//THIS WAS ADDED LAST MINUTE //WE ARE ALWAYS ON THE TIP OF THE HACKER SCENE //WE ARE BRINGING YOU THIS 0DAY INFO FREE OF CHARGE! #include #define AUTHOR "By SEAMANSAYMAN" #define ALIAS "hybrid" #define DATE "1996 8/10/" #define ART1KLE "Thwarting the Evil Hacker" #undef PHRACK #define PHRACK "fuck you man" #define WHYISUBMITTEDTO~EL8 "ok, first i submit to phrack, i include a 56 page"\ "rant on why i like little children, they say my"\ "article is good enough, BUT JUST BECAUSE OF MY"\ "harmless little rant, it gets turned down." #define WHYIDIDNTINCLUDETHERANTIN~EL8 "my parents read ~el8.\a\a\a\a\a" Inteligence is key, keep this in mind. The government has a great amount of security specialists doing research on hackers, and howto protect there systems. I've come up with a great method, which is quite small and simple, it's a MUST READ (grep "MUST READ" el8[0] < END FEDERAL AGENT HUMOR --- HERE --- >). [ The OVERVIEW ] In this new hacker-society, everything is at risk. Or is it? [ The Plan ] Ok, a hacker picks your site... [ $ grep "vuln" mscan.log | head -n 1 i yourhost.co.jp is vuln to imapd attack@@#!@#@!#!@#!@#!@#!@# ] A hacker checks if your host is there. [ $ ping yourhost.co.jp ping reply ] A hacker scans your system. [ $ nmap -sF -p 1-65500 yourhost.co.jp port 23 is open $ hell yes bash: hell yes not found ] A hacker determines your os. [ $ nmap -O -p 23 yourhost.co.jp Remote os guess: Linux 2.0.36 9.02 x -400123456.49393 positive. $ yes haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake haha!!@@!#@! what a peice of cake ^C $ ] A hacker grabs imapd exploit from rootshell. [ ./gH-exploit_gr4b.sh www.rootshell.org imapd PUT IMAPD.C IN YOUR HOME DIR $ ls Exploits/ Code/ Hacking-Utils/ passwdfile jackripr.zip $ find / -name imapd.c /etc/imapd.c $ cp /etc/imapd.c ./ $ cat howtocompileexploit.txt First you must gcc -o exploit exploit.c EOF $ gcc -o imapd imapd.c ] A hacker runs it on you.......................................... [ $ ./imapd yourhost.co.jp EXPLOIT WORKS! BASH# rm -rf / & ] [ The Solution ] Buy a 300 baud modem.