Sie sind auf Seite 1von 6

FULL NAME : ANNE VIJAY

A)
The three different techniques of protecting our identity and remaining anonym
ous on internet,we need to use
Google Language Translator,
Web Based Proxy and
Proxy Chains.

B)"SHORTENED URL VULNERABILITES"


URL Shortening is the technique taht allows users to access the same webpage usi
ng a normal long web address and also its equivalent
shortened address.
And where as the vulnerabilites regarding this shortened URL is that we cant kno
w to which real address it belongs
to and weather it is having any files (virus or some unwanted .exe files) attach
ed to it,and when we open the shortened URL any
program may run in backdoor silently without knowing which cause the damage to t
he system,but still can be protected.
A very good idea to get protected against the "Shortened URL vulnerabilites" is
to preview the link,which can be done in many ways
say
add ('+'or '=' after the shortened URL) or add the terms ('preview'or 'preek'jus
t after the http:// and followed by the remaining
URL)
For ex: The shortened link created is " http://bit.ly/9pRRTI "
and is previewed just by adding (+) after the link say "http://bit.ly/9pRRTI+"

c)For ankitfadia.in it is
Apache /1.3.41 web Server at corp6.net4india.com
For relainceworld.in it is
nginx web server

D)
Ping Results For : www.ankitfadia.in
PING www.ankitfadia.in (202.71.129.152) 56(84) bytes of data.
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=0 ttl=53 time=318 ms
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=1 ttl=53 time=317 ms
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=2 ttl=53 time=318 ms
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=3 ttl=53 time=318 ms
--- www.ankitfadia.in ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3003ms
rtt min/avg/max/mdev = 317.440/318.367/318.928/0.800 ms, pipe 2
Traceroute Result For :www.ankitfadia.in
202.71.129.152 is from India(IN) in region Southern and Eastern Asia
TraceRoute to 202.71.129.152 [www.ankitfadia.in]
Hop (ms) (ms) (ms) IP Address Host name
1 41 39 27 72.249.128.109 -
2 23 17 20 206.123.64.22 -
3 44 35 18 64.129.174.181 64-129-174-181.static.tw
telecom.net
4 19 38 74 89.149.183.114 xe-0-2-0.nyc30.ip4.tinet
.net
5 90 48 74 77.67.71.118 bharti-airtel-gw.ip4.tin
et.net
6 75 463 55 77.67.71.118 bharti-airtel-gw.ip4.tin
et.net
7 327 404 309 125.21.167.26 -
8 325 314 318 125.21.167.26 -
9 361 311 322 203.101.100.186 -
10 331 313 314 203.101.100.186 -
11 364 355 320 61.95.255.138 -
12 324 326 338 202.71.129.152 hgw.net4india.com
Trace complete

Ping Results For : 203.94.11.12


PING 203.94.11.12 (203.94.11.12) 56(84) bytes of data.
--- 203.94.11.12 ping statistics ---
5 packets transmitted, 0 received, 100% packet loss, time 3999ms
Traceroute Result For :203.94.11.12
203.94.11.12 is from China(CN) in region Southern and Eastern Asia
TraceRoute to 203.94.11.12
Hop (ms) (ms) (ms) IP Address Host name
1 12 12 20 72.249.128.109 -
2 41 18 21 206.123.64.82 -
3 81 103 132 64.129.174.181 64-129-174-181.static.tw
telecom.net
4 41 49 45 66.192.241.218 lax2-pr1-ge-1-0-0-0.us.t
wtelecom.net
5 264 236 232 219.158.30.201 -
6 272 267 266 219.158.3.121 -
7 277 283 340 219.158.4.106 -
8 292 290 271 219.158.21.242 -
9 286 323 305 112.64.240.222 -
10 308 283 283 112.64.241.154 -
11 250 267 277 58.247.223.146 -
12 253 236 248 210.22.78.130 -
13 201 188 194 203.94.0.46 -
14 244 232 218 172.30.1.1 -
15 Timed out Timed out Timed out -
16 Timed out Timed out Timed out -
17 Timed out Timed out Timed out -
18 Timed out Timed out Timed out -
Trace aborted.

Ping Results For : 203.94.12.11


PING 203.94.12.11 (203.94.12.11) 56(84) bytes of data.
--- 203.94.12.11 ping statistics ---
5 packets transmitted, 0 received, 100% packet loss, time 3998ms
Traceroute Result For : 203.94.12.11
203.94.12.11 is from China(CN) in region Southern and Eastern Asia
TraceRoute to 203.94.12.11
Hop (ms) (ms) (ms) IP Address Host name
1 141 91 51 72.249.128.109 -
2 218 213 79 206.123.64.22 -
3 111 86 64 64.129.174.181 64-129-174-181.static.tw
telecom.net
4 122 148 129 66.192.241.218 lax2-pr1-ge-1-0-0-0.us.t
wtelecom.net
5 278 314 301 219.158.27.149 -
6 298 215 234 219.158.11.189 -
7 264 253 259 219.158.13.181 -
8 273 268 298 219.158.21.242 -
9 326 335 311 112.64.240.130 -
10 262 288 316 112.64.241.154 -
11 297 334 380 58.247.223.146 -
12 Destination host unreachable Timed out Destination host unreach
able -
13 Timed out Timed out Timed out -
14 Timed out Timed out Timed out -
15 Timed out Timed out Timed out -
Trace aborted.

E:Part 1,
The "WHOIS" on www.ankitfadia.in is...

Domain ID:D3847266-AFIN
Domain Name:ANKITFADIA.IN
Created On:26-Oct-2009 22:58:05 UTC
Last Updated On:26-Dec-2009 19:20:06 UTC
Expiration Date:26-Oct-2014 22:58:05 UTC
Sponsoring Registrar:Net4India (R7-AFIN)
Status:OK
Registrant ID:N4R-235108235108
Registrant Name:Ankit Fadia
Registrant Organization:
Registrant Street1:PO BOX 11223,
Registrant City:Stanford
Registrant State/Province:DADRA AND
Registrant Postal Code:94305
Registrant Country:IN
Registrant Phone:+91.12345678
Registrant *****************@gmail.com
Admin ID:N4R-235108235108
Admin Name:Ankit Fadia
Admin Organization:
Admin Street1:PO BOX 11223,
Admin City:Stanford
Admin State/Province:DADRA AND
Admin Postal Code:94305
Admin Country:IN
Admin Phone:+91.12345678
Tech ID:N4R-235108235108
Tech Name:Ankit Fadia
Tech Organization:
Tech Street1:PO BOX 11223,
Tech City:Stanford
Tech State/Province:DADRA AND
Tech Postal Code:94305
Tech Country:IN
Tech Phone:+91.12345678
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech *****************@gmail.com
Name Server:NS1.NET4INDIA.COM
Name Server:NS2.NET4INDIA.COM
Name Server:
E:Part 2,
The general steps for dns spoofing on victim's computer are:
1) The attacker needs to send a request to victim's DNS Server asking it to reso
lve www.attacker.net
2) Victim's DNS Server is not aware of this machine IP address, it doesn't belon
gs to his domain, so it needs to ask
to the responsible name server.
3) The hacked DNS Server will reply to victim's DNS server, and at the same time
, giving all his records.
This process is called a zone transfer.Here it is hacked DNS Server because the
attacker customized the records in
his own DNS server. This will resulting the DNS spoofing on victim s computer.

F)
a,
For www.relianceworld.in on ports 100-500
The result for scans scanning is
"All 401 scanned ports on the host are filtered".
The result for "Daemon banner grabbing" (-sV)scan is
"No response".

b,
For www.ankitfadia.in on ports 100-500
The results for port scannings
"TCP SYN scan(-sS)","UDP scan(-sU)"are having
393 open|filtered ports
PORT STATE SERVICE
110/udp closed pop3
113/udp closed auth
123/udp closed ntp
143/udp closed imap
199/udp closed smux
366/udp closed odmr
433/udp closed nnsp
443/udp closedc https
"TCP header scan(-sT)"is
394 filtered ports
PORT STATE SERVICE
110/udp closed pop3
113/udp closed auth
123/udp closed ntp
143/udp closed imap
199/udp closed smux
366/udp closed odmr
433/udp closed nnsp
443/udp closedc https
"TCP NULL(-sN)",Xmas scan (-sX)and FIN(-sF),is
392 closed ports
PORT STATE SERVICE
111/tcp open|filtered rpcbind
143/tcp open|filtered unknown
135/tcp open|filtered msrpc
136/tcp open|filtered profile
137/tcp open|filtered netbios-ns
138/tcp open|filtered netbios-dgm
139/tcp open|filtered netbios-ssn
161/tcp open|filtered snmp
445/tcp open|filtered microsoft-ds

TCP ACK scan(-sA) is


395 unfiltered ports
PORT STATE SERVICE
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds

The result for "Daemon banner grabbing"(-sV)scan is


393 filtered ports
PORT STATE SERVICE VERSION
110/tcp Closed pop3
113/tcp Closed auth
123/tcp Closed ntp
143/tcp Closed imap
199/tcp Closed smux
366/tcp Closed odmr
433/tcp Closed unknown
443/tcp Closed https
and the system is up.
C,
For 203.94.11.12 on ports 100-500 is
There is"No response" form any scans of Port Scanning and the host seems to be
"DOWN".
The "Daemon banner grabbing"scan(-sV)is also
"not responding ".

Das könnte Ihnen auch gefallen