RSS


[ Pobierz całość w formacie PDF ]

definitely is not the sender. This is a very important fact. The message ID of an email is not necessarily
stored with the computer that sent it out.
So how was I able to use Icefubarnet Internet s mail server to send out the Happy Hacker Digest?
Fortunately Eudora s naivete makes it easy for me to use any mail server that has an open SMTP or ESMTP
port. You may be surprised to discover that there are uncountable Internet mail servers that you may easily
commandeer to send out your email -- if you have the right program -- or if you know how to telnet to port 25
(which runs using the SMTP or ESMTP protocols) and give the commands to send email yourself.
Why did I use Icefubarnet? Because at the time it was hosting an ftp site that was being used to download
email bomber programs (http://www.icefubarnet.com/~astorm/uy4beta1.zip). Last time I checked the owner
of the account from wh ich he was offering this ugly stuff was unhappy because Icefubarnet Internet had
made him take it down.
But -- back to how to commandeer mail servers while sending your message Ids elsewhere. In Eudora, just
specify your victim mail server under the hosts section of the options menu (under tools). Then specify the
computer to which you want to send your message ID under  POP Server.
But if you try any of this monkey business with Pegasus, it gives a nasty error message accusing you of
trying to forge email.
Of course you can always commandeer mail servers by writing your own program to commander mail
servers. But that will be covered in the upcoming GTMHH on shell programming.
*********************************************
Newbie note: Shell programming? What the heck izzat? It means writing a program that uses a sequence of
commands available to you in your Unix shell. If you want to be a real hacker, you *must* learn Unix! If you
are serious about continuing to study these GTMHHs, you *must* either get a shell account or install some
form of Unix on your home computer. You may find places where you can sign up for shell accounts
through http://www.celestin.com/pocia/. Or email haxorshell@techbroker.com for information on how to
sign up with a shell account that is friendly to hackers and that you may securely telnet into from your local
ISP PPP dialup.
*********************************************
Hang, on, Vol. 3 Number 5 will get into the really hairy stuff: how to do advanced deciphering of forged
headers. Yes, how to catch that 31137 d00d who emailbombed you or spammed you!
Happy Hacking, and be good!
___________________________________________________________
GUIDE TO (mostly) HARMLESS HACKING
Vol. 3 No. 5
The Dread GTMHH on Cracking
____________________________________________________________
Nowadays if you ask just about anyone what a hacker is, he or she will tell you  a person who breaks into
computers.
That is partly on account of news stories which make it seem like the only thing a hacker does is commit
computer crime. But there also is some truth to the public view. An obsession with breaking into computers
has swept the hacker world. In fact, lots of hackers make fun of the kinds of stuff I think is fun: forging email
and Usenet posts and programming Easter eggs into commercial software and creating Win 95 bootup
screens that say  Bill Gates mother wears army boots.
But since everyone and his brother has been emailing me pleading for instructions on how to break into
computers, here it is. The dread GTMHH on Cracking. Yes, you, too, can become a genuine computer
cracker and make everyone quake in his or her boots or slippers or whatever footgear they are wearing
lately.
 But, but, you say.  This list is for *legal* hacking. Sez right here in the welcome message you sent me
when I signed up.
Welcome to reality, Bub. Hackers fib sometimes.
************************************************
You can go to jail warning: Almost everywhere on the planet, breaking into a computer is illegal. The only
exceptions are breaking into your own computer, or breaking into a computer whose owner has given you
permission to try to break in. It doesn t matter if you are just quietly sneaking around doing no harm. It
doesn t matter if you make some stranger s computer better. You re still in trouble if you break in without
permission.
************************************************
Honestly, this Guide really *is* about harmless hacking. You don t have to commit a crime to crack into a
computer. From time to time hardy souls offer up their computers for their friends, or sometimes even the
entire world, as targets for cracking. If you have permission from the owner of a computer, it is most
definitely legal to break into it.
In fact, here s a really fun computer that you have permission to break into. Damien Sorder invites you to
break into his Internet host computer obscure.sekurity.org.
But how do you know whether this or any other announcement of a cracker welcome mat is legitimate? How
do you know I m not just playing a mean old trick on Damien by sending out an invitation to break into his
box to the 5,000 crazed readers of the Happy Hacker list?
Here s a good way to check the validity of offers to let anyone try to break into a computer. Get the domain
name of the target computer, in this case obscure.sekurity.org. Then add  root@ to the domain name, for
example root@obscure.sekurity.org. Email the owner of that computer. Ask him if I was fibbing about his
offer. If he says I made it up, tell him he s just chicken, that if he was a real hacker he d be happy to have
thousands of clueless newbies running Satan against his box. Just kidding:)
Actually, in this case you may email info@sekurity.org for more details on Damien s offer to let one and all
try to crack his box. Also, please be good guys and attack off hours (Mountain Daylight Savings Time, US)
so he can use obscure.sekurity.org for other stuff during the day.
Also, Damien requests  If you (or anyone) want to try to hack obscure, please mail root@sekurity.org and
mention that you are doing it, and what domain you are coming from. That way I can distinguish between
legit and real attacks.
We all owe you thanks, Damien, for providing a legal target for the readers of this GTMHH to test their
cracking skills.
So let s assume that you have chosen a legitimate target computer to try to break into. What? Some guys
say it s too hard to break into a fortified box like obscure.sekurity.org? They say it s more fun to break into a
computer when they re breaking the law? They say to be a Real Hacker you must run around trashing the
boxes of the cringing masses of Internet hosts? Haw, haw, sendmail 4.0! What lusers, they say. They sure
taught those sendmail 4.0 dudes a lesson, right?
I say that those crackers who go searching for vulnerable computers and breaking into them are like Lounge
Lizard Larry going into a bar and picking up the drunkest, ugliest gal (or guy) in the place. Yeah, we all are
sure impressed.
If you want to be a truly elite cracker, however, you will limit your forays to computers whose owners
consent to your explorations. This can -- should!-- include your own computer.
So with this in mind -- that you want more from life than to be the Lounge Lizard Larry of the hacker world --
here are some basics of breaking into computers.
There are an amazing number of ways to break into computers. [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • cherish1.keep.pl