
Website Hacking
Website hacking is a way to break or circumvent into the password protected sections of a website. There are two types of website hacking:
- Break the password protected sections.
- You can deform or modify a website.
In website hacking, the hacker collapses the information, and makes changes in the infomation. E-mail Hacking All email communications on the internet are possible by two protocols: 1. SMTP port-25 (simple Mail Transfer Protocol) 2. POP port-110 (Post Office Protocol) E-mail tracing is the path that is taken by an email while travelling from the sender to the receiver. It is further explained in the diagram below:
The most effective way in tracing an email is to analyze its email headers. Just view the full header of a received email. A typical email header looks like this:
The email header above gives us the following information about its origin and path:
The sender’s email address: atiles@destatis.de
The source IP address: 141.203.33.92
The source mail server: dsl-189-160-34-89.prod-infinitum.com.mx
The email client: Thunderbird 2.0.0.6
The source IP address: 141.203.33.92
The source mail server: dsl-189-160-34-89.prod-infinitum.com.mx
The email client: Thunderbird 2.0.0.6
Network Hacking
Network hacking means gathering information about the domain by using tools like Ping, Netstat, Telnet, Tracert, etc.
Ping is a part if Internet Control Message Protocol (ICMP) which is used to troubleshoot TCP/IP networks. Basically, it is just a command that allows you to check if the host is alive or not. Here’s how to ping a particular host: Go to the command prompt. You can just click start > run > then type cmd
Once you opened the command prompt, type in: c:/>ping hostname.com
No comments:
Post a Comment