IP tools

HACKER n. 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. 3. A person who is good at programming quickly. Not everything a hacker produces is a hack. 4. An expert at a particular program, or one who frequently does work using it or on it

CRACKER n. 1. A malicious meddler who tries to discover information by poking around. 2. A person who breaks into computer systems, using them without authorization, either maliciously or to just to show off.

Many of these tools and discussions come from hackers and network admins trying to stay ahead of crackers.


Your IP Address is


Footprinting

Identify Domain names

Who IS servers for finding domain name registrants and IP addresses
Who IS
Who IS www.usi.edu
http://www.whois.sc/192.206.10.36

collection of online whois tools, Sam Spade also has a windows GUI interface utility you can download
Samspade.org
Who Is USI

find web pages that link to the web page you are interested in by using link:www.target.com as the google search term
google link:www.usi.edu

block IP lookup
network tools lookup
DNS Stuff


Local OS Commands

There are several commands available from the local Command window
c:\windows\system32\command.com (these help screens were generated with XP)
type Command at the Run prompt
These also have online implementations

run NSLOOKUP, dig into the nameserver
NSLOOKUP help screen
NSLOOKUP www.usi.edu returns 192.206.10.36

Ping command reference
PING help screen

run TRACEROUTE, determine network topology, location of servers, mail handling, firewall
Online TraceRoute to USI
TRACERT reference

NET VIEW /DOMAIN
Net Help


Scanning

automated ping sweeep on a range of IP addresses, to determine if individual systems are alive. send out ICMP ECHO packets to a target system in an attempt to elicit an ICMP ECHO_REPLY

Lots of hacker tools and network maintenance tools are available. Programs (mostly unix scripts) called fping, gping,Pinger,Ping ProPack, hping.

Programs called ICMPQUERY and ICMPUSH can request local time (see what timezone the server is in) and retrieve the subnet mask.

When the server blocks ICMP at the firewall, a TCP ping scan (a program called nmap) specifying a port are the next technique

Strobe, Netcat, Nmap, are TCP port scanning utilities


Enumeration - identifying user accounts or poorly protected shared resources

DUMP SEC - dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information

Legion 2.1 - NetBIOS tool for scanning Windows file shares

 


General IP reference
IP addressing overview
http://www.samspade.org/d/ipdns.html

ARIN.net references
http://www.arin.net/reference/index.html

good index of actual IP owners
IP address index

probably more
PDF-Everything you ever wanted to know about IP Addressing

Comprehensive intro to protocols and standards
Internet Encyclopedia

Links page
Internet domain names and IP addresses

Oreilly IP addressing fundamentals
Oreilly The Internet protocol

IPv4 versus IPv6
IPv4 versus IPv6

IPv4 - How long have we got?

Internet Gatekeepers

IPv4 Address Space Report


CIS 367 references

CIS 367 Textbook home page

CIS 367 Course HomePage

Additional Course info


Some selected links from the book

http://www.networkworld.com On-line network magazines or business of network magazines

Network World: Information and links to resources about data communications and networking.

Business Communications Review: Links to Web pages of vendors that advertise in the magazine. Includes copies of some articles from past issues.
Telecommunications: Articles and new product information from past issues, plus an extensive international listing of industry trade shows. Product listings include a brief description plus the ability to request product information from the vendor. A useful search capability can be used to search articles and product listing by keyword..

Network Computing: Articles from magazine available plus pointers to advertisers. Site also includes a hypertext network design manual with useful practical tips for end-user network design.
Network Magazine: Links to Web pages of vendors, tutorials on technical topics, and other useful information.

Vendors: Links to thousands of hardware and software vendors who currently have WWW sites, as well as a list of thousands of computer and networking companies in a Phone Directory.

IT Professional: Includes career resources and links related to information technology.
ACM Networker: Includes on-line copies of magazine articles.
Forbes: Copies of some articles from past issues are provided.
Business Week: Copies of some articles from past issues are provided. Also has a considerable amount of supplemental information.



Terry Priest
homepage
tpriest@evansville.net>