode on network adapters.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Be careful when deploying wireless access points, knowing that all traffic on the wireless network is subject to sniffing.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Encrypt your sensitive traffic using an encrypting protocol such as SSH or IPsec.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Port security is used by switches that have the ability to be programmed to allow only specific MAC addresses to send and receive data on each port.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
IPv6 has security benefits and options that IPv4 does not have.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Replacing protocols such as FTP and Telnet with SSH is an effective defense against sniffing. If SSH is not a viable solution, consider protecting older legacy protocols with IPsec.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Virtual Private Networks (VPNs) can provide an effective defense against sniffing due to their encryption aspect.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
SSL is a great defense along with IPsec.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&amp;nbsp;we discussed how attackers can capture and analyze all the traffic by placing a packet sniffer in a network. With a real-time example, we saw how easy it is to get the credentials of a victim from a given network. Attackers use MAC attacks, ARP and DNS poisoning attacks to sniff the network traffic and get hold of sensitive information such as email conversations and passwords.&lt;/div&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2643006538142497703'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2643006538142497703'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/dns-poisoning.html' title='DNS Poisoning'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-5150218118439130160</id><published>2018-02-23T15:49:00.000+05:30</published><updated>2018-02-23T19:49:22.524+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>ARP Poisoning / ARP Spoofing.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Address Resolution Protocol (ARP) is a stateless protocol used for resolving IP addresses to machine MAC addresses. All network devices that need to communicate on the network broadcast ARP queries in the system to find out other machines’ MAC addresses. ARP Poisoning is also known as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ARP Spoofing&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Here is how ARP works −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
When one machine needs to communicate with another, it looks up its ARP table.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
If the MAC address is not found in the table, the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ARP_request&lt;/span&gt;&amp;nbsp;is broadcasted over the network.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
All machines on the network will compare this IP address to MAC address.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
If one of the machines in the network identifies this address, then it will respond to the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ARP_request&lt;/span&gt;&amp;nbsp;with its IP and MAC address.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The requesting computer will store the address pair in its ARP table and communication will take place.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
What is ARP Spoofing?&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
ARP packets can be forged to send data to the attacker’s machine.&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
ARP spoofing constructs a large number of forged ARP request and reply packets to overload the switch.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The switch is set in&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;forwarding mode&lt;/span&gt;&amp;nbsp;and after the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ARP table&lt;/span&gt;&amp;nbsp;is flooded with spoofed ARP responses, the attackers can sniff all network packets.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Attackers flood a target computer ARP cache with forged entries, which is also known as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;poisoning&lt;/span&gt;. ARP poisoning uses Man-in-the-Middle access to poison the network.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
What is MITM?&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The Man-in-the-Middle attack (abbreviated MITM, MitM, MIM, MiM, MITMA) implies an active attack where the adversary impersonates the user by creating a connection between the victims and sends messages between them. In this case, the victims think that they are communicating with each other, but in reality, the malicious actor controls the communication.&lt;/div&gt;
&lt;img alt=&quot;Third Person&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/third_person.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A third person exists to control and monitor the traffic of communication between two parties. Some protocols such as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;SSL&lt;/span&gt;&amp;nbsp;serve to prevent this type of attack.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
ARP Poisoning − Exercise&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In this exercise, we have used&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;BetterCAP&lt;/span&gt;&amp;nbsp;to perform ARP poisoning in LAN environment using VMware workstation in which we have installed&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Kali&lt;/span&gt;&amp;nbsp;Linux and&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Ettercap&lt;/span&gt;&amp;nbsp;tool to sniff the local traffic in LAN.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
For this exercise, you would need the following tools −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;VMware workstation&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Kali Linux or Linux Operating system&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Ettercap Tool&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;LAN connection&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Note&lt;/span&gt;&amp;nbsp;− This attack is possible in wired and wireless networks. You can perform this attack in local LAN.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 1&lt;/span&gt;&amp;nbsp;− Install the VMware workstation and install the Kali Linux operating system.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 2&lt;/span&gt;&amp;nbsp;− Login into the Kali Linux using username pass “root, toor”.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 3&lt;/span&gt;&amp;nbsp;− Make sure you are connected to local LAN and check the IP address by typing the command&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ifconfig&lt;/span&gt;&amp;nbsp;in the terminal.&lt;/div&gt;
&lt;img alt=&quot;Ifconfig&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/ifconfig.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 4&lt;/span&gt;&amp;nbsp;− Open up the terminal and type “Ettercap –G” to start the graphical version of Ettercap.&lt;/div&gt;
&lt;img alt=&quot;Ettercap&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/ettercap.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 5&lt;/span&gt;&amp;nbsp;− Now click the tab “sniff” in the menu bar and select “unified sniffing” and click OK to select the interface. We are going to use “eth0” which means Ethernet connection.&lt;/div&gt;
&lt;img alt=&quot;Ettercap Input&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/ettercap_input.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 6&lt;/span&gt;&amp;nbsp;− Now click the “hosts” tab in the menu bar and click “scan for hosts”. It will start scanning the whole network for the alive hosts.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 7&lt;/span&gt;&amp;nbsp;− Next, click the “hosts” tab and select “hosts list” to see the number of hosts available in the network. This list also includes the default gateway address. We have to be careful when we select the targets.&lt;/div&gt;
&lt;img alt=&quot;Host Tab&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/host_tab.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 8&lt;/span&gt;&amp;nbsp;− Now we have to choose the targets. In MITM, our target is the host machine, and the route will be the router address to forward the traffic. In an MITM attack, the attacker intercepts the network and sniffs the packets. So, we will add the victim as “target 1” and the router address as “target 2.”&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In VMware environment, the default gateway will always end with “2” because “1” is assigned to the physical machine.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 9&lt;/span&gt;&amp;nbsp;− In this scenario, our target is “192.168.121.129” and the router is “192.168.121.2”. So we will add target 1 as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;victim IP&lt;/span&gt;&amp;nbsp;and target 2 as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;router IP&lt;/span&gt;.&lt;/div&gt;
&lt;img alt=&quot;Target&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/target.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 10&lt;/span&gt;&amp;nbsp;− Now click on “MITM” and click “ARP poisoning”. Thereafter, check the option “Sniff remote connections” and click OK.&lt;/div&gt;
&lt;img alt=&quot;Mitm Attack&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/mitm_attack.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 11&lt;/span&gt;&amp;nbsp;− Click “start” and select “start sniffing”. This will start ARP poisoning in the network which means we have enabled our network card in “promiscuous mode” and now the local traffic can be sniffed.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Note&lt;/span&gt;&amp;nbsp;− We have allowed only HTTP sniffing with Ettercap, so don’t expect HTTPS packets to be sniffed with this process.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Step 12&lt;/span&gt;&amp;nbsp;− Now it’s time to see the results; if our victim logged into some websites. You can see the results in the toolbar of Ettercap.&lt;/div&gt;
&lt;img alt=&quot;Result&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/result.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
This is how sniffing works. You must have understood how easy it is to get the HTTP credentials just by enabling ARP poisoning.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
ARP Poisoning has the potential to cause huge losses in company environments. This is the place where ethical hackers are appointed to secure the networks.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Like ARP poisoning, there are other attacks such as MAC flooding, MAC spoofing, DNS poisoning, ICMP poisoning, etc. that can cause significant loss to a network.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In the next chapter, we will discuss another type of attack known as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DNS poisoning&lt;/span&gt;.&lt;/div&gt;
&lt;hr style=&quot;background-image: none; border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(214, 214, 214) !important; border-top-style: solid !important; box-sizing: content-box; clear: both; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; height: 0px; margin: 7px 0px;&quot; /&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/5150218118439130160'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/5150218118439130160'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/arp-poisoning-arp-spoofing.html' title='ARP Poisoning / ARP Spoofing.'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-1789713600191756832</id><published>2018-02-23T15:37:00.001+05:30</published><updated>2018-02-23T19:49:42.126+05:30</updated><title type='text'>Sniffing tools</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiapi2the_NV_LGDSTI5na15QMMDAJRHgRqzuzqAsLHjHMSrQrlwzSDP6cIyAGRkSPvvShwRMawpswSCHj9D79JtW9-bmibCou2rCjnb1hBir1GXfy8aCPDVNwSovH9dVNj0B4ehUFKCyE/s1600/sniffing.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;194&quot; data-original-width=&quot;259&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiapi2the_NV_LGDSTI5na15QMMDAJRHgRqzuzqAsLHjHMSrQrlwzSDP6cIyAGRkSPvvShwRMawpswSCHj9D79JtW9-bmibCou2rCjnb1hBir1GXfy8aCPDVNwSovH9dVNj0B4ehUFKCyE/s1600/sniffing.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
There are so many tools available to perform sniffing over a network, and they all have their own features to help a hacker analyze traffic and dissect the information. Sniffing tools are extremely common applications. We have listed here some of the interesting ones −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;BetterCAP&lt;/span&gt;&amp;nbsp;− BetterCAP is a powerful, flexible and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in real-time, sniff for credentials, and much more.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Ettercap&lt;/span&gt;&amp;nbsp;− Ettercap is a comprehensive suite for man-in-the-middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Wireshark&lt;/span&gt;&amp;nbsp;− It is one of the most widely known and used packet sniffers. It offers a tremendous number of features designed to assist in the dissection and analysis of traffic.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Tcpdump&lt;/span&gt;&amp;nbsp;− It is a well-known command-line packet analyzer. It provides the ability to intercept and observe TCP/IP and other packets during transmission over the network. Available at www.tcpdump.org.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;WinDump&lt;/span&gt;&amp;nbsp;− A Windows port of the popular Linux packet sniffer tcpdump, which is a command-line tool that is perfect for displaying header information.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;OmniPeek&lt;/span&gt;&amp;nbsp;− Manufactured by WildPackets, OmniPeek is a commercial product that is the evolution of the product EtherPeek.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Dsniff&lt;/span&gt;&amp;nbsp;− A suite of tools designed to perform sniffing with different protocols with the intent of intercepting and revealing passwords. Dsniff is designed for Unix and Linux platforms and does not have a full equivalent on the Windows platform.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;EtherApe&lt;/span&gt;&amp;nbsp;− It is a Linux/Unix tool designed to display graphically a system&#39;s incoming and outgoing connections.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;MSN Sniffer&lt;/span&gt;&amp;nbsp;− It is a sniffing utility specifically designed for sniffing traffic generated by the MSN Messenger application.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;NetWitness NextGen&lt;/span&gt;&amp;nbsp;− It includes a hardware-based sniffer, along with other features, designed to monitor and analyze all traffic on a network. This tool is used by the FBI and other law enforcement agencies.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A potential hacker can use any of these sniffing tools to analyze traffic on a network and dissect information.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1789713600191756832'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1789713600191756832'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/sniffing-tools.html' title='Sniffing tools'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiapi2the_NV_LGDSTI5na15QMMDAJRHgRqzuzqAsLHjHMSrQrlwzSDP6cIyAGRkSPvvShwRMawpswSCHj9D79JtW9-bmibCou2rCjnb1hBir1GXfy8aCPDVNwSovH9dVNj0B4ehUFKCyE/s72-c/sniffing.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-1583379010314349419</id><published>2018-02-23T15:34:00.002+05:30</published><updated>2018-02-23T19:50:44.938+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Sniffing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of “tapping phone wires” and get to know about the conversation. It is also called&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;wire tapping&amp;nbsp;&lt;/span&gt;applied to the computer networks.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
There is so much possibility that if a set of enterprise switch ports is open, then one of their employees can sniff the whole traffic of the network. Anyone in the same physical location can plug into the network using Ethernet cable or connect wirelesslly to that network and sniff the total traffic.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In other words, Sniffing allows you to see all sorts of traffic, both protected and unprotected. In the right conditions and with the right protocols in place, an attacking party may be able to gather information that can be used for further attacks or to cause other issues for the network or system owner.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;
What can be sniffed?&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
One can sniff the following sensitive information from a network −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Email traffic&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;FTP passwords&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Web traffics&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Telnet passwords&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Router configuration&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Chat sessions&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;DNS traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
How it works&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A sniffer normally turns the NIC of the system to the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;promiscuous mode&lt;/span&gt;&amp;nbsp;so that it listens to all the data transmitted on its segment.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Promiscuous mode refers to the unique way of Ethernet hardware, in particular, network interface cards (NICs), that allows an NIC to receive all traffic on the network, even if it is not addressed to this NIC. By default, a NIC ignores all traffic that is not addressed to it, which is done by comparing the destination address of the Ethernet packet with the hardware address (a.k.a. MAC) of the device. While this makes perfect sense for networking, non-promiscuous mode makes it difficult to use network monitoring and analysis software for diagnosing connectivity issues or traffic accounting.&lt;/div&gt;
&lt;img alt=&quot;Sniffing Networks&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/sniffing_networks.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A sniffer can continuously monitor all the traffic to a computer through the NIC by decoding the information encapsulated in the data packets.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Types of Sniffing&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Sniffing can be either Active or Passive in nature.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: #f1c232;&quot;&gt;
Passive Sniffing&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In passive sniffing, the traffic is locked but it is not altered in any way. Passive sniffing allows listening only. It works with Hub devices. On a hub device, the traffic is sent to all the ports. In a network that uses hubs to connect systems, all hosts on the network can see the traffic. Therefore, an attacker can easily capture traffic going through.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The good news is that hubs are almost obsolete nowadays. Most modern networks use switches. Hence, passive sniffing is no more effective.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Active Sniffing&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In active sniffing, the traffic is not only locked and monitored, but it may also be altered in some way as determined by the attack. Active sniffing is used to sniff a switch-based network. It involves injecting&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;address resolution packets&lt;/span&gt;&amp;nbsp;(ARP) into a target network to flood on the switch&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;content addressable memory&lt;/span&gt;&amp;nbsp;(CAM) table. CAM keeps track of which host is connected to which port.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Following are the Active Sniffing Techniques −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;MAC Flooding&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;DHCP Attacks&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;DNS Poisoning&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Spoofing Attacks&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;ARP Poisoning&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Protocols which are affected&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Protocols such as the tried and true TCP/IP were never designed with security in mind and therefore do not offer much resistance to potential intruders. Several rules lend themselves to easy sniffing −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;HTTP&lt;/span&gt;&amp;nbsp;− It is used to send information in the clear text without any encryption and thus a real target.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;SMTP&lt;/span&gt;&amp;nbsp;(Simple Mail Transfer Protocol) − SMTP is basically utilized in the transfer of emails. This protocol is efficient, but it does not include any protection against sniffing.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;NNTP&lt;/span&gt;&amp;nbsp;(Network News Transfer Protocol)− It is used for all types of communications, but its main drawback is that data and even passwords are sent over the network as clear text.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;POP&lt;/span&gt;&amp;nbsp;(Post Office Protocol) − POP is strictly used to receive emails from the servers. This protocol does not include protection against sniffing because it can be trapped.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;FTP&lt;/span&gt;&amp;nbsp;(File Transfer Protocol) − FTP is used to send and receive files, but it does not offer any security features. All the data is sent as clear text that can be easily sniffed.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;IMAP&lt;/span&gt;&amp;nbsp;(Internet Message Access Protocol) − IMAP is same as SMTP in its functions, but it is highly vulnerable to sniffing.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Telnet&lt;/span&gt;&amp;nbsp;− Telnet sends everything (usernames, passwords, keystrokes) over the network as clear text and hence, it can be easily sniffed.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Sniffers are not the dumb utilities that allow you to view only live traffic. If you really want to analyze each packet, save the capture and review it whenever time allows.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Hardware Protocol Analyzers&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Before we go into further details of sniffers, it is important that we discuss about&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;hardware protocol analyzers&lt;/span&gt;. These devices plug into the network at the hardware level and can monitor traffic without manipulating it.&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Hardware protocol analyzers are used to monitor and identify malicious network traffic generated by hacking software installed in the system.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
They capture a data packet, decode it, and analyze its content according to certain rules.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Hardware protocol analyzers allow attackers to see individual data bytes of each packet passing through the cable.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
These hardware devices are not readily available to most ethical hackers due to their enormous cost in many cases.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: #20124d;&quot;&gt;
Lawful Interception&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Lawful Interception (LI) is defined as legally sanctioned access to communications network data such as telephone calls or email messages. LI must always be in pursuance of a lawful authority for the purpose of analysis or evidence. Therefore, LI is a security process in which a network operator or service provider gives law enforcement officials permission to access private communications of individuals or organizations.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Almost all countries have drafted and enacted legislation to regulate lawful interception procedures; standardization groups are creating LI technology specifications. Usually, LI activities are taken for the purpose of infrastructure protection and cyber security. However, operators of private network infrastructures can maintain LI capabilities within their own networks as an inherent right, unless otherwise prohibited.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
LI was formerly known as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;wiretapping&lt;/span&gt;&amp;nbsp;and has existed since the inception of electronic communications.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1583379010314349419'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/1583379010314349419'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/sniffing.html' title='Sniffing'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-2075473875618031500</id><published>2018-02-23T15:27:00.000+05:30</published><updated>2018-02-23T19:52:45.607+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Fingerprinting</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
The term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating system is running on a remote computer. This could be −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Active Fingerprinting&lt;/span&gt;&amp;nbsp;− Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS. In the following section, we have given an example to explain how you can use NMAP tool to detect the OS of a target domain.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Passive Fingerprinting&lt;/span&gt;&amp;nbsp;− Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We have the following four important elements that we will look at to determine the operating system −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;TTL&lt;/span&gt;&amp;nbsp;− What the operating system sets the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Time-To-Live&lt;/span&gt;&amp;nbsp;on the outbound packet.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Window Size&lt;/span&gt;&amp;nbsp;− What the operating system sets the Window Size at.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DF&lt;/span&gt;&amp;nbsp;− Does the operating system set the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Don&#39;t Fragment&lt;/span&gt;&amp;nbsp;bit.&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;TOS&lt;/span&gt;&amp;nbsp;− Does the operating system set the&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Type of Service&lt;/span&gt;, and if so, at what.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
By analyzing these factors of a packet, you may be able to determine the remote operating system. This system is not 100% accurate, and works better for some operating systems than others.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Basic Steps&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Before attacking a system, it is required that you know what operating system is hosting a website. Once a target OS is known, then it becomes easy to determine which vulnerabilities might be present to exploit the target system.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Below is a simple&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;nmap&lt;/span&gt;&amp;nbsp;command which can be used to identify the operating system serving a website and all the opened ports associated with the domain name, i.e., the IP address.&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;$nmap -O -v google.com 
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It will show you the following sensitive information about the given domain name or IP address −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;Starting Nmap 5.51 ( http://nmap.org ) at 2015-10-04 09:57 CDT 
Initiating Parallel DNS resolution of 1 host. at 09:57 
Completed Parallel DNS resolution of 1 host. at 09:57, 0.00s elapsed 
Initiating SYN Stealth Scan at 09:57
Scanning google.com (66.135.33.172) [1000 ports] 
Discovered open port 22/tcp on 66.135.33.172 
Discovered open port 3306/tcp on 66.135.33.172 
Discovered open port 80/tcp on 66.135.33.172 
Discovered open port 443/tcp on 66.135.33.172 
Completed SYN Stealth Scan at 09:57, 0.04s elapsed (1000 total ports) 
Initiating OS detection (try #1) against google.com (66.135.33.172) 
Retrying OS detection (try #2) against  google.com (66.135.33.172) 
Retrying OS detection (try #3) against  google.com (66.135.33.172) 
Retrying OS detection (try #4) against google.com (66.135.33.172) 
Retrying OS detection (try #5) against google.com (66.135.33.172) 
Nmap scan report for google.com (66.135.33.172) 
Host is up (0.000038s latency). 
Not shown: 996 closed ports 
PORT     STATE SERVICE 
22/tcp   open  ssh 
80/tcp   open  http 
443/tcp  open  https 
3306/tcp open  mysql  

TCP/IP fingerprint: 
OS:SCAN(V=5.51%D=10/4%OT=22%CT=1%CU=40379%PV=N%DS=0%DC=L%G=Y%TM=56113E6D%P= 
OS:x86_64-redhat-linux-gnu)SEQ(SP=106%GCD=1%ISR=109%TI=Z%CI=Z%II=I%TS=A)OPS 
OS:(O1=MFFD7ST11NW7%O2=MFFD7ST11NW7%O3=MFFD7NNT11NW7%O4=MFFD7ST11NW7%O5=MFF 
OS:D7ST11NW7%O6=MFFD7ST11)WIN(W1=FFCB%W2=FFCB%W3=FFCB%W4=FFCB%W5=FFCB%W6=FF 
OS:CB)ECN(R=Y%DF=Y%T=40%W=FFD7%O=MFFD7NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A 
OS:=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0% 
OS:Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S= 
OS:A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R= 
OS:Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N% 
OS:T=40%CD=S)
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
If you do not have&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;nmap&lt;/span&gt;&amp;nbsp;command installed on your Linux system, then you can install it using the following&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;yum&lt;/span&gt;&amp;nbsp;command −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;$yum install nmap
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can go through&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;nmap&lt;/span&gt;&amp;nbsp;command in detail to check and understand the different features associated with a system and secure it against malicious attacks.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can hide your main system behind a secure proxy server or a VPN so that your complete identity is safe and ultimately your main system remains safe.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3xhyphenhyphen5_4Rnoz-N8VCK8FUKyR7QfcT9PEb-s1wWxOC53vlVXNSClZt3kNX7Qukt4vu4VyOOA4KSVlHumXLQRpVZHDBjOLEbPUpESoa_0oqN8sbT8NxcunlrhEdQF80lVN3WN2_-nAsFwFg/s1600/finger.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;165&quot; data-original-width=&quot;306&quot; height=&quot;171&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3xhyphenhyphen5_4Rnoz-N8VCK8FUKyR7QfcT9PEb-s1wWxOC53vlVXNSClZt3kNX7Qukt4vu4VyOOA4KSVlHumXLQRpVZHDBjOLEbPUpESoa_0oqN8sbT8NxcunlrhEdQF80lVN3WN2_-nAsFwFg/s320/finger.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Port Scanning&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
We have just seen information given by&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;nmap&lt;/span&gt;&amp;nbsp;command. This command lists down all the open ports on a given server.&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;PORT       STATE   SERVICE 
22/tcp     open    ssh 
80/tcp     open    http 
443/tcp    open    https 
3306/tcp   open    mysql
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can also check if a particular port is opened or not using the following command −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;$nmap -sT -p 443 google.com
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It will produce the following result −&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;Starting Nmap 5.51 ( http://nmap.org ) at 2015-10-04 10:19 CDT 
Nmap scan report for google.com (66.135.33.172) 
Host is up (0.000067s latency). 
PORT    STATE SERVICE 
443/tcp open  https  

Nmap done: 1 IP address (1 host up) scanned in 0.04 seconds
&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Once a hacker knows about open ports, then he can plan different attack techniques through the open ports.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
It is always recommended to check and close all the unwanted ports to safeguard the system from malicious attacks.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
Ping Sweep&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
A ping sweep is a network scanning technique that you can use to determine which IP address from a range of IP addresses map to live hosts. Ping Sweep is also known as&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ICMP sweep&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can use&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;fping&lt;/span&gt;&amp;nbsp;command for ping sweep. This command is a ping-like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;fping&lt;/span&gt;&amp;nbsp;is different from&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;ping&lt;/span&gt;&amp;nbsp;in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. If a host does not respond within a certain time limit and/or retry limit, it will be considered unreachable.&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
To disable ping sweeps on a network, you can block ICMP ECHO requests from outside sources. This can be done using the following command which will create a firewall rule in&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;iptable&lt;/span&gt;.&lt;/div&gt;
&lt;pre class=&quot;result notranslate&quot; style=&quot;background-color: #f1f1f1; border-radius: 0px; border: 1px solid rgb(214, 214, 214); box-sizing: border-box; color: #313131; font-family: Menlo, Monaco, Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-size: 12px; overflow: auto; padding: 5px; width: 604px;&quot;&gt;$iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
&lt;/pre&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: orange;&quot;&gt;
DNS Enumeration&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Domain Name Server (DNS) is like a map or an address book. In fact, it is like a distributed database which is used to translate an IP address 192.111.1.120 to a name www.example.com and vice versa.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
DNS enumeration is the process of locating all the DNS servers and their corresponding records for an organization. The idea is to gather as much interesting details as possible about your target before initiating an attack.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can use&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;nslookup&lt;/span&gt;&amp;nbsp;command available on Linux to get DNS and host-related information. In addition, you can use the following&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DNSenum&lt;/span&gt;&amp;nbsp;script to get detailed information about a domain −&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;a href=&quot;https://code.google.com/archive/p/dnsenum/downloads&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;DNSenum.pl&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;DNSenum&lt;/span&gt;&amp;nbsp;script can perform the following important operations −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Get the host&#39;s addresses&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Get the nameservers&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Get the MX record&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Perform&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;axfr&lt;/span&gt;&amp;nbsp;queries on nameservers&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Get extra names and subdomains via&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;Google scraping&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Brute force subdomains from file can also perform recursion on subdomain that has NS records&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Calculate C class domain network ranges and perform&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;whois&lt;/span&gt;&amp;nbsp;queries on them&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;&lt;div style=&quot;box-sizing: border-box; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Perform&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;reverse lookups&lt;/span&gt;&amp;nbsp;on&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;netranges&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
DNS Enumeration does not have a quick fix and it is really beyond the scope of this tutorial. Preventing DNS Enumeration is a big challenge.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
If your DNS is not configured in a secure way, it is possible that lots of sensitive information about the network and organization can go outside and an untrusted Internet user can perform a DNS zone transfer.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2075473875618031500'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/2075473875618031500'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/fingerprinting.html' title='Fingerprinting'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3xhyphenhyphen5_4Rnoz-N8VCK8FUKyR7QfcT9PEb-s1wWxOC53vlVXNSClZt3kNX7Qukt4vu4VyOOA4KSVlHumXLQRpVZHDBjOLEbPUpESoa_0oqN8sbT8NxcunlrhEdQF80lVN3WN2_-nAsFwFg/s72-c/finger.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3047728298161844542.post-4651295224787951984</id><published>2018-02-22T19:47:00.002+05:30</published><updated>2018-02-23T19:53:28.618+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Footprinting</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. Footprinting could be both&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;passive&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 640;&quot;&gt;active&lt;/span&gt;. Reviewing a company’s website is an example of passive footprinting, whereas attempting to gain access to sensitive information through social engineering is an example of active information gathering.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
During this phase, a hacker can collect the following information −&lt;/div&gt;
&lt;ul class=&quot;list&quot; style=&quot;box-sizing: border-box; color: #313131; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Domain name&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;IP Addresses&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Namespaces&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Employee information&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Phone numbers&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;E-mails&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/icon-bullet.png&amp;quot;); background-origin: initial; background-position: 0px 4px; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: black; line-height: 24px; list-style: none; margin-bottom: 5px; padding: 0px 0px 0px 19px;&quot;&gt;Job Information&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
In the following section, we will discuss how to extract the basic and easily accessible information about any computer system or network that is linked to the Internet.&lt;/div&gt;
&lt;h2 style=&quot;box-sizing: border-box; font-family: verdana, geneva, tahoma, arial, helvetica, sans-serif; font-size: 1.7em; font-weight: normal; left: 0px; letter-spacing: -1px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;
Domain Name Information&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
You can use&amp;nbsp;&lt;a href=&quot;http://www.whois.com/whois&quot; rel=&quot; nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;/images/link-icon.png&amp;quot;); background-origin: initial; background-position: right center; background-repeat: no-repeat; background-size: initial; box-sizing: border-box; color: #313131; outline: none !important; padding-bottom: 2px; padding-right: 22px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;http://www.whois.com/whois&lt;/a&gt;&amp;nbsp;website to get detailed information about a domain name information including its owner, its registrar, date of registration, expiry, name server, owner&#39;s contact information, etc.&lt;/div&gt;
&lt;img alt=&quot;Whois&quot; src=&quot;https://www.tutorialspoint.com/ethical_hacking/images/whois.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; color: #313131; display: block; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; margin-left: auto; margin-right: auto; max-width: 100%; padding-bottom: 4px; vertical-align: middle;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Here is a sample record of www.google.com&amp;nbsp;extracted from WHOIS Lookup −&lt;/div&gt;
&lt;div class=&quot;whois_heading&quot; style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 8px 8px; padding: 0px;&quot;&gt;
&lt;h1 style=&quot;color: black; display: inline-block; font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: normal; line-height: normal; margin: 0px; padding: 0px; width: 472px;&quot;&gt;
google.com&lt;/h1&gt;
&lt;div id=&quot;refreshBlk&quot; style=&quot;display: inline-block; margin: 0px; padding: 0px; text-align: right; vertical-align: bottom; width: 222px;&quot;&gt;
&lt;span id=&quot;dataAge&quot;&gt;Updated 1 hour ago&lt;/span&gt;&lt;span id=&quot;refreshLink&quot; style=&quot;margin-left: 5px; position: relative; top: 2px;&quot;&gt;&lt;img src=&quot;https://www.whois.com/images/refresh.png&quot; style=&quot;border: 0px; cursor: pointer; margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;span id=&quot;refreshStatus&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-block&quot; style=&quot;background-color: #eef7fe; border-radius: 8px; border: 1px solid rgb(164, 212, 250); color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 15px; padding: 8px;&quot;&gt;
&lt;div class=&quot;df-heading&quot; style=&quot;font-size: 15px; font-weight: bold; margin: 0px; padding: 5px 8px; text-transform: uppercase;&quot;&gt;
DOMAIN INFORMATION&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Domain:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
google.com&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Registrar:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
MarkMonitor Inc.&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Registration Date:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
1997-09-15&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Expiration Date:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
2020-09-13&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Updated Date:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
2018-02-21&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Status:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
clientDeleteProhibited&lt;br /&gt;
clientTransferProhibited&lt;br /&gt;
clientUpdateProhibited&lt;br /&gt;
serverDeleteProhibited&lt;br /&gt;
serverTransferProhibited&lt;br /&gt;
serverUpdateProhibited&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Name Servers:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
ns1.google.com&lt;br /&gt;
ns2.google.com&lt;br /&gt;
ns3.google.com&lt;br /&gt;
ns4.google.com&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-block&quot; style=&quot;background-color: #eef7fe; border-radius: 8px; border: 1px solid rgb(164, 212, 250); color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 15px; padding: 8px;&quot;&gt;
&lt;div class=&quot;df-heading&quot; style=&quot;font-size: 15px; font-weight: bold; margin: 0px; padding: 5px 8px; text-transform: uppercase;&quot;&gt;
REGISTRANT CONTACT&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Name:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Domain Administrator&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Organization:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Google LLC&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Street:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
1600 Amphitheatre Parkway,&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
City:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Mountain View&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
State:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
CA&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Postal Code:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
94043&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Country:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
US&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Phone:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
+1.6502530000&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Fax:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
+1.6502530001&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Email:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
&lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/b/24/b244ecdf5ac5e9f56fa3fac473614f02db3b395c.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@google.com&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-block&quot; style=&quot;background-color: #eef7fe; border-radius: 8px; border: 1px solid rgb(164, 212, 250); color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 15px; padding: 8px;&quot;&gt;
&lt;div class=&quot;df-heading&quot; style=&quot;font-size: 15px; font-weight: bold; margin: 0px; padding: 5px 8px; text-transform: uppercase;&quot;&gt;
ADMINISTRATIVE CONTACT&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Name:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Domain Administrator&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Organization:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Google LLC&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Street:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
1600 Amphitheatre Parkway,&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
City:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Mountain View&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
State:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
CA&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Postal Code:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
94043&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Country:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
US&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Phone:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
+1.6502530000&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Fax:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
+1.6502530001&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Email:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
&lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/b/24/b244ecdf5ac5e9f56fa3fac473614f02db3b395c.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@google.com&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-block&quot; style=&quot;background-color: #eef7fe; border-radius: 8px; border: 1px solid rgb(164, 212, 250); color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 15px; padding: 8px;&quot;&gt;
&lt;div class=&quot;df-heading&quot; style=&quot;font-size: 15px; font-weight: bold; margin: 0px; padding: 5px 8px; text-transform: uppercase;&quot;&gt;
TECHNICAL CONTACT&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Name:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Domain Administrator&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Organization:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Google LLC&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Street:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
1600 Amphitheatre Parkway,&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
City:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
Mountain View&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
State:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
CA&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Postal Code:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
94043&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Country:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
US&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Phone:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
+1.6502530000&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Fax:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
+1.6502530001&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-row&quot; style=&quot;margin: 0px; padding: 3px 8px;&quot;&gt;
&lt;div class=&quot;df-label&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 116px;&quot;&gt;
Email:&lt;/div&gt;
&lt;div class=&quot;df-value&quot; style=&quot;float: left; margin: 0px; padding: 0px; width: 560px;&quot;&gt;
&lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/b/24/b244ecdf5ac5e9f56fa3fac473614f02db3b395c.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@google.com&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;clear: both; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;df-block-raw&quot; style=&quot;background-color: #f1f1f1; border-radius: 8px; border: 1px solid rgb(190, 190, 190); color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 15px; padding: 8px;&quot;&gt;
&lt;div class=&quot;df-heading&quot; style=&quot;font-size: 15px; font-weight: bold; margin: 0px; padding: 5px 8px; text-transform: uppercase;&quot;&gt;
RAW WHOIS DATA&lt;/div&gt;
&lt;pre class=&quot;df-raw&quot; id=&quot;registrarData&quot; style=&quot;overflow-x: hidden; padding: 3px 8px; white-space: pre-wrap;&quot;&gt;Domain Name: google.com
Registry Domain ID: 2138514_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2018-02-21T10:45:07-0800
Creation Date: 1997-09-15T00:00:00-0700
Registrar Registration Expiration Date: 2020-09-13T21:00:00-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: &lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/f/12/f12f8d12b59b8ee50d3ff8e07fa1388fd230b6d7.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@markmonitor.com
Registrar Abuse Contact Phone: +1.2083895740
Domain Status: clientUpdateProhibited (https://www.icann.org/epp#clientUpdateProhibited)
Domain Status: clientTransferProhibited (https://www.icann.org/epp#clientTransferProhibited)
Domain Status: clientDeleteProhibited (https://www.icann.org/epp#clientDeleteProhibited)
Domain Status: serverUpdateProhibited (https://www.icann.org/epp#serverUpdateProhibited)
Domain Status: serverTransferProhibited (https://www.icann.org/epp#serverTransferProhibited)
Domain Status: serverDeleteProhibited (https://www.icann.org/epp#serverDeleteProhibited)
Registry Registrant ID: 
Registrant Name: Domain Administrator
Registrant Organization: Google LLC
Registrant Street: 1600 Amphitheatre Parkway, 
Registrant City: Mountain View
Registrant State/Province: CA
Registrant Postal Code: 94043
Registrant Country: US
Registrant Phone: +1.6502530000
Registrant Phone Ext: 
Registrant Fax: +1.6502530001
Registrant Fax Ext: 
Registrant Email: &lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/b/24/b244ecdf5ac5e9f56fa3fac473614f02db3b395c.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@google.com
Registry Admin ID: 
Admin Name: Domain Administrator
Admin Organization: Google LLC
Admin Street: 1600 Amphitheatre Parkway, 
Admin City: Mountain View
Admin State/Province: CA
Admin Postal Code: 94043
Admin Country: US
Admin Phone: +1.6502530000
Admin Phone Ext: 
Admin Fax: +1.6502530001
Admin Fax Ext: 
Admin Email: &lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/b/24/b244ecdf5ac5e9f56fa3fac473614f02db3b395c.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@google.com
Registry Tech ID: 
Tech Name: Domain Administrator
Tech Organization: Google LLC
Tech Street: 1600 Amphitheatre Parkway, 
Tech City: Mountain View
Tech State/Province: CA
Tech Postal Code: 94043
Tech Country: US
Tech Phone: +1.6502530000
Tech Phone Ext: 
Tech Fax: +1.6502530001
Tech Fax Ext: 
Tech Email: &lt;img alt=&quot;email&quot; class=&quot;whois_email&quot; src=&quot;https://www.whois.com/eimg/b/24/b244ecdf5ac5e9f56fa3fac473614f02db3b395c.png&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: bottom;&quot; /&gt;@google.com
Name Server: ns2.google.com
Name Server: ns1.google.com
Name Server: ns4.google.com
Name Server: ns3.google.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
&amp;gt;&amp;gt;&amp;gt; Last update of WHOIS database: 2018-02-22T04:25:14-0800 &amp;lt;&amp;lt;&amp;lt;

The Data in MarkMonitor.com&#39;s WHOIS database is provided by MarkMonitor.com for
information purposes, and to assist persons in obtaining information about or
related to a domain name registration record.  MarkMonitor.com does not guarantee
its accuracy.  By submitting a WHOIS query, you agree that you will use this Data
only for lawful purposes and that, under no circumstances will you use this Data to:
 (1) allow, enable, or otherwise support the transmission of mass unsolicited,
     commercial advertising or solicitations via e-mail (spam); or
 (2) enable high volume, automated, electronic processes that apply to
     MarkMonitor.com (or its systems).
MarkMonitor.com reserves the right to modify these terms at any time.
By submitting this query, you agree to abide by this policy.

MarkMonitor is the Global Leader in Online Brand Protection.

MarkMonitor Domain Management(TM)
MarkMonitor Brand Protection(TM)
MarkMonitor AntiPiracy(TM)
MarkMonitor AntiFraud(TM)
Professional and Managed Services

Visit MarkMonitor at http://www.markmonitor.com
Contact us at +1.8007459229
In Europe, at +44.02032062220

For more information on Whois status codes, please visit
 https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
--&lt;/pre&gt;
&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 1.3em; font-weight: normal; left: 0px; line-height: 1.5em; margin: 0.2em 0.2em 0.2em 0px; padding: 0px; position: relative; text-shadow: rgb(204, 204, 204) 1px 1px 2px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
Punch Line:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;box-sizing: border-box; font-family: Verdana, Geneva, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px !important; line-height: 24px; margin: 0em 0.2em 0.6em; padding: 0px; text-align: justify; word-wrap: break-word;&quot;&gt;
Though there are some advantages of keeping your website in an archive database, but if you do not like anybody to see how your website progressed through different stages, then you can request archive.org to delete the history of your website.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4651295224787951984'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3047728298161844542/posts/default/4651295224787951984'/><link rel='alternate' type='text/html' href='https://netconfigration.blogspot.com/2018/02/footprinting.html' title='Footprinting'/><author><name>NetConfig</name><uri>http://www.blogger.com/profile/07415699107525707229</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry></feed>