How to hide your Public IP Address using Kali Linux Anonymizer

In this Tutorial we will Learn how to hide our public ip address in kali Linux using Anonymizer Tool.If you are learning ethical hacking or working as a cyber expert the first thing you have to do is to protect yourself from hackers and for this first thing you have to do is to hide your Public IP Address and be anonymous. In this section i have explained or shows you complete step how to be anonymous using Kali Linux.

How to Configure NFS Server on Windows 7

Usually we configure NFS Server on Linux/Unix Machine for File sharing in Network between Unix Machines,But here in this tutorial we learn how to configure a Windows 7 machine as NFS Server.
I have used third party software named hanewin nfs package to install nfs package on windows and configure NFS Server on Windows7 machine.

If you want to configure NFS Server on Linux you can easily configure NFS server.

Usually people know that NFS Server is configured on Linux Machine only for sharing files with Linux clients. But that's half truth. In real world today we can easily configure NFS on windows Machine also. 


If you want to configure NFS Server with NIS Server and Autofs on Red Hat Enterprise Linux you can watch this video.

First we need to configure NIS SERVER.We set NIS DOMAIN NAME and then we will configure NFS Server and after that we will configure Autofs Server for automation process.Not forget to configure Firewall and Selinux otherwise your configuration will not work.

Practical Implementation of NIS NFS and Autofs Server on Red Hat Enterprise Linux.



You can submit this project in your Engineering Major Project.This is very helpful for computer science students.



How to setup and configure hostname in Red Hat Enterprise Linux 7

This tutorial is completely about hostname setup and hostname configuration in Red Hat Enterprise Linux 7. so if you are new to RHEL7  and you want to setup or configure hostname in your RHEL7 Machine then this tutorial is for you.Watch the below video carefully and you will very easily learn to configure hostname in RHEL7 Linux.


Why we set hostname in Linux machine?

Assigning a hostname to a PC or HOST is just like giving a name to an IP.
HOST means all the computers in a network.Each computer is a host in a network and the ip address assigned to that host machine or that computer is host address and the name given to that particular pc or computer or host is hostname.


Difference between HOST ADDRESS & HOSTNAME


IP assigned to the host pc or any pc in a network is known as host address and the name assigned to any pc or host in a network is known as hostname.


Why it necessary to set HOSTNAME in Linux?

see it's not easy for anyone to remember ip address so we need a name for each ip in our local network to differentiate or to identify specific machine easily and to make our task easy.





Apache Web server configuration in RHEL 7

In this tutorial we will learn how to install , configure and manage Apache web server in redhat Enterprise Linux 7.Here we follow simple steps to configure Apache web server.So finally you can say this is a simple and basic tutorial to configure and manage http server on redhat enterprise linux 7.



Step 1:configure Yum server on RHEL7


Step 2:Install http package using yum

# yum install http* -y


Step 3: Using firewall allow http service to get accessed.

#firewall-cmd  --permanent  -add-service=http
#firewall-cmd  --permanent  -add-service=https
#firewall-cmd  --reload


Step 4:Restart and enable Apache Service in RHEL7

#systemctl restart httpd
#systemctl enable httpd


Step 5:go inside /var/www/html folder and create index.html or index.php file according to your requirement.You can see in video.


Step 6:repeat step 4

Step 7:If you want to access your site with name you can set hostname to your RHEL machine.







Network Security Related terminology you must know

Here in this article i am including the important terminology we need to know if we are working as a system engineer ,network engineer,system administrator whether Linux or Windows admin didn't matter.Here i will provide you the complete list of terms we need to know in networking or system admin field.Here in this tutorial i have discussed about various topics like pap,chap,asynchronous,,Tokens,throughput,RADIUS SERVER,TACACS,AAA,Data owner,subject,object,baseline,policies,procedures,standard,guideline,ARO,SLE etc




Risk = Threat * Vulnerability


If we consider the topi regarding IT sector then Risk consists of these two important thing Threat and Vulnerability.where there is no Threat there is no risk.If there is Vulnerability in your system or Network and there is also threat of attack then risk is multiple effect of vulnerability.


ALE = Annualized Loss Expectancy


This is an important terminology and every IT company have almost a separate department to handle ALE.

AV = Asset Value


If you have a little knowledge off commerce field you can easily understand what asset value is.In short you understand it is a type of business valuation.


EF 

EF means Exposure Factor - % of value lost


SLE 

SLE stand for Single Loss Expectancy, the cost of a single loss.


ARO 

ARO stands for  Annual Rate of Occurrence (number of losses)


TCO 

 Total Cost of Ownership combining upfront costs and annual costs of maintenance

POLICIES:


Policies are high-level management directives that don't go into specifics.

PROCEDURES:


Procedures are step-by-step guides for accomplishing a task

Standard: 

describes specific use of technology

Guideline: 

recommendations (discretionary)

Baseline:

 uniform ways of implementing a safeguard

Data Owner 

management employee responsible for ensuring protection of specific data

AAA 

Authentication, Authorization, and Accountability


Least privilege

 says minimum amount required to do.
 privileges are defined in every level whether it os operating system based or networking based.
operating system have several users created on privilege based. Administrator user have   highest privilege than other and Guest user have least privileges than others.In Linux root have highest privilege.
In network deices like Routers and switches also have different privilege levels.

Need to know is more granular

Subject 

 active entity on a data system

Object 

As we are here talking about computer and network system.In IT Sector or in computer field or networking department by saying OBJECT we mean passive data within the system.


Discretionary 

Discretionary mean full control of objects they have access to


Mandatory 

mandatory means system-enforced based on labels


RBAC 

role based, non-discretionary

Task-based = another non-discretionary method


RADIUS 

 Uses UDP 1812 and 1813. AAA system.
RADIUS request and response data is carried in
8-bit AVPs (Attritbute Value Pairs)

Diameter 

RADIUS' successor with more accountability and a 32-bit AVP field.


TACACS 

Tacacs is used for authentication and autheriation.
It is a centralized access control system that uses UDP port 49 and may use TCP

PAP and CHAP 

PAP stands for password authentication protocol and CHAP stands for challenged handshake authentication protocol.both used PPP connection.

You can READ:PAP Configuration Tutorial on cisco Router.

You can READ: CHAP Configuration on Cisco router.


PAP is plaintext so not so secure, while CHAP uses three way handshake. so chap is  better than pap.


Objects have labels, and you have to have clearance to see them.

Synchronous Dynamic Tokens 

While talking about Synchronous Dynamic Tokens one must know that it't refresh every 60 seconds. Use time or counters to synchronize a code with the AS.

Asynchronous Tokens 

 It is little different from Synchronous Dynamic Tokens and is not synchronized with central server. Challenge-response.


Throughput 

 As we all know it is the most important point for any company institute or organiation and that is throughput. It is actually the biometric system response time.

make windows7/8/10 usb bootable using windows command promt

Suppose you dont't have DVD writter in your Laptop or PC and you want to install Windows operating system in your laptop or PC or you just want to format your laptop just to increase the performance of your laptop or PC.Then you need to know how to use a usb device to format your pc or laptop and how to install windows7 windows8 or window10 using USB Device. Once you learn how to install windows7/8/10 inside your laptop or PC from usb device you dont need DVD writter.

In this tutorial we will learn how to make a usb device windows7 or windows8/10 usb bootable using windows command promt.We don't need any third party software to make usb bootable.
If you want to learn all the steps just follow the video and watch it till end and you will learn it in very simple way. If by chance you face any problem even after watching video or you not able to boot your usb device you can ask me here or on my YouTube channel through comment section.I will love to answer your question and if you have any suggestion feel free to share with me.

100 Web Vulnerabilities you should know as a Web application Penetration Tester

100 Web Vulnerabilities you should know as a Web application Penetration Tester If you are working as web application penetration testing en...