Usually, when we run an ifconfig command everything that is acquired or
obtained by sending network packets is stored in a configuration file.
Configuration files are special types of files they maintain a certain order so
that the system can detect it. Not every file need not be a configuration file.
However, when we boot or switch off the system everything that is the
input protocol information will be deleted forever. So, instead of rekindling
the entire procedure other time it is best to write into a configuration file
which can be easily found in the, etc folder.
In the configuration file enter the network address and network mask in
detail. It should be important because the manipulated network
configuration file can be used to do a fingerprinting about the system.
Routing and gateway settings A network card consists of a gateway and also consists of a routing protocol
that looks at how things are functioned here. So before starting the network
hacking details, we will learn what a gateway is.
Gateway is like an entrance to the network system that we are dealing with.
We usually have computers and these are called hosts and they have an
immediate physical address known as MAC address. Gateway works as a
gate or checking point that checks the network packets and sends them to
the servers the user is trying to contact. It does the same when a response is
received. For this reason, gateways are the most important part of network
systems.
Why are gateways important for hackers? When you are willing to use a VPN or proxy server then you need to enter
the gateway. Otherwise, the packets will just pass through the default router
gateway.
Here are commands that can be used to change the default gateway:
example@ linuxwar : gateway = 214.133.1.1
In the next section we will discuss routing and why is important for the
better performance of the network systems.