What's new

Mega *anti-hacking* anti-intrusion* thread-share tips and tricks to stay protected

You googled it ...didn't you... :):)...that just proved that you don;t know anything about darknet at all... sorry...no offence meant...by the way... you have a superb sense of humour...something i lack...looking for some tips....:):)

Um.. No. My dad was a chef, and i have family in NC. Starting to think you are the one doing the googling.

It's all purely academic anyway. Unless you can do something to prove your skills, your just someone with an internet connection and good search engine skills.
 
Last edited:
You googled it ...didn't you... :):)...that just proved that you don;t know anything about darknet at all... sorry...no offence meant...by the way... you have a superb sense of humour...something i lack...looking for some tips....:):)

Um.. No. My dad was a chef, and i have family in NC. Starting to think you are the one doing the googling.

It's all purely academic anyway. Unless you can do something to prove your skills, your just someone with an internet connection and good search engine skills.

Thanks....:)... i appreciate your advice....

But the vidaliya i was talking about is not an onion or something... it is a module used to connect to a network also popularly known as darknet...and the domain suffix on darknet is .onion so your guess about onions is probably right...

regards... :)
 
Thanks....:)... i appreciate your advice....

But the vidaliya i was talking about is not an onion or something... it is a module used to connect to a network also popularly known as darknet...and the domain suffix on darknet is .onion so your guess about onions is probably right...

regards... :)

You kids and your fancy domains. I was computer gaming before Slackware had a GUI.
 
You googled it ...didn't you... :):)...that just proved that you don;t know anything about darknet at all... sorry...no offence meant...by the way... you have a superb sense of humour...something i lack...looking for some tips....:):)

Um.. No. My dad was a chef, and i have family in NC. Starting to think you are the one doing the googling.

It's all purely academic anyway. Unless you can do something to prove your skills, your just someone with an internet connection and good search engine skills.

Thanks for your kind appreciation :) but if I tell you that go and get a picture of ajanta and ellora caves....unless you do it ...you don't have any idea about photography...what is the first thing you will do...you will tell the man who is asking this,which in this case is me that you will first have to go to India..then to the ajanta and ellora caves..then maybe take a look at the lighting conditions there..then maybe take a moment or two to figure out the most interesting angles... after that you will take the photos.... that's the correct way to do it.....isn't it..... if you will read a few good books or better still talk to the ethical penetration testers..they will tell you one thing...it takes time to do penetration testing and it is more of a teamwork...and as i have said in my post..hackers are not wizards...most of them have a streak of luck that helps them...if I messaged you that..."hey pixmedic please give critique on my new post..i will appreciate it very much ..and give the link of my post below which will in reality be a phishing page or cookie stealer which will probably lead to a legal page...would you doubt a bit...but in reality,i will use the cookie or password i just stole to get access to our account...as simple as that...that's the way 99% of accounts are hacked..i am not telling you to prove that i know much about hacking....i am telling you this only to tell you how things really work.....and it is not much difficult as compared to sql injections or sql attacks ....... its very very simple... hope you get my point...

Regards.. :)
 
Ha..ha..ha :) pixmedic..this dare proves that you don't know anything about hacking...:)...I am not a super hacker or something but I can assure you that if I was *hacking* your account...i will be phishing..not hacking...or I will infect you with a rat or something....and this is anti-hacking thread...if you have read my useless post above...you will notice that I have said that good common sense can save from most viruses,...worms...and trojan horses..if you have read about history of hacking you will know that most of the hacking takes place with good social engineering skills......if you can counter that...you are saved from most of the punks out there...

PIX has no social skills... and you have to have social skills to be attacked with social engineering... so he has nothing to worry about! Right PIX? :)
 
You googled it ...didn't you... :):)...that just proved that you don;t know anything about darknet at all... sorry...no offence meant...by the way... you have a superb sense of humour...something i lack...looking for some tips....:):)

Um.. No. My dad was a chef, and i have family in NC. Starting to think you are the one doing the googling.

It's all purely academic anyway. Unless you can do something to prove your skills, your just someone with an internet connection and good search engine skills.

Thanks for your kind appreciation :) but if I tell you that go and get a picture of ajanta and ellora caves....unless you do it ...you don't have any idea about photography...what is the first thing you will do...you will tell the man who is asking this,which in this case is me that you will first have to go to India..then to the ajanta and ellora caves..then maybe take a look at the lighting conditions there..then maybe take a moment or two to figure out the most interesting angles... after that you will take the photos.... that's the correct way to do it.....isn't it..... if you will read a few good books or better still talk to the ethical penetration testers..they will tell you one thing...it takes time to do penetration testing and it is more of a teamwork...and as i have said in my post..hackers are not wizards...most of them have a streak of luck that helps them...if I messaged you that..."hey pixmedic please give critique on my new post..i will appreciate it very much ..and give the link of my post below which will in reality be a phishing page or cookie stealer which will probably lead to a legal page...would you doubt a bit...but in reality,i will use the cookie or password i just stole to get access to our account...as simple as that...that's the way 99% of accounts are hacked..i am not telling you to prove that i know much about hacking....i am telling you this only to tell you how things really work.....and it is not much difficult as compared to sql injections or sql attacks ....... its very very simple... hope you get my point...

Regards.. :)


I will post a phising page as soon as possible just to demonstrate how it works...especially for you pixmedic.. :)
 
PIX has no social skills... and you have to have social skills to be attacked with social engineering... so he has nothing to worry about! Right PIX? :)

I dont need social skills. Im a paramedic.
I think this was a troll thread anyway, making outrageous claims with no way to back them up. Clandestine Internet hacking groups.... So 90's....
Everyone knows Anonymous is "in" now.
 
Thanks for your kind appreciation :) but if I tell you that go and get a picture of ajanta and ellora caves....unless you do it ...you don't have any idea about photography...what is the first thing you will do...you will tell the man who is asking this,which in this case is me that you will first have to go to India..then to the ajanta and ellora caves..then maybe take a look at the lighting conditions there..then maybe take a moment or two to figure out the most interesting angles... after that you will take the photos.... that's the correct way to do it.....isn't it..... if you will read a few good books or better still talk to the ethical penetration testers..they will tell you one thing...it takes time to do penetration testing and it is more of a teamwork...and as i have said in my post..hackers are not wizards...most of them have a streak of luck that helps them...if I messaged you that..."hey pixmedic please give critique on my new post..i will appreciate it very much ..and give the link of my post below which will in reality be a phishing page or cookie stealer which will probably lead to a legal page...would you doubt a bit...but in reality,i will use the cookie or password i just stole to get access to our account...as simple as that...that's the way 99% of accounts are hacked..i am not telling you to prove that i know much about hacking....i am telling you this only to tell you how things really work.....and it is not much difficult as compared to sql injections or sql attacks ....... its very very simple... hope you get my point...

Regards.. :)

Your analogy is incorrect.... It goes like this... If I say i am a great photographer, YOU say, show me some great photographs. If i can, i have proven myself. You say, you are a great hacker. So I say, show me something you did. You either can produce something or you can not. Simple as that. No one has to go to India. Thats just silly.
 
Oh, I WANT to hear he details o how things got ugly!

You left out, perhaps, THE most interesting part!

Ha Ha HA :lmao:... ok..if you really want to hear the whole thing i hacked a website of IIT...that's one of the most prestigious engineering institutes of the world..that was a website run by indian ministry of HRD....I never did anything wrong with it..just got the username:pwds and logged into iit's smtp and ftp servers... anyway..the admin caught me logged in because I was stupid enough to make an admin account on their ftp server by name indiblaze,just for bragging rights..i was stupid enough to post by my name Indiblaze on various forums,the things I was doing..mostly getting negative comments...something no mature or you can cal it hardcore hackers do... the admin of the server tracked me down because of my stupidity and emailed me a threatening message on the id i used to login into the forums.... i was using the tor or I would've been caught...domething that still give me nightmares..the thing is ...i apologised and he deleted my account...and I informed him about the flaws in the server...mainly in the database mainframe... after that i never did anuthing like that... but if you want to know ...that idiot haven't yet fixed th flaws completely and You can still get the username and passwords on the website itself by inserting some null values in the exploits!.....have a look at my exploit...

Welcome to Virtual Labs--

Welcome to Virtual Labs--
Welcome to Virtual Labs--

It proves how vulnerable people are..and this was a govt. server,that also of one of the best engineering colleges of the world...if they can be compromised...what chance do you have...??

Hope..i didn't bored you(maybe I did..but you asked for it)

Regards... :)
 
PIX has no social skills... and you have to have social skills to be attacked with social engineering... so he has nothing to worry about! Right PIX? :)

I dont need social skills. Im a paramedic.
I think this was a troll thread anyway, making outrageous claims with no way to back them up. Clandestine Internet hacking groups.... So 90's....
Everyone knows Anonymous is "in" now.

YEP! I was once a member of the Anarchist Alliance group (at 300 baud even)! Aren't you impressed? ;)
 
Thanks for your kind appreciation :) but if I tell you that go and get a picture of ajanta and ellora caves....unless you do it ...you don't have any idea about photography...what is the first thing you will do...you will tell the man who is asking this,which in this case is me that you will first have to go to India..then to the ajanta and ellora caves..then maybe take a look at the lighting conditions there..then maybe take a moment or two to figure out the most interesting angles... after that you will take the photos.... that's the correct way to do it.....isn't it..... if you will read a few good books or better still talk to the ethical penetration testers..they will tell you one thing...it takes time to do penetration testing and it is more of a teamwork...and as i have said in my post..hackers are not wizards...most of them have a streak of luck that helps them...if I messaged you that..."hey pixmedic please give critique on my new post..i will appreciate it very much ..and give the link of my post below which will in reality be a phishing page or cookie stealer which will probably lead to a legal page...would you doubt a bit...but in reality,i will use the cookie or password i just stole to get access to our account...as simple as that...that's the way 99% of accounts are hacked..i am not telling you to prove that i know much about hacking....i am telling you this only to tell you how things really work.....and it is not much difficult as compared to sql injections or sql attacks ....... its very very simple... hope you get my point...

Regards.. :)

Your analogy is incorrect.... It goes like this... If I say i am a great photographer, YOU say, show me some great photographs. If i can, i have proven myself. You say, you are a great hacker. So I say, show me something you did. You either can produce something or you can not. Simple as that. No one has to go to India. Thats just silly.


Ok..read below...actually my expertise was database hacking and sql injections..if you want that..I can give you lots of pages with the sql injection done..you can find the login page and do whatever you want to do...but will it prove any point ..it is an *anti*hacking thread for god's sake..but sshhh...don't give me in to the cops...
 
Last edited by a moderator:
Thanks....:)... i appreciate your advice....

But the vidaliya i was talking about is not an onion or something... it is a module used to connect to a network also popularly known as darknet...and the domain suffix on darknet is .onion so your guess about onions is probably right...

regards... :)

You kids and your fancy domains. I was computer gaming before Slackware had a GUI.

My god "darknet" is not technically on the internet and to connect to it you will need an extra module.... and I am pretty sure there are no gaming sites there....it has 700 times more data than internet... just to clear your misunderstanding...and it is not world of warcraft...sorry.. :)
 
SQL injections? Geez. Setting database permissions and escape parameters too hard for some of these database administrators and coders? They deserve to be hacked then.

Darknet isn't special and is not separated from the internet in any shape or form. It is only hidden through heavily encrypted nodes and connections between the nodes (client, server and end). Tor with Vidalia or whatever you want still requires a regular internet connection to access it, hence it is a part of the normal internet and also does not have MORE data than the internet considering it is PART of it anyhow. Just because a room in the house has a hidden door does not mean it is a separate house.

Now, a true separated network would be cool if they'd design a box you could plug into the wall and connect to a inter-connected network that way (like Innbox or something similar). A new internet where all you need is access to a power-line (through a wall outlet or something) and connect to servers that way, perhaps even having exit nodes to the normal internet.

I can guarantee you I can make a hack-proof computer and I'm not a hacker, just a geek. Take one computer, remove hard-drive, remove burner (if present). Install CD reader (read-only). Run some live CD (I use a self-customized solution but if you don't want to take the time to do so, use this: SLAX). Have safe fun on the internet. Viruses attack data, trojans install hidden data, worms propagate payloads. All of these rely on a hard-drive or some other write-able storage medium. Too bad that the only way to inject malicious code on my net computer would be into volatile memory. A reboot and I'm clean. No part of the OS can be tampered with as it is pre-written to a CD and there is no way to write to it since there are no burning capabilities.

The hack-proof system would include two more computers. From the first computer, you sneakernet a jumpdrive over to a second computer that has every malicious code aware program made and run the jumpdrive against it to ensure the safety of the data is intact. This computer is generally not hooked up to the internet unless updating is needed of the malicious code databases, maybe once a week or so. Then unplug from the network.

Third computer is the expensive beast you do all your work on. This is NEVER, EVER hooked up to the internet. Considering most updates are security related, you can bypass those anyways. No need for security updates if you never hook it into a internet-accessible network. Any other updates should be able to be gotten directly from the OS manufacturer (i.e Microsoft, etc.). Most updates end up slowing the machine down in the end due to bloating anyways and so that fast computer should stay fast for years to come.

If you're a gamer, well then you probably game over the internet and so this is no solution for you. This would be for the person who just spent a ton of money on a computer that can render huge files (audio, huge photos, video, etc.) or play games solo. Its a pain in the butt going back and forth with the jumpdrive (you'll need a good-sized jumpdrive or a huge harddrive and a USB converter [sate/ide/eide/etc.]) but it will be worth it to have a computer that continues to operate the same as the day you got it.

No need for a firewall either (hardware or software). After-all, how can one hack into a computer that is physically unhooked when not in use?

*sitting here on my custom Slack box live cd using firefox. I didn't do the second computer because I have no need to constantly download software and subsequently check it for malicious code. Everything I need is installed off of discs or from reputable sources. Its a 800mhz system with a gig of ram. My net machine does the internet thang just fine. I can go anywhere on the internet and not worry. My main computer (2.20ghz Quadcore, 8gigs memory, 3.5TB storage) sits right by my legs and so there is no problem getting jumpdrive from puter to puter when needed. Using a 36" Sanyo LCD as the sole monitor. Have the net machine hooked up through VGA and the beast hooked up through HDMI. I have an old school KVM so I can just use the one mouse and keyboard for both puters.

You kids and your fancy domains. I was computer gaming before Slackware had a GUI.

Wait, Slackware has a GUI??? I thought you had to choose one first like Gnome (DM), KDE(DM), fluxbox(WM), or my favorite Enlightenment (WM) otherwise you'd be left alone with the proper way to run Slack, the command-line (even if you chose to modify the shell to use ncurses, GTK, or QT) Weren't the desktop and window managers on the second disk anyways? I refuse to believe Slackware now comes with its own desktop manager other than the add-ons.
 
Last edited:

Most reactions

New Topics

Back
Top Bottom