Вы находитесь на странице: 1из 6

Null Byte

Follow

The aspiring white-hat hacker/security awareness playground

World Home

How-To

Crack Any Master


Combination Lock
in 8 Tries or Less
Using This
Calculator

Inspiration

How Can I Hack a


Hackers Gmail
Account?

Forum

Networking
Foundations: Basic
IP Addressing (Part
2)

Creators

Msfvenom Android
Exploitation Outside
LAN?

Networking Foundations: Basic IP


Addressing (Part 1)
Posted By

fsec

20

yesterday

Follow

iStockOfficialSite

Some Great Articles


on Evading AV
Software

Hack Like a Pro:


How to Find
Vulnerable Webcams
Across the Globe
Using Shodan

Popular Now

How to Track Who


Views Your
Facebook Profile

Everything You
Need to Disable in
Windows 10

FindTopGradeImages,Videos,&Audio.Get
UnbeatablePricesToday!

Introduction
Hello my future hackers, I am PYS3C and this is my first post on nullbyte.
Nullbyte has helped me comprehend some concepts of my interest and I
decided to make an account so I can talk about some topics I'm keen on and
inform you guys as well. To begin with, hacking is an art and in order to
master an art you have to build a solid foundation around it. One of the
most important hacking requirements , is how to navigate through a
network and what's better way than actually knowing how the networking
world works right? It's easy to copy and paste tool commands and perform
attacks etc but wouldn't it be more interesting if you knew why it's done
that way? One of the basic concepts you should grasp is IP Addresing. IP
Addressing rules the world, rules how everything communicates on the
internet, so this tutorial is gonna be a massive topic of those series. Without
further ado let's get right into it!
In this tutorial we will go through:
What is an IP Address
We will get to know our "digital neighborhood" (e.g what IP addresses are
around, who you can talk to without intervention)
How to find your friends on the network using a protocol called ARP
(Address Resolution Protocol).
In general, moving around the network is a massive concept that I want to
plant in your mind and I will try to explain it as simple as possible.

IP Address
Think of an IP Address as your digital house. Actually it works like that in the
real world. For instance, you have a house, you have an address for your
house (32 FR Street) and you tell people "Hey, if you want to visit my house
come to 32 FR Street and they say "ok great I'll see you there at 5 pm", and
that's how they reach you. Well, every single device that is connected to a
network also has an address, known as an IP Address. That's how it
communicates and that's how entities (people, machines, applications)
know how to reach it.

Related
Hacker Fundamentals: The
Everyman's Guide to How
Network Packets Are Routed
Across the Web
Hacker Fundamentals: A
Tale of Two Standards

Hack Like a Pro: Networking


Basics for the Aspiring
Hacker, Part 1
Hack Like a Pro: Linux
Basics for the Aspiring
Hacker, Part 6 (Networking
Basics)
Hack Like a Pro: Using
Netdiscover & ARP to Find
Internal IP and MAC
Addresses
Mikrotik 2 WAN(ISP) + 2
LAN, with PCC + Hotspot

Collection of Online

Collection of Online
Information Gathering Tools

An IP Address is four octets, each one with a value from 0 to 255.

How to Subnet an IP address


on your PC

IP and Gateway Beef +


MITMf in a Public Network
See Who's Clogging Up Your
Wi-Fi Network with These
Free Mobile Apps

There are some defined rules, for example we can't have an IP Address with
all 0s (e.g 0.0.0.0) or all 255s (255.255.255.255), but we will unfold the
restrictions as we go. For now let's just assume that those are all
possibilites.We can have an IP Address 10.1.25.9 or 14.5.23.80 and it would
work just fine. These are ip addresses that we could assign to our computer.
The rule is that every computer in the network has to have its own IP
Address. We don't share an address with our neighbor, right? Neither do
computers. Their IP has to be unique. These IP addresses are ALWAYS
combined with a subnet mask and usually, almost always a default gateway,
your router in that case.

Networking Basics for the


Aspiring Hacker, Part One:
IP Addresses

WOW WOW subnet mask? Where did that come from? We are gonna talk
about subnet masks later on another tutorial. Shortly, the IP Address
defines your house or your location, so this is how people reach us on the
network and it's also the source that I come from when I try to talk to them.
For example how they know to get back to me when I try to communicate to
them. The subnet mask defines your neighborhood. Before we go any
further let's figure out what that means:

Newest
I've got the IP Address 192.168.1.67 and I combine that with the subnet
mask 255.255.255.0. Now these are all set up either by you or by the
network administrator (Internet Service Provider) by default. At a base level,
trust me we will get more advanced in this, this is all you need to know for
the best majority of the networks. Whenever you see 255, line that up to the
first 3 octets of the IP Address. For example:

Stagefright Exploit
Success?

DevilMind
explaining
Hacking for
Beginners!

Community
CAMERON GLASS commented

Those 3 pieces of the address, in other words, the first 3 octets (192.168.1)
represent my "neighborhood" or in technical words, my network. My
common ground that I communicate on. That 0 at the end of the subnet
mask represents who I am in that neighborhood/network, or technically
speaking, the number of hosts of that neighborhood. I know the subnetting
concept sounds confusing but bare with me, subnetting is all about binary.
Right now knowing how the subnet mask works isn't important.

on

Why Newbies Deserve Respect


We all started from zero, so you shouldn't
have anything to worry about. Shoot me any
questions if you stumble on them.
CAMERON GLASS commented

on

Why Newbies Deserve Respect


I second this comment. Thank you for
replying!
-Cameron Glass
ANONS 4ANIMALS commented

Search

15
KUDOS

These are 2 key pieces of the puzzle and before we move on I want to make
sure you understand the idea behind it. So here is another example:

Worlds

on
Login | Signup

How to Set Up a Pentesting Lab


Using XAMPP to Practice Hacking
Common Web Applications
thank you I appreciate that!

commented on

KUDOS

So let's say I'm a host (a computer) with the IP Address 10.10.10.99 and I'm
plugged into a switch and I have another computer that I want to talk to
who is 10.10.10.97 and let's assume they use the subnet mask
255.255.255.0. First of all, I don't know if you noticed but the first 3 octets of
both of the IP Addresses are the same. Which means that they are on the
same network, right? As we said before the first 3 octets represent the
network. So our network is 10.10.10.0. Wait what? The network has an IP?
Yes it does have an IP as well! You will never see(at least I haven't) a
computer with an IP ending with '.0 '. The '.0 ' is part of the network
representation, our network's IP. For example, if your computer has the IP
172.168.2.25 that means you belong to the 172.168.2.0 network. Remember
when I said that an IP Address is four octets, each one with a value from 0 to
255? Well , the 0 and 255 aren't usable because 0 represents the network
and 255 represents the broadcast IP Address. What is broadcast IP Address?
Patience is a virtue. Let's focus on the main goal for now which is to
understand how IP address contributes to the communication between
computers.
Let's go back to our example after that small explanation break we had. I go
on to the 10.10.10.99 computer and I generate a Ping. What is a Ping? Ping
stands for Packer Internet Groper. The goal of the ping is to test network
connectivity by sending a message via a packet(computers communicate via
packets, packets include information about the computer who made the
request and the target computer) to whoever we specify and then when the
other side receives it, it sends it back. Ping is your #1 network utility. Ping
will be your friend in the networking world. Let's say I open my command
prompt/terminal and I type ping 10.10.10.97.

This probably won't work in my case, because I'm not sure if that IP exists,
I'm just showing you how I would do it. Now you may ask yourself what is
the importance of ping? Well, as I explained we test network connectivity
and we can do that outside of our network as well. Let's say you type
www.google.com on your browser and you click enter. If the servers of
Google are down, an error will pop up on your browser's screen and you
can test by yourself if the website's server is down or if your machine has
the issue. How you can test that? Fire up your cmd/terminal and type "ping
google.com" (without the quotes) and let me know what are the results
saying. If the server isn't down it should respond with a message like this:

As you can probably tell, we got the response from google "Reply from
2a00:1450:4007:807::1012" that their servers are up and running without
any problem. The "2a00:1450:4007:807::1012" is their IP Address, more
specifically their IPv6 Address. IPv6 is an upgraded version of IPv4. It's not
used worldwide yet but soon it will be, since the number of people using the
internet increases rapidly and IPv4 doesn't have enough enough octet space
for that amount of people. Google is way beyong us in terms of technology
so they are already using IPv6. Basically, IPv6 has more options as you can
probably tell. Don't worry, we will talk about IPv6 concepts later on.
Now let's analyze what happens behind the scenes of our example. When I
type ping 10.10.10.97 on my terminal, my computer and its internal brain
thinks "Ok, I'm trying to ping 10.10.10.97, interesting, because I'm looking at
my subnet mask and I realize 10.10.10.97 is in the same network as me".
How does he(the computer) know that? Because they belong to the same
network. Remember, the first 3 octets is our neighborhood/network. That's
an important point because what that tells him is "I'm able to reach that
device using a broadcast message". This is #1 concept of this tutorial.
Meaning, I can say "Hellooo neighborhood!". Imagine yourself going out of
the house and start shouting "Hello my neighborhood, I would like to speak
to Greg Jones" and everybody comes out of their house and they are
thinking "What is that guy doing? He must be looking for someone named
Greg Jones, I will go back to my house since I'm not Greg", but somewhere
down the street you hear "Hello, that's me". Where do I go with that

DELLS SELLING PAGE commented

on

How to Flash Kali NetHunter on


OnePlus and Nexus Devices (Most)
As a Secondary ROM
Does the internal wifi work on the nexus 7
2013 model net hunter thanks
DONNA BLANKENBECLER

published

How to Subtract Mixed Numbers


BRETT DONADEO commented

on

You've Been Wasting the Best Part! 5


Delicious Uses for Your "Empty"
Nutella & Peanut Butter Jars
Also remember that some peanut butters
have xylitol, which is poisonous to dogs.

example? That's what the broadcast is there to do in our case. So our


computer is going to send a broadcast message, known as an ARP(Address
Resolution Protocol) broadcast. He's sending a message like the "I'm looking
for Greg" example. He's sending a message to his network neighborhood
saying "Hello neighborhood, I'm looking for 10.10.10.97, could that person
please stand forward?". All the devices of the network receive that message,
they are all "disturbed", but keep in mind they have processors that can
handle being "disturbed".
Broadcast happens all the time in a local area network and most of those
devices will ignore it. When they receive the message "Hello I'm trying to
reach 10.10.10.97" they are thinking "Well, I'm not 10.10.10.97, I'm going
back in my house" and when the message reaches the desired target, the
specified target responds by sending its MAC address. HUGE concept.

ARP (Address Resolution Protocol)

You may be asking yourself how can this dog be related or compared to our
topic but if you keep reading I'm sure you will understand why.
ARP is like the MAC Address sonar. The MAC Address is being used when it
comes to communicating inside our local network such as our house. If you
ping an active IP Address that belongs to your network, what you are getting
back is the MAC Address of the machine you pinged. ARP's goal is to find
what MAC Address the pinged device has, which is easy because they are on
the same network and when the 10.10.10.97 is being pinged it responds
back with a Unicast. What's a Unicast? A direct message. Meaning, the
10.10.10.97 computer thinks " ok I saw that broadcast coming in and I saw
the MAC Address you are coming from, so I will send a message straight
back to you without "bothering" the other hosts" and now magic
happens.Now our computer thinks "now I have all the pieces I need in order
to send a ping message". Remember the form of that message? It will get
sent as a packet which will include information as we talked about it before.
More specifically, that packet will consist of the destination IP Address, the
source IP Address, the destination MAC Address, and the source MAC
Address. That's how the ping packet is formed.

MAC Addresses are 12 characters long, hexadecimal. That means you have
the option 0-9 at your disposal, as well as A-F, and the way they look can
differ from one operating system to another. Windows use the format 00-

11-55-FF-A6-B3, some other devices format them as 00:22:3E:5B:98:8D and


some others format it as 0007-5832-etc. But don't worry, all these formats
are valid.
So, my computer sends the broadcast message out, it gets the MAC Address
of the 10.10.10.97 device back and once that happens, it has everything it
needs in order to send that message, which can be an mp3 file or an email,
anything. Now that packet gets sent to the switch and the switch does its
magic. Switches are layer 2 devices, they learn MAC Addresses, so as soon
as the switch sees the ping message coming in, in matter of fact it doesn't
even see either the IP Address or the actual message. All it does is seeing
the destination MAC Address and thinks "ok you are trying to reach the MAC
Address of the 10.10.10.97 computer and I know where that is",how?
Because as I said that's what switches do. So, the switch delivers the
message to 10.10.10.97 and it replies back but this time the packet is
formed differently since the source and destination changes. This time the
source IP and MAC Address will be the ones' with the 10.10.10.97 IP
Address. This is a HUGE HUGE concept.
That's all for now. In case you haven't noticed we haven't talked about the
default gateway so far(router). I'll let you sleep on that till our next meeting
with the part 2 of this chapter. Our topic for now is focused on local area
network so bare with me.I know it's a lot to grasp and it may seem
frustrating, but trust me, after part 2 everything will be clear to you and you
will have learnt an amazingly beautiful and important concept. Moreover,
we will cover what subnetting is and how useful it is after we finish this
chapter and we will go through the concepts of public and private IP
Addresses. How they work and why they work that way. Remember,
knowing why something is the way it is, is extremely essential for our
learning journey. I hope this has been informative for you and I would like
to thank you for taking the time to read it :). If you have any questions feel
free to ask them on the comment section down below. Have a nice day and
take care!

See Also
Hacker Fundamentals: The Everyman's Guide to How Network
Packets Are Routed Across the Web
Hacker Fundamentals: A Tale of Two Standards
Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 1
Show More...

Remember to Give Kudos, Tweet, Like, & Share

ExchangeEmailArchiving
ImproveExchangeServerPerformanceDownloadYourFreeTrial!

Join the Discussion

Subscribe

OFF

Great post!

yesterday

Reply

MEDOPHI
LE
MEDOPHI
LE

More to come soon :)


yesterday

Reply

FSEC

Good post with much detail. +1

-Phoenix750

PHOENIX
750

yesterday - edited yesterday

Reply

Thank you for the feedback :)


yesterday

Reply

FSEC

1
WASHU
WASHU

Very nice, amazing depth and understanding, thank you.


Cheers,
Washu
yesterday

Reply

I appreciate the kind words :D Part 2 will be out tomorrow :)


yesterday

Reply

FSEC

Good post!

yesterday

Reply

JEREMIAH
PAYNE

Thank you mate


yesterday

Reply

FSEC

Share Your Thoughts


Click to share your thoughts
YOU

ATTACH

Gateways
TorneSuaImaginaoRealidadee
ConectesecomoMundoaSuaVolta!

Popular How-To Topics in Computers &


Programming
Hack a website password
Hack another computer on you
How to Hack skype password
Trace someone else ip address
Hack security cameras
How to Hack locked wifi
Remotely turn on webcam
How to Google camera hack

Recover facebook chat history


Hack wifi passwords on mac
How to Hack gmail password
Hack others facebook account
Hack facebook accounts with c
Sniff facebook password
Open other computer through
Create video album in my face

Recover facebook chat history


Remotely turn on webcam
Hack other peoples facebook
Crack excel password
Hack in to another computer t
Hack another computer from y
Hack others facebook account
How to Hack neighbors wifi

Trending Across WonderHowTo


How to Do Small Hacks? For
Beginners!

The Ultimate Way to Dice


Onions

12 Android Widgets You


Need on Your Home Screen

4 Ways to Crack a Facebook


Password and How to
Protect Yourself from Them

How to Create a Windows 10


Installation Disk

Hack Like a Pro: Networking


Basics for the Aspiring
Hacker, Part 2 (TCP/IP)

How to Print, Cut & Fold


Your Own DIY Herms
Handbag

The Food Hacks Guide to


Emulsion

Arts

Science & Tech

Lifestyle

Gaming

Arts & Crafts


Beauty & Style
Dance
Fine Art
Music & Instruments

Autos, Motorcycles & Planes


Computers & Programming
Disaster Preparation
Education
Electronics
Film & Theater
Software
Weapons

Alcohol
Business & Money
Dating & Relationships
Diet & Health
Family
Fitness
Food
Home & Garden
Hosting & Entertaining
Language
Motivation & Self Help
Outdoor Recreation
Pets & Animals
Pranks & Cons
Spirituality
Sports
Travel

Gambling
Games
Hobbies & Toys
Magic & Parlor Tricks
Video Games

WonderHowTo.com

About Us

Privacy Policy

Terms & Conditions

Вам также может понравиться