Results 1 to 7 of 7

Thread: How hacker could own a system

  1. #1

    Question How hacker could own a system

    hi! i usually wonder how hacker can break in one's system, than through this site i got limited knowledge like they use an open port for this purpose. But can they break in using any open port without a trojan's help like sub7? 2nd question is i know using of zonealarm can block the open ports but still some ports like http (i can't remeber its number), yahoo's or msn messenger ports, one have to open these ports in ordor to connect thier server. Question is is there any possibility that a hacker can break in your system using these open ports, if yes than HOW? hope for some good response.
    Note;- I want to learn procedure of this security issue, not prevention method.

  2. #2
    Senior Member
    Join Date
    Jun 2003
    Posts
    122
    First off I'm no security guru and I'm sure not a Kevin Mitnick. My understanding is that its not so much the open ports you have to worry about, its the services/daemons running on those ports. Like open C shares for example, leaving those open with default or simply guessed passes is just asking for trouble. Now sub7/backorfice if I remember correctly has to be run by the user, mainly hidden with something like porn.mpg.vri or something of that nature, I could be wrong again I'm still new with this stuff. People could break threw your icq or msn I would think. I'm not even going to touch on how, but a simple a search on google for something like "hacking icq" gives lots of links. For more info check out google or wait for someone who knows more then me. Hope this helps some, enjoy.
    The internet, not just for stalkers and pervs, but for computer geeks too!

  3. #3
    Senior Member
    Join Date
    Mar 2002
    Posts
    442
    If you want to learn how to be a hacker than this thread is perfect for you. It teaches you the procedure.

    *This site is dedicated to the prevention methods, not the procedure methods.*

  4. #4
    Deceased x acidreign x's Avatar
    Join Date
    Jul 2002
    Posts
    455
    lol... thats like asking how someone could open a door, It can be as simple as turning a knob, or as difficult as c4 on a solid steel vault, it all depends on the security methods that are used to protect the door and the hacker's experience. If you want to know how to hack, you have to learn, not be taught, you don't learn to speak english by someone teaching you, someone could give you a 14 hour speech on speaking english you still would not understand a word, you can be given information, but unless you actually play around with your own systems and learn things on your own, you'll never stand a chance at understanding any advice you'd be given here.
    :q :q! :wq :w :w! :wq! :quit :quit! :help help helpquit quit quithelp :quitplease :quitnow :leave :**** ^X^C ^C ^D ^Z ^Q QUITDAMMIT ^[:wq GCS,M);d@;p;c++;l++;u ++ ;e+ ;m++(---) ;s+/+ ;n- ;h* ;f+(--) ;!g ;w+(-) ;t- ;r+(-) ;y+(**)

  5. #5
    Senior Member
    Join Date
    Jun 2003
    Posts
    119
    lol... thats like asking how someone could open a door, It can be as simple as turning a knob, or as difficult as c4 on a solid steel vault, it all depends on the security methods that are used to protect the door and the hacker's experience. If you want to know how to hack, you have to learn, not be taught, you don't learn to speak english by someone teaching you, someone could give you a 14 hour speech on speaking english you still would not understand a word, you can be given information, but unless you actually play around with your own systems and learn things on your own, you'll never stand a chance at understanding any advice you'd be given here.
    I was going to say the same thing.

    You really know how to put words in effect. It's good you told him that. The way you talk reminds me of "The Matrix", it makes you think. THis is one step that should be on every hackers check list.

    1-Learn and know how to think!

    Cheers
    [glowpurple]The inside secrets of big buisness are being leaked onto the Net - (who\'s fault is that ) - Me[/glowpurple] http://www.AntiOnline.com/sig.php?imageid=419

  6. #6
    Senior Member
    Join Date
    Sep 2001
    Posts
    1,027
    Come on people, this is a reasonable question... The OP is basically asking what are the principal entry points for hackers. He's not even asking how a hacker would exploit them.
    Let's try being a little less paranoid and share a little more knowledge. Being told that a sentence is formed with a subject a verb and complement IS something that CAN be taught and that you can't pickup on your own...

    (It's late and I'm really tired right now, but if noone as replied by tomorrow I'll try to come back and answer...)


    Ammo
    Credit travels up, blame travels down -- The Boss

  7. #7
    1: The use of a trojan like sub7 requires for the attacker to either allready have some sort of access to your system or to some social engineering to trick you into executing a file you should not have. Leaving a trojan on a system is performed to have easier access to a system instead of using an exploit time and time again which brings me to the second question.

    2: Open ports form a security issue but are neccesary in some occasions.
    Say you want to run a webserver. If you want this webserver to be visible to the outside world (the internet) you usually have to set firewall rules to allow incoming connections on the specified port (usually port 80 for webservers).
    Now if you run for example IIS on your machine a misschief will search the net for some known exploit and perform this on your machine. To perform a certain exploit on your machine time and time again will not be what the attacker wants so he leaves a backdoor.

    Sidenote: Subseven is lame as it will be detected by every virus/anti trojan scanner on the market.
    Sidenote two: To prevent you need to make sure your box is patched and locked down up to date. You can subscribe to some security mailing list to keep up with newly discovered exploit/patches. Also monitor your logs for strange behaviour.

    I hope this brings you some insight.

    Cheers
    noODLe

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •