|

http://460968.myshoutbox.com/ - my shoutbox for
any hack related questions...
!CLICK HERE!
Common ways to attack a network
Ping
Pinging is normally the first step involved in hacking the target. Ping uses ICMP (Internet Control Messaging Protocol)
to determine whether the target host is reachable or not.
Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP
Echo reply packets.
All the versions of Windows also contain the ping tool.
How To ping a remote host:
Click Start and then click Run. Now type ping <ip address or hostname>
(For example: ping yahoo.com). Now you should get the reply as shown below.
For other ways to use the ping command, go to
DOS prompt and type ping /?.
Ping Sweep
If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping sweep
also uses ICMP to scan for live systems in the specified range of IP addresses.
Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap (http://www.insecure.org)
also contains an option to perform ping sweeps.
Tracert:
Tracert is another interesting tool available to find more
interesting information about a remote host. Tracert also uses ICMP. Tracert helps you to find out some information about
the systems involved in sending data (packets) from source to destination.

|
| *Note: I edited out a connecting MAC address of mine on this pic... |
The Hacker Manifesto
by +++The Mentor+++ Written January 8, 1986
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker
Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology
and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces
shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a
world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...
Damn
underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain for the fifteenth
time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."
Damn
kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is cool.
It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels
threatened by me.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't be here...
Damn kid. All he does
is play games. They're all alike.
And then it happened... a door opened to a world... rushing through the phone line
like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought...
a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked
to them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You
bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that
you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The
few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
This
is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing
without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore...
and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality,
without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to
us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that
of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of
outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop
this individual, but you can't stop us all... after all, we're all alike.

Anything posted on this page may be illegal!! DO NOT ATTEMPT ANYTHING WITHOUT PRIOR PERMISSION FROM AN AUTHROITY AND OR WITHOUT
FULL RESEARCH OF CONCERNING LAWS THERIN! To attempt anything suggested on this page may be a violation of the law in your
state/country. This page contains tips, tricks, and how-tos...which are for information purposes only and are intended for
responsible entry-level Network Security Administrators! In no way are we responsible for the effects of this tutorial!
|