The Fifteen Greatest Hacking Exploits

VoRogue

Distinguished
Feb 6, 2007
24
0
18,510
The interesting thing about this article is that while some of the higher profile people caught are of course identified there were more [probably many more] who were not including some of whom are now employed in various places including the Security Services of some countries. In fact, I know one personally who was at University at the same time as I was and was just as active surveying the University Computers as I was however unfortunately some idiot crashed the system when I was where I shouldnt have been and I got caught by the autologging on crash system. I got at ban for a period while he was not on at the time and escaped going onto much bigger and brighter things.

Such is life.

VR

 

boonality

Distinguished
Mar 8, 2008
1,183
0
19,310
That is a good article but it does, however, only focus on the the people that were busted and got a lot of media attention. There is a huge wealth of happenings in the security arena both good and bad.
 

Bobjeee

Distinguished
Oct 13, 2007
23
0
18,510
some1 here ever hacked?

is it difficult to hack for example ur school network with an laptop from outside, to change ur marks :p?
 

boonality

Distinguished
Mar 8, 2008
1,183
0
19,310
Bobjeee, Are you serious? You don't just "hack". There is a certain level of education required. And no I am not calling you stupid or anything, I mean education to the specifics of required tools for specific tasks and so on.
 

tipoo

Distinguished
May 4, 2006
1,183
0
19,280
[quotemsg=4691770,6,150573]some1 here ever hacked?

is it difficult to hack for example ur school network with an laptop from outside, to change ur marks :p?[/quotemsg]
well, i dont think that would realy be considered hacking, but you could bring in a laptop, and try some obvious passwords like "password" or "admin" to get onto the network. once your on it, you could copy the marks program file onto your laptop and change your marks, then replace the file.

its probably not as easy as that, as any modern school will have many safegaurds against this. they will have backups of all the teachers files that they can revert to, and probably someone monitering activity. and in universities, it would be next to impossible.

by the way i have never tried this and neither should you!
 

boonality

Distinguished
Mar 8, 2008
1,183
0
19,310
[quotemsg=4691780,8,141984]yeah it's not as easy as installing exchange server .... lol ^^^[/quotemsg]


LOL, well fact is that anyone can install exchange server. Staying sane enough to keep administering it is where the problem lies
 

bounty

Distinguished
Mar 23, 2006
389
0
18,780
Interesting article. I wonder what the criteria is for a "greatest hacking exploit" is? 30% for media coverage, 25% for difficulty 25% for bawlzyness and 20% for impact or something like that?

(edit: Also, I belive the last sentence of the article is wrong. These days things are more virrulent and massive.)
 

BeAuMaN

Distinguished
Jun 12, 2006
55
0
18,630
[quotemsg=4691770,6,150573]some1 here ever hacked?

is it difficult to hack for example ur school network with an laptop from outside, to change ur marks :p?[/quotemsg]

Actually... I almost got in trouble in high school for this... and I was definitely thrown out of a special computer program at my high school for this (Man that screwed up my grades, but no regrets)...

Let's see, at my main high school program...

Grades really depend on the program, granted, High School for me was... 3 years ago, in California at that? If you have the knowledge of how Microsoft Server works, and how the various policies are enforced, you can mess with a sloppy admin's network, especially since our school was lower-budget, so he had to piece together a network of varying machines of varying generations making them inconsistent.

Anyhoo, eventually you could get Remote Desktop rights on the network, and be able to access a teacher's desktop remotely, grab the grade file (Which was encrypted), somehow find a copy of the program somewhere (That was the luck part... unless you had knowledge of reverse-engineering encryption, which I didn't), edit it in the night, and replace it in the morning. You also have to make the changes very slight, because the teachers often keep hardbook backups, or further, would simply notice that something is not right.

I also got access to the network-wide program (That at the time, teachers only used for doing attendance)... It was funny I thought once I figured it out that for everyone's password, it used an algorithm consisting of a combination of the teacher ID number and their social security number.

However, I never really "Did" anything with the information, so I didn't get in trouble, and further, when they pulled me in for questioning, I told them that their security was sorely lacking and how they could improve it. If you ever get caught at your school, it's better to speak with a sort of professional grandeur as if you were doing the school a service, and as if it was all part of your plan all along (Yet not overly snobby though).

At the special computer program (Which took up a large chunk of my junior and senior year)...

... we were learning Java and Cisco... but the teachers didn't really teach much. Often we were bored, and so we'd like to cruise the internet when we finished our work. The teachers started locking down our internet, using a filter program proxy address to restrict us to Google only, and so I eventually gained Local Access on to each computer, creating hidden accounts... which then I'd remove the local policies restricting our changing of internet settings and installing of programs, and I'd have everyone log in through the normal proxy to get internet.

Further, I disabled all the monitoring software, as our teacher had this love... for some reason... to sit at his computer and watch our desktops via remote monitoring. It was pretty funny though when he'd want to look at one of the computers that was running on a different account, and he couldn't :p

Over the two years, I slowly gained access to Network Admin, and eventually had full access to the network. All of this was done during class, in my free time between work. They kept changing things to restrict our internet, yet I kept finding was to circumvent it to keep having internet for anyone who wanted it (And we also played many games of Metal Slug via MAME).

Just about 4 months before school was over, I was caught though, cheating on a test (Probably the only thing I felt bad about, as it was the first time I cheated on a test, as I didn't study the night before), as I used my powers a bit sloppily to keep a cheat sheet open in the background. Someone else used a similar cheat sheet, and we had the same answers, which lead to them taking a closer look, and then they realized how far my control of the network included (Or, at least, to a point). I never admitted to anything, they grilled me and threatened me with bringing in the police, but in the end they did a presentation of what "evidence" they had to my parents. Funny Enough, the Computer Admin lied to everyone, saying that he knew I had control of the system for "6 Months"... When in reality, 6 months is just the cut off date of the logs :). I lost all respect for him there.

I was kicked out of the program quietly... because they neglected to mention that no one is supposed to hack into their computers, according to their Cisco Teaching Licensing Agreement. And if Cisco found out about the whole debacle, they could lose their class license. It's all really funny when you look back on it.

Anyhoo... tinkering, twiddling... pushing all the different buttons and turning all the knobs. That's the key. Finding out how it works, trial and error. Also, RTFM, specifically the Admin's manual, the answer is likely in there. Having an understanding of advanced concepts? That's what makes you Super-Awesome, as you don't have to keep testing stuff until it comes out right. Oh, and Social Engineering is golden.

Though, what I was doing was tinkering, I wouldn't even compare it to what these people did. I probably would have did more if I didn't also play on the football team for my high school... that stuff keeps you crazy busy.
 

intrepid_admin

Distinguished
Jul 25, 2006
8
0
18,510
Good read. I have never been interested in hacking, but it is nice to see what people have tried in the past.

I concentrate more on keeping my companies internal network out of harms way(double hardware firewall, double black hole DMZ with ghost nodes, SSID spoofer with over 200 ghost SSID across my wireless network ect....).

I would be curious to see how fast an experienced hacker could get into my network, but then again, it might scare me :)
 

wirelessfender

Distinguished
Mar 19, 2007
273
0
18,780
My little brother plays xbox live alot and I remember a big ordeal with him and my dad when some other 15 year old kid "hacked" his account and purchased 80$ worth of media off of xbox live's survice. It seems to me this is happening often on Live and its too easy to do if 15 year olds are doing it. I also remember it being very difficult for microsoft to comply and issue a refund to my brothers account. Whats up with that?
 

jnava121

Distinguished
Jul 11, 2007
126
0
18,680
yeah boonality, i understand that i love developing applications but i hate dealing with stupid people that ask me stuff like ... uhhh this site won't open... I'm like uhh you don't have permission to go to it... be gone !!! ... hahaha...
 
LoL!! John Draper is the first person I think of when someone says "hacker". That exploit was awesome. I mean really, who would have guessed that a whistle in a cereal box would let you get free calls...

Wasn't there something not too long ago that allowed people to get free long distance by dialing a special number that was leaked to the public? I guess thats not really hacking but pretty cool none the less.
 

jrnyfan

Distinguished
Dec 21, 2005
324
0
18,780
i was impressed by this article...it was a good read, it was interesting and more importantly, it came closer to belonging on tomshardware than a lot of the stuff that has shown up lately.
 

nubie

Distinguished
May 16, 2006
64
0
18,630
Very interesting article.

If the source to Win2k is in the wild, I wonder how long until we see hacks that will allow WinXP and Vista "only" features to be run on the cleaner and faster running Win2K.

No wonder the Woz can be so outspoken against apple products, they are themselves open to the same kind of attacks that he perpetrated on the phone companies. He is likely in as good a position as anyone to see that DRM and single carrier apple products won't last.
 

bombasschicken

Distinguished
Jan 31, 2006
192
0
18,680
[quotemsg=4691807,14,73476]I concentrate more on keeping my companies internal network out of harms way(double hardware firewall, double black hole DMZ with ghost nodes, SSID spoofer with over 200 ghost SSID across my wireless network ect....).

I would be curious to see how fast an experienced hacker could get into my network, but then again, it might scare me :)[/quotemsg]

Thats a nightmare... Not impossible of course, all it really takes is a stupid end user to use a simple password. But if your net is as you say it is, I wouldnt touch it...
 

hoofhearted

Distinguished
Apr 9, 2004
1,020
0
19,280
Ah, I remember some of the good old days. Using winnuke to knock people off the busy kali servers so I could jump in. Hacking the hughs direct pc client to get unlimited non-fap bandwidth. Shutting down my buddies computer with back oriface while he was talking to me on the phone with his boss in the room.
 

TRENDING THREADS