Metasploit mailing list archives
hack technics
From: myx at amex.ro (myx at amex.ro)
Date: 13 Feb 2007 14:43:22 +0200
Well, Today hacking becomes more and more money based. In early ages of internet, hacking was more like a "show-off" between good and bad guys. Unfortunatelly, today, hackers can be divided in few categories. Ethical one (lab hackers) , script kiddies (wich includes scam site builders, phising sites, piracy and more) and ( most dangerous) those known as on-command hackers (very good skilled and working for a lot of money). Every category have their own target(s) . Knowing what they are targeting and why, realising if the network, OS, software we protect is one of any category target is a good way to start protecting and defending. Latest phising metod(s) ? Simple. Pose as a script kiddie in one or more underground sites or chat and you'll be "on news" with them. On 2/12/2007, "lord maximus" <gangstified at gmail.com> wrote:
well to start it off... Hacking in my own opinion, is a state of mind.... I won't go into what exactly a hacker main focuses are, but they should be to get in any way possible, leaving no footprint or logs. So thinking using the state of mind factor, you could say if one think doesn't work (like subverting windows 2003 SP1 kernel integrity protection", you'd find another way todo the same thing, or some other way into a machine in a given attack. It also depends if your talking live hacking of a machine, or hacking of software. On 2/12/07, Omid Tavakoli <omid.zs at gmail.com> wrote:Dear mailing list members , This is a Network Security specialist (Penetration Testing Asset) who has been working on the latest methods of the penetration testing; as part of my research I have some questions and I would be very thankful if you would help me find the answers. I believe in order to provide the required level of security for any application, network or operating system, we need to look at it from the hacker's point of view because they have been always one step ahead of us. I need to know what the hacker's main focuses are. For example, "Subverting Windows 2003 SP1 Kernel Integrity protection"? or "defeating stack based overflow prevention mechanism". What are the latest phishing methods? and ... And in general, what is the direction of the hacking methods in the near future? Sincerely, Omid Tavakolli
Current thread:
- hack technics Omid Tavakoli (Feb 12)
- hack technics lord maximus (Feb 12)
- hack technics myx at amex.ro (Feb 13)
- <Possible follow-ups>
- hack technics auto17350 at hushmail.com (Feb 13)
- hack technics myx at amex.ro (Feb 13)
- hack technics lord maximus (Feb 12)