Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Mac Address
  • IP Address
  • How to know you IP address and Mac Address
  • on windows
  • on Linux
  • Using a Web Browser
  • Networks Ports
  1. Network Basics

Key Words

Mac Address

A MAC address, short for Media Access Control address, is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It consists of six pairs of hexadecimal numbers, separated by colons or hyphens. MAC addresses are used at the data link layer of the OSI model to uniquely identify devices within a local network. Unlike IP addresses, MAC addresses are assigned to the physical hardware and remain constant, making them useful for tasks such as network management, device tracking, and security.

IP Address

An IP address, short for Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves two main functions: identifying the host or network interface and providing the location of the device in the network. IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) and play a crucial role in enabling communication and data exchange across the internet.

How to know you IP address and Mac Address

on windows

you can simple write ipconfig on CMD

ipconfig 

on Linux

to show Network interfaces

ifconfig

to show IP addresses

ip addr

Using a Web Browser

Networks Ports

Network ports are specific numbers used to identify different services or applications running on a device within a network. They facilitate the communication and exchange of data between devices by assigning unique port numbers to each service or application. Here are some common network ports and their associated services:

  1. Port 80 (HTTP): Used for standard web browsing and accessing websites.

  2. Port 443 (HTTPS): Used for secure web browsing with SSL/TLS encryption.

  3. Port 22 (SSH): Used for secure remote access to servers.

  4. Port 21 (FTP): Used for file transfer between computers.

  5. Port 25 (SMTP): Used for sending email messages.

  6. Port 110 (POP3): Used for receiving email messages.

  7. Port 143 (IMAP): Used for accessing email messages on a server.

  8. Port 53 (DNS): Used for domain name resolution.

  9. Port 3389 (RDP): Used for remote desktop access.

  10. Port 1194 (OpenVPN): Used for secure VPN connections.

PreviousWhat is the internet ?NextNetwork devices

Last updated 1 year ago

These are just a few examples of commonly used network ports. There are many other ports assigned for various services and applications. Understanding network ports is important for configuring firewalls, routing traffic, and ensuring proper communication between devices in a network.

LogoIP Tracker & Tracer ⇒ Find, Track, Trace IP Address Location
What Is My IP Address? IP Address Tools and MoreWhatIsMyIPAddress
LogoWhat Is My IP?WhatIsMyIP.com®
LogoWhat is my IP address location? Find out hereNordVPN
LogoCheck your IP address | MyIP.com