You are on page 1of 4

How hacking is done and how to ensure

safety.
What is an IP address?
IP address is the address of each machines connected to the internet or is the
identification number of each machines on the internet.

How can you identify the IP address of websites?

First go to command prompt by: pressing windows logo key +R to prompt the
run dialog box.

In the run dialog box type ‘cmd’ without quotes and press enter. This will bring
up the command prompt.

(* pinging) Here type : ping www.google.com (google is used as an example,


you can use: ping www.site.com)

Here is what you would see when it is finished.

The number highlighted (64.233.181.104) is the IP address of the google


server.

What can we do with an ip address?

Firstly we can find the geo location of the server. But now I am not going to go
into all that now. But I am going to get into hacking and safety...
How do can we use IP address to hack into severs?

First we try to find wether the server is alive by pinging the IP address (refer
up).

If the server up then it is scanned for open ports using port scanners like nmap

You can get one for free at: http://nmap.org/download.html

Some of the most popular ports on the on the internet are:

20 FTP data (File Transfer Protocol)

21 FTP (File Transfer Protocol)

22 SSH (Secure Shell)

23 Telnet

25 SMTP (Send Mail Transfer Protocol)

43 whois

53 DNS (Domain Name Service)

68 DHCP (Dynamic Host Control Protocol)

80 HTTP (HyperText Transfer Protocol)

110 POP3 (Post Office Protocol, version 3)

137 NetBIOS-ns

138 NetBIOS-dgm

139 NetBIOS

Remember : a smart hacker would choose quick and quiet scan to avoid
suspicision.

A sample would look like:


Once the ports are scanned we try a technique known as Banner grabbing.

Here we try to to find out what is the software/softwares used by the server so
that we can find vulnerabilities and exploit them.

To do this first we have to open up command prompt

And type ‘telnet www.targetsite.com 21’ without quotes where


‘www.targetsite.com’ is the site and ‘21’ is the open port found through the
port scanning. This would be like:

If telnet is disabled in windows 7 or vista just do the following:

Goto control panel -> programs and features -> turn windows features on or
off -> select telnet client option and click ok.

Finally it would bring up some thing like :

(remember port 21 is FTP therefore this brings up the FTP software and its
version.)

Now you have to find some vulnerabilities in the software through the internet
or create your own if you are a programmer.

Once you find vulnerabilities try to get exploits for the vulnerability through
the internet sites like : http://www.milw0rm.com/

Or create your own if you are a programmer.

If you come to this step you are in the final step of penetration into the
system.

To penetrate the system has to run the exploit.

You may use some attacks like DOS, Buffer overflow and etc.

If the exploit is in perl, first open command prompt .


Then browse to the location with the cd (change directory command)

Here it is:

This would run the exploit. Sooner after running many exploits like this the
root server will be in your hands.

This is a sample of how hacking is done.

Attention to all ICA members. To ensure safety in cyber space, keep your
softwares up to date and patch them when there are patches.

Thank you.

This article is only for knowledge and safety not for any other purposes.

I am not responsible for anything you do with this tutorial.

If you ever try this without ensuring your safety you may be traced and
punished.

If you have any questions or comments just comment.

You might also like