Satanic Soulful 29/1/1384 Contact:
[email protected] [email protected] Special TNX 2: Hell Hacker – B0rn2h4k – S hahro Z – XshabgardX Im4n & Y4hoO Emperor
!" # $ % % & '( () *+, (. / .0 (1 2&3 $ 1 1 .% 4 5(1 & ' 6 % )/ ( * 7 ( *;7 $% : / $ (,8 9 < 5 1 (,8 9 & / % % )/ (1 , = * ? 7$ *9 @<7$
2 .> 1 (,8 9 +, & % )/ C / A #1 B 1
A1 Hacker’s Culb - Black Hat Hacker -@tstake -Hobbit
7 7? 42 (1 (8 $% D /% * *? 7 E1 &$ 7 ?&F ? % % C% D % F G 4 .? 1 2 . 7 (1$ * 7 E1 9 & 7 7 /$ H ? % % C % % CCC $ .(<7? IJ+8 , '(1 (. 1 ( (. / ? &$' J+ G < I$ H J . EK2 9 2 9 & (. K ? 7 ( L MN ! (1 = 1 % % )/ EK 1 >)? 1 EK2 H O N (1 % I 7H * ! I$ . F ? % &% 1 7 4 EK2 9 9 < C 1 1 I ? 7 E1 ? 7 % 9 1 % (D<7 EK2 9 C% % QRRRP/ % insecure.Org? /& / 1 H S E*TU % 4(1 2$% % ? 7 E1 9 1 9 V W (1 C%%X M 4 <7 YR9 1 P $ K* 2/ % % QRRZP/ % C / (K* I 1 E1 O [ \ 5 / J [ (. / ? 7 E1 & C% % % $
&
7 % % / % I(. / ? EK2 ( (1 * C 1 4Udp$ Tcp !3M T U& ( ?$ $! :D 5(1 BackDoor,Port Redirector,Port Listener, Banner C .\<5CC$Grabber % % E9 , $ 1 < 7 .9 ? 1 E1 9 1 ( , C 1 % 31 ? 7 1 I(<7(. UBack-End? 1 9 < ? E1 ! G (1 :% ? 7( 1 ]/ *% /(1$ <8 ( U(1 / C% * I% )/ % $% ^ /$ (- % % * *? 7% 1 .(. / , 1 E1 (* 7 (.? U (1 ' %&P $ ( / C .% F 1 .W% PM U_ \ 5 /? 1 $ Hobbit . ]/ C D Y``aP/ % $ % 1 &$ $ % 4? 1 EK2 9 K 3 / #. b ,(1 P$? C % *(c 5 &1 (1 $ U7
(1
:1
? *d$ A
U (1 7 4(1 * . % 9
UDP $ TCP?$
1 PM P IE $ PM ? I 1 DNS(,/ e V $ P/ \ . / 1 ! 7& % )/ ( e %' 7& % )/ . , 1 <7 . ! G (1 ! f 1I K %M % 5 K]4? 7 4 1I ( gN % ]4H ! G (1 .P/ , (1 7% _ $ /? 1 7( 1 /(1 & ?%$ $ H K
NetCat 1 / K. / /' 1 G .\ ^ . % 4 /h i iMakeFile \ K(1 7: C . % G Make <systype> /%$ % % L ND C% D 7j ? \ K$ ( E*
C
1
%
/ ( E* /h C .O N
< I% * Generic
1 < +M (1 ?& &$ $ % \1 I Nc.exe ? \ K& % )/ 1 , $ .% -%
&e %'&
Http://atstake.com/research/tools/network_utilities
nc nc ? 7
, % $' /% (1 ? 1
nc -help
O
$
[v1.10 NT] connect to somewhere: nc [-options] hostname port[s] [ports] ... listen for inbound:
nc -l -p port [options] [hostname]
[port] options: -d
detach from console, stealth mode
-e prog
inbound program to exec [dangerous!!]
-g gateway -G num -h -i secs -l
source-routing hop point[s], up to 8 source-routing pointer: 4, 8, 12, ...
this cruft delay interval for lines sent, ports scanned listen mode, for inbound connects
-L
listen harder, re-listen on socket close
-n
numeric-only IP addresses, no DNS
-o file
hex dump of traffic
-p port
local port number
-r -s addr
randomize local and remote ports local source address
-t
answer TELNET negotiation
-u
UDP mode
-v
verbose [use twice to be more verbose]
-w secs -z
timeout for connects and final net reads zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]
C .
7D 9
%
/ K 1&(1NC? 7
kl k
,
?c 8 & %$ . (1 ? ( *;7 * C% 1 7 4% / ?%$ $ T U & ' K % % '$ 7% \ D ? 7 (1 '?% $ /H K % & V1 C 7% IS&% % $ ( /% 9 % (: ) N S$ 9 ? 7 E & C 1 Ps DJ& C% .>e %' / ! G $% 7(1 1E % (K* .(1 Nc –n * C P I?% 5! G (1 ?'? 7e %' C% :< ! G DNS Loockup ( *;79 1 1 % (K* .(1 Nc -v * $ / _ 5 1$ 8 Loockup( *$% 7\ . U(1 72 T1 25! G %$ 7 2F 1E ? 1 e %' $ C% D % % f < ? 42m DNS % M8 ! 1nOutBoundpo 4(1 PM ? I1 ? 1 o % C% . L ND ! q E ! 5#U E -v ; / . U(1 ? PM % % 5#U 1 .% D r51 ; /9 C . K % % D r51n-v -vp 7 /(D ! G (1 ; /9 & % )/ 71 1 .(1 ? D1 ! 5#U (. H ?
I1 ? 1 2&3
1 -v; / 1
&
<7 nc –w 3\
Nc -w ; /9 & % )/ 1 C 7% f7. PM (1 ; /9 & % )/
C 7 2F
- <7 <5$ / P
-u I1 udp PM Tcp (1 PM ? (1 ; /9 & % )/ 1 1 < PM \ $ udp ( U4(1 ( ,% 74 \ .& ? 1 ]/ (.Udp Socket Connected2E & C . % )/ udpB ? I1 W (1 % D D 7 ?EJ% / ?%$ $ & 4 & #<5udp PM 2:7 (Open Portp&1 ! udp ! $% < P/& C s K t U % '
( E* 9 & 1 -4 5 /(.?% %9 1 1 % D \<5? .r51 % )/ %! ' * p 7! (<7(1 (1 C% (<
nRootp / /% 9 D1 5(1 YRQx & ? D % )/ C .O N \ 5 /]/ ! (.% D r51 ; /9 y /& ( : p%% *9 V % D % )/ ? 7! n%
1 1 . 7 ! & % )/ 9 1 &$ % )/ –r
(Listeningp % % S * Vc$ % C 7 2F 7 % % P% _^ /$ (1 . I $ Nc –l –p 1234
!
-v
$ e %' z PM ? 1 c 8 7 K % 1 . % )/ C% . 7 4 g c 8 (1 $ % K % ]/ PM H I $ P
-L % )/ ; /9 & % V PM 9 J % . I1 ? 1 C 1 I1 PM 9 J(W[,H % (.% D r51 $ H U(1 % . (< 4 7PM & . I $ PM K % W $ -I? 7 & % )/ 1 % ?
\ ^ .–DGAPING_SECURITY_HOLE 1 * & V1 1 (. L ND ? ( 1 -Ey / 1 Vc$ % ( E*9 % . .% TK PM H K % C 1 inted <7 % % S * C% ( 1 H ]8 KT U9 1 (.!$ )9 1 u==CCC &% 1 < I9 +j 19 1 1 (.? .& < * $ PVK?% 5 , % .(V I9 { 1 !0, '& _ = 79| < ( *;7P/ $ 1 W % ? ( 1? (. . I % C% 1 7 4 ? \ KH & % 1? ( 1? MI . _ C . % )/ ^ / ? (/% 1 \ ^ .-DTLENET 1 * C . 7K -? 7( E*(1 */ -T; / $ % \G$ -? 7% _ $ /(1 (-/$ 9 1 71 2F Login(1 / (, $ ! .0 < PVKs Kf U(1 % % m ( '\, % (1 9 1 . 1 2&3 * 1 .! 5#U (1 ( 1p 1 n .PVK ( E*
%
.9 D1 1 (D<7% K % ( & (.? 7 % % C% D % % \ [ % / $ 4(1 1 -.} ? 7( 1 , $% P/ ( (1 ! G 9 (1 E % / ?%$ $ U(1 P/ 5 /(. 9 V &( K -i; / C 7 f7. \1 I 1
o 4? % bD.? 1 ,$ S$ ! f % : ! G 9 (1 % 4? 7 & V1 (.?EJ 7$ M8 $ 1E e %'_^ /z; / 1 (1 (.% V! < 2 5(1 1 f 1 * C% o % E m-n2 K(1 ! & ? %$ [ \ \G$ + (1 '2< (1 1 L ND ! H C 7% ? 7 % % '(<7(1 $ % 2$% P/ bI r51 M8 ! H & f 1 .> C% D % G ? 4 -z; /& 1 % % P/ $ 1 ! f 2F ? 1 &P % % )/ Nc –v –w2 –z target 130-140 ? 7! % % V/140 130 _ $ / J .f t7 C 1 %$ [ 9 %netbios epmap ? 7 7%
%%O $ 9 / YxR YZR& ? 7! 31 \ % & 1 (1 B 1 + (1 (.YZ~$ YZ`? 7! (. C / &1 1 • ?$ % .H <. 7>)$ 7 .& ? 1 % ! f & 1 I9 7 79 1 1 [ ? 7\, %9 < & C 1
€ J13 C
4 '< (1 < ? 1
7 K $ 7; /& " 1 ([) G9 IJ9 ? 7 .& " 1 P
Telnet?
(1
& % )/
b-N ? 7Daemon 1 / % I(.? E1 5(1 ' O (1 - < I E1 ? 1 O 4 D z .(<, PM ? 1Nc Host 25\ (1 & % )/ P 5(1 1 ((Smtpp 2e \ 7% _ $ /H (<, $ 1 E g (1 %/
Mail Bomber(FakeMail)H
? (1 -& (.( * <7 C % . <7 7 & % . % )/ ? IJ9 1 < D1 '? 1 H J .P H 9 (, 7 2F - 1 < (.? 7 .$ 1 .(<7 C% % 2F H J .( 1 9 1
Port Scaning ! ( 19 ! .f
f ? 7 E & :%
C 1 9 <. % t 7? 7! H <. < (1 E 9 C% % L ND ( 1$ &1 ? 7! $ % .f & 2 H O N (1 % I 7H * • ) *(,8 \$ % •% 1 7 4 EK2 9 9 < 1 >)? 1 EK ? 7 EK2 9 < .>)? (1 7 4(1 < * Ip Scaner , Port Scaner ,file Transfer , Script uploader H & % )/ (1 % I < , $ % 7 42&3 & … €=== 7 9 $9 1_ 7 EK2 ( & /% K. 7! % .9 / ? 1 Nc –v –w2 Target FirstPort-EndPort n=% D 9 / t 7QQQ Y ! & &P %p &P Nc –v –w2 192.168.159.126 1-222
t 7&1 ? 7!
YZ~$ YZ`? 7!
(.
31 \ % C9 7
7% _ $ /? 7Banner? $'A< (J 7!
1 7 4(1 < (. ! I $ "V1 u= / .P % ? 7% _ $ / / 7 1 ? $'A< ! G M4& :% & /% K]4 % .9 ? 1 Nc –v –n Target Port Number D < (1 P ? 1 }R$ QY ? 7! &? 7P % = 7 H J QY ! P$ P % Nc –v –n 192.168.1.90 21
(1 !
"V1 D
&
7% _ $ /$ QY !
&
5#U 31 \
}R! 2$% P Nc –v –n 192.168.1.90 21
7
C% / 1 E }R! 31 \ % < ) * ! Q 9 P ? 1 ]8 K C .H J
!"#$%&' " % )/ O$ % / 7% _ $ /H C 7%
& C% < I% 4Html\ KP$ % Http / ]8 K K. / % &\ K <7 -K9 1 1
Http/1.0 200 OK Centent-type: text/plain Content-length: 724 .
5(1
. . . 4>Index.htm2 1 & K1
C
C Nc –l –p 80 < index.htm ,M 7? 1$ 7 S *}R! 7 ^ /
.9 1
\ K9 $ (% %
(1 /% 9 TU C% D % / K_. \ K < % 1 P H ]8 K9 C /) 1
() * Flooding ? 7% 1 .? 1 t M P$ K z; /zO
1 ? 7%% &( % . ? 1 C% D % )/ * * ( b-N ? E % .H J(C 1 ) 1 CCC$ \ 5t j % . % )/ &% .9 ? 1
% D &
1$ 't M 1 ? 7 % % & ?% &H K r51 .9 , . % (.% D r51-v ; /& % )/ C . 4> % P/ ? 7 % %
ß‚a¢k Hât Ha¢ker’s
n / #.p 7H 1?7 & ( = ' (1 4? 7 1 D1
P $ƒ9 % :1 1 ) *
Emperor Team
7 / #.(G 5 % O 4? 7 & U ^ 9 * E1 & /QR~R?31 % .H 7 1 9 1 = _ )% ? 7 ? 72 (1 1 "5„ ? % (. 9 IM4N,Y4Ho0,BuG,Cl4w,EimaN,@RASH&Turbo C Im4n 1 9 (.
? 7( 1 (1 9 … E1 ? 7 .& =% . Ybad 1,YBad 1.5,WinNC / _ )% 9 ]/ (.t$ V ? 7 /& ?7 / H & $ *z TU (.S $ S& ' z2E &( 4 . 9 $EI% &' :D %zb :D %zP K / ).z ' CCC $ % ^ <.z% ! &$z YY}z $ 7D % H 7? 7 /\. &H ,(1 (V 1 . http://www.zone-h.org/en/defacements/special/filter/filter_defacer=eMP3R0r+TEAM/
?7
Im4n Emperor "5 1 7 9 ? 7 )% & (. 9 9 %' + 1 7& 79 $% : @<7 * E1
1
7
Im4n-Y4ho0 U ^ (1 t$ V . $ *9 ? "5 & :% C 1 U ^ _ )% ? "5 & :% (.
Lord Cracker-IranMatrix-Mohmad Shabgard-Danil-Im4n
Author: Satanic Soulful E-Mail: [email protected] [email protected] Developed In:Satanic Digital Network Security ™ Special TNX 2 :Hell Hacker – Collector – S_hahroo_Z - Kami Research By:5/-\t4N1C ©®Copyright For : Satanic Team 2005-2006 For More Information Go to Http://Hack-er.cjb.net/
©®All Right Reserved For Shabgard Security † Mr.XShabgardX 2005-2006 For More Information Visit:Http://Shabgard.Org/ My Deram Is All Day For Girl Is Dark&Ominous,