S v D War
Ok my dad does alot of network stuff at his work. Secretly iv been learning as much as i can about hacking a computer through LAN. Just last night he challenged me to a kinda RootThisBox contest. He brought home an old computer and set it up last night. Now this morning i was able to telnet onto it. But whenever i try to get into it, it says "Access Denied" so i know my dad put some kinda passwords on it. Is there a way to get around this? Or even change it?
Thanks in advanced
-Krazy
bah, forget bruteforcing. This is a LAN, so fire up some MitM tools, and hi-jack his connection.
if you really want to own him, you can uuencode an entire rootkit to text form, and then uudecode it on the target host. instant ownage, and if you do it right he'll never know as his conection won't drop (think command injection here).
LANs offer tons of opertunities. play around with them :)
Mmmk i dont really understand the last 2 posts but thats what we have google for :D. Anyway, so the battle ended for a while till he gets home tonight. Now is the time i prepare for the next one.
Heres some questions i wanna ask…
- Is there a way i can get a program off my computer, put it on his, and execute it on his without hurting mine?
BTW i mapped a drive without him knowing if that helps…
- Is there a way i can somhow go onto his network and put a proxy on it so when he tries to open IE he gets the "Page Cannot Be Displayed" thing?
Thanks in Advanced.
-Krazy
Yea, tehre are plenty of ways. They range from using some sort of file transfer (eg: FTP, TFTP, SFTP, SCP, RCP….) to simply putting a disk in his drive.
If he is using a Windows based machine and you are as well, i recommend you look into a program called psexec. It will let you run commands on the remote host. Although, to use it, you'll need a valid login. I can't remember the exact URL for it ( :| ), so you'll have to google.
As far as telnet buffer overflows go, if this competition is any sort of challenge (or your dad as half a brain), he will not be using telnet (or if he is he'll most likley be using a recent telnetd), he'll be using SSH. There are some SSH exploits out there, however, they're all patched and not that effective (I think the only really good one was what, CRC-32? But thats long since patched…).
Like I said, Man in the Middle (MitM) attacks and connection hijacking are the way to go for this one… ;)
The computer hes using can be telneted. Im right now im in control of the box were fighting over. But its just a matter of time. Im trying to work out shutdown commands on the command prompt (cause were connected throught lan) so when he gets close to getting into it, i can execute them on \\HOME (<<<his computer). But for some reason, when i go to run it, nothing happens…Any suggestions?