before attack scenario
After attack scenario
-> is a process whereby one host sends a flood network traffic to another host. By flooding the network would caused "denial of service" or DoS attacks. the target host is unable to handle heavy load of data that is received. Due to this implication, the whole bandwidth for target host is eaten by the sender host. i have tried it using free source software called xxpoof. if you wish to try it, responsibility is under you and implication is effect immediately. for downloading, just click into this link http://www.buha.info/files/user/html/id_Tools_xxpoof_266.html.
Friday, December 15, 2006
Wednesday, December 13, 2006
What is VNC?
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view an office Linux machine on your Windows PC at home. VNC is freely and publicly available and is in widespread active use by millions throughout industry, academia and privately.
what is putty?
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator.
Create VPN using WindowsXP
WindowsXP VPN Server
The following page details the steps necessary to create a WindowsXP VPN Server
--------------------------------------------------------------------------------
1. Go to Start / Settings / Network Connections
2. Start the New Connection Wizard
3. Click on the Next button
4. Select Set up advanced connection
5. Click on the Next button.
6. Click on Accept incoming connections
7. Click on the Next button
8. At the LPT1 page, skip it and just click on the Next button.
9. Click on Allow virtual private connection
10. Click on the Next button
11. Add user accounts that you want to be able to connect to your WindowsXP computer.
12. Click on the Next button.
13. Highlight Internet Protocol (TCP/IP) and click on Properties
14. Determine how you want the remote computers to get their IP address
19. The above example will assign IP addresses to each client. Make sure the IP scheme is the same as on your server.
20. Submitted by Andy Bloss
If the VPN server is behind a router, Port Mapping will need to be done on the router. Standard port usage is 1723 for PPTP. You might also need to configure your router for PPTP Passthrough. Port usage for IPSec is 500, 50-51. These ports will have to be forwarded to the VPN server's IP
reference
http://www.onecomputerguy.com/networking/xp_vpn_server.htm
Monday, December 11, 2006
Saturday, December 09, 2006
Analyze your network security using Nmap-tool
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).
Nmap is ...
- Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
- Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
- Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
- Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
- Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
- Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, and tutorials. Find them in multiple languages here.
- Supported: While Nmap comes with no warranty, it is well supported by the community and we appreciate bug reports and patches. If you encounter a problem, please follow these instructions.
- Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press page for further details.
- Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities.
Subscribe to:
Posts (Atom)