Monday 20 August 2012

Runescape Bank Pin Logger

Great Runescape Tool: Runescape Bank Pin Logger

About:
This amazing tool generates you a tiny stub which  you will need to send over to the victim with the bank pin. 
Once the stub ran on the victim, it will send a notification email with the message that it worked!
After that, it's just a matter of time till the victim enters their bank pin and once it's entered you will receive a direct email with the bank pin + A screenshot of the bank!
This tool normally costs 50$, but now it's completely free!

Pictures:





Thank Hosman For Sharing This Software.
This Post is From Here.

Website booter

Great Free Website booter! 

About:
This easy and powerful website booter is coded in visual basic. Simply hit the URL you want to go offline in the program and then enter the amount of threads/duration.
This easy booter can take down medium websites such as virustotal.com.

Use this tool at your own risk, I am not responsible for the damages!

Picture:



Thank Hosman For Creating This BOT.
This Post is From Here.

Free SMS & Email Bomber


First share: Free SMS & Email Bomber!

About the tool:
-Simple interface
-1 second delay only!
-SMS bomber only for ATNT!
-Email bomber works!
-Coded in VB.net

Picture:




Don't be afraid of virus's or infections, the tool is 100% clean. Proof .

Thank Hosman For Sharing This Software.
This Post is From Here.

IlluDoser 1.0


IlluDoser 1.0 a powerful Doser

About IlluDoser 1.0:
This powerful Doser uses 4 different attack styles: HTTP, UDP, SYN and SlowLoris. Choose your own attack method. It has a very simple GUI.

Features of IlluDoser 1.0:

-Different attack styles: HTTP, UDP, SYN and SlowLoris
-xBuffer, this makes the packets increase 3 times
-Coded in VB6
-You can build the stub with startup/install
-With Anti-Bitdefender
-Easy GUI

Pictures:

Video of using IlluDoser 1.0:




Thank Hosman For Creating This BOT.
This Post is From Here.

SpyLine RAT 1.0


SpyLine RAT 1.0 




Features of SpyLine RAT 1.0
Server building:

-Inject into process
-Melt file
-Install & Startup
-Drop file at your preferred location
-Anti Sandiebox
-Anti Norton
-UPX compression

Spy features:
-Very fast streaming Remote Desktop
-Very fast streaming remote Webcam Manager
-Online Keylogger
-Offline Keylogger

Fun features:
-Enter a text which will be spoken out on the infected computer
-Hide&Show Desktop icons
-Turn Capslock on&off
-Open&Close Disk tray
-Block&Unblock input (mouse,keyboard)
-Chat with the infected computer

Other features:
-Open up webpage on the infected computer
-Open up programs on the infected computer (such as notepad.exe or chrome.exe)
-Send keys to the infected computer
-Send a message box to the infected computer



For more info about the RAT, go here:
Hack Forums 

Thank Hosman For Creating This BOT.
This Post is From Here.


Enjoy :)

 

Youtube Tool: Account Creator - IlluViews 1.1


Great Youtube Tool: IlluViews 1.1

About IlluViews 1.1:
This Youtube Bot helps you creating Youtube accounts quickly and completely safe! It creates 1 account each 10-20 seconds!

Picture of IlluViews 1.1:


The tool is 100% safe, check out the virus scan!


Click here for Download!


Thank Hosman For Creating This BOT.
This Post is From Here.

Youtube Tool : View Increaser - IlluViews 1.0


Great Youtube Tool: IlluViews 1.0:

About IlluViews: 
This handy tool enhances your videos on youtube with some extra view. Load up your proxies and you can get up to 400,000 views in just 20 minutes!
This tool generates about 100 views per 15 seconds!

Picture:

Video showing how it works:




Thank Hosman For Creating This BOT.
This Post is From Here.

Removing RAT Manually


Heya Fellas, This tutorial will help you to remove the Infection (RAT) from your computer manually... 

RAT - Remote Administration Tool

Cybergate


For the RAT called Cybergate, we will be using the following settings:

[Image: atgPx.png]

So lets run the virus!

In the settings, you saw that I highlighted 3 things:
-The HKCU, this means the startup name. So when your slave reboots, the HKCU called (in this case) Windows Firewall will be executed again. This startup will be placed in msconfig. We can check this by going to: run and then open ''msconfig''.

[Image: RlN03.png]

Here we see that there is an unknown startup called Windows Firewall, and it runs svchost.exe on every boot of the computer. So an important tip here is, ALWAYS check your msconfig for unknown startups. What we are going to do now is, disabling the startup. But when we do this, it comes back on! This is the second thing that I highlighted, called:
-Persistence, this is an extra process in your task manager which is called explorer.exe in this case. This process will keep the startup alive, so what we need to do is kill that process! Simply go to task manager, and then search for that process. Be careful with what process you end tho, because people who try to RAT you will always try to make the process look legit as possible. 

[Image: IQPdP.png]
The one with the less KB is the fake one (The Cybergate one)
So disable this, and now you can remove Windows Firewall from the startup! What also a good tip is, that RATs always use the *32 as default behind the process, so this may also help finding the fake process.
So this was what we all can do about removing Cybergate infections, of course a Virusscanner will also do the same, but crypters bypass virusscanners, so doing this manually is better.


DarkComet

For the RAT Darkcomet, they released a good tool called Darkcomet Remover. You can use this tool to remove infections, download it here:
DarkComet Removal Tool - Download here

But we can also remove infections manually, which is in my opinion better.

The settings we will be using for Darkcomet:
[Image: iSd1q.png]

So you see we have added persistence to the RAT, and the startup is called ''Startup Test'' in this case. Now after running the virus, the following appears in our MSCONFIG:
[Image: HpQfQ.png]

If we try to remove this startup, it will come back. Same story as CyberGate, there is a persistence process active. We must kill this process. The persistence process of Darkcomet is called:
-Msdcsc.exe*32, this process is quite obvious. As description it says: Remote Service Application:
[Image: teiLb.png]

Kill this process, and we can remove the Startup from Msconfig!
Darkcomet activates other processes as well, sometimes. The processes are called:
-hkmcd.exe 
-persistence.exe
Kill these processes as well.

Blackshades

We will be using the following settings in the Blackshades RAT:
[Image: jXeta.png]

As you can see in the picture, we will be using a startup called: ''Startup Test BS'' and we have activated ''protect process'' this is in other words persistence.

So lets run the virus and then see what comes up in msconfig and task manager:
[Image: BAPSv.png]

Again, we can't disable the startup, because there is another process active that keeps the startup alive. The startup is called smss.exe in this case. So lets end that process:
[Image: JOrTJ.png]

After ending that process, we can close the startup!

But what if a process can't be killed? This can be caused by many crypters. Some crypters will add persistence to the process, so when you try to kill that process it will say it can't end it!
Some useful tools for removing processes without limitations are:


AVG PC tuneup 2011 : Download - Here.

Unknown Logger Cure, when having the keylogger, you will also get a Unknown Cure, with that tool you can end any process. Download - Here.

So having these tools, just navigate to your process you want to kill, and simply end it!


Enjoy :)

Remote Administration Tool(RAT) Setup


Heya Fellas, In this post i'll show you how to setup a RAT(Remote Administration Tool) using Darkcomet.

You'll Need these, So Download 'em :
DarkComet
No-IP DUC

No-IP Setup


You'll have to sign up in No-IP, Click Here.
Once that's done, go here :
[Image: 63487295.png]

And Fill in the Hostname Information.

[Image: 40960867.png]

Now Install the Downloaded No-IP DUC Client. Open it and Login.

And Select "Select Hosts".
[Image: 66847899.png]

After that, the Host that you have created will show up, so just check the box like here :
[Image: 45311727.png]

Now Click on "Save".

DarkComet Configuration


Now, Open up DarkComet.
[Image: 41564684.png]

After that, Simply put an random port, anything is valid.
And Don't forget to Remember the Port you have Entered.

[Image: 33476050.png]

Port-Forwarding


Open up "CMD.exe" and type "ipconfig" and press Enter, so as to get the default Gateway.




Now Open up your Browser ( Chrome for eg.), and type in the Default Gateway IP Address. This will take you to the router configuration page. Open it up by typing in your user id and password ( Default - Userid :Admin and Password :Password). Get into Port-Forwarding Menu.



















Now, Enter up the Port Number and Select TCP and Key in the IPv4 Address which we extracted from our computer using CMD. Now Click Appy.

Now, We have Successfully Completed Port-Forwarding.


DarkComet Setup

Now, Open DarkComet.
[Image: 86805556.png]


Click on DarkComet-RAT --> Server Module --> Full Editor (Exert)

Just Fill in the Profile, as i did.
[Image: 69474073.png]


Then 

[Image: 85369919.png]


And so on,

[Image: 96177740.png]


And Then,



















Now you have finally created the Server.exe which will transfer information from the Victim's Computer.

Now, It's your talent to Spread this. As soon as the Victim Download's it, the server will start running in the background and will start trasferring information to us.

But one Defect is that , All Anti Viruses can Detect this. So for Making it undetecable you have to crypt the File, about which ill post on upcoming dates.

Enjoy :)

Networking Basics - Part 2




6. Link Aggregation (802.3ad describes lacp - link aggregation control protocol)
Link aggregation is used to connect one switch to another with more than just one link. This is useful for redundancy and to assume a higher Bandwidth for the uplink. 
First of all you need to know that you should never connect two switches to each other with more than one cable unless you have configured spanning tree or link aggregation. 
If you do so without one of these features (there are even more you can configure like the HP mesh) you will cause a broadcast storm. 
The broadcast storm will cause a total outage of your network. This is called a network loop and can be achieved with only one switch. 
Just plug in both ends of a network cable to the same switch and that's all. To be sure this is not happening (just imagine an employee don't likes to see a cable hanging 
around and plugs the other end to another network jack) you need to configure a loop protection on all access/edge ports (this is the name of the ports which are used to connect 
an end note like a client or a printer). Depending on the size of the network, a network loop will kill your complete network in less than 10 seconds. 

Ok, as I said you can assume a higher Bandwidth with link aggregation but you need to know one more thing. If you just put two one gigabit links to a link aggregation it does 
not mean that you have a two gigabit uplink. Most switch vendors do not do any kind of load balancing. Typically this is only a load sharing which means that the network traffic is 
shared by both links in a revolving system. First conversation takes link one, second conversation takes link two, third conversation takes link one and so on.
As there is no validation of link quality the fist conversation can be held while the second one has already finished. The third one will take link 1 and not the second link 
which is free in this example. 

This is the configuration on an hp switch 
(as I mentioned on the fist part of tutorial/guide this feature is called trunk in the hp world. Don't mix it with the cisco trunk) 

Code:
hpswitch> enable
password manager:
hpswitch# configure terminal
hpswitch(config)# trunk 23,24 trk1 lacp
hpswitch(config)# write memory

What you need to do:
issue the trunk command with the following information
- A list of ports that will be aggregated
- A name for the trunk
- The type of trunk (HP trunk or LACP). 
If no option is entered, the trunk will default to an hp trunk. 

This is the configuration on a cisco switch:
Code:
ciscoswitch> enable
enable password:
ciscoswitch# configure terminal
ciscoswitch(config)# interface gigabitethernet 0/1
ciscoswitch(config-if)# channel-protocol lacp
ciscoswitch(config-if)# channel-group 1 mode active
ciscoswitch(config-if)# exit
ciscoswitch(config)# interface gigabitethernet 0/2
ciscoswitch(config-if)# channel-protocol lacp
ciscoswitch(config-if)# channel-group 1 mode active
ciscoswitch(config-if)# exit
ciscoswitch(config)# write memory

What you need to do:
enter the interface configuration context and
- define the protocol to be used
- enter a group number (all links in the same group are aggregated
- enter a mode for your aggregation (a complete list of all configuration tasks can be found - Here. 

 
With cisco you have the possiblity to configure load-balancing (this is not really balancing its more like sharing)
Code:
ciscoswitch#show etherchannel load-balance
EtherChannel Load-Balancing Configuration:
        src-mac

EtherChannel Load-Balancing Addresses Used Per-Protocol:
Non-IP: Source MAC address
  IPv4: Source MAC address
  IPv6: Source MAC address


LACP - Link Aggregation Control Protocol
Because it is a widely used standard, static LACP is the preferred trunking method when the switch on the other side of the link supports LACP. However, HP Port Trunking can 
be suitable for situations when the other switch does not support LACP or when its trunking support is unknown. Because it does not rely on a protocol, HP Port Trunking 
often will interoperate with other trunking configurations.

The primary advantage of dynamic LACP is support for standby links, which means the trunk can be configured with links that will become active if other links in the trunk fail.
However, the implementation of dynamic LACP limits other configuration options for the ports in the aggregation. For instance, ports in a dynamic LACP trunk cannot be configured with
non-default Spanning Tree settings. The dynamic LACP trunk also cannot be configured for membership in static VLANs. 
For further reading: Here.

Link Aggregation Support

Link Aggregation support on switches varies among switch vendor, model, and software version. The hp ProVision Asic Switches including 3500yl, 5400zl and 8200zl support 144 link 
aggregations with eight ports. You can assign more than these eight ports but only eight will be used for load-sharing. The others will become active if another one fails.

7. Spanning Tree (the basics)

As I mentioned on the link aggregation part, it is easy to kill your complete network with a network loop. As you want to implement redundant links and you are not able to aggregate them 
you need another mechanism for that task. Imagine you have three switches. Each one is conected to each other with one link. Without the use of spanning tree, once again you build a network
loop. 
   
      _________________________
      |                      |                   |
|switch1|--------|switch2|--------|switch3|


Basically the classic spanning tree which is stp (spanning tree protocol - 802.1d) and rstp (rapid spanning tree protocol - 802.1w) just blocks the redundant link which will cause a 
network loop as long as the other two ports are active. If one of these ports fail then the blocked port will become active. There are a few more spanning tree types like the open standard
mstp (multiple spanning tree protocol) and the cisco pvst (per vlan spanning tree). The old stp is not used anymore as it tooks up to 30 seconds to recalculate the spanning tree topology if a 
link went down. This means that a part of the network was not reachable for 30 seconds. The rstp can accomplish this in less than 2 seconds (depending on the size of the network). 
In this guide I will focus on the rstp version as this is the most simple way for implementing spanning tree. I will say some words about mstp but not in depth as this can be very complex. 
I will start with the hp configuration example and explain the single steps afterwards.
Code:
hpswitch(config)# spanning-treeturn on spanning tree globally on the switch
Code:
hpswitch(config)# spanning-tree force-version rstp-operationset the protocol version to rapid spanning tree
Code:
hpswitch(config)# spanning-tree priority 1set the priority for your switch. Every spanning tree instance needs a root bridge. the root bridge decides which links should be blocked. 
If you dont set the priorities accordingly the switch with the lowest mac address will become root. 
Bridge priority is set in increments of 4096 which means 4096 is 1, 2 is 8192 ...., 8 is 32768.
Code:
hpswitch(config)# spanning-tree 1-22 auto-edge-portdefine access/edge ports as auto-edge-ports for not envolving them into the spanning tree topology. 
If one of these ports is going down the spanning tree will not recalculate it's topology.
Code:
hpswitch(config)# no spanning-tree 23-24 auto-edge-portset the uplinks port to no auto-edge-ports as they should be involved into the spanning tree topology.
Code:
hpswitch(config)# spanning-tree 1-22 bpdu-protectiondefine a bpdu protection on the access/edge ports. If some plugs in a switch to one of theses ports the switch will not get a connect. 

Lets take a look at a comparable cisco configuration.
Code:
ciscoswitch(config)# spanning-treeturn on spanning tree globally on the switch -> is on by default 
Code:
ciscoswitch(config)# spanning-tree mode rapid-pvstset the protocol version to rapid spanning tree 
Code:
ciscoswitch(config)# spanning-tree priority 1set the priority for your switch. Every spanning tree instance needs a root bridge. the root bridge decides which links should be blocked. If you dont set the priorities accordingly 
the switch with the lowest mac address will become root. Bridge priority is set with a value between 0-65535
Code:
ciscoswitch(config)# spanning-tree portfast defaultset all ports to not be involved in the spanning tree topology
Code:
ciscoswitch(config)# spanning-tree portfast bpduguard defaultconfigure all ports with bdpuguard (bdpu protection)
Code:
ciscoswitch(config)# interface gigabitethernet0/23
Code:
ciscoswitch(config-if)# spanning-tree portfast disable
Code:
ciscoswitch(config-if)# exitswitch to an uplink port to involve him to the spanning tree topology and to turn off bpdu Protection. Repeat that for all uplink ports. 

Thats all for this part. This is very basic configuration but it will work and can be found in many smaller networks (up to 15 switches)

A much better way for implementing spanning tree is the multiple spanning tree protocol or per vlan spanning tree (mstp or pvst). 
MSTP is an improvement to stp and rstp. You can use different spanning trees for different vlans. Within stp and rstp you have redundant links blocked.
With MSTP you can have a redundant link for vlan 5 blocked but the same link open for vlan 10. This means you have no dead links.
As with the above sample this time I will only focus on the hp configuration, start with the example config and explain it afterwards
If you are also interessted in the cisco configuration steps you can read this - Here.
Code:
hpswitch(config)# spanning-treeturn on spanning tree globally on the switch
Code:
[code]hpswitch(config)# spanning-tree force-version mstp-operationset the protocol version to multiple spanning tree -> which is used as default
Code:
hpswitch(config)# spanning-tree config-name hp
Code:
hpswitch(config)# spanning-tree config-revision 1Define an MST region identity for the switch. 
Must be the same on all switches involved in this mstp topology
Code:
hpswitch(config)# spanning-tree instance 1 vlan 10 30
Code:
hpswitch(config)# spanning-tree instance 2 vlan 20 40Associate user vlans with MSTP instances. If you have two instances you should consider using different root bridges for each instance. 
The configuration for the root bridge on instance 1 can look like this:
Code:
hpswitch1(config)# spanning-tree instance 1 priotity 1
Code:
hpswitch1(config)# spanning-tree instance 2 priotity 2The configuration for the other root bridge may look like this
Code:
hpswitch2(config)# spanning-tree instance 1 priority 2
Code:
hpswitch2(config)# spanning-tree instance 2 priority 1
In this example hpswitch1 is the root bridge for instance 1 and secondary root bridge for instance 2. 
hpswitch2 is the root bridge for instance 2 and secondary root bridge for instance 1. 
And thats all for the very basic configuration.

8. IP Routing (the basics)

Ok, thats another topic which can fill books on it's own. I will keep that as small as possible. For this I will only focus on static routing, a little bit on RIPv2 and OSPF.
Imagine you have the following network with one router which is located in a transfer network. Every Switch in the different departments is confgured for ip routing and the IP of the Switch
is the default gateway for the clients. Every Switch has a vlan for the clients and a transfer vlan to the router. The Transfer vlan has an address range of 10.10.0.0/28 and the routers ip is 
10.10.0.1 
DepartmentSubnetVLANSwitch IP User vlanSwitch IP Transfer Network
DataCenter10.10.1.0/24510.10.1.110.10.0.2
Sales10.10.2.0/241010.10.2.110.10.0.3
Marketing10.10.3.0/241510.10.3.110.10.0.4

e.g. a client in the sales department has network configuration which looks like this:
IP: 10.10.2.10
Netmask: 255.255.255.0
Gateway: 10.10.2.1

      _______________|Router|_____________
     |                              |                             |
|DCSwitch|--------|SalesSwitch|--------|MarketingSwitch|




Static Routing

What needs to be configured:

DCSwitch 
Code:
dcswitch(config)# ip route 10.10.2.0 255.255.255.0 10.10.0.1route to reach the sales department
Code:
dcswitch(config)# ip route 10.10.3.0 255.255.255.0 10.10.0.1route to reach the marketing department
Code:
dcswitch(config)# ip default-gateway 10.10.0.1
can be used as alternative. This means that all traffic regarding subnets the switch doesn't know will be send to the router

SalesSwitch
Code:
salesswitch(config)# ip route 10.10.1.0 255.255.255.0 10.10.0.1route to reach the datacenter
Code:
salesswitch(config)# ip route 10.10.3.0 255.255.255.0 10.10.0.1route to reach the marketing department
Code:
salesswitch(config)# ip default-gateway 10.10.0.1can be used as alternative. This means that all traffic regarding subnets the switch doesn't know will be send to the router 

MarketingSwitch
Code:
dcswitch(config)# ip route 10.10.1.0 255.255.255.0 10.10.0.1route to reach the datacenter
Code:
dcswitch(config)# ip route 10.10.2.0 255.255.255.0 10.10.0.1route to reach the sales department
Code:
dcswitch(config)# ip default-gateway 10.10.0.1can be used as alternative. This means that all traffic regarding subnets the switch doesn't know will be send to the router 

Router
Code:
router(config)#ip route 10.10.1.0 255.255.255.0 10.10.0.2all traffic for the Datacenter will be sent to the Datacenter Switch
Code:
router(config)#ip route 10.10.2.0 255.255.255.0 10.10.0.3all traffic for the Sales Department will be sent to the Sales Switch
Code:
router(config)#ip route 10.10.3.0 255.255.255.0 10.10.0.4all traffic for the Marketing Department will be sent to the Marketing Switch. 

This maybe belongs to the design part but I think it also fits to this place. This routing concept is called "routing at the edge". The first L3 Switch in the row is routing all 
Traffic regarding his local subnets. If you combine this with RACLs (routed access control lists) you can stop unwanted traffic at the first L3 network device. 
If you deploy a core router who does all the routing a network packet is traversing the complete network until it reaches the core or backbone and is then droped maybe.

e.g. you want the people from sales department to reach a fileserver (10.10.1.100) in the datacenter but only by smb (server message block tcp/445). 
Your ACL could look like this
Code:
salesswitch(config)# ip access-list extended "ACL_TRANSFER_TO_ROUTER"
salesswitch(config-ext-nacl)# 10 permit tcp 10.10.2.0 0.0.0.255 10.10.1.100 0.0.0.0 eq 445
salesswitch(config-ext-nacl)# 20 deny ip 10.10.2.0 0.0.0.255 10.10.1.100 0.0.0.0

Note: within ACLs the subnetmask needs to be inverted. 255.255.255.0 equals 0.0.0.255
This is a very simple example about access control lists. I will write a more in-depth tutorial about that in the future

Ok, this is very simple but can get more and more complex the larger the network grows. I'am a great friend of static routing as you have complete control about which 
subnet is able to reach one other. But if you have hundrets of subnets with a lot of routers and switches you maybe won't to confgure all routes by hand. 
This is when dymanic routing comes into play.


Dynamic Routing
Dynamic routing protocols enable routers to adjust automatically to changes in topology. With a dynamic routing protocol configured, if a router’s neighbor has failed, it will quickly
learn if other paths are available to the neighbor’s networks and update its route table accordingly.

RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) comparison (mainly from hp training material... they can explain it much better then I can)

Distance Vector: 
RIP
- Router sends periodic updates to neighbor routers
- Information about remote networks is passed from router to router based on each routers perspective
- Convergence can be slow

Link State: 
OSPF
- Router reports to its neighbors the characteristics of its active connections to local networks
- Updates are flooded to all routers within administratively defined "area"
- Logical tree is build to calculate shortest path to each address range
- Enables faster convergence, detection of alternate paths after link failure due to possession of first-hand information

Two types of standard interior gateway protocols are commonly used in IP networks:

1.Distance-vector protocols
Routers using these protocols integrate information into their route tables and resend the resulting entries, as modified from their own perspectives. RIP is a common
example of a distance-vector protocol.

2. Link-state protocols. 
Routers using these protocols establish neighbor relationships with adjacent routers. Routers generate updates based on local information and send the updates to 
neighbors, who then flood updates to all their neighbors. Ideally, within a few milliseconds, every router in an administratively defined area has identical information.
 Each router builds a logical tree that then traces out the shortest path to each advertised destination, using itself as the root. As a result, every router has a 
consistent picture of the network from its own perspective. OSPF is a common example of a link-state protocol 

while RIP and other distance-vector protocols are easier to configure than link-state protocols, the distance-vector protocols have one serious disadvantage. Changes in 
routing topology often propagate slowly because information in a router’s table is acquired from other routers that may be as many as 15 hops away.
OSPF, like other link-state protocols, avoids the convergence issues of RIP by not relying on “second-hand” information. A router sends an advertisement when it recognizes a
link-state change. Along with the topology change, the update contains the attributes of all of the router’s currently active links. The router sends the advertisement to its immediate 
neighbors, which are required by the protocol to immediately flood the advertisement to all of their neighbors.

Unlike RIP routers, OSPF routers do not increment the costs as they flood updates. In fact, an OSPF router is not permitted to make any changes to advertisements it receives 
on one network before sending it out onto another network. As a result, all of the routers in the OSPF “area” have a consistent picture of the connections between all routers and
networks in the area. Each router builds a tree based on “first-hand” information that traces the shortest path 
between itself and every router and network in the area. When a link state changes, the router recalculates the tree based on the new information. Ideally, less than a second 
passes between the time the router advertises its new state and the time when all of the routers have found an alternate path, if one exists. 

Ok... that's all I want to write about dynamic routing. As you know there are a lot more routing protocols and this is very complex. 
I will write a more in-depth tutorial about dynamic routing with configuration examples in the future.


9. Something about network design
I will tell you some things you need to know if you are designing a network. Mostly you won't have the possiblity to plan a complete building including cableing, network racks and network rooms.
Basically you will do a network redesign. The things I always need to know are the following (this is not a complete list.)

- How is the cableing for switch interconnection (Uplinks) (Fiber optic, copper, 10Gig ethernet (CX4))
- which network room has direct connection to another one
- how far are the switches away from each other
- Availability
- Can new cables be installed
- How deep are the racks (you may laugh but I had the problem that a switch has not fitted into the rack)
- Are there places with additional needs (maybe the human resource department needs extra protection)
and so on.

If you have the possiblity that new cables can be installed you should deploy as many redundant links as possible. 
Keep in mind that different types of cables can make different distances

copper: not more than 150 m
copper CX4: 15 m
fiber SX: 550 m
fiber LX: up to 10 km
These are not all types of cables. I just wanted to give an example. 

You should consider installing a redundant backbone/core and connect them with a 10 gigabit link. You should use a router redundancy protocol like hsrp (hot standby router protocol) 
or vrrp (virtual router redundancy protocol). In simple words every switch has its own ip address. With a router redundancy protocol you assign a virtual ip address on top with a virtual mac
address. The primary router uses this virtual ip address. If the primary router dies the second takes over the virtual ip and mac. You all know that you can not configure a client with two gateway 
ips so instead you just use the virtual one. The virtual IP address can also be used for monitoring if a remote or branch office is reachable as this is a highly available IP address. 

Think about your spanning tree deployment as much as possible. 
Use a protocol which has less dead links like mstp or pvst. Your design must be very good. If there is a mis-configuration, troubleshooting can be very hard as the problems can be very strange.

If you need to mix different venders read as much interoperability guides as possible. For example if you have a cisco network with pvst and a procurve network with mstp you should allways use
a pvst filter on the ports which connect to the cisco world. Believe me... you won't see whats happening if you don't! :-)

Ok.. I think this is enough. If anyone here needs to plan and implement a network they contact me anytime. I would love to discuss that :-) 

Last but not least I decided to copy in a configuration I have done for a small branch office network which is connected to a datacenter. The network consids of 4 switches and this config is from one of the L3 Switches (HP 3500yl). If you read both tutorials you should be able to understand most of it. In this config I changed IP Adresses, hostnames and routes.
Code:
hostname "Switch1"
time timezone 60
time daylight-time-rule Western-Europe
console inactivity-timer 60
ip access-list extended "Transfer_to_DC_ACL"
   10 deny tcp 10.10.0.0 0.0.0.255 10.10.100.0 0.0.0.255 eq 3389
   20 permit ip 10.10.0.0 0.0.0.255 10.10.100.0 0.0.0.255
   30 permit ip 10.10.0.0 0.0.0.255 10.10.150.0 0.0.31.255
   40 deny ip 10.10.0.0 0.0.0.255 10.10.200.0 0.0.0.15
   50 deny ip 10.10.0.0 0.0.0.255 10.10.201.0 0.0.0.255
   60 deny ip 10.10.0.0 0.0.0.255 10.10.202.0 0.0.0.255
   70 deny ip 10.10.0.0 0.0.0.255 10.10.203.0 0.0.0.255
   80 deny tcp 10.10.0.0 0.0.0.255 10.10.204.0 0.0.0.255 eq 3389
   90 permit ip 10.10.0.0 0.0.0.255 10.10.204.0 0.0.0.255
   200 deny tcp 10.10.1.0 0.0.0.255 10.10.100.0 0.0.0.255 eq 3389
   210 permit ip 10.10.1.0 0.0.0.255 10.10.100.0 0.0.0.255
   220 permit ip 10.10.1.0 0.0.0.255 10.10.150.0 0.0.31.255
   230 deny ip 10.10.1.0 0.0.0.255 10.10.200.0 0.0.0.15
   240 deny ip 10.10.1.0 0.0.0.255 10.10.201.0 0.0.0.255
   250 permit ip 10.10.1.0 0.0.0.255 10.10.202.0 0.0.0.255
   260 deny ip 10.10.1.0 0.0.0.255 10.10.203.0 0.0.0.255
   270 deny ip 10.10.1.0 0.0.0.255 10.10.204.0 0.0.0.255
   300 deny tcp 10.10.2.0 0.0.0.255 10.10.100.0 0.0.0.255 eq 3389
   310 permit ip 10.10.2.0 0.0.0.255 10.10.100.0 0.0.0.255
   320 permit ip 10.10.2.0 0.0.0.255 10.10.150.0 0.0.31.255
   330 deny ip 10.10.2.0 0.0.0.255 10.10.200.0 0.0.0.15
   340 deny ip 10.10.2.0 0.0.0.255 10.10.201.0 0.0.0.255
   350 deny ip 10.10.2.0 0.0.0.255 10.10.202.0 0.0.0.255
   360 deny ip 10.10.2.0 0.0.0.255 10.10.203.0 0.0.0.255
   370 permit ip 10.10.2.0 0.0.0.255 10.10.204.0 0.0.0.255
   400 deny tcp 10.10.3.0 0.0.0.255 10.10.100.0 0.0.0.255 eq 3389
   410 permit ip 10.10.3.0 0.0.0.255 10.10.100.0 0.0.0.255
   420 permit ip 10.10.3.0 0.0.0.255 10.10.150.0 0.0.31.255
   430 permit ip 10.10.3.0 0.0.0.255 10.10.200.0 0.0.0.15
   440 permit ip 10.10.3.0 0.0.0.255 10.10.201.0 0.0.0.255
   450 permit ip 10.10.3.0 0.0.0.255 10.10.202.0 0.0.0.255
   460 permit ip 10.10.3.0 0.0.0.255 10.10.203.0 0.0.0.255
   470 permit ip 10.10.3.0 0.0.0.255 10.10.204.0 0.0.0.255
   500 permit ip 10.10.4.0 0.0.0.255 10.132.72.240 0.0.0.0
   510 deny ip 10.10.4.0 0.0.0.255 10.10.100.0 0.0.0.255
   520 deny ip 10.10.4.0 0.0.0.255 10.10.150.0 0.0.31.255
   530 deny ip 10.10.4.0 0.0.0.255 10.10.200.0 0.0.0.15
   540 deny ip 10.10.4.0 0.0.0.255 10.10.201.0 0.0.0.255
   550 deny ip 10.10.4.0 0.0.0.255 10.10.202.0 0.0.0.255
   560 deny ip 10.10.4.0 0.0.0.255 10.10.203.0 0.0.0.255
   570 deny ip 10.10.4.0 0.0.0.255 10.10.204.0 0.0.0.255
   600 permit ip 10.10.7.0 0.0.0.15 10.10.100.0 0.0.0.255
   610 permit ip 10.10.7.0 0.0.0.15 10.10.150.0 0.0.31.255
   620 permit ip 10.10.7.0 0.0.0.15 10.10.200.0 0.0.0.15
   630 permit ip 10.10.7.0 0.0.0.15 10.10.201.0 0.0.0.255
   640 permit ip 10.10.7.0 0.0.0.15 10.10.202.0 0.0.0.255
   650 permit ip 10.10.7.0 0.0.0.15 10.10.203.0 0.0.0.255
   660 permit ip 10.10.7.0 0.0.0.15 10.10.204.0 0.0.0.255
   700 deny ip 10.10.0.0 0.0.7.255 10.128.0.0 0.7.255.255
   710 permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
   exit
module 1 type J86xxA
interface 1
   name "Connection_to_DC"
   speed-duplex auto-1000
exit
interface 2
   name "WAN_Optimizer"
   speed-duplex auto-1000
exit
interface 3
   name "3 Printer1"
exit
interface 4
   name "4 Printer2"
exit
interface 6
   name "6 Client1"
exit
interface 7
   name "Client2"
exit
interface 8
   name "8 Client3"
exit
interface 9
   name "9 Client 4"
exit
interface 13
   name "13 Printer3"
exit
interface 15
   name "UPL_Switch4_1"
   speed-duplex auto-1000
exit
interface 16
   name "UPL_Switch4_2"
   speed-duplex auto-1000
exit
interface 17
   name "UPL_Switch3_1"
   speed-duplex auto-1000
exit
interface 18
   name "UPL_Switch3_2"
   speed-duplex auto-1000
exit
interface 19
   name "UPL_Switch2_1"
   speed-duplex auto-1000
exit
interface 20
   name "UPL_Switch2_2"
   speed-duplex auto-1000
exit
interface 23
   name "Client5"
exit
trunk 19-20 Trk1 LACP
trunk 17-18 Trk2 LACP
trunk 15-16 Trk3 LACP
ip routing
snmpv3 enable
snmpv3 group ManagerAuth user "UserName" sec-model ver3
vlan 1
   name "DEFAULT_VLAN"
   untagged Trk1-Trk3
   ip address dhcp-bootp
   no untagged 1-14,21-24
   exit
vlan 760
   name "CLIENTNET"
   untagged 3,5-6,8-9,11-12,14,21-24
   ip helper-address 10.132.72.13
   ip address 10.10.0.1 255.255.255.0
   tagged Trk1-Trk3
   exit
vlan 770
   name "SERVERNET"
   untagged 7,10
   ip address 10.10.1.1 255.255.255.0
   tagged Trk1-Trk3
   exit
vlan 780
   name "PRINTERNET"
   untagged 4,13
   ip helper-address 10.132.72.13
   ip address 10.10.2.1 255.255.255.0
   tagged Trk1-Trk3
   exit
vlan 790
   name "MGMTNET"
   untagged 2
   ip address 10.10.3.1 255.255.255.0
   tagged Trk1-Trk3
   exit
vlan 800
   name "GUESTNET"
   ip address 10.10.4.1 255.255.255.0
   tagged Trk1-Trk3
   exit
vlan 830
   name "TRANSFERNET"
   untagged 1
   ip address 10.10.7.5 255.255.255.240
   tagged Trk1-Trk3
   ip access-group "Transfer_to_DC_ACL" out
   exit
fault-finder bad-driver sensitivity high
fault-finder bad-transceiver sensitivity high
fault-finder bad-cable sensitivity high
fault-finder too-long-cable sensitivity high
fault-finder over-bandwidth sensitivity high
fault-finder broadcast-storm sensitivity high
fault-finder loss-of-link sensitivity high
fault-finder duplex-mismatch-hdx sensitivity high
fault-finder duplex-mismatch-fdx sensitivity high
fault-finder link-flap sensitivity high
banner motd "\"Authorized access only!\n\nDisconnect IMMEDIATELY if you are not
an\n authorized user!\""
radius-server host 10.10.202.100 key "RADIUSSERVERKEY"
timesync sntp
sntp unicast
sntp server priority 1 10.10.201.5 4
no telnet-server
no web-management
ip authorized-managers 10.10.150.0 255.255.224.0 access manager
ip authorized-managers 10.10.100.0 255.255.255.0 access manager
ip authorized-managers 10.10.3.0 255.255.255.0 access manager
ip authorized-managers 10.10.201.0 255.255.255.0 access manager
ip dns domain-name "Domain.local"
ip dns server-address priority 1 10.10.203.5
ip dns server-address priority 2 10.10.203.6
ip route 10.10.150.0 255.255.224.0 10.10.7.3
ip route 10.10.100.0 255.255.255.0 10.10.7.3
ip route 10.10.201.0 255.255.255.0 10.10.7.3
ip route 10.10.202.0 255.255.255.0 10.10.7.3
ip route 10.10.200.0 255.255.255.248 10.10.7.3
ip route 10.10.203.0 255.255.255.0 10.10.7.3
ip route 10.10.204.0 255.255.255.128 10.10.7.3
router vrrp
snmp-server community "Community" operator
snmp-server contact "Admins" location "DC"
snmpv3 user "Username"
aaa accounting network start-stop radius
aaa authentication port-access eap-radius authorized
aaa authentication mac-based chap-radius authorized
aaa port-access authenticator active
aaa port-access mac-based 3-6,11-14,21-24
aaa port-access mac-based 3 unauth-vid 800
aaa port-access mac-based 4 logoff-period 10080
aaa port-access mac-based 4 unauth-vid 800
aaa port-access mac-based 5 unauth-vid 800
aaa port-access mac-based 6 unauth-vid 800
aaa port-access mac-based 8 unauth-vid 800
aaa port-access mac-based 9 unauth-vid 800
aaa port-access mac-based 11 unauth-vid 800
aaa port-access mac-based 12 unauth-vid 800
aaa port-access mac-based 13 logoff-period 10080
aaa port-access mac-based 13 unauth-vid 800
aaa port-access mac-based 14 unauth-vid 800
aaa port-access mac-based 21 unauth-vid 800
aaa port-access mac-based 22 unauth-vid 800
aaa port-access mac-based 23 unauth-vid 800
aaa port-access mac-based 24 unauth-vid 800
aaa port-access mac-based addr-format single-dash
spanning-tree
spanning-tree 3 bpdu-protection
spanning-tree 4 bpdu-protection
spanning-tree 5 bpdu-protection
spanning-tree 6 bpdu-protection
spanning-tree 7 bpdu-protection
spanning-tree 8 bpdu-protection
spanning-tree 9 bpdu-protection
spanning-tree 10 bpdu-protection
spanning-tree 11 bpdu-protection
spanning-tree 12 bpdu-protection
spanning-tree 13 bpdu-protection
spanning-tree 14 bpdu-protection
spanning-tree Trk1 priority 4
spanning-tree Trk2 priority 4
spanning-tree Trk3 priority 4
spanning-tree priority 1 force-version rstp-operation
vlan 760
   vrrp vrid 41
      owner
      virtual-ip-address 10.10.0.1 255.255.255.0
      priority 255
      enable
      exit
   exit
vlan 770
   vrrp vrid 42
      owner
      virtual-ip-address 10.10.1.1 255.255.255.0
      priority 255
      enable
      exit
   exit
vlan 780
   vrrp vrid 43
      owner
      virtual-ip-address 10.10.2.1 255.255.255.0
      priority 255
      enable
      exit
   exit
vlan 790
   vrrp vrid 44
      owner
      virtual-ip-address 10.10.3.1 255.255.255.0
      priority 255
      enable
      exit
   exit
vlan 800
   vrrp vrid 46
      owner
      virtual-ip-address 10.10.4.1 255.255.255.0
      priority 255
      enable
      exit
   exit
vlan 830
   vrrp vrid 49
      owner
      virtual-ip-address 10.10.7.5 255.255.255.240
      priority 255
      enable
      exit
   exit
no autorun
no dhcp config-file-update
no dhcp image-file-update
password manager
password operator


Enjoy :)