File Security using Advance Encryption Standards (AES) Keys and Initialization Vector (iv).

This article is all about encryption decryption of a file using AES Keys plus Initialization Vector.

Remember AES is a symmetric key Algorithm.

After Reading this article you will be able to Understand:

1.How to Encode Decode a File with the Generated Key pair.

2.How to generate KEY PAIR (AES+IV)

3.How to Encrypt a file using AES generated key pair.

4.How to Decrypt a File using AES generated key pair.

Read the rest of this entry »

Advertisement
Let’s Learn how to setup a complete Lab for Network Security Training, Penetration Testing Training as well As CCNA Cyber Ops Training.
This setup is not only for network security But you can use this Lab setup for Ethical Hacking Training ,Cyber Security Training.
This will help you to understand the Real world scenario of network setup and Cyber Attacks.

 

I have Designed the whole Lab setup in a Pattern and in simple steps that will make your lab setup easy and user friendly.

Read the rest of this entry »

Static Routing Lab using 3 routers in few simple steps. Let’s Learn to configure static routing using three routers in a circle using cisco packet tracer.

I am using three routers total for this static routing Lab and I am using cisco packet tracer software for this routing configuration Lab.

 

You can just configure this routing lab in few simple steps:

Assign Ip address on Each routers and PC.

Configure Static Route on each Routers for their indirectly connected networks.

Read the rest of this entry »

Basic routing lab using Two Router in Cisco Packet Tracer.Learn how to configure static routing using two routers very easily in just few simple steps. networking is not a rocket science,neither you need to know more coding or any programming language.It’s just a concept and once you read it you will surely get it.

Let’s have a look and see how i Have configured static routing using two routers in just two simple steps:

Read the rest of this entry »

Learn how to block telnet for specific network and allow for specific network using acl configuration on cisco router.This lab is all about how to block telnet on router using ACL. This lab is also about how to allow Telnet on router using ACL.

Simply this lab is all about acl configuration on cisco router to block or allow telnet packets for certain network.

After going through below article you will be easily able to block Telnet for any Network You want and at the same time you will be able to allow Telnet or even SSH for certain network.

Read the rest of this entry »

Learn to configure DHCP Server on Router and also learn how to setup ip helper address on Router.

How to configure a Router to work as a DHCP Server.
How to setup ip helper address on a Router
How to configure a Router to work as a DHCP Server for indirectly connected networks.

Note: In This Lab we are going To configure Router R1 as DHCP server.

Read the rest of this entry »

This is a ccna Lab showing how to block ping or how to block icmp protocol using ACL configuration on cisco routers.

Learn how to use acl on router to block ping packets. At the same time learn how to allow other packets like telnet ,ssh and other to be allowed on acl.

Read the rest of this entry »

Cyber Security Jobs are getting attentions of youth now a days. People ask me how to get cyber security Jobs, because many companies looking for experienced guys in this filed.

Now What? You have no Experience in cyber security what will you do then?

What did you all do to overcome this hurdle and gain the necessary experience to even be considered for the interview?

Many of ask me How to start my career in Cyber Security? They told me that their few friends have cyber security certifications and still they are not getting the job. What should we do now to get the job?

what should we do now to build a successful career in cyber security?

Read the rest of this entry »

Ethical Hacking Training by satish tiwary

100% Practical Ethical hacking Training at Ethical Hacking Tuition center Jaipur only By satish tiwary. This training Module is available for online students too.

Anyone who have basic knowledge of Operating system and Internet can join this training. You don’t need any extra talent to become an Ethical Hacker,Only thing required is correct approach and in depth practical knowledge of operating system and internet.

Ethical Hacking Course Brief:

Read the rest of this entry »

shutdown,suspending,hibernating and halting RHEL7 /Centos7.This tutorial is all about making things easier while restarting or power off your RHEL7 or CentOS 7 machines. I am writing this article only because i find so many people have so many questions from this small area.

Read the rest of this entry »

Learn to use netcat command in windows and kali Linux both. learn to communicate using netcat.Learn the installation  and configuration of netcat on windows and kali Linux.ncat is an important and light weight network penetration testing and ethical hacking tool available for almost all operating system.

Here we will discuss about ncat command or netcat or nc command line tool.

This tool is used for penetration testing as well as information gathering and gaining the access of any machine.

 

Read the rest of this entry »

This Tutorial is all about PUBG PC Gaming which you can play Live using Your PC or Laptop. It’s size is 23.5GB. And You need an account on STEAM and this game is not Free. You have to Pay Rs999 for this PUBG PC Version Games and it’s not Free like PUBG Mobile.

  1. FOR Playing PUBG PC GAME visit https://store.steampowered.com/
  2. Then Signup on STEAM
  3. Then Search PUBG games in its Library
  4. Select the game
  5. after that you will see the Price of the game which is 999 INR
  6. If you want to buy proceed by feeling your bank information.
  7. once checkout you just need to download the game which is 23.5 gb.

Read the rest of this entry »

How to configure Telnet server on Custom Port. Or you can say how to configure secure telnet server. Secure in the sense it is binded with a different port rather than telnet default port and so it become more difficult to hack or even port scanning tool or service scanning tool like nmap can’t scan it properly.

Our Telnet Server Machine is 192.168.225.38 and as we know by default Telnet works on PORT Number 23 but here in this lab we are going to run Telnet Service on a PORT 9898 which is a custom port and we have to tell the Linux Machine about this unknown Port.

Also Learn:

How to configure Telnet Server on Linux Machine.

Read the rest of this entry »

Learn to configure Telnet Server on redhat enterprise Linux Machine. Telnet is a remote Login Program. You can Divide Telnet in to Two parts: Telnet-Server and Telnet-Client. Telnet server is the Machine which allows users to login to it through remote and the machines which are logged in remotely through telnet on Telnet Server is known as Telnet Client.For this lab I have taken three Machines here. One RHEL5 machine as Telnet server and other two machines as a telnet client.

Also Learn: How to Configure Telnet server on Custom PORT

telnet server

Read the rest of this entry »

Learn to configure Proxy Server for your Web Server using xinetd. We are going to learn how to configure proxy server for any Web Services using xinetd in Linux. Here in this Article The Proxy Machine I have used is a RHEL5 Machine and I will show you in just few simple steps that how easily you can configure a Proxy server on your RHEL5 machine using XINETD.

Read the rest of this entry »

Linux Administration Test at ETHICAL HACKING TUITION CENTER

TOTAL question 1    Total Marks=100    PAss Marks=80

This is an open Test it means you can use Internet Friend and even any faculty even Notebook or Books.

 

Question: There are total 4 Machines Used in this Lab. If You want you can use More Than 4 Machines.

There will be Total 3 Linux Machines(RHEL) and 1 Windows Machine(Windows xp/7/8/10 or Server)

 

Users have to design flow chart Diagram with data distribution and coding inside PAINT for RAID 60, RAID100,RAID 01 and RAID 51

 

Note: You can’t use everything software,your gmail or hotmail id,usb device or any external hard disk to transfer this file from Windows Machine to Linux.

 

Linux Server 1 have NFS Server,TFTP Server,SSH Server

Linux Server 2 have samba server,HTTP Web server and Telnet server

Linux Server 3 have FTP server and Mail server

 

Linux Server1 is acting as a telnet proxy server for Linux Server 3 and Linux Server 3 acting as a telnet proxy server for Linux Server 1.

 

For Windows machines both Linux server 1 and Linux Server 3 acting as a Telnet Proxy.

 

four Different Websites hosted on Web server ,each for every user. And Each users have to design their website on their own machine and then anyhow they have to send it to web server.

 

All websites folders are shared through SAMBA to all other Linux server machines.

On Mail Servers Four users created such that each users can login and send email to each other.

 

The Data on NFS server is synced with TFTP server and hence with Windows Machine.

 

The data inside NFS Server will be the configuration notes of TFTP and Telnet Proxy of Linux Machine 1.

The data on NFS Server get protected through RAID-1 and that RAID-1 is supported by loop devices attached with file a and b.

 

Apache Web servers data getting redundancy with Flexibility.

Each Users website have Different size support.(means each users web folders have different size with redundancy.)

 

Note: File a and b which is connected with loop devices is actually inside TFTP server Directory.

 

 

 

EIGRP Configuration Lab in just few simple steps. This article is all about how easily we can configure EGRP on Cisco Router. To perform this lab we have used cisco packet tracer software here. As we know EIGRP is a Dynamic Routing Protocol and it’s work only for Interior gateway Routing protocol. Here in this lab we have taken two routers R1 and R2 and Total 3 Networks to understand EIGRP Configuration. Read the rest of this entry »

Learn to configure FTP service inside kali Linux Machine in just few simple steps. Mainly focused on ftp service package inside Kali Linux and configuration file of ftp service inside Kali Linux.Also learn how to manually allow specif user to access your ftp services in kali linux.And also learn how to stop anonymous user from accessing your ftp machine. Read the rest of this entry »

Could not get lock /var/lib/dpkg/lock-frontend – open (11: Resource temporarily unavailable)E: Unable to acquire the dpkg frontend lock (/var/lib/dpkg/lock-frontend), is another process using it?

If you getting such error you can easily resolved this in just few simple steps

Read the rest of this entry »