1000 hacking tuts

seeders: 7
leechers: 3
Added on March 6, 2013 by lazymindin Books
Torrent verified.



1000 hacking tuts (Size: 12.41 MB)
 hacking on XP part 2.doc8.25 KB
 hacking on XP part 1.doc4.58 KB
 hacking on XP part 3.doc4.51 KB
 hacking on XP part 4.doc0 bytes
 hacking on XP part 5.doc0 bytes
 CrptoProcess.jpg21.25 KB
 phase.jpg19.13 KB
 electro.jpg18.85 KB
 NormalCrypto.jpg17.09 KB
 QuantumCryptoS.jpg16.03 KB
 NormalCryptoS.jpg13.69 KB
 QuantumCrypto.jpg13.02 KB
 Axes.jpg5.66 KB
 quantum.zip128.34 KB
 passwd.txt49.45 KB
 rsa.txt10.51 KB
 encryption.txt8.39 KB
 desbreak.zip4.91 KB
 Sk00l m3 ASM!!#@$!@#.txt112.76 KB
 Pascal.txt70.05 KB
 Introduction to Perl.zip31.43 KB
 Basics of am 3mp33j3w.txt18.64 KB
 icq.txt52.94 KB
 INTRODUCTION TO DENIAL OF SERVICE.txt46.16 KB
 cable.txt20.85 KB
 Exploiting Cisco Systems.txt20.45 KB
 http.txt20.01 KB
 unixvirii.txt11.2 KB
 IP and port Info using Netstat.txt10.49 KB
 mlist.txt9.57 KB
 Mail Bombing and List Linking.txt7.27 KB
 inputval.txt6.22 KB
 search2.txt38.28 KB
 kiddies.txt20.18 KB
 ezine.txt7.33 KB
 linuxnet.txt34.65 KB
 2038-time-bug.txt7.06 KB
 slackcs.txt7.01 KB
 windos9x.zip11.6 KB
 hacker.txt11.24 KB
 traceroute.txt5.14 KB
 RECOVER.txt4.78 KB
 The Official Phreaker's Manual.txt499.25 KB
 HACKDICT.txt272 KB
 Cultural Formations in Text-Based Virtual Realties.txt257.27 KB
 Hackers A-Z.txt256 KB
 Site Security Handbook.txt247.43 KB
 Free Speech in Cyberspace.txt244.25 KB
 raj registry.doc195 KB
 LENROS~1.txt184.58 KB
 hacking and phreaking.doc168 KB
 Excellent tricks and techniques of Google Hacks.txt157.7 KB
 Algorithms Explained.doc157 KB
 Presumed Guilty.txt153.76 KB
 UNIX Use and Security - By the Prophet.txt153.74 KB
 Hacking for Dummies Volume 2.doc147 KB
 More Password Cracking Decrypted.doc127 KB
 Hacking into Linux.doc124.5 KB
 SMTP-Simple Mail Transfer Protocol.txt117.61 KB
 The Moterola Bible.txt116.99 KB
 Electropolos - Communication and Comunity on IRC.txt112.45 KB
 Guide to Hacking with sub7.doc106 KB
 liveusb-creator.png101.54 KB
 Defamation Liability of Computerized Bulliten Board Operators.txt101.36 KB
 SUNDEVIL.txt100.17 KB
 How to learn to hack in easy steps.doc100 KB
 Computer Chrime - Current Practices, Problems and Proposed So.txt96.53 KB
 The National Information Infrastructure-Agenda for Action.txt96.49 KB
 The Cracking Manual.txt86.38 KB
 The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt85.17 KB
 UNIX- A Hacking Tutorial.sir82.26 KB
 A UNIX Hacking Tutorial.txt82.2 KB


Description

_________ ___ _______
~=._ _.=~/ / _____/ | | ~=._ _.=~/
~=__=~ / _____ | | / | ~=__=~ /
_.=~ ~=._/ / | |/ | _.=~ ~=._/
_.=~ / ~=._ /_______ / |___|____|__ / .=~ / ~=.
L------------/------7 / / L------------/------7
/ /
/
/ /
OK, this is my mini guide to the easiest 'hacking' there is ( I think ) if any
one knows different then mail me and tell me :) .
Most FTP servers have the directory /pub which stores all the 'public' information
for you to download. But along side /pub you will probably find other directorys
such as /bin and /etc its the /etc directory which is important. In this directory
there is normally a file called passwd. . This looks something like this :-
root:7GHgfHgfhG:1127:20:Superuser
jgibson:7fOsTXF2pA1W2:1128:20:Jim Gibson,,,,,,,:/usr/people/jgibson:/bin/csh
tvr:EUyd5XAAtv2dA:1129:20:Tovar:/usr/people/tvr:/bin/csh
mcn:t3e.QVzvUC1T.:1130:20:Greatbear,,,,,,,:/usr/people/mcn:/bin/csh
mouse:EUyd5XAAtv2dA:1131:20:Melissa P.:/usr/people/mouse:/bin/csh
This is where all the user names and passwords are kept. For example, root is
the superuser and the rest are normal users on the site. The bit after the word
root or mcn such as in this example (EUyd5XAAtv2dA) is the password BUT it is
encrypted. So you use a password cracker....which you can d/l from numerous sites
which I will give some URL's to at the end of this document. With these password
crackers you will be asked to supply a passwd. file which you download from the
etc directory of the FTP server and a dictionary file which the crackers progam
will go through and try to see if it can make any match. And as many people use
simple passwords you can use a 'normal' dictionary file. But when ppl REALLY don't
want you to break their machines they set their passwords to things such as GHTiCk45
which Random Word Generator will create (eventually ). Which is where programs such
as Random Word Generator come in. ( Sorry just pluging my software )
BTW the bad news is that new sites NORMALLY have password files which look like this :-
root:x:0:1:0000-Admin(0000):/:/sbin/sh
The x signifies shadowed - you can't use a cracker to crack it because there's nothing
there to crack, its hidden somewhere else that you can't get to. x is also represented
as a * or sometimes a . Ones like the top example are known as un-shadowed password
files normally found at places with .org domain or .net and prehaps even .edu sites.
(Also cough .nasa.gov cough sites).
If you want a normal dictionary file i recommend you go to
http://www.globalkos.org and download kOS Krack which
has a 3 MEG dictionary file. Then run a .passwd cracking program
such as jack the ripper or hades or killer crack ( I recommend ) against the
.passwd file and dictionary file. Depending upon the amount of passwords in
the .passwd file, the size of the dictionary file and the speed of the processor
it could be a lengthy process.
Eventually once you have cracked a password you need a basic knowledge of unix.
I have included the necassary commands to upload a different index.html file to
a server :-
Connect to a server through ftp prefably going through a few shells to hide your
host and login using the hacked account at the Login: Password: part.
Then once connected type
dir or list
If there's a directory called public_html@ or something similar change directory
using the Simple dos cd command ( cd public_html )
Then type binary to set the mode to binary transfer ( so you can send images if
necassary )
Then type put index.html or whatever the index file is called.
It will then ask which transfer you wish to use, Z-Modem is the best.
Select the file at your end you wish to upload and send it.
Thats it !
If you have root delete any log files too.
Please note that this process varys machine to machine.
To change the password file for the account ( very mean ) login in through telnet
and simply type passwd at the prompt and set the password for the account to anything
you wish.
Thats it....if ya don't understand it read it about 10x if ya still don't ask someone
else i am too busy with errrr stuff..
Links :-
Where you got this I hope.
Stay cool and be somebodys fool everyone
Darkfool

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
12.41 MB
seeders:7
leechers:3
1000 hacking tuts