Thursday, October 15, 2009

HACK YAHOO WHILE CHATING

HACK YAHOO WHILE CHATING


HACK YAHOO ACCOUNT WHILE CHATTINGThis is only for education purpose.So who ever try this is at his risk.I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocolleave a comment here after u see the post lemme know if it does works or not or u havin a problem post hereFollowing are the feature : -1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.2) When we send files yahoo has 2 optionsa) Either it uploads the file and then the other client has to down load it.b) Either it connects to the client directly and gets the files3) When we use video or audio:-a) It either goes thru the serverb) Or it has client to client connectionAnd when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.So lets analyse1) Its impossible to get a Attackers IP address when you only chat.2) There are 50 % chances of getting a IP address when you send files3) Again 50 % chances of getting IP when you use video or audio.So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio1) Go to cmd(dos)type ->netstat -n 3You will get the following output.Just do not care and be coolActive ConnectionsProto Local Address Foreign Address State.Active ConnectionsProto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDJust i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->2) Try sending a file to the Target .if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is establishedHMMMM then the first attacker first phase is overThis is the output in your netstat.The 5101 number port is where the Attacker is connected.Active ConnectionsProto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDTCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHEDThats what is highlighted in RED. So what next3) Hmmm Ok so make a DOS attack nowGo to dos prompt andJust donbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.C:>nbtstat -A 194.30.209.14Local Area Connection:Node IpAddress: [194.30.209.15] Scope Id: []NetBIOS Remote Machine Name TableName Type Status---------------------------------------------EDP12 <00> UNIQUE RegisteredSHIV <00> GROUP RegisteredSHIV <20> UNIQUE RegisteredSHIVCOMP1 <1e> GROUP RegisteredMAC Address = 00-C0-W0-D5-EF-9A .TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDOk so you will ask now what next.No you find what you can do with this network than me explaining everything.So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.

0 comments:

Post a Comment

my pleasure in helping you

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Aruz Parajuli, Aruz Parajuli