HACKER n. 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. 3. A person who is good at programming quickly. Not everything a hacker produces is a hack. 4. An expert at a particular program, or one who frequently does work using it or on it
CRACKER n. 1. A malicious meddler who tries to discover information by poking around. 2. A person who breaks into computer systems, using them without authorization, either maliciously or to just to show off.
Many of these tools and discussions come from hackers and network admins trying to stay ahead of crackers.
Your IP Address is
FootprintingIdentify Domain names
find web pages that link to the web page you are interested in by using link:www.target.com
as the google search term
block IP lookup
network tools lookup
Local OS Commands
There are several commands available from the local Command window
c:\windows\system32\command.com (these help screens were generated with XP)
type Command at the Run prompt
These also have online implementations
run NSLOOKUP, dig into the nameserver
NSLOOKUP help screen
NSLOOKUP www.usi.edu returns 22.214.171.124
PING help screen
NET VIEW /DOMAIN
automated ping sweeep on a range of IP addresses, to determine if individual systems are alive. send out ICMP ECHO packets to a target system in an attempt to elicit an ICMP ECHO_REPLY
Lots of hacker tools and network maintenance tools are available. Programs (mostly unix scripts) called fping, gping,Pinger,Ping ProPack, hping.
Programs called ICMPQUERY and ICMPUSH can request local time (see what timezone the server is in) and retrieve the subnet mask.
When the server blocks ICMP at the firewall, a TCP ping scan (a program called nmap) specifying a port are the next technique
Strobe, Netcat, Nmap, are TCP port scanning utilities
Enumeration - identifying user accounts or poorly protected shared resources
DUMP SEC - dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication informationLegion 2.1 - NetBIOS tool for scanning Windows file shares
good index of actual IP owners
IP address index
PDF-Everything you ever wanted to know about IP Addressing
CIS 367 Textbook home page
CIS 367 Course HomePage
Additional Course info
http://www.networkworld.com On-line network magazines or business of network magazines
Network World: Information and links to resources about data communications and networking.
Business Communications Review:
Links to Web pages of vendors that advertise in the magazine. Includes copies
of some articles from past issues.
Telecommunications: Articles and new product information from past issues, plus an extensive international listing of industry trade shows. Product listings include a brief description plus the ability to request product information from the vendor. A useful search capability can be used to search articles and product listing by keyword..
Network Computing: Articles from magazine available plus pointers to advertisers. Site also includes a hypertext network design manual with useful practical tips for end-user network design.
Network Magazine: Links to Web pages of vendors, tutorials on technical topics, and other useful information.
Vendors: Links to
thousands of hardware and software vendors who currently have WWW sites, as
well as a list of thousands of computer and networking companies in a Phone
IT Professional: Includes career resources and links related to information technology.
ACM Networker: Includes on-line copies of magazine articles.
Forbes: Copies of some articles from past issues are provided.
Business Week: Copies of some articles from past issues are provided. Also has a considerable amount of supplemental information.