Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
tutorials:node9.html [2011/04/30 20:41] georgtutorials:node9.html [2011/04/30 20:44] georg
Line 1: Line 1:
-8. Hacking+'''''' 8. Hacking ''''''
  
 So you want to hack? To break into computers? Take them over? Get root access? Crash them or use their CPU cycles to do work for you? So you want to hack? To break into computers? Take them over? Get root access? Crash them or use their CPU cycles to do work for you?
Line 8: Line 8:
     * Crackers, Phreaks, & Lamers.     * Crackers, Phreaks, & Lamers.
  
-You might find some people in COM Mode who would like to talk about these things, but most of them are really tired of kiddies coming into the lobby & asking ''Do any of you know how to hack?'' So you'll need to be more subtle. It's like real life; you don't walk into a room, interrupt the current conversation, & loudly ask if anyone will sell you nose candy. It's just rude.+You might find some people in COM Mode who would like to talk about these things, but most of them are really tired of kiddies coming into the lobby & asking <nowiki>"</nowiki>Do any of you know how to hack?<nowiki>"</nowiki> So you'll need to be more subtle. It's like real life; you don't walk into a room, interrupt the current conversation, & loudly ask if anyone will sell you nose candy. It's just rude.
  
-Information about security holes is pretty easy to find without help. Just use Google to search for things like ''computer security virus hole exploit''. What you need is the knowledge to make use of that information. You need to learn straightforward programming techniques, especially networking8.1, before you can make use of all that security information that is readily available. So instead of asking people to teach you to crack, it might be more worthwhile & fun to talk programming with people.+Information about security holes is pretty easy to find without help. Just use Google to search for things like <nowiki>"</nowiki>computer security virus hole exploit<nowiki>"</nowiki>. What you need is the knowledge to make use of that information. You need to learn straightforward programming techniques, especially networking8.1, before you can make use of all that security information that is readily available. So instead of asking people to teach you to crack, it might be more worthwhile & fun to talk programming with people.
  
-While we're on the topic, I guess I can throw out a bone. Take a look at ''CIFS: Common Insecurities Fail Scrutiny'' ([Hob77]).+While we're on the topic, I guess I can throw out a bone. Take a look at <nowiki>"</nowiki>CIFS: Common Insecurities Fail Scrutiny<nowiki>"</nowiki> ([Hob77]).
  
 Also, be aware that most of the protocols in use on the Internet are defined in the Request For Comment (RFC) documents. One database of RFCs is The RFC Editor. Another such database is RFCs at Ohio State University. Also, be aware that most of the protocols in use on the Internet are defined in the Request For Comment (RFC) documents. One database of RFCs is The RFC Editor. Another such database is RFCs at Ohio State University.
Line 18: Line 18:
 Why do you care about the RFCs? Because to find a hole in some protocol, you need to know the actual protocol, not just heresay that people slip to you in a chat room. To know the protocol, you need to refer to its definitive source. For most protocols on the Internet, that's the RFCs. Why do you care about the RFCs? Because to find a hole in some protocol, you need to know the actual protocol, not just heresay that people slip to you in a chat room. To know the protocol, you need to refer to its definitive source. For most protocols on the Internet, that's the RFCs.
  
-For example, let's say you wanted to research holes in Internet multicast. You could go to either of those RFC databases & search for ''multicast''. You conclude that any of these RFCs were worth your time+For example, let's say you wanted to research holes in Internet multicast. You could go to either of those RFC databases & search for <nowiki>"</nowiki>multicast<nowiki>"</nowiki>. You conclude that any of these RFCs were worth your time
 |id| title| author| data| |id| title| author| data|
 |RFC1112| Host extensions of IP multicasting| S.E. Deering| 1 Aug 1989| |RFC1112| Host extensions of IP multicasting| S.E. Deering| 1 Aug 1989|