Advertisement
LuciferAvi

LPU cyber Security

Oct 22nd, 2016
80
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.58 KB | None | 0 0
  1. copy /b image+text optput_extension
  2. /b binding two files
  3.  
  4.  
  5. idn homograph attack-->changing the characters with other language characters, which looks same but have different meaning..... е
  6.  
  7. english--->www.facebook.com
  8. IDN homo--->www.facеbook.com
  9.  
  10.  
  11.  
  12. TCP/IP connection... using swiss knife....
  13. netcat
  14.  
  15. network---> connection of twoo or more heterogeneous devices, which are used to exchange information, having periferaal ports.....
  16.  
  17. ip addresses...virtual address given to you machine. it is not unique on internet but yes it is unique in the LAN.
  18.  
  19. Local ip---> ip provided to us in the LAN.... ipconfig
  20. public/global ip----> it is the IP of the lan used during surfing the web... ip of ISP.... whatismyip
  21. ipcow
  22. ipchicken
  23.  
  24. tracing UP addresss.... reverse ip mapping
  25.  
  26. http://www.fuglekos.com/
  27.  
  28.  
  29. classes of ip
  30. class A 0-127 gneral
  31. class B 128-191 purpose
  32. class C 192- 223 usage
  33. class D 224-239
  34. class E 240-255
  35.  
  36. ip4
  37. IP6
  38. where is ip5?
  39. dhcp 250... responsible for providing the ip address to your devices
  40. NIC network Interface Card
  41. MAC--- media access controll address
  42. mac is a unique name or address provided to your device. its is like the physical aadress of your machine.
  43.  
  44.  
  45.  
  46.  
  47. 250 ip addresses....
  48. 110
  49.  
  50.  
  51.  
  52.  
  53. ports---- area at which any servce is running on your device...
  54. http 80
  55. ftp 21
  56. 65,500+
  57. leap port 1337
  58.  
  59. for checking the ports
  60. cmd>netstat
  61.  
  62.  
  63. DNS is a service which converts IP into domain name and domain name in to ip address
  64. what is OSI models and ITS layers?
  65.  
  66.  
  67. proxy server--- its a stand alone machine or software which is used to hide or spoof you ip address
  68. web based proxy---hidemyass.com
  69. stand alone software--- ultrasurf, hotspot
  70. extesionbased--- annonymox
  71.  
  72.  
  73.  
  74. vpn---virtual private network\--- it provide an extra layer of encryption while surfing the web...
  75.  
  76.  
  77.  
  78.  
  79. mail---- hello how are you?
  80. send.... khdakhelljhzfbvo hokjhvjw sdjvharejsd you?
  81. psiphon is working on port 5555
  82.  
  83. netstat -nab
  84.  
  85. malware = malicious + softwares
  86. it is a code snipet, program, or a software which can be used to get accss to host device or cause serious harm to the taret
  87. worms
  88. trojans
  89. virus- it is a standalone software or a code snippet which need human interaction to harm the device. it is designed for harming system32
  90.  
  91. @echo off---> processor, please make less noise while executing
  92. mkdir-->make directory
  93.  
  94.  
  95. darkcomet
  96.  
  97.  
  98. rat Remote administrative tool
  99. msrpc-- MS remote procedure call
  100.  
  101.  
  102. bios- basic input output system32
  103. it is the first thing that rung when you power on your machine
  104.  
  105. worms--->worms are code snipeet write for a specific target, it does not need any human interaction at all. it only harms targetted computer or machine.
  106. keyogger----> software that captures keystroke of the targetted computer and send them to the hosting machine.
  107.  
  108.  
  109.  
  110. keyloggers
  111. spyware
  112. adwares
  113.  
  114.  
  115. for hiding your drives
  116. cmd>diskpart
  117. diskpart> list volume
  118. >select volume <1-9>
  119. >remove letter <A-Z>---- invisible
  120. for reassigning---
  121. select volume <1-9>
  122. assign letter <a-z>
  123.  
  124.  
  125.  
  126. start > gpedit.msc....
  127. user configuration
  128. system
  129. removable storage access
  130.  
  131. social engineering---> manupilating someone to give his/her personal information to the intruder by any means.
  132. google hacking data bas
  133. google dorks...
  134. index of/-- gives result of the particular index
  135.  
  136.  
  137. site:www.xyz.com
  138. --->it will give the result of every link having xyz.com in their link
  139.  
  140. filetype:pdf
  141.  
  142. inurl:-->it gives the link of searched keywords present in the url
  143.  
  144. intitle:-->to check the meta data for the title
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement