Friday, November 30, 2007

Celtel Gprs Hacking Revealed Updated

Steps
1.       Send internet gprs, make of phone and model to +232 and wait for settings and save it
2.       Do the normal connections as exposed on this site  or
3.       Install your pc suit for your phone
Make sure you have GPRS on your phone
You can interface the phone with either
USB cable
Bluetooth or
Cable

when prompted for configuration settings for Celtel enter these settings
user name      Administrator
password      client
dial up number     *99***1#
APN       internet.ng.celtel.com or wap.ng.celtel.com
4.       When successfully connected try and open google page if you see the celtel logo it shows that they are going to bill you, so this is the trick.
5.       Go to Tools, internet options, connections
6.       Select your connection mode which could either be bluetooth, cable or infrared
7.       Select settings, uncheck the proxy server
8.       Seleck OK, APPLY and OK
9.       Close the browser and open it,
10.   You can now browse free.


Oladipo Simeon (Engr)

Tel (GSM):08037244979
Alternate Address: simdipo@yahoo.com
My Homepage:
http://uk.geocities.com/profsimeon/simeonoladipoOnline.html
website: www.doubleklick.netfirms.com


Never miss a thing. Make Yahoo your homepage.

Tuesday, November 27, 2007

Wireless LANs

Wireless LANs

Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations and the file server or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite.
Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast. Line-of-sight communication means that there must be an unblocked direct line between the workstation and the transceiver. If a person walks within the line-of-sight while there is a transmission, the information would need to be sent again. This kind of obstruction can slow down the wireless network.
Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks.
Wireless LANs have several disadvantages. They provide poor security, and are susceptible to interference from lights and electronic devices. They are also slower than LANs using cabling.


Oladipo Simeon (Engr)

Tel (GSM):08037244979
Alternate Address: simdipo@yahoo.com
My Homepage:
http://uk.geocities.com/profsimeon/simeonoladipoOnline.html
website: www.doubleklick.netfirms.com


Be a better sports nut! Let your teams follow you with Yahoo Mobile. Try it now.

Fiber Optic Cable

Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 5). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.


Fig.5. Fiber optic cable
Facts about fiber optic cables:
  • Outer insulating jacket is made of Teflon or PVC.
  • Kevlar fiber helps to strengthen the cable and prevent breakage.
  • A plastic coating is used to cushion the fiber center.
  • Center (core) is made of glass or plastic fibers.

Fiber Optic Connector

The most common connector used with fiber optic cable is an ST connector. It is barrel shaped, similar to a BNC connector. A newer connector, the SC, is becoming more popular. It has a squared face and is easier to connect in a confined space.

Ethernet Cable Summary

Specification Cable Type Maximum length
10BaseT Unshielded Twisted Pair 100 meters
10Base2 Thin Coaxial 185 meters
10Base5 Thick Coaxial 500 meters
10BaseF Fiber Optic 2000 meters
100BaseT Unshielded Twisted Pair 100 meters
100BaseTX Unshielded Twisted Pair 220 meters


Never miss a thing. Make Yahoo your homepage.

Unshielded Twisted Pair (UTP) Cable

Unshielded Twisted Pair (UTP) Cable

Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks.
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated five categories of wire.

Categories of Unshielded Twisted Pair

Type Use
Category 1 Voice Only (Telephone Wire)
Category 2 Data to 4 Mbps (LocalTalk)
Category 3 Data to 10 Mbps (Ethernet)
Category 4 Data to 20 Mbps (16 Mbps Token Ring)
Category 5 Data to 100 Mbps (Fast Ethernet)

Buy the best cable you can afford; most schools purchase Category 3 or Category 5. If you are designing a 10 Mbps Ethernet network and are considering the cost savings of buying Category 3 wire instead of Category 5, remember that the Category 5 cable will provide more "room to grow" as transmission technologies increase. Both Category 3 and Category 5 UTP have a maximum segment length of 100 meters. In Florida, Category 5 cable is required for retrofit grants. 10BaseT refers to the specifications for unshielded twisted pair cable (Category 3, 4, or 5) carrying Ethernet signals. Category 6 is relatively new and is used for gigabit connections.


Oladipo Simeon (Engr)

Tel (GSM):08037244979
Alternate Address: simdipo@yahoo.com
My Homepage:
http://uk.geocities.com/profsimeon/simeonoladipoOnline.html
website: www.doubleklick.netfirms.com


Never miss a thing. Make Yahoo your homepage.

Monday, November 26, 2007

What is Network Cabling

What is Network Cabling?

Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.


Oladipo Simeon (Engr)

Tel (GSM):08037244979
Alternate Address: simdipo@yahoo.com
My Homepage:
http://uk.geocities.com/profsimeon/simeonoladipoOnline.html
website: www.doubleklick.netfirms.com


Be a better sports nut! Let your teams follow you with Yahoo Mobile. Try it now.

Friday, November 16, 2007

SERVICES AND CONNECTIONS

SERVICES AND CONNECTIONS

Table of Contents
“License for Use” Information............................................................................................................... 2
Contributors.............................................................................................................................................4
4.0 Introduction.......................................................................................................................................5
4.1 Services..............................................................................................................................................6
4.1.1 HTTP and The Web.....................................................................................................................6
4.1.2 E-Mail – POP and SMTP..............................................................................................................7
4.1.3 IRC...............................................................................................................................................8
4.1.4 FTP...............................................................................................................................................8
4.1.5 Telnet and SSH..........................................................................................................................10
4.1.6 DNS............................................................................................................................................10
4.1.7 DHCP........................................................................................................................................11
4.2 Connections....................................................................................................................................12
4.2.1 ISPs ...........................................................................................................................................12
4.2.2 Plain Old Telephone Service...................................................................................................12
4.2.3 DSL.............................................................................................................................................12
4.2.4 Cable Modems........................................................................................................................13
Further Reading....................................................................................................................................14
LESSON 4 – SERVICES AND CONNECTIONS
4.0 Introduction
The purpose of this lesson is to give you an understanding of some of the basic services which
networks use to provide and exchange information, and to discuss some of the methods in
which personal computers and local networks connect with the other networks which make
up the Internet.
LESSON 4 – SERVICES AND CONNECTIONS
4.1 Services
You have a computer, and you know that there is useful information on this computer, but not
very much. You also know that other people, millions of other people also have computers,
and that their computers will also have useful information.
Now, you can assume that these other people, and these other computers may very likely
have lots of information on them that would be of interest to you. The only problem is how to
access all this useful information that may be on other people's computers.
The computers themselves can communicate with each other, easily, through ports, using the
different protocols that have been designed, but that doesn't really help you. You can't
understand the streams of binary data that the computers exchange between themselves.
You need some way for your computer to interpret the information that it can receive from
the other computers in some way that you can use it.
The programs that the computers use to translate the data that they exchange into a form
that is useful to you are call services. These services allow you to view web pages, exchange
e-mail, chat, and interact in remote computers in many other different ways.
Your computer, the local computer uses programs called clients to interpret the information
that you receive. The other computers, the remote computers, use programs called servers to
provide this information to your computer.
4.1.1 HTTP and The Web
When you say, 'the Internet,' what comes to mind for most people is, in fact, the World Wide
Web. The World Wide Web, or just the Web, is not the Internet. Instead, it is a method of using
the Internet to exchange information between computers. The Web uses http or hypertext
transfer protocol and services known as web browsers and web servers to allow information in
the form of web pages to be exchanged between local and remote computers.
On the local side, what you see is the web browser. Information from the remote computer is
sent to your local computer using the http protocol. The web browser interprets that
information and displays it on your local computer in the form of web pages.
The hypertext part of the http protocol refers to a non-linear method of presenting
information. Text is normally read in a linear fashion: word 2 follows word 1; sentence 3 follows
sentence 2; paragraph 5 follows paragraph 4. The idea of hypertext allows information to be
viewed in a non-linear way. This is the major difference between hypertext and the older,
plain text methods of displaying information.
With hypertext, words and ideas can connect, not only with the words that directly surround
them, but also with other words, ideas or images. Hypertext is not restricted to the Web. Most
full-featured word processors will allow you to create locally stored pages in web or http
format. These pages are read using your web browser and act as would any other web page,
only they are stored on your local computer, not a remote computer.
On your local computer, you use a client program called a web browser. Contrary to what
you might have been lead to believe, there are actually a number of web browsers available
for both Windows and Linux. These include Microsoft's Internet Explorer, Netscape Navigator,
and the Mozilla Firefox browsers.
You can also create your own web page. The easiest way to do this is to use one of the
common word processors, such as OpenOffice, Microsoft Word, or WordPerfect. These
programs will allow you to produce simple web pages, combining text, hypertext and images.
LESSON 4 – SERVICES AND CONNECTIONS
Plenty of people have made useful, clever and innovative web pages using these simple
tools.
But these pages aren't flashy. Flashy means frames and scripts and animations. It also means
spending lots of money on a fancy web page design program. These programs allow you to
create many interesting effects on your web page, but they are more complex to use than
the word processors that you are probably already familiar with.
Once you have the pages designed, you'll need a computer to put them on, so that other
people can view them. This is called web hosting.
The hosting computer will be running a web server. It is possible to run one of these servers
from your own home, using your own computer, but there are several drawbacks, the primary
one of these being persistence. Information stored on a web server is only available when
that server is powered up, operating properly and has an open connection. So, if you want to
run a web server from your own bedroom, you have to leave your computer on all the time;
you have to make sure that the web server program is operating properly all the time (this
includes troubleshooting hardware problems, controlling viruses, worms and other attacks,
and dealing with the inevitable bugs and flaws within the program itself), and you have to
keep a connection to the Internet open. This is why most people pay someone else to do all
this.
A web hosting company will store your web page on their computer. A perfect web hosting
company will have multiple, redundant servers and a regular backup policy, so that your
service is not lost because of hardware problems, a support staff to keep the server running
despite hacker attacks and program bugs, and a number of open connections to the
Internet, so that all your have to do is design your web page, upload it to the hosting
company's server, hang up the phone, turn off the computer, and go to sleep, and your web
page will be available to the entire world.
It's also possible to find organizations that offer free web hosting. Some of these organizations
are funded by paid advertising, which means that anyone who wants to view your web page
will first have to view someone else's advertisement. But they don't have to buy anything, and
you don't have to pay anything.



4.1.2 E-Mail – POP and SMTP

The second most visible aspect of the Internet is probably e-mail. On your computer, you use
an e-mail client, which connects to a mail server. When you set up your e-mail account, you
are given a unique name in the form of user@domain. You are also asked to provide a
password to use to retrieve your e-mail.
The SMTP protocol, which is used to send e-mail, does not require a password. This may not
have been a fault when the protocol was designed, and the Internet was a small world
inhabited by like minded people, but now it has become a loophole which allows for
unauthorized use of mail servers and various other tricks, such as 'e-mail spoofing', in which
someone sends an e-mail that appears to come from another address. However, some mail
servers minimize this flaw by implementing an authentication step, in which you must prove
your identity before you can send an e-mail.
One important thing to remember is, despite being password protected, e-mail is not a way
to send secure information. Most POP clients and servers require that your password be
communicated – unencrypted – to your mail server. This doesn't mean than anyone who
receives an e-mail from you also receives your password; but it does mean that someone with
7
LESSON 4 – SERVICES AND CONNECTIONS
the right knowledge and tools can relatively easily 'sniff out' your password. (For ideas on
making your e-mail more secure, see Lesson 9: E-mail Security.)
4.1.3 IRC
IRC, or Internet relay chat, is where the unregulated nature of the Internet is most clearly
expressed. On IRC, anyone with anything to say gets a chance to say it.
You may be familiar with the chat rooms used by certain online services. IRC is just like a chat
room, only there are no rules, there are no standards, and – quite often – there are no
chaperones. You may find exactly what you are looking for on an IRC channel, or you just
may find something that you had rather you never knew existed.
All the rules that you've heard about chat rooms are applicable to IRC channels. Don't tell
anyone your real name. Don't give out your phone number, your address, or your bank
account numbers. But have fun!
Exercises:
Find and join three IRC channels which focus on security topics. How do you join in the public
conversation? What do you have to do to have a private conversation with a person?
It is possible to exchange files through IRC. How could you do this? Would you always want to
exchange files through IRC? Why or why not?
4.1.4 FTP
FTP stands for file transfer protocol. As the name implies, it allows for files to be transferred
between a local and a remote computer. While it can be used for private file transfers, it is
more commonly associated with free, anonymous ftp servers which offer public access to
collections of files.
Anonymous ftp was once the means by which most computer users exchanged files over the
Internet. While many anonymous ftp servers are used to distribute files that are available
illegally(and are possibly infected with viruses), there are also many which are legally used to
distribute programs and files. Servers which offer anonymous ftp services can be found
through various means, including Internet search engines.
Most anonymous ftp servers now allow you to access their files using the ftp protocol through
a web browser.
Exercises:
Both Windows and Linux come with a basic, command line ftp client; to access it, open a
command prompt or terminal window and type:
ftp
At the ftp> prompt, you can type help, to get a list of available commands.
ftp> help
Commands may be abbreviated. Commands are:
! delete literal prompt send
? debug ls put status
append dir mdelete pwd trace
ascii disconnect mdir quit type
LESSON 4 – SERVICES AND CONNECTIONS
bell get mget quote user
binary glob mkdir recv verbose
bye hash mls remotehelp
cd help mput rename
close lcd open rmdir
Some important commands are:
ftp> open
Which connects you to the ftp server named domain.name.
ftp> ls
or
ftp> dir
Which lists the contents of the remote working directory.
ftp> cd
Which changes the remote working directory to a directory named newdir.
ftp> get
Which downloads a file named filename from the remote computer to the local computer.
ftp> mget
Which downloads files named file1, file2, and file3 from the remote computer to the local
computer.
ftp> close
Which disconnects you from the remote ftp server.
ftp> quit
Which shuts down your local ftp client.
To connect to an anonymous ftp service, you must first open your local ftp client:
ftp
Use the open command to connect to the server. The command
ftp> open
connects your ftp client with the anonymous ftp server named anon.server.
When the remote ftp server makes its connection, it will identify itself to your local client, then
ask for a user name.
Connected to anon.server.
220 ProFTPD Server (Welcome . . . )
User (anon.server:(none)):
For most anonymous ftp servers, you should enter in the word anonymous as the user name.
The remote ftp server will acknowledge that you are connecting as an anonymous user, and
will give you instructions on what to use as a password.
331 Anonymous login ok, send your complete email address as your
password.
LESSON 4 – SERVICES AND CONNECTIONS
Password:
In most cases, the remote server does not check the validity of the email address entered as
a password, so it will not stop you from accessing the server if you enter an invalid address.
However, this is considered to be a breach of etiquette. After you have entered a password,
the remote server will send a welcome message to your local computer.
230-
Welcome to ftp.anon.server, the public ftp server of anon.server. We
hope you find what you're looking for.
If you have any problems or questions, please send email to
ftpadmin@anon.server
Thanks!
230 Anonymous access granted, restrictions apply.
From here, you can use the ls, dir, cd and get commands to download files from the remote
server to your local computer.
Using these examples, see if you can download a file from an anonymous ftp server. Use your
web browser and a search engine to find an anonymous ftp server which has a copy of Alice
in Wonderland, then, using the command line ftp client – not your web browser – try to
download the file.
4.1.5 Telnet and SSH
Telnet allows a local user to send a wide variety of commands to a remote computer. This
allows the local user to instruct the remote computer to perform functions and return data to
the local computer, almost as if you were sitting at a keyboard in front of the remote
computer. SSH, or secure shell is intended as a secure replacement for telnet.
Again, both Windows and Linux come with a basic, command line telnet client; to access it,
open a command prompt or terminal window and type: telnet.
To access a telnet server, you will need to have an account and password set up for you by
the administrator of the server, because the telnet program allows you to perform a large
number of actions, some of which could severely compromise the remote computer.
Telnet was used in the past to allow computer administrators to remotely control servers and
to provide user support from a distance.
Telnet can also be used for a number of other tasks, such as sending and receiving email and
viewing the source code for web pages (although telnet does fall under the heading of the
most difficult way to do these things). Telnet can be used to do many things that are illegal
and immoral, but there are also legitimate reasons for using it. You can use telnet to check
your email, and view, not just the subject line, but the first few lines of an email, which will
allow you to decide whether or not to delete the email without downloading the entire
message.
4.1.6 DNS
When you want to call a friend on the phone, you need to know the correct phone number;
when you want to connect to a remote computer, you also need to know its number. You
LESSON 4 – SERVICES AND CONNECTIONS
may remember from previous lessons that, for computers on the Internet, this number is called
the IP address.
As numbers, these IP addresses are very easily managed by computers, but as humans, we
prefer to use what are called domain names. For example, to connect to the Hacker
Highschool web page, we type 'www.hackerhighschool.org' into the address bar of a web
browser. However, the web browser can't use this name to connect to the server that hosts
the Hacker Highschool web page – it must use the IP address. This means that your local
computer must have some means of translating domain names into IP addresses. If there
were only hundreds, or even thousands of computers on the Internet, then it might be possible
for you to have a simple table stored on your computer to use to look up these addresses, but,
not only are there are millions of computers on the Internet, the correlations between domain
names and IP addresses can change daily.
For this reason, DNS or Domain Name Service is used to translate domain names into IP
addresses. When you type the domain name www.domainname.com into your web browser,
your web browser contacts the DNS server chosen by your ISP. If that DNS server has
www.domainname.com in its database, then it will return the IP address to your computer,
allowing you to connect.
If your DNS server doesn't have www.domainname.com in its database, then it will send a
request to another DNS server, and it will keep sending requests to other DNS servers until it
finds the correct IP address, or it establishes that the domain name is invalid.
Exercises:
To learn more about DNS:
Open an MS-DOS window and identify the IP address of your computer. What command
have you used? What IP address do you have?
Identify the IP address of your DNS server. What command have you used? What is the IP
address of the DNS server.
Ping www.isecom.org. Do you receive an affirmative answer? What IP address answers the
ping?
Can you direct your computer to use a different DNS server? If so, change the configuration
of your computer so that it uses a different DNS server. Ping www.isecom.org again. Do you
receive the same response? Why?
4.1.7 DHCP
DHCP or Dynamic Host configuration Protocol allows for IP addresses to be dynamically
allocated within a network. The network is given a block of IP addresses for its use. When a
computer joins the network, it is assigned an IP address. When a computer leaves, its IP
address becomes available for use by another computer.
This is useful for large networks of computers, since it is not necessary for each computer to
have an individually assigned, static IP address. Instead, you use a DHCP server. When a new
computer connects to the network, the first thing that it does is request an IP address from the
DHCP server. Once it has been assigned an IP address, the computer then has access to all
the services of the network.
LESSON 4 – SERVICES AND CONNECTIONS
4.2 Connections
Most computers connect to the Internet through a modem. Modems translate the digital
signals produced by computers into analog signals that can be transmitted across commonly
available telephone lines. Modem speeds are measured in baud or bits per second. Higher
baud rates are better, since they allow for faster transmission of data, but you must also
consider what you are planning to do. There are certain applications – such as telnetting into
MUDs – for which a twenty year old 300 baud modem would still be acceptable (provided
your typing speed wasn't so good), while high bandwidth applications such as streaming
video can often strain even the most powerful cable modems.
4.2.1 ISPs
You don't just call up the Internet. You need to access a server that will connect your
computer to the Internet. The server does all the heavy work, like being on all the time. The
server is run by an ISP or Internet Service Provider.
An ISP has a point-of-presence on the Internet that is constant, and it has servers that run the
services you are going to use. Now, you can run these services on your own. For example, you
can run a mail server on your local computer, but it will require you to have your computer
powered up and connected to a network all the time, just waiting for those brief moments
when information has to be exchanged. An ISP, however, consolidates the efforts of a large
number of users, so the mail server is working all the time, instead of sitting around, doing
nothing. Additionally, an ISP's computers are going to use a high speed connection to
connect to a NAP or Network Access Point. These NAPs then interconnect with each other
through ultra-high speed connections called backbones. This is the Internet.
4.2.2 Plain Old Telephone Service
POTS, or plain old telephone service, is still the most widely used method of accessing the
Internet. Its primary disadvantage is its low speed, but in many cases this is made up for by its
wide availability. Most national Internet service providers have a large number of local access
numbers, and almost everyone still has a phone with a land line. In theory, if you had an
acoustic modem and a pocket full of change, you could connect from almost any public
pay phone. Not that you would really want to do that.
POTS is slow. The fastest telephone modems are rated at a speed of 56,600 baud. That,
however, as they explain in the small print, is a lie. Power constraints limit the actual download
speed to about 53,000 baud and the effective rate is usually much lower. This doesn't
compare very well with DSL or cable modems.
That said, telephone service is widely available, and POTS based ISPs are relatively cheap
(and sometimes free). You wouldn't want to trade pirated movies over POTS, because it's
immoral, illegal and ties up your phone line all night and maybe into the afternoon, but you
could certainly send friendly, text based e-mails to Granny. And if you used telnet, you could
even do it with a dusty DOS based machine that you pulled out of the basement.
4.2.3 DSL
DSL or digital subscriber line, is a method of sending large amounts of information over the
wires that already exist for the POTS. Its main advantage over POTS is that it is much faster
than analog modems, and it provides a permanent connection. In addition, it allows you to
make and receive regular telephone calls while you are connected to the Internet. Its main
LESSON 4 – SERVICES AND CONNECTIONS
disadvantage is that its availability is limited by your proximity to the telephone company's
switching equipment – if you live too far down the line; you're out of luck.
Exercises:
Using a web search engine, find two companies that supply DSL access. What other services
do these companies provide (telephone service, tv service . . . )?
4.2.4 Cable Modems
Cable modems do not use the traditional telephone lines to connect to the Internet. Instead
they make use of the optical fiber lines that are used by cable companies to transmit digital
cable signals. Like DSL, cable modems allow you to make and receive regular telephone calls
while you are connected to the Internet, and they provide a permanent connection, but
cable modems are generally faster than DSL.
Cable modems have two basic flaws. The first is that cable modem access is a shared
resource, so your connection speeds will be decreased when there are other users in close
geographic proximity. The second is that cable modem access is only available in areas
where cable companies have installed the necessary fiber optic wiring.
Exercises:
Using a web search engine, find two companies that provide Internet access through cable
modems. What other services do these companies provide (telephone service, tv
service . . . )?

PORTS AND PROTOCOLS

PORTS AND PROTOCOLS
Table of Contents
Information............................................................................................................... 2
Contributors.............................................................................................................................................4
3.1 Introduction.......................................................................................................................................5
3.2 Basic concepts of networks.............................................................................................................6
3.2.1 Devices ......................................................................................................................................6
3.2.2 Topologies .................................................................................................................................6
3.3 TCP/IP model.................................................................................................................................. 7
3.3.1 Introduction ...............................................................................................................................7
3.3.2 Layers .........................................................................................................................................7
3.3.2.1 Application .......................................................................................................................7
3.3.2.2 Transport............................................................................................................................7
3.3.2.3 Internet ..............................................................................................................................8
3.3.2.4 Network Access.................................................................................................................8
3.3.3 Protocols ....................................................................................................................................8
3.3.3.1 Application layer protocols ............................................................................................9
3.3.3.2 Transport layer Protocols ................................................................................................9
3.3.3.3 Internet layer Protocols ................................................................................................... 9
3.3.4 IP Addresses ...............................................................................................................................9
3.3.5 Ports .........................................................................................................................................12
3.3.6 Encapsulation ..........................................................................................................................13
3.4 Exercises...........................................................................................................................................14
3.4.1 Exercise 1: Netstat ...................................................................................................................14
3.4.2 Exercise 2: Ports and Protocols ..............................................................................................15
3.4.3 Exercise 3: My First Server ....................................................................................................... 15
Further Reading....................................................................................................................................17
3
LESSON 3 – PORTS AND PROTOCOLS
Contributors
Gary Axten, ISECOM
La Salle URL Barcelona
Kim Truett, ISECOM
Chuck Truett, ISECOM
Marta Barceló, ISECOM
Pete Herzog, ISECOM
4
LESSON 3 – PORTS AND PROTOCOLS
3.1 Introduction
The text and exercises in this lesson try to impart a basic understanding of the ports and
protocols in current use, as well as their relevance within the operating systems, Windows and
Linux.
Additionally, you will have the opportunity to become familiar with a number of useful utilities
which will allow you to properly understand the network capabilities of your computer system.
At the end of the lesson you should have a basic knowledge of:
- the concepts of networks
- IP addresses
- ports and protocols.
5
LESSON 3 – PORTS AND PROTOCOLS
3.2 Basic concepts of networks
3.2.1 Devices
In order to understand the explanation of protocols and ports, it is necessary for you to
become familiar with the icons that represent the most common devices that are seen in the
basic schemes. These are:
3.2.2 Topologies
With these devices, local area networks (or LANs) can be created. In a LAN, computers can
share resources, such as hard drives, printers and internet connections, and an administrator
can control how these resources are shared. When a LAN is being designed, it is possible to
choose any of the following physical topologies:
In a bus topology, all the computers are connected to a single means of transmission, and
each computer can communicate directly with any of the others. In the ring configuration,
each computer is connected to the following one, and the last one to the first, and each
computer can only communicate directly with the two adjacent computers. In the star
topology, none of the computers are directly connected with others. Instead they are
connected through a central point and the device at that central point is responsible for
relaying information from computer to computer. If several central points are connected to
each other, an extended star topology is obtained. In a star or extended star topology, all the
central points are peers, that is, each exchanges information on an equal basis. However, if
you connect two star or extended star networks together using a central point which controls
or limits the exchange of information between the two networks, then you have created a
single, hierarchical network topology.
6
LESSON 3 – PORTS AND PROTOCOLS
Bus Ring Star Extended
Star Hierarchic
3.3 TCP/IP model
3.3.1 Introduction
TCP/IP was developed by the DoD (Department of Defense) of the United States and DARPA
(Defense Advanced Research Project Agency) in the 1970s. TCP/IP was designed to be an
open standard that anyone could use to connect computers together and exchange
information between them. Ultimately, it became the basis for the Internet.
3.3.2 Layers
The TCP/IP model defines four totally independent layers into which it divides the process of
communication between two devices. The layers through which it passes information
between two devices are:
3.3.2.1 Application
The application layer is the layer nearest the end user. This is the layer that is in charge of
translating data from applications into information that can be sent through the network.
The basic functions of this layer are:
- Representation
- Codification
- Dialog Control
- Application Management
3.3.2.2 Transport
The transport layer establishes, maintains and finishes virtual circuits for information transfer. It
provides control mechanisms for data flow and allows broadcasting, and it provides
mechanisms for the detection and correction of errors. The information that arrives at this
layer from the application layer is divided into different segments. Information that comes to
the transport layer from the internet layer is delivered back to the application layer through
ports. (See Section 3.3.5 Ports for details on ports.)
7
LESSON 3 – PORTS AND PROTOCOLS
The basic functions of this layer are:
- Reliability
- Flow Control
- Error Correction
- Broadcasting
3.3.2.3 Internet
This layer divides the segments of the transport layer into packets and sends the packets
across the networks that make up the Internet. It uses IP, or internet protocol addresses to
determine the location of the recipient device. It does not ensure reliability in the
connections, because this is already taken care of by the transport layer, but it is responsible
for selecting the best route between the originating device and the recipient device.
3.3.2.4 Network Access
This layer is in charge of sending information at both the LAN level and the physical level. It
transforms all the information that arrives from the superior layers into basic information (bits)
and directs it to the proper location. At this level, the destination of the information is
determined by the MAC, or media access control, address of the recipient device.
3.3.3 Protocols
To be able to send information between two devices, both must speak the same language.
This language is called the protocol.
The protocols that appear in the application layer of the TCP/IP model are:
- File Transfer Protocol (FTP)
- Hypertext Transfer Protocol (HTTP)
- Simple Mail Transfer Protocol (smtp)
- Domain Name Service (DNS)
- Trivial File Transfer Protocol (TFTP)
The protocols of the transport layer are:
- Transport Control Protocol (TCP)
- User Datagram Protocol (UDP)
The protocols of the internet layer are:
- Internet Protocol (IP)
The protocol most often used in the network access layer is:
- Ethernet
The protocols listed above and their associated ports will be described in the following
sections.
8
LESSON 3 – PORTS AND PROTOCOLS
3.3.3.1 Application layer protocols
FTP or file transfer protocol is used for the transmission of files between two devices. It uses TCP
to create a virtual connection for the control of information, then creates another connection
to be used for the delivery of data. The most commonly used ports are 20 and 21.
HTTP or hypertext transfer protocol is used to translate information into web pages. This
information is distributed in a manner similar to that used for electronic mail. The most
commonly used port is 80.
SMTP or simple mail transfer protocol is a mail service that is based on the FTP model. It
transfers electronic mail between two systems and provides notifications of incoming mail. The
most commonly used port is 25.
DNS or domain name service provides a means to associate a domain name with an ip
address. The most commonly used port is 53.
TFTP or trivial file transfer protocol has the same functions as FTP but uses UDP instead of TCP.
(See Section 3.3.3.2 for details on the differences between UDP and TCP.) This gives it more
speed, but less security and trustworthiness. The most commonly used port is 69.
3.3.3.2 Transport layer Protocols
There are two protocols which can be used by the transport layer to deliver information
segments.
TCP or transmission control protocol establishes a logical connection between the final points
of the network. It synchronizes and regulates the traffic with what is known as the "Three Way
Handshake". In the “Three Way Handshake,” the originating device sends an initial packet
called a SYN to the recipient device. The recipient device sends an acknowledgment
packet, called a SYN/ACK. The originating device then sends a packet called an ACK, which
is an acknowledgment of the acknowledgment. At this point, both the originating device
and the recipient device have established that there is a connection between the two and
both are ready to send and receive data to and from each other.
UDP or user datagram protocol is a transport protocol which is not based on a connection. In
this case, the originating device sends packets without warning the recipient device to
expect these packets. It is then up to the recipient device to determine whether or not those
packets will be accepted. As a result, UDP is faster that TCP, but it cannot guarantee that a
packet will be accepted.
3.3.3.3 Internet layer Protocols
IP or internet protocol serves as a universal protocol to allow any two computers to
communicate through any network at any time. Like UDP, it is connectionless, because it does
not establish a connection with the remote computer. Instead, it is what is known as a best
effort service, in that it will do whatever is possible to ensure that it works correctly, but its
reliability is not guaranteed. The Internet Protocol determines the format for the packet
headers, including the IP addresses of both the originating and the recipient devices.
3.3.4 IP Addresses
A domain name is the web address that you normally type into a web browser. That name
identifies one or more IP addresses. For example, the domain name microsoft.com represents
about a dozen IP addresses. Domain names are used in URLs to identify particular Web pages.
9
LESSON 3 – PORTS AND PROTOCOLS
For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is
pcwebopedia.com.
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to.
There are only a limited number of such domains. For example:
.gov - Government agencies
.edu - Educational institutions
.org - Organizations (nonprofit)
.com - Commercial Business
.net - Network organizations
Because the Internet is based on IP addresses, not domain names, every Web server requires
a Domain Name System (DNS) server to translate domain names into IP addresses.
IP Addresses are the identifiers that are used to differentiate between computers and other
devices that are connected to a network. Each device must have a different IP address, so
that there are no problems of mistaken identity within the network. IP addresses consist of 32
bits that are divided in four 8 bit octets which are separated by dots. Part of the IP address
identifies the network, and the remainder of the IP address identifies the individual computers
on the network.
There are both public and private IP addresses. Private IP addresses are used by private
networks that have no connection with outside networks. IP addresses within a private
network should not be duplicated within that network, but computers on two different – but
unconnected – private networks could have duplicated IP addresses. The IP addresses that
are defined by IANA, the Internet Assigned Numbers Authority, as being available for private
networks are:
10.0.0.0 through 10.255.255.255
172.16.0.0 through 172.31.255.255
192.168.0.0. through 192.168.255.255
IP addresses are divided into classes based on what portion of the address is used to identify
the network and what portion is used to identify the individual computers.
Depending on the size assigned to each part, more devices will be allowed within the
network, or more networks will be allowed. The existing classes are:
10
LESSON 3 – PORTS AND PROTOCOLS
- Class A: The first bit is always zero, so this class includes the addresses between 0.0.0.0
and 126.255.255.255. Note: the addresses of 127.x.x.x are reserved for the services of
loopback or localhost.
- Class B: The first two bits of the first octet are '10', so this class includes the addresses
between 128.0.0.0 and 191.255.255.255.
- Class C: The first three bits of the first octet are '110', so this class includes the
addresses between 192.0.0.0 and 223.255.255.255.
- Class D: The first four bits of the first octet are '1110', so this class includes the
addresses between 224.0.0.0 and 239.255.255.255. These addresses are reserved for
group multicast implementations.
- The remaining addresses are used for experimentation or for possible future
allocations.
At this time, the classes are not used to differentiate between the part of the address used to
identify the network and the part used to identify the individual devices. Instead, a mask is
used. In the mask, a '1' binary bit represents the part containing the network identification and
a '0' binary bit represents the part that identifies the individual devices. Therefore, to identify a
device, in addition to the IP address, it is necessary to specify a network mask:
IP: 172.16.1.20
Mask: 255.255.255.0
IP addresses 127.x.x.x are reserved to be used as loopback or local host addresses, that is,
they refer directly back to the local computer. Every computer has a local host address of
127.0.0.1, therefore that address cannot be used to identify different devices. There are also
other addresses that cannot be used. These are the network address and the broadcast
address.
The network address is an address in which the part of the address which normally identifies
the device is all zeros. This address cannot be used, because it identifies a network and can
never be used to identify a specific device.
IP: 172.16.1.0
Mask: 255.255.255.0
11
LESSON 3 – PORTS AND PROTOCOLS
The broadcast address is an address in which the part of the address which normally identifies
the device is all ones. This address cannot be used to identify a specific device, because it is
the address that is used to send information to all of the computers that belong to the
specified network.
IP: 172.16.1.255
Mask: 255.255.255.0
3.3.5 Ports
Both TCP and UDP use ports to exchange information with applications. A port is an extension
of an address, similar to adding an apartment or room number to a street address. A letter
with a street address will arrive at the correct apartment building, but without the apartment
number, it will not be delivered to the correct recipient. Ports work in much the same way. A
packet can be delivered to the correct IP address, but without the associated port, there is
no way to determine which application should act on the packet.
Once the ports have been defined, it is possible for the different types of information that are
sent to one IP address to then be sent to the appropriate applications. By using ports, a
service running on a remote computer can determine what type of information a local client
is requesting, can determine the protocol needed to send that information, and maintain
simultaneous communication with a number of different clients.
For example, if a local computer attempts to connect to the website www.osstmm.org,
whose IP address is 62.80.122.203, with a web server running on port 80, the local computer
would connect to the remote computer using the socket address :
62.80.122.203:80
In order to maintain a level of standardization among the most commonly used ports, IANA
has established that the ports numbered from 0 to 1024 are to be used for common services.
The remaining ports – up through 65535 – are used for dynamic allocations or particular
services.
The most commonly used ports – as assigned by the IANA – are listed here:
Port Assignments
Decimals Keywords Description
0 Reserved
1-4 Unassigned
5 rje Remote Job Entry
7 echo Echo
9 discard Discard
11 systat Active Users
13 daytime Daytime
15 netstat Who is Up or NETSTAT
17 qotd Quote of the Day
19 chargen Character Generator
20 ftp-data File Transfer [Default Data]
21 ftp File Transfer [Control]
22 ssh SSH Remote Login Protocol
12
LESSON 3 – PORTS AND PROTOCOLS
Port Assignments
Decimals Keywords Description
23 telnet Telnet
25 smtp Simple Mail Transfer
37 time Time
39 rlp Resource Location Protocol
42 nameserver Host Name Server
43 nicname Who Is
53 domain Domain Name Server
67 bootps Bootstrap Protocol Server
68 bootpc Bootstrap Protocol Client
69 tftp Trivial File Transfer
70 gopher Gopher
75 any private dial out service
77 any private RJE service
79 finger Finger
80 www-http World Wide Web HTTP
95 supdup SUPDUP
101 hostname NIC Host Name Server
102 iso-tsap ISO-TSAP Class 0
110 pop3 Post Office Protocol - Version 3
113 auth Authentication Service
117 uucp-path UUCP Path Service
119 nntp Network News Transfer Protocol
123 ntp Network Time Protocol
137 netbios-ns NETBIOS Name Service
138 netbios-dgm NETBIOS Datagram Service
139 netbios-ssn NETBIOS Session Service
140-159 Unassigned
160-223 Reserved
You can also refer to the Web page: http://www.isecom.info/cgilocal/
protocoldb/browse.dsp for more detailed information on ports.
3.3.6 Encapsulation
When a piece of information – an e-mail message, for example – is sent from one computer to
another, it is subject to a series of transformations. The application layer generates the data,
which is then sent to the transport layer. The transport layer takes this information and adds a
header to it. This header contains information, such as the IP addresses of the originating and
recipient computers, that explains what must be done to the data in order to get it to the
appropriate destination. The next layer adds yet another header, and so on. This recursive
procedure is known as encapsulation.
Each layer after the first makes its data an encapsulation of the previous layer's data, until you
arrive at the final layer, in which the actual transmission of data occurs. The following figure
explains encapsulation in a graphic form:
13
LESSON 3 – PORTS AND PROTOCOLS
When the encapsulated information arrives at its destination, it must then be deencapsulated.
As each layer receives information from the previous layer, it removes the
unneeded information contained in the header placed there by the previous layer.
3.4 Exercises
3.4.1 Exercise 1: Netstat
Netstat
The Netstat command allows you to see the state of the ports on a computer. In order to
execute it, you must open an MS-DOS window and type:
netstat
In the MS-DOS window, you will then see a list of the established connections. If you want to
see the connections displayed in numeric form, type:
netstat - n
To see the connections and the active ports, type:
netstat - an
To see a list of other options, type:
netstat - h
In the Netstat output, the second and third columns list the local and remote IP addresses
being used by the active ports. Why are the addresses of the remote ports different from the
local addresses?
Next, using a web browser, open this web page:
http://193.145.85.202
then return to the MS-DOS prompt and run Netstat again. What new connection (or
connections) appear?
Open another web browser and go to this web page:
http://193.145.85.203
Return to the MS-DOS prompt and run Netstat:
14
LESSON 3 – PORTS AND PROTOCOLS
DATA
SEGMENT
PACKET
FRAME
- Why does the protocol HTTP appear in several lines?
- What differences exist between each one of them?
- If there are several web browsers open, how does the computer know which information
goes to which browser?
3.4.2 Exercise 2: Ports and Protocols
In this lesson, you learned that ports are used to differentiate between services.
Why is it that when a web browser is used, no port is specified?
What protocols are used?
Is it possible that one protocol gets used in more than one instance?
3.4.3 Exercise 3: My First Server
To perform this exercise, you must have the Netcat program. If you do not have it, you can
download it from the page:
http://www.atstake.com/research/tools/network_utilities/
Once you have Netcat installed, open an MS-DOS window. Change to the Netcat directory
and type:
nc - h
This displays the options that are available in Netcat. To create a simple server, type:
nc - l - p 1234
When this command executes, port 1234 is opened and incoming connections are allowed.
Open a second MS-DOS window and type:
netstat – a
This should verify that there is a new service listening on port 1234. Close this MS-DOS window.
To be able to say that a server has been implemented, you must establish a client association.
Open an MS-DOS window and type:
nc localhost 1234
With this command, a connection is made with the server that is listening to port 1234. Now,
anything that is written in either of the two open MS-DOS windows can be seen in the other
window.
Create a file named 'test', that contains the text, “Welcome to the Hacker Highschool server!”
In an MS-DOS window, type:
nc - l - p 1234 > test
From another MS-DOS window, connect to the server by typing:
nc localhost 1234
When the client connects to the server, you should see the output of the file, 'test'.
To close the service, switch to the MS-DOS window in which it is running and press CTRL-C.
What protocol has been used to connect with the server?
15
LESSON 3 – PORTS AND PROTOCOLS
Does Netcat allow you to change this? If so, how?
16
LESSON 3 – PORTS AND PROTOCOLS
Further Reading
You can find more information on ports and protocols by looking at the following links:
http://www.oreilly.com/catalog/fire2/chapter/ch13.html
http://www.oreilly.com/catalog/puis3/chapter/ch11.pdf
http://www.oreilly.com/catalog/ipv6ess/chapter/ch02.pdf
http://info.acm.org/crossroads/xrds1-1/tcpjmy.html
http://www.garykessler.net/library/tcpip.html
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ip.htm
http://www.redbooks.ibm.com/redbooks/GG243376.html
Port Number references:
http://www.iana.org/assignments/port-numbers
http://www.isecom.info/cgi-local/protocoldb/browse.dsp
17
LESSON 3 – PORTS AND PROTOCOLS

PORTS AND PROTOCOLS

PORTS AND PROTOCOLS
Table of Contents
Information............................................................................................................... 2
Contributors.............................................................................................................................................4
3.1 Introduction.......................................................................................................................................5
3.2 Basic concepts of networks.............................................................................................................6
3.2.1 Devices ......................................................................................................................................6
3.2.2 Topologies .................................................................................................................................6
3.3 TCP/IP model.................................................................................................................................. 7
3.3.1 Introduction ...............................................................................................................................7
3.3.2 Layers .........................................................................................................................................7
3.3.2.1 Application .......................................................................................................................7
3.3.2.2 Transport............................................................................................................................7
3.3.2.3 Internet ..............................................................................................................................8
3.3.2.4 Network Access.................................................................................................................8
3.3.3 Protocols ....................................................................................................................................8
3.3.3.1 Application layer protocols ............................................................................................9
3.3.3.2 Transport layer Protocols ................................................................................................9
3.3.3.3 Internet layer Protocols ................................................................................................... 9
3.3.4 IP Addresses ...............................................................................................................................9
3.3.5 Ports .........................................................................................................................................12
3.3.6 Encapsulation ..........................................................................................................................13
3.4 Exercises...........................................................................................................................................14
3.4.1 Exercise 1: Netstat ...................................................................................................................14
3.4.2 Exercise 2: Ports and Protocols ..............................................................................................15
3.4.3 Exercise 3: My First Server ....................................................................................................... 15
Further Reading....................................................................................................................................17
3
LESSON 3 – PORTS AND PROTOCOLS
Contributors
Gary Axten, ISECOM
La Salle URL Barcelona
Kim Truett, ISECOM
Chuck Truett, ISECOM
Marta Barceló, ISECOM
Pete Herzog, ISECOM
4
LESSON 3 – PORTS AND PROTOCOLS
3.1 Introduction
The text and exercises in this lesson try to impart a basic understanding of the ports and
protocols in current use, as well as their relevance within the operating systems, Windows and
Linux.
Additionally, you will have the opportunity to become familiar with a number of useful utilities
which will allow you to properly understand the network capabilities of your computer system.
At the end of the lesson you should have a basic knowledge of:
- the concepts of networks
- IP addresses
- ports and protocols.
5
LESSON 3 – PORTS AND PROTOCOLS
3.2 Basic concepts of networks
3.2.1 Devices
In order to understand the explanation of protocols and ports, it is necessary for you to
become familiar with the icons that represent the most common devices that are seen in the
basic schemes. These are:
3.2.2 Topologies
With these devices, local area networks (or LANs) can be created. In a LAN, computers can
share resources, such as hard drives, printers and internet connections, and an administrator
can control how these resources are shared. When a LAN is being designed, it is possible to
choose any of the following physical topologies:
In a bus topology, all the computers are connected to a single means of transmission, and
each computer can communicate directly with any of the others. In the ring configuration,
each computer is connected to the following one, and the last one to the first, and each
computer can only communicate directly with the two adjacent computers. In the star
topology, none of the computers are directly connected with others. Instead they are
connected through a central point and the device at that central point is responsible for
relaying information from computer to computer. If several central points are connected to
each other, an extended star topology is obtained. In a star or extended star topology, all the
central points are peers, that is, each exchanges information on an equal basis. However, if
you connect two star or extended star networks together using a central point which controls
or limits the exchange of information between the two networks, then you have created a
single, hierarchical network topology.
6
LESSON 3 – PORTS AND PROTOCOLS
Bus Ring Star Extended
Star Hierarchic
3.3 TCP/IP model
3.3.1 Introduction
TCP/IP was developed by the DoD (Department of Defense) of the United States and DARPA
(Defense Advanced Research Project Agency) in the 1970s. TCP/IP was designed to be an
open standard that anyone could use to connect computers together and exchange
information between them. Ultimately, it became the basis for the Internet.
3.3.2 Layers
The TCP/IP model defines four totally independent layers into which it divides the process of
communication between two devices. The layers through which it passes information
between two devices are:
3.3.2.1 Application
The application layer is the layer nearest the end user. This is the layer that is in charge of
translating data from applications into information that can be sent through the network.
The basic functions of this layer are:
- Representation
- Codification
- Dialog Control
- Application Management
3.3.2.2 Transport
The transport layer establishes, maintains and finishes virtual circuits for information transfer. It
provides control mechanisms for data flow and allows broadcasting, and it provides
mechanisms for the detection and correction of errors. The information that arrives at this
layer from the application layer is divided into different segments. Information that comes to
the transport layer from the internet layer is delivered back to the application layer through
ports. (See Section 3.3.5 Ports for details on ports.)
7
LESSON 3 – PORTS AND PROTOCOLS
The basic functions of this layer are:
- Reliability
- Flow Control
- Error Correction
- Broadcasting
3.3.2.3 Internet
This layer divides the segments of the transport layer into packets and sends the packets
across the networks that make up the Internet. It uses IP, or internet protocol addresses to
determine the location of the recipient device. It does not ensure reliability in the
connections, because this is already taken care of by the transport layer, but it is responsible
for selecting the best route between the originating device and the recipient device.
3.3.2.4 Network Access
This layer is in charge of sending information at both the LAN level and the physical level. It
transforms all the information that arrives from the superior layers into basic information (bits)
and directs it to the proper location. At this level, the destination of the information is
determined by the MAC, or media access control, address of the recipient device.
3.3.3 Protocols
To be able to send information between two devices, both must speak the same language.
This language is called the protocol.
The protocols that appear in the application layer of the TCP/IP model are:
- File Transfer Protocol (FTP)
- Hypertext Transfer Protocol (HTTP)
- Simple Mail Transfer Protocol (smtp)
- Domain Name Service (DNS)
- Trivial File Transfer Protocol (TFTP)
The protocols of the transport layer are:
- Transport Control Protocol (TCP)
- User Datagram Protocol (UDP)
The protocols of the internet layer are:
- Internet Protocol (IP)
The protocol most often used in the network access layer is:
- Ethernet
The protocols listed above and their associated ports will be described in the following
sections.
8
LESSON 3 – PORTS AND PROTOCOLS
3.3.3.1 Application layer protocols
FTP or file transfer protocol is used for the transmission of files between two devices. It uses TCP
to create a virtual connection for the control of information, then creates another connection
to be used for the delivery of data. The most commonly used ports are 20 and 21.
HTTP or hypertext transfer protocol is used to translate information into web pages. This
information is distributed in a manner similar to that used for electronic mail. The most
commonly used port is 80.
SMTP or simple mail transfer protocol is a mail service that is based on the FTP model. It
transfers electronic mail between two systems and provides notifications of incoming mail. The
most commonly used port is 25.
DNS or domain name service provides a means to associate a domain name with an ip
address. The most commonly used port is 53.
TFTP or trivial file transfer protocol has the same functions as FTP but uses UDP instead of TCP.
(See Section 3.3.3.2 for details on the differences between UDP and TCP.) This gives it more
speed, but less security and trustworthiness. The most commonly used port is 69.
3.3.3.2 Transport layer Protocols
There are two protocols which can be used by the transport layer to deliver information
segments.
TCP or transmission control protocol establishes a logical connection between the final points
of the network. It synchronizes and regulates the traffic with what is known as the "Three Way
Handshake". In the “Three Way Handshake,” the originating device sends an initial packet
called a SYN to the recipient device. The recipient device sends an acknowledgment
packet, called a SYN/ACK. The originating device then sends a packet called an ACK, which
is an acknowledgment of the acknowledgment. At this point, both the originating device
and the recipient device have established that there is a connection between the two and
both are ready to send and receive data to and from each other.
UDP or user datagram protocol is a transport protocol which is not based on a connection. In
this case, the originating device sends packets without warning the recipient device to
expect these packets. It is then up to the recipient device to determine whether or not those
packets will be accepted. As a result, UDP is faster that TCP, but it cannot guarantee that a
packet will be accepted.
3.3.3.3 Internet layer Protocols
IP or internet protocol serves as a universal protocol to allow any two computers to
communicate through any network at any time. Like UDP, it is connectionless, because it does
not establish a connection with the remote computer. Instead, it is what is known as a best
effort service, in that it will do whatever is possible to ensure that it works correctly, but its
reliability is not guaranteed. The Internet Protocol determines the format for the packet
headers, including the IP addresses of both the originating and the recipient devices.
3.3.4 IP Addresses
A domain name is the web address that you normally type into a web browser. That name
identifies one or more IP addresses. For example, the domain name microsoft.com represents
about a dozen IP addresses. Domain names are used in URLs to identify particular Web pages.
9
LESSON 3 – PORTS AND PROTOCOLS
For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is
pcwebopedia.com.
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to.
There are only a limited number of such domains. For example:
.gov - Government agencies
.edu - Educational institutions
.org - Organizations (nonprofit)
.com - Commercial Business
.net - Network organizations
Because the Internet is based on IP addresses, not domain names, every Web server requires
a Domain Name System (DNS) server to translate domain names into IP addresses.
IP Addresses are the identifiers that are used to differentiate between computers and other
devices that are connected to a network. Each device must have a different IP address, so
that there are no problems of mistaken identity within the network. IP addresses consist of 32
bits that are divided in four 8 bit octets which are separated by dots. Part of the IP address
identifies the network, and the remainder of the IP address identifies the individual computers
on the network.
There are both public and private IP addresses. Private IP addresses are used by private
networks that have no connection with outside networks. IP addresses within a private
network should not be duplicated within that network, but computers on two different – but
unconnected – private networks could have duplicated IP addresses. The IP addresses that
are defined by IANA, the Internet Assigned Numbers Authority, as being available for private
networks are:
10.0.0.0 through 10.255.255.255
172.16.0.0 through 172.31.255.255
192.168.0.0. through 192.168.255.255
IP addresses are divided into classes based on what portion of the address is used to identify
the network and what portion is used to identify the individual computers.
Depending on the size assigned to each part, more devices will be allowed within the
network, or more networks will be allowed. The existing classes are:
10
LESSON 3 – PORTS AND PROTOCOLS
- Class A: The first bit is always zero, so this class includes the addresses between 0.0.0.0
and 126.255.255.255. Note: the addresses of 127.x.x.x are reserved for the services of
loopback or localhost.
- Class B: The first two bits of the first octet are '10', so this class includes the addresses
between 128.0.0.0 and 191.255.255.255.
- Class C: The first three bits of the first octet are '110', so this class includes the
addresses between 192.0.0.0 and 223.255.255.255.
- Class D: The first four bits of the first octet are '1110', so this class includes the
addresses between 224.0.0.0 and 239.255.255.255. These addresses are reserved for
group multicast implementations.
- The remaining addresses are used for experimentation or for possible future
allocations.
At this time, the classes are not used to differentiate between the part of the address used to
identify the network and the part used to identify the individual devices. Instead, a mask is
used. In the mask, a '1' binary bit represents the part containing the network identification and
a '0' binary bit represents the part that identifies the individual devices. Therefore, to identify a
device, in addition to the IP address, it is necessary to specify a network mask:
IP: 172.16.1.20
Mask: 255.255.255.0
IP addresses 127.x.x.x are reserved to be used as loopback or local host addresses, that is,
they refer directly back to the local computer. Every computer has a local host address of
127.0.0.1, therefore that address cannot be used to identify different devices. There are also
other addresses that cannot be used. These are the network address and the broadcast
address.
The network address is an address in which the part of the address which normally identifies
the device is all zeros. This address cannot be used, because it identifies a network and can
never be used to identify a specific device.
IP: 172.16.1.0
Mask: 255.255.255.0
11
LESSON 3 – PORTS AND PROTOCOLS
The broadcast address is an address in which the part of the address which normally identifies
the device is all ones. This address cannot be used to identify a specific device, because it is
the address that is used to send information to all of the computers that belong to the
specified network.
IP: 172.16.1.255
Mask: 255.255.255.0
3.3.5 Ports
Both TCP and UDP use ports to exchange information with applications. A port is an extension
of an address, similar to adding an apartment or room number to a street address. A letter
with a street address will arrive at the correct apartment building, but without the apartment
number, it will not be delivered to the correct recipient. Ports work in much the same way. A
packet can be delivered to the correct IP address, but without the associated port, there is
no way to determine which application should act on the packet.
Once the ports have been defined, it is possible for the different types of information that are
sent to one IP address to then be sent to the appropriate applications. By using ports, a
service running on a remote computer can determine what type of information a local client
is requesting, can determine the protocol needed to send that information, and maintain
simultaneous communication with a number of different clients.
For example, if a local computer attempts to connect to the website www.osstmm.org,
whose IP address is 62.80.122.203, with a web server running on port 80, the local computer
would connect to the remote computer using the socket address :
62.80.122.203:80
In order to maintain a level of standardization among the most commonly used ports, IANA
has established that the ports numbered from 0 to 1024 are to be used for common services.
The remaining ports – up through 65535 – are used for dynamic allocations or particular
services.
The most commonly used ports – as assigned by the IANA – are listed here:
Port Assignments
Decimals Keywords Description
0 Reserved
1-4 Unassigned
5 rje Remote Job Entry
7 echo Echo
9 discard Discard
11 systat Active Users
13 daytime Daytime
15 netstat Who is Up or NETSTAT
17 qotd Quote of the Day
19 chargen Character Generator
20 ftp-data File Transfer [Default Data]
21 ftp File Transfer [Control]
22 ssh SSH Remote Login Protocol
12
LESSON 3 – PORTS AND PROTOCOLS
Port Assignments
Decimals Keywords Description
23 telnet Telnet
25 smtp Simple Mail Transfer
37 time Time
39 rlp Resource Location Protocol
42 nameserver Host Name Server
43 nicname Who Is
53 domain Domain Name Server
67 bootps Bootstrap Protocol Server
68 bootpc Bootstrap Protocol Client
69 tftp Trivial File Transfer
70 gopher Gopher
75 any private dial out service
77 any private RJE service
79 finger Finger
80 www-http World Wide Web HTTP
95 supdup SUPDUP
101 hostname NIC Host Name Server
102 iso-tsap ISO-TSAP Class 0
110 pop3 Post Office Protocol - Version 3
113 auth Authentication Service
117 uucp-path UUCP Path Service
119 nntp Network News Transfer Protocol
123 ntp Network Time Protocol
137 netbios-ns NETBIOS Name Service
138 netbios-dgm NETBIOS Datagram Service
139 netbios-ssn NETBIOS Session Service
140-159 Unassigned
160-223 Reserved
You can also refer to the Web page: http://www.isecom.info/cgilocal/
protocoldb/browse.dsp for more detailed information on ports.
3.3.6 Encapsulation
When a piece of information – an e-mail message, for example – is sent from one computer to
another, it is subject to a series of transformations. The application layer generates the data,
which is then sent to the transport layer. The transport layer takes this information and adds a
header to it. This header contains information, such as the IP addresses of the originating and
recipient computers, that explains what must be done to the data in order to get it to the
appropriate destination. The next layer adds yet another header, and so on. This recursive
procedure is known as encapsulation.
Each layer after the first makes its data an encapsulation of the previous layer's data, until you
arrive at the final layer, in which the actual transmission of data occurs. The following figure
explains encapsulation in a graphic form:
13
LESSON 3 – PORTS AND PROTOCOLS
When the encapsulated information arrives at its destination, it must then be deencapsulated.
As each layer receives information from the previous layer, it removes the
unneeded information contained in the header placed there by the previous layer.
3.4 Exercises
3.4.1 Exercise 1: Netstat
Netstat
The Netstat command allows you to see the state of the ports on a computer. In order to
execute it, you must open an MS-DOS window and type:
netstat
In the MS-DOS window, you will then see a list of the established connections. If you want to
see the connections displayed in numeric form, type:
netstat - n
To see the connections and the active ports, type:
netstat - an
To see a list of other options, type:
netstat - h
In the Netstat output, the second and third columns list the local and remote IP addresses
being used by the active ports. Why are the addresses of the remote ports different from the
local addresses?
Next, using a web browser, open this web page:
http://193.145.85.202
then return to the MS-DOS prompt and run Netstat again. What new connection (or
connections) appear?
Open another web browser and go to this web page:
http://193.145.85.203
Return to the MS-DOS prompt and run Netstat:
14
LESSON 3 – PORTS AND PROTOCOLS
DATA
SEGMENT
PACKET
FRAME
- Why does the protocol HTTP appear in several lines?
- What differences exist between each one of them?
- If there are several web browsers open, how does the computer know which information
goes to which browser?
3.4.2 Exercise 2: Ports and Protocols
In this lesson, you learned that ports are used to differentiate between services.
Why is it that when a web browser is used, no port is specified?
What protocols are used?
Is it possible that one protocol gets used in more than one instance?
3.4.3 Exercise 3: My First Server
To perform this exercise, you must have the Netcat program. If you do not have it, you can
download it from the page:
http://www.atstake.com/research/tools/network_utilities/
Once you have Netcat installed, open an MS-DOS window. Change to the Netcat directory
and type:
nc - h
This displays the options that are available in Netcat. To create a simple server, type:
nc - l - p 1234
When this command executes, port 1234 is opened and incoming connections are allowed.
Open a second MS-DOS window and type:
netstat – a
This should verify that there is a new service listening on port 1234. Close this MS-DOS window.
To be able to say that a server has been implemented, you must establish a client association.
Open an MS-DOS window and type:
nc localhost 1234
With this command, a connection is made with the server that is listening to port 1234. Now,
anything that is written in either of the two open MS-DOS windows can be seen in the other
window.
Create a file named 'test', that contains the text, “Welcome to the Hacker Highschool server!”
In an MS-DOS window, type:
nc - l - p 1234 > test
From another MS-DOS window, connect to the server by typing:
nc localhost 1234
When the client connects to the server, you should see the output of the file, 'test'.
To close the service, switch to the MS-DOS window in which it is running and press CTRL-C.
What protocol has been used to connect with the server?
15
LESSON 3 – PORTS AND PROTOCOLS
Does Netcat allow you to change this? If so, how?
16
LESSON 3 – PORTS AND PROTOCOLS
Further Reading
You can find more information on ports and protocols by looking at the following links:
http://www.oreilly.com/catalog/fire2/chapter/ch13.html
http://www.oreilly.com/catalog/puis3/chapter/ch11.pdf
http://www.oreilly.com/catalog/ipv6ess/chapter/ch02.pdf
http://info.acm.org/crossroads/xrds1-1/tcpjmy.html
http://www.garykessler.net/library/tcpip.html
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ip.htm
http://www.redbooks.ibm.com/redbooks/GG243376.html
Port Number references:
http://www.iana.org/assignments/port-numbers
http://www.isecom.info/cgi-local/protocoldb/browse.dsp
17
LESSON 3 – PORTS AND PROTOCOLS

BASIC COMMANDS इन LINUX AND WINDOWS

BASIC COMMANDS IN
LINUX AND WINDOWS
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
Table of Contents
“License for Use” Information............................................................................................................... 2
Contributors.............................................................................................................................................4
2.1. Introduction and Objectives...........................................................................................................5
2.2. Requirements and Setup.................................................................................................................6
2.2.1 Requirements.............................................................................................................................6
2.2.2 Setup...........................................................................................................................................6
2.3. System Operation: WINDOWS.........................................................................................................7
2.3.1 How to open an MS-DOS window ..........................................................................................7
2.3.2 Commands and tools (Windows)............................................................................................7
2.4. System Operations: Linux...............................................................................................................10
2.4.1 How to open a console window............................................................................................10
2.4.2 Commands and tools (Linux)..................................................................................................10
2.5. Exercises..........................................................................................................................................13
2.5.1 Exercises in Windows................................................................................................................13
2.5.2 Exercises in Linux.......................................................................................................................13
2.5.3 Exercise 3..................................................................................................................................13
3
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
Contributors
Daniel Fernández Bleda, Internet Security Auditors
Jairo Hernández, La Salle URL Barcelona
Jaume Abella, La Salle URL Barcelona - ISECOM
Kim Truett, ISECOM
Pete Herzog, ISECOM
Marta Barceló, ISECOM
4
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
2.1. Introduction and Objectives
This lesson introduces commands and basic tools for both Windows and Linux operating
systems so that you can become familiar with them. These commands will be used to
complete the exercises in the following lessons
At the end of this lesson, you should know the following commands:
 General Windows and Linux commands
 Basic network commands and tools
- ping
- tracert
- netstat
- ipconfig
- route
5
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
2.2. Requirements and Setup
2.2.1 Requirements
For the lesson, the following are needed:
- a PC with Windows 98/Me/2000/NT/XP/2003
- a PC with Linux Suse/Debian/Knoppix
- access to the Internet.
2.2.2 Setup
This is the setup in which you are going to work. It consists of your PC, with access
to the Internet, and the ISECOM Hacker Highschool network, which you will
access through the Internet. This is the network against which you will make most
of the tests.
Note that access to the ISECOM test network is restricted. In order to gain access
to it, your instructor must contact the sytem administrator, as detailed on the
www.hackerhighschool.org web site.
6
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
2.3. System Operation: WINDOWS
Most of the tools used for the study of networks are internal commands in the
Windows operating system. Therefore, we are going to explain how to open a
command window when the Windows operating system is being used.
2.3.1 How to open an MS-DOS window
To issue the following commands, it is necessary to open a command prompt (an
MS-DOS window). The procedure for this is the same for all versions of Windows.
1.- Click the START button
2.- Choose the RUN option
3.- Type “command” if you are using Windows 95/98 or “cmd” for all other versions
of Windows and press Enter or click OK.
4.- A window similar to the following one will appear:
5.- Now the commands and tools listed below can be entered.
2.3.2 Commands and tools (Windows)
Commands
date Display or set the date of the system
time Display or set the time of the system
ver Display the MS-DOS version that is being used
dir Display the list of subdirectories and files of a directory
cls Clear the screen
mkdir,
md directory
Make a directory with the name “directory”
Example: md tools
chdir, cd directory Display the name or change the current directory to “directory”
Example: cd tools
rmdir, rd directory Delete the directory with the name “directory”
Example: rd tools
7
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
tree directory Display the structure of folders of a path in text-graphic format
Example: tree c:\tools
chkdsk Check a disk and show a status report
mem Show the amount of memory used and free in the system
rename,
ren source dest
Change the name of files
Example: ren oldname newname
copy source dest Copy one or more files to another location
Example: copy c:\tools\myfile.txt c:\tmp
move source dest Move files and change the name of files and directories
Example: move c:\tools c:\tmp
type file Type the content of one or more text files
Example: type c:\tools\myfile.txt
more file Display the information screen by screen
Example: more c:\tools\myfile.txt
delete, del file Delete one or more files
Example: del c:\tools\myfile.txt
Note: The words in italics are not commands, and must be replaced by the desired
values. Some of the commands can be used by typing either their long version or short
version; for example, "delete" and "del‚" are the same command.
Tools
ping host Verify contact with the machine “host”
The command ping sends "packets" using ICMP (Internet Control
Message Protocol) to another computer, to learn whether it is
accessible through the network. In addition, it shows a statistical
summary about the percentage of packets that have not been
answered and the response time. The name of the machine can
be used directly or its IP address.
Examples: ping www.google.com
ping 193.145.85.2
Some options are:
- n N: send N packets
- t: ping the specified host until stopped (press CTRL+C to end)
To see more options: ping /h
8
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
tracert host Show the route that packets follow to reach the machine “host”
The command tracert is the abbreviation of trace route, which
allows you to learn the route that a packet follows from the origin,
(your machine) to the destination machine. It can also tell you
the time it takes to make each jump. At the most, 30 jumps will be
listed. It is sometimes interesting to observe the names of the
machines through which the packets travel.
Examples: tracert www.google.com
tracert 193.145.85.2
Some options are:
- h N: to specify N, at the most, jumps.
- d: to not show the names of the machines.
To see more options: tracert
ipconfig Display information on the active interfaces (ethernet, ppp, etc.)
in the computer.
Some options:
/all: to show more details
/renew name: renews connection with “name” when automatic
configuration with DHCP is used.
/release name: deactivates all matching connections when
automatic configuration with DHCP is used.
To see more options: ipconfig /?
route print Display the routing table
The command route serves to define static routes, to erase routes
or simply to see the state of the routes.
Some options:
print: to show the list of routes.
delete: to delete a route.
add: to add a route.
To see more options: route/?
netstat Displays information on the status of the network and established
connections with remote machines.
Some options:
-a: To sample all the connections and listening ports
-n: to display addresses and port numbers in numeric form
-e: to sample Ethernet statistics
For example: netstat - an
To see more options: netstat/?
9
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
For additional information on these commands and tools type "command /h" or
"command /?‚" or "help command" from a MS-DOS window.
For example, for additional information on the tool netstat, we have three possibilities:
1) netstat /h
2) netstat /?
3) help netstat
2.4. System Operations: Linux
Just as in Windows, if you are using Linux, a great majority of the commands
that you will use are executed from a console emulation window. Therefore,
we will next learn how to open a console window in Linux.
2.4.1 How to open a console window
To issue the following commands, it is necessary to open a console window:
1. - To go to the START APPLICATION button
2. - Select “Run Command”
3. - Enter “konsole”
4. - A window similar to the following one will appear:
5. - Now the commands and tools listed below can be entered.
2.4.2 Commands and tools (Linux)
Commands
pwd Display the name of the current directory.
hostname Display the name of the local host (the computer which you are
currently using)
10
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
finger user Display information on the user “user”
Example: finger root
ls List the content of the directories
Example: ls -la
cd directory Change from current directory to “directory”. If no directory
name is specified it changes to the home directory,
Example:
For the login name “mylogin” the command
$cd
changes the directory to /home/mylogin
Example:
$cd -
changes to the last visited directory
Example:
$cd /tmp
changes to the “tmp” directory
cp source dest Copy files. Copy the file “source” to the file “dest”.
Example: cp /etc/passwd /tmp
rm file Delete files. Only the owner of the file (or root) can delete it.
Example: rm myfile
mv source dest Move or rename files and directories.
Example: mv oldname newname
mkdir directory Make a directory with the name “directory”.
Example: mkdir tools
rmdir directory Delete the directory with the name “directory” if it is empty.
Example: rmdir tools
find / -name file Find a file with the name “file” beginning the search in the root
directory
Example: find / -name myfile
echo string Write the string “string” in the standard output
Example: echo hello
command > file Redirect the normal screen output of the command “command”
to the file “file”
Example: ls > myls
command >> file Redirect the normal screen output of the command “command”
to the file “file”. If the file already exists, it appends the output to
the end of the file.
Example: ls >> myls
man command Show the pages of the online manual about “command”
Example: man ls
Note: The words in italics are not commands and must be replaced by the desired values.
11
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
For additional information on the use of these commands and tools, type in "command
-help" or "man command" in the console window.
For example, for additional information on the “ls” command, type in either of these two
possibilities:
1) ls –-help
2) man ls
Tools (Please see the Windows section for details on these tools.)
ping host Verify the contact with the machine “host”
Example: ping www.google.com
traceroute host Show the route that the packets follow to reach the machine
“host”. Example: tracert www.google.com
ifconfig Display information on the active interfaces (ethernet, ppp, etc.)
route Display the routing table
netstat Display information on the status of the network
Example: netstat -an
Basic command equivalences for Windows/Linux
This is a table showing the basic command equivalences between Linux and Windows.
Commands are executed from a shell (in Linux) or from a MS-DOS window (in Windows).
Linux Windows
command --help command /h, command /?
man command help command
cp copy
rm del
mv move
mv ren
more, less, cat type
lpr print
rm -R deltree
ls dir
cd cd
mkdir md
rmdir rd
route route print
traceroute –I tracert
ping ping
ifconfig ipconfig
12
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
2.5. Exercises
2.5.1 Exercises in Windows
1. Go to a MS-DOS window.
2. Identify the version of MS-DOS that you are using. What version have you detected? What
command have you used?.
3. Identify the date and time of the system. If they are incorrect, modify them so that they are
correct. What command have you used?
4. Identify all the directories and files that are in “c:\”. What command have you used?
5. Create the directory c:\hhs\lesson0. Copy in this directory all the files with the extension
“.sys” that are in “c:\”. What files have you found? What commands have you used?
6. Identify the IP address of your host. What command have you used? What IP address do
you have?
7. Trace the route to “www.google.com”. Identify IPs of the intermediate routers.
2.5.2 Exercises in Linux
1. Identify the owner of the file “passwd”. (Note: first locate where this file is). What command
have you used?
2. Create the directory “work” in your own home directory (for example, if your login is
“mylogin”, create the directory in “/home/mylogin”), and copy the file “passwd” in the
directory “work” that you have just created. Identify the owner of the file “passwd” that has
been copied.
3. Create the directory “.hide” in the “work” directory. List the contents of this directory. What
did you have to do to see the contents of directory ".hide"?
4. Create the file “test1” with the content “This is the content of the file test1” in the “work”
directory. Create the file “test2” with the content “This is the content of the file test2” in the
“work” directory. Copy into a file with the name "test” the contents of previous files. What
commands have you used?
5. Identify the name and the IP address of your machine. What commands have you used?
What IP address do you have?
6. Trace the route to “www.google.com”. Identify IPs of the intermediate routers.
2.5.3 Exercise 3
Complete the following table with parallelisms between Windows and Linux. For
example: the Linux command “command -help” is equivalent to the Windows
13
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
command “command /h”. As another example, in Linux: “cp” is just like the Windows
command, “copy”.
command --
help
command /
h
cp copy
del
mv
more
print
deltree
lsc
d
md
rd
route
tracert
Ping
ipconfig
14
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS
Further Reading
For an extensive glossary of terms visit the following URLs:
http://www.matisse.net/files/glossary.html
http://www.uic.edu/depts/accc/inform/v106.html
http://www.catb.org/~esr/jargon/
Windows – for additional information on commands and tools, type in "command /h" or
"command /?‚" or "help command" from a MS-DOS window.
Linux – for additional information on commands and tools, type in "command --help" or
"man command" from a shell.
15
LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS

MAKE FREE MONEY

WELCOME

Welcome to my world where everybody is somebody and none is nobody. Together we shall hack all hackables