----------REMOVED--------

430,308

390

186

About: bmlbytes

REMOVED

Step 1: 1-------------

--------------

Step 2: ---------------------

---------------

Step 3: -------------

------------------

Step 4: -----------

--------------

Step 5: ------------

--------------

Step 6: -------------

---------------

Burning Questions: Round 4

Grand Prize in the
Burning Questions: Round 4

Share

    Recommendations

    • Plastics Contest

      Plastics Contest
    • Optics Contest

      Optics Contest
    • Make it Glow Contest 2018

      Make it Glow Contest 2018

    186 Discussions

    0
    None
    hq

    9 years ago on Step 2

    If you remember what the massage said tell me please.

    6 replies
    0
    None
    Mr.Ownagehq

    Reply 9 years ago on Step 2

    I got it from my school a few weeks ago, that's some serious bullsh*t They said if I dont stop, they'd put me on a list (some sort of black list) and I wouldn't be able to get the programming class next year and I would be banned from any computer lab Frankly, I dont care to be banned, but I gotta take that freaking class if I wanna live later...

    0
    None
    wirahMr.Ownage

    Reply 8 years ago on Introduction

    Oddly enough, my early days of hacking my school's computer network is the exact reason I own a computer consultancy company today.

    Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.

    I'd get some old computers, build yourself a network, and learn about networking that way. Oh, and use Linux, Windows is not build for this sort of work, and will serve only to get in your way.

    0
    None
    adamazingwirah

    Reply 6 years ago on Introduction

    Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.


    That's a little disingenuous isn't it? They don't encourage the sort of activity that slows the network down for everyone else and that if successful would lead to the exposure of confidential, private student/staff data. They would rather people with just enough knowledge to be dangerous did not engage in potentially harmful behaviour on their network.  
      
    Mostly, it's probably just annoying them that they have to deal with some idiot kiddy who discovered nmap and has decided to use it on its most agressive settings (WTF?) when they could be...you know...doing the productive parts of their job.
    0
    None
    Mi-technology

    3 years ago

    how can i use.. the telnet control the programs on another computer?

    0
    None
    dan-ball

    9 years ago on Step 1

    When I try to do the scan, it says "dnet: Failed to open device eth5 QUITTING!" What's going on?

    4 replies
    0
    None
    dunderwooddan-ball

    Reply 7 years ago on Step 1

    you have to do "Intense scan, all TCP Ports" for it to work properly.

    0
    None
    adamazing

    6 years ago on Introduction

    1. Don't use telnet, download PuTTY, it's much nicer to use and lets you save connections. It'll also let you connect to SSH. Either that, or download Cygwin to get a Linux-like environment within Windows.
    2. DON'T use nmap if you're sitting in a college/school computer lab signed in under your own username. 
    3. DON'T use nmap on its most agressive settings, especially if you are doing it against a network you don't own or have permission to use it on (in the form of a written contract).  
    Ignoring 2 and 3 will lead to you getting caught. Fast. As you discovered.

    0
    None
    abran5

    6 years ago on Step 4

    too bad i can't use the ip address of the computer i'm using

    0
    None
    hooohooo

    6 years ago on Introduction

    What is port 23 isn't open but others are? How do you go about hacking something then?