Proin posuere faucibus
Tellus sit amet urna pulvinar
Quisque eget mauris at elit

SOA

princeton-97827_1280

Oracle Service Oriented Architecture

Java

san-jose-92464_1280

Java Tutorial Easy to Understand Way

OIC

academic-2769_1280

Oracle Integration Cloud

SOA/OIC interview Question

In this article, I will discuss the question which is asked in the Technical round of the SOA/OIC interview. 

Also, I will upload the answer in detail shortly.


1. Basic of OIC (OIC and generation)

2. Where to use SOA and where to use OIC?

3. How to maintain the version (major/minor version)?

4. Types of Certificates in OIC?

5. What is Inbound/Outbound integration in OIC?

6. What is a web service and its type?

7. How to configure Agent in OIC?

8. How to send an Email with an Attachment in OIC?

9. How to access the data using Lookup?

10. "Wait" activity in OIC and where to use it?

11. How to read the data in segments?

12. What is the operation in FTP adapter and stage file activity?

13. How to read Large files in OIC(more than 10 MB)?

14. What is FBDI and how to import bulk data in OIC?

15. What is Data Stitch activity and its operation?

16. operation available in the REST adapter in SOA/OIC?

17. What is a Feature flag and how to enable it?

18. Error Handling in OIC?

19. REST vs SOAP

20. What is local integration in OIC?

21. SOA and its component

22. WSDL structure?

23. Template available in BPEL

24. Synchronous vs Asynchronous 

25. How can we change the synchronous composite/web service to Asynchronous?

26. What is MFT?

27. Error Handling in SOA?

28. Fault and its type in SOA?

29. Pick vs Receive

30. Simple vs Complex schema 

31. How can we include schema from the same namespace/different namespace?

32. File, FTP adapter in SOA and its operation.

33. Difference between read and sync read in SOA.

34. WSDL structure

35. Correlation ID

36. Types of Fault

37. Error Handler Framework

38. XA vs NON-XA transaction

39. Durable vs Transient 

40. What is the Dehydration store in SOA?

41. SOA MDS

42. SOA 12c New Feature

43. XSLT functionality 

44. copylist,append,insertafter,insertbefore in SOA Assign activity

45. Parallel Flow (Flow vs Flow N)

46. Decision Table

47. DVM

48. Compensate activity

49. Binding URL tokenizer

50. Adapters in SOA(File,FTP,DB,SOAP, REST etc)

51. Components of SOA 





How to get source code of any android application?[Reverse engineering ]

 Hi all, today I am posting a very interesting topic "Reverse Engineering of Android Application". 

You need to follow the below steps to get all code & resources.


Download any .apk file.

Create a New folder and paste that .apk into the folder.

Now you just need to change the extension with .zip or .rar. [ ex: abc.apk to abc.zip or abc.rar]

Extract the .zip or .rar file, Now you can access the .dex file (compilation file) and many more (resources that were used in the application ex-: images, fonts, etc) but still, you are not able to access the java and XML file.

Download https://github.com/pxb1988/dex2jar and extract it to the folder.

Move the classes.dex file into dex2jar folder.

Now open the command prompt and change the directory to that folder (or NEW FOLDER). Then write d2j-dex2jar classes.dex (for mac terminal or ubuntu write ./d2j-dex2jar.sh classes.dex) and press enter. You now have the classes.dex.dex2jar file in the same folder.


Download java decompiler, double click on jd-gui, click on the open file, and open classes.dex.dex2jar file from that folder: now you get class files.

Save all of these class files (In jd-gui, click File -> Save All Sources) by src name. At this stage, you get the java source but the .xml files are still unreadable, so continue.

Now open another new folder Put in the .apk file which you want to decode Download the latest version of apktool AND apktool install window (both can be downloaded from the same link) and place them in the same folder Open a command window Now run command like apktool if framework-res.apk (if you don't have it get it here)and next apktool d myApp.apk (where myApp.apk denotes the filename that you want to decode) now you get a file folder in that folder and can easily read the apk's XML files.

just copy the contents of both folders(in this case, both new folders) to the single one and enjoy the source code.

Android Tools

Hello Friends Today I am posting About Android Tools that uses too much these Days  and i hope these application help you lot.


Hack Code:
The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. 

                                                                             
                                                                      Download

AVD Clone: Clone an Android Virtual Device for easy distribution through the Android SDK Manager. You can create an AVD preinstalled with the apps and settings you need, and distribute it to others by having them point their Android SDK Manager to your repository. Tool made by Security Compass. 
                            
                                                                      Download

APKInspector : The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps

                                                                        Download


Burp Suite: It is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing 
                                 
                                                                       Download


Androguard: Create your own static analysis tool,; Analysis a bunch of android apps,; Analysis . Open source database of android malware.
                            

                                                                       Download 


Android Framework for Exploitation :
Smartphone Pentest Framework: Rather this tool allows you to assess the security of the smartphones in your environment in the manner you’ve come to expect with modern penetration testing tools. 
                                                                
                                                    Download

Andro Rat
AndroRat is a remote administration Android tool.
you can bind this spyware tool with the other android application and ask the victim to download this app. It can read all messages, contacts, records and acall without knowing of the user.

                                                                     Download

Droid Pentest: Its help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform . This Tool developed by Nikhalesh Singh.
     
                                                                    Download


Android SDK: A software development kit that enables developers to create applications for the Android platform. The Android SDK includes sample projects with source code. 
  
                                                                        Download

DroidBox: Its developed to offer dynamic analysis of Android applications. The following information is shown in the results, generated when analysis is ended:
• Hashes for the analyzed package
• Incoming/outgoing network data
• File read and write operations
• Started services and loaded classes through DexClassLoader
• Information leaks via the network, file and SMS
• Circumvented permissions
• Cryptography operations performed using Android API
• Listing broadcast receivers
• Sent SMS and phone calls
Additionally, two images are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity between analyzed packages.
  

                                                                           Download

Dex2jar: dex2jar is a lightweight package that provide you with four components in order to work with .dex and java .class files. dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM.



                                                                           Download

Jd-gui: JD-GUI is a standalone graphical utility that displays Java source codes of “.class” files. You can browse the reconstructed source code with the JD-GUI for instant access to methods and fields.



                                                                              Download

Am I Hacker -:

Am I Hacker Proof scans your network, computer or website from the outside as a hacker would, looking for vulnerabilities. Once it finds the vulnerabilities, it will email or text you
letting you know how many vulnerabilities you have. In addition, in the paid version you can check to see if your voicemail on your cell phone is hacker proof.

This App does not use any resources on your phone. Once you start a scan you will be 
notified via email or text your scan started. When your scan is completed you will be notified again that your scan is complete.

Am I Hacker Proof includes these services for free:
- Choose from three types of scans: A “Quick” scan (up to four hours), a “Complete” scan
(can take up to four days to complete), and a Web site scan (searches for vulnerabilities in certain types of Web sites; currently supports WordPress Web sites).

- You can perform a scan on any Web or IP address.

- You can scan up to 10 times a month.

- Built- in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real
time cyber security news feeds.
- Your reports are saved in a PDF file that you can read on your device or forward to any email address you like.

- Your account on your device works on the website www.AmIHackerProof.com so you can have access to more applications.

-> Voicemail Hacking.


- Built-in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real time cyber security news feeds.

- Search through the scans you performed by address, time, number of vulnerabilities, or status.

- You get an email and text message letting you know the number of vulnerabilities found on that IP address or website.

 

                                                                                   Download


if any query about android or android tools feel free to ask your question in comment box.

Trojan Horse

What is a Trojan ?
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia

"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory

Types of Trojan :- 
The different types of Trojan Horses are as follows-

1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.

2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.

3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.

4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.

5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.

6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.

7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".

How Trojan Works ? 
Trojans typically consist of two parts, a client part and a server part. When a victim (unknowingly) runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim\92s computer, it (usually) tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method. 

       It is necessary for the attacker to know the victim\92s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim\92s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine. 

       Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.

How Trojan Horses Are Installed ? 
Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
  • Software Downloads
  • Websites containing executable content (ActiveX control)
  • Email Attachments
  • Application Exploits (Flaws in a web applications)
  • Social Engineering Attacks

The Removal :- 
Antivirus software is designed to detect and delete Trojan horses ideally preventing them from ever being installed.


Popular Trojan


  1. NetBus
  2. Back Orifice Xp
  3. SubSeven  /sub7
  4. Beast

Computer Viruses

What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques : 



1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. 
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length. 
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately. 

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none) 
* the word "password", "passcode", "admin" and their derivatives 
* the user's name or login name 
* the name of their significant other or another person (loved one)
* their birthplace or date of birth 
* a pet's name 
* a dictionary word in any language 
* automobile licence plate number 
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop) 
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters. 
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength




3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security. 
However, cracking usually designates a guessing attack.



                                         Window Xp Password Cracking


Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator.
First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system.

Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process.

Two most effective techniques used here are "Brute-Force" and "Cryptanalysis".

Brute-Force:- As this techniques takes more time to complete, the attacker prefer this technique only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should contain less than 7 characters. Otherwise it takes more time to crack password, which may be the mixture of all types of characters along with special symbols.

The step-by-step explaination for this technique is given below-



1) Open the tool "Cain and Abel"-:

2) Go into the category "Cracker"   it displays all sub-categories under "Cracker" in left panel.

3) Select "LM & NTLM Hashes" from left panel and then click on      symbol, you will be greeted by a window as shown.

4) Check "import hashes from local system" and then click "Next". This shows all the active accounts on local system like administrator, guest, etc. along with LM and NT hashed values of their respective passwords, as shown below.

5) Right clicking on any username shows all available options using which we can crack it's password

6) Here we select "Brute-Force Attack" and then "NTLM Hashes", since windows uses NTLM hashes to store local users' passwords.

7) You will be greeted by a window where you can modify properties for brute-force attack such as password length, character set, etc.


8) Click on "Start" button.

9) On completion it will reveal the exact password.

IDM with full Patch Crack serial key


IDM 6.19 build 2 is another version of best download managers named Internet Download Manager. This software is widely used today because of the great features it provides to its users. It provides full control over pausing, resuming, scheduling the download at any time. The downloading process is carried out in fragments by which the download process becomes much easier. It supports proxy servers, firewall, cookies, ftp & https protocol, authorization, mp3 audio etc. The easy drag and drop is being included in IDM. IDM 6.19 build 2 has customizable interface which can be edited by the user with own will. IDM can download directly files from website without any extra effort from user. IDM is supported in all windows. To download full version of IDM in system, follow given steps.








Steps to download IDM 6.19 build 2
  • You firstly have to install setup "idman619build2.exe" 
  • After you have installed it will show registered with fake serial key(if any)
  • You just have to go to crack folder in downloaded file 
  • Open the patch+keygen
  • Click on generate then put that key in idm and after that click on patch and replace eg "C:\Program Files\Internet Download Manager\idman.exe"
  • In end click on auto reg 
                                             DOWNLOAD IDM WITH FULL PATCH

PASSWORD IS:-  javaprogrammar.blogspot.in

I Hope it is working if not then i am here to help you.


IDM Key

Serial Keys:  IDM
D91GM-T5X1J-DW7YG-1GHIS

I23LZ-H5C2I-QYWRT-RZ2BO

8XJTJ-ZTWES-CIQNV-9ZR2C

PAQ34-MHDIA-1DZUU-H4DB8

4CSYW-3ZMWW-PRRLK-WMRAB

DDLFR-JKN5K-B4DE3-H2WYO

9RVII-F3W58-6FAYV-WPTFD

M7CQ2-VARGX-QFYGZ-URKG0

POOUS-S8V4C-1RXUH-HG6NQ

7JPTJ-4XLY3-HM4LK-9UP4Q

OJNGE-77NS5-MW5FC-MFB7A

HSIWU-KRQQQ-Y870K-YI6QQ

HF0I6-AYL1O-BHDI7-DG9LW

LC3OG-66OU3-38BTX-SX20M

52OGI-AKRTG-MT6YU-YZ7OU

WNJ39-J1JN0-JKNVS-BZSCB

7WPV5-NHHF3-A2P39-LRJ74

OV4O3-1ASY1-8CDWI-9UGX4

O00C4-MYLXJ-LYUDP-QFGD5

I80CQ-RUG1G-LEP9V-O7UN0

OUC2X-F1F8A-8LO76-ETQCK

SN1OJ-P3ZGF-RU4XN-S61TZ

4P6BG-WGN41-C5CQQ-QXIO8

76JVD-ISRBG-KZB4U-LGL9D

PBPXJ-BC1EH-FKO7F-VUXJ2

30P7F-IG6PZ-CSZ3L-FRL7N

4B5XT-BOSBK-94O5F-669DJ

Downloads torrent with idm

Hello friends today i am posting about how to download torrent file with idm high speed downloader.
these are few tips to download torrent file with idm.


First How to Download IDM. You can download here [ CLICK HERE ]



With the invention of latest Cloud sharing websites, Downloading Torrents directly is far easier now. There are Paid and Free Torrent Download Sites which permit you to transfer any torrents direcly via your browser. Here we’ve got reviewed the newest top 10 Websites to download Torrents with IDM simply. This is updated list for 2016 to download torrents.


ADVANTAGES OF DOWNLOADING TORRENTS WITH IDM :

  • Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.
  • It segments downloaded files dynamically during download process.
  • It helps to achieve best acceleration performance.
  • If the torrent is blocked in your offices/schools/colleges still you can download just by configuring proxy in your idm.
  • We can download torrents with IDM so that we can get maximum downloading speed even if the torrents has less number of seeds.
  • No need to worry about torrent health.
  • You can schedule downloads as per your requirement

METHODS AND WEBSITES TO DOWNLOAD TORRENTS WITH IDM




1.FILESTREAM.ME – SAFE ONLINE STORAGE


step 1. Sign up for filestream by clicking here [ CLICK HERE ].
step 2. Click on download torrent.
step 3. Paste your link or browse torrent from computer.
step 4. After that click on download icon. Copy the link to the clipboard paste it into IDM. Your torrent will start downloading with IDM.

2. ZBIGZ  – TORRENT TO IDM DOWNLOADER

STEPS TO DOWNLOAD TORRENTS WITH IDM:
step 1. First go to Zbigz.com
step 2. Sign up for free account and verify your account
step 3. You will see following homepage
step 4. After clicking on go button you will see following popup windows
step 5. Click on free button you will be redirected to following screen and click on zip file
step 6. Now here click on start download button and your download will start with full speed

3.BRUZZY.COM – MY FILES

step 1. You will need google translator plugin here and VPN sometimes.
step2. [ CLICK HERE ] if you got error as shown in following screenshot then use vpn.
step3. Change the country in VPN and register account. Its interface is same as zbigz.com which is I explained earlier. So you can follow that tutorial and download torrents with IDM.

10. TORRENT2EXE.COM

step1. NO need to Sign up. Just paste your torrent links on upload from computer
step2. Just Follow the screneshot and download torrents.

These were the Top 10 websites to download torrents with IDM. Some are free to use some also offers premium membership. Go according to your use. However there are number of ways and tricks to download torrents with IDM, if you any better than this please do share with us via comments.
If you have any problem with the above discussed websites and methods to download torrents with IDM, please do comment I am always ready to assist you.

Popular Posts

Nilesh Jha's Blog

Nilesh Jha. Powered by Blogger.

Contact Form

Name

Email *

Message *

Copyright © Nilesh Jha's Blog |
|