No Next Item No Next Conference Can't Favor Can't Forget Item List Conference Home Entrance    Help
View Responses


Grex Cyberpunk Item 76: A note to real hackers
Entered by countd on Sun May 24 19:43:25 UTC 1998:

I post this message to all elite hackers which may be reading this. (if any)
I am a newbie at this game called hacking.  This is just to inform all elite
hackers or hackers who consider themselves elite that not all newbies are
lamers.  Some of us hunger for knowladge, not for warez and progs and want
to learn about everything in the cyber world. I was introduced to this vast
world of hacking about a year ago and I feel as though I am making steady
progress.  I am not here to brag about my accomplishments but only to inform
real hackers that all newbies are not lame ass code beggers that haunt you
from AOL and Progidy. I say this because this is the way I have been treated
in my brief life of hacking.  I read everything I can about computers, whether
its C++, VB, HTML, or basic.  Im trying to build a strong informational
backround so that I can understand VAX and UNIX...etc and how they work.  For
those of you that may be reading this that are proggie lamers keep in mind
that you are the very people that make it increasingly difficult for me to
do what I love to do.  I am also looking for a tutor.  If anyone can spare
some time out of there busy day to help me out I would be great appreciative
for anything you could help me with.  Good texts are hard to find and usually
give little or no information how things work.  The newbies of today are the
hackers of tomorrow so let us keep a tradition that has been exsisting since
since the earliest modems and computers were created.  Thank you for your time
and patience.

39 responses total.



#1 of 39 by morpheus on Sun May 24 22:38:47 1998:

Well, you have the right spirit :-)

But, what most people are going to tell you is, "Just go out and hack." 

Okay, so you claim you don't know how. Well, start with an IP scanner, 
a wardialer, or something like a telenet scanner. These all look for 
systems to you play with, the wardialer scans every telephone number 
you tell it to, and the others scan different kinds of computer nets 
(internet/TCP/IP or packet switched nets such as SPRINTNET, TYMNET, 
TELENET, AT&T IAS, AutoNet, etc.). Sometimes, you can find competitions 
where you are actually encouraged to attack a system. (If anyone finds 
such a competition, tell me, huh? I could really use some money and 
fame and other such stuff <g> ;-)

Then, get as much information about a system as you can. If it gives a 
PASSWORD: prompt, see what valid password formats are. Sometimes, it 
will say something like INCORRECT PASSWORD if the try you made was a 
potential password for the system, but not the actual one, whereas it 
will say, INVALID PASSWORD if it was totally invalid for the system. 
Look for these hints. A lot of systems give them, even suposedly secure 
systems like AT&T's corporate/internal packet switched network, which 
won't give a password prompt if you didn't enter a valid login, but 
will give a password prompt if you did. 

These sorts of things can narrow down the possible login/pass combos 
significantly, to where it is very easy to get into a system. Remember, 
as soon as you get past the firstline defense, and you have the 
equivelant of a shell prompt, you run programs to exploit security 
holes in the software, or download passwd files, or whatever else to 
get sysadm level access (assuming you actually NEED such access. 
remember, low-profile is GOOD).

When people attack systems over the internet, they usually follwo a 
pattern: finger, sendmail, www, telnet. Each and every program and 
operating system has its own security flaws, and many of these remain 
un-patched. Hackers take advantage of this fact. There are literally 
thousands of sendmail holes to take advantage of. Way to many to list. 
Finger is used to find out information about the operating syste being 
used (so you know what to try with the other attacks), user names, 
superuseer names, etc. It was also used in times long past (about a 
decade ago) as a direct method of attack: the fingerdaemon that ran on 
the remote comptuer would execute any stuff over 256 characters that 
was sent to it, sometimes even as root, depending on the 
implementation. WWW has some unbeliebaly wierd exploits, in particular 
using cgi-bin stuff, like for instance the phf exploit. Would you 
believe that you can actually HACK FROM THE WEB? Neither would I, 
except that the following actually *works* on a couple servers (i won't 
name them, but the info is easy to find) at hofstra university in new 
york.

http://censored-server.hofstra.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%
20/etc/passwd 

Of course, that is pretty lame/tame. It is a well known exploit, 
anybody can try it.

The real trick is coming up with clever shit on your own, and to do 
that I suggest getting a copy of Linux, FreeBSD, OpenBSD, or something 
similiar on your computer. Play around with it, see what works, what 
doesn't and what files are created where when you do certain things. 
See what the file permissions are (you _do_ know about file 
permissions, right?). Linux is used a LOT in business now, surprisingly 
even AMERITECH (the RBOC local to ann arbor, michgian) is using it. I 
would give you the phone number for one of their systems that is using 
it, but... it would go dead then :-) I will tell you it is in the 663 
exchange, area code 734, and that you *really shold get a wardialer*. 


#2 of 39 by morpheus on Sun May 24 22:40:30 1998:

oh yeah, i should mention: it is easy to write a program to look for 
these formulaic internet attacks. many companies now have them running 
and the rest should.


#3 of 39 by delirium on Sat Jun 13 15:12:09 1998:

I have a lot of information I would like to share with people that have have
the same interests as me so please drop me an e-mail or something at this bbs



#4 of 39 by sironi on Mon Jun 15 13:47:48 1998:

I like 'net communities' for the reason i've known many people and many
interesting people.
Today I think that computers without networks are useless.
If delirium (and all the others) wants to teach me something i'll
gratefully learn.

luca_ (just another unix fan)


#5 of 39 by martha on Sun Jul 5 22:36:56 1998:

i too would like too learn more on unix sys any help is appreciated


#6 of 39 by anubos on Fri Jul 24 19:57:32 1998:

i think the first thing a potential hacker should do is read every thing you
can get your hands on 
and learn the rules , no use learning to hack then get imprissoned ur first
time out, also read Mentors last words 


#7 of 39 by g3ck0 on Wed Feb 9 07:27:53 2000:

When the hell did you ever think we actually gave a fuck about what you
think.????


#8 of 39 by manthac on Fri Dec 29 21:22:25 2000:

I just got this idea that it would be really fucking cool if we formed a group
of hackers and we took over the internet one company at a time. That would
be fucking cool heh.


#9 of 39 by nudek on Fri Feb 16 15:18:22 2001:

BELLA STORIA!!!!I'm a little nu hacker from italy and i'm trying to learn all
i can about "hacking" that i intend as a "good way of know"..Evrybody wants
to share knowledge and experience write me on this box...


#10 of 39 by mdzw on Wed Jun 13 18:45:51 2001:

I am a newbie.  I don't know much but if anyone wants to give me the name of
good books to read, sites to check out, or anything else that would be useful
in learning the sport of hacking just email me (please).  I am eager to learn.


#11 of 39 by ed on Thu Jul 5 10:04:55 2001:

easy does it newbies... not only do many companies have systems to detect for
common attacks (eg port scanning), they also keep logs of who tried to do it
and your ip address can easily be traced to your isp who will know which
account was using it at the time (try tracing your own ip on arin.net). don't
want you getting booted before you've started.


#12 of 39 by jhudson on Fri Jul 6 15:14:59 2001:

Not if you sit behind a corperate firewall.


#13 of 39 by nitropye on Thu Aug 9 02:58:40 2001:

Well on the subject of staying hidden...That is a common newb problem just
becauuse your sittin behind a computer doesn't mean your hidden from the law.
I tend to forget that and leave stupid traces but if you get into good habits
about keepin yourself hidden then you should be alset.  For any newbs i also
suggest on your linux or unix or whatever system make a text for yuor own
benifit on all of the log files and how they work on your own system...this
will do a few things for you..tell you where all the log files are, learn
about the file structure, and drill into your mind GOOD habits on being
thoughrou..i don't have much more advice cause i consider myself a big'ol'
newbie too cause i believe we are all newbies..learnin neva stops
see yas around
@@NitroPye@@


#14 of 39 by klassh on Mon Jan 7 21:38:21 2002:

Well next time you make a post man, remember that singnaling out elite hackers
to a topic will only get you those people you are trying to avoid. most
hackers of today call themselves system OPS, or proggramers.. not l33t d00dz.

Anyways! It is true that alot of the people learning to """""""hack"""""" are
pretty lame people. the script kiddies think hacking is only  accessing remote
mechien via la crackola.. in other words cracking into peoples computers and
having "\fun/"

personaly i call that cracking, and not hacking.. just thought i might rant
about that for a bit ;-P

ahmm now i lost myself.. oh well. good luck with your quest for knowledge,
and your right, it does not come very easy anymore.. 1995 you would type in
"hack" on your search engine and get detailed documents on everything you
needed to know. 

good place to start is happyhacker.org i think you probably read that site
every letter twice over.. its pretty old stuff.. but if your a clueless
neophyte check it out. and since i will probably forget i have a cyberspace
account again, i wont read any replys, email me here though. if need bee


pew i wrote a-lot.. some times i just..type.


#15 of 39 by freddude on Thu Dec 12 02:23:09 2002:

I am also a newbie who has been trying to learn to hack.  I read any tutorials
i can get my hands on, and I still don't think i have learned anything.  I
know you get a port scanner and scan for open ports and all that stuff, but
i never understood what you do when you actually find a port, how do you get
in to it.  I guess what i am really asking for is a site that has a list of
port weaknesses and stuff.  I'll leave now, just E-mail me on this machine
if you fell you can help me.  E-mail is freddude@grex.cyberspace.org


#16 of 39 by greenman on Tue Apr 22 20:17:15 2003:

Ahm. I started 'hacking' a few years ago when I lost my patience with M$
Windows (BSOD, General Fault Error, Please spend large amounts of $$$ on new
M$ products, etc...). This caused me to turn to the Google Directory
(directory.google.com) to find a better OS.

On my journey I came across Linux, the FREE (yes, that's $0.00!!!), Open
Source (free source code), Operating System based on Unix. I found Linux very
safe, hackable (I don't mean weak, I mean enjoyable and challenging), and much
more reliable than Windoze. Linux does come with a GUI (Grahpical User
Interface) called the X Window System, making it much easier to learn than
it's parent OS, Unix.

Before I go on ranting about how good Linux and Unix are, I have to go back
to the start of it all...

->Unix was developed in the '60s as a way of connecting all the DARPA
computers into a network of informaiton during the cold war (about the only
positive outcome of the war). At first it only ran on expensive, power hungry,
top of the range workstations/mid-range supercomputers, but as the '80s came
by it become avaliable


#17 of 39 by carnaily on Wed Apr 23 05:36:07 2003:

what you are talking about? Gyes? Hey! What a stupid
thing!!! You call yourself hackers!!!
CRACKERS!!! Not a hackers! I'm gonna read this item
one more time and tell to you who is who of you all!
Now I've never seen any hacker here on this bbs and
more! No one on the grex!

So respond me, what you've done to be called a hacker?
Second thing: WHO called you "hacker"?
Third... Hmm... Just first and second respond me...
 :-)
I'm in waiting for responds too much!


#18 of 39 by carnaily on Wed Apr 23 06:20:11 2003:

Ok... I'm taking back my words... Hmm... JUSTIN (anubos). You! hey real!
But just beginner. And have right way! ;-) Hehe

The man who called @@NitroPye@@ You are deep digging hacker... But I'm sure
you didn't do something real thing...

OW!!!! I see onlyone hacker here!!! Haha! klassh b tor! (klassh)

And zack adlington (greenman), I'm happy real! One more guy on the right way!
Wish you luck! You'll be real ELITE hacker after five year! You'll see! :-)))

Oh! I've really enjoyed here now! :-) Hehe! Nice to see you all!

P. S.
    freddude... you'll never be hacker just listening some ports on remote
machine... You should know what is the port and read much-much more than you
can even thing about soft whith using this port opened. :-)
For example, if you have found opened 4000 port you can know this is ICQcorp.
Next thing is learning ICQ protocol! Next thing you can use just telnet
utility to talk to everyone! If you know protocol.... Heh... Protocals is a
power!!! Hmm.. Knowledge of protocols is twice power! Protocols is language
of software... This is the GOD! lol


#19 of 39 by abcdef on Thu Jul 3 16:06:23 2003:

Nice English dude. heh


#20 of 39 by carnaily on Thu Nov 20 02:24:15 2003:

Heh, I feel a little sarcasm in your cybervoise. ;-) I am really very bad in
english. Don't laught please... :-\


#21 of 39 by mrbrett on Wed Dec 10 23:26:45 2003:

hmm...I am also a "newbie hacker" I supose, although I dont really consider
myself a hacker. I have got a good start on www.happyhacker.org, i saw that
link somwhere else in here and it is a good site to learn on. once you get
the hang of the stuff there I suggest going to www.hackthissite.org its a
great site with some fun wargames and stuff of that sort. lots of tutorials
on there by people who know what there talking about. 


#22 of 39 by zyraf on Fri Mar 19 15:26:00 2004:

http://www.google.com you will find there anything that you need...
dont try to change web page, learn about UNIX/Linux systems and how it works
its not a problem to compile some exploit and gain root on a machine, its
LAME!
and i am not a hacker, and i wont be


#23 of 39 by xdiman on Sat Apr 3 21:34:26 2004:

Hello ppl. 3y3 m from Russia. I have no any hackerz/crackerz/phreakerz in our
 town and only Net makes me feel happy. I can talk to  many people. And I
wanna
 to talk with you, not only with our Russian hackerz. We have no
 girlz-hackerz, but in America there are many girlz who knows security well,
 for example Susan Thunder. But I hate her, because he worked against Kevin.
 Ok. Let's talk. 31337 - f0r3v3r!!!


#24 of 39 by foxworth on Mon Jun 28 18:42:43 2004:

Alright people, I have something to say.  I am quite new to this BBS but just
listen.  (carnaily) has the right idea.  (klassh) and (carnaily) are
basically the only two people I have seen here (although I did not read
_every_ post, so don't flame me) that are (as far as I can tell) anywhere
close to being a real Hacker.  If you call yourself a Hacker, please refrain
from "3113t" overuse.  It just makes you appear immature.  Also, if you insist
on breaking into computers to destroy data and information, please refer to
yourself as a Cracker, not a Hacker, so that you don't give us _real_ Hackers
a bad name.  For all you neophyte Hackers out there, I got my start by reading
a book called "HACKERS" by Steven Levy. That should give you a good background
of where Hackers came from, and an introduction to the Hacker Ethic (which
I will post later on).  From there I went to Happyhacker.org.  I also highly
reccomend "The Unofficial Guide to Ethical Hacking" by Ankit Fadia.
The Hacker Ethic:

Access to computers-and anything which might teach you something about the
way the world works-should be unlimited and total.  Always yield to the
Hands-On Imperative!

All information should be free.

Mistrust Authority-Promote Decentralization.

Hackers should be judged by their hacking, not bogus criteria such as degrees,
age, race, or position.

You can create art and beauty on a computer.

Computers can change your life for the better.

   Now, I'm not saying "Don't break into computers" or anything.  I mean, what
fun would that be?  I _am_ saying "Don't destroy data or information".  When
you break into a computer or website, tell an Admin about the breach and give
him suggestions to fix it.  Hey, he might even invite you to hack his domain!
So go out there and show the world what a real Hacker is.  We wield real
power, so use it intelligently.


#25 of 39 by roar on Tue Jun 29 21:51:31 2004:

You are right! thats what it should look like...
knowledge is the power... if you want to be a hacker dont ask how to hack...
its learning and learning, if you know how everything work and how to make
it work better, you are on good way... dont think how to change someones web
page, its stupid
hmm my post is also stupid propably :)


#26 of 39 by foxworth on Tue Jun 29 22:04:51 2004:

No man, your post is not stupid, you have the right idea.  The only thing I
disagree with is if you want to be a hacker, _do_ ask how to hack, but don't
just go "hey, I want to learn hacking, teach me." that just sounds stupid.
Instead, ask a Hacker how he got started and go from there.  Anyway, I'm
working on a website devoted to everything Hackerish and geeky, but it's under
development.  http://42ndfloor.bravehost.com to get there.  Drop me some
mail on grix if you want to, but I'd like to discuss this topic more in this
thread, so speak up!


#27 of 39 by roar on Tue Jun 29 22:12:09 2004:

wow 2 ppl here at once
hacking is not something that you can easily learn, its not like 'how to make
a coffee?', and i think its not possible to learn hack... hacking is
everything :) learn about computers, UNIX, Linux and other systems, and
internet... many people want to break into computer but they dont know what
they can do there... they even dont know what is root account, or how to use
ftp... 
hmm once againt this bbs is waking up...


#28 of 39 by foxworth on Tue Jun 29 23:46:08 2004:

Wakey-wakey!  Anyway, all you Hacker-to-be's out there, just LEARN. that is
all there is to it.  It's not hard at all.  But never forget where we came
from, and to that end most of you don't.  Don't flame me, it's true.  You can
fix that problem by reading HACKERS by Steven Levy, and you can find a free
downloadable version at http://textual.net/access.gutenberg/Steven.Levy
See, now you have no excuse.  So go out there and LEARN! *grins*


#29 of 39 by foxworth on Wed Jun 30 18:05:02 2004:

Hey, I want to tell you all about a bunch of punks that just almost got me
in trouble with my college.  These wankers call themselves Cyberarmy.  At
first, I thougt they were cool.  You have a rank and you have to play a game
in order to gain rank.  Well, if you don't win the game, it trys to install
a trojan on your box.  Just letting you all know.


#30 of 39 by zyraf on Wed Jun 30 23:03:18 2004:

i've looked at cyberarmy.com/crash.shtml, and it doesnt want to load a trojan,
just crash the browser (most things for IEshit). if you have windoze be avare,
everything there can be turned against you

hmm great, bbs is getting alive again, yeah!


#31 of 39 by foxworth on Thu Jul 1 17:41:17 2004:

Yeah, well a Trojan's what I get for being a paranoid nutcase and only using
public computers so that if someone gets ticked off with me they can't harm
my oh-so-precious box that I love so much. *wink*


#32 of 39 by zyraf on Thu Jul 1 18:02:50 2004:

stop using windoze, and you wont get anything from mail or www (its
theoretically possible, but hard to do, and it ont be like blaster :) )
i went through first (or second?) level, and i can get into nice amount of
things, but usually old. and i dont know how to get to next level..


#33 of 39 by foxworth on Thu Jul 1 18:23:19 2004:

Would you stop telling me to stop using windoze?  I already told you, I use
PUBLIC COMPUTERS.  I have no control over what OS they choose to use, alright?
And at home, I use DOS... for now, until I get a second box running for
FreeDOS.


#34 of 39 by zyraf on Thu Jul 1 18:32:11 2004:

ok, but at home you can use Linux, and you wint have those problem, or you
can browse www from shell (Lynx or Links), this should prevent many things
(viruses/trojans)


#35 of 39 by foxworth on Tue Jul 6 18:02:52 2004:

Oy vey.  At home, I would be too busy playing UT or Krondor to be surfing the
Internet.  Or maybe I'd be out with my Girlfriend...


#36 of 39 by zyraf on Tue Jul 6 18:10:26 2004:

playing games? i thought computers are not for that... and thats why you NEED
windoze


#37 of 39 by foxworth on Tue Jul 6 19:21:52 2004:

Hey man,  I have not played UT for a long time, I just mentioned it beacuse
it is one of my faves, and Krondor is DOS.(DOS is the only good thing that
ever came out of Microsoft)  Anyway, why should computers not be for games?
I mean, what would our culture be like without Pong, MUD's, MUSH's, and the
rest.  No, the true statement shoulld be that computers aren't _only_ for
games.  Now, can we please get back on topic?  All this scrutinizing my
computer habits is a trifle annoying.


#38 of 39 by zyraf on Tue Jul 6 23:45:23 2004:

ok, but if you dont have time for other things its bad. and i like DOS and
few good games (DOOM! Commander Keen), and i may say the best games were made
for it and for older things (atari, commodore...), today games are not like
that


#39 of 39 by iohmms on Thu Apr 19 06:32:41 2007:

I have not played any games in a while. When I changed to Linux that was the
least of my worries.  I do not think that I am going to play them for quite
a while as well. It is a waste of time just like hacking is but at least with
hacking you learn some thing about computers.


Response not possible - You must register and login before posting.

No Next Item No Next Conference Can't Favor Can't Forget Item List Conference Home Entrance    Help

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss