Advertisement
Prabhankar0HS0

sunday

Jul 28th, 2018
375
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.31 KB | None | 0 0
  1.  
  2.  
  3. Lecture 1:
  4.  
  5.  
  6. INFORMATION SECURITY
  7. =====================
  8.  
  9. DATA | INFORMATION
  10.  
  11. Data : Raw Facts
  12. Information : Processed data or collection of data
  13.  
  14. Information Security : Covering up all the security aspects related to Information Technology.
  15. ------------------------------------------------------------------------------------------
  16.  
  17. CIA TRIAD
  18. ==========
  19.  
  20. 1. CONFIDENTIALITY - That the data which is confidential and private should be secured from bad people.eg. - Aadhar Cards, Financial Records etc.
  21.  
  22. 2. INTEGRITY - Dis-manipulation of data which should be secured from others. - accuracy. eg. chainging of any sensitive personal document.
  23.  
  24. 3. AVAILABILITY - Availability simply means that some data should be available to specific persons onbly having access rights.
  25.  
  26.  
  27.  
  28.  
  29. ETHICAL HACKING / CYBER SECURITY
  30. =================================
  31.  
  32. Ethical - Means legal practices which should be performed.
  33.  
  34. Hacking - Hacking means accessing any data, information or any system with the permission of individual.
  35.  
  36. Hackers - Hackers are the most skilled and technical people who are profiecient in understanding the technical aspects.
  37.  
  38. ------------------------------------------------------------------------------------------------------------------------------------
  39.  
  40. TYPES OF HACKERS
  41. =================
  42.  
  43. 1. BLACK HAT HACKERS - THese are the bad people who access and gain resources of any individual for the sake of there own wealth. Parents wala person,
  44. usually comes in newspaper Eg. Shadow Brokers
  45.  
  46. 2. WHITE HAT HACKERS - THese are those people who gains access and tamper the resource for the sake of the individual. eg: Rahul Tyagi, Abhijeet Singh, Sanjeev Multani ,Prabhankar Tripathi etc.
  47.  
  48. 3. GREY HAT HACKERS - These are those hackers who hacks and gains resources for the sake of the society and culture.
  49. Eg. Anonymous, Edward Snowden etc.
  50.  
  51. ----------------------------------------------------------------------
  52.  
  53. Other Categories
  54. ================
  55.  
  56. 1. Script Kiddies - These are those people who steals the programs, ideas or any other method of hacking and perform hacks without any knoweledge.
  57.  
  58. 2. Noobz - These are the new born technical babies who just arrived in the field of cyber security.
  59.  
  60. 3. Crackers - These are those people who are good in cracking into a particular machine or a authentication check ,they crack into systems for a malicious purpose.
  61.  
  62.  
  63.  
  64.  
  65.  
  66.  
  67.  
  68.  
  69.  
  70. TYPES OF INFORMATION
  71. ====================
  72.  
  73. 1. Confidentials INformation - Aadhar Cards, Passwords, Birth Certificates, PAN Cards etc.
  74.  
  75. 2. Financial Information - Financial Statements, Bank Details, Login Credentials for banking practices etc.
  76.  
  77. 3. Health Information - Policies, Diseases etc.
  78.  
  79. 4. Personal Information - Address, Phone Numbers, DOBs etc.
  80. ----------------------------------------------------------------------
  81.  
  82.  
  83.  
  84. Ques: Why people hack ya fr kya motive hota hai logo ka hacking me indulge hone ka ?
  85.  
  86. 1.Hobby
  87. 2.Defame (Revenge)
  88. 3.Stealing information
  89. 4.Leaking information
  90. 5.Political motives
  91. 6.For SECURTIY REASONS i.e. securing digital space :)
  92.  
  93.  
  94.  
  95.  
  96.  
  97.  
  98. Cyber Terrorism
  99. =================
  100. Terrorist have found a new way for indulging into disruptive activities through digital space.Jitta hm log technology ka use kr rhe hai waise hi sath hi saath iska koi na koi misuse bhi kr rha hai.
  101. Email conversation ---> telephonic conversation --> gaming platform.
  102. cyber terrorism means to damage information, computer systems and data that result in harm against non-combatant targets.
  103.  
  104. CASE 26/11 ---> NATGrid formation
  105.  
  106.  
  107.  
  108.  
  109. ***___Cyber Laws___***
  110.  
  111.  
  112.  
  113.  
  114. ** Section 43:
  115. Penalty and compensation for damage to computer and computer system.
  116.  
  117. ** Section 65:Tempering with computer source Documents.
  118. Changing and altering the documents which are available.
  119. Imprisonment upto 3 years and Fine upto 200,000 INR.
  120.  
  121. ** Section 66: Computer Related Offences.
  122.  
  123. SECTION 66 A - Punishment for sending offensive messages through communication service.
  124. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  125.  
  126.  
  127. SECTION 66 B - Dishonestly receiving and retaining any stolen computer resource or communication device is also made punishable by amendment.
  128. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  129.  
  130.  
  131.  
  132. SECTION 66 C - Identity Theft (Driving license, adhar card etc)
  133. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  134.  
  135. SECTION 66 D - Cheating by Personation by using computer resource or communication device. (telecallers)
  136. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  137.  
  138. SECTION 66 E - Violation of Privacy
  139. Imprisonment upto 3 years and Fine upto 200,000 INR or both.
  140.  
  141.  
  142.  
  143.  
  144.  
  145.  
  146.  
  147.  
  148.  
  149.  
  150.  
  151. SECTION 66 F - Punishment to cyber terrorism
  152. Data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.
  153.  
  154. ** Section 67: Punishment for publishing or transmitting obscene material in electronic from.
  155.  
  156. ** Section 71: Penalty for misrepresentation.
  157. If you have uploaded your ID card, and given the wrong name and address,then again it is a crime.
  158. Imprisonment to Two years, or with fine of 1,00,000 INR, or with both.
  159.  
  160. ** Section 72: Breaching of Confidentiality and Privacy
  161. I have some personal stuff in my hard disk drive and on google drive, If someone any how gets the access of those files without my permission, Then again it is a crime.
  162. Right To Privacy.
  163. Imprisonment for Ten Years, or with fine, or with both.
  164.  
  165. ** Section 73:Penalty for publishing electronic signature certificate false in certain particular.Signature Forgery.
  166.  
  167. Imprisonment for upto two years, or with fine upto 1,00,000 INR, or with both.
  168.  
  169.  
  170.  
  171.  
  172.  
  173.  
  174. TASKS :
  175. follow theHackernews.com
  176. edward snowden (Snowden)
  177. Kevin MIttnick (TAKEDOWN)
  178. Parissa tabriz
  179.  
  180. Helpful link : https://lucideustech.blogspot.com/2018/02/a-basic-guide-to-indian-it-amendment.html
  181.  
  182.  
  183.  
  184.  
  185. =x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x==x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x
  186.  
  187.  
  188. Lecture 2
  189. Introduction to Networks
  190. ------------------------
  191.  
  192. Network: Interconnetion of two or more devices with each other for a common purpose i.e sharing which can be peripheral devices or can either be any information.
  193. Types:
  194. Intranet
  195. Internet
  196.  
  197.  
  198.  
  199.  
  200. How you get connected to the network ?
  201. NIC (Network Interface Card)
  202.  
  203.  
  204.  
  205.  
  206.  
  207.  
  208.  
  209.  
  210. Network Topologies (Arrangement)
  211. --------------------
  212. o Bus Topology : single transmission channel
  213. o Star Topology : one central node
  214. o Ring Topology : Forming a ring sturcture with no central dependency
  215. o Mesh Topology : Every node is connected to every other node present in a network
  216. o Hybrid Topology : Mixture of the above topologies.
  217.  
  218.  
  219. ● Network Protocols (Network me kadam rakhne ke liye kch rules follow krne hote ha unko network protocol kehte hai): To implement smooth transfer of data to anfd fro the network one needs to follow these protocols.
  220. -----------------------
  221. o IP : The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  222.  
  223. o HTTP (HyperText Transfer Protocol ) : Protocol defines how messages are formatted and transmitted, it is the foundation of any data exchange in WWW (80).
  224.  
  225.  
  226.  
  227.  
  228.  
  229. o FTP: To transfer files over the network.
  230. (In intranet accessed ftp://ip ) [21]
  231.  
  232. o SMTP (Simple Mail Transfer protocol): To transfer mail properly 25,366
  233.  
  234. o VoIP : Voice over Internet Protocol is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP (5060 and 5061)
  235.  
  236.  
  237. o DHCP : Automatic assignment of IP
  238. (dynamic host configuration protocol)
  239.  
  240. o TCP : handshaking , connection-oriented, reliable, slow
  241. Transmission control Protocol: examples:
  242.  
  243.  
  244. o UDP (USER DATAGRAM PROTOCOL): no hanshake, connection less, not reliable, fast, video streamng
  245.  
  246. ipconfig
  247.  
  248. There are two types of address :
  249. Virtual address : your IP address which might change fromm place to place
  250. physical address : Which will remain constant throughout like your MAC address.
  251.  
  252.  
  253.  
  254.  
  255.  
  256.  
  257.  
  258.  
  259.  
  260.  
  261.  
  262.  
  263.  
  264.  
  265.  
  266.  
  267.  
  268.  
  269.  
  270.  
  271.  
  272.  
  273. o Types of IP
  274. ▪ Internal | Private | Local
  275. --> ipconfig
  276. --> ifconfig
  277. ▪ External | Public | Global
  278. --> myipaddress
  279. --> ipcow.com
  280. --> ipchicken.com
  281.  
  282.  
  283.  
  284. IPV4 VS IPV6
  285. ================
  286. IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion addresses)
  287. IPv6 addresses are 128-bit IP address written in hexadecimal and separated by colons.
  288.  
  289. 172.16.149.1
  290.  
  291. 00000000.00000000.00000000.00000000 = 32 bit
  292.  
  293.  
  294.  
  295. 2^2 2^1 2^0
  296. 0 0 0 0 000
  297. 1 0 0 1 001
  298. 2 0 1 0 010
  299. 3 0 1 1 011
  300. 4 1 0 0 100
  301. 5 1 0 1 101
  302. 6 1 1 0 110
  303. 7 1 1 1 111
  304.  
  305.  
  306.  
  307. 192 = 11000000
  308. 168 = 10101000
  309.  
  310.  
  311. 128 64 32 16 8 4 2 1
  312. 192= 1 1 0 0 0 0 0 0
  313. 168= 1 0 1 0 1 0 0 0
  314.  
  315. Subnetting
  316.  
  317. 192.168.0.1/23
  318.  
  319. 11000000.10101000.00000000.00000001
  320.  
  321.  
  322. IP Classes in decimal notation
  323. Class A addresses range from 1-126 -- 255.0.0.0 126.0.0.0
  324. Class B addresses range from 128-191 --- 255.255.0.0
  325. Class C addresses range from 192-223 --- 255.255.255.0
  326. Class D addresses range from 224-239
  327. Class E addresses range from 240-254
  328.  
  329. 127.0.0.1--> loopback address
  330.  
  331. 00000000.00000000.00000000.00000000 --- 11111111.11111111.11111111.11111111
  332. 0.0.0.0 --- 255.255.255.255
  333.  
  334.  
  335.  
  336. Class A: 255.0.0.0 (2^N-2) HOSTS
  337. --- -----
  338. NI HI
  339. Class B: 255.255.0.0
  340. Class C: 255.255.255.0
  341.  
  342.  
  343.  
  344. 172.16.0.1 - 172.16.0.255 ---->
  345. 172.16.1.0 - 172.16.1.255 ---->
  346. 172.16.2.0 - 172.16.2.255 ---->
  347.  
  348.  
  349. 172.16.0.54
  350.  
  351.  
  352.  
  353.  
  354.  
  355.  
  356. NAT - Network Address Translation
  357. ==================================
  358.  
  359. This is a function which converts my Public IP Address to my Private IP Address and vice versa.
  360.  
  361.  
  362.  
  363.  
  364. 172.168.10.0 - 172.168.10.255
  365. 172.168.11.0 - 172.168.11.255
  366.  
  367. TASKS:
  368. IPV5
  369.  
  370.  
  371. =x=x=x=x=x=x==x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x==x=x=x=x=x=x=x=x=x=x=x=
  372.  
  373.  
  374. Lecture 3
  375.  
  376. Types of Network
  377. ===================
  378. PAN (Personal Area Network): A network covering a very small area, usually a small room. The best known wireless PAN network technology is Bluetooth.
  379.  
  380.  
  381. LAN (Local Area Network): It covers the Local area. This usually includes a local office and they're also pretty common in homes now, thanks to the spread of Wi-Fi.
  382. Like Lucideus office.
  383.  
  384. MAN (Metropolitan Area Network) :A metropolitan area network (MAN) is similar to a local area network (LAN) but spans an entire city or campus. MANs are formed by connecting multiple LANs. Thus, MANs are larger than LANs but smaller than wide area networks (WAN).
  385. Delhi as a whole can be considered as MAN.
  386.  
  387. WAN (Wide Area Network) : A network that covers an area wider than a LAN.Distances can range from a network connecting multiple buildings on a corporate or college campus to satellite links connecting offices in different countries.
  388. Our Intenet the articles or browsing we do is a WAN based network.
  389.  
  390.  
  391.  
  392.  
  393.  
  394.  
  395.  
  396.  
  397.  
  398.  
  399. PORTS
  400. ======
  401.  
  402. Ports are the doors from where data comes and goes out of any device connected to a network can be LAN MAN or Wan.
  403.  
  404. Types of Ports
  405. ---------------
  406. Physical Ports : They are tangible in nature. i.e we can see touch and feel the ports, and as its nature data comes and goes out from these ports.
  407.  
  408. For Example: USB Ports, LAN, HDMI VGA etc etc.
  409.  
  410.  
  411. Virtual Ports : There are total 0-65535 ports avialable as it clear from the virtual they non tangible ports which you can see and feel but cant touch.
  412. For Example: Ports 80,8080 for HTTP : data comes and goes from client to server.
  413. Some well known ports:
  414.  
  415. --------------------------------------------
  416. Port | Name
  417. 21 | File Transfer Protocol (FTP)
  418. 22 | Secured shell (Ssh)
  419. 23 | Telnet
  420. 25 | SMTP
  421. 80 | HyperText Transfer Protocol (http) |
  422. 443 | HTTPS (http over ssl)
  423.  
  424. * ssh+FTP= SFTP (22)
  425.  
  426. Registered Ports:
  427. The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  428.  
  429. The registered port numbers are in the range from 1024 through 49151.
  430.  
  431. Dynamic Ports:
  432. Besides the well-known port numbers and the registered port numbers, the remaining ports in the port number spectrum are referred to as dynamic ports or private ports and are numbered from 49152 through 65535.
  433.  
  434.  
  435. Port 80 and 443
  436.  
  437.  
  438.  
  439. Proxy or Proxy Servers:
  440. ==========================
  441. A proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the server which then processes your request and returns what you were wanting.
  442. OR
  443. A proxy server is a computer that acts as a gateway between a local network and a larger-scale network such as the Internet.
  444. Proxy servers provide increased performance and security.
  445.  
  446. Example: www.hidemyass.com
  447. proxy-list.org
  448.  
  449. Extension :Anonymox
  450.  
  451.  
  452.  
  453.  
  454.  
  455.  
  456.  
  457.  
  458.  
  459.  
  460.  
  461.  
  462.  
  463.  
  464.  
  465.  
  466.  
  467.  
  468.  
  469.  
  470.  
  471.  
  472.  
  473.  
  474.  
  475.  
  476.  
  477. VPN(Virtual Private Network)
  478. ===============================
  479. A virtual private network, or VPN, extends across a public or shared network, and acts like a tunnel so you can exchange data securely and anonymously across the internet as if you were connected directly to a private network.
  480.  
  481. Once you connect through a VPN, all your traffic becomes encrypted and your IP (Internet Protocol) address gets replaced with the address of the VPN server.
  482.  
  483. pick a quality VPN benefit that does not store information or interchanges logs.
  484. PR esa kyuuu ????
  485.  
  486. Eg: Vpngates.com
  487. open VPN
  488.  
  489.  
  490. Services:
  491. Online Services : hidemyass
  492. extension based : hoxx vpn, Anonymox
  493. Stand Alone Services : Psiphon
  494.  
  495.  
  496. DNS (Domain Name System)
  497. ==========================
  498. The Domain Name System (DNS) is the phonebook of the Internet.
  499. google.com ---> google ki ip --> open's google
  500.  
  501. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
  502.  
  503. How DNS works:
  504. https://www.youtube.com/watch?v=2ZUxoi7YNgs
  505.  
  506.  
  507. www.google.com
  508.  
  509.  
  510.  
  511. OSI Layer
  512. ============
  513. 7 Layers:
  514.  
  515. Sender Receiver
  516. ======= ========
  517.  
  518. 7. Application Layer 7. Application Layer
  519.  
  520. 6. Presentation Layer 6. Presentation Layer
  521.  
  522. 5. Session Layer 5. Session Layer
  523.  
  524. 4. Transport Layer 4. Transport Layer
  525.  
  526. 3. Network Layer 3. Network Layer
  527.  
  528. 2. Data Link Layer 2. Data Link Layer
  529.  
  530. 1. Physical Layer 1. Physical Layer
  531. | |
  532. | ^
  533. |------------->---->----->--------|
  534.  
  535.  
  536. Application Layer:
  537.  
  538. Presentation Layer:
  539. This layer is usually part of an operating system (OS) and converts incoming and outgoing data from one presentation format to another -- for example, from clear text to encrypted text at one end and back to clear text at the other.
  540.  
  541. Session Layer:
  542. This layer sets up, coordinates and terminates conversations. Its services include authentication and reconnection after an interruption.
  543.  
  544. Transport Layer:
  545. This layer manages packetization of data, then the delivery of the packets, including checking for errors in the data once it arrives. (TCP AND UDP)
  546. -->Segmentation
  547. -->Connection management
  548. -->Reliable and unreliable data delivery
  549. -->Flow control
  550. -->Connection multiplexing
  551.  
  552.  
  553.  
  554. Network Layer:
  555. This layer handles addressing and routing the data -- sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level.
  556. Network layer is responsible for providing logical address known as IP address. Router works on this layer. Main functions of this layer are following:-
  557. -->Define IP address
  558. -->Find routes based on IP address to reach its destination
  559.  
  560. Data link Layer:
  561. It forms frames from the packets that are received from network layer and gives it to physical layer.Outgoing messages are assembled into frames.
  562. --> Defining the Media Access Control (MAC) or hardware addresses
  563. --> Defining the physical or hardware topology for connections
  564. --> Defining how the network layer protocol is encapsulated in the data link layer frame
  565.  
  566.  
  567. Physical Layer:
  568. Bits me khelna yhan hota hai aapka sb kch 0 and 1 k form me travel krke receiver side jaata hai.
  569. Everything travels in a network in binary form i.e. 0 and 1 so here the data is converted into its binary form.
  570.  
  571.  
  572.  
  573.  
  574. TCP/IP Model:
  575. ===============
  576. 4 layers
  577.  
  578. Sender Receiver
  579. ======= ========
  580.  
  581. 4. Application Layer 4. Application Layer
  582.  
  583. 3. Transport Layer 3. Transport Layer
  584.  
  585. 2. Internet Layer 2. Internet Layer
  586.  
  587. 1. Network Interface 1. Network Interface
  588.  
  589.  
  590.  
  591. OSI - protocol independent,TL guarantees delivery of packets
  592. TCP/IP - based on standard protocol,TL does not
  593.  
  594.  
  595.  
  596. Web Technology Basics
  597. =======================
  598. Domain Name
  599. Hosting Spaces
  600. Server
  601. Client
  602. Backend (Database)
  603. Front end
  604. Browsers
  605.  
  606.  
  607.  
  608. 09560644011 -- Jyoti ma'am
  609.  
  610. 08960949159 -- Prabhankar Tripathi
  611.  
  612. 09717083319 -- Rahul Tyagi Sir
  613.  
  614. 08558964701 -- Abhijeet Singh Sir
  615.  
  616.  
  617.  
  618.  
  619.  
  620.  
  621.  
  622.  
  623.  
  624.  
  625.  
  626.  
  627.  
  628.  
  629.  
  630.  
  631.  
  632.  
  633.  
  634.  
  635.  
  636.  
  637.  
  638.  
  639.  
  640. x=x=x==x=x=x=x=x=x=x=x=x=x==x=x=x=x=x=x=x=x=x=x=x=x=x==x=x=x=x=x=x=x=x=x==x=x=x=x=x=x=x=
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement