Does the number of hackers increase the success rate or speed?
Page 1 of 2 12 LastLast
Results 1 to 10 of 18

Thread: Does the number of hackers increase the success rate or speed?

  1. #1
    Junior Member
    Join Date
    Aug 2010
    Posts
    16

    Question Does the number of hackers increase the success rate or speed?

    The hypothetical situation:
    X number of hackers are at location A
    these hackers are trying to steal file C off file server B
    A has a fixed bandwidth. Every hacker has his/her own laptop with the required software.
    while server B has an administrator, and all the common security stuff (firewalls, password protection etc)
    My question is: does increasing the number of hackers (X) increase the success rate of stealing file C?
    Can a larger number of hackers get the job done faster?
    Does a larger number of hackers increase the chances of getting caught?
    And last but not least, is it worth the cost and effort of getting are larger number of hackers verses a smaller number of hackers? (Assume the skill level of the hackers are the same)

  2. #2
    Member
    Join Date
    Jul 2009
    Posts
    45
    Generally ... yes, the more resources you throw at a problem, the greater chance of said problem being resolved faster.

    Given, 1) limited bandwidth, you have diminished returns when you go above the amount of traffic that can go through and be processed by said target.
    2) coordination is needed, so that you don't have 20% of your work force going after the same exploit ... if it doesn't work from 1 hacker/cracker, then 20 of them doing the same thing isn't very productive
    3) surface area increases detection, all hacking activity coming from the same source ip address would easily be picked off, as would other commonly seen forms.. case in point, a port scan. Easy to see 1 ip doing a sequential port scan, easy to detect a bunch of computers taking part in a sequential port scan, but randomize the ports, the sources, and which port is scanned when (non-sequencial order) and the risk of detection decreases.

    hence DDoS - distributed denial of service attack - distribute the sources of the attack, and its much harder to curtail the attackers. Applied to hacking/cracking, and you have the same keys..

    lastly.. Cost / Effort
    Depends.. is this going after a mob stronghold where you could potentially make out with 10s of millions and they wouldn't dare report it, but they'd call for every bounty hunter and "fixer" possible to go after you? or is this for "fun". Many "fun" things can be done cheaply, simply because its there, and amongst yourselves you'd have bragging rights, etc..

    Risk often increases with Rewards ... ie, very high risk, usually a high potential for reward ... inverse: High Risk, Greater chance of death from illegal activity
    Last edited by TG2; August 29th, 2010 at 02:18 PM. Reason: answer last part (cost) of question

  3. #3
    Junior Member HackGenie's Avatar
    Join Date
    Jun 2008
    Posts
    5
    imho, since they are on one file (File C), and they all have same skill/expertise, just one hacker is required for this job.
    The HackShooter

  4. #4
    HYBR|D
    Guest
    Quote Originally Posted by The-Spec View Post
    http://Dur.Hur.on.nimp.org/ <-- Im pretty sure the answer is in here

    Last edited by HYBR|D; October 14th, 2011 at 04:32 AM.

  5. #5
    Banned
    Join Date
    Jan 2008
    Posts
    605
    Did I just ruin a very serious and technical discussion? My bad...

  6. #6
    Gonzo District BOFH westin's Avatar
    Join Date
    Jan 2006
    Location
    SW MO
    Posts
    1,188
    Quote Originally Posted by The-Spec View Post
    Did I just ruin a very serious and technical discussion? My bad...
    What do you know, the sky is still blue, the sun is still yellow, and bears still crap in the woods.

    The question is a little flawed to begin with. -- It depends on the type of penetration that you are talking about. If they have different skill sets, then yes, more attackers can sway the outcome.

    If one attacker is well versed in physical security, and can get physical access to the system, then firewalls, access controls, etc are moot.

    If an attacker is well versed in social engineering, and they can convince the victim to send the file, or open access up to the file, then once again, most barriers will fall.

    If you have an attacker that can pay/convince/blackmail an insider into grabbing the info for them... I am sure you can see the point.

    So if you have a group that is somewhat diverse, and can brainstorm the best way of getting the intended result, you will have better chances. Though, the more people you have, the more likely it is that someone will talk about it...
    \"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"

    -HST

  7. #7
    Junior Member
    Join Date
    Aug 2010
    Posts
    16
    thanks guys, this question has already created a huge flame war on a Chinese forum.
    you guys answered it, so I'm guessing its the question that's flawed
    BTW what sub forum should i post in to discuss hacking tactics and internet warfare?

  8. #8
    Senior Member JPnyc's Avatar
    Join Date
    Jan 2005
    Posts
    2,734
    This isn't a hacker site, per se, so we don't permit open discussion of hacking techniques except as they apply to their prevention. It's a security site.

  9. #9
    Antionline's Security Dude instronics's Avatar
    Join Date
    Dec 2002
    Posts
    901
    Quote Originally Posted by JPnyc View Post
    This isn't a hacker site, per se, so we don't permit open discussion of hacking techniques except as they apply to their prevention. It's a security site.
    How can we prevent/defend against techniques that we are not allowed to discuss?
    Ubuntu-: Means in African : "Im too dumb to use Slackware"

  10. #10
    Only african to own a PC! Cider's Avatar
    Join Date
    Jun 2003
    Location
    Israel
    Posts
    1,683
    Quote Originally Posted by The_tyrant View Post
    thanks guys, this question has already created a huge flame war on a Chinese forum.
    you guys answered it, so I'm guessing its the question that's flawed
    BTW what sub forum should i post in to discuss hacking tactics and internet warfare?
    lmao, post this link for us :P

    but yeah, depends on the situation i suppose, too much variables here.

    edit: im with instronics on ths one , we should be able to chat about it as a security measure, obv keep it legit.
    Last edited by Cider; August 30th, 2010 at 10:42 AM.
    The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
    Albert Einstein

Similar Threads

  1. Windows Error Messages
    By cheyenne1212 in forum Miscellaneous Security Discussions
    Replies: 7
    Last Post: February 1st, 2012, 01:51 PM
  2. Ethical Hacking!
    By E5C4P3 in forum AntiOnline's General Chit Chat
    Replies: 33
    Last Post: January 16th, 2008, 11:40 PM
  3. History of Hacking
    By souleman in forum AntiOnline's General Chit Chat
    Replies: 7
    Last Post: June 2nd, 2003, 08:29 AM
  4. The Worlds Longest Thread!
    By Noble Hamlet in forum AntiOnline's General Chit Chat
    Replies: 1100
    Last Post: March 17th, 2002, 08:38 AM
  5. Understanding hackers
    By Ennis in forum Non-Security Archives
    Replies: 12
    Last Post: November 4th, 2001, 04:25 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides