Monday, June 30, 2014

All Default password of World by Gorvam Saddar



2Wire, Inc.360 Systems3COM
3MAccelerated NetworksACCTON
AcerActiontecAdaptec
ADC KentroxAdComplete.comAddPac Technology
AdobeADTAdtech
AdtranAdvanced IntegrationAIRAYA Corp
AirlinkAirLink PlusAironet
AirwayAladdinAlcatel
Alien TechnologyAllied TelesynAllnet
AllotAlteonAmbit
AMIAminoAmpJuke
AmptronAMXApache
Apache ProjectAPCApple
Apple ComputerArrisArrowpoint
ArubaAsanteAscend
AscomASTAsus
AT&TAtlassianAttachmate
AudioactiveAutodeskAvaya
Avenger News System (ANS)AWARDAxis
Axis CommunicationsBarracudaBay Networks
Best Practical SolutionsBestPracticalBewan
BillionBintecBiodata
BiostarBizDesignBlack Widow Web Design Ltd
Blitzz TechnologiesBMC SoftwareBomgar
BorlandBreezecomBrocade
BrotherBrother Industries Ltd.BT
Buffalo/MELCOBusyboxCabletron
Capricorn Infotech IndiaCarsten SchmitzCayman
Cellit , IncCGI WorldChase Research
Check PointChuming ChenCiphertrust
CiscoCisco-ArrowpointCitrix Systems, Inc.
ClarisClearOne CommunicationsCobalt
Colubris NetworksComcast SMCComersus
CompaqCompualynxConceptronic
ConcordConexantControl4
CoronaMatrixCovertixCrystalview
CTX InternationalCyberguardCyberMax
CycladesD-LinkDaewoo
Dallas SemiconductorsDassault SystemesData General
DatacomDataWizard Technologies Inc.Davolink
DaytekDebianDeerfield
DellDevelconDictaphone
DigicorpDigicraft SoftwareDigital Equipment
Digium, Inc.DivarDlink
DotNetNuke CorporationDraytekDraytek Corp
Ducati Motor HoldingDuPontDVB
DynalinkDynix Library SystemsEaton
Echelon CorporationEdimaxEfficient
Ektron, Inc.ElronElsa
EMCEminentEnhydra
EnoxEnterasysEntrust
EPiServer ABEpoxEricsson
eSeSIX Computer GmbHExabyteExinda Networks
Extended SystemsExtreme NetworksEZPhotoSales
F5Fastream TechnologiesFastwire
FatWireFirebird ProjectFlowpoint
FortinetFoscamFoundry Networks
FreetechFrontRange SolutionsFunk Software
GalacticommGandalfGateway
GeeklogGeneral InstrumentsglFtpD
Globespan VirataGoogleGossamer Threads Inc.
GrandStreamGrandstream Networks, IncGroupee, Inc.
GuardOneH2O ProjectHayes
Hemoco SoftwareHewlett-PackardHighPOint
Honeynet ProjectHorizon DataSysHosting Controller
HPHuawei Technologies CoHyperic, Inc.
IBMInformixInfrant
InnovaphoneInovaIntegrated Networks
IntelIntelliTouchInterbase
IntermecInternet ArchiveIntersystems
Inventel WanadooIpswitchIQinVision
IRCIronPortIwill
Jaspersoft CorporationJD EdwardsJean-Philippe Lang
Jeebles TechnologyJetformJetWay
Johnson ControlsJoss TechnologyJuniper
Justin HagstromKentico SoftwareKethinov
Konica MinoltaKronosKyocera
LaCieLANSALantronics
LantronixLeading EdgeLenel
Level1LGICLindsay Electronics
LinksysLinuxLivingston
LoglogicLongshineLucent
Luxon CommunicationsM TechnologyMachSpeed
MacsenseMagentoMagic-Pro
MamboManageEngineMandarin Library Automation
MantisMegastarMentec
Mercury InteractiveMichielMicrocom
MicronMicronetMicronics
MicroplexMicrosoftMike Peters
MikroTikMintelmklencke
MoleMotiveMotorola
MP3MysticMuzeMyioSoft
MySQLNanoteqNCR
NECNetAppNetasq
NetBotzNetcommNetcordia
NetgearNetGenesisNetopia
NetscapeNetscreenNetstar
NetworkICENewMedia-NET GmbHNexsan
NeXTNICE Systems Ltd.Niksun
NimbleNokiaNortel
NovellNSINurit
ODSOpen-Xchange Inc.Openlink
OpenMarketOptivisionOracle
OsicomOTRS Inc.Overland Storage
OvisLink Canada Inc.Packard BellPacketeer
PanasonicPandatelParallels
ParrotPattonPBX
phpMyAdminPHPReactorphpTest
PikatelPirelliPlainTree
PLANET Technology Corp.PokerTracker SoftwarePollsafe
PolycomPostgreSQLPowerchute
POWERLOGICPrestigePrime
PrimeBaseProxicastProxim
PRTGQ-TecQDI
QualiTeamQuantexQuest Software
Questra CorporationRadvisionRaidzone
RainbowRamp NetworksRapidStream
RaritanRayTalkRCA
Red Hat, IncRedcreek CommunicationsRemedy
remote-exploitResearchResearch Machines
ResumixRicohRizen
RMRNNRodopi
rPathRSASaba
SafecomSambaSambar Technologies
SamsungSamuel AbelsSAP
Schneider ElectricSeagull ScientificSecuricor3NET
SemaphoreSeyeon Technology Co., LtdShiva
ShuttleSiemensSiemens Corp
Silicon GraphicsSite InteractiveSitecom
SMA AmericaSMCSmith & Bentzen
Snap ApplianceSnomSoftware AG
SonicwallSonySony Ericsson
SourcefireSovereign HillSpider Systems
SplunkSsangyoungStan Ozier
SunSuper Micro Computer, Inc.SuperMicro
SurecomSweexSybase
SymantecSymbol Technologies, IncSynology Inc
SysKonnectTandbergTasman
TelappliantTelebitTelelec
TeletronicsTelewellTelus
TerayontestTexBox
TextPortalThecus TechTim Schaab
TimeToolsTinyTinys
TMCTopLayerToshiba
Trend MicroTrintechTriumph-Adler
TumbleweedTYPO3Typo3 Association
U.S. RoboticsUnexUNIX
UnknownUSRoboticsUT Lexar
UTStarcomVBrick SystemsVerifone
VeritasVerityVerizon
vertexVextrec TechnologyVieNuke
Vina TechnologiesVirtual ProgrammingVisa VAP
VobisVoiceGenie TechnologiesVoiceObjects Germany
VonageVPASPWanco, Inc.
WatchGuardWeb WizWebmin
WebrampWestellWim Bervoets
Wireless, Inc.WWWBoardX-Micro
XaviXeroxXinit Systems Ltd.
XylanXyplexYakumo
YuxinZcomaxZebra Technologies
ZenithZEOSZeus
ZoomZyxel

Follow @passdb on Twitter

Sunday, May 18, 2014

ADDS_ACtive directory domain service windows server 2008 complete full Gorvam_Saddar



Introduction
Gaining an understanding of the Active Directory™ directory service is the first step in understanding how the Windows® 2000 operating system functions and what it can do to help you meet your enterprise goals. This paper looks at Active Directory from the following three perspectives:
  • Store. Active Directory, the Windows 2000 Server directory service, hierarchically stores information about network objects and makes this information available to administrators, users, and applications. The first section of this paper explains what a directory service is, the integration of Active Directory service with the Internet's Domain Name System (DNS), and how Active Directory is actualized when you designate a server as a domain controller1.
  • Structure. Using Active Directory, the network and its objects are organized by constructs such as domains, trees, forests, trust relationships, organizational units (OUs), and sites. The next section in this paper describes the structure and function of these Active Directory components, and how this architecture lets administrators manage the network so that users can accomplish business objectives.
  • Inter-communicate. Because Active Directory is based on standard directory access protocols, it can interoperate with other directory services and can be accessed by third-party applications that follow these protocols. The final section describes how Active Directory can communicate with a wide variety of other technologies.
  •  
  • for full knowledge about ....ADDS

rootkits_investigation_procedures_Gorvam_saddar



Rootkits

What is a rootkit?

          A rootkit is a special variant of a Trojan, a
.k.a. a RAT (Remote Administration Tool).  What separates a rootkit from a regular Trojan is that a rootkit, by definition, occupies Ring 0, also known as root or kernel level, the highest run privilege available, which is where the OS (Operating System) itself runs.  Non-rootkit trojans typically run in Ring 3, or user level, which is where ordinary applications run, though some sources refer to userland trojans as “rootkits” also.  Usually, but not always, a rootkit will actively obfuscate and attempt to hide its presence from the user and any security software present......

Monday, May 12, 2014

MCITP COMPLETE BY GORVAM SADDAR

                                          
MCITP



TOPICS OF MCITP     
WORKGROUP TOPICS

S.R.NO
PRACTICALS
PAGE NO
STATUS
1)     
IP CONFIGRATION
2-23
OK
2)     
REMOTE DESKTOP
24-41
OK
3)     
REMOTE ASSISTANCE
42-54
OK
4)     
OUTLOOK CONFIGRATION


5)     
DHCP SERVER
55-125
OK
6)     
DHCP RESERVATION
126-134
OK
7)     
DHCP RELAY


8)     
DNS MASTER
135-178
OK
9)     
DNS SLAVE


10)                        
FILE SERVER

Ok
11)                        
FILE SHARING

Ok
12)                        
PASSWORD PROTECTING SHARING

Ok
13)                        
DISK QUATA

Ok
14)                        
FOLDER QUATA

Ok
15)                        
FILE SCREANING

Ok
16)                        
DFS (DISTRIBUTED FILE SYSTEM)

Ok
17)                        
PRINT SERVER


18)                        
IIS SERVER WITH HTTP   
179-
OK
19)                        
IIS SERVER WITH HTTPS


20)                        
FTP (FILE TRANSFER PROTOCOL)
205
OK
21)  
FTP DOWNLOADING & UPLOADING USING
THE CMD LINE INTERFACE


Ok
22)                        
TERMINAL SERVER

Ok
23)                        
TERMINAL SERVER GATEWAY

Ok
24)                        
REMOTE DESKTOPS

Ok
25)                        
RDP SHARING ON MULTIPLE SHARING

Ok
26)                        
RRAS

Ok
27)                        
NAT

Ok
28)                        
NAT

Ok
29)                        
VPN (VIRTUAL PRIVATE NETWORK)

Ok
30)                        
ROUTING

Ok
31)                        
IP SECURITY

Ok
32)                        
SIMPLE FIREWALL CONFIGRATION


33)                        
ADVANCE FIREWALL CONFIGRATION


34)                        
WINDOWS BACKUP SERVICE


35)                        
WDS (WINDOWS DEPLOYEMENT SERVICE)


36)                        
INTERNET EXPLORER SECURITY PASSWORD


37)                        
HIDDEN SHARING


38)                        
USER MANAGEMENT


39)                        
GROUP MANAGEMENT


40)                        
LOCAL SECURITY POLICIES


41)                        
DRIVE MAPING


42)                        
HOME FOLDER








DOMAIN  TOPICS

      1)
ADDS TERMS +INTRO+USE


      2)
PDC


      3)
RODC


      4)
ADC


      5)
CDC


      6)
JOINING SYSTEM INTO DOMAIN


      7)
REMOVING SYSTEM FROM DOMAIN


      8)
DOMAIN O U MANAGEMENT


      9)
DOMAIN GROUP MANAGEMENT


   10)
DOMAIN USER MANAGMENT


   11)
DOMAIN LOCAL SECURTIES POLICIES


   12)
GROUP SECURITY POLICIES


   13)
SOFTWARE INTALLING USING GROUP
POLICIES



   14)
FILTERS IN THE GROUP POLICIES


   15)
AD BACK UP IN GRAPHICAL MODE


   16)
AD BACK UP IN CMD MODE


   17)
FSMO POLICIES


   18)
LOCAL PROFILIES


   19)
MADATORY PROFILIES