-
July 26th, 2004, 01:41 PM
#1
Junior Member
Jacking In
I've often heard people saying that hackers never hack using their home pcs and they use Laptops to go online.In the movie "hackers" the hero uses a booth phone to get connected.What are the different ways that a hacker can jack in?
-
July 26th, 2004, 01:49 PM
#2
Mobile (pre-paid) phones, open wi-fi networks, 0wn3d boxes, proxy chains, anything you can think of that will make it harder to trace them.
Oliver's Law:
Experience is something you don't get until just after you need it.
-
July 26th, 2004, 01:54 PM
#3
Junior Member
You mentioned about proxy chains...what are they ?.Is there any site which gives detailed information regarding this ???
-
July 26th, 2004, 02:00 PM
#4
Originally posted here by Alterk0de
You mentioned about proxy chains...what are they ?.Is there any site which gives detailed information regarding this ???
A proxychain is a chain of proxies (Duh! )
PC>----[proxy1]---->[proxy2]----->[proxy3]--->[proxy4]---->[website]
The website only "sees" the IP address of proxy4. So if a LEA wants to know who it was they'll have to confiscate the logs from proxy4 only to find out it logged the address of proxy3. They'll confiscate the logs from proxy3 which only contains the ip address of proxy2...... etc.
You can imagine how difficult it gets when these proxies are scattered all over the world. Every country has it's own laws (or lack thereof) about computercrimes so it'll take forever to trace (if they're able to do it in the first place).
Oliver's Law:
Experience is something you don't get until just after you need it.
-
July 26th, 2004, 02:12 PM
#5
in hackers the punk using the phone box spliced into the phone line and connected his modem to that, Its been a while since ive seen it, and ive never properly watched it but he might of been using an acoustic coupler..basically if you imagine picking up your phone when your on dial up and holding it to another phone then it uses that other phone. acoustic couplers were used in the begining on the net, you see one used in wargames also where he places the phone in a holder.
he could also of been blueboxing to get the free call.
i2c
-
July 27th, 2004, 01:12 AM
#6
empty factories and apartment building usually have some live connection along with a collection of winos and crack addicts.
in 'hackers' they used a public phone in the middle of china town something you couldn't pull off today. i think a large number of skiddies use boxs of regular people they hi-jack. usually no logs are keep to point back to them so it doesn't matter wether they are home or not after they own them.
while its true the last proxy can only see the one before it, the first can see the whole chain in the request.
Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”
-
July 27th, 2004, 03:33 AM
#7
And it's so easy to get a wireless connection in any big city now. If you've got a laptop just buy a wireless card and you can just walk around to get a decent signal.
When death sleeps it dreams of you...
-
July 27th, 2004, 03:43 AM
#8
You can also get a paid for connection(cash) in a lot of coffee shops, no ID no hassles, with a any type of wireless capible device. For a laptop I wonder if they care if someones spoofing their MAC or even have a clue to what secuirty is in general.
-
July 27th, 2004, 04:21 AM
#9
Lets not forget physical security. if they have physical access to the machine .. thats one way ofter overlooked too
-
July 29th, 2004, 04:52 PM
#10
Using University or Library computers are also popular, have boot disk will travel.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|