Jacking In
Page 1 of 3 123 LastLast
Results 1 to 10 of 24

Thread: Jacking In

  1. #1
    Junior Member
    Join Date
    Jul 2004
    Posts
    22

    Question Jacking In

    I've often heard people saying that hackers never hack using their home pcs and they use Laptops to go online.In the movie "hackers" the hero uses a booth phone to get connected.What are the different ways that a hacker can jack in?

  2. #2
    Just Another Geek
    Join Date
    Jul 2002
    Location
    Rotterdam, Netherlands
    Posts
    3,401
    Mobile (pre-paid) phones, open wi-fi networks, 0wn3d boxes, proxy chains, anything you can think of that will make it harder to trace them.
    Oliver's Law:
    Experience is something you don't get until just after you need it.

  3. #3
    Junior Member
    Join Date
    Jul 2004
    Posts
    22
    You mentioned about proxy chains...what are they ?.Is there any site which gives detailed information regarding this ???

  4. #4
    Just Another Geek
    Join Date
    Jul 2002
    Location
    Rotterdam, Netherlands
    Posts
    3,401
    Originally posted here by Alterk0de
    You mentioned about proxy chains...what are they ?.Is there any site which gives detailed information regarding this ???
    A proxychain is a chain of proxies (Duh! )

    PC>----[proxy1]---->[proxy2]----->[proxy3]--->[proxy4]---->[website]

    The website only "sees" the IP address of proxy4. So if a LEA wants to know who it was they'll have to confiscate the logs from proxy4 only to find out it logged the address of proxy3. They'll confiscate the logs from proxy3 which only contains the ip address of proxy2...... etc.

    You can imagine how difficult it gets when these proxies are scattered all over the world. Every country has it's own laws (or lack thereof) about computercrimes so it'll take forever to trace (if they're able to do it in the first place).
    Oliver's Law:
    Experience is something you don't get until just after you need it.

  5. #5
    Senior Member
    Join Date
    Jul 2003
    Posts
    634
    in hackers the punk using the phone box spliced into the phone line and connected his modem to that, Its been a while since ive seen it, and ive never properly watched it but he might of been using an acoustic coupler..basically if you imagine picking up your phone when your on dial up and holding it to another phone then it uses that other phone. acoustic couplers were used in the begining on the net, you see one used in wargames also where he places the phone in a holder.

    he could also of been blueboxing to get the free call.

    i2c

  6. #6
    Senior Member
    Join Date
    Nov 2001
    Posts
    4,786
    empty factories and apartment building usually have some live connection along with a collection of winos and crack addicts.

    in 'hackers' they used a public phone in the middle of china town something you couldn't pull off today. i think a large number of skiddies use boxs of regular people they hi-jack. usually no logs are keep to point back to them so it doesn't matter wether they are home or not after they own them.

    while its true the last proxy can only see the one before it, the first can see the whole chain in the request.
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

  7. #7
    BANNED
    Join Date
    Nov 2003
    Location
    San Diego
    Posts
    724
    And it's so easy to get a wireless connection in any big city now. If you've got a laptop just buy a wireless card and you can just walk around to get a decent signal.
    When death sleeps it dreams of you...

  8. #8
    Banned
    Join Date
    Jul 2004
    Posts
    297
    You can also get a paid for connection(cash) in a lot of coffee shops, no ID no hassles, with a any type of wireless capible device. For a laptop I wonder if they care if someones spoofing their MAC or even have a clue to what secuirty is in general.

  9. #9
    Senior Member
    Join Date
    May 2004
    Posts
    519
    Lets not forget physical security. if they have physical access to the machine .. thats one way ofter overlooked too

  10. #10
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897
    Using University or Library computers are also popular, have boot disk will travel.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •