| Joined: Mar 2004 Posts: 419 UGN Member | OP UGN Member Joined: Mar 2004 Posts: 419 | Is there a "magic" range of IP adresses or is it just random hit or miss from 0.0.0.0 up?
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Mar 2002 Posts: 815 nobody | nobody Joined: Mar 2002 Posts: 815 | there are certain reserved adresses and adress ranges. 127.0.0.1 is loopback there are also reserved ranges for LANs like 192.168. and 10.0.0. But the man to ask is infinite he knows all this stuff. | | | | Joined: Oct 2003 Posts: 1,449 UGN Elite Poster | UGN Elite Poster Joined: Oct 2003 Posts: 1,449 | isp's purhace ip address in blocks just like how the phone company buys their numbers in blocks of 1000 (but that will be no more soon thanks to porting). that answer ur question? it's strait from giz.... | | | | Joined: May 2003 Posts: 3 Junior Member | Junior Member Joined: May 2003 Posts: 3 | InterNIC assigns addresses by 3 classes, A, B, C(there are 2 more but those arent normally used). These classes have to do with denoteing the possible hosts and networks. As i understand it most insecure computers will be in the B or C class as those are usually used for home and business use. Because the class defines the netmasks and possible network topography it has a specific range of IP addresses. eg A has 1-126, B has 128- 191, C has 192-223.
As a sort of conclusion to my rambling speech: look for computers in 128.x.x.x - 223.x.x.x, not very narrow i know but better than accedentally port scaning White Sands Missle Range.
If any one thinks im wrong about the commonly insecure field of IPs theyre welcome to correct me.
"This is our world now... the world of the electron and the switch, the beauty of the baud" -mentor
| | | | Joined: Oct 2002 Posts: 955 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 955 | also (and I did look for a link, but tricky thinking of the keywords), certain ranges of the IP address are broken down further for specific uses or connection methods. This is the best link I could find: http://www.sabre.ccp.com.au/filez/private_addresses.html and I am sure infinite will be able to provide something better, sry for my laziness | | | | Joined: Mar 2004 Posts: 419 UGN Member | OP UGN Member Joined: Mar 2004 Posts: 419 | NP you guys are great, i knew about the three different classes from reading the links posted in a previous IP question but i didn't know the 128 to 223 thing.as for port scanning the missle range all i hve to say is "Would you like to play a game?" I am using IP tools that i got here and i have not gotten any "hits" so that is why i was asking the question.
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Oct 2002 Posts: 616 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 616 | "Would you like to play a game?" LMAO, very keen.
Nmap, 7th Sphere port scanner, Saint, hmm, http://"http://www.rootshell.com/beta/exploits.html" IF, their still operational, a quick try from this lan shows nothing, but then college proxies block lots of bullshit. Really instead of windows based exploitation of ip range scanning, intrusions, whatever, a Linux Flavor would be the better choice imo. Better choices of software, an operating system built mostly to start off on c, and a variant of unix. That's Linux itself, I prefer lots of different o/s's for different reasons.
Maybe you'd like bugtraq or freshmeat.net....maybe it's .org, one's probably an adult site, the other is a developmental unice coding project, on going. Just as sourceforge.net is. All kinds of areas to learn in, many varied layers of the tcp/ip cake. It all depends on your passion, your need, and how much you want to devote to your cause, better would be an effect. Effecting is a great process. For instance I have a darkside, but I show my jedi light more, to help, and to improve on a flawed system of knowledge everyone contributes to.
Learning more on tcp/ip layering, and ip protocal structure might or might not be to much for you. But it would teach you areas like the said requested. All just imo, and probably will help or hurt. I see your in va, north, south, east west? Southwestern here. Cool to see someone from the area on the boards=]
"Beware the Jabberwock, my son! The jaws that bite, the claws that catch! Beware the Jubjub bird, and shun The frumious Bandersnatch!"
| | | | Joined: Mar 2004 Posts: 419 UGN Member | OP UGN Member Joined: Mar 2004 Posts: 419 | norfolk to be specific, but i ahve been trying very hard to get into linux, i just installed mandrake 10.0 on my laptop. it works i guess but but i feel like i am just a poser because i have no idea what i am doing with it. i am trying to learn but there is only so much time in a day and my thirst for knowledge is never quenched. even when i sit down to dedicate time to learning i see something that catches my eye and i am off....."OOO a buterfly" oh what was i talking about? oh yeah see it's a lot like that. that is why i will never be a true hacker i lack the concentration, i just want to learn. although being 4 1337 h4x0rs would be the ulitimate but i don't know if i will ever get there.
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Oct 2002 Posts: 616 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 616 | "i am trying to learn but there is only so much time in a day and my thirst for knowledge is never quenched." Trust me, if your like some of the people I know here, It never will be:)
""OOO a buterfly"" LOL, can't catch it, but you can capture it, along with embody it into a knowledge center that your will carry with you, and spread to others as you travel.
heh that's add for ya:) I lose track all the time, live life, have fun, [censored] rules, and never believe that systems are not exploitable, and adaptable to your ever need/want. A True Hacker is not what mainstream society, and the media denote it to be. In the past it held a definition less close to "CRACKER" but the media really [censored] that one over. Heh, Your a novice hacker imo, a hacker is a hacker. That dood that adapts a quarter to play a drinking game is a hacker, the same for the chick sticking a hanger down a payphone in the past to get free calls. "Quarter on a string" Thank you millenium phone.
Concentration is only needed when your trying to hard, hold back, adapt like a chameleon, watch, read(code if you want, view sources to start), and just chill on it. Don't worry about being anyway any stereotype is. BE YOURSELF. That's what gets you in the blinding speed vision zone, where your you, and your doing things you never thought even possible at that current moment. This system, life, has rules, break them, bend them, hold them, and watch them burn. You have the divine gift of freewill, and choice. That is something many forgot.
Linux.org's main FaQ should help with most of your Flavor troubles. Start with command structure. Learn the lay of the command line. Don't go gui yet, stay console, work on some security knowledge, and then go into directory searching. Don't be afraid. If you [censored] up, you just revolve back to a higher start then before, still pushing that envelope top learn. Never give up, and never take a quiting mock of a down type talk from others. Your you, your best at being you, and I believe were all best at being ourselves when we forget what others think. Straight up drop guard, and just have fun.
Humor, laughter, dance, music, fun, that sorta [censored], that's the cool icey breath of life, reminding us to stop being so god damn hot head about [censored] that years from now most likely won't matter or be remembered. Unless, that is, if were just being who we are.:]
"Beware the Jabberwock, my son! The jaws that bite, the claws that catch! Beware the Jubjub bird, and shun The frumious Bandersnatch!"
| | | | Joined: Mar 2004 Posts: 419 UGN Member | OP UGN Member Joined: Mar 2004 Posts: 419 |
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Mar 2002 Posts: 1,041 UGN Elite Poster | UGN Elite Poster Joined: Mar 2002 Posts: 1,041 | Heh, since I've been set up for it, let's answet the question shall we. Ok, IP addressing (version 4, what we use right now) are 32 bit binary addresses used to identigy a host on a network. I must stress this right off the bat, IP addresses are binary numbers. Us humans are overwelmed ny the appearance of this long string of ones and zeros, so we write them in a dotted quad that we all know and love. So heres the deal, Let's take google's address as an example: 216.239.37.99 Sure. looks normal. However, it is a representation of : 11011000111011110010010101100011 Yeh, not so nice looking eh? Anyways, so here's how it's converted. First we seperate the binary into 4 - 8 bit chucnks like so 11011000.11101111.00100101.01100011 And then convert the binary to decimal. To give a breif overview on how that works, you just keep going up by powers of 2 (like you would powers if 10 in decimail), so each place value goes, 1, 2, 4, 8, 16, 32, 64, and 128 (8 values, 8 bits). so the first octet is 1 1 0 1 1 0 0 0
------------------------------------
128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
------------------------------------
128 + 64 +16 + 8 = 216 Follow? Good. So now, to answer the original quest, the highest an 8 bit number can be is 255. I'll prove it. 11111111 is 128+64+32+16+8+4+2+1 = 255 so, the range of addresses used is: 0.0.0.0 to 255.255.255.255 both of those having special meanings though, and you can't use em. As well, since they've been brought up, the classes. There are 5 classes of address, and they are decided by what the first couple bits of the address are set to. Class A - 0... Class B - 10.... Class C - 110... Class D - 1110... Class E - Everything else SO, to see how this works, we are looking at the first octet of any given ip adress. So for class a, the first bit is always set to zero. So the range of address is 00000000 - 011111111
--------------------
0 - 127 class b: 10000000 - 10111111
-------------------
128 - 191 class c: 11000000 - 11011111
-------------------
192 - 223 class d: 11100000 - 11101111
-------------------
224 - 239 class e: 240 + Each subnet has it's own default networks, class a - 255.0.0.0 class b - 255.255.0.0 class c - 255.255.255.0 Class e is used for multicasting only, and does not have a default mask. Class E is expermental only. If you want to know some more about subnetting try this on for size. Lemmme know if you have any more questions. Infinite | | | | Joined: Mar 2004 Posts: 419 UGN Member | OP UGN Member Joined: Mar 2004 Posts: 419 |
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Mar 2002 Posts: 1,041 UGN Elite Poster | UGN Elite Poster Joined: Mar 2002 Posts: 1,041 | | | | | Joined: Mar 2004 Posts: 419 UGN Member | OP UGN Member Joined: Mar 2004 Posts: 419 | Start with command structure. Learn the lay of the command line. Don't go gui yet, stay console, work on some security knowledge, and then go into directory searching Any Suggestions on which Flavor?
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Oct 2002 Posts: 955 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 955 | Chocolate Chip Cookie Dough... If you just want to learn the command structure and give it a spin, try a CD based distribution that you can boot from w/o having to install linux to the hard drive. Here is the link to CD-based distros. You can probably do a search for LINUX DISTRO or even just look through the linux forum here and get about a hundred threads dealing with what to use and how to learn. | | |
Posts: 52 Joined: March 2002
| | Forums41 Topics33,840 Posts68,858 Average Daily Posts0 | Members2,176 Most Online3,253 Jan 13th, 2020 | | | | | | | | | | | Doom 3 by Cyrez - 09/11/14 08:58 PM
| | | | | | | | | | | | | | | | | | |