Learning how to Hack

Discussion in 'Computer Science & Culture' started by Xelios, Jan 23, 2002.

Thread Status:
Not open for further replies.
  1. Rick Valued Senior Member

    Messages:
    3,336
    Yeah, Zambino is right about the sites that he suggested.

    but let me tell you something.as you learn Sockets programming and learn more about protecting your own system,you"ll see that defending is a bigger challenge than destroying shit.

    bye!
     
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. Xelios We're setting you adrift idiot Registered Senior Member

    Messages:
    2,447
    I figure before I step into this hacker world, I should at least get a decent firewall. While it probably won't stop any of the good hackers, it will at least slow them down enough for me to change my IP address, or if need be, pull the DSL out of the wall

    Please Register or Log in to view the hidden image!



    What firewall would you recommend? I tried McAfee and I hate it, it slows down my computer so much that 20 minutes of running it on filter mode and I'm out of memory (aparently it uses like 100 megs of RAM or something..).

    That site of defaced websites is hilarious

    Please Register or Log in to view the hidden image!

     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. Avatar smoking revolver Valued Senior Member

    Messages:
    19,083
    Zone Alarm Pro is definetely the best on the market. I have run it through several tests and it passed it all. When someone looks for your comp, it appears to him tht computer is not even connected to net i.e. it is not there.
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. zambino Registered Member

    Messages:
    8
    I would reccomend hack tracer, its a little hard to find beacuse they dont offer a demo. It guards set ports that trojans use and what zone alarm doesnt do, it block alot more incoming connections that zone alaram would let through. I do still reccomend zone alarm, just use both.

    oh yea zion is deffinately right, defending is 10 times harder to do than break in, thats why I said have that type of job is crazy, in my opioion anyway..
     
  8. nanok Registered Senior Member

    Messages:
    30
    these will keep ya busy for a while to come:

    http://glycol.5u.com/basics.htm
    www.thewhitehat.com
    www.158inc.com
    www.elitehackers.com
    www.hackers.com
    http://www.psyon.org/archive/index.shtml
    http://blacksun.box.sk/tutorials.html
    http://www.hackcanada.com/
    http://neohacker.co.kr/
    http://www.geocities.com/vipersjkworld/zonehax.html
    http://www.elfqrin.com/hack/
    http://www.glock.co.za/docs/
    http://www.nmrc.org/faqs/hackfaq/hackfaq.html#toc29
    http://www.mobileworld.org/
    http://www.dubois.ws/
    www.packetstormsecurity.org
    www.blackcode.com
    www.insecure.org
    http://members.tripod.ca/srdnadbhip2161/Books/
    http://www.sfo.com/~mcd/tutorial.html
    http://www.free-ed.net/catalog/deptmain.asp?newColl=3&newDept=2
    http://www.2600.com/mindex.html
    http://www.ilf.net/brotherhood/phreak/
    http://www.hackerscatalog.com/
    http://www.lordsomer.com/
    http://www.linenoise.org/
    http://www.l0pht.com/
    http://www.deter.com/unix/
    http://home1.swipnet.se/~w-19872/hacking.html
    http://earthspace.net/jargon/jargon_toc.html#SEC1
    http://www.hack.cc/
    http://www.proweb.co.uk/~greenway/Main.html
    http://www.rootshell.com/
    http://www.vicon.net/~bhoover/
    http://www.society-of-shadows.com/home.html
    http://www.ultranet.ca/mypage/
    http://www.robertgraham.com/pubs/firewall-seen.html
    http://www.technotronic.com/
    http://www.undergroundnews.com/right.htm
    http://www.rootshell.com/docs/backdoors.txt
    http://www.bon.net/emumania/dream/level.htm
    http://hackers.co.za/archive/hacking/
    http://www.hideaway.net/index.html
    http://www.ntsecurity.net/
    http://anon.xg.nu/
    http://anonymouse.home.pages.de/
    http://www.antionline.com/
    http://www.attrition.org/
    http://www.cert.org/
    http://www.checksum.org/
    http://www.idca.com/~thesandman/
    ftp://rtfm.mit.edu/pub/usenet-by-group/alt.2600/
    http://www.dsinet.org/
    http://www.aclu.org/echelonwatch/faq.html
    http://www.robertgraham.com/pubs/firewall-seen.html
    http://www.utexas.edu/cc/faqs/unix/
    http://www.flashback.se/arkiv/
    http://www.hackersclub.com/km/frontpage/
    http://www.hackershomepage.com/
    http://hackerzlair.org/
    http://www.warezone.com/hacking.html
    http://hackingtruths.box.sk/
    http://newdata.box.sk/neworder/docs/hacking_unix.txt
    http://www.hackernews.com/
    http://www.happyhacker.org/
    http://www.xs4all.nl/~l0rd/
    http://www.hack.vuurwerk.nl/
    http://develop.mainquad.com/web/r/ramiz/
    http://www.hps.nu/security.html/
    http://summer.studentenweb.org/LittlePanda/mail/compose_no_login.html
    http://mail-abuse.org/tsi/
    http://www.estnet.ee/mart/hack/
    http://uptime.netcraft.com/
    http://neworder.box.sk/
    http://www.nmrc.org/
    http://www.coolguy.demon.co.uk/handbook/hack.htm
    http://www.goodnet.com/~jeriii/info/pchack.htm
    http://www.iana.org/assignments/port-numbers
    http://proxys4all.cgi.net/
    http://newdata.box.sk/neworder/docs/unix_bible.zip
    http://morehouse.org/hin/hindex.htm
    http://www.securityfocus.com/
    http://www.securityportal.com/
    http://grc.com
    http://lib.ru/SECURITY/hackalot.txt
    http://www.accessorl.net/~cyberwar/nethacks.html
    http://cgi.spaceports.com:81/
    http://www.theargon.com/
    http://www.eff.org/Privacy/eff_privacy_top_12.html
    http://www.tuxedo.org/~esr/jargon/
    http://www.commodon.com/threat/
    http://www.indiana.edu/~uitspubs/b017/
    http://www.ugu.com/
    http://www.geek-girl.com/
    http://www.albany.edu/~csi205/htm/unix.html
    http://www.mono.org/~arny/
    http://www.uwsg.indiana.edu/usail/
    http://members.tripod.com/AMIRANJITH/hacking.htm
    http://hackerhomeland.cjb.net/
    http://infosyssec.org/
    http://kryptographical.r-fx.net/
    http://eyeonsecurity.net/news/
    http://www.blister-tech.com/
    http://www.webattack.com/
    http://www.hackingexposed.com/tools/tools.html
    http://www.accessorl.net/~cyberwar/hacker.html
    http://www.hackerwhacker.com/
    http://www.secure-me.net/
    http://www.firewall.com/
    http://www.microsoft.com/security
    http://www.ca.com/virusinfo/virusalert.htm
    http://www.norman.com/virus_info/virus_descriptions.shtml
    http://www.sophos.com/virusinfo
    http://www.viruslist.com/eng/default.asp
    http://www.antivirus.com/vinfo
    http://www.symantec.com/avcenter/
    http://www.symantec.com/avcenter/hoax.html
    http://www.analogx.com/contents/download/network.htm
    http://www.angelfire.com/geek/ajax/index.html
    http://www.linuxnewbie.org/nhf/index.html
    http://www.boxnetwork.net/
    http://www.ddj.com/topics/
    http://www.hack3r.com/
    http://www.tlsecurity.net/main.htm
    http://htp.stormloader.com/starthak.txt
    http://www.htmlsource.f2s.com



    News groups (hacking, computer-security & related)

    alt.2600 // alt.2600.414 // alt.2600.AOL // alt.2600.cardz // alt.2600.codez // alt.2600.crackz //
    alt.2600.debate // alt.2600.crypteia // alt.2600.hackerz // alt.2600.hope.announce //
    alt.2600.hope.tech // alt.2600.is.sooo.lame // alt.2600.moderated // alt.2600.programz //
    alt.2600.phreakz // alt.2600.programz // alt.binaries.hacking.beginner //
    alt.binaries.hacking.computers // alt.binaries.hacking.utilities // alt.binaries.hacking.websites //
    alt.bio.hackers // alt.cellular // alt.cellular-phone-tech // alt.cellular.oki.900 // alt.crackers //
    alt.cracks // alt.dcom.telecom // alt.hack // alt.hack.nl // alt.hacker // alt.hackers //
    alt.hackers.discuss // alt.hackers.groups // alt.hackers.malicious // alt.hackers.hackintosh //
    alt.phreaking // alt.privacy // alt.privacy.anon-server // alt.privacy.clipper //
    alt.private.investigator // alt.put // alt.security // alt.security.index // alt.security.keydist //
    alt.security.ripem // alt.wired // comp.privacy // comp.protocols.tcp-ip // comp.risks //
    comp.security.announce // comp.security.firewalls // comp.security.misc // comp.security.unix //


    as for a firewall, I now use sygate because I had problems with zone alarm a while ago, it's got a built in tracer so you can just click on the intruder in the log on the screen and it will back trace the address for you...the only problem is it only has a trial version for free

    and for an even cooler tracer go to www.neotrace.com and download neo-trace pro, it will show you the location of the intruder if you type in his ip number
     
    Last edited: Feb 2, 2002
  9. Xelios We're setting you adrift idiot Registered Senior Member

    Messages:
    2,447
    I actually tried the trial of neotrace a while ago, it's a neat program, I'll have to see if I can register it.

    I know this may be a stupid question, but can someone get your IP address through a chat program like MSN messanger or ICQ just by talking to you? My friend was telling me about how a friend of a friend of a friend's cousin was getting people's IP's on ICQ, I'm a little reluctant to believe him, simply because he doesn't know anything about computers and the whole friend of a friend of a friend thing.

    Thanks for the websites nanok, looks like I'll be very busy for the next 3 years or so

    Please Register or Log in to view the hidden image!



    Also, I was wondering, what is the difference between Windows, Linux, Unix and RedHat? I know Linux and Unix(?) are open sourced, and I've used Linux. Just was wondering what the big difference is between these OS's.
     
    Last edited: Feb 2, 2002
  10. Rick Valued Senior Member

    Messages:
    3,336
    UNIX is just a trade mark.
    RED-HAT manufactures LINUX,a company with great future.

    LINUX is UNIX basically as i understand,the structure is similiar.
    Windows is DOS(DISK OPERATING SYSTEM)
    The devices in Linux are in form of Files.

    bye!
     
  11. Rick Valued Senior Member

    Messages:
    3,336
    Yes you can get IP,nuke them,shutdown their computer etc etc...

    Earlier ICQ server had a big problem.while whenever a web page at port no 5190 was opened through telnet,and an invalid command was given,invalid in the sense of not being HTML one,the server simply used to crash and go offline,the problem however was repaired.if you need some programs for ICQ IP-FLOODING,you can download it from net easily,but remember that"ll only make you Lame,try something on your own and that"ll boost your confidence.



    bye!
     
  12. Rick Valued Senior Member

    Messages:
    3,336
    Hey Nanok,

    Nice compiled list buddy...

    thanks...

    bye!

    Please Register or Log in to view the hidden image!

     
  13. zambino Registered Member

    Messages:
    8
    I'd like to interject my comments about your question on the differences in unix and linux and redhat. First off red hat is a distribution of linux, its the easiest oh any version to install and its also the most insecure, i think openbsd is the most secure os out there right now. linux is basicly unix, linus travolda or seomthing like that (i forgot his last name ) just change around unix and now there are alot of different version that are completely free and open source.

    Oh yea about neo-trace, thats the same program I was talking about earlier, hac tracer, it can geographically trace the person who was trying to connect to you. its a good program, works well for me, although I rarely use it.
     
  14. Reign_of_Error Registered Senior Member

    Messages:
    68
    Xelios...

    RedHat is a linux 'Distribution' there are many ditributions of linux made by different companies like debian ( www.debian.org) and Mandrake Linux (http://www.linux-mandrake.com/en/)

    Linux is open source, however unix is not open source as there are also commercial versions of unix.

    Have a look at www.unix.com if you want to learn more about linux and unix.
     
  15. Rick Valued Senior Member

    Messages:
    3,336
    Caldera is also Kool.


    bye!
     
  16. Lioko Registered Member

    Messages:
    1
    Ima Newbie

    Please Register or Log in to view the hidden image!



    Hewo everybody, i sorta just stumbled across this web forum thingy, and i like all the boards it has, mainly all of my interests

    Please Register or Log in to view the hidden image!


    I was wondering if anyone knows of any good 3D Graphic/Mutlimedia programs that are any good, i have 3Dsmax,bryce,xara,ray dream,light wave,poser, and i'll have maya 4 pretty soon, anyone know of any other software progs that are as good as these if not better?
    Oh yea, and Xel, learning to prog is pretty easy, you just need to devote alot of time into reading those books, you should get MS Visual Studio 6.0, that program helps ALOT, and get "Learning to program in C++" thats also a pretty good book, it explains lots.
    Hmm... Xel that logo contest thingy, is it "any" kind of logo, like, from any kind of program?

    Please Register or Log in to view the hidden image!


    And umm, to put a picture in my icon is it the thing at the bottom that says "Attach File" or is that something that attaches to this board?

    Please Register or Log in to view the hidden image!

    ? I'll check this board every other day or so, ciao
     
  17. Xelios We're setting you adrift idiot Registered Senior Member

    Messages:
    2,447
    Welcome to sciforums

    Please Register or Log in to view the hidden image!



    There's actually a good website with all kinds of info on digital art contests and lots of other stuff. www.deviantart.com

    A lot of the time they have contests in the news on the main page.
     
  18. dexter ROOT Registered Senior Member

    Messages:
    689
    haha, I guess its time for my input. Sorry guys, I have not been here for a very long time. Most of you I still dont know, there are a lot of new people here since exosci, or sciforums as you like to call it now first started. Well, hacking in programing. its that simple. A hacker is not just any programmer though, it is a extrememly talented programer, one that can do anything with a keyboard and compiler. Breaking into other computers? That is not hacker, that is what some hackers do, thought I wouldnt consider most of them hackers, since hackers code to help, not to destroy. as for security, system security is very important, most people who want to get into it, no matter what they say (i.e. "I just want to learn how they do it" or "I just want to be secure myself") just want to break into their friends computer and make his cdrom open, and a little black screen pop up telling them that they are now in the matrix. Trust me, I have been there. If you want to get into computers, then I suggest getting a few more comptuers than your mommys gateway. reading old computer "underground" txt files, doesnt really help you at all, in fact, I think I have found 1 thing that even still worked. (redboxing and wardialing). I suggest starting your own home network, setting up a webserver, dns, mail, you know.. the basics. have them all running a flavor of unix, though I despise roothat, I mean redhat, you might want to start with it. Start learning C/c++. Learn how to accually use linux. learn how to change stuff, how to cheat the system, figureing out little hacks(when I say hacks, I do not mean getting root, I mean ways to make the computer think one thing so you can do something you are not soposed to, like scsi simulation w/ a mount point or whatever you want. )

    Hmm... for those of you who already have linux, you might want to try BSD, it is very nice, I like it a lot. though, my dad took away all my boxen cept for this laptop(pII300mhz) and my 500mhz cely, and I dont run it on anything, I had it on another laptop for a long time(openBSD). I cannot imagine putting bsd on anything over 300 mhz. Ok, I am kinda rambling so I will wrap it up.

    system cracking is bad, it can get you in a lot of trouble. You are not untracable, you are anything but. it is really easy, so you are not really accomplishing anything by breaking into some server running a outdated version of telnetd.(should be running sshd anyways). Computers are fun, very fun, good way to comunicate and learn. possible source of income. If you have money, please buy me a g4 powerbook. if you do want to learn about security, learn about computers first, you need to know how to use a computer in order to exploit it.
     
  19. Xelios We're setting you adrift idiot Registered Senior Member

    Messages:
    2,447
    Thanks for the info Dexter

    Please Register or Log in to view the hidden image!



    I downloaded BlackICE Defender, and after running it for about 20 minutes heres what I'm seeing:

    Attack-Intruder-Count
    UDP Port Probe-157.242.91.***-5
    TCP Port Probe-157.242.91.***-3
    HTTP Port Probe-BLAINE-2
    TCP Port Probe-wlrd13-230-dhcp.resnet.Colorado.EDU-3
    TCP Port Probe-c108-bea24.uibk.ac.at-4
    TCP Port Probe-THADALMN1-4
    TCP Port Probe-157.242.91.***-3

    The stars are actually numbers, just thought I'd leave out the last bit. Is this normal? I mean, I'm getting scanned on almost every access point to my computer. =/
     
  20. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    I once had Blackice, but it turned out that the ruddy thing had a trojan in it....

    What good is a firewall when it turns out to be a Backdoor???

    Anyway looking at the attacks you seemed to have, some of them are quite natural... yes they are the reminants of Code Red and Nimda.... Which can still be found on peoples Windows systems because they haven't turned off their IIS servers.

    I worked out that there is a possibility that hackers are utilising these I-worms by placing a firewall in an OS like Linux which is uneffected, and placing an open infected IIS server on a machine behind it.

    Then the machine spouts out loads of port 80 HTTP attempts to gain access to other IIS machines.

    The way I see it all these I-worms are like an automated smoke screen to hide up the true attackers of systems that are doing it manually.

    I'm still trying to develop some method of sending a file back to the I-worm ridden system and forcing a TROJAN PATCH... YES... I'm talking about WHITE VIRII, viruses that probe for your faults, bugs and security holes and does it's best to fix them.

    This is the future of Virii coding.
     
  21. Xelios We're setting you adrift idiot Registered Senior Member

    Messages:
    2,447
    Well, I've checked my system for the common trojans like BackOrifice and such and haven't found any. I'm up to 66 "suspicious attacks", mostly UDP and TCP port probes. A lot of them seem to be coming from the same 3 or 4 people over and over again. So far that's all I've seen though, port probes. Guess I shouldn't be too worried just yet.
     
  22. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    See if you can get hold of the actual port numbers that were probed. Otherwise all those probes could just be people trying t oget your netbios from port 137-9.

    (By the way netbios if you don't know, gives out information like:
    What IP your computer's been assigned, What name you've given it and what group it's been given in Windows [Unless you have patches]

    on a linux system it will give the name you've given the machine and/or the ip, I think it's similar with MAC.

    There is also a possibility of retreiving your LAN adapter address etc as well.

    Some servers use this info so they know who they are talking to, others do when you hit a site and they show you the "Info" that they can gather.

    (It's like turning of the identd.conf for TIME isn't a good idea when you have a system within a network, as they tend to outsync.)
     
  23. ImaHamster2 Registered Senior Member

    Messages:
    220
    Stryder wrote: “I'm still trying to develop some method of sending a file back to the I-worm ridden system and forcing a TROJAN PATCH... YES... I'm talking about WHITE VIRII, viruses that probe for your faults, bugs and security holes and does it's best to fix them.”

    Be careful of unintended consequences. The best of motives may lead to significant harm. A user whose computer fails after being infected with the “white” virus isn’t gonna be happy. (The virus might be blamed even if the computer failed for reasons unrelated to the infection.)
     
Thread Status:
Not open for further replies.

Share This Page