Copyright © 2009 sonusoft. All rights reserved
 

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="generator" content="Web Page Maker V2">

<style type="text/css">
/*----------Text Styles----------*/
.ws6 {font-size: 8px;}
.ws7 {font-size: 9.3px;}
.ws8 {font-size: 11px;}
.ws9 {font-size: 12px;}
.ws10 {font-size: 13px;}
.ws11 {font-size: 15px;}
.ws12 {font-size: 16px;}
.ws14 {font-size: 19px;}
.ws16 {font-size: 21px;}
.ws18 {font-size: 24px;}
.ws20 {font-size: 27px;}
.ws22 {font-size: 29px;}
.ws24 {font-size: 32px;}
.ws26 {font-size: 35px;}
.ws28 {font-size: 37px;}
.ws36 {font-size: 48px;}
.ws48 {font-size: 64px;}
.ws72 {font-size: 96px;}
.wpmd {font-size: 13px;font-family: 'Arial';font-style: normal;font-weight: normal;}
/*----------Para Styles----------*/
DIV,UL,OL /* Left */
{
 margin-top: 0px;
 margin-bottom: 0px;
}
</style>

</head>

<body>

<div id="image1" style="position:absolute; overflow:hidden; left:190px; top:252px; width:550px; height:92px; z-index:0"><img src="https://img.webme.com/pic/s/sonusoft/art5535906.gif" border=0 width=550 height=92></div>

<div id="art1" style="position:absolute; overflow:hidden; left:370px; top:275px; width:202px; height:61px; z-index:1"><img border=0 src="images/art5535906.gif"></div>

<div id="text1" style="position:absolute; overflow:hidden; left:191px; top:344px; width:549px; height:5349px; z-index:2"><div class="wpmd">
<div><font class="ws20" face="Goudy Old Style">What is Hacking? </font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works.</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">What are Hackers?</font></div>
<div><font class="ws20" face="Goudy Old Style">Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. However, most people understand a hacker to be what is more accurately known as a 'cracker'</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">What are Crackers?</font></div>
<div><font class="ws20" face="Goudy Old Style">Crackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer.</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">What damage can a Hacker do?</font></div>
<div><font class="ws20" face="Goudy Old Style">This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">How do Hackers hack?</font></div>
<div><font class="ws20" face="Goudy Old Style">There are many ways in which a hacker can hack. Some are as follows –</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">NetBIOS </font></div>
<div><font class="ws20" face="Goudy Old Style">ICMP Ping </font></div>
<div><font class="ws20" face="Goudy Old Style">FTP </font></div>
<div><font class="ws20" face="Goudy Old Style">rpc.statd </font></div>
<div><font class="ws20" face="Goudy Old Style">HTTP </font></div>
<div><font class="ws20" face="Goudy Old Style">NetBIOS </font></div>
<div><font class="ws20" face="Goudy Old Style">NetBIOS hacks are the worst kind, since they don't require you to have any hidden backdoor program running on your computer. This kind of hack exploits a bug in Windows 9x. NetBIOS is meant to be used on local area networks, so machines on that network can share information. Unfortunately, the bug is that NetBIOS can also be used across the Internet - so a hacker can access your machine remotely. </font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">ICMP ‘Ping’ (Internet Control Message Protocol)</font></div>
<div><font class="ws20" face="Goudy Old Style">ICMP is one of the main protocols that make the Internet work. It standards for Internet Control Message Protocol. 'Ping' is one of the commands that can be sent to a computer using ICMP. Ordinarily, a computer would respond to this ping, telling the sender that the computer does exist. This is all pings are meant to do. Pings may seem harmless enough, but a large number of pings can make a Denial-of-Service attack, which overloads a computer. Also, hackers can use pings to see if a computer exists and does not have a firewall (firewalls can block pings). If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer. </font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">FTP (File Transfer Protocol)</font></div>
<div><font class="ws20" face="Goudy Old Style">FTP is a standard Internet protocol, standing for File Transfer Protocol. You may use it for file downloads from some websites. If you have a web page of your own, you may use FTP to upload it from your home computer to the web server. However, FTP can also be used by some hackers...&nbsp; FTP normally requires some form of authentication for access to private files, or for writing to files</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">FTP backdoor programs, such as-</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">Doly Trojan </font></div>
<div><font class="ws20" face="Goudy Old Style">Fore </font></div>
<div><font class="ws20" face="Goudy Old Style">Blade Runner </font></div>
<div><font class="ws20" face="Goudy Old Style">simply turn your computer into an FTP server, without any authentication.</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">rpc.statd </font></div>
<div><font class="ws20" face="Goudy Old Style">This is a problem specific to Linux and Unix. The problem is the infamous unchecked buffer overflow problem. This is where a fixed amount of memory is set aside for storage of data. If data is received that is larger than this buffer, the program should truncate the data or send back an error, or at least do something other than ignore the problem. Unfortunately, the data overflows the memory that has been allocated to it, and the data is written into parts of memory it shouldn't be in. This can cause crashes of various different kinds. However, a skilled hacker could write bits of program code into memory that may be executed to perform the hacker's evil deeds.</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">HTTP – HTTP stands for HyperText Transfer Protocol.. </font></div>
<div><font class="ws20" face="Goudy Old Style">HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server. There is a bug in this software called an 'unchecked buffer overflow'. If a user makes a request for a file on the web server with a very long name, part of the request gets written into parts of memory that contain active program code. A malicious user could use this to run any program they want on the server.</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">Where and how to start Hacking </font></div>
<div><font class="ws20" face="Goudy Old Style">After you get yourself a good scanner, scan some prefixes and find some cool dialups, then do the following:</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">First Method </font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">From your terminal, dial the number you found. </font></div>
<div><font class="ws20" face="Goudy Old Style">You will hear a series of Beeps. (Telling you that you are connecting to a remote computer. </font></div>
<div><font class="ws20" face="Goudy Old Style">After few seconds you will hear something like “CONNECT 9600”. </font></div>
<div><font class="ws20" face="Goudy Old Style">It then identifies the system you are on. </font></div>
<div><font class="ws20" face="Goudy Old Style">If nothing happens after it says “CONNECT 9600” try hitting ENTER a number of times. </font></div>
<div><font class="ws20" face="Goudy Old Style">If you get a bunch of garbage adjust your parity, data bits, stop bits etc. until it becomes clear. </font></div>
<div><font class="ws20" face="Goudy Old Style">Now when you get connected to the server you can apply either of the above mentioned methods. </font></div>
<div><font class="ws20" face="Goudy Old Style">Second Method </font></div>
<div><font class="ws20" face="Goudy Old Style">The TELNET way</font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">Get your local dialups. </font></div>
<div><font class="ws20" face="Goudy Old Style">Then you dial the number from your terminal &amp; connect. </font></div>
<div><font class="ws20" face="Goudy Old Style">Press Enter and wait for a few seconds. </font></div>
<div><font class="ws20" face="Goudy Old Style">Then it will say “Terminal =”. </font></div>
<div><font class="ws20" face="Goudy Old Style">Type your terminal emulation. </font></div>
<div><font class="ws20" face="Goudy Old Style">If you don’t know what it is hit ENTER. </font></div>
<div><font class="ws20" face="Goudy Old Style">It will give you a prompt @. </font></div>
<div><font class="ws20" face="Goudy Old Style">Type ‘c’(connects to the host) </font></div>
<div><font class="ws20" face="Goudy Old Style">Type NAU (Network user address) that you want to connect. </font></div>
<div><font class="ws20" face="Goudy Old Style">Find out the type of system you are on UNIX, VAX/VSM, PRIME. </font></div>
<div><font class="ws20" face="Goudy Old Style">Here is a list of some Telenet commands and their functions. </font></div>
<div><font class="ws20" face="Goudy Old Style"><BR></font></div>
<div><font class="ws20" face="Goudy Old Style">c Connect to a host. </font></div>
<div><font class="ws20" face="Goudy Old Style">stat Shows network port. </font></div>
<div><font class="ws20" face="Goudy Old Style">Full Network echo. </font></div>
<div><font class="ws20" face="Goudy Old Style">half Terminal echo. </font></div>
<div><font class="ws20" face="Goudy Old Style">Telemail Mail. (need ID and password) </font></div>
<div><font class="ws20" face="Goudy Old Style">mail Mail. (need ID and password) </font></div>
<div><font class="ws20" face="Goudy Old Style">set Select PAD parameters </font></div>
<div><font class="ws20" face="Goudy Old Style">cont Continue. </font></div>
<div><font class="ws20" face="Goudy Old Style">d Disconnect. </font></div>
<div><font class="ws20" face="Goudy Old Style">hangup Hangs up. </font></div>
<div><font class="ws20" face="Goudy Old Style">access Telenet account. (ID and password)</font></div>
</div></div>

</body>
</html>

E-mail:
sonu@sonusoft.tk
if you want an e-mail id with your own provider
Ex: E-mail@providername.tk
goto
Sign up for acoount





















Thanks for visiting This website was created for free with Own-Free-Website.com. Would you also like to have your own website?
Sign up for free