SlideShare a Scribd company logo
1 of 44
Cyber Security & Ethical Hacking
By Mehedi Hasan
Lecture 3:
NAT, Internal VS External IP Addresses, IP Address Hiding,
Perfect Cyber Crime, Proxy Server, Unblocking Websites, People
Hacking, VPN and HTTP Tunneling
IP Address
When the internet was initially created, there was no shortage of IP
addresses. However, as internet usage spread, an acute shortage of
IP addresses was created was created worldwide. This led to the
emergence of NAT of Network Address Translation.
The biggest advantages of NAT are:
• Reduces Need for IP addresses.
• Improves security.
• Easier implementation of Network.
Internal IP Address and External IP Address
Introduction to NAT
IP Address
Let me give you an example to explain a NAT. Let us assume that
there are 100 employee in an office. Every employee has a internal
phone on their number with an extension number. There is a
receptionist in the office who controls all incoming /outgoing phone
calls in the office. We can call her NAT. The receptionist has a lookup
table that contains a list of employee names and their respective
extension numbers. Now look at how incoming and outgoing phone
calls are handled.
Outgoing call:
Employee -----------Receptionist -----------------Target number.
The person at the destination number will only see the mail office
line phone number and not your internal desk number. This give you
security & prevents annoying people from calling you. It also allows
Internal IP Address and External IP Address
Introduction to NAT
IP Address
Incoming Call:
Outside number ----------------Receptionist ----------Internal Extension
When someone from outside the office wants to call you then they
have to call on the office main number. The receptionist or
automatic phone system will pickup the call and ask the outside to
enter the extension number or name they want to speak to.
Depending upon the extension number entered, the lookup table is
used to route the call to the appropriate employee in the office.
Internal IP Address and External IP Address
Introduction to NAT
IP Address
A NAT system operates in the same way. All employee in the office
are giving unique internal IP addresses which normally can not be
accessed from outside the network. When a internal computer
wants to connect to the internet, then the router assigns the internal
computer a public external IP address that has been bought by the
company. The same public external IP address is shared by all
computers in the network. The internal IP addresses of the
employees remains protected, because outsiders are always only
communicate with the public IP address of the company.
Internal IP Address and External IP Address
Introduction to NAT
IP Address
For example, let us assume that there are 100 student in a collage and
all of them have been assigned internal IP addresses: 10.95.1.23,
10.95.1.1……………..10.95.1.99. if student X (IP addresses is 10.94.1.23)
wants to access a system Y onside the network, then the following will
happen:
• Step 1: Student X connects to router requesting an outside
connection. Router knows student X’s internal IP address
• Steps 2: Router allows the internal system to communicate with
outside world using the networks public IP address.
• Step 3: The router maintains a lookup table that maps different
connections made by internal computers to various port numbers. Let
un see an example to make this clearer.
Internal IP Address and External IP Address
Introduction to NAT
IP Address
Step 3: The router maintains a lookup table that maps different
connections made by internal computer to various port numbers. Let
us see an example to make this clearer.
Say there are two internal systems A (10.95.1.23) and B (10.95.1.1)
and both of them initiate connections to the same website
www.gmail.com. The public IP address of the network is 204.98.11.2,
then the router will store the 2 connections in a lookup table in the
following manner.
10.95.1.23 is stored as 204.98.11.2: port X
10.95.1.1 is stored as 204.98.11.2: port Y
Gmail.com thinks it is communicating with only the public IP
addresses 204.98.11.2. to send data to the internal system 10.94.1.0
gmail will send date to 204.98.11.2 and to send data to the internal
system 10.04.1.1, gmail will send data to 204.98.11.2: Y
Internal IP Address and External IP Address
Introduction to NAT
IP Address
Step 4: When the router of the college receives data from the
remote computer, then the data is forwarded to the respective
internal system based on the lookup table.
Data send to the public IP address 204.98.11.2: X, is forwarded to the
internal system 10.95.1.23 and data sent to the public IP address
204.98.11.2: Y , is forwarded to the internal system 10.95.1.23 . As
simple as that.
Internal IP Address and External IP Address
Introduction to NAT
IP Address
Internal IP address can be found out using the commands:
Netstate –n
Ipconfig /all
External IP address can be found out by opening your browser and
connecting to:
www.whatismyipaddress.com
Internal IP Address and External IP Address
How to find out your internal IP address and external IP
address?
IP Address
www. anonymizer.com
IP Address
www.samair.ru/proxy
IP Address
www.hidemyass.com
IP Address
www.anonymizer.ru
Torrents
How are Torrents Blocked?
-Disable Torrent Clients.
-Block Download of .torrent extension files
IP Address
www.bitlet.org
IP Address
www.torrent2exe.com
The Real Cyber Crime
Proxy Bouncing (Hide your IP).
Mac Spoofing (MacMakeup, Mad Macs, Ether Change,
Bwmachak).
WAR Driving (Connect to random wi-fi network).
Onion Routing (Tor Encrypts Data + 3 Server Minimum)
IP Address
How to unblock Tor?
IP Address
• Change the name of the exe file.
• Change the port being used by tor.
• Add bridge relays to tor.
How to unblock Tor?
IP Address
www.bridges.torproject.org
Introduction to NAT
IP Address
bridges@bridges.torproject.org will get bridges in the
body. Introduction to NAT
IP Scanning
Types of Proxy Servers: Socks and http
HTTP Proxy Server:
Http Proxy server allow you to bypass filtering mechanism & access
blocked control. User sends HTTP request to proxy server, who then
reads the host header in the HTTP request, connects to the target
server and transmits back whatever data the server sends back.
Usually works with only HTTP apps. For example,
www.anonymizer.com
IP Scanning
Types of Proxy Servers: Socks and http
HTTP Proxy Server:
Http Proxy server allow you to bypass filtering mechanism & access
blocked control. User sends HTTP request to proxy server, who then
reads the host header in the HTTP request, connects to the target
server and transmits back whatever data the server sends back.
Usually works with only HTTP apps. For example,
www.anonymizer.com
Socks Proxy Server:
Socks Proxy Server allow you to bypass filtering mechanisms &
access blocked content. Socks is a protocol that transmits data
between source and destination via a proxy server without reading
any of the contents. Hence it works with all protocols like TCP, UDP
etc and will allow you to use all applications (like mail, browsing, FTP,
ets). For example tor.
IP Scanning
MultiProxy : Allows you to keep changing proxy server the
same session. Supports both HTTP & SOCKS proxy
IP Scanning
SOCKSChain: Connects you to a chain of various SOCKS of
HTTP proxies. (Proxy Bouncing)
IP Scanning
You------------------Proxy Server------------Internet
Proxy Bouncing
You-------------Proxy Server------------Proxy Server 2----------
Proxy Server 3-------------Proxy Server 4-----------Internet
IP Scanning
Proxifier: Allows you to connect multiple proxy server. The
same session. Typically Socks Proxies.
IP Scanning
Ultrasurf: Anonymous browsing from your pen drive,
encrypts connection, hide your IP and unblocks stuff.
IP Scanning
A VPN (Virtual Private Networks) is a group of computer
connected together privately through a public network like
the internet. Usually VPN services give you an encrypted
secure and anonymous communication channel
IP Scanning
Popular VPN Services: HideMyAss, IPVanish, Strong VPN,
Box VPN, 12VPN, GoTrusted and others.
HTTP Tunneling
Let us assume that in your college or company, FTP protocol (Port
21) is blocked or torrents are blocked. The firewall only allows HTTP
traffic on port 80, all other ports are blocked. It is possible to
encapsulate FTP or torrent traffic inside HTTP protocol and bypass
the firewall.
Step 1: Install HTTP Tunneling software server on your home or
outside computer that has unrestricted access.
Step 2: Install HTTP tunneling software client on your college or
office computer that has restricted access.
HTTP Tunneling
Step 3: Now your connection diagram will be the following:
You ------------FTP or torrent software ------------HTTP Tunneling client
-----------------sends FTP or Torrent traffic encapsulated into HTTP
protocol via port 80 to bypass firewall --------HTTP Tunneling server
on home computer -----------FTP or torrent destination.
Now you can use college computer to access everything on your
home network including unrestricted internet.
Tunnelizer, HTTPort and HTTP Tunnel and so one.
Super Network Tunnel
This is a commercial tool that perform two way HTTP tunneling . Not
only can you access your home network from college. But you can
access college network from home.
Super Network Tunnel
PSIPHON: invitation only. Proxy server globally encrypted data
communication.
Reverse Text
.reverse in text the write to is china in used strategy
http://textmechanic.com
Google Translate
Unblock WebPages by converting them from one language to other
translate google.com
Google Translate
Unblock WebPages by converting them from one language to other
translate google.com
Proxy Workbench
Proxy workbench records all data passing through particular system
in teal time. Fantastic to study how connections happen.
People Hacking
Whatever you do online, you are leaving a trace behind on some
website, server of system in some part of the world or other.
People hacking is the technique of searching the entire internet
looking for private information about some individual. The
information that you can find out is the following.
• Contact Addresses.
•Date of Birth.
•Email Address.
•Contact Number.
•Place of Work.
•Satellite Photos.
•Work History.
Proxy Workbench
www.pipl.com
Proxy Workbench
www.anywho.com
Proxy Workbench
www.googlemap.com
www.googleearth.com
Proxy Workbench
IptoMAC
Coverts know IP to MAC Address.
Thanks You

More Related Content

Viewers also liked

PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA Kak Yong
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of networkKak Yong
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIAKak Yong
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOLKak Yong
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

Viewers also liked (9)

PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Cyber security and ethical hacking 3

Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus networkAalap Tripathy
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Asas Pelayaran Internet
Asas Pelayaran InternetAsas Pelayaran Internet
Asas Pelayaran InternetAhmad Faizar
 
Footprinting LAB SETUP GUIDE.pdf
Footprinting LAB SETUP GUIDE.pdfFootprinting LAB SETUP GUIDE.pdf
Footprinting LAB SETUP GUIDE.pdfsdfghj21
 
Konsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webKonsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webAhmad Faizar
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in javaAmol Gaikwad
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu Alessandro De Suoodh
 
Setup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkSetup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkNazmul Hossain Rakib
 
Pears
PearsPears
Pearsthips
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxMUHAMMADATTAURREHMAN7
 
1. Task In this assignment you are asked to provide named.pdf
 1. Task In this assignment you are asked to provide named.pdf 1. Task In this assignment you are asked to provide named.pdf
1. Task In this assignment you are asked to provide named.pdfalokopticalswatchco0
 

Similar to Cyber security and ethical hacking 3 (20)

class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Hyperlink
HyperlinkHyperlink
Hyperlink
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Asas Pelayaran Internet
Asas Pelayaran InternetAsas Pelayaran Internet
Asas Pelayaran Internet
 
Footprinting LAB SETUP GUIDE.pdf
Footprinting LAB SETUP GUIDE.pdfFootprinting LAB SETUP GUIDE.pdf
Footprinting LAB SETUP GUIDE.pdf
 
Konsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webKonsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman web
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Hacking
HackingHacking
Hacking
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 
Firewall
FirewallFirewall
Firewall
 
Setup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkSetup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE network
 
Pears
PearsPears
Pears
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
1. Task In this assignment you are asked to provide named.pdf
 1. Task In this assignment you are asked to provide named.pdf 1. Task In this assignment you are asked to provide named.pdf
1. Task In this assignment you are asked to provide named.pdf
 

More from Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdfMehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfMehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxMehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfMehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfMehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdfMehedi Hasan
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingMehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security systemMehedi Hasan
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESMehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxMehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxMehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation trainingMehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensicsMehedi Hasan
 
Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Mehedi Hasan
 

More from Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Cyber security and ethical hacking 3

  • 1. Cyber Security & Ethical Hacking By Mehedi Hasan Lecture 3: NAT, Internal VS External IP Addresses, IP Address Hiding, Perfect Cyber Crime, Proxy Server, Unblocking Websites, People Hacking, VPN and HTTP Tunneling
  • 2. IP Address When the internet was initially created, there was no shortage of IP addresses. However, as internet usage spread, an acute shortage of IP addresses was created was created worldwide. This led to the emergence of NAT of Network Address Translation. The biggest advantages of NAT are: • Reduces Need for IP addresses. • Improves security. • Easier implementation of Network. Internal IP Address and External IP Address Introduction to NAT
  • 3. IP Address Let me give you an example to explain a NAT. Let us assume that there are 100 employee in an office. Every employee has a internal phone on their number with an extension number. There is a receptionist in the office who controls all incoming /outgoing phone calls in the office. We can call her NAT. The receptionist has a lookup table that contains a list of employee names and their respective extension numbers. Now look at how incoming and outgoing phone calls are handled. Outgoing call: Employee -----------Receptionist -----------------Target number. The person at the destination number will only see the mail office line phone number and not your internal desk number. This give you security & prevents annoying people from calling you. It also allows Internal IP Address and External IP Address Introduction to NAT
  • 4. IP Address Incoming Call: Outside number ----------------Receptionist ----------Internal Extension When someone from outside the office wants to call you then they have to call on the office main number. The receptionist or automatic phone system will pickup the call and ask the outside to enter the extension number or name they want to speak to. Depending upon the extension number entered, the lookup table is used to route the call to the appropriate employee in the office. Internal IP Address and External IP Address Introduction to NAT
  • 5. IP Address A NAT system operates in the same way. All employee in the office are giving unique internal IP addresses which normally can not be accessed from outside the network. When a internal computer wants to connect to the internet, then the router assigns the internal computer a public external IP address that has been bought by the company. The same public external IP address is shared by all computers in the network. The internal IP addresses of the employees remains protected, because outsiders are always only communicate with the public IP address of the company. Internal IP Address and External IP Address Introduction to NAT
  • 6. IP Address For example, let us assume that there are 100 student in a collage and all of them have been assigned internal IP addresses: 10.95.1.23, 10.95.1.1……………..10.95.1.99. if student X (IP addresses is 10.94.1.23) wants to access a system Y onside the network, then the following will happen: • Step 1: Student X connects to router requesting an outside connection. Router knows student X’s internal IP address • Steps 2: Router allows the internal system to communicate with outside world using the networks public IP address. • Step 3: The router maintains a lookup table that maps different connections made by internal computers to various port numbers. Let un see an example to make this clearer. Internal IP Address and External IP Address Introduction to NAT
  • 7. IP Address Step 3: The router maintains a lookup table that maps different connections made by internal computer to various port numbers. Let us see an example to make this clearer. Say there are two internal systems A (10.95.1.23) and B (10.95.1.1) and both of them initiate connections to the same website www.gmail.com. The public IP address of the network is 204.98.11.2, then the router will store the 2 connections in a lookup table in the following manner. 10.95.1.23 is stored as 204.98.11.2: port X 10.95.1.1 is stored as 204.98.11.2: port Y Gmail.com thinks it is communicating with only the public IP addresses 204.98.11.2. to send data to the internal system 10.94.1.0 gmail will send date to 204.98.11.2 and to send data to the internal system 10.04.1.1, gmail will send data to 204.98.11.2: Y Internal IP Address and External IP Address Introduction to NAT
  • 8. IP Address Step 4: When the router of the college receives data from the remote computer, then the data is forwarded to the respective internal system based on the lookup table. Data send to the public IP address 204.98.11.2: X, is forwarded to the internal system 10.95.1.23 and data sent to the public IP address 204.98.11.2: Y , is forwarded to the internal system 10.95.1.23 . As simple as that. Internal IP Address and External IP Address Introduction to NAT
  • 9. IP Address Internal IP address can be found out using the commands: Netstate –n Ipconfig /all External IP address can be found out by opening your browser and connecting to: www.whatismyipaddress.com Internal IP Address and External IP Address How to find out your internal IP address and external IP address?
  • 14. Torrents How are Torrents Blocked? -Disable Torrent Clients. -Block Download of .torrent extension files
  • 17. The Real Cyber Crime Proxy Bouncing (Hide your IP). Mac Spoofing (MacMakeup, Mad Macs, Ether Change, Bwmachak). WAR Driving (Connect to random wi-fi network). Onion Routing (Tor Encrypts Data + 3 Server Minimum)
  • 18. IP Address How to unblock Tor?
  • 19. IP Address • Change the name of the exe file. • Change the port being used by tor. • Add bridge relays to tor. How to unblock Tor?
  • 21. IP Address bridges@bridges.torproject.org will get bridges in the body. Introduction to NAT
  • 22. IP Scanning Types of Proxy Servers: Socks and http HTTP Proxy Server: Http Proxy server allow you to bypass filtering mechanism & access blocked control. User sends HTTP request to proxy server, who then reads the host header in the HTTP request, connects to the target server and transmits back whatever data the server sends back. Usually works with only HTTP apps. For example, www.anonymizer.com
  • 23. IP Scanning Types of Proxy Servers: Socks and http HTTP Proxy Server: Http Proxy server allow you to bypass filtering mechanism & access blocked control. User sends HTTP request to proxy server, who then reads the host header in the HTTP request, connects to the target server and transmits back whatever data the server sends back. Usually works with only HTTP apps. For example, www.anonymizer.com Socks Proxy Server: Socks Proxy Server allow you to bypass filtering mechanisms & access blocked content. Socks is a protocol that transmits data between source and destination via a proxy server without reading any of the contents. Hence it works with all protocols like TCP, UDP etc and will allow you to use all applications (like mail, browsing, FTP, ets). For example tor.
  • 24. IP Scanning MultiProxy : Allows you to keep changing proxy server the same session. Supports both HTTP & SOCKS proxy
  • 25. IP Scanning SOCKSChain: Connects you to a chain of various SOCKS of HTTP proxies. (Proxy Bouncing)
  • 26. IP Scanning You------------------Proxy Server------------Internet Proxy Bouncing You-------------Proxy Server------------Proxy Server 2---------- Proxy Server 3-------------Proxy Server 4-----------Internet
  • 27. IP Scanning Proxifier: Allows you to connect multiple proxy server. The same session. Typically Socks Proxies.
  • 28. IP Scanning Ultrasurf: Anonymous browsing from your pen drive, encrypts connection, hide your IP and unblocks stuff.
  • 29. IP Scanning A VPN (Virtual Private Networks) is a group of computer connected together privately through a public network like the internet. Usually VPN services give you an encrypted secure and anonymous communication channel
  • 30. IP Scanning Popular VPN Services: HideMyAss, IPVanish, Strong VPN, Box VPN, 12VPN, GoTrusted and others.
  • 31. HTTP Tunneling Let us assume that in your college or company, FTP protocol (Port 21) is blocked or torrents are blocked. The firewall only allows HTTP traffic on port 80, all other ports are blocked. It is possible to encapsulate FTP or torrent traffic inside HTTP protocol and bypass the firewall. Step 1: Install HTTP Tunneling software server on your home or outside computer that has unrestricted access. Step 2: Install HTTP tunneling software client on your college or office computer that has restricted access.
  • 32. HTTP Tunneling Step 3: Now your connection diagram will be the following: You ------------FTP or torrent software ------------HTTP Tunneling client -----------------sends FTP or Torrent traffic encapsulated into HTTP protocol via port 80 to bypass firewall --------HTTP Tunneling server on home computer -----------FTP or torrent destination. Now you can use college computer to access everything on your home network including unrestricted internet. Tunnelizer, HTTPort and HTTP Tunnel and so one.
  • 33. Super Network Tunnel This is a commercial tool that perform two way HTTP tunneling . Not only can you access your home network from college. But you can access college network from home.
  • 34. Super Network Tunnel PSIPHON: invitation only. Proxy server globally encrypted data communication.
  • 35. Reverse Text .reverse in text the write to is china in used strategy http://textmechanic.com
  • 36. Google Translate Unblock WebPages by converting them from one language to other translate google.com
  • 37. Google Translate Unblock WebPages by converting them from one language to other translate google.com
  • 38. Proxy Workbench Proxy workbench records all data passing through particular system in teal time. Fantastic to study how connections happen.
  • 39. People Hacking Whatever you do online, you are leaving a trace behind on some website, server of system in some part of the world or other. People hacking is the technique of searching the entire internet looking for private information about some individual. The information that you can find out is the following. • Contact Addresses. •Date of Birth. •Email Address. •Contact Number. •Place of Work. •Satellite Photos. •Work History.