Padre
it's not what it takes to do it .... it's not smth that you take a book, and start learning "how to hack"
and please, hacking is NOT how to break into computers and shit like that.
Anyway, if you want to learn how to bend the security rules and programs to your will, you first need to learn how it works. I would advise you to start learning how networks and OS operates. Then you can start looking into how to bypass some of the restrictions. If you are into the "One click pwn all" solution, forget it.
chosen2k
There was a member here who led me to this website.
http://www.hellboundhackers.org/ it looks interesting.
the guy is lebanese, a member here and in hellboundhackers and he found a security issue in facebook.
maybe you can find your way there.
Try it out.
@Padre, please, hacking IS breaking into computers. At least this is what the whole world thinks and accepts as definition. Anyways you gave the guy an advise, make it a GOOD one, give him your best resources on where he can LEARN about Networks and OS's instead of bringing him down.
Peace
Flakk
@chosen2k
hacking is not just breaking into computers, technically its more than that, you are reprogramming something to function in a way its not supposed to be or you are modifying something and adding more electrical components or circuits to compromise the main purpose of the machine you are trying to break into . Say for example microprocessors or microcontrollers hacking which is a thing i learned on the motorolla 7800 series assembly language during digital electronics courses.
Some of these MPU's were given a security code that makes it hard for anyone to access the memorized instructions on the chip, i kinda learned how to bypass that (in a very hard way). But thats what hacking is and used to be since this is getting really old (1980s). Hacking is mostly done on computer systems now since most terminals and routes exist on this platform.
But bare in mind hacking could be anything, say for example if you are able to intercept a secured or coded RF signal using special demodulator thats called hacking. Just like the illegal satellite dishes found in Lebanon today. Same thing for microwave signals. The use of mod-chips in game consoles... etc..
chosen2k
Source: Oxford Dictionary.
Just give the guy some sources ppl.
we know what he means. let him have his fun.
In the end, he'll either has to format his computer and forget about hacking , or he'll actually learn something and share it here. :)
mzaouar
Even if hacking into other people's boxes is unethical, that doesn't mean learning how to do it is..
At least it gives the extra incentive, as in it would be far from exciting to learn how an OS works or how to patch vulnerabilities for a total beginner, if he can't have some fun doing it..
samer wrotehacking IS breaking into computers and other shit.
No, hacking
can mean that, but isn't necessarily that. A little Venn diagram to help you out:
http://imgur.com/dDT8H.png
and admin, if you're ridiculing someone quit it, if you're not, IMO that was lame :/
saeidw
There is a document called
How to Become a Hacker. It is a step-by-step guide on how to become a hacker.
I recommend you read it carefully. If you're still interested by the end, you have what it takes.
Here is a quote from the section
"What is a Hacker?"
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
That's how I understand hacking.
nader-sleiman
Greetings earthlings...
BRIEFLY:
-Hacking is not what it sounds like ...
-Hacking is obviously a very general term that implies evilness and dirtiness , its just same as stealing cash of someone.
-Recently , and according to security measures , hacking is mainly just being smart and evil enough to trick certain people into something, and lure them into your own program , as key loggers, Trojans and Bot-nets.
Hacking Types :
Website hacks:
1)its nearly impossible to hack a well secured website, however some exploits can be applied to some vulnerable forums and sites, as ones vulnerables to sql injections and Xss cross scripting.
2)DDos attacks can be launched on site's hosting to get it down for the whole period of attack, such attacks can be done by using botnets (zombies)_, a collection of infected pcs ready for your requests.
[Personal hacks:
Very easy as long as victims are dumb enough to accept strange files and actually open, even in the presence of anti viruses, ppl must be intelligent enough to accept only trusted files, because such files may be Fud Stubbed, to be fully undetectable, and therefore anti-viruses would fail @ that point.
Simply, Spread a botnet or a keylogger, you can download free a free pop keylogger , Ardamax keylogger , its simple enough to create the client to spread, it will send you logs and screen shots to your email or ftp site , according to the preferences you set.
Wirless Connection hack & Packets Sniffing
It's almost the same, its all about packets sniffing , most packets are encrypted, however , if you are in mood sometime to hack a wireless connection secured with WEP key, then its easy enough, otherwise you need some dictionary bruteforce to crack WPA or other kinda securities.
To hack a WEP secured connection, its easily done via linux / backtrack, just read some tuts about it, alternatively it can be done from windows, you need to programs a packet sniffer like "commview for wifi", it will replace your wireless driver with another one just to sniff packets, once you are done sniffing, roll back driver to be able to use the internet again, then just use Aircrack sng to analyze packet logs captured by a packet sniffer, and just wait few minutes to hours to get they WEP KEY, it well simply sayt in a shell "FOUND KEY [key]". ill paste some detailed tut about it later on.
Other than that, you can hack Games, Sniff msn convos and plenty of other stuff that can be done thru packets sniffing .
Notes:
-Any one on your network can sniff your msn convos if you don't have an MSN encryption program.
-games with non encrypted packets can be easily hacked by sniffing the packets, writing your own packets that will imply different info such as changing score from 1000 to 10000 , and then sending it again to the game's server.
Finally, effective hacking nowadays is just nearly impossible according to all massive security measures ,server-siding and irreversible encryptions such as MD5 algos, you just have to be evil smart against the system kid to be able to hack , Done.