TranceAddict Forums

TranceAddict Forums (www.tranceaddict.com/forums)
- Chill Out Room
-- computer hacking
Pages (5): [1] 2 3 4 5 »


Posted by Slylee on Aug-27-2009 20:20:

computer hacking

ben or anyone who is really smart about computers, can you explain it to me like i'm a 2 year old please?

was just having a convo about this with my boss today and we were really curious about how it works. how do u get someone's password? do you have to send them a file and once they open it, it gives the hacker access?


Posted by KilldaDJ on Aug-27-2009 20:22:

keyloggers? trojans? wtf u on about woman?


Posted by Capitalizt on Aug-27-2009 20:23:

There is no "easy" way.. You need to understand complex code..It takes months to learn.


Posted by Leon on Aug-27-2009 20:24:

http://pwned.nlhttp://pwned.nl


Posted by iTranscendence on Aug-27-2009 20:24:

Trojan: sending a file like a trojan horse, you have to open it and run the .exe file

phishing: fake login pages, this is usually how people get their social networking pages hacked.

social engineering: calling support for the product in question and convincing habeeb in punjab india to reset your password, common problem with xbox live.


Posted by enydo on Aug-27-2009 20:24:

lol.


Posted by lenazi on Aug-27-2009 20:25:

you smoke a lot and it comes naturally.


Posted by Slylee on Aug-27-2009 20:25:

quote:
Originally posted by Capitalizt
There is no "easy" way.. You need to understand complex code..It takes months to learn.


im not trying to learn how lol i have better things to do. i just wanted to know how it works.


Posted by david.michael on Aug-27-2009 20:26:

Re: computer hacking

quote:
Originally posted by Slylee
ben or anyone who is really smart about computers, can you explain it to me like i'm a 2 year old please?


QUIT SHITTING YOUR PANTS.

IT'S TIME TO USE THE BIG-GIRL POTTY NOW.


Posted by Slylee on Aug-27-2009 20:27:

quote:
Originally posted by iTranscendence


phishing: fake login pages, this is usually how people get their social networking pages hacked.



ok what do you mean "fake login pages". you mean the hacker creates one and somehow gets the victim to sign in?


Posted by enydo on Aug-27-2009 20:27:

quote:
Originally posted by lenazi
you smoke a lot and it comes naturally.


Shiiit I need to change my avatar.


Posted by Cloudburst on Aug-27-2009 20:27:

Usually you sit down in front of an console and start typing commands like "hack www.fbi.com -NOW -3" then a large 3D animation starts following your commands flying through the world wide web until it reaches its target. Pretty easy actually.


Posted by enydo on Aug-27-2009 20:29:

This is how it works.


Posted by kadomony on Aug-27-2009 20:32:

quote:
Originally posted by enydo
This is how it works.



yep.
the more flashy graphics, the more hacking power you have.


Posted by david.michael on Aug-27-2009 20:32:

quote:
Originally posted by Slylee
ok what do you mean "fake login pages". you mean the hacker creates one and somehow gets the victim to sign in?


Essentially. Often there is a bit of social engineering involved with phishing, too.

For example, a user gets an e-mail something like:

quote:
Facebook is now offering 100 free iTunes downloads for the week of August 23! [bunch of additional, convincing text]

Click the following link to log in to your Facebook account and claim your free downloads! http://facebook.freeitunesoffer.com/login


In this case, the user would have registered "freeitunesoffer.com" and made a subdomain of "facebook" to end up with that sort of URL, which might look legit to the unsuspecting n00b. They then create their own login page that looks identical to the real Facebook one, but the form would actually send the information you type in to the creator of the fake page (or wherever they want).


Posted by Slylee on Aug-27-2009 20:32:

lol

im being serious. i'm genuinely curious. what does the fake login page mean? would that only work if you are trying to hack someone's computer who lives in the same home? you couldn't do that from another computer/another location could you?


Posted by enydo on Aug-27-2009 20:32:

I'M IN THE MAAAAIINNFRAAAAME.


Posted by david.michael on Aug-27-2009 20:33:

quote:
Originally posted by Slylee
lol

im being serious. i'm genuinely curious. what does the fake login page mean? would that only work if you are trying to hack someone's computer who lives in the same home? you couldn't do that from another computer/another location could you?


See above


Posted by Slylee on Aug-27-2009 20:33:

quote:
Originally posted by david.michael
Essentially. Often there is a bit of social engineering involved with phishing, too.

For example, a user gets an e-mail something like:



In this case, the user would have registered "freeitunesoffer.com" and made a subdomain of "facebook" to end up with that sort of URL, which might look legit to the unsuspecting n00b. They then create their own login page that looks identical to the real Facebook one, but the form would actually send the information you type in to the creator of the fake page (or wherever they want).


ohh ok i get it.

so it only works if the person has your email address though right?


Posted by enydo on Aug-27-2009 20:34:

quote:
Originally posted by Slylee
lol

im being serious. i'm genuinely curious. what does the fake login page mean? would that only work if you are trying to hack someone's computer who lives in the same home? you couldn't do that from another computer/another location could you?


Hacking is not a set process that one goes through in order to "hack" a system. It's complicated, there's a lot of things you can pull to "hack" someone, usually involving some sort of computer code. Basically, if you don't know anything about computer science you're going to have a tough time understanding what hackings all about.

Also, good hackers generally do not share their secrets.


Posted by iTranscendence on Aug-27-2009 20:34:

quote:
Originally posted by Slylee
ok what do you mean "fake login pages". you mean the hacker creates one and somehow gets the victim to sign in?


Yes, like once they get an account they will run bots to get them to spam comments on all its friends profiles with like the "free macy's" or whatever that was going around for a while on myspace. When you click that link, it redirects you to a login page that the average moron would just think was the myspace login page, but if you looked at the web URL.

instead of
login.myspace.com

you'd see
login.something.something


Posted by kadomony on Aug-27-2009 20:34:

GAME OVER, MAN!
GAME OVER!


Posted by david.michael on Aug-27-2009 20:34:

quote:
Originally posted by Slylee
ohh ok i get it.

so it only works if the person has your email address though right?


Well, with the aforementioned method...yes. That's just an example, though.


Posted by Slylee on Aug-27-2009 20:35:

i know it's complicated i'm not expecting to just know how to do it after reading some posts, but you guys are doing a good job of dumbing it down for me i appreciate it.

would scanning your computer with ad-aware (the free one) help find shit?



* also, what can someone do to prevent being hacked?


Posted by woscar on Aug-27-2009 20:36:

You can learn all about it here

http://www.imdb.com/title/tt0113243/


Pages (5): [1] 2 3 4 5 »

Powered by: vBulletin
Copyright © 2000-2021, Jelsoft Enterprises Ltd.