IP to hACK

How Hackers Use Your IP Address to Hack Your Computer & How to Stop It

Your IP (Internet Protocol) address is your extraordinary ID on the web. It's synonymous with your place of residence. Anybody on the planet can contact your PC through its IP address, and send a recover data with it. 

I'm certain at some time you've heard that programmers can hack your PC through your IP address. This is one reason intermediaries and namelessness administrations exist, to shield individuals from taking in your IP address. So how are programmers utilizing only a deliver to get into your PC and make your life damnation?

Open ports. Your PC runs administrations like media sharing on what are called ports. A port is only an opening that an administration utilizes as an interchanges endpoint. There are 65,535 aggregate distributed ports in TCP/UDP. To misuse an administration on a port, a programmer would standard snatch for the product and form. After they discover that data, they would scan locales like Packet Storm for known adventures to keep running against the administration. 

The present Null Byte will exhibit a basic "port sweep" on neighborhood PC utilizing Nmap, and show how a programmer would abuse these administrations, and in addition how to protect ourselves against it. This will be done under Linux, yet Nmap is accessible for all stages. In the event that you can't make sense of how to introduce it in Windows with the GUI installer (no doubt, right), take after along utilizing Cygwin.

Step 1 Download & Install Nmap

Bold words are commands that must be entered in a terminal emulator.
First, we must download Nmap, which is going to be our tool that we use for port scanning and information gathering:
    wget http://nmap.org/dist/nmap-5.51.tar.bz2
Now, extract the archive:
    tar -zxvf nmap-5.51.tar.bz2
Change to the newly made directory:
    cd <directory name>
This is the standard installation procedure:
   ./configure
   make && sudo make install
Nmap should now be installed!

Step 2 Scan for a Target

Let's scan a local computer. I'm going to use a website as an example, rather than a local computer. This is because my firewall is absolutely crazy, and filters out scans. Don't scan a remote computer with the intentions of doing bad deeds. This is for educational purposes only.
Start by mapping out your local network:
    sudo nmap -sP 192.168.1.0/24
That should return a list of hosts that are up for a port scan!

Step 3 Scan Your Individual Target

Out of the returned list of targets, pick one that you would like to scan for services. Let's do a full scan of all the TCP/UDP ports:
    sudo nmap -p 1-65535 -T4 -A -v <target IP goes here>
As you can see, this target has MANY open ports. SSH piques my interest, so let's move on to banner grabbing to learn the software version or our choice of service.

Step 4 Banner Grabbing

For this, you can use the regular ol' telnet client. Telnet comes with Windows and most Linux distros:
    telnet <host IP> <port banner to grab>
From this, I would learn which software version the service is running, then see if I can find a way to exploit it.

How Can I Protect Myself?

Luck for all of you lovely people, I recently made a tutorial on iptables, which will filter out unwanted connections. Also, disable any unnecessary programs that connect to the internet (remote administration, media sharing, etc).
Windows users, install Comodo firewall, it's incredible and uses a simple point and click installation, and will filter ports for you. It has great default settings and it is free.

Comments

Popular posts from this blog

The Secure Socket Tunneling Protocol

Fake WAP

Lets Make a Simple Keylogger