The Anatomy of a Hack – Hacking with Cain - By Ramius

Docs that have proven to be a staple in understanding computer/network security. This is not an inclusive forum and nothing ipublished will tell you how to 0wn someone, these docs will help you understand how you got 0wnd.
Hotmod
n00b
Posts: 1
Joined: Tue Dec 05, 2006 9:38 pm

Post by Hotmod » Tue Dec 05, 2006 9:42 pm

NOTE: The next section makes the assumption that you have properly configured your Ethernet interface with an IP address that is correct for your network and that you have logical connectivity to the target hosts.
and I do this how...[/quote]

User avatar
silas
Sargeant at Arms
Posts: 268
Joined: Sat May 27, 2006 8:57 pm
Location: ./scapy

Post by silas » Tue Dec 05, 2006 10:07 pm

Hotmod wrote:
NOTE: The next section makes the assumption that you have properly configured your Ethernet interface with an IP address that is correct for your network and that you have logical connectivity to the target hosts.
and I do this how...
[/quote]
In order to hack something, you first need a connection to it. This connection can be physical LAN access; via a compromise router, switch, or firewall; or through alternate means.

By viewing the network via a sniffer or by common knowledge, you should be able to pick up the IP addresses that are communicating across the network. A sniffer program like Ethereal or Wireshark will do the trick. If you can view the IP address, then you can logically deduce the subnet mask and maybe guess the DNS server(s) and Default Gateway. However, most companies employ the use of private IP addressing.

If you are unfamilar with any of the above items, please research them and become familar. Once you have obtained the IP addresses, look in the sniffer output/logs for any protocols that might be of use, like; DHCP, RIP, OSPF, etc... Once you have found a host(s) that is using some specifc protocol, you can usually determine its function on the network. For example, a host that uses RIP or OSPF is usually a router, which is usually the Default Gateway on most network or subnets.

---Silas
Knowledge is potential,
Application is kinetic.

borat
n00b
Posts: 1
Joined: Mon Jul 16, 2007 5:20 pm

Post by borat » Mon Jul 16, 2007 5:22 pm

i couldn't log in as administrator, it says user name not found or bad password :?

help, please?

User avatar
hormesis
Veteran
Posts: 679
Joined: Wed May 17, 2006 3:27 pm
Location: irc.tddirc.net #hackerthreads

Post by hormesis » Mon Jul 16, 2007 6:01 pm

You do realize that the last post in this thread is over half a year old, don't you?

Please start a new thread.

jo33 mama
n00b
Posts: 1
Joined: Tue Jul 24, 2007 9:03 am
Location: idk

Post by jo33 mama » Tue Jul 24, 2007 9:28 am

when i click all computers at the beggining it gives me an error can someone help me out
leeeerooooooyyyyyyy!!!!!!!!!!!!!!!!!!

obidon
Hacker in Training
Posts: 95
Joined: Sun Feb 18, 2007 11:35 pm
Contact:

Post by obidon » Fri Aug 03, 2007 2:01 pm

I heard somewhere that once you install Cain, you can't uninstall it. Is this true? And also can you get the executable in a compressed file instead of needing to install it?

the black baron
n00b
Posts: 4
Joined: Fri Nov 09, 2007 8:55 pm

Post by the black baron » Sat Nov 10, 2007 11:06 am

verry nice tut realy helped me

thx~~

User avatar
genjutsu01
n00b
Posts: 21
Joined: Thu Dec 06, 2007 6:46 am
Location: Outer_Heaven

Post by genjutsu01 » Fri Dec 07, 2007 6:54 am

does it need to be a computer connected directly to your network, like would you have to go into the college/workplace to actually do it manually or can you do it over the web? If so how?
I always tell the truth, even when I lie

ergeben
Sargeant at Arms
Posts: 157
Joined: Mon Apr 04, 2005 10:05 am
Location: over there --->

Post by ergeben » Fri Dec 07, 2007 9:22 am

Note how it says LAN hacking.
ಠ_ಠ

User avatar
genjutsu01
n00b
Posts: 21
Joined: Thu Dec 06, 2007 6:46 am
Location: Outer_Heaven

Post by genjutsu01 » Fri Dec 07, 2007 9:26 am

ergeben wrote:Note how it says LAN hacking.
ahh right missed that part, thanks
I always tell the truth, even when I lie

Smiley
Sargeant at Arms
Posts: 238
Joined: Tue Sep 07, 2004 12:29 pm

Post by Smiley » Fri Dec 07, 2007 10:35 am

Have you read the replies?

JibberingJ
n00b
Posts: 1
Joined: Sat Jan 05, 2008 11:42 pm

Post by JibberingJ » Sun Jan 06, 2008 12:24 am

Another question to add to the stack:

I am running two computers on my home network, a desktop and a laptop. They are connected via a wireless linksys router. Both systems running XP SP2 with software firewalls.

My desktop has cain installed and detects both of my PCs. I can browse my desktop(the pc cain is installed on), but I cannot browse my laptop. I imagin this has something to do with SP2 and/or my firewalls? Anyhow, on my desktop I can enumerate all the users, but when I try to "Connect As" with my username/password it tells me "Unknown Username or Bad Password".
"PC_Name"\"User_name" is the format I am suppose to use here right? Does it matter than I am logged onto this account already?

Maybe this is another question answered by reading the book?

Oh yeah. It says 'User' and then in the next column says 'Full Name'. Is 'Full Name' used for anything other than identification? (Yes dumb
question im sure, but I keep thinking I should try to use it "Just In Case" so I figured I would ask and save myself a lot of time hopefully"

Post Reply