HACKING

HOW TO VIEW A SAVED GMAIL PASSWORD USING GOOGLE CHROME

OPEN THE WEB BROWSER THAT YOUR TARGET USES ON THEIR COMPUTER.



 You must have access to that person's computer. Try this when they're out of the room or you know that you have a few minutes alone.
 Open a link from an email or a Help menu to launch the default browser.


OPEN THE PASSWORD MANAGER. 



The process for accessing the password manager is different depending on the browser you are using.

·         INTERNET EXPLORER - Click the Gear button or the Tools menu and select "Internet Options." Click the "Content" tab and then click the "Settings" button in the AutoComplete section. Select "Manage Passwords" from the new window.

·         CHROME - Click the Chrome Menu button () and select "Settings." Click the "Show advanced settings" link and then scroll to the "Passwords and forms" section. Click "Manage passwords."

·      FIREFOX - Click the Firefox Menu button () and select "Options." Click the "Security" tab and then click "Saved Passwords."

·         SAFARI - Click the Safari menu and select "Preferences." Click the "Passwords" tab.



FIND THE PASSWORD FOR YOUR TARGET'S GOOGLE ACCOUNT


 Use the search bar in the password manager to search for "Google". This is the quickest way to narrow down the list of passwords. Look for the "accounts.google.com" entry for the target's G-mail address.

DISPLAY THE PASSWORD



 Select the password and then click the "Show" or "Show Password" button. You may have to enter the administrator password for the computer before the passwords are displayed.

WRITE DOWN THE PASSWORD AND THEN CLOSE THE PASSWORD MANAGER. 


Make note of the password as well as the exact Gmail address. Close the password manager when you are done to cover your tracks.

TRY THE PASSWORD FROM ANOTHER COMPUTER



If the target has not enabled two-factor authentication, then you should be able to access the account. The target will likely be notified that a login has occurred from an unknown browser.

·         If the target has two-factor authentication activated, then you will need the code that is sent to their mobile device. There is no way around this if it is activated.

SECURTIY AND AUTHENTICATION

 INFORMATION SECURTIY AND AUTHENTICATION


                                         


     Security can be defined as state of freedom from a danger, risk or attack. Information security can be defined as the task of guarding information which is processed by a server, stored on a storage device, and transmitted over a network like Local Area Network or the public Internet. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction

INTRODUCTION TO AAA

    AAA stands for Authentication, Authorization and Accounting. AAA are a set of primary concepts that aid in understanding computer and network security as well as access control. These concepts are used daily to protect property, data, and systems from intentional or even unintentional damage. AAA is used to support the Confidentiality, Integrity, and Availability (CIA) security concept.

Confidentiality: The term confidentiality means that the data which is confidential should remain confidential. In other words, confidentiality means secret should stay secret.

Integrity: The term integrity means that the data being worked with is the correct data, which is not tampered or altered.

Availability: The term availability means that the data you need should always be available to you.

Authentication provides a way of identifying a user, typically requiring a Userid/Password combo before granting a session.  Authentication process controls access by requiring valid user credentials.  After the Authentication process is completed successfully, a user must be given authorization (permission) for carrying out tasks within the server. Authorization is the process that determines whether the user has the authority to carry out a specific task. Authorization controls access to the resources after the user has been authenticated. The last one is accounting. Accounting keeps track of the activities the user has performed in the server.


AUTHENTICATION:


Authentication is the process which allows a sender and receiver of information to validate each other. If the sender and receiver of information cannot properly authenticate each other, there is no trust in the activities or information provided by either party.  Authentication can involve highly complex and secure methods or can be very simple.  The simplest form of authentication is the transmission of a shared password between entities wishing to authenticate each other. Today’s authentication methods uses some of the below factors.

1) What you know

An example of this type of Authentication is a "Password". The simple logic here is that if you know the secret password for an account, then you must be the owner of that account. The problems associated with this type of Authentication is that the password can be stolen, someone might read it if you wrote it somewhere. If anyone came to know your password, he might tell someone else. If you have a simple dictionary password, it is easy to crack it by using password cracking software.

2) What you have

Examples of this type of Authentication are smart cards, tokens etc.  The logic here is if you have the smart card with you, you must be the owner of the account. The problems associated with this type of authentication are you might lose the smart card, it can be stolen, or someone can duplicate the smart card etc.

3) What you are

Examples of this type of authentication are your fingerprint, handprint, retina pattern, voice, keystroke pattern etc. Problems associated with this type of authentication are that there is a chance of false positives and false negatives. Chances are there that a valid user is rejected and an invalid user is accepted. Often people are not comfortable with this type of authentication.
Network Authentication are usually based on Authentication protocols, Digital Certificates, Username/Password, smart card etc. Some of the most important authentication protocols which are used today are Kerberos, Challenge Handshake Authentication Protocol (CHAP), Microsoft Challenge Handshake Authentication Protocol (MSCHAP) etc.  We will learn about these protocols in coming lessons.


KERBEROS AUTHENTICATION



Kerberos was originally developed by Massachusetts Institute of Technology (MIT) Project Athena. It was published as a suite of free software by Massachusetts Institute of Technology (MIT) that implements this protocol. The name "Kerberos" is taken from the three-headed dog of Greek mythology, Kerberos is designed to work across the Internet, an inherently insecure environment.
The Kerberos protocol is a secure protocol, and it provides mutual authentication between a client and a server. In Kerberos protocol, the client authenticates against the server and also the server authenticates itself against the client. With mutual authentication, each computer or a user and computer can verify the identity of each other. Kerberos is extremely efficient for authenticating clients in large enterprise network environments. Kerberos uses secret key encryption for authentication traffic from the client.
The same secret key is also used by the Kerberos protocol on the server to decrypt the authentication traffic.

Kerberos protocol is built on top of a trusted third party, called as Key Distribution Center (KDC). Key Distribution Center (KDC)   acts as both an Authentication Server and as a Ticket Granting Server. When a client needs to access a resource on the server, the user credentials (password, Smart Card, biometrics) are presented to the Key Distribution Center (KDC) for authentication. If the user credentials are successfully verified in the Key Distribution Center (KDC), Key Distribution Center (KDC) issues a Ticket Granting Ticket (TGT) to the client. The Ticket Granting Ticket (TGT) is cached in the local machine for future use. The Ticket Granting Ticket (TGT) expires when the user disconnects or log off the network, or after it expires. The default expiry time is one day (86400 seconds).

CHAP AUTHENTICATION


Challenge Handshake Authentication Protocol (CHAP) is a remote access authentication protocol used in conjunction with Point to Point Protocol (PPP) to provide security and authentication to users of remote resources. CHAP is described in RFC 1994, which can be viewed from http://www.rfc-editor.org/. Challenge Handshake Authentication Protocol (CHAP) uses a challenge method for authentication. Challenge Handshake Authentication Protocol (CHAP) doesn’t use a user ID/password mechanism. In Challenge Handshake Authentication Protocol (CHAP), the initiator sends a logon request to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and, if the information matches, grants the session. If the response fails, the session is denied, and the request phase starts over.
Challenge Handshake Authentication Protocol (CHAP) periodically verify the identity of the peer using a three-way handshake. The verification the identity of the peer is done initially, and may be repeated any time after the link has been established.

BIO-METRIC AUTHENTICATION


Each person has a set of unique characteristics that can be used for authentication. Biometrics uses these unique characteristics for authentication. Today’s Biometric systems examine retina patterns, iris patterns, fingerprints, handprints, voice patterns, keystroke patterns etc for authentication. But most of the biometric devices which are available on the market, only retina pattern, iris patterns, fingerprint and handprint systems are properly classified as biometric systems. Others are more classified as behavioral systems.
Biometric identification systems normally work by obtaining unique characteristics from you, like a handprint, a retina pattern etc. The biometric system then compares that to the specimen data stored in the system.
Biometrics authentication is much better when compared with other types of authentication methods. But the users are reluctant in using biometric authentication. For example, many users feel that retina scanner biometric authentication system may cause loss of their vision. False positives and false negatives are a serious problem with Biometric authentication.

RETINA PATTERN BIO-METRIC SYSTEMS


Everybody has a unique retinal vascular pattern. Retina Pattern Biometric system uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. Some other bio metric systems also perform iris and pupil measurements. Retina Pattern Bio-metric Systems are highly reliable. Users are often worried in using retina scanners because they fear that retina scanners will blind or injure their eyes.

IRIS SCANS BIO-METRIC SYSTEMS


Iris scan verify the identity by scanning the colored part of the front of the eye. Iris scan is is much easier and very accurate.

FINGERPRINTS BIO-METRIC SYSTEMS



Fingerprints are used in forensic and identification for long time. Fingerprints of each individual are unique. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be allowed access.
The theoretical working of the fingerprint scanner is as described below. The user’s finger is placed on the scanner surface. Light flashes inside the machine, and the reflection is captured by a scanner, and it is used for analysis and then verified against the original specimen stored in the system. The user is allowed or denied based on the result of this verification.

HAND-PRINTS BIO-METRIC SYSTEMS


As in the case of finger print, everybody has unique hand-prints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification

VOICE PATTERNS BIOMETRIC SYSTEMS


Voice Patterns Biometric Systems can also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice.

KEYSTROKES BIOMETRIC SYSTEMS


Keystroke Biometric Systems examine the unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access. 

TOKEN AUTHENTICATION


Token technology is another method that can be used to authenticate users. Tokens are physical devices used for the randomization of a code that can be used to assure the identity of the user. Tokens provide an extremely high level of authentication. 

There are different types of tokens. A particular type token is a small device with a keypad to key in values. The server issues a challenge with a number when the user try to login. The user keys this number into the token card, and the card displays a response.  

The user inputs this response and sends it to the server, which calculates the same result it expects to see from the token. If the numbers match, the user is authenticated.


Another type of token is based on time. This type of token display numbers at different intervals of time. The user who needs the authentication should key in this time based values also at the time of authentication. If the value from the token matches a value the server has calculated, the account is authenticated, the user is allowed access.

MULTI FACTOR AUTHENTICATION


In multi-factor authentication, we expand on the traditional requirements that exist in a single factor authentication. To accomplish this, multi-factor authentication will use another factor for authentication in addition to the traditional password authentication.
For example, most password-based single authentication methods use a password. In multi-factor authentication methods, we can tighten the authentication by adding a finger print biometric scanner system also.
Multi-factor authentication is more secure single factor authentication, because it adds steps that increase the layers of security.

ROUTER

ROUTER AND ITS MEMORY

    
   A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

  Routers are special computers built to handle inter network traffic. Routers are very important network infrastructure devices and they serve many users at same time. The end users ho not communicate with the routers, but the network traffic generated by the end users communicate through the router.

APPLICATIONS OF ROUTER

  • ACCESS
  • DISTRIBUTION
  • CORE
  • SECURITY
ACCESS


   Access routers, including 'small office/home office' (SOHO) models, are located at customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost. Some SOHO routers are capable of running alternative free Linux-based firmware’s like Tomato, Openwork or DD-WRT

DISTRIBUTION


   Distribution routers aggregate traffic from multiple access routers, either at the same site, or to collect the data streams from multiple sites to a major enterprise location. Distribution routers are often responsible for enforcing quality of service across a wide area network (WAN), so they may have considerable memory installed, multiple WAN interface connections, and substantial on board data processing routines. They may also provide connectivity to groups of file servers or other external networks.

CORE



   In enterprises, a core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth, but lack some of the features of Edge Routers

SECURITY


   External networks must be carefully considered as part of the overall security strategy. A router may include a firewall, VPNhandling, and other security functions, or these may be handled by separate devices. Many companies produced security-oriented routers, including Cisco Systems' PIX and ASA5500 series, Juniper's Net screen, Watch guard’s Firebox, Barracuda's variety of mail-oriented devices, and many others. Routers also commonly perform network address translation, (which allows multiple devices on a network to share a single public IP address) and State full Packet Inspection. Experts agree that open source routers are more secure.

INTERNET CONNECTIVITY AND INTERNAL USE

Routers intended for ISP and major enterprise connectivity usually exchange routing information using the Border Gateway Protocol (BGP). RFC 4098 standard defines the types of BGP routers according to their functions:
·        EDGE ROUTER: Also called a Provider Edge router, is placed at the edge of an ISP network. The router uses External BGP to EBGP routers in other ISPs, or a large enterprise Autonomous System.
·      SUBSCRIBER EDGE ROUTER: Also called a Customer Edge router, is located at the edge of the subscriber's network, it also uses EBGP to its provider's Autonomous System. It is typically used in an (enterprise) organization.
·         INTER-PROVIDER BORDER ROUTER: Interconnecting ISPs, is a BGP router that maintains BGP sessions with other BGP routers in ISP Autonomous Systems.
·       CORE ROUTER: A core router resides within an Autonomous System as a back bone to carry traffic between edge routers.
·         WITHIN AN ISP: In the ISP's Autonomous System, a router uses internal BGP to communicate with other ISP edge routers, other intranet core routers, or the ISP's intranet provider border routers.
·     "INTERNET BACKBONE:" The Internet no longer has a clearly identifiable backbone, unlike its predecessor networks. See default (DFZ). The major ISPs' system routers make up what could be considered to be the current Internet backbone core.[16] ISPs operate all four types of the BGP routers described here. An ISP "core" router is used to interconnect its edge and border routers. Core routers may also have specialized functions in networks based on a combination of BGP and Multi-Protocol Label Switching protocols.
·     PORT FORWARDING: Routers are also used for port forwarding between private Internets connected servers.
·  VOICE/DATA/FAX/VIDEO PROCESSING ROUTERS: Commonly referred to as access servers or gateways, these devices are used to route and process voice, data, video and fax traffic on the Internet. Since 2005, most long-distance phone calls have been processed as IP traffic (VOIP) through a voice gateway. Use of access server type routers expanded with the advent of the Internet, first with dial-up access and another resurgence with voice phone service.

SYMBOL OF ROUTER



ROUTER CONNECTIONS


CONNECTION BY USING CONSOLE PORT



By connecting the routers console port to a workstation through a console cable. The console port is the management port which is used by administrators to log into a router directly-that without using a network connection. You require a terminal emulator application like HyperTerminal or Putty to connect to router. Console port connection is a way to connect to the router when a router cannot be accessed over the network. Click the following link to learn how to connect and access a router using console connection


CONNECTION BY USING AUXILIARY PORT (AUX PORT)

By using a remote computer through a modem that calls another modem connected to the router with a cable using the Auxiliary Port on the router. Auxiliary Port (AUX Port) allows a direct, non-network connection to the router, from a remote location. The Auxiliary Port (AUX Port) uses a connector type to which modems can plug into, which allows an administrator from a remote location to access the router like a console port.

CONNECTION BY USING PROTOCOLS LIKE TELNET, SSH, HTTP OR HTTPS

The routers can be managed over the network by using standard TCP/IP protocols like Telnet, SSH, HTTP or HTTPS. Telnet was developed in the early days of the UNIX operating system to manage computers remotely. A Telnet client and server application ships with Cisco's IOS software and most computer operating systems. SSH is a more secure way to configure routers, since the SSH communication is encrypted. Cisco IOS also has a HTTP server to managed web based communication with the router.

CONSOLE AND AUXILIARY PORT


Table of Routers with Console and AUX Ports

The table in this section lists the Cisco router series and the corresponding console and AUX ports.

Router
Console Port
Console Port Cable
AUX Port
AUX Port Cable
600
RJ-45(management port)
N/A
N/A
700
N/A
N/A
800
N/A
N/A
1000
N/A
N/A
1600
N/A
N/A
1700
2500
2600
3600
MC3810
4000
AS5200/5300
AS5400
AS5800
7100/7200/7300
7200
7500
12000


CONSOLE PORT SIGNALS

Note: The console port does not support modem control or hardware flow control.
AUXILIARY PORT SIGNALS

Note: The auxiliary port supports hardware flow control and modem control.