Social Engineering always gets your further
NOTE: This tutorial is still in the works, but I felt that I wouldn't beable to contain myself if I didn't let the already completed information out -xyr0x
Table of context
1A: Disclaimer
1B: Introduction
2A: Tools of the trade
2B: What to look for
2C: To be continued...
3A: Last words
Using the tools Correctly
1A Disclaimer:
Tracing somebodies IP isn't illegal. However ISP(s) restrict to the best of their ability to allow their costumers private information from being obtain, i.e address, phone number, emails etc. For this information you'll be learning how to obtain, and therefor if you abuse this information and harrass, play pranks, etc... and get caught, I cannot, and will not be held responsible in any way.
1B: Introduction:
IP Tracing and identifying has been around for quite some time now, since the day of the earliest hackers -- criminal hackers that is, to identify their movement and to enable authorities apprehend them. I haven't seen, nor read a tutorial on how to teach, or publicate how simple this is, even though you watch the news, etc etc... and it's all bloated and looks technical, when it's not. I'm going to be giving you two methods, which really it seems to me, there are only two methods that you'll want to know. These are, how to Identify a Router. For example, let's say you have a wireless network card, and you want to identify the source of it, with an online Map. That'll be one, and the other one is stripping apart an IP Address. As for Remote IP, that you stole from somebody online while sending them a file, and doing a netstat -n manuever. Imagine all of the fun and possibilities you could have. Calling up their phone, billing stuff to their phone, knowing their name, and address, etc. Sounds fun doesn't it? I bet it does.
2A: Tools of the Trade:
In this chapter, I'm going to assert to you which tools we will be needing. We're going to need NeoTrace Pro, Understand what Lattitude and Longitude is for, Logic, Google Maps and, everything else is in your own discretion, as far as being Master detective, stalker enthused, etc.
2B: What to look for:
In this chapter, I'm going to assert to you for what you're going to be looking for, to help you determine and understand, so you don't mess up, and play guess who? with the Nodular display case. Now. I'm going to break this into two segments. One for Router identification, and how to locate using Lattitude, and Longitude mapping. For the newbies who don't know what that is, that's how the globe is mapped out, as for Location range. For each Lattitude, and each Longitude parameter, consists of a virtual box on any comprehensive mapping device, or map. It's also how the pirates of the early 19th century mapped their treasure and sunken ships so that they could find them for salvage, or simply just to explain. I'm not a pirate* nor a historian so I'm just using the best of my logic to guess. So if I'm wrong on the pirate crap, just shut up, and ignore that.
Alright. So if you're using a Wireless network card, e.g Linksys Wireless-G/N/B PCI adapter, you might just learn something new, and this also goes for the readers who're using a Router, and have fallen victimized to this breach. However I'm not going to disclose any security issues on how to prevent that, that's simply in your Configuration Manual. Don't use WEP/WEP2/WPA. They are weak.
Ok, so have we got NeoTrace Pro installed? If yes, than continue reading. Now, statistically speaking, for each Node, there is a base. i.e 191.168.*.* 10.*.*.* and so forth. Every router or DSL/Cable modem which supports WIFI (Wireless Connectivity) will be assigned to a Default Gateway -- they're usually assigned in this nature. Are you getting me here? You'll need to know this. The most widespread default gateway address on a specified router/modem will be like the following: 192.168.1.1 or, 192.168.0.1, why these gateway address' vary is simply depending on if it's being routed by more than one router to connect more than one modem, or simple for other objections. But those are the most usual gateway address'. Ok, so we're connected to a Gateway, and we want to determine where it's comming from now.
Boot up NeoTrace Pro, and then go to www.whatismyip.com This will return your Remote IP, since you're not Physically connected to the router source, you won't get an IP that looks like, 192.168.1.6 for say. Once you've obtaind your IP, put that into NeoTrace Pro. Now we're going to click, Trace. When it's done, click on " NODE VIEW Tab" and select "Node View" -- this will identify what all nodes it pinged to interpret where it's being connected at, with who and so forth. Now you're going to see like the ISP, other connected computers on the router, and the gateway. The gateway ignore the gateway, and look for a node, which is declaring your remote IP in a format such as the following example: 62-12-44-63.myisp.comcast.net. Once you've located that, click on it. Now transfer your attention to the right window pane in NeoTrace. Do you see your information? You'll want to focus on the "Location:" information. It'll have your City where the ISP subscriber is getting their internet from, along with your North and West, Lattitude and Longitude. That'll display like this. Location: My City ISP (11.111N, 11.111W) or it could be south, S, or east, E... Now write the Lattitde and Longitude down. Now remove all of the special characters, like your Hyphens, Coma's and just keep it like the following example: 11.111N 11.111W. Now goto maps.google.com and paste that into the search field, click go, and it'll bring up where you're connecting to. I know alot to read, but wasn't it fun to learn straight forward?
2C: Remote IP comprehensive indentification, is ...To be continued.
3A: Last words:
I'd like to dedicate this tutorial to all of the wardriving addicts and WEP/Network gurus, and it's crackers/security administrators. And for the people who learn't something from this, that it's fun to understand where you are, even if you're in cyberspace
Blog Archive
-
▼
2007
(165)
-
▼
November
(19)
- Securing your Wireless Network
- Sending Anonymous Emails
- How to Exploit Compact Flash media on Enhanced CD
- Essential Encryption Part I - PGP
- Essential Encryption Part II - Linux Loopback
- Utilizing search engines
- Utilizing search engines in better way
- Defending your ID
- How to remove file protection from iTunes songs
- Obfuscation by Compression and Binding
- Bypassing webfilters
- Tracing IP address of anybody
- Encrypting instant messaging conversations
- Guide to customise win xp
- Expaining SERVER
- INTERNET RELAY CHAT
- The COMPLETE guide to optimizing your IRC experience
- How and from where to download free games,music,mo...
- WHAT IS PROXY
-
▼
November
(19)
0 comments:
Post a Comment