1. Owners that were active to E*pvpers would get tighter security for there server.
2. n00bs would be n00bs with the information...
I came to the conclusion last night that it was time i relised this. If people would want to lern how to hack AND WERE SERIOUS ABOUT IT!! the bits and piceaces i am going to post here would'nt be enough. So here it is Banes latest guide. Preventing hackers.
Ok, remeber when we all lived in the age were we thought hacking was just like in The Matrix?? a black program that only pros had and serious hackers could obtain. Well now we are somewhat more enlightend but some of us still don't know what they use...
Programs like: SQLping, Cain and Able, and Brute forcing devices are what they truley use. Now before you go Google crazy and relize these are all OPEN SOURCE programs (free ware) also know prevention of them are Open source aswell.
Ok first lets lean to know our enemy. Ok i am going to take a Paragraph that best discribes hackers from The Hacker Pragidem by Rich Christen
"hacker population is predominantly made up of adolescent males. This is often the image portrayed throughout the media. However, there seems to be more and more of an increase in self described female hackers as well. Since hacking is a relatively new element of society, many of the young adolescent hackers from years ago are now older and still claim to be hackers in some sense, whether it be a System Administrator with a hacker background, a Computer Security Expert, or even a programmer. Perhaps if the stereotype of hackers were to be less restrictive, such as not being all adolescent males, the hacker community would then gain many more new "hackers" and new perspectives and thus giving the media another focus." (full essay here
)Now let us start with the most common Hacker target Passwords: Now i also want to note that the is acctualy more dricted to you're website password. BUT don't think that you are secure even if you have a long password....you might not be. Also rember you're site is the MOST vital part of you're server. only because it provides the information of upcoming news.
Now here is what you DON'T want to do with you're password Easy to guess.
Seldom changed. Reused for many security points. (IE you use the password for alot of diffrent sites.
Also do not use programs that keep you're password in a memory file. or weaks file encriptions.
Dictionary attacks
Now before you imagine a hacker sitting there with a dictionary putting every singel word in the space...that's not what this is. A dictinaory attack is used by a program that breaks a few line's of the website and trys hundreds (to hundreds of thosands) of common passwords and dictionary passwords. Also some of these dictonary can contain multiple launguge passwords and leet speak passwords.. IE p@$$w0rd.
to stop this simpley make sure you'r password is long NUMERICL valude password IE 29976432Gl123 (feel free to write this down and lock it in a closet or something till you memirize it.)
Brute force attacks.
brute force attacks are programs that take well..infenitly generate passwords and atempt a login with it. probleme is they take days to work so the smart solution to not getting a brute force hacked is changing every month (use 3 passwords and alter)
Keystorke logger
This is by far the easyest way to "crack" a password. All hackers have to do is send you a file with a logger on it and it records you're history and keystrokes. simple solution hear though. ALWAYS SCAN FILES!
Next portion: Network hacking.
Before you even think you are secure rember you're network must be secure too. this means: you're host, VPN, firewall, and ETC.
Scanning
The fatal first step hackers will take is scanning. If you're network was weak and the scan was right then the hacker now know all they need to to bring you're server down. After a common scan they will know: provider, ports, System, and in some cases back doors to ******* you'r server.
According "How to hack for dummies" these are the most common scaned and hacked ports
7 Echo TCP, UDP
19 Chargen TCP, UDP
20 FTP data (File Transfer Protocol) TCP
21 FTP control TCP
22 SSH TCP
23 Telnet TCP
25 SMTP (Simple Mail Transfer Protocol) TCP
37 Daytime TCP, UDP
53 DNS (Domain Name System) UDP
69 TFTP (Trivial File Transfer Protocol) UDP
79 Finger TCP, UDP
80 HTTP (Hypertext Transfer Protocol) TCP
110 POP3 (Post Office Protocol version 3) TCP
111 SUN RPC (remote procedure calls) TCP, UDP
135 RPC/DCE (end point mapper) for Microsoft
networks
TCP, UDP
137, 138, 139, 445 NetBIOS over TCP/IP TCP, UDP
161 SNMP (Simple Network Management
Protocol)
TCP, UDP
443 HTTPS (HTTP over SSL) TCP
512, 513, 514 Berkeley r-services and r-commands (such
as rsh, rexec, and rlogin)
TCP
1433 Microsoft SQL Server (ms-sql-s) TCP, UDP
1434 Microsoft SQL Monitor (ms-sql-m) TCP, UDP
1723 Microsoft PPTP VPN TCP
3389 Windows Terminal Server TCP
5631, 5632 pcAnywhere TCP
8080 HTTP proxy TCP
So to prevent simpaly secure these ports.
DDOS
No matter who you are you will always be a possible target for Denial of Service attacks.
Now if we were running a real game or a inportent website we COULD have the risk of getting a 50K zombie comp attack. Fortunately all we relay have to worry about is 10-100 attacks (the largest attack being on evo and it was assumed it was a paied attack)
Ok, one attack choice hackers have is the SYN attack. In a SYN Flood, the attack works by overwhelming the protocol handshake that has to happen between two Internet-aware applications. How can we stop this. We don't need a high power application just a firewall that scans trafic and blocks bad internal IPs.
Next up is some good applecations that stop a DDOS 1 good application is
(notice some are not very cost effecient but are 2 as stronge)Last is staying up to date with DDOS breakthroughs and the tools they use. I highly recomend checking this website once a day
as it updates periodically with new DDOS and the tools they use.APR poisoning
Now there is soo much on Network hacking i just can't cover it. But i will cover the most dealdy APR posion. ARP poisoning can be hazardous to your network’s hardware and health,
causing downtime and more. So be careful! To prevent.
Never go to a driect IP hosted domain.
Never go to site that look odd or strange.
Never open a Tiny URL link from someone you do not know.
Next is what is most inportent to us pserver devs. The Database hacks.
Run your databases on different machines.
Check the underlying operating systems for security vulnerabilities.
Ensure that your databases fall within the scope of patching and system
hardening.
Require strong passwords on every database system.
Use appropriate file and share permissions to keep prying eyes away.
De-indentify any sensitive production data before it’s used in development
or QA.
Check your Web applications for SQL injection and related input validation
vulnerabilities.
Use a network firewall, such as those available from Juniper Networks —
formerly NetScreen
Those are only some common ways to keep it from getting hacked.
I tried to keep this guide at straight and to the point as i could.
Also i will update this periodicly adding sections. So don't worry.
If you have a story or anymore Anti-Hacking ways. please post here. I would also like to see feedback...
How do i know if someone can MMSQL/MYSQL inject me or my website??????? :'(
Very simple acctualy, let me first give a example of MYSQL injecting a server.
First you would want to navigate over to
A) char res script
B) regestration script.
Then in the username and password type 1=1-- or hi'
if you were able to register, then there is a possibility, another good test is if you can make a account with over 14 characters or with no password....
If you use a MYSQL Database then testing you're website is simple too just find a UR that looks like hackerszbeware.com/index.asp?id=10 then simpley add a ' or 1=1-- after the ? or at the end of the URL, if you come back with MYSQL error, then you need to bost some security.
Also be aware that pages with ASP, JSP, CGI, or PHP web pages are SQL injectible.....
-Bane






