What can a hacker do with your IP address and how do hackers obtain such confidential information.docx.pdf
1. UTAFITI_HUB@FACEBOOK.COM
+254791410785
EDUGREG60@GMAIL.COM
What can a hacker do with your IP address and how do hackers
obtain such confidential information?
Well, let's dive straight into the heart of the question. As a hacker, I will ping your IP to check if it’s up
or not. After that, I will NMAP (port scanner and much more) you to find all the services running on
your system. With NMAP by my side, I can find out which OS you are using and all possible daemons
with ports. Then comes judging part which port to target or what outdated services are you running
(vulnerable services). After making a list of that, my attack will differ.
If you are a website or web-server, then I may use nikto or vega to scan for vulnerabilities in web-
applications. Some common but major flaws are: SQL injection or blind as well cross-site scripting cross-
site forgery invalid password or form submission shell injection and many others. Here comes the attack
phase, where I can use popular tools like Metasploit to launch myriads of attacks or even use social
engineering to trick you into opening spammed emails containing trojans or malware. If I am persistent
enough, I may get inside your computer using any methods.
Even, password crackers can be used for breaking authentication against FTP, SSH, or telnet protocol.
Common ones are hydra, john the ripper and so. After getting inside, I may wreck your pc and it depends
on the mindset of a hacker and his reasons for hacking.
Then comes post-exploitation phase were cleaning up the log files and other suspicious tracks and
maintaining persistence for re-visiting may be done.
All these just from an IP address!!!
Avoid open suspicious links or pop-ups or even spam emails from anonymous contacts.