Mig33 Friends
Would you like to react to this message? Create an account in a few clicks or log in to continue.

the most dangerous secret of hacking world read regret

Go down

the most dangerous secret of hacking world read regret Empty the most dangerous secret of hacking world read regret

Post by gym Tue Feb 19, 2008 11:37 am

the most dangerous secret of hacking world read regret
this is my most important notes on hacking by dos a real method used by hackers i have tried my best to make is easy for basic user
there are 22 parts in my notes
follow step by step
if the moderators delete it first copy and paste it in ur pc cos u will never get a better than this
I love you I love you I love you I love you

hacking by dos (step to step) method

warning

You can go to jail warning: Breaking into computers is
against the law if you do not have permission to do so from the owner
of that computer. For example, if your friend gives you permission to
break into her Hotmail account, that won't protect you because
Microsoft owns Hotmail and they will never give you permissio
n[color/]

The key to doing amazing things with XP is as simple as D O S. Yes,
that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System.
Windows XP (as well as NT and 2000) comes with two versions of DOS.
Command.com is an old DOS version. Various versions of command.com come
with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating
systems, is cmd.exe. Usually cmd.exe is better than command.com because
it is easier to use, has more commands, and in some ways resembles the
bash shell in Linux and other Unix-type operating systems. For example,
you can repeat a command by using the up arrow until you back up to the
desired command. Unlike bash, however, your DOS command history is
erased whenever you shut down cmd.exe. The reason XP has both versions
of DOS is that sometimes a program that won?t run right in cmd.exe will
work in command.com
about vista i dnt know the most dangerous secret of hacking world read regret Smilethe most dangerous secret of hacking world read regret Smilethe most dangerous secret of hacking world read regret Smile

whats dosthe most dangerous secret of hacking world read regret Smile

DOS is your number one Windows gateway to the Internet, and the open
sesame to local area networks. From DOS, without needing to download a
single hacker program, you can do amazingly sophisticated explorations
and even break into poorly defended computers.

So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you
type "help" at the DOS prompt, it gives you a long list of commands.
However, this list leaves out all the commands hackers love to use.
Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup


TCP/IP stands for transmission control protocol/Internet protocol. As
you can guess by the name, TCP/IP is the protocol under which the
Internet runs. along with user datagram protocol (UDP). So when you are
connected to the Internet, you can try these commands against other
Internet computers. Most local area networks also use TCP/IP.


NetBIOS (Net Basic Input/Output System) protocol is another way to
communicate between computers. This is often used by Windows computers,
and by Unix/Linux type computers running Samba. You can often use
NetBIOS commands over the Internet (being carried inside of, so to
speak, TCP/IP). In many cases, however, NetBIOS commands will be
blocked by firewalls. Also, not many Internet computers run NetBIOS
because it is so easy to break in using them. gym will cover NetBIOS
commands in the next Guide to XP Hacking.
the most dangerous secret of hacking world read regret Smilethe most dangerous secret of hacking world read regret Smile gym
reply to proceed ask to learnthe most dangerous secret of hacking world read regret Smile
gym
gym
Technician
Technician

Male
Number of posts : 592
Age : 38
Location : bangladesh
mig33 username : gym22
Registration date : 2007-09-07

http://www.dirtydesires.net

Back to top Go down

the most dangerous secret of hacking world read regret Empty Re: the most dangerous secret of hacking world read regret

Post by gym Tue Feb 19, 2008 11:51 am

telnet the queen of hackers command how to use it

The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:



Code:
telnet /?

or in full

Code:
C:\>telnet /?

Here's what you will get



telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]

a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.

-e Escape character to enter telnet client prompt.
-f File name for client side logging

-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.

-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.

port Specifies a port number or service name.



for newbieSmile Smile Smile

what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.

Code:
How do you address a computer over the Internet? There are two ways: by number or by name.


what their user name and password are. Stop laughing:) Smile , darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.

The simplest use of telnet is to log into a remote computer. Give the
command:Smile

Code:
telnet targetcomputer.com

or

Code:
C:/>telnet targetcomputer.com

(substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:

login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest

Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?

if u cannt opent telnet


That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.


newbie notes

your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.


If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.


How to Telnet into a Shell Account


Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
Code:
C:/telnet freeshell.org 22

or
Code:
telnet freeshell.org 22


SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables

encrypted connections between computers. If you want to SSH into an
account there, you can get a shell account for free at

Code:
. You can get a free SSH client program from
Code:
 
.
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!

Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it That's also why I always keep my Internet address from showing up in the headers of my emails

Code:
What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when.
gym
gym
gym
Technician
Technician

Male
Number of posts : 592
Age : 38
Location : bangladesh
mig33 username : gym22
Registration date : 2007-09-07

http://www.dirtydesires.net

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum