|
|
| Author |
Message |
countd
|
|
A note to real hackers
|
May 24 19:43 UTC 1998 |
I post this message to all elite hackers which may be reading this. (if any)
I am a newbie at this game called hacking. This is just to inform all elite
hackers or hackers who consider themselves elite that not all newbies are
lamers. Some of us hunger for knowladge, not for warez and progs and want
to learn about everything in the cyber world. I was introduced to this vast
world of hacking about a year ago and I feel as though I am making steady
progress. I am not here to brag about my accomplishments but only to inform
real hackers that all newbies are not lame ass code beggers that haunt you
from AOL and Progidy. I say this because this is the way I have been treated
in my brief life of hacking. I read everything I can about computers, whether
its C++, VB, HTML, or basic. Im trying to build a strong informational
backround so that I can understand VAX and UNIX...etc and how they work. For
those of you that may be reading this that are proggie lamers keep in mind
that you are the very people that make it increasingly difficult for me to
do what I love to do. I am also looking for a tutor. If anyone can spare
some time out of there busy day to help me out I would be great appreciative
for anything you could help me with. Good texts are hard to find and usually
give little or no information how things work. The newbies of today are the
hackers of tomorrow so let us keep a tradition that has been exsisting since
since the earliest modems and computers were created. Thank you for your time
and patience.
|
| 39 responses total. |
morpheus
|
|
response 1 of 39:
|
May 24 22:38 UTC 1998 |
Well, you have the right spirit :-)
But, what most people are going to tell you is, "Just go out and hack."
Okay, so you claim you don't know how. Well, start with an IP scanner,
a wardialer, or something like a telenet scanner. These all look for
systems to you play with, the wardialer scans every telephone number
you tell it to, and the others scan different kinds of computer nets
(internet/TCP/IP or packet switched nets such as SPRINTNET, TYMNET,
TELENET, AT&T IAS, AutoNet, etc.). Sometimes, you can find competitions
where you are actually encouraged to attack a system. (If anyone finds
such a competition, tell me, huh? I could really use some money and
fame and other such stuff <g> ;-)
Then, get as much information about a system as you can. If it gives a
PASSWORD: prompt, see what valid password formats are. Sometimes, it
will say something like INCORRECT PASSWORD if the try you made was a
potential password for the system, but not the actual one, whereas it
will say, INVALID PASSWORD if it was totally invalid for the system.
Look for these hints. A lot of systems give them, even suposedly secure
systems like AT&T's corporate/internal packet switched network, which
won't give a password prompt if you didn't enter a valid login, but
will give a password prompt if you did.
These sorts of things can narrow down the possible login/pass combos
significantly, to where it is very easy to get into a system. Remember,
as soon as you get past the firstline defense, and you have the
equivelant of a shell prompt, you run programs to exploit security
holes in the software, or download passwd files, or whatever else to
get sysadm level access (assuming you actually NEED such access.
remember, low-profile is GOOD).
When people attack systems over the internet, they usually follwo a
pattern: finger, sendmail, www, telnet. Each and every program and
operating system has its own security flaws, and many of these remain
un-patched. Hackers take advantage of this fact. There are literally
thousands of sendmail holes to take advantage of. Way to many to list.
Finger is used to find out information about the operating syste being
used (so you know what to try with the other attacks), user names,
superuseer names, etc. It was also used in times long past (about a
decade ago) as a direct method of attack: the fingerdaemon that ran on
the remote comptuer would execute any stuff over 256 characters that
was sent to it, sometimes even as root, depending on the
implementation. WWW has some unbeliebaly wierd exploits, in particular
using cgi-bin stuff, like for instance the phf exploit. Would you
believe that you can actually HACK FROM THE WEB? Neither would I,
except that the following actually *works* on a couple servers (i won't
name them, but the info is easy to find) at hofstra university in new
york.
http://censored-server.hofstra.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%
20/etc/passwd
Of course, that is pretty lame/tame. It is a well known exploit,
anybody can try it.
The real trick is coming up with clever shit on your own, and to do
that I suggest getting a copy of Linux, FreeBSD, OpenBSD, or something
similiar on your computer. Play around with it, see what works, what
doesn't and what files are created where when you do certain things.
See what the file permissions are (you _do_ know about file
permissions, right?). Linux is used a LOT in business now, surprisingly
even AMERITECH (the RBOC local to ann arbor, michgian) is using it. I
would give you the phone number for one of their systems that is using
it, but... it would go dead then :-) I will tell you it is in the 663
exchange, area code 734, and that you *really shold get a wardialer*.
|
morpheus
|
|
response 2 of 39:
|
May 24 22:40 UTC 1998 |
oh yeah, i should mention: it is easy to write a program to look for
these formulaic internet attacks. many companies now have them running
and the rest should.
|
delirium
|
|
response 3 of 39:
|
Jun 13 15:12 UTC 1998 |
I have a lot of information I would like to share with people that have have
the same interests as me so please drop me an e-mail or something at this bbs
|
sironi
|
|
response 4 of 39:
|
Jun 15 13:47 UTC 1998 |
I like 'net communities' for the reason i've known many people and many
interesting people.
Today I think that computers without networks are useless.
If delirium (and all the others) wants to teach me something i'll
gratefully learn.
luca_ (just another unix fan)
|
martha
|
|
response 5 of 39:
|
Jul 5 22:36 UTC 1998 |
i too would like too learn more on unix sys any help is appreciated
|
anubos
|
|
response 6 of 39:
|
Jul 24 19:57 UTC 1998 |
i think the first thing a potential hacker should do is read every thing you
can get your hands on
and learn the rules , no use learning to hack then get imprissoned ur first
time out, also read Mentors last words
|
g3ck0
|
|
response 7 of 39:
|
Feb 9 07:27 UTC 2000 |
When the hell did you ever think we actually gave a fuck about what you
think.????
|
manthac
|
|
response 8 of 39:
|
Dec 29 21:22 UTC 2000 |
I just got this idea that it would be really fucking cool if we formed a group
of hackers and we took over the internet one company at a time. That would
be fucking cool heh.
|
nudek
|
|
response 9 of 39:
|
Feb 16 15:18 UTC 2001 |
BELLA STORIA!!!!I'm a little nu hacker from italy and i'm trying to learn all
i can about "hacking" that i intend as a "good way of know"..Evrybody wants
to share knowledge and experience write me on this box...
|
mdzw
|
|
response 10 of 39:
|
Jun 13 18:45 UTC 2001 |
I am a newbie. I don't know much but if anyone wants to give me the name of
good books to read, sites to check out, or anything else that would be useful
in learning the sport of hacking just email me (please). I am eager to learn.
|
ed
|
|
response 11 of 39:
|
Jul 5 10:04 UTC 2001 |
easy does it newbies... not only do many companies have systems to detect for
common attacks (eg port scanning), they also keep logs of who tried to do it
and your ip address can easily be traced to your isp who will know which
account was using it at the time (try tracing your own ip on arin.net). don't
want you getting booted before you've started.
|
jhudson
|
|
response 12 of 39:
|
Jul 6 15:14 UTC 2001 |
Not if you sit behind a corperate firewall.
|
nitropye
|
|
response 13 of 39:
|
Aug 9 02:58 UTC 2001 |
Well on the subject of staying hidden...That is a common newb problem just
becauuse your sittin behind a computer doesn't mean your hidden from the law.
I tend to forget that and leave stupid traces but if you get into good habits
about keepin yourself hidden then you should be alset. For any newbs i also
suggest on your linux or unix or whatever system make a text for yuor own
benifit on all of the log files and how they work on your own system...this
will do a few things for you..tell you where all the log files are, learn
about the file structure, and drill into your mind GOOD habits on being
thoughrou..i don't have much more advice cause i consider myself a big'ol'
newbie too cause i believe we are all newbies..learnin neva stops
see yas around
@@NitroPye@@
|
klassh
|
|
response 14 of 39:
|
Jan 7 21:38 UTC 2002 |
Well next time you make a post man, remember that singnaling out elite hackers
to a topic will only get you those people you are trying to avoid. most
hackers of today call themselves system OPS, or proggramers.. not l33t d00dz.
Anyways! It is true that alot of the people learning to """""""hack"""""" are
pretty lame people. the script kiddies think hacking is only accessing remote
mechien via la crackola.. in other words cracking into peoples computers and
having "\fun/"
personaly i call that cracking, and not hacking.. just thought i might rant
about that for a bit ;-P
ahmm now i lost myself.. oh well. good luck with your quest for knowledge,
and your right, it does not come very easy anymore.. 1995 you would type in
"hack" on your search engine and get detailed documents on everything you
needed to know.
good place to start is happyhacker.org i think you probably read that site
every letter twice over.. its pretty old stuff.. but if your a clueless
neophyte check it out. and since i will probably forget i have a cyberspace
account again, i wont read any replys, email me here though. if need bee
pew i wrote a-lot.. some times i just..type.
|
freddude
|
|
response 15 of 39:
|
Dec 12 02:23 UTC 2002 |
I am also a newbie who has been trying to learn to hack. I read any tutorials
i can get my hands on, and I still don't think i have learned anything. I
know you get a port scanner and scan for open ports and all that stuff, but
i never understood what you do when you actually find a port, how do you get
in to it. I guess what i am really asking for is a site that has a list of
port weaknesses and stuff. I'll leave now, just E-mail me on this machine
if you fell you can help me. E-mail is freddude@grex.cyberspace.org
|
greenman
|
|
response 16 of 39:
|
Apr 22 20:17 UTC 2003 |
Ahm. I started 'hacking' a few years ago when I lost my patience with M$
Windows (BSOD, General Fault Error, Please spend large amounts of $$$ on new
M$ products, etc...). This caused me to turn to the Google Directory
(directory.google.com) to find a better OS.
On my journey I came across Linux, the FREE (yes, that's $0.00!!!), Open
Source (free source code), Operating System based on Unix. I found Linux very
safe, hackable (I don't mean weak, I mean enjoyable and challenging), and much
more reliable than Windoze. Linux does come with a GUI (Grahpical User
Interface) called the X Window System, making it much easier to learn than
it's parent OS, Unix.
Before I go on ranting about how good Linux and Unix are, I have to go back
to the start of it all...
->Unix was developed in the '60s as a way of connecting all the DARPA
computers into a network of informaiton during the cold war (about the only
positive outcome of the war). At first it only ran on expensive, power hungry,
top of the range workstations/mid-range supercomputers, but as the '80s came
by it become avaliable
|
carnaily
|
|
response 17 of 39:
|
Apr 23 05:36 UTC 2003 |
what you are talking about? Gyes? Hey! What a stupid
thing!!! You call yourself hackers!!!
CRACKERS!!! Not a hackers! I'm gonna read this item
one more time and tell to you who is who of you all!
Now I've never seen any hacker here on this bbs and
more! No one on the grex!
So respond me, what you've done to be called a hacker?
Second thing: WHO called you "hacker"?
Third... Hmm... Just first and second respond me...
:-)
I'm in waiting for responds too much!
|
carnaily
|
|
response 18 of 39:
|
Apr 23 06:20 UTC 2003 |
Ok... I'm taking back my words... Hmm... JUSTIN (anubos). You! hey real!
But just beginner. And have right way! ;-) Hehe
The man who called @@NitroPye@@ You are deep digging hacker... But I'm sure
you didn't do something real thing...
OW!!!! I see onlyone hacker here!!! Haha! klassh b tor! (klassh)
And zack adlington (greenman), I'm happy real! One more guy on the right way!
Wish you luck! You'll be real ELITE hacker after five year! You'll see! :-)))
Oh! I've really enjoyed here now! :-) Hehe! Nice to see you all!
P. S.
freddude... you'll never be hacker just listening some ports on remote
machine... You should know what is the port and read much-much more than you
can even thing about soft whith using this port opened. :-)
For example, if you have found opened 4000 port you can know this is ICQcorp.
Next thing is learning ICQ protocol! Next thing you can use just telnet
utility to talk to everyone! If you know protocol.... Heh... Protocals is a
power!!! Hmm.. Knowledge of protocols is twice power! Protocols is language
of software... This is the GOD! lol
|
abcdef
|
|
response 19 of 39:
|
Jul 3 16:06 UTC 2003 |
Nice English dude. heh
|
carnaily
|
|
response 20 of 39:
|
Nov 20 02:24 UTC 2003 |
Heh, I feel a little sarcasm in your cybervoise. ;-) I am really very bad in
english. Don't laught please... :-\
|
mrbrett
|
|
response 21 of 39:
|
Dec 10 23:26 UTC 2003 |
hmm...I am also a "newbie hacker" I supose, although I dont really consider
myself a hacker. I have got a good start on www.happyhacker.org, i saw that
link somwhere else in here and it is a good site to learn on. once you get
the hang of the stuff there I suggest going to www.hackthissite.org its a
great site with some fun wargames and stuff of that sort. lots of tutorials
on there by people who know what there talking about.
|
zyraf
|
|
response 22 of 39:
|
Mar 19 15:26 UTC 2004 |
http://www.google.com you will find there anything that you need...
dont try to change web page, learn about UNIX/Linux systems and how it works
its not a problem to compile some exploit and gain root on a machine, its
LAME!
and i am not a hacker, and i wont be
|
xdiman
|
|
response 23 of 39:
|
Apr 3 21:34 UTC 2004 |
Hello ppl. 3y3 m from Russia. I have no any hackerz/crackerz/phreakerz in our
town and only Net makes me feel happy. I can talk to many people. And I
wanna
to talk with you, not only with our Russian hackerz. We have no
girlz-hackerz, but in America there are many girlz who knows security well,
for example Susan Thunder. But I hate her, because he worked against Kevin.
Ok. Let's talk. 31337 - f0r3v3r!!!
|
foxworth
|
|
response 24 of 39:
|
Jun 28 18:42 UTC 2004 |
Alright people, I have something to say. I am quite new to this BBS but just
listen. (carnaily) has the right idea. (klassh) and (carnaily) are
basically the only two people I have seen here (although I did not read
_every_ post, so don't flame me) that are (as far as I can tell) anywhere
close to being a real Hacker. If you call yourself a Hacker, please refrain
from "3113t" overuse. It just makes you appear immature. Also, if you insist
on breaking into computers to destroy data and information, please refer to
yourself as a Cracker, not a Hacker, so that you don't give us _real_ Hackers
a bad name. For all you neophyte Hackers out there, I got my start by reading
a book called "HACKERS" by Steven Levy. That should give you a good background
of where Hackers came from, and an introduction to the Hacker Ethic (which
I will post later on). From there I went to Happyhacker.org. I also highly
reccomend "The Unofficial Guide to Ethical Hacking" by Ankit Fadia.
The Hacker Ethic:
Access to computers-and anything which might teach you something about the
way the world works-should be unlimited and total. Always yield to the
Hands-On Imperative!
All information should be free.
Mistrust Authority-Promote Decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees,
age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.
Now, I'm not saying "Don't break into computers" or anything. I mean, what
fun would that be? I _am_ saying "Don't destroy data or information". When
you break into a computer or website, tell an Admin about the breach and give
him suggestions to fix it. Hey, he might even invite you to hack his domain!
So go out there and show the world what a real Hacker is. We wield real
power, so use it intelligently.
|