How do I hack Hotmail, AOL etc? - Page 2
Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 34

Thread: How do I hack Hotmail, AOL etc?

  1. #11
    Regal Making Handler
    Join Date
    Jun 2002
    Posts
    1,668
    But then they revert to in clear transmission of the mail itself so I can sniff it and read their mail right.... Stalking anyone.
    This is where, I new you would be going
    What happens if a big asteroid hits the Earth? Judging from realistic simulations involving a sledge hammer and a common laboratory frog, we can assume it will be pretty bad. - Dave Barry

  2. #12
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    Ok, this is what I have written to my users:-

    For those of you that live and/or work in Oakland County this is a warning. It is long but you really do need to read it and understand it’s implications.

    Wireless Oakland – that brilliant idea by a computer illiterate politician and his less than security minded IT advisors to make him look good and “trendy” – is piloting in areas of Oakland County. This has serious security implications for both home users and businesses. I have argued at length with one of it’s proponents, a local councilman, and it is clear that, no matter what security minded IT professionals say to him he doesn’t care about the havoc his “baby” will potentially wreak on the taxpayers of Oakland County. But enough of my vehement opposition to this entire project, you all need to be aware of the threat to your privacy and personal security.

    What Wireless Oakland will do is to cover all of Oakland County with a wireless internet access “cloud” for public use. This means that anyone living in or just driving through Oakland County can connect to the internet while they are within the “cloud”. The big issue is that because the “cloud” is public they cannot place any kind of security such as encrypted connections because it would be pointless – everyone would have to know the key so there is no point issuing one. This means that unless individuals protect themselves appropriately online while connected through the “cloud” they will be vulnerable to numerous forms of attack on their privacy. Without proper care this lack of privacy could escalate into more serious issues such as stalking and the resulting potential for physical harm. I’m not simply being a scare-monger here, believe me, I can see a huge potential for “cyber stalking” with very little skill required on the part of a perpetrator which would be very difficult for the police to determine the occurrence of and even more difficult for them to prevent. There is also a colossal potential for identity theft – again with very little skill required by the perpetrator.

    Why is this all so easy? Because things in the computer world are simply not set up to be secure when everyone can see the transmission which is what a wireless cloud will do. Many of you use email services such as AOL, Hotmail, Yahoo to send and receive your email. Many of the common web based email services give you that nice “warm, fuzzy” feeling by making you log in via an encrypted login. This is all well and good, (and remember many don’t encrypt the login so anyone could see your login and password and hijack your account at will – the evil minded amongst you can work out where things can go from there), but once you have authenticated to the system they revert to sending your mail backwards and forwards in “clear”. Anyone close by in the wireless “cloud” can see everything you send and receive. Yes, your neighbors, the kid across the street or the guy driving by with malicious intent. The same thing applies to your kids using their favorite Instant Messenger program such as Yahoo, MSN etc. Everything going backwards and forwards can be read by anyone.

    If you chose to use the Wireless Oakland system you need to be aware that you have no privacy or security unless you provide it for yourself. Needless to say, properly securing your transmissions is much more complicated than it sounds and the potential for a mistake is high. Additionally you will need to learn to properly secure your computer itself. If you don’t, or make a mistake, you computer could be accessible to anyone who is close by in the wireless cloud. That means that everything you have on your computer, (personal banking, taxes, letters etc.), could be viewed by anyone who chooses to. I don’t think I need to say more about what can happen with that – but remember that a malicious person may have no interest in your stuff, they may just use your computer to commit crimes elsewhere on the internet. No big deal you think? Visits from the FBI aren’t fun and your kids will complain insistently that you need to go and buy a new computer to replace the one the FBI just impounded.

    The clever ones amongst you might think that they don’t need to worry because you already have your own wireless network so you won’t be using Wireless Oakland. Wrong! Fifty percent of you are already vulnerable to a small scale version of the other threats because you haven’t secured your wireless network. But it gets worse… Many computer systems that are “wireless aware” will connect to any network available. Whether you secured your wireless network or not if the Wireless Oakland antennas, (pots), are close enough to your house they will become the primary signal and the risk is high that your computer will automatically connect to the insecure Wireless Oakland network exposing you to all the threats. Even if it doesn’t automatically connect to Wireless Oakland there will come a day when your personal network fails and one of your kids will be presented with the choice of connecting to “an available network”…. They will and from then on everything the family does will become public again until you notice, (if you ever do).

    The cleverer still will think that you are using wired connections only. Congratulations, that’s the safest way. But when you buy your college kid that spiffy new laptop that is “wireless aware” and tell them they must only connect by using the wired connection just be aware that you should probably make sure they disable the built in wireless device or you could be providing a conduit for anyone to enter your “secure” network.

    Businesses and home users could also fall victim to malicious persons hijacking an initial wireless connection and providing fake login screens for things in order to harvest login credentials of users. Especially for businesses with mobile users with newer laptops this is of great concern because these laptops are usually “wireless aware”.

    Then, even if you have everything right what happens when Wireless Oakland’s wireless cloud interferes with your private “cloud” to the point where it makes your network unusable? Do you know how to change channels on your network so you can use it again? I didn’t think so. So all that money and time you spent purchasing and setting up your private network will now involve more cost or be worthless because I can assure you Wireless Oakland isn’t going to change channels for you.

    If Wireless Oakland puts one of it’s pots on your neighbors roof changing channels may not be possible because their pots will have to be quite a bit more powerful than yours and this will make your network unusable and un-fixable. Lot’s of people will be affected by this because wireless Oakland will need a lot of pots because the signals generated by the wireless cards in your computers have a limited range so they need to have every square inch of Oakland County covered by their pots.

    This is a serious situation. The tools required to carry out the malicious acts are publicly available on the internet, free and very easy to use. Anyone can use them. There are a myriad of ways this system can be exploited. You can rest assured that there are many who will be out to exploit them.

    Lastly, the company that won the contract is called Michtel. Michtel is a previously bankrupt company, (Michtel Inc.), owned by Netcom LLC. Interestingly enough Michtel has had an operating annual budget that is a mere fraction of what will be required to run Wireless Oakland. They admit to having a larger backer but, for some reason, they will not reveal the identity of that backer. Think about the possibilities of someone who is less than ethical watching everything you do.

    The seven pilot projects are located in the communities of Royal Oak, Pontiac, Troy, Birmingham, Madison Heights, Oak Park, and Wixom.
    Feel free to use it if you live or work in Oakland County and feel you can use it to warn others.
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  3. #13
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,250
    OK. Let me play the not so informed user.

    Why do I need to worry about the security? I don't care if anyone can see who and what I am doing on IM. I only talk to my friends at school and my parents. There is nothing personal there, right?

    I use on line banking and that's secure. I always check to see if the site cert is valid, my bank rep. told me how to check and what to look for.

    I don't care if someone knows what web sites I visit.

    I use windows xp and it has a firewall and is always updated.

    Tiger, my point is you might be going about this the wrong way. How many times has a user told you that they have no personal information on their computer, just to find that IE is holding their usernames and passwords to their bank site and credit card info? When you explained the problem with having IE hold that information, did you get the glazed eye effect?

    Perhaps the need to explain why you don't want someone else using your email address is a better approach - Actually I meant additional.

    You're fighting the good fight but I'm afraid those you're trying to help don't understand you're trying to help them.

    Just my take.

    Dino
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  4. #14
    AO BOFH: Luser Abuser BModeratorFH gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    "you computer could be accessible"

    You got a typo .
    Kill the lights, let the candles burn behind the pumpkins’ mischievous grins, and let the skeletons dance. For one thing is certain, The Misfits have returned and once again everyday is Halloween.The Misfits FreeBSD
    Cannibal Holocaust
    SuSE Linux
    Slackware Linux

  5. #15
    AO BOFH: Luser Abuser BModeratorFH gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    "it’s pots on your neighbors roof changing channels may not be possible because their pots will have to be quite a bit more powerful than yours and this will make your network unusable and un-fixable."

    Shouldn't neighbors be neighboors? And shouldn't it have a possesive ' in there?

    You have one here:

    "Lot’s of people"


    "will be affected by this because wireless Oakland will need a lot of pots because the signals generated by the wireless cards in your computers have a limited range so they need to have every square inch of Oakland County covered by their pots. "

    Did it in word huh?
    Kill the lights, let the candles burn behind the pumpkins’ mischievous grins, and let the skeletons dance. For one thing is certain, The Misfits have returned and once again everyday is Halloween.The Misfits FreeBSD
    Cannibal Holocaust
    SuSE Linux
    Slackware Linux

  6. #16
    AO BOFH: Luser Abuser BModeratorFH gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    Ok I just finished reading it. That one sentence towards the end has a LOT of periods... Pun maybe? Anyway this doesn't bother me. If anything I have something to do on Saturday nights now when my friends are working. Buahahaha...... Yea I think I set myself up for you to make an example of me.
    Kill the lights, let the candles burn behind the pumpkins’ mischievous grins, and let the skeletons dance. For one thing is certain, The Misfits have returned and once again everyday is Halloween.The Misfits FreeBSD
    Cannibal Holocaust
    SuSE Linux
    Slackware Linux

  7. #17
    Member
    Join Date
    May 2005
    Posts
    92
    To ensure all areas are covered with signal they have decided to just implement a wireless ap at each of the starbucks in those counties. That should provide solid coverage. [/sarcasm]


    But seriously how did they get this approved? Did they actually bother to let the public know about this idea for a vote or is this more of an action move? I would love to have my city have the ability to fix a lot of other problems before they go into something as luxory as this.
    "Experience is the hardest teacher, it gives the test first and the lesson after." Anonymous

  8. #18
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,190
    Gore! Really old chap, you weren't thinking of changing all their passwords to KurtHack#0 were you?

    Well, after all.............more than 8 characters, upper and lower case, special character and number................they would be bound to be safe?

    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

  9. #19
    Regal Making Handler
    Join Date
    Jun 2002
    Posts
    1,668
    Tiger,
    I appreciate the underlying message you are trying to get across. However, you are pissing in the wind.

    As you no doubt know. The internet was never designed with security in mind. All of your fears are well founded but somewhat dated. Due to the way the internet works. It's possible to carry out all the attacks you are complaining about without wifi. Currently these attacks require a level of knowlege and ability above and beyond what would be normal usage. All wifi will do is highlight the short comings of the internet, as is.

    This must be a good thing, in the long run. As it will surely make the powers that be take note?

    Those that are aware of security will take measures, those that are not will end up getting fecked.Much like the current state of affairs. Just on a bigger scale, perhaps? and maybe on a scale where something will be done to rectify current problem?
    What happens if a big asteroid hits the Earth? Judging from realistic simulations involving a sledge hammer and a common laboratory frog, we can assume it will be pretty bad. - Dave Barry

  10. #20
    Senior Member
    Join Date
    Nov 2005
    Posts
    115
    Unfortunately I think I agree with Jinxy... But one must try to educate... ignorance is expensive!

    I still firmly believe people should have to pass an operators exam and gain a computer licence before embarking on the adventures of touching a keyboard... Let alone wireless!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •