Hack Nasa (nu deschide daca esti newbie)

 :: More
 :: HacKs

Vezi subiectul anterior Vezi subiectul urmator In jos

Frumos Hack Nasa (nu deschide daca esti newbie)

Mesaj Scris de D.S.S.H. la data de Sam Noi 22, 2008 9:20 pm

O sa va las ceva info de cum se hackeaza NASA.
Daca esti un newbie,nu stii sa inlantuiesti proxyuri sau nu stii extrem
de bine cum sa te protejezi ... nu are rost sa citesti textul ... nu te
ajuta la nimic.Nu uita ca NASA are legatura cu guvernul ... si guvernul
are bani si timp sa te caute ...

si inca ceva : e doar un post informativ ... nu va asteptati la explicatii detaliate , si cum sa realizati atacul pas cu pas

Primul pas e sa mergeti la www.arin.net
si sa cautati NASA,si vi se da o serie de ipuri.Atentie ... trebuie sa
luati informatia exacta ! (adica de ex nu luati in seama NASA
Technologies , mergeti direct la National Aeronaut.

NASA (NASA-45)
NASA (NASA-4Cool
NASA (NASA-49)
NASA - Space Station Project Office (NSSPO)
NASA Ames Research Center (NARC)
NASA CTC (NASACT-1)
NASA Earth Science Data and Information System (NESDIS)
NASA Federal Credit (NFC-6)
NASA GLENN RESEARCH CENTER (NGRC)
NASA GLENN RESEARCH CENTER (#2) (NGRC2)
NASA Goddard Space Flight Center (NGSFC)
NASA Langley (NASALA)
NASA Langley Research Center (NLRC)
NASA Lewis Research Center (NLRC-1)
NASA Science Internet (NSI-1)
NASA Science Network (NSN-7)
Nasa Services (NASASE-1)
Nasa Services, Inc. (NASASE)
National Aeronautics and Space Administration (NASA)
NASA - John H. Glenn Research Centerat Lewis Field (ZN14-ARIN)
gnoc@grc.nasa.gov +1-216-433-9850
NASA Abuse (NASAA-ARIN) abuse@nasa.gov +1-256-544-5623
NASA Ames Research Center, NAS Division M/S 258-6 (LG-ORG-ARIN) hostmaster@nas.nasa.gov +1-650-604-4444
NASA Information Services Network (NISN-ARIN) noc@nisn.nasa.gov +1-256-961-9397
NASA Langley Research Center (ZN4-ARIN) larcnet@larc.nasa.gov +1-757-864-7799
NASA Langley Research Center (NC3-ORG-ARIN) larcnet@larc.nasa.gov +1-757-864-7799
NASA, Langley Research Center (LRN2-ARIN) larcnet@larc.nasa.gov +1-757-864-7799
NASA (AS1843) NASA-KSC-AS 1843 - 1848
NASA (AS270) PSCNI-AS 270
NASA Ames Research Center (AS771) NSN-RICE-AS 771
NASA Ames Research Center (AS372) NSN-AMES-AS 372
NASA Ames Research Center (AS24) AMES-NAS-GW 24
NASA Ames Research Center (AS10888) EI-AIX 10888
NASA Ames Research Center (AS1262) NSN-NCAR-AS-AS 1262
NASA Ames Research Center (AS1263) NSN-NCAR-AS-AS 1263
NASA Ames Research Center (AS23) RIACS-AS 23
NASA Ames Research Center (AS41) AMES 41
NASA Earth Science Data and Information System (AS22767) NASA-ESDIS-NET 22767
NASA Goddard Space Flight Center (AS1749) NASA-GSFC-AS 1749
NASA Goddard Space Flight Center (AS7847) NASA-HPCC-ESS 7847
NASA Langley Research Center (AS1254) NASA-LARC-AS 1254
NASA Lewis Research Center (AS1316) LERC-AS-AS 1316
NASA Science Internet (AS2143) NSN-FFIX-W 2143
NASA Science Internet (AS2142) NSI-FFIX-E 2142
NASA Science Network (AS297) NSN-UMD-AS 297
NASA NASA-NSSTC (NET-192-67-107-0-2) 192.67.107.0 - 192.67.108.255
NASA - Space Station Project Office NASA-SSFPO-ISO (NET-192-67-117-0-1) 192.67.117.0 - 192.67.117.255
NASA Ames Research Center NETBLK-NSI1 (NET-198-116-3-0-1) 198.116.3.0 - 198.116.3.255
NASA Ames Research Center ARC-OMM (NET-198-120-8-0-1) 198.120.8.0 - 198.120.8.255
NASA Ames Research Center NETBLK-NSI-1 (NET-198-116-7-0-1) 198.116.7.0 - 198.116.7.255
NASA Ames Research Center NETBLK-NSI2 (NET-198-116-2-0-1) 198.116.2.0 - 198.116.2.255
NASA CTC RESO-216-204-34-24 (NET-216-204-34-24-1) 216.204.34.24 - 216.204.34.31
NASA Federal Credit UU-63-88-86-80 (NET-63-88-86-80-1) 63.88.86.80 - 63.88.86.95
NASA GLENN RESEARCH CENTER TAC-66-181-41-72 (NET-66-181-41-72-1) 66.181.41.72 - 66.181.41.79
NASA GLENN RESEARCH CENTER TAC-66-181-42-200 (NET-66-181-42-200-1) 66.181.42.200 - 66.181.42.207
NASA GLENN RESEARCH CENTER TAC-66-181-38-128 (NET-66-181-38-128-1) 66.181.38.128 - 66.181.38.135
NASA GLENN RESEARCH CENTER (#2) TAC-66-181-39-80 (NET-66-181-39-80-1) 66.181.39.80 - 66.181.39.87
NASA Goddard Space Flight Center GSFC14 (NET-192-225-73-0-1) 192.225.73.0 - 192.225.73.255
NASA Goddard Space Flight Center GSFC20 (NET-192-225-79-0-1) 192.225.79.0 - 192.225.79.255
NASA Goddard Space Flight Center GSFC37 (NET-198-119-0-0-1) 198.119.0.0 - 198.119.63.255
NASA Langley NASA-LANGLEY-3 (NET-216-54-42-0-1) 216.54.42.0 - 216.54.42.255
NASA Langley NASA-LANGLEY-2 (NET-216-54-41-0-1) 216.54.41.0 - 216.54.41.255
NASA Langley NASA-LANGLEY-1 (NET-216-54-40-0-1) 216.54.40.0 - 216.54.40.255
NASA Langley NASA-LANGLEY-4 (NET-216-54-43-0-1) 216.54.43.0 - 216.54.43.255
NASA Langley NASA-LANGLEY-5 (NET-216-54-44-0-1) 216.54.44.0 - 216.54.44.255
NASA Langley NASA-LANGLEY-6 (NET-216-54-45-0-1) 216.54.45.0 - 216.54.45.255
NASA Langley NASA-LANGLEY-7 (NET-216-54-46-0-1) 216.54.46.0 - 216.54.46.255
NASA Langley NASA-LANGLEY-8 (NET-216-54-47-0-1) 216.54.47.0 - 216.54.47.255
NASA Langley Research Center LARCNET-3 (NET-192-239-114-0-1) 192.239.114.0 - 192.239.114.25 5
NASA Langley Research Center LARCNET-5 (NET-192-239-116-0-1) 192.239.116.0 - 192.239.116.25 5
NASA Langley Research Center LARCNET-7 (NET-192-239-118-0-1) 192.239.118.0 - 192.239.118.25 5
NASA Langley Research Center LARCNET-6 (NET-192-239-117-0-1) 192.239.117.0 - 192.239.117.25 5
NASA Langley Research Center LARCNET-8 (NET-192-239-119-0-1) 192.239.119.0 - 192.239.119.25 5
NASA Langley Research Center LARCNET-2 (NET-192-239-113-0-1) 192.239.113.0 - 192.239.113.25 5
NASA Langley Research Center LARCNET-4 (NET-192-239-115-0-1) 192.239.115.0 - 192.239.115.25 5
NASA Science Internet SONDRESTROM (NET-192-136-69-0-1) 192.136.69.0 - 192.136.69.255
Nasa Services ERSD-13162674 (NET-66-47-196-184-1) 66.47.196.184 - 66.47.196.191
Nasa Services, Inc. IEN-NASAINC (NET-64-248-117-32-1) 64.248.117.32 - 64.248.117.63
NASA NOVA-200 (NET-207-227-126-32-1) 207.227.126.32 - 207.227.126.47
NASA AMES RESCH CTR SBCIS-101731-15910 (NET-66-123-29-144-1) 66.123.29.144 - 66.123.29.151
NASA Convection and Moisture Experiment CAMEX4 (NET-198-116-14-0-1) 198.116.14.0 - 198.116.14.255
NASA Federal Credit Union DIGEX-NFCU-BLK1 (NET-206-205-36-0-1) 206.205.36.0 - 206.205.36.255
Nasa Tech SBCIS-101730-112853 (NET-65-68-41-16-1) 65.68.41.16 - 65.68.41.23

# ARIN Whois database, last updated 2002-10-24 19:05
# Enter ? for additional hints on searching ARIN's Whois database.


Prima
impresie e ca se folosesc niste ranguri de ip enorme ... dar in
realitate nu se folosesc toate ipurile asociate ... ne informeaza
aproximativ unde sunt localizate sistemele NASA.
Pt a continua aveti
nevoie de LANguard Network Scanner
(http://www.tucows.com/preview/213719) ... puneti rangul de ipuri si
scanati.Dupa ceva timp va apar cam 8 sisteme active.Asa arata outputul
unuia din ele (in cazul asta se numeste StarGate ... lol! ce original ... puff ... )


198.116.11.45
Username: Stargate
Operating System: Windows NT 4.0
Open Ports: 21 - 135 - 139
LAN Manager : NT LAN Manager 4.0
Domain : WORKGROUP
Operating System : Windows NT 4.0

Open Ports (3)
21 [ Ftp => File Transfer Protocol ]
220 FTP Software, Inc. Win32 FTP Server 5,0,0,116 ready.
135 [ epmap => DCE endpoint resolution ]
139 [ Netbios-ssn => NETBIOS Session Service ]

[/madfran]
E un sistem de la Universitatea din Rhode Island !
[madfran/]

ipul
care apare e al sistemului "prins" , si avem si log in-ul.Insa
informatia mai improtanta : in cazul asta avem de aface cu un windows
nt 4.0 , si porturile deschise.

Pasul urmator ar fi un atac prin
netbios.Pt asta puteti folosi Shadow Scan (cred ca l-am postat eu pe la
programe ... cautati ..).Si la Shadwo S. sa fie activata optiunea
NetBios Auditing Tool,si faceti un atac brute-force pt a scoate
passul... sigur va iese.Si inafara de StarGate , am mai gasit un user
"Administrator" ... asa ca nu cred ca dureaza multa scoaterea passului
, vazand log inul .Deasemenea se poate folosi Red Button ,care
functioneaza in WinNT 3.5x cat si in 4.0 .Partea cu exploiturile o sar
, dar fac o mica explicatie de fiecare (Red Button, RDS,
Unicode, Null session, Legion ):

-Red Button : Intri fara log in si pass , folosind porturile 137,138 si 139.
-RDS
Microsoft IIS : protocol http ; vulnerabilitatea RDSului se obtine prin
Data Factory din Remote Data Service,care e un component MSDAC ...si
asta implica acces la distanta la date default.Un client fara
autorizare are permis sa acceseze OLE DB din server.Descriere tehnica :
-Folosind metoda Head si Post : creaza un GET la /msdac/msadcs.dll
-Se codifica zecimal chemarile la URL
-Schimband Mime (original)
-Creand o tabla .MDB in loc de numele original
-Unicode : protocol http ... e un bug destul de celebru , si prostesc
-Null
session : protocol NetBios si NetBEUI (asta ar fi exploitul care ar
trebui sa-l folositi impotriva celor de la NASA) ... comanda ar fi :
Net use \\xxx.xxx.xxx.xxx\IPC$ "/user:"
(pt
asta puteti folosi Legion 2.1 sau Cerberus Internet Scanner) ...
Cerberus Internet Scanne e mai efectiv (cea mai efectiva metoda fiind
prin netbios)... poati ataca prin metodele spuse mai sus ... dar si
Getsvrinfo, GNITvse rc1, NB4, NBName, Net Fizz, NtInfoScan,
Winfingerprint 2.2.6 sau Winfo 1.4.
Pt a intra in sistem aveti
nevoie de Essential Net tools... scrieti un rang de ipuri (ex
198.116.11.45 - 198.116.11.80 ) ... si va apar mai multe recursuri ...
dati click stanga si alegeti open computer.Daca nu e posibil folositi
PQwak pt crackeat passul.
************************
Dupa cum ati
putut vedea , s-au folosit tehnici simple ,dar letale.Deasemenea ramane
demonstrat ca oricat de importante ar fi sistemele , nu inceteaza sa
fie vulnerabile ... asadar mereu o sa fie posibil sa practicam hackul
pe FBI , pentagon , NASA ... etc. ... si nu e nevoie ca atacantul sa
fie expert ... Smile

salut!

P.S. : NU MA FAC RESPONSABIL DE CUM FOLOSITI INFORMATIA PE CARE AM POSTATO ...
avatar
D.S.S.H.
Bishoujo
Bishoujo

Numarul mesajelor : 27
Varsta : 27
Data de inscriere : 22/11/2008

Vezi profilul utilizatorului http://sdh-downloads.forumz.ro

Sus In jos

Vezi subiectul anterior Vezi subiectul urmator Sus

- Subiecte similare

 :: More
 :: HacKs

 
Permisiunile acestui forum:
Nu puteti raspunde la subiectele acestui forum