lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun Apr 17 02:12:44 2005
From: wr0ck at hotmail.com (Sean Marks)
Subject: Exploiting Cisco Systems

??? Old doc...

>From: Sumy <sanandres@...il.com>
>Reply-To: Sumy <sanandres@...il.com>
>To: security-basics@...urityfocus.com
>CC: full-disclosure@...ts.grok.org.uk
>Subject: [Full-disclosure] Exploiting Cisco Systems
>Date: Sun, 17 Apr 2005 01:19:02 +0200
>MIME-Version: 1.0
>Received: from lists.grok.org.uk ([195.184.125.51]) by mc3-f11.hotmail.com 
>with Microsoft SMTPSVC(6.0.3790.211); Sat, 16 Apr 2005 17:55:47 -0700
>Received: from lists.grok.org.uk (localhost [127.0.0.1])by 
>lists.grok.org.uk (Postfix) with ESMTP id 78BDD1C3;Sun, 17 Apr 2005 
>01:55:09 +0100 (BST)
>Received: from zproxy.gmail.com (zproxy.gmail.com [64.233.162.196])by 
>lists.grok.org.uk (Postfix) with ESMTP id A9F8114Cfor 
><full-disclosure@...ts.grok.org.uk>;Sun, 17 Apr 2005 00:19:03 +0100 (BST)
>Received: by zproxy.gmail.com with SMTP id 9so1394342nzofor 
><full-disclosure@...ts.grok.org.uk>;Sat, 16 Apr 2005 16:19:02 -0700 (PDT)
>Received: by 10.36.86.19 with SMTP id j19mr277872nzb;Sat, 16 Apr 2005 
>16:19:02 -0700 (PDT)
>Received: by 10.36.50.10 with HTTP; Sat, 16 Apr 2005 16:19:02 -0700 (PDT)
>X-Message-Info: JGTYoYF78jHFrEJMsdUGZKAnruL84/WGdcZFheYcrEQ=
>X-Original-To: full-disclosure@...ts.grok.org.uk
>Delivered-To: full-disclosure@...ts.grok.org.uk
>DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; 
>d=gmail.com;h=received:message-id:date:from:reply-to:to:subject:cc:mime-version:content-type:content-transfer-encoding:content-disposition;b=b9OZK70uyrB7gXD2NH4ZMY54T//5ZlQABkeineiCG4Zast3lcJsbj57Ik3sSPYViUzfrtujbHlilAmGvy4NuNj3E6gTXjq8XO1BuZEP+Yo783fac+E6p4AtulRga84RINXoQpP5PIwz+nLeiTHovyHHWB25jXLiEhctqP2bzPuM=
>X-Mailman-Approved-At: Sun, 17 Apr 2005 01:54:58 +0100
>X-BeenThere: full-disclosure@...ts.grok.org.uk
>X-Mailman-Version: 2.1.5
>Precedence: list
>List-Id: An unmoderated mailing list for the discussion of security 
>issues<full-disclosure.lists.grok.org.uk>
>List-Unsubscribe: 
><https://lists.grok.org.uk/mailman/listinfo/full-disclosure>, 
><mailto:full-disclosure-request@...ts.grok.org.uk?subject=unsubscribe>
>List-Archive: <http://lists.grok.org.uk/pipermail/full-disclosure>
>List-Post: <mailto:full-disclosure@...ts.grok.org.uk>
>List-Help: <mailto:full-disclosure-request@...ts.grok.org.uk?subject=help>
>List-Subscribe: 
><https://lists.grok.org.uk/mailman/listinfo/full-disclosure>, 
><mailto:full-disclosure-request@...ts.grok.org.uk?subject=subscribe>
>Errors-To: full-disclosure-bounces@...ts.grok.org.uk
>Return-Path: full-disclosure-bounces@...ts.grok.org.uk
>X-OriginalArrivalTime: 17 Apr 2005 00:55:47.0809 (UTC) 
>FILETIME=[315F1D10:01C542E8]
>
>Table of Contents:
>----------------------------------
>Before you start:
>-
>What is an IP address?
>-
>What is an ISP?
>-
>What is a TCP/IP packet?
>-
>How to spoof your IP
>-
>How to use Telnet
>-
>How to use HyperTerminal
>-
>How to use Ping
>-
>How to use TraceRoute
>-
>How to use a proxy server
>-------------------------------------
>
>- Section 1: why hack a cisco router?
>Section 2: how to find a cisco router
>Section 3: how to break into a cisco
>Section 4: how to break the password
>Section 5: how to use a cisco router
>-----------------------------------
>Stuff you'll need to know BEFORE you start:
>-----------------------------------
>What is an IP address?
>IP stands for Internet Protocol, IP addresses are used by other computers 
>to
>identify computers that connect to
>them. This is how you can be banned from IRC, and how they can find your 
>ISP. IP
>addresses are easily obtained, they
>can be retrieved through the following methods:
>you go to a website, your IP is logged
>on IRC, anyone can get your IP
>on ICQ, people can get your IP, even if you have the option set "do not 
>show
>ip"
>they can still get it
>if you are connected to someone, they can type "systat", and see who is
>connected to them
>if someone sends you an email with IP-logging java, they can also get your 
>IP
>address
>There are many more ways of obtaining IP addresses, including using 
>back-door
>programs such as Sub7 or NetBus.
>
>
>Full Article: http://www.exploitx.com/forum/azbb.php?1113390854
>
>
>Note: We are inviting for those people that is interesting on the
>Forum topics to register, share your knowledge and ask. This is a new
>community after a long downtime for some "script kiddies" attacks.
>Help this community to grow. There will be many other topics depending
>on your suggestions
>Thanks
>Sincerely
>Exploitx Admin
>--
>Security Portal:
>http://www.exploitx.com
>  Forum: http://www.exploitx.com/forum/
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/

_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ