Hacking!

Discussion in 'Computer Science & Culture' started by Mystech, Jun 26, 2003.

Thread Status:
Not open for further replies.
  1. Mystech Adult Supervision Required Registered Senior Member

    Messages:
    3,938
    Ok, I know it's a pretty friggin' broad and inclusive term, and really more of a buzz word than any cohesive idea, but still I'm interested in hacking!

    At the moment I'm really mostly interested in learning about silly stuff like DDoS attacks, and anything that would let you track someone else’s online activity. Is it possible, for instance, to monitor someone's open ports and find out where they are sending packets too and where they are receiving them from?

    How about bouncing your connection through insecure proxies, what all is involved in that? If someone is going through a remote proxy, is there any way that I can trace them back to their own machine?
     
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. Redrover Registered Senior Member

    Messages:
    234
    Is it just me or is the FBI is really getting desprate?
     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. whitewolf asleep under the juniper bush Registered Senior Member

    Messages:
    3,112
    All I want to know is how to get into someone's e-mail mail box. Suggestions are anticipated.
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. MechTech Registered Senior Member

    Messages:
    59
    If you want to know about hacking, learn C, C++, and assembly language and hack your own Linux kernel modules and programs.

    Hacking: ---A very low level of programming.

    Cracking: ---Breaking into someone's machines, email, etc...

    If you are going to post such a topic in the computer science section, at LEAST know your definitions first, and get the terms right

    Please Register or Log in to view the hidden image!



    If you're not even willing to do that, then give up now because you would likely amount to no more than a script kiddie.
     
  8. AntonK Technomage Registered Senior Member

    Messages:
    1,083
    I always find it humorous when a sentence starts with "All I want to do is..."

    The next part of the sentence is always something incredibly complicated. It's like saying "All I want to do is take over the world" It's a simple sentence, why can't someone tell me how to do it. I just want a quick 1 sentence answer!

    Well sorry, you can't do it (and im guessing from your attitude on the whole subject, that you will NEVER be able to since you won't take the time to learn).

    Secondly, why would you want to? It's simply wrong. I don't care your reasons, I don't care your motives. You know its wrong. If there is so much security that you have to post on message boards to figure out how to get into something, perhaps you shouldn't be there in the first place. Chances are if you were caught (which YOU would be), you'd go to jail or have some HEAFTY fines.

    Grow up.

    -AntonK
     
  9. SG-N Registered Senior Member

    Messages:
    1,051
    Are you sure?

    Please Register or Log in to view the hidden image!

     
  10. malkiri Registered Senior Member

    Messages:
    198
    The definition is a little fuzzy, but that's not very accurate. Hacking is generally regarded as breaking into a system, while cracking is defeating protection or encryption on a program or some such. Maybe you're thinking of the other meaning of the word 'hack' that's used to describe a quick and messy programming fix? Then there's the 'password crackers' which relate to hacking...
    It's all a mess...
     
  11. MechTech Registered Senior Member

    Messages:
    59
    Oh yes, I am 100% sure

    The problem is that a LOT of people misuse the terms.

    If you program in assembly language or in pure hex codes, that is known as hacking. Programming an operating system, compiler, or other extremely low-level tool, for example, would be hacking.

    Breaking people's passwords, exploiting insecure servers, port-scanning, reverse-engineering software are all known as cracking

    Read some assembly language programming books, hardware interfacing books, and Linux programming books, and you should become fully aware of the correct definitions of both terms

    Please Register or Log in to view the hidden image!



    Anyone who uses "hacking" to mean "breaking into a system" is incorrect, as that is not what it is. That would be cracking

    Please Register or Log in to view the hidden image!



    BTW, any serious Computer Science major, hacker, or cracker would know these two correct definitions I have given.

    The ones who call themselves "hackers" but who are really "crackers" are actually the script kiddies No serious cracker would call himself a hacker, unless he ALSO was a hacker (which many of them are both cracker and hacker), but if he prided himself on the cracking abilities, he would go by "cracker" instead of "hacker".

    Also, knowing a little C, a little C++, a little Java, a little Visual Basic, etc....doesn't count as a serious Computer Science major. You have to be totally infused in the stuff

    I know x86 assembly language, and I have actually made a few different types of files using only hex codes before. I have never broken into anyone else's comptuer, nor would I.

    You tell me what I am

    Please Register or Log in to view the hidden image!

     
  12. malkiri Registered Senior Member

    Messages:
    198
    If a lot of people are 'misuing' the terms, then I'd say there's a pretty good chance that they're right, if for no other reason than common usage tends to determine meaning. While the original meaning of hacker is what you describe, the generally accepted meaning has obviously changed into something different.
    I don't see how being a computer science major ought to get dragged into this. I don't recall any classes on the meanings of these words...

    Please Register or Log in to view the hidden image!

     
  13. MechTech Registered Senior Member

    Messages:
    59
    Well, generally you wouldn't have those words, per se, actually taught in a class unless you took a security-related course.

    Please Register or Log in to view the hidden image!



    What does computer science have to do with it? Well, for one, both are technical terms in computer science.

    Please Register or Log in to view the hidden image!

    For two, this is a computer science discussion area.

    It is okay to be disinformed. It is okay to not know all of the answers. It is okay to be wrong. What is not okay is to not be willing to learn and find out the answers yourself. It is okay to not know, but, instead, simply take the information which you now know, and remember it. You now have increased your knowledge level a bit.

    True that a lot of people are misusing the terms and they probably will be added to the dictionary (incorrectly) like that.

    Another example of a word which I do not accept as valid, but which has crept into the dictionary because of frequent incorrect usage is "fishes" (that should be "fish"). Also, various incorrect pronunciations of certain words have become accepted as "correct" over time. (I still hold that they are not).

    You are right that it will probably end up in the dictionary such as you have stated, but the most accurate/correct definitions of words will always be the technical, and not generalized, definitions.

    Besides, wouldn't the terms which experts in their own field use be more accurate than terms which the common people attribute to the same things?

    I am by no means calling myself an expert. What you should do is find a good assembly language programmer (probably someone who is an assembly language programmer who is about 27 or 28 years old currently should be good), and ask him to read this, and see what his thoughts are on it. You can also ask around in the Linux community, and you will get some clear answers.

    It is okay. You didn't know. Now you do. ....and knowing is half the battle

    Please Register or Log in to view the hidden image!

     
  14. whitewolf asleep under the juniper bush Registered Senior Member

    Messages:
    3,112
    RE:AntonK

    BITE ME!
    Watch me do it!
    I am astonished by your ability to type up such elaborate numerous negative paragraphs in responce to two positive lines.
    However, you were right to some extent; I am not planning to have a career in programming, it is only one of my various secondary interests.
    (dont reply to this post)
     
    Last edited: Jun 28, 2003
  15. testify Look, a puppy! Registered Senior Member

    Messages:
    508
    ALSO
    SO
    Not necessarily
    Nope

    *Edit* This information came right from the course that I take, in university.
     
  16. SG-N Registered Senior Member

    Messages:
    1,051
    Testify, I agree with "your" definitions of hackers/crackers. A hacker can break into a system as well as a cracker! The difference comes once they are in that system : a hacker will tell the admin that he has found a bug and will tell him how to correct it if he can, while the cracker will modify or destroy the files.
     
  17. AntonK Technomage Registered Senior Member

    Messages:
    1,083
    Whitewolf,

    I am replying because of one simple fact. You HAVE to know that what you want to do is wrong. Mailboxes are private. They have security on them, and what you're talking about could lead to jail time. It may seem harmless, but not to the companies that provide the security and pride themselves on keeping client's information safe.

    -AntonK
     
  18. Kane Registered Member

    Messages:
    18
    You can get in trouble for that stuff!? Crap. I got to go...
     
  19. Specialist Registered Senior Member

    Messages:
    46
    lol I just caught a hacker from Malaysia trying to hack me

    Please Register or Log in to view the hidden image!

    hehe norton screw him good though

    Please Register or Log in to view the hidden image!



    Now I traced his ass

    inetnum: 219.94.0.0 - 219.94.127.255
    netname: TMNET
    descr: TMNET, TELEKOM MALAYSIA BERHAD,
    descr: INTERNET SERVICE PROVIDER, MALAYSIA
    country: MY
    admin-c: AS115-AP
    admin-c: EU3-AP
    admin-c: SM135-AP
    admin-c: SS456-AP
    tech-c: AS115-AP
    tech-c: EU3-AP
    tech-c: SM135-AP
    tech-c: SS456-AP
    status: ALLOCATED PORTABLE
    changed: hm-changed@apnic.net 20021111
    mnt-by: APNIC-HM
    mnt-lower: TM-NET-AP
    source: APNIC

    What a wonderful world we live in

    Please Register or Log in to view the hidden image!

     
  20. AntonK Technomage Registered Senior Member

    Messages:
    1,083
    How do you know he was trying to hack? What did he do? Ever setup any honeypots for people like him?

    -AntonK
     
  21. prozak Banned Banned

    Messages:
    782
    Terms are changed by the media. Same way the term "thrash" originally never had anything to do with suburbanites like Metallica, Testament, Megadeth, etc.

    Hacking to me has always meant the science of working directly with the machine, so for the most part I support whatshisname's definitions.
     
  22. GRO$$ Registered Senior Member

    Messages:
    304
    2 things

    "silly stuff like DDoS attacks"
    - Mystech

    And Specialist, why in G-d's name is some Malaysian criminal trying to get into your computer? No, seriously... why? Please answer

    Please Register or Log in to view the hidden image!

     
  23. Specialist Registered Senior Member

    Messages:
    46
    Re: 2 things

    Maybe he's scanning for a trojan horse?
     
Thread Status:
Not open for further replies.

Share This Page