What to do now?

Discussion about hacker.org's server
Post Reply
ParadiseHack
Posts: 20
Joined: Fri Jun 06, 2008 3:37 pm

What to do now?

Post by ParadiseHack »

hey, guys i today i was playing with google and suddenly i found a website which contains allot of security holes, i have got into the /cgi/etc directory , there is a list of files like, passwd,.htpasswd,aliases,pwd.db etc.etc and now i want to know that can i hack into site or not? if so then how???
Lets Get Lost.......
User avatar
jack krauser
Posts: 1005
Joined: Wed Aug 29, 2007 5:45 pm
Location: greece
Contact:

Re: What to do now?

Post by jack krauser »

ParadiseHack wrote:hey, guys i today i was playing with google and suddenly i found a website which contains allot of security holes, i have got into the /cgi/etc directory , there is a list of files like, passwd,.htpasswd,aliases,pwd.db etc.etc and now i want to know that can i hack into site or not? if so then how???
that wouldn't be a smart move!!!

inform the admin for the security holes.

but if you really want to hack it first find where the logs are located and find a way to clear them all cause it will be very easy for the admin to find you if you don't.
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.

by Loyal_Dark
ParadiseHack
Posts: 20
Joined: Fri Jun 06, 2008 3:37 pm

Post by ParadiseHack »

Muwahahaha, u think i'm a kid :D , i used JoHNthe Ripper and JAack to crack passwd, pwd,and Shadowed password files, but wait... I m not that much bad... i informed the administrator but he says that they were configuring the database ... anywayz, i have a file if anybody can decrypt it so decrypt it if you can :D

root:*:0:0:Super User:/root:/bin/csh daemon:*:1:1:Daemon:/nonexistent:/sbin/nologin operator:*:2:5:Operator:/nonexistent:/sbin/nologin bin:*:3:7:Binaries:/nonexistent:/sbin/nologin tty:*:4:65533:tty Sandbox:/nonexistent:/sbin/nologin kmem:*:5:65533:kmem Sandbox:/nonexistent:/sbin/nologin games:*:7:13:Games:/nonexistent:/sbin/nologin news:*:8:8:News Subsystem:/nonexistent:/sbin/nologin man:*:9:9:Man Pages:/nonexistent:/sbin/nologin ftp:*:14:5:Anonymous FTP Admin:/usr/ftp:/nonexistent bind:*:53:53:BIND


i cant decode it!! can any body please?
Lets Get Lost.......
Allosentient
Posts: 273
Joined: Thu Apr 10, 2008 9:47 pm

Post by Allosentient »

Where do you get your proxies?
The_Dark_Avenger
Posts: 115
Joined: Wed Jun 11, 2008 9:47 pm

Post by The_Dark_Avenger »

ParadiseHack wrote:Muwahahaha, u think i'm a kid :D , i used JoHNthe Ripper and JAack to crack passwd, pwd,and Shadowed password files, but wait... I m not that much bad... i informed the administrator but he says that they were configuring the database ... anywayz, i have a file if anybody can decrypt it so decrypt it if you can :D

root:*:0:0:Super User:/root:/bin/csh daemon:*:1:1:Daemon:/nonexistent:/sbin/nologin operator:*:2:5:Operator:/nonexistent:/sbin/nologin bin:*:3:7:Binaries:/nonexistent:/sbin/nologin tty:*:4:65533:tty Sandbox:/nonexistent:/sbin/nologin kmem:*:5:65533:kmem Sandbox:/nonexistent:/sbin/nologin games:*:7:13:Games:/nonexistent:/sbin/nologin news:*:8:8:News Subsystem:/nonexistent:/sbin/nologin man:*:9:9:Man Pages:/nonexistent:/sbin/nologin ftp:*:14:5:Anonymous FTP Admin:/usr/ftp:/nonexistent bind:*:53:53:BIND


i cant decode it!! can any body please?
There's nothing to decode. It's a basic /etc/passwd file. In old days there were encrypted passwords, but now they are stored in another file (which * means). this file is /etc/shadow, for every active user there's a hash, by default it's MD5, sometimes stronger "blowfish" is used (algorithm is defined by module pam_unix.so). Only root can access this file.
Post Reply