Sunday 30 August 2009

Basics About Networking And Haking Part 2

What is a static and dynamic IP address? - Static means permanent set IP address - like a website will have a static IP address, it never changes. Dynamic means temporary IP address - dialing up to the Internet with a modem or most ADSL connections has dynamic IP's. Every time you logon to the Internet your ISP ( Internet Service Provider ) will issue you a new IP address.

I have sent someone a trojan but I cannot connect to their PC?
- Either they are running a firewall which blocks you from connecting to their PC, or they are connected to the internet through a router.



What do I do when someone is behind a router and I want to control their PC with a trojan?
- You will need to use a trojan which uses reverse connections - meaning you don't connect to the host, the host connects to you. Remember when someone is behind a router and your using some software to get hold of their IP address, you are actually getting their routers IP, not their actual PC's IP. The router will have the persons internet IP (WAN IP) and their PC will have a different IP - their LAN IP.


How do I check if my own PC is infected with a Trojan?
- Do a port scan on your PC and check which ports are open. If you find any open ports almost every port can be compromised with trojan, so you might be infected with a trojan. So see to that you don't open unnecessary ports on you system .


What is a router?
- A device which is used to route data on a network. A Router decides where certain traffic should be sent to.


What is a firewall?
- Its a software or hardware device which can block or permit certain ports or IP's or certain kinds of data.


What is a port and what can I do with it?
- Every program running on your PC which has some network function uses a specific port to send an receive data though. If you do a port scan you will see which ports are open on the host you scanned. Port 80 is normally a web server. Port 21 a FTP server ect ect.. Trojans also uses ports. If you find an open port (ports not reveled security reason), the host might be infected with a trojan, download the trojan and try connecting to the port.


How do I do a port scan?
- You need a program to do a port scan. Then all you do is add the ip you want to scan.


Why do you want to scan ports?
- If you scan a PC with a port scanner, it will show you which programs or services are running on the PC.
Common ports:
Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110


What is a exploit?
- It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there.I recommend you to use Linux based OS. I will discuss in my later posts about windows drawback.


How do I use a exploit?
- You first need to compile the exploit with a program like Bloodshed C++ compiler. Then you can start the exploit through command prompt and see if the system your trying to exploit is vulnerable to that specific exploit.


What is a exploit POC?
- POC stands for proof of concept and it the proof that a exploit works.


What is a DOS attack?
- It is when too much data is being sent to a host and it cannot handle all the data and disconnects from the Internet.We will see later in detail about the types of attacks which is common in this network world.


Ok we will end this post with this if you have any query please give me a shout in the query box to your right.
We will see more about security issues and other way to protect your system from hacker.

Source:governmentseurity

No comments:

Post a Comment

Conformio-Online Compliance Tool Multiple Vulnerabilities

# Exploit Title: Conformio-Online Compliance Tool Multiple Vulnerabilities. # Discovered Date: 16/11/2017 # Exploit Author: Ramikan # Websi...