Jump to content

SAadmin

Root Admin
  • Posts

    3,462
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by SAadmin

  1. I trim by beard, i kno i shud'nt (i'm not amritdheri yet), but i consider myself 2 b Gurus Gobinds child.

    Then just imagine yea...you just outta nowhere saw guru gobind singh ji maharaj in the mirror crying and in tears to see his son cuttin kesh. Just imagine this scenario and tell me what you think?? dont you feel sowwie for your father when he is cryin for love from his sons/daughters???

  2. Oh by the way if you read this thread properly you will see his picture. He has put kirpan in the turban for time being while doing his bhakti-marg. So he doesnt need to show the fake world his greatness. For him, his feet of vaheguroo is enough.

    Even if he wear kirpan in his dastar all time. I dont see anything wrong. Why you need big kirpan when you got gurooo sahiban walkin with you??

    So next time you say the words of hate. Please read the thread properly. `

  3. erm... if people put kirpans in their dastaars, arent they turning them into symbols rather than real gifts of the guru? aernt they supposed to be displayed to the world, showin that ur a sikh?

    dont mean to do nindya of a gurmukh, im just stating what i find to be tru

    Hey if you gotta problem with mahpursh/bhramgyani by puttin their kirpans in their dastar. Why dont take it up to the akaal takth??? They be more than happy to sort it out for you... :D

  4. Execellent Question veer.

    I would like to please to answer you question.

    First thing- If you are born in a sikh family. I think even if you cut your hair you still have love and attachment with sikh guroo's and saints. And you still go to gurdwara and do namaskar to guru granth sahib ji maharaj, ask for the forgiveness of whatever they have done in the life. They still have faith in guroo nanak patsah.

    You gotta understand veer. Taking amrit or not taking amrit is not in control of one's life. You dont choice to take amrit. Vaheguroo does it for you. why??? Because that is decided from your past life deeds your past karma whether your seed of spirtual development has been grown already or not. If not then again rebirth and then again rebirth of 8.4 million reincarnations. In that long process soul start learning it.

    Thats why guru arjan dev ji maharaj ji said:

    Eho tari vaarii aaa Gobind millan diii

    Oh Human, this is chance to meet god dont let it waste this precious human life (SGGS)

    Because soul in animal form neither it can think or have a ability to get savlation. Its only the human life that god gave us. so we shall not waste it.

    Comin back to your orginal question. My answer would be none is wrong. If a person converts that is defanitely written on his/her head before that such an such person will convert to islam, or convert to sikh etc.

    There are cases veer. Where muslim saints by nishkam bhakti born into sikh family in their next life because they are sent by akaaal purkh. Vaheguroo belongs to every being not only sikhi. So if you were to do deep reasearch on saints you will found out that most saints sent by akaal purkh their soul doesnt belong to any specific relegion.

    For example christian/islam/hindu/buddhism saint can born as sikh saint in his next life and vice versa. I know christian and islam dont beleive in recincarnation. But i disagree, recincarnation concept is soooo sooo strong that so called christians/islamic intellectuall's cant prove recincarnation wrong. Since there were christians who know their past life.

    So I would say everything is happening be happy and take it as akaal's will. We as humans can educate youths only. If its akaal will no matter how hard we try it wouldnt work.

    so its better to accept the facts and keep doing seeva of educating youths. If doesnt work..no worries...keep doing it. Sikhi cant be root out..Its a truth from akaal purkh. It was created by akaal purkh himself. How can it go away??? Truth no matter how many you twist Truth. It will stay the same.

    Have faith in guroo's. Whatever guroo's said it will happen. Be obbessive with guroo's word with no doubts. watch you will see our guroo sahiban in no time...vaheguroooooooooooooooooooooooo :D

  5. I wanted to ask someone this question...about 6 yrs back when my Nani Ji passed on...at her Funeral when the Jap Ji sahib was being recited I had a vision...

    I saw mountains, lots of ppl dressed in white sitting...one Baba Ji at the Front, in complete meditation....and I saw my Nani Ji go up and matha tekh and then sit in the sangat...what do u think that all means???

    Was your nani ji spirtual?? If she was....

    Here the similiar things i have heard from the teaching from sggs ji.

    Inorder to understand my post you have to understand there are different levels of spirtual development .

    Sachkhand- This is where all the bhramgyanis went. There is no worry about rebirths and suffering. If by god's will you do get born again.. It will be written that you will be saint to do jagat seeva (helping other humans to get rid of suffering) and that is called "Nishkham Bhakti". Where you are the chosen one by akaal(vaheguroo) to come in this earth and help the people with suffering and go merge back with him.

    Bahkhunt-

    This is the level that i m assumin because the vision you described is quite similiar to this level. Well everyone is dressed in white and all they do is complete meditation (peace of mind) i meant infinity peace of mind. Its undescrible but all i would say "Imagine guroo's throne 300 yrs back and everyone is meditating" .. That kinda flashback happens there...

    Your nani has been succesful in the task given by akal in this world which was meditating on vaheguroo's naam and follow guroo's hakum... so now there shall be no rebirths for her and or suffering for her.

    oh btw i ll try to find verses in sggs talkin about bahkhunt.. I know all these from the tapes of baba ishar singh ji rara sahib maharaj... right no w i m at the school doing my security project.. i shall be home in a bit... will keep u updated mate :D

  6. Oh thats just great.. I have heard soooooo much of them.............Baba ishar singh kalairwalie and baba ishar singh ji rara sahib walie were pure bhramgyani chosen ones from akal purkh came in this earth to do jagat seeva. And Baba nand singh maharaj was guru nanak himself when baba nand singh ji did darshan of guroo nanak dev ji maharaj. Guroo nanak dev ji neh baba nand singh ji nouoou apne aaap chh milaya laya (Baba nand singh ji merged with guroo nanak dev ji and become one)...thats why you see in nanaksar gurudwara baba nand singh picture right beside the guroo nanak dev ji picture...

    Also if you wish to learn how to respect guru granth sahib ji maharaj.. read baba nand singh sakhi(biography) you would cry to death by expereincing the love he had for sggs sahib and our guroo sahiban :cry: :cry: :cry: :cry:

    Also canadian jatti your family is sooooooooooooo lucky to darshan of maharaj ji.. its a pure bliss(kirpa) on your family if you ask me.....i think that kirpa made you ended up in sikhawareness site...

  7. Wireless Attacks Explained

    by: SyDisTyKMoFo

    email:sydistykmofo@isuber1337.com

    Table Of Contents

    Intro

    The Hackers WLAN Toolbox

    Freeware Tools

    Antennas

    Breaking Encryption

    Authentication

    War Driving

    Attacks Explained

    Malicious Association

    MAC Spoofing - Identity theft

    Man-in-the-middle Attacks

    Denial-of-Service Attacks

    Conclusion

    Intro

    Wireless LANs are popping up here, there and everywhere. Many businesses are implementing wireless LAN segments on their internal LANs because it is easy to setup and obviously there are no wires to run. Wireless allows users with laptops and other mobile devices to roam the enterprise and not have to plug in wherever they go. As part of the process of implementing a wireless network segment on the corporate LAN of the company that I presently work for, I did some research and testing of wireless security. This white paper outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and the widely available wireless hacking tools that are used. Too often people think that because the setup of a wireless segment is literally plug and go that everything is functioning properly and securely. Wireless is a virtual playground for hackers, the technology is still quite new, most admins are not anywhere near up to speed on it and security protocols and procedures are still being developed; giving quick-learning hackers the edge.

    Any wireless access point attached to a network segment is essentially bridging the internal network to the surrounding area directly, without any firewall protection. After only installing one low-budget wireless access point (WAP) I could get access to the LAN anywhere in the shop, the office and in the parking lot!! I don't know how many square feet of shop floor and office space we have, but it isn't small. I was getting 15% connection strength sitting in my car in the parking lot!! Without proper security measures for authentication, any laptop with a wireless card can access the network or stealthy listen in on all network traffic across that access point from any area within the WAPs range.

    It is important to realize the potential for rogue wireless access points in an enterprise. WAPs can be hooked up by anyone, just take the cable plugging into your computer and plug it into a WAP, throw a wireless card into your PC and you now have a wireless segment. The network admins wouldn't even know. There are several documented cases of rogue WAPs found in corporations and universities.

    The Hackers WLAN toolbox:

    This section provides a few examples of the hardware and freeware tools available.

    Freeware Tools

    New wireless LAN hacking tools are introduced every week and are widely available on the Internet for anyone to download. The table below lists some of these hacking tools.

    Netstumbler www.netstumbler.com Freeware wireless access point identifier - listens for SSIDs & sends beacons as probes searching for access points

    Kismet www.kismetwireless.net Freeware wireless sniffer and monitor - passively monitors wireless traffic & sorts data to identify SSIDs, MAC addresses, channels and connection speeds

    Wellenreiter packetstormsecurity.nl Freeware WLAN discovery tool - Uses brute force to identify low traffic access points; hides your real MAC; integrates with GPS

    THC-RUT www.thehackerschoice.com Freeware WLAN discovery tool - Uses brute force to identify low traffic access points

    Ethereal www.ethereal.com Freeware WLAN analyzer - interactively browse the capture data, viewing summary and detail information for all observed wireless traffic

    WEPCrack wepcrack.sourceforge.net Freeware encryption breaker - Cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling

    AirSnort airsnort.shmoo.com Freeware encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered

    HostAP hostap.epitest.fi Converts a WLAN station to function as an access point; (Available for WLAN cards that are based on Intersil's Prism2/2.5/3 chipset)

    Antennas

    To connect with wireless LANs from distances greater than a few hundred feet, sophisticated hackers use long-range antennas that are either commercially available or home built and can pick up 802.11 signals from up to 2,000 feet away. The intruders could be in the parking lot or completely out of sight.

    Breaking Encryption

    The industry's initial encryption technology, WEP, was quickly broken by published tools WEPCrack and AirSnort, which exploit vulnerabilities in the WEP encryption algorithm. WEPCrack and AirSnort passively observe WLAN traffic until it collects enough data by which it recognizes repetitions and breaks the encryption key.

    Authentication

    The next step in the evolution of wireless LAN security was the introduction of 802.1x for port-based authentication. However, papers have already been published to demonstrate how the newly proposed standard can be defeated. A new standard is expected to be designed within the next two years.

    War Driving

    War driving is simply driving around in a car to discover unprotected wireless LANs. Windows-based freeware tools such as NetStumbler, probe the airwaves in search of access points that broadcast their SSIDs and offer easy ways to find open networks. More advanced tools, such as Kismet, were then introduced on Linux platforms to passively monitor wireless traffic.

    Both Netstumbler and Kismet work in tandem with a global positioning system (GPS) to map exact locations of the identified WLANs. These maps and data are posted on web sites such as www.wigle.net and www.wifinder.com.

    Attacks explained

    Malicious Association

    Using widely available tools, hackers can force unsuspecting stations to connect to an undesired 802.11 network or alter the configuration of the station to operate in ad-hoc networking mode. A hacker begins this attack by using freeware HostAP to convert the attacking station to operate as a functioning access point. As the victim's station broadcasts a probe to associate with an access point, the hacker's new malicious access point responds to the victim's request for association and begins a connection between the two. After providing an IP address to the victim's workstation (if needed), the malicious access point can begin its attacks. The hacker - acting as an access point - can use a wealth of available hacking tools available that have been tested and proven in a wireless environment. At this time, the hacker can exploit all vulnerabilities on the victim's laptop, which can include installing the HostAP firmware or any other laptop configuration or programmatic changes. The malicious association attack shows that wireless LANs are subject to diversion and stations do not always know which network or access point they connect to. Stations can be tricked or forced to connect to a malicious access point. Even wireless LANs that have deployed VPNs are vulnerable to malicious associations. This attack does not try to break the VPN. Rather, it takes over the security-poor client.

    Enterprises must monitor the airwaves of their wireless LAN to make sure their stations only connect to authorized access points and networks. Monitoring the network is the only way to know whom your stations connect to and which stations connect to your access points.

    MAC Spoofing - Identity theft

    Many enterprises secure their wireless LAN with authentication based on an authorized list of MAC addresses. While this provides a low level of security for smaller deployments, MAC addresses were never intended to be used in this manner. Any user can easily change the MAC address of a station or access point to change its 'identity' and defeat MAC address-based authentication.

    Software tools such as Kismet or Ethereal, are available for hackers to easily pick off the MAC addresses of an authorized user. The hacker can then assume the identity of that user by asserting the stolen MAC address as his own. The hacker then connects to the wireless LAN as an authorized user.

    By monitoring the airwaves of their wireless LAN, enterprises are able to detect MAC spoofing by identifying when more than one MAC address is simultaneously on the network. Wireless LAN intrusion detection systems also identify when a MAC address is spoofed by analyzing the vendor 'fingerprints' of the wireless LAN card. This enables the IDS to see when, for example, a Orinoco wireless LAN card connects to the network using a MAC address of a Cisco WLAN card.

    Man-in-the-middle Attacks

    As one of the more sophisticated attacks, a man-in-the-middle attack can break a secure VPN connection between an authorized station and an access point. By inserting a malicious station between the victim station and the access point, the hacker becomes the "man in the middle" as he tricks the station into believing that he is the access point and tricks the access point into thinking he is the station.

    This attack preys upon an authentication implementation to randomly force a connected station to re-authenticate with the access point. The station must respond to a random challenge from the access point, and the access point must respond to a successful challenge response with a success packet.

    To begin this attack, the hacker passively observes the station as it connects to the access point, and the hacker collects the authentication information, including the username, server name, client and server IP address, the ID used to compute the response, and the challenge and associate response.

    The hacker then tries to associate with the access point by sending a request that appears to be coming from the authenticated station. The access point sends the VPN challenge to the authenticated station, which computes the required authentic response, and sends the response to the access point. The hacker observes the valid response. The hacker then acts as the access point in presenting a challenge to the authorized station. The station computes the appropriate response, which is sent to the access point. The access point then sends the station a success packet with an imbedded sequence number. Both are captured by the hacker. After capturing all this data, the hacker then has what he needs to complete the attack and defeat the VPN. The hacker sends a spoofed reply, with large sequence number, which bumps the victim's station off the network and keeps it from re-associating (ie 0x00ffffff). The hacker then enters the network as the authorized station.

    Only 24/7 monitoring and a highly capable wireless IDS can detect this type of attack on a wireless LAN. An effective security solution must first keep a constant watch over the wireless LAN while it analyzes the activity it observes.

    Denial-of-Service Attacks

    Every network and security manager fears the downtime and loss of productivity from a crippling Denial-of-Service attack. In the wireless world, this damaging attack can come from any direction, and the most basic variations of DoS attacks can be just as worrisome as the most sophisticated.

    Because 802.11b wireless LANs operate on the unregulated 2.4GHz radio frequency that is also used by microwave ovens, baby monitors, and cordless phones, commonly available consumer products can give hackers the tools for a simple and extremely damaging DoS attack. Unleashing large amounts of noise from these other devices can jam the airwaves and shut down a wireless LAN.

    Hackers can launch more sophisticated DoS attacks by configuring a station to operate as an access point. As as access point, the hacker can flood the airwaves with persistent disassociate commands that force all stations within range to disconnect from the wireless LAN. In another variation, the hacker's malicious access point broadcasts periodic disassociate commands every few minutes that causes a situation where stations are continually kicked off the network, reconnected, and kicked off again.

    In addition to malicious disassociation attacks, hackers are now abusing the Extensible Authentication Protocol (EAP) to launch DoS attacks. There are several forms of DoS attacks from various ways a hacker can manipulate EAP protocols by targeting wireless stations and access points with log-off commands, start commands, premature successful connection messages, failure messages, and other modifications of the EAP protocol.

    Conclusion

    To better secure a wireless network segment, a layered approach should be used. Similar to a wired network infrastructure, I have implemented several security features that each alone would not be sufficient, but together with monitoring create a much more secure WLAN. On my network there is only one access point and one wireless user to date, so the traffic can be monitored from an old laptop that I have on my desk running RedHat. I occasionally boot up and trap sections of traffic to look for any attack signatures. We are also not located in a city or industrial complex and our grounds are quite large and secured. The user is connecting via a vpn, the access point is secured so it cannot be reset, WEP is enabled, the access point is in a position that limits travel of the radio frequency outside of the building, and mine and the mobile user's MAC addresses are the only two that are registered with the access point. I also check for rogue access points, as every other laptop user wants to be mobile now as well. The traffic between the access point and the LAN passes through a firewall to help block any possible DoS attacks on the wireless LAN from entering the enterprise LAN.

    Wireless networks are a great alternative or addition to ethernet networks, they can bridge two segments of traditional cable ethernet network segments or allow laptop users to wander the enterprise and stay connected to the LAN at all times. WLANs are definitely here to stay, but pose definite security issues.

  8. Absouletly brillant stuff...

    Yes, saints have power because they are connected with akal purkh. These days nobody cares about them. They are fakirs of vaheguroo. Akaaaaaaaaaaaaaaaaaaaaaaaaaaaaal he akaaaaaaaaaaaaaaaaaaaaal

    Here is another miracle of another sikh saint. This one actually changed thousands of lives. Here is live convo between ghost and saint ishar singh's devotees. Ghost is talkin about life after death....

    http://www.sikhawareness.com/sikhawareness...topic.php?t=564

  9. Veer i m in the process of makin my resumes and stuff because i just have completed course....lets see where you live in canada???

    if you live in toronto... i can meet you and discuss with you each line while listening to the tape... if you dont live in toronto then i need some more time... i m busy lookin for job and other house work k...

    let me know if you live in toronto though... i ll pm you my fone number... you can call me then...

    gur fateh

  10. I was wondering guys. Is there any takshals in india where they teach you dasam granth sahib ji???

    I know one rara sahib. Sant teja singh ji rara sahib walie know whole dasam granth moo jabani (memorized) :shock: . But i dont know if he would give me the vidiya of dasam granth sahib ji. He comes out like 2 hrs only every day meet sangat. Rest of the time he spents in bhora sahib ji where he does his bhagti.

    Is there any open takshals where gyanis can teach you dasam granth ???

×
×
  • Create New...