Madirish Tutorial 08

30 November -0001
Lets say we've decided we want to hack (a site I chose randomly through an Alta Vista search, mostly because given the nature of thier operations they aren't likely to complain to anyone if I f*ck with them). What steps do we need to take to figure out how to get in? Well, the simplest thing to do is to first find out the IP address of the web host. We do this using the following:


Pinging [] with 32 bytes of data:

Reply from bytes=32 time=71ms TTL=240
Reply from bytes=32 time=70ms TTL=240
Reply from bytes=32 time=70ms TTL=240
Reply from bytes=32 time=70ms TTL=240

Ping statistics for
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 70ms, Maximum =  71ms, Average =  70ms


Next we need to figure out who owns or runs the box, and where it is physically located. This information may be useful for social engeneering, password guessing, or just to find out if the law will come looking for you when you knock on this box's door. I used ARIN's whois lookup first, to find out who hosts the service, here are the results:

Arin Search Results:

World Internet Services (NET-HISPEED-2)
   330 Rancheros Drive Suite #108
   San Marcos, CA 92069

   Netname: HISPEED-2
   Netblock: -

      Baker, Jasen  (JB770-ARIN)
      760-761-0495 (FAX) 760-744-3778

   Domain System inverse mapping provided by:


   Record last updated on 21-Jul-2000.
   Database last updated on 27-Mar-2001 22:52:10 EDT.

Next I used a Network Solutions whois lookup to find out exactly who registered the domain, mostly for reasons mentioned above, here's what we find:

Network Solutions Search Results:

Registrant: (WHITEPOWER6-DOM)
   Micetrap Distribution Post Office
   Box 8813
   Turnersville, NJ 08012

   Domain Name: WHITEPOWER.COM

   Administrative Contact, Technical Contact, Billing Contact:
      Micetrap, James  (ISD16)  micetrap14@AOL.COM
      Micetrap Distribution
      Post Office Box 55
      Maple Shade, NJ  08052
      609-451-9314 609-451-9314

   Record last updated on 25-Jan-2001.
   Record expires on 03-Apr-2004.
   Record created on 03-Apr-1999.
   Database last updated on 27-Mar-2001 23:15:00 EST.

   Domain servers in listed order:


Now comes the interesting part. I switched over to my linux box and ran a quick NMAP scan of the box, tons of juicy info in here:

Starting nmap V. 2.30BETA17 by ( )
Interesting ports on  (
Port       State       Service
21/tcp     open        ftp                     
23/tcp     open        telnet            
25/tcp     open        smtp                    
53/tcp     open        domain                  
80/tcp     open        http                    
81/tcp     open        hosts2-ns               
110/tcp    open        pop-3                   
143/tcp    open        imap2                   
444/tcp    open        snpp                    
617/tcp    open        unknown                 
1414/tcp   open        ibm-mqseries            
1488/tcp   open        docstor                 
3306/tcp   open        mysql                   

TCP Sequence Prediction: Class=random positive increments
                         Difficulty=5661830 (Good luck!)
Remote operating system guess: Linux 2.1.122 - 2.2.14

Nmap run completed -- 1 IP address (1 host up) scanned in 13 seconds

So there are a whole lot of entry points to this domain. We could potentially exploit any of the services we see running. Of course it would be easier to do this if we knew which version and program was offering the services. You can find this out simply by telnetting to the well known ports and seeing what you find. I like to try out some basic accounts and 'expn' the root account on an SMTP server to see if it will give up any goods. Unfortunately this server doesn't allow expn (which shows the members of groups that recieve mail. 'expn users' would show recipients of mail to ''. root, postmaster, mail, and users are all good groups to check out if you can.). Unfortunately the finger daemon isn't running or we'd 'finger' to get a list of all user accounts if that function hadn't been disabled. Here's my results:

	Cobalt Linux release 5.0 (Pacifica) Kernel 2.2.14C10 on an i586
C:\>telnet 25
	220 ESMTP Sendmail 8.9.3/8.9.3; Wed, 28 Mar 2001 11:28:
	28 -0500
	helo affordable
	250 Hello [], pleased to meet you
	expn root
	502 Sorry, we do not allow this operation
	221 closing connection

	Connected to
	220 ProFTPD 1.2.0rc3 Server (ProFTPD) []
	User (

Its also a good idea to check and see if annonymous FTP is enabled. If it is you can list 'annonymous' as your username and an e-mail address (such as '') as your password.

Lastly I want to check to find out what the gateway computer to this target is. To do this all we have to do is run a traceroute:


Tracing route to over a maximum of 30 hops

  2    10 ms    20 ms    10 ms []
  3   >10 ms    10 ms    10 ms []
  4   >10 ms    10 ms    10 ms []

  5   >10 ms    10 ms    10 ms []

  6   >10 ms    10 ms    10 ms []
  7   >10 ms    10 ms    10 ms []

  8   >10 ms    10 ms    10 ms [209.247.10.
  9    70 ms    70 ms    70 ms [209.
 10    70 ms    70 ms    70 ms
 11    70 ms    70 ms    80 ms

Trace complete.


Using the traceroute we see that the gateway is This is the computer that filters all information sent to and from the target web host. This could be a simple router, or it could be a firewall (doubtful in this case since the target gave up the goods really easily). In order to make a full scan, we should repeat the above steps on the gateway and see if we can find any other useful information about the target, gateway, or network.

So, as you can see we can find out a lot of useful information about a target remotely. From here we can investigate exploits for services running or simply try to brute force password guess the services.