Skip to main content

Posts

Showing posts from March, 2018

Bash Reverse Shell explained.

 

Microsoft Windows NLB Feature for Stateful Applications

NLB is a software-based load balancer (Windows Feature) that resides on each member in the cluster. Load Balancing is based on number of client connection requests and the NLB algorithm does not dynamically respond to changes in the load on each cluster host (such as the CPU load or memory usage or Network Usage). Thus, If client population is less and/or the connections produce varying loads on the server, the load balancing algorithm of Microsoft NLB is less effective. Udacity has special offers worldwide to help anyone learn important, higher-paying job skills during this challenging time. Click here to get your offer and start learning now! To understand how NLB preserve the session state, first let me take you through the difference between a stateful and stateless connections: Stateless The application connection is said to be stateless if the server does not store any state about the client session instead the session data is saved at th client side. The server does n

TLS version 1.3 is Here : A brief Overview

On 23rd March 2018, the latest version of TLS ,which is TLS 1.3 has been approved by the IETF. There are a considerable number of improvements and differences in TLS version 1.3 over 1.2. Now the developers need to implement this version in to their products and the actual roll out can be expected soon. Right now, I'm having a Mozilla Firefox version 59.0.1 and by default the TLS1.3 is not yet enabled. But as per some tech forums, the browser does support TLSv1.3 though its not enabled by default. There are some tips available over internet on enabling TLSv1.3 manually but i'm not going to discuss that here. On TLS version 1.3,one of the major improvement is the speed. Those who need a revision on SSL handshake process, can refer to my older post. So the handshake process in TLS1.2 have more packet exchanges. The whole handshake process in TLS 1.3 will be now concluded in just 3 exchanges.  But basically the concept is same. Client starts with HELLO, Se

Facts: Facebook Deactivation vs Deletion

So the #deletefacebook campaign has been circulating over the internet, lets analyze the impact of deactivation and deletion of Facebook account and how to perform it. Tip : If you don't want to read this article fully, here is the direct link for account deletion :  https://www.facebook.com/help/delete_account Ok lets start, Firstly Deactivation. So as per FB, " Deactivating your account will disable your Profile and remove your name and photo from most things that you've shared on Facebook. Some information may still be visible to others, such as your name in their Friends list and messages that you've sent .". Also " Your Messenger account will remain active unless you deactivate it from the Messenger app. Using Messenger will not reactivate your Facebook account. Your profile picture will still be visible in your conversations and people will still be able to search for you by name to send you a message. You will continue to appear

Cisco ASA: Disable SSLv3 and configure TLSv1.2.

For configuring TLS v1.2, the ASA should run software version 9.3(2) or later. In earlier versions of ASA, TLS 1.2 is not supported.If you are running the old version, it's time to upgrade. But before that i will show you the config prior to the change. I am running ASA version 9.6.1 Now ,set the server-version to tlsv1.2, though ASA supports version tlsv1.1, its always better to configure the connection to more secure. Server here in the sense, the ASA will be act as the server and the client will connect to the ASA.     #ssl server-version tlsv1.2 set the client-version to tlsv1.2, if required.     #ssl client-version tlsv1.2 ssl cipher command in ASA offers 5 predefined security levels and an additional custom level.     #ssl cipher tlsv1.2 high we can see the setting of each cipher levels using #show ssl cipher command. Now set the DH group to 24, which is the strongest offered as of now in the ASA.     #ssl dh-group group24 An

Add a program to the Context menu: Regedit

Many times, we may require to open a file using a particular program directly from the right-click context menu. For a quick example if we want to add Notepad in the context menu,  Process to add Open in Notepad to the context menu is detailed below : Navigate to HKEY_CLASSES_ROOT\*\shell . Create a new key under the Shell key. Right-click Shell and select New > Key. Set the key name to Open In Notepad . This name is your desired text to be shown in the context menu. Create a new key under the Open In Notepad key . Right-click Open In Notepad and select New > Key. Set the key name to command . This setting of key is optional though. Select the (Default) value in the command key and select Modify . Enter notepad.exe %1 in the Value data field and click OK. Another example, if you want to see the command prompt in the context menu, instead of notepad.exe , you can set cmd.exe .   Now right click on any file and you should see and option.  In this exampl

Cambridge Analytica and Information Technology Act of India: Why India needs a Stringent Data Privacy Law?

Last few days, the Cambridge Analytica scandal has been shaking different governments around the world. Also in the news that, CA/FB or its partners was allegedly involved in different elections in India actively. Let’s see how practical it is to punish CA/FB/or any other organization that violates the data privacy. Currently, data protection in India is governed by provisions of the Information Technology Act, 2008.So if the Cambridge Analytica scandal has been taken up to the court, the only way it can be dealt with is by using India's Information Technology Act. Here is what the India’s Union Minister’s response on the Cambridge Analytica Scandal. “Mr Mark Zuckerberg, you better note the observation of the IT Minister of India. We welcome the FB profile in India, but if any data theft of Indians is done through the collusion of Facebook's system, it shall not be tolerated. We have got stringent powers in the IT Act, and we shall use it, including to summon you in Indi

Recovery Procedure: Alcatel-Lucent Omni-Switch not booting AOS: Going to Mini-boot prompt.

Problem: Switch not booting AOS; Going to Mini-boot prompt. Model: Alcatel-Lucent OS6850 [Note:The same procedure might be applicable for different models of Omni-Switches, However, for this illustration, i have used OS-6850 ] Reason: This problem may occurs due to corrupt AOS image files or misconfigured boot parameters. Hence switch cannot boot the images properly and will go to Mini-boot prompt.  Work Around: [Note: This zmodem procedure consumes a lot to time to finish the process.] 1.) Power off your OS6850 2.) When you switched it back on, stop it before the Miniboot (there is some counter counting down from 4). Press Enter to break. 3.) You will have the following prompt " => " 4.) Enter " setenv baudrate 115200 ”. Increasing baudrate helps to increase the data transfer speed using zmodem. 5.) Enter " saveenv " 6.) Enter " boot " 7.) The switch should run now in baud rate 115200 (so you have to change your clients ter

SSL Handshake Explained

The setting up of a Secure SSL/TLS connection is known as the SSL handshake process. This will be performed for all the websites starts with https://. The SSL handshake process can be explained in 6 different steps. 1.    Client Web Request - Client Hello 2.    Server Responds -  Server Hello. 3.    Client validates the Certificate 4.    Client generate and encrypt the session key 5.    Server decrypts the session key  6.    Encrypted data exchange takes place. 1. Client Web Request - Client Hello This is the initiation of the SSL/TLS communication. Client Sends a "Hello" message to the Server. Basically, this Hello means, Hello, i want to set up a secure connection with you but before that let me introduce myself. I supports this version of SSL/TLS , These are the cipher Suit/protocols i support and these are the data compression methods i support. 2. Server Responds -  Server Hello. Then the Server respond to the Client with a Server Hello. So the Server

Cisco ASA Firewall: Packet Flow/Mode of Operation

Scenario : So here is a packet initiated from Inside to the Outside [ingress to egress]. 1) A user who is sitting inside of the network is trying to access a website located at the Internet (outside) 2) The packet hits the inside interface (Ingress) of ASA. 3) Once the packet reached ASA, it will verify whether this is an existing connection by checking its internal connection table. If it is an existing connection, the ACL check (step 4) will be bypassed and move to step 5. ASA will check for the TCP flag if its a TCP packet. If the packet contains a SYN flag, then the new connection entry will be created in the connection table(connection counter gets incremented). Other than SYN flag, the packet will be discarded and a log entry will be created. "Remember the 3-way handshake process. SYN/SYN-ACK/ACK. If the TCP connection flags are not in the order as it is intended to be, ASA will simply drop the packet. Most of the scanning/attacks are done by these flag manipula

Netcat Tool: 5 most common usage with examples

Netcat is one of the most powerful and useful tool for testing and debugging the network and protocol connectivity. Though administrators use this tool for troubleshooting, the attackers can use this for malicious intentions such as establishing a backdoor connectivity, transferring files, scanning ports etc. Netcat can act as in client-server mode as well. This tool is available for both Windows and Linux. Lets go through the five most common usage of netcat commands. 1) Check whether the port is Open. For checking TCP ports :-  #nc -v <IP or Domain name> <port number>  Eg: nc -v www.jaacostan.com 80 For checking UDP ports:-  #nc -vu www.jaacostan.com 53 //where "u" in "-uv" represents UDP. 2) For doing Port Scans #nc -vzu <IP or Website> <port range> eg: #nc -vz www.jaacostan.com 100-200 for scanning the opened UDP ports, #nc -vzu www.jaacostan.com 100-200 //where "u" in "-uzv" represents UDP. 3) N