Jump to content
shadyRO

N.A.S.A hack

Recommended Posts

SURSA :hack NASA nu deschide postul daca esti newbie

O sa va las ceva info de cum se hackeaza NASA.

Daca esti un newbie,nu stii sa inlantuiesti proxyuri sau nu stii extrem

de bine cum sa te protejezi ... nu are rost sa citesti textul ... nu te

ajuta la nimic.Nu uita ca NASA are legatura cu guvernul ... si guvernul

are bani si timp sa te caute ...

Primul pas e sa mergeti la www.arin.net

si sa cautati NASA,si vi se da o serie de ipuri.Atentie ... trebuie sa

luati informatia exacta ! (adica de ex nu luati in seama NASA

Technologies , mergeti direct la National Aeronaut.

NASA (NASA-45)

NASA (NASA-4

NASA (NASA-49)

NASA - Space Station Project Office (NSSPO)

NASA Ames Research Center (NARC)

NASA CTC (NASACT-1)

NASA Earth Science Data and Information System (NESDIS)

NASA Federal Credit (NFC-6)

NASA GLENN RESEARCH CENTER (NGRC)

NASA GLENN RESEARCH CENTER (#2) (NGRC2)

NASA Goddard Space Flight Center (NGSFC)

NASA Langley (NASALA)

NASA Langley Research Center (NLRC)

NASA Lewis Research Center (NLRC-1)

NASA Science Internet (NSI-1)

NASA Science Network (NSN-7)

Nasa Services (NASASE-1)

Nasa Services, Inc. (NASASE)

National Aeronautics and Space Administration (NASA)

NASA - John H. Glenn Research Centerat Lewis Field (ZN14-ARIN)

E-mail .gov +1-216-433-9850

NASA Abuse (NASAA-ARIN) E-mail +1-256-544-5623

NASA Ames Research Center, NAS Division M/S 258-6 (LG-ORG-ARIN) E-mail .gov +1-650-604-4444

NASA Information Services Network (NISN-ARIN) E-mail .gov +1-256-961-9397

NASA Langley Research Center (ZN4-ARIN) E-mail .gov +1-757-864-7799

NASA Langley Research Center (NC3-ORG-ARIN) E-mail .gov +1-757-864-7799

NASA, Langley Research Center (LRN2-ARIN) E-mail .gov +1-757-864-7799

NASA (AS1843) NASA-KSC-AS 1843 - 1848

NASA (AS270) PSCNI-AS 270

NASA Ames Research Center (AS771) NSN-RICE-AS 771

NASA Ames Research Center (AS372) NSN-AMES-AS 372

NASA Ames Research Center (AS24) AMES-NAS-GW 24

NASA Ames Research Center (AS10888) EI-AIX 10888

NASA Ames Research Center (AS1262) NSN-NCAR-AS-AS 1262

NASA Ames Research Center (AS1263) NSN-NCAR-AS-AS 1263

NASA Ames Research Center (AS23) RIACS-AS 23

NASA Ames Research Center (AS41) AMES 41

NASA Earth Science Data and Information System (AS22767) NASA-ESDIS-NET 22767

NASA Goddard Space Flight Center (AS1749) NASA-GSFC-AS 1749

NASA Goddard Space Flight Center (AS7847) NASA-HPCC-ESS 7847

NASA Langley Research Center (AS1254) NASA-LARC-AS 1254

NASA Lewis Research Center (AS1316) LERC-AS-AS 1316

NASA Science Internet (AS2143) NSN-FFIX-W 2143

NASA Science Internet (AS2142) NSI-FFIX-E 2142

NASA Science Network (AS297) NSN-UMD-AS 297

NASA NASA-NSSTC (NET-192-67-107-0-2) 192.67.107.0 - 192.67.108.255

NASA - Space Station Project Office NASA-SSFPO-ISO (NET-192-67-117-0-1) 192.67.117.0 - 192.67.117.255

NASA Ames Research Center NETBLK-NSI1 (NET-198-116-3-0-1) 198.116.3.0 - 198.116.3.255

NASA Ames Research Center ARC-OMM (NET-198-120-8-0-1) 198.120.8.0 - 198.120.8.255

NASA Ames Research Center NETBLK-NSI-1 (NET-198-116-7-0-1) 198.116.7.0 - 198.116.7.255

NASA Ames Research Center NETBLK-NSI2 (NET-198-116-2-0-1) 198.116.2.0 - 198.116.2.255

NASA CTC RESO-216-204-34-24 (NET-216-204-34-24-1) 216.204.34.24 - 216.204.34.31

NASA Federal Credit UU-63-88-86-80 (NET-63-88-86-80-1) 63.88.86.80 - 63.88.86.95

NASA GLENN RESEARCH CENTER TAC-66-181-41-72 (NET-66-181-41-72-1) 66.181.41.72 - 66.181.41.79

NASA GLENN RESEARCH CENTER TAC-66-181-42-200 (NET-66-181-42-200-1) 66.181.42.200 - 66.181.42.207

NASA GLENN RESEARCH CENTER TAC-66-181-38-128 (NET-66-181-38-128-1) 66.181.38.128 - 66.181.38.135

NASA GLENN RESEARCH CENTER (#2) TAC-66-181-39-80 (NET-66-181-39-80-1) 66.181.39.80 - 66.181.39.87

NASA Goddard Space Flight Center GSFC14 (NET-192-225-73-0-1) 192.225.73.0 - 192.225.73.255

NASA Goddard Space Flight Center GSFC20 (NET-192-225-79-0-1) 192.225.79.0 - 192.225.79.255

NASA Goddard Space Flight Center GSFC37 (NET-198-119-0-0-1) 198.119.0.0 - 198.119.63.255

NASA Langley NASA-LANGLEY-3 (NET-216-54-42-0-1) 216.54.42.0 - 216.54.42.255

NASA Langley NASA-LANGLEY-2 (NET-216-54-41-0-1) 216.54.41.0 - 216.54.41.255

NASA Langley NASA-LANGLEY-1 (NET-216-54-40-0-1) 216.54.40.0 - 216.54.40.255

NASA Langley NASA-LANGLEY-4 (NET-216-54-43-0-1) 216.54.43.0 - 216.54.43.255

NASA Langley NASA-LANGLEY-5 (NET-216-54-44-0-1) 216.54.44.0 - 216.54.44.255

NASA Langley NASA-LANGLEY-6 (NET-216-54-45-0-1) 216.54.45.0 - 216.54.45.255

NASA Langley NASA-LANGLEY-7 (NET-216-54-46-0-1) 216.54.46.0 - 216.54.46.255

NASA Langley NASA-LANGLEY-8 (NET-216-54-47-0-1) 216.54.47.0 - 216.54.47.255

NASA Langley Research Center LARCNET-3 (NET-192-239-114-0-1) 192.239.114.0 - 192.239.114.25 5

NASA Langley Research Center LARCNET-5 (NET-192-239-116-0-1) 192.239.116.0 - 192.239.116.25 5

NASA Langley Research Center LARCNET-7 (NET-192-239-118-0-1) 192.239.118.0 - 192.239.118.25 5

NASA Langley Research Center LARCNET-6 (NET-192-239-117-0-1) 192.239.117.0 - 192.239.117.25 5

NASA Langley Research Center LARCNET-8 (NET-192-239-119-0-1) 192.239.119.0 - 192.239.119.25 5

NASA Langley Research Center LARCNET-2 (NET-192-239-113-0-1) 192.239.113.0 - 192.239.113.25 5

NASA Langley Research Center LARCNET-4 (NET-192-239-115-0-1) 192.239.115.0 - 192.239.115.25 5

NASA Science Internet SONDRESTROM (NET-192-136-69-0-1) 192.136.69.0 - 192.136.69.255

Nasa Services ERSD-13162674 (NET-66-47-196-184-1) 66.47.196.184 - 66.47.196.191

Nasa Services, Inc. IEN-NASAINC (NET-64-248-117-32-1) 64.248.117.32 - 64.248.117.63

NASA NOVA-200 (NET-207-227-126-32-1) 207.227.126.32 - 207.227.126.47

NASA AMES RESCH CTR SBCIS-101731-15910 (NET-66-123-29-144-1) 66.123.29.144 - 66.123.29.151

NASA Convection and Moisture Experiment CAMEX4 (NET-198-116-14-0-1) 198.116.14.0 - 198.116.14.255

NASA Federal Credit Union DIGEX-NFCU-BLK1 (NET-206-205-36-0-1) 206.205.36.0 - 206.205.36.255

Nasa Tech SBCIS-101730-112853 (NET-65-68-41-16-1) 65.68.41.16 - 65.68.41.23

# ARIN Whois database, last updated 2002-10-24 19:05

# Enter ? for additional hints on searching ARIN's Whois database.

Prima

impresie e ca se folosesc niste ranguri de ip enorme ... dar in

realitate nu se folosesc toate ipurile asociate ... ne informeaza

aproximativ unde sunt localizate sistemele NASA.

Pt a continua aveti

nevoie de LANguard Network Scanner

(http://www.tucows.com/preview/213719) ... puneti rangul de ipuri si

scanati.Dupa ceva timp va apar cam 8 sisteme active.Asa arata outputul

unuia din ele (in cazul asta se numeste StarGate ... ce original ... puff ... )

198.116.11.45

Username: Stargate

Operating System: Windows NT 4.0

Open Ports: 21 - 135 - 139

LAN Manager : NT LAN Manager 4.0

Domain : WORKGROUP

Operating System : Windows NT 4.0

Open Ports (3)

21 [ Ftp => File Transfer Protocol ]

220 FTP Software, Inc. Win32 FTP Server 5,0,0,116 ready.

135 [ epmap => DCE endpoint resolution ]

139 [ Netbios-ssn => NETBIOS Session Service ]

[/madfran]

E un sistem de la Universitatea din Rhode Island !

[madfran/]

ipul

care apare e al sistemului "prins" , si avem si log in-ul.Insa

informatia mai improtanta : in cazul asta avem de aface cu un windows

nt 4.0 , si porturile deschise.

Pasul urmator ar fi un atac prin

netbios.Pt asta puteti folosi Shadow Scan (cred ca l-am postat eu pe la

programe ... cautati ..).Si la Shadwo S. sa fie activata optiunea

NetBios Auditing Tool,si faceti un atac brute-force pt a scoate

passul... sigur va iese.Si inafara de StarGate , am mai gasit un user

"Administrator" ... asa ca nu cred ca dureaza multa scoaterea passului

, vazand log inul .Deasemenea se poate folosi Red Button ,care

functioneaza in WinNT 3.5x cat si in 4.0 .Partea cu exploiturile o sar

, dar fac o mica explicatie de fiecare (Red Button, RDS,

Unicode, Null session, Legion ):

-Red Button : Intri fara log in si pass , folosind porturile 137,138 si 139.

-RDS

Microsoft IIS : protocol http ; vulnerabilitatea RDSului se obtine prin

Data Factory din Remote Data Service,care e un component MSDAC ...si

asta implica acces la distanta la date default.Un client fara

autorizare are permis sa acceseze OLE DB din server.Descriere tehnica :

-Folosind metoda Head si Post : creaza un GET la /msdac/msadcs.dll

-Se codifica zecimal chemarile la URL

-Schimband Mime (original)

-Creand o tabla .MDB in loc de numele original

-Unicode : protocol http ... e un bug destul de celebru , si prostesc

-Null

session : protocol NetBios si NetBEUI (asta ar fi exploitul care ar

trebui sa-l folositi impotriva celor de la NASA) ... comanda ar fi :

Net use \\xxx.xxx.xxx.xxx\IPC$ "/user:"

(pt

asta puteti folosi Legion 2.1 sau Cerberus Internet Scanner) ...

Cerberus Internet Scanne e mai efectiv (cea mai efectiva metoda fiind

prin netbios)... poati ataca prin metodele spuse mai sus ... dar si

Getsvrinfo, GNITvse rc1, NB4, NBName, Net Fizz, NtInfoScan,

Winfingerprint 2.2.6 sau Winfo 1.4.

Pt a intra in sistem aveti

nevoie de Essential Net tools... scrieti un rang de ipuri (ex

198.116.11.45 - 198.116.11.80 ) ... si va apar mai multe recursuri ...

dati click stanga si alegeti open computer.Daca nu e posibil folositi

PQwak pt crackeat passul.

************************

Dupa cum ati

putut vedea , s-au folosit tehnici simple ,dar letale.Deasemenea ramane

demonstrat ca oricat de importante ar fi sistemele , nu inceteaza sa

fie vulnerabile ... asadar mereu o sa fie posibil sa practicam hackul

pe FBI , pentagon , NASA ... etc. ... si nu e nevoie ca atacantul sa

fie expert ...

salut!

P.S. : NU MA FAC RESPONSABIL DE CUM FOLOSITI INFORMATIA PE CARE AM POSTATO ...

Link to comment
Share on other sites

Warning: Something's Not Right Here!

gabyyhackerteam.3xforum.ro contains content from support.3xforum.ro, a site known to distribute malware. Your computer might catch a virus if you visit this site.

Google has found malicious software may be installed onto your computer if you proceed. If you've visited this site in the past or you trust this site, it's possible that it has just recently been compromised by a hacker. You should not proceed, and perhaps try again tomorrow or go somewhere else.

We have already notified support.3xforum.ro that we found malware on the site. For more about the problems found on support.3xforum.ro, visit the Google Safe Browsing diagnostic page.

Vejnicul chrome:))

Dute si paste fericit!:)

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.


×
×
  • Create New...