<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: AMI_GOT_BUGGED</title>
    <description>The latest articles on Forem by AMI_GOT_BUGGED (@ambermishra).</description>
    <link>https://forem.com/ambermishra</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F359138%2Ff31a1f03-c40f-40b5-988b-99e24f1f2c18.jpeg</url>
      <title>Forem: AMI_GOT_BUGGED</title>
      <link>https://forem.com/ambermishra</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ambermishra"/>
    <language>en</language>
    <item>
      <title>Hacking 101 — Footprinting (Theory Part-1)</title>
      <dc:creator>AMI_GOT_BUGGED</dc:creator>
      <pubDate>Sun, 10 May 2020 12:59:04 +0000</pubDate>
      <link>https://forem.com/ambermishra/hacking-101-footprinting-theory-part-1-4maf</link>
      <guid>https://forem.com/ambermishra/hacking-101-footprinting-theory-part-1-4maf</guid>
      <description>&lt;h3&gt;
  
  
  Hacking 101 — Footprinting (Theory Part-1)
&lt;/h3&gt;

&lt;p&gt;Hello Guys! So, as we ended up with the first article about the &lt;a href="https://medium.com/@ambermishra3011/basic-concepts-of-networking-osi-model-and-tcp-ip-model-2fac803ebe8a?source=your_stories_page---------------------------"&gt;Basic Concepts of Networking-OSI Model and TCP/IP Model&lt;/a&gt;. This day, we start with some tweaking related to the Footprinting and Reconnaissance.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Have you ever come across an episode of SHERLOCK? If not, I would definitely suggest you to. Ever, witnessed a detective trying to trace the attacker following the prints and the hints left behind. What if there is nothing left to work upon? Will the mystery solve? Similarly, if you want to apply any penetration test or vulnerability assessment on a device or want to gain its access, Footprinting makes it easy to get to know about the whereabouts of the device.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zvOwI7Vi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AAxatrJSb7R0kL4XJ1BLwnw.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zvOwI7Vi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AAxatrJSb7R0kL4XJ1BLwnw.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is Footprinting?
&lt;/h3&gt;

&lt;p&gt;Footprinting allows you to gather information about the device on which you are trying VA/PT. This helps you to gain information on the target PC. Now there are various factors on which the system tries to gain the information on as:-&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Network information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Domains, Subdomains, IP addresses, Whois and DNS records&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;System information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Web server operating systems, Server locations, Users, Passwords&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Organization information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Employee information, Organization’s background, Phone numbers, Locations&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Now if we go for the objectives of the Footprinting, they are:-&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Learn security posture Analyze the security posture of the target, find loopholes, and create an attack plan.&lt;/li&gt;
&lt;li&gt;Identify focus area Using different tools and techniques, narrow down the range of IP addresses.&lt;/li&gt;
&lt;li&gt;Find vulnerabilities Use the collected information to identify weaknesses in the target’s security.&lt;/li&gt;
&lt;li&gt;Map the network Graphically represent the target’s network and use it as a guide during the attack.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9lmWNeng--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AIWg873ihjaXKX1-9upPzUw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9lmWNeng--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AIWg873ihjaXKX1-9upPzUw.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There are two types of footprinting — Active and Passive&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When an attacker is in direct contact with the user or the victim to gain the information it’s known as &lt;strong&gt;ACTIVE FOOTPRINTING&lt;/strong&gt; eg calling the victim etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This Includes:-&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;em&gt;Performing WHOIS analysis&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Performing Social Engineering&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Performing Traceroute&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Querying Published name server&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Extracting DNS information&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Using e-mail tracking&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Web spiders&lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If the attacker tries to juice out information from the victim without coming into direct contact it’s said to be &lt;strong&gt;PASSIVE FOOTPRINTING&lt;/strong&gt; eg Social Media information gathering etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This Includes:-&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;em&gt;Finding Information with the help of Search Engines&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Finding the TLD’s(Top-Level Domains) and Sub-Domains&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Extract Information by the internet archive&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Monitoring the website traffic of the victim&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Tracking the online reputation of the target.&lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_8JncuDr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AU8AoTFWM9F2IrQmREtieoA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_8JncuDr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AU8AoTFWM9F2IrQmREtieoA.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now as we know why and where do we need Footprinting for, let us go for the HOW?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bBLMkXXV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2ADyX0FJcXwX21eoEZM30NVg.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bBLMkXXV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2ADyX0FJcXwX21eoEZM30NVg.gif" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;So Footprinting can be done by these methods.&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Footprinting through search engines.&lt;/li&gt;
&lt;li&gt;Footprinting through web services&lt;/li&gt;
&lt;li&gt;Email Footprinting&lt;/li&gt;
&lt;li&gt;Website Footprinting&lt;/li&gt;
&lt;li&gt;Footprint through Social Network&lt;/li&gt;
&lt;li&gt;Competitive Intelligence&lt;/li&gt;
&lt;li&gt;Whois Footprinting&lt;/li&gt;
&lt;li&gt;Network Footprinting&lt;/li&gt;
&lt;li&gt;DNS Footprinting&lt;/li&gt;
&lt;li&gt;Footprinting through Social Engineering&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kCHeqh4e--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1000/1%2APstRlFNZ85E-VBHb6fL-Sg.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kCHeqh4e--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1000/1%2APstRlFNZ85E-VBHb6fL-Sg.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;So as we have covered the &lt;strong&gt;methods and concepts&lt;/strong&gt; of Footprinting, we will proceed with the &lt;strong&gt;tools and countermeasures&lt;/strong&gt; for it in the coming up thread.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;PS: We’ll be needing ParrotOS or KALI in the next thread.&lt;/p&gt;

&lt;p&gt;Till then!!&lt;/p&gt;

&lt;p&gt;Happy Reading :-)&lt;/p&gt;

&lt;p&gt;-Amber Mishra&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybercrime</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Hacking 101 — Phases of Attack</title>
      <dc:creator>AMI_GOT_BUGGED</dc:creator>
      <pubDate>Tue, 07 Apr 2020 16:16:00 +0000</pubDate>
      <link>https://forem.com/ambermishra/hacking-101-phases-of-attack-10mc</link>
      <guid>https://forem.com/ambermishra/hacking-101-phases-of-attack-10mc</guid>
      <description>&lt;h3&gt;
  
  
  Hacking 101 — Phases of Attack
&lt;/h3&gt;

&lt;p&gt;Hello readers!&lt;/p&gt;

&lt;p&gt;So in the last article of the thread, we covered — &lt;a href="https://medium.com/@ambermishra3011/basic-concepts-of-networking-osi-model-and-tcp-ip-model-2fac803ebe8a?source=your_stories_page---------------------------"&gt;Basic Concepts of Networking-OSI Model and TCP/IP Model&lt;/a&gt;. This gives you an overview of Networking and will only be required in some of the further articles, coming up. I’ll be covering the other concepts as soon as we proceed on this journey.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--t8tQ5H0z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2ARhq5pOA3bMZkUgz3h5FMQQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--t8tQ5H0z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2ARhq5pOA3bMZkUgz3h5FMQQ.jpeg" alt=""&gt;&lt;/a&gt;CSO ONLINE&lt;/p&gt;

&lt;p&gt;Before getting on the journey, I would like to introduce you to it. I would like you guys to be comfortable and get amiable with the Phases of Attacks that will introduce you to the proceedings of Vulnerable Assessment(VA) and Penetration Testing(PT). As we know categorization and flowcharting play a vital role in visualization and understanding of the content. These phases will be completed and covered in detail in the next releases.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;These phases are also categorized into 5definite steps.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TwcAE47P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/602/1%2AayhudQQ2r7l-ogCZzFKXrA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TwcAE47P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/602/1%2AayhudQQ2r7l-ogCZzFKXrA.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;1.Footprinting and Reconnaissance&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--slc65xSC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/415/1%2AtKnGX8J4RKMPSdcOds5E-A.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--slc65xSC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/415/1%2AtKnGX8J4RKMPSdcOds5E-A.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is the primary information that a penetrator tries to gain.Footprinting allows you to gather information about the device on which you are trying VA/PT. This helps you with the sensitive information of the target machine. It also involves Social Engineering.This includes the information as Domain name,IP Addresses,Namespaces,Employee information,Phone numbers,E-mails,Job Information, etc.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  2.Scanning and Enumeration
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7PgnG57s--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AFGjpyE3w89yDdikwi4epOA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7PgnG57s--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AFGjpyE3w89yDdikwi4epOA.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Once you do footprinting and reconnaissance, you get your domain a bit focussed the further attacks. In scanning and enumeration, you use further techniques to continue to exploit and gather more in-depth information on the same field i.e. scrutinized during the examination of the network earlier.This gives up all the vulnerabilities of the victim. Tools that we may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  3.Gaining Access
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HvYZzRaK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AkwiA-mFPWuArnPKcqIjZtg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HvYZzRaK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AkwiA-mFPWuArnPKcqIjZtg.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;After you have collected all the information in the initial two phases, you use them to gain access to the victims' device. A blueprint is created by the tester based on the Phase1 and Phase2 information. This is the main penetration phase where all the jiggly stuff takes place. In this phase, all the vulnerabilities are exploited extensively one-by-one. The method of connection the penetrator uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. Gaining access is known in the testers' paradise.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  4. Maintaining Access
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---8OdyTC3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/741/1%2A7jam6ij6GlxdVOYrGZwKow.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---8OdyTC3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/741/1%2A7jam6ij6GlxdVOYrGZwKow.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Once, access has been gained, it's very important to maintain it for further use. Once the penetrator has gained access, they want to keep that access for future exploitation and attacks. Sometimes, they harden the system from other exploiters or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the tester or miscreant owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  5. Covering Tracks
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4NR-EnTF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/800/1%2AEXHrnC5mvKw6wG5krMFHZw.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4NR-EnTF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/800/1%2AEXHrnC5mvKw6wG5krMFHZw.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If you are already jumping with joy after these 4 steps, probably it’s an early celebration. Why? Let me tell you. After the attack has been done and the security has been compromised, the security response teams or the victim will come after you. It’s very important to cover your own tracks or else you’ll end up uncovering your own coven. Penetrators try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mgunMJYp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2APdHpyuLqCXyYOU-JB4uXGA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mgunMJYp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2APdHpyuLqCXyYOU-JB4uXGA.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So here was the quick input on the major 5 stages that takes place during the VA/PT process.&lt;/p&gt;

&lt;p&gt;PS: All the phases will be described further in the next articles of the thread. Till then,&lt;/p&gt;

&lt;p&gt;Happy Reading!&lt;/p&gt;

&lt;p&gt;-Amber Mishra&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Basic Concepts of Networking-OSI Model and TCP/IP Model</title>
      <dc:creator>AMI_GOT_BUGGED</dc:creator>
      <pubDate>Thu, 02 Apr 2020 08:59:47 +0000</pubDate>
      <link>https://forem.com/ambermishra/basic-concepts-of-networking-osi-model-and-tcp-ip-model-1ald</link>
      <guid>https://forem.com/ambermishra/basic-concepts-of-networking-osi-model-and-tcp-ip-model-1ald</guid>
      <description>&lt;p&gt;Hello Readers!&lt;/p&gt;

&lt;p&gt;I know we all want to skip to these basics and directly want to jump to the place where there are codes, tools, and tweaks that will be applied to start all the sneaky tech we have been boasting about from the beginning. Perhaps I’m eager too, to start covering those topics. But, we know that without having any building blocks the further topics are gonna look greek Zuzu to you.&lt;/p&gt;

&lt;p&gt;So let’s start with the Basic Concepts of Networking. Starting with the OSI model and then further with some necessary packet headers, protocols and port numbers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--A8q6JtBY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/702/1%2AIH5UUf6KnlMx042YbM3WLg.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--A8q6JtBY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/702/1%2AIH5UUf6KnlMx042YbM3WLg.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  OSI (Open System Interconnection) MODEL
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;It’s a 7-layer reference model that is used by all the communicaion systems to maintain a standard for every function they perform. This helps them to communicate easily with each other and also for understanding and categorization of the same. This also helps the communication system device vendors to build an architecture for the same amicably.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FAhMLXXf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/804/1%2AHVsiWW1C60UBGkpn-hxc7g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FAhMLXXf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/804/1%2AHVsiWW1C60UBGkpn-hxc7g.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, I would like to keep this explanation in the form of a string of situations and would try to cover the concepts for all of them as we proceed.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Have you ever used an online banking system or any social media website?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;When you connect to the internet or when you put the ethernet cable that comes under the &lt;strong&gt;Physical Layer(1)&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Physical Layer consists of the physical transmission medium for transferring the raw and unstructured data.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now when the network connectivity is established, how the data would be encapsulated for the further layer and medium of access over the network in the responsibility of the &lt;strong&gt;Data Link Layer(2).&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Data Link Layer provides the node-to-node transfer. It is responsible for the protocol to be established. This layer has two sublayers.&lt;/p&gt;

&lt;p&gt;MAC(Media Access Control) Layer:- This layer has it’s role to control how the devices gain access to medium and permission to transmit data.&lt;/p&gt;

&lt;p&gt;LLC(Logic Link Control) Layer:- this identifies to encapsulate the network layer protocol, checks error and synchronizes.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When the data is encapsulated it gets converted to the packets at Layer 3 — The &lt;strong&gt;Network Layer(3)&lt;/strong&gt;. In this layer, the packets can travel to different networks as well.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Network Layer converts the data into packets and helps it to send to various networks. The data on this layer travels using IP addresses, with the help of which the data reaches its destination.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now when the data packet is being sent over the network, there will be protocols that help them over the network and ensure that how the data is being transferred. Now the &lt;strong&gt;Transport Layer(4)&lt;/strong&gt; is responsible for it.&lt;/p&gt;

&lt;p&gt;The transport layer provides the functional and procedural means of transferring variable-length data sequences from a source to a destination host while maintaining the quality of service functions. They can ensure the reliability of the link as they do error checking during Segmentation/Desegmentation, with the help of which they can resend the packet from where it failed.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;There are two types of protocols in it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TCP(Transfer Control Protocol):-&lt;/strong&gt; This protocol ensures that the data is transferred. Thus, this uses a 3-way handshake methodology.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TxFmiylP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/660/1%2AIJxirTfwF8sVm4Xe3ACdYg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TxFmiylP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/660/1%2AIJxirTfwF8sVm4Xe3ACdYg.png" alt=""&gt;&lt;/a&gt;In the &lt;strong&gt;three-way Handshake&lt;/strong&gt;, the client starts communication with a server by sending a&lt;strong&gt; SYN&lt;/strong&gt; packet, to this synchronization packet the server sends a&lt;strong&gt; SYN/ACK, &lt;/strong&gt;where a Synchronization request is sent and also an acknowledgment is done for the previously received sync packet. To the now received SYN packet from the server, the client sends an &lt;strong&gt;ACK &lt;/strong&gt;packet for the acknowledgment of the received SYN packet from the server.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This makes the TCP a reliable source to send messages, for the highest priority. For example, the Net banking Transaction, log in and etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;UDP(User Datagram Protocol):&lt;/strong&gt; This protocol is not so reliable, it doesn’t ensure that the packet has reached the destination. Therefore not so important things are sent over UDP, for example, VoIP packets.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now, when the data is transferred, a session is created between you and your banking server. The process of creating a session and providing you with a secured Session-Id is done by the &lt;strong&gt;Session Layer(5)&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The session layer is responsible for the dialogues between the systems. It can establish the procedures for checkpointing, restarting or suspending an ongoing connection.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now, when the session has been established the data is shown into several forms and using various languages. Thus this is also known as the syntax layer. This provides the interdependency of choosing the form of representation of data. This is done by the &lt;strong&gt;Presentation Layer(6)&lt;/strong&gt;. The language in which the page of the Net-Banking is written comes in this layer.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Data can be written in various forms and languages like Python, XML, etc and then are further encoded in various ways. This layer presents the structures of the various encoding rules.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When the encoding has been done, it’s time for the visibility of the data. The data can be shown on various codecs and applications which is considered into &lt;strong&gt;Application Layer(7)&lt;/strong&gt;. Therefore, when you see that Net Banking webpage, that is shown by the Application Layer.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. The most important distinction in the application layer is the distinction between the application-entity and the application.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  TCP (Transfer Control Protocol) Model
&lt;/h3&gt;

&lt;p&gt;The TCP Model is also a reference model that came after the OSI Model. The TCP model came to cut-short the OSI Model and reduce the strict boundaries at each layer. Thus this model was made of 4 layers including and combining some of the OSI Layers into one.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YcLsd5P4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/475/1%2Awm2X5tW-3zpaSfnxLwrpCg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YcLsd5P4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/475/1%2Awm2X5tW-3zpaSfnxLwrpCg.png" alt=""&gt;&lt;/a&gt;Therefore, we can see how the layers are mixed into one to form the TCP Model.&lt;/p&gt;

&lt;p&gt;The final scenario of the OSI Model and the TCP Model is given in the figure below. This shows the protocols on each layer of both the models.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CC4aohz---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AYAk0IJSyP8AJTLeTjFOWJA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CC4aohz---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AYAk0IJSyP8AJTLeTjFOWJA.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you have any doubts regarding any of the layers, feel free to ping in the comment section below.&lt;/p&gt;

</description>
      <category>networking</category>
      <category>networksecurity</category>
      <category>osi</category>
      <category>hacking</category>
    </item>
    <item>
      <title>Get Live with Hacking 101 — Pilot</title>
      <dc:creator>AMI_GOT_BUGGED</dc:creator>
      <pubDate>Wed, 01 Apr 2020 16:15:56 +0000</pubDate>
      <link>https://forem.com/ambermishra/get-live-with-hacking-101-pilot-je4</link>
      <guid>https://forem.com/ambermishra/get-live-with-hacking-101-pilot-je4</guid>
      <description>&lt;h3&gt;
  
  
  Get Live with Hacking 101 — Pilot
&lt;/h3&gt;

&lt;p&gt;Have you ever dreamt of sitting in a dark room wearing a hoodie? A room where you can only see laptops, PCs and bigger screens with red and green lights surrounding you. Yes! cutting the lost story short, have you ever thought of being a hacker? If your answer is YES! Then this coming thread is for you.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KBdFVBGM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Ayy3OxD2QuqoVe9TX-tfmGw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KBdFVBGM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Ayy3OxD2QuqoVe9TX-tfmGw.png" alt=""&gt;&lt;/a&gt;Source: Avast&lt;/p&gt;

&lt;p&gt;Hello reader, I’m Amber Mishra and I’ll be taking you on a roller coaster ride where the hacking concepts won’t be a dream for you anymore. I’ll be introducing you to the concepts of Vulnerable Assessments and Penetration testing.&lt;/p&gt;

&lt;p&gt;This thread will be well-curated from the basics to everything that you want to know for the same. So, this is going to be a journey that will take you from being a noob to a chieftain in the domain.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--QW9n01CE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AV4n8KJtAjre4zFcGNR0WpQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--QW9n01CE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AV4n8KJtAjre4zFcGNR0WpQ.jpeg" alt=""&gt;&lt;/a&gt;Source: Incognito Forensics&lt;/p&gt;

&lt;p&gt;I’ll be covering the following topics in this:&lt;/p&gt;

&lt;p&gt;1) Footprinting and Reconnaissance&lt;/p&gt;

&lt;p&gt;2)Scanning and Enumeration&lt;/p&gt;

&lt;p&gt;3)Vulnerability Analysis&lt;/p&gt;

&lt;p&gt;4)Malware Threats&lt;/p&gt;

&lt;p&gt;5)Sniffing and Social Engineering&lt;/p&gt;

&lt;p&gt;6)Denial-of-Service&lt;/p&gt;

&lt;p&gt;7)Session Hijacking&lt;/p&gt;

&lt;p&gt;8)Bypassing IDS, Firewalls, and Honeypots&lt;/p&gt;

&lt;p&gt;9)Hacking Web servers&lt;/p&gt;

&lt;p&gt;10) Hacking Web Applications&lt;/p&gt;

&lt;p&gt;11)SQL Injections&lt;/p&gt;

&lt;p&gt;12)Hacking Wireless Networks&lt;/p&gt;

&lt;p&gt;13)Hacking Mobile Platforms&lt;/p&gt;

&lt;p&gt;14)IoT hacking&lt;/p&gt;

&lt;p&gt;15)Cloud Computing&lt;/p&gt;

&lt;p&gt;16)Cryptography&lt;/p&gt;

&lt;p&gt;Before starting with these topics I would also like to introduce you to the basic concepts of Networking, and terms that will be handy for you to go through the coming up threads. If you want me to address something more, feel free to mention it in the comments sections.&lt;/p&gt;

&lt;p&gt;Starting with — Setting up Kali, MAC Spoofing, IP spoofing&lt;/p&gt;

&lt;p&gt;PS- These threads will be just for the awareness and I don’t take responsibility for any of the stale use of it. I do not promote any wrong use of it.&lt;/p&gt;

&lt;p&gt;-Amber Mishra&lt;/p&gt;

</description>
      <category>introduction</category>
      <category>hacking</category>
      <category>coursesandtraining</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
