Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Mar 2002
Posts: 13
E
Ender Offline OP
Junior Member
OP Offline
Junior Member
E
Joined: Mar 2002
Posts: 13
Ok, I'm just trying to map this out to my knowledge so that people can give me advice on what to studie up on next.

So you use telnet to connect to whatever your trying to access. Try different ports until you find one you can access.
At this point i'm a little blurry.
Do you need a cracking program specific to the Hardware/software of the other comp.?
How can you tell what they are running? Etc.?
Also I've found different programs purported to "Hack" different email site (Hotmail, etc.) Now my question is not how, it's simply are there methods to do this that do not involve just entering password after password until you find the right one? ( with or without a program.)
I'm pretty much to the point at which I can find and connect but, now what?

Joined: Mar 2002
Posts: 109
T
Member
Offline
Member
T
Joined: Mar 2002
Posts: 109
Quote:
So you use telnet to connect to whatever your trying to access


I'm assuming you're on windows? Remember, telnet the protocol is NOT the same as the telnet that comes with windows that you're probably using to connect with.


Quote:
Try different ports until you find one you can access.


Or use a port scanner and save yourself some time smile It seems that you know what ports are, so you're off on semi-good footing. Do some research so that you know what protocols or programs are exploitable/ what give you information.

Quote:
do you need a cracking program specific to the Hardware/software of the other comp.

Sure, you can use a program that'll try and bruit force an ftp acount or something that tries different cgi exploits for you. Personally, I figure as long as you know how they work and what they're doing there's no reason to reinvent the wheel. However, it doesn't appear that you do know that, so learn first, act later.

Quote:
are there methods to do this that do not involve just entering password after password until you find the right one? ( with or without a program.)


If you know the person you can probably figure out their password reasonably well. However, I would strongly suggest that you DO NOT go that route ,be it using one of those alleged e-mail hacking programs or using SE (social engineering).

And now the dreaded overall answer....read.
some good sites: http://blacksun.box.sk/ http://www.securitywriters.org/ http://packetstormsecurity.org/

There are more, many more( a great list of sites you'll love is RRFN, learner posted a link to it somewhere.)


"There is no end. There is no beginning. There is only the infinite passion of life."
--Fellini
Joined: Mar 2002
Posts: 562
UGN Supporter
Offline
UGN Supporter
Joined: Mar 2002
Posts: 562
Quote:
Or use a port scanner and save yourself some time It seems that you know what ports are, so you're off on semi-good footing. Do some research so that you know what protocols or programs are exploitable/ what give you information.



You should know that unless you have a **** good stealth port scanner when you prot scan a network you are screaming you are about to hack them. There is realy no other reason to port scan someone.

Joined: Mar 2002
Posts: 109
T
Member
Offline
Member
T
Joined: Mar 2002
Posts: 109
Usually learner, true. However, at this point it seems that Ender is just starting to try and figure out how things work. Odds are he won't end up doing anything, merely checking out some banners and what some common ports are. If actually planning on hacking something then yes, be extremely carefull. But in this case I see no reason why not to explore and see what's out there.


"There is no end. There is no beginning. There is only the infinite passion of life."
--Fellini
Joined: Mar 2002
Posts: 562
UGN Supporter
Offline
UGN Supporter
Joined: Mar 2002
Posts: 562
I belive in letting them know before they go off on a wild tangent. Also might wana hide behind a proxy. Your ISP might not like you playing with hacking toys wink

Joined: Mar 2002
Posts: 13
E
Ender Offline OP
Junior Member
OP Offline
Junior Member
E
Joined: Mar 2002
Posts: 13
Thanx for the info guys.
Got me rolling on this thing.
Trust me, I'll have more questions later, but I've got alot of reading to do first.

Joined: Mar 2002
Posts: 1
R
Junior Member
Offline
Junior Member
R
Joined: Mar 2002
Posts: 1
Hi I am a newbie to hacking though I am not a newbie at all to computing. I currently have a list of open UDP and TCP ports on a computer and I was wondering how I can actually put a trojan on this computer? It does have tftp port 82 open so that may be useful. I am not very knowledgeable regarding Telnet commands so if I need to use Telnet to control a program using one of the ports please explain how if I am running XP Pro. Also are there any fully stealth port scanners? If you don't use a port scanner then would it not take hours searching for open ports manually? Also I have a few port scanners and none of them seem to have options for a proxy server so can someone recommend one that does or can you not use a proxy with a port scanner?

Thanks a lot for any help

Joined: Mar 2002
Posts: 1,273
DollarDNS Owner
Offline
DollarDNS Owner
Joined: Mar 2002
Posts: 1,273
hrm hrm, you seem to be a reasonable if clueless person. You'll learn what and how and what NOT and how NOT to ask a question after awhile.

Anywho, think of a port as a program. So their tftp port is open. Great - wonderful. It can be quite handy - but only if you know how to use it. Telnet commands... psh. There isn't any "Telnet Commands". All telnet does is allow you to communicate with a program on another computer directly and in the raw. This communication follows certain rules and guidelines so that you may understand each other and perform the desired tasks.

So how do you communicate with tFTP? Well, go learn how! How do you communicate with port 80 (webserver)? Well, go learn how! You see, we can't tell you how to hack. And really, nobody should be taught how to hack. Hacking should come natural after you know all about something. For instance, if you're a lock maker, you know how to pick locks! Nobody taught you how to pick locks, you didn't ever have to learn how. You just know! Cause you understand locks THAT well.

So now's the time to start learning how to communicate with various programs. Once you've learned how, you can start experimenting with ways to break into their security - or see the signs of weak security. When you read about exploits written by people who know a heck of a lot MORE than you do about some program - then you'll understand how to use it - cause you too is familiar.

So for now, don't worry about learning how to install a trojan on somebody's computer through a port. Instead, learn how to request a webpage from port 80 (HTTP), or learn how to download a file via 21 (FTP), or learn how to send an email with port 25 (SMTP)...

That's the knowledge that is important. Come back with that question after you've learned more protocols than I have. > laugh SMTP, POP3, DNS, SOCKS 5, HTTP, FTP, TELNET, IRC, IP, TCP, UDP, ICMP, WHOIS, FINGER, IDENT..... um, I think that's pretty much it.


Domain Registration, Hosting, Management
http://www.dollardns.net
Joined: Apr 2002
Posts: 730
UGN Supporter
Offline
UGN Supporter
Joined: Apr 2002
Posts: 730
I know Im a newbie.... i have alot of computer background but few hacking background. I have win2k and connect with 56k modem. But thats beside the point..


How do you hide behind a proxy? And where can you get a stealth port scanner? confused


2 people can keep a secret as long as one is dead

Link Copied to Clipboard
Member Spotlight
Phatal
Phatal
Houston, TX
Posts: 298
Joined: April 2004
Forum Statistics
Forums41
Topics33,840
Posts68,858
Average Daily Posts1
Members2,176
Most Online3,253
Jan 13th, 2020
Latest Postings
Where and how do you torrent?
by danni75 - 03/01/24 05:58 AM
Animation,
by JohanKaariainen - 08/15/19 01:18 AM
Blackbeard.....
by Gremelin - 10/03/18 07:02 PM
my old account still exists!
by Crime - 08/10/18 02:47 PM
Okay WTF?
by HenryMiring - 09/27/17 01:45 AM
The History Thread...
by Gremelin - 08/11/17 12:11 PM
My friend NEEDS your HELP!
by Lena01 - 07/21/17 12:06 AM
I'm having fun with this guy.
by gabithompson730 - 07/20/17 01:50 AM
I want to upgrade my phone
by gabithompson730 - 07/20/17 01:49 AM
Doom 3
by Cyrez - 09/11/14 08:58 PM
Amazon Gift Card Generator/KeyGen?te
by Gecko666 - 08/22/14 09:21 AM
AIM scene 99-03
by lavos - 09/02/13 08:06 AM
Planetside 2
by Crime - 03/04/13 07:10 AM
Beta Testers Wanted
by Crime - 03/04/13 06:55 AM
Hello Everyone
by Gremelin - 02/12/12 06:01 PM
Tracfone ESN Generator
by Zanvin Green - 01/18/12 01:31 PM
Python 3 issue
by Testing - 12/17/11 09:28 PM
tracfone airtime
by Drache86 - 07/30/11 03:37 AM
Backdoors and the Infinite
by ZeroCoolStar - 07/10/11 03:52 AM
HackThisZIne #12 Releaseed!
by Pipat2 - 04/28/11 09:20 PM
gang wars? l33t-wars?
by Gremelin - 04/28/11 05:56 AM
Consolidate Forums
by diggin2deep - 04/21/11 10:02 AM
LAN Hacking Noob
by Gremelin - 03/12/11 12:42 AM
Top Posters
UGN Security 41,392
Gremelin 7,203
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Top Likes Received
Ghost 2
Cyrez 1
Girlie 1
unreal 1
Crime 1
Powered by UBB.threads™ PHP Forum Software 7.7.5