AdrenalineX Forums

General => Unban Requests => Topic started by: SeWeR on March 21, 2009, 06:44:09 am

Title: SeWeR
Post by: SeWeR on March 21, 2009, 06:44:09 am
1. SeWeR
2. 82.207.70.26
3. unknown
4. "Speed hacking!"
5. I didn't hack, it was friends , they must of installed something. :o

P.S. Sorry for my bad English :'(
Title: Re: SeWeR
Post by: [MAF]MrHess on March 21, 2009, 01:08:31 pm
my imaginary brother always comes here and insults people, Im a saint
Title: Re: SeWeR
Post by: MikeGT on March 21, 2009, 02:14:33 pm
(http://stringyuniverse.files.wordpress.com/2008/06/funny-pictures-cat-keyboard-microsoft-assistant11.jpg)
Do you have a cat? :O maybe he did it :O
Title: Re: SeWeR
Post by: [MAF]mooman on March 21, 2009, 07:23:05 pm
(http://www.bitboost.com/pawsense/cat-like-typing-detected.gif)
Title: Re: SeWeR
Post by: [MAF]Snoopy on March 21, 2009, 08:21:12 pm
:L :L :L
Title: Re: SeWeR
Post by: [FSR]Ush on March 21, 2009, 11:57:12 pm
Hi sewery ;_;
Title: Re: SeWeR
Post by: SeWeR on March 22, 2009, 12:43:11 am
Unbanned me plz.. :P

Hi sewery ;_;
I SeWeR ;D and Hi
Title: Re: SeWeR
Post by: [MAF]Snoopy on March 22, 2009, 12:47:42 am
That's what I was looking at for the first time a few weeks ago.
The first thing I did was what a real hacker would probably never do; I got on the phone and told the only hacker that I know irl, that I was in, running around in circles like a small kid who just opened the birthday present he always wanted, hyperventelating and bashing my hand against my forhead.
How could they have been so stupid?





Before I got this far...this is how I started:
I started doing a portscan with nmap (one of the things I learned at HAL2001)

Starting nmap V. 2. 07 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)
Interesting ports on ipd*******.speed.planet.nl

Port State Protocol Service
23 open tcp telnet
53 open tcp domain
80 open tcp http

This is what nmap gave me. Well the fact that they had port 80 open could mean that they have a webserver running, but I checked and they don't. So I had probably move on. Port 53 is the DNS, I know what it is, but port 23 looked more interesting to me. Telnet. So I fired up my telnet client and connected to the IP.

Linux 2.0.38 (bunny) (ttyp1)

Bunny.LT4.net login:
Password:

So I thought I'd just try something...why not?
But after a few tries I realised that what I was doing was rather useless. I had been trying different combinations of usernames and passwords...but of course (duh) the username would surely be "root"?.
Title: Re: SeWeR
Post by: [FSR]Ush on March 22, 2009, 12:51:52 am
Roll it up, Light it up, Smoke it up..

(http://www.deondernemer.nl/data/artikel/Shutterstock/Allerlei/.cache-467x307/joint.jpg)
Title: Re: SeWeR
Post by: ǝǝǝoſ[sXɐ] on March 22, 2009, 10:30:07 pm
umm... can anyone tell me what the hell andy's talking about? :L
Title: Re: SeWeR
Post by: [FSR]Ush on March 22, 2009, 10:48:05 pm
umm... can anyone tell me what the hell andy's talking about? :L

How to use hax... or that's what i thought :L
Title: Re: SeWeR
Post by: ǝǝǝoſ[sXɐ] on March 31, 2009, 02:06:30 pm
umm... just download vogles?
Title: Re: SeWeR
Post by: some_punk on March 31, 2009, 08:02:18 pm
ROFLAMO!!

username root
pass toor

why did u scanport someone???
its useless without an infected pc...
just turn off your netbios, and services...
Title: Re: SeWeR
Post by: [MAF]Snoopy on April 15, 2009, 12:42:27 am
i found it on google :L