Date post: | 02-Jun-2018 |
Category: |
Documents |
Upload: | lulzim-brucaj |
View: | 215 times |
Download: | 0 times |
of 25
8/10/2019 A Novice's Guide to Hacking 2004
1/25
+++++++++++++++++++++++++++++++++++++++++++
++++++
| The LOD/H Presents |
++++++++++++++++ +++++++++++++++
+
\ A Novice's Guide to Hacking- !!" edition /
\ #########################################
/
\ $% /
\ The &entor /
\ Legion o Doo(/Legion o Hackers /
\ /
\ Dece($er) !!" /
\ &err% *hrist(as ver%one, /
\+++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++/
| The author here$% grants .er(ission to re.roduce) redistri$ute) |
| or incude this 0e in %our g-0e section) eectronic or .rint |
| ne1etter) or an% other or( o trans(ission that %ou choose) as |
| ong as it is ke.t intact and 1hoe) 1ith no o((issions) deet- |
| ions) or changes2 3*4 The &entor- Phoeni5 Pro6ect Productions |
| !!7)!!" 888/888-8888 |
9ntroduction: The ;tate o the Hack
8/10/2019 A Novice's Guide to Hacking 2004
2/25
the act that there hasn't $een a good introductor% 0e 1ritten or a$soute
$eginners since $ack 1hen &ark Ta$as 1as cranking the( out 3and a(ost
ever%one 1as a $eginner,4 The Arts o Hacking and Phreaking have changed
radica% since that ti(e) and as the =!'s a..roach) the hack/.hreak co((unit%
has recovered ro( the ;u((er '>? $usts 36ust ike it recovered ro( the @a
'> $usts) and ike it 1i a1a%s recover ro( atte(.ts to shut it do1n4) and
the .rogressive (edia 3ro( Beait% Hackers (agaCine to iia( Gi$son and
Eruce ;tering's c%$er.unk a$es o hackerdo(4 is starting to take notice
o us or the 0rst ti(e in recent %ears in a .ositive ight2
Fnortunate%) it has aso gotten (ore dangerous since the ear% >!'s2
Phone co.s have (ore resources) (ore a1areness) and (ore inteigence that
the%
e5hi$ited in the .ast2 9t is $eco(ing (ore and (ore dicut to survive as
a hacker ong enough to $eco(e skied in the art2 To this end this 0e
is dedicated 2 9 it can he. so(eone get started) and he. the( survive
to discover ne1 s%ste(s and ne1 inor(ation) it 1i have served it's .ur.ose)
and served as a .artia re.a%(ent to a the .eo.e 1ho he.ed (e out 1hen 9
1as a $eginner2
*ontents
8/10/2019 A Novice's Guide to Hacking 2004
3/25
Part One: The Easics
8/10/2019 A Novice's Guide to Hacking 2004
4/25
that 1i vaidate %ou2
J92 Do not hack govern(ent co(.uters2 Kes) there are govern(ent s%ste(s
that are sae to hack) $ut the% are e1 and ar $et1een2 And the
govern(ent has ini0te% (ore ti(e and resources to track %ou do1n than
a co(.an% 1ho has to (ake a .ro0t and 6usti% e5.enses2
J992 Don't use codes uness there is NO 1a% around it 3%ou don't have a
oca teenet or t%(net outdia and can't connect to an%thing >!!2224
Kou use codes ong enough) %ou 1i get caught2 Period2
J9992 Don't $e araid to $e .aranoid2 Be(e($er) %ou are $reaking the a12
9t doesn't hurt to store ever%thing encr%.ted on %our hard disk) or
kee. %our notes $uried in the $ack%ard or in the trunk o %our car2
Kou (a% ee a itte unn%) $ut %ou' ee a ot unnier 1hen %ou
1hen %ou (eet Eruno) %our transvestite ce(ate 1ho a5ed his a(i% to
death2
982 atch 1hat %ou .ost on $oards2 &ost o the rea% great hackers in the
countr% .ost nothing a$out the s%ste( the%'re current% 1orking
e5ce.t in the $roadest sense 39'( 1orking on a FN98) or a *O;&O;) or
so(ething generic2 Not 9'( hacking into Genera ectric's Joice &ai
;%ste( or so(ething inane and reveaing ike that24
82 Don't $e araid to ask Muestions2 That's 1hat (ore e5.erienced hackers
are or2 Don't e5.ect ever%thing %ou ask to $e ans1ered) though2
There are so(e things 3L&O;) or instance4 that a $egining hacker
shoudn't (ess 1ith2 Kou' either get caught) or scre1 it u. or
others) or $oth2
892 @ina%) %ou have to actua% hack2 Kou can hang out on $oards a %ou
1ant) and %ou can read a the te5t 0es in the 1ord) $ut unti %ou
actua% start doing it) %ou' never kno1 1hat it's a a$out2 There's
no thri Muite the sa(e as getting into %our 0rst s%ste( 31e) ok)
8/10/2019 A Novice's Guide to Hacking 2004
5/25
9 can think o a cou.e o $igger thris) $ut %ou get the .icture24
One o the saest .aces to start %our hacking career is on a co(.uter
s%ste( $eonging to a coege2 Fniversit% co(.uters have notorious% a5
securit%) and are (ore used to hackers) as ever% coege co(.uter de.art-
(ent has one or t1o) so are ess ike% to .ress charges i %ou shoud
$e detected2 Eut the odds o the( detecting %ou and having the .ersone to
co((itt to tracking %ou do1n are si( as ong as %ou aren't destructive2
9 %ou are aread% a coege student) this is idea) as %ou can ega%
e5.ore %our co(.uter s%ste( to %our heart's desire) then go out and ook
or si(iar s%ste(s that %ou can .enetrate 1ith con0dence) as %ou're aread%
a(iar 1ith the(2
;o i %ou 6ust 1ant to get %our eet 1et) ca %our oca coege2 &an% o
the( 1i .rovide accounts or oca residents at a no(ina 3under !4 charge2
@ina%) i %ou get caught) sta% Muiet unti %ou get a a1%er2 Don't vo-
unteer an% inor(ation) no (atter 1hat kind o 'deas' the% oer %ou2
Nothing is $inding uness %ou (ake the dea through %our a1%er) so %ou (ight
as 1e shut u. and 1ait2
Part T1o: Net1orks
8/10/2019 A Novice's Guide to Hacking 2004
6/25
net1orks) it is not 0nancia% .ractica to kee. track o 1here ever% ca and
connection are (ade ro(2 9t is aso ver% eas% to disguise %our ocation using
the net1ork) 1hich (akes %our ho$$% (uch (ore secure2
Teenet has (ore co(.uters hooked to it than an% other s%ste( in the 1ord
once %ou consider that ro( Teenet %ou have access to T%(net) 9taPA*) IANT)
DATAPA*) ;EDN) PandaNet) THnet) and a 1hoe host o other net1orks) a o
1hich %ou can connect to ro( %our ter(ina2
The 0rst ste. that %ou need to take is to identi% %our oca diau. .ort2
This is done $% diaing ->!!-""-="=" 3!! ?4 and connecting2 9t 1i
s.out so(e gar$age at %ou and then %ou' get a .ro(.t sa%ing 'TB&9NAL#'2
This is %our ter(ina t%.e2 9 %ou have vt!! e(uation) t%.e it in no12 Or
6ust hit return and it 1i deaut to du($ ter(ina (ode2
Kou' no1 get a .ro(.t that ooks ike a Q2 @ro( here) t%.e Qc (ai RcrS
and then it 1i ask or a Fserna(e2 nter '.hones' or the userna(e2 hen it
asks or a .ass1ord) enter '.hones' again2 @ro( this .oint) it is (enu
driven2 Fse this to ocate %our oca diau.) and ca it $ack oca%2 9
%ou don't have a oca diau.) then use 1hatever (eans %ou 1ish to connect to
one ong distance 3(ore on this ater24
hen %ou ca %our oca diau.) %ou 1i once again go through the
TB&9NAL# stu) and once again %ou' $e .resented 1ith a Q2 This .ro(.t ets
%ou kno1 %ou are connected to a Teenet PAD2 PAD stands or either Packet
Asse($er/Disasse($er 3i %ou tak to an engineer4) or Pu$ic Access Device
3i %ou tak to Teenet's (arketing .eo.e24 The 0rst descri.tion is (ore
correct2
Teenet 1orks $% taking the data %ou enter in on the PAD %ou diaed into)
$unding it into a > $%te chunk 3nor(a%222 this can $e changed4) and then
trans(itting it at s.eeds ranging ro( =!! to =)!! $aud to another PAD) 1ho
then takes the data and hands it do1n to 1hatever co(.uter or s%ste( it's
8/10/2019 A Novice's Guide to Hacking 2004
7/25
connected to2 Easica%) the PAD ao1s t1o co(.uters that have dierent $aud
rates or co((unication .rotocos to co((unicate 1ith each other over a ong
distance2 ;o(eti(es %ou' notice a ti(e ag in the re(ote (achines res.onse2
This is caed PAD Dea%) and is to $e e5.ected 1hen %ou're sending data
through severa dierent inks2
hat do %ou do 1ith this PAD Kou use it to connect to re(ote co(.uter
s%ste(s $% t%.ing '*' or connect and then the Net1ork Fser Address 3NFA4 o
the s%ste( %ou 1ant to go to2
An NFA takes the or( o !7!77!!!!
\UUU/\UUU/\UUU/
| | |
| | |UUUU net1ork address
| |UUUUUUUUU area .re05
|UUUUUUUUUUUUUU DN9*
This is a su((ar% o DN9*'s 3taken ro( Eade Bunner's 0e on 9taPA*4
according to their countr% and net1ork na(e2
DN9* Net1ork Na(e *ountr% DN9* Net1ork Na(e *ountr%
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
|
!!" Datanet Netherands | !7! Teenet F;A
!! D*; Eegiu( | !77"! Tee.ac &e5ico
!!>! Trans.ac @rance | !7"!! FDT;-*uracau *uracau
!>" Tee.ac ;1itCerand | !" 9sranet 9srae
!7 Date5-P Austria | !""! DD8-P Ia.an
8/10/2019 A Novice's Guide to Hacking 2004
8/25
!7= Badaus Austria | !""!> Jenus-P Ia.an
!7" P;; FV | !"! Daco(-Net ;outh Vorea
!7> Data.ak Den(ark | !"" 9nte.ak ;inga.ore
!"! Data.ak ;1eden | !! Aust.ac Austraia
!"! Tee.ak ;1eden | !!7 &idas Austraia
!"" @in.ak @inand | ! Tee.ac Hong Vong
!" Date5-P est Ger(an% | !7! Pacnet Ne1 Weaand
!?!" Lu5.ac Lu5e($ourg | !! ;a.onet ;outh Arica
!?" ir.ak 9reand | !?"! 9nterdata EraCi
!7!! Data.ac *anada | !?" Ben.ac EraCi
!7!> 9nogra( *anada | !=!!! Dianet F;A
!7!7 9TT/FDT; F;A | !?" Do(.ac @rench Guiana
!7! T%(net F;A |
There are t1o 1a%s to 0nd interesting addresses to connect to2 The 0rst
and easiest 1a% is to o$tain a co.% o the LOD/H Teenet Director% ro( the
LOD/H Technica Iourna X" or !! &agaCine2 Iester ;uggo aso .ut out a good
ist o non-F; addresses in Phrack 9nc2 Ne1setter 9ssue 2 These 0es 1i
te %ou the NFA) 1hether it 1i acce.t coect cas or not) 1hat t%.e o
co(.uter s%ste( it is 3i kno1n4 and 1ho it $eongs to 3aso i kno1n24
The second (ethod o ocating interesting addresses is to scan or the(
(anua%2 On Teenet) %ou do not have to enter the !7! DN9* to connect to a
Teenet host2 ;o i %ou sa1 that !7!"!!!"! had a JA8 on it %ou 1anted
to
ook at) %ou coud t%.e Qc " " 3!'s can $e ignored (ost o the ti(e24
9 this node ao1s coect $ied connections) it 1i sa% " "
*ONN*TD and then %ou' .ossi$% get an identi%ing header or 6ust a
Fserna(e: .ro(.t2 9 it doesn't ao1 coect connections) it 1i give %ou a
8/10/2019 A Novice's Guide to Hacking 2004
9/25
8/10/2019 A Novice's Guide to Hacking 2004
10/25
There are .ent% o neat co(.uters to .a% 1ith in a 7-digit scan) ho1ever)
so don't go $erserk 1ith the e5tensions2
;o(eti(es %ou' atte(.t to connect and it 1i 6ust $e sitting there ater
one or t1o (inutes2 9n this case) %ou 1ant to a$ort the connect atte(.t $%
sending a hard $reak 3this varies 1ith dierent ter( .rogra(s) on Proco(()
it's ALT-E4) and then 1hen %ou get the Q .ro(.t $ack) t%.e 'D' or disconnect2
9 %ou connect to a co(.uter and 1ish to disconnect) %ou can t%.e RcrS Q
RcrS and %ou it shoud sa% TLNT and then give %ou the Q .ro(.t2 @ro(
there)
t%.e D to disconnect or *ONT to re-connect and continue %our session
uninterru.ted2
Outdias) Net1ork ;ervers) and PADs
8/10/2019 A Novice's Guide to Hacking 2004
11/25
unction that (an% o the( have2 @irst thing %ou do 1hen %ou connect is to
invoke the 'Bedia Last Nu($er' aciit%2 This 1i dia the ast nu($er used)
1hich 1i $e the one the .erson using it $eore %ou t%.ed2 rite do1n the
nu($er) as no one 1oud $e caing a nu($er 1ithout a co(.uter on it2 This
is a good 1a% to 0nd ne1 s%ste(s to hack2 Aso) on a JNTL (ode() t%.e 'D'
or Dis.a% and it 1i dis.a% the 0ve nu($ers stored as (acros in the
(ode('s (e(or%2
There are aso dierent t%.es o servers or re(ote Loca Area Net1orks
3LAN4 that have (an% (achine a over the oce or the nation connected to
the(2 9' discuss identi%ing these ater in the co(.uter 9D section2
And 0na%) %ou (a% connect to so(ething that sa%s '82 *o((unication
PAD' and then so(e (ore stu) oo1ed $% a ne1 Q .ro(.t2 This is a PAD
6ust ike the one %ou are on) e5ce.t that a atte(.ted connections are $ied
to the PAD) ao1ing %ou to connect to those nodes 1ho earier reused coect
connections2
This aso has the added $onus o conusing 1here %ou are connecting ro(2
hen a .acket is trans(itted ro( PAD to PAD) it contains a header that has
the ocation %ou're caing ro(2 @or instance) 1hen %ou 0rst connected
to Teenet) it (ight have said ""A *ONN*TD i %ou caed ro( the
area code2 This (eans %ou 1ere caing PAD nu($er ""A in the area2
That ""A 1i $e sent out in the header o a .ackets eaving the PAD2
Once %ou connect to a .rivate PAD) ho1ever) a the .ackets going out
ro( it 1i have it's address on the() not %ours2 This can $e a vaua$e
$uer $et1een %ourse and detection2
Phone ;canning
8/10/2019 A Novice's Guide to Hacking 2004
12/25
a(ous a(ong the non-hacker cro1d $% that Oh-;o-Technica%-Accurate (ovie
arga(es2 Kou .ick a three digit .hone .re05 in %our area and dia ever%
nu($er ro( !!!! --S ==== in that .re05) (aking a note o a the carriers
%ou 0nd2 There is sot1are avaia$e to do this or near% ever% co(.uter
in the 1ord) so %ou don't have to do it $% hand2
Part Three: 9've @ound a *o(.uter) No1 hat
8/10/2019 A Novice's Guide to Hacking 2004
13/25
to circu(vent s%ste( securit%2 The JA8 aso has the $est set o
he. 0es in the 1ord2 Iust t%.e HLP and read to %our heart's
content2
*o((on Accounts/Deauts: Yuserna(e: .ass1ord YY).ass1ordZZ Z
;K;T&: OPBATOB or &ANAGB or ;K;T& or ;K;L9E
OPBATOB: OPBATOB
;K;T;T: FTP
;K;&A9NT: ;K;&A9NT or ;BJ9* or D9G9TAL
@9LD: @9LD or ;BJ9*
GF;T: GF;T or un.ass1orded
D&O: D&O or un.ass1orded
D*NT: D*NT
D*-!- An earier ine o D* co(.uter eMui.(ent) running the TOP;-!
o.erating s%ste(2 These (achines are recogniCed $% their
'2' .ro(.t2 The D*-!/! series are re(arka$% hacker-riend%)
ao1ing %ou to enter severa i(.ortant co((ands 1ithout ever
ogging into the s%ste(2 Accounts are in the or(at Y555)%%%Z 1here
555 and %%% are integers2 Kou can get a isting o the accounts and
the .rocess na(es o ever%one on the s%ste( $eore ogging in 1ith
the co((and 2s%stat 3or ;Kste( ;TATus42 9 %ou seen an account
that reads Y7")!!Z EOE ION;) it (ight $e 1ise to tr% EOE or
ION; or $oth or a .ass1ord on this account2 To ogin) %ou t%.e
2ogin 555)%%% and then t%.e the .ass1ord 1hen .ro(.ted or it2
The s%ste( 1i ao1 %ou uni(ited tries at an account) and does
not kee. records o $ad ogin atte(.ts2 9t 1i aso inor( %ou
i the F9* %ou're tr%ing 3F9* # Fser 9denti0cation *ode) ) or
8/10/2019 A Novice's Guide to Hacking 2004
14/25
e5a(.e4 is $ad2
*o((on Accounts/Deauts:
): ;K;L9E or OPBATOB or &ANAGB
)?: &A9NTA9N
)7!: GA&;
FN98- There are doCens o dierent (achines out there that run FN982
hie so(e (ight argue it isn't the $est o.erating s%ste( in the
1ord) it is certain% the (ost 1ide% used2 A FN98 s%ste( 1i
usua% have a .ro(.t ike 'ogin:' in o1er case2 FN98 aso
1i give %ou uni(ited shots at ogging in 3in (ost cases4) and
there is usua% no og ke.t o $ad atte(.ts2
*o((on Accounts/Deauts: 3note that so(e s%ste(s are case
sensitive) so use o1er case as a genera rue2 Aso) (an% ti(es
the accounts 1i $e un.ass1orded) %ou' 6ust dro. right in,4
root: root
ad(in: ad(in
s%sad(in: s%sad(in or ad(in
uni5: uni5
uuc.: uuc.
r6e: r6e
guest: guest
de(o: de(o
dae(on: dae(on
s%s$in: s%s$in
Pri(e- Pri(e co(.uter co(.an%'s (ainra(e running the Pri(os o.erating
s%ste(2 The are eas% to s.ot) as the greet %ou 1ith
8/10/2019 A Novice's Guide to Hacking 2004
15/25
'Pri(econ >272!' or the ike) de.ending on the version o the
o.erating s%ste( %ou run into2 There 1i usua% $e no .ro(.t
oered) it 1i 6ust ook ike it's sitting there2 At this .oint)
t%.e 'ogin Ruserna(eS'2 9 it is a .re->2!!2!! version o Pri(os)
%ou can hit a $unch o [*'s or the .ass1ord and %ou' dro. in2
Fnortunate%) (ost .eo.e are running versions =+2 Pri(os aso
co(es 1ith a good set o he. 0es2 One o the (ost useu
eatures o a Pri(e on Teenet is a aciit% caed NTL9NV2 Once
%ou're inside) t%.e NTL9NV and oo1 the he. 0es2 This ao1s
%ou to connect to NFA's a over the 1ord using the 'nc' co((and2
@or e5a(.e) to connect to NFA !">=!!"!!!") %ou 1oud t%.e
Qnc :">=!!"!!!" at the netink .ro(.t2
*o((on Accounts/Deauts:
PB9& PB9& or PB9&O;
PB9&O;U*; PB9& or PB9&O;
PB9&NT PB9&NT
;K;T& ;K;T& or PB9&
NTL9NV NTL9NV
T;T T;T
GF;T GF;T
GF;T GF;T
HP-5!!!- This s%ste( is (ade $% He1ett-Packard2 9t is characteriCed $% the
':' .ro(.t2 The HP has one o the (ore co(.icated ogin seMuences
around- %ou t%.e 'HLLO ;;;9ON
NA&)F;BNA&)A**OFNTNA&)GBOFP'2
@ortunate%) so(e o these 0eds can $e et $ank in (an% cases2
;ince an% and a o these 0eds can $e .ass1orded) this is not
the easiest s%ste( to get into) e5ce.t or the act that there are
8/10/2019 A Novice's Guide to Hacking 2004
16/25
usua% so(e un.ass1orded accounts around2 9n genera) i the
deauts don't 1ork) %ou' have to $rute orce it using the
co((on .ass1ord ist 3see $eo124 The HP-5!!! runs the &P o.erat-
ing s%ste() the .ro(.t or it 1i $e a ':') 6ust ike the ogon
.ro(.t2
*o((on Accounts/Deauts:
&GB2TL;FP)PFE Fser: &GB Acct: HPONLK Gr.: PFE
&GB2HPO@@9*)PFE un.ass1orded
&ANAGB29T@7!!!)PFE un.ass1orded
@9LD2;FPPOBT)PFE user: @LD) others un.ass1orded
&A9L2TL;FP)PFE user: &A9L) others
un.ass1orded
&GB2BI un.ass1orded
@9LD2HPP>= )HPP>?)HPP>=)HPP= un.ass1orded
&GB2TL;FP)PFE)HPONLK)HP7 un.ass1orded
9B9;- 9B9; stands or 9nteractive Bea Ti(e 9nor(ation ;%ste(2 9t orig-
ina% ran on PDP-'s) $ut no1 runs on (an% other (inis2 Kou can
s.ot an 9B9; $% the 'eco(e to 9B9; B=22" Ti(esharing' $anner)
and the A**OFNT 9D .ro(.t2 9B9; ao1s uni(ited tries at hacking
in) and kee.s no ogs o $ad atte(.ts2 9 don't kno1 an% deaut
.ass1ords) so 6ust tr% the co((on ones ro( the .ass1ord data$ase
$eo12
*o((on Accounts:
&ANAGB
EO;;
;O@TAB
8/10/2019 A Novice's Guide to Hacking 2004
17/25
D&O
PDP>
PDP
A**OFNT9NG
J&/*&;- The J&/*&; o.erating s%ste( runs in 9nternationa Eusiness
&achines
39E&4 (ainra(es2 hen %ou connect to one o these) %ou 1i get
(essage si(iar to 'J&/7?! ONL9N') and then give %ou a '2' .ro(.t)
6ust ike TOP;-! does2 To ogin) %ou t%.e 'LOGON Ruserna(eS'2
*o((on Accounts/Deauts are:
AFTOLOG: AFTOLOG or AFTOLOG
*&;: *&;
*&;EAT*H: *&; or *&;EAT*H
BP: BP
&A9NT: &A9NT or &A9NTA9N
OPBATN;: OPBATN; or OPBATOB
OPBATOB: OPBATOB
B;*;: B;*;
;&ABT: ;&ABT
;NA: ;NA
J&T;T: J&T;T
J&FT9L: J&FT9L
JTA&: JTA&
NO;- NO; stands or Net1orking O.erating ;%ste() and runs on the *%$er
co(.uter (ade $% *ontro Data *or.oration2 NO; identi0es itse
Muite readi%) 1ith a $anner o 'L*O& TO TH NO; ;O@TAB
;K;T&2 *OPKB9GHT *ONTBOL DATA =?>)=>?'2 The 0rst .ro(.t %ou
8/10/2019 A Novice's Guide to Hacking 2004
18/25
1i get 1i $e @A&9LK:2 Iust hit return here2 Then %ou' get
a F;B NA&: .ro(.t2 Fserna(es are t%.ica% ? a.ha-nu(erics
characters ong) and are e5tre(e% site de.endent2 O.erator
accounts $egin 1ith a digit) such as ?TPDO*2
*o((on Accounts/Deauts:
;K;T& unkno1n
;K;T&J unkno1n
Decserver- This is not tru% a co(.uter s%ste() $ut is a net1ork server that
has (an% dierent (achines avaia$e ro( it2 A Decserver 1i
sa% 'nter Fserna(eS' 1hen %ou 0rst connect2 This can $e an%thing)
it doesn't (atter) it's 6ust an identi0er2 T%.e 'c') as this is
the east cons.icuous thing to enter2 9t 1i then .resent %ou
1ith a 'LocaS' .ro(.t2 @ro( here) %ou t%.e 'c Rs%ste(na(eS' to
connect to a s%ste(2 To get a ist o s%ste( na(es) t%.e
'sh services' or 'sh nodes'2 9 %ou have an% .ro$e(s) onine
he. is avaia$e 1ith the 'he.' co((and2 Ee sure and ook or
services na(ed '&OD&' or 'D9AL' or so(ething si(iar) these are
oten outdia (ode(s and can $e useu,
G;/- Another t%.e o net1ork server2 Fnike a Decserver) %ou can't
.redict 1hat .ro(.t a G;/ gate1a% is going to give %ou2 The
deaut .ro(.t it 'G;/S') $ut this is redi0na$e $% the
s%ste( ad(inistrator2 To test or a G;/) do a 'sh d'2 9 that
.rints out a arge ist o deauts 3ter(ina s.eed) .ro(.t)
.arit%) etc2224) %ou are on a G;/2 Kou connect in the sa(e (anner
as a Decserver) t%.ing 'c Rs%ste(na(eS'2 To 0nd out 1hat s%ste(s
are avaia$e) do a 'sh n' or a 'sh c'2 Another trick is to do a
8/10/2019 A Novice's Guide to Hacking 2004
19/25
'sh (') 1hich 1i so(eti(es sho1 %ou a ist o (acros or ogging
onto a s%ste(2 9 there is a (acro na(ed JA8) or instance) t%.e
'do JA8'2
The a$ove are the (ain s%ste( t%.es in use toda%2 There are
hundreds o (inor variants on the a$ove) $ut this shoud $e
enough to get %ou started2
Fnres.onsive ;%ste(s
8/10/2019 A Novice's Guide to Hacking 2004
20/25
4 9 %ou're getting gar$age) hit an 'i'2 T%(net res.onds to this) as does
a &utiLink 992
?4 Eegin sending contro characters) starting 1ith [A --S [W2
>4 *hange ter(ina e(uations2 hat %our vt!! e(uation thinks is gar$age
(a% a o a sudden $eco(e cr%sta cear using AD&- e(uation2 This aso
reates to ho1 good %our ter( .rogra( is2
=4 T%.e LOG9N) HLLO) LOG) ATTA*H) *ONN*T) ;TABT) BFN) EG9N) LOGON)
GO)
IO9N) HLP) and an%thing ese %ou can think o2
!4 9 it's a diain) ca the nu($ers around it and see i a co(.an%
ans1ers2 9 the% do) tr% so(e socia engineering2
Erute @orce Hacking
8/10/2019 A Novice's Guide to Hacking 2004
21/25
s%ste( 3i kno1n4) the co(.an% initias) and things reating to the .roducts
the co(.an% (akes or deas 1ith2
Pass1ord List
#############
aaa danie 6ester rasca
acade(ia dann% 6ohnn% rea%
ada dave 6ose.h re$ecca
adrian de$ 6oshua re(ote
aero$ics de$$ie 6udith rick
air.ane de$orah 6ugge reagan
a$an% dece($er 6uia ro$ot
a$atross des.erate katheen ro$otics
a$ert deveo. ker(it roe5
ae5 diet kerne ronad
ae5ander digita knight rose$ud
age$ra discover% a($da rose(ar%
aias disne% arr% roses
a.ha dog aCarus ru$en
a.ha$et drought ee rues
a(a duncan ero% ruth
a(% eas% e1is sa
anaog eat(e ight sa5on
anchor edges isa sche(e
and% ed1in ouis scott
andrea egghead %nne scott%
ani(a eieen (ac secret
8/10/2019 A Novice's Guide to Hacking 2004
22/25
ans1er einstein (acintosh sensor
an%thing ee.hant (ack serenit%
arro1 eiCa$eth (aggot se5
arthur een (agic shark
asshoe e(erad (aco( sharon
athena engine (ark shit
at(os.here engineer (arkus shiva
$acchus enter.rise (art% shutte
$adass enC%(e (arvin si(on
$aie% eucid (aster si(.e
$anana eve%n (aurice singer
$andit e5tension (erin singe
$anks air1a% (ets s(ie
$ass eicia (ichae s(ies
$at(an ender (ichee s(ooch
$eaut% er(at (ike s(other
$eaver 0nite (ini(u( snatch
$eethoven o1er (insk% snoo.%
$eoved oo.roo (ogu soa.
$enC oot$a (oose socrates
$eo1u or(at (oCart s.it
$erkee% ors%the nanc% s.ring
$erin ourier na.oeon su$1a%
$eta red net1ork success
$ever% riend ne1ton su((er
$o$ righten ne5t su.er
$renda un oivia su..ort
$rian ga$rie orace surer
8/10/2019 A Novice's Guide to Hacking 2004
23/25
$ridget gar0ed orca suCanne
$road1a% gauss or1e tangerine
$u($ing george osiris ta.e
cardina gertrude outa1 target
car(en gi$son o5ord ta%or
caroina ginger .aci0c tee.hone
caroine gnu .ainess te(.tation
caste go .a( tiger
cat goer .a.er togge
cetics gorgeous .ass1ord to(ato
change graha( .at to%ota
chares gr%.hon .atricia trivia
char(ing guest .enguin unha..%
charon guitar .ete unicorn
chester hacker .eter unkno1n
cigar har(on% .hii. urchin
cassic harod .hoeni5 utiit%
coee harve% .ierre vick%
coke heinein .iCCa virginia
coins heo .over 1arren
co(rade he. .o%no(ia 1ater
co(.uter her$ert .raise 1eenie
condo hone% .reude 1hatnot
condo( horse .rince 1hitne%
cookie i(.eria .rotect 1i
coo.er incude .u(.kin 1iia(
create ingres .u..et 1iie
creation innocuous ra$$it 1inston
8/10/2019 A Novice's Guide to Hacking 2004
24/25
creator irish(an rach(anino 1iCard
cretin isis rain$o1 1o($at
dae(on 6a.an raindro. %ose(ite
dancer 6essica rando( Ca.
Part @our: ra..ing it u.,
8/10/2019 A Novice's Guide to Hacking 2004
25/25
4 F;NT co(.2risks digest 3various authors) various issues4
4 F;NT uni521iCards oru( 3various authors4
?4 F;NT ino-va5 oru( 3various authors4
Beco((ended Beading:
4 Hackers $% ;teven Lev%
4 Out o the 9nner *irce $% Ei Landreth
74 Turing's &an $% I2 David Eoter
"4 ;ou o a Ne1 &achine $% Trac% Vidder
4 Neuro(ancer) *ount Wero) &ona Lisa Overdrive) and Eurning *hro(e) a
$% iia( Gi$son
4 Beait% Hackers &agaCine c/o High @rontiers) P2O2 Eo5 "!?) Eerkee%)
*aiornia) ="?!") "-==-!
?4 An% o the Phrack 9nc2 Ne1setters ] LOD/H Technica Iournas %ou can 0nd2
Ackno1edge(ents:
Thanks to (% 1ie or .utting u. 1ith (e2
Thanks to Lone o or the B;T; ] TOP; assistance2
Thanks to Android Po.e or .rooreading) suggestions) and $eer2
Thanks to The Frvie/Necron == or .rooreading ] *%$er ino2
Thanks to ric Eooda5e or 1ading through a the trash2
Thanks to the users o Phoeni5 Pro6ect or their contri$utions2
Thanks to Atos *o(.uter ;%ste(s) &unich) or the chat s%ste(2
Thanks to the various securit% .ersone 1ho 1ere 1iing to tak to
(e a$out ho1 the% o.erate2