Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 32

Thread: Learn Hacking Project

  1. #11

    Talking THank you all

    Wanted to thank you all for your time.. I hope many contribute to this project.
    ------------EViLSEED
    Hackers are impervious. Resistant is futile.


  2. #12
    Member
    Join Date
    Oct 2001
    Posts
    88
    You seem like a helpful person and I kind of like that. I will post some VMS security README's/How-To's on your site in a few days.

  3. #13
    Senior Member
    Join Date
    Aug 2001
    Posts
    183

    Talking

    I think this sounds like an excellent project, so I'll contribute what I can....
    “People don’t talk about anything.” [Clarisse]
    “Oh, they must!” [Guy]
    “No, not anything. They name a lot of cars or clothes or swimming pools mostly and say how swell! But they all say the same things and nobody says anything different from anyone else. And most of the time in the cafes they have the joke-boxes on and the same jokes most of the time, or the musical wall lit and all the colored patterns running up and down, but it’s only color and all abstract. And at the museums, have you ever been? All abstract. That\'s all there is now...\"
    -A conversation with Clarrise McClellan and Guy Montag from Fahrenheit 451

  4. #14

    Arrow Neophyte Tutorial

    Thats great.. thank you.
    ------------EViLSEED
    Hackers are impervious. Resistant is futile.


  5. #15
    IT Specialist Ghost_25inf's Avatar
    Join Date
    Sep 2001
    Location
    Michigan
    Posts
    648
    Sounds good but do you have a real set plan or are you just going to have a but of posts? Maybe you should set it up like I set up my folders start off with a main page with this on it

    hacking with
    windows
    Linux
    unix
    other OS

    then in that do something like this

    Steps to becoming a Hacker.

    Footprinting.
    Scanning
    Enumeration
    Gaining Access
    Escalating Privilege
    Pilfering
    Covering tracks
    Creating BackDoors
    ( DoS ) Denial of Service

    all those can be seperate links to the pages that corrispond to what they need to learn. It would turn out to be an awsome site if you have the know how to build it.

    I got a server I dont use by Net Ware but it needs More Skuzzy Drives before I get it up and running. I was going to use it for my learning needs. cant believe that my company I work for was going to throw it away just because they got all new ones from dell. It was like giveing me free money? How much do you think I could get for it? Anyways Ill check out your site and add a couple of things and some good sites to get the tools from Like where to get L0phtcrack 3 with the reg. codes... talk to you later and kick me up some points while your at it Ive been away for awhile now.

  6. #16
    Originally posted by Ghost_25inf
    Sounds good but do you have a real set plan or are you just going to have a but of posts? Maybe you should set it up like I set up my folders start off with a main page with this on it

    hacking with
    windows
    Linux
    unix
    other OS

    then in that do something like this

    Steps to becoming a Hacker.

    Footprinting.
    Scanning
    Enumeration
    Gaining Access
    Escalating Privilege
    Pilfering
    Covering tracks
    Creating BackDoors
    ( DoS ) Denial of Service

    all those can be seperate links to the pages that corrispond to what they need to learn. It would turn out to be an awsome site if you have the know how to build it.

    I got a server I dont use by Net Ware but it needs More Skuzzy Drives before I get it up and running. I was going to use it for my learning needs. cant believe that my company I work for was going to throw it away just because they got all new ones from dell. It was like giveing me free money? How much do you think I could get for it? Anyways Ill check out your site and add a couple of things and some good sites to get the tools from Like where to get L0phtcrack 3 with the reg. codes... talk to you later and kick me up some points while your at it Ive been away for awhile now.
    Yes.. Awesome Idea!

    I am working on that exact thing.

    Its contributions like yours that really helps me on this project.. thank you! I hope to see you post info into the project too!
    ------------EViLSEED
    Hackers are impervious. Resistant is futile.


  7. #17
    Banned
    Join Date
    Sep 2001
    Posts
    852

    well if every one is self prasing sites

    www.area-6.net
    pretty good challenges
    just a thought c how far u get lol

  8. #18

    Post Inter-Process Communication (IPC$)

    Inter-Process Communication (IPC)

    By Remote_Access_
    This will explain the "uses" of IPC for hackers. Inter-Process Communication is used for data sharing between applications and computers. We will be looking at Windows NT default IPC$ share use for communication between computers. This share is what we use to start to gain access to the server. What we will look at before we start is the NET commands for the console in NT. (Note I was unable to create a null connection using a 95/98 computer I had to use an NT computer) The net commands that we will be using are net use and net view. Now get in to the console (fake ms-dos) in windows. Pick out your target and make sure that it is an NT system and it has port 139 open. You need port 139 open so that net-bios is on. After checking for that you go to the console and type:

    Example 1> C:\>NET USE \\TARGET\IPC$ * /USER:
    Example 2> C:\>NET USE \\TARGET\IPC$ * /USER:""
    Example 3> C:\>NET USE \\TARGET\IPC$ "" /USER:""
    (Note: For some reason the command varies a little bit from NT to NT)
    (Note: TARGET is the name or IP of the computer, ex. \\211.3.4.11\ipc$ * /user
    (Note: If it works youll get> The command completed successfully.)
    (Note: To check the connection type NET USE \\TARGET\IPC$ )

    After starting a null connection you could try to access the hidden shares. The default hidden shares are: C$, PRINT$, ADMIN$, IPC$. As you can probably tell shares are hidden by putting a $ at the end of the share name. Sometime shares don't have passwords so you can use them. When you create a null connection you have the least possible rights. Next you could try using net view. To do this open the console and type:

    Example:
    C:\>net view \\TARGET (Shares)
    Or
    C:\>net view /workgroup:TARGETWG (Computers in workgroup)
    Or
    C:\>net view /domain:TARGETD (Computers in domain)

    (Note: change TARGETWG to the name of the workgroup to see all of the computers connected)
    (Note: change TARGET to the IP or name of the computer to see all none hidden shares)
    (Note: change TARGETD to domain name example: /domain: Bob.com )
    If you can't find an open share you could use a program that I like a lot called winfo. Winfo will get all of the user names from the target. Or another programs that is Nat(NetBIOS Auditing Tool). Nat will try names and passwords (dictionary attack) to get the right one. Another well like program is sid2user and user2sid.
    Last but not least there are DoS attacks that could be preformed. Dos attacks become outdated quickly but new ones are always poping up. A good Dos attack that works on NT systems with printer capibiltes. It kinda goes like this (null connection is needed): \\target\pipe\spoolss. Do this alot. The next one is one that im not sure that works but you fill all the connections possible on: \\target\pipe\samr. For that I would recomend use a program like ubend.exe.

    Hope this helps with your project.
    latr,
    Remote_Access_


    p.s. please leave nick when adding Antipoints, positive or negative, thanks

  9. #19

    Arrow

    I have been in contact with a few good hackers and a few newbies.. I posted this announcement:
    Click here to see announcement
    ------------EViLSEED
    Hackers are impervious. Resistant is futile.


  10. #20
    People who are interested in joining the hackers group pls leave an e-mail to info@infodelia.net

    thank you!
    ------------EViLSEED
    Hackers are impervious. Resistant is futile.


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •