Posts

Showing posts from June, 2017

Difference between a normal Cisco Switch and a Catalyst

Image
Heyy guys!!! You might have heard the name Catalyst Switch or L-3 Switches and you might have a lot of confusion regarding it. so today we will discuss about the difference between a normal Cisco Switch and a  Catalyst  Switch. Catalyst is the brand-name of Cisco’s most popular series of switches. When someone says they’re using a “Catalyst switch”, it just means that they’re working with a Cisco switch. Other companies have names for their L-3 switches, like HP’s ProCurve or Dell’s PowerConnect. A Layer 2 switch (L-2) does switching only. This means that it uses MAC addresses to switch the packets from a port to the destination port (and only the destination port). It therefore maintains a MAC address table so that it can remember which ports have which MAC address associated. A L3 switch also does switching exactly like a L2 switch. The L3 means that it has an identity from the L3 layer. Practically this means that a L3 switch is capable of having IP addresses an

Backup and Restore Startup Configurations in a CISCO ROUTER

Image
heyy guys!!! In this post i will be showing you how to take  Backup  of Startup Configuration of a router and  Restore  it to another router . So, for this first of all what you need is a TFTP server (Trivial File Transfer Protocol Server) in your network (having an IP adsress). now follow these steps to copy your Startup configuration file to the TFTP server. Router# copy running-config tftp: Address or name of remote host []? 64.104.207.171 Destination filename [ce_2-confg]? backup_cfg_for_my_router !! 1030 bytes copied in 2.489 secs (395 bytes/sec) Router# now after this .. open the file from your TFTP server in any text editor and remove the lines that starts with AAA, these are to remove security that exists. once you have completed this step your Backup is completed. Now you have to install that startup config file to the new router. Just follow these steps in the new router. Router_new# copy tftp: running-config Address or name of remote host []? 64.104.207.

Password Recovery in Cisco Routers and Switches

Image
Edit Heyy guys!!! here i am again with something new this time.. Imagine you have spent a lot of time in configuring a router or a switch and unfortunately you have forgotten its password..now you are not able to log in to the Privilege or even to the User Exec mode. or let say some other network engineer set the password on the device and he is not present right now. In both the cases you need to access the device (let say router) without entering the password. so is it possible to bypass the password authentication procedure..well the answer is  YES , we can do it. we can recover the password without losing the previous configurations set on the Router. I have made a video that will demonstrate you how to recover the password in Cisco Router or Switch. Disclaimer   :   This video is only for Education Purpose, i am not responsible for any harm or involvement in any illegal activity by you. To watch the Video  CLICK HERE  . If you face any Doubt or if something is n

Update for Club Students

Image
So guyss!!! here i am again posting some good n tricky stuffs for those who r eagerly waiting for the Viruses and Batch programming tricks.. Just download it and Unzip the file and enjoy. Disclaimer : This is only for Education Purpose . I am not responsible for any harm or involvement in any illegal activity by you.

New release of Packet Tracer

Image
heyy guys thr !!!!! I am feeling really exited to tell you all that the new version of  CISCO PACKET TRACER (v6.2)  has been released. It has got no. of new features. just see the video  click here To download the new version just  click here   (packet tracer v6.2) Hope you guys like it. Any doubts , comment below. - Team KTI  (Kshitij The Infinity)

HOW TRACEROUTE WORKS

Image
Well guys !! Time to take a break from our regular Ethical Hacking posts and learn something new in Networking. You guys might have used  “traceroute”  command   many  a times but have you ever wonder how this works? Lets see when we press  ENTER after the above command than what happens at the BackEnd. Traceroute sends a sequence of UDP packets ( these may be ICMP packets as well ). Traceroute uses TTL value to determine intermediate routers that comes in between the Source and Destination. The device decreases the TTL value to 1 and sends it to the Destination. Now what happens when first time the device (Router, PC or Switch) sends the the ICMP packet it sets the TTL value of the packet to 1 (means max. HOP COUNT for that packet will be 1) and as soon as a device recieves a UDP or ICMP packet it decreases its value by 1. so the packet will not be send to the next HOP and reply comes from the first HOP and the device writes the entry on the Command or the Shell PROMPT.

POST FOR CCNA GUYS

For all those who are facing difficulty in various topologies in CCNA i’ve uploaded all the topologies (particularly of CCNA level).  click here Still if you are facing any problem in the topologies, you can contact me. Keep checking the Link for Updates. The new post of “ HACKWORKING ” will be coming soon. - Team KTI  (Kshitij The Infinity)

Types of Hackers

Image
So guys!!!! here i am after a loooong time…but now you’ll be getting daily updates. ok now..lets start from where we left last..  IP ADDRESS In last class we have seen the classes of IP addresses. 5 classes are there out of which 3 are important and used in today’s scenario , these are A, B and C. Class A : 0.0.0.0 to 127.255.255.255 and subnet mask is /8 Class B : 128.0.0.0 to 191.255.255.255 and subnet mask is /16 Class C : 192.0.0.0 to 223.255.255.255 and subnet mask is /24 so thats lil bit revision about what we studied in the last post.Today we will be talking about Hackers. interesting nah..?? yeah it is pretty much ..who are they and what they do.. A hacker is one who enjoys the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities.The act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration is termed  hacking . tha

ip address CLASSES

Image
Internet Protocol hierarchy contains several classes of IP Addresses to be used efficiently in various situations as per the requirement of hosts per network. Broadly, the IPv4 Addressing system is divided into five classes of IP Addresses. All the five classes are identified by the first octet of IP Address. Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses. The first octet referred here is the left most of all. The octets numbered as follows depicting dotted decimal notation of IP Address: The number of networks and the number of hosts per class can be derived by this formula: When calculating hosts’ IP addresses, 2 IP addresses are decreased because they cannot be assigned to hosts, i.e. the first IP of a network is network number and the last IP is reserved for Broadcast IP. Class A Address The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e. Class A addresse
Image
W hat is IP? “ The Internet Protocol  ( IP ) is the principal communications  protocol  in the  Internet protocol  suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the  Internet”. ——-this is what THE WIKIPEDIA SAYS .. but guys.. frankly speaking, i never got it when i first searched for IP on the INTERNET. so for those who are facing the same difficulty, i have a simple and understanding definition.. here we go… As we all have our house’s address to have a particular identification and someone want to reach to you can come to your address and do his job. similarly this happens in case of INTERNET. If we want to open a website or to connect to some other computer which is not around us then something that recognises our requirement and divert us to that place is INTERNET PROTOCOL or IP.  But now the biggest question is that we open any website by their names and not by their IP address th

Hello n welcome to the World of HACKWORKING (HACKING + NETWORKING)