Thread: an intersting arguement

  1. #31
    >>you're all wrong, how about that? (yes iain...you're wrong!
    hmm, it was me who posted that


    >>Just about every true whitehat hacker will tell you a cardinal rule is to NEVER, EVER, EVERRRR break into a system without permission
    like I said before: If you're allowed to try and get in that is fine, if the admin says you can try, go a head and have fun. But if the admin doesn't want that: stay out, don't try.

    >>first you'll probably want to send an email to the admin of the system warning him of the flaw. If he gives you the go-ahead to check it out, then delve on.
    How many times will that happen. What kind of admin will let an unknow person on the internet check out an fault in his security

    >>Pretty simple stuff. Also, who's so stupid as to even attempt cracking into a bank and then publish, to the admin, from your own email address, what you've done
    He didn't mailed it with his own address. If I remember correctly, it lasted a few weeks before they could catch him

    >>Black-hat = evil, illegal, malicious hacker (as seen in the movies).
    I liked hackers.
    ...
    ...
    No sorry, I liked Angelina Jolie in Hackers

  2. #32
    Hamster without a wheel iain's Avatar
    Join Date
    Aug 2001
    Posts
    1,385
    fair enough, i just dont see the harm of someone just looking and not touching.
    Monday - what a way to spend a seventh of your life

  3. #33
    >>>>you're all wrong, how about that? (yes iain...you're wrong!
    Actiualy that was not me who posted that sentence, it was KEN, but I think what he ment was:
    you're all wrong, how about that? (yes maes...you're wrong!
    Right ?
    the reason why I think that is because he quoted me and have put that sentence under it, so I think it was ment(sp?) for me
    But he has deleted it know so it doesn't matter any more. So iain, it wasn't me who said that and I doubt it was ment for you because you and Ken seems to having the same points of view

  4. #34
    Hamster without a wheel iain's Avatar
    Join Date
    Aug 2001
    Posts
    1,385
    hmm, an interesting, intelligent and refreshing view expressed by "da-l33t-won". read it, its well worth it.
    security forum at www.forums.iainpb.com
    Monday - what a way to spend a seventh of your life

  5. #35
    Mayor of Awesometown Govtcheez's Avatar
    Join Date
    Aug 2001
    Location
    MI
    Posts
    8,823
    I can kinda understand not being mad about being hacked non-destructively, but - wouldn't you be a little mad if you found someone poking around on your computer, even if they didn't hurt anything?

  6. #36
    train spotter
    Join Date
    Aug 2001
    Location
    near a computer
    Posts
    3,868
    My computer is like my house. You try to come in without my permission and I will use all my ability to keep you out, or track you down and go crazy ape s*** bonkers at your ISP.

    Hackers don't only go where allowed. The whole point is to be able to go where others can't.

    If you have a DSL/cable look at you firewall report. Bet you have been sniffed in the last hour.

    >>youd need Unix (preferably with Root access),

    Or XP, both have raw sockets with root access. Both can launch SYN attacks without third party drivers. (unfilterable high speed floods attacks)
    "Man alone suffers so excruciatingly in the world that he was compelled to invent laughter."
    Friedrich Nietzsche

    "I spent a lot of my money on booze, birds and fast cars......the rest I squandered."
    George Best

    "If you are going through hell....keep going."
    Winston Churchill

  7. #37
    left crog... back when? incognito's Avatar
    Join Date
    Oct 2001
    Posts
    1,427
    Ok, I don't really know what you're talking about but, you said something about XP, and I just got that myself, so is XP easier to hack or easier to hack from than any other Windows before it?
    There are some real morons in this world please do not become one of them, do not become a victim of moronitis. PROGRAMMING IS THE FUTURE...THE FUTURE IS NOW!!!!!!!!!

    "...The only real game I thank in the world is baseball..." --Babe Ruth

    "Life is beautiful"-Don Corleone right before he died.

    "The expert on anything was once a beginner" -Baseball poster I own.


    Left cprog on 1-3-2005. Don't know when I am coming back. Thanks to those who helped me over the years.

  8. #38
    train spotter
    Join Date
    Aug 2001
    Location
    near a computer
    Posts
    3,868
    Yes.

    To keep it backward compatible M$ decided to include raw sockets (without Win2000 priveliges to stop all apps gettting root access). In other words an system where the Admin is not present to restrict a programs ability to manipulate data or the OS.

    Raw sockets can use the IP layer bypassing the TCP shell.
    When your computer wants to establish a connection thru a port, you send a SYN packet, the server responds with an ACK+SYN and you return them to finalise the connection.

    Now you can send the smaller SYN packet, spoof the IP and at the other end the computer is sending both SYN and ACK packets that it will have to wait for them to run out of TTL (time to live). As it has to send more than you, and wait for your response to its ACK, you can easily flood it off the net. Not possible as far as I know to filter them out as you would a DDoS / DoS, especially as you can easily change the spoofed IP.

    IP spoofing is possible but harder under Win2000 (though there are skripts available).
    "Man alone suffers so excruciatingly in the world that he was compelled to invent laughter."
    Friedrich Nietzsche

    "I spent a lot of my money on booze, birds and fast cars......the rest I squandered."
    George Best

    "If you are going through hell....keep going."
    Winston Churchill

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. How to use void* as an arguement?
    By Kleid-0 in forum C Programming
    Replies: 9
    Last Post: 11-25-2010, 11:29 PM
  2. Template arguement probelm.
    By King Mir in forum C++ Programming
    Replies: 8
    Last Post: 09-12-2007, 02:18 PM
  3. FILE pointer as arguement?
    By darsunt in forum C Programming
    Replies: 19
    Last Post: 06-29-2006, 07:51 PM
  4. passing a vector as an arguement
    By gL_nEwB in forum C++ Programming
    Replies: 7
    Last Post: 05-13-2006, 10:11 PM
  5. function call as a 'case' arguement
    By rc7j in forum C Programming
    Replies: 2
    Last Post: 02-17-2002, 08:09 PM