Jump to content

agentaika

Active Members
  • Posts

    32
  • Joined

  • Last visited

Everything posted by agentaika

  1. You're right. The post should have gone here: http://hak5.org/forums/index.php?showforum=20 Cool beans. Thanks. I won't.
  2. Does it need any specific specs, or would any model do?
  3. Not everyone has the time or the need to learn all of the ins and outs of their operating system. Sure, they should know some basics, but they really don't need to know how to compile programs from source, or add repositories through the command line. An operating system should help us get our work done. It shouldn't give us more work to do. I installed Ubuntu on my mother's computer and she uses it with no problem.
  4. That might go against the point of the test. We're trying to verify the security of his online server. But I'll still be able to make use of the information you've provided. Maybe I should give USBSwitchblade a second look. Thank you. Running an exploit is the only way to get unauthorized access to someone's computer? I find it so odd that someone like me, who has been using computers since the 80s, is having a hard time understanding this when 12 year olds today are able to hack without any problem. :( What in the hell are these kids reading? I want that. lol. Oh noes. This is a white hat attack. I don't want to do anything that could do serious damage.
  5. I could never understand why someone would recommend something like Debian, Fedora, and (especially) Slackware to someone who is new to Linux. I've been using Linux for many years now and I still have problems with those distros. Ubuntu is the epitome of ease. It's the only distro worth recommending to those who just want to get their work done, and would rather not spend too much time tinkering with settings. http://distrowatch.com/
  6. Thanks for the replies. I'm not looking to make a career out of hacking. I just want to help my cousin with the security on his server, and move on. lol. What ever knowledge I gain I'll likely use for something else. Or maybe I could do a little white hat hacking on the side? I don't know. But right now I would prefer a book that just, flat out, told me how to hack, step by step. I learn best by watching examples, and then filling in the details later. And regarding programming, I already know Python and some C++. I'll give this a try.
  7. I don't know. That is why I made this thread. Which program would I use? Here is the workflow I've figured out so far. Conceal Identity - I won't need to conceal my identity for this test. Exploitation - Use nmap and hping to get information (OS, software, etc) about Victim - Go to milworm, or a similar site, to find exploits for software used by Victim - Apply exploit using Metasploit - Backdoor the Victim using socat - Transfer files using --??-- - Upload a trojan (it'll just be a text file) to create a permanent backdoor for next hack - Clear the Victim's log so actions won't be cataloged using --??-- Administrator Access - Use nmap and hping to get information (OS, software, etc) about Victim - Use THC-Hydra to crack administrator password - Backdoor the Victim using socat - Transfer files using --??-- - Upload a trojan to create a permanent backdoor for next hack - Clear the Victim's log so actions won't be cataloged using --??--
  8. Oodalalee! This is exactly what I need right now. For this test that might actually be a good thing. We'll be able to both look through the logs and see what I did wrong, and what he did wrong. Will do. Thanks again.
  9. I just noticed that netcat hasn't been updated in 4 years. Does it still work as well today, or should I consider socat? http://www.dest-unreach.org/socat/ Ah. So I need to use 'back door' as my search topic? That clears up a little confusion. Thank you.
  10. But wouldn't I need permission to install SSH onto the target? I apologize for not explaining the point of my question before hand, but my question relates to a hacking test that I'm doing for my cousin. Before he goes public with his site, he wants to see if I can hack it. netcat looks very promising. Thank you for the link. I'll look into it later today. Thank you all for your replies. Any additional information is welcome.
  11. Someone told me this was possible. So there is no way to upload a file to someone's computer, or download a file from their computer, without authenticating?
  12. Goodness.... If I wanted to get remote access of a Windows computer without the admin's permission using Backtrack Linux, what would I need to use? My guess is that I would have to start with a scan using nmap and/or hping, look for open ports and vulnerabilities, and then do a dictionary attack using THC-Hydra. I just don't know what to do after this point. My goal is to crack the admin's password, upload a text file into the c:/ folder, and download a file from the system32 folder. I want to do this for a test that I explained in detail here in this thread.
  13. Ugg... This is so overly complicated... For the last 40 minutes now I've been trying to log into my own ftp using PuTTY, pscp, and psftp, but I keep getting "connection refused" and other error messages. Is there an easy way to and transfer files to and from a remote computer using ssh and the command terminal in Linux? In a perfect world the command SHOULD read 'sshlogin username:password@55.123.55.12 upload /home/me/test.txt to c:/temp' but, of course, none of the examples I've found give anything this clear. lol
  14. You can transfer files with PSCP, PuTTY's "secure copy client." http://the.earth.li/~sgtatham/putty/0.60/h...pter5.html#pscp I'll look them up. Thanks folks.
  15. I found a solution. I have to use something called PuTTY http://the.earth.li/~sgtatham/putty/0.60/htmldoc/
  16. I'm having a hard time finding a direct example on how to do this. If I wanted to upload a file to someone's computer [FROM /home/me/file.txt --> TO c:/windows/], or get a file from someone else's computer [TO /home/me/ <-- FROM c:/windows/file.txt] what would I need to type in? I use Backtrack 3 for my penetration tests.
  17. I've been doing a lot of digging through Google and Amazon for quality hacking books. So far Practical Hacking Techniques and Countermeasures by Mark D. Spivey tops my list. It looks very promising, and seems to provide very clear and direct information on how to attack and defend using Windows and Linux applications. Have any of you read this books, or know of similar books that might be better?
  18. Thanks a lot for painting a clear picture of what I need to do, Jayze. So, basically, to perform these tests I'll need to first gather information about his server with a program like nmap, look on a site like milworm for exploits to apply, and then apply those exploits with metasploit to gain root access. Once I get root access, I'll be able to upload a trojan (for the test it'll just be a text file saying "PWNED"), try to download some password hashes, clear the logs to cover my tracks, and then log out. If I have this right, I think I only have 2 questions remaining: - Could I also gain root access by cracking his admin password with a program like THC-Hydra? - What would I use to log into, and browse, the "Victim's" computer?
  19. I don't know. I'm not even 100% sure if Apache is what he plans on using. But I do know he plans on setting everything up in Windows because that is the operating system he knows best. Personally, I would use Linux.
  20. I started with Suse. I actually bought it from a convention and was never able to install it properly.
  21. I don't believe he'll be running the servers from a virtual machine. :) I've noticed, and I just recently noticed that its categories are listed in order of operation. That is very helpful. lol. He has something better planned. He's going to record a video using his webcam giving me permission to do white hat hacking to his server. :) But I appreciate the warning. Thanks folks.
  22. He does plan on doing regular backups of important data. They're Windows servers, but when I do the tests, I'm going to "attack" as if I don't know this. Apache. He lives in a different state so we're not directly connected on the same network. I didn't know that. Thank you for your reply.
  23. agentaika

    Linux top 5

    Ubuntu Xubuntu Puppy Linux Depending on what you need to do, those could work well on the desktop.
  24. Ubuntu. Unlike many other distros, Ubuntu has a very strong community, a regular release cycle, and it works extraordinarily well. I've tried Suse, Mandriva, Mepis, etc, and none of them, in my opinion, come close to Ubuntu. http://www.ubuntu.com
×
×
  • Create New...