-
December 31st, 2002, 08:02 AM
#21
Junior Member
Yes that makes sense! Well maybe thats my problem...I'll have a look for a server I know works and I shall try it. Thanks alot
-
December 31st, 2002, 03:31 PM
#22
Junior Member
Places to Telnet
Here is one place for you to telnet to on port 23: tcfreenet.org . It only lets you use a limited version of Lynx as a guest, but I do not know what it would let you do as a registered user.
-
December 31st, 2002, 11:09 PM
#23
Junior Member
What program you using to find out if some ones viewing ur ports?
Please could you tell me. Thankyou
Plus some Information for you:
------------------------------------------------------------------------------------------------------------------------
In news group alt.hacking, you wrote...
>
> the main thing i want to learn is to get into some ones pc just by
> knowing their IP. So all this is just to ask I'm ready to start learing
> hacking were do i go.................
Port 139. NetBIOS Session (TCP), Windows File and Printer Sharing
This is the single most dangerous port on the Internet. All "File and
Printer Sharing" on a Windows machine runs over this port. About 10% of
all users on the Internet leave their hard disks exposed on this port.
This is the first port hackers want to connect to, and the port that
firewalls block.
http://www.iss.net/security_center/a...39/default.htm
Very simple. Search the net for info on how to exploit this port. It's
out there. Commands can be given in an msdos window. Good luck finding a
machine with filesharing turned on.
A tool to help you:
http://www.webattack.com/get/superscan.shtml
-Neb.
------------------------------------------------------------------------------------------------------------------------
-
January 1st, 2003, 06:03 AM
#24
Junior Member
I am running Zone alarm pro 3.5 and a program called Genius 3.1
I'm downloading that program u susgested, thanks a lot I read the blerb (sp) and it sounds really good!
Is it what hackers use to connect to peoples computers? 'cause then I will find more about it and see what I can do to prevent it happening to me.
Thanks again!
-
January 1st, 2003, 08:05 AM
#25
What really gets me mad is that there are these sites set up that talk about port scanners and they say stuff like "Port scanners are the number one tool in the script kiddies arsenal" , I mean these ignorant people never heard of testing out your own systems security and seeing if your system is vulnerable !? wtf , they need to stop stereo-typing.
"Serenity is not the absence of conflict, but the ability to cope with it."
-
January 1st, 2003, 11:24 AM
#26
Well, I don't know whether I would call it stereotyping. It's just that it's a double-edged sword. On the one hand, you can discover vulnerabilities before attackers have the chance to get to them. And on the other, the attacker could easily discover that you have something crazy like anonymous FTP running on an internet-exposed machine or something else that could open you up to becoming a zombie for the attacker. I think they are probably right in saying that it is the attackers #1 tool. Of course, it all depends on how they come across. They could have said that all people that use port scanners are attackers, and maybe that's why the statement is rubbing you the wrong way. From that aspect, I can understand why you would be a little upset. You know they say that ignorance is a curse, or at least my High School Algebra teacher used to say that all the time.
Cheers,
t2k2
Opinions are like holes - everybody\'s got\'em.
Smile
-
January 1st, 2003, 05:37 PM
#27
Well, first about ports: as have been stated before, there´s a comprehensive list o well-known ports and protocols related to them on IANA (Internet Assigned Numbers Authority).
But it doesn´t mean a program can´t listen on another port, which would be useful to be able to work through some firewalls. A Trojan may use a ftp port, for instance. (21). If you have access to a *nix like so, you may know the inetd. It controls a lot of servers, and reading the lines of inetd.conf (its configuration file) you may where are the programs running on each port (or that may run, since most are commented). Having a look at the line about systat, you may notice this command line : ps auxx . Try this on you machine and you will know how systat works. At least one implementation..
Ah, a nice substitute for telnet as a general "connect-on-everything" is netcat. I think it is way better than any telnet client for several situations. Well, one problem is that it doesn't filter ansi color code, so its awful for playing MUD.. . But its features are pretty nice .
And you may want to know about ssh, and use it instead of telnet when you want access to another computer, since it offers you encryption of data. Passwords are easily captured in a telnet session, for they travel in plain text. hmm and emails are usually sent "naked" .. another thing to worry? Probably.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|