Preview

Hacking for Newbie

Powerful Essays
Open Document
Open Document
3946 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking for Newbie
Made on August 19, 1997.

Introduction - OK, this file is intended solely for people who know very little about hacking, and when I say very little I mean very little. Now, for those of you jumping happily around and screaming "Finally, I am gonna be a hacker!” stop jumping around and just sit down, take a few deep breaths, and just relax.

After reading this file you should be able to hack 1 - A WWWBOARD, 2 - FTP/UNIX sites, 3 - Website Tricks, and 4 - Neat stuff/Misc. with much confidence.

Now, on to the disclaimer:
*** I will NOT be held responsible for what you do with this information. ***

NOTE: All commands that are written in this file, with the exception of the John the Ripper commands, like "edit passwd" are for DOS, so if you have UNIX use the VI editor or something of the sort.

OK, now there is no specific table of contents of this file, I am pretty much just going to make it up as I go along. Now, for you advanced hackers out there, I would recommend just leaving this file because you probably won't find much in this file that you don't already know. All right, now that I'm done this stupid raving rant, I can start explaining how to go about learning what you want to learn.

1 - How to hack a WWWBOARD (Credit going to kM of www.hackersclub.com for coming up with this brilliant idea, lets all applaud kM.)

OK, now obviously, in order to hack a WWWBOARD you need some sort of password file. Now, defaultly the passwd file is in the WWWBOARD directory. Most people who run the WWBOARD think to themselves "Hmm... What are the odds of some guy coming along and wanting to hack my WWWBOARD?" Well, the odds are pretty damn good. Now, when I say hack I mean both just to explore and just to do fun stuff like deleting files. I am not saying deleting files is GOOD, but sometimes it is fun. Anyway, the passwd file is almost always in the WWWBOARD directory, so lets take a real WWWBOARD.

The URL is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. How is the passwd file used, and what fields make up its content? Explain.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    name and password, but also trolled through network activity to obtain potential accounts (username and…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit5Dis1

    • 314 Words
    • 2 Pages

    4. Config file is available remotely therefore someone could use this file to change configuration and gain access to the system.…

    • 314 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Display any information which enables others to gain unauthorised access to computer material including instructions for gaining access, computer codes or other devices which assist hacking.…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Good Essays

    This document describes the procedure for recovering an enable password or replacing enable-secret passwords on Cisco 801, 802, 803, 804, 805, 811, and 813 Series Routers. These passwords are used to protect access to privileged EXEC and configuration modes. The enable password can be recovered because it is displayed in plain text in the configutaion file. The enable-secret password is encrypted in the configuration file and therefore can only be replaced with a new password.…

    • 677 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    3. What application and tools can be used to perform this initial reconnaissance and probing step?…

    • 681 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The movie "War Games" introduces the public to hacking. A computer hacker intends to ruin businesses performing an act much more unprincipled than an enthusiastic biologist 'hacking' away at work or theory. The truth is that computer hacking is in fact easy in the general sense, but more consideration must be given. Some aspects of hacking are used in everyday life and you may not know that accessing wireless internet from another person's account is considered wireless hacking even though your borrowing there connection. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 749 Words
    • 3 Pages

    1. Provide a brief summary of the activities in each of the hacking steps listed below:…

    • 749 Words
    • 3 Pages
    Satisfactory Essays

Related Topics