Академический Документы
Профессиональный Документы
Культура Документы
Follow
World Home
How-To
Inspiration
Forum
Networking
Foundations: Basic
IP Addressing (Part
2)
Creators
Msfvenom Android
Exploitation Outside
LAN?
fsec
20
yesterday
Follow
iStockOfficialSite
Popular Now
Everything You
Need to Disable in
Windows 10
FindTopGradeImages,Videos,&Audio.Get
UnbeatablePricesToday!
Introduction
Hello my future hackers, I am PYS3C and this is my first post on nullbyte.
Nullbyte has helped me comprehend some concepts of my interest and I
decided to make an account so I can talk about some topics I'm keen on and
inform you guys as well. To begin with, hacking is an art and in order to
master an art you have to build a solid foundation around it. One of the
most important hacking requirements , is how to navigate through a
network and what's better way than actually knowing how the networking
world works right? It's easy to copy and paste tool commands and perform
attacks etc but wouldn't it be more interesting if you knew why it's done
that way? One of the basic concepts you should grasp is IP Addresing. IP
Addressing rules the world, rules how everything communicates on the
internet, so this tutorial is gonna be a massive topic of those series. Without
further ado let's get right into it!
In this tutorial we will go through:
What is an IP Address
We will get to know our "digital neighborhood" (e.g what IP addresses are
around, who you can talk to without intervention)
How to find your friends on the network using a protocol called ARP
(Address Resolution Protocol).
In general, moving around the network is a massive concept that I want to
plant in your mind and I will try to explain it as simple as possible.
IP Address
Think of an IP Address as your digital house. Actually it works like that in the
real world. For instance, you have a house, you have an address for your
house (32 FR Street) and you tell people "Hey, if you want to visit my house
come to 32 FR Street and they say "ok great I'll see you there at 5 pm", and
that's how they reach you. Well, every single device that is connected to a
network also has an address, known as an IP Address. That's how it
communicates and that's how entities (people, machines, applications)
know how to reach it.
Related
Hacker Fundamentals: The
Everyman's Guide to How
Network Packets Are Routed
Across the Web
Hacker Fundamentals: A
Tale of Two Standards
Collection of Online
Collection of Online
Information Gathering Tools
There are some defined rules, for example we can't have an IP Address with
all 0s (e.g 0.0.0.0) or all 255s (255.255.255.255), but we will unfold the
restrictions as we go. For now let's just assume that those are all
possibilites.We can have an IP Address 10.1.25.9 or 14.5.23.80 and it would
work just fine. These are ip addresses that we could assign to our computer.
The rule is that every computer in the network has to have its own IP
Address. We don't share an address with our neighbor, right? Neither do
computers. Their IP has to be unique. These IP addresses are ALWAYS
combined with a subnet mask and usually, almost always a default gateway,
your router in that case.
WOW WOW subnet mask? Where did that come from? We are gonna talk
about subnet masks later on another tutorial. Shortly, the IP Address
defines your house or your location, so this is how people reach us on the
network and it's also the source that I come from when I try to talk to them.
For example how they know to get back to me when I try to communicate to
them. The subnet mask defines your neighborhood. Before we go any
further let's figure out what that means:
Newest
I've got the IP Address 192.168.1.67 and I combine that with the subnet
mask 255.255.255.0. Now these are all set up either by you or by the
network administrator (Internet Service Provider) by default. At a base level,
trust me we will get more advanced in this, this is all you need to know for
the best majority of the networks. Whenever you see 255, line that up to the
first 3 octets of the IP Address. For example:
Stagefright Exploit
Success?
DevilMind
explaining
Hacking for
Beginners!
Community
CAMERON GLASS commented
Those 3 pieces of the address, in other words, the first 3 octets (192.168.1)
represent my "neighborhood" or in technical words, my network. My
common ground that I communicate on. That 0 at the end of the subnet
mask represents who I am in that neighborhood/network, or technically
speaking, the number of hosts of that neighborhood. I know the subnetting
concept sounds confusing but bare with me, subnetting is all about binary.
Right now knowing how the subnet mask works isn't important.
on
on
Search
15
KUDOS
These are 2 key pieces of the puzzle and before we move on I want to make
sure you understand the idea behind it. So here is another example:
Worlds
on
Login | Signup
commented on
KUDOS
So let's say I'm a host (a computer) with the IP Address 10.10.10.99 and I'm
plugged into a switch and I have another computer that I want to talk to
who is 10.10.10.97 and let's assume they use the subnet mask
255.255.255.0. First of all, I don't know if you noticed but the first 3 octets of
both of the IP Addresses are the same. Which means that they are on the
same network, right? As we said before the first 3 octets represent the
network. So our network is 10.10.10.0. Wait what? The network has an IP?
Yes it does have an IP as well! You will never see(at least I haven't) a
computer with an IP ending with '.0 '. The '.0 ' is part of the network
representation, our network's IP. For example, if your computer has the IP
172.168.2.25 that means you belong to the 172.168.2.0 network. Remember
when I said that an IP Address is four octets, each one with a value from 0 to
255? Well , the 0 and 255 aren't usable because 0 represents the network
and 255 represents the broadcast IP Address. What is broadcast IP Address?
Patience is a virtue. Let's focus on the main goal for now which is to
understand how IP address contributes to the communication between
computers.
Let's go back to our example after that small explanation break we had. I go
on to the 10.10.10.99 computer and I generate a Ping. What is a Ping? Ping
stands for Packer Internet Groper. The goal of the ping is to test network
connectivity by sending a message via a packet(computers communicate via
packets, packets include information about the computer who made the
request and the target computer) to whoever we specify and then when the
other side receives it, it sends it back. Ping is your #1 network utility. Ping
will be your friend in the networking world. Let's say I open my command
prompt/terminal and I type ping 10.10.10.97.
This probably won't work in my case, because I'm not sure if that IP exists,
I'm just showing you how I would do it. Now you may ask yourself what is
the importance of ping? Well, as I explained we test network connectivity
and we can do that outside of our network as well. Let's say you type
www.google.com on your browser and you click enter. If the servers of
Google are down, an error will pop up on your browser's screen and you
can test by yourself if the website's server is down or if your machine has
the issue. How you can test that? Fire up your cmd/terminal and type "ping
google.com" (without the quotes) and let me know what are the results
saying. If the server isn't down it should respond with a message like this:
As you can probably tell, we got the response from google "Reply from
2a00:1450:4007:807::1012" that their servers are up and running without
any problem. The "2a00:1450:4007:807::1012" is their IP Address, more
specifically their IPv6 Address. IPv6 is an upgraded version of IPv4. It's not
used worldwide yet but soon it will be, since the number of people using the
internet increases rapidly and IPv4 doesn't have enough enough octet space
for that amount of people. Google is way beyong us in terms of technology
so they are already using IPv6. Basically, IPv6 has more options as you can
probably tell. Don't worry, we will talk about IPv6 concepts later on.
Now let's analyze what happens behind the scenes of our example. When I
type ping 10.10.10.97 on my terminal, my computer and its internal brain
thinks "Ok, I'm trying to ping 10.10.10.97, interesting, because I'm looking at
my subnet mask and I realize 10.10.10.97 is in the same network as me".
How does he(the computer) know that? Because they belong to the same
network. Remember, the first 3 octets is our neighborhood/network. That's
an important point because what that tells him is "I'm able to reach that
device using a broadcast message". This is #1 concept of this tutorial.
Meaning, I can say "Hellooo neighborhood!". Imagine yourself going out of
the house and start shouting "Hello my neighborhood, I would like to speak
to Greg Jones" and everybody comes out of their house and they are
thinking "What is that guy doing? He must be looking for someone named
Greg Jones, I will go back to my house since I'm not Greg", but somewhere
down the street you hear "Hello, that's me". Where do I go with that
on
published
on
You may be asking yourself how can this dog be related or compared to our
topic but if you keep reading I'm sure you will understand why.
ARP is like the MAC Address sonar. The MAC Address is being used when it
comes to communicating inside our local network such as our house. If you
ping an active IP Address that belongs to your network, what you are getting
back is the MAC Address of the machine you pinged. ARP's goal is to find
what MAC Address the pinged device has, which is easy because they are on
the same network and when the 10.10.10.97 is being pinged it responds
back with a Unicast. What's a Unicast? A direct message. Meaning, the
10.10.10.97 computer thinks " ok I saw that broadcast coming in and I saw
the MAC Address you are coming from, so I will send a message straight
back to you without "bothering" the other hosts" and now magic
happens.Now our computer thinks "now I have all the pieces I need in order
to send a ping message". Remember the form of that message? It will get
sent as a packet which will include information as we talked about it before.
More specifically, that packet will consist of the destination IP Address, the
source IP Address, the destination MAC Address, and the source MAC
Address. That's how the ping packet is formed.
MAC Addresses are 12 characters long, hexadecimal. That means you have
the option 0-9 at your disposal, as well as A-F, and the way they look can
differ from one operating system to another. Windows use the format 00-
See Also
Hacker Fundamentals: The Everyman's Guide to How Network
Packets Are Routed Across the Web
Hacker Fundamentals: A Tale of Two Standards
Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 1
Show More...
ExchangeEmailArchiving
ImproveExchangeServerPerformanceDownloadYourFreeTrial!
Subscribe
OFF
Great post!
yesterday
Reply
MEDOPHI
LE
MEDOPHI
LE
Reply
FSEC
-Phoenix750
PHOENIX
750
Reply
Reply
FSEC
1
WASHU
WASHU
Reply
Reply
FSEC
Good post!
yesterday
Reply
JEREMIAH
PAYNE
Reply
FSEC
ATTACH
Gateways
TorneSuaImaginaoRealidadee
ConectesecomoMundoaSuaVolta!
Arts
Lifestyle
Gaming
Alcohol
Business & Money
Dating & Relationships
Diet & Health
Family
Fitness
Food
Home & Garden
Hosting & Entertaining
Language
Motivation & Self Help
Outdoor Recreation
Pets & Animals
Pranks & Cons
Spirituality
Sports
Travel
Gambling
Games
Hobbies & Toys
Magic & Parlor Tricks
Video Games
WonderHowTo.com
About Us
Privacy Policy