What is Dorks List

When We are find an weak website for performing SQL Injection so We had to need A small codes such as related with url-id many more like that and we use to find these code on google and weak or  Vulnerable websites(hackable websites) Are Found in Google Results

This Means Google Help Us For Hacking So These small Codes Are Called Google Dorks

SQli-1024x612

List Of Google Dorks-:

inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=d=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurltray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?av
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurlreview.php?id=
inurl:loadpsb.php?id=
inurlpinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurlrofile_view.php?id=
inurl:category.php?id=
inurlublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurlroductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurlroduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlroduit.php?id=
inurlop.php?id=
inurl:shopping.php?id=
inurlroductdetail.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurlage.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurlroduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:tran******.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurlpinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurlffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inur l: info.php?id=
inurl : pro.php?id=
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurltray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurlreview.php?id=
inurl:loadpsb.php?id=
inurlpinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurlrofile_view.php?id=
inurl:category.php?id=
inurlublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurlroductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurlroduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlroduit.php?id=
inurlop.php?id=
inurl:shopping.php?id=
inurlroductdetail.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurlage.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurlroduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:tran******.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurlpinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurlffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:shop+php?id+site:fr
“inurl:admin.asp”
“inurl:login/admin.asp”
“inurl:admin/login.asp”
“inurl:adminlogin.asp”
“inurl:adminhome.asp”
“inurl:admin_login.asp”
“inurl:administratorlogin.asp”
“inurl:login/administrator.asp”
“inurl:administrator_login.asp”
inurl:”id=” & intext:”Warning: mysql_fetch_assoc()
inurl:”id=” & intext:”Warning: mysql_fetch_array()
inurl:”id=” & intext:”Warning: mysql_num_rows()
inurl:”id=” & intext:”Warning: session_start()
inurl:”id=” & intext:”Warning: getimagesize()
inurl:”id=” & intext:”Warning: is_writable()
inurl:”id=” & intext:”Warning: getimagesize()
inurl:”id=” & intext:”Warning: Unknown()
inurl:”id=” & intext:”Warning: session_start()
inurl:”id=” & intext:”Warning: mysql_result()
inurl:”id=” & intext:”Warning: pg_exec()
inurl:”id=” & intext:”Warning: mysql_result()
inurl:”id=” & intext:”Warning: mysql_num_rows()
inurl:”id=” & intext:”Warning: mysql_query()
inurl:”id=” & intext:”Warning: array_merge()
inurl:”id=” & intext:”Warning: preg_match()
inurl:”id=” & intext:”Warning: ilesize()
inurl:”id=” & intext:”Warning: filesize()
inurl:”id=” & intext:”Warning: require()
inurl:index.php?id=
inurl:trainers.php?id=
inurl:login.asp
index of:/admin/login.asp
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:produit.php?id=+site:fr
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurltray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurlreview.php?id=
inurl:loadpsb.php?id=
inurlpinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurlrofile_view.php?id=
inurl:category.php?id=
inurlublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurlroductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurlroduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlroduit.php?id=
inurlop.php?id=
inurl:shopping.php?id=
inurlroductdetail.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurlage.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurlroduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurlpinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurlffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=

What is file binder ?

jpgfilebinder

With this small tool, you can bind or merge any compressed files(WinRar, WinZip, 7Zip, etc) with an ordinary JPEG image file, making it look like any other JPEG image file but in actual fact contains all your secret files.

Other people will only see it as an ordinary JPEG image but when you open it with a compression tool like WinRar, WinZip, 7Zip, etc; you’ll see the secret files. Hide any file, be it a secret note, a secret picture, a secret song, or anything else you can think of. Sneaky!

Use your imagination and discover other benefits of this software. No installation needed and is fully portable. This is the first release and any feedback is much appreciated.

IMPORTANT: Please take note that this tool will not encrypt or secure your files and other users can also access the files like you if they are aware of the method. It is advisable that you encrypt the compressed file before binding for enhanced security.

 

 

Jpg+FileBinder 1.0: Free Download follow link to download-:

Download link 1

 

Download link 2

 

Download link

What is Havij?

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

 

 

Install Havij in Ubuntu 12.04 -: Download

Official Website for downloading havij Itsecteam.com

 

 

Practical Cmd Tutorial 1

1.ping (type ping in cmd prompt )

What it is?

The ping command is a Command Prompt
command used to test the ability of the source
computer to reach a specified destination
computer. The ping command is usually used as a
simple way verify that a computer can
communicate over the network with another
computer or network device.
The ping command
operates by
sending Internet
Control Message
Protocol (ICMP)
Echo Request
messages to the
destination
computer and
waiting for a response. How many of those
responses are returned, and how long it takes for
them to return, are the two major pieces of
information that the ping command provides.
Ping Command Syntax
ping [-t ] [ -a ] [ -n count ] [-l size ] [ -f ] [ -i TTL] [ -v
TOS ] [-r count ] [-s count ] [ -w timeout] [-R ] [ -S
srcaddr ] [ -4] [ -6] target [/? ]
-t = Using this option will ping the target until you
force it to stop using Ctrl-C .
-a = This ping command option will resolve, if
possible, the hostname of an IP address target.
-n count = This option sets the number of ICMP
Echo Request messages to send. If you execute
the ping command without this option, four
requests will be sent.
-l size = Use this option to set the size, in bytes,
of the echo request packet from 32 to 65,527. The
ping command will send a 32 byte echo request if
you don’t use the -l option.
-f = Use this ping command option to prevent
ICMP Echo Requests from being fragmented by
routers between you and the target. The -f option
is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL = This option sets the Time to Live (TTL)
value, the maximum of which is 255.
-v TOS = This option allows you to set a Type of
Service (TOS) value. Beginning in Windows 7, this
option no longer functions but still exists for
compatibility reasons.
-r count = Use this ping command option to
specify the number of hops between the your
computer and the target computer or device that
you’d like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead if you’re interested in viewing all
hops between two devices.
-s count = Use this option to report the time, in
Internet Timestamp format, that each echo
request is received and echo reply is sent. The
maximum value for count is 4 meaning that only
the first four hops can be time stamped.
-w timeout = Specifying a timeout value when
executing the ping command adjusts the amount
of time, in milliseconds, that ping waits for each
reply. If you don’t use the -w option, the default
timeout value is used which is 4000, or 4 seconds.
-R = This option tells the ping command to trace
the round trip path.
-S srcaddr = Use this option to specify the source
address.
-4 = This forces the ping command to use IPv4
only but is only necessary if target is a hostname
and not an IP address.
-6 = This forces the ping command to use IPv6
only but as with the -4 option, is only necessary
when pinging a hostname.
target = This is the destination you wish to ping,
either an IP address or a hostname.
/? = Use the help switch with the ping command
to show detailed help about the command’s
several options.
Note: The -f , -v , -r , -s , -j , and -k options work
when pinging IPv4 addresses only. The -R and -S
options only work with IPv6.
Other less commonly used switches for the ping
command exist including [-j host-list ] and [ -k
host-list ]. Execute ping /? from the Command
Prompt for more information on these two options.
Tip: Save all that ping command output to a file
using a redirection operator . See How To Redirect
Command Output to a File for instructions or see
my Command Prompt Tricks list for more tips.
Ping Command Examples
ping -n 5 -l 1500 http://www.google.co
In this example, the ping command is used to ping
the hostname http://www.google.com . The -n option
tells the ping command to send 5 ICMP Echo
Requests instead of the default of 4 and the -l
option sets the packet size for each request to
1500 bytes instead of the default of 32 bytes. The
result displayed in the Command Prompt window
will look something like this:
Pinging http://www.google.com [74.125.
Reply from 74.125.224.82: bytes
Reply from 74.125.224.82: bytes
Reply from 74.125.224.82: bytes
Reply from 74.125.224.82: bytes
Reply from 74.125.224.82: bytes
Ping statistics for 74.125.224.
    Packets: Sent = 5, Received
Approximate round trip times in
    Minimum = 65ms, Maximum = 7
The 0% loss reported under Ping statistics for
74.125.224.82 tells me that each ICMP Echo
Request message sent to http://www.google.com was
returned. This means that, as far as my network
connection goes, I can communicate with Google’s
website just fine.
ping 127.0.0.1
In the above example, I’m pinging 127.0.0.1 , also
called the IPv4 localhost IP address or IPv4
loopback IP address, without options.
Using the ping command to ping 127.0.0.1 is an
excellent way to test that Windows’ network
features are working properly but it says nothing
about your own network hardware or your
connection to any other computer or device. The
IPv6 version of this test would be ping ::1 .
ping -a 192.168.1.22
In this example I’m asking the ping command to
find the hostname assigned to the 192.168.1.22
IP address but otherwise ping it as normal.
Pinging J3RTY22 [192.168.1.22]
Reply from 192.168.1.22: bytes=
Reply from 192.168.1.22: bytes=
Reply from 192.168.1.22: bytes=
Reply from 192.168.1.22: bytes=
Ping statistics for 192.168.1.2
    Packets: Sent = 4, Received
Approximate round trip times in
    Minimum = 0ms, Maximum = 1m
As you can see, the ping command resolved the IP
address I entered, 192.168.1.22 , as the hostname
J3RTY22 and then executed the remainder of the
ping with default settings.
ping -t -6 SERVER
In this example, I force the ping command to use
IPv6 with the -6 option and continue to ping
SERVER indefinitely with the -t option.
Pinging SERVER [fe80::fd1a:3327
Reply from fe80::fd1a:3327:2937
Reply from fe80::fd1a:3327:2937
Reply from fe80::fd1a:3327:2937
Reply from fe80::fd1a:3327:2937
Reply from fe80::fd1a:3327:2937
Reply from fe80::fd1a:3327:2937
Reply from fe80::fd1a:3327:2937
Ping statistics for fe80::fd1a:
    Packets: Sent = 7, Received
Approximate round trip times in
    Minimum = 0ms, Maximum = 1m
Control-C
^C
I interrupted the ping manually with Ctrl-C after
seven replies. Also, as you can see, the -6 option
produced IPv6 addresses.
Tip: The number after the % in the replies
generated in this ping command example is the
IPv6 Zone ID, which most often indicates the
network interface used. You can generate a table
of Zone IDs matched with your network interface
names by executing netsh interface ipv6 show
interface . The IPv6 Zone ID is the number in the
Idx column.
Ping Command Availability
The ping command is available from within the
Command Prompt in Windows 8, Windows 7,
Windows Vista , and Windows XP operating
systems . The ping command is also available in
older versions of Windows like Windows 98 and 95.

image

Why LAN security is important?

WHY LAN SECURITY IS IMPORTANT ?

image

Nowadays many organizations use LANs for data processing and data communication needs. LAN logically and physically extend data, processing and communications facilities across the organization.
Security services that protect the data, processing and communication facilities must also be distributed throughout the LAN. For example, sending sensitive files that are protected with stringent access controls on one system and LAN to another system that has no access control protection, defeats the efforts made on the first system. User must ensure that their data and the LAN itself are protected or not.
Electronic mail (email),  a major application provided by most LANs, replaces inter-office and even inter-organizational mail that is written on paper and placed in an envelope. This envelope provides some confidentiality between the sender and receiver by these process there was a assurances (guarantee) that the message was not altered. Using electronic mail does not provide these assurances.
When you send electronic mail on simple transfer unprotected LANs than mail messages can be captured and read or perhaps even altered (means they can change your message form or structure). For some LANs, there can be no assurance(guarantee)  that the message actually was sent from the named sender. Fortunately tools such as encryption, digital signature  and message authentication codes helps solve these problems and can help provide some assurance .
image

Encryption-: Digital signature-:     Message Authentication-:

Encryption is the conversion of data into a form , called a ciphertext , that cannot be easily understood by unauthorized people . Decryption is the process of converting encrypted data back into its original form, so it can be understood. For more details on Encryption and ciphertext click on it.

Digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of the documents and possibly to ensure the original content of the message or documents that has been sent is unchanged. For more details on digital signature click on it and depth of digital signature .
Message Authentication is a short piece of code (often MAC) is a short piece of information used to authenticate a message and to provide integrity and authenticity assurances on the message integrity assurances detect accidental and intentional message changes, while authenticity assurances affirm the message’ origin . For more detail on Message Authentication click on it.

What is Local Area Network (LAN) ?

image

Local Area Network(LAN)-:
A LAN is a high-speed data network that covers a relatively small geographic area.  It connects workstations, personal computers, printers, server, and other devices. LAN gives computer user many advantages, including shared access to devices and applications, file exchange between connected users, and communications between users via electronic mail and other applicatons.
In LAN network group of computers share a common workload. Network computers means that the people using them can share files easily send each other messages and share each other’s printers. Nowadays most organizations have a local area network. LANs can be as small as just one shared office or as large as a whole city.
Although single LANs are geographically limited (to a department or office building, for example), separate LANs can be connected to form larger networks. LANs can be configured utilizing a client –server architecture which make use of –distributed intelligence by splitting the processing of an application between two distinct component: a – front-end client and a –back—end server.
The client component, itself a complete, stand-alone personal computers, offers the user its full range of power and features for running applications. The server component which can be another personal computer, minicomputers and mainframe in a time-shared environment: data management, information sharing among client, and sophisticated network administration and security features.

Computer Network

image

Computer Network is a way to transfer data from one computer to another.
Computer Network is an engineering , discipline conversion with communication between computer system or device.

Types of Networks – :

image

LAN(Local Area Networking)
WLAN(Wireless Local Area Networks)
WAN(Wide Area Networks)
MAN(Metropolitan Area Networks)
CAN(Campus Area Networks)
SAN(Storage or Sytem Area Network)
PAN(Personal Area Network)
Dan(Desk Area Network)
Let’s talk about these types of
networking in detail:

LAN(Local Area Networking)-:

image

Local Area Networking is used
primarily in small areas such as
schools, hospitals and office buildings.
Local Area Networking, is one of the
older types of networks. TCP/IP is used
as the method of communication
between computers in Local Area
Networking. Due to its small size, it is
possible for one person to administrate
a Local Area Network. Local Area
Networks are viable to quick change,
using a bus network topology that
allows for easy access to the Local Area
Network.

WLAN(Wireless Local Area Networks)-:

image

Wireless Local Area Networks are much
like LAN networks, except they do not
require network cables to connect each
other. Radio and infrared signals are
used to communicate between
machines whilst using a wireless local
area network. Wireless Local Area
Networks allow for small amounts of
mobility whilst being connected to the
internet. Wireless Local Area Networks
work according to the IEEE 802.11
standards. Wireless Area Networks are
commonly seen being used by a WiFi
internet connection . Wireless LAN
connections offer a surprising amount
of mobility for users with laptops and
smart phones while being able to stay
connected to the internet by different
networking topology .

WAN(Wide Area Networks)-:

image

Wide Area Networks are used to
connect server machines and
computers across continents are
countries for constant information
updates. Wide Area Networks, are used
across the globe, many networks
connect with one another across
continents to create one giant Wide
Area Network. Wide Area Networks use
optic fibre as their communication
medium. The largest example of a Wide
Area Network is the internet itself,
which connects all users to the
information and data that is available
on the the internet.

MAN(Metropolitan Area Networks).

image

Metropolitan Area Networks are not
commonly used these days, they are
used to create communication between
systems in an entire city. Hence a
Metropolitan Area Network area falls
between the sizes Local Area Networks,
and Wide Area Networks. Metropolitan
Area Networks are used by city specific
businesses such as the New York Times
in the state of New York.

CAN(Campus Area Networks).

image

Campus Area Networks are usually a
connection of many small LAN
networks which are often used on
university campuses and office
buildings. Campus Area Networks allow
for easy file sharing between different
departments as all the files are usually
shared on the server machines of each
LAN network. This type of network
offers a lot of simplicity in the transfer
and downloading of files.

SAN(Storage Area Network).

image

Storage Area Networks are primarily
used as information databases. They
are not usually used by large
organizations or similar entities. They
are specifically used for the storage of
information, and easy retrieval of
specific pieces of data whenever
required. Storage Area Networks are
usually used by websites which offer
downloading services.

SAN (System Area Network)

image

System Area Networks are speed
oriented networks which provide high
speed internet connections to a cluster
of computers. These are primarily used
for server purposes, and allow other
computers to connect to these System
Area Networks. Permission to different
access points are given according to
what status a system is on the System
Area Network, such as administrators
or simple users.