Jump to content

Recommended Posts

Posted

Guys...

You know how you can access someone's shares by doing:

net view <computer name>

THEN

net use <drive letter>: \\<computer name>\<share>

Is that concidered hacking if you do it to someone that is not on your network?


Posted

Almost all firewalls block that, it can be blocked manually by filtering ports 135-140 and only works when the victim has enabled file sharing on they network..

Posted

Seems like it would be hard. All firewalls don't let you know the computer name anyway, so you'd have to do it to someone you knew. :)

EDIT: Shoot! Tha Filer beat me to it :rolleyes: You're speedy!

Posted

Actually, on my router, I had to set my DMZ Host IP Address to 192.168.1.0 to disable it...Now no one can get into my shares using that procedure...

Well, I just got a call from my cousin saying that I shouldn't do it to her boyfriend anymore, when all I did was took a look at the list of his shares, and told him that he should do something about the security of his router... :rolleyes:

Oh yeah, now I remember that ThA_FiLeR and FthrJACK did this to me once...

ThA_FiLeR took a look at my MP3s and FthrJACK deleted my website (don't worry, I had a backup! :D)! :)

Anywayz, I'm going out for pie...Cya...

Posted
Actually, on my router, I had to set my DMZ Host IP Address to 192.168.1.0 to disable it...Now no one can get into my shares using that procedure...

Well, I just got a call from my cousin saying that I shouldn't do it to her boyfriend anymore, when all I did was took a look at the list of his shares, and told him that he should do something about the security of his router... :rolleyes:

Oh yeah, now I remember that ThA_FiLeR and FthrJACK did this to me once...

ThA_FiLeR took a look at my MP3s and FthrJACK deleted my website (don't worry, I had a backup! :D)! :)

Anywayz, I'm going out for pie...Cya...

What? u mean them Backstreet boys, Britney Spears, Christina Aguilera, and what other gay band songs u had on ur hd?

lollll....I cant hack, whats hacking?

  • 3 weeks later...
Posted

um no there are pro hackers still out here most that use programs are sript kiddies. using trojans web d/l's etc etc. But using sploits on servers is "hacking".

Th3ChaS3r

Posted
Only way to hack these days is if you got someone on the inside, planting a program 'letting' you in  :rolleyes:

that is so not true....lol. You would be suprised on who is on this board. :)

Posted

-hacking IIS servers :) (full control, run anything you want) used to do this allot but then had to switch ISP coz Time Warner RR was whining bout me sendin packets or some sh*t..

Posted

Alright then...

Say you wanted to hack a network which is idlised... No connection to the net, no connection to a different network...

How you gonna get into it?! You need someone on the inside, hook you up to the LAN or just get the files what ever you want.

Thats how most secure servers are these days.

Posted
Alright then...

Say you wanted to hack a network which is idlised... No connection to the net, no connection to a different network...

How you gonna get into it?! You need someone on the inside, hook you up to the LAN or just get the files what ever you want.

Thats how most secure servers are these days.

ok, having someone getting files from a few PCs that have no outside connection is called "STEALING" not "HACKING".

Posted

Flash, you are so wrong.

more complex a system is, generally the more insecure it is. modern systems do what? -- get more complicated.

there are many OLD exploits out there that are still working even today, never mind the new ones. Windows ISS still has lots of exploitable wholes in it.

new exploits get found every minute of every day. Finding them out would be considered hacking... using them on a victim is not, thats cracking.

websites get defaced every day too, you need to get access to the web server to do that some how... be it confusing the DNS record, actually over writting the files on the web server, telling the webserver to download files from another server (eg a new index.htm file or micro trojan) via code put in say.. a webpage form. etc etc.

if new exploits werent found all the time, websites like www.ntbugtraq.com and www.packetnews.com would be very dull indeed, for different reasons in each case :)

  • 4 weeks later...
Posted

As system admin it is my job to check what users are doing on my network. My firewall/proxy/router supply me with great logs, who are coupled with e-mail logging and snort/ids database. Ultimately i've also access to all their files in case i need to check if somebody is messing up.

I love net-dictature :)

Posted

i wanna make fun with one of my friend, can someone help me.. if someone kan make a file for me who does something like net view for me so i can joke him alittle :rolleyes:?

or is it hacking? - then forget about it :)

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...