Professional Documents
Culture Documents
https://onedrive.live.com/?authkey=
%21AFCcVeaoihlIptE&id=A06B0807E9CEFDF8%21406&cid=A06B0807E9CEFDF8
3.SCANING NETWORK
1)port and services need and use to acess host
2)by scanning port and services we get to known vernarability
3)ipconfig to know ipv4 address
4)(ip addr)-> New cmd for ipv4 for linux
5)(ping) cmd is also use to communicate b/w devices in same network
6)if i dnt know ip addr of opponent we can use NMAP cmd(use this cmd to permorm
host discovery)
7)1st ip addr is network addrs(10.10.1.0) and last ip address (10.10.1.255) is
broadcast addrs
8)If you want large machine at quiuck time use cmd (nmap -sn 10.10.1.0/24)
9)with the help of ttl(time to live) we can know which ip addrs have machine or os
10)nmap is also help to know machine is server or not
11)protocol is known as m/c to m/c communication lang
12)tcp (connection protocol) UDP (user datagram protocol)
13)(nmap -O 10.10.1.11) by this you can know more detail information about the m/c
14)-O to know about OS
15)nmap -O 10.10.1.11 -> this cmd run by root user
16)arp(address Rosolution protocol)-> use to get mac addrs
AFTER 9:00 PM
8.sniffing
1)ip soofing using arp(adress resolution protocol).
2)switch majorly work on mac address
3)swith have a fifo method
4)macof helps in mac flooding attack
5)macof -i eth0-n 10
6)
9.SOCIAL ENGINEERING
1)art of convincing people to self xpose their informaion
2)$setoolkit = social engg toolkit
2.1)it help to create phishing website
3) phishtank = it is a phishing awareness website
4)netstat extension = It is like antivirus
11.SESSION HIJACKING
1)Once user and server is connected then that is called session
2)session hijacking = attacker will interfere b/w user and server then attacker
will communicate with server in the name of genuine user
3)two type o session hijacking (active & passive)
3.1) in active seizes control of session
3.2) in passive attacker is like movie watching audience
4)ZAP (zed attack proxy) same as like burp suite
5)for passive :
$bettercap -iface(interface) eth0
6) with the wirehark we can deteck session hijacking
13.WEB SERVER
1) a web server is computer system which is use to store , process and connect to
internet through http
2)who.is = it is use to search for domains or ip adresses
3)ghost_eye is python tool there fopr everfy related to webserver
4)skipfish : It brute force attack
the whole website
5)hydra is tool which ius use to parallelized login cracker which supports numerous
protocols to attack
6)$hydra -h
7)
15)
16)
18)
19)
20)