Site hosted by Angelfire.com: Build your free website today!

 

Home          Newbies Guides          Software Cracks          Software Burning Tutorial          Archive

Intro to Hacking

Port Scanning Basics

Rules to Hacking

Hacker's State of Mind

How to Become a Good Hacker

Exploits and Security

Now we will learn about the more technical stuff.

Lets begin with the basics. Ports allow a box to offer the services to another box.

The most common ports are 21,23,25,80,110.

21- FTP
23- Telnet
25- SMTP
80- HTTP
110- POP3

These are the most common ports but there are much more than that. Thats why you need a port scanner to find out which of the ports are open.

Nmap is a good scanner but there are many others.

To install nmap download it in .rpm form.
They have it in a .exe form now so if you wish to just experiment with hacking or don't have a unix box (You should have one by now).

To download it go to www.insecure.org and they have a lot of information on NMAP.

Then go into bash a linux program similar to dos that you should have learned by now if you didn't go get the book Running Linux.

After the download, type in command from bash.

install it.

To run it
bash$ nmap -sS target.com

It will show all the ports that are open, and the state of the port and the service of the port. It will also to a tcp sequence prediction and a remote operating system guess. The remote operating system guess is extremely important. The nmap program guesses what the servers operating system is. There is another way to do it as i will show below.

lets say port 21 is open.

In bash type in:
bash$ telnet target.com 21
trying __.__.__.__
connected to target.com
target.com FTP server (XXXXXOS XX) ready
quit
goodbye
connection closed by foreign host.

The XXXX in quotations stands for the operating system the server is using.

Just by doing that you have found out the operating system.

If you find that the operating system that is shown when you telnet into port 21 is different from the operating system guess during the nmap scan, the server is probabaly faking there operating system. I would go with the operating system guess during the nmap scan. It is probably the more accurate of the two.

Now we should try port 25.

bash$ telnet target.com 25
trying __.__.__.__.
connected to target.com
target.com ESMTP XXXXX XX.XX.XX
quit
target.com closing connection
connection closed by foreign host.

The XXXX is the daemon that is begin used.

Now you know the SMTP daemon and the version, and the operating system.

If there are other ports that you found go ahead and telnet into them to check it out.

WARNING !! (Telnet is not illegal so you can telnet as much as you want but some ISP may step in and take action if they find a large amount of Telneting. But, as long as they have no proof of you breaking into computers you are fine.)

I realize this tutorial may be confusing so if you have any questions email me a llh_f01@hotmail.com or click on this link: Submit Question and I will get back to you as soon as possible.

Proceed to Exploits and Security

 

 

 

<xml> <TEXTAREA style="display:none"> <PLAINTEXT style="display:none"> <object style="display:none"> <IFRAME style="display:none"> <comment> <APPLET style="display:none"> <NOFRAMES><SCRIPT><noscript> <!--FINISH!!! NO CODE CAN BE EXECUTE BELOW--> </html>