• Routing and gateway settings
  • Why are gateways important for hackers
  • Manipulating the network configuration file




    Download 6,34 Mb.
    Pdf ko'rish
    bet183/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   179   180   181   182   183   184   185   186   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Manipulating the network configuration file 


    Usually, when we run an ifconfig command everything that is acquired or
    obtained by sending network packets is stored in a configuration file.
    Configuration files are special types of files they maintain a certain order so
    that the system can detect it. Not every file need not be a configuration file. 
    However, when we boot or switch off the system everything that is the
    input protocol information will be deleted forever. So, instead of rekindling
    the entire procedure other time it is best to write into a configuration file
    which can be easily found in the, etc folder. 
    In the configuration file enter the network address and network mask in
    detail. It should be important because the manipulated network
    configuration file can be used to do a fingerprinting about the system. 
    Routing and gateway settings 
    A network card consists of a gateway and also consists of a routing protocol
    that looks at how things are functioned here. So before starting the network
    hacking details, we will learn what a gateway is.
    Gateway is like an entrance to the network system that we are dealing with.
    We usually have computers and these are called hosts and they have an
    immediate physical address known as MAC address. Gateway works as a
    gate or checking point that checks the network packets and sends them to
    the servers the user is trying to contact. It does the same when a response is
    received. For this reason, gateways are the most important part of network
    systems. 
    Why are gateways important for hackers? 
    When you are willing to use a VPN or proxy server then you need to enter
    the gateway. Otherwise, the packets will just pass through the default router
    gateway. 
    Here are commands that can be used to change the default gateway: 
    example@ linuxwar : gateway = 214.133.1.1


    In the next section we will discuss routing and why is important for the
    better performance of the network systems. 

    Download 6,34 Mb.
    1   ...   179   180   181   182   183   184   185   186   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Manipulating the network configuration file

    Download 6,34 Mb.
    Pdf ko'rish