well the DNS server address default is my routers address I changed it to my ISP's DNS server's address and everything works well any idea why this happened only on nslookup while the rest of DNS worked fine ? also : it happened only on one router I moved to another house and it is working with any setting
User 10929916
Posts
-
nslookup fails on windows 7 -
nslookup fails on windows 7I tried switching off IPV6 but it didnt work it shows "DNS request timed out timeout was 2 seconds" almost every time these is the DNS communication as captured by wireshark when I type 'nslookup' and open the program
5 4.080346 192.168.1.6 192.168.1.1 DNS 84 Standard query 0x0001 PTR 1.1.168.192.in-addr.arpa
6 4.336621 192.168.1.1 192.168.1.6 DNS 113 Standard query response 0x0001 PTR 1.1.168.192.in-addr.arpa PTR D-Link.DSL2740Band when I type 'facebook.com'
21 12.931466 192.168.1.6 192.168.1.1 DNS 81 Standard query 0x0002 A facebook.com.DSL2740B
22 12.965884 192.168.1.1 192.168.1.6 DNS 156 Standard query response 0x0002 No such name A facebook.com.DSL2740B SOA a.root-servers.net
23 12.966017 192.168.1.6 192.168.1.1 DNS 81 Standard query 0x0003 AAAA facebook.com.DSL2740B
29 14.976087 192.168.1.6 192.168.1.1 DNS 72 Standard query 0x0004 A facebook.com
30 14.980174 192.168.1.1 192.168.1.6 DNS 88 Standard query response 0x0004 A facebook.com A 173.252.89.132(first field is the packet number,second:time,third:source IP fourth:dest IP fifth:protocol sixth:length seventh:description) why is my gateway's name appended on facebook.com (facebook.com.DSL2740B) when I type set type=mx or set type=all the MX and ANY queries are sent and there is no reply any help ??
-
C string operationsif I have this code : char * s =(char*)malloc(10); and then I write 's="test"' then s will have a different address right ? why is this happening ?
-
C execl is this a bug ?inside a C function I have this code
printf("%s",final);
//execl(final,final,NULL);I do a fork and this is part of the childs code the final string is not printed when the execl line is not commented out,nor are any printf calls before it why is this happening ?
-
how do websites know my IP?(not a totally noob question)each side can see the other side's IP in the packet header but if we run for example tracert codeproject.com we see that a packet goes through a number of gateways between the client and the server .Isn't it supossed that each gateway changes the last gateway's IP address with its own so it can get the packet back ? if it is so then how codeproject see my IP and not the IP of the last place the packet went through ? thanks
-
what does WPA/WPA2 really encrypt ??I have WPA2-personal on my laptop and Im connected wirelessly to my home AP.the traffic I capture from wireshark is all unencrypted some days ago I had my router on WPA-personal and did a MITM attack on my smartphone and the traffic was unencrypted too. Isn't WPA supposed to encrypt the traffic and not just ask a password to enter the network ?
-
using MITM and packet editing to defeat SSL/TLS : is this a valid method ?I'm studying security -on my own- and need to clear out a few things ! If I've learned this correctly HTTPS connections do these things: 1)public key from server to client 2)client encrypts a key he generates using public key 3) sends encrypted key to server 4) server decrypts the message with his private key 5) voilà! the two sides are ready to exchange information using symetric ciphers so asymmetric encryptiong is only used for sending a symmetric key over the network suppose I have a certificate and I can decrypt messages encrypted with its public key I perform a MITM attack (say ARP spoof),intercept and change the certificate the server sends with the one I know its private key. browsers pops a little warning most users ignore ("WTF is a trusted certificate anyway ??") most of the times user proceeds the key is encrypted using my public key and sent to the server I intercept the key,decrypt it,and encrypt it again with the public key the server sent then let it go to the server. server decrypts the key and I can see every info the two sides exchange. well...is it that simple ? I don't have time to test it these days so Im asking you I believe/hope I am mistaken and a "do you want to proceed" message is not the only guard
-
using MITM and packet editing to defeat SSL/TLS : is this a valid method ?I'm studying security -on my own- and need to clear out a few things ! If I've learned this correctly HTTPS connections do these things: 1)public key from server to client 2)client encrypts a key he generates using public key 3) sends encrypted key to server 4) server decrypts the message with his private key 5) voilà! the two sides are ready to exchange information using symetric ciphers so asymmetric encryptiong is only used for sending a symmetric key over the network suppose I have a certificate and I can decrypt messages encrypted with its public key I perform a MITM attack (say ARP spoof),intercept and change the certificate the server sends with the one I know its private key. browsers pops a little warning most users ignore ("WTF is a trusted certificate anyway ??") most of the times user proceeds the key is encrypted using my public key and sent to the server I intercept the key,decrypt it,and encrypt it again with the public key the server sent then let it go to the server. server decrypts the key and I can see every info the two sides exchange. well...is it that simple ? I don't have time to test it these days so Im asking you I believe/hope I am mistaken and a "do you want to proceed" message is not the only guard
-
do routers contain switches ?no I'm not talking about lan communication suppose you send a packet to codeproject from your pc. its trip will be (with all address change of course) 192.168.1.4->192.168.1.1(def.gate.)->10 more machines->codeproject say your external ip is 100.100.100.100 when its reply gets at 100.100.100.100 your router is in charge of sending it to x.x.x.4...I'm talking about this bit
-
do routers contain switches ?it's probably a stupid question but when packets are sent to a router that is for example at 192.168.1.1 on the LAN with a destination 192.168.1.4 the router searches a lookup table for the MAC associated with 192.168.1.4 and sends the frame just there and doesnt forward it to all connected devices so does that count as a switch ?
-
machine code : disabling interupts ?Ok so I've read that there are some instructions that do things that enable/disable interupts,etc are these the so-called priviledged instructions ?? do you know if there is a list with all those "strange" instructions ?
-
Is 11110000 processed faster than 10101010?somewhere on the Internet I read that the high-low voltage change is not immediate but happens slowly instead. for example a voltage graph of 010 would be:
___________ / \ / \ _______/ \_________ and not ____________ __________ ___________
I've also read that the "/" and "\" parts are a factor that slows processors' speed why does this happen,( can you recomend me a book or something to understand this better ? ) and does it mean that 11110000 is processed faster than 10101010 for example ? thanks a lot !! edit: I tried putting my pretty 'graph' on inside 'code' so it would look ok... it didn't work :( -
I think I got a virus on my galaxy S3...but I suck at analysing APKs and mobile phone security generally...So I was browsing a page and something seemed to go wrong ! after some time I saw there were two APKs files downloaded -from that page-. their names are Xzone-1409140423366-.apk and Xzone-1409227281662-.apk whether or not they are malicious is obvious :if they weren't why were they downloaded 'secretly'. I found a report here[^] and it says something about key logging.well that's scary...and there are not keyscramblers available for android ! after opening the APK with winrar I found -except of the bunch of HTMLs and a few XMLs- some pictures like playbuttons etc- that were not noticed by me while using the phone. no other strange activity was noticed either ! so in my view the file was not 'executed'. but I wan't to know for sure ! Is it possible for someone to run an APK file ,bypassing the phone's security measures ? also,if this thing enabled a stealth program how can I find it ? (I mean something hidden from taskmanager etc ) any advanced tips ? oh...I scanned the phone with AVG free and it found no threat ! thanks a lot !!!
-
Think I got a virus...but I suck at analysing APKs -don't know anything about mobiles in general-So I was browsing a page and something seemed to go wrong ! after some time I saw there were two APKs files downloaded -from that page-. their names are Xzone-1409140423366-.apk and Xzone-1409227281662-.apk whether or not they are malicious is obvious :if they weren't why were they downloaded 'secretly'. I found a report here[^] and it says something about key logging.well that's scary...and there are not keyscramblers available for android ! after opening the APK with winrar I found -except of the bunch of HTMLs and a few XMLs- some pictures like playbuttons etc- that were not noticed by me while using the phone. no other strange activity was noticed either ! so in my view the file was not 'executed'. but I wan't to know for sure ! Is it possible for someone to run an APK file ,bypassing the phone's security measures ? also,if this thing enabled a stealth program how can I find it ? (I mean something hidden from taskmanager etc ) any advanced tips ? oh...I scanned the phone with AVG free and it found no threat ! thanks a lot !!!
-
Computer Architecture : is 0 really 0 ?in computers' circuits is the bit 0 really represented by no currency or it is a small signal that the computer is made to treat as 0 ? thank a lot !