dcsimg
Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 37

Thread: computer hacking

  1. #11
    Senior Member
    Join Date
    Oct 2002
    Posts
    4,055
    Originally posted here by Cybr1d
    Do you have physical access to the computers? If you do, then there's no need to find a sygate vulnerability. Just try what Val told u, install a keylogger. If possible, try STARR's Proctor spyprogram which offers a wide array of spy techniques and offers a completely invisible install. (The user will almost-never become aware of the program, unless you screw up somewhere).

    I'd give Nessus and LanGuard a thought too.
    Whoa, you have physical access to their comp? Teh **** yeh! Keylogger, wait, then use their password and format c:/. LOL I'm so fuqqin' stupid. Cybr1d I'ma look into that Proctor spyprogram, sounds interesting!
    Space For Rent.. =]

  2. #12
    Flash M0nkey
    Join Date
    Sep 2001
    Posts
    3,447
    If possible, try STARR's Proctor spyprogram which offers a wide array of spy techniques and offers a completely invisible install. (The user will almost-never become aware of the program, unless you screw up somewhere).
    only problem with these types of programs is you ahve to be able to login to the PC with sufficent rights to install it - a hardware keylogger like i mentioned above just plugs in between the keyboard and the back of the PC - that way there is nothing needs installing - it just captures all traffic between the keyboard and the machine.

    v_Ln

  3. #13
    HeadShot Master N1nja Cybr1d's Avatar
    Join Date
    Jul 2003
    Location
    Boston, MA
    Posts
    1,840
    True Val ...after they get the physical keylogger and get inside....STARR might get them the xtra passwords perhaps for extra credit.

    I have a copy of the program, I'll put it up in the FTP site later on tonight...and send you a link where u can download it.

  4. #14
    Senior Member
    Join Date
    Oct 2002
    Posts
    4,055
    Uhm, I'm hoping for me to possibly d/l as well?
    Space For Rent.. =]

  5. #15
    HeadShot Master N1nja Cybr1d's Avatar
    Join Date
    Jul 2003
    Location
    Boston, MA
    Posts
    1,840
    Lol I was talking to you.

    , I have to apologize, Proctor is not its name, I actually was mixing two of them together. its iOpus STARR, which does what I mentioned before. Proctor is another one.

    Security Software Description:
    All-round, award-winning Computer and Internet Monitoring software tool with Network and email tool. It allows companies and individuals to track the use of PCs easily and invisibly. It logs screenshots, keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation, AOL and visited websites. With Network (LAN) and email support.
    Mine's a little out of date...but still does what it promises . Here's an Update:


    http://www.iopus.com/actmon/index.htm
    http://www.iopus.com/download.htm
    http://www.allthesoft.com/utility/se...r-pro-edition/

    System Requirements:

    Windows 98, ME, 2000, XP or Server 2003
    32MB RAM
    PC with 486 or higher processor
    10 MB hard disk space


    Talk about convenience ^





  6. #16
    Junior Member
    Join Date
    Apr 2004
    Posts
    7
    We may have physical access to the computers before the hacking day, ie, before they get their specific drives into the computers. We will not have physical access to them during the competition. We will try to put Keylogger on before that time.
    Thanks a lot for your suggestions, they help a lot!!!

  7. #17
    Junior Member
    Join Date
    Apr 2004
    Posts
    7
    Let me know when you put STARR on the FTF later so I can dowload it.
    No, we cannot run with the computer out of the room:))

  8. #18
    Banned
    Join Date
    May 2003
    Posts
    1,004
    If it were me, and I wanted to keep in the true spirit of the game (no tempest etc) I would install a "vulnerable" server, and utilize a smidge of social engineering to lure the other team into pulling a trojan from my system, perhaps one that looks like a web application protection scheme module or some other security relevant module that they would want try and leverage more access from.

    best of luck,

    catch

  9. #19
    Senior Member gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    Nmap is argueably the best scanner in the world, find a copy of that and give it a try. What other methods have you thought of to secure the machine? Be very alert with the other people, they may try a social engineering ploy to get something out of you, so don't talk to them about the project at ALL.

    Do a Google or Yahoo! Search for social engineering and learn a bit about that. some people may say it's not real hacking, or no talent, but when you get good, you know it is. I specialise in operating systems and social engineering. Those are my strong points.

    If you give me an OS and a computer to use it on I can usually have it figured out in a day, and then for the art of bullshitting, I am fairly good at that.

    I'm no Kevin Mitnick, but I can hold my own in bullshitting.

    Also, don't let anyone here tell you he is a lamer, he served his time for what he did and more, and has turned around, don't let people here tell you different. He is an awesome guy, and from what I understand very nice.

    He has taken enough **** from others, he doesn't need it here too.

    As for voulnerabilies, just look around online and see if you can find an exploits fo the software they use, and go from their.

    Also;

    I'd like to personally thank everyone in this thread for actually helping this dude. Any other time someone asks for help like this, it seems they get flamed and negged, which is bullshit. In My Linux + class I was asked to do a "Hack" so to speak.

    I am also in charge of security in my school network now.

    So I know now first hand, that teachers DO in fact ask sometimes for a hacking demo.

    So now, I reward you all, with a green pat on the back.

  10. #20
    Senior Member
    Join Date
    Feb 2004
    Posts
    197

    Talking

    I know away you can distroy there secutity get a trojan (rat) to delete the files you want to delete. first get a trojan with antivirus and firewall kill feature next send them the trojan server file binded with something then use trojan stealth tool (will work against antivirus detection). then change the icon of the file to look different send it to them (find out away to send it ).ounce they open the program their security will be disabled and their ip will be sent to you. use the ip to connect to the rat then delete lots of files and get out.

    i hope that this helped

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •