How to hide identity completely using Kali Linux

 How to hide identity completely using Kali Linux

How to Secure your website using Web Application Firewall

 

How to Assign IP Address Linux in RHEL 5 & RHEL 6

In this Tutorial I am going to show how to assign Permanent IP Address in Linux. Specially RedHat and CentOS 5 Linux.

 First you have to do is to Log on as root user and go to the Directory  /etc/sysconfig/network-scripts/ to view all available devices.

    # cd /etc/sysconfig/network-scripts/

You need to edit following files:

    /etc/sysconfig/network-scripts/ifcfg-eth0 ( First Ethernet card configuration file)
    /etc/sysconfig/network-scripts/ifcfg-eth1  ( Second Ethernet card configuration file)

To edit/create first NIC file, type command:

    # vim ifcfg-eth0

Append/modify as follows:

    DEVICE=eth0
    BOOTPROTO=static
    DHCPCLASS=
    HWADDR=00:30:48:56:A6:2E
    IPADDR=192.168.1.100
    NETMASK=255.255.255.0
    ONBOOT=yes

Save and close the file. (:wq!)

After that, configure the default gateway (router IP) and hostname in /etc/sysconfig/network file:

    # vim /etc/sysconfig/network

Append/modify configuration as follows:

    NETWORKING=yes
    HOSTNAME=opesource
    GATEWAY=192.168.1.1

Save and close the file(:wq!). Restart networking by enter following command:

    # /etc/init.d/network restart

Make sure you have correct DNS server defined in /etc/resolv.conf file:

    # vi /etc/resolv.conf

Setup DNS Server as follows:

    nameserver  8.8.8.8
    nameserver  8.8.4.4

Save and close the file(:wq!). Now you can check(ping) the gateway/other hosts:

     # ping 192.168.1.1          (check network connection)
   
    #ping www.google.com    (check Internet connection )

IF You want to assign temporary ip address then Log on as root user and run the below command.
#ifconfig eth0:0 192.168.1.101 netmask 255.255.255.0
#ifconfig eth0:1 192.168.1.102 netmask 255.255.255.0

DNS Configuration on Cisco Router

This tutorial is all about how to configure DNS on Cisco Router.
I have used GNS3 software to show DNS Configuration on Cisco router.





Best time to buy domain name and web hosting plan from GoDaddy

This is the Best time to buy domain name and web hosting plan from GoDaddy. GoDaddy Providing up to 85% discounts using so many coupons which are freely available on internet.

You can see complete Web Hosting Price with domain name on godaddy in Just $14.16:




You can use the below promo code for buying wordpress hosting plan on GoDaddy. its working.



Buy Domain in just 1$ at GoDaddy.com

You want the proof? lets see below snapshot i have taken for you guys.
I have bought ccnalinux.com domain name in just 1 $ and you can see it clearly in below image with proof.



Let's see the Receipt Send by GoDaddy:








GNS3 complete installation and configuration in Windows10

GNS3 complete installation and configuration in Windows10

This Tutorial is all about GNS3 proper installation and configuration with router IOS image integration.

We also learn how to integrate cisco router ios inside GNS3.



Objective: Learn to install GNS3 Software inside Windows8/10


We will also learn how to use GNS3 and practice CCNA and CCNP LABS.
If you are learning ccna ccnp or ccna security you must need this software this is an alternative of cisco routers ios. Cisco Packet Tracer is not alternative of Router IOS but GNS3 is an alternative.

Inside GNS3 we will real router ios.



Scan Ubuntu 18 04 viruses with ClamAV and clamTK Antivirus

Learn how to scan viruses inside Ubuntu linux using ClamAv Antivirus Program. Also learn how to use Graphical version of ClamAv antivirus Named ClamTK.


OBJECTIVE: CLAMAV and CLAMTK Antivirus Installation and configuration in Ubuntu Linux.


Benefits: We can scna Linux Viruses and Delete them using help of antivirus.

Many people think Linux Machines are Virus Free but this is not True.

As usage of Linux Increasing many hackers and developers are making Virus programes for Linux.

Linux can be infected by Rootkits,Malware,Virus and other types of TROJANS.





How to install Nethunter on any Android Phone without rooting

In this tutorial we will learn how to install and configure Nethunter on any Android Phone.Here i will show you how to install nethunter on android mobile in just few simple steps.After installing nethunter on your Android Mobile your Mobile is ready to attack on any machine whether it is Linux or Wiindows or mac.


You can use Nethunter tool for penetration Testing and Security Audit.


Step1: First you need to install either Termux or GNURoot Debian on your Android Phone.


Step2: After that you have to install Nethunter inside Termux or GNURoot Debian.





If you like my articles Please share your views with me on it and even if you find any mistakes feel free to share through comment section.

Port Forwarding using Ngrok and SimpleHTTP Server tool in Android

This tutorial is all aout Port Forwarding using Ngrok and SimpleHTTP Server tool in Android. First we need to install SimpleHTTPServer App on my Android Mobile which will help us to configure our Android Mobile as HTTP  Web Server. Then we will install termux app inside our Android Mobile and then we install Ngrok inside Termux. Ngrok App will help us to port forward.When you will watch the complete video you will easily learn all this in just few simple steps.

Tools used in this Tutorial are:

TERMUX

This App can be easily installed from google play store without rooting your mobile.

NGROK

This app will be installed inside Termux and you will get this app from github.com

SimpleHTTPServer

You will get this app from google play store.Its free to download and use.



How to Install Linux On Android Phone Without Rooting using GNURoot Debian

In this simple tutorial we will learn step wise configuration of Kali Linux over Android Phone without rooting using GNURoot Debian.We will also learn how to install and configure social networking tool named setoolkit inside GNURoot Debian.First we install GNURoot Debian on Android Mobile. After that we will install an important package named git inside GNURoot Debian.Then we will learn how to install setoolkit on Android Phone inside GNURoot Debian.For Detail and step wise tutorial watch the complete video.


How to Design and Develop social networking site like facebook

Today in this tutorial we will learn how to design or develope a social networking site like facebook using buddy-press plugin in WordPress CMS.Web designing and web development become so easy after cms introduce.Wordpress have made our tast much more easier than before. Now anyone can design and develop a social networking site like Facebook or a chat server in just few simple steps using buddypress plugin in WordPress.

What we need to Design and Develope a social networking site?


  • Wordpress CMS which is Free.
  • BuddyPress Plugin for WordPress CMS.
  • And little configuration knowledge of wordpress cms which i will teach you here through this video.

We will Learn how to install WordPress and then we will see how to install and configure Buddy press Plugin inside WordPress to design and develop a social networking site like Facebook.

You will integrate chat messenger facility.
Album creation facility.

Sending friend request and composing mails.



How to hide your Public IP Address using Kali Linux Anonymizer

In this Tutorial we will Learn how to hide our public ip address in kali Linux using Anonymizer Tool.If you are learning ethical hacking or working as a cyber expert the first thing you have to do is to protect yourself from hackers and for this first thing you have to do is to hide your Public IP Address and be anonymous. In this section i have explained or shows you complete step how to be anonymous using Kali Linux.

How to Configure NFS Server on Windows 7

Usually we configure NFS Server on Linux/Unix Machine for File sharing in Network between Unix Machines,But here in this tutorial we learn how to configure a Windows 7 machine as NFS Server.
I have used third party software named hanewin nfs package to install nfs package on windows and configure NFS Server on Windows7 machine.

If you want to configure NFS Server on Linux you can easily configure NFS server.

Usually people know that NFS Server is configured on Linux Machine only for sharing files with Linux clients. But that's half truth. In real world today we can easily configure NFS on windows Machine also. 


If you want to configure NFS Server with NIS Server and Autofs on Red Hat Enterprise Linux you can watch this video.

First we need to configure NIS SERVER.We set NIS DOMAIN NAME and then we will configure NFS Server and after that we will configure Autofs Server for automation process.Not forget to configure Firewall and Selinux otherwise your configuration will not work.

Practical Implementation of NIS NFS and Autofs Server on Red Hat Enterprise Linux.



You can submit this project in your Engineering Major Project.This is very helpful for computer science students.



How to setup and configure hostname in Red Hat Enterprise Linux 7

This tutorial is completely about hostname setup and hostname configuration in Red Hat Enterprise Linux 7. so if you are new to RHEL7  and you want to setup or configure hostname in your RHEL7 Machine then this tutorial is for you.Watch the below video carefully and you will very easily learn to configure hostname in RHEL7 Linux.


Why we set hostname in Linux machine?

Assigning a hostname to a PC or HOST is just like giving a name to an IP.
HOST means all the computers in a network.Each computer is a host in a network and the ip address assigned to that host machine or that computer is host address and the name given to that particular pc or computer or host is hostname.


Difference between HOST ADDRESS & HOSTNAME


IP assigned to the host pc or any pc in a network is known as host address and the name assigned to any pc or host in a network is known as hostname.


Why it necessary to set HOSTNAME in Linux?

see it's not easy for anyone to remember ip address so we need a name for each ip in our local network to differentiate or to identify specific machine easily and to make our task easy.





Apache Web server configuration in RHEL 7

In this tutorial we will learn how to install , configure and manage Apache web server in redhat Enterprise Linux 7.Here we follow simple steps to configure Apache web server.So finally you can say this is a simple and basic tutorial to configure and manage http server on redhat enterprise linux 7.



Step 1:configure Yum server on RHEL7


Step 2:Install http package using yum

# yum install http* -y


Step 3: Using firewall allow http service to get accessed.

#firewall-cmd  --permanent  -add-service=http
#firewall-cmd  --permanent  -add-service=https
#firewall-cmd  --reload


Step 4:Restart and enable Apache Service in RHEL7

#systemctl restart httpd
#systemctl enable httpd


Step 5:go inside /var/www/html folder and create index.html or index.php file according to your requirement.You can see in video.


Step 6:repeat step 4

Step 7:If you want to access your site with name you can set hostname to your RHEL machine.







Network Security Related terminology you must know

Here in this article i am including the important terminology we need to know if we are working as a system engineer ,network engineer,system administrator whether Linux or Windows admin didn't matter.Here i will provide you the complete list of terms we need to know in networking or system admin field.Here in this tutorial i have discussed about various topics like pap,chap,asynchronous,,Tokens,throughput,RADIUS SERVER,TACACS,AAA,Data owner,subject,object,baseline,policies,procedures,standard,guideline,ARO,SLE etc




Risk = Threat * Vulnerability


If we consider the topi regarding IT sector then Risk consists of these two important thing Threat and Vulnerability.where there is no Threat there is no risk.If there is Vulnerability in your system or Network and there is also threat of attack then risk is multiple effect of vulnerability.


ALE = Annualized Loss Expectancy


This is an important terminology and every IT company have almost a separate department to handle ALE.

AV = Asset Value


If you have a little knowledge off commerce field you can easily understand what asset value is.In short you understand it is a type of business valuation.


EF 

EF means Exposure Factor - % of value lost


SLE 

SLE stand for Single Loss Expectancy, the cost of a single loss.


ARO 

ARO stands for  Annual Rate of Occurrence (number of losses)


TCO 

 Total Cost of Ownership combining upfront costs and annual costs of maintenance

POLICIES:


Policies are high-level management directives that don't go into specifics.

PROCEDURES:


Procedures are step-by-step guides for accomplishing a task

Standard: 

describes specific use of technology

Guideline: 

recommendations (discretionary)

Baseline:

 uniform ways of implementing a safeguard

Data Owner 

management employee responsible for ensuring protection of specific data

AAA 

Authentication, Authorization, and Accountability


Least privilege

 says minimum amount required to do.
 privileges are defined in every level whether it os operating system based or networking based.
operating system have several users created on privilege based. Administrator user have   highest privilege than other and Guest user have least privileges than others.In Linux root have highest privilege.
In network deices like Routers and switches also have different privilege levels.

Need to know is more granular

Subject 

 active entity on a data system

Object 

As we are here talking about computer and network system.In IT Sector or in computer field or networking department by saying OBJECT we mean passive data within the system.


Discretionary 

Discretionary mean full control of objects they have access to


Mandatory 

mandatory means system-enforced based on labels


RBAC 

role based, non-discretionary

Task-based = another non-discretionary method


RADIUS 

 Uses UDP 1812 and 1813. AAA system.
RADIUS request and response data is carried in
8-bit AVPs (Attritbute Value Pairs)

Diameter 

RADIUS' successor with more accountability and a 32-bit AVP field.


TACACS 

Tacacs is used for authentication and autheriation.
It is a centralized access control system that uses UDP port 49 and may use TCP

PAP and CHAP 

PAP stands for password authentication protocol and CHAP stands for challenged handshake authentication protocol.both used PPP connection.

You can READ:PAP Configuration Tutorial on cisco Router.

You can READ: CHAP Configuration on Cisco router.


PAP is plaintext so not so secure, while CHAP uses three way handshake. so chap is  better than pap.


Objects have labels, and you have to have clearance to see them.

Synchronous Dynamic Tokens 

While talking about Synchronous Dynamic Tokens one must know that it't refresh every 60 seconds. Use time or counters to synchronize a code with the AS.

Asynchronous Tokens 

 It is little different from Synchronous Dynamic Tokens and is not synchronized with central server. Challenge-response.


Throughput 

 As we all know it is the most important point for any company institute or organiation and that is throughput. It is actually the biometric system response time.

make windows7/8/10 usb bootable using windows command promt

Suppose you dont't have DVD writter in your Laptop or PC and you want to install Windows operating system in your laptop or PC or you just want to format your laptop just to increase the performance of your laptop or PC.Then you need to know how to use a usb device to format your pc or laptop and how to install windows7 windows8 or window10 using USB Device. Once you learn how to install windows7/8/10 inside your laptop or PC from usb device you dont need DVD writter.

In this tutorial we will learn how to make a usb device windows7 or windows8/10 usb bootable using windows command promt.We don't need any third party software to make usb bootable.
If you want to learn all the steps just follow the video and watch it till end and you will learn it in very simple way. If by chance you face any problem even after watching video or you not able to boot your usb device you can ask me here or on my YouTube channel through comment section.I will love to answer your question and if you have any suggestion feel free to share with me.

arp spoofing and cache poison attack demonstartion project for computer science students(B.Tech/BCA/MCA/M.tech)

ARP Spoofing and cache poison attack demonstration Project and Future Scope.This is subject of ethical hacking and cyber security.So anyone including computer science students interested in ethical hacking field or cyber security then this tutorial is for you.In this article i will guide you to create an ethical hacking project whose name is "ARP SPOOFING and CACHE POISON ATTACK".

Before i start explaining this project I love to inform you that you must have basic idea of networking and Linux before working on this project.



What actually ARP SPOOFING is?


ARP spoofing is a type of security attack in which the attacker spoofs the ARP reply packet sent to a destination address with its own mac-address.


AIM OF THIS PROJECT:


 The project aims to demonstrate the concept of ARP spoofing, where the ARP cache of Windows XP is poisoned with the attacker mac-address for a specific system on the network.

Hardware and Software Requirement for this Project:



1.Three PC (Ubuntu and Windows XP, Windows7/8)


Either you need three different Computers one having windows xp installed ,second pc have Windows7 or Windows 8 Installed and third PC have Ubuntu Linux installed.
I suggest you to use a virtualization software like Oracle VirtualBox or Vmware Workstation.
And then install all these three operating system inside them and configure virtual box networking between them so that they can communicate with each other.


2.Scapy and Python (Free download )


Install Scapy and Python tool.remember these are free tools and are easily available on internet.


3.Switch 


If you are using three different PC then you need a SWITCH.If you are using Virtualization software it will be better to user your home wi-fi network.

4.Network cables
If you are using wi-fi network you don't need any network cables.But if you are using switch then you need three straight cable to connect computers with switch so that all pc can communicate with each other.


Project Report Contents:


1. Project Scope



2. Hardware and Software.



3. Lab topology with IP network design



4. Software installation



5. Steps to execute with code and script.



6. Verification with Screenshots.


Active and Passive FTP Design and Security analysis Project For Computer Science Student

If you are a computer science student or studying B.E/B.tech/MCA this could be summer internship seminar topic or your Minor or Major Projects. Our Project Topic is  "Active and Passive FTP Design and Security analysis".Here i will only give the Abstract i mean basic idea of project and not the complete Project Code.


This is a Security Analysis Project and this project does a detailed analysis of the two different types of the FTP protocol, Active and Passive.I hope you better know about active and passive FTP Protocol and if not keep visiting my blog i will soon post on ftp active and passive ftp protocol.



 The design of the protocols:


The design of this project  include the TCP connection establishment on the respective ports,
are verified using live practical analysis with wireshark protocol analyzer tool.You can easily finnd wireshark tool for any linux operating system or even windows operating systems.

 The different types of security vulnerabilities and attacks:

This projcet is targeted security loopholes and attacks on FTP based application are understood.

Lab setup For This Project:


I have mentioned in detail the complete lab setup you need to perform this project.
A lab setup topology with appropriate instructions is provided for practical experiment.

What your Project Report Contents?


1. Basic FTP Server and FTP Client Design with Detail Diagram.

In this section you have to Design a flowchart diagram showing FTP Server and FTP Clients.
Your FTP Server will be a Linux Machine.You can configure vsftpd Server on your Ubuntu Linux or You can Configure ProFTPD Server on Ubuntu Linux. You can also configure ftp server on your RHEL machine.


2. FTP Types (Active and Passive)

Here you have to mention the difference between ACTIVE AND PASSIVE FTP with few examples.

3.Brief Wireshark analysis of Active FTP with detail explanation on capture file

Use Wireshark Tool and using wireshark tool capture the Active FTP Files and write a detail analysis on file captured.


4. Brief Wireshark analysis of Passive FTP with  detail explanation on capture file.

While capturing Passive FTP data don't forget to write its analysis report.


5. Show FTP loopholes and Mitigation

Mention the loopholes you find in detail.

6.Show different methods of  FTP attacks

Here in this section you have to show the different attacks methods you have used in this Project.


7. Software and Hardware Requirement

you just need a laptop or a pc with good configuration.
You need a virtualization software like Oracle Virtualox or Vmware Workstation.
You need Linux operating system like ubuntu,redhat Enterprise Linux or Kali Linux

8. Lab Setup for Live capture with wireshark

You have three Operating System installed in your Virtualbox.
One os will be your Linux Server configured with FTP.
Another OS will be your windows or Linux Client Machine.
3rd os will be your ubuntu linux Machine or Redhat Linux Machine with wireshark tool installed.
Dont forget o configure internal networking between these all three os.And also configure or enable bridge option in network setting in virtualbox.


command line password protection of a file in Linux using vi and vim editor


This tutorial is all about how to assign password to a file in Linux without using any software,just by using vi editor or vim editor. We will learn how to provide password protection to a file in Linux machine using vi editor or vim editor.We will learn all the methods of password protection using vim and vi editor using command line , not only that but we will also learn how to change password of a file in Linux using vim editor and we will also see how to remove password from a file.






Method 1: #vim -x filename


This method is very easy to implement. i have shown this method in video,so watch video carefully.

Method 2: Vim filename


:X

In this method we will use capital X before saving file to assign password.watch it carefully in video.


Method 3: # vim fiename

:set key=password123

I have also included this method in video.You can learn all above method easily by just watching this video.
If you still have any doubts you can ask me through comment section either on my YouTube channel or here.

Different methods to find your public ip address using cli in linux

Whether you are network engineer or a Linux System Administrator doesn't matter you always need to know the public ip address of your network , Private ip address of any Linux machine can be easily seen using ifconfig command line tool or show ip address command but when it comes to find the public ip address it sometimes become very difficult situation if you are using a Linux operating system and you are using cli mode of linux.
THIS TUTORIAL IS ALL ABOUT HOW TO FIND PUBLIC IP ADDRESS IN LINUX MACHINE.I HAVE INCLUDED APPROX ALL THE DIFFERENT COMMAND LINE TOOL OR METHODS TO SEE THE PUBLIC IP ADDRESS USING CLI IN LINUX.

How to design facebook Like social Networking site using buddypress plugins in wordpress

If you want to start your own social networking site you can do it very easily if you have basic knowledge of WordPress CMS. When i say basic knowledge i mean you have idea how to create a page in WordPress or how to create in WordPress cms and you better know how to install themes and plugins in WordPress.In this tutorial i have shown you how to create a social networking site using Buddy-press Plugin in WordPress cms. This is a simple and straight forward tutorial.When you finished watching below video you will be very easily able to create and launch your own social networking site like Facebook.



How to install and configure PhpMyAdmin tool in Ubuntu linux

This tutorial is all about Phpmyadmin tool installation in Ubuntu Linux,But before phpmyadmin tool installation you need to learn how to install install Mysql database in Ubuntu Linux.
After you configure MySQL on Ubuntu Linux You can follow below steps mentioned in video and can easily install and configure phpmyadmin tool on Ubuntu Linux.
Remember before watching this video you must install and configure MySQL server on your Ubuntu Linux machine.

How to configure MySQL Server on Ubuntu Linux

This tutorial for all Ubuntu linux users.This tutorial is focused on installation and configuration of MySQL on Ubuntu Linux.We will also learn

1.how to create database in MySQL,
2.how to see database in MySQL
3.and how to delete or drop MySQL database.

If you want to learn all above things in just few minutes watch this video carefully.It will help you if you are a IT or computer science student or a database engineer or a DBA.




Advance Ethical Hacking Diploma Course in Jaipur city at Ethical Hacking Tuition center

Advance Ethical Hacking Diploma Course in Jaipur city at Ethical Hacking Tuition Center

This training Module has been designed for students who is really interested in ethical hacking and who wants to be expertise in each and every field of computer and IT Security.

In Advance Ethical Hacking diploma Course we include following training Modules:


CCENT training + CCNA Training + WINDOWS  Training+ ANDROID SECURITY Training + LINUX Training  + SERVER Management Training+ SERVER SECURITY Training + Cryptography Training + Virtualization Training +Storage Management Training+WEN Designing Training + Web security Training +SEO Training +YouTube Business Training


WHO CAN ATTEND THIS TRAINING?

Anyone who can read and write and understand english and have basic knowledge of computer like on off computer or laptop and can be able to use internet.



Add caption

.

How to enable root user and root password in Ubuntu Linux

By default every Ubuntu linux user finds no root login and then they have to use sudo command every time. If you don't want to use sudo command each time you install a package or start a service you need to be root user. In this tutorial i have told you how to enable root user in Ubuntu Linux in just few simple steps. If you want to learn it completely watch the below video till end.

Advantage of being ROOT USER:

Being a root user you dont need to run sudo command always.Now you can directly run any command without using an extra command sudo.


IS it Good to Always Login with ROOT USER in UBUNTU?

If you ask me this question My Answer will be in NO!
If you want to do certain administrative task on your Ubuntu Linux Machine or Any Linux Machine installed in your Laptop or Computer or Server I personally suggest you to never ever Login to your Linux Machine as ROOT User unless you have to do some important Administrative task which is not possible without root Login.

What is Threat in ROOT LOGIN?

If you always used to Login as root user in your Linux then there is so much chances of hack attack on your Linux Machine and very chances that your machine can get compromised. Because if someone got root access to your Linux Machine He/she can do any thing.When i say anything then I mean anything in destructive manner.

How to install and configure ProFTPD on UBUNTU 14.04

ProFTPD is a File Transfer protocol used in case we need to transfer file from on machine to other,whether from server to client or client to server.When file get transfer from server to client known as downloading and when the file get transfer from client to server it is know as uploading.But in both case FTP is working. Here in this tutorial we will learn installation and configuration of ProFTPD services on a Ubuntu Linux Machine.
This tutorial is for beginners who are new to Ubuntu Linux and who wants to configure and install proftpd server easily in just few simple steps.If you are a Linux Advance user then this tutorial might not be for you.If you have any suggestion kindly suggest it through comment section.

Step1: First we need to confirm that all packages are up to date and for that we run below command.

#apt-get update  (only for root user)


$ sudo apt-get update (For non-root user)


Step2:Install Proftpd package

#apt-get -y install proftpd

Step3:Then you have to made some changes as i have mentioned in this video.If you want to configure proftpd accurately with no mistakes must watch this video on proftpd configuration on Ubuntu Linux.


Step4: Restart the proftpd service

#service proftpd restart

Step5;Check whether proftpd service is running or not.

#service proftpd status



Linux networking Combined Test paper for Ethical Hacking training Batch.

This Test paper has been designed at ETHICAL HACKING TUITION CENTER JAIPUR by satish Tiwary(Trainer) for Students of Ethical Hacking.The main motive behind designing this paper is to aware students about Linux and networking terminology and check there commands on Linux and Networking and make them ready for tackle Interview of Different IT Companies.


Students are advised to answer the question in there own language.Try to keep your answer to the point and not mention useless points in your answer.For every Right answer you will get the Marks and for every wrong answer negative Marking sytem.Post Your Answer through comments section.
Total Marks:180                           Pass Marks:120              Test Duration: 80Minutes

1. How will you determine which processes are running on your linux system,which hardware devices are available and how much ram is left? 4Marks

2.The system on-disk swap space needs to be increased after a memory upgrade.This new partition needs to be created,without affecting other existing partitions or mount points.All partitions should become active after each reboot. 6marks


3. The DHCP server is down. You need to get your workstation up on the network,so you have to edit the appropriate configuration files by hand to set up static networking. ( 10marks) 

a.What is your current ip address and netmask and broadcast address?
b.What is your current default gateway?
c.what is your current DNS name Server?
d.how will you shutdown your network interface?
e.define layer 3 static settings.
f.verify dns and hostname resolution.

4.explain below linux commands in just few lines.  (10 Marks)
a.ip addr show
bip route show
c.ifup eth0
d.cat /etc/resolve.conf
e.hostname satish.com
f. cat /etc/sysconfig/network
  hostname= server.satish.com

g.shutdown - r now
h.ping -c 4 192.168.0.100
i. dig server.satish.com

5. Explain below Linux commands in short. 8Marks
a.setfacl -x u:linux:rx /home/satish.txt
b.setfacl -m d:u:student:rw /home/tiwary
c.system-config-language
d.echo $LANG

6. There are total three machine A,B and C. A login to machine C through B.Now write the configuration file of A ,B and C machine. 6 Marks

7.Answer following question: 4+15+1+1+1=23 Marks

a.what is difference between imap and pop3?
b.Write the port number of DNS,DHCP,TFTP,HTTPS,RDP,Whois,IMAP,IMAP(ssl)
c.GUI stands for
d CLI stands for
e.What is the maximum length for a file name in Linux?


8.This question is all about SSH Server.explain in short.  8Marks

a. ListeAddress 1.0.0.1:22
b.  Banner /etc/issue.net
c.  Protocol 2
d.  PermitRootLogin no

9.configure Apache web Server named it tiwary.com and satish.com both on a single machine.
Host a php site on tiwary.com which is combination of html+php and css. Also configure a php site on satish.com such that the html is integrated inside that php file using different H1 H2 tag     10Marks


10.how to reduce or shrink the size of LVM partition in Linux?And how to rename,split,extend,reduce and merge a volume group in Linux.  10marks

11.Write all the methods to Lock a user account in Linux and also how to unlock each Lock. 

                                                                                                                  10 Marks

12.what is the name and path of main linux system Log? 3 Marks

13.explain shell in Linux and how to see shells available for your Linux Machine? Also write command to change the shell of a specific user in Linux.  7marks.

14.explain Following: 3+3+2+2+2+2+2+2+2+2+2+2+2+2=30Marks

a.Mention what are the ranges for the private IP?
b.how many ways you can access router?
c.Bandwidth
d.Load
e.Delay
f.Reliability
g.MTU
h DCE
k.DTE
l.half duplex with an example
m.tcp with an example
n.udp with an example
o.Physical Layer
p.route poisoning



15.Mention all the steps to secure a Cisco router locally and Remotely.  9 marks

16. What subnet does  192.168.0.71/29 belongs to ?  marks

17.What valid host range is the IP address 171.25.242.112 255.255.255.0 a part of?  8marks

18. What subnet does  172.17.17.35/20 belongs to ? 8Marks

19.What is the broadcast address of the network 172.27.216.80/28 ? 5 Marks



Methods to Secure your Wi-Fi Network from Hackers

If you are using any WI-FI device then this tutorial is for you.Today in this tutorial we will learn how to secure WI-FI Networks from hackers or the wrong guys or from unauthorized users.A secure Wi-Fi device means faster speed and no misuse.A secure Wi-Fi device means tension free net surfing.
Here i will mention few steps to secure or protect your wi-fi device.


1.Always use a strong password for your wi-fi device.

When i say strong password it means it's lenghth must be 8 character.Strong password means it's combination of letter numeric and special character.Also mixture of small letter and capitla letter and it should not be matching with username or SSID name.Strong password means a password which is not guessable and which can't be remeber even seen in a glance.



2.Never use default login name or password.



Default login name or username is easily hack-able so never user default username and password. Default login name and passwords are easily available on internet for approx all networking devices.


3.Change your default SSID.

most of the people used to change the password only and not the SSID,but you should change the default SSID too because hacking software's available in market are designed for all default SSID and  all default SSID names are already listed in hacking software's database.



4.Change Your default password even if it is a strong password.

Some people think that there default password is strong so no need to change it.Always remember default passwords are never safe.



5.Do discourage hacking attacks use a scary name.

Scary names keeps kids and hackers away from your network.


6.Keep checking connecting device list from your wi-fi router.

If you feel your network is used by someone else or someone else is also using your wi-fi device internet services then you must check it by login to your wi-fi router and check connected dvice list.You can use FING tool if you are using andoid mobile.



7.Enable MAC-Filtering based Security and allow each device with there mac address.

MAC-Filtering means allow or block any device from your wi-fi device using mac address of all devices whether it is computer laptop or mobile. Every device has it's mac address and they are fixed.


8.Keep your Wi-Fi software updated.

Always update your wi-fi router software


9.Reduce the range of your wi-fi signal.

Lesser the signal range minimum the chances of hacking.It will reduces the chances of hacking.



10.When you are not using Internet Just Turned it OFF.

When you are not using your wifi router you better turned it OFF.There is no point in keeping your wi-fi device on even when you are not using it.



11.Disable Guest network.






How to hide identity completely using Kali Linux

  How to hide identity completely using Kali Linux how to hide identity online | anonymous | AnonGT How to hide identity completely using Ka...