Skip to main content

Posts

Showing posts from December, 2014

Ethical hacking simplified. IPv6 autoconfiguration (System fundamentals)

Autoconfiguration Your feedback is really important. For suggestions and corrections you can drop your comments. Thanks  This ease the burden on network administrators. It allows the devices to assign network addresses to themselves automatically with a link-local unicast address. The autoconfiguration is the same with the IPv4 DCHP (dynamic host configuration protocol) they both configure devices/hosts automatically. By default an IPv6 host can configure a link-local address for each interface. Using router discovery, host can learn the address of routers, additional and other configuration settings. The router advertisement message (this is a multicast message the router always send out to help the IPv6 to configure itself) states whether the address is going to be stateful configuration. NB: autoconfiguration can only be done on interfaces that support multicast addressing. This autoconfiguration is fully described in RFC 2462 IPv6 stateless address autoconfiguration.

Ethical Hacking simplified. IP version 6 (System fundamentals)

IPv6 IPv4 address contains less than five billion addresses. With the technological advancement IPv4 cannot is almost if not already outnumbered. Here comes the BOOM! IPv6! It comes with an unlimited addresses which if it every human, animals trees impact anything you can think of is given address in cannot be outnumbered! Yeah!! anything including the human/hair grain of sand! Stop thinking you heard me right! IPv6 solved any problem regarding addressing system shortages. Although it comes with many upgrades, impact is an overhaul of IPv4. IPv4 is divided into 4 parts, while IPv6 is divided into 8 parts! Example 2001:0df9:4cd7:0011:0000:0000:3541:35da The first three are the global prefix, followed by the subnet and the last four are the interface. Ohh I thought technological advancement is to make things easier not complicated! Laughing.... don't worry IPv6 is easier than IPv4. Whats easy here! A chunk of letters and numbers all together? Hmmm... don ' t forget

Ethical Hacking simplified (System fundamentals) IP subnetting.

I P Subnet t ing IP subnet t ing is the breaking down of IP address into smaller chunks. It is the act of creating multiple networks out of a particular IP address. Classful and Classless Subnetting Classful subnetting is the normal class A, B, C, D addresses. In every network when a broadcast is sent, it makes sure it goes through all the available IP addresses in the network. Lets take for example, you want to set up a network that can contains only 100 host, which class of ip address are you going to use? The answer will be class C address. Mind you class C can contain more than two hundred amounts of hosts! So you are wasting more than 100 IP addresses. C lassless subnet t ing solve the problems of wasting ip addressing and creating not-worthy network traffic. In classless subnetting the Class A, B & C addresses are broken down into smaller parts, thus making broadcast smaller. If the broadcast are smaller the network traffic will definitely be stable only n

Ethical hacking simplified (System fundamentals) Introduction to IP addressing.

Introduction to IP addressing IP address is the addressing system used in network to identify network devices, host etc. its a unique way which repetition is not allowed especially on the internet and within LAN local area network. LAN is group of devices on the same network address that connect to the same network device. Types of IP address IPv4 (IP version 4) IPv6 (IP version 6) IPv4 is the most commonly used IP address, its defined as a 32bit address which can contains up to 4,294,967.296 four billion, two hundred and ninety four million, nine hundred and sixty seven thousand two hundred and ninety six addresses. Wow it sound many! Can we actually exhaust this addresses? The answer is capital YES! These addresses has already been exhausted. Billions of devices are on the internet today. Example of IPv4 10.1.1.0 IPv4 is grouped into four classes namely A, B, C, D and E . although only the A,B and C are in use. The class E addresses are used for multic

Ethical Hacking simplified (System fundamentals) OSI reference model

this is the continuation of OSI reference model for layer 5 to 7 here  layer 4 here   Network layer (layer 3) This l ayer take control of the way the network addressing works. It deals with managing IP addressing, tracking device location, and choose the best path to transmit data. Network layer again is after sending data to devices that do not belong the same local network. The Router (also known as layer 3 device) routes packages between different networks. When a package arrived at layer 3, the router checked the source and destination network address (don't worry we will discuss that later) if it matched? Then the router has nothing to do with it, because they belong to one LAN(local area network i.e. The same network) and router only route packages between different networks or LANs. Take for example, when making a local call (within the same country) do you need and IDD (international direct dialing) number? That +234 stuffs . The ans is definitely n

Ethical hacking simplified (System fundamentals). OSI reference Model.

Inter-networking models  (System fundamentals continuation)   The word inter according to word web dictionary means between or among. Network as already defined is a system which permits devices to share common resources together. Inter-networking simply means sharing resources between different networks. Initially when networking started devices can only interconnect between devices from the same vendors. Meaning HP machines can never interconnect with Dell machines. Example is take for example your HP machine cannot work on any network that is not a HP network! Meaning all the network must be made up of HP devices. This can be tedious, it only promote monopoly. The most popular system will always dominate the market, end users (consumers) have no choice than to stick with the popular device so as to share resources. To solve this problem the ISO (international standard organization) came up with a solution. The hero was born to save the networking industry from monopo

Ethical Hacking simplified Network topology (Fundamnetals of system).

Network Topology Before you attack or prevent attacking on anything, you need to know how the system works. One of the most important thing to know its fundamentals is the network. Today I'm introducing you to networking fundamental. A network is the interconnection of two or more devices to share common resources (data, peripherals etc). Since we are just going to brush through networking there is no need to dive deep. Network topology Network topology is a graphical representation of the network. Network topology again can be seen as map of the network, because it represent how all the devices are connected and how they are using the network. Classifications of topology Physical topology represent how each devices is located, physical location, cable wiring etc. Logical topology represents how the devices used the network regardless of their location, it grouped the devices based on their logical addresses, software installed etc. Basic Netwo

Windows safe mode explained.(Everything you need to know)

Windows safe mode explained Safe mode is a scary non impressive environment, where your machine will log into a desktop environment which is so boring! Yeah so boring! because many drivers and software are not available. If for example you left your computer system with a friend, brother or son, on coming back you saw this scary desktop environment, the first thing that will come to your mind is this guy messed up with my system, if care is not taken I have to spend my hard-earned money to fix it! Especially when you notice those safe mode alert at every corner  of your machine  desktop. Laughing.  Don't panic this is just normal. The safe mode environment is indeed a safe place for troubleshooting and maintenance on  PC (windows machine). Its one of the ways that makes windows machine unique thus giving user an interface to get rid of strong-headed software or files which where infected by malwares, viruses etc. when system boot in safe mode, only the basic software and dri

Ethical hacking simplified

Introduction to Hacking Disclaimer: What I am about to teach you is highly sensitive. I am doing it for educational purpose only! ICTmagazine is not liable for any harm caused by you in attempt to intrude any system. Continue reading shows your acceptance of our disclaimer! Hacking is an attempt to bypass computer or network security system legally or illegally. Although both the legal and illegal hacking shares some similarities and differences respectively. The person that carries out hacking is known as hacker. A legal or illegal hacker use software, techniques etc. to get access into the target network or individual. One might be surprised to hear of legal hacking or hacker. This really exist! Think of an intruder in your house, it might be for good or bad! Laughing, how can an intruder into ones house be for good? Nice question! Lets say for example, you traveled out and left your house locked. Your neighbor called you complaining of cooking gas leakage from your locke