Saturday 31 October 2020

Use of Rainbow Crack to Exploit Windows

 Gone are the days when we have to wait for the days together to recover the Windows account password. Thanks to the rainbow crack technology, now we can crack the passwords in few seconds with 100% success rate.


This Rainbow cracking technology works on simple concept. Instead of computing the hashes for each password dynamically and comparing with the correct one during cracking, password hashes are computed in advance for all character sets. These hashes are then stored in datasets called rainbow tables.

So cracking involves just comparing the current password hash with the pre computed hashes within the rainbow tables and get the associated plain text password. Hence it takes very less time compared to the traditional method of brute force cracking. Setting up the rainbow table for various character sets is just one time activity and may take days or months based on the character set and speed of the machine. Once the rainbow tables are ready, you can feed the password hash to it and get your password cracked in seconds.

In order to recover your Windows user password, first you have to get the LM hash for the target user account. This can be done in many ways. You can use any of the tools such as pwdump, cain&abel or LC5. You need to have administrator privileges to dump the hashes using these tools. If you have lost administrator password itself, then you can boot the system using BackTrack live cd or Windows restore CD and then copy the SAM & SYSTEM hive files (which is located in c:\windows\system32\config folder. Note that your system drive may be different). Next feed these files to Cain & Abel tool to get the LM hashes for the target account.

Read more : lm password cracker

Wednesday 28 October 2020

Open Source Support Providers for IT managers

 It was much easier for IT managers back in the days when proprietary software was the only game in town: After figuring out what software would do the job best, all that was necessary was to license and install. Support might be included in the license or it might be extra, but either way it'd most likely be coming from the same source as the license, whether that be directly from the company developing the software or from a licensed partner.


Aside from compliance issues, with each major vendor having the contractual right to show up in the data center to perform an audit to make sure that all running instances were fully paid and in accordance with the contract, it was pretty much an uncomplicated arrangement: Pay to license the software, pay again for the support and put the software into service.

While most data centers are still licensing at least some proprietary software, much of what's running in modern data centers is open source. On one hand, the IT manager’s job is easier if it includes balancing a budget: money no longer needs to be spent on software or operating system licenses. Compliance audits are also all but nonexistent.

find more : ms lan manager

Monday 26 October 2020

Comcast Security Key role in Networking

 Wireless security is becoming more important in relation to easily available Wi-Fi. Securing your household wireless keeps you from being an easy target for hackers who could use your Internet for unsavory purposes. It's easy to get your security key through Comcast.


Step 1
Determine your router or gateway. Your manufacturer, model and number should be on the equipment. See Reference below for the list of Comcast supported equipment.

Step 2
Open your Internet browser.

Step 3
Enter the IP address in your browser's address bar. This will bring up a pop up asking for your "username" and "password." For the Linksys WCG200, for instance, the IP address

Step 4
Fill in the requested information. For a Linksys WCG200, the Comcast defaults are "username:" Comcast and "password:" 1234.

Step 5
Click on the tab marked "wireless" from your Gateway status page. This will take you to "basic wireless settings." On the toolbar, you will see a selection marked "wireless security." Click on the link.

Thursday 22 October 2020

Route Redistribution Role in Networking

 The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.


What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.

Tuesday 20 October 2020

Is NetServer Authentication needful for Networking

 If a client provides a LANMAN and an NTLM hash, only the NTLM hash is used unless the QZLSPWDANY$ share exists (or NetServer is configured to allow LANMAN authentication). This is because the NTLM hash is more secure. If only a LANMAN hash is provided (as was done by Windows 9x), that hash is used. NetServer does not support LMv2 hashes; therefore, LMV2 always fails. NTLM and NTLMv2 hashes are always accepted (with the restrictions in the table above) unless NetServer is configured for Kerberos-only authentication.


The QPWDLVL of the system does not affect the hashes that NetServer can accept. The thing that it does do is make the NTLM style hashes work with mixed-case Windows passwords. This is possible with QPWDLVL 2 and 3 because the system password can be mixed-case.

NetServer does not indicate to Windows to send a specific type of encryption. The only thing the server tells the client during the Negotiate is if extended security is supported by the server. The client will then try to negotiate whether to use Kerberos or password hashes. At no point does NetServer tell the client what form of password hash to use nor is there any way that NetServer could tell the client what form to use.

Also find : ms lan manager

Saturday 17 October 2020

My Security Key for My Router

 Wireless and grounded Internet connections offer quick Internet service for a consumer and their family. To protect their service from any intruders attempting to steal Internet, many people set up security keys for their routers. Unfortunately, security keys can sometimes be easily forgotten, restraining you from connecting to your own router. Gain entry to it by finding your original security key and recording it later in a safe place.


Step 1
Ensure that the connections on your router are all correct and secured. Make sure that your computer indicates it is connected to the router.

Step 2
Open the folder containing the network connections for your computer. For Windows users, click the "Start button," then click "Control Panel," and then select "Network Connections." Right-click on the icon for your router and click on "Status." Click the "Support" tab. Write down the number given as the default gateway. This will be an eight digit number with periods after the third, sixth and seventh digits.

Step 3
Open a web browser window.

Step 4
Type the default gateway number into the address bar of your browser window and hit "Enter." You may or may not use the prefix "http://," either way will work. This will bring you to the router configuration page. Search through the router settings listed for an entry titled "Security Key" or something similar. This will reveal the security key for that router.

Step 5
Contact the customer support number for your router's manufacturer if you still cannot locate your security key. Ask a customer service representative for any options you have for security key retrieval. In many cases, it may be easier to restore the factory settings on your router and set up the network again.

find more : network security level

Thursday 15 October 2020

Authentication is necessary for NetServer

 If a client provides a LANMAN and an NTLM hash, only the NTLM hash is used unless the QZLSPWDANY$ share exists (or NetServer is configured to allow LANMAN authentication). This is because the NTLM hash is more secure. If only a LANMAN hash is provided (as was done by Windows 9x), that hash is used. NetServer does not support LMv2 hashes; therefore, LMV2 always fails. NTLM and NTLMv2 hashes are always accepted (with the restrictions in the table above) unless NetServer is configured for Kerberos-only authentication.


The QPWDLVL of the system does not affect the hashes that NetServer can accept. The thing that it does do is make the NTLM style hashes work with mixed-case Windows passwords. This is possible with QPWDLVL 2 and 3 because the system password can be mixed-case.

NetServer does not indicate to Windows to send a specific type of encryption. The only thing the server tells the client during the Negotiate is if extended security is supported by the server. The client will then try to negotiate whether to use Kerberos or password hashes. At no point does NetServer tell the client what form of password hash to use nor is there any way that NetServer could tell the client what form to use.

Also find : ms lan manager

Tuesday 13 October 2020

LAN Monitor Software for your Managing Network, Traffic

 some tools are best fit purely for troubleshooting, but in the case of monitoring your LAN, a little bit of awareness can go a long way towards preventing problems before they happen.


There's a variety of software for monitoring your Local Area Network, both in terms of the devices attached to it as well as the traffic traversing it!

It's invaluable when trouble stirs to quickly discover the root of the cause, but there's more to it than just that – software with predictive alerts and monitoring can help you spend less time actively monitoring and more time focusing on other technical problems without sacrificing precious up-time

On a broad scale, LAN Monitoring software is great for keeping track of all the physical aspects of your network – the various devices connected to it, the servers that rely on it, the routing equipment that makes it function, and the systems that utilize it all.

Knowing a machine or server suddenly dropped offline as soon as, or even having it predicted slightly before, it happens is invaluable.

The happiest users are those who almost never realize anything is wrong because you're using the right software to predict and prevent problems as much as possible.

Also find : lan management

Monday 12 October 2020

Configuring Route Redistribution in Gaia Portal

 The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.


What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.

Sunday 11 October 2020

Hypertext Help with LaTeX Miscellaneous symbols

 Depending upon the context in which it is used, the "#" symbol can have different meanings in a LaTeX document. The "#" symbol may represent a "pound" sign, hash mark or a sharp musical note. The LaTeX markup language also uses the "#" character to designate the parameters for macro commands you create. You can instruct LaTeX to print out a special keyboard character like "#" by combining it with the "" or backslash character. Other special characters like the British pound sterling symbol, however, have their own, unique LaTeX command.


Special Character Markup
To instruct LaTeX to print a keyboard symbol like "#" on paper or within a PDF file, place the "" or backslash symbol immediately before the typed symbol. For example, if "#expert" is your hash tag, type the follow line in your LaTeX document:


find more : lm hash generator

Thursday 8 October 2020

IoT device sales set to surge in next decade

 Many IoT technologies have been slow to catch on, but Verizon's Cat M1 and similar networks will be game changers for IoT deployments, said Steve Hilton, an IoT analyst at Machnation.


Cat M1 is a low-power, wide area network (LPWAN) technology that competes most directly with other LPWAN networks like LoRa, Sigfox and Narrowband IoT, Hilton said. Cat M1 and Narrowband run on licensed spectrum, while the others run on unlicensed spectrum.


However, Verizon believes Cat M1 will also compete against Bluetooth, ZigBee and Z-Wave, wireless local area network (WLAN) technologies that connect to devices like thermostats and a wide array of appliances, such as washing machines and dryers.

"Cat M1 competes directly with Zigbee, Z-Wave and … Bluetooth," said Mike Lanman, Verizon senior vice president for IoT, in an interview. He added, however, "there will always be other connecting technologies, and some might make more sense economically."

know more : lanman server

Wednesday 7 October 2020

Computer Networks – Information, People, and Technology

 Computer networks allow users to connect over distances. They also enable file sharing, hardware sharing and instant communication, making them a convenient tool for the home and a necessity for offices and organizations like universities. A computer network consists of several components, each of which is important to making the network function properly.


Computers

The purpose of a network is to join computers together. For this to work, the first step in setting up a network is to identify computers and users who may wish to participate in the network. The computers will also need to include software than enables them to connect to the network. Not every computer on the network needs to be running the same operating system. This is true even if users of different types of computers plan to share files, as long es each computer has the appropriate software for opening that file type.

Modems

Modems are devices that enable computers to interpret data they receive from a network, and also allow them to send information in the proper format to be read by other computers on the network. The term modem actually means modulator/demodulator, referring to the two jobs the device performs.

Routers

Routers, also known as hubs, are another link in the network chain. A router, as its name implies, routes the network signal from the modem to the computer. In some network designs, routers may be unnecessary. But in other instances, such as home and office networks with multiple computers, they are essential.

Also read : network security level

Tuesday 6 October 2020

Do Not Store LAN Manager Hash Value

 MaxCmds actually serves the same purpose as the MaxMpxCt on the Fileserver. Not surprisingly these two parameters have a special relationship. It’s like this: whenever an SMB session is setup (i.e. a shared file is accessed), the SMB session is negotiated. During this negotiation the Fileserver passes down the value of MaxMpxCt to the client (a Terminal server for example). The client then compares this value to his own MaxCmds value. The lower of the two values then is used to set a maximum on the number of outstanding client requests to the File server.


Possible values: 1-65535

MaxThreads
The MaxThreads specifies how many threads are allowed to run at once. (Each thread allows one outstanding operation.) By increasing this you can increase the amount of simultaneous work. Each extra execution thread will take 1 Kbyte of additional NonPaged pool memory.

Possible values: 1-255

MaxCollectionCount
Specifies the amount of data that must be present in the buffer of the redirector to trigger a write operation. If the amount of data in the buffer meets or exceeds this value, then it is written immediately. Otherwise, it is retained in the buffer until either more data is added or the value of the CollectionTime entry expires.

Possible values: 1-65535

Monitoring
Problems stemming from poor fileserving performance can sometimes be a bit tricky to pinpoint. One way to make sure is by using good ol’ perfmon. The problem with interpreting perfmon counters is that you can never know what the "right" value is unless you have baselined your environment properly. So what to monitor and how to interpret those values is entirely up to you. However, there are some counters you can monitor that I can give some basic tips on. Configure perfmon to monitor the following counters:

Physical Disk
You can measure this on the Terminal Server as well, but you should start at the file server. If the queue length is more than one for a sustained period of time, then your disks are hyperventilating. Give them some air: up your I/O throughput. Look on the software-side: are you paging a lot? (that'll kill your I/O throughput right there) or is your system disk heavily fragmented? Or on the hardware side: buy faster disks (15K SCSI) or upgrade your RAID controller.

know more : ms lan manager

Monday 5 October 2020

How to Get Support for Open Source Software

 It was much easier for IT managers back in the days when proprietary software was the only game in town: After figuring out what software would do the job best, all that was necessary was to license and install. Support might be included in the license or it might be extra, but either way it'd most likely be coming from the same source as the license, whether that be directly from the company developing the software or from a licensed partner.


Aside from compliance issues, with each major vendor having the contractual right to show up in the data center to perform an audit to make sure that all running instances were fully paid and in accordance with the contract, it was pretty much an uncomplicated arrangement: Pay to license the software, pay again for the support and put the software into service.

While most data centers are still licensing at least some proprietary software, much of what's running in modern data centers is open source. On one hand, the IT manager’s job is easier if it includes balancing a budget: money no longer needs to be spent on software or operating system licenses. Compliance audits are also all but nonexistent.

find more : ms lan manager

Sunday 4 October 2020

NetServer Authentication and Security Considerations

 If a client provides a LANMAN and an NTLM hash, only the NTLM hash is used unless the QZLSPWDANY$ share exists (or NetServer is configured to allow LANMAN authentication). This is because the NTLM hash is more secure. If only a LANMAN hash is provided (as was done by Windows 9x), that hash is used. NetServer does not support LMv2 hashes; therefore, LMV2 always fails. NTLM and NTLMv2 hashes are always accepted (with the restrictions in the table above) unless NetServer is configured for Kerberos-only authentication.


The QPWDLVL of the system does not affect the hashes that NetServer can accept. The thing that it does do is make the NTLM style hashes work with mixed-case Windows passwords. This is possible with QPWDLVL 2 and 3 because the system password can be mixed-case.

NetServer does not indicate to Windows to send a specific type of encryption. The only thing the server tells the client during the Negotiate is if extended security is supported by the server. The client will then try to negotiate whether to use Kerberos or password hashes. At no point does NetServer tell the client what form of password hash to use nor is there any way that NetServer could tell the client what form to use.

Also find : ms lan manager

Router Role in Networking

  The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based...