P. 1
Hackers Secrets

Hackers Secrets

4.78

|Views: 21,042|Likes:
Published by mateusd

More info:

Published by: mateusd on May 14, 2007
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/17/2013

pdf

text

original

Earlier you saw me make references to utilities that
combine two executable files into one. That’s what these
programs are. These programs make it possible to hide the
Trojans in legitimate files.

ICQ

Though as itself is not a utility for hacking there are
program files written by Un-named programmers for it.
The more advance Trojans have the ability to notify the
“hacker” via ICQ of whether or not you are online. Given
that you are infected with a Trojan.

If you are not infected then ICQ can serve as a Utility to
give away your IP address. Currently there are
files/programs available on the net that allows you to
“patch” ICQ so it reveals the IP numbers of anyone on the
“hackers” list. There are also files that allow you add users
in ICQ without their authorization or notification.

35
35
35

35

For demonstration purposes let’s see how a hack would go
if a hacker with the above mentioned utilities were to
attempt to hack into a users machine.

Hack 1:

Objective: Obtain entry to the users machine.

Step1: Obtain user’s ICQ #
Step2: Add User to ICQ list
Step3: Use Get Info on user
Step4: Record User’s IP address
Step5: Start a dos prompt
Step6: nbtstat –A
Step7: Look for hex code <20>
Step8: (Assuming a hex of <20> is there) net view
\\ip_address.
Step9: See what shares are available we’ll say “C” is being
shared.
Step10: net use x: \\ip_address\c

Access to the user’s machine has been achieved.

In the above scenario our “potential hacker” used the patch
programs available for ICQ to gain the IP address of the
“victim” and then launch his assault.

With the realization of how an “individual” can gain access
to your machine let’s move on to Chapter 6. We will
discuss what’s at risk once your computer has been
compromised.

36
36
36

36

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->