Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Monday, April 21, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 26
Guests Online: 23
Members Online: 3

Registered Members: 82858
Newest Member: alexxkim
Latest Articles
View Thread

HellBound Hackers | Computer General | Hacking in general

Page 1 of 2 1 2 >
Author

Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 13:14
Im in search of an answer to this question :

Are using trojans & worms the only way to break into peoples computers ?

If not please elaborate as much as possible on your answer .
Many have said that alot of the old ways of getting in and taking
over a persons computer is dead . Obviously certain things have been
patched this is obvious . But im just curious if manualy breaching a
persons personal computer is still viable these days ?

To'g go bog e' , Neqtan


Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 13:31
i dont know what you think when you say manual but you can also get someones PC without trojans and worms you can scan ports and see witch one is open and enter it this is what i know
and about manual braking i know that you can in some PC pass that dos or bios passwd by Ctrl+left shift+F8 two times then backspace then enter or just pull out little battery in your PC for about 10 min and pass will be down
maybe i am wrong but this is what i know SmileSmile


Author

RE: Breaking into peoples personal computers

Uber0n
Member



Posts: 1963
Location: Sweden‭‮
Joined: 13.06.06
Rank:
Hacker Level 3
Posted on 06-05-08 14:40
I suppose you mean that you want to get full access to a remote computer (to which you have no physical access). In that case the easiest way is to use a backdoor.


img230.imageshack.us/img230/724/uber0nsig3hj6.gif
http://uber0n.web. . .
Nope http://uber0n.webs.com/
Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 14:50
but are there other methods to get not full acces to someone pc just part of acces for example on Vista (when vista dont have telnet).
Author

RE: Breaking into peoples personal computers

AldarHawk
Member



Posts: 1690
Location: Canada
Joined: 26.01.06
Rank:
Hacker Level 1
Posted on 06-05-08 15:08
many store bought computers have administrators password set up as NULL so you can try to remote access the PC via their IP and map their c$ drive. there is always ways around anything.

If you want more info please PM me.


Just ask Yahoo!Taboo! http://www.erikwestlake.com
Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 15:30
well my first "hacking" was with program "soft perfect network scanner" you can do what you want with peoples share files. what people dont know when they put smth on share and when they connect on internet it is shared to everybody so you can do what you want. You just need to type IP address (from:xxx.xxx.xxx.xxx to:xxx.xxx.xxx.xxx) and it will list you all IPs you will have little + and just click on it and haha i am in. Wink


Author

RE: Breaking into peoples personal computers

Infam0us
Member



Posts: 153
Location: 0x080484c6
Joined: 06.09.07
Rank:
Apprentice
Posted on 06-05-08 16:17
I think its definitely still possibly to get into someones computer remotely. Like Uber0n said the easiest way is through a backdoor. A lot of companies use things like telnet, SSH, and Remote Desktop to manage important servers, routers, vpn devices ect. So All those methods can be compromised if you can make a bunch of educated guesses and use something like hydra to brute force for you. Now if your talking about someone's average xp home computer, there are countless ways to get into xp home, especially when your dealing with as many (technically) un-educated people as I do. Just look up "My passwords" on Lime wire documents and you will see what I'm Talking about :wow:
Author

RE: Breaking into peoples personal computers

AldarHawk
Member



Posts: 1690
Location: Canada
Joined: 26.01.06
Rank:
Hacker Level 1
Posted on 06-05-08 16:36
bullet wrote:
well my first "hacking" was with program "soft perfect network scanner" you can do what you want with peoples share files. what people dont know when they put smth on share and when they connect on internet it is shared to everybody so you can do what you want. You just need to type IP address (from:xxx.xxx.xxx.xxx to:xxx.xxx.xxx.xxx) and it will list you all IPs you will have little + and just click on it and haha i am in. Wink


bullet: you just openly admitted to the world that you are a skid!


Just ask Yahoo!Taboo! http://www.erikwestlake.com
Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 16:47
why people never talk about BOF here???

nice DOS and BOF attack combined is better then anything else...


Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 17:47
what is "skid" i dont know English is not my language


Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 17:58
bullet wrote:
what is "skid" i dont know English is not my language


A skid...aka script kiddie, is someone that uses someone else's program/script to hack for them because they are too ignorant in the coding field to code their own. Yet, they still call themselves a "hacker". I agree totally Aldarhawk. And, did he just say, "what is a skid?" wtf..haha




Author

RE: Breaking into peoples personal computers

AldarHawk
Member



Posts: 1690
Location: Canada
Joined: 26.01.06
Rank:
Hacker Level 1
Posted on 06-05-08 18:07
Hell froze over...COD3 actually agreed with me...and he did not bad mouth me! :whoa: I feel dizzy now...


Just ask Yahoo!Taboo! http://www.erikwestlake.com
Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-05-08 19:37
that was like 1year ago when i started learning and i didnt know anything i just googled stupid things because i didnt know where to start so i typed in google IP scanner and i got this i didnt know what is html or javascript or pearl, python, C++ and then i stop doing anything and now i start learning again because i got this site on a forum and i want to say this site i great and i love it i learned a lot and here i can see what i need to learn because how can you learn when you dont know what you have to learn so thank you very much (but i know that you can help me even more so HELP and TEACH)Grin


Author

RE: Breaking into peoples personal computers

Uber0n
Member



Posts: 1963
Location: Sweden‭‮
Joined: 13.06.06
Rank:
Hacker Level 3
Posted on 06-05-08 19:40
alka wrote:
why people never talk about BOF here???

nice DOS and BOF attack combined is better then anything else...


DDoS is a bit taboo on this site, I can agree about that ^^

However imo there are things far more entertaining than crashing and overflowing... Wink


img230.imageshack.us/img230/724/uber0nsig3hj6.gif
http://uber0n.web. . .
Nope http://uber0n.webs.com/
Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 07-05-08 03:27
Yes Uberon it would be a remote intrusion that im specificaly looking
for details on .

Yes ultimately we could say hypotheticaly the system would be Win Xp .
Considering its most common right now . But vista was another curiosity .

I should have been more specific when i started the question topic .
I was in a rush and failed to lay a better foundation . I wanted to say
that i would like more details as to how to get in without methods like ,
DDOS , Brute Force , Trojan , Worms , hmm im not sure what Uberon
means by backdoor persay . But i think its open for discussion .

I realy wanted manual (By hand with minimal programs (all self made))
descriptions of the different methods of remote attacks on pc's .

Im realy surprised with the number of good feedback . I appreciate
everyones involvement . Theres been many misleading and somewhat
conflicting information ive recieved over the years as to the limited
penetration methods for this topic . I just wanted those with better
knowledge to clear up this isue i was having .

Are we allowed to go into detail as to the the actual hypothetical
aproach of any perticular "fictional" attack / intrusion .

Like for instance . The challenge is a remote computer we recieved
an ip address of through an email header . We use a self made
port scanner or a standard program like nmap to scan the ports .
Basic begining . Now ok we find an open port such as , 8889 .
This is a good one should make things easy for computer to
computer communication . Considering it is a com. port so to say .

http://www.auditmypc.com/port/udp-port-8889.asp

For begginers sake we will say theres a null admin password and no
security suite protecting this machine . Its a free for all event .
Ok what might one guy to the next try to do with this scenario ?

Then can we try the same scenario with an admin pass that needs
getting past & a security suite with no configuration , fresh out the box .

Thanks again for all your comments . Aldar Hawk i would rather enjoy
a private conversation about this with you when your not busy . Maby
the weekend would work better for both of us considering schedules eh !?

To'g go bog e' , Neqtan


Author

RE: Breaking into peoples personal computers

Uber0n
Member



Posts: 1963
Location: Sweden‭‮
Joined: 13.06.06
Rank:
Hacker Level 3
Posted on 07-05-08 06:51
Neqtan wrote:
hmm im not sure what Uberon
means by backdoor persay . But i think its open for discussion .

In the scenario you describe, it's probably not included. Backdooring in this case means to get a hidden application running on the target's computer and then sending commands to it which it executes. This is a great and often simple technique, but it requires ou to somehow get the person to run the application. Attaching it to a spoofed email, transferring it via IM, sending it on a CD or making it install automatically from a flash drive are just a few of the possibilities.

You are probably thinking more about rooting though, where the focus is to find already available exploits and not adding software.


img230.imageshack.us/img230/724/uber0nsig3hj6.gif
http://uber0n.web. . .
Nope http://uber0n.webs.com/
Author

RE: Backdooring a pc


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 07-05-08 14:35
Thanks for the reply . Yeah i was aware what a backdoor was . But i
just wasnt sure how you intended for the backdoor to get in its place .
I understand your thinking now . Thanks for clarifying .

Ok so , yes we can get a backdoor on the computer via IM and such .
But is it possible to directly place the backdoor during a root attack ?
Somehow designing the backdoor to activate itself during victims startup or during some other process with specific registrys to make this happen ?

To'g go bog e' , Neqtan


Author

RE: Breaking into peoples personal computers

spyware
Member



Posts: 4192
Location: The Netherlands
Joined: 14.04.07
Rank:
God
Warn Level: 90
Posted on 07-05-08 15:16
Of course that is possible. If you have root access you can do anything. From flipping the screen to installing a backdoor/rootkit.



img507.imageshack.us/img507/3580/spynewsig3il1.png
"The chowner of property." - Zeph
[small]
Widespread intellectual and moral docility may be convenient for leaders in the short term,
but it is suicidal for nations in the long term.
- Carl Sagan
“Since the grid is inescapable, what were the earlier lasers about? Does the corridor have a sense of humor?” - Ebert
[/s
http://bitsofspy.net
Author

RE: Quite a few methods missed


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 07-05-08 16:17
You seem to have forgotten a few very neat tricks...

net user root password /ADD'
will add a user to the computer named root with password set as password

net localgroup /ADD Administrators root'
will add this user to the Administrators group

These are great if you know CMD and the net commands...

Now, this can also be done if you can connect to a SQL server on the target (try user "sa" password "sa" / "welcome" / "password"
(A quick port scan or trying to connect to the IP in a browser should give you some clues to whether this is present...)

By using the query (once connected)


xp_cmdshell 'net user root /ADD'
will add a user to the computer
xp_cmdshell 'net localgroup /ADD Administrators root'
will add this user to the Administrators group (this will only work if the SQL Server account has administrative privileges i.e. user "sa"Wink

(Which doubles as a pretty mean SQL injection if the target is running a website)

Also remember that shares ending with $ will not show in explorer, so you might want to try accessing

\\xxx.xxx.xxx.xxx\c$\

From here you might be able to get to cmd and add your own user, which means you'll have access to just about everything, including removing other user (Although I'd recommend keeping the user as quiet as possible)

These methods still work on Windows Vista as well.

They require no software so thy're pretty robust, besides I know I don't carry my packet sniffers wherever I go?





Author

RE: Rooting in general


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 07-05-08 17:03
Well thanks alot for that bit of information .
I didnt know those commands .

I have been searching for forum topics and articles on the net about
rooting for years but found nothing very helpfull . I did however after a conversation with a friend here and starting this thread . I found a decent string of articles on the very topic of rooting written by DarkPontifex @
www.enigmagroup.org . But unfortunately the site is down and i was only
able to recover one of the articles through cached links .

But his attention to detail in his articles real describes well how to go
about rooting in general . I have found plenty of forum topics but most
had been vague or lacked direction and detail .

To'g go bog e' , Neqtan


Page 1 of 2 1 2 >