P. 1
Grad Individual Hacking

Grad Individual Hacking

|Views: 6|Likes:
Published by Shiva Kumar

More info:

Published by: Shiva Kumar on Sep 28, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Research Project AIT 614 Network Hacking & Prevention

Purpose: The purpose of this research is to find how easy or hard it is to gather information of a remote network by using readily available tools, programming codes and other commands. This research at any time did not attempt to hack into a network, nor did it try to gather sensitive information with a malicious intent. This research concentrated on  How to obtain an IP address of a person chatting over a MSN/Yahoo messenger  How to obtain an IP address of a remote website  How to obtain information of the owner of the website  How to obtain information on where the website being hosted and their serve information This research used the following tools to achieve the above,  Nmap  pcHacker Tracker 3.1  Visual Route 2006  Angry IP scan (Port Scanner) Network Hacking: To obtain an IP address of a person on MSN or Yahoo messenger, you need to establish a direct connection with that target computer. This could be achieved by sending the target system a request to transfer a file and using ‘netstat –n’ in command prompt white the file being transferred. However, this IP address is a dynamic IP address. To obtain an IP address of a website, you could open the website in the Internet Browser and use ‘netstat –n’. This will give you the IP address of the website. You could also use the tool ‘Visual Route 2006’ to obtain the IP address of the website. This tool also tells you other information such as, physical location where the website is hosted, information of the hosting company (physical address, contact details and contact person, NetRange, CIDR, NetHandle, etc) and information of the owner of the website (name, address, contact numbers etc). Refer to Appendix 1: Visual Route 2006 screen shots. This information of the person is enough to locate the people’s whereabouts in the world. It’s important for a hacker to find out the open ports of a network. A hacker could use TCP connection port scanning, TCP/SYN Scanning, SYN/ACK Scanning, TCP FIN Scanning and FTP Bounce Attack Port Scanning programs written in C or Perl to gather information on a network. A hacker could also use tools such as nmap and Angry IP Scan to find open ports of a remote network. nmap command ‘nmap “IP address of the target system”’ give you a list of all open ports of the target system. You could also use Angry IP Scan to scan a range of ports of the target system. Angry IP Scan scans the range of ports and returns with a list of all open ports. Refer to Appendix 2: nmap and Angry IP Scan screen shots

You could use the HTTP port of the target systems to find out the web server running in the server.com/download8853. The response from the daemon at Port 80 may contain the web server name and version its running. An organization and individuals could take the following actions to prevent an attack  if using MSN/Yahoo messengers – deny requests for file transfer and if possible not use messenger at all  Use IP address blocking tools  Use tools such as pcHacker Tracker which logs any attempt to scan the ports of the network  Have good firewall and firewall policies (and implement them) References:  Network Security. One can also use echo requests or ping to find out whether the target system is alive and connected to the internet.xx) Conclusion: by using the above tools and methods. However.angryziber. one can get information on a remote network (its location.1 – Gold Software (http://www. contact details.xx. This logs the Intruders IP. port.0.org (http://www..xx.filter out all echo request packets and discard them  Access-list 101 deny icmp any any 8 Access-list 101 permit icmp xx. date and time of scan.1 is a tool which keeps track of who is scanning the network ports.org/nmap/) . A Hackers Prospective by Ankit Fadia. you could block ping and echo requests at router level by adding the following rules.visualroute. type an invalid HTTP command in the input prompt and press ENTER Twice.0. open ports. As a precaution. whether it’s alive or not) and information on the owner of a website (name.xx 0. However this is not a free tool. Simply telnet to Port 80 of the target system.html)  Angry IP Scan – AngryZiber (http://www. web server and version.com/ipscan/)  VisualRoute 2006 – Visualware® (http://www.pcHacker Tracker 3.xx.insecure. SYN/ACK and FIN scans. It’s also possible to use ‘netstat –a’ command to detect SYN.225 any 8 .discard all echo requests except those that are coming from your ISP (whose IP address is xx. Macmillan India Ltd. you could configure the HTTP daemon to not display the Operating system name in the header. physical location etc).gold-software.com/)  nmap – insecure.xx. 2003  pcHacker Tracker 3.  Access-list 101 deny icmp any any 8 .

Appendix 1: Visual Route Screen shots Visual Route Map Network and Owner details .

Appendix 2: namp and Angry IP screen shots nmap UDP and TCP port scanning Angry IP Scan Port Scanner .

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->