Quote:
Originally posted by XtremeX-CO+Jun 19 2006, 04:33--></span><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td>QUOTE (XtremeX-CO @ Jun 19 2006, 04:33)</td></tr><tr><td id='QUOTE'> <!--QuoteBegin--iliveoncaffiene@Jun 18 2006, 20:43
Get brutus AE2 (brute forcer) it has a built in proxy. Find out if the server runs SQL databases, brute force for a pass and username to the SQL port, login with PostgreSQL, voilah... there's a database
Now without SQL, all files are stored on the server, therefore requiring a backdoor implanted server-side to let you in through the port.
Another way -> There are main packets sent at login that send the username and password. Find out a way to simply log packets from a remote computer to the server, decrypt the password in the packet (it's even encrypted clientside), and then you have a username and pass.
|
im pretty sure they use chinese windows, and they dont use any sql... i think they store their data in .ini files lol... my opinion is based on their game coding [/b][/quote]
.ini files for local system use. The only other location for any .ini files would be on the web server for directory paths and so on.
You would have to know a few things before attempting to target a server directly.
1. The type of database (FrontBase, MySQL, OpenBase, Oracle, PostgreSQL, SQL Server, Sybase etc... the list goes on.)
2. Is this database located on a dedicated server or is it shared with other types of servers?
Dedicated: This means the the server that runs the DB does not run any other server type functions. This limits the available ports but expands the possible exploits to try depending on the type of DB used
Shared: This means the DB server is also running other server functions, possiby web server or login etc... This means on this system there are more open ports and more vulnerable however this does give you numerous possabilities and the issue is how much time do you want to waste?
3. What type of Server are they running?
Wich one do they use where? (Unix,NT4, Win2k, 2003)
This brings again the issue of what type of process are you to take to try and gain access to the server. Also with every server there's patches. What patch is the server running? Whats exploits exist for that patch?
Yes its possible, highly illegal but doubtfull that any average to intermediate user can do it. You need time patience and brains. Not hard to log such activities on a server and activate another level of security.
I sadly had the pain of working for
[Only registered and activated users can see links. Click Here To Register...] building such machines and cloaking them from users.