/////Warning : Just for Educational Purpose/////////
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??
It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Subscribe to:
Post Comments (Atom)
Counter
Labels
- About Domain Names (4)
- Android Hacks (2)
- Anti Yahoo booter (1)
- AOL hack (1)
- Broadband Hacking (5)
- Browser Tricks (1)
- Bsnl hack (1)
- Cell Phone Hacking (7)
- Computer hacks (24)
- Cracks/Serials (3)
- DataBase hacking (2)
- Defender (1)
- E-books for Hacking (4)
- Ethical hacking (15)
- Exciting Links.. (14)
- Facebook hack (2)
- FireFox hack (2)
- Free Downloadings (1)
- G-TALK Hacking (3)
- Gmail Hacking (2)
- Google Chrome (1)
- Google Hacking (2)
- Hack Airtel (5)
- Hack Vodafone (2)
- Hacking (62)
- Hotmail hack (3)
- Important Articles (16)
- Important Utility Softwares (35)
- Increase download speed (1)
- Innovations Articles (5)
- Intel Core i 7 (1)
- ip (2)
- ip hack (6)
- iPad (1)
- Key Logger (1)
- Lan Hacking (1)
- LInux (11)
- MegaUpload Hack (4)
- Mobile Hacks (14)
- Msn hacks (4)
- Nero (Linux) (1)
- Networking (6)
- Office (1)
- Operating Sysytems (24)
- Oracle 11g (2)
- Orkut goodies (3)
- Orkut Hacking (8)
- Password Hacking (6)
- phone unlocking (2)
- Programming softwares (3)
- Proxy (1)
- Proxy links (1)
- Rapid share hacks (10)
- Security (5)
- Skype hacking (1)
- Special Antiviruse (1)
- Theme for XP (3)
- Themes for Window 7 (1)
- Trojan (6)
- Usb Secuirty (3)
- Viruse (9)
- Website hacking (7)
- Windows 8 (2)
- Wireless Hacking (7)
- Xp Tweeks (5)
- Yahoo Hack (3)
- Yahoo messnger hack (6)
- You Tube Hack (1)
- Zapak hacking (4)
Followers
Blog Archive
-
▼
2009
(264)
-
▼
May
(32)
- Windows Vista Ultimate Edition Service Pack 1 32 b...
- Seven Transformation Pack
- Download number of operating sysytems
- All in one Keylogger
- Hacking an email
- Fastest processor on the planent,The new Intel Cor...
- Play Nintendo DS on your Computer
- ACTIVE LOCK USB
- Rapidshare Auto Downloader 3.5 ML with Portable
- Visual basic 6 Professional (VB6)
- Window XP(Gamer Edition)
- Mac OS X Leopard 10.5.2 For PC (kalyway)
- Oracle 11g Enterprise Edition
- INFO :Oracle Database 11g Enterprise Edition deliv...
- Anti Boot Software for Yahoo Messenger (Update)
- Hatch code hacking for Zapak accounts
- Hacking Cracking Hacks MD5
- [Tutorial] How to create dvd5 SSBB NTSC-USA with f...
- Hack MD5 passwords - Internet how to video
- Find IP info using Gmail/Yahoo/Hotmail
- RapidShare Hacker v3.0 (Final)
- Increase your internet browsing speed with Firefox...
- Password to open your MS Office Documents
- Hacking Through Yahoo Messenger: Beware!!
- Breaking Administrator's Password!!
- How to Hack Into a Windows XP Computer Without Cha...
- NTFS vs. FAT, which is better?
- Google Chrome v/s Mozilla FireFox - Comparing Web ...
- Register A Domain Name
- Domain Name Myths when Domain registration,buying ...
- Selling Domain Names For Maximum Profit
- Hack [Sify,Reliance,Others] Speed Upto 10 MBPS [Be...
-
▼
May
(32)
Subscribe Via Email &Sms
Also Subscribe Via Sms Just click here to follow via
SMS
0 comments:
Post a Comment