----------REMOVED--------

430,749

389

186

Introduction: ----------REMOVED--------

About: bmlbytes

REMOVED

Step 1: 1-------------

--------------

Step 2: ---------------------

---------------

Step 3: -------------

------------------

Step 4: -----------

--------------

Step 5: ------------

--------------

Step 6: -------------

---------------

Burning Questions: Round 4

Grand Prize in the
Burning Questions: Round 4

Be the First to Share

    Recommendations

    • Potato Speed Challenge

      Potato Speed Challenge
    • Bikes Challenge

      Bikes Challenge
    • Remix Contest

      Remix Contest

    186 Discussions

    0
    hq
    hq

    11 years ago on Step 2

    If you remember what the massage said tell me please.

    0
    Mr.Ownage
    Mr.Ownage

    Reply 11 years ago on Step 2

    I got it from my school a few weeks ago, that's some serious bullsh*t They said if I dont stop, they'd put me on a list (some sort of black list) and I wouldn't be able to get the programming class next year and I would be banned from any computer lab Frankly, I dont care to be banned, but I gotta take that freaking class if I wanna live later...

    0
    wirah
    wirah

    Reply 9 years ago on Introduction

    Oddly enough, my early days of hacking my school's computer network is the exact reason I own a computer consultancy company today.

    Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.

    I'd get some old computers, build yourself a network, and learn about networking that way. Oh, and use Linux, Windows is not build for this sort of work, and will serve only to get in your way.

    0
    adamazing
    adamazing

    Reply 8 years ago on Introduction

    Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.


    That's a little disingenuous isn't it? They don't encourage the sort of activity that slows the network down for everyone else and that if successful would lead to the exposure of confidential, private student/staff data. They would rather people with just enough knowledge to be dangerous did not engage in potentially harmful behaviour on their network.  

    Mostly, it's probably just annoying them that they have to deal with some idiot kiddy who discovered nmap and has decided to use it on its most agressive settings (WTF?) when they could be...you know...doing the productive parts of their job.
    0
    EnricoP11
    EnricoP11

    Reply 4 years ago

    just use tor proxychains ... ;)

    0
    thepaul93
    thepaul93

    Reply 11 years ago on Introduction

    thats why you go in the libary with a laptop, crack their internet, then do it

    0
    hq
    hq

    Reply 11 years ago on Step 2

    So what did the message say?

    0
    Mi-technology
    Mi-technology

    5 years ago

    how can i use.. the telnet control the programs on another computer?

    0
    dan-ball
    dan-ball

    11 years ago on Step 1

    When I try to do the scan, it says "dnet: Failed to open device eth5 QUITTING!" What's going on?

    0
    dunderwood
    dunderwood

    Reply 9 years ago on Step 1

    you have to do "Intense scan, all TCP Ports" for it to work properly.

    0
    DexHunx
    DexHunx

    Reply 10 years ago on Step 1

    me too,
    has anyone found the reason of this?

    0
    adamazing
    adamazing

    8 years ago on Introduction

    1. Don't use telnet, download PuTTY, it's much nicer to use and lets you save connections. It'll also let you connect to SSH. Either that, or download Cygwin to get a Linux-like environment within Windows.
    2. DON'T use nmap if you're sitting in a college/school computer lab signed in under your own username. 
    3. DON'T use nmap on its most agressive settings, especially if you are doing it against a network you don't own or have permission to use it on (in the form of a written contract).  
    Ignoring 2 and 3 will lead to you getting caught. Fast. As you discovered.

    0
    abran5
    abran5

    8 years ago on Step 4

    too bad i can't use the ip address of the computer i'm using

    0
    hooohooo
    hooohooo

    8 years ago on Introduction

    What is port 23 isn't open but others are? How do you go about hacking something then?