How to Know DoFollow On Firefox

NoDoFollow add-ons you can see a link from a website or blog is Do Follow or No Follow.
This will highlight links in a document and colour codes them according to follow / no follow.
Red colour indicates no follow and blue is do follow. It is very easy to  turn on and off. Just right-click and check for on and uncheck for off.
Ok . Now we have two good plugins to find the do follow links . Next we have to find out the blogs in our niche

How to Know DoFollow On Firefox

How to Find Blogs Related to Your Niche ?

Go to Google.com and type
keyword “comment here” (e.g. health tips “comment here”)
keyword “add comment”
keyword “submit comment”
keyword “add url”
keyword “submit url”
keyword “submit a site”

The ‘keyword’ should replace with your keyword like ‘health tips’.  Here you will get lots of blogs for commenting. Check on your do follow checker and start building back links.

Note : I usually ignore the ‘no follow’ and ‘do follow’ thing while commenting . Provide quality comment and build your authority. No follow links from trusted domains will  help you to increase your page rank and you will also get quality traffic.
NoDoFollow add-ons you can see a link from a website or blog is Do Follow or No Follow. This will highlight links in a document and colour c...
Read More

How to Scanning with NeXpose

NeXpose is Rapid7’s vulnerability scanner that scans networks to identify the devices running on them and performs checks to identify security weaknesses in operating systems and applications. It then analyzes the scan data and processes it for inclusion in various reports. 

Rapid7 offers multiple versions of NeXpose, but we’ll use the Community edition because it’s free. If you plan to use NeXpose commercially, see the Rapid7 site (http://www.rapid7.com/vulnerability-scanner.jsp) for information on the various versions and their capabilities and pricing. 

Our target for scanning will be a default installation of Windows XP SP2 as configured in Appendix A. We will first perform a basic overt scan of our target and import the vulnerability scan results into Metasploit. We will close out this section by showing you how to run a NeXpose vulnerability scan directly from msfconsole rather than using the web-based GUI, eliminating the need to import a scan report.
How to Scanning with NeXpose
Configuration 

After installing NeXpose Community, open a web browser and navigate to https://<youripaddress>:3780. Accept the NeXpose self-signed certificate, and log in using the credentials you created during setup. You should next be presented with an interface similar to the one shown in Figure 4-2. (You’ll find complete installation instructions for NeXpose at the Rapid7 website.) 

On the NeXpose main page, you will notice a number of tabs at the top of the interface:

- The Assets tab  displays details of computers and other devices on your network after they have been scanned. 

- The Reports tab  lists vulnerability scan reports after they have been generated. 
- The Vulnerabilities tab  gives you details on any vulnerabilities discovered during your scans. 
- The Administration tab  allows you to configure various options.

Buttons in the main body of the page let you perform common tasks such as creating a new site or setting up a new vulnerability scan.

The New Site Wizard Prior to running a vulnerability scan with NeXpose, you need to configure a site—a logical collection of devices such as a specific subnet, a collection of servers, or even a single workstation. These sites will then be scanned by NeXpose, and different scan types can be defined for a particular site.

1. To create a site, click the New Site button on the NeXpose home page, enter a name for your site and a brief description, and then click Next. 

2. In the devices step, shown in Figure 4-3, you have quite a bit of granularity in defining your targets. You can add a single IP address, address ranges, hostnames, and more. You can also declare devices, such as printers, to exclude from scans. (Printers frequently don’t take kindly to being scanned. We have seen instances in which a simple vulnerability scan caused more than one million pages of pure black to be placed in the queue to print!) Click Next when you have finished adding and excluding devices. 

3. At the scan setup step, you can choose from several different scan templates, such as Discovery Scan and Penetration test; select the scanning engine you want to use; or set up an automated scanning schedule. For purposes of this initial walk-through, keep the default selections and click Next to continue. 

4. Add credentials for the site you want to scan, if you have them. Credentials can help create more accurate and complete results by performing indepth enumeration of installed software and system policies on the target. 

5. On the Credentials tab, click the New Login button, type a username and password for the IP address you want to scan, and then click Test Login to verify your credentials then save them.

6. Last, click Save to complete the New Site wizard and return to the Home tab, which should list your newly added site, as shown in Figure 4-4.

NeXpose is Rapid7’s vulnerability scanner that scans networks to identify the devices running on them and performs checks to identify securi...
Read More

How to Working with vulnerability assessment tools

Vulnerability assessment tools play a very important role in penetration testing. These tools help a pen-tester in analyzing vulnerabilities and weaknesses in the current system. Vulnerability assessment can be performed over a variety of services and software based on the requirement. OpenVAS is an open source vulnerability-scanning framework specifically designed to dig out vulnerabilities under various scenarios.
How to Working with vulnerability assessment tools

To start working with OpenVAS, browse to Applications | Kali Linux | Vulnerability Analysis | OpenVAS.

If you are starting it for the first time, run openvas-setup to update the software and start  all of the required plugins and dependencies.
The next step will be to add a new user to OpenVAS. Pass on the following command to  the terminal:
root@kali:~#openvas-adduser

You can skip the rule creation process by pressing Ctrl + D. We can use the following command  to regularly update the framework with new signatures and dependencies:

root@kali:~#openvas-nvt-sync

Now, we are all set to load the framework and begin our assessment task. Browse to Applications | Kali Linux | Vulnerability Analysis | OpenVAS | openvas-gsd. This will launch the GUI framework and prompt for the login details. Enter the credentials that you set up earlier and provide the local server address.

After logging in, you can begin your scanning process. To get started with your first scan, navigate to Task | New. Fill in a task name and the required scan mode as shown in the  following screenshot:

Once the task is created, you will notice that the task is listed at the bottom part of the interface. Click on the Start button to begin scanning.


Vulnerability assessment tools play a very important role in penetration testing. These tools help a pen-tester in analyzing vulnerabilities...
Read More

How to Use Network forensics using Kali Linux

Network forensics involves analyzing, reporting, and recovering network information from a computer system or any digital storage media. Forensics involves a detailed investigation of events along with gathering relevant information. Kali comes with a wide range of tools that can assist in effective forensic analysis. Forensic analysis usually involves investigating different aspects, which requires different tools. Unlike exploitation frameworks, forensics usually depends on multiple tools. Let us cover some of the major forensic tools in detail here.
Network forensics using Kali Linux
Network analysis with Wireshark Wireshark is an open source network packet analyzer tool similar to tcpdump that captures the data packets flowing over the wire (network) and presents them in an understandable form. Wireshark can be considered as a Swiss army knife as it can be used under different circumstances such as network troubleshooting, security operations, and learning protocol internals. This is one tool that does it all, and with ease.

Some of the important benefits of working with Wireshark are as follows:

-  Multiple protocol support 
-  A user-friendly interface 
-  Live traffic analysis Ê Open source

To begin working with Wireshark in Kali Linux, navigate to Applications | Kali Linux | Top 10 security tools | Wireshark.

Once the GUI is loaded, you will have to select the interface you want to begin working with.  The left-bottom panel shows the various available interfaces. Select an interface and click on Start to begin. You will notice that the GUI starts showing different packets captured on the selected interface.

You will notice that the Wireshark GUI is divided into three distinct sections. The Capture panel displays the live capture of packets. The Packet details panel displays information about the selected packet in the capture panel. The Packet bytes panel represents the information from the Packet details panel in a dump or actual format. It shows the byte sequences of the flow.  You can select different actions from the menu option to maximize your capture performance.

Network forensics involves analyzing, reporting, and recovering network information from a computer system or any digital storage media. For...
Read More

Attacking the database using sqlninja on Linux

sqlninja is a popular tool used to test SQL injection vulnerabilities in Microsoft SQL  servers. Databases are an integral part of web apps hence, even a single flaw in it can  lead to mass compromising of  information. Let us see how sqlninja can be used for  database penetration testing.
To launch SQL ninja, browse to Applications | Kali Linux | Web applications | Database Exploitation | sqlninja.


This will launch the terminal window with sqlninja parameters. The important parameter  to look for is either the mode parameter or the –m parameter: 
The –m parameter specifies the type of operation we want to perform over the target database. Let us pass a basic command and analyze the output:

root@kali:~#sqlninja –m test Sqlninja rel. 0.2.3-r1 Copyright (C) 2006-2008 icesurfer [-] sqlninja.conf does not exist. You want to create it now ? [y/n]
This will prompt you to set up your configuration file (sqlninja.conf). You can pass the respective values and create the config file. Once you are through with it, you are ready to perform database penetration testing.

The Websploit framework Websploit is an open source framework designed for vulnerability analysis and penetration testing of web applications. It is very much similar to Metasploit and incorporates many of  its plugins to add functionalities.

To launch Websploit, browse to Applications | Kali Linux | Web Applications | Web Application Fuzzers | Websploit. 
We can begin by updating the framework. Passing the update command at the terminal will begin the updating process as follows:

wsf>update [*]Updating Websploit framework, Please Wait…
Once the update is over, you can check out the available modules by passing the following command:
wsf>show modules
Let us launch a simple directory scanner module against www.target.com as follows:
wsf>use web/dir_scanner wsf:Dir_Scanner>show options wsf:Dir_Scanner>set TARGET www.target.com wsf:Dir_Scanner>run

To launch a brute force attack against a password file, you can pass the following command:
root@kali:~#john pwd

Here pwd is the name of the password file.
To retrieve the cracked password, pass the following command:
root@kali:~#john –show pwd
You can also provide a wordlist of stored passwords:
root@kali:~#john --wordlist=password.lst --rules pwd
sqlninja is a popular tool used to test SQL injection vulnerabilities in Microsoft SQL  servers. Databases are an integral part of web apps ...
Read More

Sejarah Internet dan Perkembangan Internet



Sejarah Internet
Sejarah Internet dan Perkembangan Internet


Daftar Kejadian Dalam Sejarah Internet dan Perkembangannya

1957
Uni Sovyet (kini Rusia) meluncurkan wahana luar angkasa, Sputnik.

1958
Sbg buntut dari "kekalahan" Amerika Serikat dalam meluncurkan wahana luar angkasa, dibentuklah suatu tubuh di dalam Departemen Pertahanan Amerika Serikat, Advanced Research Projects Agency( ARPA), yg bertujuan supaya Amerika Serikat bisa meningkatkan ilmu wawasan dan technologi negeri tersebut. Salah satu sasarannya ialah tehnologi pc.

Sejarah Internet dan Perkembangan Internet


1962
Sejarah internet di th ini yakni seseorang J.C.R. Licklider posting satu buah tulisan tentang suatu visi di mana komputer-komputer bisa saling dihubungkan antara satu dgn yang lain dengan cara global supaya tiap-tiap computer tersebut sanggup menawari akses pada program dan data. Di th ini serta RAND Corporation mengawali riset pada konsep ini (jaringan komputer terdistribusi), yg ditujukan untuk tujuan militer.

1960
Teori berkenaan packet-switching mampu diimplementasikan dalam dunia nyata.


1965
Istilah "Hypertext" dikeluarkan oleh Ted Nelson.

1968
Jaringan Tymnet dibuat.

1971
Anggota jaringan ARPANET bertambah jadi 23 buah node computer, yg terdiri atas komputer-komputer utk riset milik pemerintah Amerika Serikat & kampus.

1972
Suatu grup kerja yg dinamakan dgn International Network Working grup(INWG) dibuat buat meningkatkan tehnologi jaringan computer & pula menciptakan standar-standar utk jaringan computer, termasuk juga di antaranya ialah Internet. Pembicara perdana dari organisasi ini merupakan Vint Cerf, yg setelah itu dinamakan juga sebagai "Bapak Internet".

1972-1974
Sekian Banyak pelayanan basis data komersial seperti Dialog, SDC Orbit, Lexis, The New York Times DataBank, & yang lain, mendaftarkan ia ke ARPANET lewat jaringan dial-up.

1973
ARPANET ke luar Amerika Serikat : pada thn ini, anggota ARPANET bertambah lagi dgn masuknya sekian banyak kampus diluar Amerika Serikat adalah University College of London dari Inggris & Royal Radar Establishment di Norwegia.

1974
Vint Cerf & Bob Kahn mempublikasikan spek detil protokol Transmission Control Protocol (TCP) dalam artikel "A Protocol for Packet Network Interconnection".

1974
Bolt, Beranet dan Newman (BBN), pontraktor utk ARPANET, mengakses suatu version komersial dari
ARPANET yg mereka sebut yang merupakan Telenet, yg yakni pelayanan paket data publik mula-mula.

1977
Telah ada 111 buah pc yg sudah membuka ke ARPANET.

1978
Protokol TCP dipecah jadi dua sektor, yaitu Transmission Control Protocol & Internet Protocol(TCP/IP).

1979
Kelompok diskusi Usenet perdana dibuat oleh Tom Truscott, Jim Ellis & Steve Bellovin, alumni dari Duke University & University of North Carolina Amerika Serikat. kemudian, pemakaian Usenet juga meningkat dengan cara drastis. Sungguh menarik, di thn ini serta emoticon diusulkan oleh Kevin McKenzie.

Awal 1980-an
Komputer pribadi (Komputer) mewabah, & jadi sektor dari tidak sedikit hidup manusia. Thn ini tertulis ARPANET sudah mempunyai anggota sampai 213 host yg mengakses. Pelayanan BITNET (Because It's Time Network) dimulai, dgn sediakan pelayanan e-mail, mailing daftar, & pun File Transfer Protocol (FTP).
CSNET (Pc Science Network) pula dibangun pada thn ini oleh para ilmuwan & pakar pada sektor ilmu komputer dari bermacam macam kampus.

1982
Istilah "Internet" mula-mula kali dimanfaatkan, & TCP/IP diadopsi yang merupakan protokol universal utk jaringan tersebut.

1986
Dikenalkan system nama domain, yg saat ini dikenal dgn DNS (Domain Name Sistem) yg berfungsi utk menyeragamkan system pemberian nama alamat di jaringan komputer.

2000-an
Internet berkembang demikian pesat, faktor ini mampu dibuktikkan dgn munculnya milyaran website didunia. & usaha digital juga sudah jadi trend di berkat perkembangan dari internet
Sejarah Internet Sejarah Internet dan Perkembangan Internet Daftar Kejadian Dalam Sejarah Internet dan Perkembangannya 1957 Uni Sovyet (kin...
Read More

Komentar