Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Saturday, September 15, 2012

A beginners guide to Hacking UNIX




In the following file, all references made to the name Unix, may also be
substituted to the Xenix operating system.

  Brief history:  Back in the early sixties, during the development of third
generation computers at MIT, a group of programmers studying the potential of
computers, discovered their ability of performing two or more tasks
simultaneously.  Bell Labs, taking notice of this discovery, provided funds for
their developmental scientists to investigate into this new frontier.  After
about 2 years of developmental research, they produced an operating system they
called "Unix".

  Sixties to Current:  During this time Bell Systems installed the Unix system
to provide their computer operators with the ability to multitask so that they
could become more productive, and efficient.  One of the systems they put on the
Unix system was called "Elmos".  Through Elmos many tasks (i.e.  billing,and
installation records) could be done by many people using the same mainframe.

  Note:  Cosmos is accessed through the Elmos system.

  Current:  Today, with the development of micro computers, such multitasking
can be achieved by a scaled down version of Unix (but just as powerful).
Microsoft,seeing this development, opted to develop their own Unix like system
for the IBM line of PC/XT's.  Their result they called Xenix (pronounced
zee-nicks).  Both Unix and Xenix can be easily installed on IBM PC's and offer
the same functions (just 2 different vendors).

  Note:  Due to the many different versions of Unix (Berkley Unix, Bell System
III, and System V the most popular) many commands following may/may not work.  I
have written them in System V routines.  Unix/Xenix operating systems will be
considered identical systems below.

  How to tell if/if not you are on a Unix system:  Unix systems are quite common
systems across the country.  Their security appears as such:

Login;     (or login;)
password:

  When hacking on a Unix system it is best to use lowercase because the Unix
system commands are all done in lower- case.

  Login; is a 1-8 character field.  It is usually the name (i.e.  joe or fred)
of the user, or initials (i.e.  j.jones or f.wilson).  Hints for login names can
be found trashing the location of the dial-up (use your CN/A to find where the
computer is).

  Password:  is a 1-8 character password assigned by the sysop or chosen by the
user.

      Common default logins
   --------------------------

   login;       Password:

   root         root,system,etc..
   sys          sys,system
   daemon       daemon
   uucp         uucp
   tty          tty
   test         test
   unix         unix
   bin          bin
   adm          adm
   who          who
   learn        learn
   uuhost       uuhost
   nuucp        nuucp

  If you guess a login name and you are not asked for a password, and have
accessed to the system, then you have what is known as a non-gifted account.  If
you guess a correct login and pass- word, then you have a user account.  And,
if you guess the root password, then you have a "super-user" account.  All Unix
systems have the following installed to their system:  root, sys, bin, daemon,
uucp, adm

  Once you are in the system, you will get a prompt.  Common prompts are:


$

%

#


  But can be just about anything the sysop or user wants it to be.

  Things to do when you are in:  Some of the commands that you may want to try
follow below:

  who is on (shows who is currently logged on the system.)
  write name (name is the person you wish to chat with)
  To exit chat mode try ctrl-D.
  EOT=End of Transfer.
  ls -a (list all files in current directory.)
  du -a (checks amount of memory your files use;disk usage)
  cd\name (name is the name of the sub-directory you choose)
  cd\ (brings your home directory to current use)
  cat name (name is a filename either a program or documentation your username
has written)

  Most Unix programs are written in the C language or Pascal since Unix is a
programmers' environment.

  One of the first things done on the system is print up or capture (in a
buffer) the file containing all user names and accounts.  This can be done by
doing the following command:



cat /etc/passwd



  If you are successful you will a list of all accounts on the system.  It
should look like this:

root:hvnsdcf:0:0:root dir:/:
joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe
hal::1:2:Hal Smith:/bin:/bin/hal

  The "root" line tells the following info :

login name=root
hvnsdcf   = encrypted password
0         = user group number
0         = user number
root dir  = name of user
/         = root directory

  In the Joe login, the last part "/bin/joe " tells us which directory is his
home directory (joe) is.

  In the "hal" example the login name is followed by 2 colons, that means that
there is no password needed to get in using his name.

  Conclusion:  I hope that this file will help other novice Unix hackers obtain
access to the Unix/Xenix systems that they may find.  There is still wide growth
in the future of Unix, so I hope users will not abuse any systems (Unix or any
others) that they may happen across on their journey across the electronic
highways of America.  There is much more to be learned about the Unix system
that I have not covered.  They may be found by buying a book on the Unix System
(how I learned) or in the future I may write a part II to this........

Signed By : RK World

For More Cool Stuff  Visit  : Geek's Area


Wednesday, August 1, 2012

How to turn XP SP2 into SP3 or even more




Start> Run> type in 'regedit'
Go to HKEY_LOCAL_MACHINE, then SYSTEM, then CurrentControlSet, then windows
From here on in click "CSDVersion" and click modify, change "0x00000200" (SP2) to "0x00000300" by typing 300 in the field where 200 once was.
Close it down,
Restart (MAKE SURE YOU RESTART)

Introduction To Hacking (Tutorial 1)


Introduction:

 Hey guys am here again with my other post which gives you the brief Introduction To Hacking.So Are you eager..? So lets know about all about hacking today. I will be posting some tutorials about the hacking. So Folks keep visiting the BLOG.

Lets move to the topics now.........

So guys for today let us know about on below topics

1)What is Hacking.?
2) Who is Hacker.?
a) Types of Hackers.
b) Hacker's Hierarchy.

What is Hacking and Who is Hacker? 

Hacking is nothing but tinkering with electronic or computer systems. The person who does these is known as Hacker. 

So guys all of us think that Hacker's are cool,bad-boy's and selfish in nature but actually that's not the real thing. I do agree they are cool,passionate etc but all Hackers are not Bad-Boys,Selfish. There are many Hacker's who work(Hack) for welfare of people and are against the Bad-Boys. So thinking that all Hackers are bad,selfish in nature is not a good thing according to my point of view.

Types of Hackers

There are two main types of Hacker's in the world they are :
1) White Hat Hackers
2) Black Hat Hackers

So guys let us know about them individually,

1) White Hat Hackers

These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.
Example:  Ethical Hackers

2) Black Hat Hackers

These guys are considered as the bad guys. Black hat hackers use their skills for illegal purpose.
They usually break into system's security steal all the confidential data from the people for their personal use.
Example : Malicious Hackers

Hacker's Hierarchy

Script Kiddie's:

These guys are just noobs in world of computers. They do-not have any idea of "HOW TO HACK" but pretend to be a Hacker. These guys are actually not a hackers but misunderstanding of people had made them to pretend to be a hackers.They just Copy-Paste the things from the Pre-Coded codes of hackers and implement them where they are not supposed to and become bugged-up having no idea what the code does.

Intermediate/Middle Level Hacker's:

These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use Discovered well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks.These are just considered as the one step forward people from the Script Kiddie's.They just make some changes in the main Discovered well-known exploits and discover the other things from them. These people re just the user's but not the one who discover something on stand-alone.

Elite Hackers :

Here are the real guys who have most of the knowledge of computers,networking,security systems etc. and more than that they are well experienced guys. These Pro guys are actually known as a real hackers who can just do anything with their knowledge. They are nor dependent and do discover the things own.

Guys Stay Tuned for my next Tutorial :

☻S☺I☻G☺N☻E☺D☻☻B☺Y☻ - RK WORLD

 VISIT HERE FOR MORE : Geek's Area