cheeseman222
In Runtime
- Messages
- 200
before I post this I just want to clarify I didn't write it. Some guy who calls himself Wang did. This is part one of eight i think so if anyone is interested in more I can post them over an eight week period or something. I'll make this two posts as well because of the 10000 character maximum. This should answer a lot of questions people have and I found it very useful, so here it is:
Topics covered
What do I need to begin?
What are some good Websites?
What programming languages should I learn?
What is Telnet?
What is an IP address?
How do I find out my IP address?
What is IP spoofing?
What is a trojan/worm/virus/logic bomb?
What is PGP?
What is Unix?
How do I know if I telnet to a Unix system?
What is a shell account?
Where can I get a shell account?
How can I crack Unix account passwords?
What is a shadowed password?
What do I need to begin?
Well, most text files would probably disagree with this, but I think Windows 9x is as good as any other OS for getting started. Most people will tell you to go away and not come back until you have Unix or Linux, but that's really flinging you in at the deep end. In this file I will focus mostly on Windows 95 but I will mention Unix a bit later on.
Here's what you will probably need:
An OS (Operating system, could be DOS (?), Windows, Unix, Linux, BeOS etc.)
A lot of text files (This is a good start)
A selection of good web sites
A web browser (I use Netscape, but IE is as good as any)
An IRC client (IRC = Internet relay chat...well, this isn't really essential - but its a laugh!)
Telnet (or similar)
Small knowledge of programming in some language
--------------------------------------------------------------------------------
What are some good websites?
Here are a few that have helped me out in the past: -
www.happyhacker.org - This is great! If you really want to learn to be a hacker then you have to visit this website. They teach you how to hack without breaking the law (Yes, it is possible). Check out the "Guides To Mostly Harmless Hacking" which focus on every aspect of hacking you could imagine.
www.theargon.com - A site about security and hacking, it features lots of good sections of different aspects.
www.Cyberarmy.com - A nice site with a list of proxies, wingates etc. and A great selection of information tools.
www.securify.com/packetstorm - PacketStorm is a huge security archive which is updated every day - it rocks.
www.Antionline.com - Cool site for learning about exploits etc. and you can perform a security analysis of yourself.
www.phrozencrew.org.uk - A UK phreaking group providing information on BT payphones and Nokia's.
www.swateam.org - Home of the Swat team E-zine - a great mix of hacking/phreaking/anarchy.
--------------------------------------------------------------------------------
What programming languages should I learn?
Some good languages to look at are:
C (or C++)
Perl
Pascal
Delphi
Visual Basic
Personally, I started off just having a peak at QBasic, then I moved on to VB and Pascal, then Delphi, and finally Perl and C. That's probably not the best order to learn them in, but its really what suits you.
I use:
Borland C++ Builder 5
Borland Delphi 3 Professional
Microsoft Visual Basic 5 Professional
Turbo Pascal 7
Active Perl for windows
Perl 5 for Linux
--------------------------------------------------------------------------------
What is Telnet?
Telnet is a program that allows you to connect to other computers using ports. Every computer/server has ports, the most common ones you would see when using telnet are:
Port 21: FTP
Port 23: Telnet
Port 25: SMTP (Mail)
Port 37: Time
Port 43: Whois
So, for example you could tell Telnet to connect to mail.virgin.net on port 25. This would connect you to Virgins mail server.
Telnet really is essential, and its a great information tool as well.
--------------------------------------------------------------------------------
What is an IP address?
An IP address is a unique number which is given to you when you use your modem to connect to the internet. No two people can have the same IP address at one time, and your IP address changes every time you connect. An IP address looks like this: 198.164.32.123 Usually, the first 6 numbers will be the same every time you connect because they tell us what Internet service provider you are using (For example, 198.164 is the standard beginning for a Virgin.net IP address). The last 5 numbers are unique to you. Believe it or not, people can find out absolutely tons of stuff about you just from seeing your IP address. You also probably don't realise that your IP address is logged practically every time you do anything on the net. This happens so that if you do something you shouldn't be (being an evil Haxor for instance!) the people who logged your IP can contact your Internet service provider and get you thrown off the net. The other bad thing about IP addresses, is the misuse that people can do with them. If someone on IRC gets hold off your IP address (that's easy by the way, there is a command /dns which gives them anyones IP) they can type it into a nuke program and crash your connection or even your computer. Recently, IP addresses have also been used in a lot of trojan programs such as Back Oriface and Netbus.
--------------------------------------------------------------------------------
How do I find out my IP address?
In windows, go to the start menu and choose run, then type in "Winipcfg".
In mIRC, connect to a server then type /dns <your nick> (that should work unless they have an IP cloacking device)
In Unix, if you use unix then you should already know how to get your own IP!
--------------------------------------------------------------------------------
What is IP Spoofing?
This is the art of hiding your real IP address, and making it look like you have a different one. Please see "What are Wingates?" for a few examples.
--------------------------------------------------------------------------------
What is a trojan/worm/virus/logic bomb?
This is excerpted from: Computer Security Basics by Deborah Russell and G.T. Gengemi Sr.
Trojan: An independent program that appears to perform a useful function but that hides another unauthorized program inside it. When an authorized user performs the apparrent function, the trojan horse performs the unauthorized function as well (often usurping the priveleges of the user).
Virus: A code fragment (not an independent program) that reproduces by attaching to another program. It may damage data directly, or it may degrade system performance by taking over system resources which are then not available to authorized users.
Worm: An independent program that reproduces by copying itself from one system to another, usually over a network. Like a virus, a worm may damage data directly, or it may degrade system performace by tying up system resources and even shutting down a network.
Logic Bomb: A method for releasing a system attack of some kind. It is triggered when a particular condition (e.g., a certain date or system operation) occurs.
--------------------------------------------------------------------------------
Topics covered
What do I need to begin?
What are some good Websites?
What programming languages should I learn?
What is Telnet?
What is an IP address?
How do I find out my IP address?
What is IP spoofing?
What is a trojan/worm/virus/logic bomb?
What is PGP?
What is Unix?
How do I know if I telnet to a Unix system?
What is a shell account?
Where can I get a shell account?
How can I crack Unix account passwords?
What is a shadowed password?
What do I need to begin?
Well, most text files would probably disagree with this, but I think Windows 9x is as good as any other OS for getting started. Most people will tell you to go away and not come back until you have Unix or Linux, but that's really flinging you in at the deep end. In this file I will focus mostly on Windows 95 but I will mention Unix a bit later on.
Here's what you will probably need:
An OS (Operating system, could be DOS (?), Windows, Unix, Linux, BeOS etc.)
A lot of text files (This is a good start)
A selection of good web sites
A web browser (I use Netscape, but IE is as good as any)
An IRC client (IRC = Internet relay chat...well, this isn't really essential - but its a laugh!)
Telnet (or similar)
Small knowledge of programming in some language
--------------------------------------------------------------------------------
What are some good websites?
Here are a few that have helped me out in the past: -
www.happyhacker.org - This is great! If you really want to learn to be a hacker then you have to visit this website. They teach you how to hack without breaking the law (Yes, it is possible). Check out the "Guides To Mostly Harmless Hacking" which focus on every aspect of hacking you could imagine.
www.theargon.com - A site about security and hacking, it features lots of good sections of different aspects.
www.Cyberarmy.com - A nice site with a list of proxies, wingates etc. and A great selection of information tools.
www.securify.com/packetstorm - PacketStorm is a huge security archive which is updated every day - it rocks.
www.Antionline.com - Cool site for learning about exploits etc. and you can perform a security analysis of yourself.
www.phrozencrew.org.uk - A UK phreaking group providing information on BT payphones and Nokia's.
www.swateam.org - Home of the Swat team E-zine - a great mix of hacking/phreaking/anarchy.
--------------------------------------------------------------------------------
What programming languages should I learn?
Some good languages to look at are:
C (or C++)
Perl
Pascal
Delphi
Visual Basic
Personally, I started off just having a peak at QBasic, then I moved on to VB and Pascal, then Delphi, and finally Perl and C. That's probably not the best order to learn them in, but its really what suits you.
I use:
Borland C++ Builder 5
Borland Delphi 3 Professional
Microsoft Visual Basic 5 Professional
Turbo Pascal 7
Active Perl for windows
Perl 5 for Linux
--------------------------------------------------------------------------------
What is Telnet?
Telnet is a program that allows you to connect to other computers using ports. Every computer/server has ports, the most common ones you would see when using telnet are:
Port 21: FTP
Port 23: Telnet
Port 25: SMTP (Mail)
Port 37: Time
Port 43: Whois
So, for example you could tell Telnet to connect to mail.virgin.net on port 25. This would connect you to Virgins mail server.
Telnet really is essential, and its a great information tool as well.
--------------------------------------------------------------------------------
What is an IP address?
An IP address is a unique number which is given to you when you use your modem to connect to the internet. No two people can have the same IP address at one time, and your IP address changes every time you connect. An IP address looks like this: 198.164.32.123 Usually, the first 6 numbers will be the same every time you connect because they tell us what Internet service provider you are using (For example, 198.164 is the standard beginning for a Virgin.net IP address). The last 5 numbers are unique to you. Believe it or not, people can find out absolutely tons of stuff about you just from seeing your IP address. You also probably don't realise that your IP address is logged practically every time you do anything on the net. This happens so that if you do something you shouldn't be (being an evil Haxor for instance!) the people who logged your IP can contact your Internet service provider and get you thrown off the net. The other bad thing about IP addresses, is the misuse that people can do with them. If someone on IRC gets hold off your IP address (that's easy by the way, there is a command /dns which gives them anyones IP) they can type it into a nuke program and crash your connection or even your computer. Recently, IP addresses have also been used in a lot of trojan programs such as Back Oriface and Netbus.
--------------------------------------------------------------------------------
How do I find out my IP address?
In windows, go to the start menu and choose run, then type in "Winipcfg".
In mIRC, connect to a server then type /dns <your nick> (that should work unless they have an IP cloacking device)
In Unix, if you use unix then you should already know how to get your own IP!
--------------------------------------------------------------------------------
What is IP Spoofing?
This is the art of hiding your real IP address, and making it look like you have a different one. Please see "What are Wingates?" for a few examples.
--------------------------------------------------------------------------------
What is a trojan/worm/virus/logic bomb?
This is excerpted from: Computer Security Basics by Deborah Russell and G.T. Gengemi Sr.
Trojan: An independent program that appears to perform a useful function but that hides another unauthorized program inside it. When an authorized user performs the apparrent function, the trojan horse performs the unauthorized function as well (often usurping the priveleges of the user).
Virus: A code fragment (not an independent program) that reproduces by attaching to another program. It may damage data directly, or it may degrade system performance by taking over system resources which are then not available to authorized users.
Worm: An independent program that reproduces by copying itself from one system to another, usually over a network. Like a virus, a worm may damage data directly, or it may degrade system performace by tying up system resources and even shutting down a network.
Logic Bomb: A method for releasing a system attack of some kind. It is triggered when a particular condition (e.g., a certain date or system operation) occurs.
--------------------------------------------------------------------------------