Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Monday, April 21, 2014
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Members Online
Total Online: 25
Guests Online: 22
Members Online: 3

Registered Members: 82855
Newest Member: icepeter
Latest Articles

Staying hidden.

Arrow Image Basic to Intermediate Stealth practices.

Okay this is my first article, Since I think I\'m good at hiding files and hiding myself on the internet. I thought that I would share one or two things with you.

Okay now Proxies, shells and wingates can come in handy for stealth and other stuff. Especially when you Somehow managed to get yourself blocked from your favourite irc server, or your school has blocked you from downloading the files you want (My Problem!) . Whatever your reasons are to keep your identity hidden, this will help you I hope.

The bad side of Proxies is that they have a tendency to disconnect you, and it can become rather annoying for some quicker than others, so wingates becomes loved almost at first site ( . Anyway, To use a wingate simply telnet to one and type the address followed by a colon and the port number, for example \'\' Quite often wingates are password protected and public ones can be painfully hard to find. To find them you can use a use a scanner or get some of your friends/enemies wingates. Which ever way you get them, dont go begging anyone for them, they will probably Flame you and you will be forced to go ask someone else. I for right now don\'t have any wingates.

Partime Vocab Show!
Wingate:an Integrated Gateway Management system for Microsoft Windows, providing firewall and NAT services, along with a number of integrated proxy servers and email services (SMTP, POP3 and IMAP servers).

Scripting Stealth:
So your anooying highschool or university for others has just disabled the downloading of zip files, and the new distro of BackTrack 4.0 has just been released! and your home connection would take the next five centuries or so to download it. So what will you do? Pay for it? Not happening anytime soon. I still like to support people that make software under public license by the way. Why should you sit down and allow your teachers or lecturers to stop you from having your share of their precious (and expensive) bandwidth? Well in my opinion, you shouldnt allow this.If they can email you so much homework you should be able to atleast download the new version of Notepad. Anyway, To fix your problem, you could either use proxies like, which tend to be rather slow and already over used , or you could make web servers to do it for you. For example remember how your ISP gave you that free webspace with your home internet account? or that new hosting site that just opened up and has lots of lovely bandwidth? Well you can \'borrow\' it for your own personal gain. To do this all you have to do is create and upload a few proxy scripts to the free webspace. I use sometimes. Make sure the webspace allows PHP and upload the following script I made to it:

if ($password == \"freebandwidth\") {
$fp = fopen(\"http://\".$destfile,\"r\");
while (!feof($fp)) {
$fd = fread($fp,4096);
echo $fd;

Name This Proxy.php or whatever.
I\'m still new to php but I was able to create this. If there is a better way to make this script then let me know please.Also a similar script could be made in Perl if that is all the host supports, but it is much more simple to do in PHP. Okay After you have uploaded it. The following request would download
\'\' and send the file to you:::
------------------------------------- proxy.php?
What the script does is downloads the file and prints it into the contents of what you see when you visit the url, so you may have to save the link rather than opening it depending on what you are using to download it. Try not to do this with extremely large files, as your host my be not upto speed with the connection you are on. Now To download from FTP\'s, That can be a little more dificult, but can still be accomplished. This example can be applied to many different situations. Once i had four local ISP\'s all calculating mega fractals for me through little Perl scripts I found.Yes That is extremely Scriptkiddie but I needed them. Anyway, One slightly more interesting application I found was to get hosts to crack DES encryptions and have them emailed to me when they have been cracked. Quite often a host can be on a rather beasty box, and a little processing power wont be missed.

The Shell Life:
Shells are also rather dificult to find, but gives you the absolute most flexibility to launch an attack from. Public shells normally block all outgoing address requests, so you cant go wasting their limited bandwidth or do any hacking from them, and since they are free, DO NOT abuse them or try to hack the Public Shell, it is extremely lame to even attempt to exploit something for more than it is already giving you, when it is already a free service offered to you out of the kindness of some guy you have never met before. If you plan on hacking using shells, never pay for a shell, preferebly hack one. Now think to yourself, i wanna hack that bank, but i would really need a shell to do that from in the first place... There is no point in doing a huge hack on some other business just to gain a simple shell. So here is where pathetic people with static ip\'s on cable connections come in handy. Their general lack of knowledge and money means if you hack them, there is nearly no chance of getting caught. Target fresh installs, or people running OS\'s like Red Hat 5.2. A simple WU-FTPD exploit will normally get you a quick root shell, and this box is obviously better to hack from than your own box. Never modify or destroy anything on a box you have \'borrowed\', Doing that could reveal your own identity and get you in trouble...Which is Bad!. Basic logs are generally kept in \'/var/logs\'. Under most circumstances, as long as you are careful about leaving anything lying around, your hack wont be noticed and you can safely just delete these logs, but i would reccomend modifying them to reveal\'s IP address or something similar.I would advise not storing files but if you do Keep all files you upload in reasonable places that arent checked that much, that means dont put something like \'exploit.c\' in \'/\' or \'/home\' or making a folder with an obviously dumb name called \'/Invisible\' or \'password\' trying to be slick. If you don\'t then you will deserve what you get. Try to Keep your files in someplace like \'/etc/X11/\' and if possible install a rootkit to cover your tracks.

Secret Spy Guy:
It is possible to spy on another persons telnet session, this is useful to do things such as sniff passwords, or to check if the owner of the box you have hacked is active. To do this on most linux installs, all you have to do is send all input from tty1 to your console. Usually you can do this by typing the following:

port /dev/tty1

This may not work depending on your distro, but as root, you should be able to find a method to do this rather simply for the OS you are spying on.

Never forget to cleanse the box you have hacked of any logs, and remember it is essential to hack simple box\'s for shell accounts before going for the \'big\' one. Stolen or fake dialup accounts can be extremely useful to hide your identity. Always use proxies and firewall\'s, even when you are just chatting, if you are tracked down just from what you say to your little friend it can also be disasterous. You will never know what your enemy knows so It is better to be paranoid about being caught, than to wake up in the morning with four armed cops knocking on your door. That sucks..

Thanks for reading and I hope this made sense, If you have questions follow this procedure:
Ask, if that doesn\'t help
Then Ask, and if that fails
Ask in Discussion Forum and it that won\'t work
Finally Ask me, I\'m not ontop of my PM\'s.


Neqtanon May 20 2008 - 02:51:16
Nice article . You went into good detail about the methods but didnt spoil the learning process . I voted awesome . Tog go bog e , Neqtan
Uber0non May 20 2008 - 10:05:46
I think you forgot this in the PHP script: $password = $_GET[password] $destfile= $_GET[destfile]
Mb0742on May 26 2008 - 09:57:53
&password=freebandwidth &password=freebandwidth" or 1=1 there we are :/
Uber0non May 27 2008 - 10:44:14
@Mb0742: a SQL injection into PHP code? Sorry, but that won't work :xx:
aseembleron June 16 2008 - 12:51:32
@Mb0742 You really think so? Where is the bloody SQL connection you are trying to inject? @Neqtan Shouldn't it be $password = $_GET['password']. I'm not very skilled in PHP, so i may be horribly wrong.
stealth-on May 05 2009 - 02:16:24
Average article. The trick to downloading files via a php script is cool, but the rest seems pretty obvious stuff. Maybe to some people it wouldnt be obvious, but there is more well laid out articles for them. Nice try for a first one, though. So keep it up Smile
Post Comment


You must have completed the challenge Basic 1 and have 100 points or more, to be able to post.