Sunday, September 17, 2017

What is communication channels?

Communication Channel:

Communication channels are physical (Wires) or wireless (Radio frequency) path used as a transmission medium to carry information signal between two sources. The parameter used to measure communication channels are usually known as bandwidth (HZ) or data rate (bit per second). For real communication it's is mandatory to use some kind of communication channels. It is divided into two categories.
  1. Guided Medium
  2. Unguided Medium
Which is further subdivided given as follow.
Communication Channels

Guided Medium:

By guided medium means those communication channels that connect sender and receiver through some physical media.For example, a copper wire used in PSTN is considered as guided medium. There are three types of wires are used as communication channels in the guided medium.
  1. Twisted Pair Cable
  2. Coaxial Cable
  3. Optical Fiber

1- Twisted pair cable:

Twisted Pair Cable is guided medium which is made of copper wire. Both pairs of the cable are insulated separately and act as a single communication link. It is mostly used cable especially in old telephone system where subscriber connects with end office through twisted pair cable. A question comes to mind that why Twist?
Creating Twist helps in to avoid cross-talk and interference between adjacent pairs in the cable. These pair cables are bundled together. It is also necessary to keep the difference in twist length in the adjacent pair.

Characteristic of Twisted Pair cable:

  • Less expensive as compared to Co-axial and optical fiber cable.
  • Support both analog and digital signal.
  • Easy to handle and work with it.
  • Twisting reduces cross-talk and interference. 
  • Suitable for local area network.
  • Support multiple categories.

Limitation of Twisted Pair Cable:

  • Repeater or Amplifier required after some distance.
  • Limited in the distance, data rate, and bandwidth.
  • Susceptible to interface and Noise.

2- Coaxial cable:


3- Optical Fiber:

Optical fiber is a thin cylinderical fiber made of glass that carries data in form of light pulses.

Unguided Medium:

microwave, satellite, radio, and infrared

Don't forget to Share this post with your friends

Sunday, September 10, 2017

Explanation of sim card (Subscriber Identity Module) | GSM user

Explanation of sim card (Subscriber Identity Module) | GSM user

Sim Card (Subscriber Identity Module)

It is a small chip that carries and store information of GSM user. Sim card is actually a memory module or registers. GSM user keeps sim card on their mobile device. Besides, that sim card has a lot of other function that we going explain in this post so keep reading. Check below table content that we are going to explain.
  1.  Network Identity
  2.  IMSI 
  3.  Tmsi
  4.  MSISDN (Mobile Subscriber Integrated Services Digital Network-Number)
  5.  Ki(Secret key) & Ki (cipher key)
  6.  LAI (location area identity)
  7.  Algorithms (A8 ,A3 & A5)
  8.  pin, pin2, puk, puk2

1- Network Identity

Sim card carries a network code that identifies where is network located. This defines its type, like STC, MTN etc.


It is a serial that separates every segment. This serial should be kept hidden because this can use for any attempt to hack to steal its balance or common information.


When a GSM user inserts their Sim card in his mobile then IMSI serial should send to the network. This all because to keep you safe from the hack. The  IMSI serial is replaced by TMSI. This change is temporary so that hacker cannot recognize it.

4- MSISDN (Mobile Subscriber Integrated Services Digital Network-Number)

MSISDN is known as a mobile number. This number contains the complete address of GSM user. E.g it contains a country code, network code, etc which identify the address.

   Tag:  What is exactly Mobile number made of? 

5- Ki(Secret key) & Ki (cipher key)

Ki (Secret key) and ki ( Cipher key) is used for data transfer and security.

6- LAI (location area identity)

LAI is used for Identification of GSM user. This information is stored by Mobile station in Sim Card. When GSM user changes their location then MS request for location update and sends this new location to the mobile provider. This helps mobile provider to identify the mobile station in case of an incoming call.

7- Algorithms (A8 ,A3 & A5)

Algorithms A8 and  A3 are used for authentication process (validation) and algorithm A5 is used for ciphering (Encryption).

9-pin, pin2, puk, puk2

These are some special number codes used for GSM user security. Users are allowed to access this code for usage and modification.

Don't forget to Share this post with you friends

Saturday, September 9, 2017

Architecture of GSM (Global System for Mobile Communication)

GSM  Architecture: 

Today we will learn about GSM (Global system for mobile communication) architecture in this post. GSM is also known as 2G (Second generation of mobile communication). It is developed by European Telecommunication Standards Institute (ETSI) and it's is based on TDMA technology. To learn more about GSM architecture in detail watch the following video...


Don't forget to Share this post with your friends

Explanation of Signalling system 7(ss7) Network Architecture

Signalling system 7 Network Architecture:

ss7 is used to set up GSM (global system for mobile communication) phone calls. SS7 is set of protocols. The main job ss7 is to set and tear down mobile calls. It also uses in translation, short message service (SMS), local number portability, prepaid billing mechanism etc.
To learn more about ss7 network Architecture in detail check below video


Don't forget to Share this post with your friends

Friday, September 8, 2017

CommView for WiFi tool for monitoring wireless

CommView for Wifi tool for monitoring wireless:

CommView for WiFi tool is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n/ac networks. Loaded with many user-friendly features, CommView for WiFi tool combines performance and flexibility with an ease of use unmatched in the industry.
ComView for Wifi
CommView for WiFi tool captures every packet on the air to display important information such as the list of access points and stations, per-node and per-channel statistics, signal strength, a list of packets and network connections, protocol distribution charts, etc.
By providing this information, CommView for WiFi tool can help you view and examine packets, pinpoint network problems, and troubleshoot software and hardware.

CommView for WiFi tool includes a VoIP module for in-depth analysis, recording, and playback of SIP and H.323 voice communications.

Packets can be decrypted utilizing user-defined WEP or WPA/WPA2-PSK keys and are decoded down to the lowest layer. With over 100 supported protocols, this network analyzer allows you to see every detail of a captured packet using a convenient tree-like structure to display protocol layers and packet headers. Additionally, the product provides an open interface for plugging in custom decoding modules.

CommView for WiFi tool is a comprehensive and affordable tool for wireless LAN administrator, security professionals, network programmers, or anyone who wants to have a full picture of the WLAN traffic.

The feature of ComView:

  1. Scan the air for WiFi stations and access points.
  2. Capture 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac WLAN traffic.
  3. Specify WEP or WPA keys to decrypt encrypted packets.
  4. View detailed per-node and per-channel statistics.
  5. View detailed IP connections statistics: IP addresses, ports, sessions, etc.
  6. Reconstruct TCP sessions.
  7. Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, rogue access points, etc.
  8. View protocol "pie" charts.
  9. Monitor bandwidth utilization.
  10. Browse captured and decoded packets in real time
  11. Search for strings or hex data in captured packet contents.
  12. Log individual or all packets to files.
  13. Load and view capture files offline.
  14. Import and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, Wireshark/Tcpdump, and Wireshark/pcapng formats, export packets in hex and text formats.
  15. Export any IP address to SmartWhois for quick, easy IP lookup.
  16. Capture data from multiple channels simultaneously using several USB adapters.
  17. Capture A-MPDU and A-MSDU packets.
  18. Simulate access points.
  19. And much more!

System Requirements:

CommView for WiFi tool runs on Microsoft Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2. Both 32- and 64-bit versions are supported.

   Source:                                                 tamos      

Don't forget to Share this post with you friends

Fluxion Wireless tool for hacking WPA/WPA2

Fluxion Wireless tool:

Fluxion wireless tool for hacking WPA/WPA2 is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. Fluxion wireless tool is compatible with the latest release of Kali (rolling). The attack is mostly manual.

Note:  This post is purely for security purpose to make you safe from such attack. 

How it works:

  1. Fluxion wireless tool Scan the networks.
  2. Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password)
  3. Use WEB Interface *
  4. Launch a FakeAP instance to imitate the original access point.
  5. Spawns an MDK3 process, which deauthenticates all users connected to the target network so they can be lured to connect to the FakeAP and enter the WPA password.
  6. A fake DNS server is launched in order to capture all DNS requests and redirecd them to the host running the script
  7. A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  8. Each submitted password is verified by the handshake captured earlier
  9. The attack will automatically terminate, as soon as a correct password is submitted.


For fluxion wireless tool Linux-based operating system is required. We recommend Kali Linux 2 or Kali 2016.1 rolling. Kali 2 & 2016 support the latest aircrack-ng versions. An external wifi card is recommended.


  • git clone --recursive # Download the latest revision 
  • cd fluxion # Switch to tool's directory 
  • ./ # Run fluxion (missing dependencies will be auto-installed)

Click on below link to Download

Source:      GitHub

Don't forget to Share Fluxion wireless tool with your friends

Elcomsoft Wireless Security Auditor (EWSA) free download 7.01.456

Elcomsoft Wireless Security Auditor:

Elcomsoft Wireless Security Auditor is an all-in-one tool to help administrators verify how secure a company’s wireless network is. The tool will attempt to break into a secured Wi-Fi network by sniffing wireless traffic and running an attack on the network’s WPA/WPA2-PSK password. Featuring patented cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor runs an accelerated attack on the network for a pre-defined amount of time in order to test how secure your wireless environment is.
Elcomsoft Wireless Security Auditor free download

Features and Benefits:

  • Determine how secure your wireless network is by attacking WPA/WPA2-PSK passwords
  • Built-in wireless network sniffer
  • Support for most modern Wi-Fi adapters, as well as dedicated AirPCap adapters
  • Patented GPU acceleration technology uses one or more NVIDIA or AMD video cards to simulate real-world attacks
  • Run advanced dictionary attacks with highly configurable variations
  • Intercept limited Wi-Fi traffic, continue working offline
  • Don't forget to Share this post with your friends

How Secure Is Your Wireless Network?

A single weak link poses a valid security threat to the entire corporate network. Wireless (Wi-Fi) networks can provide sufficient security if configured properly and accompanied by an adequate password policy. Elcomsoft Wireless Security Auditor exposes security problems in your wireless network to allow network administrators taking appropriate measures and adopting a proper password policy.

Wireless Network Security Audit:

Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. It can work as a wireless sniffer or operate offline by analyzing a dump of network communications. The tool attempts to retrieve the original WPA/WPA2-PSK passwords in plain text.

It allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in password recovery, it is one of the fastest and most advanced tools for recovering Wi-Fi passwords. If this software fails to recover a Wi-Fi password within reasonable time, a real attack would similarly fail.

Built-in Wi-Fi Sniffer:

Elcomsoft Wireless Security Auditor comes with a custom NDIS driver for 32-bit and 64-bit systems (Windows 7, 8, 8.1 and 10). By automatically intercepting Wi-Fi traffic and performing an attack on selected Wi-Fi networks, it becomes a one-stop solution for auditing Wi-Fi networks. WinPCap drivers are required to enable Wi-Fi sniffing. The WinPCap driver is included with Wireless Security Auditor.

In addition, it is fully supports dedicated AirPCap adapters provided that the correct drivers are installed.

GPU Acceleration:

ElcomSoft has pioneered many software innovations that have made it easier to recover passwords protecting various types of resources. For the first time in the industry, the company’s patented GPU acceleration makes its way into Wi-Fi password recovery, reducing the time required to recover Wi-Fi passwords up to a hundred times. Supporting up to four mixed NVIDIA and AMD video cards, Elcomsoft Wireless Security Auditor allows building servers with supercomputer performance at a fraction of the price.


  • Supported Operating Systems: Windows 2000/7/Server 2003/2008/Vista/XP/8/8.1
  • About 3 GB of free space on hard disk
  • Administrator privileges are recommended
  • At least one of supported NVIDIA or ATI cards is recommended
  • AirPCap adapter

How to Install:

        1. Download Elcomsoft Wireless Security Auditor. (Link is given below)
        2. Right click and run software and follow instruction
        3. Enter your serial key when asking if you have or buy it... (Link is given below)
        4. That's it enjoy!

Source:                     ElcomsoftWireless Security Auditor

Don't forget to share this post with your friends.