LightBlog

Monday 11 March 2019

Ethical Hacking Tutorials - Services and Connections

Ethical-Hacking-Tutorials

Ethical Hacking Tutorials - Services and Connections


The purpose of this post is to give you an understanding of some basic services that the Network provides for providing and exchanging information, and discusses some of the ways in which individual computers and local networks connect to other networks that make the Internet Are...

What is Services?


You have a Computer, and you know that this Computer has useful information, but not very much. You also know that other people, millions of other people also have Computers, And their Computer also has useful information.

Now, you can assume that these other people and these other computers are very likely to keep a lot of information on them which will be beneficial for you. The only problem is how to Access all this useful information that may be on other people's computers.

Computers themselves, with each other, can communicate easily through ports Different protocols that are designed, but it really does not help you. you could not Understand the streams of binary data that the computers exchange among themselves.

Your computer needs some kind of information to interpret the information you receive Some other way you can use it on other computers.

Computers that use computers translate data, which they exchange in a form. There are useful call services for you. These services allow you to view web pages, exchanges Interact with many other ways in an e-mail, chat, and remote computers.

Your computer uses programs called the client to explain local computer information Which you get. Other computers use a program called Remote Computer, Server Provide this information to your computer.

HTTP and the Web


When you say, 'the Internet,' which comes to mind most people, in fact, is the worldwide Web. The World Wide Web, or just the Web, is not the Internet. Instead, it's a way to use the Internet to exchange information between computers The web uses HTTP or hypertext Protocols and services are known as web browsers and web servers, with information to allow The form of web pages that are exchanged between local and remote computers.

On the local side, what you are watching is a web browser. Has information from a remote computer
is sent to your local computer using the HTTP protocol. Explains the web browser As information and web pages it displays on your local computer.

Http refers to a non-linear method of presenting the hypertext portion of the protocol Information. The text is usually read in a linear fashion: word 2 follows word 1; sentence 3 is as follows Sentence 2; Paragraph 5 follows paragraph 4. Hypertext allows idea information Seen in a non-linear way. This is the major difference between hypertext and old, Methods of plain text to display information

With hypertext, words and thoughts can be added, not directly with words They, but with other words, thoughts or images. Hypertext is not restricted on the web. The majority of Full-featured word processors will allow you to create locally stored pages in the web or HTTP Format. These pages are read using your web browser and work like any other web page; Only they are stored on your local computer, not on a remote computer.

On your local computer, you use a client program called a web browser. What is the opposite You can lead to trust, in fact, many web browsers are available For both Windows and Linux These include Microsoft's Internet Explorer, Netscape Navigator, And Mozilla Firefox Browser?

You can also create your own web page. The easiest way to do this is to Common word processors such as OpenOffice, Microsoft Word or WordPerfect In The program will allow you to combine simple web pages, text, hypertext, and images. Many people have made useful, clever, and innovative web pages using these simple one's equipment...

But these pages are not attractive. Attractive means frames and scripts and animations. It also means Spend a lot of money on a fancy web page design program These programs allow you Many interesting effects on your web page, 

But they are more complex to use Word processor which you probably are already familiar with Once you have pages designed, you will need a computer to keep them so that other people can see them This is called web hosting.

The hosting computer must be running a web server. It is possible to run one of these servers From your home, using your computer, but there are many drawbacks, primary One of these is perseverance. 

Information stored on the webserver is only available when That server is operating, working properly, and has an open connection. 

So, if you want Run a web server from your own bedroom, you have to leave your computer all the time; You must ensure that the webserver program is working properly all the time (this) Troubleshooting involves controlling hardware problems, viruses, worms, and other attacks, 

And dealing with inevitable bugs and flaws within the program), and you have to Keep Internet connection open. This is the reason why most people pay someone else to do all the work this.

A web hosting company will store your web page on your computer. A Perfect Web Hosting The company will have many, redundant servers and regular backup policy, so that your A helpful staff to keep the server running, the service is not lost due to hardware problems Despite hacker attacks and program bugs, and for a number of open connections Internet, 

So that all of you have to design your web page, upload it to the hosting Company server, hanging up the phone, shutting down the computer, and going to sleep, and your web page will be available to the whole world.

It is also possible to find organizations that offer free web hosting. Some of these organizations  Paid advertising is funded, which means that anyone who wants to view your web page You must first see someone else's ad. But they do not have to buy anything, and You do not have to pay anything.

E-mail - POP and SMTP

The second most visible aspect of the Internet is perhaps e-mail. On your computer, you use An e-mail client that connects to a mail server. When you set up your e-mail account, you A specific name is given as user @ domain. You are also asked to provide one Password to use to retrieve your e-mail.

The SMTP protocol, which is used to send e-mail, does not require a password. this can not be happening When the protocol was designed, it was a mistake and the Internet was a small world Residents like people with brains, but now it has become a cause for flaws, which allows Unauthorized use of mail servers and many other tricks, such as 'e-mail spoofing', in which Someone sends an e-mail that comes from another address. 

However, some mails Servers reduce this flaw by applying a certification step, in which you have to prove Your identity before sending e-mail

One important thing to remember is that despite the password being protected, e-mail is not a way To send secure information Most POP clients and servers require your password Transmit - Unencrypted - On Your Mail Server It does not make sense to anyone receives an e-mail from you, which also receives your password; But this means that with anyone

The right knowledge and tools can 'smell' your password relatively easily. (For ideas Making your email more secure, see Lesson 9: Email Security.)

What is IRC?


IRC, or Internet Relay Chat, is where the irregular nature of the Internet is most obvious Has expressed. At the IRC, anyone gets an opportunity to say anything.

You can get acquainted with the chat room used by some online services. IRC is like a Chat Room, there are no rules, there are no standards, and - often - there is no one Guardian, You can find what you are looking for on an IRC channel, or you can There may be something that you had, but you never knew.

All the rules you heard about chat rooms are applicable to IRC channels. Do not tell Do not give your real name your phone number, your address, or your Bank Account Number. But have fun!

What is FTP?


The FTP file stands for File Transfer Protocol. As the name implies, it allows transferring files between a local and a remote computer. While it can be used for private file transfers More generally associated with a free, anonymous FTP server that provides public access Collection of files.

Anonymous FTP was the means by which most computer users exchanged files. Internet. While many anonymous ftp servers are used to distribute files Illegally (and possibly infected with a virus), there are many who are legally used to Distribute programs and files. Servers that provide anonymous ftp services can be found Through various mediums including internet search engine

Most anonymous FTP servers now allow you to access your files through the FTP protocol. A web browser

What are Telnet and SSH?

Telnet allows a local user to send several types of commands to remote computers. this Allows local users to dictate remote computers and return data Local computers, such as you were sitting on a keyboard in front of the remote computer. 

The purpose of SSH, or Safe Shell, is in the form of a secure replacement for Telnet. Then, both Windows and Linux come with a basic, command-line telnet client; To access it, Open a command prompt or a terminal window and type: Telnet.

To access a Telnet server, you need to set up an account and password. Server administrator, because the Telnet program allows you to perform a bigger performance The number of tasks, some of which can compromise seriously from remote computers.

Telnet was used to allow computer administrators to remotely control servers and in the past To provide user support remotely

Telnet can also be used for many other tasks such as sending and receiving email and View source code for web pages (through telnet comes under the heading The most difficult way to do these things). 

Telnet can be used to do many things that are illegal And unethical, but there are legitimate reasons to use them too. You can use telnet to check Your email and view, not only the subject line but the first few lines of an email, which will be Allows you to decide whether to delete or not delete the email without downloading it a message.

What is DNS?


When you want to call a friend on the phone, you will need to know the correct phone number; When you want to connect to a remote computer, you also need to know its number. From the previous lessons, remember that for the computer on the Internet, this number is called IP address

As a number, these IP addresses are managed very easily by the computer, but as a human, we prefer to use the domain name is called. For example, to connect to the TheHackerEarth web page, we type 'https://thehacktech0.blogspot.com/' in the address bar of a web browser, However, the web browser can not use this name to connect to the hosting server TheHackerEarth Web Page - This IP address should be used. 

This means that you're local The computer should have some means of translating the domain name into an IP address. If there There were only hundreds or thousands of computers on the Internet, then it could be possible To see these addresses for you, a simple table is stored on your computer, but, 

Not only are millions of computers on the Internet, but the connection between domains Name and IP address can also change daily.

For this reason, DNS or domain name service is used to translate domain names into IPs. Addresses When you type domain name www.domainname.com in your web browser, 

Your web browser contacts your chosen DNS server with the ISP. If that is the DNS server www.domainname.com in your database, then it will return the IP address to your computer, Allows you to connect.

If your DNS server does not have www.domainname.com in the database, it will send one Request another DNS server, and it will continue sending requests to other DNS servers Finds the correct IP address, or establishes that the domain name is invalid.

What is DHCP?

DHCP or Dynamic Host Configuration Protocol allows the IP address to be dynamically Allocated within a network. The network has been given a block of IP address for its use. when one The computer connects to the network, it is assigned an IP address. When a computer leaves, its IP The address becomes available for use by another computer.

This is useful for the large network of computers because it is not necessary for every computer Individually assigned, static IP address Instead, you use a DHCP server. 

When a new computer connects to the network, the first thing is that it requests an IP address DHCP Server. Once it has been assigned an IP address, then the computer has access to all Network Services

What is Connection?


Most computers connected to the internet through a modem. The modem translates digital The signals produced by the computer are produced in analog signals, which can usually be transmitted by Available telephone lines. 

Modem speed is measured in baud or bits per second. higher blood rates are better because they allow for faster transmission of data, but you should also be Think about what you are planning to do. 

There are some applications - such as in telneting MUDs - for which a twenty-year 300 baud modem will still be acceptable (provided Your typing speed was not so good), while high bandwidth applications such as streaming Video can often stress the most powerful cable modems too.

Internet Service Providers


You just do not call the Internet. You need to use a server that will connect you Computers for the Internet The server does all the heavy work, like all the time. The server is run by ISP or Internet service provider.

ISP has a point on the Internet that is continuous and has servers in it which run it The services you are going to use are Now, you can run these services on your own. 

For example, You can run a mail server on your local computer, but for that you have to keep your computer Operated and connected to a network all the time, just waiting for those brief moments When information is to be exchanged. 

An ISP, however, strengthens the efforts of a large number of users, so the mail server is working all the time, rather than sitting around, doing Nothing. In addition, an ISP computer is going to use a high-speed connection Connect to NAP or Network Access Point. 

These naps then connect with each other Through ultra-high-speed, connections called Backbone. It's the internet.

Plain Old Telephone Service

POTS, or even plain old telephone service, is still the most widely used method of accessing the Internet. Its primary loss is its low speed, but in many cases, it is made by Extensive availability. 

Most national internet service providers have a large number of local access The number, and almost everyone still has a landline phone. In principle, if you had one pocket full of acoustic modem and change, you can connect with almost any public Pay the phone. It's not that you really want to do this.

POTS is slow. The fastest telephone modems are rated at 56,600 baud's speed. That, however, as they say in small print, there is a lie. 

Lack of power limits actual downloads The speed is approximately 53,000 baud and the effective rate is usually very low. It is not Compare very well with DSL or cable modems.

He said, telephone service is widely available, and POTS-based ISPs are relatively cheap (And sometimes free). 

You do not want to trade pirated films on the pots, because it is Immoral, illegal, and holds your phone line all night and probably in the afternoon, but you, Of course, you can send a text-based e-mail to Grandma. And if you use Telnet, you can do it Even do it with a dusty dust based machine, which you pulled out of the basement.

What is DSL?

DSL or Digital Subscriber Line is a method of sending more information Pre-existing wire for POTS Its main advantage on POTS is that it is very fast compared to an analog modem, and it provides a permanent connection. 

Also, it allows you to make regular telephone calls and receive when you are connected to the internet. it's main The disadvantage is that its availability is limited by your proximity to the telephone company Switching Equipment - If you live far below the line; you're out of luck.

Cable Modem

Cable modems do not use traditional telephone lines to connect to the Internet. Instead, They use optical fiber lines that are used by cable companies to transmit digital Cable signal Like DSL, cable modem allows you to make and receive regular telephone calls When you are connected to the Internet, and they provide a permanent connection, but Cable modems are usually faster than DSL.

There are two basic flaws in the cable modem. The first is that cable modem access is a shared Resources so your connection speed will be reduced when other users are nearby Geographical proximity The second is that cable modem access is available only in areas Where cable companies have installed the necessary fiber-optic wiring.

No comments:

Post a Comment