Preview

Hacking for Newbie

Powerful Essays
Open Document
Open Document
3946 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking for Newbie
Made on August 19, 1997.

Introduction - OK, this file is intended solely for people who know very little about hacking, and when I say very little I mean very little. Now, for those of you jumping happily around and screaming "Finally, I am gonna be a hacker!” stop jumping around and just sit down, take a few deep breaths, and just relax.

After reading this file you should be able to hack 1 - A WWWBOARD, 2 - FTP/UNIX sites, 3 - Website Tricks, and 4 - Neat stuff/Misc. with much confidence.

Now, on to the disclaimer:
*** I will NOT be held responsible for what you do with this information. ***

NOTE: All commands that are written in this file, with the exception of the John the Ripper commands, like "edit passwd" are for DOS, so if you have UNIX use the VI editor or something of the sort.

OK, now there is no specific table of contents of this file, I am pretty much just going to make it up as I go along. Now, for you advanced hackers out there, I would recommend just leaving this file because you probably won't find much in this file that you don't already know. All right, now that I'm done this stupid raving rant, I can start explaining how to go about learning what you want to learn.

1 - How to hack a WWWBOARD (Credit going to kM of www.hackersclub.com for coming up with this brilliant idea, lets all applaud kM.)

OK, now obviously, in order to hack a WWWBOARD you need some sort of password file. Now, defaultly the passwd file is in the WWWBOARD directory. Most people who run the WWBOARD think to themselves "Hmm... What are the odds of some guy coming along and wanting to hack my WWWBOARD?" Well, the odds are pretty damn good. Now, when I say hack I mean both just to explore and just to do fun stuff like deleting files. I am not saying deleting files is GOOD, but sometimes it is fun. Anyway, the passwd file is almost always in the WWWBOARD directory, so lets take a real WWWBOARD.

The URL is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    7. How is the passwd file used, and what fields make up its content? Explain.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    name and password, but also trolled through network activity to obtain potential accounts (username and…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The first thing you need to do is save a copy of this document, either onto your computer or a disk…

    • 5144 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit5Dis1

    • 314 Words
    • 2 Pages

    4. Config file is available remotely therefore someone could use this file to change configuration and gain access to the system.…

    • 314 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Course Work

    • 510 Words
    • 3 Pages

    The first thing you need to do is save a copy of this document, either onto your computer or a disk…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Display any information which enables others to gain unauthorised access to computer material including instructions for gaining access, computer codes or other devices which assist hacking.…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Good Essays

    This document describes the procedure for recovering an enable password or replacing enable-secret passwords on Cisco 801, 802, 803, 804, 805, 811, and 813 Series Routers. These passwords are used to protect access to privileged EXEC and configuration modes. The enable password can be recovered because it is displayed in plain text in the configutaion file. The enable-secret password is encrypted in the configuration file and therefore can only be replaced with a new password.…

    • 677 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 749 Words
    • 3 Pages

    1. Provide a brief summary of the activities in each of the hacking steps listed below:…

    • 749 Words
    • 3 Pages
    Satisfactory Essays

Related Topics