Text Archive || E-mail || Files || Linux || Links ||
Purpose and Direction:I don't updated this but once every six months. But there's still some good reading here so check stuff out.
** Last updated: Aug 27, 99
New texts onboard!
Past and Present Projects:
- win_ntwrk_caching.txt: Tells some vulnerabilities in Windows Network Caching
- junohacker.txt: This is an update from an older one of my texts. If you use Juno you should read it.
- hidea.zip: Hides files on a floppy
The most annoying thing in the world is someone watching you type in your password without you knowing it. My current project is to develop a program that will search your C: for all known key loggers. It will tell you if your C: has any installed. If any found, it will clean your C: of the logger. If you know of a key logger besides these below, please e-mail me where I may download it so that I may figure out a way to detect and remove it.
- Keycopy
- Keylog v1.5
- Keylog v2.0
- Keylog v2.5
- Keylog 95
- Keytrap v2.0
- Phantom v2.0
- Playback v1.9c
** OLD ** Many people often ask me how to "spoof". I wrote a little document on how to spoof your IP using wingates.** OLD ** I have been working on getting someone help to figure out the algorythms to the passwords on WS_FTP 6.0. The idea is.. when a user clicks "save password", then logs in to his/her server, the password is saved to his/her WS_FTP.INI file. If someone can get a hold of the person's WS_FTP.INI file, then he/she can replace his/her WS_FTP.INI file with the victom's, thus allowing him to log into the victom's FTP. I was going to try to get the algorythms figured out so I could eventually build a crack, or have one built. But of course no idea is original anymore. The uNITED cRACKING fORCE has already made one which is available here. (huff). No big deal, I'll find some more projects soon. =) If someone still would like to figure out the algorythms, feel free. What I have found out on them are here. But for the record, I think I was the first person to crack the WS_FTP 4.04 LE version algorythms. (They are way too insecure).
Texts and Documents:
- Some Windows 9x Networking bugs that I have found
- How To Hack Juno
- Batch file written to hide files on your A:
- The Facts About Wingates
- Perfecting the Tennis Ball Bomb
- My Wordlist (used for brute force cracking)
- Getting Around Javascript Password Popup Windows
- The Ultimate Guide to Finding People
- Targets to go for when hacking a Windows 95/98 user
- Cracking Cached Ws_Ftp passwords
- Creating Havok With Guestbooks
- How To Rid Yourself Of The Netbus Trojan
send comments and suggestions to nidgid@thepentagon.com
Text Archive || E-mail || Files || Linux || Links ||