Tuesday, March 19, 2013
Interview questions for fresher network engineer: Tips and Tricks for CCNA, CCNP, OSPF, BGP, MPLS-VPN | Ask all your queries online absolutely free
Wednesday, December 19, 2012
Route Redistribution Basics: Golden Rules about Route Redistribution
2. The redistributing protocol knows which routes to take from the RIB based on the “known via” information present in "show ip route" details.
3. A route must be installed in the RIB for it to be redistributed in another protocol.
4. Routes redistributed from the routing table are not re-installed again into the RIB.
5. Only the attributes of a route present in the RIB can be used for filtering.
Redistribution Filters:-
1. Redistribution filters can control what information is injected into a routing protocol through redistribution.
2. Filters can also be used to stop routing loops(Read more about layer 3 routing loops) when mutual redistribution between two routing protocols is configured.
Redistribution Filter Tools:-
1. Match metric:- Filtering is possible between all protocols based on metric used.
2. Match Tag:- While mutual redistribution, TAGs can be assigned to routes to stop the routing loop too.
3. Match IP Address:- Matches the prefix, possibly the network mask, depending on the access list type used.
4. Match IP Next Hop Address:- Matches on the next hop listed in the routing table.
5. Match route-type
6. Match Interface
Thursday, December 13, 2012
Basics of EIGRP Routing Protocol: EIGRP Cheatsheet – Learn EIGRP in 15 min
Source: PROHACK
About the author : Rishabh Dangwal
Saturday, October 6, 2012
Delhi RedFort True Story & True History: Social Engineering Attack Example
History of Taj Mahal: The True Story | Best Social Engineering Attack Example
Monday, October 1, 2012
Take the Hackers Quiz
Thursday, September 6, 2012
Google Search is only 18% Search: Is Google becoming a Yahoo?
My brain got used to filtering the ads out, so it never popped into my head before... We are used to this picture. I actually had to get up from my laptop, grab a coffee and then glance back at my monitor from across the room to notice this.
ADs vs Results: area size
Now, we're all technical people so let's do the math:
- The screenshot above is 1280x960 pixels (a typical resolution for a 13" wide-screen laptop and some older 15"s). My Mac has a 1920x1200 resolution, but still I prefer not to browse in full screen (actually, the only apps I run full-screen are the development ones - Sublime Text, Visual Studio, XCode etc.).
- The search results take up 535x425 pixels.
- Which makes it 18.5% of the window
I do understand that this stuff is resolution-dependent, but still... Only 18.5% of the screen is devoted to something that people are actually looking for.
Let me show you what "18.5% of the screen" really looks like:
ADs vs Results: UI elements count
Now, enough with the area size. Let's count the links - the clickable text UI elements.

The page has about 45 different links in total. Only 5 of them are the actual search results (I do not count the "sitelinks" - the sub-links shown under some results and ADs). Which makes it about 11%. Only 11% of the total links on the page are the actual search results.
(If we do include the "sitelinks", it makes 57 links, 10 of which are the results, which is 17.6%).
OK, let's be fair, some of the links are the tools ("Google Docs", "Gmail"), some are search modifiers ("Search near...", "Search images"), some are Google-Account utilities ("Sign in", "Settings") so let's drop these links and buttons... Let's count only the "blue stuff". I.e. links that "look like" the search results, not including the "sitelinks". We have 18 links in total. 5 are the results. Which is 27%.
The bottom-line is: even dropping all the "secondary" UI-elements, the Ad/Results ratio is almost 4-to-1.
Was it always like this?
Unfortunately, I was unable to find a screenshot of Google's result page back from the late 90s, but found some stuff from the 2000s. I did an image search for "large" images, dated "before 2008", searching for "google results", "serp page" etc. Obviously, I was not able to find a screenshot for these particular keywords ("saas help desk"), so I tried to find a screen with as many ads as possible. Since "saas help desk" turns out to be a pretty competitive term. Here's what I found.
The AD/Results ratio is 8 links to 7. Which is 47% of the links are the actual results.
Now, the area. The results are 779x595 pixels. The total size is 1108x790 (which is even smaller than my original screenshot). Which makes it 53% of the screen is taken by the results, more than a half (actually, even more, since it's a smaller screenshot and there are no more ADs below the fold).
What does this mean?
Google has cut down the results area by three times - from 53% to 18%. The company is obviously interested in people clicking more ADs (in fact, I believe that's also the true reason behind "Penguin" and "Panda") since it's the company's primary source of income...
But all I know is that in the early 2000s Google has become the #1 search engine because of the three things:
- Relevant results
- The speed at which they were served
- The simplicity of the UI
Wednesday, September 5, 2012
Join Indian Cyber Army | Hackers VS Cyber Weapon
But we all are living in new era now. We all are part of a new world, directly or indirectly, which we might not aware of & that is INTERNET. Yes..It’s a virtual world which becomes necessity for everybody these days.
Currently we have no control on the cyber space. Anyone with a little knowledge of computers can enter into this virtual world and do such thing which no one can even imagine. On this virtual world, age doesn’t matter, whether you are 10 years kid or 70 year old, Internet is providing equal level of power to all. Only matter is how perfectly you are using it. Let me take a small live example. Suppose if I just Google the term - how to make a bomb all methods and video will be available. So any one can put few more efforts and innovation to make own BOMB.
Everyone including military leaders has realized that most of the next world war will be fought on the cyber space and only those will win, who have the best experts knows as HACEKSR or as I termed then as CYBER WEAPON. This Cyber War will be the most destructive war & can destroy the infrastructure of any country in less than a minute. The latest example is STUXNET. Stuxnet was the targeted cyber attack aimed at destroying an industrial process in the physical world & it was invented specifically to target part of the Iranian nuclear infrastructure.
For a moment if I consider that government & military leaders have no more idea in this cyber field, but what about our ETHICAL HACKERS of India? Have they ever thought about this issue or not? Whether it’s a CEH institute or an individual one, almost everyone is doing the same thing that is WORKSHOPS, WORKSHOPS & MORE WORKSHOPS. Till date I have not seen any of the ETHICAL HACKER, who has raised his voice for country.
HACKING is an ART. HACKING MEANS INNOVATION. Somewhere this ART has been replaced by few outdated tips & tricks. Just think why the term HACK creates so much hype in young generation. It’s only because they have no proper and valid resource to learn this. HACKING is also a subject just like MATHS, ENGLISH, ELECTRONICS & MECHNICAL.
Few days back while surfing Internet, I found a similar term know as "Information Weapon". Professionals has started thinking about this Information Weapon OR Cyber Weapon & I doubt that In India any one from government higher authorities OR military leaders taking this issue seriously. No one is realizing this truth that misuse of cyber can turn into serious issue any time. The major part of any country’s Infrastructure will directly be affected due to cyber attack including financial systems & Telecommunication systems.
A simple hacking of Vijay Mallya becomes national news. Just think that how website defacement attracts everyone. Well let me clear one point here that such website defacements are not CYBER WAR. It’s only the EGO war between technical guys of two countries. Just imagine how such script kiddies attract everyone. Now just think that what would be the impact when actual cyber war starts. The truth is all those guys are not real hackers. They all are script kiddies. In hacking world they all are knows as N00Bs. I am saying only because website defacement is not required any specialized skill or new development. If you know little bit of SQL injection then you can bypass the authentication and get the access to ADMIN panel of the website. After that you have to upload the SHELL and boooom…. All done..just few clicks on you uploaded shell and website defaced. If you are little technical and have little more in depth knowledge, you can do server rooting in which you will get the root access to the server. Once the server get rooted, you have all the websites in your hands hosting on that particular server. So this is what exactly hackers are doing. In this the most important thing is SHELL. And the REAL hacker is the person who has developed that SHELL. Few freely available shells are C99 shell, C100 shell, ex0shell, GNY shell, rootshell, megabros, cpanel & R57 shell.
For cyber peace in India I am happy to be part of a revolution in Indian Cyber History. A new young army for Cyber security of our country INDIA.....INDIAN CYBER ARMY. This army will not hack or crack any country's server, but secure the Indian cyber Infrastructure & protect the Indian cyber space from any cyber attack. Will you join this Cyber Army & wanna be part of it ?? Come & Join Guys.
- CCNA (Cisco Certified Network Associates)
- After CCNA, you can go for CCSP (Cisco Certifies Security Professional) - Help you to get into network security
- If you are interested in LINUX, go for Red Hat Certified Security Specialist (RHCSS)
- The best is ISO 27001 lead auditor at you initial level. If you do this, you will be certified s a auditor for all security related audits includes in ISO 27001. It is a professional certification for auditors specializing in information security management systems.
---Do you want to share you views?? Just leave a comment here. you can also drop an email on mail@amarjit.info
Friday, May 4, 2012
Exclusive Interview of Rahul Tyagi: Author of “Hacking Crux 2
Because the book looks very promising, we have decided to interview the author to find out more about his work and his new creation. Besides discussing his contributions to the IT security industry, Tyagi also shared his insight regarding the fact that many Indian ethical hackers are called fakes.
Softpedia: Please introduce yourself for our readers.
Rahul Tyagi: My name is Rahul Tyagi and I am 24 years old. I am a person for whom work is more important than anything in the world. I was born in a middle class family in Gurdaspur, a small city in Punjab. My father is an accountant and my mother is a housewife. I love to interact with new people and share knowledge.
At the age of 17 my father brought the first PC to my home for his accounting work. I remember spending hours on my father's computer, getting in trouble for messing things up. It occurred to me that the only way you really learn about something is by breaking it, then fixing it.
I am Lapi-Worm kinda person who works 24/7 on a laptop for many days without sleep. My mind always thinks of something, my mind never stays free. Because one thing I learnt in my life: a free mind is the house of Ghost. I admire Steve Jobs and I want to contribute to the cyber society just like him.
Rahul Tyagi: Well, first I will try to explain the meaning and responsibility of an ethical hacker. According to me, an ethical hacker is a computer geek, who obviously thinks more out of the box than other computer lovers. The main responsibility of an ethical hacker is to protect people from the cyber space attacks.
Protection can be at corporate level by securing their servers, by patching the web vulnerabilities or maybe securing a common man’s Gmail account by adding two-step verification on his/her account.
I think I have trained more than 10,000 people from all around the world physically and online in the last 7 years, and today if they are using their computers and internet freely without any problems then I think my work is done.
I did my pre schooling from my hometown. I have obtained a bachelor’s degree in Computer Applications at the Punjab Technical University. After my three year graduation I got admitted to India’s largest university, the Lovely Professional University (LPU) for my masters, i.e, Master in Computer Applications (MCA), and that was my life’s best decision.
At LPU I learned a lot because there I found the best infrastructure required for penetration testing. I hacked into LPU’s University Management System twice and found much vulnerability in the network, but instead of doing harm I reported the vulnerability to the authorities there.
In my 5th semester of masters I got placed in TCIL-IT Chandigarh as their brand ambassador and that was something big for me. Later I was selected as Vice-President of Cyber Security and Anti-Hacking Org India. Last, but not least, I am working as the Technical Head at the News Paper Association of India.
For the past two years I have been associated with DEF CON India meets and I was one of the leading speakers in DEF CON Chennai, where I presented my paper named “Busting Windows in Backtrack 5” and DEF CON Rajasthan, where I presented my paper called “The Endless Fight with Global Cyber Crime”.
This month you can see my article in one of the reputable security magazines named Pen Test.
Softpedia: Tell us a little bit about your new book “Hacking Crux 2”. What IT security topics does it cover?
Rahul Tyagi: Hacking Crux 2 is a book which is like a mirror of me. Everything that I learned in the past I’ve put into this book. I had many issues with the content of the book, but after 8 months of “blood burn effort” from my part and my publisher, Mr. Dev, I am happy to present Hacking Crux 2.
Initially I wanted to publish it in January, but after that I decided to make it more knowledgeable and I tried to cover every aspect related to computer security in it. We tried to make this a lively book, having 90% screenshots for the readers so that it will be easy for them to implement testing by just watching the pictures, rather than reading theory.
Here are the chapters of the book:
1. Introduction to Ethical Hacking
2. Information Gathering
3. Advance Google Hacking
4. Trojan and Backdoors
5. Binder and Crypters
6. Website Hacking Techniques
7. Spamming Techniques
8. Email Hacking and Countermeasures
9. Advance System Hacking
10. Steganography Terrorist’s Way
11. Basics of Python for Coders
12. Virus and Worms
13. Proxy Servers ad VPN
14. Exploit Launching with Perl
15. Advance Mobile Hacking
16. Wireless Attacks
17. Penetration Testing With Backtrack 5 R1
We have a total of 17 chapters covering every possible ethical hacking module. The main highlighted topics of the book are Binder and Crypters, Advance System Hacking, Email Hacking and Countermeasures, Exploit Launching in Perl, Advance Mobile Hacking , Penetration Testing With Backtrack 5, and, last but not least, my favorite, Basics of Python.
This is the first book on ethical hacking ever published in India having so many chapters at such a small price, i.e. INR150 , under 5 USD.
I tried to make this book as informative as possible so that after reading this book no one will need to join any expensive ethical hacking courses. If you believe my words, then Hacking Crux 2 contains all you ever need and wish to know about the so-called “Ethical Hacking”.
Softpedia: When will the book be released and where will it be available?
Rahul Tyagi: We are trying to publish it worldwide through eBay, Amazon, Flipkart, Snapdeal to our international readers before May 15. Indian readers can get this book from any nearby bookstore starting with the last week of May or the first week of June. Also, online purchasing options like Flipkart and Snapdeal will be available.
And if someone is facing any problems then they can send an order to hackingcrux2@gmail.com.
Softpedia: In the past period many Indian ethical hackers have been named fakes and mere marketing stunts. On the other hand, we have white hats, such as Himanshu Sharma, who try to wash away this stained reputation gained by many Indian security experts. What makes you different from the fakes? What do you hope to achieve with this book and with your work?
Rahul Tyagi: If you talk about Himanshu, then yes, he is like my younger brother. Even though he is younger than me, I still respect his talent from the bottom of my heart.
Now, let’s talk about some fake hackers. According to me, there are some reasons why people call some Indian ethical hackers fake.
The first reason is that many ethical hackers claim to be great in their work, but if you talk about statistics, then they are ZERO. You can take a look at attrition.org.
They exposed many ethical hackers who were just fooling people with ethical hacking courses, but in reality the things they teach are just internet filtering techniques and tricks, which, from my point of view, are not going to help any person get a reputed job in any company.
That’s why those who have done the ethical hacking certification from these kinds of hackers later abuse them and say that they were fake hackers, who cheated them.
The second reason is that people from the cyber world these days are becoming smarter day by day. They are bored with traditional hacking tricks, hacking websites with SQL Injection, NETBUS, Proxy servers and other “noobish” things, which today anyone can do even at the age of 10. So if you are repeating the same and same thing from 2000 to 2012, then obviously you deserve the tag of fake hacker.
As far as I am concerned, it’s not that I don’t have critics, but today almost all white hat and black hat communities know me, respect me and motivate me. I have many friends from both black and white hat communities who from time to time help me upgrade myself.
This is why I was the first white hat ethical hacking trainer who spoke at DEF CON meets in India. My paper is there in Exploit-DB and Packetstorm Security and if you compare this fact with the ethical hackers tagged as fakes, they don’t submit any papers and they never dare to enter into conferences like DEF CON and NULLCON.
The only thing that makes me different from other ethical hackers is that I do not forget my past, from where I rose. Even though I have 38k followers on Twitter and 5k friends on Facebook , I reply to every possible query they ask me.
I also believe in contributing with new stuff to cyber space, hence a few months back, I released a full Python language-learning course on YouTube and it was the first ever basic Python video lectures series made by an Indian ethical hacker.
With all this I don’t think anyone can say I am a fake hacker. If anyone wants to say that, I ask him/her to compare my contribution with the ones of other fake ethical hackers and, they will get their answer automatically.
Finally, I hope my new book Hacking Crux 2 will help you to learn all the hidden areas of ethical hacking, especially ones that are never revealed by any ethical hacker, ever. I promise that if you trust me and buy this book you will thank me for sure.
You can contact me on: Facebook, Twitter or by e-mail.
Thursday, March 15, 2012
How LSA Works with/without OSPF AREA 0 | Running OSPF without AREA 0 By Anuj Tyagi: Case Study
Hi Friends, I have received a complete case study done by Mr.Anuj Tyagi on OSPF routing protocol. After reading our article Configure OSPF without AREA 0: CCNP OSPF Case Study, he also tested the similar scenario in his testing LAB. I am publishing his case study as it is without any editing so that guys who are learning networking & OSPF, will get some benefit from this.
Running OSPF without AREA 0
Topology 1: Connecting OSPF Area 2 and area 3 without using ABR.
Interface configurations are mentioned above in the topology.
Remember,
· ABR: ABR is a area border router that contain interfaces in atleast two separate area out of which one should always be in AREA 0.
So, surely above topology don’t have any ABR and we will be going to test how routers behavior in absence of backbone area.
After configuring OSPF routes on R1, R2, R3 as in above topology, we analysis all Routers neighbor table .
That shows Full Neighborship Status for neighbors . Take a look again at the neighbor table,
Neighborship is being maintained with it’s directly connected interfaces.
Now, if we will try to PING
· R2 S0/1 , surely we will get successful reply .
· R2 S0/0, we will get successful reply (as it is directly connected)
· R3 S0/0, obviously we R1 can’t reach 2.2.2.1 of R2 we will be unable to get reply from R3 s0/0.
Why? Just take a look at the neighborship table of R1 again .
So, what is happening behind the scenes when R1 trying to communicate with 2.2.2.0/24 network .
R1 can’t even find the path or from which interface R1 should send the packets .
Now lets take a look at the Router OSPF LSA’s,
· R1 having LSA1 (router-id) updates of only those routers in same area.
Reason : There is no ABR to send LSA3 (summary LSA) updates . ( remember ABR? )
After looking at LSA and neighbor-table, you can guess about the routes will be there in Routing Table.
Again, they are also from directly connected interfaces with Routers.
Now make it a bit interesting, we will going to add interfaces on R2 in Area 0 .
Now, compare neighborship table of Router R1,R2,R2 with and without AREA 0 (backbone area) .
R1 topology table with AREA 0
We can now clearly see LSA3 in the table, apart from networks of Area 0 R1 got one more network advertisement in LSA for 192.168.2.0/24 and 2.2.2.0/24 in summary LSA updates from R2(ABR router).
While in
R2 topology table without AREA 0
In the same way, AREA 0 will also make Router R2 as ABR now and that will add a lot to topology table of Router R2 .
Now, it is behaving like ABR as it is acting as both in AREA-2 and AREA-3 completely.
Router R3 also getting LSA1 and LSA3 updates from R2(ABR).
Note: LSA2 updates (network LSA) are only advertised in Non-broadcast where DR & BDR exist.
Now , also PING will be successful from any Router to any network in topology.
Conclusion:
OSPF will not form neighborship with inter-area(IA) routes if there is no backbone area exist or we do not use ABR . In other words, Each area share it’s link state database only through AREA0 to any other AREA. It will make neighborship only with directly connected networks
LSA 1,2 do not need Area0 to share it’s Acknowledgement but LSA2 will form only in non-broacast network (like frame-relay) where DR will be having responsibility to send updates but we must need to have AREA0 to send LSA 3, 4, 5 & 7 updates.
----------------------------------------------------------------------------
R1 Config
Using 1024 out of 57336 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 5
ip cef
!
!
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
multilink bundle-name authenticated
!
!
archive
log config
hidekeys
!
!
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0
ip address 1.1.1.1 255.255.255.0
clock rate 2000000
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/1
no ip address
shutdown
clock rate 2000000
!
router ospf 100
router-id 1.1.1.1
log-adjacency-changes
network 1.1.1.0 0.0.0.255 area 2
network 192.168.1.0 0.0.0.255 area 2
!
ip forward-protocol nd
!
!
ip http server
no ip http secure-server
!
!
line con 0
line aux 0
line vty 0 4
!
!
end
-------------------------------------------------------------
R2-ABR Config
R2-ABR#show configuration
Using 1114 out of 57336 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 5
ip cef
!
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
multilink bundle-name authenticated
!
!
archive
log config
hidekeys
!
!
interface FastEthernet0/0
ip address 172.16.1.1 255.255.0.0
duplex auto
speed auto
!
interface Serial0/0
ip address 1.1.1.2 255.255.255.0
clock rate 2000000
!
interface FastEthernet0/1
ip address 172.17.1.1 255.255.0.0
duplex auto
speed auto
!
interface Serial0/1
ip address 2.2.2.1 255.255.255.0
clock rate 2000000
!
router ospf 100
router-id 2.2.2.2
log-adjacency-changes
network 1.1.1.0 0.0.0.255 area 2
network 2.2.2.0 0.0.0.255 area 3
network 172.16.0.0 0.0.255.255 area 0
network 172.17.0.0 0.0.255.255 area 0
!
ip forward-protocol nd
!
!
ip http server
no ip http secure-server
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
!
!
end
-------------------------------------------------------------------------
R3 Config
Using 1024 out of 57336 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R3
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 5
ip cef
!
!
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
multilink bundle-name authenticated
!
!
!
!
archive
log config
hidekeys
!
!
!
interface FastEthernet0/0
ip address 192.168.2.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0
ip address 2.2.2.2 255.255.255.0
clock rate 2000000
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/1
no ip address
shutdown
clock rate 2000000
!
router ospf 100
router-id 3.3.3.3
log-adjacency-changes
network 2.2.2.0 0.0.0.255 area 3
network 192.168.2.0 0.0.0.255 area 3
!
ip forward-protocol nd
!
!
ip http server
no ip http secure-server
!
control-plane
!
!
!
line con 0
line aux 0
line vty 0 4
!
!
end




