Sei sulla pagina 1di 27

Satanic Soulful

29/1/1384

Contact:
Satanic.soulful@GMail.Com
Satanic_Soulful@Yahoo.Com
Special TNX 2:
Hell Hacker – B0rn2h4k – S hahro Z – XshabgardX -
Im4n & Y4hoO Emperor
!" #

$ % % & '( ()
*+, (- . / .0 (1 2&3
$ 1 1 .% 4 5(1 & ' 6 % )/ ( * 7
( *;7 $% : / $ (,8 9
< 5 1 (,8 9 & / % % )/ (1 ,
= *

? 7$ *9 @<7$ 2 .> 1 (,8 9 +, & % )/


C / A #1 B 1

A1
Hacker’s Culb - Black Hat Hacker -@tstake -Hobbit
7 7? 42 (1

(8
$% D /% * *? 7 E1 &$ 7 ?&F ? % %
C% D % F G 4 .? 1 2 . 7
(1$ * 7 E1 9 & 7 7 /$ H ? % %
C % % CCC $ .(<7? IJ+8 , '(1 (. 1 (
(. / ? &$' J+ G < I$ H J . EK2 9
2 9 & (. K ? 7 ( L MN ! (1
= 1 % % )/ EK
1 >)? 1 EK2 H O N (1 % I 7H *
! I$ . F ? % &% 1 7 4 EK2 9 9 <
C 1 1
I ? 7 E1 ? 7 % 9 1 % (D<7 EK2 9
C% %
QRRRP/ % insecure.Org? /& / 1 H S E*TU
% 4(1 2$% % ? 7 E1 9 1 9 V W (1
C%%X M 4
YR9 1 P $ K* 2/ % % QRRZP/ % <7
C / (K* I 1 E1
O [ \ 5 / J [ (. / ? 7 E1 &
C% % % $
& 7 % % / % I(. / ? EK2 ( (1 *
C 1 4Udp$ Tcp !3M T U& ( ?$
$! :D 5(1
BackDoor,Port Redirector,Port Listener, Banner
C .\<5CC$Grabber
% % E9 , $ 1 < 7 .9 ? 1 E1 9 1 ( ,
C 1 % 31 ? 7 - 1 I(<7(.
UBack-End? 1 9 < ? E1 ! G (1
:% ? 7( 1 ]/ *% /(1$ <8 ( U(1 /
C% * I% )/ % $% ^ /$
(- % % * *? 7% 1 .(. / , 1 E1
(* 7 (.? U (1 ' %&P $ ( /
C .% F 1 .W% PM
U_ \ 5 /? 1 $ Hobbit . ]/
C D Y``aP/ % $ % 1
&$ $ % 4? 1 EK2 9 K 3 / #. b ,(1 P$?
C % *(c 5 &1 (1 $ U7
(1 :1 ? *d$ A U (1 7 4(1 *
. % 9

UDP $ TCP?$ 1 PM P IE $ PM ? I 1
DNS(,/ e V $ P/ \ . / 1
! 7& % )/
( e %' 7& % )/
. , 1 <7 . ! G (1 ! f -1I
K%M % 5
K]4? 7 4 - 1I
( gN % ]4H ! G (1 .P/ ,
(1 7% _ $ /? 1 7( 1 /(1 &
?%$ $ H K

NetCat
1 / K. / /' 1 -
G .\ ^ .
% 4 /h i iMakeFile \ K(1 7:
C . % G Make <systype> /%$ % % L ND
C% D 7j ? \ K$
( E* % / ( E* /h < I% *
C .O N Generic

1 < +M (1 ?& &$ $ %


C 1 Nc.exe ?
\1 I \ K& % )/ 1 ,
$

.% -% &e %'&
Http://atstake.com/research/tools/network_utilities
nc
nc ? 7 , % $' /% (1 ? 1

nc -help

O $
[v1.10 NT]
connect to somewhere: nc [-options] hostname port[s]
[ports] ...
listen for inbound: nc -l -p port [options] [hostname]
[port]
options:
-d detach from console, stealth mode

-e prog inbound program to exec [dangerous!!]


-g gateway source-routing hop point[s], up to 8
-G num source-routing pointer: 4, 8, 12, ...
-h this cruft
-i secs delay interval for lines sent, ports scanned
-l listen mode, for inbound connects
-L listen harder, re-listen on socket close
-n numeric-only IP addresses, no DNS
-o file hex dump of traffic
-p port local port number
-r randomize local and remote ports
-s addr local source address
-t answer TELNET negotiation
-u UDP mode
-v verbose [use twice to be more verbose]
-w secs timeout for connects and final net reads
-z zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]

C . 7D 9 % / K 1&(1NC? 7 ,

kl k
?c 8 & %$ . (1 ? ( *;7 *
C% 1 7 4% / ?%$ $ T U & ' K % % '$
7% \ D ? 7 (1 '?% $ /H K % & V1
C 7% IS&% % $ (
/% 9 % (: ) N S$ 9 ? 7 E &
C 1 Ps DJ&
C% .>e %' / ! G $% 7(1 1E

% (K* .(1 Nc –n *
C P I?% 5! G (1 ?'? 7e %'
C% :< ! G DNS Loockup ( *;79 1 1
% (K* .(1 Nc -v * $
/ _ 5 1$ 8 Loockup( *$% 7\ . U(1
72 T1 25! G %$ 7 2F 1E ? 1 e %' $
C% D % % f < ? 42m DNS %
M8 ! 1nOutBoundpo 4(1 PM ? I1 ? 1
o % </ ?% 5! G (1 E M8 ! C% .>
C%
. L ND ! q E ! 5#U E -v ; / - . U(1
? PM % % 5#U 1 .% D r51 ; /9
C . K %
% D r51n-v -vp 7 /(D ! G (1 ; /9 & % )/
71 1 .(1 ? D1 ! 5#U (.

Nc -w
H ? I1 ? 1 2&3 & ; /9 & % )/ 1
C 7% f7. PM
1 -v; / 1 <7 nc –w 3\ (1 ; /9 & % )/
C 7 2F - <7 -
<5$ / P <V

-u
I1 udp PM Tcp (1 PM ? (1 ; /9 & % )/ 1
1 < PM \ $ udp ( U4(1 ( ,% 74
\ .& ? 1 ]/ (.Udp Socket Connected2E &
C . % )/ udpB ? I1 W (1 % D D 7
?EJ% / ?%$ $ & 4 & #<5udp PM 2:7
(Open Portp&1 ! udp ! $% < P/&
C s K
t U % ' <K .9 & % )/ 1 AI "V1 %
=u( / % % _ $ /P % ? 7% _ $ / :%

Nc –o logfile
1&(1 (,
% ?7%%& , % $' / 1 ? 1
C % )/ ; /9 & nHexp_ 7
( D ( &$ ( </(1 + (1 w $ v 1 \ K? 7 /
C% D ? 0*
% D 5 /$ \<5? .r51 (,
% ! 5#U 4>
( E* 9 & 1 -4 5 /(.?% %9 1 1
% D \<5? .r51 % )/
%! ' * p 7! (<7(1 (1
C% (<<c n 1 7% _ $ / ,

-p
(1 ! %%? 1$% s Kf U(1 !
% )/ -p; /&
C% D ()
*E . /9 V \<5 # G \<59 (1
nRootp / /% 9 D1 1 1 .
5(1 YRQx & ? D % )/ 7
C .O N !
\ 5 /]/ ! (.% D r51 ; /9 & % )/
y /& ( : p%% *9 V % D % )/ ? 7! 9 1 &$
n% % )/ –r

PM H W (Listeningp % % S * Vc$ %
C 7 2F 7 % % P% _^/$
(1 . I $ Nc –l –p 1234 <filename & % )/ 1 9 1 1
C% D % / Kf 1 1E \ K% \G$ YQZx!
% D % )/ - [ ?7 1 <5 % % S * Vc$
9 V -[ ! $ M8 1E % % S * Vc$ % *
P I !3M L ND ! $ 1E & .
C% . 7 4% !3M (8 1$

-v
! $ e %'
z PM ? 1 c 8 7 K % 1 . % )/
C% . 7 4 g c 8
(1 $ % K % ]/ PM H I $ P <V , %
C (< 4 . /

-L
% )/ ; /9 & % V PM 9 J % . I1 ? 1
C 1 I1 PM 9 J(W[,H % (.% D r51 $
H U(1 % . (< 4 7PM & . I $
PM K % W $ -I? 7 & % )/ 1
% ?
\ ^ .–DGAPING_SECURITY_HOLE 1 *
& V1 1 (. L ND ? ( 1 -Ey / 1
Vc$ % ( E*9 % . .% TK PM H K %
C 1 inted <7 % % S *
C% ( 1 H ]8 KT U9 1 (.!$ )9 1
u==CCC &% 1 < I9 +j 19 1 1
(.? .& < * $ PVK?% 5 , % .(V I9
{ 1 !0, '& _ = 79| <
( *;7P/ $ 1 W % ? ( 1? (. . I %
C% 1 7 4 ?
\ KH & % 1? ( 1? MI . _
C . % )/ ^ / ? (/%
1 \ ^ .-DTLENET 1 *
C . 7K -? 7( E*(1 */ -T; /
$ % \G$ -? 7% _ $ /(1 (-/$ 9 1
71 2F Login(1 / (, $ ! .0
< PVKs Kf U(1 % % m ( '\, % (1
9 1 . 1 2&3 * 1 .! 5#U (1 ( 1p 1
n .PVK ( E*
% .9 D1 1 (D<7% K % ( & (.? 7 % %
C% D % % \ [ % / $ 4(1 1 -.} ? 7( 1
,
$% P/ ( (1 ! G 9 (1 E % / ?%$ $
U(1 P/ 5 /(. 9 V &( K -i; /
C 7 f7. \1 I

1 o 4? % bD.? 1 ,$ S$ ! f
% : ! G 9 (1 % 4? 7
& V1 (.?EJ 7$ M8 $ 1E e %'_^ /z; / 1
(1 (.% V! < 2 5(1 1
f 1 * C% o % E m-n2 K(1 ! & ? %$ [ \
\G$ + (1 '2< (1 1 L ND ! H
C 7% ? 7 % % '(<7(1 $ %
2$% P/ bI r51 M8 ! H & f 1 .>
C% D % G ? 4
-z; /& 1 % % P/ $ 1 ! f 2F ? 1
&P % % )/
Nc –v –w2 –z target 130-140
? 7! % % V/140 130 _ $ / J .f t7
C 1 %$ [ 9 %netbios epmap ? 7 7%
%%O $ 9 / YxR YZR& ? 7! 31 \ %
& 1 (1 B 1 + (1 (.YZ~$ YZ`? 7! (.
C / &1 1 • ?$
% .H <. 7>)$ 7 .& ? 1 % ! f &
-
1 I9 7 79 1 1 [ ? 7\,%9 < &
C 1


J13 4 '< (1 7 K $ 7; /& " 1 ([)
G9
C < ? 1 IJ9 ? 7 .& " 1 P
Telnet? (1 & % )/

b-N ? 7Daemon 1 / % I(.? E1 5(1


' O (1 - < I E1 ? 1 O 4 D z .(<,
PM ? 1Nc Host 25\ (1 & % )/ P 5(1
1 ((Smtpp 2e \ 7% _ $ /H (<, $
1 E g (-1 %/

Mail Bomber(FakeMail)H
? (1 -& (.( * <7
C % . <7 7 & % . % )/
? IJ9 1 < D1 '? 1 H J .P H 9 (,
7 2F - 1 < (.? 7 .$ 1 .(<7
C% % 2F H J .( 1 9 1
Port Scaning ! f
( 19 ! .f ? 7 E & :%
C 1
9 <. % t 7? 7! H <. < (1 E 9
C% % L ND ( 1$ &1 ? 7! $ % .f &
2 H O N (1 % I 7H * • ) *(,8 \$ %
•% 1 7 4 EK2 9 9 < 1 >)? 1 EK
? 7 EK2 9 < .>)? (1 7 4(1 < *
Ip Scaner , Port Scaner ,file Transfer , Script uploader
H & % )/ (1 % I < , $ % 7 42&3 & …
€=== 7 9 $9 1_ 7 EK2
( & /% K. 7! % .9 / ? 1
Nc –v –w2 Target FirstPort-EndPort
n=% D 9 / t 7QQQ Y ! & &P %p &P
Nc –v –w2 192.168.159.126 1-222
t 7&1 ? 7! YZ~$ YZ`? 7! (. 31 \ %
C9 7

7% _ $ /? 7Banner? $'A<

(J 7! "V1 D 1 7 4(1 < (. ! I $ "V1


u= / .P % ? 7% _ $ /
/ 7 1 ? $'A< ! G M4& :%
& /% K]4 % .9 ? 1
Nc –v –n Target Port Number
D < (1 P ? 1 }R$ QY ? 7! &? 7P %
= 7
H J QY ! P$ P %
Nc –v –n 192.168.1.90 21

(1 ! & 7% _ $ /$ QY ! & 5#U 31 \

}R! 2$% P
Nc –v –n 192.168.1.90 21
C% / 1 E }R! 31 \ %
7 < ) * ! Q 9 P ? 1 ]8K
C .H J

!"#$%&' "
% )/ O$ % / 7% _ $ /H 5(1 &
C% <
C 7% I% 4Html\ KP$ % Http / ]8
K K.
/ % &\ K <7 -K9 1 1

Http/1.0 200 OK
Centent-type: text/plain
Content-length: 724
<HTML>
<BODY>
.
.
.
.
</BODY>
</HTML>

C 4>Index.htm2 1 \ K9 $
C & K1 (% %
Nc –l –p 80 < index.htm
,M 7? 1$ 7 S *}R! (1 /% 9 TU
C% D % / K_. \ K
7 ^ / .9 1 < % 1 P H ]8 K9
C /) 1

* Flooding
()

? 7% 1 .? 1 t M 1 ? 7%% &( % . ? 1
C% D % )/ * *
P$ K
z; /zO ( b-N ? E % .H J(-
C 1 ) 1 CCC$ \ 5t j
% . % )/ &% .9 ? 1
% D 1$ 't M 1 ? 7 % % & ?% &H K r51 .9
& , . % (.% D r51-v ; /& % )/
C . 4> % P/ ? 7 % %
ß‚a¢k Hât Ha¢ker’s

n / #.p 7H -
1?7 & ( P $ƒ9 %
= ' (1 4? 7 1 D1 :1 1 )
*

Emperor Team

7 / #.(G 5 % O 4? 7 & U ^
9 * E1 & /QR~R?31 % .H 7 1 9 1
= _ )% ? 7
? 72 (1 1 "5„ ? % (. 9
IM4N,Y4Ho0,BuG,Cl4w,EimaN,@RASH&Turbo
C Im4n 1 9 (.
? 7( 1 (1 9 … E1 ? 7 .&
=% . Ybad 1,YBad 1.5,WinNC
/ _ )% 9 ]/ (.t$ V ? 7 /&
?7 /
H & $ *z TU (- .S $ S& ' z2E &( 4 .
9 $EI% &' :D %zb :D %zP K - / ).z '
CCC $ % ^<.z% ! &$z YY}z </$
7D % H 7? 7 /\. &H ,(1 (V 1
.
http://www.zone-h.org/en/defacements/special/filter/filter_defacer=eMP3R0r+TEAM/

Im4n Emperor
?7 "5 1 7 9 ? 7 )% & (. 9 9 %'
+ 1 7& 79 $% : @<7 * E1
Im4n-Y4ho0
1 7 U ^ (1 t$ V . $ *9 ? "5 & :%
C 1 U ^ _ )% ? "5 & :% (.

Lord Cracker-IranMatrix-Mohmad Shabgard-Danil-Im4n


Author: Satanic Soulful
E-Mail: Satanic.Soulful@GMail.Com
Satanic_Soulful@Yahoo.Com
Developed In:Satanic Digital Network Security ™
Special TNX 2 :Hell Hacker – Collector – S_hahroo_Z - Kami
Research By:5/-\t4N1C
©®Copyright For : Satanic Team 2005-2006
For More Information Go to Http://Hack-er.cjb.net/

©®All Right Reserved For Shabgard Security †


Mr.XShabgardX
2005-2006 For More Information
Visit:Http://Shabgard.Org/

My Deram Is All Day For Girl Is Dark&Ominous,

Potrebbero piacerti anche