Thursday 26 December 2013

Network Hacking



Ping

Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.

To ping a particular host the syntax is (at command prompt)--

c:/>ping hostname.com
example:- c:/>ping www.google.com
Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the
command prompt.

Netstat

It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote
address, port number, etc.
It's syntax is (at command prompt)--

c:/>netstat -n

Telnet

Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer
on particular port. When connected it grabs the daemon running on that port.
 The basic syntax of Telnet is (at command prompt)--

c:/>telnet hostname.com

By default telnet connects to port 23 of remote
computer.So, the complete syntax is

c:/>telnet www.hostname.com port
example:- c:/>telnet www.yahoo.com 21 or
c:/>telnet 192.168.0.5 21

Tracert

It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--

c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in
Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.
various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.
The information obtained by using tracert command can be further used to find out exact operating system running on target system.


Countermeasures

There are a few things you can do to stay secure from network hacking attempts.

1. Keep all your software up to date. There will always be
new vulnerabilities coming out, and your responsibility is
to patch them immediately after a patch comes out.

2. Implement a firewall. This will keep most of the bad
data out and good data in.

3. Install anti-virus software.

4. Scan your system with a vulnerability scanner. This
may reveal possible vulnerabilities in your system.

No comments:

Post a Comment