Jump to content

MaHaReT

Active Members
  • Posts

    900
  • Joined

  • Last visited

Everything posted by MaHaReT

  1. http://www.e-hack.org/exploit/archive/018.txt
  2. Introduction 1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know. 1. Hardware and Firmware 1a. The BIOS The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access. NOTE that the BIOS is not a software program, insofar as it is not purged from memory when you turn off the computer. It's firmware, which is basically software on a chip. A convenient little feature that most BIOS manufacturers include is a startup password. This prevents access to the system until you enter the correct password. If you can get access to the system after the password has been entered, then there are numerous software-based BIOS password extractors available from your local H/P/A/V site. NETBIOS/NBTSTAT - What does it do? 2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster. Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT Method 2:Start>Run>Type Command>Type NBTSTAT (Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.) Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following: NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n] [-r] [-R] [-RR] [-s] [-S] [interval] ] -a (adapter status) Lists the remote machine's name table given its name -A (Adapter status) Lists the remote machine's name table given its IP address. -c (cache) Lists NBT's cache of remote [machine] names and their IP addresses -n (names) Lists local NetBIOS names. -r (resolved) Lists names resolved by broadcast and via WINS -R (Reload) Purges and reloads the remote cache name table -S (Sessions) Lists sessions table with the destination IP addresses -s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names. -RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh RemoteName Remote host machine name. IP address Dotted decimal representation of the IP address. interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying statistics. C:WINDOWSDESKTOP> The only two commands that are going to be used and here they are: -a (adapter status) Lists the remote machine's name table given its name -A (Adapter status) Lists the remote machine's name table given its IP address. Host Names 3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example. 123-fgh-ppp.internet.com there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference. abc-123.internet.com ghj-789.newnet.com these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server. 123-fgh-ppp.internet.com 567-cde-ppp.internet.com IP Addresses 4. You can resolce these host names if you want to the IP address (Internet Protocol) IP addresses range in different numbers. An IP looks like this: 201.123.101.123 Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP. 24.18.18.10 on dialup connections IP's are higher, like this: 208.148.255.255 notice the 208 is higher than the 24 which is the cable connection. REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS. Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command. Getting The IP Through DC (Direct Connection) 5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are: Sending a file to their computer you are directly connected. AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted. ICQ when sending a file or a chat request acception allows a direct connection. Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.) Voice Chatting on Yahoo establishes a direct connection. If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement. If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer: ------------------------------------------------------------------------------------------------ C:WINDOWSDESKTOP>netstat -n Active Connections Proto Local Address Foreign Address State TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED C:WINDOWSDESKTOP> ------------------------------------------------------------------------------------------------ The first line indicated the Protocol (language) that is being used by the two computers. TCP (Transfer Control Protocol) is being used in this and is most widely used. Local address shows your IP address, or the IP address of the system you on. Foreign address shows the address of the computer connected to yours. State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states. the way you know the person is directly connected to your computer is because of this: ------------------------------------------------------------------------------------------------ C:WINDOWSDESKTOP>netstat -n Active Connections Proto Local Address Foreign Address State TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED C:WINDOWSDESKTOP> ------------------------------------------------------------------------------------------------ Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name: abc-123-ppp.webnet.com If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc-123-ppp.webnet.com host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack! Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know. IMPORTANT, READ NOW!!! -a (adapter status) Lists the remote machine's name table given its name -A (Adapter status) Lists the remote machine's name table given its IP address. Remember this? Time to use it. -a will be the host name -A will be the IP How do i know this? Read the Statements following the -a -A commands. It tells you there what each command takes. So have you found which one you have to use? GOOD! Time to start. Using it to your advantage 6. Type this if you have the host name only. NBTSTAT -a (In here put in hostname without parenthesis) Type this is you have the IP address only. NBTSTAT -A (In here put in IP address without parenthesis) Now, hit enter and wait. Now Either one of two things came up 1. Host not found 2. Something that looks like this: -------------------------------------------- NetBIOS Local Name Table Name Type Status --------------------------------------------- GMVPS01 <00> UNIQUE Registered WORKGROUP <00> GROUP Registered GMVPS01 <03> UNIQUE Registered GMVPS01 <20> UNIQUE Registered WORKGROUP <1E> GROUP Registered --------------------------------------------- If the computer responded "Host not found" Then either one of two things are the case: 1. You screwed up the host name. 2. The host is not hackable. If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system. If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose. Name - states the share name of that certain part of the computer <00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on that share name. Type - Is self-explanatory. It's either turned on, or activated by you, or always on. Status - Simply states that the share name is working and is activated. Look above and look for the following line: GMVPS01 <20> UNIQUE Registered See it? GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part) LMHOST File 7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part: # This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts # files and offers the following extensions: # # #PRE # #DOM: # #INCLUDE # #BEGIN_ALTERNATE # #END_ALTERNATE #
  3. What is an Exploit? Well to explain this simply, a Exploit is a program that 'exploits' a bugin a specific software. All exploits are different, they do different thingsexploit different bugs, thats why exploits are allways program specific.Exploits are made to get root on different operating systems. They achive this by exploiting a bug in software when the software is running as root.In UNIX type OS's, software may have to run as root ( or UID 0 ) in order toperform a specific task that cannot be performed as another user. So basicallythe exploit crashes the software while running as root to give you the beautifulroot prompt. How do I use a exploit? Since exploits are coded in C 99% of the time, you need a shell on the box you are going to use the exploit on, OR, you need to be running the same OS as the box you are attempting to hack. So basically, you need to put the source code, or the binary in your shell accounts dir, ( you want to use a hacked, or a shell not yours for this ) to put it on your shell, you can ftp to your account and upload it that way, or you can use rz if you are using a dialup shell. Either way, i shouldnt have to explain those to things to much, its pretty easy. Once you have the exploit on the box you just need to compile it. Usually you would compile the exploit like so; blah:~/$gcc exploit.c that should compile your exploit. However, be aware that some exploit coders are sneaky pests, and like to pick on people who dont know C, so they will sometimes insert bugs into the exploit, thus uninabiling it to be compiled. So it does help to know C, when playing with C After the compiling is done, you should beable to just run the exploit and its work will be done when you see the root prompt. however, not all exploits are the same, and might require different commandlines to get them to work.
  4. Detailed Trojans Port List, Protocol/Port/Trojan/Version TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250 TCP 28 Amanda.200 TCP 31 MastersParadise.920 TCP 68 Subseven.100 TCP 142 NetTaxi.180 TCP 146 Infector.141, Intruder.100, Intruder.100 TCP 171 ATrojan.200 TCP 285 WCTrojan.100 TCP 286 WCTrojan.100 TCP 334 Backage.310 TCP 370 NeuroticKat.120, NeuroticKat.130 TCP 413 Coma.109 TCP 420 Breach.450 TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100 TCP 623 Rtb666.160 TCP 660 Zaratustra.100 TCP 661 Noknok.800, Noknok.820 TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110 TCP 667 SniperNet.210, Snipernet.220 TCP 668 Unicorn.101, Unicorn.110 TCP 680 Rtb666.160 TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332 TCP 785 NetworkTerrorist.100 TCP 800 NeuroticKitten.010 TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130 TCP 901 NetDevil.130, NetDevil.140 TCP 1000 DerSpaeher.200 TCP 1001 Silencer.100 TCP 1008 AutoSpy.100 TCP 1010 DerSpaeher.200 TCP 1015 Doly.150 TCP 1111 TPort.100 TCP 1130 Noknok.800, Noknok.820 TCP 1207 SoftWAR.100 TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200 TCP 1245 VoodooDoll.006 TCP 1269 Matrix.130 TCP 1480 RemoteHack.130 TCP 1568 RemoteHack.100, RemoteHack.110 TCP 1600 DirectConnection.100 TCP 1601 DirectConnection.100 TCP 1602 DirectConnection.100 TCP 1634 NetCrack.100 TCP 1784 Snid.120, Snid.212 TCP 1999 TransmissionScout.100, TransmissionScout.110 TCP 2000 ATrojan.200, InsaneNetwork.400 TCP 2001 DIRT.220, TrojanCow.100 TCP 2003 TransmissionScout.100, TransmissionScout.110 TCP 2023 RipperPro.100 TCP 2040 InfernoUploader.100 TCP 2115 Bugs.100 TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310 TCP 2332 SilentSpy.202 TCP 2589 Dagger.140 TCP 2600 DigitalRootbeer.100 TCP 2989 Rat.200 TCP 3128 MastersParadise.970 TCP 3129 MastersParadise.920, MastersParadise.970 TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110 TCP 3215 BlackStar.100, Ghost.230 TCP 3333 Daodan.123 TCP 3410 OptixPro.100, OptixPro.110 TCP 3456 Force.155, TerrorTrojan.100 TCP 3505 AutoSpy.130, AutoSpy.140 TCP 3586 Snid.120, Snid.212 TCP 3700 PortalOfDoom.100 TCP 3723 Mantis.100 TCP 3800 Eclypse.100 TCP 3996 RemoteAnything.364 TCP 4000 SkyDance.220, SkyDance.229 TCP 4201 Wartrojan.160, Wartrojan.200 TCP 4225 SilentSpy.202 TCP 4321 Bobo.100 TCP 4444 AlexTrojan.200, Crackdown.100 TCP 4488 EventHorizon.100 TCP 4523 Celine.100 TCP 4545 InternalRevise.100, RemoteRevise.150 TCP 4567 FileNail.100 TCP 4666 Mneah.100 TCP 4950 ICQTrojan.100 TCP 5005 Aladino.060 TCP 5025 Keylogger.WMRemote.100 TCP 5031 NetMetro.104 TCP 5032 NetMetro.104 TCP 5033 NetMetro.104 TCP 5050 RoxRat.100 TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040 TCP 5190 MBomber.100 TCP 5277 WinShell.400 TCP 5343 WCRat.100 TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300 TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100 TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100 TCP 5534 TheFlu.100 TCP 5550 XTCP.200, XTCP.201 TCP 5555 Noxcape.100, Noxcape.200 TCP 5695 Assassin.100 TCP 5714 WinCrash.100 TCP 5741 WinCrash.100 TCP 5742 WinCrash.103 TCP 5802 Y3KRat.160 TCP 5810 Y3KRat.160 TCP 5838 Y3KRat.170 TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140 TCP 5880 Y3KRat.140 TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140 TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150 TCP 5883 Y3KRat.110, Y3KRat.140 TCP 5884 Y3KRat.140, Y3KRat.150 TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140 TCP 5886 Y3KRat.120, Y3KRat.140 TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140 TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150 TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150 TCP 5890 Y3KRat.140 TCP 6400 Thething.100, Thething.150 TCP 6556 AutoSpy.120, AutoSpy.122 TCP 6655 Aqua.020 TCP 6660 LameSpy.095 TCP 6666 LameRemote.100, ProjectMayhem.100 TCP 6669 Vampire.100 TCP 6670 DeepThroat.200, DeepThroat.210 TCP 6671 DeepThroat.310 TCP 6699 HostControl.101 TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190 TCP 6712 Subseven.100 TCP 6713 Subseven.100 TCP 6767 NTRC.120 TCP 6776 SubSeven.180, SubSeven.190, Subseven.200 TCP 6789 Doly.200 TCP 6796 SubSeven.214 TCP 6912 ShitHeep.100 TCP 6939 Indoctrination.100 TCP 6953 Lithium.100 TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120 TCP 6970 Danton.330 TCP 7001 Freak88.100 TCP 7119 Massaker.100 TCP 7200 Massaker.110 TCP 7300 Coced.221 TCP 7301 Coced.221 TCP 7306 NetSpy.200, NetSpy.200 TCP 7410 Phoenix.190, Phoenix.200 TCP 7511 Genue.100 TCP 7609 Snid.120, Snid.212 TCP 7614 Wollf.130 TCP 7648 BlackStar.100, Ghost.230 TCP 7788 Last.2000, Matrix.200 TCP 7826 MiniOblivion.010, Oblivion.010 TCP 7887 SmallFun.110 TCP 7891 Revenger.100 TCP 7979 VagrNocker.200 TCP 7997 VagrNocker.200 TCP 8000 XConsole.100 TCP 8011 Way.240 TCP 8012 Ptakks.215, Ptakks.217 TCP 8110 LoseLove.100 TCP 8111 LoseLove.100 TCP 8301 LoseLove.100 TCP 8302 LoseLove.100 TCP 8372 NetBoy.100 TCP 8720 Connection.130 TCP 8734 AutoSpy.110 TCP 8811 Force.155 TCP 8899 Last.2000 TCP 9000 Aristotles.100 TCP 9301 LoseLove.100 TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170 TCP 9401 InCommand.100, InCommand.110, InCommand.170 TCP 9402 InCommand.100, InCommand.110 TCP 9561 CRatPro.110 TCP 9563 CRatPro.110 TCP 9580 TheefLE.100 TCP 9696 Danton.210, Ghost.230 TCP 9697 Danton.320, Danton.330, Ghost.230 TCP 9870 R3C.100 TCP 9872 PortalOfDoom.100 TCP 9873 PortalOfDoom.100 TCP 9874 PortalOfDoom.100 TCP 9875 PortalOfDoom.100 TCP 9876 Rux.100, SheepGoat.100 TCP 9877 SmallBigBrother.020 TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120 TCP 9879 SmallBigBrother.020 TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300 TCP 10001 DTr.130, DTr.140 TCP 10013 Amanda.200 TCP 10067 PortalOfDoom.100 TCP 10100 Gift.240 TCP 10101 NewSilencer.100 TCP 10167 PortalOfDoom.100 TCP 10528 HostControl.100, HostControl.260 TCP 10607 Coma.109 TCP 10666 Ambush.100 TCP 11011 Amanda.200 TCP 11050 HostControl.101 TCP 11051 HostControl.100, HostControl.260 TCP 11223 AntiNuke.100, Progenic.100, Progenic.110 TCP 11225 Cyn.100, Cyn.103, Cyn.120 TCP 11306 Noknok.800, Noknok.820 TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400 TCP 11991 PitfallSurprise.100 TCP 12043 Frenzy.2000 TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400 TCP 12346 Netbus.160, Netbus.170 TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317 TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402 TCP 12389 KheSanh.210 TCP 12478 Bionet.210 TCP 12623 Buttman.090, Buttman.100 TCP 12624 Buttman.090, Buttman.100 TCP 12625 Buttman.100 TCP 12904 Akropolis.100, Rocks.100 TCP 13473 Chupacabra.100 TCP 13753 AFTP.010 TCP 14100 Eurosol.100 TCP 14194 CyberSpy.840 TCP 14286 HellDriver.100 TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070 TCP 14501 PCInvader.060, PCInvader.070 TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070 TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070 TCP 14504 PCInvader.050, PCInvader.060 TCP 15092 HostControl.100, HostControl.260 TCP 15382 SubZero.100 TCP 15432 Cyn.210 TCP 15555 ICMIBC.100 TCP 16322 LastDoor.100 TCP 16484 MoSucker.110 TCP 16661 Dfch.010 TCP 16969 Progenic.100 TCP 16982 AcidShiver.100 TCP 17300 Kuang.200 TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521 TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521 TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100 TCP 17593 AudioDoor.120 TCP 19191 BlueFire.035, BlueFire.041 TCP 19604 Metal.270 TCP 19605 Metal.270 TCP 19991 Dfch.010 TCP 20000 Millenium.100 TCP 20001 Millenium.100, PshychoFiles.180 TCP 20002 AcidKor.100, PshychoFiles.180 TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220 TCP 21212 Schwindler.182 TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135 TCP 21579 Breach.2001 TCP 21584 Breach.2001 TCP 21684 Intruse.134 TCP 22068 AcidShiver.110 TCP 22115 Cyn.120 TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600 TCP 22223 Rux.400, Rux.500, Rux.600 TCP 22456 Bla.200, Bla.503 TCP 22457 AcidShiver.120, Bla.200, Bla.503 TCP 22784 Intruzzo.110 TCP 22845 Breach.450 TCP 22847 Breach.450 TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100 TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100 TCP 23032 Amanda.200 TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110 TCP 23456 EvilFTP.100, VagrNocker.400 TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155 TCP 23477 DonaldDick.153 TCP 24000 Infector.170 TCP 24307 Wildek.020 TCP 25386 MoonPie.220 TCP 25486 MoonPie.220 TCP 25555 FreddyK.100, FreddyK.200 TCP 25556 FreddyK.100 TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400 TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400 TCP 25982 MoonPie.135, MoonPie.200 TCP 26274 Delta.050 TCP 27160 MoonPie.135, MoonPie.200 TCP 27184 Alvgus.100, Alvgus.800 TCP 27374 Muerte.110, Subseven.210, SubSeven.213 TCP 28429 Hack'a'Tack.2000 TCP 28430 Hack'a'Tack.2000 TCP 28431 Hack'a'Tack.2000 TCP 28432 Hack'a'Tack.2000 TCP 28433 Hack'a'Tack.2000 TCP 28434 Hack'a'Tack.2000 TCP 28435 Hack'a'Tack.2000 TCP 28436 Hack'a'Tack.2000 TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400 TCP 29891 Unexplained.100 TCP 30000 Infector.170 TCP 30001 Error32.100 TCP 30003 LamersDeath.100 TCP 30029 AOLTrojan.110 TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131 TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131 TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131 TCP 30103 NetSphere.131 TCP 30947 Intruse.134 TCP 31320 LittleWitch.400, LittleWitch.420 TCP 31337 BackOrifice.120, Khaled.100, OPC.200 TCP 31415 Lithium.101 TCP 31416 Lithium.100, Lithium.101 TCP 31557 Xanadu.110 TCP 31631 CleptoManicos.100 TCP 31745 Buschtrommel.100, Buschtrommel.122 TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112 TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112 TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112 TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112 TCP 31887 BDDT.100 TCP 31889 BDDT.100 TCP 32100 ProjectNext.053 TCP 32418 AcidBattery.100 TCP 32791 Akropolis.100, Rocks.100 TCP 33291 RemoteHak.001 TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214 TCP 33577 SonOfPsychward.020 TCP 34324 TelnetServer.100 TCP 34763 Infector.180, Infector.190, Infector.200 TCP 35000 Infector.190, Infector.200 TCP 35600 Subsari.140 TCP 36794 BugBear.100 TCP 37237 Mantis.020 TCP 37651 YAT.210 TCP 37653 YAT.310 TCP 40308 Subsari.140 TCP 40412 TheSpy.100 TCP 40421 MastersParadise.970 TCP 40422 MastersParadise.970 TCP 40999 DiemsMutter.110, DiemsMutter.140 TCP 41626 Shah.100 TCP 44444 Prosiak.070 TCP 45673 Akropolis.100, Rocks.100 TCP 47262 Delta.050 TCP 48006 Fragglerock.200 TCP 49683 HolzPferd.210 TCP 50000 Infector.180 TCP 50130 Enterprise.100 TCP 50766 Fore.100 TCP 51234 Cyn.210 TCP 51966 Cafeini.080, Cafeini.110 TCP 54321 PCInvader.010 TCP 57341 NetRaider.100 TCP 57922 Bionet.084 TCP 58008 Tron.100 TCP 58009 Tron.100 TCP 59090 AcidReign.200 TCP 59211 DuckToy.100, DuckToy.101 TCP 59345 NewFuture.100 TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101 TCP 60411 Connection.100, Connection.130 TCP 60412 Connection.130 TCP 60552 RoxRat.100 TCP 63536 InsaneNetwork.500 TCP 63878 AphexFTP.100 TCP 63879 AphexFTP.100 TCP 64969 Lithium.100 TCP 65000 Socket.100 UDP 1 SocketsDeTroie.250 UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820 UDP 1130 Noknok.800, Noknok.820 UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310 UDP 2989 Rat.200 UDP 3128 MastersParadise.970 UDP 3129 MastersParadise.920, MastersParadise.970 UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110 UDP 3333 Daodan.123 UDP 3800 Eclypse.100 UDP 3996 RemoteAnything.364 UDP 4000 RemoteAnything.364 UDP 5555 Daodan.123 UDP 5881 Y3KRat.110, Y3KRat.140 UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150 UDP 5883 Y3KRat.110, Y3KRat.140 UDP 5884 Y3KRat.140, Y3KRat.150 UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140 UDP 5886 Y3KRat.120, Y3KRat.140 UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140 UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150 UDP 6953 Lithium.100 UDP 8012 Ptakks.217 UDP 10067 PortalOfDoom.100 UDP 10167 PortalOfDoom.100 UDP 10666 Ambush.100 UDP 11225 Cyn.100, Cyn.103, Cyn.120 UDP 11306 Noknok.800, Noknok.820 UDP 12389 KheSanh.210 UDP 12623 Buttman.090, Buttman.100 UDP 12625 Buttman.100 UDP 14100 Eurosol.100 UDP 23476 DonaldDick.155 UDP 26274 Delta.050 UDP 27184 Alvgus.100 UDP 28431 Hack'a'Tack.2000 UDP 28432 Hack'a'Tack.2000 UDP 28433 Hack'a'Tack.2000 UDP 28434 Hack'a'Tack.2000 UDP 28435 Hack'a'Tack.2000 UDP 28436 Hack'a'Tack.2000 UDP 29891 Unexplained.100 UDP 30103 NetSphere.131 UDP 31320 LittleWitch.400, LittleWitch.420 UDP 31337 BackOrifice.120, OPC.200 UDP 31416 Lithium.100, Lithium.101 UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112 UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112 UDP 33333 Blackharaz.100 UDP 47262 Delta.050 UDP 49683 HolzPferd.210 UDP 60000 MiniBacklash.100
  5. What does a Hacker do? well here's a pretty blunt definition of a hacker, a person who posseses a superior knowledge of anything that has to do with computers and the internet, a hacker has the ability to munipulate everything that he knows, meaning he can create, destroy, take apart, and put things back together. you can find hackers all over the place in the computer world, they make up about 95% of the high tech industry there the one's that get hired for computer, network, security, and internet realated jobs, still intrested? if so keep reading, if not get the fuck out of my site! What do i need? well first of all you'll need to have the will to learn, are you willing to donate most of your life to computers and learn as much as possible?... well then good, here are some good outlines for you to follow. first of all you'll need to learn what a computer and the internet is, a computer is a revolutional machine that change the course of history, it has a massive calculating power, that enables it to run multiple application and taskes at once, a computer has many parts to it and they are the prossesor, Hard drive, RAM, Mother board, Video and sound card, network card, disk drive, and modem. the internet, what is the internet? the internet is the largest network in the world, the network is made up of all the computers, and servers in the world, with the help of ISP's(internet service providers) they connect all of them together. What will I need to learn? well that depends in what direction you want to go in, you could be a programmer, webdesigner, webmaster, graphics artist, computer engineer, and the list goes on, for instance if you want to be a programmer you need to learn C languages like perl, C++, PHP, python and all the other important one's, if you want to be a webdesigner you should learn html, java, and flash, you get the idea. How do i learn? well reading and self teaching will be the best way for you, but if your rich like my buddy "chill" and "Oli" then you could buy courses and/or go to university jus j/k guys. anyway i suggest going to places like chapters or any other book store and buying books on your interests, also going to places like future shop, and buying the software you'll need like compliers, OS's, or whatever it is you need. just ask someone there for help if they cant help you speak to the manager and get that basterd fired.
  6. http://www.progenic.com/out/?id=library Blues Port Scanner ProPort v2.2 SuperScan v3.0 Net Scan Tools v4.2 LanSpy v2.0 Bitchin Threads v3.1 Trojan Hunter v1.5 SuperScan v4.0 Neotrace PRO v3.25 trial&crack Next page Angry IP Scanner v1.89 AOL IP Finde Domain Scanner ProxyPro v1.0.0 TCP View StealthWasp's Basic PortScanner v1.2 GateHound
  7. Creating A Ghosted Profile 1. Login with the name u want to be a ghost 2.Go to account info and click edit/create profile 3.Then create another profile...it can be any name u want 4.Then go to this site http://edit.profiles.yahoo.com/config/sele...om/&prof_delete 5.click confirm delete How to space a name How do u determine if the default is spaced? ( Please Assume that Fuck Me Now is the account you are attempting to modify ) 1. Log in your account at http://chat.yahoo.com/ 2. Click [ add / change profile ] 3. The name above where it says Yahoo ID is you default ( blue area for U.S.A. accounts ) The account has to have been made before 1999 to have a spaced default so don't assume that you can space any name. Now that you know how to determine a spaceable name I will explain how I space Mr-Lucas 1. I log in the account at http://chat.yahoo.com/ 2. I determine the default name which is Mr Lucas 3. There are other public profiles on the account. I will lose all the other accounts if I choose to space the name. But its worth it to me. if there is more then one profile on the account I would first delete Mr-Lucas' public profile then I would delete all the other profiles and I would have a spaced name. If the other public profiles were illegals I would lose them so make sure it is worth it to you. If they were not illegals you can remake them after space the name on the same or a separate account. If Mr-Lucas is the only profile I can delete Then I would make a new public profile first. Anything will do then I would delete Mr-Lucas' Public profile then I would delete the profile I just made. If the public profile Mr-Lucas can not be deleted but the default is spaced, please follow the next step. Restoring a name to default would apply to you. 4. Finished Product 5. http://profiles.yahoo.com/mr+lucas Info cracking explained This Section Explains The Concept Of Information Cracking Info Cracking is easy as pie its just getting the info that's a bitch. Yahoo! changed many things now a days so shit isn't easy like back then. Back then you can run a birthday cracker, zip code cracker & secret question cracker and the account would never get locked up nor would your ip get banned. You see now even if you were to use proxies the account would still get locked up from so many attempt on the zip, birthday or secret question. So I will explain the process of info cracking & you use this information how you please. Its the same concept however you do it. 1st step is you need the birth date of the account that you are trying to crack. 2nd you need the zip code/country. If the account was made after 1999 then you will need to answer the secret question on the account. I have a way to bypass the Secret Question part which I will share all my secrets so just listen up. You see it don't matter if a name is owned or not when you info crack. If you know the info then the name is yours. If the account was made prior to 1999 then when you go to request a new password the new password goes to the alternate email on the account. Theres only 2 ways ( possibly 3 ) to own this name. 1st is to know the alternate email 2nd run a Yahoo! Generated Password List on it. People have told me that the password list is only about 50,000 words That is bullshit. I have a complete list and it is over 1,000,000 words. You can crack a name using only about 50,000 words by just requesting a new password and running that partial list over and over, its all up to you. Some accounts when you reach the Secret Question stage ( accounts after 1999 ) there is the option to request a new password to the alternate email, if you do not know the secret question answer then you can request a new password and run a Yahoo! Generated Password List on it. If the account was made before 1999 and you know the alternate email then you can go to http://add.yahoo.com/fast/help/us/edit/cgi_feedback and request your alternate email to be changed. Just say you lost access to the account. 3rd way to get a name is to call Yahoo! with a bullshit story or something with partial information. I never went this route for a name but I know many people that had success with it. You must consider the long distance charges lol. http://edit.yahoo.com/config/eval_forgot_p...rtner=&.intl=us is the link to request a new password. Adding Pics to Spaced accounts 1. Log in the account at http://chat.yahoo.com/ 2. Click [ add / change profile ] 3. Click Edit Picture 4. Make sure it you don't get a page asking you for a 6 digit confirmation code. If so, then enter a code and do whatever so that when u return to the upload picture page it doesn't ask you for a code anymore. 5. While your at the page where you would normally upload a pic, do a right click & view source. 6. Count 20 spaces down on your html code & insert http://edit.briefcase.yahoo.com in between action=" and /config/ giving you action="http://edit.briefcase.yahoo.com/config/ 7. Locate everywhere on the test where your ID is & Put a + where you a space should be. Make sure you don't miss any spaces. 8. While you are doing all this keep the page where you viewed the source from open to keep your cookies enabled. Save as that text you just edited to anything.html 9. Execute the file & upload your desired picture. 10. Click upload & enjoy Please see the finished product by profiling the+unseen To point to a photo on the Web click point to a photo on the Web, then repeat step 6. You can also use the color scheme to go along with this Tweak. The script for changing colors when mouse over or off pic works as well.
  8. http://www.ebook.eu.org/files/HACK/ http://www.ebook.eu.org/files/CRACK/ http://www.ebook.eu.org/files/LINUX/ http://www.ebook.eu.org/files/SOLARIS/ http://www.ebook.eu.org/files/Crypto/ http://www.ebook.eu.org/files/WINDOWS/
  9. MaHaReT

    IRC

    si stai tu sa explici acela's lucru de 100 de ori la ?
  10. la primu program , ii dau dowland , si da errore la 98% , la al doile nu mi se dezarhiveaza ......... !
  11. si trebuia sa pui ditama'i textu care nu ajuta la nimic pt a sune ca in romania a aparut netu'n 94 ?
  12. MaHaReT

    blog

    "? am a turk?sh hacker" ii turk omu !! au daca ar sti cate injuraturi a luat (nu el personal , turci) ... !
  13. MaHaReT

    blog

    cu toateca nu trebuie sa posstez un post cu "ms , tks sau multzumesc" pt tine o fac MULTZAM FRATE !!
  14. Tutorial complet PHP http://www.etutoriale.ro/articles/93/1/Tut...ial-complet-PHP De Catalin Drogoreanu Publicat la 10.03.2006
  15. cred ca ceva ziare e sursa , mah da ar fi ceva , netu a aparut in 1994 , daca teai apucat de atunci de el ......................... clar ca sti kalumea .........
  16. http://www.oriceon.com/tutorial/descarca/t...torial_v2.1.pdf
  17. Administrarea utilizatorilor Controlul accesului Comezile GRANT si REVOKE Backup-ul bazelor de date Securitatea datelor Optimizarea MySQL http://www.itim-cj.ro/~jalobean/Cursuri/ww...dministrare.htm
  18. http://www.galuna.ro/docs/tutorial_linux.pdf "Meniu" Ce este linux ? De ce invatzam linux ? Primi pasii ! Configurarea sistemului ! Instalarea de noi programe ! Aplicatzii utile ! Setari de securitate ! Configurarea hddu'lui Configurarea avansata ! Serverul grafic x ! Instalarea si configurarea interfetzei grafice Configurarea caracterelor romanesti ! Setarea connexiuni de internet ! Coexistentza Linux-Windows Configurarea si instalarea KERNEL-ului Nota finala !! Sper sa fie bun de ceva ... si sa ajute pe careva !
  19. http://www.usb-drivers.com/drivers/259/259203.htm - motorola v220 [sami zici daca merge] http://forums.mobiledia.com/cgi-bin/redire...nload/29308.asp - motorola c650 [sami spui daca merge] si apropo , www.google.ro !!
  20. lo fi killerit vriunu ....
  21. pliktiseala , asa am zi sis io , cand ma fac boscalau , imi trag un laptop , o casa'n padure si o conexiune la net .... si traiesc fericit pana ............. mor !
  22. Thunder dc zici ca nu'i bun linku ? ca nu vezi DOWNLAND ?? asteapta 30 de secunde sau cat e , apoi itzi va aparea Click here to download file Vbulletin_3.5.x._By_Cro-Warez.rar (you can use download-accelerators and you can resume broken downloads) dai clic aoclo si boig dowland a , mentzionez ca acel lucru va aparea in josu chenarului verde !! bafta ... !
  23. la aia ma gandeam , bag frate io auzisem ca vatzi infiintzat recent ... cum naiba prin 2004 spargeatzi forumuri , si cu virusu ala ...
  24. http://www.tallsoft.com/image/MSNTrack.jpg - poza ! MSN Track Monitor is a msn spy and MSN sniffer to spy MSN chat on network. It is able to hack and monitor MSN conversations automatically. All intercepted messages can be saved as HTML files for later analysis. You can choose whether open the HTML files automatically after you save it manually. The re-check merchanism can ensure you get the whole super-large messages, and prevent you from getting the same message repeatedly.! MSN Track Monitor is very easy to make it to work. Just run the MSN Track Monitor on any computer on your network, and start it to capture. It will record all conversation from any PC on your network. You can show all messages in MSN Track Monitor directly or export these messages to HTML files in a directory for later analysis. Everything will be recorded without being detected. It is especially useful for administrators or parents, who need to know what their employees or kids are care and talking about with others. In your network, if the 2-layed devices is HUB, MSN Track Monitor will spy MSN messages. if the 2-layed devices is switch, you should do span or port monitor, and MSN Track Monitor will spy MSN messages too. If you have problems about setup span or port monitor, please mail to support@tallsoft.com You can download MSN Track Monitor and take a trial before order to make sure it works for you. Buy now online for only $49.85 USD. After you order the MSN Track Monitor, you will get the registration information and enjoy the full-feature unlimited program. with the new version of MSN Track Monitor 3.53, you can hide the system tray icon of MSN Track Monitor fully, No one know you are running the MSN Track Monitor. http://www.tallsoft.com/MSNTrack_setup.exe http://download.tallsoft.com/MSNTrack_setup.exe Sper sami repar si celelate greseli !! scuze !! si sa ma anuntze si pe mine careva daca merge sa "hackuesti" cu prog. asta !
×
×
  • Create New...