Forum » Omrežja in internet » kako lahko hekerji ti vdrejo v računalnik
kako lahko hekerji ti vdrejo v računalnik
r5r ::
men sploh ni jasn kako lahko hekerji prevzamejo oblast nad računalnikom ??
Hitra in enostavna znebitev: prekinitev linije(cvikcange, kabel > precvikane ) saj mislim
Hitra in enostavna znebitev: prekinitev linije(cvikcange, kabel > precvikane ) saj mislim
- premaknil: perci ()
Yohan del Sud ::
Se strinjam. res pa je da je taka rešitev za resnega uparabnika skoraj enaka samomoru. Strežnik mora biti online 24 ur, če ne ni strežnik. Je pa to res skrajna rešitev....
DavidJ ::
vi ste hudi.. kaj pa ce enostavno disconnectas? ce pa to ne gre pa izklopis racunalnik.. zdej bos pa rezu ...
"Do, or do not. There is no 'try'. "
- Yoda ('The Empire Strikes Back')
- Yoda ('The Empire Strikes Back')
ABX ::
O bom! Da ne boje rekli da posredujemo napačne informacije.
Vaša inštalacija je uspešno spodletela!
freejack ::
Perci, ne zavajaš folk, sam ne dajaš dovolj informacij. Preverjeno pomaga, če udariš monitor. Seveda ga morš tko udarit, da pade na tla, pri tem pa potegne kabel z napajalnika. Garantirano deluje.
Kk se lahk vdre v računalnik oz. prevzame oblast nad njim? Nimam nikakršnega namena koga žalit, sam če pa nimaš niti pojma kako naj bi vse skupaj potekalo, potem si pa ... zihr novinec na tem forumu Če ne,..pol pa uff
Verjamem, da boš bolj težko našel kake url-je o tem kako vdreti v kakšen računalnik (čeprav se da, če veš kje iskati), tko da uporabi glavo in malce razmisli. Zihr boš pogruntal.
Kk se lahk vdre v računalnik oz. prevzame oblast nad njim? Nimam nikakršnega namena koga žalit, sam če pa nimaš niti pojma kako naj bi vse skupaj potekalo, potem si pa ... zihr novinec na tem forumu Če ne,..pol pa uff
Verjamem, da boš bolj težko našel kake url-je o tem kako vdreti v kakšen računalnik (čeprav se da, če veš kje iskati), tko da uporabi glavo in malce razmisli. Zihr boš pogruntal.
IceIceBaby ::
"Hitra in enostavna znebitev: prekinitev linije(cvikcange, kabel > precvikane ) saj mislim"
Ja dokler se spet ne konektaš.
Sploh pa je fora v tem da ti neveš da ti nekdo po compu šari. Takoj ko to postane jasno ga lahko tudi killaš, oziroma kakorkoli ospraviš posledice vdora.
Če pa več hočeš zvedet o temu pa tale link
Ja dokler se spet ne konektaš.
Sploh pa je fora v tem da ti neveš da ti nekdo po compu šari. Takoj ko to postane jasno ga lahko tudi killaš, oziroma kakorkoli ospraviš posledice vdora.
Če pa več hočeš zvedet o temu pa tale link
Tito ::
Mislm, a ste že slišal za požarni zid in če nimate na svojem računalniku CIA inih strogo zaupnih podatkov vam noben norc nebo hekov! Pa še ena možnost je, da ne gledate trojancov (kliknime.exe ...)!
Pred parimi dnevi sem poslušal na radiju kako se znebiti virusev in hekerjev (Govoril je prevajalec pandinega antivirusa STROKOVNJAK TOREJ!!!) Kako se znebiti virusov: da ne vlečete piratskih programov, da ne vlečete filmov in mp3 datotek (so potencialni ubijalci sistemov!! ) in take bedarije je kvasu! Skratka namesto da bi se poglobil v temo Virusna zaščita je pridigal kot da bi bil kupljen od APZ saj najbrž je bil! Toda pustimo stroko naj opravlja dobro delo!
Pred parimi dnevi sem poslušal na radiju kako se znebiti virusev in hekerjev (Govoril je prevajalec pandinega antivirusa STROKOVNJAK TOREJ!!!) Kako se znebiti virusov: da ne vlečete piratskih programov, da ne vlečete filmov in mp3 datotek (so potencialni ubijalci sistemov!! ) in take bedarije je kvasu! Skratka namesto da bi se poglobil v temo Virusna zaščita je pridigal kot da bi bil kupljen od APZ saj najbrž je bil! Toda pustimo stroko naj opravlja dobro delo!
footprint ::
"Firewall tud ni 100% zaščita"
Res? Firewall z backdoori res ni rešitev. Če se poglobim v to potem ugotovim, da morm sam napisat Firewall saj vedno obstaja vsaj en backdoor (avtor se mora zaščititi).
Kaj pa če imamo Router neviden za ping in zaprt za nedovoljene porte, pa za njim FIrewall s svojo access in denay listo, pa potem Mail in WEBProxy z integriranim Virus scanerjem in zanjem še gateway v DMZ-ju šele potem pa zasebno omrežje varovano z intrusion detection softwareom?
Mislim, da potem človek malo bolje spi. Ima pa kopico problemov. Skoz more gledat a je kje bil vdor, kolk mailov je v karenteni, kolk virusov je uletel not, preverjat ali je Virus scaner naložu zadnjo bazo z neta,...
Poleg tega da je vsa ta oprema svinjsko draga pol pa še dva zaposlit da to počneta?!? Ja če si odvisen od Interneta in ti ta prinese dovolj da pokriješ stroške in še živiš s tem.
Bistvo je tudi če imaš tako močno zaščito vedno in še enkrat vedno, pa če ne drugaš s spyware ali trojanci bodo informacije, ki ne bi smele tekle v svet. Sam sem prepričan, da je večino licenčne programske opreme tako napisane, da če ne drugega dela baz s število instaliranih kopij (kar ni težko narest pa še ilegalno ni). Sam najbolj zaupam OpenSource programerjem čeprav nisem dovolj dober da bi lahko vedu da mi oni nisko kaj podtaknili. Sem pa prepričan, da če bi bi se hitro zvedl. Zatu na moji mašini rula Linux antivirusnega programa pa enostavno nimam.
Res? Firewall z backdoori res ni rešitev. Če se poglobim v to potem ugotovim, da morm sam napisat Firewall saj vedno obstaja vsaj en backdoor (avtor se mora zaščititi).
Kaj pa če imamo Router neviden za ping in zaprt za nedovoljene porte, pa za njim FIrewall s svojo access in denay listo, pa potem Mail in WEBProxy z integriranim Virus scanerjem in zanjem še gateway v DMZ-ju šele potem pa zasebno omrežje varovano z intrusion detection softwareom?
Mislim, da potem človek malo bolje spi. Ima pa kopico problemov. Skoz more gledat a je kje bil vdor, kolk mailov je v karenteni, kolk virusov je uletel not, preverjat ali je Virus scaner naložu zadnjo bazo z neta,...
Poleg tega da je vsa ta oprema svinjsko draga pol pa še dva zaposlit da to počneta?!? Ja če si odvisen od Interneta in ti ta prinese dovolj da pokriješ stroške in še živiš s tem.
Bistvo je tudi če imaš tako močno zaščito vedno in še enkrat vedno, pa če ne drugaš s spyware ali trojanci bodo informacije, ki ne bi smele tekle v svet. Sam sem prepričan, da je večino licenčne programske opreme tako napisane, da če ne drugega dela baz s število instaliranih kopij (kar ni težko narest pa še ilegalno ni). Sam najbolj zaupam OpenSource programerjem čeprav nisem dovolj dober da bi lahko vedu da mi oni nisko kaj podtaknili. Sem pa prepričan, da če bi bi se hitro zvedl. Zatu na moji mašini rula Linux antivirusnega programa pa enostavno nimam.
andrej ::
nope, se vedno se da vdret vsaj iz dveh faktorjev:
1. cloveska napaka - nobena napisana koda ni bug free.
2. druga cloveska napaka pri konfiguraciji. to se dogaja zelo zelo pogosto.
3. ce tudi mas bug free firewall in popolno konfiguracija se vedno obstaja nacin kako prid noter... da vidimo ce kdo pogrunta ;)
ce nekdo sam napise firewall, se grem stavit, da bo v 99.9999 % primeri "slabsi" kot obstojeci produkti na trgu. Da niti ne govorimo kako dolgo bi trajalo, da bi napisal funkcionalno celoto.
1. cloveska napaka - nobena napisana koda ni bug free.
2. druga cloveska napaka pri konfiguraciji. to se dogaja zelo zelo pogosto.
3. ce tudi mas bug free firewall in popolno konfiguracija se vedno obstaja nacin kako prid noter... da vidimo ce kdo pogrunta ;)
ce nekdo sam napise firewall, se grem stavit, da bo v 99.9999 % primeri "slabsi" kot obstojeci produkti na trgu. Da niti ne govorimo kako dolgo bi trajalo, da bi napisal funkcionalno celoto.
freejack ::
[18:05] On your marks.
[18:05] Get set.
[18:05] Go!
[18:05] okay, so today's topic is...
[18:06] how servers are hacked
[18:06] basically, of course
[18:06] cracked
[18:06] yeah, cracked
[18:06] terminology...
[18:06] hehe
[18:06] :-)
[18:06] that's what you wrote on your website ;p
[18:06] :)
[18:06] anyway, most of those website defacements...
[18:06] dns cracks
[18:06] email cracks
[18:06] ftp cracks
[18:06] etc' etc'
[18:06] they're usually done in fairly easy and simple ways
[18:06] that do not require much knowledge
[18:07] they're usually done by little kids
[18:07] mostly little kids in "hacking" groups
[18:07] who want to show the world how smart they are
[18:07] Phase I
[18:07] --------
[18:07] oops...
[18:07] -------
[18:07] DAMN!
[18:07] lol
[18:07] okay, all over again
[18:07] Phase I
[18:07] -------
[18:07] ahh...
[18:07] that's better
[18:07] any questions so far?
[18:07] okay, so phase one is...
[18:07] intelligence gathering
[18:07] why is it so easy?
[18:08] we'll get to that
[18:08] because of ./i-0wn3d-u ;p
[18:08] exactly
[18:08] if some of u don't understand, don't worry
[18:08] we'll get to that
[18:08] so anyway, stage one is intelligence gathering
[18:08] this is the most important stage
[18:08] why?
[18:08] ...
[18:09] because otherwise you'll find yourself trying thousands of sunos 3.4 exploits
[18:09] need to know what os
[18:09] you have to know what exploits apply
[18:09] while you're actually attacking an nt4.0 server
[18:09] what os...
[18:09] and what is the host running
[18:09] *** c0c0_ has joined #bsrf
[18:09] those are the two most important phases in intelligence gathering
[18:09] damn i've disconnected
[18:09] getting them is fairly easy
[18:09] *** c0c0 has quit IRC (Ping timeout)
[18:09] welcome c0c0_, we're in the middle of the lecture
[18:09] *** c0c0_ is now known as c0c0
[18:09] poor soul
[18:09] nmap?
[18:09] :-)
[18:10] that's two
[18:10] nmap is too "advanced" for most script kiddies
[18:10] advanced?
[18:10] most people use really amateurish methods
[18:10] such as reading daemon banners
[18:10] (yes, it requires the "cracker" to have unix... ooh)
[18:10] hehe
[18:10] whats a daemon banner?
[18:10] and to know how to install new software
[18:10] ha
[18:10] alright, i'll show u
[18:10] oo me oo me!
[18:10] everyone, do telnet mailgw.netvision.net.il
[18:10] this is my isp's smtp server
[18:11] smtp = simple mail transfer protocol
[18:11] but daemon banner is trivial to be spoofed
[18:11] for outgoing mail
[18:11] yes, of course
[18:11] first, let's explain to those who don't know what daemon banners are
[18:11] what do u get when u telnet to mailgw.netvision.net.il?
[18:11] oh, i think i know what you mean
[18:11] Trying 194.90.1.14...
[18:11] "could not connect"
[18:11] :-)
[18:11] telnet: connect to address 194.90.1.14: Connection refused
[18:11] telnet: Unable to connect to remote host: Connection refused
[18:11] oops
[18:11] *** SnIpEr_WoLf_ has left #bsrf
[18:11] telnet mailgw.netvision.net.il 25
[18:11] *** SnIpEr_WoLf_ has joined #bsrf
[18:11] telnet mailgw.netvision.net.il 25
[18:12] port 25, this is important
[18:12] smtp runs on port 25
[18:12] yea
[18:12] I'm on...
[18:12] we get like sendmail version etc...
[18:12] running sendmail
[18:12] 8.9.3 sendmail
[18:12] yup
[18:12] 220 alpha.netvision.net.il ESMTP Sendmail 8.9.3/8.8.6; Sat, 22 Jan 2000 19:14:41 +0200 (IST)
[18:12] a linux/unix?
[18:12] this is what u get
[18:12] *** Sniper_wolf__ has joined #bsrf
[18:12] this is a daemon banner
[18:13] hmmmm, oki
[18:13] btw check blacksun.box.sk/ports.txt for a list of standard ports
[18:13] now, what does it tell us?
[18:13] ooh, sendmail
[18:13] the dumbest daemon ever
[18:13] it just gave us the version of the daemon that is running
[18:13] it's a unix type sys
[18:13] usually, in sendmail holes, the OS doesn't matter much
[18:13] yup
[18:13] now, suppose we're some script kiddie
[18:14] so we have the version
[18:14] of the daemon
[18:14] now we go to, say, packetstorm.securify.com
[18:14] or neworder.box.sk
[18:14] and we search
[18:14] bugtraq
[18:14] technotronic
[18:14] ;p
[18:14] we use keywords such as "sendmail 8.9.3"
[18:14] yes, bugtraq is good too
[18:14] look for a crack/bug
[18:14] yup
[18:14] ntbugtraq.com
[18:14] now, here is what we'll find
[18:14] we could find:
[18:15] that's pathetic!
[18:15] a) advisories
[18:15] these hardly mean anything to crackers
[18:15] they only explain to u how to fix the hole
[18:15] and a little technical backgruond
[18:15] and a little technical background
[18:15] which the common script kiddie won't be interested in
[18:15] b) texts
[18:15] texts will detail the hole
[18:15] how to exploit it
[18:16] and a workaround, if any
[18:16] c) an exploit
[18:16] BINGO!
[18:16] an exploit is a premade program
[18:16] that exploits a certain hole
[18:16] all the cracker has to do is to compile it
[18:16] (unless it's written in perl)
[18:16] (or another interpreted programming language)
[18:16] bash
[18:16] ('cause they run in the form of source code)
[18:16] So crackers are usally lazy punks...
[18:16] yes, or a shell script
[18:16] although u'll hardly ever found exploits in the form of shell scripts
[18:16] pamslam.sh
[18:16] heheh ;p
[18:17] sniperwolf missed everything from phase one 'till "the dumbest daemon ever"
[18:17] redhat and mandrake rooter
[18:17] can anyone plz help him?
[18:17] i'm kinda busy here with the lecture and everything
[18:17] :-)
[18:17] other daemons a cracker might want to look at:
[18:17] ftp
[18:17] by logging into ftp servers
[18:17] when logging into ftp servers
[18:17] u usually get technical information about the system
[18:18] u could also try to issue the syst command
[18:18] which will also give away some information
[18:18] webservers
[18:18] if u issue a bad url request
[18:18] it'll give u some info
[18:18] for example: try surfing to http://blacksun.box.sk/some-dead-link.h...
[18:18] like they are usun apache
[18:18] it'll give u an error msg
[18:18] and the name and version of the webserver program
[18:18] fairly easy
[18:18] all u need is a browser
[18:19] crackers can also utilize newsgroups daemons
[18:19] how bout pop mail?
[18:19] and others
[18:19] pop mail too
[18:19] Apache 1.3.6 port 80
[18:19] pop3 usually reveals information
[18:19] ftp port 21
[18:19] news port...
[18:19] 119, i think
[18:19] pop is...
[18:19] telnet
[18:19] uhh, damn
[18:19] 110 = pop
[18:19] 110
[18:19] yeah
[18:19] telnet too
[18:19] telnet to port 23
[18:19] yep 119 if it is not a secure connection
[18:19] go ahead and telnet to blacksun.box.sk on port 23
[18:19] u'll get some info on the system
[18:20] but what if we change this information?
[18:20] *** Sniper_wolf__ has quit IRC (IL.Quit: I was using Ghost_Rider Script version 2.0)
[18:20] most of today's server programs let u do it
[18:20] most admins do it.
[18:20] redhat linux 5.2 --- you learn the os
[18:20] Kernel 2.0.36 on an i586
[18:20] and the system
[18:20] so suppose we've changed the daemon banner
[18:20] Red Hat Linux release 1.2 (Apollo)
[18:20] but what if...
[18:20] ...
[18:20] we're dealing with a smarter script kiddie?
[18:21] (ph33r)
[18:21] they exist?
[18:21] yeah
[18:21] :)
[18:21] there are some
[18:21] nmap!
[18:21] yes, unfortunately ;p
[18:21] yup
[18:21] www.insecure.org
[18:21] download nmap
[18:21] queso may be?
[18:21] how does nmap work?
[18:21] winfingerptint.exe
[18:21] queso too
[18:21] winfingerprint too
[18:21] winfingerprint is for windows
[18:21] the others are for unix
[18:21] get them all at packetstorm.securify.com
[18:21] windows nt
[18:21] how do they work?
[18:21] pretty simple
[18:21] each OS has what we call tcp/ip fingerprints
[18:21] why?
[18:22] it trys all these same techniques don't it?
[18:22] because each os implements tcp/ip in a different way
[18:22] kinda
[18:22] yeah
[18:22] basically, nmap and the others are just port scanners
[18:22] ya now I remember
[18:22] but they do more
[18:22] they can detect these fingerprints
[18:22] and give definitive information
[18:22] this irc server gives a lot if advertising msgs..
[18:22] the win tcp/ip stack is easy to detect
[18:22] yes, it's the easiest
[18:22] windows is the easiest to detect
[18:23] detecting the difference between two similar unix distributions is harder
[18:23] detecting the differences between, say, some unix and windows
[18:23] or mac and windows
[18:23] is fairly easy
[18:23] could you spoof fingerprints? as an admin i mean
[18:23] so our smart and elite script kiddie grabs his copy of nmap
[18:23] how bout between linux distro or *bsd?
[18:23] but nmap uses a combo of all the techniques.
[18:23] technically, u can, but it takes a lot of messing around with code and stuff
[18:24] and u probably won't be able to do it well
[18:05]
[18:05]
[18:05]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:06]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:07]
[18:08]
[18:08]
[18:08]
[18:08]
[18:08]
[18:08]
[18:08]
[18:08]
[18:08]
[18:09]
[18:09]
[18:09]
[18:09]
[18:09]
[18:09]
[18:09] *** c0c0_ has joined #bsrf
[18:09]
[18:09]
[18:09]
[18:09] *** c0c0 has quit IRC (Ping timeout)
[18:09]
[18:09] *** c0c0_ is now known as c0c0
[18:09]
[18:09]
[18:09]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:10]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11]
[18:11] *** SnIpEr_WoLf_ has left #bsrf
[18:11]
[18:11] *** SnIpEr_WoLf_ has joined #bsrf
[18:11]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12]
[18:12] *** Sniper_wolf__ has joined #bsrf
[18:12]
[18:13]
[18:13]
[18:13]
[18:13]
[18:13]
[18:13]
[18:13]
[18:13]
[18:13]
[18:13]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:14]
[18:15]
[18:15]
[18:15]
[18:15]
[18:15]
[18:15]
[18:15]
[18:15]
[18:15]
[18:15]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:16]
[18:17]
[18:17]
[18:17]
[18:17]
[18:17]
[18:17]
[18:17]
[18:17]
[18:17]
[18:17]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:18]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:19]
[18:20]
[18:20] *** Sniper_wolf__ has quit IRC (IL.Quit: I was using Ghost_Rider Script version 2.0)
[18:20]
[18:20]
[18:20]
[18:20]
[18:20]
[18:20]
[18:20]
[18:20]
[18:20]
[18:20]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:21]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:22]
[18:23]
[18:23]
[18:23]
[18:23]
[18:23]
[18:23]
[18:23]
[18:23]
[18:23]
[18:24]