
We are back!
Moderator: dromia
Re: We are back!
...you've met my son then
Although I have to say in his defence he's not a hacker.

-
- Site Admin
- Posts: 17530
- Joined: Fri Nov 05, 2010 7:52 pm
- Location: Wind Swept Denmark
- Contact:
Re: We are back!
tongueoutWatcher wrote:...you've met my son thenAlthough I have to say in his defence he's not a hacker.
Re: We are back!
Watcher wrote:...you've met my son thenAlthough I have to say in his defence he's not a hacker.
If he were, and any good at it, would you know?

- Blackstuff
- Full-Bore UK Supporter
- Posts: 7840
- Joined: Sun Nov 07, 2010 1:01 pm
- Contact:
Re: We are back!
I've never understood hacking
Ok if you're hacking into a bank or other financial institution for money, or MI6 the CIA to get 'secrets' or to 'bring the establishment down', but whats the story with attacking a benign website like this? Or when they create viruses that attack personal computers?? Only one explaination, they're fornication onanists!
:lol:


DVC
Re: We are back!
Mark, it is 99.999% down to one thing, financial gain.
- Blackstuff
- Full-Bore UK Supporter
- Posts: 7840
- Joined: Sun Nov 07, 2010 1:01 pm
- Contact:
Re: We are back!
Have you and the Viking being away pillaging or something?? If so, share the wealth please! 
DVC
Re: We are back!
I wish.... Bot networks, that is privately owned computers that are controlled remotely are worth big money as they can be used for many purposes and hired out by the day or activity. Usually the machines are infected with a worm of some form invariably because the operating system is old or not fully hotfixed/service packed or has been compromised due to poor or out of date anti virus software and most typically because the user is logged in with full admin permissions or the machine is exploited to escalate to full admin permissions.
Once compromised the machine run as usual but periodically contact an IRC server and look for activity instructions, if none exist they just run as normal. Eventually they are given a command, it could be download a file and send a spam message to a few million unsuspecting mail accounts, it could be send out some form of phishing attempt and it could be for a denial of service where they all try and connect to a specific server or array or even better send malformed packets that cause the remote machine/site to slow down while it tries to handle the packets.
The poor admin then have to try and stop the remote attack by denying subnets or throttling back connections.
There is a load more than this but it is not the sort of thing I talk about these days :roll:
Once compromised the machine run as usual but periodically contact an IRC server and look for activity instructions, if none exist they just run as normal. Eventually they are given a command, it could be download a file and send a spam message to a few million unsuspecting mail accounts, it could be send out some form of phishing attempt and it could be for a denial of service where they all try and connect to a specific server or array or even better send malformed packets that cause the remote machine/site to slow down while it tries to handle the packets.
The poor admin then have to try and stop the remote attack by denying subnets or throttling back connections.
There is a load more than this but it is not the sort of thing I talk about these days :roll:
- Blackstuff
- Full-Bore UK Supporter
- Posts: 7840
- Joined: Sun Nov 07, 2010 1:01 pm
- Contact:
Re: We are back!
All WAY over my head!
Thanks to everyone involved keeping the cretins at bay though! clapclap

Thanks to everyone involved keeping the cretins at bay though! clapclap
DVC
Who is online
Users browsing this forum: No registered users and 3 guests