Beruflich Dokumente
Kultur Dokumente
Have you ever thought to yourself, now how the hell did that
computer get hacked? Was that really possible? This just
doesnt make sense, that computer only had a single
unvulnerable service, it cant have been hacked...
This case was just to give you an idea of how bad trust can be,
but it probably still doesnt explain how to hack the
unhackable. Let us take a real target and see how it may be
flawed. Cyberarmy is an excellent example, but how would you
gain access? Well here is how the system was once setup to
the public:
www.cyberarmy.com
The first thing is to pick a target host, then play with it and see
if we can somehow exploit it. The newest host in the list is
actually ca-osi.org, the open source insutute of cyberarmy.
The guy who runs it (barnseyboy) aint too bad a bloke. After a
bit of research into the site, we find the following people
appear to have priveledged rights to the server:
barnseyboy barnseyboy@mail.com
Xenic xenicp@yahoo.es
aton aton1337@hotmail.com
shn webmaster@shnonline.com
pertinax pertinax@completeecom.com
fightgravity anon.ymous25@excite.com
sefo sefo@ca-osi.com
w0lf w0lf@ca-osi.com
sliptop sliptop@ca-osi.com
avataru avataru@ca-osi.com
So now we have a couple more sources for the tree. You can
easily do a search on google for sites that these individuals
visit, and from there gain even more sources. The target for
example may be www.shnonline.com, the owner being
ofcourse 'shn'.