hey guys
I would like to say thanks to all of you who helped specially I_learning_I
I got great success in attacking the network
I used all the software to get details of the vulnerabilities present in the network.
Well it had medium level vulnerabilities but for my interest it supports sniffing which makes is vulnerable to man in the middle attack.
We have static ip configuration and the dns server for all is 192.168.0.1
i just changed my ip to 0 series and started sniffing
i found the server ip is 192.168.0.2
I poisoned it and bang! it worked all the traffic flowing through it popped up in password tabs.
I used Cain&abel for it.
Now the company that provides protection to our college is nebero.
You can have a look at their website
www.nebero.com But the most foolish part was they encrypted the normal user with md5 hashing but the admin password was in plain text that made it feel like an icecream for me.
Now for being on the good side i told my college authorities about this and that brings my new question for everyone out there
How can they protect it?
second, I do changed the admin password but in a minute he called nebero and they rechanged the password, this means i have access to front end only which only leads to temporary access
what should i do to get in the backend access and also maintaining it.
I tried port scan and find out port 650 is used for ssh.
That's all from my side info.
Can you guys sort this out for me or help me sorting it.
Thanks.