-
August 30th, 2010, 02:44 PM
#11
Originally Posted by JPnyc
This isn't a hacker site, per se, so we don't permit open discussion of hacking techniques except as they apply to their prevention. It's a security site.
This is why we can't have nice things.
Real security doesn't come with an installer.
-
August 30th, 2010, 03:11 PM
#12
Can you guys teach me to hack the Gibson??
\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"
-HST
-
August 30th, 2010, 03:22 PM
#13
The number of attackers has no direct effect on the amount of time it takes to penetrate. It's not like moving a heavy object where adding people is going to directly affect the physics of it. It's a poker game. It's a guided game of chance.
The machine is either secure, or it isn't.
Real security doesn't come with an installer.
-
August 30th, 2010, 03:23 PM
#14
Originally Posted by westin
Can you guys teach me to hack the Gibson??
You should sneak in through the backdoor, go for the garbage file.
Real security doesn't come with an installer.
-
August 30th, 2010, 03:44 PM
#15
Originally Posted by D0pp139an93r
You should sneak in through the backdoor, go for the garbage file.
but but but i need a pretty gui app i can run in windows that i can just point my mouse n click buttons.
i don't want to read up no unix manual gimme gimme gimme..
the days of dumpster diving / social engineering finding holes in the target and doing a precission "Cracking" and then slipping away in the darkness of night are long lost arts. the youth of today just want it all now now now. Who cares if they make a ton of network noise doing loud as heck scans.
-
August 30th, 2010, 03:46 PM
#16
Originally Posted by HYBR|D
but but but i need a pretty gui app i can run in windows that i can just point my mouse n click buttons.
i don't want to read up no unix manual gimme gimme gimme..
the days of dumpster diving / social engineering finding holes in the target and doing a precission "Cracking" and then slipping away in the darkness of night are long lost arts. the youth of today just want it all now now now. Who cares if they make a ton of network noise doing loud as heck scans.
You should code a GUI in Visual Basic, just like CSI.
Real security doesn't come with an installer.
-
September 1st, 2010, 01:40 AM
#17
Sorry Joe but I'm gonna have to agree on a little less strictness too with a very valid reason:
You never hire cops to show you how to break into a house to make a better lock, you hire a dirty rotten son of a bitch to do it right.
Thanks Captain Zap!
Anyway, I personally don't think there is an issue talking, discussing, or talking about, how to break into something, to better understand it. That curiosity is how most of us started, and most of the big companies today were founded by kids in a garage with this mentality. Even Apple (Steve Wozniak has my vote for greatest Hacker ever as he can design both hardware and software, and make it actually work, even down to the paper and pencil level) but either way, as long as there is a reason other than "I are teh Haxxor, I are rooting Hotmail" I don't think it's much of an issue.
-
September 3rd, 2010, 05:47 PM
#18
Well, I don't have any problems with this particular thread, as it is about the logistics of hacking, rather than how to do it.
I would also comment that intel would play a part...................the more you know about a system, then the fewer people you would need as you would know what wasn't worth trying? On the other hand, if you know pretty much nothing about the system, more people would let you try more possibilities in a shorter space of time.
As has already been mentioned, the more people you have the greater the need for project management so they are all working as a team, and cohesively.
The number of attackers has no direct effect on the amount of time it takes to penetrate. It's not like moving a heavy object where adding people is going to directly affect the physics of it.
Yes, I think that pretty soon you would hit "The Law of Diminishing Returns" ....basically you probe the system and look to see what the response is before making your next move.............that would be very difficult to control with too many people working on it.
Similar Threads
-
By cheyenne1212 in forum Miscellaneous Security Discussions
Replies: 7
Last Post: February 1st, 2012, 02:51 PM
-
By E5C4P3 in forum AntiOnline's General Chit Chat
Replies: 33
Last Post: January 17th, 2008, 12:40 AM
-
By souleman in forum AntiOnline's General Chit Chat
Replies: 7
Last Post: June 2nd, 2003, 08:29 AM
-
By Noble Hamlet in forum AntiOnline's General Chit Chat
Replies: 1100
Last Post: March 17th, 2002, 09:38 AM
-
By Ennis in forum Non-Security Archives
Replies: 12
Last Post: November 4th, 2001, 05:25 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|