Page 3 of 3 FirstFirst 123
Results 21 to 30 of 30

Thread: How hackers pick their victem

  1. #21
    Junior Member
    Join Date
    Sep 2003
    Posts
    4
    Alot of time a "hacker" will pick a very specific target, such as someone who has gotten on their bad side or that might have a secrect that they want to know. Another reason is payment many "hackers" do assignments for some sort of payment, the lets say "consumer" might have a certain victim in mind but not know what they are doing so they will hire someone with a little more knowledge to do the job for them.
    Hate or Be Hated ; )

  2. #22
    Senior Member
    Join Date
    Mar 2003
    Posts
    301
    Ive got a couple links you might want to look at.
    http://www.linuxvoodoo.com/resources/security/enemy/
    http://www.linuxvoodoo.com/resources/security/motives/

    These two papers go into a bit of detail on script kiddies and how they pick their victims as well as helping to protect yourself from them. You can see all of the papers in the series named "Know Your Enemy" here http://www.linuxvoodoo.com/resources/security/

    PeacE
    -BoB
    #!/usr/local/bin/perl -s-- -export-a-crypto-system-sig -RSA-in-3-lines-PERL
    ($k,$n)=@ARGV;$m=unpack(H.$w,$m.\"\\0\"x$w),$_=`echo \"16do$w 2+4Oi0$d*-^1[d2%
    Sa2/d0<X+d*La1=z\\U$n%0]SX$k\"[$m*]\\EszlXx++p|dc`,s/^.|\\W//g,print pack(\'H*\'
    ,$_)while read(STDIN,$m,($w=2*$d-1+length($n||die\"$0 [-d] k n\\n\")&~1)/2)

  3. #23
    Senior Member
    Join Date
    Oct 2002
    Posts
    141
    The Community isn't like that anymore, and I have never seen it while it is. If you claim to have done something cool, then people dont believe you, and if you prove it the "authorities" get ya. Either way you dont really win. Why not do it, if at all, just to learn and not to brag at all?
    Did curiousity really kill the cat, or is that just what they want you to think?

  4. #24
    Senior Member
    Join Date
    Jun 2003
    Posts
    219
    mostly crackers are teenagers on an average... n most of them either have a purpose, or just wanna check their knowledge... most of them just do "hacking", "script-kidding" etc. for bragging....
    Now is the moment, or NEVER!!!

  5. #25
    Originally posted here by NorthernLytes
    no real hacker is going to go into someone computer and hack them. Thats for crackers or "script kiddys" that like to do malicious things and destroy easy targets, they have no idea of a challenge. they take the easy way instead of finding something to aquire knowledge from.
    That would depend on how easy it would be for them.. human nature rules the land. Even a pro will take a shortcut to get home or win a race. They start out curious and then it becomes a disease to them and they can not stop, the key to their success is their ability to retain knowledge. Anyone can learn anything they want... but can they retain it and retrieve it at will.

    Should have a new cate called leakers LoL for the 1's 2 dumb to retain the power. They do try and and they even find the answers but in the end they are not capable of retaining the amount of information needed to draw a target in the right place from the sky... (jk) only a few will understand that last part.

  6. #26
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    Originally posted here by thehorse13
    Just to bring everyone up to speed, the "politically correct" term to use these days is, "attacker".



    Also, attackers' motivation will be different from case to case but there are a few major categories as I see it (and those at Foundstone):

    1) Curiosity
    2) Entertainment
    3) Political Reasons
    4) Desire for info
    5) Thrill of gaining root
    6) Attempt to compromise additional systems.
    7) Trophy hunting to gain status

    -TH13
    Wanted to add a few more to this list:

    8) hacktivism (usually for defacements; supporting a particular cause like Red Cross aid for areas hit by major natural disasters and no one cares; best example: NASA defaced to ask for Red Cross support after India (?) was hit by major earthquake shortly after 9/11)
    9)Mount Everest reason (just because).
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  7. #27
    AntiOnline Senior Member souleman's Avatar
    Join Date
    Oct 2001
    Location
    Flint, MI
    Posts
    2,883
    a cracker is a person that cracks copywrite protection schemes. It has nothin gto do with attacking computers. The correct term is malicious hacker.

    But this is an old discussion and completely pointless.
    \"Ignorance is bliss....
    but only for your enemy\"
    -- souleman

  8. #28
    Ninja Code Monkey
    Join Date
    Nov 2001
    Location
    Washington State
    Posts
    1,027
    To bring up another old discussion that is completely pointless....Souleman is my hero.
    "When I get a little money I buy books; and if any is left I buy food and clothes." - Erasmus
    "There is no programming language, no matter how structured, that will prevent programmers from writing bad programs." - L. Flon
    "Mischief my ass, you are an unethical moron." - chsh
    Blog of X

  9. #29
    Now, RFC Compliant! Noia's Avatar
    Join Date
    Jan 2002
    Posts
    1,210
    I prefere to do all my hacking with a Picaxe!
    With all the subtlety of an artillery barrage / Follow blindly, for the true path is sketchy at best. .:Bring OS X to x86!:.
    Og ingen kan minnast dei linne drag i dronningas andlet den fagre dag Då landet her kvilte i heilag fred og alle hadde kjærleik å elske med.

  10. #30

    Lightbulb Easy Way of finding

    If you wanna know try out the middle east and turkish sites because they are weak in general. The best place to start with is search for turkish and middle east sites from yahoo and apply security checks with nessus to find the holes. Than it is up to you...

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •