So finally after a long time a practical blog.
In this blog, I will give you the knowledge of hacking.
Hacking is done with steps, it is just like stairs i.e step by step.So before attacking someone or hacking someone, we must have all knowledge of the victim.
- Footprinting.
- Scanning.
Foot-printing means information gathering like victim's IP address, email address, Name, Ph no. etc.
This information means 50% work done.
And second comes Scanning ports, no let me explain you about ports:
Now port, like in the communication we have Starting and ending points so basically port is the ending point like if we start the computer server it has receiving and sending i.e starting and ending.
We know about Airport, it is a place where airplanes end its journey same as a seaport, all the ships end there journey there, so the port is the ending point.
It also uses in differentiating services like now every service has there particular port like we surf HTTP its port number is 80.These ports help in entering victim's server.
So today is the practical of foot-printing means the first step means info gathering:
So in this practical video, we collect information from the website named www.whois.sc this website gives all the information of the target i.e IP address, e-mail, phone number, location etc.
if on this site you entered someone's website suppose www.google.com then it will give all the information about it and all means all.
This website can even search the IP address.
This is totally legal work there is nothing like illegal here, everyone, anyone can use it at any time.
And in it we also talk about the PING, this is the tool or command used in cmd to known wether the target is active or not.
This is clearly understood by its working in the video, in this if a total number of packets send=total number of packets received then there is 0% loss means a target is online.
This is also mandatory that the target is alive at rhe prestent moment because inactive of the target may causes many problems like unsufficient or impartial tranfer of the packets in which a person get known about the spy this is the biggest problem to known about it ,because once the target know about the hack he/she will get to known about the hack ,and the next attack will became unsuccessful.
After all of this here comes the Scanning, scanning plays the vast role is hacking.
Scanning generally means scanning the ports these ports are to be scan and from this ports the attacker sends the information or the trojan to it and effect the system or server.
This what the main basic of hacking and all these help in the hacking and even cracking.
this plays wise role in the information of things.
Now lets talk about IOT or internet of things,
all the technology contains iot can hack some or the other way.
things which is non-iot can hack to some limits.
but in the day to day life, nowadays the countries becoming developed and nowadays the home is also also based in it .now what this means .in America the homes are built with the iot like if we say "off " then the lights or the fans is off this is what the iot means.
There is the course of iot
iot also contains cyber security, which has high scope nowadays.
now btech introduced the new fields i.e BACHELOR OF TECHNOLOGY (computer science)(iot)
After all this, it becomes the vast field of it.
hence this is what i want to explain to you all
thank you for today will meeet you soon with the nwe blog and videos tutorial so stay tuned.

No comments:
Post a Comment