Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
What is a MS Windows Network Drive
1. What is a MS Windows network drive?
Drive letters are only of relevance within a MS Windows environment,
and has no relevance on other Operating Systems. In other words it's
ONLY a MS way of assigning a disk resource.
It is a drive letter assigned LOCALLY to a LAN filespace resource. This
drive letter is only valid for use on the LAN and has NO relevance on
WANs, including the Internet.
If some disk space is made available to users, and the user has
permission to access this resource, then on a MS Windows machine
only, and assuming the correct network protocols are being used, then
this disk space can be assigned to a drive letter.
2.
3. dforbes on 'SATURN (nthomes.inf.brad.ac.uk)' is assigned to drive z:
in this example the contents of 'dforbes' filespace on the server called
'SATURN' is assigned to a drive letter z:.
So drive z: is only of relevance to 'dforbes' on his machine. Other users
can also be using a drive z:, but their z: will contain completely different
files from the 'dforbes' user filestore area.
... One drive letter ..... different filestores .... lots of confusion.
4. How is a filestore assigned to a drive letter?
In 'Windows Explorer' , 'My Network Places', 'Entire Network', 'Microsoft
Windows Network', available workgroups and domains on the LAN are
viewable.
If you are a registered user in a domain, you can enter and view
resources, otherwise.....
Assuming a workgroup or domain service is available.........open the
command prompt.
5. To view all workgroups and domains on the LAN, type:
c:> net view
If a machine called, say, 'SATURN' is available to you, then connect in the
following way.
c:> net use k: SATURNWebSpace
c:> net use z: SATURNdforbes
The command completed successfully.
SATURN is a Windows compatible NETBIOS name for the server, which is
actually a Unix machine pretending to be a Windows server.
The 'real' name of SATURN is 'nthomes.inf.brad.ac.uk' and 'saturn.inf.brad.ac.uk'.
How can a Unix filestore 'pretend' to be a Windows filestore?
The protocols used are called SMB or 'Server Message Blocks' which are an open
standard. The information transfer using SMB looks the same on a Unix box
running a SAMBA server, as on a Windows box running FileServer.
6. Internet Hacking Tools - Unix and Windows
What must I understand completely to be a beginner?
• telnet
• ftp
Use telnet to linux1.inf.brad.ac.uk
telnet linux1.inf.brad.ac.uk
7. Tools to hack with
• YoLinux: List of Linux Security and Hacker Software Tools
http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
• Unix tools track hackers
http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm
http://www.antihackertoolkit.com/tools.html
• For DNS lookups use -
'dig' (domain information groper) or
host -a 143.53.29.129 ns2.splice1.com or
nslookup Note: nslookup is deprecated and may be removed from future
releases. or
http://www.dns.net/dnsrd/tools.html
C:>nslookup 143.53.29.129 ns1.splice1.com
Server: server4.splice1.com
Address: 66.45.242.178
Name: d209.inf.brad.ac.uk
Address: 143.53.29.129
C:>
8. Where is the site hosted?
traceroute/tracert
Is the site on-line?
ping
Is there a back door or way in?
nmap
How is the network routing configured?
netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
143.53.28.0 * 255.255.255.0 U 0 0 0 eth1
169.254.0.0 * 255.255.0.0 U 0 0 0 eth1
127.0.0.0 * 255.0.0.0 U 0 0 0 lo
default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1
How are the network cards configured?
ifconfig/ipconfig
satan - Security Administrator Tool for Analyzing Networks
9. Internet Corporation for Assigned Names and Numbers (ICANN)
http://www.icann.com/
www.internic.net:
• The InterNIC® web site is a public information resource for Internet users
worldwide.
• It provides information on the domain-name system, the domain-name
registration process, and domain-name registrars.
• To access information regarding registered domains, please go to the Registry
Whois.
10. • For Whois information about country-code (two-letter) top-level domains, try
Uwhois.com.
• http://www.whois.net/
• http://www.betterwhois.com/
• http://www.nic.uk/
• Nominet UK is the registry for .uk internet names.
• Manages the authoritative database of .uk domain name registrations.
• A not-for-profit company - has members instead of shareholders.
• Nominet is officially recognised as the .uk domain name registry by the internet
industry, users and the UK Government.
11. What Is a Mail Message?
• A mail message generally consists of
• a message body, which is the text of the
message,
• and special administrative data specifying
recipients, transport medium, etc., as you see
when you look at an envelope of a real letter.
12. A typical mail header may look like this:
Return-Path: <ph10@cus.cam.ac.uk>
Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by
al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for
<terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100
Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp (Exim 3.13
#1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000
Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT)
From: Philip Hazel <ph10@cus.cam.ac.uk>
Reply-To: Philip Hazel <ph10@cus.cam.ac.uk>
To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com>
Subject: Electronic mail chapter
In-Reply-To: <38921283.A58948F2@animats.net>
Message-ID: <Pine.SOL.3.96.1000130111515.5800A-200000@ursa.cus.cam.ac.uk>
13. This list is a collection of common header fields
From: This contains the sender's email address and possibly the “real name.” A complete
zoo of formats is used here.
To: This is a list of recipient email address e s. Multiple recipient address e s are separate d by
a com m a.
Cc: This is a list of email address e s that will receive “carbon copies” of the mess a g e.
Multiple recipient address e s are separate d by a com m a.
Bcc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. The
key differenc e betwe e n a “Cc:” and a “Bcc:” is that the address e s listed in a “Bcc:” will
not appear in the header of the mail mess a g e s delivered to any recipient. It's a way of
alerting recipients that you've sent copies of the messa g e to other people without telling
them who those others are. Multiple recipient address e s are separate d by a com m a.
Subject: Describe s the content of the mail in a few words.
Reply-To: Specifies the address the sender wants the recipient's reply directed to. This may
be useful if you have several accou nts, but want to receive the bulk of mail only on the
one you use most freque ntly. This field is optional.
14. How Is Mail Delivered?
• Generally, you will compose mail using a mailer interface like pine.
• These programs are called mail user agents, or MU A s. If you send a mail
mess a g e, the interface progra m will in most cases hand it to another progra m
for delivery. This is called the mail transportagent, or MT A. On most syste m s
the same MTA is used for both local and remote delivery and is usually
invoke d as a progra m such as sendmail.
•
• Local delivery of mail is, of course, more than just appending the inco min g
mess a g e to the recipient's mailbox. Usually, the local MT A understa n d s
aliasing (setting up local recipient address e s pointing to other address e s) and
forwardin g (redirecting a user's mail to some other destination). Also,
mess a g e s that cannot be delivered must usually be bounced, that is, returne d
to the sender along with some error mess a g e.
15. • Mail delivered over a network using TCP/IP, commonly
uses Simple Mail Transfer Protocol (SMTP).
• SMTP was designed to deliver mail directly to a
recipient's machine, negotiating the message transfer
with the remote side's SMTP daemon.
• Today it is common practice for organizations to
establish special hosts that accept all mail for
recipients in the organization and for that host to
manage appropriate delivery to the intended recipient.
16. Email Addresses
• Email addresses are made up of at least two parts.
• One part is the name of a mail domain that will ultimately
translate to either the recipient's host or some host that accepts
mail on behalf of the recipient.
• The other part is some form of unique user identification that
may be the login name of that user, the real name of that user in
“Firstname.Lastname” format, or an arbitrary alias that will be
translated into a user or list of users.
• Internet sites adhere to the RFC-822 standard, which requires
the familiar notation of user@host.domain, for which
host.domain is the host's fully qualified domain name. The
character separating the two is properly called a “commercial at”
sign, but it helps if you read it as “at.”
17. How Does Mail Routing Work?
• The process of directing a message to the
recipient's host is called routing .
• Apart from finding a path from the sending site
to the destination, it involves error checking and
may involve speed and cost optimization.
18. Mail Routing on the Internet
• On the Internet, the destination host's configuration determines
whether any specific mail routing is performed.
• The default is to deliver the message to the destination by first
determining what host the message should be sent to, and then
delivering it directly to that host.
• Most Internet sites want to direct all inbound mail to a highly
available mail server that is capable of handling all this traffic
and have it distribute the mail locally.
• The Mail Exchanger is a machine that states that it is willing to
act as a mail forwarder for all mail addresses in the domain.
19. DOS - Disk Operating Systems
DOS provides the prime means of interaction between the user and
the computer hardware.
The command interface (DOS prompt) converts keyboard
commands into instructions understood by the machine hardware.
Without DOS there is no means of interpreting input commands.
The GUI "sits" on top of DOS and provides a graphical equivalent of
keyboard commands.
Windows - written by Microsoft for PC's.
UNIX and UNIX clones, eg. Linux, Apple