Just follow the given steps:-
1) Goto the link below and find the IP Address of the website you want to gather information about. You may do this by writing its name in the Get IP box
http://www.selfseo.com/find_ip_address_of_a_website.php
(This step was optional just to tell you that it can be done this way also):-P
2)Goto run->type CMD
IN CMD type
ping Target _Website_Name . For Eg- ping google.com
or
ping target_website/computer_ip_address . For Eg:- 59.172.45.1
Now you will see several ping requests coming
Ping Google Server
We Are interested in seeing the TTL time which you can see at the end of each request in ping.
NOTE:-
1) If TTL
2) If TTL>64 but
3) TTL>128 Mac and others.
From the above screenshot, it is clear that the servers of google are linux based.
Note:- In some Cases you may not get ping replies ( Eg. you try it on your friend’s PC ). Now This can have two reasons, The server is down ie.. The machine is not connected to internet. Else the most common reason, The Firewall is protecting that PC and is not allowing your request to access that system.
Same thing may happen in case of some websites as well, Reason is same.
Caution:- If you are trying this on your friends machine then do not enter the local IP address like 192.168.1.1
Ask him to goto: http://whatismyip.com and check the IP address from there
Sunday, 21 August 2011
Tuesday, 16 August 2011
Becoming A Certified Hacker
1: Introduction to Ethical Hacking
Why Security?
The Security, functionality and ease of use Triangle
Can Hacking be Ethical?
Module 2: Footprinting
Defining Footprinting
Module 3: Scanning
Definition of Scanning.
Types of scanning
Module 4: Enumeration
What is Enumeration?
NetBios Null Sessions
Module 5: System Hacking
Administrator Password Guessing
Manual Password Cracking Algorithm
Automated Password Cracking
Module 6: Trojans and Backdoors
Effect on Business
What is a Trojan?
Module 7: Sniffers
Definition of sniffing
How a Sniffer works?
Module 8: Denial of Service
What is Denial of Service?
Goal of DoS(Denial of Service)
Module 9: Social Engineering
What is Social Engineering?
Art of Manipulation
Module 10: Session Hijacking
Understanding Session Hijacking
Spoofing vs Hijacking
How Web Servers Work?
Module 11: Hacking Web Servers
How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
Web Application Set-up
Web Application Hacking
Module 13: Web Based Password Cracking Techniques
Authentication- Definition
Authentication Mechanisms
HTTP Authentication
Module 14: SQL Injection
Attacking SQL Servers
SQL Server Resolution Service (SSRS)
Module 15: Hacking Wireless Networks
Introduction to Wireless Networking
Business and Wireless Attacks
Module 16: Virus
Virus Characteristics
Symptoms of 'virus-like' attack
Module 17: Physical Security
Security statistics
Physical Security breach incidents
Module 18: Linux Hacking
Why Linux?
Linux basics
Module 19: Evading Firewalls, IDS and Honeypots
Intrusion Detection Systems
Ways to Detect Intrusion
Module 20: Buffer Overflows
Significance of Buffer Overflow Vulnerability
Why are Programs/Applications Vulnerable?
Module 21: Cryptography
Public-key Cryptography
Working of Encryption
Module 22: Penetration Testing Course
Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Module 26: Advanced Reverse Engineering Techniques
Why Security?
The Security, functionality and ease of use Triangle
Can Hacking be Ethical?
Module 2: Footprinting
Defining Footprinting
Module 3: Scanning
Definition of Scanning.
Types of scanning
Module 4: Enumeration
What is Enumeration?
NetBios Null Sessions
Module 5: System Hacking
Administrator Password Guessing
Manual Password Cracking Algorithm
Automated Password Cracking
Module 6: Trojans and Backdoors
Effect on Business
What is a Trojan?
Module 7: Sniffers
Definition of sniffing
How a Sniffer works?
Module 8: Denial of Service
What is Denial of Service?
Goal of DoS(Denial of Service)
Module 9: Social Engineering
What is Social Engineering?
Art of Manipulation
Module 10: Session Hijacking
Understanding Session Hijacking
Spoofing vs Hijacking
How Web Servers Work?
Module 11: Hacking Web Servers
How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
Web Application Set-up
Web Application Hacking
Module 13: Web Based Password Cracking Techniques
Authentication- Definition
Authentication Mechanisms
HTTP Authentication
Module 14: SQL Injection
Attacking SQL Servers
SQL Server Resolution Service (SSRS)
Module 15: Hacking Wireless Networks
Introduction to Wireless Networking
Business and Wireless Attacks
Module 16: Virus
Virus Characteristics
Symptoms of 'virus-like' attack
Module 17: Physical Security
Security statistics
Physical Security breach incidents
Module 18: Linux Hacking
Why Linux?
Linux basics
Module 19: Evading Firewalls, IDS and Honeypots
Intrusion Detection Systems
Ways to Detect Intrusion
Module 20: Buffer Overflows
Significance of Buffer Overflow Vulnerability
Why are Programs/Applications Vulnerable?
Module 21: Cryptography
Public-key Cryptography
Working of Encryption
Module 22: Penetration Testing Course
Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Module 26: Advanced Reverse Engineering Techniques
Subscribe to:
Posts (Atom)
Search for Hacking security
Custom Search