That's what I was looking at for the first time a few weeks ago.
The first thing I did was what a real hacker would probably never do; I got on the phone and told the only hacker that I know irl, that I was in, running around in circles like a small kid who just opened the birthday present he always wanted, hyperventelating and bashing my hand against my forhead.
How could they have been so stupid?
Before I got this far...this is how I started:
I started doing a portscan with nmap (one of the things I learned at HAL2001)
Starting nmap V. 2. 07 by Fyodor (fyodor@dhp.com,
www.insecure.org/nmap/)
Interesting ports on ipd*******.speed.planet.nl
Port State Protocol Service
23 open tcp telnet
53 open tcp domain
80 open tcp http
This is what nmap gave me. Well the fact that they had port 80 open could mean that they have a webserver running, but I checked and they don't. So I had probably move on. Port 53 is the DNS, I know what it is, but port 23 looked more interesting to me. Telnet. So I fired up my telnet client and connected to the IP.
Linux 2.0.38 (bunny) (ttyp1)
Bunny.LT4.net login:
Password:
So I thought I'd just try something...why not?
But after a few tries I realised that what I was doing was rather useless. I had been trying different combinations of usernames and passwords...but of course (duh) the username would surely be "root"?.