tag:blogger.com,1999:blog-33555655681632626392024-03-14T11:50:11.451-07:00Networking Tricks And TipsAarifhttp://www.blogger.com/profile/11737881529277276041noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-3355565568163262639.post-55647734035066976372010-06-23T14:20:00.000-07:002015-07-09T03:56:14.164-07:00Basic Networking and Hacking Commands<div dir="ltr" style="text-align: left;" trbidi="on">
<script type="text/javascript"><!--
google_ad_client = "ca-pub-8916749042172554";
/* My AddList */
google_ad_slot = "3100195329";
google_ad_width = 728;
google_ad_height = 90;
//</script>
</div>
-->
<script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script>
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
Here I am going to tell some useful basics Commands for a Networking on a "Command Prompt"(CMD).<br />
In case you don’t know how to get CMD open , then click on Start, then Run, then type “cmd" without quotes.<br />
<br />
Lets start with some simple commands<br />
<br />
<b>1) </b><b>ping : </b> It sends a message to a computer anywhere on the network/internet, and if the computer is connected you will get a response. If the computer is not connected to the network/internet you wont get a response. <br />
<br />
<b>Examples</b><br />
<b>ping 192.168.1.4</b> (192.168.1.4 is the IP address is you want to check whether it is connected or not )<br />
or<br />
<b>ping www.myworld.com </b><br />
(www.myworld.com is the website you want to ping, if you don’t know the IP).<br />
<br />
There are many ption with this commands <br />
<b>ping /? </b>this help command give more option with description<br />
<b>2) nslookup :</b> This command have different functionalities. The name <i>nslookup</i> means "name server lookup".<br />
This is used find Domain Name System<span style="color: #eeeeee;"> </span>(DNS) details, including IP addresses of a particular computer, MX records for a domain and the NS servers of a domain.<br />
<b>Examples </b><br />
<b>nslookup www.google.com </b><br />
<br />
Server: mumns4.mtnl.net.in (This is your nearest DNS server of your service provider with IP address) <br />
Address: 59.185.3.12<br />
<br />
Non-authoritative answer:<br />
Name: google.com (This is a DNS server name of website you want to know)<br />
Address: 209.85.153.104<br />
<br />
Another function of nslookup is to find out mail server and its IP address<br />
Now MX records(<b>M</b>ail e<b>X</b>change record) is an entry in a DNS database that points to the mail server for that domain.In a small company, the MX record typically directs all e-mail to the same domain. However, a company may handle e-mail using a different domain name,in this case the MX record is configured route to the mail server.<br />
<br />
<b>nslookup (enter)<br />
set type=mx (enter)<br />
yahoo.com </b>(This command will give you the mail servers IP address of yahoo.com.)<br />
<br />
<b>3) tracert : </b><tt class="COMMAND">The tracert</tt> displays each host that a packet travels through as it tries to reach its destination.<br />
each host is considered as hop you can see how many “hops” from the website you are way with this command:<br />
<b>Example </b><br />
<b>tracert 209.85.153.104</b><br />
or<br />
<b>tracert google.com</b><br />
<br />
<br />
<br />
<b>4)arp :</b> This command display and modifies the IP to Physical Address translation table used by "Address Resolution Protocol".<br />
<b>A</b>ddress <b>R</b>esolution <b>P</b>rotocol protocol used to obtain a node's physical address. Suppose a node (source) wants to communicate with target node. Source sends arp request with target IP address target responds by sending its physical address.<br />
<b>Examples</b><br />
arp -a (Displays current ARP entries table.)<br />
<br />
There are many option with this commands <br />
<b>arp /?</b> this help command give more option with description.<br />
<b><br />
</b><br />
<b>5)netstat (</b><b>network </b><b>statistics):</b> is used displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics.<br />
<b>Examples</b> <br />
netstat -a (Displays <b>a</b>ll active TCP connections and the TCP and UDP ports on which the computer is <br />
listening).<br />
<br />
There are many option with this commands <br />
<b>netstat /?</b> this help command give more option with description.<br />
<br />
<b>6) ipconfig :</b><code></code><i>(internet protocol <b>config</b>uration</i>) displays all current TCP/IP network configuration values like IP address ,subnet mask,gateway etc.<br />
<b>Examples </b><br />
<b>ipconfig </b>(display only the IP address, subnet mask and default gateway).<br />
<b>ipconfig /all </b>(Display full configuration information including DHCP ,DNS address ,physical address etc.<br />
<b>ipconfig /release</b> (this will release your IP) <br />
<b>ipconfig /renew</b> (this will renew your iP)<br />
<br />
<b></b><br />
There are many option with this commands<br />
<b>ipconfig /? </b> this help command give more option with description.<br />
<br />
<b>7) nbtstat : </b>This command will show you the netbios name of the target.<br />
nbtstat is use to troubleshoot NetBIOS name resolution problems. When a network is functioning normally, NetBIOS over TCP/IP (NetBT) resolves NetBIOS names to IP addresses. The <b>nbtstat</b> command removes and corrects preloaded entries.<br />
<b>Examples</b><br />
<b> nbtstat -a computername </b>(displays local NetBIOS name table for that computer as well as the MAC<br />
address of the adapter card).<br />
<b>nbtstat -A < <i>IP address</i> > </b> (command performs the same function using a target IP address rather than a<br />
name).<br />
<b> </b><b>nbtstat </b> <b> <i>-</i> </b> <b> c</b> (option shows the contents of the NetBIOS name cache, which contains NetBIOS name-to-IP<br />
address mappings). <br />
<b>nbtstat -n</b> (displays the names that have been registered locally on the system by NetBIOS applications<br />
such as the server and redirector).<br />
There are many option with this commands<br />
<b>nbtstat</b><b> /? </b> this help command give more option with description.<br />
<br />
<br />
<b>8) net use :</b> <b>T</b>his command connects / disconnects the computer from a shared resources such as other computers, printers and drives, or allow to view the information about current computer connections. In addition, it provides other functionalities as well. Net use is used to display a list of network connection information on shared resources.<br />
If you will use <b>net use command</b> without any parameters, you will retrieves a list of network current connections.<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
There are many option with net use see the option in image.The with this bracket [ ] is optional. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<code></code> <br />
<a href="http://www.blogger.com/goog_233704083"></a><br />
<code></code><b>Examples </b><br />
<br />
<b>net use \\ IP address\IPC$ “” /user:administrator </b>(this command will allow you to connect to the target<br />
as administrator)<br />
<br />
Now if you want to connect to the target and browse the entire C drive, then use this command:<br />
<b>net use K: \computername\C$</b> (this will create a virtual drive on your “my computer” folder)<br />
<b> </b><br />
<b>Note :</b> Keep in mind that this will only works if the target doesn’t have an administrator password set.<br />
or you will have to provide administrator password within a command.<br />
<br />
To hack administrator password of any pc on LAN use <b>"Cain and Abeil"</b> tool (see video of my previous post ) <br />
<br />
<i> This command makes use of the <a class="ilnk" href="http://www.answers.com/topic/server-message-block-2" onclick="assignParam('navinfo','method|4'+getLinkTextForCookie(this));" target="_top">SMB</a> (server message block) and the <a class="ilnk" href="http://www.answers.com/topic/netbios" onclick="assignParam('navinfo','method|4'+getLinkTextForCookie(this));" target="_top">NetBios</a> protocol on port 139 or 445. By default, in the basic windows XP configuration, it is enabled. Thus, users can connect and disconnect from shared resources such as computers, printers and drives.</i><br />
<i><code></code></i> <br />
<i><sup class="reference" id="cite_ref-0"></sup></i><br />
<i>It also connects to the IPC$ (interprocess communication share). This is so called the null session connection, which allows unauthenticated users. The basic use for connecting anonymously is: net use \<b>\ IP address\IPC$ “” /u:””. </b>For example, if this is typed in the command prompt: net use <b>\\192.168.1.101\IPC$ "" /u:""</b>, you would be connecting to the share IPC$ of the network 192.168.1.101 as an anonymous user with blank password. If successfully connected to the target machine, a lot of information can be gathered such as shares, users, groups, registry keys and more. This would provide a hacker with a lot of information about a remote user.</i></div>
Aarifhttp://www.blogger.com/profile/11737881529277276041noreply@blogger.com16tag:blogger.com,1999:blog-3355565568163262639.post-33057323106566369962010-06-15T12:31:00.000-07:002015-07-09T03:58:26.478-07:00HACK any PC on a LAN<div dir="ltr" style="text-align: left;" trbidi="on">
<b>In this topic i am going to tell you how to hack a PC on a Local Area Network(LAN).</b><br />
<b>A LAN is a computer network covering a small physical area, like a home, office, or small groups of buildings, such as a school, or an airport. The whole process of inter connecting computers in such a small physical area is called as Local Networking.</b><br />
<b>In a Local Networks we can share files, folders, local web server or play game.</b><br />
<b>we can list all online user in LAN with help of command </b>"<i><b>net view</b></i>"<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<b><i style="font-weight: normal;"><b>"net view > pclist.txt"</b> </i> Command save list of alive computer name in a file called pclist.txt inside current directory.</b><br />
<b>But I will not recommend this method because</b> <b>if </b><b>any user </b><b>has chosen Private Network instead of Home Network or </b><b> have turned off Network Discovery then his PC name will not show in the Network<b>.</b></b><br />
<b><b>To discover number of online user in network simply use IP Scanner. There are many free IP scanner available on internet like </b>Angry IP Scanner,Advance IP Scanner etc.</b><br />
<b>you can get Advance IP Scanner from this link</b><br />
<b> <a href="http://www.radmin.com/products/utilities/ipscanner.php">http://www.radmin.com/products/utilities/ipscanner.php</a></b><br />
<br />
<b>Suppose "arif" is computer name we are using have an IP address 192.168.1.5.</b><br />
<b>suppose we scanned our Local Area Network, and after scanning our Network we found 10 hosts alive, We are not interested in all of the 10 hosts, rather we are interested in Hacking MANU's computer.</b><br />
<b>With the help of advance IP Scanner which resolves the PC name display the corresponding IP address, so after resolving host names of all computer we found a computer named "MANU" and has the IP address 192.168.0.20.</b><br />
<b>Packet Sniffing tools help you to hack MANU's computer.</b><br />
<b><i>Sniffing</i> is the method in which you spy all the network packets, and analyze the network traffics</b><b> </b><br />
<b>A packet sniffer, referred as a network monitor or network analyzer, can be used legitimately by a network or system administrator to monitor and troubleshoot network traffic.</b><br />
<b>But a sniffer can also be used illegitimately to capture data being transmitted on a network.</b><br />
<b>Hackers use these tools to steal data flown across the network, hackers can capture all the packets transmitted through the network, and analyze the contents. Sniffers can log the Email user-name and passwords, Cpanel Passwords, Bank passwords etc some famous sniffing tools are Cain and Abel, Ettercap, Wireshark, Ethereal etc, these softwares are availabe to download on internet, and all these are freeware. </b><br />
<b>just search from Google you will get many sniffing tools.To get <i>"cain and abel</i>" tool click on this link </b><a href="http://www.oxid.it/cain.html">http://www.oxid.it/cain.html</a><br />
<b>we not only hack MANU's PC but also monitor internet activity like which site she often visits etc. </b><br />
<b>with help of "<i>Cain and Abel</i>" from Oxid.it which has several good features like Sniffing, Arp poisoning, MITM, Hash Cracking(Dictionary + Rainbow Table) Windows NTLM password cracking etc. </b><br />
<b> </b><br />
<b>To understand features of <i>"cain and abel</i>" tool look at this video</b><br />
<a href="http://www.blogger.com/goog_1746330598"><b> </b></a><br />
<a href="http://www.youtube.com/watch?v=tMNPjMsjpfQ">http://www.youtube.com/watch?v=tMNPjMsjpfQ</a><br />
<br />
<b>we can monitore few sites which MANU's visits, and may be we can get user-name and password of some sites, but we will have a problem in Hacking MANU's Hot mail, Yahoo, Facebook etc, and that is because Cain and Abel does not sniff packets sent over Secure Sockets Layer(SSL).</b><br />
<br />
<b>We can still sniff SSL packets by using some other tools, the best tool i would recommend you is Ettercap</b>,<b> It is also available for Unix system.</b><b>To understand features of Ettercap watch this video <i>(size 317mb ) </i></b><br />
<a href="http://infinityexists.com/2008/08/03/episode-20-ettercap/">http://infinityexists.com/2008/08/03/episode-20-ettercap/</a><br />
<br />
if this Dose not work find open ports in MANU's PC, then Enumerate the Service, find vulnerable service, Exploiting Vulnerable service, Privilege escalation.see next post.</div>
Aarifhttp://www.blogger.com/profile/11737881529277276041noreply@blogger.com21tag:blogger.com,1999:blog-3355565568163262639.post-16048603222271322972010-05-17T01:57:00.001-07:002016-08-18T11:41:00.433-07:00Port in Computer<div dir="ltr" style="text-align: left;" trbidi="on">
<link href="file:///C:%5CDOCUME%7E1%5CRashid%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml" rel="File-List"></link><link href="file:///C:%5CDOCUME%7E1%5CRashid%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx" rel="themeData"></link><link href="file:///C:%5CDOCUME%7E1%5CRashid%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml" rel="colorSchemeMapping"></link> <m:smallfrac val="off"> <m:dispdef> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:narylim></m:intlim> </m:wrapindent><style>
<!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p {mso-style-priority:99; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman";} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt; mso-ascii-font-family:Calibri; mso-fareast-font-family:Calibri; mso-hansi-font-family:Calibri;} @page Section1 {size:8.5in 11.0in; margin:.5in .5in .5in .5in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} </style>
</m:defjc></m:rmargin></m:lmargin></m:dispdef></m:smallfrac><br />
--> <br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b><span style="font-size: 14pt; line-height: 115%;"> On computer and telecommunication devices</span></b>, <b>a <i>port</i> is generally a specific physical connection to some other devices, usually with a socket and plug of some kind. Typically, a personal computer is provided with one or more serial ports and one parallel port. The serial port supports sequential, one bit-at-a-time transmission to peripheral devices such as scanners and the parallel port supports multiple-bit-at-a-time transmission to devices such as printers.<o:p></o:p></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b><span style="font-size: 16pt; line-height: 115%;"><o:p> </o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b><span style="font-size: 16pt; line-height: 115%;"> In programming</span>, a port is a "logical connecting place" and specifically, the protocols of the Transport Layer of the Internet Protocol Suite(like TCP/UDP) uses a numerical identifier of the endpoints for host-to-host communications. Such an endpoint is known as a port and the identifier is the port number. <o:p></o:p></b></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: "; font-size: 11pt;">Higher-level applications that use TCP/IP such as the Web protocol, Hypertext Transfer Protocol, have ports with preassigned numbers. These are known as "well-known ports" that have been assigned by the Internet Assigned Numbers Authority (IANA). Other application processes are given port numbers dynamically for each connection. When a service (server program) initially is started, it is said to bind to its designated port number. As any client program wants to use that server, it also must request to bind to the designated port number.</span></b><span style="font-family: "; font-size: 11pt;"> <b>Port numbers are from 0 to 65535. <o:p></o:p></b></span></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: ";"><o:p> </o:p></span></b></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: ";">Ports 0 to 1024</span></b><b><span style="font-family: "; font-size: 11pt;"> are reserved for use by certain privileged services. For the HTTP service, port 80 is defined as a default and it does not have to be specified in the Uniform Resource Locator (URL).<o:p></o:p></span></b></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: ";"><o:p> </o:p></span></b></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: ";">Ports 1024 to 49151 </span></b><b><span style="font-family: "; font-size: 11pt;">are registered ports that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).<o:p></o:p></span></b></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: ";"><o:p> </o:p></span></b></div>
<div style="margin: 0in 0in 0.0001pt;">
<b><span style="font-family: ";">Ports 49151 to 65535 </span></b><b><span style="font-family: "; font-size: 11pt;">Besides the well-known port numbers and the registered port numbers, the remaining ports in the port number spectrum are referred to as </span></b><b><span style="font-family: ";">dynamic ports or private ports. <o:p></o:p></span></b></div>
<b><span style="font-family: ";">Before the arrival of ICANN, the port numbers were administered by the Internet Internet Assigned Numbers Authority (IANA). <o:p></o:p></span></b><br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b>Official: Port/application combination is registered with IANA .<o:p></o:p></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b>Unofficial: Port/application combination is not registered with IANA. <o:p></o:p></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b>Conflict Port: is in use for multiple applications.<o:p></o:p></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b><o:p> </o:p></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b>If you want to know the port number for a specific web service (program), look here:<o:p></o:p></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;">
<b>http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers<o:p></o:p></b></div>
</div>
Aarifhttp://www.blogger.com/profile/11737881529277276041noreply@blogger.com0tag:blogger.com,1999:blog-3355565568163262639.post-25410554042894454202010-03-14T22:44:00.000-07:002010-07-07T02:39:50.223-07:00The MAC Addressing And Spoofing The MAC address is "Media Access Control " address which is the unique identifier assigned to network interface cards(NICs) by the manufacturer for the purpose of identification. It may also known as an Ethernet Hardware Address, Adapter Address or Hardware Address.<br />
MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats: <br />
<blockquote>MM:MM:MM:SS:SS:SS<br />
<br />
MM-MM-MM-SS-SS-SS</blockquote><blockquote>The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body. The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer.</blockquote>In the example, <br />
<blockquote>00:A0:C9:29:B8:36</blockquote>The prefix 00A0C9 indicates the manufacturer is Intel Corporation.<br />
<br />
<b>MAC Spoofing</b> is a technique of changing an assigned Media Access Control (MAC) address of a networked device to a different one. The changing of the assigned MAC address may allow the bypassing of access control list on servers or routers either hiding a computer on a network or allowing it to impersonate another computer.<br />
<b>MAC</b> spoofing is the activity of altering the MAC address of network cards .<br />
In windows change of MAC address can be change by editing the registry or via "My Network Places" . To change the MAC address via Network Places<br />
go to properties of <b>"local Area Connection",</b> press <b>configure</b>.. button then go to <b>advance</b> tag<br />
In advance tag select <b>Local Administrative Address</b> ,<br />
select value<b> radio button</b> and insert any MAC address you want.<br />
To alter the MAC via the <b>registry</b>, open the Windows Registry Editor and change the appropriate values.<br />
The value " NetworkAddress" is located in a subkey under <b>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318</b>}.Aarifhttp://www.blogger.com/profile/11737881529277276041noreply@blogger.com1