- Web IRC
See also: Hackers
Most scholars agree that 'hacking' (actually a bastardisation of computer 'cracking') refers to an activity in dealing with computers, which is generally regarded as a technically hard thing to do. There are of course differing descriptions as well. Over the course of history the world has been separated in to four schools over the meaning of hacking:
- According c_Ne0 (Josh Miller M/14/CA), Hacking is the process whereby you destroy someone's life through the internet, and has to do with cool console with greenish characters that flicker and scroll and a lot of ones and zeros (color 0A and then dir /s). This theory also claims hacking some faggots Makes you a pretty cool guy.
- According to Ellie Miller (F/32/CA): Although 133t h4xx0rz claim it involves "skill", it's simply as easy as giving AIDS to someones daughter. (Of course while it might be true for some of you to see a root of a box you didn't buy, it is logically impossible for any anon to ever have seen the female genitalia (except for pedobear), let alone contract AIDS you can spread.*Some subjectively-instrumentally oriented scholars think of hacking as a way of life. Most of them also agree that this way of life composes of sitting in a swivel chair and having minimal female company throughout one's life.
- According to the most recent theory hacking is in fact a dialect of the english language that's closest lingual relative is Cockney and Cock-mongling.
- The most common hacking method is to open your internet browser and to type into the URL bar "/hack" followed by the thing you wish to hack. Example: "/hackCIAsatellites". then click on 'yes'. This is by far the easiest and most efficient way to hack and always yields good results.
- Using worms on computer networks is as old as the fucking network. There was some shit in the 1970s and 1980s with school networks I read about on unix fortune which I use as a screensaver. (Somebody who knows about the early days, type something in)
- Trojans were the fucking thing in the 90s Since people downloaded lots and lots of Windows executables, it wasn't very difficult to write one that started a server in autoexec.bat and logged to some IRC (The incredible mastery of fopen, fwrite and whatever the OS had for sockets). Only retards download trojans nowadays.
- Overflowing a string, one way of "just overwriting" a CPU register was first done in 1988. It became standard practice after it was released in Phrack magazine in -96. Retards from my age group who grew up back then still have trouble accepting that trojans, db injects, XSS and bruteforcing are hacking. Only buffer overflows and DNS-spoofs is hacking...
- Database injects became popular in about 2000 after some rudementary security was put in place. Simple as fuck. The second resort of kids after bruteforcing failed, when it doesn't work they flood. Have a cheatsheet to get the basic idea.
- XSS is the process of injecting shit on websites. Hacking your email account used to entail these, now it plagues forums and wikis. They can be used to fetch your cookies and spoof SQL injects.
- Bruteforcing. Oh well, AES was put in place in 1997 to replace DES in US national security, draw your own conclusions. Before 2000 bruteforcing usually entailed a supercomputer. Now, due to Bill Gates, botnets are used instead. Bruteforcing is also popular among script kiddies, it usually gets them a ban from the science lab since police don't really give a fuck if you entered login: root, password: root on your schools nix. For extra-credit, bruteforce /etc/passwd or /etc/shadow on a Windows box.
- Spoofing takes many forms, some XSS amounts to spoofing
- Faked login skript: Generate one by acquiring webspace, copying the HTML from some site (e.g. Facebook), make your own php or perl backend to log coming requests, link 'n profit.
- DNS spoof. Hacking a software called 'bind' at some point in the DNS-server tree, which is what Angyl's merry group of trolls did to 4chan. Old versions of bind have a fair amount of overflow bugs on them as well as points (aka race conditions) to put in your own regs, but probably you better just stick with the program and bruteforce the registration password.
- Pharming. Usually means fucking with the DNS at the point of request, the client rather than the server. Same methods apply as above. Just hack the home ISP servers instead of the server end ones. Or beat the DNS server to answering the request - useful if you have a T3 and several hacked routers, I don't.
- Social engineering. This is classed as a valid method of hacking your target, despite the fact that the only piece of technology you use is a telephone to blab into. this involves begging/tricking/bribing/blackmailing some fucktard on a calldesk for important information like the OSs the target runs, network/firewall/anti-virus gear installed, internal telephone numbers, maybe get him to reset a password or two if you're ultra whiney and annoying (and you will be, because you're a hacker ).
|Hackslang||"I think my game of life has been going half to hell, the partyvan bitches found out three of boxes I own after sum dimwit admin somehow found my leet spoilts - i quess it was tripwire, one fukken masterpiece - and run a packet sniffer."|
|Proper English||"Three of the computers I use to facilitate illegal and morally questionable access to other computers were recently acquired by the law enforcement services. This happened after a system administrator rightly ran a packet capture program and found out about my illegal compiled and inline programs. This interlude might have been triggered by running the tripwire program, I do so abhor that program."|
History of hacking
Hacking was first discovered in late 1971 by a 26-year-old soldier who had just gotten out of Vietnam and his blind, crippled Mexican friend by using a whistle they found in a box of Captain Crunch. No, srsly, I'm not kidding. They found that this whistle could give them free phone calls and shit, which allowed them to troll IRL all over the world, sending lulzy (but FREE) calls to China or black person. In 1973, they showed two fags named Steve Jobs and Steve Wozniak how to hack the phone system using their techniques (though by this time they had gone from a Captain Crunch whistle to a contraption they built themselves). Steve Jobs later founded Apple and gave blowjobs because his last name is Jobs.
How to hack
UDP FloodJust use LOIC if you want to UDP flood
- Nmap fuckyeah. Hackers on steroids need a port scanner on 'em.
- Hping3 is better than your retarded script kiddie flooders
- Cryptolib is nice, so is the errata and charlatans board. Whoever first wrote this page will be found there.
- point, click, root, v&
- Shellcodes when you get bored with the metaspoilt ones and exploits -- Site possibly dead
- Point, Click, epic fail. lulz.
- what you go to to learn how to hack
- Subscribe them to a bunch of mailing lists.
Let it be known that if you are just copying and pasting it doesn't make you a hacker. No matter how many times you do it. Hacking exposed should answer your more retarded questions of what is and isn't hacking.
PS. Bubba's interest
Bubba appreciates you reading this article. Bubba loev shota. You can help Bubba find a reasonable love life in prison by following this simple checklist:
- Download, install nmap, nessus and every other tool and script imaginable. No trojan can penetrate your awesomeness
- Use Vista or some any other Gate$ driven OS written under the philosophy: "security is a joke"
- Become cocky over your skill-level (yeah, proxys are for 10zers and fuck remailers)
- when words fail, SYN-flood!
- Build a botnet
- Ethics - wtf, anything goes!
- Hack .gov sites, you are so 1337
How to protect yourself
Who you should hack
- People on Facebook
- IP ADDRESS: 127.0.0.1 , that BITCH
- IP ADDRESS: 18.104.22.168. He tortures kittens.
- Anyone, really
- Lori Drew
Air Gap Hacking for when you're not connected to the Internet:
The Government has found a way to hack your your shitty device using an inaudible sound to ultimately access your computer and mobile device without consent (input almost rape there) without an Internet connection. So, for example, you win the Golden iPod and celebrate happily but in the first day before you even connect said iPod to an Internet it gets hacked by a faggot who wants the shit you inputted on it than leave behind malware like shit clinging to the hair of an asshole. The inaudible sounds (input link to blind or deaf) than gets picked up by a microphone than grants access to a device. Upon testing this air wave it was released that it can go up to 65 feet far but people who've tested it state that it goes farther by forming a mesh network with the addition of additional devices nearby.
Which leaves your computer more vulnerable?
|01||Running Microsoft Windows|
|01||Mentioning on your Facebook page that you use "Open Sesame" for all your passwords.|
is part of a series on
Taking Down ED
[Do It Faggot]
Hacking is part of a series on
Visit the Trolls Portal for complete coverage.
is part of a series on serious business
Free Speech • Identity theft • Irony • Internet asshole • Internet Celebrities • Internet disease • Internet drama • Internet humanitarians • Internet Law • Internet lawsuit • Internet lawyer • Internet stalking • Internet tough guy • Internet Vigilante Group • Operation Falcon Punch • Swatting • World Wide Web Consortium
People & Organizations
2cash • Alan Turing • Casey Serin • David Hockey • Dear Cis People • Doxbin • Fast Eddie • Grace Saunders • Hallcats Squadron • Jessi Slaughter • Kittens • Maja Schmidt • Missy • Niggest Crook Force • Psychopath • Vloggerheads • WEB SHERIFF
Hacking is part of a series on Security Faggots
2cash • AnonOps • Brian Salcedo • Fearnor • Fry Guy • Gadi Evron • g00ns • Hack This Site • Hacking Team • hann • Joanna Rutkowska • John Field • Joseph Camp • Lizard Squad • LulzSec • Mark Zuckerberg • MarshviperX • Masters of Deception • Michael Lynn • Krashed • Raven • r000t • Ryan • Steve Gibson • th3j35t3r • The Regime • Sabu • Zeekill
Avira • Ciscogate • Cloudflare • Conficker • CyberDefender • Defcon • The Gibson • The Great Em/b/assy Security Leak of 2007 • Heartbleed • I GOT NORTON! • Is Your Son a Computer Hacker? • Operation Sundevil • PIFTS.exe • Social engineering • Stylometry • SubSeven • Zone-H