Exploit -- A noun that refers to a program that demonstrates or takes advantage of a software security hole. Writing an exploit is the best way to technically describe a security hole while simultaneously demonstrating it. That's why "White Hat" hackers (hackers who use their skills to help companies discover security problems) often write exploits.
Root -- As a noun, refers to cyberomnipotence, the highest level of access on a computer. Can also be used as a verb. "To root a box" means to obtain root through unconventional means, at which point the system has been "rooted."
Haxored -- A cool underground term for hacking. "I haxored that box."
Trojan -- Shorthand for "Trojan horse," a method of cracking a system by slipping it a seemingly harmless and beneficial program that secretly contains programming that gives an attacker unauthorized access. Common off-the-shelf Trojans include Back Orifice 2000, and Sub-7, recently spotted masquerading as a free Internet adult film -- beware of Greeks bearing porn.
Eleet -- Means "elite," but generally used with sarcastic or self-deprecating humor and spelled out with numerals, not roman letters: 31337. "I hax0red this box with 31337 skillz," might mean, "This was too easy."
Rootkit -- A generic term for a suite of programs that gives a hacker fun things to do after rooting a box. Might include programs for covering your tracks, or for "sniffing" a company's network for interesting traffic.
Zero day -- A security hole that's been discovered by the underground, but not yet by the computer security community.
Docs -- A person's identifying information, like name, email address, social security number, etc. "I rooted his box and downloaded his docs."
Script kiddie -- Someone who uses exploits to penetrate unsecured boxes, deface websites, and generally make trouble, without having the skills to write such a program themselves. Usually a juvenile.
Packet monkey -- A script kiddie who floods computers and websites with data packets, to maliciously take them offline. The distributed denial of service attacks that sometimes afflict popular e-commerce websites are performed by packet monkeys
----------------------------
The very first thing you need to do is get a copy of PKZIP or some other file unzipping utility. Nearly everything that you download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip". Then you need to get yourself a good prefix scanner.(also known as a War Dialer) This is a program that automatically dials phone numbers beginning with the three numbers (prefix) that you specify. It checks to see if the number dialed has a carrier.(series of beeps that tells you that you have dialed a computer) Try and find a large business area prefix to scan. It is these businesses that have interesting computers. There are many good scanners out there, but I would recommend Autoscan or A-Dial. These are very easy to use and get the job done quickly and efficiently.
-----------------------------
Another way is through Telenet or some other large network. Telenet is a very large network that has many other networks and remote computers connected to it.
Command
- Function
c
stat
full
half
telemail
mail
set
cont
d
hangup
ccess
- connect to a hose
- shows network port
- network echo
- terminal echo
- mail. (need ID and password)
- Mail. (need ID and password)
- select PAD parameter
- continue
- disconnect
- hangs up.
- Telenet account. (ID and password)
"Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans." Virus: "A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore." Worm: "Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."
Red Box generates tones for free phone calls
Black Box when called, caller pays nothing
Beige Box lineman's handset
Green Box generates coin return tones
Cheese Box turns your phone into a payphone
Acrylic Box steal 3-way calling and other services
Aqua Box stops F.B.I. lock-in-trace
Blast Box phone microphone amplifier
Blotto Box shorts out all phones in your area
Blue Box generates 2600hz tone
Brown Box creates party line
Bud Box tap neighbors phone
Chatreuse Box use electricity from
Chrome Box manipulates traffic signals
Clear Box free calls
Color Box phone conversation
Copper Box causes crosstalk interference
Crimson Box hold button
Dark Box re-route calls
Dayglo Box connect to neighbors phone line
Divertor Box re-route calls
DLOC Box create party line
Gold Box dialout router
Infinity Box remote activated phone
Jack Box touch-tone key pad
Light Box in-use light
Lunch Box AM transmitter
Magenta Box connect remote phone line to another Mauve Box phone tap without cutting into the line Neon Box external microphone Noise Box creates line noise Olive Box external ringer Party Box creates party line Pearl Box tone generator Pink Box creates party line Purple Box hold button Rainbow Box kill trace Razz Box tap neighbors phone Rock Box add music to phone line Scarlet Box causes interference Silver Box create DTMF tones for A,B,C, and D Static Box raises voltage on phone line Switch Box add services Tan Box phone conversation recorder TV Cable Box see sound waves on TV Urine Box create disturbance on phone headset Violet Box stop payphone from hanging up White Box DTMF key pad Yellow Box add line extension
Ports for Trojans UseFul
9 UDP Chargen
21 TCP Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash
23 TCP Tiny Telnet Server
25 TCP Antigen, Email Password Sender, Haebu Coceda, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy
31 TCP Agent 31, Hackers Paradise, Masters Paradise
41 TCP DeepThroat
53 TCP DNS
58 TCP DMSetup
79 TCP Firehotcker
80 TCP Executor
110 TCP ProMail trojan
121 TCP JammerKillah
129 TCP Password Generator Protocol
137 TCP Netbios name (DoS attacks)
138 TCP Netbios datagram (DoS attacks)
139 TCP Netbios session (DoS attacks)
421 TCP TCP Wrappers
456 TCP Hackers Paradise
531 TCP Rasmin
555 TCP Ini-Killer, Phase Zero, Stealth Spy
666 TCP Attack FTP, Satanz Backdoor
911 TCP Dark Shadow
999 TCP DeepThroat
1001 TCP Silencer, WebEx
1011 TCP Doly Trojan
1012 TCP Doly Trojan
1024 TCP NetSpy
1027 TCP ICQ
1029 TCP ICQ
1032 TCP ICQ
1045 TCP Rasmin
1080 TCP Used to detect Wingate sniffers.
1090 TCP Xtreme
1170 TCP Psyber Stream Server, Voice
1234 TCP Ultors Trojan
1243 TCP BackDoor-G, SubSeven
1245 TCP VooDoo Doll
1349 UDP BO DLL
1492 TCP FTP99CMP
1600 TCP Shivka-Burka
1807 TCP SpySender
1981 TCP Shockrave
1999 TCP BackDoor
2001 TCP Trojan Cow
2023 TCP Ripper
2115 TCP Bugs
2140 TCP Deep Throat, The Invasor
2565 TCP Striker
2583 TCP WinCrash
2801 TCP Phineas Phucker
2989 UDP Rat
3024 TCP WinCrash
3129 TCP Masters Paradise
3150 TCP Deep Throat, The Invasor
3700 TCP al of Doom
4092 TCP WinCrash
4567 TCP File Nail
4590 TCP ICQTrojan
5000 TCP Bubbel, Back Door Setup, Sockets de Troie
5001 TCP Back Door Setup, Sockets de Troie
5321 TCP Firehotcker
5400 TCP Blade Runner
5401 TCP Blade Runner
5402 TCP Blade Runner
5555 TCP ServeMe
5556 TCP BO Facil
5557 TCP BO Facil
5569 TCP Robo-Hack
5742 TCP WinCrash
6400 TCP The Thing
6670 TCP DeepThroat
6771 TCP DeepThroat
6776 TCP BackDoor-G, SubSeven
6939 TCP Indoctrination
6969 TCP GateCrasher, Priority
7000 TCP Remote Grab
7300 TCP NetMonitor
7301 TCP NetMonitor
7306 TCP NetMonitor
7307 TCP NetMonitor
7308 TCP NetMonitor
7789 TCP Back Door Setup, ICKiller
9872 TCP al of Doom
9873 TCP al of Doom
9874 TCP al of Doom
9875 TCP al of Doom
9989 TCP iNi-Killer
10067 TCP al of Doom
10167 TCP al of Doom
10520 TCP Acid Shivers
10607 TCP Coma
11000 TCP Senna Spy
11223 TCP Progenic trojan
12076 TCP GJamer
12223 TCP Hack´99 KeyLogger
12345 TCP GabanBus, NetBus, Pie Bill Gates, X-bill
12346 TCP GabanBus, NetBus, X-bill
12361 TCP Whack-a-mole
12362 TCP Whack-a-mole
12631 TCP WhackJob
13000 TCP Senna Spy
16969 TCP Priority
20000 TCP Millennium
20001 TCP Millennium
20034 TCP NetBus 2 Pro
21544 TCP GirlFriend
22222 TCP Prosiak
23456 TCP Evil FTP, Ugly FTP
26274 UDP Delta Source
29891 UDP The Unexplained
30029 TCP AOL Trojan
30100 TCP NetSphere
30101 TCP NetSphere
30102 TCP NetSphere
30303 TCP Sockets de Troie
31337 TCP Baron Night, BO client, BO2, Bo Facil
31337 UDP BackFire, Back Orifice, DeepBO
31338 TCP NetSpy DK
31338 UDP Back Orifice, DeepBO
31339 TCP NetSpy DK
31666 TCP BOWhack
31789 TCP Hack'A'Tack
33333 TCP Prosiak
34324 TCP BigGluck, TN
40412 TCP The Spy
40421 TCP Agent 40421, Masters Paradise
40422 TCP Masters Paradise
40423 TCP Masters Paradise
40425 TCP Masters Paradise
40426 TCP Masters Paradise
47262 UDP Delta Source
50505 TCP Sockets de Troie
50766 TCP Fore
53001 TCP Remote Windows Shutdown
54321 TCP School Bus
60000 TCP Deep Throat
http://www.hacktech.org/hacking.html
http://www.hacktech.org/hacklib/starthak.txt
http://www.blackcode.com/directory/index.php?cat=14
Saturday, April 25, 2009
Subscribe to:
Post Comments (Atom)
Posting Free Download
- Ansav Antivirus
- BitDefender Anti Virus
- Download MySQL Front
- Driver Toshiba-Asia Support
- DVD Repositori openSUSE 11.0
- Embellish Text Photoshop
- Free Ajax Tutorial
- FREE antivirus software - avast! Home Edition
- Free Download Antivirus PCMAV 2.0a
- Free Ebook J2SE
- Free Ebook Linux
- Free Mysql Download Manual
- Free Tutorial C#
- Free version AVG Anti-Virus
- Free Wallpaper 3D and Picture
- Free Wallpaper Car Ferrari
- Free Wallpaper Dragonball Z
- Free Wallpaper inuyasha 1 800
- Free Wallpaper Linux
- Free Wallpaper Mac
- Free Wallpaper Windows
- Free Wallpaper Windows Vista
- Hacking Tutorial
- Java AWT Reference In PDF Format
- Kernel Linux v 2.6.x
- Linux Dasar dari Onno W. Purbo
- Master FreeBSD 7.0
- Master Linux Slackware-12.2
- Master Linux Ubuntu 8.10
- Master OpenOffice 3.0.1
- Master OpenSUSE 11.1
- Master Vektor Linux 5.9
- MySQL Presentations File PDF
- MySql Tutorial in Windows
- New WordPress Themes Template
- Open Source for Windows part 1
- Open Source for Windows part 2
- PC Tools AntiVirus™ 6 for Windows®
- php Tutorial
- Shop Admin Tutorial Carding
- Triggers and Stored Procedures
- Tutorial complete of php injection for BEGINNING
- Tutorial dari Onno W. Purbo
- Tutorial e-commerce dari Onno W. Purbo
- Tutorial Education dari Onno W. Purbo
- Tutorial Internate Cafe dari Onno W. Purbo
- Tutorial Java CSLib and Master Program
- Tutorial Media dari Onno W. Purbo
- Tutorial Microelectronics dari Onno W. Purbo
- Tutorial MySQL 5 Trigger Before Insert
- Tutorial Network Security dari Onno W. Purbo
- Tutorial Networking dari Onno W. Purbo
- Tutorial Physical dari Onno W. Purbo
- Tutorial RDMS MySQL
- Tutorial Voip dari Onno W. Purbo
- Tutorial Wireless dari Onno W. Purbo
- Video tutorial Hacking
- Wordpress Themes Templates
INDOCOM SPONSOR TO FIND A HOTEL
Categories Download
- Networking (18)
- Driver (11)
- MySQL (9)
- Tutorial Linux (9)
- Tutorial Education (8)
- Wallpaper (8)
- Free Mp3 (7)
- Hacking (7)
- Antivirus (6)
- ISO Linux (6)
- software for windows (6)
- Software in Linux (5)
- E-Book (4)
- Tutorial php (4)
- Java (3)
- Template (3)
- Ajax (2)
- Contoh Proposal (2)
- Oracle (2)
- e-commerce (2)
- lain-lain (2)
- Beasiswa (1)
- Blog (1)
- C# (1)
- Driver Toshiba (1)
- Info Lomba (1)
- Photoshop Cs (1)
- Tutorial Voip (1)
- Tutorial Wireless (1)
- VB (1)
No comments:
Post a Comment