bolsas femininas

Friday, January 13, 2012

Network Hacking

Network Hacking

        Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS FingerprintingPort Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping http://www.google.com
[Image: 
ping.gif]

Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n
[Image: 
netstat.gif]

Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet http://www.hostname.com port

example:- c:/>telnet http://www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert http://www.hostname.com
example:- c:/>tracert http://www.insecure.in
[Image: 
tracert.gif]

Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

By Blog Admin with No comments

0 comments:

Post a Comment

This is Dofollow Blog.
Don't Spam us. Your comment should be relevant to contents(don't say simply thanks or very useful information, i'll consider this as spam).

    • Popular
    • Categories
    • Archives

     
    Blogger Wordpress Gadgets Twitter Bird Gadget