Saturday, June 14, 2014

Windows Web Hosting

The availability of Microsoft’s Active Server Pages technology in Windows hosting solutions provides for dynamic web pages that can help give your website the best possible presentation and performance.  ASP is a powerful and flexible technology that can provide your site users with a range of interactive page options and functionality that surpasses the norm.  When opting for a Windows hosting package equipped with this dynamic programming technology, you will then have the tools needed to gain an edge on the competition.

If I use Windows Hosting, is it necessary my operating system should be Windows?
The answer is NO. The type of hosting you choose has nothing to do with the operating system your PC runs.



Below are some features which provided by WebHosting Companies:

Statistics
This is where you view detailed reports on how resources provided with your subscription are used.

File Manager
Upload new files and work with current files and directories of your websites.

Web Statistics
View the reports on how your websites are visited. See how many people visited a site and which webpages they viewed.

FTP Access
Set up access to files of your websites over FTP protocol.

DNS Setting
Mangage DNS zone for your Domain names.

Backup Manager
Back Up and restore your domains, including settings and content of websites and mail accounts.

Web Hosting Access
 Change setting of the system user account used for remote access to Panel over SSH or RDP and working with files and folders in File Manager.

Databases
Create and remove databases used by your websites and manage them using integrated administrative web application.

Password Protected Directories
Restrict access to selected areas of your website with password protection.

Website Copying
Copy website files to another site or external FTP Storage.

Logs
View logs and configure recycling of logs files.

Dedicated IIS Application Pool for your Websites
Set Up a dedicated IIS application pool for serving website associated with the currently selected subscription.

ASP.NET Setting
Configure the setting of ASP.NET framework.

Scheduled Tasks
View and Manage scheduled tasks.

Hotlink Protection
Protect content of your websites from hotlilnking.

Web Users
Set up accounts for users who can host personal web pages on your websites.

Website Maintenance Mode
Switch a site off for maintenance and let the site visitors know that this is done on purpose and the site will be up soon.

Virtual Directories
Create and manage virtual directories for your websites.

ODBC Data Sources
Set up ODBC Data sources.

Note - Above Features list are just an example. May be you will get more features or less features its depend on the hosting provider companies. Some webhosting also provides some software and services.

Like it ? Share it.

Wednesday, June 11, 2014

Introduction Burp Suite Part II ( Proxy Tab)


Burp Proxy lies at the heart of Burp's user-driven workflow. It operates as a web proxy server between your browser and target applications, and lets you intercept, inspect and modify the raw traffic passing in both directions.
If the application employs HTTPS, Burp breaks the SSL connection between your browser and the server, so that even encrypted data can be viewed and modified within the Proxy.


1. Intercepting
      The Intercept tab is used to display and modify HTTP and WebSockets messages that pass between your browser and web servers. When an intercepted message is being displayed, details of the destination server are shown at the top of the panel. For HTTP requests, you can manually edit the target server to which the request will be sent, by clicking on the server caption or the button next to it.
Forward- When you have reviewed and (if required) edited the message, click "Forward" to send the message on to the server or browser.
Drop- Use this to abandon the message so that it is not forwarded.
Interception is on/off - This button is used to toggle all interception on and off. If the button is showing "Intercept is on", then messages will be intercepted or automatically forwarded according to the configured options for interception of HTTP and WebSockets messages. If the button is showing "Intercept is off" then all messages will be automatically forwarded.
Action- This shows a menu of available actions that can be performed on the currently displayed message. These are the same options that appear on the context menu of the intercepted message display.
Comment field - This lets you add a comment to interesting items, to easily identify them later. Comments added in the intercept panel will appear in the relevant item in the Proxy history. Further, if you add a comment to an HTTP request, the comment will appear again if the corresponding response is also intercepted.
Highlight- This lets you apply a colored highlight to interesting items. As with comments, highlights will appear in the Proxy history and on intercepted responses.
(Click image for large view)


2. History
      The Proxy history maintains a full record of all messages that have passed through the Proxy. You can filter and annotate this information to help manage it. The Proxy history is always updated even when you have interception turned off, allowing you to browse without interruption while still monitoring key details about application traffic.
History Table
Separate history tables are shown for HTTP and WebSockets messages. Each table shows full details of the messages that have passed through the Proxy, and any modifications you have made to intercepted messages.
The HTTP history table contains the following columns: 
  • The request index number
  • The protocol and server hostname
  • The HTTP method
  • The URL file path and query string
  • Flag whether the request contains any parameters
  • Flag whether the request or response were modified by the user
  • The HTTP status code of the response
  • The length of the response in bytes
  • The MIME type of the response
  • The URL file extension
  • The page title (for HTML responses)
  • Any user-applied comment
  • Flag whether SSL is used
  • The IP address of the destination server
  • Any cookies that were set in the response
  • The time the request was made
  • The listener port on which the request was received
3. Option
     This tab contains Burp Proxy settings for Proxy listeners, intercepting HTTP requests and responses, intercepting WebSockets messages, response modification, match and replace, SSL pass through, and miscellaneous options.

A. Proxy Listeners
     A Proxy listener is a local HTTP proxy server that listens for incoming connections from your browser. It allows you to monitor and intercept all requests and responses. By default, Burp creates a single listener on port 8080 of the loopback interface. To use this listener, you need to configure your browser to use 127.0.0.1:8080 as its proxy server. Visit Configure Browser
Burp lets you create multiple Proxy listeners, and provides a wealth of configuration options for controlling their behavior. You may occasionally need to use these options when testing unusual applications, or working with some non-browser-based HTTP clients. 

B. Intercepting HTTP Requests and Responses
    These settings control which requests and responses are stalled for viewing and editing in the Intercept tab. Separate settings are applied to requests and responses.
The "Intercept" checkbox determines whether any messages are intercepted. If it is checked, then Burp applies the configured rules to each message to determine whether it should be intercepted.
 Individual rules can be activated or deactivated with the checkbox on the left of each rule. Rules can be added, edited, removed, or reordered using the buttons.
 Rules can be configured on practically any attribute of the message, including domain name, IP address, protocol, HTTP method, URL, file extension, parameters, cookies, header/body content, status code, MIME type, HTML page title, and Proxy listener port. You can configure rules to only intercept items for URLs that are within the target scope. Regular expressions can be used to define complex matching conditions for each attribute.
 Rules are processed in order, and are combined using the Boolean operators AND and OR. These are processed with a simple "left to right" logic in which the scope of each operator is as follows:
 (cumulative result of all prior rules) AND/OR (result of current rule)
All active rules are processed on every message, and the result after the final active rule is applied determines whether the message is intercepted or forwarded in the background.
The "Automatically update Content-Length" checkbox controls whether Burp automatically updates the Content-Length header of the message when this has been modified by the user. Using this option is normally essential when the HTTP body has been modified.
For requests, there is an option to automatically fix missing or superfluous new lines at the end of requests. If an edited request does not contain a blank line following the headers, Burp will add this. If an edited request with a body containing URL-encoded parameters contains any newline characters at the end of the body, Burp will remove these. This option can be useful to correct mistakes made while manually editing requests in the interception view, to avoid issuing invalid requests to the server.

C. Response Modification
       These settings are used to perform automatic modification of responses. You can use these options to achieve various tasks by automatically rewriting the HTML in application responses.
 The following options may be useful to remove client-side controls over data:
  • Unhide hidden form fields. (There is a sub-option to prominently highlight unhidden fields on-screen, for easy identification.)
  • Enable disabled form fields
  • Remove input field length limits
  • Remove JavaScript form validation
The following options may be useful for disabling client-side logic for testing purposes (note that these features are not designed to be used as a security defense in the manner of NoScript): 
  • Remove all JavaScript
  • Remove <object> tags
The following options may be used to deliver sslstrip-like attacks against a victim user whose traffic is unwittingly being proxied via Burp. You can use these in conjunction with the listener option to force SSL in outgoing requests to effectively strip SSL from the user's connection: 
  • Convert HTTPS links to HTTP
  • Remove secure flag from cookies
D. Match and Replace
       These settings are used to automatically replace parts of requests and responses passing through the Proxy. For each HTTP message, the enabled match and replace rules are executed in turn, and any applicable replacements are made.
 Rules can be defined separately for requests and responses, for message headers and bodies, and also specifically for the first line only of requests. Each rule can specify a literal string or regex pattern to match, and a string to replace it with.
 For message headers, if the match condition matches the entire header and the replacement string is left blank, then the header is deleted. If a blank matching expression is specified, then the replacement string will be added as a new header.
 There are various default rules available to assist with common tasks - these are disabled by default.


E. Miscellaneous
      These settings control some specific details of Burp Proxy's behavior. The following options are available:
  • Use HTTP/1.0 in requests to server - This option controls whether Burp Proxy enforces HTTP version 1.0 in requests to destination servers. The default setting is to use whichever version of HTTP is used by the browser. However, some legacy servers or applications may require version 1.0 in order to function correctly.
  • Use HTTP/1.0 in responses to client - All current browsers support both version 1.0 and 1.1 of HTTP. Since version 1.0 has a reduced feature set, forcing use of version 1.0 can sometimes be useful to control aspects of browsers' behavior, such as preventing attempts to perform HTTP pipelining.
  • Set response header "Connection: close" - This option may also be useful to prevent HTTP pipelining in some situations.
  • Unpack gzip / deflate in requests - Some applications (often those using custom client components), compress the message body in requests. This option controls whether Burp Proxy automatically unpacks compressed request bodies. Note that some applications may break if they expect a compressed body and the compression has been removed by Burp.
  • Unpack gzip / deflate in responses - Most browsers accept gzip- and deflate-compressed content in responses. This option controls whether Burp Proxy automatically unpacks compressed response bodies. Note that you can often prevent servers from attempting to compress responses by removing the Accept-Encoding header from requests (possibly using Burp Proxy's match and replace feature).
  • Disable web interface at http://burp - This option may be useful if you are forced to configure your listener to accept connections on an unprotected interface, and wish to prevent others gaining access to Burp's in-browser controls.
  • Suppress Burp error messages - When certain errors occur, by default Burp returns meaningful error messages to the browser. If you wish to run Burp in stealth mode, to perform man-in-the-middle attacks against a victim user, then it may be useful to suppress these error messages to disguise the fact that Burp is involved.
  • Disable logging to history and site map - This option prevents Burp from logging any requests to the Proxy history or the target site map. It may be useful if you are using Burp Proxy for some specific purpose, such as authenticating to upstream servers or performing match-and-replace operations, and you want to avoid incurring the memory and storage overhead that logging entails.
  • Enable interception at startup - This option lets you configure whether Proxy interception should be enabled when Burp is started up. You can choose to always enable interception, always disable interception, or to restore the setting from when Burp was last closed.
(Click image for large view)

Like it ? Share it.

Sunday, June 8, 2014

Apps To Track Lost / Stolen Android Devices

If you have forget your android while travelling or someone stolen your android mobile phone you do not need to worry if you have one of these application installed in your device. You can track your mobile phone with the apps term and condition. I like to advice within purchasing your Android mobile install these awesome apps for protecting your device.

Where’s My Droid
Where’s My Droid is a pure Find my Phone app to help you locate your phone. When your smartphone goes missing, sending a code via text will make the phone ring (even when set in silent mode) while another text code sends you the GPS coordinates of the phone. Alternatively, you can remotely control your phone by connecting it to the Commander option, a web-based interface. Where’s My Droid also offers a Pro version which lets you take pictures with the camera (you might be able to take a snapshot of the perpetrator), remote lock the phone rendering it impenetrable or remote wipe the app to save your data from misuse.

Plan B
If you had not install any tracking app before your Android device was stolen or misplaced, Plan B will be a lifesaver. Plan B is an Android app from Lookout Labs which locates your smartphone using cell towers and GPS, then sends the location of your smartphone to your Gmail Inbox. In some smartphones, Plan B can enable the GPS on the phone then update you with its location every 10 minutes. For phones with no such support, you can text ‘location’ from another phone, and details of the missing phone’s location will be sent to your email. In the absence of a data connection, the software will send its location via SMS instead.



Lookout Security Anti-Theft
Lookout Security & Antivirus gives Android users peace of mind keeping phones and tablets safe and secure. By going to lookout.com, users can find their lost device on a Google Map, have their device make a loud noise even if it’s on silent, or if their battery dies, users can see the last location where they had their device. If someone tries to steal or unlock your device, you’ll receive an email with the picture and location info of the person who tries to steal it. Lookout Security & Antivirus will protect all your personal data so know one sees it.

Seek Droid
Seek Droid is an app that lets users find their Android phone or tablet. Users can locate their phone using GPS and find the accurate location, and it will be placed on Google Maps. Other features include being able to lock the phone, wipe, it, or wipe the SD.

Android Lost Free
This app is not only perfect for finding your lost phone, it will also torment the thief (something which we’re sure they fully deserve). You can activate (via SMS or the Web) the alarm to ring with a flashing screen, enable and disable the GPS, data and Wi-Fi connection, remote wipe the SD card, and get their latest call list.Once the SIM card is changed, you will be informed via email. This app can be used even after you have lost your smartphone due to its remote install feature and is hidden from the launcher to prevent uninstallation.

Prey Anti-Theft
Prey is an anti-theft app developed by Fork Ltd. Prey lets users track and locate a lost or stolen Android phone. Users will receive detailed reports on who has their device and where they can find it. Lock your device and trigger the alarm even if your phone is on silent.

Bitdefender Anti-Theft
Bitdefender is an anti-theft app developed by Bitdefender. Bitdefender Mobile security blocks the latest malware, spyware, Trojans, and other threats. Misplaced or stolen phone? Send SMS commands, lock, geo-locate, sound an alarm, and wipe your Android device from any internet connection.

McAfee Antivirus & Security
It comes as a 7-day free trial but to keep it on your phone, it’s a $30/year subscription. For that sum, you get the regular anti-theft protection, antivirus protection, plus data backup and restore functions.

AVG AntiVirus
It can locate your lost or stolen phone via Google Maps and lock your device to protect your privacy via a text message. If your phone or tablet is stolen or missing, you can also set a lock screen message to help the locator find you and make your device ring even when it’s on silent mode.

Like it ? Share it.

Monday, June 2, 2014

Introduction Burp Suite Part I (Burp Suite Target Tab)


Topic - In this Article we will learn Burp Suite's Target Tab. You will see how Target Tab is most important part of burp suite.
Requirement:
B. Firefox or iceweasel
C. Burp Suite (We are using Free Version)



1. Each time whenever you need to perform Mutillidae in your system, you have to run mysql and apache server.
Open Terminal
    a. Type service mysql start and Press Enter
    b. Type service apache2 start and Press Enter
Both servers have been started. Now, you can open mutillidae without any issue.
Before opening Mutillidae Lets start Burp Suite. In Terminal type burpsuite.jar and Press Enter.
 (Click image for large view)


2. Your burp suite has been started. First of all turn off intercept. We will discuss about it later because in this article we will discuss only about Target Tab.

3. Open your Internet Browser and browse your Mutillidae as per your setup. If you have installed and configured Mutillidae according to my article then type 127.0.0.1/mutillidae in the browser web address and search it. Soon you will get your Mutillidae screen.

4. Target tab contains detailed information about your target applications, and lets you drive the process of testing for vulnerabilities.
Site Map Sub-tab
    A. The site map contains all of the URLs you have visited in your browser, and also all of the content that Burp has inferred from responses to your requests. Items that have been requested are shown in black, and other items are shown in gray. You can expand branches in the tree, select individual items, and view the full requests and responses. The tree view contains a hierarchical representation of content, with URLs broken down into domains, directories, files, and parameterized requests. You can expand interesting branches to see further detail. If you select one or more parts of the tree, all the selected items and items in child branches are shown in the table view.
      B. The table view shows key details about each item (URL, HTTP status code, page title, etc.).
      C. Request and Response Pane

5. If you select an item in the table, the request and response for that item are shown in the request/response pane.
Request Tab
      Raw – You can see host, user agent, server and cookies etc.

6. Request Tab
      Params – As you can see it shows cookies.

7. Request Tab
      Headers – Its look like raw details but in well organized. This shows headers details.

8. Request Tab
      Hex – It shows details like host user etc in hex code.

9. Response Tab
      Raw – This is what server responding, Raw sub-tab shows server details etc. If you will scroll down you will notice HTML codes are there but leave it for now because there are HTML sub-tab has given separately.

10. Response Tab
      Headers – Organized details of respond server.

11. Response Tab
      Hex – Details in Hex.

12. Response Tab
      HTML – In this section we can see respond html codes.

13. Response Tab
      Render – Render shows the actually view of the site how it looks like exactly.

14. Scope Sub-tab - The scope configuration tells Burp the items that you are currently interested in and willing to attack. The scope definition uses two lists of URL-matching rules - an "include" list and an "exclude" list. When Burp evaluates a URL to decide if it is within the target scope, it will be deemed to be in scope if the URL matches at least one "include" rule and does not match any "exclude" rules. This enables you to define specific hosts and directories as being generally within scope, and yet exclude from that scope specific subdirectories or files (such as logout or administrative functions). You can add or edit rules on the "include" and "exclude" lists using the URL-matching rule editor.
Each URL-matching rule can specify various features of the URLs that will be matched. For a URL to match the rule, it must match all of the features that are specified by the rule. The following items can be configured:
Protocol - This specifies the protocol(s) that the rule will match. Available options are: HTTP, HTTPS, or any.
Host or IP range - This specifies the host(s) that the rule will match. You can enter a regular expression to match the hostname, or an IP range in various standard formats, for example 10.1.1.1/24 or 10.1.1-20.1-127. If the host field is left blank, then the rule can match URLs containing any host.
Port - This specifies the port(s) that the rule will match. You can enter a regular expression to match one or more port numbers. If the port field is left blank, then the rule can match URLs containing any port.
File - This specifies the file portion of the URL that the rule will match (ignoring any query string). You can enter a regular expression to match the required range of URL files. If the file field is left blank, then the rule can match URLs containing any file.
However, in most cases, by far the easiest way to define your target scope is via the site map. As you map out the target application via Burp Proxy, the application's content will appear in the site map. You can then select one or more hosts and folders, and use the context menu to include or exclude these from the scope. This process is extremely easy and in most situations will let you quickly define all of the rules necessary for your testing.

15. Context Menu - Displaying all of the information gathered about your target, the site map enables you to control and initiate specific attacks against the target, using the context menus that appear everywhere. The exact options that are available depend on the location where the context menu was invoked, and the type of item selected. The complete list of context menu actions is as follows:
Add to / remove from scope - These options create new target scope rules which add or remove the selected item from scope. The rule generated will apply to the selected item and all child branches in the tree. A common technique when testing an application that includes some sensitive URLs is to add the whole application path (domain or directory) to the target scope, and then select the sensitive items and exclude them from scope.
Spider this host- You can select a host or folder within the tree view, and perform actions on the entire branch of the tree, such as spidering.
Actively scan this host- [Pro version] Actively scan takes an individual request to the application, called the "base request", and modifies it in various ways designed to trigger behavior that indicates the presence of various vulnerabilities. These modified requests are sent to the application, and the resulting responses are analyzed. In many cases, further requests will be sent, based on the results of the initial probes. You should use this scanning mode with caution, only with the explicit permission of the application owner, and having warned them of the possible effects that automated scanning may have on the application and its data.
Passively scan this host- [Pro version] Passively scanning doesn't send any new requests to the application - it merely analyzes the contents of existing requests and responses, and deduces vulnerabilities from those. This mode of operation can be used safely and legally in any situation in which you are authorized to access the application.
Engagement tools- [Pro version] This submenu contains various useful functions for carrying out engagement-related tasks:
      Search - [Pro version] You can use the Search function to search the selected branches of the site map for items matching a specific expression.
     Find comments / scripts - [Pro version] You can use the Find comments / scripts functions to search the selected branches of the site map for comments and scripts.
     Find references - [Pro version] You can use the Find references function to search all of Burp's tools for HTTP responses that link to the selected item.
     Analyze target - [Pro version] You can use the Target Analyzer function to analyze the selected branches of the site map and tell you how many static and dynamic URLs it contains, and how many parameters each URL takes.
    Discover content - [Pro version] You can use the Discover content function to discover content and functionality that is not linked from visible content which you can browse to or spider.
    Schedule task - [Pro version] You can use the Schedule task function to create tasks that will run automatically at defined times and intervals.
    Simulate manual testing - [Pro version] The Manual testing simulator can be used to generate HTTP traffic that is similar to that caused by manual penetration testin
Compare site maps- You can use the Compare site maps function to identify differences between two site maps. This is a powerful feature that can be used for various purposes, in particular testing for access control vulnerabilities.
Expand / collapse branch / requested items - You can use these functions in the tree view to quickly expand whole branches of the tree, and collapse them after you have reviewed them.
Delete host- This function removes the selected item permanently. Since by default the site map displays all content that Burp has identified based on HTTP responses, the map will often include a large amount of third-party content that is linked to from the application you are interested in. You can deal with this either by configuring a suitable target scope and a display filter, or by manually removing irrelevant branches of the tree.
Copy URLs in the host- This function copies the URLs of the selected item to the clipboard.
Copy links in the host- This function parses the selected item for links, and copies these to the clipboard.
Save selected items- This function lets you specify a file to save the details of selected item in XML format, including full requests and responses, and all relevant metadata such as response length, HTTP status code and MIME type.

16. Display filter - The site map has a display filter that can be used to hide some of its content from view, to make it easier to analyze and work on the content you are interested in.
Request type- You can show only in-scope items, only requested items, only requests with parameters, or you can hide not-found items.
MIME type - You can configure whether to show or hide responses containing various different MIME types, such as HTML, CSS, or images.
Status code- You can configure whether to show or hide responses with various HTTP status codes.
Folders - You can optionally hide empty folders in the tree view. This is useful to remove folders whose child items have all been hidden by other display filter attributes.
Search term- [Pro version] You can filter on whether or not responses contain a specified search term. You can configure whether the search term is a literal string or a regular expression, and whether it is case sensitive. If you select the "Negative search" option, then only items not matching the search term will be shown.
File extension- You can configure whether to show or hide items with specified file extensions.
Annotation - You can configure whether to show only items with user-supplied comments or highlights.
 Note: - If you set a filter to hide some items, these are not deleted, only hidden, and will reappear if you unset the relevant filter.
  (Click image for large view)
Like it ? Share it.

Saturday, May 31, 2014

Tata Docomo 100 MB 3G Free

TATA Docomo offers free 100MB data to test superb and seamless connectivity. This is official offer by Tata Docomo. If you have 3G in your circle you will be experience 3G speed but if you do not have 3G then it will also work for 2G but you will not get 3G speed.


How to Activate -

1. Open Docomo reload official page - CLICK HERE

2. Enter your 10 Digit Mobile Number.

3. Click on Reload Now

4. You will receive a activation sms on your number. Enjoy this....

Terms & Conditions
  • The Reload data benefits are free of cost.
  • On successful activation of the pack, 100MB benefit will be passed into pool account with 5 days validity.
  • The benefit will get added to existing data benefit of the customer and Validity as per last date of Data bucket.
  • This pack can be availed by customer once only. If trying to send keyword again to get the pack free, the request will get rejected.
  • All the above packs will be available to Tata DOCOMO subscribers on Tata DOCOMO Home and Tata DOCOMO roaming network only.
  • Pack benefits are not applicable for browsing www.vuclip.com and standard data charges of 10p/10KB will be applicable.
  • The above mentioned packs are applicable on all APN’s except Dongle.
  • For internet settings, SMS INTERNET to 52270 and save received settings as default settings on your mobile.
  • Any unutilized Data usage will lapse at the end of the offer validity period.
  • Data is chargeable during International Roaming as some Smart phones/device get connected to Data Network automatically. If a particular application is ON, the application can trigger data connection automatically and hence be chargeable.
  • Data pack pool benefits will be applicable on Dive in browsing also.
  • Using your Device as a modem for a personal computer or other piece of electronic equipment (tethering) is not permitted.
  • It is a limited period offer.




Note - If you are visiting geekyshows through mobile and you do not have computer or lappy. or if you are unable to visit docomo reload page. you can leave your number at comment box we will active this offer on your mobile number. 

Like it ? Share it.

Key Match: Docomo Free 3G, Docomo Free 2G, Docomo reload offer, Docomo Free Internet

Thursday, May 22, 2014

Airtel Night Store Offers Unlimited Plan and Data Pack



Airtel has launched Night Store for its prepaid customers. The Night Store includes various unlimited voice and data night packs between the price ranges of Rs. 7 to Rs. 49. All the packs in the Airtel Night Store are valid between 12 midnight and 6AM.

Rs. 7 - Unlimited Local Airtel to Airtel Calls
Rs. 8 - Unlimited 2G internet
Rs. 15 - Unlimited Local A2A Calls + Unlimited 2G
Rs. 29 - 500 MB 3G Data
Rs. 49 - 1GB 3G Data
Rs. 1  - Unlimited Facebook Access (3G Speed upto 250 MB and throttling post that)

How to Activate Plan -
1. Open Airtel Official Website Click Here then Choose Your Circle and Click on Select your Night Pack.

2. Choose your plan from the Plan List and Click on Active.

3. Write Your Mobile Number and Email ID then Click on Proceed

4. Click on Confirm

5. Wait a second you will get a One Time Password (OTP) on your mobile number. Write your OTP and check Term & Condition box then Click on Submit
*Amount of the pack will be deduct from main balance. It means you have to maintain sufficient balance in your mobile number for recharging Airtel Night Store.

You can also activate these packs through USSD or IVR 
USSD for activating Airtel Night Store Plans  -  *129#
IVR for activating Airtel Night Store Plans     -     129 

*****************Terms and Conditions****************

All Packs
  • Pack applicable between 12 AM to 6 AM valid for 1 night only. If pack is bought between 12 AM to 6 AM, benefits applicable for same night till 6 AM
  • Pack applicable for Airtel Prepaid customers only
  • Packs can be bought anytime during the day (24 hours) but can be consumed only between 12AM to 6AM
Rs 7 Local A2A Unlimited
  • Free local A2A calls applicable for Home circle only. Benefits do not apply while roaming.
  • Multiple recharges of this pack on same day are not allowed.
Rs 8 2G Unlimited
  • Mobile internet at 2G speeds between 12AM to 6 AM even if customer has any other 3G normal pack
  • 3G night store pack, 29/49, will take priority over 2G unlimited circles- (Only in 3G circles)
  • Multiple recharges of this pack on same day are not allowed.
Rs 9 Local A2A Unlimited + 2G Unlimited
  • Free local A2A calls applicable for Home circle only. Benefits do not apply while roaming.
  • Multiple recharges of this pack on same day are not allowed.
Rs 15 Local A2A Unlimited + 2G Unlimited
  • Free local A2A calls applicable for Home circle only. Benefits do not apply while roaming.
  • 3G night store pack, 29/49, will take priority over 2G unlimited circles- (Only in 3G circles)
  • Multiple recharges of this pack on same day are not allowed.
Rs 29/49 3G packs
  • None
Facebook Unlimited  Rs 1 – 2G Circles
  • Free benefit only for Facebook browsing. Any additional 3rd party content/videos etc. which redirect a customer to another 3rd party site will be chargeable
  • After 250MB Facebook data browsing speed 40kbps for all mobile internet usage till 6 AM.
  • Pack not applicable if customer has any other active Unlimited data pack
  • Pack will be available only post activating the Facebook pack on Night store and will not be given to all by default
  • Multiple recharges of this pack on same day are not allowed.
  • Facebook pack not applicable if customer already has an active unlimited 2G or 3G pack
Facebook Unlimited  Re 1 – 3G Circles
  • Free benefit only for Facebook browsing. Any additional 3rd party content/videos etc. which redirect a customer to another 3rd party site will be chargeable
  • After 250MB Facebook data browsing speed 40kbps for all mobile internet usage till 6 AM.
  • Till 250MB facebook data usage, 3G speed applicable for all other mobile internet usage
  • Pack not applicable if customer has any other active Unlimited data pack
  • Pack will be available only post activating the Facebook pack on Night store and will not be given to all by default
  • Multiple recharges of this pack on same day are not allowed.
  • Facebook pack not applicable if customer already has an active unlimited 2G or 3G pack

Like it ? Share it.
Key Match : Airtel Unlimited 2G, Airtel 3G Pack, Airtel Unlimited calls, Airtel Unlimited Facebook