Hacking

From Encyclopedia Dramatica

Jump to: navigation, search
SPOILER: This article is written by script kiddies on acid. It is utter shite. You can help by becoming an hero over it.
Hacking illustrated
Hacking illustrated

Most scholars agree that hacking refers to an activity in dealing with computers, which is generally regarded as a hard thing to do. There are of course differing descriptions as well. Over the course of history the world has been separated in to four schools over the meaning of hacking:

  • According c_Ne0 (Josh Miller M/14/CA), Hacking is the process whereby you destroy someone's life through the internet, and has to do with cool console with greenish characters that flicker and scroll and a lot of ones and zeros. This theory also claims hacking some faggots makes you a very cool guy.
  • According to Ellie Miller (F/32/CA): Although 133t h4xx0rz claim it involves "skill", it's simply as easy as giving AIDS to someones daughter. (Of course while it might be true for some of you to see a root of a box you didn't buy, it is logically impossible for any anon to ever have seen the female genitalia, let alone contract AIDS you can spread.)
  • Some subjectively-instrumentally oriented scholars think of hacking as a way of life. Most of them also agree that this way of life composes of sitting in a swivel chair and having minimal female company throughout one's life.
  • According to the most recent theory hacking is in fact a dialect of the english language that's closest lingual relative is Cockney and Cock-mongling.

Contents

Techniquez

contains neolithic-period skripts
contains neolithic-period skripts
  1. Using worms on computer networks is as old as the fucking network. There was some shit in the 1970s and 1980s with school networks I read about on unix fortune which I use as a screensaver. (Somebody who knows about the early days, type something in)
  2. Trojans were the fucking thing in the 90s Since people downloaded lots and lots of Windows executables, it wasn't very difficult to write one that started a server in autoexec.bat and logged to some IRC (The incredible mastery of fopen, fwrite and whatever the OS had for sockets). Only retards download trojans nowadays.
  3. Overflowing a string, one way of "just overwriting" a CPU register was first done in 1988. It became standard practice after it was released in Phrack magazine in -96. Retards from my age group who grew up back then still have trouble accepting that trojans, db injects, XSS and bruteforcing are hacking. Only buffer overflows and DNS-spoofs is hacking...
  4. Database injects became popular in about 2000 after some rudementary security was put in place. Simple as fuck. The second resort of kids after bruteforcing failed, when it doesn't work they flood. Have a cheatsheet to get the basic idea.
  5. XSS is the process of injecting shit on websites. Hacking your email account used to entail these, now it plagues forums and wikis. They can be used to fetch your cookies and spoof SQL injects.
  6. Bruteforcing. Oh well, AES was put in place in 1997 to replace DES in US national security, draw your own conclusions. Before 2000 bruteforcing usually entailed a supercomputer. Now, due to Bill Gates, botnets are used instead. Bruteforcing is also popular among script kiddies, it usually gets them a ban from the science lab since police don't really give a fuck if you entered login: root, password: root on your schools nix. For extra-credit, bruteforce /etc/passwd or /etc/shadow on a Windows box.
  7. Spoofing takes many forms, some XSS amounts to spoofing
    • Faked login skript: Generate one by acquiring webspace, copying the HTML from some site (e.g. MySpace), make your own php or perl backend to log coming requests, link 'n profit.
    • DNS spoof. Hacking a software called 'bind' at some point in the DNS-server tree, which is what Angyl's merry group of trolls did to 4chan. Old versions of bind have a fair amount of overflow bugs on them as well as points (aka race conditions) to put in your own regs, but probably you better just stick with the program and bruteforce the registration password.
    • Pharming. Usually means fucking with the DNS at the point of request, the client rather than the server. Same methods apply as above. Just hack the home ISP servers instead of the server end ones. Or beat the DNS server to answering the request - useful if you have a T3 and several hacked routers, I don't.

Linguistics

Hackslang"I think my game of life has been going half to hell, the partyvan bitches found out three of boxes I own after sum dimwit admin somehow found my leet spoilts - i quess it was tripwire, one fukken masterpiece - and run a packet sniffer."
Proper English "Three of the computers I use to facilitate illegal and morally questionable access to other computers were recently acquired by the law enforcement services. This happened after a system administrator rightly run a packet capture program and found out about my illegal compiled and inline programs. This interlude might have been triggered by running the tripwire program, I do so abhor that program."

History of hacking

Hacking was first discovered in late 1971 by a 26-year-old soldier who had just gotten out of Vietnam and his blind, crippled Mexican friend by using a whistle they found in a box of Captain Crunch. No, srsly, I'm not kidding. They found that this whistle could give them free phone calls and shit, which allowed them to troll IRL all over the world, sending lulzy (but FREE) calls to China or Africa. In 1973, they showed two fags named Steve Jobs and Steve Wozniak how to hack the phone system using their techniques (though by this time they had gone from a Captain Crunch whistle to a contraption they built themselves). Steve Jobs later founded Apple and gave blowjobs because his last name is Jobs, lol.
Also, cocks.

How to hack

Websites

Emailz

  • Subscribe them to a bunch of mailing lists.

IRC

Game Hacking

Note

Let it be known that if you are just copying and pasting it doesn't make you a hacker. No matter how many times you do it. Hacking exposed should answer your more retarded questions of what is and isn't hacking.

PS. Bubba's interest

See also: bubba
See also: bubba

Bubba appreciates you reading this article. Bubba loev shota. You can help Bubba find a reasonable love life in prison by following this simple checklist:

  1. Download, install nmap, nessus and every other tool and script imaginable. No trojan can penetrate your awesomeness
  2. Use Vista or some any other Gate$ driven OS written under the philosophy: "security is a joke"
  3. Become cocky over your skill-level (yeah, proxys are for 10zers and fuck remailers)
  4. when words fail, SYN-flood!
  5. Build a botnet
  6. Ethics - wtf, anything goes!
  7. Hack .gov sites, you are so 1337
  8. ????
  9. PROFIT

How to protect yourself

Who you should hack

See also

Personal tools

Bookmark