; cablehijack
Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out
Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

cablehijack

VIEWS: 0 PAGES: 2

Author: van Hauser / THC I.INTRODUCTION II.MENTAL III.BASICS IV.ADVANCED V.UNDER SUSPECT VI.CAUGHT VII.PROGRAMS VIII.LAST WORDS I. INTRODUCTION Please excuse my poor english - I'm german so it's not my mother language I'm writing in. Anyway if your english is far better than mine, then don't think this text hasn't got anything to offer you. In contrast. Ignore the spelling errors & syntax - the contents of this document is important ... NOTE : This text is splitted into TWO parts. The first one, this, teaches about the background and theory. The second just shows the basics by an easy step-by-step procedure what to type and what to avoid. If you are too lazy to read this whole stuff here (sucker!) then read that one. It's main targets are novice unix hackers. If you think, getting the newest exploits fast is the most important thing you must think about and keep your eyes on - you are wrong. How does the best exploit helps you once the police has seized your computer, all your accounts closed and everything monitored? Not to mention the warrants etc. No, the most important thing is not to get caught. It is the FIRST thing every hacker should learn, because on many occasions, especially if you make your first hacks at a site which is security conscious because of many break-ins, your first hack can be your last one (even if all that lays back a year ago "they" may come up with that!), or you are too lazy to change your habits later in your career. So read through these sections carefully! Even a very skilled hacker can learn a bit or byte here. So this is what you find here: Section I - you are reading me, the introduction Section II - the mental things and how to become paranoid 1. Motivation 2. Why you must become paranoid 3. How to become paranoid 4. Stay paranoid Section III - the basics you should know BEFORE begin hacking 1. Preface 2. Secure Yourself

More Info
  • pg 1
									                   Cable Modem IP Hijacking in Win95/98


The purpose of this is to show you how bad cable modems security is and
that
even with a win box you can take someone else's IP. You can hijack IP's
using
a cable modem and it's very simple in any operating system. Just follow
the
steps:

1) Choose someone's IP that you wish to have. Make sure the IP is on the
same
   network. Most cable modem providers use DHCP. The fist thing you have
to
   do is find the victims IP. Remember the victims IP has to be in the
same
   network and with the same service provider for this to work.

2) Now this is probably the hardest thing in this file (but it's still
easy),
   you have to wait until the victims computer is off or you can Smurf
kill
   his connection. When you think his computer is off-line just try to
ping
   it to see if you get a response. Do this by going to a DOS prompt and
   typing "ping <victims IP>". If you get a response then you have to try
   harder.

   After you get his PC off-line then you go into your network properties
and
   edit the IP settings, but instead of having yours there you put the
victims
   IP, host, and domain.

3) Restart. If you restart and you get an IP conflict this means that the
   victims computer is on, if you don't get an IP conflict then try to go
to
   your web browser and see if it works. With some cable modem providers
you
   might have to also add the Gateway, Subnet mask (255.255.55.0), Host,
DNS
   search, and Domain.

Now you can go. Everything will work until the victims PC is back on.
Once it is
back online it will take the IP away because it will tell you that you
have the
wrong Mac addresses.


*Linux*
This is also possible in Linux, but is not the best way. You can change
your Mac
address to the victims PC and this is more secure and much easier. There
are a
couple of scripts to change your address, just look around.


Warning: Some cable modem service providers will know when you're using
the wrong
IP, but hey, it might be useful.


                             Copyright (c) 1999 Wildman

                                 www.hackcanada.com

								
To top
;