Tuesday 18 September 2012

OSI Model

The OSI (Open System Interconnection) model is developed by ISO(International Organization for standardization) in 1984 to provide a reference model for the complex aspects related to network communication. It divides the different functions and services provided by network hardware and software in 7 layers. This facilitates modular engineering, simplifies teaching and learning network technologies, helps to isolate problems and allows vendors to focus on just the layer(s) in which their hardware or software is implemented and be able to create products that are compatible, standardized and interoperable.


The diagram below shows the 7 layers of the OSI Model, to remember them in the correct order a common mnemonic is often used: All People Seem To NeedData Processing.

The Application, Presentation and Session layer are known as the Upper Layer and are implemented in software. The Transport and Network layer are mainly concerned with protocols for delivery and routing of packets to a destination and are implemented in software as well. The Data Link is implemented in hard- and software and the Physical layer is implemented in hardware only, hence its name. These last two layers define LAN and WAN specifications.

7.APPLICATION LAYER

The Application layer provides network services directly to the user's application such as a web browser, email software and Windows Explorer. This layer is said to be "closest to the user".
Protocols that operate on this layer include: TELNET, HTTP, FTP, TFTP, SMTP, NTP, SNMP, EDI.

6.PRESENTATION LAYER

This layer 'represents' the data in a particular format to the Application layer. It defines encryption, compression, conversion and other coding functions.
Specifications defined at this layer include: GIF, TIFF, JPEG, MPEG, MIME, and ASCII.


5.SESSION LAYER

Establishes, maintains and terminates end-to-end connections (sessions) between two applications on two network nodes. It controls the dialogue between the source and destination node, which node can send when and how long. Also provides error reporting for the Application, Presentation and Session layer.
 
Protocols/API's that operate on this layer include: RPC, SQL, NETBIOS.

4.TRANSPORT LAYER

This layer converts the data received from the upper layers into segments. The Transport layer is responsible for end-to-end (also called source-to-destination) delivery of entire messages. Provides end-to-end connectivity, it allows data to be transferred reliably and sequencing to guarantee that it will be delivered in the same order that it was sent. Provides services such as error checking and flow control (software).
Protocols that operate on this layer: TCP, UDP, NETBEUI, SPX.

These protocols are either
 connectionless or connection-oriented:

Connection-oriented means that a connection (a virtual link) must be established before data can be exchanged. This can guarantee that data will arrive, and in the same order it was sent. It guarantees delivery by sending acknowledgements back to the source when messages are received. TCP is an example of an connection-oriented transport protocol.

A common example of connection-oriented communication is a telephone call: you call, the 'destination' picks up the phone and acknowledges and you start talking (sending data). When a message or a piece of it doesn't arrive, you say: "What!?" and the sender will retransmit the data.

Connectionless is the opposite of connection-oriented; the sender does not establish a connection before it sends data, it just sends without guaranteeing delivery. UDP is an example of an connectionless transport protocol.

3.NETWORK LAYER

This layer converts the segments from the Transport layer into packets (or datagrams) and is responsible for path determination,
 routing, and the delivery of these individual packets across multiple networks without guaranteed delivery. The network layer treats these packets independently, without recognizing any relationship between those packets, it relies on upper layers for reliable delivery and sequencing. 
Also this layer is is responsible for
 logical addressing (also known as network addressing or Layer 3 addressing) for example IP addresses
Examples of protocols defined at this layer: IP, IPX, AppleTalk, ICMP, RIP, OSPF, BGP, IGRP, EIGRP, NLSP, ARP, RARP, X.25
Devices that operate on this layer: Routers, Layer 3 Switches.

Network layer addresses
Also known as Layer 3 or Logical addresses. These type of addresses are protocol-dependent, for example if the network protocol is IP, IP addressing will be used which is made up of a network part and a host part and needs a subnet mask to determine the boundaries of these parts. An example of an IP address is: 172.16.0.1 and a subnet mask: 255.255.0.0
Another example is Novell's IPX addressing, which uses a combination of a hexadecimal network address + the layer 2 MAC address to form a network layer address, for example" 46.0010E342A8BC

2.DATA LINK LAYER

The Data Links provides transparent network services to the Network layer so the Network layer can be ignorant about the physical network topology and and provides access to the physical networking media. Responsible for reassambling bits taken of the wire by the Physical layer to frames, makes sure they are in the correct order and requests retransmission of frames in case an error occurs. Provides error checking by adding a CRC to the frame, and flow control.
 Examples of devices that operate on this layer are switches, bridges, WAPs, and NICs.
 
DATA LINK LAYER SUB DIVIDED INTO TWO SUB LAYER:-
LLC sublayer
LLC is short for Logical Link Control. The Logical Link Control is the upper sublayer of the Data Link layer. LLC masks the underlying network technology by hiding their differences hence providing a single interface to the network layer. The LLC sublayer uses Source Service Access Points (SSAPs) and Destination Service Access Points (DSAPs) to help the lower layers communicate to the Network layer protocols acting as an intermediate between the different network protocols (IPX, TCP/IP, etc.) and the different network types (Ethernet, Token Ring, etc.) This layer is also responsible for frames sequencing and acknowledgements.
The LLC sublayer is defined in the IEEE standard 802.2.
MAC sublayer

The Media Access Control layer takes care of physical addressing and allows upper layers access to the physical media, handles frame addressing, error checking. This layer controls and communicates directly with the physical network media through the network interface card. It converts the frames into bits to pass them on to the Physical layer who puts them on the wire (and vice versa)
 

IEEE LAN standards such as 802.3, 802.4, 802.5 and 802.10 define standards for the MAC sublayer as well as the Physical layer.

Other standards on this layer include: X.25 and Frame Relay
Data Link layer addresses
Also known as layer 2 addresses, BIAs (Burned-in Address), physical address and most commonly referred to as MAC address. This is a fixed address programmed into a NIC or a router interface for example.
 
00-10-E3-42-A8-BC is an example of a MAC address. The first 6 hexadecimal digits (3 bytes) specify the vendor/manufacturer of the NIC, the other 6 digits (3 bytes) define the host.
The layer 2 broadcast address is FF-FF-FF-FF-FF-FF.
1.PHYSICAL LAYER

This layer communicates directly with the physical media, it is responsible for activating, maintaining and deactivating the physical link. It handles a raw bits stream and places it on the wire to be picked up by the Physical layer at the receiving node. It defines electrical and optical signaling, voltage levels, data transmission rates and distances as well as mechanical specifications such as cable lengths and connectors, the amount of pins and their function.
Devices that operate on this layer: HUBs/concentrators, repeaters, NICs, and LAN and WAN interfaces such as RS-232, OC-3, BRI, V.24, V.35, X.25 and Frame Relay.



Saturday 15 September 2012

Change Facebook Theme


Everyone want to know how to change Facebook theme there is no any option provided by the Facebook to change theme but u can change Ur theme by installing plugin here i give step by step procedure to change the Facebook theme
Steps:


1.Go to this link http://userstyles.org/styles/browse? sort=popularity&sort_direction=desc
2.You may see many plugins of various themes.
3.Click the theme of your choice.
4.Now on the right top click on “Install as User Script“
5.Now login to your Facebook, you may customized with themes.
Note:
after installing facebook Dark + transparent ur profile look like this



These themes will only be visible if userstyles plugins are installed in the browsers.

Source: Userstyles.org

Friday 14 September 2012

MAKING BOOTABLE USB TO INSTALL WINDOW 7

You all want to format ur system(pc,laptop or notebook) through pendrive or USB because we always have usb device but not we always take bootable cd or dvd at every place.so here i will give u the step by step procedure to make USB bootable to install window7



ü  Insert USB stick
ü  Open cmd in administrative mode and follow the below command sequence

v  Diskpart and press enter
v  List disk and hit enter
It will display the disk number of your USB stick drive
v  Now enter below command 1 by 1
Select disk 1(replace disk 1 with your USB stick drive letter which you found in List Disk command)
Clean
Create partition primary
Select partition 1
Active
Format FS=NTFS (It will take several minute to formatur drive)
Assign
Exit
ü  Now insurt your win 7 dvd and follow below instruction
ü  Open cmd and execute following commands
D: (Where D is your DVD drive letter)
Cd boot
Bootsect.exe/nt60 J:
Where J: is USB stick drive letter


Thursday 13 September 2012

Google Hacking

You all are used Google for searching ur result .Google hacking is the simple search operator which we used to filter our results.

suppose if you want to search eBooks or PDFs on the topic "Ethical Hacking" you type "Ethical hacking pdf" or  "free eBooks of ethical hacking"  without the quote on Google search .It gives you all the related links which contains Ethical hacking .one bye one you click all the link and when you find pdf or ebook you download it but it is so time taken.Google gives facility to filter results by using some special operators.

same thing we done through the Google hacking /dorks in Google search type
ext:pdf ethical hacking
it will show you filter results of all the pdf available on the topic ethical hacking you can download it directly.

There is lots of these search operator which make our search more advance i describe some of these google dorks we generally used .
1.site-It returns the specified domain like if we type 
site:wikipedia.org it returns webpage of the domain Wikipedia.org
if we type site:wikipedia.org ethical hacking it returns all the webpage of domain Wikipedia.org which contain words ethical hacking.we can use various clause in site command we use site:gov to see all government website we used site:pk to see Pakistan website and more...


2.intitle and allintile:-it show the pages whose title contain specified phrase or words.
intitle:admin gives u all the webpage whose title contain admin
intitle:admin login gives u all the webpage whose title contain admin and login can be anywhere in the page.
allintile:admin login returns u all the page whose title contain admin login together.

3.inurl:-it return all the website whose url contain specified phrase or words.
inurl:admin login returns those page whose url contain admin login.
like allintitle you can also use allinurl.

4.. related- It returns the websites similar to specified websites.

examples :-
related:www.homeshop18.com, now homeshop18.com is a online shopping website. This search query would return results containing websites which provide such kind of services.

5. cache: It returns the cached webpage that is kept with Google.

example:-
cache:www.explorehacking.com, this dork is useful very when actually the website is down and
you can still view its contents (from cached pages).

6. ext- It specifies the extension .

You can use '
filteype' at place of 'ext'.
example-:
ext:ppt hacking - this will return  PowerPoint presentations (ppt files) on topic 'hacking'.

7.Combining multiple dorks
  site:gov inurl:adminlogin





8. Accessing unprotected camera
  inurl:view/index.shtml
through  this u can view live camera of many beaches and traffic .some time you seen dark because there is night there if you have better net speed u can see live images and view enjoy.....








Wednesday 12 September 2012

Basic terms of ethical hacking

            INTRODUCTION OF ETHICAL HACKING

I welcome to all of you.This is my first Blog on security .First i will tell you some basic terms which are always confusing all of you.
Hacking is the art of stretching the capability of a software either it is application or system it doesn't matter .They edit the source code and make it more powerful.
Hacker's are the intelligent computer professionals who have learned and acquired knowledge of advanced techniques about operating system architecture and software.
     They try to gain in-depth knowledge of a system/network, and then use that information to find possible Security gaps in it.

Hacker's are divided into two categories:-
1.Ethical Hacker
2.Malicious Hacker 
                  First we know about ethics :-
* Ethics are principles that distinguish between right and wrong.
Hacker's with good intentions that they do not harm any company or organisation and they don't perform any  illegal activity on that company or organisation without the prior permission are comes in category of Ethical Hacker.

on the other hand.Hacker's with bad intention they harm the company or asset for earn money.They perform illegal activity without the prior permission of that company or asset are comes in category of Malicious Hacker.

CLASSES OF HACKER'S

1.White Hat
2.Black Hat
3.Grey Hat
 White hat hackers use their skills and knowledge for good purposes,helping to find new security vulnerabilities and making the vendors of the applications or network administrators aware of the detected vulnerabilities.White hats do not hack systems with any bad intent.
A white hat often does this on a professional basis ,because there is no domain for hacking .They working for a security organization or an application vendor as security auditor ,penetration tester etc.

Black hat hackers engage in their activities with bad intentions.They perform illegal activities,such as destroying data,website defacement,denying services to legitimate user.For example ,a hacker who breaks into the network of a bank and steals thousands of dollars by transferring it to other banks is a Black hat hacker.

Grey hat hackers do not believe in categorizing hacking activities as either good or bad. So they perform both activities .Grey hat hackers are formerly black hat hacker but now they become security professional in a company as a white hat hacker.

Hackers Motivation

* Enthusiasm for new solutions
* Desire for recognition
* Desire for financial gain
* Urge to imitate role models
* Desire for revenge


This is some basic terms which i think is essential while going further in this domain .I am also in learning phase so if there is some mistake please comment and give ur feedback i will try my best .