Binary code
Binary Code and How it Works Translating IP Addresses
This guide will try to explain the conversion of IP addresses into binary code. Binary code is an essential element in a computer to understand at the basic level different inputs, one example being programming languages. Programming languages are converted into basic 1s and 0s for the computer to understand and implement those languages into a program. Everything in your computer ultimately gets translated into binary code for the computer to understand and process information.
This holds true for ipv4 addresses in which an address like 128.64.32.1 would translate into 10000000.01000000.00100000.00000001, in which every 00000000 starting with the first 0 from the right equals 1 then the second 2 then the third 4, 8, 16 and so forth as they multiple by the number or power of 2. This means the first 0 is 1, the second 0 is 2, the third 0 is 4, the fourth 0 is 8, the fifth 0 is 16, the sixth 0 is 32, the seventh 0 is 64, and the eighth 0 128. If we look at a number like 128 we would see that the eight zero applies and it becomes a 1 while the other zeros stay zero because there is no left over number and 128 goes into 128 exactly. If there had been a left over number like 12 then the eighth zero would still be a 1 and all 0s except the fourth zero that would have subtracted 8 from 12 and that zero would have been a 1 and 4 which would have been the left over of the subtracting and the 0 would have been a 1 as well being 100001100 The above example is a basic example of this translation of numbers into binary code in an ipv4 setting.
Binary Exploitation
Binary exploitation according to an article in Medium which will be linked here explains that binary exploitation is the act of manipulating the fact that the computer can only understand 1 (positive) and 0 (negative) and use vulnerabilities to exploit the weaknesses of said language (machine language). One of them being buffer overflow attacks. These attacks are an exploit that is taking advantage of an application that is waiting for the user's input. This involves overwriting the memory of that application. This happens when programming languages are not monitoring the limitation of memory. As the article suggests this happens in C++ and C languages. Consult the article for further explanation and sample codes of C that cause this.
Second, the article talks about segmentation faults. Segmentation fault occurs when a program tries to access memory that is not allowed. The article goes further on to explain how to do this with python.
Recommended by LinkedIn
The article further expands on shellcode with BufferOverflow. This method allows for code to be injected and be able to access the command shell which a hacker can take control of the system. They are using machine code (again which uses binaries) to instruct to inject code into an application. Here is the article and I would suggest to take a look if you want to know how these types of hacks are done.
Summary
If your IP is somehow able to be connected to other computers of hackers, in theory they would be able to perform DDoS (distributed denial-of-service) and your network would be overflowed with request to either connect or pass along internet traffic to your computer that the memory would overflow and either you would have slow internet speeds or get an error on your computer. This is due to the memory having run out because the binary code has been produced to your computer to understand in large quantities therefore produce an error or even freeze your computer. Of course a simple fix for this is to disconnect from the internet. This is all theoretical because most DDoS have been committed exclusively to websites.