|
Hacker
Feb 11, 2007 19:17:56 GMT -5
Post by Nicky Peter Hollyoake on Feb 11, 2007 19:17:56 GMT -5
Does anyone here know how to hack? (Lol don't worry I don't want anyone to do anything for me, i'm just wondering if theres anyone here interested in hacking).
|
|
|
Hacker
Feb 11, 2007 19:30:58 GMT -5
Post by Pizzasgood on Feb 11, 2007 19:30:58 GMT -5
Yep. It's really easy. You take an ax, go to a tree, and start swinging. Swords against people also work, but that's too bloody for my tastes....
|
|
|
Hacker
Feb 11, 2007 19:32:18 GMT -5
Post by matthew on Feb 11, 2007 19:32:18 GMT -5
If you're really interested in hacking you should try and find some books on the subject.
|
|
|
Hacker
Feb 11, 2007 19:48:32 GMT -5
Post by davy on Feb 11, 2007 19:48:32 GMT -5
The definition of "hacking" is broad... So much that any programmer is essentially a "hacker"
If you mean illegal/malicious/intrusive code... Then learn assembly and C to the bone, but don't go around asking people about it... If that IS what you mean, then you are saying "hey, do you know how to commit this crime? Wanna help me..."
|
|
|
Hacker
Feb 12, 2007 1:11:25 GMT -5
Post by xenovacivus on Feb 12, 2007 1:11:25 GMT -5
Actually, you can use just about any mainstream language as long as it gives you access to files and the network.
I wrote a client/server app using microsoft visual c# that allowed you to add/remove/run files on a remote computer connected via LAN. The obvious drawback is the client part must be installed on the remote computer, but in domains with roaming profiles this poses no problem if you have a login name and password. Simply log on, install the program and modify the registry to run the program on startup, then log off. The next time somebody logs onto the computer the program starts and (if I wrote it to do so) it could install a copy of itself in thier My Documents folder (which is actually a network share that doesn't get deleted) as well as a script that runs the program every time they log on. So every time they log onto another computer, the program installs itself. And every time somebody logs onto a computer with the program installed, it copies itself to thier profile. Soon every computer runs the program, and all somebody has to do is run the server part and get access to every file everybody has in the network.
There are also programs out there that can do stuff like intercept wireless logon information, then pretend to be a ligitimate computer (even if MAC address filtering and stuff is enabled) and connect to the wireless router and change passwords and security.
But this stuff is like walking into somebody's house just because they leave a door or window unlocked. You don't go around doing it just because you can, and it's obviously ethically and morally wrong. Anybody with enough brains to figure out how to hack into a system should also have enough to realize there's no need to. I think most of the people who use hacking programs aren't the ones that coded them.
Real world hacking is nowhere near as cool as movies portray it to be (for instance, the anime "Battle Programmer Shirase"). You can't get free cell service by sending a certain frequency through the microphone, you can't blow up somebody's computer from halfway around the world (unless it's a macintosh, which blow up all by themselves), and you cant wire tons of money into your bank account or clear your driving record at DMV. (actually, the last two may be possible if you knew enough about the systems, but they the feds would prolly shoot you).
|
|
stu
Posts a bit
Posts: 150
|
Hacker
Feb 12, 2007 1:34:34 GMT -5
Post by stu on Feb 12, 2007 1:34:34 GMT -5
[...]you can't blow up somebody's computer from halfway around the world (unless it's a macintosh, which blow up all by themselves)[...] Ha, I thought it was just me with exploding Macs.
|
|
|
Hacker
Feb 12, 2007 1:50:03 GMT -5
Post by xenovacivus on Feb 12, 2007 1:50:03 GMT -5
nope. established fact.
|
|
|
Hacker
Feb 12, 2007 4:16:12 GMT -5
Post by STT on Feb 12, 2007 4:16:12 GMT -5
I must say that dells are more prone to A Splode
|
|
|
Hacker
Jun 29, 2007 4:51:12 GMT -5
Post by nerd321 on Jun 29, 2007 4:51:12 GMT -5
If the computer your on blocks out certain sites, with certain tags, (parental block or something) then you just need to follow the 3 steps listed below.... 1. Download the page as HTML ONLY 2. Open it with Notepad 3. Backspace ALL of the META TAGS
-after you do this (and save it), the next time you click on it, it should open the page...
|
|
|
Hacker
Jun 29, 2007 9:34:34 GMT -5
Post by James :) (aka Madcow) on Jun 29, 2007 9:34:34 GMT -5
If the computer your on blocks out certain sites, with certain tags, (parental block or something) then you just need to follow the 3 steps listed below.... 1. Download the page as HTML ONLY 2. Open it with Notepad 3. Backspace ALL of the META TAGS -after you do this (and save it), the next time you click on it, it should open the page... with some blockers you download the "your blocked page" rather than the blocked page itself. if thats the case then use a proxy server
|
|
|
Hacker
Jun 29, 2007 9:44:00 GMT -5
Post by Supermonkey on Jun 29, 2007 9:44:00 GMT -5
I wonder what sites you were trying to access
|
|
|
Hacker
Jun 29, 2007 12:25:59 GMT -5
Post by davy on Jun 29, 2007 12:25:59 GMT -5
I wonder what sites you were trying to access lol
|
|
|
Hacker
Jun 29, 2007 18:13:43 GMT -5
Post by nerd321 on Jun 29, 2007 18:13:43 GMT -5
you download the ACTUAL page on a different computer that doesent block it...... -and this is not for me, this is just for those of you who find it useful....
|
|
|
Hacker
Jul 10, 2007 10:07:51 GMT -5
Post by STT on Jul 10, 2007 10:07:51 GMT -5
Wouldn't it be easier to use a proxy site?
|
|
|
Hacker
Jul 10, 2007 13:13:26 GMT -5
Post by johnwedd on Jul 10, 2007 13:13:26 GMT -5
indeed, even more so to use a seperate DNS, but not to many people know or have the admin rights to do so. opendns.org isgood tho, even if its not for porn.
|
|