Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Hacking Exposed Know the secrets of

Network Security 1st Edition Behera


Visit to download the full and correct content document:
https://ebookmeta.com/product/hacking-exposed-know-the-secrets-of-network-securit
y-1st-edition-behera/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Hacking Exposed Computer Forensics Second Edition


Computer Forensics Secrets Solutions Chris Davis Aaron
Philipp David Cowen

https://ebookmeta.com/product/hacking-exposed-computer-forensics-
second-edition-computer-forensics-secrets-solutions-chris-davis-
aaron-philipp-david-cowen/

Network Security Assessment Know Your Network Second


Edition Chris Mcnab

https://ebookmeta.com/product/network-security-assessment-know-
your-network-second-edition-chris-mcnab/

Cyber Security and Network Security 1st Edition


Sabyasachi Pramanik (Editor)

https://ebookmeta.com/product/cyber-security-and-network-
security-1st-edition-sabyasachi-pramanik-editor/

Computer Network Security 1st Edition Ali Sadiqui

https://ebookmeta.com/product/computer-network-security-1st-
edition-ali-sadiqui/
Multi-Site Network and Security Services with NSX-T:
Implement Network Security, Stateful Services, and
Operations 1st Edition Iwan Hoogendoorn

https://ebookmeta.com/product/multi-site-network-and-security-
services-with-nsx-t-implement-network-security-stateful-services-
and-operations-1st-edition-iwan-hoogendoorn/

Comptia Security+ Guide to Network Security


Fundamentals 7th Edition Mark Ciampa

https://ebookmeta.com/product/comptia-security-guide-to-network-
security-fundamentals-7th-edition-mark-ciampa/

Hands-On Ethical Hacking and Network Defense (MindTap


Course List) 4th Edition Rob Wilson

https://ebookmeta.com/product/hands-on-ethical-hacking-and-
network-defense-mindtap-course-list-4th-edition-rob-wilson/

Network Security and Cryptography Sarhan M. Musa

https://ebookmeta.com/product/network-security-and-cryptography-
sarhan-m-musa/

Network Forensics: Privacy and Security 1st Edition


Anchit Bijalwan

https://ebookmeta.com/product/network-forensics-privacy-and-
security-1st-edition-anchit-bijalwan/
HACKING EXPOSED

by
Soumya Ranjan Behera
FIRST EDITION 2018

Copyright © BPB Publications, INDIA


ISBN : 978-93-8728-431-9

All Rights Reserved. No part of this publication can be stored in a retrieval system or reproduced
in any form or by any means without the prior written permission of the publishers.

LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY


The Author and Publisher of this book have tried their best to ensure that the programmes,
procedures and functions described in the book are correct. However, the author and
the publishers make no warranty of any kind, expressed or implied, with regard to these
programmes or the documentation contained in the book. The author and publisher shall
not be liable in any event of any damages, incidental or consequential, in connection with,
or arising out of the furnishing, performance or use of these programmes, procedures and
functions. Product name mentioned are used for identification purposes only and may be
trademarks of their respective companies.

All trademarks referred to in the book are acknowledged as properties of their respective
owners.

Distributors:
BPB PUBLICATIONS 20, BPB BOOK CENTRE
Ansari Road, Darya Ganj 376 Old Lajpat Rai Market,
New Delhi-110002 Delhi-110006
Ph: 23254990/23254991 Ph: 23861747

COMPUTER BOOK CENTRE DECCAN AGENCIES


12, Shrungar Shopping Centre, 4-3-329, Bank Street,
M.G.Road, BENGALURU–560001 Hyderabad-500195
Ph: 25587923/25584641 Ph: 24756967/24756400

MICRO MEDIA
Shop No. 5, Mahendra Chambers, 150 DN
Rd. Next to Capital Cinema, V.T. (C.S.T.)
Station, MUMBAI-400 001
Ph: 22078296/22078297

Published by Manish Jain for BPB Publications, 20, Ansari Road, Darya Ganj, New Delhi-
110002 and Printed by Repro India Pvt Ltd, Mumbai
DISCLAIMER
This book has been published for education purpose only.
Readers are advised to examine the privacy policy, organization
policies and the laws of respective countries before taking their
own decisions. The publisher and author are not liable for any
steps that a reader may take based on this publication and are not
responsible for any steps that may have been taken after reading
the publication. Microsoft Windows and any other marks used
(Pictures, Screen Shots, etc.) have been used descriptively as the
marks are owned by third parties.
PREFACE
Hacking is the art of creative problem solving, whether that
means finding an unconventional solution to a difficult problem
or exploiting holes in sloppy programming. Many people call
themselves hackers, but few have the strong technical foundation
needed to really push the envelope. Rather than merely showing
how to run existing exploits, author Soumya Ranjan Behera
explains how hacking techniques actually work. To share the
art and science of hacking in a way that is accessible to
everyone, Hacking Exposed introduces practical hacking
techniques from a hacker's perspective.
Hackers are always pushing the boundaries, investigating
the unknown, and evolving their art. This book will give you a
complete picture network communications, and existing hacking
techniques. Combine this knowledge with the accompanying
Linux environment, and all you need is your own creativity.
DEDICATED TO
People's president and Missile man
Late Dr. A. P. J. Abdul Kalam

“You have to dream before your dreams can come true.”


Table of Contents

Chapter – 1 : Introduction to Hacking


Hacking .......................................................................................... 1
Ethical Hacking ............................................................................. 1
Importance of Ethical Hacking ................................................... 2
Hacker ............................................................................................. 2
Hacker Classification .................................................................... 3
White hat hacker .......................................................................... 3
Black hat hacker ............................................................................ 3
Grey hat hacker ............................................................................ 3
Script kiddie ................................................................................... 4
Hacktivist ....................................................................................... 4
Phases of Hacking ......................................................................... 4
Reconnaissance .............................................................................. 4
Scanning ......................................................................................... 5
Gaining access ............................................................................... 5
Maintaining access ........................................................................ 6
Covering tracks ............................................................................. 6
Types of Hacking Attacks ............................................................ 7
Essential Terminologies ................................................................ 7
Chapter – 2 : Cybercrime & Security
Cybercrime ..................................................................................... 9
Types of Cybercrime ..................................................................... 9
Cyber Attack & Its Sources .......................................................... 10
Symptoms of Malware attack ...................................................... 12
Cyber Security ............................................................................... 12
Computer Protection (Countermeasures) ................................. 13
Methods to Provide Protection ................................................... 13
Components of Computer Security ............................................ 13
Solution to Computer Security Threats ..................................... 14
Laws relating to cybercrime in India.......................................... 16
Chapter – 3 : Computer Network System and DNS
Working
Computer Network....................................................................... 19
Applications of Computer Network .......................................... 19
Types of Computer Network....................................................... 19
Table of Contents vii

Local Area Network (LAN) ..........................................................19


Metropolitan Area Network (MAN) ...........................................20
Wide Area Network (WAN) .........................................................20
Personal Area Network (PAN) .....................................................20
Virtual Private Network (VPN) ..................................................20
Internet Connections ....................................................................21
Types of Internet Connection .......................................................21
Dial-up Connection........................................................................21
Broadband Connection..................................................................21
Wireless Connection ......................................................................22
Network Architecture ....................................................................23
OSI Model .......................................................................................24
Network Devices ............................................................................24
Network Host .................................................................................27
Network Protocol ...........................................................................27
How to find your Public IP Address ...........................................28
How to find your Private IP Address..........................................29
Network Port ..................................................................................32
Network Packet ..............................................................................33
PING ................................................................................................34
MAC Address .................................................................................35
Domain Name System (DNS).......................................................36
Firewall ............................................................................................37
Proxy Server ....................................................................................38

Chapter – 4 : Hacking Skills and Tools


Hacking Skills .................................................................................39
Programming Language ...............................................................39
Low Level Language .....................................................................39
Machine Language (Machine Code) ...........................................39
Assembly Language ......................................................................40
High Level Languages (HLL) .......................................................40
Language Translator ......................................................................40
Assembler ........................................................................................40
Compiler ..........................................................................................40
Interpreter .......................................................................................41
Programming Language for Hackers ..........................................41
viii HACKING EXPOSED

Hacking Tools .................................................................................42


Commonly Used Hacking Tools ..................................................42

Chapter – 5 : Virtualization and Kali Linux


Virtualization ..................................................................................45
Virtual Machine (VM)....................................................................45
Installation of VMware Workstation ...........................................46
What is Linux? ................................................................................48
Linux Distributions ........................................................................48
Live Linux distributions (live CD/USB).....................................49
Linux Architecture .........................................................................49
Linux Directory Structure .............................................................50
Basic File Management..................................................................50
Kali Linux ........................................................................................51
Installing Kali Linux using VMware Workstation ....................51
Using Kali Linux for first time .....................................................54
Kali Linux Console Terminal ........................................................57
Parts of a Terminal window .........................................................57
Working with some common commands ...................................59
Kali Linux Commands (working in terminal) ...........................62
Connecting to a remote server ....................................................66

Chapter – 6 : Social Engineering and Reverse Social


Engineering
Social Engineering..........................................................................69
Types of Social Engineering-Attacks ...........................................69
Reverse Social Engineering...........................................................71
Social Engineering Toolkit (SET) - Kali Linux Tools .................72
Mass Mailer Attack ........................................................................74
Website Attack Vector (Site Cloning)...........................................78

Chapter – 7 : Footprinting
Footprinting ....................................................................................83
Techniques used for Footprinting ................................................83
Domain Name Information (DNS lookup) ................................83
Finding IP Address and Host Provider.......................................85
Finding an IP address location .....................................................85
Traceroute ........................................................................................86
Using tracert command in Windows ..........................................86
Table of Contents ix

Using traceroute command in Kali Linux ..................................87


Gaining the archive of a targeted Website ..................................87
DMitry – Information gathering Tool on Kali Linux ................88
Web spiders (or Web crawler) ......................................................89

Chapter – 8 : Scanning
Scanning ..........................................................................................91
Types of scanning ...........................................................................91
Port Scanning ..................................................................................91
Network Scanning ........................................................................92
Vulnerability Scanning .................................................................92
Using of Scanning Tools ................................................................92
Nmap - Network Mapper in Windows.......................................92
Nmap - Network Mapper in Kali Linux .....................................94
nmap Usage on Kali Linux ...........................................................94
nping Usage on Kali Linux ...........................................................95
Scan for Specific Port or Port Range ............................................95
Hide your IP address or How to Stay Anonymous Online .....96

Chapter – 9 : Cryptography
Cryptography .................................................................................99
Types of Cryptography .................................................................100
Secret Key Cryptography (SKC) ..................................................100
Public Key Cryptography (PKC) .................................................102
Hash Functions ...............................................................................102
Online Encryption and Decryption .............................................103
Block Cipher vs. Stream Cipher ...................................................104
Cryptanalysis ..................................................................................104
Cryptanalysis techniques and attacks .........................................104
BitLocker Drive Encryption ..........................................................105

Chapter – 10 : Steganography
Steganography ................................................................................109
Steganography Process..................................................................109
Steganography Methods ...............................................................110
Text Steganography .......................................................................110
Audio Steganography ................................................................... 111
Video Steganography .................................................................... 111
x HACKING EXPOSED

Image Steganography ....................................................................112


Executable file Steganography .....................................................113
Steganography in Windows .........................................................113
Steganography in Kali Linux........................................................116
Steghide ...........................................................................................116
Stegosuite ........................................................................................119
Online Steganography Tool ..........................................................120

Chapter – 11 : System Hacking


System Hacking ..............................................................................121
Password and its types ..................................................................121
Password Cracking Techniques ...................................................122
Active Online Attacks ....................................................................122
Passive Online Attack ....................................................................122
Offline Attack..................................................................................123
Non-Electronic Attacks..................................................................123
Default Passwords .........................................................................123
Password Cracking Tools ..............................................................124
Cracking password by using of Cain and Abel .........................125
Keyloggers ......................................................................................129
Spyware ..........................................................................................129
Rootkits ............................................................................................130
Hiding files and folder ..................................................................130
Clearing the tracks .........................................................................134
Clearing Audit Policy ....................................................................134
Clearing Even Log..........................................................................135

Chapter – 12 : Malware
Malware ...........................................................................................137
Virus .................................................................................................137
Types of Virus .................................................................................137
Worm................................................................................................139
Trojan Horse ....................................................................................140
Backdoor ..........................................................................................141
Remote Access Trojan (RAT) ........................................................141
Rootkit..............................................................................................142
Ransomware ...................................................................................142
Keylogger ........................................................................................142
Table of Contents xi

Adware ...........................................................................................143
Spyware ..........................................................................................143
Spam.................................................................................................144
Techniques of Malware attack .....................................................144
Symptoms of Malware attack ......................................................145

Chapter – 13 : Sniffing, Packet Analyzer and Session


Hijacking
Sniffing.............................................................................................147
Packet Analyzer ..............................................................................147
Types of Sniffing .............................................................................147
Active Sniffing ................................................................................147
Passive Sniffing ..............................................................................148
Some major Sniffing Tools ............................................................148
Sniffing passwords on LAN using Cain and Abel ....................148
Using Wireshark .............................................................................151
Session Hijacking ...........................................................................156
Types of Session Hijacking ...........................................................157
Session Hijacking Techniques ......................................................157
Session Hijacking using Ettercap, Hamster and Ferret
(in Kali Linux) .................................................................................158

Chapter – 14 : Denial of Service (DoS) Attack


Denial of Service (DoS) attack ......................................................163
Distributed Denial of Service (DDoS) attack..............................163
Types of DoS and DDoS attacks ...................................................164
UDP Flood .......................................................................................164
ICMP (Ping) Flood .........................................................................164
SYN Flood .......................................................................................165
Ping of Death (POD) attack ..........................................................166
Reflected Attack .............................................................................166
NTP Amplification .........................................................................166
Peer-to-Peer Attacks.......................................................................166

Chapter – 15 : Wireless Network Hacking


Wireless Network ...........................................................................167
Wireless Network Types................................................................167
Radio Frequency Transmission Factors ......................................168
Transmission Method ....................................................................169
xii HACKING EXPOSED

WLAN Standards ...........................................................................170


Wireless Network Security ...........................................................170
Wired Equivalent Policy (WEP) ...................................................170
Wi-Fi Protected Access (WPA) .....................................................170
Wi-Fi Protected Access version 2 (WPA2) ..................................171
Wireless Network Hacking ...........................................................171
Wireless Network Hacking & Cracking Tools ...........................172
Cracking Wireless Password using
Cain and Able (in Windows) ........................................................173
Cracking Wi-Fi Password in Kali Linux ....................................174

Chapter – 16 : Web Server & Application Vulnerabilities


Web Server ......................................................................................175
Web Server Working ......................................................................175
Types of Web Servers .....................................................................176
File Servers ......................................................................................176
Application Servers .......................................................................176
Inter-server level devices ..............................................................177
Message Servers .............................................................................177
Proxy Servers ..................................................................................177
Proxy Server Uses ..........................................................................177
Database Servers ............................................................................177
Mail Servers ....................................................................................178
Web Server Attacks ........................................................................178
Web server attack tools ..................................................................179
Web Application .............................................................................179
Web Application Vulnerabilities ..................................................179
Cross-site scripting (XSS) ..............................................................179
SQL (Structured Query Language) Injection..............................180
SQL Injection Vulnerability Example ..........................................180
Denial of Service Attacks (DDoS) ................................................181
Cross Site Request Forgery ...........................................................181
Arbitrary Code Execution .............................................................181

Chapter – 17 : Penetration Testing


Penetration Testing (Pen Test) ......................................................183
Types of Penetration Test ..............................................................183
Network Service Tests ...................................................................183
Table of Contents xiii

Web Application Tests ...................................................................184


Client Side Tests..............................................................................184
Wireless Network Tests .................................................................184
Social Engineering Tests ................................................................185

Chapter – 18 : Surface Web, Deep Web And Dark Net


Surface Web .....................................................................................187
Deep Web ........................................................................................187
Surface Web vs. Deep Web............................................................188
Dark Web (or Darknet) ..................................................................188
Deep Web vs. Dark Web ................................................................188
Overview of Surface, Deep and Dark Web.................................189
TOR - The Onion Router ...............................................................189
CHAPTER 1

Introduction to Hacking
Hacking
“Hacking is exploiting security controls either in a technical, physical
or a human-based element.”
– Kevin Mitnick
Gaining unauthorized access to
data in a system or computer
is hacking. However, the word
hacking has two definitions.
The first definition refers to the
hobby/profession of working
with computers. The second
definition refers to modifies
computer hardware or software
in a way that changes the
creator’s original intent.
It is also defined as the art
of exploiting computers to get access to otherwise unauthorized
information. Now that the world is using IT systems to gather,
store, and manipulate important information; there is also a need
to make sure that data is secure. However, no system is without
is problems. Holes are often present within security systems,
which, if exploited, allow hackers to gain access to this otherwise
restricted information.

A hacker is a person who finds and exploits the fault in


computer systems and networks to gain access. They are
usually expert in computer programing and computer
security.

Ethical Hacking
It refers to the act of locating weaknesses and vulnerabilities of
computer and information systems by duplicating the intent
and actions of malicious hackers. It is also known as penetration
testing, intrusion testing, or red teaming.
2 HACKING EXPOSED

An ethical hacker is a security professional who applies


their hacking skills for defensive purposes on behalf of
the owners of information systems. Ethical hackers are
also known as white hat hackers.

Importance of ethical hacking


In today’s digital era, the biggest threats to any business
organization and government organization come from cyber
criminals. Nowadays, as more and more companies are entering
the e-commerce ecosystem and adopting new technologies, like
cloud computing, the threat from imminent security breaches
is clearly demanding the need for efficient information security
systems.
Hacking can lead to loss of business for organizations
that deal in finance. Ethical hacking puts them a step ahead
of the cyber criminals who would otherwise lead to loss of
business.

Ethical hacking includes services like application testing,


remote or war dialing, local network testing, wireless
security, system hardening, social engineering, etc.

Hacker
Hackers have been around for so many years. Since the computer
and Internet became widely used in the world, we have started
to hear more and more about hacking.
As the term hacking has two meanings, so does the term
hacker is a word that has two meanings:
Traditionally, a hacker is someone who likes to play with
software or electronic systems. They enjoy exploring and
learning how computer systems operate.
Recently, a hacker has taken on a new meaning that someone
who finds weaknesses in a computer and computer network,
though the term can also refer to someone with an advanced
understanding of computers and computer networks.
Normally, hackers are people who try to gain unauthorized
access to your computer.
Introduction to Hacking 3

acker cla ificati n


Hackers are classified according to their motive and type of
work. The following list helps you to better understand the types of
hackers.

White hat hacker


A white hat hacker is computer security expert
who specializes in penetration testing and
in other testing methodologies to ensure the
security of an organization’s information
systems. They are also known as ethical
hacker. Generally, white hat hackers are the
good guys in the world of hackers.

Ethical hacking is a term coined by IBM meant to imply a


broader category than just penetration testing.

Black hat hacker


A black hat hacker is an individual with
extensive computer knowledge whose
purpose is to breach or bypass Internet
security. They are also known as crackers or
dark-side hackers. They are computer security
hackers who break into computers and
networks or also create computer viruses.
Generally, ethical hackers build things and
crackers break things.

Gray hat hacker


A gray hat hacker is a combination of a black
hat and a white hat hacker. It may relate
to whether they sometimes arguably act
illegally, though in good will, or to show
how they disclose vulnerabilities. They
usually do not hack for personal gain or
have malicious intentions, but may be
prepared to technically commit crimes
4 HACKING EXPOSED

during the course of their technological exploits in order to


achieve better security.

Script kiddie
A script kiddie (or skiddie) is a non-expert who uses existing
scripts, code, or other tools illegally to gain entry to a computer
system or network, without understanding the way the tools
function or the way the system or network is designed. Although
they may have some programming skill, script kiddies do not
have the experience to write their own programs that exploit
vulnerabilities.

Hacktivist
A hacktivist is a hacker who utilizes technology to announce a
social, ideological, religious, or political message. Most of the
hacktivism involves website defacement or denial-of-service
attacks.

Phases of hacking
The process of hacking can be broken down into five distinct
phases, which are described as follows:
Phase 1 – Reconnaissance
Phase 2 – Scanning
Phase 3 – Gaining access
Phase 4 – Maintaining access
Phase 5 – Covering tracks

Reconnaissance
Reconnaissance is the primary phase where the hacker gathers
information about a target using active or passive means.
Passive reconnaissance involves gathering information
regarding a potential target without the target’s knowledge. It
is usually done by using Internet searches of an individual or
company to gain information. This process is generally called
information gathering.
Sniffing the network is a type of passive reconnaissance and
can produce useful information, such as IP address ranges,
naming conventions, hidden servers or networks, and other
available services on the system or network. Sniffing network
Introduction to Hacking 5

traffic is similar to building monitoring: a hacker watches the


flow of data to see what time certain transactions take place and
where the traffic is going.
Active reconnaissance involves penetrating the network to
discover individual hosts, IP addresses, and services on the
network. It generally involves more risk of detection than
passive reconnaissance. It is also called rattling the doorknobs.

Some widely used reconnaissance tools are NMAP,


Hping, Maltego, and Google Dorks.

Scanning
In scanning, the information gathered during the reconnaissance
phase is used to scan the perimeter and internal network
devices looking for weaknesses. It includes scanning the target
for services running, open ports, firewall detection, finding
vulnerabilities, OS detection, etc.
Tools that a hacker may use during the scanning phase
include dialers, port scanners, network mappers, vulnerability
scanners, Internet Control Message Protocol (ICMP) scanners,
ping sweeps, and Simple Network Management Protocol
(SNMP) sweepers.
Hackers are looking for any information that can help them
perpetrate an attack on a target, such as computer names,
operating system (OS), user accounts, IP addresses, and installed
software.

Some widely used scanning tools are Nessus, Nexpose,


and NMAP.

Gaining access
After scanning, a hacker strategies the blueprint of the network
of the target with the help of data collected during Phase 1
(Reconnaissance) and Phase 2 (Scanning). In this phase, the
hacker would exploit a vulnerability to gain access to the target.
It generally involves taking control of one or more network
6 HACKING EXPOSED

devices to extract data from the target or use that device to


perform attacks on other targets.
Hackers perform certain types of hacking attacks, such
as stack-based buffer overflows, denial-of-service (DoS), and
session hijacking. This hacking attack can be delivered to the
target system via a local area network (LAN), either wired or
wireless; local access to a PC; the Internet (online); or offline.
Gaining access is known in the hacker world as owning the
system. Because, once a system has been hacked, the hacker has
all the controls of the system and can run that system according
to them.

The primary tool that is used in this process is Metasploit.

Maintaining access
After gaining access, the hacker wants to keep that access for
future exploitation and attacks to collect more data. Sometimes,
hackers create a harder security for the system by using
backdoors, rootkits, and Trojans so that no other hackers or
security personnel can breach it.

Zombie system is a computer connected to the Internet


that has been compromised by a hacker, computer virus,
or Trojan horse program and can be used to perform
malicious tasks of one sort or another under remote
direction.

Covering tracks
In the final phase, hackers cover their tracks
to avoid detection by security personnel. To
avoid legal action on them, hackers remove
evidence of hacking, such as deletion or
alteration of log files, exfiltration of data via
DNS tunneling or steganography, clearing
out sent e-mails, and clearing temp files.
Introduction to Hacking 7

Types of hacking attacks


There are several ways in which hackers can target and attack
the devices and networks. So, some of the most common hacking
techniques are listed as follows:
• Social engineering: This is a form of techniques engaged by
cybercriminals designed to trap normal and common users
into sending their confidential data, infecting their computers
with malware, or opening links to infected sites.
• Malware attack: This is specifically designed by cybercriminals
to gain access or damage a computer without the knowledge
of the owner by injecting malicious software through Internet
or by other storage devices.
• Password cracking: This is meant to gain unauthorized access
to a computer without the computer owner’s awareness by
decoding the password.
• Phishing: This involves one program, system, or website
successfully masquerading as another by gaining confidential
information, such as user IDs, passwords, bank details, and
thereby being treated as a trusted system by a user or another
program.
• Session hijacking: This is a method of taking over a Web
user session by stealthily obtaining the session ID and
masquerading as the authorized user. It is also known as
cookie hijacking.
• DoS (denial-of-service) attack: This is aimed to bring the
network to its knees by flooding it with useless traffic, such as
invalid authentication requests, which eventually brings the
whole network down.
• Web hacking: This is any attack that attempts to breach a
website. SQL injection and cross-site scripting are the common
hacking types of web hacking.

Essential terminologies
Backdoor is a hidden entry to a computing device or software
that bypasses security measures, such as logins and password
protections.
Bot is a computer that has been compromised with malware
attack and can be controlled remotely by a hacker. A hacker
8 HACKING EXPOSED

can then use the bot (also known as a zombie computer)


to launch more attacks, or to bring it into a collection of
controlled computers, known as a botnet.
Bug is a flaw or error in a software program.
Cracking is defined by breaking into a security system, usually
for nefarious purposes.
Exploit is a way or process to take advantage of a bug or
vulnerability in a computer or application.
Phreak is someone who breaks into the telephone network
illegally, to make free calls or to tap phone lines.
Vulnerability is a weakness that allows a hacker to compromise
the security of a computer or network system.
CHAPTER 2

Cybercrime and Security

Cybercrime
Any unlawful acts that involve a computer and a network is
defined as cybercrime.

Types of cybercrime
Cybercrime can be classified into four major categories.

Cybercrime against person


• Cyber stalking means unwanted or obsessive attention by an
individual or group toward another person through the use
of computer technology such as the Internet, e-mails, SMS,
webcams, phones calls, websites, or even videos.
• Hacking is gaining unauthorized access over a computer
system with the intent of personal gain or misuse.
• Cracking means digitally removing the copyright protection
code of a computer program or software.
• Defamation is the technique of damaging the reputation of
someone using a computer or electronic service and the
Internet.
• Identity theft occurs when someone steals your identity and
pretends to be you to access resources such as credit cards,
bank accounts, and other benefits in your name.
• Online fraud is act of stealing confidential details (such as
bank details, personal details, card details) of a victim using
phishing and spamming for gaining or withdrawing money
from the victim’s account.
• Child pornography involves the use of electronic device and
services to create, distribute, or access materials that sexually
exploit minor children.
• Spoofing means imitate something while exaggerating its
characteristic features with some personal gain or profit.
10 HACKING EXPOSED

Cybercrime against property


• Transferring virus into someone’s computer programs, disk
drive, files, or booting sector of hard drive using an e-mail
attachment as a medium to slowing down or destroy the
system.
• Cybersquatting refers to two or more persons claiming for the
same or approximately identical domain name or any service
available on the Internet (such as a profile of Facebook,
Twitter, Instagram).
• Cyber vandalism means destroying or damaging the data
during the unavailability of a network service.
• Intellectual property crime is any illegal act by which the owner
is deprived of his/her rights completely or partially. These
crimes deal with copyrights, trademark, software piracy,
infringement of patents, designs, source code, etc.

Cybercrime against government


• Cyber warfare is an online conflict that involves politically
motivated attacks on information and its related systems
by hijacking or disabling the official websites, disrupting
the network connection, stealing or altering the classified
information of government or financial institutions.
• Cyber terrorism is also an Internet-based attack that includes
large-scale attacks to create a havoc on computer networks
using malware or viruses, to attack governments and
organizations.

Cybercrime against society


• Online gambling is defined as gaining money through gambling
over the Internet. It is also known as Internet gambling or
iGambling.
• Cyber trafficking is defined as any illegal trading over the
Internet using computer and/or computer services.

Cyber-attack and its sources


A cyber-attack is defined as a malicious attempt to damage or
disrupt a computer network or system. Virus attacks hamper
Cybercrime and Security 11

important work involved with


data and documents. That’s
why it is the most powerful and
vulnerable threat to computer
users. It is vital for every
computer user to be aware about
the software and programs that
can help to protect the personal computers from attacks.
The major sources of cyber-attacks are highlighted as follows.

Downloadable programs
Downloadable programs and files are one of the best possible
sources of virus attack. Any executable program and file are the
major sources. If a user want to download a programs or file
from the Internet, then user needs to scan it before downloading.

Pirated or cracked software


Pirated or cracked software are illegal to download. Most people
who download them from online sources are unaware that they
may contain viruses and bug sources as well. These types of
viruses and bugs are difficult to detect and remove. So, a user
should always download original software from the appropriate
source.

Email attachments
Anyone can send you an e-mail attachment whether you know
them or not. Clicking on unknown links or attachments can harm
your computer. It is necessary to scan the e-mail attachment
before downloading.

Internet
One of the easiest ways to get a virus in your device is through
the Internet. Make sure to check the URL before accessing any
website. For a secured URL, always look for https in it.

Booting from an unknown CD


A malicious software can get into your device through an
unknown CD. A good practice to be safe from malicious infection
is to remove the CD when your device is not working at all. Your
system could reboot the CD if it is not removed before switching
off the computer.
12 HACKING EXPOSED

nfected a h dri e r di k
Flash drives and disks are the main cause of spreading viruses.
A virus can also be copied from one computer to other when
the user copies infected files using flash drives and disks. To
prevent it, a user must scan it before transferring any files from
an unknown user.

Symptoms of malware attack


While these types of malware differ greatly in how they spread
and infect computers, they all can produce similar symptoms.
Computers that are infected with malware can exhibit any of the
following symptoms:
• Increased CPU usage.
• Slow computer or web browser speedProblems connecting to
networks.
• Freezing or crashing.
• Modified or deleted files.
• Appearance of strange files, programs, or desktop icons.
• Programs running, turning off, or reconfiguring themselves
(malware will often reconfigure or turn off antivirus and
firewall programs).
• Strange computer behavior.
• E-mails/messages being sent automatically and without the
user ’s knowledge (a friend receives a strange e-mail from you
that you did not send).

Cyber security
The security applied to computers, as well as computer networks
such as private and public networks, including the Internet is
called as cyber security or IT security. Cybersecurity is the process
of applying security measures to ensure confidentiality, integrity,
and availability of data.
Cybercrime and Security 13

Computer protection (countermeasures)


Computer protection is an action, device, procedure, or technique
that reduces a threat, vulnerability, or an attack by eliminating or
preventing it.

Methods to provide protection


Some primary methods to provide protection are as follows:
• System access control is a method that does not allow any
unauthorized access of a system.
• Data access control is a method in which a user can monitor
who can access what data and for what purpose. A user can
set the rules for based-on-security level of other user.
• System and security administration monitors and allocates
system resources such as disk space, performs backups,
provides user access, manages user accounts and system
security functions.
• Secure by design means that the hardware and software have
been designed from the ground up to be secure.

Components of computer security


The basic components of a computer security system are as
follows:
• Confidentiality is the process of keeping data and information
secret and hidden from threats.
• Integrity is the process protecting data and information from
being modified by unknown and unauthorized parties.
• Availability of information refers to ensuring that authorized
parties are able to access the information when needed.
• Access control ensures that only authorized users can access
resources.
• Authentication is a process that ensures and confirms a user’s
identity.
• Non-repudiation means to ensure that a transferred message
has been sent and received by the parties claiming to have
sent and received the message.
• Privacy ensures that information is available only to those
who have the right to use it.
14 HACKING EXPOSED

• Steganography is the technique of hiding confidential


information within any media. It can be applied to images,
video files, or audio files. It helps to maintain confidentiality
and integrity of data.
• Cryptography is a technique to provide message confidentiality.
In Greek, it means secret writing. It involves the process of
encryption and decryption.

Some commonly used terms related to cryptography are as


follows:
• Plaintext is the original message or data that as input.
• Encryption is the process of changing plaintext into cipher
text using an encryption algorithm.
• Cipher text is the encrypted form of the message. It is the
scrambled message produced as an output.
• Decryption is the process of changing cipher text into plain
text using a decryption algorithm.
• Key also acts as input to the encryption algorithm. The
exact substitutions and transformations performed by
the algorithm depend on the key. Thus, a key is a number
or a set of numbers that the algorithm uses to perform
encryption and decryption.

Solution to computer security threats


Some major solutions to prevent and protect computer security
threats are described as follows.

Antivirus software
Antivirus programs are installed onto
your computer and can scan and remove
known viruses that you may have
contracted. The software can also be set
to automatically scan diskettes when
inserted into the disk drive, scan files
when downloaded from the Internet, or
scan e-mail when received.
Antivirus or anti-virus software are
used to prevent, detect, and remove malware, including but not
limited to computer viruses, computer worms, Trojan horses,
Cybercrime and Security 15

spyware, and adware. Computer security, including protection


from social engineering techniques, is commonly offered in
products and services of antivirus software companies.
Some major antivirus software are: Quick-Heal, AVG,
Kaspersky, Avira, Bit-defender, McAfee, Trend Micro, K7, and
Norton.

Digital certificate
Digital certificate is an electronic passport that allows a person,
computer, or organization to exchange information securely
over the Internet using the Public Key Infrastructure (PKI). It is
also referred as a Public Key Certificate.

Digital signature
Digital signature is an electronic form of signature that is used
to validate the authenticity and integrity of a message, software,
or digital document. It is also known as an electronic signature.
It is generally used in e-commerce, software distribution,
financial transactions, and other situations that rely on forgery
or tampering detection techniques.

Firewall
It protects private networks by securing gateway servers to
external networks such as the Internet. It guards any network
against hacks, cyber-attacks, and other unauthorized user
access. It can be a standalone machine or software in a router
or server. Thus, it is classified into two type: hardware firewall
and software firewall. Advanced firewalls operate on the
application layer of a network stack. This means they are capable
of intercepting all packets traveling to or from running software.
Application firewalls apply their filtering rules per process (i.e.,
to allow or block), instead of filtering connections by port.

Password
A password is a sequence of characters used to verify the
identity of a user during the authentication process. It is mostly
used in conjunction with a username or user ID. It is designed
to be known only to the user and allow that user to gain access
to a device, application, or website. When a password is entered,
the computer system hides the password field with asterisks or
bullets for security purposes.
16 HACKING EXPOSED

Generally, there are two modes of password as follows:


• Weak password: This is short and consists solely of letters
or numbers. It is very easy to remember, such as the name,
phone number, birthdate. It is easy to crack.
• Strong password: This is a combination of alphabets (both
upper- and lowercase), numbers, and special characteristics.
It is difficult to crack.

File and folder access permissions


File and folder access permissions is a method to assign
permissions or access rights to specific users and groups of users
to view, change, navigate, and execute the contents of the files
and folders.
Some specific permissions are as follows:
• Read: Permits viewing or accessing of the file’s and folder ’s
contents.
• Write: Permits writing and adding of files and folder.
• Read and Execute: Permits viewing and accessing of the file’s
contents, as well as executing of the file.
• Modify: Permits reading and writing of the file; allows
deletion of the file or folder.
• Full control: Permits reading, writing, changing, and deleting
of files and folders.

Laws relating to cybercrime in India


To deal with growing cybercrime
in India, the Government of India
(GoI) has imposed the Information
Technology Act, 2000, which was
enacted with the prime objective
to create an enabling environment
for commercial use of information
technology (IT). Some major acts and
laws are described below:
Cybercrime and Security 17

Cybercrimes under the IT Act


• Section 65: Tampering with computer source documents.
• Section 66: Hacking with computer systems, data alteration.
• Section 66B: Receiving stolen computer or communication
device.
• Section 66C: Using password of another person.
• Section 66D: Cheating by personation by using a computer
resource.
• Section 66E: Violation of privacy (publishing private images
of others).
• Section 66F: Acts of cyber terrorism.
• Section 67: Publishing obscene information in electronic form.
• Section 67A: Publishing or transmitting of material containing
sexually explicit act, etc. in electronic form.
• Section 67B: Publishing child porn or predating children
online.
• Section 67C: Intermediary intentionally or knowingly
contravening the directions about preservation and retention
of information.
• Section 68: Failure/refusal to comply with orders.
• Section 69: Failure/refusal to decrypt data/information.
• Section 70: Unauthorized access to protected systems.
• Section 71: Penalty for misrepresentation.
• Section 72: Breach of confidentiality and privacy.
• Section 72A: Disclosure of information in breach of lawful
contract.
• Section 73: Publishing false digital signature or certificates.
• Section 74: Publication for fraudulent purposes.

Cybercrimes under IPC and special laws


• Section 503 IPC: Sending threatening messages by e-mails.
• Section 499 IPC: Sending defamatory messages by e-mails.
• Section 463 IPC: Forgery of electronic records.
• Section 420 IPC: Fake websites, cyber frauds.
18 HACKING EXPOSED

• Section 463 IPC: E-mail spoofing.


• Section 383 IPC: Web-jacking.
• Section 500 IPC: Sending abusive message by e-mails.

Cybercrimes under the special acts


• NDPS (Narcotic Drugs and Psychotropic Substances) Act:
Online sale of drugs.
• Arms act: Online sales of arms and ammunitions.
CHAPTER 3

Computer Network
System and DNS Working

Computer network
A computer network is defined as the interconnection of
two or more computers. It is done to enable the computers to
communicate and share available resources.

Applications of a computer network

• Sharing of resources, such as printers.


• Sharing of expensive software and database.
• Communication from one computer to another computer.
• Exchange of data and information among users via network.
• Sharing of information over geographically wide areas.

Types of computer networks


Some major types of computer networks are as follows.

Local area network


A local area network (LAN) is designed for small physical areas
such as an office, group of buildings, or a factory. LANs are used
widely as they are easy to design and to troubleshoot. Personal
computers and workstations are connected to each other
through LANs. We can use different types of topologies through
LAN, including Star, Ring, Bus, Tree, etc. A LAN can be a simple
network such as connecting two computers, to share files and
network among each other, while it can also be as complex as
interconnecting an entire building. LANs are also widely used to
share resources such as printers, shared hard drives, etc.
20 HACKING EXPOSED

Metropolitan area network


A metropolitan area network (MAN) is basically a bigger version
of LAN. It uses the similar technology as LAN. It covers a large
geographical area and may serve as an ISP (Internet service
provider). A MAN is designed for customers who need a high-
speed connectivity. The data transfer rate and the propagation
delay of MAN are moderate. Devices used for transmission of
data through MAN are: modem and wire/cable. Examples of a
MAN are the part of the telephone company network that can
provide a high-speed DSL line to the customer or the cable TV
network in a city.

Wide area network


A wide area network (WAN) is a computer network that
extends over a large geographical area, although it might
be confined within the bounds of a state or country. A WAN
could be a connection of LAN connecting to other LANs via
telephone lines and radio waves and may be limited to an
enterprise (a corporation or an organization) or accessible to the
public. The technology is high speed and relatively expensive.
Devices used for transmission of data through WAN are optic
wires, microwaves, and satellites. There are two types of WAN:
switched WAN and point-to-point WAN. Example of a switched
WAN is the asynchronous transfer mode (ATM) network, and
example of a point-to-point WAN is a dial-up line that connects
a home computer to the Internet.

Personal area network


A personal area network (PAN) is the smallest type of network,
which is made up of a wireless modem, a computer or two,
phones, printers, tablets, etc., and revolves around one person
in one building. These types of networks are typically found in
small offices or residences and are managed by one person or
organization from a single device.

Virtual private network


A virtual private network (VPN) is a technology that creates
a safe and encrypted connection over a less secure network,
such as the Internet. VPN technology was developed as a way
to allow remote users and branch offices to securely access
Computer Network System and DNS Working 21

corporate applications and other resources. To ensure safety,


data travels through secure tunnels, and VPN users must use
authentication methods including passwords, tokens, and other
unique identification methods to gain access to the VPN.

Server is a device that is shared by several users of a


network.
File server is a computer on a network that is used to
provide users on a network with access to files.

Internet connections
An Internet connection is a service that provides access to the
global system of interconnected computer networks. The speed
of the Internet connection depends on the bandwidth.

Types of Internet connections


Some major types of Internet connections are described as
follows.

Dial-up connection
A dial-up connection technology dials into the network through
an existing phone line, creating a semi-permanent link to the
Internet. Operating on a single channel, it monopolizes the
phone line and is the slowest method of accessing the Internet. It
is often the only form of Internet access available in rural areas,
as it requires no infrastructure, other than the already existing
telephone network, to connect to the Internet. Usually, dial-
up connections do not exceed a speed of 56 kbit/s, as they are
primarily made via a 56k modem.

Broadband connection
The term broadband connection includes a broad range of
technologies, all of which provide high data rate access to the
Internet. It provides a continuous connection; there is no dial-
up/in process required and it does not “hog” phone lines. It
truly is the most used form of Internet access because of its high
access speeds. A broadband connection is offered in different
forms as follows:
22 HACKING EXPOSED

• Digital subscriber line (DSL): This uses an existing two-wire


copper telephone line connected to the premise, so service is
delivered simultaneously with wired telephone service; it will
not tie up your phone line as an analog dial-up connection
does. The two main categories of DSL for home subscribers
are called ADSL and SDSL. All types of DSL technologies are
collectively referred to as xDSL. An xDSL connection’s speed
ranges from 128 Kbps to 9 Mbps.
• Cable modem: This transmits data via airwaves on the cable
television infrastructure. It is provided by the local cable TV
provider through a cable modem. Data is transmitted via a
coaxial cable or a hybrid fiber coaxial cable. Cable speeds
range from 512 Kbps to 20 Mbps.
• Fiber optic: This transfers data fully or partially via fiber
optic cables. “Fiber” refers to the thin glass wires inside the
larger protective cable. “Optic” refers to the way the type of
data transferred light signals. Fiber connections can provide
homes and businesses with data transfer speeds of 1 Gbps.
• Broadband over power line (BPL): This technology makes
possible high-speed Internet and home network access over
ordinary residential electrical lines and power cables. It was
created as an alternative to other wired broadband Internet
systems such as the DSL and cable modem. Some people use
the term BPL to refer specifically to the home networking
aspects of power line communications and IPL (Internet over
power line) to refer to long-distance Internet usages.

Wireless connection
In a wireless type of Internet connection, radio frequency bands
are used in place of telephone or cable networks. This Internet
connection is the “always-on” connection that can be accessed
from any location that falls within the network coverage. Wireless
connections are made possible through the use of a modem,
which picks up Internet signals and sends them to other devices.
Some ways to connect the Internet wirelessly are as follows:
• Wireless fidelity (Wi-Fi): Wi-Fi uses radio waves to provide
wireless high-speed Internet and network connections.
Wireless (or Wi-Fi) hotspots are essentially wireless access
points providing network and/or Internet access to mobile
devices such as your laptop or smartphone, typically in
Computer Network System and DNS Working 23

public locations, such as shopping malls, restaurants, hotels,


airports, railway station, parks, etc.
• Worldwide Interoperability for Microwave Access
(WiMAX): This is a standardized wireless version of Ethernet
intended primarily as an alternative to wire technologies
(such as cable modems, DSL) to provide broadband access to
customer premises. It would operate similar to Wi-Fi, but at
higher speeds over greater distances and for a greater number
of users.
• Mobile wireless broadband service: This is also called
as mobile broadband. It also referred to as WWAN (for
wireless wide area network) and is a general term used to
describe high-speed Internet access from mobile providers
for portable devices. Mobile broadband services can also
provide wireless Internet access on your laptop or netbook
using built-in mobile broadband network cards or other
portable network devices, such as USB modems or portable
Wi-Fi mobile hotspots.
• Internet over satellite (IoS): IoS allows a user to access the
Internet via a satellite that orbits the earth. A satellite is placed
at a static point above the earth’s surface, in a fixed position.
The enormous distance that a signal travels from the earth
to the satellite and back again provides a delayed connection
compared to cable and DSL.

Intranet is a private network, operated by a large company


or other organization, which uses Internet technologies,
but is insulated from the global Internet.
Extranet is an intranet that is accessible to some people
from outside the company, or possibly shared by more
than one organization.
Integrated Services Digital Network (ISDN) is a
telecommunications technology that enables the
transmission of digital data over standard phone lines.
It can be used for voice calls, as well as data transfers. It
supports data transfer rates of 64 Kbps.

Network architecture
Network architectures can be broadly classified as using either
peer-to-peer or client/server architecture.
24 HACKING EXPOSED

Peer-to-peer network
A peer-to-peer network is also known as a P2P network. In this,
each workstation has equivalent capabilities and responsibilities.
This differs from the client/server architecture in which some
workstations are dedicated to serving the others. Peer-to-peer
networks are generally simpler and less expensive, but they
usually do not offer the same performance under heavy loads.

Client/Server network
In a client/server architecture, each computer or process on
the network is either a client or a server. Servers are powerful
computers or processors dedicated to managing disk drives (file
servers), printers (print servers), or network traffic (network
servers). Clients are less powerful PC workstations on which
users run applications. Clients rely on servers for resources, such
as files, devices, and even processing power.

OSI model
There are so many users who use a computer network and
are located over the world. So, the International organization
of Standardization (ISO) has developed a standard to ensure,
national and worldwide data communication, systems must be
developed that are compatible to communicate with each other.
This is called a model for Open System Interconnection (OSI)
and is commonly known as the OSI model.
This model has a seven-layer architecture. It defines seven
layers or levels in a complete communication system.
• Application: The application layer is the layer that the users
and user applications most often interact with. Network
communication is discussed in terms of availability
of resources, partners to communicate with, and data
synchronization.
• Presentation: The presentation layer is responsible for mapping
resources and creating context. It is used to translate lower-
level networking data into data that applications expect to see.
• Session: The session layer is a connection handler. It creates,
maintains, and destroys connections between nodes in a
persistent way.
• Transport: The transport layer is responsible for handing the
layers above it a reliable connection. In this context, reliable
Computer Network System and DNS Working 25

refers to the ability to verify that a piece of data was received


intact at the other end of the connection. This layer can resend
information that has been dropped or corrupted and can
acknowledge the receipt of data to remote computers.
• Network: The network layer is used to route data between
different nodes on the network. It uses addresses to be able
to identify which computer to send information to. This layer
can also breakdown larger messages into smaller chunks to be
reassembled on the opposite end.
• Data link: This layer is implemented as a method of
establishing and maintaining reliable links between different
nodes or devices on a network using existing physical
connections.
• Physical: The physical layer is responsible for handling the
actual physical devices that are used to make a connection.
This layer involves the bare software that manages physical
connections as well as the hardware itself (like Ethernet).

Network devices
Network devices are components used to connect computers or
other electronic devices together so that they can share files or
resources. Different networking devices have different roles to
play in a computer network. Some major computer networking
devices are as follows.

Repeater
A repeater operates at the physical layer. Its job is to regenerate
the signal over the same network before the signal becomes too
weak or corrupted so as to extend the length to which the signal
can be transmitted over the same network. An important point
to be noted about repeaters is that they do no amplify the signal.
When the signal becomes weak, they copy the signal bit-by-bit
and regenerate it at the original strength. It is a two-port device.

Hub
A hub is basically a multiport repeater. A hub connects multiple
wires coming from different branches, for example, the connector
in a star topology that connects different stations. Hubs cannot
filter data, so data packets are sent to all connected devices. In
other words, a collision domain of all hosts connected through a
hub remains one. Also, they do not have intelligence to find out
26 HACKING EXPOSED

the best path for data packets, which leads to inefficiencies and
wastage.

Bridge
A bridge operates at the data link layer. A bridge is a repeater,
with add on functionality of filtering content by reading the
MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has
a single input and single output port, thus making it a two-port
device.

Gateway
A gateway, as the name suggests, is a passage to connect two
networks together that may work upon different networking
models. They basically works as the messenger agents that take
data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and can
operate at any network layer. Gateways are generally more
complex than a switch or router.

Switch
A switch is a multi-port bridge with a buffer and a design that
can boost its efficiency (large number of ports imply less traffic)
and performance. A switch is a data link layer device. A switch
can perform error checking before forwarding data that makes
it very efficient as it does not forward packets that have errors
and forward good packets selectively to correct port only. In
other words, a switch divides collision domain of hosts, but the
broadcast domain remains same.

Routers
A router is a device like a switch that routes data packets based
on their IP addresses. A router is mainly a network layer device.
Routers normally connect LANs and WANs together and have a
dynamically updating routing table based on which they make
decisions on routing the data packets. Routers divide broadcast
domains of hosts connected through it.

Modem
A modem stands for modulator demodulator. That means it
modulates and demodulates the signal between the digital
data of a computer and the analog signal of a telephone line. It
Computer Network System and DNS Working 27

converts the computer-generated digital signals of a computer


into analog signals to enable their traveling via phone lines. It
can be used as a dial-up for a LAN or to connect to an ISP. It can
be both external, as in the device that connects to the USB or the
serial port of a computer, or proprietary devices for handheld
gadgets and other devices, as well as internal; in the form of add-
in expansion cards for computers and PC cards for laptops.

Network host
A network host refers to any computer (or server) that is
interlinked with another computer(s) or network devices
through an Internet connection. Each host has its unique IP
address, formed by the computer’s local number and the
particular number of the network it belongs to. The network
host is responsible for storing data that will be transmitted to
other computable devices, usually users’ computers, called
remote terminals.

Network protocol
The rules and conventions for communication between network
devices are defined as a network protocol. It includes the
characteristics of a network, such as access method, allowed
physical topologies, types of cabling, and speed of data transfer.
Several types of computer network protocols have been
developed for specific purposes and environments. Some major
network protocols are described, including TCP, IP, POP, SMTP,
HTTP, FTP, SSH, PPP, WAP, and VoIP.

Transmission control protocol


The transmission control protocol (TCP) is a communication
protocol that computers use to communicate over a network. It
divides a message into a stream of packets that are sent and then
reassembled at the destination.

Internet protocol
The Internet protocol (IP) is an addressing protocol. It is always
used together with TCP. The IP addresses the packet, routes them
through different nodes and networks until they reach their final
destination. TCP/IP is perhaps the most used standard protocol
for connecting computer networks.
28 HACKING EXPOSED

Internet protocol address


An Internet protocol (IP) address is the unique numerical
address of a device in a computer network that uses the IP for
communication. An IP address consists of four numbers; each
can contain one to three digits. These numbers are separated
with a single dot (.). These four numbers can range from 0 to 255.
Some types of IP address are described next.

Public IP address
A public IP address is used for identification of a home network
to the outside world. It is unique throughout the entire network.
It is used on the Internet or other WAN. It is an IP address that
your home or business router receives from your ISP. Public
IP addresses are required for any publicly accessible network
hardware, such as for your home router, as well as for the servers
that host websites. It is sometimes called an Internet IP address.

Finding your public IP address


Go to Google and search for ip; it will show your public IP
address:

Websites for finding a public IP address are:


• www.whatsmyip.org
• www.whatismyipaddress.com
• www.ipchicken.com

Private IP address
A private IP address is used for identification of a network device
inside the home network. Two or more separate networks can
Computer Network System and DNS Working 29

have same private IP addresses assigned to different computers.


It is used on a LAN for computers not directly connected to the
Internet. It is an IP address that is reserved for internal use behind
a router or other network address translation (NAT) device,
apart from the public. It is also known as a local IP address.

Finding your private IP address


For Windows OS users:
To open Command Prompt: Press the Windows key + R, then
type cmd and click on OK:

In the Command Prompt window, type ipconfig and press


Enter:
30 HACKING EXPOSED

The IPv4 address shows the private IP address, like the


preceding screenshot.
To find a private IP address:
Linux users can launch the Terminal window and enter
the command hostname -I, ifconfig, or ip addr show.
Mac OS users can use the command ifconfig.

Dynamic IP address
A dynamic IP address is an IP address
that is automatically assigned to each
connection of a network by a Dynamic
Host Configuration Protocol (DHCP)
server. It’s called dynamic because it
constantly changes. It is good for residential users and small
business owners. The public IP address that gets assigned to
the router of most home and business users by their ISPs is a
dynamic IP address. The upload and download speed of a
dynamic IP address is slower than the static IP address.

Static IP address
A static IP address is an IP address
that was manually configured for
a device. It’s called static because it
doesn’t change. Routers, phones,
tablets, desktops, laptops, and any
other device that can use an IP address can be configured to
have a static IP address. It is widely used by web servers, e-mail
servers, and other Internet servers. Also, it is used for voice over
IP (VOIP), VPN, playing online games, or game hosting. The
upload and download speed of a static IP address is faster than
a dynamic IP address.

Both private and public IP addresses are either dynamic


or static, which means that, respectively, they either
change or they don’t.

The Post Office Protocol (POP) is used to receive incoming


e-mails.
The Simple Mail Transport Protocol (SMTP) is used for
sending and distributing outgoing e-mails.
Computer Network System and DNS Working 31

Hypertext Transfer Protocol


The Hypertext Transfer Protocol (HTTP) is used to transfer
a hypertext between two or more computers. Generally, it is
used by a web server to allow web pages to be shown in a web
browser. Hypertext is the text that is coded using the language
called HTML. HTTP is based on the client/server principles, for
example, https://www.google.co.in.
Hypertext Markup Language (HTML) is a standardized
system for tagging text files to achieve font, color,
graphic, and hyperlink effects on World Wide Web pages.
It defines the structure and layout of a web document by
using a variety of tags and attributes.
Hyper Text Transfer Protocol Secure (HTTPS) is the secure
version of HTTP, the protocol over which data is sent between
your browser and the website that you are connected to.

File Transfer Protocol


The File Transfer Protocol (FTP) allows users to transfer files
from one computer to another computer. Files that can be
transferred may include program files, text files, and multimedia
files, etc. This method of file transfer is faster than that using
HTTP. With a free FTP client software (such as FileZilla,
Cyberduck or Transmit) uploading/downloading a file is really
easy through the Internet.

SSH protocol
The SSH protocol is a method for secure remote login from one
computer to another. It is also known as Secure Shell. It provides
several alternative options for strong authentication, and it
protects the communications security and integrity with strong
encryption. It is a secure alternative to the non-protected login
protocols (such as Telnet). It is also used for interactive and
automated file transfers.
Another random document with
no related content on Scribd:
when Anne was a baby of three; left her with a dreadful pang, a
rending of the inmost fibres, and yet a sense of unutterable relief,
because to do so was to escape from the oppression of her married
life, the thick atmosphere of self-approval and unperceivingness
which emanated from John Clephane like coal-gas from a leaking
furnace. So she had put it at the time—so, in her closest soul-
scrutiny, she had to put it still. “I couldn’t breathe—” that was all she
had to say in her own defence. She had said it first—more’s the pity
—to Hylton Davies; with the result that two months later she was on
his yacht, headed for the West Indies.... And even then she couldn’t
breathe any better; not after the first week or two. The asphyxiation
was of a different kind, that was all.
It was a year later that she wrote to her husband. There was no
answer: she wrote again. “At any rate, let me see Anne.... I can’t live
without Anne.... I’ll go and live with her anywhere you decide....”
Again no answer.... She wrote to her mother-in-law, and Mrs.
Clephane’s lawyer sent the letter back unopened. She wrote, in her
madness, to the child’s nurse, and got a reply from the same legal
firm, requesting her to cease to annoy her husband’s family. She
ceased.
Of all this she recalled now only the parting from Anne, and the
subsequent vain efforts to recover her. Of the agent of her release,
of Hylton Davies, she remembered, in the deep sense of
remembering, nothing. He had become to her, with his flourish and
his yachting-clothes, and the big shining yacht, and the cocoa-palms
and general setting of cool drinks and tropical luxury, as unreal as
somebody in a novel, the highly coloured hero (or villain) on the
“jacket”. From her inmost life he had vanished into a sort of remote
pictorial perspective, where a woman of her name figured with him,
in muslin dresses and white sunshades, herself as unreal as a lady
on a “jacket”.... Dim also had grown the years that followed: lonely
humdrum years at St. Jean-de-Luz, at Bordighera, at Dinard. She
would settle in a cheap place where there were a circulating library, a
mild climate, a few quiet bridge-playing couples whom one got to
know through the doctor or the clergyman; then would grow tired and
drift away again. Once she went back to America, at the time of her
mother’s death.... It was in midsummer, and Anne (now ten years
old) was in Canada with her father and grandmother. Kate Clephane,
not herself a New Yorker, and with only two or three elderly and
disapproving relatives left in the small southern city of her origin,
stood alone before the elaborately organized defences of a vast New
York clan, and knew herself helpless. But in her madness she
dreamed of a dash to Canada, an abduction—schemes requiring
money, friends, support, all the power and ruse she was so lacking
in. She gave that up in favour of a midnight visit (inspired by Anna
Karénine) to the child’s nursery; but on the way to Quebec she heard
that the family had left in a private car for the Rocky Mountains. She
turned about and took the first steamer to France.
All this, too, had become dim to her since she had known Chris. For
the first time, when she met him, her soul’s lungs seemed full of air.
Life still dated for her from that day—in spite of the way he had hurt
her, of his having inflicted on her the bitterest pain she had ever
suffered, he had yet given her more than he could take away. At
thirty-nine her real self had been born; without him she would never
have had a self.... And yet, at what a cost she had bought it! All the
secluded penitential years that had gone before wiped out at a
stroke—stained, defiled by follies she could not bear to think of,
among people from whom her soul recoiled. Poor Chris! It was not
that he was what is called “vicious”—but he was never happy without
what he regarded as excitement; he was always telling her that an
artist had to have excitement. She could not reconcile his idea of
what this stimulus consisted in with his other tastes and ideas—with
that flashing play of intelligence which had caught her up into an air
she had never breathed before. To be capable of that thought-play,
of those flights, and yet to need gambling, casinos, rowdy crowds,
and all the pursuits devised to kill time for the uninventive and
lethargic! He said he saw things in that kind of life that she couldn’t
see—but since he also saw this unseeable (and she knew he did) in
nature, in poetry and painting, in their shared sunsets and
moonrises, in their first long dreaming days, far from jazz-bands and
baccarat tables, why wasn’t that enough, and how could the other
rubbishy things excite the same kind of emotions in him? It had been
the torment of her torments, the inmost pang of her misery, that she
had never understood; and that when she thought of him now it was
through that blur of noise and glare and popping corks and
screaming bands that she had to grope back to the first fleeting Chris
who had loved her and waked her.

At eleven o’clock she found herself, she didn’t know how, at the
milliner’s. Other women, envious or undecided, were already
flattening their noses against the panes. “That bird of Paradise ...
what they cost nowadays!” But she went in, cool and confident, and
asked gaily to try on her new hat. She must have been smiling, for
the saleswoman received her with a smile.
“What a complexion, ma’am! One sees you’re not afraid of the wind.”
But when the hat was produced, though it was the copy of one she
had already tried on, it struck Mrs. Clephane as absurdly youthful,
even ridiculous. Had she really been dressing all this time like a girl
in her teens?
“You forget that I’ve a grown-up daughter, Madame Berthe.”
“Allons, Madame plaisante!”
She drew herself up with dignity. “A daughter of twenty-one; I’m
joining her in New York next week. What would she think of me if I
arrived in a hat more youthful than hers? Show me something
darker, please: yes, the one with the autumn leaves. See, I’m
growing gray on the temples—don’t try to make me look like a
flapper. What’s the price of that blue fox over there? I like a gray fur
with gray hair.”
In the end she stalked out, offended by the milliner’s refusal to take
her gray hair seriously, and reflecting, with a retrospective shiver,
that her way of dressing and her demeanour must have thoroughly
fixed in all these people’s minds the idea that she was one of the silly
vain fools who imagine they look like their own daughters.
At the dress-maker’s, the scene repeated itself. The dashing little
frock prepared for her—an orange silk handkerchief peeping from
the breast-pocket on which an anchor was embroidered—made her
actually blush; and reflecting that money wouldn’t “matter” now (the
thought of the money had really not come to her before) she
persuaded the dress-maker to take the inappropriate garment back,
and ordered, instead, something sober but elaborate, and ever so
much more expensive. It seemed a part of the general unreal rapture
that even the money-worry should have vanished.
Where should she lunch? She inclined to a quiet restaurant in a back
street; then the old habit of following the throng, the need of rubbing
shoulders with a crowd of unknown people, swept her automatically
toward the Casino, and sat her down, in a blare of brass instruments
and hard sunshine, at the only table left. After all, as she had often
heard Chris say, one could feel more alone in a crowd.... But
gradually it came over her that to feel alone was not in the least what
she wanted. She had never, for years at any rate, been able to bear
it for long; the crowd, formerly a solace and an escape, had become
a habit, and being face to face with her own thoughts was like facing
a stranger. Oppressed and embarrassed, she tried to “make
conversation” with herself; but the soundless words died unuttered,
and she sought distraction in staring about her at the unknown faces.
Their number became oppressive: it made her feel small and
insignificant to think that, of all this vulgar feasting throng, not one
knew the amazing thing which had befallen her, knew that she was
awaited by an only daughter in a big house in New York, a house
she would re-enter in a few days—yes, actually in a few days—with
the ease of a long-absent mistress, a mistress returning from an
immense journey, but to whom it seems perfectly natural and familiar
to be once again smiling on old friends from the head of her table.
The longing to be with people to whom she could tell her news made
her decide, after all, to live out her day as she had originally planned
it. Before leaving the hotel she had announced her departure to the
astonished Aline (it was agreeable, for once, to astonish Aline) and
despatched her to the post-office with a cable for New York and a
telegram for a Paris steamship company. In the cable she had said
simply: “Coming darling.” They were the words with which she used
to answer little Anne’s calls from the nursery: that impatient
reiterated “Mummy—Mummy—I want my Mummy!” which had kept
on echoing in her ears through so many sleepless nights. The
phrase had flashed into her head the moment she sat down to write
the cable, and she had kept murmuring to herself ever since:
“Mummy—Mummy—I want my Mummy!” She would have liked to
quote the words to Mrs. Minity, whose door she was now
approaching; but how could she explain to the old lady, who was
deaf and self-absorbed, and thought it a privilege for any one to go
driving with her, why little Anne’s cry had echoed so long in the void?
No; she could not speak of that to any one: she must stick to her old
“take-it-for-granted” attitude, the attitude which had carried her
successfully over so many slippery places.
Mrs. Minity was very much pre-occupied about her foot-warmer. She
spent the first quarter of an hour in telling Mrs. Clephane that the
Rector’s wife, whom she had taken out the day before, had
possessed herself of the object without so much as a “may I,” and
kept her big feet on it till Mrs. Minity had had to stop the carriage and
ask the coachman in a loud voice how it was that The Foot-warmer
had not been put in as usual. Whereupon, if you please, Mrs.
Merriman had simply said: “Oh, I have it, thanks, dear Mrs. Minity—
such a comfort, on these windy days!” “Though why a woman who
keeps no carriage, and has to tramp the streets at all hours, should
have cold feet I can’t imagine—nor, in fact, wholly believe her when
she says so,” said Mrs. Minity, in the tone of one to whom a defective
circulation is the recognized prerogative of carriage-owners. “I
notice, my dear, that you never complain of being cold,” she added
approvingly, relegating Kate, as an enforced pedestrian, to Mrs.
Merriman’s class, but acknowledging in her a superior sense of
propriety. “I’m always glad,” she added, “to take you out on windy
days, for battling with the mistral on foot must be so very exhausting,
and in the carriage, of course, it is so easy to reach a sheltered
place.”
Mrs. Minity was still persuaded that to sit in her hired victoria, behind
its somnolent old pair, was one of the most rapid modes of
progression devised by modern science. She talked as if her
carriage were an aeroplane, and was as particular in avoiding
narrow streets, and waiting at the corner when she called for friends
who lived in them, as if she had to choose a safe alighting-ground.
Mrs. Minity had come to the Riviera thirty years before, after an
attack of bronchitis, and finding the climate milder and the life easier
than in Brooklyn, had not gone back. Mrs. Clephane never knew
what roots she had broken in the upheaval, for everything
immediately surrounding her assumed such colossal proportions that
remoter facts, even concerning herself, soon faded to the vanishing-
point. Only now and then, when a niece from Bridgeport sent her a
bottle of brandy-peaches, or a nephew from Brooklyn wrote to say
that her income had been reduced by the foreclosure of a mortgage,
did the family emerge from its transatlantic mists, and Mrs. Minity
become, for a moment, gratified or irate at the intrusion. But such
emotions, at their acutest, were but faint shadows of those aroused
by the absence of her foot-warmer, or the Salvation Army’s having
called twice in the same month for her subscription, or one of the
horses having a stiff shoulder, and being replaced, for a long
hazardous week, by another, known to the same stable for twenty
years, and whom the patron himself undertook to drive, so that Mrs.
Minity should not miss her airing. She had thought of staying in till
her own horse recovered; but the doctor had absolutely forbidden it,
so she had taken her courage in both hands, and gone out with the
substitute, who was not even of the same colour as the horse she
was used to. “But I took valerian every night,” she added, “and
doubled my digitalis.”
Kate Clephane, as she listened (for the hundredth time),
remembered that she had once thought Mrs. Minity a rather
impressive old lady, somewhat arrogant and very prosy, but with a
distinct “atmosphere,” and a charming half-obsolete vocabulary,
suggesting “Signers” and Colonial generals, which was a refreshing
change from the over-refinement of Mrs. Merriman and the Betterlys’
monotonous slang. Now, compared to certain long-vanished figures
of the Clephane background—compared even to the hated figure of
old Mrs. Clephane—Mrs. Minity shrank to the semblance of a vulgar
fussy old woman.
“Old Mrs. Clephane never bragged, whatever she did,” Kate thought:
“how ridiculous all that fuss about driving behind a strange horse
would have seemed to her. After all, good breeding, even in the
odious, implies a certain courage....” Her mother-in-law, as she
mused, assumed the commanding yet not unamiable shape of a
Roman matron of heroic mould, a kind of “It-hurts-not-O-my-Pætus,”
falling first upon the sword.
The bridge-players in Countess Lanska’s pastille-scented and
smoke-blurred drawing-room seemed to have undergone the same
change as Mrs. Minity. The very room, as Kate entered, on fire from
the wind, seemed stuffier, untidier and, yes—vulgarer—than she had
remembered. The empty glasses with drowned lemon-peel, the
perpetually unemptied ash-trays, the sketches by the Countess’s
latest protégé—splashy flower markets, rococo churches, white
balustrades, umbrella-pines and cobalt seas—the musical
instruments tossed about on threadbare cashmere shawls covering
still more threadbare sofas, even the heart-rending gaze of the
outspread white bear with the torn-off ear which, ever since Kate had
known him, had clung to his flattened head by the same greasy
thread: all this disorder was now, for the first time, reflected in the
faces about the card-tables. Not one of them, men or women, if
asked where they had come from, where they were going, or why
they had done such and such things, or refrained from doing such
other, would have answered truthfully; not, as Kate knew, from any
particular, or at any rate permanent, need of concealment, but
because they lived in a chronic state of mental inaccuracy,
excitement and inertia, which made it vaguely exhilarating to lie and
definitely fatiguing to be truthful.
She had not meant to stay long, for her first glance at their new faces
told her that to them also she would not be able to speak of what had
happened. But, to subdue her own agitation and divert their heavy
eyes, the easiest thing was to take her usual hand at bridge; and
once she had dropped into her place, the familiar murmur of “No
trumps ... yes ... diamonds.... Who dealt?... No bid.... No ... yes ... no
...”, held her to her seat, soothed by the mesmeric touch of habit.

At the Rectory Mrs. Merriman exclaimed: “Oh, there she is!” in a tone
implying that she had had to stand between Mrs. Clephane and the
assembled committee.
Kate remembered that she was secretary, and expected to read the
minutes.
“Have I kept you all waiting? So sorry,” she beamed, in a voice that
sang hallelujahs. Mrs. Merriman pushed the book toward her with a
protecting smile; and Mrs. Parley Plush of the Villa Mimosa (she
always told you it had been quite her own idea, calling it that) visibly
wondered that Mrs. Merriman should be so tolerant.
They were all there: the American Consul’s wife, mild, plump and
irreproachable; the lovely Mrs. Prentiss of San Francisco, who “took
things” and had been involved in a drug scandal; the Comtesse de
Sainte Maxime, who had been a Loach of Philadelphia, and had
figured briefly on the operatic stage; the Consul’s sister, who dressed
like a flapper, and had been engaged during the war to a series of
American officers, all of whom seemed to have given her celluloid
bangles; and a pale Mrs. Marsh, who used to be seen about with a
tall tired man called “the Colonel”, whose family-name was not
Marsh, but for whom she wore mourning when he died, explaining—
somewhat belatedly—that he was a cousin. Lastly, there was Mrs.
Fred Langly of Albany, whose husband was “wanted” at home for
misappropriation of funds, and who, emerging from the long
seclusion consequent on this unfortunate episode, had now
blossomed into a “prominent war-worker”, while Mr. Langly devoted
himself to the composition of patriotic poems, which he read (flanked
by the civil and military authorities) at all the allied Inaugurations and
Commemorations; so that by the close of the war he had become its
recognized bard, and his “Lafayette, can we forget?” was quoted
with tears by the very widows and orphans he had defrauded. Facing
Mrs. Merriman sat the Rector, in clerical pepper-and-salt clothes and
a secular pepper-and-salt moustache, talking cheerful slang in a
pulpit voice.
Mrs. Clephane looked about her with new eyes. Save for their
hostess, the Consul’s wife and Mrs. Langly, “things” had been said of
all the women; even concerning Mrs. Parley Plush, the older
inhabitants (though they all went to her teas at the Villa Mimosa)
smiled and hinted. And they all knew each other’s stories, or at least
the current versions, and affected to disapprove of each other and
yet be tolerant; thus following the example of Mrs. Merriman, who
simply wouldn’t listen to any of those horrors, and of Mr. Merriman,
whose principle it was to “believe the best” till the worst stared him in
the face, and then to say: “I understand it all happened a long while
ago.”
To all of them the Rectory was a social nucleus. One after another
they had found their way there, subscribed to parochial charities,
sent Mrs. Merriman fruit and flowers, and suppressed their yawns at
Mothers’ Meetings and Sewing Circles. It was part of the long long
toll they had to pay to the outraged goddess of Respectability. And at
the Rectory they had made each other’s acquaintance, and thus
gradually widened their circle, and saved more hours from solitude,
their most dreaded enemy. Kate Clephane knew it all by heart: for
eighteen years she had trodden that round. The Rector knew too; if
ever a still youngish and still prettyish woman, in quiet but perfect
clothes with a scent of violets, asked to see him after service, he
knew she was one more recruit. In all the fashionable Riviera
colonies these ladies were among the staunchest supporters of their
respective churches. Even the oldest, stoutest, grimmest of his flock
had had her day; Mr. Merriman remembered what his predecessor
had hinted of old Mrs. Orbitt’s past, and how he had smiled at the
idea, seeing Mrs. Orbitt, that first Sunday, planted in her front pew
like a very Deborah.
Some of the prettiest—or who had been, at least—exchanged
parishes, as it were; like that sweet Lady de Tracey, who joined the
American fold, while Miss Julia Jettridge, from New York, attended
the Anglican services. They both said it was because they preferred
“the nearest church”; but the Rector knew better than that.
Then the war came; the war which, in those bland southern places
and to those uprooted drifting women, was chiefly a healing and
amalgamating influence. It was awful, of course, to admit even to
one’s self that it could be that; but, in the light of her own
deliverance, Kate Clephane knew that she and all the others had so
viewed it. They had shuddered and wept, toiled hard, and made their
sacrifices; of clothes and bridge, of butter and sweets and carriage-
hire—but all the while they were creeping slowly back into the once
impregnable stronghold of Social Position, getting to know people
who used to cut them, being invited to the Préfecture and the
Consulate, and lots of houses of which they used to say with feigned
indifference: “Go to those dreary people? Not for the world!” because
they knew they had no chance of getting there.
Yes: the war had brought them peace, strange and horrible as it was
to think it. Kate’s eyes filled as she looked about the table at those
haggard powdered masks which had once glittered with youth and
insolence and pleasure. All they wanted now was what she herself
wanted only a few short hours ago: to be bowed to when they caught
certain people’s eyes; to be invited to one more dull house; to be put
on the Rector’s Executive Committees, and pour tea at the
Consuless’s “afternoons”.
“May I?” a man’s voice fluted; and a noble silver-thatched head with
a beak-like nose and soft double chin was thrust into the doorway.
“Oh, Mr. Paly!” cried Mrs. Merriman; and murmured to the nearest
ladies: “For the music— I thought he’d better come today.”
Every one greeted Mr. Paly with enthusiasm. It was poky, being only
women and the Rector. And Mr. Paly had the dearest little flat in one
of the old houses of the “Vieux Port”, such a tiny flat that one
wondered how any one so large, manly and yet full of quick
womanish movements, managed to fit in between the bric-a-brac.
Mr. Paly clasped his hostess’s hand in a soft palm. “I’ve brought my
young friend Lion Carstairs; you won’t mind? He’s going to help me
with the programme.”
But one glance at Mr. Carstairs made it clear that he did not mean to
help any one with anything. He held out two lax fingers to Mrs.
Merriman, sank into an armchair, and let his Antinous-lids droop over
his sullen deep gray eyes. “He’s awfully good on Sicilian music ...
noted down folk-songs at Taormina....” Mr. Paly whispered, his
leonine head with its bushy eye-brows and silver crown bending
confidentially to his neighbour.
“Order!” rapped the Rector; and the meeting began.

At the Casino that night Kate Clephane, on the whole, was more
bored than at the Rectory. After all, at the Merrimans’ there was a
rather anxious atmosphere of kindliness, of a desire to help, and a
retrospective piety about the war which had served them such a
good turn, and of which they were still trying, in their tiny measure, to
alleviate the ravages.
Whereas the Betterlys—
“What? Another begging-list? No, my dear Kate; you don’t! Stony-
broke; that’s what I am, and so’s Harry—ain’t you, Harry?” Marcia
Betterly would scream, clanking her jewelled bangles, twisting one
heavy hand through her pearls, and clutching with the other the
platinum-and-diamond wrist-bag on which she always jokingly
pretended that Kate Clephane had her eye. “Look out, Sid, she’s a
regular train-robber; hold you up at your own door. I believe she’s
squared the police: if she hadn’t she’d ’a been run in long ago.... Oh,
the war? What war? Is there another war on? What, that old one?
Why, I thought that one was over long ago.... You can’t get anybody I
know to talk about it even!”
“Guess we’ve got our work cut out paying for it,” added Horace
Betterly, stretching a begemmed and bloated hand toward the wine-
list.
“Well, I should say!” his wife agreed with him.
“Sid, what form of liquid refreshment?” And “Sid”, a puffy Chicago
business man, grew pink in his effort to look knowing and not name
the wrong champagne....
It was odd: during her drive with Mrs. Minity, at Madame Lanska’s,
and again at the Rectory, Kate Clephane had meant to proclaim her
great news—and she had not yet breathed a word of it. The fact
was, it was too great; too precious to waste on Mrs. Minity’s
inattention, too sacred to reveal to Madame Lanska’s bridge-players,
and too glorious to overwhelm those poor women at the Rectory
with. And now, in the glare and clatter of the Casino, with the Sids
and Harrys exchanging winks, and the Mrs. Sids and Harrys craning
fat necks to see the last new cocotte, or the young Prince about
whom there were such awful stories—here, of all places, to unbare
her secret, name her daughter: how could she ever have thought it
possible?
Only toward the end of the long deafening dinner, when Marcia and
Mrs. Sid began to make plans for a week at Monte Carlo, and she
found herself being impressed into the party (as she had, so often
and so willingly, before) did Mrs. Clephane suddenly find herself
assuming the defensive.
“You can’t? Or you won’t? Now, you Kate-cat you,” Marcia
threatened her with a scented cigarette, “own up now—what’s
doing? What you onto this time? Ain’t she naughty? We ain’t grand
enough for her, girls!” And then, suddenly, at a sign from Horace,
and lowering her voice, but not quite enough to make the
communication private: “See here, Kate darling—of course, you
know, as our guest: why, of course, naturally.” While, on the other
side, Mrs. Sid drawled: “What I want to know is: where else can
anybody go at this season?”
Mrs. Clephane surveyed her calmly. “To New York—at least I can.”
They all screamed it at her at once: “N’York?” and again she
dropped the two syllables slowly from disdainful lips.
“Well, I never! Whaffor, though?” questioned Horace from the depths
of a fresh bumper.
Mrs. Clephane swept the table with a cool eye. “Business—family
business,” she said.
“Criky!” burst from Horace. And: “Say, Sid, a drop of fine, just to help
us over the shock? Well, here’s to the success of the lady’s Family
Business!” he concluded with a just-perceptible wink, emptying his
champagne goblet and replacing it by the big bubble-shaped liqueur
glass into which a thoughtful waiter had already measured out the
proper quantity of the most expensive fine.
III.
AS Kate Clephane stood on deck, straining her eyes at the
Babylonian New York which seemed to sway and totter toward her
menacingly, she felt a light hand on her arm.
“Anne!”
She barely suppressed the questioning lift of her voice; for the length
of a heart-beat she had not been absolutely certain. Then ... yes,
there was her whole youth, her whole married past, in that small pale
oval—her own hair, but duskier, stronger; something of her smile too,
she fancied; and John Clephane’s straight rather heavy nose,
beneath old Mrs. Clephane’s awful brows.
“But the eyes—you chose your own eyes, my darling!” She had the
girl at arms’-length, her own head thrown back a little: Anne was
slightly the taller, and her pale face hung over her mother’s like a
young moon seen through mist.
“So wise of you! Such an improvement on anything we had in
stock....” How absurd! When she thought of the things she had
meant to say! What would her child think her? Incurably frivolous, of
course. Well, if she stopped to consider that she was lost.... She
flung both arms about Anne and laid a long kiss on her fresh cheek.
“My Anne ... little Anne....”
She thirsted to have the girl to herself, where she could touch her
hair, stroke her face, draw the gloves from her hands, kiss her over
and over again, and little by little, from that tall black-swathed figure,
disengage the round child’s body she had so long continued to feel
against her own, like a warmth and an ache, as the amputated feel
the life in a lost limb.
“Come, mother: this way. And here’s Mr. Landers,” the girl said. Her
voice was not unkind; it was not cold; it was only muffled in fold on
fold of shyness, embarrassment and constraint. After all, Kate
thought, it was just as well that the crowd, the confusion and Fred
Landers were there to help them over those first moments.
“Fred Landers! Dear old Fred! Is it you, really? Known me
anywhere? Oh, nonsense! Look at my gray hair. But you—” She had
said the words over so often in enacting this imagined scene that
they were on her lips in a rush; but some contradictory impulse
checked them there, and let her just murmur “Fred” as her hand
dropped into that of the heavy grizzled man with a red-and-yellow
complexion and screwed-up blue eyes whom Time had substituted
for the thin loose-jointed friend of her youth.
Landers beamed on her, silent also; a common instinct seemed to
have told all three that for the moment there was nothing to say—
that they must just let propinquity do its mysterious work without
trying to hasten the process.
In the motor Mrs. Clephane’s agony began. “What do they think of
me?” she wondered. She felt so sure, so safe, so enfolded, with
them; or she would have, if only she could have guessed what
impression she was making. She put it in the plural, because, though
at that moment all she cared for was what Anne thought, she had
guessed instantly that, for a time at least, Anne’s view would be
influenced by her guardian’s.
The very tone in which he had said, facing them from his seat
between the piled-up bags: “You’ll find this young woman a handful
—I’m not sorry to resign my trust—” showed the terms the two were
on. And so did Anne’s rejoinder: “I’m not a handful now to any one
but myself—I’m in my own hands, Uncle Fred.”
He laughed, and the girl smiled. Kate wished her daughter and she
had been facing each other, so that she could have seen the whole
stretch of the smile, instead of only the tip dimpling away into a half-
turned cheek. So much depended, for the mother, on that smile—on
the smile, and the motion of those grave brows. The whole point
was, how far did the one offset the other?
“Yes,” Mr. Landers assented, “you’re a free agent now—been one for
just three weeks, haven’t you? So far you’ve made fairly good use of
your liberty.”
Guardian and ward exchanged another smile, in which Kate felt
herself generously included; then Landers’s eye turned to hers.
“You’re not a bit changed, you know.”
“Oh, come! Nonsense.” Again she checked that silly “look at my gray
hair.” “I hope one never is, to old friends—after the first shock, at any
rate.”
“There wasn’t any first shock. I spotted you at once, from the pier.”
Anne intervened in her calm voice. “I recognized mother too—from
such a funny old photograph, in a dress with puffed sleeves.”
Mrs. Clephane tried to smile. “I don’t know, darling, if I recognized
you.... You were just there ... in me ... where you’ve always been....”
She felt her voice breaking, and was glad to have Mr. Landers burst
in with: “And what do you say to our new Fifth Avenue?”

She stood surveying its upper reaches, that afternoon, from the
window of the sitting-room Anne had assigned to her. Yes; Fred
Landers was right, it was a new, an absolutely new, Fifth Avenue; but
there was nothing new about Anne’s house. Incongruously enough—
in that fluid city, where the stoutest buildings seemed like atoms
forever shaken into new patterns by the rumble of Undergrounds and
Elevateds—the house was the very one which had once been
Kate’s, the home to which, four-and-twenty years earlier, she had
been brought as a bride.
Her house, since she had been its mistress; but never hers in the
sense of her having helped to make it. John Clephane lived by
proverbs. One was that fools built houses for wise men to live in; so
he had bought a fool’s house, furniture and all, and moved into it on
his marriage. But if it had been built by a fool, Kate sometimes used
to wonder, how was it that her husband found it to be planned and
furnished so exactly as he would have chosen? He never tired of
boasting of the fact, seemingly unconscious of the unflattering
inference to be drawn; perhaps, if pressed, he would have said there
was no contradiction, since the house had cost the fool a great deal
to build, and him, the wise man, very little to buy. It had been, he was
never tired of repeating, a bargain, the biggest kind of a bargain; and
that, somehow, seemed a reason (again Kate didn’t see why) for
leaving everything in it unchanged, even to the heraldic stained glass
on the stairs and the Jacobean mantel in a drawing-room that ran to
Aubusson.... And here it all was again, untouched, unworn—the only
difference being that she, Kate, was installed in the visitor’s suite on
the third floor (swung up to it in a little jewel-box of a lift), instead of
occupying the rooms below which had once been “Papa’s and
Mamma’s”. The change struck her at once—and the fact that Anne,
taking her up, had first pressed the wrong button, the one for the
floor below, and then reddened in correcting her mistake. The girl
evidently guessed that her mother would prefer not to go back to
those other rooms; her having done so gave Kate a quick thrill.
“You don’t mind being so high up, mother?”
“I like it ever so much better, dear.”
“I’m so glad!” Anne was making an evident effort at expansiveness.
“That’s jolly of you—like this we shall be on the same floor.”
“Ah, you’ve kept the rooms you had—?” Kate didn’t know how to put
it.
“Yes: the old nursery. First it was turned into a schoolroom, then into
my den. One gets attached to places. I never should have felt at
home anywhere else. Come and see.”
Ah, here, at last, in the grim middle-aged house, were youth and
renovation! The nursery, having changed its use, had perforce had to
change its appearance. Japanese walls of reddish gold; a few
modern pictures; books; a budding wistaria in a vase of Corean
pottery; big tables, capacious armchairs, an ungirlish absence of
photographs and personal trifles. Not particularly original; but a
sober handsome room, and comfortable, though so far from “cosy.”
Kate wondered: “Is it her own idea, or is this what the new girl likes?”
She recalled the pink and white trifles congesting her maiden bower,
and felt as if a rather serious-minded son were showing her his
study. An Airedale terrier, stretched before the fire, reinforced the
impression. She didn’t believe many of the new girls had rooms like
this.
“It’s all your own idea, isn’t it?” she asked, almost shyly.
“I don’t know—yes. Uncle Fred helped me, of course. He knows a lot
about Oriental pottery. I called him ‘Uncle’ after father died,” Anne
explained, “because there’s nothing else to call a guardian, is there?”
On the wall Kate noticed a rough but vivid oil-sketch of a branch of
magnolias. She went up to it, attracted by its purity of colour. “I like
that,” she said.
Anne’s eyes deepened. “Do you? I did it.”
“You, dear? I didn’t know you painted.” Kate felt herself suddenly
blushing; the abyss of all she didn’t know about her daughter had
once more opened before her, and she just managed to murmur: “I
mean, not like this. It’s very broad—very sure. You must have
worked....”
The girl laughed, caught in the contagion of her mother’s
embarrassment. “Yes, I’ve worked hard—I care for it a great deal.”
Kate sighed and turned from the picture. The few words they had
exchanged—the technical phrases she had used—had called up a
time when the vocabulary of the studio was forever in her ears, and
she wanted, at that moment, to escape from it as quickly as she
could.
Against the opposite wall was a deep sofa, books and a reading-
lamp beside it. Kate paused. “That’s just where your crib used to
stand!” She turned to the fireplace with an unsteady laugh. “I can see
you by the hearth, in your little chair, with the fire shining through
your bush of hair, and your toys on the shelf in front of you. You
thought the sparks were red birds in a cage, and you used to try to
coax them through the fender with bits of sugar.”
“Oh, did I? You darling, to remember!” The girl put an arm about
Kate. It seemed to the mother, as the young warmth flowed through
her, that everything else had vanished, and that together they were
watching the little girl with the bush of hair coaxing the sparks
through the fender.

Anne had left her, and Mrs. Clephane, alone in her window, looked
down on the new Fifth Avenue. As it surged past, a huge lava-flow of
interlaced traffic, her tired bewildered eyes seemed to see the
buildings move with the vehicles, as a stationary train appears to
move to travellers on another line. She fancied that presently even
the little Washington Square Arch would trot by, heading the tide of
sky-scrapers from the lower reaches of the city.... Oppressed and
confused, she rejected the restless vision and called up in its place
the old Fifth Avenue, the Fifth Avenue still intact at her marriage, a
thoroughfare of monotonously ugly brown houses divided by a thin
trickle of horse-drawn carriages; and she saw her mother-in-law, in
just such a richly-curtained window, looking down, with dry mental
comments, on old Mrs. Chivers’s C-spring barouche and Mrs.
Beaufort’s new chestnut steppers, and knowing how long ago the
barouche had been imported from Paris, and how much had been
paid for the steppers—for Mrs. Clephane senior belonged to the
generation which still surveyed its world from an upper window, like
the Dutch ancestresses to whom the doings of the street were
reported by a little mirror.
The contrast was too great; Kate Clephane felt herself too much a
part of that earlier day. The overwhelming changes had all
happened, in a whirl, during the years of her absence; and
meanwhile she had been living in quiet backwaters, or in the steady
European capitals where renewals make so little mark on the
unyielding surface of the past. She turned back into the room,
seeking refuge in its familiar big-patterned chintz, the tufted lounge,
the woolly architecture of the carpet. It was thoughtful of Anne to
have left her.... They were both beginning to be oppressed again by
a sense of obstruction: the packed memories of their so different
pasts had jammed the passages between them. Anne had visibly felt
that, and with a light kiss slipped out. “She’s perfect,” her mother
thought, a little frightened....
She said to herself: “I’m dead tired—” put on a dressing-gown,
dismissed the hovering Aline, and lay down by the fire. Then, in the
silence, when the door had shut, she understood how excited she
was, and how impossible it would be to rest.
Her eyes wandered about the unchanged scene, and into the equally
familiar bedroom beyond—the “best spare-room” of old days. There
hung the same red-eyed Beatrice Cenci above the double bed. John
Clephane’s parents had travelled in the days when people still
brought home copies of the Old Masters; and a mixture of thrift and
filial piety had caused John Clephane to preserve their collection in
the obscurer corners of his house. Kate smiled at the presiding
genius selected to guard the slumbers of married visitors (as Ribera
monks and Caravaggio gamblers darkened the digestive processes
in the dining-room); she smiled, as she so often had—but now
without bitterness—at the naïve incongruities of that innocent and
inquisitorial past. Then her eye lit on the one novelty in the room: the
telephone at her elbow. Oh, to talk to some one—to talk to Fred
Landers, instantly! “There are too many things I don’t know ... I’m too
utterly in the dark,” she murmured. She rushed through the directory,
found his number, and assailed his parlour-maid with questions. But
Mr. Landers was not at home; the parlour-maid’s inflexion signified:
“At this hour?” and a glance at the clock showed Kate that the
endless day had barely reached mid-afternoon. Of course he would
not be at home. But the parlour-maid added: “He’s always at his
office till five.”
His office! Fred Landers had an office—had one still! Kate
remembered that two-and-twenty years ago, after lunching with
them, he used always to glance at his watch and say: “Time to get
back to the office.” And he was well-off—always had been. He
needn’t—needn’t! What on earth did he do there, she wondered?
What results, pecuniary or other, had he to show for his quarter-
century of “regular hours”? She remembered that his profession had
been legal—most of one’s men friends, in those remote days, were
lawyers. But she didn’t fancy he had ever appeared in court; people

You might also like