This is the way a system is hacked using Exploits
posted by
Posted by
Joe2010
|
|
Leave a Response
Tagged With
Tutorials H4Ckîng [EN]
Exploit is a code built in C, VB etc.. that takes advantage of an open port.
This guide will teach you how to hack into a computer without sending any trojan server in other words - using Exploits..
In the following steps i'll show you how to hack into a computer using a port 5000 exploit, but you can do the same for other ports just download there exploit from:
- Google.com
- Securiteam.com
- K-otik.com
- Astalavista.box.sk
- Coromputer.net
- Securityfocus.com
(Search the exploit as: "Exploit for PORT NUMBER")
STEP 1: Download port 5000 exploit, uslly the exploits come as .txt and you need to change them to .c
http://planet.nana.co.il/progroup/exploits/5000e.zip
After downloading and extracting the port 5000 Exploit we need to compile it (covert it to .exe), In order to compile the exploit we need the "Cygwin" program.
http://sources.redhat.com/cygwin/setup.exe
STEP 2: Open the Cygwin setup.exe and install it by the following pictures:
STEP 3: After installing the program we need to compile the exploit, place the 5000.c exploit in C:\cygwin\bin
then run the command line from - Start - Run - cmd/command
in the command window type:
CD c:\cygwin\bin
gcc 5000.c -o 5000.exe
(CD = Open)
Or follow by the picture:
STEP 4: After we finshed to compiled the exploit we can use it! =)
in order to connect the the victims computer that has port 5000 open in this case..
Open the command line by - Start - Run
then type:
CD c:\cygwin\bin
5000.exe XXX.XXX.XXX.XXX -e
(XXX.XXX.XXX.XXX = Victims IP address)
Or follow by the picture:
Source: hxxp://prorat.net/forum/viewtopic.php?t=1838





![[2a6jvpg.jpg.gif]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3DeVwIT-rEycs4ctNT_UgpN21U1q3RdP9EXdVwqjokQY4NqnNBpYGQiHOjnWQmglOPKSDXY6-kcRpma2OHgAGCcZc7kWrO1NJ_P2oNHWWiuVXxaWw9f9idyRfLbvfdpxZ5xb3hKMl6nnS/s1600/2a6jvpg.jpg.gif)
![[Specialsecurity.gif]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHdW_yAzCMaTqyzMc0_GRFdQ2xE-zzIl8mKdce4euar70R1CDH8hMM17hcOv5KWTrHQdt7CCPpbTzOPQAahU72e-UmyHSii9pkIOZV0ETPdrnKo21UgGYExqIqkuBgWNMZ7YEX47bSUCKa/s1600/Specialsecurity.gif)










0 Responses to 'This is the way a system is hacked using Exploits'
Post a Comment
If you have any Problem (any link dont work...) contact us :