What's New!

Chat with
Hackers

How to Defend
Your Computer 

The Guides
to (mostly) 
Harmless Hacking

Happy Hacker 
Digests (old stuff) 

Hacker Links 

Hacker
Wargames 

Meet the 
Happy Hacksters 

Help for 
Beginners 

Hacker 
Bookstore 

Humor 

It Sucks 
to Be Me!

How to Commit
Computer Crime (not)! 

What Is a 
Hacker, Anyhow? 

Have a 
Great Life! 

News from the 
Hacker War Front

How to Totally Compromise a Fortune 500 Company

Beep… Beep… Beep (Wake up stupid!) 0530!!! I sent an arm flinging across over to the nightstand to silence the menace known as the alarm clock. I stumbled over to the stacks of 486's, Pentium, Pentium II and Pentium III boxes that were stacked on top of one another in the corner of my bedroom. As the light from my 21" monitor illuminated the room, I decreased the brightness as to not wake the wife who was sleeping soundly.

Rubbing my hands together anxiously, I poured through the list of freshly acquired and enciphered passwords that would serve as my key right into the wide area network (WAN) of AcmeHQ. That's my fubarred version of the name of my victim, a Fortune 500 company. My enumeration of the target network sure did pay off! I eagerly got to work exploiting a reverse telnet technique bypassing the fearless Cisco PIX Firewall and casually made my secure shell (ssh) connection from a small inconspicuous BSD box tucked away in a closet half way across the world. When prompted for my username I simply entered "CIO" and "<users SSN#>" as the password.

Welcome
To
AcmeHQ.com
If you have any
Questions or comments
Please e-mail admin@AcmeHQ.com
If you have any complaints
Please e-mail abuse@AcmeHQ.com or complaints@AcmeHQ.com

-GOD

Last login: Wed Jan 3 17:57:45 -0800 1999 on TTY1 from god.acmehq.com

-[ttyp1]-[/home/cio]
-[CIO@AcmeHQ.com]-#

Oh, very nice. The CIO had added himself to the root group. GID0 -- how convenient for me!!! I quickly created a half a dozen new accounts with inconspicuous names that followed the obvious naming convention which I easily put together from the shadowed /etc/passwd.

More how to totally compromise a Fortune 500 company--->>


Carolyn's most
popular book,
in 4th edition now!
For advanced
hacker studies,
read Carolyn's
Google Groups
Subscribe to Happy Hacker
Email:
Visit this group

 © 2013 Happy Hacker All rights reserved.