satish tiwary

ccna ccnp linux ethical hacking cyber-security Tutorials and Training both classroom and Online Training.Linux,Networking,Ethical Hacking Projects for Final year Engineering Graduates. cisco packet tracer Labs and Projects guide with training and Tutorial.

Home Top Ad

Learn How to connect a host PC to Your Devices in GNS3. At the same time also learn Creating PC LoopBack Network Adapter. Actually her...

Learn How to connect a host PC to Your Devices in GNS3.

At the same time also learn Creating PC LoopBack Network Adapter.


Actually here we are learning to Connect GNS3 topology to Host computer.

Connecting GNS3 to local Machine is so simple if you learn these steps and follow as it is.

I hope you got your answer of the question How to connect Windows HOST Machine with GNS3 Machine.

This tutorial is all about NFS server configuration on Linux. mainly on redhat Linux,centos  Linux. NFS server and NFS Client Setup In RedH...

This tutorial is all about NFS server configuration on Linux. mainly on redhat Linux,centos  Linux.

NFS server and NFS Client Setup In RedHat Linux:










This tutorial is all about how to configure DNS on Cisco Router. I have used GNS# software to show DNS Configuration on Cisco router.

This tutorial is all about how to configure DNS on Cisco Router.
I have used GNS# software to show DNS Configuration on Cisco router.



Today I am going to explain you how to use brute force attack using Metasploit to access telnet server. You will learn metasploit attac...


Today I am going to explain you how to use brute force attack using Metasploit to access telnet server.

You will learn metasploit attack on telnet server explained with an example lab.

So in just few simple steps i will explain metasploit attack and meterpreter attack explained with an example lab using virtuslabox,kali Linux and redhat enterprise Linux.

Learn the usage of Metasploit and use it to hack tlnet machine or telnet server configured on and machine.Learn meterpreter usage with an example and gain access of telnet server through meterpreter.

Brute force attack on telnet using Metasploit.Access Telnet server using Metsaploit and Meterpreter.



This is the Best time to buy domain name and web hosting plan from GoDaddy. GoDaddy Providing up to 85% discounts using so many coupons wh...

This is the Best time to buy domain name and web hosting plan from GoDaddy. GoDaddy Providing up to 85% discounts using so many coupons which are freely available on internet.

You can see complete Web Hosting Price with domain name on godaddy in Just $14.16:




You can use the below promo code for buying wordpress hosting plan on GoDaddy. its working.



Buy Domain in just 1$ at GoDaddy.com

You want the proof? lets see below snapshot i have taken for you guys.
I have bought ccnalinux.com domain name in just 1 $ and you can see it clearly in below image with proof.



Let's see the Receipt Send by GoDaddy:








How to Setup proxy in kali Linux with tor and proxychains. This tutorial is all about tor configuration and proxychain configuration in ...

How to Setup proxy in kali Linux with tor and proxychains.

This tutorial is all about tor configuration and proxychain configuration in kali linux.



We will learn how to be anonymous or how to hide our ip address in kali linux.


Setup proxy in kali Linux with tor and proxychains.

Tor and Proxychains configuration inside kali linux.


Remember if you are using Kali linux then proxychain is already installed on your kali Linux Machine.


If you don't find proxychain inside your kali linux machine use below command to install proxychain.


#apt-get install proxychain


Now check the status of TOR using below command.



#service tor status


If tor is running then its ok if not then start tor service using below command.


#service tor start


To stop Tor and use Proxychains with custom proxies:

# service tor stop



Locate Directory Of Proxychains


open terminal and type below command.
#locate proxychains

Now how to Configure Proxychains

Modify the configuration file with vim or nano editor

#vim /etc/proxychains.conf

just add this line in this file



socks4  127.0.0.1 9050

How to connect a host PC to Your Devices in GNS3

Learn How to connect a host PC to Your Devices in GNS3. At the same time also learn Creating PC LoopBack Network Adapter. Actually her...