Page 1 of 1

I want some info on hacking can you help.

Posted: Sun Jun 14, 2009 9:57 am
by Judgment
I want to know how hacking works. Also i know languages like C, C++, java. Can i implement them in hacking or solving puzzles :?:

I am wondering how the puzzles on this site help in learning hacking.
I would appreciate if anybody will help. :)

Re: I want some info on hacking can you help.

Posted: Sun Jun 14, 2009 5:35 pm
by plope0726
Judgment wrote:I want to know how hacking works. Also i know languages like C, C++, java. Can i implement them in hacking or solving puzzles :?:

I am wondering how the puzzles on this site help in learning hacking.
I would appreciate if anybody will help. :)
The best way I can think to explain hacking is as a lifestyle. A hacker takes what they know about something like a computer and thinks of new unique ways to use that something. It's not necessarily about gaining unauthorized access to a system or stealing information from remote computers etc.

For example, whoever first thought about the possibility of capturing packets being transferred over a wireless medium knew that the data was sent over the air and took what they knew about that to figure out a way to grab those packets with their wireless card.

As for the puzzles on this site...To complete them you need to know about certain topics like encryption, programming, web design, and so on. So if you don;t know about the specific topic you need to learn something about it to complete the mission. Therefore they encourage you to think critically and to learn about different subjects. By gaining this knowledge one can understand how things work and find new and unique ways to use these things.

Posted: Mon Jun 15, 2009 2:14 am
by Judgment
Thanks buddy, that was quite a good explaination. :D

But can i implement java,C or C++ while hacking? :? If yes can you give me the basic outline of the procedure in short.


-Judgment

Posted: Mon Jun 15, 2009 3:05 am
by plope0726
Judgment wrote:Thanks buddy, that was quite a good explaination. :D

But can i implement java,C or C++ while hacking? :? If yes can you give me the basic outline of the procedure in short.


-Judgment
To be honest, Im not much of a programmer...but yes you can use java, C, or whatever language. You are using what you know, say C++, and using it to solve a problem, or accomplish a specific task.

To put this in the context of hacking, let's take a Denial of Service attack for example. Say you have uncovered a vulnerability in an operating system, such as an open port that shouldn't be, that leaves a system open to a DoS attack. You could perform this attack manually by keying in whatever necessary to perform the attack, or you can take the steps of the attack and the knowledge you have of programming and write a script that will perform the attack for you by simply keying in the IP address. Knowing programming is also good because you think logically, and you better understand the inner workings of a computer system. You also have a better understand of how a program that has already written, was put together and how the programmer may have been thinking when writing the code. I hope this make some sense.

Posted: Wed Jun 17, 2009 9:17 am
by Liidian
Judgment wrote:Thanks buddy, that was quite a good explaination. :D

But can i implement java,C or C++ while hacking? :? If yes can you give me the basic outline of the procedure in short.


-Judgment
I think i can call myself s good "hacker" but i doesn't know a single language, but i understund them all :P you understund? i see the code and with abit of logic i figure out what the line do ^^

Posted: Wed Jun 17, 2009 8:45 pm
by LarsH
Liidian wrote: I think i can call myself s good "hacker" but i doesn't know a single language, but i understund them all :P you understund? i see the code and with abit of logic i figure out what the line do ^^
http://catb.org/esr/faqs/hacker-howto.html wrote: How do I tell if I am a hacker?

Ask yourself the following three questions:

* Do you speak code, fluently?
* Do you identify with the goals and values of the hacker community?
* Has a well-established member of the hacker community ever called you a hacker?

If you can answer yes to all three of these questions, you are a hacker. No two alone are sufficient.
From what you say I don't think you qualify. It's not about just understanding, but to create and improve. Sometimes logic is not enough, as seen in one of my favourite code snippets:

Code: Select all

float lol (float x){
    float xhalf = 0.5f*x;
    int i = *(int*)&x;
    i = 0x5f3759df - (i>>1);
    x = *(float*)&i;
    x = x*(1.5f - xhalf*x*x);
    return x;
}

Posted: Thu Jun 18, 2009 12:21 am
by plope0726
LarsH wrote:
Liidian wrote: I think i can call myself s good "hacker" but i doesn't know a single language, but i understund them all :P you understund? i see the code and with abit of logic i figure out what the line do ^^
http://catb.org/esr/faqs/hacker-howto.html wrote: How do I tell if I am a hacker?

Ask yourself the following three questions:

* Do you speak code, fluently?
* Do you identify with the goals and values of the hacker community?
* Has a well-established member of the hacker community ever called you a hacker?

If you can answer yes to all three of these questions, you are a hacker. No two alone are sufficient.
From what you say I don't think you qualify. It's not about just understanding, but to create and improve. Sometimes logic is not enough, as seen in one of my favourite code snippets:

Code: Select all

float lol (float x){
    float xhalf = 0.5f*x;
    int i = *(int*)&x;
    i = 0x5f3759df - (i>>1);
    x = *(float*)&i;
    x = x*(1.5f - xhalf*x*x);
    return x;
}
While this list is an ok identifier of computer hackers, I don't fully agree with it. I don't think being a hacker is restricted to just computers. For example, one may know a lot about a particular tool and like how it is put together and how it works, but may figure out a way to modify that tool to do it's job better or use it in other ways not intended by the creator. In this case I would say the person has hacked the tool. Like the MIT model railroad club rigging old telephone equipment to create a complex system to control the railroad track. They used equipment meant for one task to do something it wasn't made for. While this is close to computer hacking, its not quite the same. In my opinion hacking can be applied to more than just computers so programming is not always necessary to be a hacker and about have a member of the hacker community call you a hacker? why is this a requirement. If a hacker just isn't affiliated with anyone in the hacker community, that doesn't mean that they aren't a hacker. That just means they aren't close to other hackers.

Posted: Thu Jun 18, 2009 5:57 pm
by LarsH
plope0726: I agree on that. But the first post made me assume only software hackers were considered.

Posted: Thu Jun 18, 2009 9:49 pm
by plope0726
LarsH wrote:plope0726: I agree on that. But the first post made me assume only software hackers were considered.
I'm sure that's what he was talking about (software), and an understanding of writing and reading code is certainly a must for software hacking. I just feel that limiting hacking only to computers is inadequate since anything can be improved upon and used for things other than the original intent. I also feel it's necessary for any kind of hacking to have not only a deep understanding of a topic but a broad understanding of many different topics.

Posted: Fri Jun 19, 2009 6:08 am
by Judgment
I came across some tools some of them were nmap and CRC32. Can any one tell me how is its functioning, or can its use make someone to sue the user?



-Judgment

Posted: Fri Jun 19, 2009 7:01 am
by plope0726
Judgment wrote:I came across some tools some of them were nmap and CRC32. Can any one tell me how is its functioning, or can its use make someone to sue the user?



-Judgment
nmap is a port scanning tool. It depends on the country you are in whether or not it's illegal. In the US it is not illegal, but other countries it is. I'm not familiar with CRC32 but after searching Google it looks to be used as a checksum generator for files, usually used to verify that the data of a file hasn't been corrupted or altered. There shouldn't be any legal ramifications for it's use.