From: Sumy <sanandres@xxxxxxxxx>
Reply-To: Sumy <sanandres@xxxxxxxxx>
To: security-basics@xxxxxxxxxxxxxxxxx
CC: full-disclosure@xxxxxxxxxxxxxxxxx
Subject: [Full-disclosure] Exploiting Cisco Systems
Date: Sun, 17 Apr 2005 01:19:02 +0200
MIME-Version: 1.0
Received: from lists.grok.org.uk ([195.184.125.51]) by mc3-f11.hotmail.com
with Microsoft SMTPSVC(6.0.3790.211); Sat, 16 Apr 2005 17:55:47 -0700
Received: from lists.grok.org.uk (localhost [127.0.0.1])by
lists.grok.org.uk (Postfix) with ESMTP id 78BDD1C3;Sun, 17 Apr 2005
01:55:09 +0100 (BST)
Received: from zproxy.gmail.com (zproxy.gmail.com [64.233.162.196])by
lists.grok.org.uk (Postfix) with ESMTP id A9F8114Cfor
<full-disclosure@xxxxxxxxxxxxxxxxx>;Sun, 17 Apr 2005 00:19:03 +0100 (BST)
Received: by zproxy.gmail.com with SMTP id 9so1394342nzofor
<full-disclosure@xxxxxxxxxxxxxxxxx>;Sat, 16 Apr 2005 16:19:02 -0700 (PDT)
Received: by 10.36.86.19 with SMTP id j19mr277872nzb;Sat, 16 Apr 2005
16:19:02 -0700 (PDT)
Received: by 10.36.50.10 with HTTP; Sat, 16 Apr 2005 16:19:02 -0700 (PDT)
X-Message-Info: JGTYoYF78jHFrEJMsdUGZKAnruL84/WGdcZFheYcrEQ=
X-Original-To: full-disclosure@xxxxxxxxxxxxxxxxx
Delivered-To: full-disclosure@xxxxxxxxxxxxxxxxx
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta;
d=gmail.com;h=received:message-id:date:from:reply-to:to:subject:cc:mime-version:content-type:content-transfer-encoding:content-disposition;b=b9OZK70uyrB7gXD2NH4ZMY54T//5ZlQABkeineiCG4Zast3lcJsbj57Ik3sSPYViUzfrtujbHlilAmGvy4NuNj3E6gTXjq8XO1BuZEP+Yo783fac+E6p4AtulRga84RINXoQpP5PIwz+nLeiTHovyHHWB25jXLiEhctqP2bzPuM=
X-Mailman-Approved-At: Sun, 17 Apr 2005 01:54:58 +0100
X-BeenThere: full-disclosure@xxxxxxxxxxxxxxxxx
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: An unmoderated mailing list for the discussion of security
issues<full-disclosure.lists.grok.org.uk>
List-Unsubscribe:
<https://lists.grok.org.uk/mailman/listinfo/full-disclosure>,
<mailto:full-disclosure-request@xxxxxxxxxxxxxxxxx?subject=unsubscribe>
List-Archive: <http://lists.grok.org.uk/pipermail/full-disclosure>
List-Post: <mailto:full-disclosure@xxxxxxxxxxxxxxxxx>
List-Help: <mailto:full-disclosure-request@xxxxxxxxxxxxxxxxx?subject=help>
List-Subscribe:
<https://lists.grok.org.uk/mailman/listinfo/full-disclosure>,
<mailto:full-disclosure-request@xxxxxxxxxxxxxxxxx?subject=subscribe>
Errors-To: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
Return-Path: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
X-OriginalArrivalTime: 17 Apr 2005 00:55:47.0809 (UTC)
FILETIME=[315F1D10:01C542E8]
Table of Contents:
----------------------------------
Before you start:
-
What is an IP address?
-
What is an ISP?
-
What is a TCP/IP packet?
-
How to spoof your IP
-
How to use Telnet
-
How to use HyperTerminal
-
How to use Ping
-
How to use TraceRoute
-
How to use a proxy server
-------------------------------------
- Section 1: why hack a cisco router?
Section 2: how to find a cisco router
Section 3: how to break into a cisco
Section 4: how to break the password
Section 5: how to use a cisco router
-----------------------------------
Stuff you'll need to know BEFORE you start:
-----------------------------------
What is an IP address?
IP stands for Internet Protocol, IP addresses are used by other computers
to
identify computers that connect to
them. This is how you can be banned from IRC, and how they can find your
ISP. IP
addresses are easily obtained, they
can be retrieved through the following methods:
you go to a website, your IP is logged
on IRC, anyone can get your IP
on ICQ, people can get your IP, even if you have the option set "do not
show
ip"
they can still get it
if you are connected to someone, they can type "systat", and see who is
connected to them
if someone sends you an email with IP-logging java, they can also get your
IP
address
There are many more ways of obtaining IP addresses, including using
back-door
programs such as Sub7 or NetBus.
Full Article: http://www.exploitx.com/forum/azbb.php?1113390854
Note: We are inviting for those people that is interesting on the
Forum topics to register, share your knowledge and ask. This is a new
community after a long downtime for some "script kiddies" attacks.
Help this community to grow. There will be many other topics depending
on your suggestions
Thanks
Sincerely
Exploitx Admin
--
Security Portal:
http://www.exploitx.com
Forum: http://www.exploitx.com/forum/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/