Saturday, February 09, 2013

6:50:00 pm Posted by Unknown No comments Posted in
Posted by Unknown on 6:50:00 pm with No comments | Categories:

Hi, readers do you ever wondered to know how hackers hack a network or server.

Today I eagerly want to tell you the procedure of hacking a network don't panic or get excited and this post may change your career into would be hacker.
Now listen carefully, the main thing that you should have is patience because things get hard while hacking,sometimes you are forced to give up.
so,my advice is "Don't enter into the world of hacking without having patience and eager to get skills" and many of you will be searching for shortcuts to become hacker very quickly if you do so you are not a eligible person to become hacker.

There are no shortcuts to become a hacker

Now,let's start hacking.

First you must have the ip address of the target network.
you can get it by following the simple steps on SPY PIG (if your target is a computer).

If you get the Ip address of target computer then you have to ping it by using command.

1.Ping:

The ip address give the target's internet address.the numerical address like 198.192.168.72 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS:The domain name service(DNS) protocol reveals the matching domain name.Ping stands for "Packet Internet Groper".

Make sure you are logged on to the net.Open the COMMAND shell and enter the following PING commmand:
Eg: Ping 192.168.010.001

ping will search the domain name and reveal it.
Pinging is normally the first step involved in hacking the target.


2.Port scanning:

After you have determined that your target system is alive the next important step would be to perform a port scan on the target system using IP address.

There are a wide range of port scanners available for free but many of them uses outdated techinques for port scanning which could be easily recognized by the network administrator personally I like to use Nmap you can download it from Here.
which has a wide range of options,you can download the Nmap win and its source code from Here.


Apart from port scanning Nmap is capable of identifying the operating system being used by the target computer,version numbers of various services running,firewalls being used and a lot more.

Common ports:

Below is a list of some common ports and the respective services running on the ports.
20-FTP DATA(File Transfer Protocol)
21-FTP(File Transfer Protocol)
22-SSH
23-TELNET
25-SMTP(Simple Mail Transfer Protocol)
53-DNS(Domain Name Service)
68-DHCP(Dynamic Host COnfiguration Protocol)
78-FINGER
80-HTTP(Hyper Text Transfer Protocol)
110-POP3(Post Office Protocol,version 3)
137-NETBIOS-ns
138-NETBIOS-dgm
139-NETBIOS
143-IMAP(Internet Message Access Protocol)
161-SNMP(Simple Network Management Protocol)
194-IRC(Internet Relay Chat)
220-IMAP3(Internet Message Access Protocol 3)
389-LDAP
443-SSL(Secure Socket Layer)
445-SMB(Net Bios over TCP)

Besides the above ports there are even some ports known as TROJAN ports used by trojans that allow remote access to that system.

Using these things hackers get into your system remotely.
Also visit my other post which tell about protecting your computer from this type of hacking....

Take time to like,comment and share.
Feel free to ask questions i'm glad to here from you..



0 comments :

Post a Comment

Don't hesitate to comment, please provide suggestions and feedback

Recent in Sports

Search