handdator

Visa fullständig version : Hacker tråden


Pudzianovski
2005-05-10, 13:14
http://www.afterdawn.com/news/archive/1872.cfm :D

http://www.aftonbladet.se/vss/it/story/0,2789,643236,00.html

pudde= *innocent*

Tigerkotten
2005-05-10, 13:28
mogen lirare på första länken att pajja för folk på sådant sätt.

Någon som åkt fast för något btw inom data saker?

Fått själv ett års avstängning av telefon, och varit på ett polisförhör med misstänkt för 2saker i Sverige och USA *innocent*

Pudzianovski
2005-05-10, 13:31
Fick ett brev från Telias abuse avd.

:hbang:

:thumbup:

jwzrd
2005-05-10, 13:32
Fick ett brev från Telias abuse avd.

:hbang:

:thumbup:

Vad har du gjort då?

Pudzianovski
2005-05-10, 13:34
Vad har du gjort då?

Jag laddade hem för mkt Dödsmetal. Telias servrar klarade inte det. Det blev för tungt.

*bs*

Delade ut ett spel, vilket man inte får. Många har fått liknande.

Tigerkotten
2005-05-10, 13:35
körde på felia konton kan man tippa på :D

Hade själv 2 telefonlinjer, ena fick jag pröjsa typ 750kr eller vad det nu var, vet polare som fick betala mycket mera för varje konto eller något som han hade åkt dit på.


Hade säkert 200konton med lösenord och password, fick variera sig. Eftersom om man nu var på ett konto så var det upptaget om någon var på det, så var inte bra att köra åp ett konto mera den 1 kväll :) ISDN och utfors gick det dock vara flera på samtidigt.. :)

edit: hade fel :D

jwzrd
2005-05-10, 13:37
körde på felia konton kan man tippa på :D

Hade själv 2 telefonlinjer, ena fick jag pröjsa typ 750kr eller vad det nu var, vet polare som fick betala mycket mera för varje konto eller något som han hade åkt dit på.


Hade säkert 200konton med lösenord och password, fick variera sig. Eftersom om man nu var på ett konto så var det upptaget om någon var på det, så var inte bra att köra åp ett konto mera den 1 kväll :) ISDN och utfors gick det dock vara flera på samtidigt.. :)

edit: hade fel :D

Sjukt konstigt att man inte kan se att din telefonutgång använder massor av olika konton. Skumt att du inte fick arslet avstämt.

Dipshit
2005-05-10, 18:14
kan se det framför mig..

uppsala 23:07
ding-dong.. Carl, 16 år, öppnar dörren för att se två stora män i kostymer och svarta solglas..
"nej, nu är det kört!" tänker Carl..
"You will work for us as a top secret agent and we will support you financially for the rest of your life" *popcorn*

The Somberlain
2005-05-10, 18:17
Klart gay.

Herkulez
2005-05-10, 18:22
Klart gay.
nej det HÄR är gay
http://www.photo.net/photo/pcd0155/gay-parade-21.jpg

Mart|n
2005-05-10, 18:27
nej det HÄR är gay
http://www.photo.net/photo/pcd0155/gay-parade-21.jpg

Du syftar på att dom har större armar än dig va? :)

abjorn
2005-05-10, 18:28
http://www.hackerman.b3.nu/

Skyldig

(jag VET, gammal som graven)

The Somberlain
2005-05-10, 20:54
Såg ju ut som negern i "lost" =)

bosse_brutal
2005-05-10, 22:05
http://www.hackerman.b3.nu/

Skyldig

(jag VET, gammal som graven)

haha skön sida...

bosse_brutal
2005-05-10, 22:13
nej det HÄR är gay

2 boegar

det här också (http://www.sylvester.se)

JAM
2005-05-10, 22:23
Fick ett brev från Telias abuse avd.

:hbang:

:thumbup:
Det har jag också fått en gång i tiden. Var 15 år och skickade spam till hela Sprays mailadressregister... Handlade om att jag ville att de skulle gå in på min hemsida där jag hade sponsorlänkar som betalade för varje klick (MrJet.com gav 2 kr/klicket!!!) och som jag tvingade folk att klicka på - både för att komma in på hemsidan och för att avregistrera sig från mitt påstådda nyhetsbrev... :em:

WHITEFOLKS
2005-05-10, 23:22
Jag har haft husrannsakan gjord av ekobrottsmyndigheten särskilda enheten eller nåt sånt.

MilkmaN
2005-05-10, 23:31
Jag har haft husrannsakan gjord av ekobrottsmyndigheten särskilda enheten eller nåt sånt.

You naughty boy! Varför?

WHITEFOLKS
2005-05-11, 00:11
Jag hade givetvis inte gjort nånting, de pladdrade nåt om bankkonton och pengar. vettefan men de tog mina datorer i ~1år.

Tigerkotten
2005-05-11, 01:11
Kanske var bra att du blev av med den dock, dom var lite beroende som vissa andra var. Ångrar jag fick en dator så tidigt, skolgången blev lidande om man säger så :)

Började med smått chattande, sedan irc och man var op kåt. Och ville ha makt i kanaler så var krig och allt mot andra :) Sedan kom farliga online spel som starcraft och mmorpg spel och sedan vart man fucked up!

Men nu e jag borta från allt spelande online, aldrig mera! :) Bara mot kompisar isåfall.

WHITEFOLKS
2005-05-11, 02:25
nja, de tog alla datorerna jag hade hemma och tog in mig på förhör. Sen släppte de mig och jag hade en dator hemma på ett par timmar igen.

Bolio
2005-05-11, 08:50
Jag med, två gånger till och med. På den tiden då milw0rm fortfarande var aktiva! Jag kommer ihåg när t0rn skrev det på den tiden ökända t0rnkit som faktiskt fungerade mycket bra (reah r1ght). Fast han slapp problem eftersom han flydde till Israel, enligt Mixter.

pellepedal
2005-05-11, 12:08
Bolio: Jag har för mig att du skrev tidigare att du jobbar med datasäkerhet nu mera. Anställd på nån firma eller hemifrån så att säga...
Du får gärna använda PM för att berätta mer...

Bolio
2005-05-11, 12:22
Varför?

jwzrd
2005-05-11, 12:25
Varför?

pwnd.

TCOG
2005-05-11, 12:27
Varför?

:laugh: :thumbup:

Bolio
2005-05-11, 12:40
Haha! För att sno den här tråden hittade jag precis en text jag skrev när fenomenet DDoS fortfarande var nytt. Jag umgicks mest på IRCnet i #blackhat då på den tiden då det var mirkkwar mellan etC!/X-Org och lite andra groupz. Men vi sket i sånt, vi hackade bara. (Jag var n00b och fenomenet var relativt nytt så ni får excuse moi):

year: 2000 by: zirek [zirek@zirek.net]
for: the information hungry masses...

---[ DoS and DDoS Demystified ]---

The purpose of this paper is to explain Denial of Service(DoS) and also
Distributed Denial of Service(DDoS) to the many people on IRC that have
asked me about this matter. Denial of Service is a very easy attack
to understand and should be regarded as such, thus I will explain it very
briefly. In here I will explain what DoS and DDoS are, some commonly
used techniques and some methods of prevention.

---[ Some knowledge about TCP/IP ]---

The Internet is the biggest computer network on the face of the earth
and as such it relies on rules. There are four common protocols used in
this network of computers, routers, gateways, etc etc. The first and most
important one I think is the IP protocol. This protocol is responsible
for mainly one thing; finding and delivering packets from one node of the
Internet or LAN to another. IP is the connectionless, unreliable
network protocol in the TCP/IP suite. It has two 32-bit header fields
to hold address information. IP is also the busiest of all the TCP/IP
protocols as almost all TCP/IP traffic is encapsulated in IP datagrams.
IP's job is to route packets around the network. It provides no mechanism
for reliability or accountability, for that, it relies on the upper layers.
IP simply sends out datagrams and hopes they make it intact.
If they don't, IP can try to send an ICMP error message back to the
source, however this packet can get lost as well. (ICMP is Internet
Control Message Protocol and it is used to relay network conditions
and different errors to IP and the other layers.) IP has no means to
guarantee delivery. Since IP is connectionless, it does not maintain
any connection state information. Each IP datagram is sent out without
regard to the last one or the next one. This, along with the fact that
it is trivial to modify the IP stack to allow an arbitrarily choosen IP
address in the source (and destination) fields make IP easily subvertable.
In simplier terms one could say that IP works like the mail-office of a
country. It takes a package and sees to it that it reaches the mailbox of
whom the sender posted it to. This protocol uses an addressing system called
"IP addressing". In the header of an IP datagram there is a field named
"source". In there contains the source address of the packet owner. When
using "raw sockets" in programming one can forge that "source" part of the
IP header and thereby faking or spoofing the origin of the packet... I will
discuss this more later in the text.

TCP is the connection-oriented, reliable transport protocol
in the TCP/IP suite. Connection-oriented simply means that the two
hosts participating in a discussion must first establish a connection
before data may change hands. Reliability is provided in a number of
ways but the only two we are concerned with are data sequencing and
acknowledgement. TCP assigns sequence numbers to every segment and
acknowledges any and all data segments recieved from the other end.
(ACK's consume a sequence number, but are not themselves ACKnowledge'd.)
This reliability makes TCP harder to fool than IP.


---[ The basic DoS attack... ]---

Denial of Service is very easy to understand just by knowing the meaning
of the three words that compile the sentence. When you perform a successful
Denial of Service attack, you see to it that a service is denied from
something or someone. This service can be a TCP or UDP port, a home
connection to the Internet, even the powerful connections of an ISP could
(and have :>) be "dossed". There are hundreds of DoS attacks that have
been exploited and used but I guess you could divide them into two groups.
The first one would be the software dependent(overflow) attacks. These
are based on overflowing a specific daemon or just any program if you have
the necessary access on an arbitrary host in order to crash that
service and the port or maybe the whole system that provides it.
They are based on an exploit that have been found in a program or even
the core of the operating system in for example *nix and windows: the kernel.
Others are due to bugs in the TCP/IP suite as an example of this..
What is done is that the attacker sends to much information to the program
and by doing so overflows the buffer or smashes the stack.
This can lead to either system compromisation(haxx0ring(hacking)) or DoS...
This type of attack is nowadays mostly considered as "unaffective" since
you would rather go for the compromisation or just simply flood the
service and that leads us to the second type of DoS. This attack is also
very easy to understand, since it's simple flooding. There are several
methods of flooding a service but I think that the most common one would
probably be SYN flooding. The attacker launches the attack using randomly
changing source addresses; the source addresses are depicted as from within,
which are not generally present in the global Internet routing tables, and
therefore, unreachable. This means that the attacker floods the victim
with TCP packets that have a SYN flag set. And the server cannot just
"ignore" the attacker since he randomly changes his source ip and the
attacker can't just "firewall DROP" TCP/SYN from the whole Internet because
then he could not connect anywhere and thus not be able to pornsurf the web :P
This diagram might possibly show the elements of the attack slightly better:

host <----- router <--- Internet <----- router <-- attacker

TCP/SYN
<---------------------------------------------
Source: 192.168.0.4/32

SYN/ACK
no route
TCP/SYN
<---------------------------------------------
Source: 10.0.0.13/32
SYN/ACK
no route
TCP/SYN
<---------------------------------------------
Source: 172.16.0.2/32
SYN/ACK
no route

[etc.]

SYN flooding is one method of DoS:ing but there are many more.
Another method is mass ACK flooding (which I personally appreciate
the most :>). Lately I have seen flooding of name servers' cache registers
and DoS attacks against mail servers, etc etc. Every service that provides
something could be a possible DoS target.

There is one DoS attack though, of whom I haven't written but is
considered important and that is the 'smurf' attack. This attack
works in a slightly different way since it uses broadcast ips to
amplify ICMP_ECHO and ICMP_ECHO_REPLY packets(normal 'ping'). What happens
is that the attacker spoofes his IP to be that of the victim which he
intends to "smurf" and he 'pings' these broadcast IP's(I won't explain how
they work kiddies :>) and they think that the victim is pinging them because
the attacker has forged his IP to be that of the victim. So they ping
him back and thereby the victim gets flooded. (I won't go into smurf
attacks any more in this text coz I don't want you ppl to start dossing
eachother :>). A good thing is that most people are patched against
being smurf broadcasters nowaydays so we packetkiddies can't play
like people did in the old days :)


---[ The basic DDoS attack... ]---

For a person to understand what DDoS is one has to understand the word
'distributed'. It means that the attack(DoS attack) is being waged by
more than one system. Before I explain more, remember that everything
must be done with root=superuser rights and remember that you can't spoof
your IP in Windows (except for in the new versions like XP and 2000 so I'm
discussing *nix(even though DDoS attacks without IP forging are possible
in Windows). In practice a DDoS attack is mostly waged in this manner:
The attacker has hacked several computers and connected them all to one
main computer that he uses as a "hub" or client for his DDoS. What the
attacker does is that he uses his DDoS program to tell the other computers,
the servers he that they should start, for example SYN flooding ip number
127.0.0.1 and they all do this. This is obviously much more effective than
one machine waging the same attack. There are several programs that have
been distributed in this field. The one I personally like is Stacheldraht
by Mixter which means "barb wire" in german. Other programs include Trinoo,
TFN, TFN2k etc etc... Since DDoS attacks can produce so much bandwith they
have created a great threat against the Internet communtity. Big sites
like yahoo.com and the american e-bay have been DDoS:ed off the Internet
by kiddies that have scripted their way into "owning" hundreds of root
shells...


---[ Methods of prevention ]---

There have been a lot written about this(even by myself :]) so I will keep
it rather short and concise.. First off, in protecting against the first
type of DoS that I discussed is obsiously not to have exploitable software
which is accomplished by getting involved in the security discussion and
patching your box(es), second thing would be to get some effective and
strict firewalling rules...
There is still one problem though.. and that is against spoofed DoS attacks
and DDoS attacks. As of today there is no "real" protection against those
attacks but there is one method called Ingress Packet Filtering that makes
it impossible for an attacker to forge his IP address and thus not being
able to DoS or DDoS. This is only accomplished if the ISP of the attacker
uses ingress packet filtering and since an attacker can hack broadcasters
allover the world and in different countries with different ISPs he can
still DDoS. But if ALL ISPs used this method it would prevent people from
forging their IPs in order to DoS and thus protecting the Internet
community from such attacks.


---[ How YOU can learn to DDoS people in 2 hours ]---

Fooled ya bitchez ;)

Acknowledgments:

I would like to thank God for making me smarter than him, thus giving me the
opportunity to become an atheist. Because even if it was proven to me that
he existed I would still /kickban him :) I don't like what he has done, nor do
I need him. But nevertheless I don't believe in fairytales and I don't
think that you should either my fellow scriptkiddie/packetkiddie, to be.

I take no responsibility for anything written in this and yeah visit
#darknet @ IRCnet if you want to
diss me or something, i'm the little thingy they like to
call zirek :)

And yeah one more thing... RIP Fadime Sahindal & Astrid Lindgren :(

"zirek" betyder smartast på kurdiska och är min favorit inom estetiken: http://www.geocities.com/ziraksongs/

Han var en nära vän till min farfar.