badbrein Posted March 3, 2007 Share Posted March 3, 2007 helo! i scanned a website and saw that port 22222 is open means website is affected by trojan but how hackers do that? plz tel me Quote Link to comment Share on other sites More sharing options...
SomeoneE1se Posted March 3, 2007 Share Posted March 3, 2007 huh?? oh well ok... first you have to find a school any school but a college works best because you need the .edu part type thing... then you call up the principal and tell him to unlock the outer level port sub-system... He should know what that means then you super-tellnet into it on port 97554 that port will be open if the sub-system was unlockered correctly.... if not it might be port 79553 that's ok too but not as gooder then you bypass the super-system locker by guessing the password it should be something like password or drowssap or happypants... from there tunnel into port 22222 and any computer will let you on because you have the .edu part thingy... the tellnet program will guide you just use tellnet help hax and it should tell you what to do next.... if you didn't understand let me what part and I'll help out some more everyone else sorry for blowing the secret but I was bored Quote Link to comment Share on other sites More sharing options...
badbrein Posted March 3, 2007 Author Share Posted March 3, 2007 helo! sorry for this questions but... :( what is the meaning of getting the .edu part and that is the sub-system? i want to understand only these two things, other's are explained very nicely! thanx h4x0r! Quote Link to comment Share on other sites More sharing options...
moonlit Posted March 3, 2007 Share Posted March 3, 2007 helo!sorry for this questions but... :( what is the meaning of getting the .edu part and that is the sub-system? i want to understand only these two things, other's are explained very nicely! thanx h4x0r! He's making fun of you. There are many ways of planting trojans, the easiest of which are physical access to the machine or stupid people running things they shouldn't (that contain viruses). Other options might include remotely exploiting a service or application running on a machine (with perhaps a buffer overflow or whatever) and make it run your own code which might download and run the trojan locally or using an application's update features to download a trojan disguised as an update instead of the real update. ...and so to close, I'll use the obligatory *sigh*. Quote Link to comment Share on other sites More sharing options...
deleted Posted March 3, 2007 Share Posted March 3, 2007 Well, the most common way a trojan gets onto a machine is through a program they have install. !!CLICK HERE FOR AN E-GREETING CARD!! !!OH, NO, DOWNLOAD THIS SAFE ACTIVEX CONTROL!! Quote Link to comment Share on other sites More sharing options...
unasoto Posted March 3, 2007 Share Posted March 3, 2007 Well, the most common way a trojan gets onto a machine is through a program they have install.!!CLICK HERE FOR AN E-GREETING CARD!! !!OH, NO, DOWNLOAD THIS SAFE ACTIVEX CONTROL!! and don't forget the FREE PORN download this program and install it. ;) Quote Link to comment Share on other sites More sharing options...
SomeoneE1se Posted March 3, 2007 Share Posted March 3, 2007 helo!sorry for this questions but... :( what is the meaning of getting the .edu part and that is the sub-system? i want to understand only these two things, other's are explained very nicely! thanx h4x0r! He's making fun of you. There are many ways of planting trojans, the easiest of which are physical access to the machine or stupid people running things they shouldn't (that contain viruses). Other options might include remotely exploiting a service or application running on a machine (with perhaps a buffer overflow or whatever) and make it run your own code which might download and run the trojan locally or using an application's update features to download a trojan disguised as an update instead of the real update. ...and so to close, I'll use the obligatory *sigh*. awww moontlit you're no fun... and had he posted in the New here forum I would have helped. I also assumed that he'd get it as a joke if he was using a port scanner, sorry about that dude. Quote Link to comment Share on other sites More sharing options...
Deveant Posted March 4, 2007 Share Posted March 4, 2007 lol Tetrasoft u forgot the one that comes up, "I am not a virus it is safe to install me" one Quote Link to comment Share on other sites More sharing options...
theSmiler Posted March 4, 2007 Share Posted March 4, 2007 Watch the movie "Hackers" for some great hacking tips. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.