zondag 28 februari 2010

Perl

At this moment i'm really bizzy with learning perl. It really is a easy language.
Thanks to Warpboy who wrote the pdf file Writing exploits with perl.
I was amazed how quickly i understood the commands of perl. I just did the exercizes the pdf file explains and i finished the file in no time. I just made a login form with perl and i'm thinking of continueing the perl file so it will become something like the computer of Wargames...Haha. Shall We Play A Game?
I think it should actually work. Just a single computer with modem access and all the files. Remote access will be possible so i can access the computer from everywhere in the world. The computer will be able to do everything: from looking into telephone books until making phone calls. I love the idea.

dinsdag 2 februari 2010

Left 4 Dead 2

"Yesterday was a good day. A wonderfull day. A day of Xbox-360 games. A day of Left 4 Dead 2." ~Raseac_MI

Yesterday i bought the horror game Left 4 Dead 2. And it really is a beautiful game.
The graphics are amazing and the speed of the zombies is just terrifying.
I had to pay 60 euros for it, but it's worth twice the money! Really the game is awesome! You play in a team of four and you must survive the zombie apocalypse.
There are many levels and even more online ones. There's even a theme-park level. And as you might suggest there are clowns over there. And of course they are zombies as well! So at the end of two hour non stop gaming i had chopped off many clowns heads!!!! Mwuahahahaha!!!

Oh and by the way: i just read some polls which resulted into a top 20 of horror games and i've got both number one and number two. At number one stood Resident Evil 5 and at number two Left 4 Dead 2. Man i love horror.

dinsdag 26 januari 2010

What i am doing right now

Alright, it has been a while ago when i posted my last post. But now i am back.
Here my current statics. Let's see, i've learned all the basics of phone phreaking. The scanning stuff. How to play with VMBs, answering machines. How the telephone network works, all the terms(most of them). I've also specialized myself in VMB hacking. All those weaknesses, default passwords etc. So that part is done.

Now i've also learned how to hack on the fisher way. You know Sam Fisher from Tom Clancy's Splinter Cell!
So:
1. Get in
2. Put in usb which contains a trojan, retrieves passwords, deletes AVG, shutdowns the firewall, activates the guest account.
3. Get out
4. Get in through Trojan and set up VPN for total access
5. And of course, because i have pwd of the internet connection (WEP, WPA etc) i can just drive by and connect. When i've done that i can do some ARP-POISONING. So i get up to date with all their internet activities.

In other words: i'll have total control.

Now at this moment i'm planning to start to learn lock-picking. I now already have he basics but i want to know it all and be able to practice the theory in real. So i got some PDF files about picking, watched some videos. I'm gonna get a picking set at my local hardware store soon.

Well those are my current statics. Oh and by the way. I keep my twitter account updated more than this blog so you might want to check out my twitter.

Greets,
Raseac_MI

zondag 10 januari 2010

Phone Phreaking

Hello Guys,
I am planning to start learning phone phreaking. I really like the idea of breaking into voicemail boxes. Haha.
And all that scanning stuff. Cool!!! I have to adapt the theory i found on the internet though. I live in the Netherlands, so we have different kind of phone numbers. Well doesn't matter.

Keep you updated,
Raseac_MI

woensdag 30 december 2009

ARP-Poisoning in practice


So yesterday i did some arp poisoning. Because, you know, i knew how it worked and so, but i never actually did it. And this ARP-poisoning went pretty well. I could follow my victims (my parents by the way) on the net and see where the were going.
I managed to retrieve all their passwords as well.



For the Arp cache attack i used:
  • Cain and Abel (totally scriptkiddy i know)
  • Ettercap
  • Urlsnarf (i forgot the name but i believe it was Urlsnarf)
  • Arpspoof (from the Dsniff packet)
  • Wireshark
As you might suggest, I used all those software individually so i could check out arp-poisoning with both Windows and Linux. Oh, and by the way, I really can't believe why they didn't made a Cain and Able for the Linux. Cain and Able really is a reason for using a Windows instead of a Linux. It speeds up the process really well. A succesfull attack will be just a few clicks away. I understand as well why C&A is this famous in the scriptkiddie world. It is just to easy. You can compare it with a software to launch Nuclear missles (don't look for it on google, these software do not exist), just press on the launch button and you have started a nuclear war. Mhm...why does this remind me of Wargames?

Well that was it for yesterday, but what did i find out today. Today i made myself familiar to the python script Sslstrip for ARP-poisoning. With this script you can see even the passwords remote users type into ssl pages(https). This script makes use of an exploit to convert ssl sites (https) to normal sites (http). Well, not really convert, but the remote users gets to see an http site instead of a https site. This way the users types in his password in a http sites and so it can be viewed just as normally. This makes Sslstrip a really handy piece of software for your hackers arsenal.

Raseac_MI

zondag 27 december 2009

New blog

People, i've just made a new blog about ftp. At that blog you can find information about how to use ftp at it's best. It's still in it's building process, but very soon it will be full of tips 'n trics and handy tutorials.

Regards,
Raseac_MI

zaterdag 26 december 2009

Merry Christmas

Merry Christmas all of you! I didn't have the time to write a post yesterday nor that day before, but now i am back. So now it's Christmas. The time that we can we can all ask for geeky stuff, money or whatever you like. I asked the Santa-clause for money so i can buy an antenna for my laptop. This way i can wardrive more effectively. As you might think out of my previous sentence: i am really into wardriving again. First i just knew how to wardrive, but now I've got a laptop i can start going wardriving in real. Yeah!!! At this moment i know all the theory and software available and it is just waiting till Monday so i can buy an antenna.

The clue behind all this wardriving joy is that i am planning to combine this with ARP-poisoning, packet sniffing. And then, of course, i am gonna tell the owners of the hotspot that their internet connection isn't secure.

I also like the idea of mapping all hotspots in my local village. By the way i just read this article on the internet explaining how to upload your Kismet files to Google Earth. Well that's some geeky stuff. Here is the link: http://www.perrygeo.net/wordpress/?p=55.

Well, guess that was it.
regards,

Raseac_MI

woensdag 23 december 2009

Linux!!!

And People,
just as i promised, here is my second message. In just one single day! Now back to my point...

Guys, today i've installed Linux Ubuntu on my laptop. Just to check out all this mess on the internet that Linux is the real hackers OS. Well....i've checked it out and....My god this really is a wonderfull OS. Really, i didn't believe my eyes. I've immediately downloaded Wine, Aircrack, Kismet, Nmap and more.

At this moment i am learning all those unix commands. They're quite simple. (while i think DOS is simpler though)

I also reviewed my knowledge about wardriving(,warwalking, warflying, warskating etc). I am definitely gonna try this out in the field.

Well, that was it for today.

Happy Hacking,
Raseac_MI

Welcome to my Blog

Welcome readers, to my first post.
First i will introduce myself. I am Raseac_MI, a learning hacker. 13 years old. Later i would like to go into security. And to specify my future plans, i mean security with computers. My biggest dream is to become a Penetration Tester. Hacking while you're getting paid for it. I think that's the dream of almost any hacker on this planet.

In my free time i like to expand my knowledge about how operating systems work, networks and most important of all: keep up with the constant chang of technology. And that's the hardest part.

And some of you guys might think that i am just one of the many scriptkiddies. Well, i'am not.
While hacking i try to use as less software as possible. I don't seek my victims depending on the security vulnerability, but instead i chose a victim and then observate the system for vulnerabilities. And if you've read what i wrote in the first paragraph you must understand that i want to become a Pen Tester. And to make my way to that level i need to resist the easy tools freely available and do everything at my own.

Well...now, what am i gonna post on this blog?
On this blog or at this blog (english isn't my native language) i will put my thoughts and discoveries. So you might read this blog as a dairy. For example i will put my resent experiences (computer related), and technological discoveries. With discoveries i mean milesteps in my 'carreer'. So, for example, hack tacticts. What i will also post here are ebooks or links to text files. Becouse, of course, the most important thing to do as a hacker is expanding your knowledge. You can do this by reading.

Well that was my first post, i hope i have the time to put another one today. See you later folks.

Raseac_MI