Thats it... what you do from here is the matter of other how2s. You
also might be asking what is NetCat for... well some exploits require
it. Notice that above exploit used anonymous login, so if anonymous
access was disabled there, it wouldnt work. Thats why we were checking
for anonymous access at step f. If anon access was disabled, this exploit
would only work if you had a login and password to ftp to the box...
so you must read source to see how it works. Different exploits work
differently and have different syntax. This was just one easy example,
but basic prinsiple is the same.
Thats all it takes to break into a machine... Well that is if machine
is not protected or something like that. In our case machine was totaly
open on the internet hackable by anybody. There are a lot of machines
out there like this. But also a lot of protected machines that are
behind different firewalls and with different security mechanisms
installed. Stealth coordinated attack techniques will be discussed in
later documentation. Documentadion on how to remain undetected and
various other tricks of the trade will be done later too.
PS. all the above explainations should give you general idea what
crackers do to break into your network. Hopefuly you will use this
information wisely to protect your network from intrusions.
Mail me for any questions you might have.
kgb_kid 10th of May 2001 07H37
-------
email: searchstops@gmail.com
site: http://www.searchstops.com/
Jai Shree Raam
No comments:
Post a Comment