Get cash from your website. Sign up as affiliate.
4000 TV channels
Download TV Software. It's safe to install.
Safe to install software
Download TV Software. It's safe to install.
Number one rated software

Nov 16, 2009

Hacking Using DOS

Microsoft DOS came with some hidden hacking tool that I will discuss here.
This tool can be found in the directory c: \ \ windows if you use Win98, and if you
using WinXP then this tool is at C: \ \ WinXP \ \ system32. WinXP, Win2000 and WinNT
released with some additional Internet tools. So if you are still using Win98 then I
suggested replacing it with WinXP. Which of course has an additional feature securiti
and commands a good internet hacking. In this manual I will discuss about some
commands found in Win98 and WinXP

So for the user window, the following commands at the DOS hacking.


1. ping
2. tracert
3. telnet
4. ftp
5. netstat

1. ping

Utiliy is used to find the existence of the remote host.
Yan gmengirmkan a SYN signal to a remote host and if the remote host is returned then there is a remote machine.

Try you type this command:

C:\\windows>ping/?

*************

Newbie tip: type in \ '/? \' After the show dos command helpnya. So how do you learn various dos commands.
Is not WinXP, WinNT and Win2000 also has command 'help' to display all the dos commands.
*************
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list

Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don\'t Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.

So I can ping any ip address or domain name to check its presence on the internet.
For example I type "ping localhost" then I get.

Pinging chintan [127.0.0.1] with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 timemput *.*
sends all files from C:\\windows to /etc
5. \'mget\' to get multiple files from remote machine.
contohnya. ftp>mget *.*
gets all files from /etc to C:\\windows
6. \'open\' to establish a connection with remote host.
contohnya. ftp>open www.target.com
7. \'bye\' closes the connection and quits from ftp

For other commands from the ftp, please see their help.

Now on the FTP port (prot 21) is open www.nosecurity.com. A hacker will connect to the site
using the "ftp www.nosecurity.com" at the dos prompt. Then he will try to log in anonymously. With
assumption that www.nosecurity.com use linux servers, so hackers will mengtikkan orders
"Get / etc / apsswd" for the password file mendaptkan and mengcracknya. If you are a hacker, so do not forget
to remove the log.

5. netstat

You can specify a connection to the remote machine on a particular port, the port is only opened on the remote machine.
For example, if you want to specify a connection with www.target.com on port 23 (telnet) then the port should be
open at www.target.com. And all hacking activity typically use an open port. Typing "netstat /?" On
dos prompt gives:

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s
option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.



Options will explain their respective functions. And the most important is the option-a and-n. The-a displays
all ports are open on the machine. And if I use the-n option it will show ip
address instead of the domain. I get the following if I type "netstat-a" at the command prompt.

Active Connections

Proto Local Address Foreign Address State
TCP chintan:1027 0.0.0.0:0 LISTENING
TCP chintan:80 0.0.0.0:0 LISTENING
TCP chintan:135 0.0.0.0:0 LISTENING
TCP chintan:6435 0.0.0.0:0 LISTENING
TCP chintan:1025 0.0.0.0:0 LISTENING
TCP chintan:1026 0.0.0.0:0 LISTENING
TCP chintan:1028 0.0.0.0:0 LISTENING
TCP chintan:1309 0.0.0.0:0 LISTENING
TCP chintan:1310 0.0.0.0:0 LISTENING
TCP chintan:1285 rumcajs.box.sk:80 ESTABLISHED
TCP chintan:1296 l an-202-144-78-3.maa.sify.net:80 CLOSE_WAIT
TCP chintan:1297 lan-202-144-65-14.sify.net:80 ESTABLISHED
TCP chintan:1310 cdn-v13.websys.aol.com:80 ESTABLISHED
TCP chintan:1220 aiedownload.cps.intel.com:ftp ESTABLISHED

"Proto" stated the name of the protocol, "localaddress" gives us Ipaddress and open ports.
"Foreign Address" with Namor Ipaddress menyatkaan port connected to us. "State" states
current statement if a connection is "established" or listening, or just "waiting".

For example if I open http://www.yahoo.com then when I run "netstat-a"
I would get input like this:

\ "ESTABLISHED TCP 203.43.50.81:2034 www.yahoo.com:80 \"

My computer with the ip 203.43.50.81 port 2034 connected with yahoo on port 80
************************************************** ***************************
* Newbie tip: Dengna this way you can get the ip chat with someone who is. *
* The first time you run "netstat-an" and look under foreign ip address. Now begins *
* Private chat with other people. Also run "netstat-an" and you will get one *
* Ip foreign lagin eventually. This is the ip person.

0 comments:

Post a Comment