QOTD: Have You Ever Hacked Anything?

Page 3 - Seeking answers? Join the Tom's Hardware community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
Hacked school network gained access to powerschool and all teachers files. Somebody ratted me out and I almost got expelled except I didn't do anything, just did it to see if I could. And then there are other things that I am going to plead the 5th on.
 
about 7 years ago (forgot the exact date) i did hacked 2 internet shops ragnarok players using a fake levelupgames website... what i did was mimic the exact login page of ragnarok philippines website and change the code in username and password... if they login in my fake website there username and password will be sent to my dummy email account while it will reload to the original site .. 😀, keylogger cannot be used because of another game have gameguard on it... i make my site as a homepage..
 
It largely depends on your definition of hacking, but yes, I probably have. My Junior year of High School, I installed Firefox on one of the classroom computers and made it so I could use it from any computer in the school.
 
As a Cisco certified security consultant I have done pretty much everything, ranging from packet capture, spoofed mac and IP addresses, SQL injection, XSS, social engineering, dumpster diving, cracked WEP keys, .... and some more all for educational purposes (and most in a lab environment)
 
some programs that's sell for thousand of dollars..u have to use pirated version to learn it ..
u know it's big chance to sell sell some thing u won't use it lather if u fail to learn on it .
so if i found useful for me i buy it that simple .
 
Hacked some things using tutorials and stuff. Hacked a keyboard to use it in an arcade cabinet. All the rest is pirating :).
 
Only once: These B*st*rds tried to screw me with a fake employment email when I was desperate for work; where they "conveniently" provided a means for me to verify my credit history. Well, not only did I not buy it; I hacked their website and and ultimately their server. And yes, it was a real Scam operation too. I had a very nice time forwarding their "personal" (we all know they used stolen IDs anyways) info to the appropriate authorities. Have to admit: It wasn't entirely legal, but as mine was the lesser of two crimes....the big boys were perfectly fine to take the tip and move in. Still, it's very satisfying when the predators become the prey....and it makes dealing with ID theft issues like this that much easier to deal with.
 
Yea, but the most recent thing was for a friend, he was talking to a girl from New York on the phone, and she said her myspace had some pictures. He was her friend on the site, and I wasn't, so I ended up hacking his g-mail and myspace to see what she had sent, and it ended up being a bunch of pictures from 4chan, lol!
 
You're asking us to openly admit to doing something that might not be legal?
I would never do such thing. I did have to remove certain protocols from my laptops wlan adapter before things like wow's login system would work again, but unless you have logs, I've not done anything.
 
You're asking us to openly admit to doing something that might not be legal?
I would never do such thing. I did have to remove certain protocols from my laptops wlan adapter before things like wow's login system would work again, but unless you have logs, I've not done anything.
 
Installing a crack using a keygen or follow an SQL injection guide is not hacking.
Creating the crack the keygen or the SQl injection guide IS.

However writing any other then a hello world script could be called hacking if you accomplish your goals by being creative and not by following the set standards to reach your goals.

The days of dumpster diving are over but you could still social engineer which is might be called hacking to (my favorite part).
As soon as you go on-line and look for the answer to your (software or hardware) problem and use the guides or notes from some one else your no longer hacking your just another computer user.
However if the result of some ones notes is not good enough for you and you start changing the recipe you are hacking again.

Hacking really is not all that negative as people think of it since it only means you are using the tools you have in a creative way like for instance using your skateboard to transport your fridge could be a hack as long as you don't google how to move my fridge with just the tools i have in my locker.
 
The occasional hack for work, breaking into machines we need to fix because waiting on the IT departments of various customers can take a while. Usually with a customers consent (Just a non-IT person).

Then there was college, They added custom signatures to the AV scanner to detect games, which was a shame, as they were good computers for their time, and were in a nice isolated location for gaming..

It was an old DOS based AV scanner, and I managed to get around it by renaming the config file, and dropping in one I tweaked myself, to have a blank password.. Then I could use this blank password to terminate the TSR, remove the game sigs, etc.... Once the TSR was gone, we would load on our games, and then use Norton Disk Doctor, to flag the folder as a "Volume Label".. which hid it just fine.. Next time, we'd just unload the AV scanner, remove the Volume Label flag, and game on!
 
[citation][nom]Master Exon[/nom]We call your kind script kiddies.[/citation]
script kiddies are defined as hackers by the courts, so that's hacking too. The german kid that created that virus that would crash lsass (dun remember the name) was just a script kiddie .... but did immense harm, and could potentially have used his software to gain unauthorized entry to thausands of computers - which is usually defined as hacking as well.

In any event - hacking is a lot of different things, and a lot of different actions qualify as it. Anyone exploiting 0day vulnerabilities are potentially hacking - not just the person who posts the first proof of concept.
 
[citation][nom]JStr5375[/nom]It was an old DOS based AV scanner, and I managed to get around it by renaming the config file, and dropping in one I tweaked myself, to have a blank password.. Then I could use this blank password to terminate the TSR, remove the game sigs, etc.... Once the TSR was gone, we would load on our games, and then use Norton Disk Doctor, to flag the folder as a "Volume Label".. which hid it just fine.. Next time, we'd just unload the AV scanner, remove the Volume Label flag, and game on![/citation]
Another solution would be to create a file with a certain name, and a folder with the same name (using nortons disk edit or a similar utility) that would be enumerated later. Most software of the day would only scan the first of the entries, thus not even bothering with the folder. And cd would still be looking for an item with the 'd' attribute flagged.
 
When I was in High School, they used security software that was really easy to break in to. I found back-doors to all of the games (what else would you do in class?) and changed a password on one of the machines. The IT department had to pull me out of English class to ask me what the password was.

Then, when I worked at Wal Mart, we had to do these stupid computer-based-learning things (all you wal mart associates know what I'm talking about). Well, all of the sessions were written with Flash and they locked down the machines so you couldn't access any of the Windows components - well, as far as they knew! I was able to get on IE by right-clicking on one of the videos and going to the About Flash section, which opened an IE session and I was able to not only surf the web, but access some of their network resources :)
 
Throughout my 2 years at college we had access to every password on our mac network and used them to hide network games etc. on the servers.

They were always looking for over-complex ways of how we were doing it, never thought to look for the obvious answer... walk into the head of computing's office when he's out at lunch and copy the unencrypted password list off the server.

I wrote all the admin and teacher's passwords I could remember on the white board in the computer room just before I left at the end of the 2 years. Would have loved to have seen their faces.
 
Hacking cracking, although often hacking is for the purpose of cracking.
One of the "coolest" things I ever did was create a program in RBase (a DOS-based relational database) in the late 80s that created and executed its own menu blocks, in order to create dynamic picklists.
If a company implied I'm a pirate (e.g. by using an onerous form of copy protection), it did not bother me at all to earn the name by breaking it (typically for test-before-purchase purposes). If, however, the company trusted me, by not doing so (e.g. The Software Group/Enable Software), I would go to great lengths, including physical security, to prevent people from copying it off my system.
I've hacked/modded any number of things, but I am not a cracker. I do not count unlocking advertised capabilities in a device I've purchased, that someone else locked, as cracking, since I'm undoing damage.
 
I've modded a PS2 to play any region games, added a 120GB HDD and stored games on it and used some software to manage it all. I modded an Xbox with a larger HDD and faster cable (80PIn) as well as loaded up a fancy dasboard where I can view movies/pictures a library of installed games and a handful of emulators.
I ghetto 'hacked' a 80mm fan to extended wires that were soldered to a molex power connector so that I can cool off my 24" monitor. But I wired it in such a fashion that it wasn't going full speed. It was acting funny and was very hot to the touch. Basically the component cables attached to my xbox were even 'sinking' out the heat it was so hot. There's a bunch of little other things but no serious swordfish type hacking.

 
I hacked Toms Hardware so to post this ridiculous news, because i'm brain dead and don't have anything else to do.

Seriously...who would post what they have REALLY done (if anything) ? - only immature kids.

bah.
 
Well, if you count the "hardware hacks" on hackaday.com as actual hacks, then i'm preformed hundreds of hacks along those lines.

If you count using a software hack that someone else has created and bundled up all neat and tidy in a winrar archive, then i have thousands.

The only real software hack that i've done myself is changing a few lines in an xml file to enable some features in IMVU that you had to pay for, apparently a lot of other people realized you could do this too because it is now fixed. :-(

Also, referrer spoofing
 
Status
Not open for further replies.