-
August 29th, 2010, 12:50 PM
#1
Junior Member
-
August 29th, 2010, 02:13 PM
#2
Generally ... yes, the more resources you throw at a problem, the greater chance of said problem being resolved faster.
Given, 1) limited bandwidth, you have diminished returns when you go above the amount of traffic that can go through and be processed by said target.
2) coordination is needed, so that you don't have 20% of your work force going after the same exploit ... if it doesn't work from 1 hacker/cracker, then 20 of them doing the same thing isn't very productive
3) surface area increases detection, all hacking activity coming from the same source ip address would easily be picked off, as would other commonly seen forms.. case in point, a port scan. Easy to see 1 ip doing a sequential port scan, easy to detect a bunch of computers taking part in a sequential port scan, but randomize the ports, the sources, and which port is scanned when (non-sequencial order) and the risk of detection decreases.
hence DDoS - distributed denial of service attack - distribute the sources of the attack, and its much harder to curtail the attackers. Applied to hacking/cracking, and you have the same keys..
lastly.. Cost / Effort
Depends.. is this going after a mob stronghold where you could potentially make out with 10s of millions and they wouldn't dare report it, but they'd call for every bounty hunter and "fixer" possible to go after you? or is this for "fun". Many "fun" things can be done cheaply, simply because its there, and amongst yourselves you'd have bragging rights, etc..
Risk often increases with Rewards ... ie, very high risk, usually a high potential for reward ... inverse: High Risk, Greater chance of death from illegal activity
Last edited by TG2; August 29th, 2010 at 02:18 PM.
Reason: answer last part (cost) of question
-
August 29th, 2010, 04:25 PM
#3
Junior Member
imho, since they are on one file (File C), and they all have same skill/expertise, just one hacker is required for this job.
The HackShooter
-
August 30th, 2010, 12:37 AM
#4
Originally Posted by The-Spec
Last edited by HYBR|D; October 14th, 2011 at 04:32 AM.
-
August 30th, 2010, 01:14 AM
#5
Did I just ruin a very serious and technical discussion? My bad...
-
August 30th, 2010, 02:57 AM
#6
Originally Posted by The-Spec
Did I just ruin a very serious and technical discussion? My bad...
What do you know, the sky is still blue, the sun is still yellow, and bears still crap in the woods.
The question is a little flawed to begin with. -- It depends on the type of penetration that you are talking about. If they have different skill sets, then yes, more attackers can sway the outcome.
If one attacker is well versed in physical security, and can get physical access to the system, then firewalls, access controls, etc are moot.
If an attacker is well versed in social engineering, and they can convince the victim to send the file, or open access up to the file, then once again, most barriers will fall.
If you have an attacker that can pay/convince/blackmail an insider into grabbing the info for them... I am sure you can see the point.
So if you have a group that is somewhat diverse, and can brainstorm the best way of getting the intended result, you will have better chances. Though, the more people you have, the more likely it is that someone will talk about it...
\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"
-HST
-
August 30th, 2010, 03:44 AM
#7
Junior Member
thanks guys, this question has already created a huge flame war on a Chinese forum.
you guys answered it, so I'm guessing its the question that's flawed
BTW what sub forum should i post in to discuss hacking tactics and internet warfare?
-
August 30th, 2010, 06:38 AM
#8
This isn't a hacker site, per se, so we don't permit open discussion of hacking techniques except as they apply to their prevention. It's a security site.
-
August 30th, 2010, 08:57 AM
#9
Originally Posted by JPnyc
This isn't a hacker site, per se, so we don't permit open discussion of hacking techniques except as they apply to their prevention. It's a security site.
How can we prevent/defend against techniques that we are not allowed to discuss?
Ubuntu-: Means in African : "Im too dumb to use Slackware"
-
August 30th, 2010, 10:39 AM
#10
Originally Posted by The_tyrant
thanks guys, this question has already created a huge flame war on a Chinese forum.
you guys answered it, so I'm guessing its the question that's flawed
BTW what sub forum should i post in to discuss hacking tactics and internet warfare?
lmao, post this link for us :P
but yeah, depends on the situation i suppose, too much variables here.
edit: im with instronics on ths one , we should be able to chat about it as a security measure, obv keep it legit.
Last edited by Cider; August 30th, 2010 at 10:42 AM.
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
Similar Threads
-
By cheyenne1212 in forum Miscellaneous Security Discussions
Replies: 7
Last Post: February 1st, 2012, 02:51 PM
-
By E5C4P3 in forum AntiOnline's General Chit Chat
Replies: 33
Last Post: January 17th, 2008, 12:40 AM
-
By souleman in forum AntiOnline's General Chit Chat
Replies: 7
Last Post: June 2nd, 2003, 08:29 AM
-
By Noble Hamlet in forum AntiOnline's General Chit Chat
Replies: 1100
Last Post: March 17th, 2002, 09:38 AM
-
By Ennis in forum Non-Security Archives
Replies: 12
Last Post: November 4th, 2001, 05:25 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|