Hack Your Mind Right Now....!

  • Home
  • Android
  • C Language
  • Facebook Hacking
    • 20 FB Tricks
    • Animation in FB
  • DeadlyHacker

GET SET READY......Go

  • Mr. DeadlyHacker
    more
  • Window Hacking
    more
  • Hacking Tools
    more
  • Google Hacking
    more
Showing posts with label IP Tips. Show all posts
4:04 PM

Learn TCP/IP

-: IP Spoofing :-

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

For Check Your IP Address..
http://whatismyip.com/

for see another IP address
http://whatismyip.com/tools/ip-address-lookup.asp

Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

Photobucket

Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Your Browser and Server use TCP/IP
Browsers and servers use TCP/IP to connect to the Internet.
A browser uses TCP/IP to access a server. A server uses TCP/IP to send HTML back to a browser.
Your E-Mail uses TCP/IP
Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails.
Your Internet Address is TCP/IP
Your Internet address "192.168.10.14" is a part of the standard TCP/IP protocol (and so is your domain name).

What is TCP/IP?
TCP/IP is the communication protocol for communication between computers on the Internet.
TCP/IP stands for Transmission Control Protocol / Internet Protocol.
TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.

Inside TCP/IP
Inside the TCP/IP standard there are several protocols for handling data communication:
  • TCP (Transmission Control Protocol) communication between applications
  • UDP (User Datagram Protocol) simple communication between applications
  • IP (Internet Protocol) communication between computers
  • ICMP (Internet Control Message Protocol) for errors and statistics
  • DHCP (Dynamic Host Configuration Protocol) for dynamic addressing

TCP Uses a Fixed Connection
TCP is for communication between applications.
If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will set up a "full-duplex" communication between the two applications.
The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications.
UDP is very similar to TCP, but simpler and less reliable.

IP is Connection-Less
IP is for communication between computers.
IP is a "connection-less" communication protocol.
IP does not occupy the communication line between two computers. IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time.
With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet.
IP is responsible for "routing" each packet to the correct destination.

Tcp/IP

IP Routers
When an IP packet is sent from a computer, it arrives at an IP router.
The IP router is responsible for "routing" the packet to the correct destination, directly or via another router.
The path the packet will follow might be different from other packets of the same communication. The router is responsible for the right addressing, depending on traffic volume, errors in the network, or other parameters.

Connection-Less Analogy
Communicating via IP is like sending a long letter as a large number of small postcards, each finding its own (often different) way to the receiver.

TCP/IP
TCP/IP is TCP and IP working together.
TCP takes care of the communication between your application software (i.e. your browser) and your network software.
IP takes care of the communication with other computers.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.
IP is responsible for sending the packets to the correct destination.

IP Addresses
Each computer must have an IP address before it can connect to the Internet.
Each IP packet must have an address before it can be sent to another computer.
IP addess is the identity of computer or website.

Domain Names
A name is much easier to remember than a 12 digit number.
Names used for TCP/IP addresses are called domain names.
google.com is a domain name.
When you address a web site, like http://www.google.com, the name is translated to a number by a Domain Name Server (DNS).
All over the world, DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses.
When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information.
TCP - Transmission Control Protocol
TCP is used for transmission of data from an application to the network.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP - Internet Protocol
IP takes care of the communication with other computers.
IP is responsible for the sending and receiving data packets over the Internet.

HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web browser.
HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.

HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web browser.
HTTPS typically handles credit card transactions and other sensitive data.

SSL - Secure Sockets Layer
The SSL protocol is used for encryption of data for secure data transmission.

SMTP - Simple Mail Transfer Protocol
SMTP is used for transmission of e-mails.

MIME - Multi-purpose Internet Mail Extensions
The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.

IMAP - Internet Message Access Protocol
IMAP is used for storing and retrieving e-mails.

POP - Post Office Protocol
POP is used for downloading e-mails from an e-mail server to a personal computer.

FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.

NTP - Network Time Protocol
NTP is used to synchronize the time (the clock) between computers.

DHCP - Dynamic Host Configuration Protocol
DHCP is used for allocation of dynamic IP addresses to computers in a network.

SNMP - Simple Network Management Protocol
SNMP is used for administration of computer networks.

LDAP - Lightweight Directory Access Protocol
LDAP is used for collecting information about users and e-mail addresses from the internet.

ICMP - Internet Control Message Protocol
ICMP takes care of error-handling in the network.

ARP - Address Resolution Protocol
ARP is used by IP to find the hardware address of a computer network card based on the IP address.

RARP - Reverse Address Resolution Protocol
RARP is used by IP to find the IP address based on the hardware address of a computer network card.

BOOTP - Boot Protocol
BOOTP is used for booting (starting) computers from the network.

PPTP - Point to Point Tunneling Protocol
PPTP is used for setting up a connection (tunnel) between private networks.

When you write an email, you don't use TCP/IP.
When you write an email, you use an email program like Lotus Notes, Microsoft Outlook or Netscape Communicator.

Your Email Program Does
Your email program uses different TCP/IP protocols:
  • It sends your emails using SMTP
  • It can download your emails from an email server using POP
  • It can connect to an email server using IMAP

SMTP - Simple Mail Transfer Protocol
The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer.
Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination.
SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.
SMTP uses the MIME protocol to send binary data across TCP/IP networks. The MIME protocol converts binary data to pure text.

POP - Post Office Protocol
The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server.
If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.

IMAP - Internet Message Access Protocol
The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol.
The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.
The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.
7:54 PM

Summary of TCP/IP commands for all platforms..

INTRODUCTION
This summary lists many of the commonly used commands (with
brief descriptions) for FTP and TCP/IP, as well as related z/OS,
z/VM, VSE, Linux, and VTAM commands.

TCP/IP Commands for TSO/E
**Note: The following TCP/IP commands should be done from the
TSO command panel or the READY prompt.
Note: hostname may be the IP address of the host, or the host
name of the host.

• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21.
• HOMETEST - Validate TCP/IP configuration.
• NETSTAT option {TCP procname} - Display network status
of local host. Use ? for list of options.
• NETSTAT ALLCON|CONN - Display port connections for
the TCP/IP stack.
• NETSTAT ARP ALL|ipaddress - Display ARP cache for the
TCP/IP stack.
• NETSTAT DEV - Display the status of the device(s) and
link(s) for the TCP/IP stack.
• NETSTAT GATE|ROUTE - Display routing information for
the TCP/IP stack. (Different views)
• NETSTAT HOME - Display IP address(es) for the stack.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use ? for list
of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use ? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use ? for list of options.


z/OS Console Commands for TCP/IP

***Note: If multiple stacks are running, you must identify the stack in
the procname field.
• D TCPIP - list names and status of TCP/IP stacks.
• D TCPIP,{procname},HELP - display list of TCP/IP display
options. These include -NETSTAT, TELNET, HELP,
DISPLAY, VARY, OMPROUTE, SYSPLEX, STOR.
• D TCPIP,{procname},Netstat,ALLCONN|CONN - display
socket information for the TCP/IP stack.
• D TCPIP,{procname},Netstat,ARP - display contents of ARP
cache for the TCP/IP stack.
• D TCPIP,{procname},Netstat,DEVlinks - display Device and
link status for the TCP/IP stack.
• D TCPIP,{procname},Netstat,HOME - display the IP
address(es) for the TCP/IP stack.
• D TCPIP,{procname},Netstat,ROUTE - display the routing
table for the TCP/IP stack.
• V TCPIP,{procname},HELP - display list of TCP/IP vary
options. These include - HELP, OBEYFILE, PKTTRACE,
DATTRACE, START, STOP, PURGECACHE
• V TCPIP,{procname},PURGECACHE,linkname - purge
ARP cache for the specified adapter (linkname from
NETSTAT,DEVLINKS).
• V TCPIP,{procname},START|STOP,devname - Start or stop
the device name identified in NETSTAT DEV output.
• V TCPIP,{procname},Telnet,xxxx - performs specified
function for TELNET.
ACT|INACT,luname - Enables|disables lu as VTAM
session candidate
QUIESCE - Blocks new connections.
RESUME - Ends QUIESCEd state.
STOP - Ends telnet connections and closes port.

Related z/OS Console Commands :

• D IOS,MIH,DEV=dddd - MIH value for device
Note: The value for "c's and d's" in the following Display
Matrix (D M) command is optional, but if included, must be in
parentheses ().
• D M=CHP{(cc)}|DEV{(dddd)} - Status of CHPID cc, or
summary of all CHPIDs if (cc) is not provided.
Display CHPIDs/device status or summary of CHPID status of
all devices if (dddd) is not provided.
• D U,,ALLOC|OFFLINE|ONLINE - Display information for
all devices by selected status.
• D U,,,dddd{,nnn} - Display status of devices starting at device
dddd for nnn number of devices (default 16).
• SETIOS MIH,DEV=ddd,TIME=mm:ss - set MIH time for
specified device.
• V dddd|dddd-dddd,OFFLINE|ONLINE - vary device(s)
offline or online.
• CF CHP(cc),ONline|OFFline - Configure online/offline
CHPID cc to MVS & hardware.

z/VM Operator Commands:

***Note: Requires class B authority to issue the following commands.

• Q MITIME - Display MIH times for devices.
• Q OSA ACTIVE|ALL - display status of OSA devices.
• Q rdev|rdev-rdev - Display status of real device(s).
• Q PATHS rdev|rdev-rdev - Display path status to real
device(s) (PIM, PAM, LPM).
• Q CHPID cc - Display real CHPID status.
• VARY OFF|ON rdev|rdev-rdev - vary device(s) off or online
• VARY OFF|ON PATH cc FROM|TO rdev|rdev-rdev -
change the status of a path to device(s).
• VARY OFF|ON CHPID cc - configure a CHPID off or on to
both hardware and software.

z/VM TCP/IP Commands:

***Note: Your CMS userid must be linked to the TCPMAINT 592
minidisk to execute the following commands.
***Note: hostname may be the IP address of the host, or the host
name of the host.

• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21. Enter FTP ? for list of options.
• HOMETEST - Validate TCP/IP configuration.
• IFCONFIG - display network interfaces.
• IFCONFIG interface UP|DOWN - Start or stop the specified
network interface.
• NETSTAT option - Display network status of local host. Use ?
for list of options.
• NETSTAT ALLCON|CONN - Display all port connections
for the TCP/IP stack.
• NETSTAT ARP *|ipaddress - Display ARP cache for the
TCP/IP stack.
• NETSTAT DEV - Display the status of the device(s) and
link(s) for the TCP/IP stack.
• NETSTAT GATE - Display TCP/IP routing information.
• NETSTAT HOME - Display IP address(es) in TCP/IP stack.
• NETSTAT OBEY START|STOP devname - Start or stop the
device name identified in NETSTAT DEV output.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use ? for list
of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use ? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use ? for list of options.

VSE TCP/IP Commands:

***Note: hostname may be the IP address of the host, or the host
name of the host.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible.
• Query ARP{,IP=hostname} - Display contents of ARP cache
for the TCP/IP stack.
• Query CON{,IP=hostname} - Display port connections for
the TCP/IP stack.
• Query LINKs{,ID=name} - Display link status.
• Query MASKs - Display contents of subnet mask table.
• Query ROUTes{ID=name|,IP=hostname} - Display routing
table for the TCP/IP stack.
• STATUS dddd - Display device status
• START LINK=name -start a link in the TCP/IP stack.
• STOP LINK=name -suspends attempts to activate a link.
• Note: Use with CTCA and cross-partition links (not OSA).
• TRACERT hostname - Trace hops from this host to
destination host.

VTAM Commands:-
VTAM commands related to OSA cards.

• D NET,ID=name - display network named in ID field
Additional parameters that may be added:
,SCOPE=ONLY|ACT|ALL|INACT
,E - Gives extended information about the node.
• D NET,MAJNODES|APPLS - Shows status of all active
major nodes or applications.
• D NET,PENDING - Lists nodes in pending states.
• D NET,TRL - display list of TRLEs.
• D NET,TRL,TRLE=trlename - display status of specific
TRLE. (Use this command to display the devices assigned to a
QDIO (or MPC) OSA-Express resource.)
• V NET,ACT,ID=ISTTRL,UPDATE=ALL - Deletes all
inactive TRLEs.
• V NET,ACT,ID=name - Activates the VTAM resource
identified by the name.
• V NET,INACT,ID=name - Inactivates the VTAM resource
identified by the name.
,F|I|U - Deactivate FORCE, IMMEDIATE, or
UNCONDITIONAL (if normal inact fails).

TCP/IP Commands for OS/2:-

***Note:Commands must be done from a command prompt window.
The commands are listed in upper case for presentation only. They
should be entered in lower case.
***Note: hostname may be the IP address of the host, or the host
name of the host.

• ARP -A - Display ARP cache. Use -? for options.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21. Use -? for list of options.
NETSTAT command output may roll through the OS/2 window. To
prevent this, add |more to the end of the netstat command. (Or direct
output to a file by adding >filename.TXT to the end of the
NETSTAT command.)
• HOST ipaddress - Sends request to an IP address and returns
information about the hostname.
• NETSTAT -? - Display a list of options.
• NETSTAT -A - Display host network address.
• NETSTAT -C - Display host ICMP statistics.
• NETSTAT -H - host name for specified IP address.
• NETSTAT -I - Display host IP statistics.
• NETSTAT -N - Display host network interface details. (Like
MAC, speed, and statistics)
• NETSTAT -P - Display host ARP cache.
• NETSTAT -R - Display host routes.
• NETSTAT -S - Display host sockets.
• NETSTAT -T - Display host TCP statistics.
• NETSTAT -U - Display host UDP statistics.
• PING hostname - Sends an echo request to a host name or
address to determine if computer is accessible. (To cancel, use
Ctrl + C.) Use -? for list of options.
• TELNET {-p port} hostname - Log on to remote host. By
default, port 23 is used. Use -? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use -? for list of options.

TCP/IP Commands for Windows(older):

***Commands should work for Windows 95, 98, NT, & 2000 1.
Commands must be done from a command prompt window.
The commands are listed in upper case for presentation only. They
should be entered in lower case.
***Note: hostname may be the IP address of the host, or the host
name of the host.

• ARP -A - Display ARP cache. Use -? for options.
• FTP hostname - Connect to remote host to get/put files.
Defaults to port 21. Use -? for list of options.
Note: The output of the NETSTAT command may roll through your
window. To prevent this, add |more to the end of the netstat
command. (Or direct the output to a file by adding >filename.TXT
to the end of the NETSTAT command.)
• NETSTAT -? - Display a list of options.
• NETSTAT -A - Display host socket information.
• NETSTAT -E - Display host Ethernet statistics.
• NETSTAT -N - Display host addresses and ports numerically.
• NETSTAT -P TCP|UDP|IP - Display connection information
for the selected protocol.
• NETSTAT -R - Display host routes.
• NETSTAT -S - Display host statistics.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use -? for
list of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use -? for list of options.
• TRACERT hostname - Trace hops from this host to
destination host. Use -? for list of options.
1Windows, Windows 95, 98, NT, and 2000 are trademarks of Microsoft Corporation.

TCP/IP Commands for Linux:

***The commands are listed in upper case for presentation only. They
should be entered in lower case.

• ARP - Display ARP cache. Use -? for options.
• DMESG |MORE - Display complete information about the
Linux environment including network devices. ( |MORE keeps
output from scrolling.) ( > filename to send to a file.)
• FTP hostname|ipaddress - Connect to remote host to get/put
files. Defaults to port 21. Use -? for options.
• IFCONFIG - display network interfaces (like LO,EN0,TR0)
• IFCONFIG interface UP|DOWN - Start or stop the selected
network interface(EN0,TR0, etc).
For the following NETSTAT commands, adding N to the option
will display numerical output. AddingV will display verbose.
• NETSTAT -A - Display all sockets.
• NETSTAT -I - Display interface table.
• NETSTAT -R - Display host routes.
• PING hostname|ipaddress - Sends an echo request to a host to
determine if the computer is accessible. Use -? for options.
• ROUTE - Displays IP routing table.
• TELNET hostname|ipaddress {port} - Log on to remote host.
By default, port 23 is used. Use -? for options.
• TRACEROUTE hostname|ipaddress - Trace hops from this
host to destination host. Use -? for list of options.

FTP Subcommands:-

• ascii - ASCII transfer of text files.
• binary - BINARY transfer of binary files.
• cd remote-directory - Change directory on remote host.
• close - Ends the FTP session. After close, OPEN a new
connection or QUIT from FTP.
• delete filename - Delete the file from remote host.
• dir {file destination} - Gives full directory listing on remote
host. file - file to be listed. destination - where to put listing.
Both file and destination are optional.
• get filename {localfilename} - Get a file from remote host.
• hash - Display a hash sign (#) every time a block of data is
transferred. (Useful for large transfers.)
• help {command} - Displays a description of the command. If a
command is not specified, a list of commands is displayed.
• lcd directory - Change directory on your local machine.
• ls {file destination} - Like dir, but less information.
• mget file-list - Get multiple files from remote machine.
• mput file-list - Put multiple files to remote machine.
• open machine-name - Connect to named machine (IP or host
name). Old connection must be CLOSEd first.
• prompt - Turn prompting off/on for mget and mput.
• put filename {remotefilename} - Put a file onto remote host.
• pwd - Present Working Directory on remote host.
• quit|bye - exits FTP.


7:52 PM

Complete IP address: For beginners...

Ip Address:

Internet protocol or IP is an address given to each computer in network. The address is a 32 bit numeric value consisting of numbers separated by dots. It has network part and host part. The network is the address of network to which you belong like the area code or colony name... and the host part is address of the particular computer or client like your house's address.
Each IP address has both the things.
The IP address is divided into 4 parts each of 8 bits and each part is called an octet. The parts are divided by a Dot. The first octet is always the host part and the last octet is always the host part.
The IP address is written in 3 ways:
1. Binary Form: 11000000.10101000.00000000.00000001
2. Dotted Decimal Form: 192.168.0.1
3. Hexadecimal Form: C0-A8-00-01
This type of IP address consisting of 32 bit is called IPv4 or IP version 4. Since only near about 4 billion IP Address could be formed with 32 bits IP address or v4. And the left IP addresses(not yet used) for other people was very limited, a new version of IP was developed called IPv6 which is a 128 bit IP address.
We will talk about this later.
Dotted Decimal:
The way we use for writing IP address is dotted decimal. Since the computer only understands Binary numbers , therefore internally in computer IP address is also converted into binary before being used by the computer and routers.
As already stated above, the 1st octet is always used for Network ID or Network Part and the last for Host part. 2nd and 3rd octet may be used for Network part or host part.
On the basis of the range of values in the 1st octet the IP address may be classified in 5 different classes:
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E

1. CLASS A :-
If the value in 1st octet is between 0-127 it belongs to Class A. But the 1st address and the last address i.e. 0 and 127 are reserved for special cases. It can’t be used by public for a particular computer. The 127.x.y.z is reserved for loop back function to check the network settings in a computer.
The IP address of class A has 1 network part and 3 host part.

Network Part Host Part Host Part Host Part
|----8bits-| |----8bits----| |----8bits----| |----8bits----|

The Last 3 parts may contain any value from 0-255(except the in the 4th part where we can use only till 254,).
In Network Part:
1st Eight bits may be: 0xxxxxxx where x=0/1
The 1st bit is constant and is 0.
Therefore the minimum value is: 00000000=0 (where x=0)
The maximum value =01111111=127(where x=1 )
That is why the range for 1st class is from 0-127.
Maximum number of possible networks=2^ ( total number of network bits – constant bits) – reserved addresses
= 2^ (8-1) – 2 = 2^7-2 = 128-2= 126.
Maximum number of possible clients per network=2^no of host bits -2
= 2^24 -2 = 16777216 – 2=16777214 address.
Note: This 2 is being subtracted because 2 host addresses are already reserved for Administrative tasks. The 1st host address in every network (which may be 0 for example: in class C this could be 192.168.1.0 where only the last part is host part.) and the last for broadcasting i.e.to send a message to all the hosts in a network (Suppose in a network using Class ‘A’ address. If the server would like to sent a message to all the clients it can just sent the message to this broadcast address and it will be forwarded to all. You can’t manually enter every client’s IP address, as there could be as many as 16777214 clients). So it will be subtracted in every class i.e.in A,B and C.
This means that in 1 network there can be 16777214 clients for class A.
2. CLASS B :-
If the value in 1st octet is between 128-191 it belongs to Class B. This class also doesn’t have any reserved value in the Network Part. This has 2 Network Part and 2 Host Part:

Network Part Network Part Host Part Host Part
|--8bits--| |----8bits----| |----8bits-- |-----8bits----|

Here also the last 3 octet may have any value between 0-255 (except for the last octet which can have between 1-254. The reason is already stated in Class ‘A’) since the class is decided only by the 1st octet.

In the Network Parts:-

Range: 128-191.
1st Eight Bits may be: 10xxxxxx (where x=0/1)
As in class A 1st bit was constant in this class 1st 2 bits are constant and are: 1 & 0.
Therefore Minimum value of 1st octet could be: 10000000 = 128 (where x=0)
And maximum value =10111111=191(where x=1).
That’s why the range is 128-191.
Maximum numbers of possible Networks= 2^(no of network bits – constant bits)
= 2^(16-2) = 2^14
=16384.
Maximum number of possible clients or hosts= 2^number of host bits – 2
=2^16 - 2 = 65536-2
= 65534.
3. CLASS C :-
If the value in the 1st octet in between 192-223, then IP belongs to Class C. This class also doesnt' have any reserved value in the Network Part.
It has 3 Network Parts and 1 Host Part:

Network Part Network Part Network Part Host Part
|----8bits--| |---8bits----| |----8bits-----| |---8bits---|

Here too the last 3 octets can have values between 0-255 (except for the last octet which can have between 1-254. The reason is already stated in Class ‘A’).
In Network Part:
1st Eight bits may be: 110xxxxx (where x=0/1).
H ere the 1st 3 bits are constant .
Like the last 2 classes the minimum value of 1st octet will be: 11000000 =192 (where x=0)
Maximum value of 1st octet: 11011111=223(where x=1).
Therefore the range is 192-223.
Maximum numbers of possible Networks= 2^(no of network bits – constant bits)
= 2^(24-3) = 2^21
= 2097152.
Maximum number of possible clients or hosts= 2^number of host bits – 2
=2^8 - 2 = 256-2
= 254.
Since this Class has least number of possible hosts, it is used by small to medium companies. But generally big companies use class B addresses.

4-5. Class D:-

If the value is between 224 -239, it belongs to class D. And if its between 240-255 it belongs to Class E.
The Class D & E IP addresses are not for public use. Class D addresses are used for Multicasting(Remember broadcasting, here in multicasting,the number of clients are limited or a particular group of hosts are the recipients ) by routers and servers. It is for internal use and for administrative works.

Class E is reserved particularly for Research and Development.

Now that you have a great deal of knowledge on IP, you should also know about SUBNET MASK. In networking generally, subnet mask goes in parallel with IP.





SUBNET MASK

It is also a 32 bit address used by computer to distinguish between Network Part and Host Part.
Since the computer internally works on binary it needs something in binary to get the 2 parts.
The 255 value represents Network Part and 0 represents Host Part.
The Default subnet masks for the 3 Classes are:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Note: The word default is being used because these subnet addresses are considered to be according to class. There’s another use of subnet mask called Subnetting and in that subnet masks are different from the above mentioned addresses.





IP Address Management Principles and Practice (IEEE Press Series on Network Management)
Home Older Posts
Subscribe to: Posts (Atom)

Like Me On Facebook Mr. Deadly Hacker

About The Author

Unknown
View my complete profile
Aman Badhania writes this blog to help computer users with problems related to web services and getting the most out of their own websites.
Feel The Power Of Cyber Hacking Mr. DeadlyHacker

Popular

    List of google dorks for sql injunction List of google dorks for sql injunction
    no image Keylogger Tutorial
    no image Speed Up XP BootingThis is a featured page
    no image Getting Started with Windows 7
    The 5 Worst Computer Viruses The 5 Worst Computer Viruses
    no image 11 handy tips for Windows 7
    no image How to Create A System Image in Windows 7

TemplateHits

  • Home
  • About Me
  • Serial Keys 1million
  • Password Hacking
  • Telnet
  • Hacking
  • Download
  • C Language Tips and Trick
Feel The Power Of Cyber Hacking Mr. DeadlyHacker

Categories

  • Hacked Window
  • Android
  • Google Hacking
  • Hacking Tools
  • Game
  • Window Software
  • Android Tips
  • Window 8
  • Software
  • Facebook Hacking
  • Firefox Imp. Addons
  • Window Tips
  • Android Apps
  • Computer Hacking
  • Google Tips
  • How To Make Window Genuiene
  • Networking certifications
  • Android Hack
  • AntiVirus Hack
  • Facbook hack
  • Mobile Hacking Tools
  • Aman Badhania
  • Deadly Hacker
  • Desktop Hacking
  • Google Info
  • Google Project
  • LFI and RFI
  • Proxy Server
  • Blogger Tips
  • Crash Computer
  • Cross Site Scripting (XSS)
  • Exploits
  • IP Tips
  • USB Hacking
  • Batch Programming
  • CRIMINAL HACKED
  • Computer trick
  • Email Hacking
  • Internet Tricks
  • Keylogger
  • System Hacking
  • Assassin’s Creed III
  • C#
  • IGI 2013
  • Recover Deleted Files

Hacking Tricks

Hacked Window Hacking Tools Window Software Window 8 Window Tips How To Make Window Genuiene Window 7 Hacking tutorial IP Tips Internet USB Hacking Hardware IGI 3 Internet Tricks Torrent HD movie HTML Hacker Types Hacking Game Hacking Tips Happy Deepawali Hard Disk Hardware Hacking HitMan Game HoneyPot Hosting IGI 2013 Image 2 Text Information Intrusion Detection System (IDS) Tekken 6 Telnet Terminator RAT TrueCaller UserName VLC Player Hacking Virus Visual Script Tricks Window 10 Window 8 Hack Window 9 Window News Window Server Youtube Tips Zombie iPhone

Crack Skull

Crack Skull
Shiiiiiiiiiiiiiiii.....Don't Live This

Followers

Deadly Tricks

Android Android Tips Android Apps Android Hack AntiVirus Hack Aman Badhania About Keylogging Backtrack Blogger Tips Backup Trick Batch Programming Browser APT Access Block Sites Advance Persistant Threat Albert Einstein Android Code Android Games Android Smart Phone Angry birds Application Assassin’s Creed III AutoCad Batch Hacking Blogger tools Bolloywood Movie HD
Facebook Hacking Firefox Imp. Addons Facebook Tips Download Facbook hack Deadly Hacker Desktop Hacking Exploits Email Hacking Data Recovery Desktop Apps Disable Mouse Dos Tools Drawing Arts Drive Icon Change Ethical Hacking Learn File hosting Firefox Download Flash Software

More Tricks

Software Proxy Server Password Hacking Software hacking Opreting System Partition Make Programming Of linux Remix Hacking Reverse Engineering Samsung Mobile Hacking Skin Pack For Window 7 System Hacking Open Source Code PC Hack PenDrive Bootable PenDrive Hacking Phishing Attacks Phreaking Proxy Sites RainMeters Recover Recover Deleted Files Red Hat Registry Hack Reinstall Your All Drivers In 5 MinutesThis is a featured page Resume Spear Phishing
Computer Hacking Backtrack Blogger Tips Command Hacking Crash Computer Cross Site Scripting (XSS) Backup Trick Batch Programming Browser CRIMINAL HACKED Computer trick Batch Hacking Blogger tools Bolloywood Movie HD C# CSS Check Password Coin Box Calling Hacking Cryptography
Aman Badhania
Copyright © 2012 Hack Your Mind Right Now....! - and Deadly Hacker.