DJ Renfield (dj_renfield) wrote in hakrhlp,
DJ Renfield
dj_renfield
hakrhlp

h3xc45t3r's help Part 2 - The Almighty Connection



So, the basics:

I still consider myself a neophyte, because I'm still uncomfortable with doing anything that I'm not sure about. I wouldn't try using what I write here to do something heavy-duty, because it's being changed already.

Connection:

This is the most important part of any hack. How do you connect to a remote system? Well, as I found out, it's actually really easy, and at the same time, a pain in the ass. Let me start by saying that if you have AOL, you might not want to consider hacking anything yet for a few simple reasons:

1) AOL takes up something like 46% of your RAM when it's loading
2) The Browser only connects you to the AOL Server, which then sends you to the Internet via it's own devices. This is why when you go to sites like Moviefone or something like that in AOL, you get the AOL Members site. This brings us to #3:
3) When AOL connects, it gives you a static, network IP address. This makes you all kinds of traceable.

Now, when I first learned this, I was a bit disheartened, but a quick change to Adelphia High Speed and I was back. So, if you have AOL, just find another comp to hack from.

Now then, back to the connection. To understand this, you first have to understand a few things about your computer, and its points of connection. If you are running a standard Windows system, you've got something like 56,000 virtual data ports through which your system can obtain information. Now, any of these ports can transmit and download information, and all of them serve as entry points into a system. Here's the problem, though: Thanks to handy-dandy firewalling software, 98% of these ports are already blocked from entry, except the ones that your computer is told to leave open (such as port 80 for the Internet, or port 6346 for Limewire).

I don't rightly know how to open these ports remotely yet, but I am working on a program to actively monitor your ports at the moment. I will have it available for download when I finish it. Either way, to make a connection to a system, you have to know which system you want to hack. Every computer connected to the Internet has what's known as an Internet Protocol (IP) address. This address is, for sake of argument, the computer's name on the internet, and it's how servers know where your downloaded files go, and what sites you are and are not allowed to view. There are a number of different ways to get an IP address, but the easiest way that I've found is through your Email Headers. To view these headers, change the settings of your email client to view the full headers of all your incoming mail. This way, whenever you get an email, right up there where it tells you who the email came from, you will see a number that looks something like xxx.xxx.xxx.xxx roughly. Fill in the x's, and that is the physical address of the computer that sent you the email.

The Next part in establishing a connection is verifying which ports are open on that system. The only way I've seen to do that is to download a program (straight from a legit site like download.com) called a Port Scanner. As the name implies, this will scan an entered IP address for open ports. I'll post a list of relevant ports and IP addresses to look out for in a later post. The only problem with that is that a portscanner works by sending tiny signals to all the ports on a system, and waits for the return to tell which ones are open. This is completely noticeable to the semi-conscious network administrator, so use them carefully.

Okay, so let's say that the portscanner tells us that port 32 on our target computer is open. This is cool, because it gives us a point of entry. So, how do we make our computer talk to the other computer? Simple. On a Windows program, your DOS prompt has a nifty little feature called Telnet, which allows you to remotely connect to computers. Cool, eh? To use this thing, pull up your DOS prompt, and type in "Telnet " then the IP address you want to connect to and " 32" The whole entry should look like this:

C:\Documents and Settings\Owner>Telnet xxx.xxx.xxx.xxx 32

This tells the computer to use telnet and open a connection to your target on that port. Port 32 is the standard port for Telnet functions, so you'll find that one open the most. From there, we have to gain access, but that's for another day (specifically because I'm not entirely sure how yet). Please, this is a learning forum, so if you know any other ways to approach this situation, comment and tell us. There is nothing I'd like to see more than a new generation of Hackers doing what they do best: finding information.

-h3xc45t3r

Subscribe
  • Post a new comment

    Error

    default userpic
    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 0 comments