Sunday 1 July 2018

Network & Information Gathering


Understanding Network:-                

What is Network? :-

                        The dictionary explanation: -  “any net lie combination of filament lines veins passages or the like”, Typically a network is a connection of crisscross. Two or more computer are connected together from a wire or wireless called network, they can using LAN or WAN.



What is LAN?: -

A LAN (Local area network) as name suggests is the type of network that is used for a small to medium sized area
    A LAN may be wired, wireless or a combination of both. A wired LAN used for Ethernet to connect device together. Wireless LLANs are typically created using a WI-FI Connection it can be used to create a LAN with both wired and wireless device. Speed of LAN is 80-100 Mbps.




What is WAN? :-

            A WAN (Wide Area Network) is a network that covers a broad area using private or public network transport,It connect multipal LAN. 
. WAN is a system follow geometric patterns in order to get consistency. The Wan has lower transfer rate due to congestion.  The speed of WAN is lower than LAN 10-20 mbps. Computers connected to a wider area network are network are often connected through public networks, such as the telephone system. They can also be connected through leased lined or satellite.
Footprinting Hacking (Information Gathering):-
            Footprinting is the process of gathering the information of respective network or system, footprinting reveals system vulnerabilities and weakness of system and network that can be access or attack a system.

Types of footprinting:-

                                                                   *Active:-
                        Active foot printing technic directly gather the data from websites like banner grabbing web server, FTT server etc… These method of active footprinting , this is not attack it’s just a gathering an information.
            *Passive:-
                        Passive footprinting is a method in which the attacker never makes contact with the target systems. The downside to the active method for an attacker is that many companies may log contact between an attacker and the target system. Since ICMP traffic is so common, attempting to log all ping requests would be cumbersome, so ICMP pings are often not recorded. This is not the case for TCP connections and/or DNS queries.


*Steps of Information gathering:-

            There are seven basic steps of IG:-
Ø  Finding initial information
Ø  Address range of the network
Ø  Find active machine
Ø  Search open ports or active ports
Ø  What is the OS?
Ø  Which service are running on each port
Ø  Finally map out the network

*Gathering Target Information:-

Ø  Find People and their information
Ø  Search company’s info
Ø  Footprinting through Search Engines
Ø  Tracking target location
Ø  Info. Gathering using social media or any other tricks

Some tools and website of information Gathering:-

: DNS Tools
: Nmap
: Zenmap

In Next blog we learn about Google Hacking and Scanning… Follow me by using us email… thankful to everyone…..

No comments:

Post a Comment

WEP INSECURITIES

  WEP I NSECURITIES Two researchers from the University of California at Berkeley and one from Zero Knowledge Systems Inc. published a repor...