• 5) Traceroute
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet185/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   181   182   183   184   185   186   187   188   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    4) Ping tool
    Hackers often when trying to deal with networks after getting access to the
    system will try to do work on the ping tool. This is because the ping tool
    sends an SMP request to the tool and will let the packets received. When
    you enter the ping command in the Linux terminal the tool will start
    analyzing the packets and will display the response packets that are
    receiving. For this reason, the ping tool is often considered the initiation of
    networking tools that need to be mastered. 
    Here is a command that explains the working of the ping command:
    ping www.hackkali.com
    a) when we enter this command, the network will start analyzing the
    packets that are flowing and will give the following output. 
    128 packets received 192.674.34.2
    64 packets received 192.675.34.2
    .....
    .....


    A ping is a command tool that displays the content in the shell so there is no
    way you can stop the tool unless you close the shell window. You can
    further check the ping statistics using the following command and can also
    be exported into a text file.
    192.674.34.2 ping statistics
    With this command, all of the statistics that deals with the domain will be
    displayed. In the next section, we will explain about traceroute another
    important network tool that can trace where the packet has traveled. 
    5) Traceroute
    Networks are used to send information from one system to another that is
    present in the same network or to other systems that are present elsewhere.
    However, have you ever wondered how this information will be passed on? 
    The transportation of the information is done using packets and routers.
    Packets are basic traffic that exchanges the information. Traceroute in the
    basic idea will inspect these packets and will trace whatever they are doing.
    This is an advanced concept that deals with things that networks are ought
    to do. Check yourself about the packets that are passing through using the
    traceroute command.
    example@ linuxwar : traceroute 192.23.2.1
    With this, we have completed a brief explanation of the network hacking
    tools and in the next chapter, we will have a brief explanation about hacking
    hierarchies.



    Download 6,34 Mb.
    1   ...   181   182   183   184   185   186   187   188   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish