亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? exploiting cisco systems.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
----------------------------------

Exploiting Cisco Systems
(Even From Windows!   ;-) )

Written by Cyvamp
(with a few notes added by Raven)
July 2000

http://blacksun.box.sk

----------------------------------

Warning:
DO NOT use this to damage cisco systems, or gain unauthorized access to systems. This tutorial is just something to
use for educational purposes. Only use this information in a legal way (the hacker wargames for instance), and do
not damage or destroy anything. This is a step-by-step guide on how a series of proven cisco exploits can be used to
gain access. If you get caught breaking into a cisco router, or screw the system up, you can interrupt hundreds of
internet clients, and cost thousands of dollars, so only use this when you are allowed!! Using this the wrong way
will get you into a lot of trouble.

Note: some of this tutorial was written on a Unix system, and the text was not converted to be DOS /
Windows-compatible, so you'll have to view this text from either your Internet browser, or from an advanced editor
such as Microsoft Word.

----------------------------------
Table of Contents:
----------------------------------
Before you start:

- What is an IP address?

- What is an ISP?

- What is a TCP/IP packet?

- How to spoof your IP

- How to use Telnet

- How to use HyperTerminal

- How to use Ping

- How to use TraceRoute

- How to use a proxy server

-------------------------------------

- Section 1: why hack a cisco router?

- Section 2: how to find a cisco router

- Section 3: how to break into a cisco

- Section 4: how to break the password

- Section 5: how to use a cisco router

-----------------------------------

Stuff you'll need to know BEFORE you start:

-----------------------------------

What is an IP address?

IP stands for Internet Protocol, IP addresses are used by other computers to identify computers that connect to
them. This is how you can be banned from IRC, and how they can find your ISP. IP addresses are easily obtained, they
can be retrieved through the following methods:

-you go to a website, your IP is logged

-on IRC, anyone can get your IP

-on ICQ, people can get your IP, even if you have the option set "do not show ip"
 they can still get it

-if you are connected to someone, they can type "systat", and see who is connected  to them

-if someone sends you an email with IP-logging java, they can also get your IP  address

There are many more ways of obtaining IP addresses, including using back-door programs such as Sub7 or NetBus.

------------------------------------

What is an ISP?

ISP stands for Internet Service Provider, they are the ones that give you the internet. You connect to one everytime
you dial-up and make a connection. People can find your ISP simply by running a traceroute on you (traceroute is
later explained). It will look something like this:

tracert 222.222.22.22

Tracing route to [221.223.24.54]
over a maximum of 30 hops.
1       147ms   122ms   132ms your.isp [222.222.22.21]
2       122ms   143ms   123ms isp.firewall [222.222.22.20]
3       156ms   142MS   122ms aol.com [207.22.44.33]
4       *       *       *       Request timed out
5       101ms   102ms   133ms cisco.router [194.33.44.33]
6       233ms   143ms   102ms something.ip [111.11.11.11]
7       222ms   123ms   213ms netcom.com [122.11.21.21]
8       152ms   211ms   212ms blahblah.tts.net [121.21.21.33]
9       122ms   223ms   243ms altavista.34.com [121.22.32.43] <<< target's isp
10      101ms   122ms   132ms 221.223.24.54.altavista.34.com [221.223.24.54] 
Trace complete.

-----------------------------------

What is a TCP/IP packet?

TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is
compressed, then a header is put on it and it is sent to another computer. This is how ALL internet transfers occur,
by sending packets. The header in a packet contains the IP address of the one who originally sent the packet. You
can re-write a packet and make it seem like it came from anyone!! You can use this to gain access to lots of systems
and you will not get caught. You will need to be running Linux or have a program which will let you do this. This
tutorial does not tell you to use this on a Cisco router, but it does come in handy when hacking any system. If
something goes wrong when you try to hack a system, you can always try this...

------------------------------------

How to spoof your IP:

Find a program like Genius 2 or DC IS, which will let you run IdentD. This will let you change part of your
computer's identity at will! Use this when you get banned from some IRC chat room.... you can get right back in! You
can also use it when you are accessing another system, so it logs the wrong id...

------------------------------------

How to use telnet:

You can open telnet simply by going to your Start Menu, then to Run, and typing in "telnet". 

Once you have opened telnet, you may want to change some features. Click on Terminal>Preferences. Here you can
change the buffer size, font, and other things. You can also turn on/off "local echo", if you turn local echo on,
your computer will show you everything you type, and the other computer you are connected to will show you aswell.
So you may get something like this;

You type "hello", and you get
hhelelollo

This is because the information has bounced back and got scrambled with what you typed. The only reason I would use
this is if the machine does NOT return what you are typing.

By default, telnet will connect to a system on the telnet port, which is port 23. Now you will not always want to
connect to port 23, so when you go to connect, you can change the port to maybe 25, which is the port for mail
servers. Or maybe port 21, for FTP. There are thousands of ports, so make sure you pick the right one!

----------------------------------

How to use HyperTerminal:

HyperTerminal allows you to open a "server" on any port of your computer to listen for incoming information from
specified computers. To use this, go to 
Start>Programs>Accessories>Communications>HyperTerminal. First you will need to select the connection, pick "TCP/IP
Winsock", and then put in the computer to communicate with, and the port #. You can tell it to listen for input by
going to Call>Wait for Call. Now the other computer can connect to you on that port, and you can chat and transfer
files.

----------------------------------

How to use Ping:

Ping is easy, just open the MS-DOS prompt, and type "ping ip.address", by default it will ping 3 times, but you can
type 

"ping ip.address -t"

Which will make it ping forever. To change the ping size do this:

"ping -l (size) ip.address"

What ping does is send a packet of data to a computer, then sees how long it takes to be returned, which determines
the computer's connection speed, and the time that it takes for a packet to go back and forth (this is called the
"trip time"). Ping can also be used to slow down or even crash a system if the system is overloaded by ping floods.
Windows 98 crashes after one minute of pingflooding (it's connections buffer is overflown - too many connections are
registered, and so Windows decides to take a little vacation).
A ping flood attack takes a lot of bandwidth from you, and you must have more bandwidth than your target (unless
the target is a Windows 98 box and you have an average modem, that way you'll knock it down after approximately a
single minute of ping flooding). Ping flooding isn't effective against stronger targets, unless you have quite a few
evil lines to yourself, and you have control over a few bandwidth-saavy hosts that can ping flood your target as
well.
Note: DOS's -t option doesn't do a ping flood, it just pings the target continously, with intervals from one ping to
another. In every Unix or Linux distribution, you can use ping -f to do a real pingflood. Actually ping -f is
required if you want your distribution to be POSIX-compliant (POSIX - Portable Operating System Interface based on
uniX), otherwise it's not a real Unix/Linux distribution, so if you have an OS that calls itself either Unix or
Linux, it has the -f switch.

----------------------------------

How to use TraceRoute:

To trace your connection (and see all the computer's between you and a target), just open the MS-DOS prompt, and
type "tracert ip.address" and you will see a list of computers, which are between you and the target computer. 

You can use this to determine if there are firewalls blocking anything. And will also allow you to determine
someone's ISP (internet service provider). 

To determine the ISP, simple look at the IP address before the last one, this should be one of the ISP's routers.

Basically, this is how traceroute works - a TCP/IP packet has a value in it's header (it's in the IP header. If you
don't know what this means, then ignore it and continue reading, it's not that crucial) called TTL, which stands
for Time To Live. Whenever a packet hops (travels through a router) it's TTL value is decreased by one. This is just
a countermeasure against the possibility that something would go wrong and a packet would ricochet all around the
net, thus wasting bandwidth.
So when a packet's TTL reaches zero, it dies and an ICMP error is sent back to the sender.
Now, traceroute first sends a packet with a TTL value of 1. The packet quickly returns, and by looking at the
sender's address in the ICMP error's header, the traceroute knows where the packet has been in it's first hop. Then
it sends a packet with a TTL value of 2, and it returns after the second hop, revealing it's identity. This goes on
until the packet reaches it's destination.

Now isn't that fun?    :-)

----------------------------------

How to use a proxy server: 

Do a search on the web for a proxy server which runs on the port of your choice. Once you find one, connect to it
with either telnet or hyperterminal and then connect to another computer through the proxy server. This way the
computer at the other end will not know your IP address.

----------------------------------

Section 1: why hack a cisco router?

You probably are wondering.. why hack into a cisco router? 

The reason being is that they are useful when it comes to breaking into other systems...

Cisco routers are very fast, some with 18 T1 connections on one system, and they are very flexible and can be used
in DoS attacks or to hack other systems since most of them run telnet. 

They also have thousands of packets going through them at any one time, which can be captured and decoded... A lot
of cisco routers are also trusted systems, and will let you have a certain amount of access to other computers on
it's network.

----------------------------------

Section 2: finding a cisco router

Finding a cisco router is a fairly easy task, almost every ISP will route through at least one cisco router. The
easiest way to find a cisco router is to run a traceroute from dos (type "tracert" and then the IP address of
anyone's computer), you can trace pretty much anyone because the trace will show all of the computer systems between
your computer and their computer. One of these systems will probably have the name "cisco" in it's name. If you find

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩精品一区视频| 久久久久久久综合| 色呦呦国产精品| 成人久久久精品乱码一区二区三区| 水野朝阳av一区二区三区| 亚洲一区在线观看视频| 亚洲欧美一区二区三区国产精品| 国产精品久久久久久久裸模| 国产精品国产三级国产有无不卡| 国产精品美女久久久久aⅴ国产馆| 久久精品一区八戒影视| 国产日韩欧美综合一区| 国产欧美日韩在线视频| 国产精品视频一区二区三区不卡| 亚洲国产精品黑人久久久| 欧美韩日一区二区三区四区| 亚洲国产精品成人综合| 国产精品久久久久影院亚瑟| 亚洲欧洲一区二区三区| 一区二区三区波多野结衣在线观看| 一区二区视频在线| 亚洲成av人片在线观看| 丝袜亚洲另类欧美| 久久精品国产亚洲高清剧情介绍 | 日韩欧美aaaaaa| 日韩午夜激情免费电影| 精品久久久久香蕉网| 久久久99精品免费观看不卡| 国产精品久久久久精k8 | 青青青爽久久午夜综合久久午夜| 免费成人你懂的| 国产精品 日产精品 欧美精品| 成人av网站在线| 欧美性猛片xxxx免费看久爱| 欧美一级生活片| 国产午夜亚洲精品不卡 | 成人av电影在线| 色菇凉天天综合网| 欧美一区二区视频观看视频| 精品少妇一区二区三区日产乱码 | 亚洲日本在线a| 亚洲国产精品影院| 国产美女久久久久| 91麻豆免费在线观看| 777久久久精品| 久久精品水蜜桃av综合天堂| 一区二区三区四区亚洲| 美女视频黄久久| av亚洲产国偷v产偷v自拍| 在线不卡免费av| 日本一区二区成人在线| 爽好多水快深点欧美视频| 国产精品一区二区你懂的| 色88888久久久久久影院按摩| 日韩免费福利电影在线观看| 中文字幕一区二区三| 日韩av电影免费观看高清完整版 | 久久国产精品第一页| 99久久伊人网影院| 欧美日韩精品专区| 中文字幕一区日韩精品欧美| 免费在线看成人av| 91啪亚洲精品| 久久亚洲一区二区三区明星换脸 | 一级日本不卡的影视| 国内精品久久久久影院色| 91极品美女在线| 国产婷婷色一区二区三区四区| 亚洲成人动漫精品| 成人av在线资源网| 免费成人在线网站| 五月激情综合婷婷| 99久久精品国产精品久久| 日韩欧美美女一区二区三区| 亚洲美女视频一区| 国产成人精品一区二| 欧美一区二区三区色| 亚洲欧美色一区| 国产成人自拍高清视频在线免费播放| 欧美日韩一二三区| 亚洲欧美综合另类在线卡通| 极品美女销魂一区二区三区免费| 欧美日韩精品欧美日韩精品 | 亚洲一区二区欧美激情| 成人美女视频在线看| 精品国产凹凸成av人导航| 亚洲www啪成人一区二区麻豆| 99久久精品久久久久久清纯| 国产亚洲一本大道中文在线| 青娱乐精品视频在线| 欧美欧美欧美欧美| 亚洲一区二区欧美激情| 在线免费观看一区| 亚洲人成人一区二区在线观看| 国产福利不卡视频| 精品久久久久久无| 久久精品国产亚洲aⅴ | 亚洲成人在线免费| 色欧美片视频在线观看| 亚洲天堂免费看| 99re这里只有精品视频首页| 国产精品拍天天在线| 国产成人久久精品77777最新版本 国产成人鲁色资源国产91色综 | 一区二区三区加勒比av| 91蜜桃婷婷狠狠久久综合9色| 国产精品免费视频观看| 成人一级片在线观看| 欧美国产日韩a欧美在线观看 | 久久久久国产免费免费| 黄色资源网久久资源365| 欧美成人精品高清在线播放| 久久av资源网| 精品国精品国产| 国产馆精品极品| 中文久久乱码一区二区| 成人动漫av在线| 亚洲人成亚洲人成在线观看图片| 91原创在线视频| 亚洲综合色区另类av| 欧美日韩亚洲高清一区二区| 午夜视频在线观看一区二区| 欧美一区二区三区四区五区| 精品一区精品二区高清| 久久精品人人做人人综合| 高清不卡在线观看av| 亚洲少妇30p| 欧美日韩激情在线| 蜜臀久久久99精品久久久久久| 精品美女一区二区三区| 国产大陆亚洲精品国产| 中文字幕在线一区免费| 色999日韩国产欧美一区二区| 亚洲国产乱码最新视频| 日韩免费看的电影| 成人av电影免费观看| 亚洲国产日韩综合久久精品| 欧美一区二区三区婷婷月色| 国产激情91久久精品导航| 亚洲精品成a人| 欧美一级欧美一级在线播放| 国产精品一区二区91| 亚洲精品乱码久久久久久 | 亚洲天堂2014| 在线成人免费观看| 懂色中文一区二区在线播放| 一卡二卡欧美日韩| 精品99999| 91久久香蕉国产日韩欧美9色| 日本午夜一本久久久综合| 国产天堂亚洲国产碰碰| 欧美亚洲综合另类| 国产毛片精品视频| 亚洲免费高清视频在线| 日韩免费观看高清完整版 | 久久久久久免费毛片精品| 色综合久久久网| 黑人巨大精品欧美一区| 亚洲精品国产第一综合99久久| 精品少妇一区二区三区在线视频| 色先锋aa成人| 国产精品自在在线| 亚瑟在线精品视频| 国产精品国模大尺度视频| 日韩三级中文字幕| 色88888久久久久久影院野外| 国产精品综合一区二区三区| 天天色天天爱天天射综合| 国产精品女上位| 日韩精品一区二区三区老鸭窝 | 中文字幕亚洲区| 日韩精品专区在线影院观看 | 亚洲精品伦理在线| 久久精品亚洲乱码伦伦中文 | 国产午夜精品一区二区三区视频 | 久久只精品国产| 欧美视频在线一区| av电影天堂一区二区在线观看| 久久成人免费日本黄色| 亚洲国产你懂的| 亚洲女爱视频在线| 国产欧美一区二区精品久导航 | 在线播放日韩导航| 91色|porny| 成人精品一区二区三区中文字幕| 久久精品国产999大香线蕉| 亚洲一区在线视频| 亚洲精品成人悠悠色影视| 国产精品二区一区二区aⅴ污介绍| 精品三级在线观看| 884aa四虎影成人精品一区| 欧美自拍丝袜亚洲| 91美女片黄在线观看| av不卡一区二区三区| 国产成人鲁色资源国产91色综| 久久99精品一区二区三区| 日韩一区精品字幕| 午夜精彩视频在线观看不卡| 亚洲一级电影视频| 一区二区三区丝袜| 最新中文字幕一区二区三区|