#8751 - 10/15/02 08:00 AM
Re: IP Question!!!!
|
Joined: Mar 2002
Posts: 1,273
SilentRage
DollarDNS Owner
|
DollarDNS Owner

Joined: Mar 2002
Posts: 1,273
OH, USA
|
ok, let's have a bit of harmless fun and ports shall we? Let's explore port 25. Port 25 is the SMTP port. In english, that means you send email through that port. I see you have an AOL account yes? well then, let's send an email to your aol account. open up telnet and connect to mailin-01.mx.aol.com 25 mailin-01.mx.aol.com is one of their SMTP servers and port 25 is the port providing the service. After you've connected type the following (the ## lines are just descriptions of the commands) ## First we identify ourselves HELO localhost ## Now we specify the account it was sent from. this can be just about anything MAIL FROM:< [email protected]> ## This is mailbox the email is being sent to RCPT TO:< [email protected]> ## Now we indicate that we wanna start writing the email DATA ## Now we type the headers and the email. You MUST end it with a . on a blank line From: Telnet boy < [email protected]> To: DaMaRiS < [email protected]> Subject: This is my telnet test! Hi, this is my email body. . ## Now we send the QUIT command. The email is sent QUIT Now here's a real life example as I sent you an email via telnet. 220-rly-yb03.mx.aol.com ESMTP mail_relay_in-yb3.4; Mon, 14 Oct 2002 21:04:15 -0400
220-America Online (AOL) and its affiliated companies do not
220- authorize the use of its proprietary computers and computer
220- networks to accept, transmit, or distribute unsolicited bulk
220 e-mail sent from the internet.
HELO localhost
250 rly-yb03.mx.aol.com OK
MAIL FROM:<[email protected]>
550 REQUESTED ACTION NOT TAKEN: DNS FAILURE
MAIL FROM:<[email protected]>
250 OK
RCPT TO:<[email protected]>
250 OK
DATA
354 START MAIL INPUT, END WITH "." ON A LINE BY ITSELF
From: blah <[email protected]>
To: blah4 <[email protected]>
Subject: blah7
blah8
.
250 OK
QUIT
221 SERVICE CLOSING CHANNEL
|
|
|
#8752 - 10/15/02 11:57 AM
Re: IP Question!!!!
|
Joined: Mar 2002
Posts: 217
Asteos
Member
|
Member

Joined: Mar 2002
Posts: 217
Nadia
|
/me enters friendly-newb-mode The use of an ip is to identify computers while connecting to other computers, kind of like a numerical name given to your computer that other computers can identify you as. Each is individully unique, given to your machine from your isp, as you probably already know. IP isn't a very complicated thing to understand, in my opinion, TCP, on the other hand, is a bit more complicated. If you're really interested about this sort of stuff then you probably already know from reading tuts that tcp has four layers: 1: Network Access Layer; 2: Internet Layer; 3: Transport Layer; and 4: Application Layer. ... just food for thought. http://www.good-stuff.co.uk/useful/portfull.html This is a pretty good tcp/udp port list. It will tell you what ports are used for what, if you don't already know. You can't get this kind of knowledge just anywhere <img border="0" alt="[alien]" title="" src="graemlins/alien.gif" /> What do gangs have anything to do with ip addresses and open ports? ... just curious.
=~ s/boredom/ studies/g
|
|
|
#8758 - 10/16/02 02:15 PM
Re: IP Question!!!!
|
Joined: Sep 2002
Posts: 624
black^Pimp
UGN GFX Whore
|
UGN GFX Whore

Joined: Sep 2002
Posts: 624
Underground
|
/me joins Guys, i think that what he really wanted to know is how to start hacking with IP's and [censored] stuff like that, but there is another topic here on this board in which the same question was asked or at least close to that and i remember that we've explained it pretty good so no need to ask the same thing again, i believe this is the most asked question in every board in the internet: -"I know the IP of the computer, how can i hack into it ?" and stuff like that. That was explained, DaMaRiS no offense, i'm not saying you're a newb or anything else, if you are there's nothing to be shy from, nobody is born an EXPERT, everyone learns to achieve knowledge. You said you read a lot of tutorials and so on, well i suggest you continue... Now asteos explained to you how TCP/IP layers, but i'd suggest you to learn first about the OSI layers which are maybe older but they're much easier to undestand the full things how it works, coz things there are more separated and you've got more details. Here i'll give you a short description of the OSI reference model. 7. APPLICATION 6. PRESENTATION 5. SESSION 4. TRANSPORT 3. NETWORK 2. DATA LINK 1. PHYSICAL here a good link for you to read a bit more... The OSI Seven Layers Model If you want more details about this one or anything else, just let me know ... btw: SR that was a great explanation see ya
+^Born Intelligence
|
|
|
#8759 - 10/16/02 08:51 PM
Re: IP Question!!!!
|
Joined: Mar 2002
Posts: 1,273
SilentRage
DollarDNS Owner
|
DollarDNS Owner

Joined: Mar 2002
Posts: 1,273
OH, USA
|
I can't stand the OSI model. It means nothing to me when I packet sniff. So here I'll explain "briefly" and practically what TCP packets are and how they travel.
Now like the OSI, a packet is composed of several layers. The top of this data packet is the network information. It includes the sender's MAC address (the ID for their network card) and the reciever's MAC address. It also includes the network type (token ring, ethernet, wireless of some sort, etc)
Next comes the IP layer which is usually 20 bytes long. It contains the sender's IP address, and the recievers IP address. It also includes various other information useful for the ROUTING of the packet - that is, packet transfer information. It is the IP which identifies a computer on the internet, and from which it is determined where the packet has come from, and where it will go. The sender's IP is included so that the recieving computer knows to whom it should reply. Kind of like email. You need a return address to get a reply.
Next comes the TCP or UDP or ICMP layer. The TCP layer is also usually 20 bytes and is used when you make a connection between two computers. Within the TCP, UDP and sometimes ICMP layers the port information is stored. The port is what a program listens on for a connection from another computer. There are ports from 1 to 65535 which may be used for communication. The TCP layer also includes other information which says what kind of packet it is. There's the connection request packet (SYN) an acknowledgement packet (ACK) and a packet which indicates that the user wishes to close the connection (FIN).
Now finally we come upon the data layer. The data layer is what programs use to communicate. When you open telnet to connect to another machine, the text you send is placed in this layer. Every program has a language that you must speak for it to understand. Above in my email example, I had to enter the commands just the right way for the email program on the other computer to understand me. standardization made it so that almost every time, if you connect to port 80 - you must speak the HTTP language (to ask for webpages and retrieve them). If you connect to port 21 you must speak the FTP language to login and move about on the remote file system.
To be a good hacker, you must learn as many languages "protocols" that you can so that you know how to talk to all these servers out there and perhaps trick (exploit) them into doing things for you they're not supposed to do.
|
|
|
#8761 - 10/17/02 01:28 AM
Re: IP Question!!!!
|
Joined: Oct 2002
Posts: 21
Energy
Junior Member
|
Junior Member

Joined: Oct 2002
Posts: 21
|
Both the OSI model and the TCP/IP model have their uses. If you want to know how the Internet really works from a binary perspective look at the TCP/IP model. It is pretty self-explainitory. I instead would like to talk about the OSI model as it relates to security.
Two basic rules apply when using the OSI model for security: the model does not only apply to the network, and security is applied in layers. The few examples I give here will barely scratch the surface of this topic. Many books and careers are based on this design.
Starting at the lowest layer, the physical layer, you begin to look at physical security. Fencing, guards and dogs, closed circuit TV, building entrance security, network topology, how network wiring is run, critical path flow of data, water, electricity, computer room design and security, fire controls, etc.
The next layer,the data link layer, covers things such as authenticating machines before they connect to the network, arp spoofing, network switching technology, colision and broadcast domains, etc.
The network layer can cover stack smashing, IPSec, sniffing, scanning, denial of service attacks, network design schematics, DMZs and extranets, etc.
A person designing security progresses through the whole model placing the current security implimentation into their appropriate layer. This can include firewalls (gateway, personal, and application), IDS, ssl/tsl, authentication methods (passwords, smart cards, SecureID, biometrics), database modeling, policies, access control lists, disaster recovery and continuity planning, single or multi-mode fiber, toxic waste management, computer supplier contracts and warranties, forced vacations, job rotation, audits, user education, and too many more to list here. Even software design uses this model.
Once the current security has been broken up into the different layers the designer can see where the holes in the different layers are and patch them accordingly.
So you see when viewing security it is not just what comes over the wire (the TCP/IP model), but how well all layers of the OSI model are protected.
|
|
|
#8764 - 10/18/02 09:35 AM
Re: IP Question!!!!
|
Joined: Mar 2002
Posts: 71
CryptoKnight
Junior Member
|
Junior Member
Joined: Mar 2002
Posts: 71
|
hahaha. Is it only me or does anybody else find it amusing that this guy keeps stressing the point that he/she is in a gang. I don't know, I just found it a bit comical
"If you let your wife stand on your toe tonight, she'll stand on your face tomorrow morning" - Sir/Saint Thomas More
-CryptoKnight-
|
|
|
|
Forums41
Topics33,701
Posts68,795
Average Daily Posts0
|
Members2,173
Most Online1,567 Apr 25th, 2010
|
|
|
Okay WTF?
by HenryMiring on 09/27/17 08:45 AM
|
|
|
|
|
|
|
|