Posts

Showing posts from January, 2015

How to find a remote IP

Method 1 To view someone's IP# when they send you hotmail email do this: 1) Click "Options" on the upper right side of the page. 2) On the left side of the page, Click "Mail" 3) Click "Mail Display Settings" 4) Under "Message Headers" select "Full" or "Advanced" 5) Click ok Method 2 Reg a dydns account and install the ip pointer, so each time you ping the host name you regestored For example: you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server. so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address. Method 3 Neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their...

BRUTE- A brute force approach to hacking Unix passwords

BRUTE: A brute force approach to hacking Unix passwords. Version 1.1 ------------------------------------------------------------------------------ Here's how to use it in a nutshell... Download the passwd file from your local unix site, or have someone download it for you. It should be in the unix format (that is, line feeds but no carriage returns) so don't run it through any conversion programs--Brute uses it "as-is". To check a single password against your list do this: BRUTE passwd Password (that would check the passwd file for the password "Password"). Brute is case sensitive (just as unix is), so "Password" is different than "password". To convince yourself that brute actually works you'll probably want to run it with your password and see that it pulls up your account. It will. --- Brute can be used with a list of passwords. In this case, edit up a list or use a pre-made one (one password per line) and call brut...

A beginners guide to Hacking UNIX

In the following file, all references made to the name Unix, may also be substituted to the Xenix operating system. Brief history: Back in the early sixties, during the development of third generation computers at MIT, a group of programmers studying the potential of computers, discovered their ability of performing two or more tasks simultaneously. Bell Labs, taking notice of this discovery, provided funds for their developmental scientists to investigate into this new frontier. After about 2 years of developmental research, they produced an operating system they called "Unix". Sixties to Current: During this time Bell Systems installed the Unix system to provide their computer operators with the ability to multitask so that they could become more productive, and efficient. One of the systems they put on the Unix system was called "Elmos". Through Elmos many tasks (i.e. billing,and installation records) could be done by many people using the same mai...