Warning - This Website is only for education purposes, By reading these articles you agree that HackingBytes is not responsible in any way for any kind of damage caused by the information provided in these articles.

Hackingbytes

Hide Data Behind Any File :Steganography

Steganography is the art and science of hiding messages, Images, Data .etc in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, you can Hide Data Behind Images without using any software

Password Protect File/Hard Disk : Cryptography

Today in a typical middle class family everyone in the family uses the same computer , There are times when we need to keep our file ,folders, Hard Drivers, usb's private .The best way to protect your file ,folders, hard disks, thumb drives ..etc, is by encrypting them (i.e password protect ) By this way there's no chance of the file or folder being accessed without the password ,To achieve this, I use True crypt a Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

Trick To Find User Surname Of Any Reliance Mobile Number

Basically this website is for recharge but it helps you to get information about user of that mobile number. So lets dive into it. 1. Go to this Website 2. Enter Mobile Number in Reliance Subscriber Number. 3. Email address is optional so you don't need to enter. 4. Done!!!

Windows 8 E Book Free Download

This book covers most of the problems users are facing with Windows 8. Windows 8 is totally different from older version of Windows and it does not has start button. So people are facing problems while using it. This new version of Windows is also optimized for touchscreen. According to security researchers, Windows 8 is also the most secure operating system from Microsoft.

Yahoo Session Cookies hacking

A cookie is a small piece of text sent to your browser by a website when you visit. It contains information about your visit that you may want the site to remember. These cookies can be stored in your browser.you can see your cookies by typing the following script in your browser. p>

Tuesday, May 21, 2013

MCSE : Windows Server 2003 Introduction

                                                         

                          Introduction to Windows 2003

 

 

                                           

Windows Server 2003 is a Network Operating System from Microsoft, introduced on April 2003. Microsoft released another modified and improved version, Windows Server 2003 R2, on December 2005. The Windows Server 2003 family is the successor to the Windows 2000 Server family, which was based on Windows NT Server. Windows Server 2003 introduces many new features and offers significant improvements to many features which were avalilable in earlier Windows Network Operating Systems.
Windows Server 2003 is a multithreaded, multiprocessing, multitasking operating system. Windows Server 2003 has a rich set of built-in APIs that make application development very easy.
Some improvemnts of Windows 2003 over the previous operating systems are listed below.
• Active Directory improvements
• .NET technologies support
• Windows XP integration
• Internet Information Services (IIS) v6.0 - An improved version of IIS.
• Industry standard support
• Interface and tool improvements
Group Policy improvement
• Increased in security and built-in firewall. Most services in Windows 2003 are disabled by default.
• Improved disk management. New backup feature included which allows to back up open files.

Windows 2003 family Editions

Windows Server 2003 is available in the following four editions:
Standard Edition: Standard Edition is intended for file-and-print services and general purpose application support. It can also act as an Internet gateway and dial-in server.
Enterprise Edition: Enterprise Edition has greater memory and processor capacity than Standard Edition, along with support for clustering and advanced certificate services. It is intended for high-end applications and high-availability services. It also supports services that are no longer included in the Standard Edition package.
Datacenter Edition: Datacenter Edition comes as part of a hardware/software package supplied by authorized hardware vendors. Datacenter Edition has more memory and clustering capacity than Enterprise Edition and contains features that support superior availability. Datacenter Edition is suitable for large, critical datacenter applications.
Web Edition: Web Edition is a new addition to the Windows server family which is specially made for web services and web hosting applications. Web Edition lacks many of the features in the Standard Edition. But Web Edition is priced less than other editions.

CCNA : Cisco and TCP/IP Model



 

Cisco's three-layer hierarchical model

Core Layer

The core provides a high-speed layer-2 switching infrastructure and typically does not manipulate packet contents.

Distribution Layer

The distribution layer provides a boundary between the access and core layers. It contains routers and switches. Routers are used to provide the logical boundary--broadcasts are contained within the access layer and Filtering policies can be implemented to restrict traffic flows.

Access Layer

The access layer provides the user's initial access to the network, which is typically via switches or hubs.

 


TCP/IP protocol



 

The TCP/IP protocol stack has four layers. Note that although some of the layers in the TCP/IP protocol stack have the same names as layers in the OSI reference model, the layers have different functions in each model, as is described in the following list:

Application layer:

The application layer handles high-level protocols, including issues of representation, encoding, and dialog control. The TCP/IP model combines all application-related issues into one layer and ensures that this data is properly packaged for the next layer.

Transport layer:

The transport layer deals with QoS issues of reliability, flow control, and error correction. One of its protocols, TCP, provides for reliable network communications.

Internet layer:

The purpose of the Internet layer is to send source datagrams from any network on the internetwork and have them arrive at the destination, regardless of the path they took to get there.

Network access layer:

The name of this layer is broad and somewhat confusing. It is also called the host-to-network layer. It includes the LAN and WAN protocols and all the details in the OSI physical and data link layers.

CCNA : OSI Model 7 Layers




Application Layer

The application layer is the OSI layer that is closest to the user. This layer provides network services to the user's applications. It differs from the other layers in that it does not provide services to any other OSI layer, but only to applications outside the OSI reference model. Applications layer provide a platform to access the data of remote computer.
The application layer protocols that you should know are as follows:
  • SNMP (Simple Network Management Protocol)— Communicates status and allows control of networked devices.
  • TFTP (Trivial File Transfer Protocol)— Simple, lightweight file transfer.
  • DNS (Domain Naming System)— Translates a website name (easy for people) to an IP address (easy for computers).
  • DHCP (Dynamic Host Configuration Protocol)— Assigns IP, mask, and DNS server (plus a bunch of other stuff) to hosts.
  • Telnet— Provides a remote terminal connection to manage devices to which you are not close enough to use a console cable.
  • HTTP (Hypertext Transfer Protocol)— Browses web pages.
  • FTP (File Transfer Protocol)— Reliably sends/retrieves all file types.
  • SMTP (Simple Mail Transfer Protocol)— Sends email.
  • POP3 (Post Office Protocol v.3)— Retrieves email.
  • NTP (Network Time Protocol)— Synchronizes networked device clocks.

presentation layer

The presentation layer is responsible for formatting data so that application-layer protocols (and then the users) can recognize and work with it. Presentation layer format the file extensions—such as .doc, .jpg, .txt, .avi, and so on. you realize that each of these file types is formatted for use by a particular type of application. The presentation layer taking the application layer data and marking it with the formatting codes so that it can be viewed reliably when accessed later. If necessary, the presentation layer might be able to translate between multiple data formats by using a common format.

The Session Layer

The session layer establishes, manages, and terminates sessions between two communicating hosts. It provides its services to the presentation layer. The session layer also synchronizes dialogue between the presentation layers of the two hosts and manages their data exchange. For example, web servers have many users, so many communication processes are open at a given time. Therefore, keeping track of which user communicates on which path is important.

Transport Layer

The transport layer is possibly the most important layer for exam study purposes. A lot is going on here, and it is heavily tested.
The transport layer's main jobs
  • It sets up and maintains a session connection between two devices.
  • It can provide for the reliable or unreliable delivery of data across this connection.
  • It multiplexes connections, allowing multiple applications to simultaneously send and receive data. When
  • Implementing a reliable connection, sequence numbers and acknowledgments (ACKs) are used.
  • Flow control (through the use of windowing or acknowledgements)
  • Reliable connections (through the use of sequence numbers and Acknowledgement )
Transport layer use two protocols for sending data TCP and UDP.
TCP
TCP is connection oriented protocols. Connection-oriented transmission is said to be reliable. Thinks TCP as registry AD facility available in Indian post office. For this level of service, you have to buy extra ticket and put a bunch of extra labels on it to track where it is going and where it has been. But, you get a receipt when it is delivered, you are guaranteed delivery, and you can keep track of whether your shipment got to its destination. All of this costs you more—but it is reliable!

UDP
UDP is connection less protocols. Connection-less transmission is said to be unreliable. Now, don't get too wrapped up in the term "unreliable" this doesn't mean that the data isn't going to get there; it only means that it isn't guaranteed to get there. Think of your options when you are sending a postcard, put it in the mailbox, and chances are good that it will get where it's supposed to go—but there is no guarantee, and stuff does go missing once in a while. On the other hand, it's cheap.

Reliability

When reliability is necessary, it should cover these four items:
  • recognizing lost packets and having them re-sent
  • recognizing packets that arrive out of order and reordering them
  • detecting duplicate packets and dropping the extra ones
  • Avoiding congestion

Connection Multiplexing/Application Mapping

Transport layer assigns a unique set of numbers for each connection. These numbers are called port or socket numbers. TCP, and UDP, provide a multiplexing function for a device: This allows multiple applications to simultaneously send and receive data.
Imagine a server that performs a number of functions—for example email, web pages, FTP, and DNS. The server has a single IP address, but can perform all these different functions for all the hosts that want to connect to it. The transport layer (layer 4) uses port numbers to distinguish between different types of traffic that might be headed for the same IP address.
Port numbers are divided into ranges by the IANA. Following are the current port ranges:
Port number
descriptions
0–1023
Well-Known—For common TCP/IP functions and applications
1024–49151
Registered—For applications built by companies
49152–65535
Dynamic/Private—For dynamic connections or unregistered applications

 

 

 

 

Common TCP and UDP Port Numbers

TCP
UDP
FTP
20, 21
DNS
53
Telnet
23
DHCP
67,68
SMTP
25
TFTP
69
DNS
53
NTP
123
HTTP
80
SNMP
161
POP
110


NNTP
119


HTTPS
443


Network Layer

The network layer provides a logical topology and layer-3 addresses. Routers function at the network layer. This layer is responsible for three main functions:
  • Defines logical addresses used at layer-3
  • Finds paths, based on the network numbers of logical addresses, to reach destination devices
  • Connects different data link types together, such as Ethernet, FDDI, Serial, and Token Ring
IP packet
Where the transport layer uses segments to transfer information between machines, the Internet layer uses datagram's. Datagram is just another word for packet.
The IP protocol is mainly responsible for these functions:
  • Connectionless data delivery: best effort delivery with no data recovery capabilities
  • Hierarchical logical addressing to provide for highly scalable internetworks
IP addresses are broken into two components:
  • Network component Defines on what segment, in the network, a device is located
  • Host component defines the specific device on a particular network segment

Two types of packets are used at the Network layer: data and route updates.
Data packets
Used to transport user data through the internetwork. Protocols used to support data traffic are called routed protocols; examples of routed protocols are IP and IPv6.
Route update packets
Used to update neighboring routers about the networks connected to all routers within the internetwork. Protocols that send route update packets are called routing protocols; examples of some common ones are RIP, RIPv2, EIGRP, and OSPF. Route update packets are used to help build and maintain routing tables on each router.

IP Classes

  • Class A addresses range from 1-126: 00000001-01111111.
  • Class B addresses range from 128-191: 10000000-10111111.
  • Class C addresses range from 192-223: 11000000-11011111.
  • Class D addresses range from 224-239: 11100000-11101111.
  • Class E addresses range from 240-254:
  1. 0 is reserved and represents all IP addresses;
  2. 127 is a reserved address and is used for testing, like a loop back on an interface:
  3. 255 is a reserved address and is used for broadcasting purposes.
Public addresses are Class A, B, and C addresses that can be used to access devices in other public networks, such as the Internet. Public IP address assign authority The Internet Assigned Numbers Authority (IANA) is ultimately responsible for handing out and managing public addresses. Normally you get public addresses directly from your ISP, which, in turn, requests them from one of five upstream address registries:
  • American Registry for Internet Numbers (ARIN)
  • Reseaux IP Europeans Network Coordination Center (RIPE NCC)
  • Asia Pacific Registry for Internet Numbers (APNIC)
  • Latin American and Caribbean Internet Address Registry (LACNIC)
  • African Network Information Centre (AfriNIC)

Private IP and ISP

Private ip address can be used to configure private network. You can use private ip to build your network without paying a single rupees. But one biggest problem with private ip is that with private you can not access the internet. This is the point where ISP comes from. ISP purchase a bulk of public ip address and provide them on rent. Whatever you pay to ISP for accessing internet is actually the charge of using public ip address.


Private ip address:- Not route able in public network
  • Class A: 10.0.0.0-10.255.255.255 (1 Class A network)
  • Class B: 172.16.0.0-172.31.255.255 (16 Class B networks)
  • Class C: 192.168.0.0-192.168.255.255 (256 Class C networks)
Protocol
Description
IP
IP of TCP/IP, featuring routable 32-bit addressing.
IPX
The equivalent of IP in Novell Netware.
ICMP
Internet Connection Management Protocol. Incorporates Ping and Traceroute, which are layer 3 link-testing utilities.
OSPF, IGRP, EIGRP, RIP, ISIS
Dynamic routing protocols that learn about remote networks and the best paths to them from other routers running the same protocol.
ARP, RARP
Address Resolution Protocol (and Reverse ARP). ARP learns what MAC address is associated with a given IP address. Reverse ARP learns an IP address given a MAC address.

Data link layer

Main functions of data link layer is
  • Defining the Media Access Control (MAC) or hardware addresses
  • Defining the physical or hardware topology for connections
  • Defining how the network layer protocol is encapsulated in the data link layer frame
  • Providing both connectionless and connection-oriented services
  • Defines hardware (MAC) addresses as well as the communication process that occurs within a media.
  • The first six hexadecimal digits of a MAC address form the OUI.
  • MAC addresses only need to be unique in a broadcast domain,
  • You can have the same MAC address in different broadcast domains (virtual LANs).
There are two specifications of Ethernet frame Ethernet II and 802
802.2 use a SAP or SNAP field to differentiate between encapsulatedlayer-3 payloads.
With a SNAP frame, the SAP fields are set to 0xAA and the type field is used to indicate the layer-3 protocol. One of the issues of the original SAP field in the 802.2 SAP frame is that even though it is eight bits (one byte) in length, only the first six bits are used for identifying upper-layer protocols, which allows up to 64 protocols.
802.2 SNAP frame support of up to 65,536 protocols
Ethernet II's Version of Ethernet
  • Ethernet II does not have any sub layers, while IEEE 802.2/3 has two: LLC and MAC.
  • Ethernet II has a type field instead of a length field (used in 802.3). IEEE 802.2 defines the type for IEEE Ethernet

Physical Layer

The Physical layer communicates directly with the various types of actual communication media. Different kinds of media represent these bit values in different ways. Some use audio tones, while others utilize state transitions—changes in voltage from high to low and low to high. Specific protocols are needed for each type of media to explain the proper bit patterns to be used, how data is encoded into media signals, and the various qualities of the physical media’s attachment interface.

LinkWithin

Related Posts Plugin for WordPress, Blogger...