EL JID omar
2 min readJun 11, 2023

What can a hacker do with an IP address -

How do hackers get this confidential information
Well, my friend it all starts with an IP address it's like finding out someone's phone number or postal address

The first thing a hacker will probably do is search for open ports and services used in ports.

šŸ“There are a total of 65535 TCP plus UDP ports, so anyone sitting there trying to hack will definitely try their luck with one of the open ports.

The very popular ports to watch are 23/22 (TELNET / SSH) but both are protected but you might get lucky.

ļø ļø So let's delve into the essence of the question instead of hackers , to do it with me: what would I do if I got your IP address

Let's start I'm going to test your IP connection to check if it works or not after that, I'm going to do #nmap (port scanner ) to find all the services running on your system with Nmap I can find out which operating system you are using and all possible vulnerabilities with ports.

Then comes the judgment on which part to target or which legacy services you are running (vulnerable services)after making a list that my attack will be different if I am a website or web server I may use nikto or vega to look for vulnerabilities in web applications

Some of these common but major disadvantages are:

āš”ļø-SQL injection or blind as well
āš”ļø-cross-site scripting
āš”ļø-cross-site forgery
āš”ļø-invalid password or form submission
āš”ļø-shell injection and many others

Counting it comes the attack phase where I can use popular tools like #Metasploit to launch countless attacks or even use social engineering to trick you into opening spam emails containing Trojans or malware if you are persistent enough

Even, password crackers can be used to break authentication against the #FTP, #ssh or #telnet protocol.
šŸ“Among these common types are hydra, john the ripper and others

After entering, I may damage your computer and it depends on the mentality of the hacker !.

Then comes the post-exploitation stage where log files and other suspicious paths are cleaned.

All of these are from just an IP address :)
For the record, this is a very simple thing that you can use if you get an IP address.

# Google #cybersecurity #information security

EL JID omar

Blogger and marketing and mobile phone expert SEO Social media management