- This topic has 15 replies, 11 voices, and was last updated 11 years, 7 months ago by
W3bWarl0cK.
-
AuthorPosts
-
-
April 8, 2009 at 6:38 am #3663
W3bWarl0cK
ParticipantI’m just starting out with Hacking for Dummies and it’s given me a great idea to set up a virtual pc and attempt to break into it.
Well, I’ve set up the virtual pc and I’ve managed to get a telnet connection to it on port 135, but now I’m stuck. What do I do now? I’d like to try and browse the filesystem remotely, but I don’t know how.
I’m using Windows Vista (you may all cringe now) as the host OS and XP as the guest OS. I would’ve used Fedora Core or Ubuntu linux as the guest, but I think my discs are wrecked.If anyone can post a list of telnet commands for browsing a filesystem or help me in anyway, I’d really appreciate it. After searching on google, all I keep getting is the standard list of telnet commands that appear when I type in ?
-
April 8, 2009 at 1:54 pm #23595
hackly66
ParticipantI have not practice much with telneting, but just to discover what information the webserver would spit out, but check this link
>http://cracksandhacks.wordpress.com/2007/10/02/telnet-hacking/ -
April 8, 2009 at 8:21 pm #23596
apollo
ParticipantI would recommend downloading a backtrack vm and starting here:
http://www.ethicalhacker.net/content/view/227/24/
This will walk you through the tools that you will want to start with. via telnet, it is difficult to interact with port 135. There are tools that will help you, but you probably want to know more about the status of the host before going further. Look at ports open, vulnerabilities present, etc before heading in to try and get a shell.
-
April 11, 2009 at 3:59 am #23597
crk
ParticipantAlso as a literary side note, I didn’t feel like Hacking for Dummies really did a great job with explaining the basics. If I were you, and if I happened to be in the market for a good pentesting book, I would look into ‘Penetration Testing and Network Defense’-Whitaker and Newman. It’s basic enough that beginners can understand and technical enough that you can understand what’s being said and actually learn something.
Just a helpful suggestion…I’ve read ’em all:-)
-
April 11, 2009 at 4:24 am #23598
jason
ParticipantCounterhack Reloaded by Ed Skoudis is another one that you might want to add to your library.
-
April 11, 2009 at 11:21 pm #23599
crk
ParticipantIndeed it is. I forgot about that one.
Some others:
Gray Hat Hacking- Harris, Harper, Eagle, Ness
Shellcoder’s Handbook- Anley, Heasman, Linder, Richarte
Hacking Exposed series- mostly by McClure, Scambray -
June 8, 2009 at 6:27 pm #23600
W3bWarl0cK
ParticipantOK, I should’ve done more research. I was expecting telnet to give me access to the vpc’s filesystem…
I’ve tried looking for software that I can use to access the vpc’s filesystem, but I haven’t found anything.
I found some tutorials on doing all sorts of things crackers would do, but nothing on remotely accessing a protected filesystem.
Does anyone know about a tutorial on doing this or is it ridiculous to assume that such a tutorial exists? -
June 9, 2009 at 1:22 pm #23601
eth3real
ParticipantThat depends. What’s the OS of your virtual machine?
-
June 9, 2009 at 7:44 pm #23602
W3bWarl0cK
ParticipantI’ve got the vpc set up to use WinXP – I would prefer to use linux, but it seems my pc doesn’t have the ram and stuff to handle Vista and linux running at the same time…
I’m hoping to get something that’ll show me how to get into a password protected user profile too
-
June 9, 2009 at 7:50 pm #23603
RoleReversal
Participant@W3bWarl0cK wrote:
…I would prefer to use linux, but it seems my pc doesn’t have the ram and stuff to handle Vista and linux running at the same time…
But it’ll run Vista and XP? Never come across that problem, now I’m confused…..
-
June 9, 2009 at 10:42 pm #23604
Jhaddix
ParticipantWarlock,
The best advice i can give you is go get the practice pentest disks, called De-ICE, from heorot.net.
Basically you will use your VMware to boot one of those disks that have multiple vulnerabilities. Dont worry about using it… just boot it. Your not supposed to have access until you hack it.
Then boot Backtrack 4 and use it to attack the target.
Ethical hacking is designed in phases, get acquainted with the tools and concepts of each phase.
Use the Penetration testing framework here to get started:
http://www.vulnerabilityassessment.co.uk/Penetration%20Test.htmlEverything is numbered, obviously since your target is a VM you can skip the Social Engineering et al.
This is a good start, let us know if you need help with a concept or tool, but do your own due diligence, it helps get the mindset of a real hacker ingrained in your head =)
-
June 10, 2009 at 5:07 am #23605
UNIX
ParticipantI would also recommend you to search through this and similar websites as there are many newcomers with same or similar questions.
Just start with a few basics like networking, programming etc. and improve yourself continously. The discs mentioned by Jhaddix, the De-ICE ones, are really great for getting some experience with the whole process of penetration testing and tools which can be involved.
Another thing you may try out if interested in Linux may be DVL – Damn Vulnerable Linux. This is a linux distro which was designed to offer vulnerable services to allow different attacks.
VMWare is one of the best programs you can use in my opinion and you should definetily consider to upgrading your RAM in order to get it running smoothly. Later on the chance is high that you will use this software on a regulary basis for various tasks.
In this and other threads already a lot of books where recommended to you, so just pick the ones which looks interesting to you and start.
If you have any specific questions please feel free to ask but you have to do the work by yourself.
-
June 10, 2009 at 12:30 pm #23606
eRiCtHyReD
ParticipantI also recommend OWASP Live CD:
http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project
-
June 11, 2009 at 9:18 pm #23607
SynJunkie
ParticipantI sort of went down the same path as you (hacking VM’s etc..) when I first got a computer and abut the same time I bought “Pentesters Open Source Toolkit”. It was one of the best books I have read and I still refer back to it all the time.
As for telnet, here’s a link to some commands
http://technet.microsoft.com/en-us/library/c.aspx
Cheers
Syn
-
June 11, 2009 at 11:45 pm #23608
Jhaddix
Participant@eRiCtHyReD wrote:
I also recommend OWASP Live CD:
http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project
The OWASP Live CD focuses more on web application attacks and lacks some better features that the Samurai Web Testing Framework has.
if you want to learn Webapp hacking you’ll want to setup the Hacme products by Foundstone, or damn vulnerable web app. Use SamuraiWTF to abuse these distributions (XSS, SQLi, etc)
-
June 13, 2009 at 9:36 pm #23609
W3bWarl0cK
ParticipantI HATE capped data lines…
Thanks for the info about the tools guys, but I can’t download any of it.
My connection is capped at 3G, and I’m not the only one who uses it.That’s the reason I love small .exe downloads…
Thanks again though
-
-
AuthorPosts
- You must be logged in to reply to this topic.