+ All Categories
Home > Documents > Fiery Dennis - Secrets of a Super Hacker

Fiery Dennis - Secrets of a Super Hacker

Date post: 02-Jun-2018
Category:
Upload: cesar-piiloto
View: 224 times
Download: 0 times
Share this document with a friend

of 238

Transcript
  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    1/238

  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    2/238

    SECRETS OF A

    SUPER HACKERBy The Knightmare

    TOCAppendix

    Text ripped verbatim

  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    3/238

    Note: Edited with clarity and space (win 98 word pad in Times new roman)8! pa"es# yrs old

    $ind o% o&tdated and lot o% it is "arba"e b&t its o'Constant orrow

    SECRETS

    of a

    SUPER

    HACKERy The $N*+,T-A.E

    *ntrod&ction by +areth ranwyn

    o&nd ytes %rom .eviews o%ecrets o% a &per ,ac'er

    /ecrets o% a &per ,ac'er is a %ascinatin" hac'er coo'boo' that reveals the ease o%penetratin" even the most stalwart comp&ter system0/1The an 2rancisco Chronicle/Not o%ten do the contents o% a boo' match its cover hype3 b&t here is one boo' thatcomes closer than most0 ecrets o% a &per ,ac'er3 by The $ni"htmare3 is billed as4every sec&rity mana"er4s worst ni"htmare04 *t does3 indeed3 descend into the realmo% sec&rity mana"ers5 dar'est %ears0/1 *n%o sec&rity News000 step1by1step instr&ctions in meanin"%&l hac'in" 6&sin"7 a personal comp&ter0/

    1 oo'list/Excellent0 This wor' will appeal to many3 especially b&siness pro%essionals as thenetwor's and e1mail become more commonplace0/1The .eader4s .eview/000the most speci%ic3 detailed3 "eneral1p&rpose "&ide to electronic shenani"ans *4veseen0 .ecommended0/1 .eadin" %or leas&re/All ! pa"es are loaded with clear3 concise3 and very devio&s in%ormation0 *t iswell1written3 sprin'led with wit and the $ni"htmare4s own personal experiences0/1 elected oo' .eviews/ysops may %ind it necessary to read this one3 especially i% their callers read it %irst0/1 -a"a;ine/*t4s readable3 interestin"3 in%ormative3 balanced3 and acc&rate3 with a nice spirit o%%&n and swashb&c'lin"

  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    4/238

    y The $ni"htmare

    @oompanics nlimitedort Townsend3 ?ashin"ton

    This boo' is sold %or in%ormation p&rposes only0 Neither the a&thor nor the p&blisherwill be held acco&ntable %or the &se or mis&se o% the in%ormation contained in thisboo'0

    ecrets o% a &per ,ac'er99B by ennis 2iery

    *ntrod&ction (c) 99B by +areth ranwynCover by art Na"el*ll&strations by an ?endD-E*A +raphicsAll ri"hts reserved0 No part o% this boo' may be reprod&ced or stored in any %ormwhatsoever witho&t the prior written consent o% the p&blisher0 .eviews may &otebrie% passa"es witho&t the written consent o% the p&blisher as lon" as proper credit is"iven0&blished by:@oompanics nlimited0O0 ox 9Fort Townsend3 ?A 98G#8

    @oompanics nlimited is a division o% @oompanics Enterprises3 *nc0

    *N 1!!9!1#1!

    @ibrary o% Con"ress Catalo" Card N&mber 9G18#!#8

    Contents

  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    5/238

    *ntrod&ction: ,ac'ers:,eroes or HillainsI3 by +arethranwyn00000000000000000000000000000000000000000000000000000000000000000000000000i

    A.T ONEe%ore ,ac'

    Chapter One: Theasics0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000G.eadin" vs0 oin" IOpenin" .emar'sIE&ipment -oderns and peedIComm&nicationso%twareI,andy 2eat&res ata Capt&reIast and 2&t&reIays o% Jore @ive OnIComp&terCrimeItealin" -oney abota"eIHario&s ThieveriesIThe eventh CrimeI,ac'er-otivations

    Chapter Two:

    The ,istory O%,ac'in"0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000G2irst Came ,ardwareIJ*@ and TAIComp&ter CrimeI#I?ar+ames and hrac' Ihadow,aw' IThe Electronic 2rontier 2o&ndation

    Chapter Three:.esearchin" The,ac'000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009Tar"etin" ICollectin" *n%ormation Iome n&s&al .esearch -ethods IOn1lineComp&ter im&lators

    and T&torials Iortin" Thro&"h Trash I+*.$ I2o&nd is' Analysis IChec' p Iama"e to One ide I.ips and Tears I*mper%ections IExaminin" creenshots Inoopin"

    Chapter 2o&r:asswords And AccessControl0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000G!asswords Iasswords &pplied by the ser Iossible assword *nvesti"ation Iassword t&dies Iassword .estraints IComp&ter +enerated asswords: 2a'eryand Analysis o% -achine +enerated asswords INon1.andom -achine1+eneratedasswords Iro"rams are eople Toor&te 2orce -ethods I2oilin" the r&te 2orce Assa&lt IConcl&sion

    Chapter 2ive:ocialEn"ineerin"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000B9The Noble 2orm I,ac'er as Neophyte I,ac'er in ower I,ac'er as ,elper Iea',o&rs IOther ,ints ample ocial En"ineerin" it&ations I-iscellaneo&s ocialEn"ineerin" Tips IOther .oles *n1erson En"ineerin" I?ritten En"ineerin" I.e&est %or *n%ormation I-essa"e 2rom +od ITro&ble in aradiseI

  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    6/238

    Chapter ix:.everse ocialEn"ineerin"0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000#GOvercomin" ocial En"ineerin" rawbac's I.everse ocial En"ineerin" abota"e

    -ethods I.ECase t&dy: The Translation Table Iolvin" the abota"e I.E Advertisin" -ethodsITro&ble %or Nothin"I

    A.T T?O&rin" ,ac'

    Chapter even:&blic Access Comp&ters AndTerminals000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000F*ntrod&ction to the Three $inds IC1.O- atabases and *n%ormation Comp&ters I&blic AccessTerminals (ATs) IThe ar Code ,ac' I,idden Commands IColle"e ATs Ioin" itthe E1K?ay Iho&lder &r%in" Ioin" it A*Cally I,ardware -ethods I+eneral&rpose -icrocomp&ters Irea'in" 2ree I2reedom -eans 2ree .oamin" IAC$ I-en& im&lation and Other nea'iness I,idin" Jo&r +oody as'et IThin"s to?atch O&t 2or

    Chapter Ei"ht:On1ite ,ac'in": The Trespasser1,ac'er000000000000000000000000000000000000000000000000000000000000000000000000000000000089Closed1Circ&it Television Iiometric ystems IAlways a ?ay IActin" %or the On1ite,ac' I

    i""ybac'in" IOther &ccess%&l Tric's L Antics IElectronic assive Comp&tin" I.adiation Comprehension IHan Ec' and ritton Ips and owns

    Chapter Nine:,ac'in" At ,ome: ialin" p Comp&ters ?ith Jo&r-odem00000000000000000000000000000000000000000000000000099.eality I?ho to Connect to Iayin" %or the leas&re Iac'et witched Networ's IOtherNetwor's I2indin" ial1p N&mbers Iial1p ec&rity -eas&res Icr&tini;e the@o"in Environment

    Chapter Ten:Electronic &lletin oard

    ystems000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000!2indin" N&mbers I2indin" ,ac'er oards I-a'in" Connections I 2eat&resI Exploitation I+ettin" to $now Jo& Iypassin" ec&rity I.&nnin" a I-idni"ht -as&erade I,ac' mail ICrashin" s ITroMan ,orses ICoverin" pTroMan ,orse Activity I?hile it is .&nnin" Ie%ore L A%ter IA 2ew Tips %or the o1*t1Jo&rsel%er

    Chapter Eleven:

  • 8/10/2019 Fiery Dennis - Secrets of a Super Hacker

    7/238

    orderline,ac'in"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009,ac'in" %or Cah 2ilthy Tric's ribery oo;e and roads ad 2eelin"s

    Chapter Twelve:

    ?hat To o ?hen*nside000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000G,ac'er -otivations .evisited Operatin" ystems @oo'in" Aro&nd Commands to@oo' 2orand to se 2ile Trans%er rotocol (2T) 2&n 4N +ames The ser Networ' ecomin" a &per&ser poo%in" Crypto"raphy and E it by it ro"ramEmployment Hir&ses Covert Channels +et O&t o% Pail 2ree .et&rnin" to thecene -ission Accomplished Almost And don4t

    %or"et all the st&pidity: the test acco&nts and demo modes3 the de%a&lt sec&rity

    F

    meas&res that nobody bothers to delete or chan"e0 *n P&ly 98F3 a b&nch o% ChaosComp&ter Cl&b members hac'ed their way thro&"h the networ'3 %rom an entry inE&rope3 to NAA4s AN system (pace hysics Analysis Networ')0 These crac'ersexploited a %law in the H- in%rastr&ct&re which EC Corporation had anno&ncedwas remedied three months earlier0 There m&st be h&ndreds o% HAV comp&ters stillo&t there3 still r&nnin" the %a&lty parts o% the operatin" system0 Even with the patchin place3 the Chaos members reportedly were la&"hin" themselves silly over theo%ten trivial passwords &sed to /protect/ the system0 ome o% the passwords were

    ta'en strai"ht %rom the man&1%act&rer4s man&als< On the one hand we have a topsecret HAV D F8! comp&ter with the %&ll power o% NAA to protect itU b&t on theother hand there are approximately %o&r tho&sand &sers o% that com1p&ter0 Nevercan yo& "et B3 people to"ether and still 'eep secrets h&shed &p0,ac'in" may seem harder than ever be%ore3 b&t it really is not0 The c&lt&re mayhave "otten more sec&rity1aware3 b&t the individ&al &ser still lives in a world o%beni"n indi%%erence3 vanity3 &ser1%riendliness and %riendly1&serness0 sers who arein1the1'now will always want to help the less %ort&nate ones who are not0 Thosewho aren4t will see' the advice o% the "&r&s0 And so ocial En"i1neerin" and .everseocial En"ineerin" live on3 as yo& shall discover within these pa"es0 Ease o% &se willalways r&le0 The /d&mb/ pass1word will be a "ood "&ess %or a lon" time to come0A%ter all3 people M&st don4t choose #2'8l(Xvb-1GBtrwV!/ %or their passwords


Recommended