*DAMN R6 Forum

*DAMN R6 Community => General Gossip => Topic started by: Zomar on August 03, 2001, 07:32:25 pm



Title: Re: here we go again.....
Post by: Zomar on August 03, 2001, 07:32:25 pm
well loud sounds like this will get u banned  ;D


Title: Re: here we go again.....
Post by: Grifter on August 03, 2001, 07:50:11 pm
Loud,
-Deleted-


So, as for Peeky's comments. ?I say, so what. ?It's got a bug while in "debug mode" ?yeah, and that's the mode you always run a public server in, right? ?And as for vulnerable to DoS attacks... what really isn't? ?You flood enough signals at any address, and real messeges will start dropping... that's the whole point of DoS attacks. ?Anyone can do them, and it's very hard to do anything about it.

So Loud, pass it along if you wish, but I'm very sure that Evil knows more then I do in these issues.



Title: Re: here we go again.....
Post by: Peepay (Peekay taken) on August 03, 2001, 10:08:28 pm
Alright...I just wanted Loud to tell evill this.  I've never hacked any server in my life.  If you want to know where I got this information, from a program, MacAnalysis.  I didn't say I hacked the server.  I'm just telling Evill this stuff so he can fix it.  And Loud, please, please stop calling me Romeo, IM NOT ROMEO!!!  ASK WRATH, me and romeo have talked to him at the SAME EXACT time.  Here's the original transcript for MacAnalysis if your wondering:

MacAnalysis Started at: 12:09 PM

MacAnalysis scans over 1200 holes, please do something else during the scan. For more informations: support@macanalysis.com

STEP 1:  CGI vulnerabilities


STEP 2:  Folders:

Viewable Folder found:  /help .
Viewable Folder found:  /news .

STEP 3:  Trojans


STEP 4: Services/Protocols Holes

FTP:21 is active (High)
Version: Wu- 2.6

Info: Debug Mode client Vulnerability
Resume: When running in debug mode, Wu-ftpd logs user activity to syslog in an insecure manner. An attacker with control over your server's hostname resolving facility could exploit this vulnerability to get root access remotely on your  host.

SSH:22 is active (Risk: High)
Resume: This service is vulnerable to various remote buffers overflows and Denial Of Services attacks.
Fix: Upgrade to the lastest version.


STEP 5: Remote Procedure Call


STEP 6: CGI syntax

Vulnerable syntax found:  
Command line: ////////////////////////////////////////////////////////////////////////////////////


Don't believe this is true? Download it for yourself.

Peekay (NOT PEEPAY, PEEKAY is TAKEN FOR USERNAME [i lost pw]!!!)


Title: Re: here we go again.....
Post by: jn.loudnotes on August 03, 2001, 10:49:14 pm
yeah whatever this thread got stupid so I deleted all my remarks


Title: Re: here we go again.....
Post by: Ace on August 04, 2001, 09:58:06 am
loud, by deleting all ur remarks, u have managed to confuse me beyond all imagination


Title: Re: here we go again.....
Post by: jn.wrath on August 04, 2001, 10:18:23 am
Juliet, asked me yesterday if I would tell Scott about the errors in his FTP server, I declined, stating that I would have to explain that I was *NOT* Juliet and that I just talked to him on AIM. etc, etc, etc and I would have to convince him the info was correct... I finally told him to email Scott himself... then he said he'd ask Loud to tell Scott..

Romeo != Juliet (for non-programmers, != means "does not equal", they are entirely two different people. Back before they became famous, I knew them and they were two different people and they are still the same two people, so I think that issue is closed.


Title: Re: here we go again.....
Post by: Grifter on August 04, 2001, 10:41:22 am
A question and comment for the dumbass.......

Peekay, why would you be running an analysis program on another person's server, unless you were looking for points of vulnerability?  And why do people do this?  To figure out how to get in......

And a big fat FYI... running analysis tools without permission on sombody elses computer / server is a violation of the ToS of every ISP I've ever seen.  Don't believe me... just ask the dip shit student from NMSU that lost his dorm room connection for trying to telnet into one of my servers.  DOH! you can't ask him, since the system admin (a nice chap named Ian) yanked is account within 6 hours of my e-mail with the log (along with the IP, I back tracked his user ID, etc.).....  Seriously... everyone knows that analysis tools are used as much for hacking as for real analysis work.  That's why it's in the ToS when you sign up for your ISP.  You're lucky that Scott doesn't mail some of his logs to @Home (or whatever broadband service you belong to) and get you a spanking when your Daddy gets home and can't access his e-mail anymore.  I guess Scott is nicer then me.



Title: Re: here we go again.....
Post by: jn.loudnotes on August 04, 2001, 11:51:44 am
see....I knew there was some reason that I'd posted that conversation....it just sounded vaguely illegal.   Well, I'm glad Grifter has the specifics.


sorry Ace....

If you want to get unconfused you can look at www.capitolaw.com/Jacob/r6/convo.gif


Title: Re: here we go again.....
Post by: SiGmA_X on August 05, 2001, 05:23:58 am
ok... Right Loud... That sounds illegal... not that i study it, but it would seem to show that probing a server just *might* also tell you where to hack in to it... seems logicial... and Loud, i am confused...can you re-place all of your messages?? plz?

Romulus


Title: Re: here we go again.....
Post by: SiGmA_X on August 05, 2001, 05:24:43 am
Quote

Loud,
-Deleted-


So, as for Peeky's comments. ?I say, so what. ?It's got a bug while in "debug mode" ?yeah, and that's the mode you always run a public server in, right? ?And as for vulnerable to DoS attacks... what really isn't? ?You flood enough signals at any address, and real messeges will start dropping... that's the whole point of DoS attacks. ?Anyone can do them, and it's very hard to do anything about it.

So Loud, pass it along if you wish, but I'm very sure that Evil knows more then I do in these issues.




whats up w/ that Deleted thing??


Title: Re: here we go again.....
Post by: jn.loudnotes on August 05, 2001, 12:04:29 pm
um...no actually i can't....

and grifter deleted his comment to me about the comment I made that I deleted myself.....

understand now?


Title: Re: here we go again.....
Post by: SiGmA_X on August 05, 2001, 02:37:55 pm
yes, i do now! thank you!

you
--deleted--

cya
Romulus


Title: Re: here we go again.....
Post by: Grifter on August 05, 2001, 06:16:48 pm
Actually, I deleted my comment about Loud because upon reflection, it seemed too harsh... I meant it as a point, but it didn't seem to come out right.  Sorry Loud.


As for illegal.... no. ?At this point, until you actually do *something* to someones server, you are not breaking any law (never heard of a law for loitering on the internet). ?However, it is against the Terms of Service (ToS) of almost every Internet Service Provider (ISP) and they will yank your access if they get a report of you probing, scanning, flooding, etc. any system that keeps a log and feels like reporting you.

Rule number 1, no matter how many servers you travel through to disguise your tracks, you never, never hack from your home. ?(this goes for anyplace that you have *normal* access through, school, work, etc.)



Title: Re: here we go again.....
Post by: SiGmA_X on August 05, 2001, 06:28:59 pm
Yea... Couldnt you like disciuse it by hacking into someone else's modem and run through them tho? there has gotta be a way to protect your self from the law! lol...


Title: Re: here we go again.....
Post by: Grifter on August 05, 2001, 09:37:28 pm
That would require that you subverted complete control of their system.....

And are there ways to not get caught?  Sure there are, lots of ways.....  but the people that really know, they don't talk about them.  Real hackers know that talking is how you get caught.  


Title: Re: here we go again.....
Post by: SiGmA_X on August 06, 2001, 04:42:02 am
I am no hacker, but i know that much.

A secret is only a secret if only 2 eople know it and one of those people is dead.

How would you take over some one elses computer w/o them knowing? isnt there some softwear (legal stuff) that, if installed, allows you to use the other computer remotly? i remember back in '97 (i think - first G3's came out...) that my friends dad remotly controled his office comp from home...


Title: Re: here we go again.....
Post by: jn.loudnotes on August 06, 2001, 11:27:55 am
actually it's still a secret if both of them are dead....


Title: Re: here we go again.....
Post by: Romeo on August 06, 2001, 02:22:02 pm
Ok, There are lots of programs that help you hack. they just say use this program with caution. it is what you are doing that is illegle


Title: Re: here we go again.....
Post by: SiGmA_X on August 06, 2001, 03:59:47 pm

Quote

actually it's still a secret if both of them are dead....


so true! but i dont think that you, me, or the other 'one' waht to end up dead... at least, not yet...


Title: Re: here we go again.....
Post by: SiGmA_X on August 06, 2001, 04:01:17 pm

Quote

Ok, There are lots of programs that help you hack. they just say use this program with caution. it is what you are doing that is illegle


is is illegal to hack your own computer w/o going out side of the network that the computers are in? i mean like break down password barriers and stuff like that...


Title: Re: here we go again.....
Post by: Grifter on August 06, 2001, 05:15:54 pm
Romeo, most comercial programs that are used for hacking are legit network problem solving applications.  It's just known that these are the same programs used by many hackers to probe networks for weaknesses.  There are also a bunch of underground apps and scripts for doing pure hacking tasks like brute force attacks, demon dialers, etc.  None of these programs are illegal (is there *any* illegal program at all?).  It's just what you do with them.  And once again..... most HACKING is not illegal... it's a definate violation of your ISP ToS, but usually not illegal (MOST is a BIG word...  port scanning the local bank or FBI or IRS is not illegal, just stupid.... actually taking down their systems, breaking in, deleting files, etc... that's illegal).  Most laws have not caught up with the technology age yet.

Romulus, yes, there are comercial programs to remotly control other computers (dial in or network).  Timbuktoo was one of those, PC anywhere for wintel's is another.... a couple more that I know about.  This is not hacking, but remote network access/control programs.  Also, it is NOT illegal to hack into your own computer.. you are giving yourself permission to do it, after all.... this is how most hackers practice.  Load a copy of the program they are wanting to exploit, then attack it from another computer in their home.... once they figure out the vulnerabilities... they just then need apply them to the actual target of their adolecent wet dreams.....



Title: Re: here we go again.....
Post by: SiGmA_X on August 06, 2001, 05:26:33 pm
Ok. I sorta understand. My friend had a hacker in his computer. It was some sort of server that was placed through Napster... How does THAT work? Ill add more in a litle while...