|+++++++++++++++++++++++++++++++++++++++|
|What a root can do to you?             |
|by tHeMaNiAc                           | 
|contact me at: themaniac@blackcode.com |
|http://www.blackcode.com               |
|+++++++++++++++++++++++++++++++++++++++|

This guide is for educational purposes only I do not take any responsibility about anything
happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.
If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don't
change anything without the permission of the author.I'll be happy to see this text on other pages too.

All copyrights reserved.You may destribute this text as long as it's not changed.

Home Page:
users.ldproxy.com/maniac

Author Notes
=-=-=-=-=-=-=
In this text I'll tell you things that your root can and maybe 
is doing on you know and ways that you
can stop the root from doing them.Also I'll tell  you
how to become a friend with your root and one
story about me and my root.The story i'm talking about here is for real
so be sure because most of the roots are always monitoring if they're not
stupid or lazy.

Table of Contents

-1.What a root can do to you?
-2.A Story about me and my root
-3.When the root will start monitoring you?
-4.How you can check if the root is monitoring you?
-5.How to protect?
-6.Ways to prevent your root from monitoring you
-7.Terms in this text
-8.Final Words

1.What a root can do to you?

Well when someone is root is on some system he/she
can do EVERYTHING on the system and the users.
As you see ALL of your traffic conversations and so on
can be captured because they all goes through the
network.
The root can sniff your ICQ messages because they're
all send in plain text,IRC messages
also the root can see which sites you're on
which sites you visit most,read your e-mail 
sniff your passwords
basically everything that you do when you're
online.Also the root may see if you're port scanning
another host,also check you're trying to send
spoofed packets and of course the pop3 users.
When someone start checking 1 e-mail account
from 2 different accounts the root will start
monitoring him closer.
Well basicly anyone with proper level of access to 
TCP/IP packets can get any packet on the net and read what's in.
It also can be done in a Windows,Mac and Unix system.
 As you all see if someone like you interested
in hacking this is REALLY bad thing but be sure
a lot of roots are doing it for the security of
their systems.

2.This is one story about me and the root from the ISP I left

Well I contacted one friend about giving me shell on his
server via unencrypted e-mail and he said he'll send me the
user the pass via e-mail.I didn't know that my root was
monitoring me.So I received the e-mail with subject:
"Password" and of course there was my password.
I used the shell 2 times for some work and on the other
day I received e-mail from my friend saying that
I entered 3 times and the third one was from
root@myisp.com!!!!!!
I didn't know what to say.He asked me if I was root
at the server,and of course I told him I wasn't.
He cheked closer and noticed that the root of one
of the servers of my network was there the previous night.
Then I told him that I think my root took me my password
and I asked him what was he doing on the server.
He said that he went to all of my directories
copied some texts and other things and
tried the su command with password:hacker
Lame heh.
There was no other thing that might happened.My root
read my e-mail saw the password and entered to see
what's there.
I was thinking why would the root monitor exactly me and not
someone else.Check out the next section and you'll understand.

3.When the root will start monitoring you?

Later I realized that if I was root I'll also
start monitoring someone like me.
The ISP was not so big with not so much
clients I mean.I was making a lot of traffic
receiving a lot of e-mails from various
mailing lists,sending and receiving big
e-mail and always staying more than the time
I have.Every root that is a little paranoid
will ask himself what is this guy doing so much
receiving so much e-mails and sending big one,
staying so long online not as the other users.
And of course the root will start monitoring you.
Also if he/she start checking from where you're 
receiving e-mails and if he find something like
hacker@security.org be sure he/she will start
monitoring all of your traffic.

4.How you can check if the root is monitoring you?

You may be interested is your root monitoring you
Well here's something you can try.I tried this on
the root that once get my password and it works again.

Tell someone but via the phone(remember you're not sure if the root is monitoring you)
to send you an e-mail with subject like "PASSWORDS" "HACKING" "EXPLOITS FOR yourISP"
and something that you take the root's attention.
Then of course inside should be user name and password for some server.
Also it would be AWESOME if you add something like that
"Hey dude I trust you and I won't keep any logs of you
so you can enter whenever you want and do whatever you want I trust you"
This will make your root think he's secure and won't be traced and he'll
have the chance to look what's there also try to add something in the
e-mail like
"Hey when you start smurfing or ping flooding something be sure he's someone
that won't understand what's going on because I don't want problems
Also when you exploit some site remove yourself from the logs"
and "I left you some expoits that you wanted for your ISP in the /home/hacker dir"

This will make your root go there and check immediately what's going down
because your friend said that there are some exploits for your ISP.
Of course the server will keep logs of everything and if your root
is monitoring you you'll get him caught.

5.How to protect?

Well you may ask how can I protect myself from such roots
and do my work without being watched?
There's one word that will help you:Encryption
You should encrypt EVERYTHING  your telnet sessions
with Secure Shell,your ICQ conversations with ICQ
secret messanger,your e-mails with PGP and so on.
This will keep your root away from your messages
and conversations.Also your root may log what
you're typing and sending.Let's say the root
is logging for words like "hacker" "exploit"
"password" "hack" and so on.Well can stop that
by starting to type these and other words you think
your root is logging in a different ways.
LIke "hacker" into a h4cker or {hacker}
"exploit" into an 3xploit or <exploit>.
In this way you'll again be sure the root
can't trace you.But don't type the words
as seen here be creative,and remember
encrypt everything.

6.Ways to prevent your root from monitoring you

The best thing you can do is to become a friend
with your root and start helping him and make him 
think you're useful for the ISP's security.
In this way you can be sure that your root will
not monitor you and who knows he/she may give you
the root's pass sometime.
First you must prove to your root that you can
be useful.The best way is to break the server
several times and then of course tell the root
how you've breaked it and tell him how to patch the bug.
If you do this your root will start trusting you
and as I told you give you the root's pass some time.
Then you're able to do EVERYTHING with the system.
For the evil people this is way to deface a website.

These methods are working I've tried them and I'm now
friend with my root.He didn't gave me the root's 
password but when he give it to me...............

Think whatever you want :-)

7.Terms in this text

Here I'll try to explain the different terms in 
this paper.

7.1.Sniffing

In the normal network accounts and passwords are
send in plain text it's not hard for the root
to just "sniff"(look into)the packets and
find out the things there.Admins and other
people often use sniffin either for security
purposes or to see what's going through their network.

7.2.Root

For those of you that don't know a root is
the user of the system that can do EVERYTHING
on it.The root has FULL access to everything on
a system and can make whatever he/she wants with it.

8.Final Words

I hope you like this text and now you know what a root can do
to you so be a little paranoid.

------------------------------------
This guide is for educational purposes only I do not take any responsibility about anything
happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.
If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don't
change anything without the permission of the author.I'll be happy to see this text on other pages too.

All copyrights reserved.You may destribute this text as long as it's not changed.