Dollars BBS | Technology

feed-icon

Main

News

Animation

Art

Comics

Films

Food

Games

Literature

Music

Personal

Sports

Technology

Random

A Hakcer'a Thread (28)

1 Name: Kouta-kun : 2013-04-30 18:38 ID:KbRFN+pg [Del]

Some hacker online ? See, I said a Hacker, not a Cracker ... Maybe we can trade some informations ...

2 Name: Hatash!HATStoI1IE : 2013-05-01 10:17 ID:jaXzkIH0 [Del]

No, you said A "Hakcer'a". :3

3 Name: Kouta-kun : 2013-05-03 20:58 ID:KbRFN+pg [Del]

Hacker's**
sorry .-.

4 Post deleted by user.

5 Name: Anugar !8wy2pTNghM : 2013-05-04 16:59 ID:GncQ7Ly9 [Del]

lol what kind of information ?

And BTW, tell me something about onion

6 Name: Izumi !OHldAALjDE : 2013-05-06 02:33 ID:WFINI8UF [Del]

I think we should trade some info, but I'm pretty new to the Hacker ways....>.>

7 Name: Anugar !8wy2pTNghM : 2013-05-06 12:16 ID:CecEvO7W [Del]

First of all, I want you guys to tell me what you know about onion. If you answer me right I might give some tips.

8 Name: Plato!JZFVKEQYEc : 2013-05-06 20:56 ID:ePy1dG3A (Image: 225x225 jpg, 6 kb) [Del]

src/1367891780742.jpg: 225x225, 6 kb
What the fuck is this shit? xD

9 Name: Plato!JZFVKEQYEc : 2013-05-06 20:56 ID:ePy1dG3A [Del]

>>7http://en.wikipedia.org/wiki/.onion

10 Name: Anugar !8wy2pTNghM : 2013-05-07 13:52 ID:CecEvO7W [Del]

>>9 lol I said tell me not link me.

I already know what it is, just want to know if you know to make sure you are really hacker starters.

11 Name: Thiamor (on another computer) !Enough.h12 : 2013-05-07 22:16 ID:PjmXt24S [Del]

>>10
If they used Wiki, they aren't.

12 Name: Anugar !8wy2pTNghM : 2013-05-08 08:34 ID:CecEvO7W [Del]

>>11 Well guess you're right, just gonna give a little tip to everyone:
Kali Linux

//saged

13 Post deleted by user.

14 Name: Kouta-kun : 2013-05-23 06:21 ID:KbRFN+pg [Del]

What do you wanna know about onion ?

15 Name: Lance DeBard : 2013-11-21 04:03 ID:nN6Q84uZ [Del]

We should keep this board alive. Maybe as a sort of information trading system?

16 Name: Anugar !8wy2pTNghM : 2013-11-21 11:59 ID:brlhkggW [Del]

>>15 http://dollars-bbs.org/main/res/1352369874.html

//sage this thread

17 Name: Face : 2013-11-23 18:28 ID:Wws/lN5x [Del]

>>15 agreed. We wouldnt leak the information here, however. Simply leave a dollars signature wherever you do leak information. Being an info-broker isnt as easy as it sounds. Leak the wrong information and you'll find yourself in acompromising situation if you're found out by someone and even bigger if you expose our organization. Just be careful. I'm pretty sure our leader wont like it of a paper trail led to him

18 Name: archadmiral!ISvQ2vSsZc : 2013-11-24 20:41 ID:OhGTduAO [Del]

more stupid comments of hipsters saying LOOK AT ME IM A HACKER IL JUDGE U IF U ARE -__- *smh*

19 Name: daremo : 2013-11-25 05:34 ID:0haUtBE7 [Del]

I don't know your eduction background, but if you want to learn hacking, start by learning as much as you can about computers and programming. The more low-level details you understand, the easier it is to learn specifics.

The difference between a script kiddie and a real hacker is pretty simple. A hacker is someone who can read and write assembly, who can debug memory errors in threaded code, who understands good and bad code design. Even if they have never 'owned a box', they have the knowledge of programming and its fallacies, and how people can exploit them. A script kiddie just runs programs. A script kiddie might be able to run metasploit + SET and own your computer, but they can't write safe code or tell you why those exploits actually work.

Bottom line: if you want to be a hacker, learn to program really well first. If you're already there, start looking at basic classes of exploits. Find a tutorial on buffer overflows and do one. exploit-exercises (google it) has lots of very good practice problems for you to learn on. Don't be afraid to look things up as you go. Nobody expects you to know everything when you start. If you do need to look up the answer, try to understand why it works. Then revisit the problem later and see if you can still solve it.

If you ever find yourself unable to understand why an exploit works, it's because you lack understanding of the underlying technology. Figure out what you don't understand and learn it!

I hope this all helped. If you have any more specific questions, I'll be happy to answer them.

20 Name: red !YY8ebcAR4s : 2013-11-26 15:30 ID:EBlVHSW9 [Del]

>>19
I will have to disagree on some of this because the "hacking" culture goes far beyond just coding. But you are right: (computer) hacking require knowledge of the underlying technology. And knowledge of said technology require...passion (this one is true for all hacking you will want to do in your life).

Computer hackers are passionate fans. The kind of people who look up how garbage collectors work in Ruby "just because" when most users out there won't even try to think about it (or know it exists).

For buffer overflows (which are a staple of hacking and the basis of most exploits out there in the wild), the definite read is "Smashing the stack for fun and profit" by Aleph1 and published in issue 49 of Phrack: http://www.phrack.org/issues.html?issue=49&id=14#article

I also encourage you to just read everything you can put your hands on. If you want to learn to code, start with C and ruby. They are a bit similar, (somewhat) easy to understand and both got clearly defined uses.

However, all this will be for naught if you don't learn a (computer) hacker's first skill: research. This may sound condescending but everything you need is out there (yes, even how to write a shell though all major shells have been written more than ten years ago). To do that, you must learn how to break apart a big problem ("How do I hack my neighbor's computer?") into smaller pieces ("How do I get on his wifi anonymously?" then "How can I get inside his machine?") until you get to information you can easily find and learn.

To give you an example of a hacker, look up delroth from the Dolphin project (the GC & Wii emulator): he got a Wii for Xmas some years ago and had an exploit to run homebrew apps on it written right in time for Valentine's day. Sounds hard? Well, when you look at how he did it...not so much ;)

21 Name: daremo : 2013-11-27 03:43 ID:ac1CfDRF [Del]

>>20 I'm so glad you mentioned this. I had completely forgotten to give any attention and credit to all the fascinating non-computer hacking you can do, so I'll toss out a few examples.

Lockpicking is a fascinating subject and contrary to popular belief, it is legal to not only own lockpicking equipment, but also use it on locks you own in almost every country and state (BE SURE TO RESEARCH THIS ON YOUR OWN IF YOU WANT TO TRY). Lockpicking is easy to learn, extremely hard to master, and can be practiced just about anywhere. You can buy a good set from TOOOL (The Open Organization Of Lockpickers) for just the price of materials (they are non-profit), and assuming it's legal, just buy a couple of padlocks and practice on them. Anything cheap should be a good place to start. TSA locks are a joke (literally opened them with a paperclip before) but masterlocks are a good place to start (you generally have to ACTUALLY pick it but you can usually do it in a few minutes even without any prior experience).

Physical security in a broader sense is also pretty interesting. This one you probably won't have as much of an opportunity to play with, but I've broken into my room before when locked out for a total cost of $5 in damage instead of paying a sketch locksmith over $100 in the middle of the night. At the very least, challenge yourself to some mind experiments. Next time you're in some kind of secured place (say a bank), think about how you would break in. How could you prevent someone from breaking in like that in the future?

There is finally social engineering. This is where I am weakest and I can't give you a lot of info. However, there are a lot of great resources out there and I would recommend you at least take a brief look. Social engineering deals with hacking people. How you make someone do something you want them to. It's fascinating to see just how easy it can be to get someone to do something they shouldn't simply by abusing situations, props, and/or social expectations.

22 Name: red !YY8ebcAR4s : 2013-11-27 05:58 ID:TlIa7i/R [Del]

>>21
I wasn't even thinking of lockpicking, thanks for reminding me :D A lot of computer hackers I know are into lockpicking too (plus of course, the MIT Lockpicking Guide :D http://www.capricorn.org/~akira/home/lockpick/ ).

Social engineering involve AN AWFUL LOT of confidence and knowledge of basic human psyche. It's not guaranteed to work on everybody but when it does, oh boy... What is funny is a lot of computer hackers will prefer social engineering to computer hacking to get access to a system.

23 Name: daremo : 2013-11-28 05:00 ID:lDVk+SYX [Del]

>>22
Yep. Lockpicking is a lot of fun, and you can do it while you watch TV or in class or whatever. I strongly recommend it to anyone who's reading this who's curious. Definitely go for the TOOOL picks though because they literally only charge cost of materials and their picks are high quality.

24 Name: Anugar !8wy2pTNghM : 2013-11-29 16:42 ID:wL5QhINy [Del]

If you want to continue this thread then maybe someone should at least recreate it, the title has grammatical mistakes and the first post is childish, don't you guys think so ?

25 Name: Ao!xbaEGjJEyU : 2013-11-29 17:04 ID:y1Pnocx/ [Del]

>>24 due to my lack of interest and involvement in this thread, I said nothing, but I kind of agree.

26 Name: Hacker-san : 2013-11-30 23:54 ID:gbwURI76 [Del]

is there a onion wiki or search engine? pls kind souls link it to me

27 Name: daremo : 2013-12-01 02:04 ID:Ct/38EdQ [Del]

>>26 I don't understand what you're looking for. Are you trying to find information on onion routing? Try wikipedia [http://en.wikipedia.org/wiki/Onion_routing].

If you elaborate I can give you more useful information.

28 Name: Hacker-san : 2013-12-01 03:32 ID:gbwURI76 [Del]

>>27 thank you :3