Change DNS Server (Windows)


A lot of companies have their own DNS Servers which are open to society. So if we have difficulties with the DNS services provided by the ISPs like slow DNS resolving. We can change the DNS server for faster results and security.

  • Go to Control Panel and then select Network and Internet.
  • Click on Network and Sharing Center

  • Click Change adapter settings on the left side.

  • Right-Click on the Adapter, you are using (in our case it's Wi-Fi as shown above) and go to Properties
  • Double-click on Internet Protocol Version 4 (TCP/IPv4).


  • Click on OK and you are done.

To know more about DNS Servers, Click Here

Video Tutorial - Coming Soon...


We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

A lot of companies have their own DNS Servers which are open to society. So if we have difficulties with the DNS services provide...

DNS Servers, Explained!


We all know how the basic functionality of the Internet works! We request a page like www.hackhunt.in and the browser displays the webpage. Well, it's not that simple, there is another entity involved, and understanding this entity can help you protect your privacy and security and even speed up.

DNS, short for Domain Name System which is nothing but an analogy of our phonebook or contacts. Like phonebooks and contacts applications store mobile numbers of different persons with their names. Similarly, IPs are stored with their domain name (or website). This helps in accessing the website as on the internet, websites are accessed using their IPs only. 


Earlier there were fewer websites so it was easy to remember the IPs of those websites. But as the internet grew, the number of websites and IPs corresponding to them increased too. Hence, it was impossible for the human brain to remember all the IPs. Therefore,  DNS was formed, which stores the IPs of websites (domain name) and helps us to access them easily.


What is a DNS Server?

A server is a device or program used to provide services to other programs known as “clients”. Similarly, DNS Server is used to retrieve the IP of the website that was entered in the user's browser (Application Layer Service) which ultimately helps the user to connect to the website.


A lot of companies have their own DNS Servers which are open to society. So if we have difficulties with the DNS services provided by the ISPs like slow DNS resolving. We can change the DNS server for faster results and security. 


Why change DNS Server?

  • Change in DNS server may increase the speed of resolving DNS queries. 
  • The DNS server you are using may not be secure to DNS-related attacks which may cause you to delay in DNS resolving whereas using a secure DNS service like Googles' may result in faster resolving of the DNS query. The resolving speed depends upon the location as Google's DNS server IPs are anycast which means your query will be sent to the nearest server depending on your location. 
  • Sometimes you may face an issue of a particular website not responding only on your internet or in your country whereas it's working for others or in different countries, it might be due to the blocking of the website by your ISP's DNS server or by the Government.
  • If you change your DNS server then you can access those websites. 

List of DNS Servers

Google DNS (good speed and security, but no privacy)
    Primary 8.8.8.8
    Alternate 8.8.4.4

Open DNS (good speed and security, privacy can be a concern)
    Primary 208.67.222.222
    Alternate 208.67.220.220

Comodo DNS (good speed and security, privacy can be a concern)
    Primary 8.26.56.26
    Alternate 8.20.247.20

Cloudflare DNS (good speed and security, privacy can be a concern)
    Primary 1.1.1.1
    Alternate 1.0.0.1

    Primary 172.104.136.243
    Alternate 192.71.245.208


We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

We all know how the basic functionality of the Internet works! We request a page like www.hackhunt.in  and the browser displays t...

HTTP Request Methods

Headers are basically the metadata that is sent by the client and server while communicating with each other. It contains 

  • HTTP Method,
  • Connection type, 
  • User-Agent, 
  • HTTP Version, 
  • Content-Encoding, 
  • Host, and etc.

Request and Response both contain headers that may differ. For example, Content-Length, while requesting it may be less or null (might not be even present) in the request header while in the response header the content length parameter is present.

The first line in the request headers contains the HTTP Method, Host, HTTP Version which is sent to the server for processing, after processing the server responds with the response header and the content.

Types of HTTP Method

There are 8 types of methods GET, POST, HEAD, PUT, DELETE, OPTIONS, CONNECT, and TRACE

  • GET: The GET method is used to retrieve data from a given server using a URI (Uniform Resource Identifier).  Requests using the GET method only retrieves data and have no other effect on the data. A GET request retrieves data by specifying the parameters in the URL portion of the request. The length of the URL remains limited in GET method. It is used when data does not require security as in the GET method the parameters passed are visible in the URL.
Requests Header for URI: www.example.com

  • POST: The POST method is used to send or upload a file to a server. It is also used in HTML form submission. The parameters passed in POST is sent via headers instead of passing it in the URL thus the parameters are not visible in the URL. Furthermore, the method is not efficient because the method is non-idempotent (idempotence is a property that applied multiple times to give the same result). 


Difference between GET and POST methods:

GET POST
Used to receive data or information using URL. Used to send or upload data on the server using URL.
Parameters passed are visible in the URL. Parameters are not visible as they are part of headers.
GET request is often cacheable. POST requests can hardly be cacheable.
More efficient due to idempotence property. Less efficient due to non-idempotence.
Helps to send non-sensitive data. Helps to send sensitive data.

  • HEAD: HEAD is similar to GET but it is used to obtain the information regarding the document, not the document itself i.e. its aim is to get the metadata in response like filetype, the Content-Length, the Content-Encoding, and other header parameters.
Requests Header for URL: www.example.com

Response Header for the Request

  • PUT: Replaces all current representations of the target resource with the uploaded content.
  • DELETE: Removes all current representations of the target resource given by a URI. The Server will DELETE the file that was passed in the request method.
  • CONNECT: Establishes a tunnel to the server identified by the URL passed.
  • OPTIONS: This method helps us to know about all the methods that we can use or have permission to perform on a particular URL.
  • TRACE: This method is used to echo the contents of an HTTP request back to the requester which can be used for debugging purposes at the time of development.

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

Headers are basically the metadata that is sent by the client and server while communicating with each other. It contains  HT...

Online Antivirus

Online Antivirus can also be used as a Second Opinion Antivirus. Everyone generally misinterprets Online Antivirus. Online Antivirus are of two types, 

FIRST TYPE

There are websites available where you can upload a file and check if the file is a malware or not. These websites do not repair or fix the issue. Websites like this scan the file and then check the signature of the file with their database and some even check the database with over 70 different antivirus company and gives you results according to each company's database. These websites share the results of the file with the community if they detect any virus or malware to update their database and make the world a bit more secure. 
 

SECOND TYPE

These Antivirus or websites are also known as Cloud-Based Antivirus (to know more about cloud antivirus check the link at the bottom of the page called What is Antivirus). For this antivirus to work you need to install a tool that will connect and give access to your system's files. In other words, the tool will scan the system and send the result to the company and they will check the signatures online. So, we do not need to download the whole antivirus and also do not need to update the database. The best part of this kind of antivirus is it can be installed apart from the Antivirus you have.

If you are interested in any topic, CLICK HERE:
  • What is Antivirus 
  • Free Antivirus 
  • Best Antivirus in terms of OS 
  • Next-Generation Antivirus 
  • Why Antivirus is Joke/Dangerous

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

Online Antivirus can also be used as a Second Opinion Antivirus. Everyone generally misinterprets Online Antivirus. Online Antivir...

Best Antivirus Available [June 2020]

An antivirus is software that protects our system from malware like viruses, trojans, backdoors, etc. To prevent our computers from this malware, antiviruses are installed. This also protects our data from getting leaked, provides email protection, browsing protection, and much more.  
 
We heard one antivirus name and think it is best for every platform. But is it the case? No. Check below which antivirus is best on which platform. (All the listed below are best in terms of protection, there is no order)

Links are provided with the name; you can choose any one of these antiviruses as per your need.
 
If you are interested in any topic, CLICK HERE
  • Free Antivirus
  • What is Antivirus 
  • Next-Generation Antivirus 
  • Online Antivirus 
  • Why Antivirus is Joke/Dangerous 

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

An antivirus is software that protects our system from malware like viruses, trojans, backdoors, etc. To prevent our computers fro...

Introduction to Google Dorking

Generally, people use Google Search to find images, videos, news, specific information, etc. However, Google has special operators know as Dork that can be used to search specifically. Hackers use this technique to get information for a specific target which can help them to get sensitive information like usernames and passwords.


Google Dorking is a technique that uses Google's search and other applications to find security holes in the configuration and the coding techniques used by the website. Advanced operators can be used inside the search engine to locate specific strings of text within search results.

Google Dork is a search string criterion in which the search engine returns the results according to the requested dork.

This goes without saying that Google knows who you are when you perform activities like this. Only use this information for legal purposes. If the information is available on the Internet does not mean it can be used to harm others. Any illegal activities will result in cybercrime charges.

Operators:

  • site: Search only one website. site operator limits the search, below example will show the results of hacks on website hackhunt.in
hacks site:hackhunt.in 
  • intitle: Searches for the string in the title of the HTML page. The below example will show the results which have python in the page title.
intitle:python
  • inurl: Searches for the string in URL. The below example shows the result of websites that have login.php in the URL.
inurl:login.php
  • intext: Searches for the string in the content of the page. This command is similar to a normal google search. The below example shows the result of the websites which has programming word in it.
intext:programming

Or can be combined with other operators like suppose we need results containing hacks from hackhunt.in website. So,

site:hackhunt.in intext:hacks
  • filetype: Searches for the string as a file type. The below example will show PDFs available on the internet.
filetype:pdf

Or if you want a presentation on the topic Python.

python filetyle:ppt | filetype:pptx

Note: | can be used as a Logical OR.

  • cache: This will show you the cached version of the site. Google always takes a snapshot of the website which later becomes a part of Google's Cache. If the website is down these cached websites are helpful. The below an example will show the cached version of facebook.com.
cache:facebook.com
  • link: Displays all the pages linked to the specified URL. The below example will show the linked pages to hackhunt.in
link:hackhunt.in
  • *: This can be used as anything in that place. The below example will show the results for how to be on/create/post a poll/... Facebook etc. Or you want all the subdomains of  facebook.com.
how to * facebook
site:*.facebook.com

You can get more of this on Google Hacking Database which is also known as GHDB where many dorks are published by Cybersecurity researchers, penetration testers which can be used, and also can be modified to ease our work.  


If you would like to perform basic RECON on a website or know what files are exposed to the Internet. Go to Pentest-Tools, type the name of the website, and click the options mentioned below and check the results.


We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

Generally, people use Google Search to find images, videos, news, specific information, etc. However, Google has special operators...

Nmap - Working and Basic Commands


Nmap is the most used port scanning tool on the Internet and it is reasonable too as it is extremely powerful. With these Nmap basic commands, you can gather information on a target by running port scanning and fingerprinting. 

The basic and default SYN scan will scan 1000 TCP ports on the target specified.

  • Syntax: nmap <IP>
  • Example: nmap 192.168.0.105
If non-root user add sudo, in the beginning, sudo nmap <IP>
 
**NOTE - If you are interested in what these 1000 ports are, check the file nmap-services in the directory /usr/share/nmap/nmap-services. To read the file type in the terminal

nano /usr/share/nmap/nmap-services

If you run the Nmap with root access, Nmap will do a so-called privileged scan which is a RAW SYN Stealth Scan. But if you run Nmap as a non-root access, it will do a so-called unprivileged scan which is TCP Connect Scan which is apparently slower and can be detectable. 

So, with the root privileges, the Nmap is able to send an SYN packet and then SYN-ACK that comes back is enough to know if there is an actual open port.

But, with the non-root privileges, the Nmap cannot send Raw TCP/IP packets. So, it has to call the Operating System to do a full connect which makes it slower and more probable to get recorded in system logs as it does a full TCP Connect to obtain the port information.

Not sure about SYN or SYN-ACK or TCP Connect? 



All in all, with root access it is an SYN Scan, without root it is a full connect scan.

If you want to know what is going on during the scan. Add the -v command, which is for verbosity. It has three levels: -v, -vv, -vvv. More v's means more verbose. If you chose one level of verbose you can press in the middle of the scan to increase the verbosity.

Similarly, -d command, which is for debugging. It has 9 levels and can be defined as -d1 till -d9. That is the highest effective level and will produce thousands of lines unless you run a very simple scan with very few ports and targets.

To know the percentage of completion, you can press any key in the middle of the scan and it will display the percentage.

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

Nmap is the most used port scanning tool on the Internet and it is reasonable too as it is extremely powerful. With these Nmap basic c...

Nmap - Explained

Nmap, short for Network Mapper is a free and open-source command-line (CLI) tool for network discovery and security assessment. Many systems and network administrators, penetration testers, hackers, and anyone who is interested and wants to understand more about the devices on the given network finds Nmap useful. 

Nmap uses raw IP packet in a unique way to determine:

  • What devices and/or hosts available on the network.
  • What services like application name and version are running on the host. 
  • What operating system and OS version they are running.
  • What type of firewalls are in use.
  • What type of packet filtering are in use.

Basically, Nmap was designed to rapidly scan large networks. but also works fine with a single host. Nmap runs on all major operating systems, and official binary packages are available for Linux, Windows, and Mac OS X to name a few.

In addition to the classic command-line tool, it has an advanced GUI and results viewer named Zenmap

All in all, Nmap is a huge security scanner and from an IP Range, it can discover open ports, running services, OS, connected host to the network, and much more.

Similar Applications

  • For Large IP Ranges: 
    • Nmap
    • Zmap
    • Masscan
  • For Small IP Ranges: 
    • Nmap
    • WhatWeb
    • BlindElephant

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

Nmap, short for Network Mapper is a free and open-source command-line (CLI) tool for network discovery and security assessment. Many ...

Block Access to Websites for your PC

 
One of the backbones of the Internet is the DNS system that translates easily to remember (and type) names such as www.google.com into equivalent IP addresses (8.8.8.8). While you use DNS servers to get to websites, your computer also has something called a HOSTS file which can have this information stored locally. This can be used to disable access to unwanted websites.
  • Browse C:\WINDOWS\system32\drivers\etc 
  • Find the file named "HOSTS"
  • Right-click and open with notepad
  • Under "127.0.0.1 localhost" Add 127.0.0.2 siteyouwanttoblock.com
  • Now close the hosts file and click Save
  • Reboot your computer for the changes to take effect and you'll find that all those websites are now blocked. 

**NOTE - If you have trouble saving the file, check the video. 

    Video Tutorial



    We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

      One of the backbones of the Internet is the DNS system that translates easily to remember (and ty...