i was very fortunate that i did not get in trouble but as since the system administrators saw me as only an aspiring young person who wished to learn more about the computer world charges were not pressed. due to me telling them about several flaws in there computer system besides this one they know of me and i am in a good position to get a job with them later on in the future once i go to college.
originally i figured it out by messing up when defining my site in Dreamweaver this allowed for to see the root of the drive containing all of the user profiles. on your a physical terminals hard drive the user profiles can be found as folders within the my computer application and within these folders is where all the data from that user is stored. so for me gaining access to these user files proved as a p.o.c, after all what other files can have there user restrictions bypassed in this way and as such be viewed by an unauthorized user.
i learned by making this mistake defining my website in dreamweaver, how file locations on the servers hard drives are handles by these program
an example of my findings is below, this is the file location of where the students files were located
\\sch-fps02\students$\1st name. 3 of last name birthdate
based on this i figured out that it was basically
\\server drive\drive share\user
from this i exchanged the different parts for random variables to see what would work, in a way this allowed my to learn more about location mapping
\\server drive\drive share\user >>> \\*\*\*
from my previous days i was really into batch scripting and using the cmd to hack
i figured i start by learning batch code because the computer is based on some thing called dos and all we really see is a shell in a way
i managed to take over the command prompt and run a couple of commands to map the system drives [hidden and un-hidden]
i know had a map of all drives and there shares, and a way by which to bypass restrictions and freely view these restricted files
in other words the network was pawned.
how ever if you'll notice the file viewing capabilities is very limited, which caused me to seek a method to improve upon this hack.
this lead me to find this exploit in other programs, such as the entire adobe and ms suite.
Advertising