Script Kiddies Suck!

Discussion in 'Computer Science & Culture' started by randominds, Jan 24, 2003.

Thread Status:
Not open for further replies.
  1. randominds Registered Member

    Messages:
    12
    Script kiddies are taking over the world suddenly...

    I once posted an article on here that I would help people learn how to hack different things and now everyone emails me immediately thinking that after reply that can hack their parents email, schools grades, or just random people they happen to not like! I think it's pathetic. If you really want to hack, don't ask me first, goto antionline orsome security based website that specially talks about that stuff. To be a hacker and not a cracker also means to have a little respect to what you are doing and who you are doing it to. First of all, before I will even think of replying to another one of you lamers out there please consult the following!

    1. Learn something. Got money? I know you can get some from somewhere so go out and buy a book! Read books that have things to do with authentications, protocols (specificallyTCP/IP,FTP,HTTP,POP3,and SMTP). Actually read what is contained and think about it. Also, any programs or examples that are presented in the book, try them, experiment.

    2. Learn something else. Got more money? Good, get more books. You can't just learn one thing and expect to know it all. What you reallly need before attempting anything is what I like to think of as supreme system knowledge. When you know what you want to attack, don't do just think. Find out the information of the system, what IPs,Domains,Mapped drives are all directed to that computer and what protocols it hosts. From this and somewhat a vague knowledge of the operating system that is running on that machine you can safely make a determination what programs may be serving the protocols, the filesystems format, and the exploits within the operating system itself.

    3. Plan something and get organized. When you have all this knowledge of this remote system, type it up and archive it. Get some ring binders with the spare change from the books. I know no one buys books with the exact amount that is due. In these binder(s) archive the following information...
    3.1 OS
    3.2 Protocols
    3.3 File system
    3.4 Networking
    3.5 Exploits of the OS
    3.6 Exploits of the protocols
    3.7 Exploits and errors that can be caused in the file system
    3.8 Exploits in the networking and networking methods

    All of this information will become helpful in the next stage....

    4. Hatch a plot. Figure out exactly what, when, where, who (extra help needed by you), and do it...

    Read all of this and consider it before emailing anyone about this type of stuff.

    Halower
     
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    I'm not saying I condone hacking, especially since most of the people who want to do it nowadays, are only doing it to ?!?"impress"?!?

    Simply put the way I have looked at security issues is in relation to myself.

    I have an underlining understanding that causing Chaos on the internet only increases the chances of losing particular freedoms that we take for granted now.

    This means the countless trojans, the half-ascii'd attempts at writing patches to deal with them, the spam mails tieing up the internet servers and reducing speeds/inducing CRC errors for data transports all have an effect of decaying the networks.

    Script Kiddies and what they can also be called "Lamerz" are killing our networks and stealing out freedom.

    This is backed up when large companies or governments are attacked by only people that you can call script kiddies because obviously if they were to think about what "Targets" they choose they might think twice about it.

    What does a person actually gain from attacking someone?
    Well thats dependent on their reasoning, if you want to follow the right path along this, then you should ask the Systems administrator and the company in writing, then you can "arrange" to test the security of the companies networks and possibly even get paid for the task. (And not busted if you make a mess)

    If your doing it for "countless numbers of devotee fans", then your obviously suffering from some deluded meglomania buzz.
    If you expect to be popular through this line of "work", then obviously your in the wrong business.
    (Especially if you take the "dark path".)

    There, I've had my rant on the topic, perhaps people might just think twice before they do something destructive.
     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. Rick Valued Senior Member

    Messages:
    3,336
    I am a strict Condemmer of Cyber Vandalism of any kind.Despite the fact that i was one of them long time back.Those people who do these things must grow up.In all of my tutorials reported here have disclamers saying that.

    Thanks.

    bye!
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. randominds Registered Member

    Messages:
    12
    I agree

    To be a cyber terrorist is to be a coward. I, though not activly involved in hacking, am a hacker. I am a white colar hacker, contracted by businesses to test security and consult to make their security better. What I gave was just what is needed to be done, not necessarily what to do, to do it. I neither condone or condem hacking because when used in the right sense, can be a great tool for program, OS, and hardware development. Hacking to me is not necessarily the ability to get in but rather having the knowledge of how to get in, what is able to be done when in, and the ability to contour to the various settings of the environment...
     
  8. spookz Banned Banned

    Messages:
    6,390

    Please Register or Log in to view the hidden image!



    i had been quite happy scanning for shares and using them as
    online storage. silly stuff really. being malicious is simply not an option. but then again my irc days were filled with some really nasty battles...! i think i still have my mirc (18 megs of script) gathering dust on a cdr somewhere. if i try to start it up on a box with an anti virus prog.......(its that old!)

    ridiculous!
     
  9. Xelios We're setting you adrift idiot Registered Senior Member

    Messages:
    2,447
    Any books you would recommend random? I'm going to university this fall to study programming, a few good books on networks and programming should give me a bit of a head start.
     
  10. chroot Crackpot killer Registered Senior Member

    Messages:
    2,350
  11. randominds Registered Member

    Messages:
    12
    Thanks chroot

    I would also highly recomend anything that gets you more familiar with the type of systems you use frequently and one of the Hacking Exposed books i have III and i love it
     
Thread Status:
Not open for further replies.

Share This Page