Hackers Explained 
Visualised by archtomato On Monday, December 26, 2005 at 6:31 Hrs | Minimum B.S.

Ok ok,

Many people don’t get how malicious hackers do their work. In this article, I will explain how they do it.Hacking is not magic. If your computer gets hacked, it’s not the most amazing thing in the world. In fact, it takes almost no skill to “hack” into a computer. A simple point and click? Oh, right! And the keyboard. There are many tools on the internet that allow anyone to hack… No skill needed; the program does it all fo them. These programs are usually classified as “script-kiddie”, or “skidde”, software.

But how about the people that really know how to “hack”? How do they do it? Well all hacking is, in basic terms, is sending data to a remote computer, as well as receiving data. That’s it. Nothing exciting. Sorry to disappoint all you hacker-wannabes, but it’s not all ultra high-tech like in the movies. That is called making it seem interesting as to draw viewers into watching the movie. Now let’s get back to the statement I made before.

It’s not just sending any data to a computer; it’s sending data that will return valuable data back to the hacker. In other words, an exploit of some sort. That’s where the expertise comes in.If this is hard to understand, let me give you all an example. Let’s say someone wanted to hack into your computer. If they wanted to do this 100% remotely without using any trojan horse to create an exploit (aka. backdoor) for them (will get into that later), what would they need to do? Find a service to exploit, no doubt. That’s all they have to work with. So, they use it.

Let’s say a friend gets you to download a file. They say it’s a very neat game that they made and that they want you to test it out for them. So you download it… Only to find it won’t run? You forget about it, and a few days later your friend has your password. What exactly happened? Well let’s see. That file he get you to run? It was probably a trojan horse. In other words, a file that looks like something harmless, but really creates an exploit (or backdoor) for the hacker. That is where it gets it’s name “trojan horse”; it’s outcomes are unexpected. That is also where the term “backdoor” got it’s name; it allows a secret “door” (service that runs returning valuable information to the hacker if he or she connects) to be made on the system.

Many times, if a computer is very secure, it won’t have any exploitable services for the hacker to use. So what would a hacker do? Create an exploit him or her self. This usually requires a bit of social engineering, because he or she actually has to get the target to run the trojan horse. But once it’s there, it usually runs in the background and waits for the hacker to connect to the service. There really isn’t an exploit needed here. If anything, the exploit is that the trojan is allowing the hacker to connect and gain control over the infected computer.

Cheers.

ps: Just the Basics for now. And o ya, Happy Boxing Day Everybody!

Technorati tags: , , ,

Main   |   Previous Article  «      |   Next Article  »  
This entry was posted on Monday, December 26th, 2005 at 6:31 am and is filed under Ageless. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

    Leave a Reply
   
   

   

   

   

   

   

This blog is kept spam free by WP-SpamFree.

Fact File
Archtomato

Archtomato . OxyMoron .
Laughing at Gilded Butterflies

Archtomato works in the IT security industry and has managed to convince his bosses for the past 10 years that his best work is yet to come.

Archtomato is a coffee nut, a photographer without focus, a traveler who can't read maps, a diver who floats all too easily and a champion of world peace.

He is an avid practitioner of the dark side of the force; admires Chuck Norris, Paris Hilton and collects vintage Batman comics. Just like the Horizon, Time Dilation, Flying pigs, Tax Reliefs and possibly, the "Opposition", he believes he is more of a concept than a corporeal being.

Archtomato believes that the true nature of man is decided in the battle between the conscious mind and the desires of the subconscious and that the evil of man's subconscious is often too strong to resist. The only way to win is to deny it battle.

He now lives in a world of pollution, profanity, adolescence, smelly beavers, zits, herpes, broccoli, racism, ozone depletion, sexism, conscription, yellow bananas, stupid people, nightmares, dog whisperers,Gamma Ray Bursts, Nuke Baddies and sings badly but regularly in the bathroom.


 Tomatoes were sacrificed in the making of this website, contents and for the continual existence of its owner.

 Rss 2.0  |  Atom  |  Main

Blog Search




Articles Vault

Categories



References



Recent Comments



Spam


Still going strong in an inane work full of Ozone Depletion, Data Breaches, Chuck Norris, Tough Cookies, Mangy Dogs, Zits, Scurvy, Ninjas, Racism, Pollution, Herpes, Festivus , Broccoli, Mimes, Ghost Whisperer, Smelly Beavers, Petya, Donald Trump, Adolescence, Gravity, Pin Worms, Maths, Black Holes, Jedis, Cuban Cigars, Quick Sand, Methamphetamie, Ransomware and Nuke Baddies. Archtomato.com® reserves the full rights to all materials found on this domain. All works are commisioned and owned by Archtomato.com®, unless explicitly stated and are protected by international copyright laws. Archtomato.com® shall not be held liable should these materials be distributed without the explicit written permission of Archtomato.com®. Not Suitable for Dummies, Feminists, Animal Rights Activists, Scientologists and Dead People. Powered by 125% Freshly Locally Squeezed Tomato Juice.

Archtomato.com © 2005-2019. All Rights Reserved.