wine Posted January 11, 2007 Report Posted January 11, 2007 So there's this Guy, George, who's wireless network I can connect to when I'm downtown on this one particular bench. Is there anyway I can get into his computer for kicks?:Waldo: Quote
InfiniteNow Posted January 11, 2007 Report Posted January 11, 2007 Sure can, if George is unprotected. Think you're willing to smarten up enough for purposes of terroristic jollies? Check it out: Wi-Foo - The Secrets of Wireless Hacking Your mission, should you choose to accept it, is to break into George's computer and make it perform more efficiently. Efficiency will not only improve George's computer, but the world as a whole. This message will self-destruct in 5 seconds.... 5...4...3...2...1... :Waldo: /forums/images/smilies/devilsign.gif Isn't life wonderful, Brain? Just think, we started out as lab mice forced to spend the whole day working our way through frustrating mazes that went absolutely nowhere. Now we get to do what humans do! Quote
alexander Posted January 12, 2007 Report Posted January 12, 2007 i thought my first long rant since me coming back would be on some Vista widget that is extremely useless and consumes crazy amount of space.... i see i was wrong... Largely based on Simple Nomad's DefCon 11 speech. (sorry dude if i use a few sentences here and there to tell it's meaning in the way i perceive it) What is the world coming to? Have you noticed a change? I am talking about the change in the computer security underground community. Virtualy no trust as more and more people try to control their hard-earned information. There is no truth, there is only the idea of it, but it does not exist in this new, more elaborately scammy information age. I'm not talking about society since the world trade center, although most certainly things like the Patriot Act and DSEA you can certainly see no trust, control, control, CONTROL without any truth. I'm talking about the underground ranks. The emergence of the third generation of hackers, different, ideologically different then the two before. The ideology of hackers is based on three things: trust, control, and truth. Truth, a pure fact, knowledge in its purest form. A wisp of falsehood or lie will cause a hacker to bristle. With the nature of hacking being to learn the true nature of something, the truth is an important commodity. Trusting a "truth" is an important item on the hacker checklist as well. Is it really true, can i trust it being true? Keeping enemies as friends, encountering the unknown and very rarely unexplicable, a hacker needs to know not only what to trust, but more importantly who. And it is never a glass that is either half empty or half full, it is a swirling alphabet soup where the letters are truths and lies, all swimming together and influencing each other. Finding the root of truth in a haystack of sometimes useless or wrong information is the idealism of the new hacker generation. Hackers need not only to be able to control the mechanism behind the truth, but to understand the responsibility that comes with exercising control over such a matter and more then ever, its implications and consequences. Also, knowing when and how YOU are being controlled and manipulated is a big trait, whether you are manipulated by pervasive means or other means, the fact that you are being manipulated may mean that you are being monitored. Having your actions monitored can and should influence your behavior, you are a stupid hacker if it does not! Between Carnivore-styled systems to enemy hackers with dsniff to obnoxious ISP admins, the constantly shifting chess board has not just shifted the controls, but the mere threat of controls along with the laws associated with computer information security, made hackers change their methods drastically and permanently, no way back, no more games or "oops i screwed up, i wont do it again", the new ever-changing world is ruthless to those who can not keep out of the way. There are hackers of two types: white hat -- that have removed code from their web pages simply because of the threats posed by such things as DMCA, as well as threats from the new-born script kiddies (that should die) that may use otherwise proper code that outlines a weakness, for doing something stupid and malicious. Talk about Sun Tzu tactics, many coders removed their work from the net without any laws being used against them. That's a serious control mechanism right there one that is not to be taken lightly if you are serious about what you do. The new generation hacker has seen this plethora of unknown enemies with unseen faces and with an unknown army, circled the wagons, and lives a multi-layered life behind layered walls of security, disinformation, and distrust. It has become increasingly harder to learn the truth, but sometimes learning the truth is only a part of the puzzle, learning the truth is one thing, understanding what you have just learned is as big a part of being a hacker as learning it. Like it or not, hacking has changed. Hacking is no longer just about seeing the limits of a computer or a network system any more, or even the limits of the political world surrounding around the modern-day hacker. It is about understanding the complete system, for if you know all, you know part, if you know part, all is not revealed to you. You must hack yourself, hack your human you as well as your digital self, there is no division, we have become one, your human you and your digital you are all a part of you you! We are plugged in, and there is no way back. We *have* to hack ourselves as we are as much a part of the system as the system is the part of us. Live to hack, and hack to live. This is the future of meta-hacking, the future of the hacking world is not limited by merely controlling the operating system and obtaining their files, it is about controlling the operators of that system and influencing what they do; whether they do it for good or ill, and whether that system is a computer, a political set of ideals, or your own thought processes. This is why we are pursued through cyberspace by the USA Patriot and the other donkeys of the digital apocalypse. Our potential; we need to turn our hacking skills from the systems we have root on to the data stored on those systems and what that data represents! As Simple Nomad so elequantly put it:"I am not going to tell anyone what to do anymore, namely because until I fully and truly understand my own truths, and can trust my vision and understand the controls that bind me, I only serve the will of others. Others who wish to control you AND me. I can't tell you where the truth lies, because I refuse to accept the reality shovelled up my *** by the Man. I have to question everything, and while I am not telling you what to do, I *am* inviting you to do the same. Question yourself. Question your questions. Question your lack of a question." The truth, wine, is that i will not tell you how you can go about this "break in for fun" deal not because i don't want you to know how to steal cursor control from an innocent guy who keeps his network open; because he figures that sharing may be better then locking doors and putting up guards to make something like information inaccessible to those who may need to use it (because he may be a good sumaritan who may well understand that secure wireless is an oxymoron and what "live and let live" really means), it is because i want you to know what hacking really is. Don't be a script kiddie, ask, answer and learn from the experiences! InfiniteNow 1 Quote
alexander Posted January 12, 2007 Report Posted January 12, 2007 well, since i am really bored, am not at my best friend's house (she wasnt there when i stopped by), hate my life and am upset about the upcoming weekend being wet (which generaly means that i cant go stunt riding), oh and my recent attempts at installing gentoo on my core 2 in 64 bit mode have failed for weird reasons, i found nothing better to do then sit down and rant on something that i feel pretty passionate about... That is, not telling those who openly ask to show them how they can "hack" using a windows guiicious drag and drop tool. (and to refresh one of the most important lessons: scriptkiddies must die) Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.