Posts

Using the Windows Management Instrumentation Command-line (WMIC) tool

Image
* Using the Windows Management Instrumentation Command-line (WMIC) tool The Windows Management Instrumentation Command-line (WMIC) is a command-line and scripting interface that simplifies the use of Windows Management Instrumentation (WMI) and systems managed through WMI. WMIC is based on aliases. Aliases make the primary data provided by WMI available without having to understand WMI-specific concepts. WMI data and many WMI features are also accessible through WMI without aliases. You can list the available aliases by using WMIC /? help. WMIC has a progressive help system. You can use /? at any time and at any depth to discover the additional options that are available in the current context. /? lists the currently available aliases, commands, and the global switches (that is, switches that apply to WMIC overall). To list the verbs and switches available for an alias, type the name of the alias and /?. To list the parameters available for a particular verb, type the name of th...

Network Scanning

Image
* Network Scanning Network scanning is a procedure for identifying active hosts on a network , either for the purpose of attacking them or for network security assessment. Scanning procedures, such as ping sweeps and port scans, return information about which IP addresses map to live hosts that are active on the Internet and what services they offer. Another scanning method, inverse mapping, returns information about what IP addresses do not map to live hosts; this enables an attacker to make assumptions about viable addresses. Scanning is one of three components of intelligence gathering for an attacker. In the foot printing phase, the attacker creates a profile of the target organization, with information such as its domain name system (DNS) and e-mail servers, and its IP address range. Most of this information is available online. In the scanning phase, the attacker finds information about the specific IP addresses that can be accessed over the Internet, their operating systems...

Techniques used for Footprinting

Image
* Some Techniques used for Footprinting - Ping Sweep Ping a range of IP addresses to find out which machines are awake. how to ping? Go to cmd -> type: ping (address/domain) eg. ping www.facebook.com - TCP Scans Scan the ports on a machine to see which services are offered.TCP scans can be performed by scanning a single port on a range of IPs, or by scanning a range of ports on single IP, both techniques yield useful information. - Open Source Footprinting It is the easiest and the safest way to go about finding information that is available to the public, such as phone numbers, addresses, etc. Performing whois requests, searching through DNS tables are other forms of open source footprinting. Most of this information is fairly easy to get and within legal limits. One way to check for sensitive information is to check the HTML source code of the website to look for links, comment,Meta tags etc. -   Using Tools whois is the best tool to get information about the w...

Network Cameras, IVMS and Firewall

Image
* Network cameras A network camera, often also called an IP camera, can be described as a camera and computer combined in one unit. The main components of a network camera include a lens, an image sensor, one or several processors, and memory. The processors are used for image processing, compression, video analysis and networking functionalities. The memory is used for storing the network camera’s firmware (computer program) and for local recording of video sequences. Like a computer, the network camera has its own IP address, is connected directly to a network and can be placed wherever there is a network connection. This differs from a web camera, which can only operate when it is connected to a personal computer (PC) via the USB or IEEE 1394 port, and to use it, software must be installed on the PC. A network camera provides web server, FTP (File Transfer Protocol), and e-mail functionalities, and includes many other IP network and security protocols. A network camera can ...

DNS, SEO and SMO

Image
* DNS (Domain Name System) Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses. Information from all the domain name servers across the Internet are gathered together and housed at the Central Registry. Host companies and Internet Service Providers interact with the Central Registry on a regular schedule to get updated DNS information. When you type in a web address, your Internet Service Provider views the DNS associated with the domain name, translates it into a machine friendly IP address and directs your Internet connection to the correct website. After you register a new domain name or when you update the DNS servers on your domain name, it usually takes about 12-36 hours for the domain name servers world-...

Web Hosting and it's types

Image
* Web Hosting Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet. A web host, or web hosting service provider, is a business that provides the technologies and services needed for the website or webpage to be viewed in the Internet. Websites are hosted, or stored, on special computers called servers. When Internet users want to view your website, all they need to do is type your website address or domain into their browser. Their computer will then connect to your server and your webpages will be delivered to them through the browser. Most hosting companies require that you own your domain in order to host with them. If you do not have a domain, the hosting companies will help you purchase one. If you decide to create and host your website with Website.com, you can get a custom domain, email addresses, and web hosting all bundled into one subscription. * Types of Web Hosting Some of the basic types of Web Host...

Data Extraction and some tools use for Data Extraction

Image
* Data Extraction Data extraction is the act or process of retrieving data out of (usually unstructured or poorly structured) data sources for further data processing or data storage (data migration). The import into the intermediate extracting system is thus usually followed by data transformation and possibly the addition of metadata prior to export to another stage in the data workflow. Typical unstructured data sources include web pages, emails, documents, PDFs, scanned text, mainframe reports, spool files, classifieds, etc.Extracting data from these unstructured sources has grown into a considerable technical challenge where as historically data extraction has had to deal with changes in physical hardware formats, the majority of current data extraction deals with extracting data from these unstructured data sources, and from different software formats. This growing process of data extraction[3] from the web is referred to as Web scraping. * Data Extraction Tools:- Ther...