Hopping connections?

Discussion about hacker.org's server
Post Reply
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Hopping connections?

Post by Zaffron »

I know I will prolly get flamed by someone for thinking this is possible because i saw it in a video game, but can you do a connection hop from one ip to another to make yourself harder to trace in the event of cracking a password? BTW: Saw this in uplink, was just curious if it is applicable to real world networking.
User avatar
i am red
Posts: 55
Joined: Fri Feb 27, 2009 9:04 pm

Post by i am red »

i think it is, either create a static ip after its cracked or crack it via remote connect on an unprotected computer, but those are just guesses.
the redneck hacker is watching, from the depths of hee haw hell muahahahahahahahahahahahahah!!!!!!!!!!!!!!!!
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

So on the remote connect, the only way I can think of that happening is remote connecting and then opening up your little cracking program you made to get to the target, which seems kind of inconvenient to go through all the remote desktop stuff, or can you not open another connection and only act on the 1 outgoing one you used to crack another computer?
User avatar
i am red
Posts: 55
Joined: Fri Feb 27, 2009 9:04 pm

Post by i am red »

You can use a skid tool to crack someones WEP key, then run your attack from the owners network, because when an attack is detected they dont track the actual attacker but the location to which the IP lease was assigned. so they suspect the network owner or administrator of cracking
the redneck hacker is watching, from the depths of hee haw hell muahahahahahahahahahahahahah!!!!!!!!!!!!!!!!
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

Alright, thanks! NO skid tools for me though... Once I figure out how to make an encrypter then i'll work on something network related even though it will probably take me like 2 years.
User avatar
koolpop0
Posts: 259
Joined: Thu Sep 20, 2007 11:03 pm
Location: In the binary of this system
Contact:

Post by koolpop0 »

they use ftp bounce probably just from my exp with it


google it up
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

Didnt know that existed, ty
User avatar
koolpop0
Posts: 259
Joined: Thu Sep 20, 2007 11:03 pm
Location: In the binary of this system
Contact:

Post by koolpop0 »

its not common anymore since it was a exploit using the PORT command so i would expect it to be dead right now probably some servers are exploitable still
Image
Post Reply