Network Hacking



The go IP address wht gives the attacker’s thats Internet address when. The numerical address like 212.214.172.81 hello does not reveal what much. You can use too PING to convert the address guddiya into a domain takha name in WINDOWS: The thfn Domain Name Service (DNS) hasse protocol revealssddsss the matchifffng domain name. PING stanjgids for “Padcket Interdnet Grogper” and is delivhrered with prakhijctically every Inbdternet compnjfatible system, incluhefjseding all current Winfsndows versions.
Make susafre you are losafgged on to the safafnet. Open the DOS sfshell and eawfnter the following PING command:asf
Ping –a 123.123.12.1
Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:
dialup21982.gateway123.provider.com
Pinging is normally the first step involved in hacking the target. Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP Echo reply packets.
All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.
Click Start and then click Run. Now type ping <ip address or hostname>
This means that the attacker logged on using “provider.com”.
Unfortunately, there are several IP addresses that cannot be converted into domain names.
For more parameter that could be used with the ping command,
go to DOS prompt and type ping /?.

Ping Sweep
If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping ethical hacking sweep also uses ICMP to scan for live systems in the specified range of IP addresses. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap (www.insecure.org) also contains an option to perform ping sweeps.
Tracert:
Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.
Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination.
To perform a tracert follow the procedure below.
Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. Both the IP address as well as the domain name (if available) is displayed.
If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.
Go to DOS prompt and type tracert <destination address>
(For example: tracert yahoo.com).
But there are some tools available like Visual Traceroute which help you even to find the geographical location of the routers involved.

Port Scanning:-
After you have determined that your target system is alive the next important step would be to perform a port scan on the target system.
There are a wide range of port scanners available for free. But many of them uses outdated techniques for port scanning which could be easily recognized by the network administrator. Personally I like to use Nmap (http://www.insecure.org) which has a wide range of options.
You can download the NmapWin and its source code from: http://www.sourceforge.net/projects/nmapwin.
source = https://hackersonlineclub.com/network-hacking/
read more = what is ethical hacking
other link = lenovo
                   hackers growth , how to tips

Comments

Popular posts from this blog

Profile link submission list 2018

little bit information about game

what is seo