Warning - This Website is only for education purposes, By reading these articles you agree that HackingBytes is not responsible in any way for any kind of damage caused by the information provided in these articles.

Hackingbytes

Hide Data Behind Any File :Steganography

Steganography is the art and science of hiding messages, Images, Data .etc in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, you can Hide Data Behind Images without using any software

Password Protect File/Hard Disk : Cryptography

Today in a typical middle class family everyone in the family uses the same computer , There are times when we need to keep our file ,folders, Hard Drivers, usb's private .The best way to protect your file ,folders, hard disks, thumb drives ..etc, is by encrypting them (i.e password protect ) By this way there's no chance of the file or folder being accessed without the password ,To achieve this, I use True crypt a Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

Trick To Find User Surname Of Any Reliance Mobile Number

Basically this website is for recharge but it helps you to get information about user of that mobile number. So lets dive into it. 1. Go to this Website 2. Enter Mobile Number in Reliance Subscriber Number. 3. Email address is optional so you don't need to enter. 4. Done!!!

Windows 8 E Book Free Download

This book covers most of the problems users are facing with Windows 8. Windows 8 is totally different from older version of Windows and it does not has start button. So people are facing problems while using it. This new version of Windows is also optimized for touchscreen. According to security researchers, Windows 8 is also the most secure operating system from Microsoft.

Yahoo Session Cookies hacking

A cookie is a small piece of text sent to your browser by a website when you visit. It contains information about your visit that you may want the site to remember. These cookies can be stored in your browser.you can see your cookies by typing the following script in your browser. p>

Tuesday, April 30, 2013

CCNA : Exam Information







CCNA Training series

Exam Information 

640 – 802 CCNA New Exam Syllabus

640-802 CCNA® EXAM

You can achieve CCNA certification in two ways:
  • Pass the CCNA-640-802 exam.
  • Pass both the ICNDv1 (640-822) and ICNDv2 (640-816) exams.
·         The CCNA 640-802 exam includes the same topics covered by the ICNDv1 640-822 and ICNDv2 640-816 exams. Cisco developed the second approach particularly for individuals who are just beginning their journey into networking, especially for people taking the CCNA curriculum at a Cisco Network Academy. The two-test approach is better suited for this environment since it takes a year to two to go through Cisco’s CCNA curriculum at the Network Academies. With this approach, you take the ICNDv1 640-822 exam halfway through the curriculum and the ICNDv2 640-816 exam at the end of the curriculum.
·         Another advantage of taking and passing the ICNDv1 exam is that you have achieved Cisco’s newest entry-level certification: CCENT (Cisco Certified Entry Networking Technician). In August 2007, Cisco introduced this certification based on customer and employer demand for a lower level certification demonstrating basic networking and hand-on skills with IOS devices such as routers and switches. If you already have networking experience, especially if that experience includes configuring Cisco devices, you are better off taking the single CCNA 640-802 exam. The main advantage of this approach is that you have to pay for only one exam.
·         This CCNA Free Study Guides series are primarily written for those individuals wishing to pass the CCNA 640-802 exam. However, this free series contains all the information that you would need to pass both the ICNDv1 640-822 and ICNDv2 640-816 exams. Therefore, it is up to you to determine which testing approach you take to achieve your CCNA certification.

Company
Cisco System
Exam Number
640-802
Associated Certifications
CCNA
Duration
90 minutes (45-55 questions)
Available Languages
English, Japanese, Chinese, Spanish, Russian, Korean, French, Portuguese
Authorize Exam Organizer
Pearson VUE
Prerequisites
None ( Basic Networking Knowledge recommended)
Substitute Exam
640-822 ICND1- Interconnecting Cisco Networking Devices Part 1
640-816 ICND2-Interconnecting Cisco Networking Devices Part 2
Validity period
Three years
Recertification
To recertify, pass the ICND2 exam, or pass the current CCNA exam, or pass a CCNA Concentration exam (wireless, security, voice), or pass the current CCDA exam, or pass any 642 - XXX professional level or Cisco Specialist exam (excluding Sales Specialist exams), or pass a current CCIE or CCDE written exam.



Exam Topics

The following topics are general guidelines for the content likely to be included on the Cisco Certified Network Associate exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
Describe how a network works
  • Describe the purpose and functions of various network devices
  • Select the components required to meet a network specification
  • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
  • Describe common networked applications including web applications
  • Describe the purpose and basic operation of the protocols in the OSI and TCP models
  • Describe the impact of applications (Voice Over IP and Video Over IP) on a network
  • Interpret network diagrams
  • Determine the path between two hosts across a network
  • Describe the components required for network and Internet communications
  • Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
  • Differentiate between LAN/WAN operation and features
Configure, verify and troubleshoot a switch with VLANs and interswitch communications
  • Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
  • Explain the technology and media access control method for Ethernet networks
  • Explain network segmentation and basic traffic management concepts
  • Explain basic switching concepts and the operation of Cisco switches
  • Perform and verify initial switch configuration tasks including remote access management
  • Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
  • Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
  • Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
  • Describe how VLANs create logically separate networks and the need for routing between them
  • Configure, verify, and troubleshoot VLANs
  • Configure, verify, and troubleshoot trunking on Cisco switches
  • Configure, verify, and troubleshoot interVLAN routing
  • Configure, verify, and troubleshoot VTP
  • Configure, verify, and troubleshoot RSTP operation
  • Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
  • Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)
Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network
  • Describe the operation and benefits of using private and public IP addressing
  • Explain the operation and benefits of using DHCP and DNS
  • Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)
  • Implement static and dynamic addressing services for hosts in a LAN environment
  • Calculate and apply an addressing scheme including VLSM IP addressing design to a network
  • Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
  • Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).
  • Describe IPv6 addresses
  • Identify and correct common problems associated with IP addressing and host configurations
Configure, verify, and troubleshoot basic router operation and routing on Cisco devices
  • Describe basic routing concepts (including: packet forwarding, router lookup process)
  • Describe the operation of Cisco routers (including: router bootup process, POST, router components)
  • Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
  • Configure, verify, and troubleshoot RIPv2
  • Access and utilize the router to set basic parameters.(including: CLI/SDM)
  • Connect, configure, and verify operation status of a device interface
  • Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
  • Perform and verify routing configuration tasks for a static or default route given specific routing requirements
  • Manage IOS configuration files. (including: save, edit, upgrade, restore)
  • Manage Cisco IOS
  • Compare and contrast methods of routing and routing protocols
  • Configure, verify, and troubleshoot OSPF
  • Configure, verify, and troubleshoot EIGRP
  • Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
  • Troubleshoot routing issues
  • Verify router hardware and software operation using SHOW & DEBUG commands.
  • Implement basic router security
Explain and select the appropriate administrative tasks required for a WLAN
  • Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)
  • Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
  • Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
  • Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
  • Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)
Identify security threats to a network and describe general methods to mitigate those threats
  • Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats
  • Explain general methods to mitigate common security threats to network devices, hosts, and applications
  • Describe the functions of common security appliances and applications
  • Describe security recommended practices including initial steps to secure network devices
Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network
  • Describe the purpose and types of ACLs
  • Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
  • Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
  • Verify and monitor ACLs in a network environment
  • Troubleshoot ACL issues
  • Explain the basic operation of NAT
  • Configure NAT for given network requirements using (including: CLI/SDM)
  • Troubleshoot NAT issues
Implement and verify WAN links
  • Describe different methods for connecting to a WAN
  • Configure and verify a basic WAN serial connection
  • Configure and verify Frame Relay on Cisco routers
  • Troubleshoot WAN implementation issues
  • Describe VPN technology (including: importance, benefits, role, impact, components)
  • Configure and verify a PPP connection between Cisco routers
Cisco system could change this syllabus without any notification. We suggest you to review Cisco’s official site before taking exam.

Live Step By Step Website Hacking Example Using Havaji:

Live Step By Step Website Hacking Example Using Havaji:


Firstly i am going to introduce the term havij :)
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.


The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Download havij 1.10

First Find a sqli infected site .Now here i found a vulernable site

http://www.hypetrading.com/productinfo.php?id=285

Now Let's start

Open havij and copy and paste infected link as shown in figure





Now click in the "Analyze"



Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx



Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed




After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure



In that Just put mark username and password and click "Get data"


Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure...


SMS Spoofing: How to spoof SMS for free

SMS Spoofing: How to spoof SMS for free

There are a lot of services on web offering a way to send anonymous sms. But, when it comes to SMS spoofing, these services require you to pay in-order to spoof sms. So, apparently, there are no free SMS spoofing sites. But, some of these sites offer free trial which we can take advantage of for sending spoofed SMS. I searched for some of the websites which allow us to spoof SMS for free.

What is SMS Spoofing?

If you are new to SMS Spoofing, here is what Wikipedia says:
SMS spoofing is a relatively new technology which uses the short message service (SMS) to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text.
Confused? Ok. In simple words, say you have two friends: A and B. Then, you using SMS Spoofing, you can send message to B using phone number of A. Thus, it will appear to B that the message has been sent by A, but the actual sending work is done by you, without A’s knowledge. :)

How to spoof SMS for free:

1. Go to Smsian website and register for an account.


2. After logging in:


3. Enter your victim’s phone number and also, the number you want to spoof. Enter the text you want and hit on Send.
And bang! The SMS will be sent to your victim using the spoofed number. This site allows you to send 2 or more(depending on your country) messages as a part of trial.
Some of the other websites offering SMS spoofing trial:
- Lleida.net
- SMSGlobal(no trial)
These are some of the websites offering free SMS spoofing service. I think you will now stop searching for “how to spoof SMS for free”. If you know any other free SMS spoofing website, please share it with us in comments.

Hacking Facebook Accounts on LAN

Hacking Facebook Accounts on LAN

By : JamesLove

Hello Everyone,
Today i want to share my tutorial on how to Phish usernames & passwords using Credential Harvester found in Backtrack 5/ Social Engineering Kit (SET).

This tutorial is aimed for LAN usage only, This means that this will only work on people connected to the same local area network as you. It will not work if you try it on someone outside your network.
Enjoy!
Tools Needed :
  • Backtrack 5
  • Social Engineering Toolkit (SET)
INSTALLATION :
1) Firstly, click Applications –> Backtrack –> Exploitation Tools –> Social Engineering Toolkit –> SET.
2) The screen shown below will appear, next choose 5 to update your SET and choose “4″ to update your Metasploit Framework. Updating will take awhile depending on your connection. Maybe go have a joint and enjoy some zeppelin?
3) Welcome back Stonie, lets continue. As seen in the picture below we are back to the default screen. Here choose “1″ to choose “Social Engineering Attacks”.
http://zyphyto1.host56.com/snapshot-1.png
4) Next choose “2″ to choose “Website Attack Vendors” as shown below.
http://zyphyto1.host56.com/snapshot2.png
5) Choose “3″ for “Credential Harvester Attack Method”. This is our main ingredient in this exploit.
http://zyphyto1.host56.com/snapshot3.png
6) For this tutorial lets choose “2″ for “Site Cloner” as shown below.
http://zyphyto1.host56.com/snapshot4.png
7) Here you will need to key in your internal IP address, keying your external IP address will only route it back to your internal IP address. So if you do not know where to find your IP address, open up another terminal and type in “IFCONFIG” as shown below.
http://zyphyto1.host56.com/snapshot5.png
http://zyphyto1.host56.com/snapshot6.png
8) After keying in your IP address, you will be prompted to key in the site to clone.
http://zyphyto1.host56.com/snapshot7.png
9) Upon keying in your site to clone, you will be shown the screen below, press the enter button.
http://zyphyto1.host56.com/snapshot8.png
http://zyphyto1.host56.com/snapshot9.png
10) Next open up your Firefox (or whatever browser you use). Type in your IP address in you browser as shown below and press enter.
http://zyphyto1.host56.com/snapshot-10.png
11) The bait is set! If you have done everything correctly, your IP address will now show you a cloned facebook login page as shown below. This is the link we must make our VICTIMS CLICK and LOGIN so you can successfully “PHISH” their credentials.
http://zyphyto1.host56.com/snapshot11.png
12) Now the minute someone opens your link, your terminal will prompt you as shown below.
http://zyphyto1.host56.com/snapshot12.png
13) When the victim types in their username & password, it will lead them to the real Facebook page but the credentials keyed into the cloned site are sent to our terminal.
http://zyphyto1.host56.com/snapshot13.png
14) Voila! As you can see below, email = jameslove & pass = computers.
http://zyphyto1.host56.com/snapshot14.png
OBJECTIVE :
Basically we are using our internal IP address to host a cloned website. We must then proceed to find ways and methods to get our LAN victims to click and login to our cloned sites.

LinkWithin

Related Posts Plugin for WordPress, Blogger...