tailieunhanh - Hacking in telnet ftp

[I Want to Start at the Start] [I Want to Go Straight to Hacking] INTRODUCTION: A little background is needed before we get into hacking techniques. When we talk about ‘Hacking’ | I Want to Start at the Start I Want to Go Straight to Hacking INTRODUCTION A little background is needed before we get into hacking techniques. When we talk about Hacking we are talking about getting some access on a server we shouldn t have. Servers are set up so that many people can use them. These people each have different accounts on the server - like different directories that belong just to them. If Fred has an account with the ISP Internet Service Provider he will be given 1 a login name which is like the name of your directory and 2 a password which lets you get access to that directory. This login name and password will usually give you access to all of Fred s services - his mail news services and web pages. There is also the root account which has it s own login and password. This gives super-user access to the entire server. We will focus on getting root in this help file. Ok I want to move to the anatomy of the hack I know all this let me move straight to hacking I don t have a clue what you re on about let me read some backgroundon this so called Internet you keep referring to http tute THE ANATOMY OF THE HACK There are two main ways to break into a system. Think of a server as a Swiss Bank Vault. There are two main ways to get in. You can try to get in by finding the combination of the vault. This is like finding the password. It s how you are meant to get in. The second way is by using dynamite. You forget all about the proper way to get in. This is like using exploits or weaknesses in the servers operating system to gain access. Ok Let s Go. Tell Me About Not Getting Caught Stuff it I know how to not get caught on to the techniques DON T GET CAUGHT Hacking is illegal and it is very easy to trace you if realizes you hacked them. Wherever you go your IP number your computer s unique identification is left and often logged. Solutions 1. When you set up your account with an ISP give a false .