40
S DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA & RAHUL TYAGI)

DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Embed Size (px)

Citation preview

Page 1: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

S

DANIAL MAYO SCHOOL NAGAUR

ETHICAL HACKING WORKSHOP BY

RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED)SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA & RAHUL TYAGI)

Page 2: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

TOPICS OF WORKSHOP ETHICAL HACKING INTRODUCTION.

INTRODUCTION TO INFORMATION GATHERING & FOOT PRINTING

PHISHING (GMAIL HACKING,FACE-BOOK HACKING)

CYBER FORENSICS. VIRUS,WORMS,KEYLOGGERS,SNIFF

ERS, TROZANS.

Page 3: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

TOPICS

SYSTEM HACKING & SECURITY.

GOOGLE HACKING STEGNOGRAPHY

FIREWALLS AND DNS .

Page 4: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

1).ETHICAL HACKING INTRODUCTION

1. WHAT IS HACKING?

2. WHAT IS ETHICAL HACKING AND WHO ARE ETHICAL HACKERS?

3. WHAT ARE TYPE OF ETHICAL HACKERS?

Black hat ,White hat ,Grey hat, Script kiddies,

Undergo Employees.

Page 5: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Hackers development cycle

Reconnaissance- it’s the basic information gathering about the target system.

Scanning-its to target the system for open ports and services running on the open ports.(65570 ports)

Gaining Access-it’s the actual access of the target system by exploiting the system.

Maintaining Access-keeping the access of the system even after leaving the system so as not to perform all the steps from the start.

Cleaning tracks- To remove the footprints if any so as to remain undetected from the system.

Page 6: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

practical's Global IP address-www.ipcow.com

To find dedicated and shared server-www.yougetsignal.com

Use to check IP address and contact details of any website-

Who.is website, Samspade software.

How to copy full website and see it in offline –winHT track website copier.

To see website back to time –way back time machine.

Page 7: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

For changing right click properties Go to run type regedit.

In regedit go to my computer then Hkey classes root

Then search for name “folder”.

In folder there is shell open ,

Default change content according to you .

To ping any website- c:CD/

C:/>ping www.websitename.com

Page 8: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

For changing hard disk options

Go to run type gpedit.msc

User configurations.

Admin privileges.

Windows component.

Windows explorer –just see on its right side and change settings according to you.

Page 9: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

INTRODUCTION TO INFORMATION GATHERING AND FOOTPRINTING FOOT PRINTING IS PRE ATTACK PHASE IT HELPS US TO

GATHER MAXIMUM ABOUT OUR VICTIM.

SCANNING IS A PROCESS OR TECHNIQUE OF INTELLIGENT INFORMATION FOR AN ATTACKER

WE FIND

1. IP ADDRESS

2. OPERATING SYSTEMS.

3. SYSTEM ARCHITECTURE.

4. SERVICES RUNNING ON EACH COMPUTER.

THREE TYPES OF SCANNING

PORT SCANNING,NETWORK SCANNING ,VULNERABILITY SCANNING

Page 10: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

PRACTICALS SOFTWARE TO SCAN PERSONS THAT ARE IN

YOUR NETWORK IF U ARE WORKING ON WIFI OR ANY COMPANY

SOFTPERFECT NET SCAN FOR NET WORK

SCANNING

SOFTWARE TO SCAN DETAILS OF ANY WEBSITE ANY SERVER ,ANY COMPUTER

ZENMAP OR NMAP (SCAN ANY WEBSITE )

C:/>NMAP 192.168.150.1.

Page 11: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

PHISHING (GMAIL,FACE BOOK HACKING)

PHISHING IS A TECHNIQUE THROUGH WHICH WE SEND A CLONE PAGE OF ANY WEBSITE TO THE VICTIM AND AS THE VICTIM FILES THE USERNAME AND PASSWORD WE GET THAT PASSWORD AND WE CAN ACCESS THAT MAIL OR WEBSITE ACCOUNT OF THE VICTIM.

REQUIREMENTS:-

1. GMAIL FAKE PAGE .

2. PHP SCRIPT.

3. LOGS.txt.

4. FREE HOSTING WEBSITE.

Page 12: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

PRACTICAL OPEN GMAIL .COM

RIGHT CLICK ON IT OR PRESS CONTROL+U.

ITS PAGE SOURCE VIEW COPY ALL THE PAGE

OPEN NOTEPAD AND PASTE IT

EDIT FIND ACTION CHANGE FILE TO NOKIA.PHP

AND SAVE THAT FILE AS GMAIL.HTML

NOW THAT FILE IS ON LOCAL MACHINE BUT TO SEND THAT TO ANY VICTIM WE SHOULD HAVE TO UPLOAD THAT ON ANY WESITE THROUGH WHICH IT WOULD BE GETTING LINKED.

Page 13: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

CONTINUE ANY WEBHOSTING SITE

WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOSTING.COM,000WEBHOST.COM

MAKE YOUR ACCOUNT THEN GO TO CONTROL PANEL FILE MANAGER

MAKE NEW FOLDER MAKE NEW DIRECTORY

UPLOAD NOKIA.PHP FILE ,GMAIL.HTML(FAKE

PAGE).

Page 14: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

CONTINUE SEND THE LINK OF YOUR FAKE PAGE TO VICTIM

YOU WOULD GET THE USERNAME PASSWORD IN LINK YOU SEND IT TO THE VICTIM JUST CHANGE LAST ROOT FILE OF IT WITH LOGS.TXT.

http://roam.hostingsiteforfree.com/nokia.php/logs.txt

http://roam.hostingsiteforfree.com/nokia.php/gmail.html

http://roam.hostingsiteforfree.com/nokia.php/facebook.html

Page 15: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

CYBER FOREINSICS Cyber Forensics can be defined as a process

of retrieving back the evidences deleted by the criminal from hard disk, pen drive, memory card, laptop disks, portable hard disks.

The process takes place in two manners:-

1. Recovering the deleted data

2. In case of damage Sorting the data from a scrambled

form.

Page 16: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

continue

Formatting

1. Quick Formatting 2. Complete Formatting

Index Application Size

101001 ramayan.avi 850MB

Quick Formatting will be very quick and after when its done your OS will not gone show you any content of the pendrive and hence we think data is deleted but in reality data is always there in quick formatting, its only Index is gone. and when index is gone then Windows OS can not determine the location of file and hence will say its empty.

Page 17: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Continue

Complete Formatting : It will delete both index and data.

Whatsapp Forensic Recovery:-Can recover up to 7 days of the chat because after 7 days backup whatsapp delete the logs from your storage.

Page 18: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Practical How to recover what's app messages

1. Take the phone whose messages you want to recover take file called MySQL from database of whatsapp to your computer and save it .

2. Go to website www.recovermessages.com

3. Scan the MySQL file and you will have messages of seven days.

Page 19: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Continue

How to recover pendrive and hard disk drives?

For that a software is needed it is

Easus data recovery professional for data recovery .

Select the drive in this software which you want to recover but first condition drive should be quick format .

Page 20: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Virus ,worms keyloggers,trojans

What is virus ?

Malicious program ,using this program will damage your

system, by injecting the virus into other program

what is worms?

same as virus but they will spread throughout the

network.

What is Trojan ?]

It is like data of the victim to be used by someone else.

Not harming your computer.

Page 21: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

TROJANS

There are 2 types of Trojans are there

1. DIRECT TROZAN – IT’S THE TROZAN IN WHICH YOU NEED TO HAVE IP ADDRESS OF THE VICTIM EVERYTIME .

2. REVERSE TROZAN- IT’S THE TROZAN IN WHICH YOU NEED TO HAVE IP ADDRESS OF THE VICTIM ONCE AS IT CHANGES DYNAMICALLY THERE WILL BE EFFECT IN OUR ID WHICH WE WANT(VICTIM’S IP)

Page 22: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

PRACTICAL DIRECT TROZAN ARE-

1. BEAST TROZAN V2.0

2. PRO RAT

3. TROKOZAN

REVERSE TROZAN

1. CYBER GATE

2. DARK COMMET.

Page 23: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

CONTINUE

BEAST TROZAN

1. HOST IP address ,port, built server

2. As server is build there will be file we will send it to victim there he clicks it .

3. And then we connect the victim by clicking on go beast now we can have ay change .

DARK COMMET

1.CLIENT 2.EDIT SERVER 3.SERVER MODULE 4.TEST

NETWORK 4.INSTALL MESSAGE 5.BUILD SERVER .

Page 24: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Keyloggers (theory n practical) What is key logger?

It is a tool which keeps record of what ever you write on pc

or notepad file username password etc.

Two types of key logger

1.local key logger – family key logger.

2.remote key logger –general keylogger.

Page 25: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

SYSTEM HACKING & SECURITY

What is system hacking?

it’s the process in which we log into the victims computer

or any persons computer which is locked without

password or by changing the password.

there are 2 modes in which system hacking is done :-

1 online mode.

2 offline mode.

Page 26: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

PRACTICALS Online mode-

For windows XP –command prompt net user password

For windows 7 and above manage options local users

user administrator (change password)

Offline mode-

1. Hiren boot cd.

2. Kon boot cd.

Page 27: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

security

Use windows 8 version or Ubuntu.

Use bios password locker .

Use boot priority as from hard disk .

Change periodically your password.

Page 28: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

GOOGLE HACKING Who discovered Google?

Larry Page and Sergey Brin 1997 and deploy in 1998 from Stanford university.

Google ranking--> Its a page rank algorithm that rank the websites according to their genuine content and their relevance on stats incurring hits on the websites and popularity among the cyber space youth.

Google hacking is nothing but its advance method for searching required things in the internet. As Google advance searching platform gives us a refined search.

Page 29: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

PRACTICALS Define: computer.

Time: Gujarat.

Weather: America.

CCTV Camera Hacking with Google

DORK ----> "view/shtml”

Website Hacking with Google Hacks

XML Extraction attack

"app/etc./local.xml”

www.exploit-db.com -- to see more Google hacks.

Page 30: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

STEGNOGRAPHY

It is science of hiding information.

It is hiding text files in pictures audio mp3 files ,video files.

Basically used by terrorist in 9/11 attacks on USA

Page 31: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Practical First make a notepad file and save as

“secret.txt”

And next we should have pictures any image. Jpg

Now go to command prompt type

copy/b image.Jpg+secret.txt secretimage.jpg

1 file copied (it’s a way in command prompt)

Using GUI we use Stool which accepts only bmp image file

Page 32: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

FIREWALLS Firewall in computer terms can be defined as the

gatekeeper which checks the genuine of every data packet coming and going out from the computer. Mainly it is deployed to protect our computer from external attacks ,like malicious URL attacks, remote exploits like netapi, viruses etc.

Company Colleges Restrictions

Establishing ID

Establishing UTMs

Establishing Firewalls

Page 33: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Practicals 1. Software Firewall: can be defined as an

application software which is going to be installed on windows or any other operating system. And then start its scanning and protection mechanism.

Top software firewalls

1. Zone Alarm Firewall 2.Viper Internet Security 2013

*Limitation of Software Firewall*

can easily be corrupted and infected

- Unable to protect servers and other OS from zero day attacks

Page 34: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

practical 2. Hardware Firewall: can be defined as a piece

of hardware that can be deployed in the organization to protect it from external as well as internal attacks. As its a piece of hardware its always comes into a read only rom chip that can not be easily infected by any virus or exploit.

Hardware Firewalls Available

1. Juniper Hardware Firewall (UTM)unified threat mgmt. system.

2. Nebero ( Anti-Porn)

3. Cyberom (Indian Company Ahmedabad, Client)

Page 35: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Set up a free firewall Name –open DNS

Website Control Panel: www.opendns.com

Support: Servers, Windows, LAN and MAN up to 5k users.

Deployment: For Personal PC, For LAN Router, For

College University and organization etc. etc.

Page 36: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

WEBSITE HACKING What is website?

Websites can be defined as a platform to present information about a company, person, organization etc. etc.

Web site are of two types

1. Static Websites: Static Websites can be defined as the websites which are not driven by a proper database and maximum all static websites are developed in HTML technology with almost rare response feature from the end these website are not having any control panel. they are mostly driven through TP clients connected to the hosting server.

Page 37: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Continue

2. Dynamic Websites: These websites can be defined as the websites having large number of database installed and also have features to insert new data, fetch new data, delete the data etc. etc. These websites have their own control panels from which the admin do change the settings as per required. It has properties like : Read Write Delete Insert etc. etc. which are not available in Static websites. Dynamic Websites uses databases like: MY SQL , SQL SERVER , ORACLE etc.

Parts of Web Application

Front Hand : From where user fills the data and when clicks on submit the data goes to the database.

Backhand: is the database where the requested data is being stored.

Page 38: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Continue SQL ( Structured Query Language)

Its a technology that able to get the data from the front hand and stored the data into the backhand And when required do the vice versa.

Admin Login Page

The page from where the administrator enters into the control panel of the website and do the need fully changes.

"adminlogin.php" "admin/login.php" "administrator.php" "login/admin.php"

"adminlogin.asp" "admin/login.asp" "adminstrator.asp" "login/admin.asp"

"adminlogin.aspx" "admin/login.aspx" "adminstrator.aspx" "login/admin.aspx"

Page 39: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

Continue When u find admin age then u need to enter

username password

Write 'or' '=’ in user Name n password Field

Use proxies while hacking

If time Left i Will teach You error based SQL injection and xss vulnérabilités

Page 40: DANIAL MAYO SCHOOL NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER SUNNY VAGELA

QUERIES

For any enquires & questions contact on

Facebook-https://www.facebook.com/rajan.khandelwal.98

Gmail- http://[email protected]

My WEBSITE-www.officialrajankhandelwal01.weebly.com

On whatsapp only ques 9414463477

YOU can follow me on TWITTER-

AND MR SACHIN PUNIYA

Sachinpuniya.blogspot.com

Facebook-https://www.facebook.com/sachin.puniya