Monday 7 April 2014

EIGRP PACKET TYPES



PACKET TYPE        TYPE OF DELIVERY    MULTICAST/UNICAST    ACK REQ
   
HELLO                     UNRELIABLE                MULTICAST                       NO

UPDATE                   RELIABLE                    MULTICAST                         YES

ACK                         UNRELIABLE                UNICAST                             NO

QUERY                    RELIABLE                   MULTICAST                           YES

REPLY                     RELIABLE                   MULICAST/UNICAST            YES

Types of Communications


1: Broadcast: One to all
eg: AIR: ALL india Radio, Television news etc
eg: I am taking a batch. In batch there are 8 students all understand english.
So when I am speaking in english the message is for every one.
eg: Diwali Season or Christmas : you send a email of Diwali or christmas to every one, to ur parents, brother, sister, girlfriend and friends. a message is for every one.

Hub doesn't understand the ip address, mac address.so he floods the packet to all the interfaces its connected to but it never sends the packet to the same interface from which it was received.

Hub is having one broadcast domain.
Broadcast domain = 1
In hub there is a collision.
Collision Domain = 1

Hub: maximum ports = 24
     minimum ports = 4

What is Hub?

1) Hub is a dump device.
2) Hub is broadcast device.
3) Hub is not as intelligent as Switch
4) Hub is a multipoint repeater.
5) Hub regenrates the signal.
6) Hub works at layer 1.
7) Hub has shared bandwidth every port is of 10mbps.

AND OPERATION IN NETWORK

10101100.00010000.00001010.00001010
11111111.11111111.00000000.00000000.
---------------------------------------
10101100.00010000.00000000.00000000
128+32+8+4
172.16.0.0====Network ID

------------------------------------------------------------------------

00-25-64                           -4f-8e-c9
OUI
Organisation unique Identifier        Vendor assigned


00-25-64-4f-8e-c1
00-25-64-4f-8e-c2
        c3
        c4

CONGESTION RENO

Thursday 3 April 2014

Booting of the router



POST : Power on self test
ROM:
BootStrap: Initializing the router.

Flash

Nvram

----------------------------------------

Config register value:

16 bits value

0000    0000    0000    0000

2    1    0    0    -----> Rom monitor mode

2    1    0    1    -----> ROm IOS ( mini-ios)

2    1    0    2    -----> (Default) Normal booting of the router

2    1    4    2    -----> Troubleshooting


-----------------------------------------

md5 = message digest 5 the encryption mecanism used to encrypt the password


Saturday 29 March 2014

Routing protocols: Select the best path to reach the destination.




Mumbai to Delhi

Routing protocols: Select the best path to reach the destination.



Airways       2 hrs    10
Railways   15 hrs    40
Roadways    48 hrs    80

Administrative distance = Trustworthiness
Lower the value best is the performance
Higher the value poor the performance


Routing Protocols

RIp    120
igrp    100
eigrp    90
isis    115
ospf    110
bgp    200 for ibgp
bgp     20 for ebgp


Routed protocols: They carry the data from source to destination via the best path selected by the routing protocols.
aeroplane
train
bus, car


ip
ipx
appletalk


Kali Linux Gnome Desktop

 

 

 

I am always looking for interesting new developments in security analysis and penetration testing, and have been attending SANS Security conferences for a few years now, which has introduced me to several Linux distributions that I was not otherwise familiar with.
Initially the most popular was Knoppix, then focus moved to BackTrack Linux, and finally last year when it seemed that BackTrack might disappear,  Kali Linux picked up the torch.
Although I have always installed whatever Linux they were using in the class on my laptop, I never seemed to keep it for very long afterward. Something always came up - either they weren't flexible enough, or updates were too difficult, or they were just based on a Linux distribution which was too old to begin with.
I have also tried to put some of the tools we used in the classes on other Linux distributions, and while that sometimes worked I all too often found that the tools were difficult to install/configure/update, and they generally didn't last either.
So, when I read the Kali 1.0.6 release announcement, there were two things in it which really caught my eye.  First, it is now based on Debian 7 (Wheezy), and second, the Kali developers have made standard packages of all the tools included in it. I decided it was time to give it a closer look, in pretty much the same way that I look at any other Linux distribution, rather than waiting until I got to the conference this year.

Saturday 15 March 2014

hack facebook account using security question

So here what you need to do is go to victims account you will find a address like http://facebook.harsh.31
So just copy thid harsh.31
Now go to login page and enter harsh. 31 for username and leave the password field blank and then make a fake email id facebook will ask this is ur account click on reset password you will now need to click on no longer access then u have to answer security question and the account is urs if u have any doubt just comment below