Skip to main content

Posts

Showing posts from January, 2022

What is the SMB Protocol?

What is the SMB Protocol? Even if you haven’t heard of the SMB protocol, millions of people use it every day. The Server Message Block (SMB) is a network protocol that enables users to communicate with remote computers and servers — to use their resources or share, open, and edit files. It’s also referred to as the server/client protocol, as the server has a resource that it can share with the client. Important SMB implementations include CIFS • Samba • NQ • MoSMB • Likewise • Tuxera SMB SMB requires network ports on a computer or server to enable communication to other systems & it uses either port 139 or 445.  Port 139 • SMB originally ran on top of NetBIOS using port 139. NetBIOS is an older transport layer that allows Windows computers to talk to each other on the same network. Port 445 • Later versions of SMB (after Windows 2000) began to use port 445 on top of a TCP stack. Using TCP allows SMB to work over the internet.

What are Ports?

On a TCP/IP network every device must have an IP address. However an IP address alone is not sufficient for running network applications, as a computer can run multiple applications and/or services. Just as the IP address identifies the computer, The network port identifies the application or service running on the computer. • Analogy If you use a house or apartment block analogy the IP address corresponds to the street address. All of the apartments share the same street address. However each apartment also has an apartment number which corresponds to the Port number.

Learn Ethical hacking with practical language.

Types of hackers A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. Script kiddies: A non-skilled person who gains access to computer systems using already made tools. #intermediate Getting started with Nmap Nmap is the world's leading port scanner. Nmap, as an online port scanner, can scan your perimeter network ...

What is ADB?

Many users are not familiar with Android SDK or ADB commands, this thread is created with an intention to help them! Look at any tutorial for rooting an Android device, and one set of initials is sure to come up: ADB. Veterans to Google’s mobile platform will let it roll off their tongues as if it’s everyday language, but those new to Android hacking can get a little tripped up. What the $%#@ is ADB? Let’s take a look. Introduction:- Android Debug Bridge (adb) is a versatile command line tool that lets you communicate with an emulator instance or connected Android-powered device. ADB is a tool that allows you to talk with your device and accomplish a host of different tasks from your computer, such as transferring data, recording the screen's output to a video file, and running powerful shell commands.In simple words. it’s a “bridge” for developers to work out bugs in their Android applications. This is done by connecting a device that runs the software through a P...