WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Monday, November 19, 2012

list of latest Samsung codes

Today we will discuss about the some secret codes of Samsung mobiles. These codes may be not applied to all old models of Samsung mobile, but you can try to all latest Samsung mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest Samsung codes list:

Code

*#9999#                      
         Use to display the mobile software version

#*3849#                                Use to reboot the Samsung handsets

*#06#                                     To display the IMEI Number of the mobile

#*2558#                                To on/off the mobile time

#*7337#                                Use to unlock the latest Samsung set

#*4760#                                Use to activate and deactivate the GSM features

*#9998*246#                        To verify the memory and battery information

*#7465625#                         To verify the Lock status of mobile

*#0001#                                To display the Serial Number of the mobile

*2767*637#                           Use to unlock the mobile code

*#8999*636#                         To display the storage capacity of the mobile

#*2562#                                 Use to reboot the Samsung handsets

*#8999*667#                         Use to run the mobile in Debug mode

*2767*226372#                     To fine-tune the camera settings

*#8999*778#                          Use to display the information about mobile SIM card

*2767*637#                             Use to unlock the mobile code

*7465625*28638#                  Use to make active the Network Lock

#*#8377466#                          To display the hardware version

*7465625*746*Code#           Use to make active the SIM card lock

*#pw+15853649247w#          Use to unlock the mobile code without SIM card

#*3888#                                    To verify the Bluetooth information

*#9998*627837793#               Uses to get extra parameter for unlock mobile settings

#7465625*28638#                   Use to unlock the Network Lock

#*7983# Voltage                       Use to regulate Frequency or Voltage

#7465625*746*Code#             Use to unlock the SIM card lock

#*2834#                                      Use to reset the handsfree options

#*5376#                                      To delete all SMS in one command

*#4777*8665#                            Use to explore the GPSR tool list

#*2474#                                      To verify the charging duration

*2767*688#                                Use to readjust the mobile TV optionss

Wednesday, June 20, 2012

Remote JMS with JBoss AS 7.1 / HornetQ JMS

When you want to connect to a Queue or Topic on JBoss Application Server 7.1.1 with a remote jms client you can follow the next steps.

First step is to add messaging configuration to the JBoss configuration xml. In this case I will use the standalone configuration.

Open standalone.xml located at jboss-as-7.1.1.Final\standalone\configuration

Add org.jboss.as.messaging to the extensions








Add the HornetQ messaging configuration, make sure it is the first xml entry after profile.





truepersistence-enabled>
102400journal-file-size>
2min-files>




















231.7.7.7group-address>
9876
5000broadcast-period>

netty






231.7.7.7group-address>
9876
10000refresh-timeout>





jms

nettyconnector-ref>















jms.queue.DLQaddress>
jms.queue.ExpiryQueue
0redelivery-delay>
10485760size-bytes>
BLOCKaddress-full-policy>
limit>10history-day-limit>
1000redistribution-delay>









/>


>




/>
























We will use

RemoteConnectionFactory as JMS ConnectionFactory with "java:jboss/exported/jms/RemoteConnectionFactory" as JNDI name. Use jms/RemoteConnectionFactory as CF reference in your java client.

queue/test as Queue with as jndi name "java:jboss/exported/jms/queue/test". Use jms/queue/test as Queue reference.

For remote it should start with java:jboss/exported/ else these object won't be exposed and then you can't lookup the CF or Queue.

Also for remote we need to create a application user. Go to the bin folder and start add-user.sh
Create a user jms with a password and add this user to the guest role. Guest role has permission for remote and jms.

Start JBoss with the standalone configuration.


For our java test clients we need to have a jboss and a HornetQ jar file.
First copy jboss-client.jar from the bin/client jboss folder and we need to download the lates HornetQ libraries ( hornetq-2.2.14.Final) . Copy hornetq-jms-client.jar from the HornetQ lib folder.

First the Jms Send Client


Jms Receive Client



In this example I use the same username , password for createQueueConnection
QueueConnection qcon = qconFactory.createQueueConnection("jms","jboss1");

If you don't do this you will get this error Unable to validate user: null

INFO: JBoss Remoting version 3.2.3.GA
Exception in thread "main" javax.jms.JMSSecurityException: Unable to validate user: null
at org.hornetq.core.protocol.core.impl.ChannelImpl.sendBlocking(ChannelImpl.java:312)
Caused by: HornetQException[errorCode=105 message=Unable to validate user: null]

To solve this you can also disable messaging security
truepersistence-enabled>
102400journal-file-size>
2min-files>
falsesecurity-enabled>

Now you can also use QueueConnection qcon = qconFactory.createQueueConnection();

Monday, May 28, 2012

What is Ctfmon.exe? How to Fix Error Of Ctfmon.exe?



> Ctfmon.exe is not virus.

> Ctfmon.exe is vital window component, responsible for Alternative User Input Text Input Processor (TIP) with MS office Language Bar.

> Ctfmon.exe should not be stopped or removed.

> Ctfmon.exe can be uninstalled.

Read Complete story of Ctfmon.exe Here

http://support.microsoft.com/kb/282599

Friday, March 23, 2012

Collection Programming and Tools Crack (2011)


Collection Programming and Tools Crack (2011)

Collection Programming and Tools Crack (2011) | 4.59 GB

If you're already familiar with the basics krekerstva and programming, then videokurs CRACKL @ B could be for you to be even more useful, because in the course of lessons you will learn the secrets of my approach, you can "hear" the professional details that are imperceptible beginner.

List of lessons video course (they are all voiced):
1. The benefits of krekerstva for themselves. (Audio)
2. How not to transgress the law, being a *******. (Audio)
3. Where to start. Stages of becoming a programmer and *******.
4. Delphi, C or PHP: a difficult choice.
5. PHP modern language for a beginner. Installation and the first program.
6. Practice in PHP. Part One.
7. Practice in PHP. Part II.
8. Fundamentals of code: the number system, bits, bytes.
9. What is common between EXE, JPG, TXT
10. Program Analysis: Entropy, the basics of virology.
11. Processor architecture for the purpose of cracking.
12. Assembler. Familiarity with the language. Stack format registers.
13. Assembler. Commands, flags, and examples.
14. Overview of the main tools *******
15. Familiarization with the debugger OllyDbg
16. Specialization *******s
17. Breaking the first program. Disassembly, the search code.
18. Breaking the second program. Debugging, patch, use patterns.
19. The structure of executable files PE.
20. Unpacking the first program. Secrets of the approach. Classic hack unpacked program.
21. Surprises from the protectors: littering and morph code, virtual machine, the encrypted code, anti-******* tools.
22. Radiotekh + protection programs: a homemade dongle.
23. Forum CRACKL @ B. Great opportunity for a proper understanding.
24. At last

Ext. Information:
In addition, according to tradition CRACKL @ B DVD, the disk also contains tools krekerskie (1900 MB - 600 files).
Folder:
CRACKLAB.RU.exe - a copy of the entire site CRACKL @ B (800 megabytes zipped in 7z SFX)
Analyzers - Analyzer 22 files (PEiD Final, RDG Packer Detector ,...)
*******s - 25 programs to guess passwords for RAR, ZIP, The BAT, OfficeXP, MD5 (Passware Kit 9.0 Registered, Multi Password Recovery, Rar Password ******* 4.12, The Bat Password Viewer, The Bat Unpass ,...). Here is the archive dictionaries chastovstrechayuschimisya passwords - to break the method of "dictionary attacks", the total size of the uncompressed dictionary - 40 MB.
Crypto - 20 programs for cracking the encryption, hash (PasswordsPro 2.5.1.1, RSA Attacking Toolkit 0.1f, MD5 CrackFAST 2.10, Encryption Xpert 1.2, ...)
Debuggers - 9 debuggers (DriverStudio 3.2, SoftICE 4.05 and 4.27 (under 98, and NT / XP) + all sorts of gadgets for him, OllyDbg 1.10 + crack + plugins + Russian help, OllyDbg 2.01, Syser Debugger, TRW2000, SoftSnoop, Rock Debugger, Auto Debug Professional)
Decompilers - 35 decompilers (DeDe 3.50 + SDK,. NET Reflector 5.1, Numega SmartCheck 6.20 RC2, 9Rays Spices. NET Suite 5.0, ReFox MMII, VB RezQ 3.3a, MSI FEU 0.2, EMS Source Rescuer 2.0, ...)
Disassemblers - 30 disassembler and associated tools (IDA Pro, Flair and WinCE Debugger + directory (RUS) + new plug-ins, Killer WinDASM 10, Sourcer 8.01, ...)
Dongles and LMs - a set of 47 major management licenses for research and instumentov hardware keys (Sentinel LM SDK 7.3, FLEXlm SDK 9.2i, FLEXlm SDK 11.4, HASP and Hardlock Emulator 2007, Guardant SDK 5.0, SentinelSuperPro 6.0 Kit, ...)
EXE Tools - more than 25 tools for working with EXE files (SDL Passolo 2009, Restorator 2007 Full, PETools 1.5, Stud_PE 2.3, PE Explorer 1.99, PE Studio 3.3, ...)
Monitors - All monitors from sysinternals (RegMon 7.04, FileMon 7.04, ...) and 45 others: Regshot 2.0.1, RegSnap Pro 6.1, kerberos 1.13p API spy, VB Spy 2.3, ...
Other - 25 programs to reset trial and creating NFO (Registry Trash Keys Finder, Trial-Reset, Data ****, EVACleaner 2.7 + SRC, Damn NFO Viewer, ...)
Packers - Packers 50 EXE files, code scramblers (ASPack, NSPack, PECompact, PECrypt, UPX, WinUPack ...) - all the most recent version
Patchgens - 35 Patch Maker (Patchmaker 1.2g, WCRPatcher 1.2.12, Universal Patcher 2.0 Pro, ABEL Loader Generator 2.31, ...)

Note:
1. burn to cd or mount using a virutal drive e.g. Alcohol120%
2. install the pre-cracked software

Download Links:

Bookmark and Share

Saturday, March 17, 2012

Complete List of 100 Centuries by Sachin Tendulkar

Finally after a long wait of one year, Sachin Tendulkar scored his 100th international ton in the match against Bangladesh. Sachin helped India to score 289 runs in 50 overs but unfortunately Bangladesh scored 293 for five in 49.2 overs and won the match by five wickets. Anyway, Sachin has become the first cricketer in the world to score 100 international centuries, a record which came after more than two decade long career. He is regarded as one of the greatest batsmen in the history of cricket. Besiders being the highest century maker, he is the leading run-scorer in Test and one-day international cricket. I have compiled the complete list of all the hundred international centuries scored by Sachin. Please have a look.

One Day International Centuries ::

1
110
Australia
R. Premadasa Stadium, Colombo
9 September, 1994
Won
2
115
New Zealand
IPCL Sports Complex Ground, Vadodara
28 October, 1994
Won
3
105
West Indies
Sawai Mansingh Stadium, Jaipur
11 November, 1994
Won
4
112*
Sri Lanka
Sharjah Cricket Association Stadium, Sharjah
9 April, 1995
Won
5
127*
Kenya
Barabati Stadium, Cuttack
18 February, 1996
Won
6
137
Sri Lanka
Feroz Shah Kotla, New Delhi
2 March, 1996
Lost
7
100
Pakistan
Padang, Singapore
5 April, 1996
Lost
8
118
Pakistan
Sharjah Cricket Association Stadium, Sharjah
15 April, 1996
Won
9
110
Sri Lanka
R. Premadasa Stadium, Colombo
28 August, 1996
Lost
10
114
South Africa
Wankhede Stadium, Mumbai
14 December, 1996
Won
11
104
Zimbabwe
Willowmoore Park, Benoni
9 February, 1997
Won
12
117
New Zealand
M. Chinnaswamy Stadium, Bangalore
14 May, 1997
Won
13
100
Australia
Green Park Stadium, Kanpur
7 April, 1998
Won
14
143
Australia
Sharjah Cricket Association Stadium, Sharjah
22 April, 1998
Lost
15
134
Australia
Sharjah Cricket Association Stadium, Sharjah
24 April, 1998
Won
16
100*
Kenya
Eden Gardens, Kolkata
31 May, 1998
Won
17
128
Sri Lanka
R. Premadasa Stadium, Colombo
7 July, 1998
Won
18
127*
Zimbabwe
Queens Sports Club, Bulawayo
26 September, 1998
Won
19
141
Australia
Bangabandhu Stadium, Dhaka
28 October, 1998
Won
20
118*
Zimbabwe
Sharjah Cricket Association Stadium, Sharjah
8 November, 1998
Won
21
124*
Zimbabwe
Sharjah Cricket Association Stadium, Sharjah
13 November, 199
Won
22
140*
Kenya
County Ground, Bristol
23 May, 1999
Won
23
120?
Sri Lanka
Sinhalese Sports Club, Colombo
29 August, 1999
Won
24
186*
New Zealand
Lal Bahadur Shastri Stadium, Hyderabad
8 November, 1999
Won
25
122
South Africa
IPCL Sports Complex Ground, Vadodara
17 March, 2000
Won
26
101
Sri Lanka
Sharjah Cricket Association Stadium, Sharjah
20 October, 2000
Lost
27
146
Zimbabwe
Barkatullah Khan Stadium, Jodhpur
8 December, 2000
Lost
28
139
Australia
Nehru Stadium, Indore
31 March, 2001
Won
29
122*
West Indies
Harare Sports Club, Harare
4 July, 2001
Won
30
101
South Africa
New Wanderers Stadium, Johannesburg
5 October, 2001
Lost
31
146
Kenya
Boland Park, Paarl
24 October, 2001
Won
32
105*
England
Riverside Ground, Chester-le-Street
4 July, 2002
N/R
33
113
Sri Lanka
County Ground, Bristol
11 July, 2002
Won
34
152
Namibia
City Oval, Pietermaritzburg
23 February, 2003
Won
35
100
Australia
Roop Singh Stadium, Gwalior
26 October, 2003
Won
36
102
New Zealand
Lal Bahadur Shastri Stadium, Hyderabad
15 November, 2003
Won
37
141
Pakistan
Rawalpindi Cricket Stadium, Rawalpindi
16 March, 2004
Lost
38
123
Pakistan
Sardar Patel Stadium, Motera, Ahmedabad
12 April, 2005
Lost
39
100
Pakistan
Arbab Niaz Stadium, Peshawar
6 February, 2006
Lost
40
141*
West Indies
Kinrara Academy Oval, Kuala Lumpur
14 September, 2006
Lost
41
100*
West Indies
IPCL Sports Complex Ground, Vadodara
31 January, 2007
Won
42
117*
Australia
Sydney Cricket Ground, Sydney
2 March, 2008
Won
43
163*
New Zealand
AMI Stadium, Christchurch
8 March, 2009
Won
44
138
Sri Lanka
R. Premadasa Stadium, Colombo
14 September, 2009
Won
45
175
Australia
Rajiv Gandhi International Stadium, Hyderabad
5 November, 2009
Lost
46
200*
South Africa
Roop Singh Stadium, Gwalior
24 February, 2010
Won
47
120
England
M Chinnaswamy Stadium, Bangalore
27 February 2011
Tie
48
110
South Africa
Vidarbha Cricket Association Stadium, Jamtha, Nagpur
12 March 2011
Lost
49
114
Bangladesh
Shere Bangla National Stadium, Mirpur
16 March 2012
Lost

Test Centuries ::

1
119*
England
Old Trafford Cricket Ground, Manchester
14 August 1990
Drawn
2
148*
Australia
Sydney Cricket Ground, Sydney
6 January 1992
Drawn
3
114
Australia
WACA Ground, Perth
3 February 1992
Lost
4
111
South Africa
Wanderers Stadium, Johannesburg
28 November 1992
Drawn
5
165
England
M. A. Chidambaram Stadium, Chennai
12 February 1993
Won
6
104*
Sri Lanka
Sinhalese Sports Club, Colombo
31 July 1993
Won
7
142
Sri Lanka
K. D. Singh Babu Stadium, Lucknow
19 January 1994
Won
8
179
West Indies
Vidarbha Cricket Association Ground, Nagpur
2 December 1994
Drawn
9
122
England
Edgbaston Cricket Ground, Birmingham
8 June 1996
Lost
10
177
England
Trent Bridge, Nottingham
5 July 1996
Drawn
11
169
South Africa
Newlands Cricket Ground, Cape Town
4 January 1997
Lost
12
143
Sri Lanka
R. Premadasa Stadium, Colombo
3 August 1997
Drawn
13
139
Sri Lanka
Sinhalese Sports Club, Colombo
11 August 1997
Drawn
14
148
Sri Lanka
Wankhede Stadium, Mumbai
4 December 1997
Drawn
15
155*
Australia
M. A. Chidambaram Stadium, Chennai
9 March 1998
Won
16
177
Australia
M. Chinnaswamy Stadium, Bangalore
26 March 1998
Lost
17
113
New Zealand
Basin Reserve, Wellington
29 December 1998
Lost
18
136
Pakistan
M. A. Chidambaram Stadium, Chennai
31 January 1999
Lost
19
124*
Sri Lanka
Sinhalese Sports Club, Colombo
28 February 1999
Drawn
20
126*
New Zealand
Punjab Cricket Association Stadium, Mohali
13 October 1999
Drawn
21
217
New Zealand
Sardar Patel Stadium, Motera, Ahmedabad
30 October 1999
Drawn
22
116
Australia
Melbourne Cricket Ground, Melbourne
28 December 1999
Lost
23
122
Zimbabwe
Feroz Shah Kotla, New Delhi
21 November 2000
Won
24
201*
Zimbabwe
Vidarbha Cricket Association Ground, Nagpur
26 November 2000
Drawn
25
126
Australia
M. A. Chidambaram Stadium, Chennai
20 March 2001
Won
26
155
South Africa
Goodyear Park, Bloemfontein
3 November 2001
Lost
27
103
England
Sardar Patel Stadium, Motera, Ahmedabad
13 December 2001
Drawn
28
176
Zimbabwe
Vidarbha Cricket Association Ground, Nagpur
24 February 2002
Won
29
117
West Indies
Queen’s Park Oval, Port of Spain
20 April 2002
Won
30
193
England
Headingley, Leeds
23 August 2002
Won
31
176
West Indies
Eden Gardens, Kolkata
3 November 2002
Drawn
32
241*
Australia
Sydney Cricket Ground, Sydney
4 January 2004
Drawn
33
194*
Pakistan
Multan Cricket Stadium, Multan
29 March 2004
Won
34
248*
Bangladesh
Bangabandhu National Stadium, Dhaka
12 December 2004
Won
35
109
Sri Lanka
Feroz Shah Kotla, New Delhi
22 December 2005
Won
36
101
Bangladesh
Bir Shrestha Shahid Ruhul Amin Stadium, Chittagong
19 May 2007
Drawn
37
122*
Bangladesh
Sher-e-Bangla National Stadium, Mirpur
26 May 2007
Won
38
154*
Australia
Sydney Cricket Ground, Sydney
4 January 2008
Lost
39
153
Australia
Adelaide Oval, Adelaide
25 January 2008
Drawn
40
109
Australia
Vidarbha Cricket Association Stadium, Nagpur
6 November 2008
Won
41
103*
England
M. A. Chidambaram Stadium, Chennai
15 December 2008
Won
42
160
New Zealand
Seddon Park, Hamilton
20 March 2009
Won
43
100*
Sri Lanka
Sardar Patel Stadium, Motera, Ahmedabad
20 November 2009
Drawn
44
105*
Bangladesh
Zohur Ahmed Chowdhury Stadium, Chittagong
18 January 2010
Won
45
143
Bangladesh
Shere Bangla National Stadium, Mirpur
25 January 2010
Won
46
100
South Africa
Cricket Association Stadium, Nagpur
9 February 2010
Lost
47
106
South Africa
Eden Gardens, Kolkata
15 February 2010
Won
48
203
Sri Lanka
Sinhalese Sports Club, Colombo
28 July 2010
Drawn
49
214
Australia
M. Chinnaswamy Stadium, Bangalore
11 October 2010
Won
50
111*
South Africa
SuperSport Park, Centurion
19 December 2010
Lost
51
146
South Africa
Newlands Cricket Ground, Cape Town
4 January 2011
Drawn

Sachin Tendulkar’s 100 international hundreds since his debut against Pakistan back in December, 1989 in sequential order.

1) 119 no vs England at Old Trafford on Aug 14, ‘90

2) 148 no India vs Australia at SCG on Jan 6,’92

3) 114 vs Australia at WACA, Perth on Feb 3, ‘92

4) 111 vs SA at Wanderers, Johannesburg on Nov 28, ‘92

5) 165 vs England at Chepauk, Chennai on Feb 12, ‘93

6) 104 no vs Sri Lanka at SSC, Colombo on Jul 31,’93

7) 142 vs SL at KDSB Stadium, Lucknow on Jan 19,’94

8) 110 vs Australia, at RPS, Colombo, on Sep 9, ‘94

9) 115 vs New Zealand at IPCL, Vadodara on Oct 28, ‘94

10) 105 vs West Indies at SMS, Jaipur on Nov 11, ‘94

11) 179 vs West Indies at VCA Ground, Nagpur on Dec 2,’94

12) 112 no vs Sri Lanka at Sharjah on Apr 9, ‘95

13) 127 no vs Kenya at Barabati, Cuttack on Feb 18, ‘96

14) 137 vs Sri Lanka at Kotla, New Delhi on Mar 2, ‘96

15) 100 vs Pakistan at Padang, Singapore, on Apr 5, ‘96

16) 118 vs Pakistan at Sharjah on Apr 15, ‘96

17) 122 vs England at Edgbaston, Birmingham, on Jun 8, ‘96

18) 177 vs England at Nottingham on Jul 5, ‘96

19) 110 vs Sri Lanka at RPS Colombo, on August 28, ‘96

20) 114 vs SA at Wankhede Stadium, Mumbai on Dec 14, ‘96

21) 169 vs SA at Newlands, Cape Town on Jan 4, ‘97

22) 104 vs Zimbabwe at Benoni on Feb 9, ‘97

23) 117 vs NZ at Chinnaswamy, Bangalore, on May 14, ‘97

24) 143 vs Sri Lanka at RPS, Colombo, on Aug 3, ‘97

25) 139 vs Sri Lanka at SSC, Colombo, on Aug 11, ‘97

26) 148 vs SL at Wankhede Stadium, Mumbai on Dec 4, ‘97

27) 155 No vs Australia at Chepauk, Chennai, on Mar 9, ‘98

28) 177 vs Aus at Chinnaswamy, Bangalore on March 26, ‘98

29) 100 vs Australia at Green Park, Kanpur, on Apr 7, ‘98

30) 143 vs Australia at Sharjah on Apr 22, ‘98

31) 134 vs Australia, Sharjah, on April 24, ‘98

32) 100 no vs Kenya, Eden Gardens, May 31, ‘98

33) 128 vs Sri Lanka at RPS, Colombo, on Jul 7, ‘98

34) 127 vs Zimbabwe at Bulawayo on Sep 26, ‘98

35) 141 vs Australia in Bangladesh on Oct 28, ‘98

36) 118 no vs Zimbabwe at Sharjah, on Nov 8, ‘98

37) 124 vs Zimbabwe at Sharjah on Nov 13, ‘98

38) 113 vs New Zealand at Wellington, on Dec 29, ‘98

39) 136 vs Pakistan at Chepauk, Chennai on Jan 31, ‘99

40) 124 no vs Sri Lanka at SSC, Colombo, on Feb 28, ‘99

41) 140 vs Kenya at Bristol, on May 23, ‘99

42) 120 vs Sri Lanka in Colombo, on Aug 29, ‘99

43) 126 no vs New Zealand at PCA, Mohali, on Oct 13, ‘99

44) 217 vs NZ at Motera, Ahmedabad, on Oct 30, ‘99

45) 186 vs New Zealand at Hyderabad on Nov 8, ‘99

46) 116 vs Australia at MCG on Dec 28, ‘99

47) 122 vs South Africa at Vadodara on Mar 17, ‘00

48) 101 vs Sri Lanka, Sharjah, Oct 20,’00

49) 122 vs Zimbabwe at Kotla, New Delhi, on Nov 21, ‘00

50) 201 no vs Zimbabwe at VCA, Nagpur, on Nov 26, ‘00

51) 146 vs Zimbabwe at Jodhpur, on Dec 8, ‘00

52) 126 vs Australia at Chepauk, Chennai on Mar 20, ‘01

53) 139 vs Australia at Indore on Mar 31, ‘01

54) 122 vs West Indies at Harare on Jul 4, ‘01

55) 101 vs SA at Wanderers, Johannesburg on Oct 5, ‘01

56) 146 vs Kenya at Paarl, South Africa, on Oct 24, ‘01

57) 155 vs SA at Goodyear Park, Bloemfontein, Nov 3, ‘01

58) 103 vs England at Motera, Ahmedabad, on Dec 13, ‘01

59) 176 vs Zimbabwe at VCA, Nagpur, on Feb 24, ‘02

60) 117 vs WI at QP Oval, Port of Spain, on Apr 20, ‘02

61) 105 vs England at Chester—Le—Street on Jul 4, ‘02

62) 113 vs Sri Lanka, Bristol, England, on Jul 11, ‘02

63) 193 vs England at Headingley, Leeds, on Aug 23, ‘02

64) 176 vs WI at Eden Gardens, Kolkata on Nov 3, ‘02

65) 152 vs Namibia, Pietermaritzburg, SA, on Feb 23, ‘03

66) 100 vs Australia, Gwalior, on Oct 26,’03

67) 102 vs New Zealand in Hyderabad on Nov 15, ‘03

68) 241 no vs Australia at SCG on Jan 4, ‘04

69) 141 vs Pakistan in Rawalpindi, on Mar 16, ‘04

70) 194 no vs Pakistan at Multan, on Mar 29, ‘04

71) 248 no vs Bangladesh in Dhaka, on Dec 12, ‘04

72) 123 vs Pakistan at Ahmedabad on Apr 12, ‘05

73) 109 vs Sri Lanka at Kotla, New Delhi, on Dec 22, ‘05

74) 100 vs Pakistan at Peshawar, on February 6, ‘06

75) 141 no vs WI at Kuala Lumpur, on Sept 14, ‘06

76) 100 no vs WI at Vadodara, on Jan 31, ‘07

77) 101 vs Bangladesh in Chittagong on May 19, ‘07

78) 122 no vs Bangladesh in Mirpur on May 26, ‘07

79) 154 no vs Australia at SCG, on Jan 4, ‘08

80) 153 vs Australia at Adelaide Oval, on Jan 25, ‘08

81) 117 no vs Australia at SCG on Mar 2, ‘08

82) 109 vs Australia at Nagpur, on Nov 6, ‘08

83) 103 no vs England at Chepauk, Chennai, on Dec 15, ‘08

84) 163 vs New Zealand at Christchurch, on Mar 8, ‘09

85) 160 vs New Zealand at Seddon Park, on March 20, ‘09

86) 138 vs Sri Lanka at RPS, Colombo, on Sep 14, ‘09

87) 175 vs Australia at Hyderabad on Nov 5, ‘09

88) 100 no vs Sri Lanka at Ahmedabad, on Nov 20, ‘09

89) 105 no vs Bangladesh at Chittagong, on Jan 18, ‘10

90) 143 vs Bangladesh at Mirpur, on Jan 25, ‘10

91) 100 vs South Africa at Nagpur, on Feb 9, ‘10

92) 106 vs South Africa at Kolkata, on Feb 15, ‘10

93) 200 no vs South Africa at Gwalior, on Feb 24, ‘10

94) 203 vs Sri Lanka at Colombo, on Jul 28, ‘10

95) 214 vs Australia at Bangalore, on Oct 11, ‘10

96) 111 no vs South Africa at Cape Town, on Dec 19, ‘10

97) 146 vs South Africa at Cape Town, on Jan 4, ‘11

98) 120 vs England at Bangalore, on Feb 27, ‘11

99) 111 vs South Africa at Nagpur, on March 12, ‘11

100) 114 vs Bangaldesh at Mirpur, On March 16, ‘12

Friday, March 2, 2012

What is Clickjacking? Download tool for Clickjacking Technique

Clickjacking is a term first introduced by Jeremiah Grossman and Robert Hansen in 2008 to describe a technique whereby an attacker tricks a user into performing certain actions on a website by hiding clickable elements inside an invisible iframe.

Although it has been two years since the concept was first introduced, most websites still have not implemented effective protection against clickjacking. In part, this may be because of the difficulty of visualising how the technique works in practice.

This new browser-based tool allows a user to experiment with clickjacking techniques by using point-and-click to visually select different elements within a webpage to be targeted. The tool also allows several 'next-generation' clickjacking techniques to be used, as introduced in Paul Stone's Blackhat Europe 2010 talk.

Among the features of the new tool are:
Use point-and-click to select the areas of a page to be targeted
Supports the new 'text-field injection' technique
Supports the new 'content extraction' technique
'Visible mode' replay allowing a user to see how the technique works behind the science
'Hidden mode' replay allows the same steps to be replayed in a hidden manner, simulating a real clickjacking attack.

The tool is currently in an early beta stage, and works best in Firefox 3.6. Full support for other browsers will follow shortly. For further information, please see the Readme.txt file in the downloadable tool.

http://www.contextis.co.uk/resources/tools/clickjacking-tool/cjtool.zip
S

Collection Programming and Tools Crack (2011)

Collection Programming and Tools Crack (2011)

Collection Programming and Tools Crack (2011) | 4.59 GB

If you're already familiar with the basics krekerstva and programming, then videokurs CRACKL @ B could be for you to be even more useful, because in the course of lessons you will learn the secrets of my approach, you can "hear" the professional details that are imperceptible beginner.

List of lessons video course (they are all voiced):
1. The benefits of krekerstva for themselves. (Audio)
2. How not to transgress the law, being a *******. (Audio)
3. Where to start. Stages of becoming a programmer and *******.
4. Delphi, C or PHP: a difficult choice.
5. PHP modern language for a beginner. Installation and the first program.
6. Practice in PHP. Part One.
7. Practice in PHP. Part II.
8. Fundamentals of code: the number system, bits, bytes.
9. What is common between EXE, JPG, TXT
10. Program Analysis: Entropy, the basics of virology.
11. Processor architecture for the purpose of cracking.
12. Assembler. Familiarity with the language. Stack format registers.
13. Assembler. Commands, flags, and examples.
14. Overview of the main tools *******
15. Familiarization with the debugger OllyDbg
16. Specialization *******s
17. Breaking the first program. Disassembly, the search code.
18. Breaking the second program. Debugging, patch, use patterns.
19. The structure of executable files PE.
20. Unpacking the first program. Secrets of the approach. Classic hack unpacked program.
21. Surprises from the protectors: littering and morph code, virtual machine, the encrypted code, anti-******* tools.
22. Radiotekh + protection programs: a homemade dongle.
23. Forum CRACKL @ B. Great opportunity for a proper understanding.
24. At last

Ext. Information:
In addition, according to tradition CRACKL @ B DVD, the disk also contains tools krekerskie (1900 MB - 600 files).
Folder:
CRACKLAB.RU.exe - a copy of the entire site CRACKL @ B (800 megabytes zipped in 7z SFX)
Analyzers - Analyzer 22 files (PEiD Final, RDG Packer Detector ,...)
*******s - 25 programs to guess passwords for RAR, ZIP, The BAT, OfficeXP, MD5 (Passware Kit 9.0 Registered, Multi Password Recovery, Rar Password ******* 4.12, The Bat Password Viewer, The Bat Unpass ,...). Here is the archive dictionaries chastovstrechayuschimisya passwords - to break the method of "dictionary attacks", the total size of the uncompressed dictionary - 40 MB.
Crypto - 20 programs for cracking the encryption, hash (PasswordsPro 2.5.1.1, RSA Attacking Toolkit 0.1f, MD5 CrackFAST 2.10, Encryption Xpert 1.2, ...)
Debuggers - 9 debuggers (DriverStudio 3.2, SoftICE 4.05 and 4.27 (under 98, and NT / XP) + all sorts of gadgets for him, OllyDbg 1.10 + crack + plugins + Russian help, OllyDbg 2.01, Syser Debugger, TRW2000, SoftSnoop, Rock Debugger, Auto Debug Professional)
Decompilers - 35 decompilers (DeDe 3.50 + SDK,. NET Reflector 5.1, Numega SmartCheck 6.20 RC2, 9Rays Spices. NET Suite 5.0, ReFox MMII, VB RezQ 3.3a, MSI FEU 0.2, EMS Source Rescuer 2.0, ...)
Disassemblers - 30 disassembler and associated tools (IDA Pro, Flair and WinCE Debugger + directory (RUS) + new plug-ins, Killer WinDASM 10, Sourcer 8.01, ...)
Dongles and LMs - a set of 47 major management licenses for research and instumentov hardware keys (Sentinel LM SDK 7.3, FLEXlm SDK 9.2i, FLEXlm SDK 11.4, HASP and Hardlock Emulator 2007, Guardant SDK 5.0, SentinelSuperPro 6.0 Kit, ...)
EXE Tools - more than 25 tools for working with EXE files (SDL Passolo 2009, Restorator 2007 Full, PETools 1.5, Stud_PE 2.3, PE Explorer 1.99, PE Studio 3.3, ...)
Monitors - All monitors from sysinternals (RegMon 7.04, FileMon 7.04, ...) and 45 others: Regshot 2.0.1, RegSnap Pro 6.1, kerberos 1.13p API spy, VB Spy 2.3, ...
Other - 25 programs to reset trial and creating NFO (Registry Trash Keys Finder, Trial-Reset, Data ****, EVACleaner 2.7 + SRC, Damn NFO Viewer, ...)
Packers - Packers 50 EXE files, code scramblers (ASPack, NSPack, PECompact, PECrypt, UPX, WinUPack ...) - all the most recent version
Patchgens - 35 Patch Maker (Patchmaker 1.2g, WCRPatcher 1.2.12, Universal Patcher 2.0 Pro, ABEL Loader Generator 2.31, ...)

Note:
1. burn to cd or mount using a virutal drive e.g. Alcohol120%
2. install the pre-cracked software

Download Links:

Ram Charan's Pic

Hide or Remove all your Windows Desktop Icons

Hide or Remove all your Windows Desktop Icons from your system in single click without following any long process of removing icon , you can do this from your desktop.

Right-Click anywhere on your desktop -> Select View -> Uncheck Show desktop icons.


All your desktop icons will get hidden. To get all your hidden icon back on your desktop simply repeat the steps.

Sunday, February 5, 2012

How to Easily Switch Between Profiles On Firefox With ProfileSwitcher

One of the best things about Firefox is that it lets you create multiple user profiles on it. This feature might come in handy when you have siblings around working on the same computer. Firefox comes with an excellent profile manager of its own where you can create and manage profiles. The sad part is that there is no way you can quickly switch between the profiles directly from your browser. It’s like giving a five year old a wrapped chocolate bar he can barely open.

To fix the things we already covered an add-on called Switchy, a Firefox add-on that lets you create and switch between profiles quickly. Though the plugin did the task it claimed, there were some issues like there are weird symbols in the toolbar icon options, one can only create a profile and there is no option to remove or rename an existing one which sometimes made working on it difficult and annoying.

So today I would like to introduce another profile switcher for Firefox that does the task effectively yet elegantly.

ProfileSwitcher is a simple add-on for Firefox that lets you easily launch other profiles right from the browser menu. After you install the add-on restart your browser. Now when you click on the file menu you will find two new options. The first one is the Launch another profile and the second one is Open Profile Manager (Normal and Safe Mode).

profile switcher

As the name speaks, the first option lets you switch between profiles easily and the second one opens the default profile manager for Firefox where you can handle all your profile needs.

If you already have the necessary profiles created, just click on the file menu and choose your desired profile from the Launch Another Profile section. If you don’t have the profiles created, you can open the profile manager using the second option and create them.

create manage profile

Note: You will have to install the add-on across all the Firefox profiles you have on your computer manually.

There are some settings about the add-on behavior as well that you can configure from the add-on options page in the add-on manager.

profileswitcher options

My Verdict

Switchy’s developer has promised that he will come with a better add-on in the next update which will cover all the present shortcomings. Let’s see how well it works out but until then ProfileSwitcher is the best to go with.

What is Pen-Testing? | Pen-Testing vs.Vulnerability Assessment | How Vulnerabilities Are Identified?

What is Pen-Testing?

Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, price lists, databases and other protected information.

The main thing that separates a penetration tester from an attacker is permission. The penetration tester will have permission from the owner of the computing resources that are being tested and will be responsible to provide a report. The goal of a penetration test is to increase the security of the computing resources being tested.

In many cases, a penetration tester will be given user-level access and in those cases, the goal would be to elevate the status of the account or user other means to gain access to additional information that a user of that level should not have access to.

Some penetration testers are contracted to find one hole, but in many cases, they are expected to keep looking past the first hole so that additional vulnerabilities can be identified and fixed. It is important for the pen-tester to keep detailed notes about how the tests were done so that the results can be verified and so that any issues that were uncovered can be resolved.

It’s important to understand that it is very unlikely that a pen-tester will find all the security issues. As an example, if a penetration test was done yesterday, the organization may pass the test. However, today is Microsoft’s “patch Tuesday” and now there’s a brand new vulnerability in some Exchange mail servers that were previously considered secure, and next month it will be something else. Maintaining a secure network requires constant vigilance.

Pen-Testing vs.Vulnerability Assessment

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has more of an emphasis on gaining as much access as possible while vulnerability testing places the emphasis on identifying areas that are vulnerable to a computer attack.

An automated vulnerability scanner will often identify possible vulnerabilities based on service banners or other network responses that are not in fact what they seem. A vulnerability assessor will stop just before compromising a system, whereas a penetration tester will go as far as they can within the scope of the contract.

It is important to keep in mind that you are dealing with a ‘Test.’ A penetration test is like any other test in the sense that it is a sampling of all possible systems and configurations. Unless the contractor is hired to test only a single system, they will be unable to identify and penetrate all possible systems using all possible vulnerabilities. As such, any Penetration Test is a sampling of the environment. Furthermore, most testers will go after the easiest targets first.

How Vulnerabilities Are Identified?

Vulnerabilities need to be identified by both the penetration tester and the vulnerability scanner. The steps are similar for the security tester and an unauthorized attacker. The attacker may choose to proceed more slowly to avoid detection, but some penetration testers will also start slowly so that the target company can learn where their detection threshold is and make improvements.

The first step in either a penetration test or a vulnerability scan is reconnaissance. This is where the tester attempts to learn as much as possible about the target network as possible. This normally starts with identifying publicly accessible services such as mail and web servers from their service banners.

Many servers will report the Operating System they are running on, the version of software they are running,patches and modules that have been enabled, the current time, and perhaps even some internal information like aninternal server name or IP address.

Once the tester has an idea what software might be running on the target computers, that information needs to be verified. The tester really doesn’t KNOW what is running but he may have a pretty good idea. The information that the tester has can be combined and then compared with known vulnerabilities, and then those vulnerabilities can be tested to see if the results support or contradict the prior information.

In a stealthy penetration test, these first steps may be repeated for some time before the tester decides to launch a specific attack. In the case of a strict vulnerability assessment, the attack may never be launched so the owners of the target computer would never really know if this was an exploitable vulnerability or not.

Local File Inclusion Exploiter Version 1.2 Download Free


Local File Inclusion Exploiter Version 1.2 Download Free by Valentin

Description
The Simple Local File Inclusion Exploiter helps you to exploit LFI vulnerabilities. After you found one, simply pass the URL of the affected website and the vulnerable parameter to this tool. You can also use this tool to scan a parameter of an ULR for a LFI vulnerability.

Usage./lfi_sploiter.py –exploit-url= –vulnerable-parameter=

Usage example./lfi_sploiter.py –exploit-url=http://www.example.com/page.php?file=main –vulnerable-parameter=file

Usage notes- Always use http://….
- When you pass a vulnerable parameter, this tool assumes that it is really vulnerable.
- If you do not know if a parameter is vulnerable, simply pass it to this script and let the scanner have a look.
- Only use one vulnerable parameter at once.
- This tool does not work with SEO URLs, such as http://www.example.com/news-about-the-internet/.
- If you only have a SEO URL, try to find out the real URL which contents parameters.

Feature list- Provides a random user agent for the connection.
- Checks if a connection to the target can be established.
- Tries catch most errors with error handling.
- Contains a LFI scanner (only scans one parameter at once).
- Finds out how a LFI vulnerability can be exploited (e.g. directory depth).
- Supports nullbytes!
- Exploit features: Dumps a list of interesting files to your hard disk.
- Supports common *nix targets, but no Windows systems.

Known issues- I know there is more about LFI than it is covered in this tool. But this is the first release,
and more features will be implemented in future versions.
- This tool is only able to handle “simple” LFI vulnerabilities, but not complex ones. For example: Some LFI vulnerabilities consist of two URL parameters or require to find a way around filters. In those cases, this tool unfortunately does not work.
- Like most other LFI exploiter / scanner, this tool here also has problems with handling certain server responses. So this tool does not work with every website.

Some notes- Tested with Python 2.6.5.
- Modify, distribute, share and copy the code in any way you like!
- Please note that this tool was created for educational purposes only.
- Do not use this tool in an illegal way. Know and respect your local laws.
- Only use this tool for legal purposes, such as pentesting your own website
- I am not responsible if you cause any damage or break the law.
- Power to teh c0ws!

Exploring Google Music, the Amazing Cloud-based Music Player

Most of us, when asked about the default music manager and player we use on our computers, are likely to mention iTunes or Windows Media Player. Both of these, and the other popular desktop media players like Winamp and VLC are useful in their own right but they can only reign over your music as long as you are using your PC.

If you also listen to music on your smartphone or any other such portable device then getting your favorite tracks on them means manually syncing it with the computer, which after a while feels like drudgery.

You need a cloud-based music player that can show up your favorite playlists on any device which can connect to the Internet, be it a smartphone or a public computer in a different continent.

Google Music is an online music manager and streaming service, and also a music store that lets your play your music on the go. When I say that Google Music is an online music streaming service, don’t judge it wrong by comparing it to services like Grooveshark and Earbits. Google music does stream your songs on the clouds, but the songs should come from you. It is also available as an Android app and web based optimized versions for iOS devices.

Google Music Manager player

Let us get started with Google Music and see how it works. Well, firstly, here’s the bad news: Google Music is available only in the US for now. And now the good news: you can easily override your IP using a US proxy and activate Google Music on your account.

tunnelbear

Once you get Google Music activated on your Google account, it’s time to upload some music to it. To upload music from your local drive to you can use the Google Music Manager. You can upload as much as 20,000 songs to Google Music Manager for free and the music can be uploaded from iTunes, Windows Media Player or local folders.

google music manager

Wait!! Don’t upload your whole collection just yet. Just upload few of them as there’s a lot more to it.

Once you have some of your albums uploaded on Google Music, you can play them right away. Just like iTunes, Google also has some auto-playlists with room to create them manually as well. Don’t worry if your music collection is huge. It’s a Google product and thus talking about its searching powers will be a waste of time. Stay rest assured that you’ll be able to find any track in seconds.

music stores

Google Music not only serves as an online music manager, but it’s a music store as well. You can buy, listen and download lots of paid and free tracks, and listen to them across all the devices you have Google Music installed on.

My Verdict

Of course, one question that came to my mind was, “Why should I waste my bandwidth to upload the music on the clouds and then again, spend the same bandwidth to stream them?” Well, I realized that’s a small price to pay for the universal access to my favorite songs irrespective of the device I am on (provided it can connect to the world wide web).

Have you tried out Google Music yet? Do you like it?

3 Awesome Add-ons to Watch and Manage YouTube Videos From Chrome Toolbar

Whenever I get some free time online, I resort to 2 of my favorite pastimes: scouring through Wikipedia or devouring videos on YouTube. I have already talked about two extensions I use in Chrome to enhance my Wikipedia browsing, and today I will reveal the extensions that help me manage YouTube videos in Chrome.

If you are like me who watches videos on YouTube quite often and uses Chrome to do that then these 3 add-ons should get you excited.

Video Controller

As the name speaks, Video Controller extension for Chrome lets you control your YouTube video right from the extension bar. You can play/pause, change tracks, adjust volume and replay the tracks. Though the plugin is not useful when you are viewing videos on YouTube one after another, it works as a great music controller for YouTube music videos. Don’t want to hear a track? Just skip it and replay the one you love without leaving the tab you are working on.

controller

If you have two or more YouTube tabs running videos, all of them can be controlled simultaneously using this extension. You can click on the title text of the video to open the respective tab too. Overall, a very nifty YouTube tool for sure.

YouTube Feed

You probably know what YouTube channels are. You can think of channels as some user created category which is updated by an individual or an organization in a regular basis. You can subscribe to many available channels, and YouTube will notify you via an email regarding the addition of the new content.

channels

YouTube Feeds is a simple add-on that notifies you right in your browser whenever new videos are available in your YouTube subscribed channels and friends. In simple words, you can think of this add-on as an RSS aggregator for your YouTube channels.

youtube feeds

All you need to do is authenticate your YouTube account. The extension icon will notify you whenever a new video is available. You can control things like Number of feed items to retrieve, Polling interval, Number of feed items to show, etc. from the option page.

Lyrics for Google Chrome

Do you love to sing along with your favorite artists on YouTube, but don’t remember the lyrics well enough? Don’t worry, Lyrics for Google Chrome is a simple extension which will help you with that. After you install the extension, just click on the extension icon in the omnibar to show the lyrics next to the playing video. If the extension is not able to recognize the song, you can manually provide the name and search again.

iron maiden lyrics

Note: All the lyrics are fetched from LyricsWiki.

The extension not only works for YouTube but also for Grooveshark, Last.fm and Google Music.

Conclusion

I am sure these three add-ons will definitely enhance your YouTube experience. Do you have a personal favorite extension for YouTube, we have not mentioned above? Do let us know.

2 Ways to Arrange Firefox Tabs Vertically

The use of tabs has made browsing so much more efficient. A power user knows that browser tab management is a productivity boost. Firefox came late on the tabbed browsing scene, but it was a fast learner. The Tab Groups feature is a default way to manage your Firefox tabs if you have quite a few open. Thanks to Firefox add-ons, what’s not there by default gets covered adroitly by these add-ons.

Here are two add-ons which will give you a way to arrange your Firefox tabs vertically. Whether that gives your browsing an added edge depends on personal experience, but try it out and see for yourself.

Side Tabs

Side Tabs is a restart-less Firefox add-on that has been preliminary reviewed by Mozilla. It’s quite nice if you have a widescreen monitor as you can take advantage of all that screen estate by moving your tabs to the side. It gives you a few options to configure. For instance, you can set the width you want the vertical Side Tab to occupy (just drag with the double headed arrow on the edge). You can place it on the right or left of the screen. You can open a new tab by clicking on the ‘+’ sign or by double-clicking on the side tab.

Side Tabs is very simple in looks and function. No extra colors or themes for eye candy. A bit of a run with it found me getting used to side–tabbed browsing quite swiftly.

Tab Sidebar Reloaded

This is another Firefox add-on which takes the horizontally arranged tabs and places them vertically. Compared to the plain Jane looks of Side Tabs, Tab Sidebar Reloaded is like a rockstar. After installing the add-on, click on View –>Tab Sidebar to bring up the vertical tabs on the left. You can see that the open tabs are loaded on the side with thumbnails which give you active previews of their content. By default the top tab is rendered invisible when the vertical tab opens in its place. You can set these in the options:

You can drag the vertical tab area with the crosshairs to change their width. You can drag ‘n drop the tabs to change their order. Close the tabs with a click on the cross or open a new one with a double-click. The little thumbnails come with their own navigation buttons (history, stop and reload). But if you are a power user, then you will appreciate that this extension also works with other tab managers seamlessly.

Go for simplicity or opt for a more complete feature-set. These two add-ons give you the choice. Which one would you pick? Let us know.

How OSI 7 Layer Model Works? Understanding OSI Layers by Anuj Tyagi




This article aims to study the 7 layers of OSI model used by Computer system, when communicating with any other system in same/ different network.
Note: This article is not about understanding OSI layers. It is a practical approach for how OSI layers works & used by our computer system.
image
Application Layer: Application Layer provides user interface i.e. user directly interacts with this layer. The most common examples of applications which enable us to communicate through different protocols are :
  • FTP (Eg. Filezilla Server Application)
  • http/https (Eg. Firefox or any other Web-browser)
  • SMTP ( via any email client like IBM LOTUS or Microsoft Outlook or WebBrowser)
  • Telnet ( shell interpretaors like Command Prompt in windows/ terminal in linux distro)
As all of these applications accessed through computer .

Presentation Layer: This layer gets name from it’s purpose . This layer responsibility includes :
  • Presents data to application layer and responsible for data translation and formatting. Eg. Translation of data we enter into browser to be converted into web language codes with different tags . Also it takes care of data which has been sent should be understood by browser to present it on user-interface .
  • Compression and encryption of data .
image
I tried to capture a packet for PING REQUEST to www.google.com and on capturing packets got this in packets.
For compression, take an example of browser which uses HTTP Compression to save transfer data volume and speeds ups Web page load time. Firefox uses Gzip encoding to send data .
  • We proved that presentation layer also used by & within computer system .
Session Layer : Session layer establish, maintain and terminates sessions between end devices. We can check current sessions in the system using netstat command and output will look like this :
image
This command is common for windows/Linux OS.

Transport Layer : This layer is concerned with reliability of data transfer .
It is of two types :
  1. Connection Oriented (TCP)
  2. Connectionless (UDP)
It is easy to find if connection is establish is in TCP/UDP state. Look at the above figure in which first column defines whether connection is established as TCP/UDP. This process is Protocol dependent .

It also take care of other responsibilities like :
Flow Control (windows) : Which find how much data should be send in one packet during transfer to minimize the data loss due to buffer overflow. It doesn’t send data but Segment into smaller pieces and size of which is defined through windowing feature. To show this in practical manner, I started to upload a file on mediafire.com .
image
By ping , we got ip address of mediafire.com .it’s 205.196.120.8 .
And Now I started to sniff the packets using wireshark on my pc. So, it’s easy to confirm that below captured packets are those during transfer from mediafire. .
image
So, what do we learn from above image ?
Source address: 205.196.120.8
Destination address: 192.168.1.3
Protocol type: TCP (connection oriented )
Win (window size ): 66240 bytes = 65 KB approx .
Source address is mediafire server as we are uploading data.
So, what conclusion it makes ? Data is being split up into 66240 bytes each and after reaching destination it being re-ordered.
The segments which are delivered are acknowledged back to the sender upon their reception.
Network Layer: Network layer works on Logical address which is IP addresses. A computer system understand IP addresses and communication and identification also takes place in computer system.
image
Any device which use ip-address for communication
Data Link Layer : The main focus of data link layer on use of MAC address. Whenever data flows through the LAN , communication takes place through MAC address .
So, to find if MAC address is being used during data transfer in lan or not ?
I start capturing again using wireshark .
image
Which shows Destination MAC address : 00:26:5e:ff:c5:fc for 192.168.1.3
Source MAC address: 00:26:5e:fc:10:Se for 192.168.1.2 .
image






Physical Layer :
This layer conveys the bit stream through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier.
The Physical Layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or optical cable.
The major functions and services performed by the Physical Layer are:
  • Establishment and termination of a connection to a communications medium.
  • Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.
  • Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.
In short, Computer translates the signal and instructions into Binary language (0 or 1). Hardware devices understand Binary language (including computer device components , connecting cables)
image
image
So, during transfer of data, various instructions and signals executed whichch converted into binary language . Similarly, when we transfer data from our system to any other then transfer takes place through various components and leave through cable.

Yersinia: How to analyzing and testing Network Protocols

Yersinia: How to analyzing and testing Network Protocols


System: Linux/Solaris/All BSD Platforms
License: GNU General Public License (GPL)
Purpose: Framework for analyzing and testing networks and systems
Homepage: http://www.yersinia.net/


Brief Summary:
Yersinia is a free open source utility written entirely in C which is great for security professionals, pen testers and hacker enthusiasts alike. Yersinia is a solid framework for analyzing and testing network protocols, and it is a great network tool designed to take advantage of some weaknesses in different network protocols. Yersinia allows you to send raw VTP (VLAN Trunking Protocol) packets and also allows you add and delete VLAN’s from a centralized point of origin.

Other Useful Features:
One of the useful features I like using with Yersinia is the DHCP (Dynamic Host Configuration Protocol) attack. In this scenario a DHCP starvation attack works by broadcasting DHCP requests with spoofed MAC addresses. This is easily accomplished with Yersinia, if enough requests are sent; the network attacker can exhaust the address space available to the DHCP provider for a period of time. I have used this attack on my Netgear router WGT624 v2 and every machine, regardless of whether it is connected via a wired or wireless looses its network connection. Once the attack is stopped the DHCP clients can reconnect and are able to use the network again.

Yersinia also runs as a network daemon (#yersinia –D) and allows you to setup a server in each network segment so that network administrators can access their networks. Yersinia listens to port 12000/tcp by default and allows you to analyze the network packets traversing the network. This is very useful because you can determine the mis-configurations on you network segment and correct them before an attacker takes advantage of them. With Yersinia you can also launch HSRP (Hot Standby Router Protocol) attacks. The first option with sending raw HSRP packets is simply sending custom HSRP packets; you can then test HSRP implementations on the local network segment. Another option is becoming the active router with a fake IP which results in a Denial of Service (DOS). You can also can launch a MITM (Man in the Middle) attack by becoming an active router by editing the HSRP packets fields in the attacked routers, by enabling IP forwarding on the attackers machine and providing a valid static route to the legitimate gateway the traffic from the victim’s machine will go through the attacker’s platform and will be subject to analysis and/or tampering.

You can configure a CDP (Cisco Discovery Protocol) virtual device that is fully automated by selecting the correct parameters frames in CDP. My favorite attack vector is using the flooding CDP table attack. It also allows for capturing editing and manipulating the frames in the Yersinia GUI interface.

Disadvantages:
Only two disadvantages within Yersinia are worthy of mention. The first is that it was created solely for the *nix community and is not available for the Windows Platform. The Yersina team has requested that the community contribute to the Windows platform, so all the Windows enthusiasts cross you fingers and let’s hope it will be available on Windows in the near future. Secondly, the Yersinia output log is written in Spanish words so have your translator of choice at the ready!

ATTACKS:

Spanning Tree Protocol
Sending RAW Configuration BPDU
Sending RAW TCN BPDU
DoS sending RAW Configuration BPDU
DoS sending RAW TCN BPDU
Claiming Root Role
Claiming Other Role
Claiming Root Role dual home (MITM)

Cisco Discovery ProtocolSending RAW CDP packet
DoS flooding CDP neighbors table
Setting up a virtual device

Dynamic Host Configuration ProtocolSending RAW DHCP packet
DoS sending DISCOVER packet (exhausting ip pool)
Setting up rogue DHCP server
DoS sending RELEASE packet (releasing assigned ip)

Hot Standby Router ProtocolSending RAW HSRP packet
Becoming active router
Becoming active router (MITM)



Dynamic Trunking ProtocolSending RAW DTP packet
Enabling trunking

802.1QSending RAW 802.1Q packet
Sending double encapsulated 802.1Q packet
Sending 802.1Q ARP Poisoning

802.1XSending RAW 802.1X packet
Mitm 802.1X with 2 interfaces

VLAN Trunking ProtocolSending RAW VTP packet
Deleting ALL VLANs
Deleting selected VLAN
Adding one VLAN
Catalyst crash

LinkWithin

Related Posts Plugin for WordPress, Blogger...