Page 1 of 4 123 ... LastLast
Results 1 to 10 of 37

Thread: The Compromise

  1. #1

    The Compromise

    When you find a system scan it and the basic stuff to find holes. How do you access it I mean like get the dos console shell or like explore directories?

  2. #2
    Senior Member cwk9's Avatar
    Join Date
    Feb 2002
    Posts
    1,207
    Now you wouldn’t happen to be asking how to hack would you? Because that tends to earn a lot of negative anipoints.
    Its not software piracy. I’m just making multiple off site backups.

  3. #3
    no im writeing a report on the process of the hack and how vunerable sytems are

  4. #4
    My report is about how systems are compramised and im stuck on the part where the hacker access the system.

  5. #5
    Member
    Join Date
    Nov 2001
    Posts
    65
    Hahahaha, nice report, but you better go and ask somewhere else, we don't like those reports here.
    Todo lo que no me mata me hace mas fuerte...

  6. #6
    Look you people im not a hacker or anything all im trying to do is learn how hackers hack into systems so I can be a better Internet Security Specialist when I graduate. And I dont appricate being accused of being a hacker!

  7. #7
    Senior Member
    Join Date
    Oct 2001
    Posts
    638
    When you find a system scan it and the basic stuff to find holes. How do you access it I mean like get the dos console shell or like explore directories?
    Ok, because you didn't ask "how can I hack into hotmail" I'm going to be nice . Networking security is a very broad and complex area. So this question is a little beyond the scope of a single thread. There have been thousands of books and articles (www.google.com) written on this subject. So I suggest you go do some research first.

    If you really are just writing a report, we're not the sort of people to do your homework for you. If I come across as condescending or beligerant, I apologise. It's just that at AO we get these sorts of questions every day from people who obviously have less than honourable intentions.

    Some good hard sources that detail practical intrusion techniques and defenses include:

    Hacking Exposed 3/e, ISBN: 0072193816 by Stuart McClure, Joel Scambray, George Kurtz
    Real World Linux Security, ISBN: 0130281875 by Bob Toxen

    We'd love to see the end result of this report when you're done .
    OpenBSD - The proactively secure operating system.

  8. #8
    Im not a Stupid neophyte or anything i know all about how sniffers work and how internet protocols work. I have Hacking Exposed 3/e Hackers Challenge Hack Attacks revealed and like 20 other internet security books ive been looking for this info for ever and i cant find out how to remotely excute a command shell.

  9. #9
    Hi mom!
    Join Date
    Aug 2001
    Posts
    1,103
    So, hmm... smirc... how do I hack hotmail?
    I wish to express my gratitude to the people of Italy. Thank you for inventing pizza.

  10. #10
    Senior Member
    Join Date
    Oct 2001
    Posts
    638
    I have Hacking Exposed 3/e Hackers Challenge Hack Attacks revealed and like 20 other internet security books ive been looking for this info for ever and i cant find out how to remotely excute a command shell.
    Why do you think that these books are reluntant to simple supply the exact methodology needed to get a remote shell? They're not just going to hand it out to kids on a platter. You really want to do some research on buffer overflows.

    So, hmm... smirc... how do I hack hotmail?
    Don't make me come over there . Hehe.
    OpenBSD - The proactively secure operating system.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •