Beruflich Dokumente
Kultur Dokumente
A)
The three different techniques of protecting our identity and remaining anonym
ous on internet,we need to use
Google Language Translator,
Web Based Proxy and
Proxy Chains.
c)For ankitfadia.in it is
Apache /1.3.41 web Server at corp6.net4india.com
For relainceworld.in it is
nginx web server
D)
Ping Results For : www.ankitfadia.in
PING www.ankitfadia.in (202.71.129.152) 56(84) bytes of data.
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=0 ttl=53 time=318 ms
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=1 ttl=53 time=317 ms
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=2 ttl=53 time=318 ms
64 bytes from hgw.net4india.com (202.71.129.152): icmp_seq=3 ttl=53 time=318 ms
--- www.ankitfadia.in ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3003ms
rtt min/avg/max/mdev = 317.440/318.367/318.928/0.800 ms, pipe 2
Traceroute Result For :www.ankitfadia.in
202.71.129.152 is from India(IN) in region Southern and Eastern Asia
TraceRoute to 202.71.129.152 [www.ankitfadia.in]
Hop (ms) (ms) (ms) IP Address Host name
1 41 39 27 72.249.128.109 -
2 23 17 20 206.123.64.22 -
3 44 35 18 64.129.174.181 64-129-174-181.static.tw
telecom.net
4 19 38 74 89.149.183.114 xe-0-2-0.nyc30.ip4.tinet
.net
5 90 48 74 77.67.71.118 bharti-airtel-gw.ip4.tin
et.net
6 75 463 55 77.67.71.118 bharti-airtel-gw.ip4.tin
et.net
7 327 404 309 125.21.167.26 -
8 325 314 318 125.21.167.26 -
9 361 311 322 203.101.100.186 -
10 331 313 314 203.101.100.186 -
11 364 355 320 61.95.255.138 -
12 324 326 338 202.71.129.152 hgw.net4india.com
Trace complete
E:Part 1,
The "WHOIS" on www.ankitfadia.in is...
Domain ID:D3847266-AFIN
Domain Name:ANKITFADIA.IN
Created On:26-Oct-2009 22:58:05 UTC
Last Updated On:26-Dec-2009 19:20:06 UTC
Expiration Date:26-Oct-2014 22:58:05 UTC
Sponsoring Registrar:Net4India (R7-AFIN)
Status:OK
Registrant ID:N4R-235108235108
Registrant Name:Ankit Fadia
Registrant Organization:
Registrant Street1:PO BOX 11223,
Registrant City:Stanford
Registrant State/Province:DADRA AND
Registrant Postal Code:94305
Registrant Country:IN
Registrant Phone:+91.12345678
Registrant *****************@gmail.com
Admin ID:N4R-235108235108
Admin Name:Ankit Fadia
Admin Organization:
Admin Street1:PO BOX 11223,
Admin City:Stanford
Admin State/Province:DADRA AND
Admin Postal Code:94305
Admin Country:IN
Admin Phone:+91.12345678
Tech ID:N4R-235108235108
Tech Name:Ankit Fadia
Tech Organization:
Tech Street1:PO BOX 11223,
Tech City:Stanford
Tech State/Province:DADRA AND
Tech Postal Code:94305
Tech Country:IN
Tech Phone:+91.12345678
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech *****************@gmail.com
Name Server:NS1.NET4INDIA.COM
Name Server:NS2.NET4INDIA.COM
Name Server:
E:Part 2,
The general steps for dns spoofing on victim's computer are:
1) The attacker needs to send a request to victim's DNS Server asking it to reso
lve www.attacker.net
2) Victim's DNS Server is not aware of this machine IP address, it doesn't belon
gs to his domain, so it needs to ask
to the responsible name server.
3) The hacked DNS Server will reply to victim's DNS server, and at the same time
, giving all his records.
This process is called a zone transfer.Here it is hacked DNS Server because the
attacker customized the records in
his own DNS server. This will resulting the DNS spoofing on victim s computer.
F)
a,
For www.relianceworld.in on ports 100-500
The result for scans scanning is
"All 401 scanned ports on the host are filtered".
The result for "Daemon banner grabbing" (-sV)scan is
"No response".
b,
For www.ankitfadia.in on ports 100-500
The results for port scannings
"TCP SYN scan(-sS)","UDP scan(-sU)"are having
393 open|filtered ports
PORT STATE SERVICE
110/udp closed pop3
113/udp closed auth
123/udp closed ntp
143/udp closed imap
199/udp closed smux
366/udp closed odmr
433/udp closed nnsp
443/udp closedc https
"TCP header scan(-sT)"is
394 filtered ports
PORT STATE SERVICE
110/udp closed pop3
113/udp closed auth
123/udp closed ntp
143/udp closed imap
199/udp closed smux
366/udp closed odmr
433/udp closed nnsp
443/udp closedc https
"TCP NULL(-sN)",Xmas scan (-sX)and FIN(-sF),is
392 closed ports
PORT STATE SERVICE
111/tcp open|filtered rpcbind
143/tcp open|filtered unknown
135/tcp open|filtered msrpc
136/tcp open|filtered profile
137/tcp open|filtered netbios-ns
138/tcp open|filtered netbios-dgm
139/tcp open|filtered netbios-ssn
161/tcp open|filtered snmp
445/tcp open|filtered microsoft-ds