• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 15:03
CEST 21:03
KST 04:03
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Code S RO4 & Finals Preview: herO, Rogue, Classic, GuMiho0TL Team Map Contest #5: Presented by Monster Energy4Code S RO8 Preview: herO, Zoun, Bunny, Classic7Code S RO8 Preview: Rogue, GuMiho, Solar, Maru3BGE Stara Zagora 2025: Info & Preview27
Community News
Classic & herO RO8 Interviews: "I think it’s time to teach [Rogue] a lesson."2Rogue & GuMiho RO8 interviews: "Lifting that trophy would be a testament to all I’ve had to overcome over the years and how far I’ve come on this journey.3Code S RO8 Results + RO4 Bracket (2025 Season 2)12BGE Stara Zagora 2025 - Replay Pack2Weekly Cups (June 2-8): herO doubles down1
StarCraft 2
General
Classic & herO RO8 Interviews: "I think it’s time to teach [Rogue] a lesson." Code S RO8 Results + RO4 Bracket (2025 Season 2) Code S RO4 & Finals Preview: herO, Rogue, Classic, GuMiho Rogue & GuMiho RO8 interviews: "Lifting that trophy would be a testament to all I’ve had to overcome over the years and how far I’ve come on this journey. I have an extra ticket to the GSL Ro4/finals
Tourneys
[GSL 2025] Code S: Season 2 - Semi Finals & Finals $3,500 WardiTV European League 2025 Sea Duckling Open (Global, Bronze-Diamond) SOOPer7s Showmatches 2025 RSL: Revival, a new crowdfunded tournament series
Strategy
[G] Darkgrid Layout Simple Questions Simple Answers [G] PvT Cheese: 13 Gate Proxy Robo
Custom Maps
[UMS] Zillion Zerglings
External Content
Mutation # 477 Slow and Steady Mutation # 476 Charnel House Mutation # 475 Hard Target Mutation # 474 Futile Resistance
Brood War
General
ASL20 Preliminary Maps BGH Auto Balance -> http://bghmmr.eu/ Recent recommended BW games BW General Discussion FlaSh Witnesses SCV Pull Off the Impossible vs Shu
Tourneys
[Megathread] Daily Proleagues [BSL 2v2] ProLeague Season 3 - Friday 21:00 CET Small VOD Thread 2.0 [BSL20] ProLeague Bracket Stage - Day 4
Strategy
I am doing this better than progamers do. [G] How to get started on ladder as a new Z player
Other Games
General Games
Path of Exile Nintendo Switch Thread Stormgate/Frost Giant Megathread Beyond All Reason What do you want from future RTS games?
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
Things Aren’t Peaceful in Palestine US Politics Mega-thread UK Politics Mega-thread Russo-Ukrainian War Thread Vape Nation Thread
Fan Clubs
Maru Fan Club Serral Fan Club
Media & Entertainment
Korean Music Discussion [Manga] One Piece
Sports
Formula 1 Discussion 2024 - 2025 Football Thread NHL Playoffs 2024 TeamLiquid Health and Fitness Initiative For 2023
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List
Blogs
A Better Routine For Progame…
TrAiDoS
StarCraft improvement
iopq
Heero Yuy & the Tax…
KrillinFromwales
I was completely wrong ab…
jameswatts
Need Your Help/Advice
Glider
Trip to the Zoo
micronesia
Customize Sidebar...

Website Feedback

Closed Threads



Active: 32192 users

History of Hacking (parts 1, 2 and 3) - Page 2

Forum Index > General Forum
Post a Reply
Prev 1 2 All
AK-Nemesis
Profile Joined December 2002
2005 Posts
May 21 2006 13:27 GMT
#21
thanks ohinsane. i'm interested. more would be great
Nemesis has left the building~
Orome
Profile Blog Joined June 2004
Switzerland11984 Posts
May 21 2006 13:33 GMT
#22
Thx oHinsane I'd be very interested in more information.
On a purely personal note, I'd like to show Yellow the beauty of infinitely repeating Starcraft 2 bunkers. -Boxer
oHInsane
Profile Joined February 2005
France727 Posts
May 21 2006 16:57 GMT
#23
Ok, so i will continue , and thanks for the support, it is always apprecitated

So as i said, to sum up a little bit, the "hacking scene" can be divided into two main streams:

- The "real" hackers: they usually have good/extreme computer knowledge. They can use this knowledge to attack and to make damages on a specific target (black hat hackers) or they can be hekpfull by warning software/network or any companies about some flaws in their product, security softwares etc (white hat hackers)

- The "lamers" who are the source of the majority of the attacks over the Internet. Those guys just use softwares coded by other people to look "cool", "1337" or whatever.
This category is a pure pain as i said. The main reason is that they bring nothing to the "hacking" community. And the second reason is that they give a "bad" image about what hacking is really.

So let's concentrate on the "real hackers". As someone said, some of them are working alone or with a little group and prefer staying "covered" by remainin anonymous. And a part of them releases and shares their discovery.
Those guys are working on different fields (i can just talk here about what i know):

Coding: being able to program is a "must have" tool. Basically, you can't be a hacker if you don't know what programing is. Why ?
Because in order to find a flaw in a software, you should be able to know what is happening in this software and how it works. Under the term "sofware", you can find usual soft like MS WORD, MS OUTLOOK, you can also find websites (which is an intenet program), you can also find Operating System like Windows, Unix (Linux), Solaris , etc... and you can also find network program like Apache. Basically, any services or program can be hacked. So imagine someone wants to hack a website and he knows this website has been built with "phpnuke" (which is program that allow you to make your own website in a short amount of time). The hacker will download "phpnuke" then he will check the source code (how the program is made) to find if there is something that can be a flaw for the website.
There are many possible flaws on a website portal. There are XSS flaws (which allows the hacker to introduce his own code on the website) , SQL Injection (which allows the hacker to interact with all the datas stored on a website like user password, user email and so on) , include flaws (which allows the hacker to execute his own program on the website, for example a program that will erase all the website), etc.... But don't misread me, i don't say every website has flaws, i just say that it is possible to find some of this flaw. You know a website has generally 100.000 + lines of code so it is reasonnable to think that the programmer could have made a little mistake while writing all those lines that would allow someone to find a XSS, a SQL Injection or anything else.

So coding is a key for a programer. As i said, it allows the hackers to understand how his target work, but it also allows a hacker to make his own program. For example, a hacker found a flaw on Windows XP that allows him to reboot the machine if he enters some specific data onto windows. He will then write a program that will automatically send this data and make his target rebooting. Here is a typical example of that with the "lsass" flaw that was found in Windows like 4-5 years ago ( you know it was known as the "sasser" worm). The idea still remains the same: Finding a flaw on a software then build the software that will exploit this flaw. (more details about sasser here http://www.osix.net/modules/article/?id=527 ).

Carding: this is something i don't really know well. Still, i just know the concept. The idea is to clone credit card (or any type of card but it is less profitable to clone a bus card than a credit card). This is very very VERY illegal so it is hard to find those guys and many of the websites are regularly closed. The last i hard of was carderplant and it has been closed for a while. The russians are really active (talk about russian mafia ??) into this area and most of the time, if they release websites about carding, it is all on russian so i can't get deep into it. As i don't know many things about pure carding, i won't go into the details. The ony way i know to steal credit card number is to keylog someone's else computer and get his credit card number back. A keylogger is just a program (as i said coding is the way to go) that will store everyting you can type and then send the content to the hacker. Usually those keyloggers are detected by antivirus cause their signature are easy to detect.

Reverse Engineering: This area is closely related to coding. It is just a way to find a flaw in a compilated sofware without having the source code. To sum it up fast, you can't read the source code on a compilated software (like word, brood war and everything you can install on your computer). So in order to know how the program is working you should disemble it (with a program). So basically, you will have something which is not the source but something (if you know how to read it) that will the hacker to know how the program is working. FOr example, this is what is usually done to make a cd key generator. The hacker disembles the program, then he will look for the procedure that will check the validity of the cd key. Then the hackers will extract the algorithm of the cd key validation and will build his own cd key generator.

Networking: Well, the idea here is to penetrate a network (ie the network of a private companie). That's where Kevin Mitnick (here is his story: http://en.wikipedia.org/wiki/Kevin_Mitnick ) was a master. The idea here is to allow you to remotely acces a network you should not have the right to access. There are many tricks depending on the network topology. One of them is the Man In The Middle (MITM). I like this example because it explains on itself quite well the ideology of attacking networks:
you have a network where a computer in a company ( A ) is sending/receiving information from the server of the companies that stores for example financile information about customers (B). And you are on other computer in this company.

So here is the idea of the MITM:
A <--------------------------->B
A <---------> C <----------> B
So you have make B believing you're A and at the same time, make believing A you're B and put yourself in the middle of their transaction. Then you just have to capture the traffic (with a sniffer) and pick the information you need in it.
One of the new field on the network attacks is the wireless network. The idea of this is to enter a wireless network outside ot the physic limitation but still in the range of the network. Let met explain. I know my neighboor is using a wireless internet connection and i want to use it too but he does not want me to do that. So physically, you're supposed to be out of the network since you don't live in your neigboor's place. But, the wireless acces point has a range of 35 meters so basically, you can be on its network range and so, you can be able to access the network. In theory, you just have to install a software that will find for you the password of the network and then you can go into his internet. Now, wireless protocols are being updated and it won't be that easy in the future but it is just the idea of the concept.

Fingerprinting: To penetrate a network or a computer, you will have to know which operating system your target is running. So there is a field called fingerprinting that deals with the art to guess which system your opponent is running. There are softwares like nmap for example that will guess your OS target by analyzing the network traffic (the TCP windows to go a little more into the details). For instance, you want to attack someone but you have to know which operating system he has because you're a pro to hack windows system but if it's linux, you're fucked. So to be sure he is uing windows, you launch a fingerprint on him then if it 's a WIndows system, you will be able to try all your fresh new hacking knowledgre to get into his system. This field is very difficult to understand since you will have to know mostly everything about computer networks (tcp/ip and so on) and many things about Operating System.

Ok there are many other fields but i just mention those to just give you an idea. Now, you should be able to understand that viruses are really not the mainstream for hackers.

I am done writing for the moment. So i am gonna give you some other links to illustrate different things i dealt with.
[vid] http://video.google.com/videoplay?docid=-1021256519470427962 : video that shows how to hack a wireless network
[vid] http://video.google.com/videoplay?docid=-7477301395023415733 : video that just shows some reverse engineering
[vid] http://video.google.com/videoplay?docid=3658264224674753229 : SQL injection
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 21 2006 23:38 GMT
#24
Mitnick guest starred in a first season episode of Alias. The casting was an in-joke, since Mitnick played a CIA hacker. Due to the conditions of his parole, however, the computer he used in the scene was a prop.

LOL, omg...poor guy
:)
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 22 2006 00:44 GMT
#25
there's a magazine from hackers to hackers :o.....also, hackers have many radio shows and internet TV shows all over the world :0
/me fears


2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground" and libertarian issues. The magazine is published and edited by Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four), who is also the magazine's founder, and his company, 2600 Enterprises, Inc.

In the usage of 2600 Magazine and affiliates, the often loaded term "hacking" refers to Grey Hat hacking, which is generally understood to be any sort of technological utilisation or manipulation of technology which goes above and beyond the capabilities inherent to the design of a given application. This usage attempts to maintain neutrality, as opposed to the politically charged and often contentious terms White Hat hacking, which is designated as "hacking" motivated exclusively by good intentions (e.g. enhancing the performance of a device or exposing the vulnerabilities of a security system for the benefit of the system administrator), or Black Hat hacking, which is designated as "hacking" motivated exclusively by bad or selfish intentions (e.g. stealing useful information or exacting technological revenge through sabotage).

The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone (which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal—discovered by friends of John Draper) over a long-distance trunk connection gained access to "operator mode" and allowed the user to explore aspects of the telephone system that were not otherwise accessible. Mr. Corley chose the name because he regarded it as a "mystical thing," commemorating something that he evidently admired.

2600 has established the H.O.P.E. (Hackers On Planet Earth) conferences as well as monthly meetings in Argentina, Australia, Austria, Brazil, Canada, Denmark, England, Finland, France, Greece, Ireland, Italy, Japan, Mexico, New Zealand, Norway, Poland, Russia, Scotland, South Africa, Sweden, Switzerland, and the United States. The meetings take place on the first Friday of the month at 5 p.m. local time. 2600 meetings exist as a forum for all interested in technology to meet and talk about events in technology-land, learn, and teach. Meetings are open to anyone regardless of age or level of expertise.

2600 Films has made a feature-length documentary about famed hacker Kevin Mitnick, the Free Kevin movement and the hacker world, entitled Freedom Downtime, and is currently working on one titled Speakers' World.

Additionally, 2600 has been involved in many court cases related to technology and freedom of speech alongside the Electronic Frontier Foundation, perhaps most significantly Universal v. Reimerdes involving the distribution of DVD copy protection tool DeCSS, where courts upheld the constitutionality of the Digital Millennium Copyright Act anti-circumvention provisions.

Corley is also host of Off The Wall and Off the Hook, two New York talk radio shows. Both shows can be downloaded or streamed via the 2600 site.


thx wikipedia =)
:)
oHInsane
Profile Joined February 2005
France727 Posts
May 22 2006 03:12 GMT
#26
yes , 2600 is a really famous meeting which is now much more relevant than the "defcon" one.
Some of the 2600 people wrote and are still writing some webzines to release/explain some flaws/exploits/hacking state of the art paper.
You can find some of them here:
http://madchat.org/esprit/emags/

Most of those articles are very technicals but some of them are friendly readable if you can get into them a little bit.

Alborz
Profile Blog Joined March 2006
Canada1551 Posts
Last Edited: 2006-05-22 15:52:49
May 22 2006 12:42 GMT
#27
Kevin Mitnick is a true hacker
Great thread, thanks Unforgiven_ve
Resonate
Profile Joined October 2002
United Kingdom8402 Posts
May 22 2006 18:00 GMT
#28
sheeckret shoshiety!
Memory lane in nice
shinigami
Profile Blog Joined June 2004
Canada423 Posts
May 23 2006 13:24 GMT
#29
Wow, you cleared up a lot of myths I had about hacking, especially with your examples and explanations.

My respect for hackers shot up a several notches, except crackers.
They seem to have the easier job, which explains why many of us never had to pay for our software in years.
I was thinking about joining a debate club, but I was talked out of it.
Orome
Profile Blog Joined June 2004
Switzerland11984 Posts
May 23 2006 13:33 GMT
#30
On May 23 2006 03:00 Resonate wrote:
sheeckret shoshiety!


ahahahaha now that was a nerd
On a purely personal note, I'd like to show Yellow the beauty of infinitely repeating Starcraft 2 bunkers. -Boxer
Prev 1 2 All
Please log in or register to reply.
Live Events Refresh
BSL: ProLeague
18:00
Bracket Stage: Day 3
Hawk vs UltrA
Sziky vs spx
TerrOr vs JDConan
ZZZero.O218
LiquipediaDiscussion
CSO Cup
17:00
#80
Liquipedia
Cheesadelphia
15:00
Cheeseadelphia 2025
CranKy Ducklings499
davetesta84
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
BRAT_OK 99
MindelVK 49
StarCraft: Brood War
Britney 20782
Calm 4092
Rain 2897
Horang2 1469
ZZZero.O 218
Dewaltoss 122
Nal_rA 116
JulyZerg 53
Rock 39
Terrorterran 16
[ Show more ]
IntoTheRainbow 8
Dota 2
Gorgc7873
qojqva2276
LuMiX1
League of Legends
Grubby2707
Dendi1513
JimRising 876
Counter-Strike
fl0m6620
olofmeister3267
Fnx 1
Super Smash Bros
Mew2King107
Heroes of the Storm
Khaldor712
Liquid`Hasu636
Other Games
tarik_tv52145
gofns25815
C9.Mang0515
DeMusliM482
crisheroes355
B2W.Neo168
TKL 123
ArmadaUGS93
Trikslyr74
Organizations
Dota 2
PGL Dota 2 - Main Stream9733
Other Games
gamesdonequick1175
EGCTV976
StarCraft 2
angryscii 40
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 19 non-featured ]
StarCraft 2
• printf 76
• 3DClanTV 26
• Adnapsc2 23
• tFFMrPink 14
• Kozan
• Migwel
• AfreecaTV YouTube
• sooper7s
• intothetv
• IndyKCrew
• LaughNgamezSOOP
StarCraft: Brood War
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• C_a_k_e 3065
• WagamamaTV399
• Ler95
Other Games
• imaqtpie1307
• Shiphtur375
Upcoming Events
GSL Code S
12h 57m
Rogue vs herO
Classic vs GuMiho
Sparkling Tuna Cup
14h 57m
WardiTV Qualifier
20h 57m
BSL: ProLeague
22h 57m
Bonyth vs Dewalt
Cross vs Doodle
MadiNho vs Dragon
Replay Cast
1d 4h
Wardi Open
1d 15h
Replay Cast
2 days
Replay Cast
2 days
RSL Revival
2 days
Cure vs Percival
ByuN vs Spirit
RSL Revival
3 days
herO vs sOs
Zoun vs Clem
[ Show More ]
Replay Cast
4 days
The PondCast
4 days
RSL Revival
4 days
Serral vs SHIN
Solar vs Cham
Replay Cast
5 days
RSL Revival
5 days
Reynor vs Scarlett
ShoWTimE vs Classic
uThermal 2v2 Circuit
5 days
SC Evo League
6 days
Circuito Brasileiro de…
6 days
Liquipedia Results

Completed

Proleague 2025-06-11
BGE Stara Zagora 2025
Heroes 10 EU

Ongoing

JPL Season 2
BSL 2v2 Season 3
BSL Season 20
KCM Race Survival 2025 Season 2
NPSL S3
Rose Open S1
CSL 17: 2025 SUMMER
2025 GSL S2
Murky Cup #2
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025
PGL Astana 2025
Asian Champions League '25
BLAST Rivals Spring 2025
MESA Nomadic Masters
CCT Season 2 Global Finals
IEM Melbourne 2025
YaLLa Compass Qatar 2025
PGL Bucharest 2025

Upcoming

Copa Latinoamericana 4
CSLPRO Last Chance 2025
CSLPRO Chat StarLAN 3
K-Championship
SEL Season 2 Championship
Esports World Cup 2025
HSC XXVII
Championship of Russia 2025
BLAST Open Fall 2025
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.