![]() ![]() I'm going to use a website as an example, rather than a local computer. Nmap should now be installed! Step 2 Scan for a Target This is the standard installation procedure: Step 1 Download & Install Nmapīold words are commands that must be entered in a terminal emulator.įirst, we must download Nmap, which is going to be our tool that we use for port scanning and information gathering: If you can't figure out how to install it in Windows with the GUI installer (yeah, right), follow along using Cygwin. This will be done under Linux, but Nmap is available for all platforms. Today's Null Byte is going to demonstrate a simple "port scan" on local computer using Nmap, and teach how a hacker would exploit these services, as well as how to guard ourselves against it. After they learn that information, they would search sites like Packet Storm for known exploits to run against the service. To exploit a service on a port, a hacker would banner grab for the software and version. There are 65,535 total allocated ports in TCP/UDP. A port is just an opening that a service uses as a communications endpoint. Your computer runs services like media sharing on what are called ports. ![]() So how are hackers using just an address to get into your computer and make your life hell? This is one of the reasons proxies and anonymity services exist, to protect people from learning your IP address. ![]() I'm sure at one time or another you've heard that hackers can hack your computer via your IP address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. Your IP ( Internet Protocol) address is your unique ID on the internet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |