Posts

Ports

Port  Port scanning: in computing device a port is like a door which is used in data transmission and other services like charging, running a service-application etc. A port provides interface between two devices to send and receive information/data. Types of ports:-              # Physical ports: also known as hardware port and external ports: ex, usb, type-c, micro usb,                        rj45lan, HDMI, vga, SD card port thunderbolt, audio-3.O etc.              # Virtual ports: also known as pcp and udp ports internal ports, application port we have total                     65535 virtual ports in our computing devices. > total no. of ports  = 65535 > range = 0-65534 # top 1024 (0-1023) ports known as predefined virtual ports/ fixed virtual ports/ reserved virtual ports. #1024-65534 ...
  IP ADDRESS DETECTION    Yourself: From ISP Public IP.    From local router to access internet: Public and private    From Local router to access local network: Private IP        Linux: ifconfig         Router: ipr   NMap stands for network mapper. Used for network scanning.   USES: Ping Sweeping         Running service detection         Open ports          Check target connectivity by firewall bypassing         Mac address detection         DOS Attack   NMap Command commands: # Default scan: It will result the following                  Host Status <up/down>                 Target mac address detection                 Open ports           ...
Image
  NETWORK  A computer network is a group of two or more computer system linked together, collection of machine devices, computer, mobile, notes, servers, etc. * Lan: (Local area network) uses private/in a limited range (WIFI, Bluetooth). * Man: (Metropolitan area network) uses publics/city/state (limited area) network. Ex. cable tv operator,   broadband connection, landline connection. * Wan: (Wide area network) uses public, entire world, group of countries, internet access through   satellite. * Pan: (Personal Area Network)    It is a unique identification address in a network for each connected device. Types of IP address: (Uses, versions and allocation) * Allocation: Static is fix does not change. Dynamic is a continuous process. * Versions of IP address:    There are two versions of IP: i IPV4: Internet protocol version 4   Properties of IPV4:   Size- It is a 32 bit address.   No. of blocks: It consist of 4 blocks...
Image
  FOOTPRINTING =>  Footprinting is the first step of hacking. it is the process of collecting as much information as possible about the target. Attackers gathers publicly  available sensitive information using which he/she performs social engineering, network and system attacks.    Why perform Footprinting? =  Footprinting is about gathering info and formulating hacking strategy. As a hackers you may be able to uncover the path of least resistance on target expect to obtain information as follows:-     Information about target security posture and where potential loop holes may exist.    A database that points detailed picture with maximum amount of information possible about target.     
                                                        Ethical Hacking Ethical Hacking involves an authorised attempt to gain unauthorized access to a computer system application or data. Also known as White hats. Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply, it is the unauthorized access to control  over computer network security system for some illicit purpose. They can destroy, steal or eeven prevent authorised userd from accessing the system. There are main three thpes of hacker:  # White Hats: Also known as ethical hackers they are often employed or contracted by companies and government entities, working as security specialists               looking for vulnerabilities. # Black Hats: These hackers are normally responsible for creating malwares, w...