This topic contains 1 reply, has 2 voices, and was last updated by jmd9qs 1 month, 1 week ago.
- July 4, 2020 at 3:15 am #278323
Some IPs can he recycled and reference several different locations / computers. How does pinging / scanning / etc work on these? Also, if an IP has 0 open ports (my own computer and several others ive tested)? Related to this, is this why script kiddies can only ever dos you? Because they can just send tons of connections and not actually try attacking already open ports?
- July 4, 2020 at 3:15 am #278324
Look into Network Address Translation, should answer some of your questions.
As far as what you mean by “hack”, there are lots of answers to that question. There are many ways to gain a foothold into a network without even knowing a public IP (or that network having ports exposed), namely things like Phishing, drive-by downloads, etc. That’s not even close to all-inclusive but if you look into this stuff further you’ll learn more.
In my experience so far with the attacks I’ve encountered, very few have been the kind of “hack” portrayed in popular culture (and what I think you’re picturing). Most of them relied on some sort of social engineering designed to get an end user to do something or run something they shouldn’t.
I hope that makes sense
You must be logged in to reply to this topic.