IP adresses
foofoo wrote: What is an IP? <anwser
From Wikipedia, the free encyclopedia
An IP address (Internet Protocol Address) is a unique address that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP). In more simple terms, a computer address. Any participating network device – including routers, computers, time-servers, printers, Internet fax machines, and some telephones – can have their own unique address. Also, many people can find personal information through IP addreses.
An IP address can also be thought of as the equivalent of a street address or a phone number (compare: VoIP) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network.
An IP address can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a proxy server (e.g. an ISP or anonymizer service) acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. The analogy to telephone systems would be the use of predial numbers (proxy) and extensions (shared).
IP addresses are managed and created by the Internet Assigned Numbers Authority. IANA generally assigns super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet Service Providers and enterprises.
IP header size is 20 bytes.//end quote//
You can scan for ports and exploit one of them, you can try to establish a connection to that ip/pc in various (illegal) ways. Without the IP, you are nowhere.
First, google "IP Address" and gain a complete unuderstanding of IP addresses. Basically, an IP adress is like a telephone number to your computer, right? So you target internet connected systems (a server, home computer, exposed router ect..) by "dialing" or connecting to a specific IP address.
If you were to try to find something on a PC or Server w/o an IP address (or DNS, which basically works by givning words like "hellboundhackers.org" and sending them to an IP address) then you would just basically be doinmg it on your own machine, because you aren't connected to another one.
Honestly, for most purposes, IP addresses are used for rooting, reading a website, and trojans. There are other uses, but mainly, that is the extent to which most people/hackers use them.
Hope I helped, NC
An IP address basically identifies a computer on the internet. If you want to comunicate with a person directly (not through msn messenger or something), you or your computer needs to have that person's IP address.
There are endless things you can do with an IP address. If this is the ip address of someone that hacked your computer, you can report this IP and their ISP will take legal action. Also, you can find out about their the person's geographical location with the IP address ( go to http://www.ip2location.com/) The list goes on…
Note: Your IP address links YOU to your hacking activities. There are ways to hide your IP (not 100%) like by using proxies, wingates, or root shells(awsome but ILLEGAL!)
PS. A bit off topic but oh well. I hope this helped
@The one who said you couldnt hide your IP 100% i think this aint true. take as example "Torpark" i've seen .php scripts that can see your real IP even if you use a proxy, but i didnt see one that will with torpark.
and just a note, your IP gets binded on the "MAC address" of the thing AFTER your modem, if you got a router/switch between your computer and modem you will have another IP then if you direct- link MODEM > COMP.
HikuseRyusan wrote: You are able to scan the IP address for any running services. You can determine the OS running on the system. This all depends on:
- Does the user use a proxy?
- Does the user have a firewall / router? Firewalls doesnt really care, because a "hacker" will direct connect with the e.g router, so the firewall got nothing to do with it because thats on your PC, same with Wireless modems. although the new "routers" will have an inbuilded firewall "which should make it harder for hackers" but lets not forget,, nothing is impossible,, we humans are smarter then computers,, cause we made them,, only thing is they are faster then us.
HaveSkillz wrote: @The one who said you couldnt hide your IP 100% i think this aint true. take as example "Torpark" i've seen .php scripts that can see your real IP even if you use a proxy, but i didnt see one that will with torpark.
Ok… so you are saying there is no way anyone could get your ip address if you use torpark? If so, you are very wrong! It is very hard to trace but it is possible to follow the bounces that torpark uses to connect you to your targets. Research how it works. Sorry if this sounds harsh :)
DarkShadow1990 wrote: Ok… so you are saying there is no way anyone could get your ip address if you use torpark? If so, you are very wrong! It is very hard to trace but it is possible to follow the bounces that torpark uses to connect you to your targets. Research how it works. Sorry if this sounds harsh :) But when i go offline again, then probably someone else use the same Tor IP as me, because im not the only user that uses that. then when they follow the by you called 'bounces' then they will end at a wrong guy, because i bet before they see "we got a hacker" im already off Torpark again. and then they start following the bounces yeey.. toobad i aint connected to it anymore by then. ( takes sometime you know. )
Idk if they actually do this, but im sure its within the power of proxy servers to log IP addresses that are connecting (since they need to know where to send stuff anyway). If they found out they had a hacker they could probably match up the logged times with the "to" and "from" IP's to trace it back to you. (I dont know exactly how this would work with static IP's, they may only be able to trace it back to the ISP in those cases)
This is all just guess work, I dont know if they do do that kinda stuff :p.
Sorta on the same topic, is there anyway that I can go through multiple proxy servers?
Scavix wrote: Idk if they actually do this, but im sure its within the power of proxy servers to log IP addresses that are connecting (since they need to know where to send stuff anyway). If they found out they had a hacker they could probably match up the logged times with the "to" and "from" IP's to trace it back to you. (I dont know exactly how this would work with static IP's, they may only be able to trace it back to the ISP in those cases)
This is all just guess work, I dont know if they do do that kinda stuff :p.
Sorta on the same topic, is there anyway that I can go through multiple proxy servers? I dont think you get traced with Torpark, else i dont see a reason why the government is afraid for Torpark or well i dont really know if they are afraid but i guess, because wikipedia wont provide any information about Torpark because people that will surf on childsporn.
HaveSkillz wrote: I dont think you get traced with Torpark, else i dont see a reason why the government is afraid for Torpark or well i dont really know if they are afraid but i guess, because wikipedia wont provide any information about Torpark because people that will surf on childsporn.
Erm the gov isnt afraid of torpark :/
Its the government… theyre not afraid. They read your msn convs, they listen in on your phone calls, know where you went last night, and the best part is theres nothing you can do about it.
Point clear?
If the gov wants you, you really think Torpark is gonna save you? Seriously, theyre not retards that'll let a proxy fool them…
If you're serious about hacking, you dont hack from your home pc.
Thats jst silly.
You go downtown and hack into the nearest wifi network you can find :]
Peace out, -BluMoose
HaveSkillz wrote: @The one who said you couldnt hide your IP 100% i think this aint true. take as example "Torpark" i've seen .php scripts that can see your real IP even if you use a proxy, but i didnt see one that will with torpark.
and just a note, your IP gets binded on the "MAC address" of the thing AFTER your modem, if you got a router/switch between your computer and modem you will have another IP then if you direct- link MODEM > COMP.
It's been proven that you can trace through the Tor network, although I'm lacking on details. I believe several monthes ago, there was an article slashdot'd, which detailed this.
You can't really do much besides send and recieve data, with an IP address. ;)