Post

 Resources 

Console

Home | Profile | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 VBGamer
 VBGamer
 Cryptograhpy

Note: You must be registered in order to post a reply.

Screensize:
UserName:
Password:
Format Mode:
Format: BoldItalicizedUnderlineStrikethrough Align LeftCenteredAlign Right Horizontal Rule Insert HyperlinkInsert EmailInsert Image Insert CodeInsert QuoteInsert List Spell Checker
   
Message:

* HTML is OFF
* Forum Code is ON
Smilies
Smile [:)] Big Smile [:D] Cool [8D] Blush [:I]
Tongue [:P] Evil [):] Wink [;)] Clown [:o)]
Black Eye [B)] Eight Ball [8] Frown [:(] Shy [8)]
Shocked [:0] Angry [:(!] Dead [xx(] Sleepy [|)]
Kisses [:X] Approve [^] Disapprove [V] Question [?]

   Insert an File
Check here to include your profile signature.
Check here to subscribe to this topic.
    

T O P I C    R E V I E W
Hacker9988 Posted - Nov 13 2004 : 11:31:44 PM
Hello All,
I hope I can get some answers in this post (no reference to the 3d Help post i made). I am at a stand still...



If you don't already know from my name, I am a hacker. Normally a quite good one at that, but I'm stuck on something. I can't say much because of the sensitivity of this topic, but i will say that it has to do with an encryption that is claimed to be uncrackable (if you know what i'm talking about, please please don't post the site's name). I have discovered a few important java files regarding their encryption and think i might have the encryption style.



If you want the name of the site, send me an e-mail and i'll tell you.
If you know what site it is and think u may be able to help, e-mail me and I'll set up a private room on my web site to talk.



Thanx
15   L A T E S T    R E P L I E S    (Newest First)
Brykovian Posted - Nov 28 2004 : 8:17:17 PM
Excellent post, Crysstaafur! That perfectly fits what I think of a "real" hacker ... but perhaps that has to do with my age.

quote:
Originally posted by Crysstaafur

in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know.


Sounds familiar ...

And Hacky ... I'm still waiting. Something tells me that Cryss already has my routine figured out.

-Bryk
Crysstaafur Posted - Nov 26 2004 : 7:09:45 PM
http://www.thisisnotporn.com

If you can make to the hidden forums at this site, then I honestly verify your skill.
I am a retired hacker/phreak.

Sadly, actual hackers are vanishing. Ok, being one of the surviving few that still operate from time to time, let me give you some ideas to try, purpose, well,.. that's for you to decide.

Learn how win32 memory addresses are setup, create a program that uses only peek and poke to write and read values from a lpt port, has an embedded controller receive those signals from a homebrew dev cable to activate a beer catching robot.
The point:A true hacker will seem to waste time on things that others would find mind-numbingly pointless.

History lesson/another example:Do you know the name of the first hacker to exist? The father of phone phreaking.. Captain Crunch was his nick. He was the first person who discovered that if you blow a 'captain crunch' whistle (not made anymore...) into a freshly picked up telephone you could dial a single digit. Slight alterations of that signal produce the other tones. even tech tones. 8P Thus the first blue box was born in 1969 at Berkley U.

2nd piece of advice:Unless you can actually crack keyless quantum encryption, always play lame like you don't know a thing. Only share with those who you trust, or in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know.

3rd project:Try to write an AI with Heuristic reasoning in VB.

Final point:Not all hackers are theives, not all hackers will call themselves hackers, many aren't even aware that is what they are doing (old Berkley definition of it anyway..). One of the values we hold is that of freedom of information with non-conformity. This is what drives you to your current project does it not? If you really want to buff up in that sense(and I don't condone it, as I have already shown you the white hat direction) then make your own web server, learn to administrate it. Then from another computer connected to the internet elsewhere try to 0wn yourself. That a way, no one innocent is hurt. Think about it. l8trz
ballistik Posted - Nov 23 2004 : 4:55:20 PM
quote:
It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts.

Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here.




That's what I'm talkin' about! ... well said.
Knight Chat X Posted - Nov 23 2004 : 3:26:08 PM
It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts.

Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here.

Think I'm done here, about to watch some new game trailors.

Laterz!
Hacker9988 Posted - Nov 23 2004 : 11:40:03 AM
I have seen that game and it is very far off from real hacking. Real hacking you have to locate a server, not just click on a location and connect. Advice from expirence, that game sux.
Knight Chat X Posted - Nov 23 2004 : 01:20:36 AM
quote:
If you don't already know from my name, I am a hacker. Normally a quite good one at that, but I'm stuck on something. I can't say much because of the sensitivity of this topic.


It's kinda funny but that sounds like the start of a game.

Here's a little fun game called Uplink, could learn somethin from this:
http://www.introversion.co.uk
Brykovian Posted - Nov 22 2004 : 3:57:03 PM
quote:
Originally posted by Hacker9988

ok, i'll send u an email once i've got the encryption. I should be done shortly.




Still waiting, and ...

{breathes heavily into cupped hand ... sniffs hand}

... yep! My breathe's still baited!!

-Bryk
masterbooda Posted - Nov 22 2004 : 3:12:35 PM
Um....What's a Hack?

:>)Lol...

Can my title be "Talentless Fool"...hmmm...lol

DaBooda out....

P.S. Hack doesn't ryme with Game, so why is it here on a site dedicated to Games?...Hmmm...Does not compute...
Brykovian Posted - Nov 18 2004 : 9:44:54 PM
quote:
Originally posted by Hacker9988

... willing to take any punishment that may come from my hacks to better mankind.


Wow -- aren't you the noble one!

Let me know which e-mail you're sending the BrickCrypt solution to ... thanks!

-Bryk
Hacker9988 Posted - Nov 18 2004 : 7:17:04 PM
Well, you can think what you want, but i can assure you i have taken precautions for my hacks and am ready and willing to take any punishment that may come from my hacks to better mankind.
Brykovian Posted - Nov 17 2004 : 7:45:30 PM
quote:
Originally posted by Knight Chat X

Here's info I know that will drop alot of jaws ...


I hope this was meant as sarcasm, because you didn't say anything overly surprising or novel. You *did* assemble some good points together, though. Hope our friendly SK took some notes.

-Bryk
Scorpion_Blood Posted - Nov 17 2004 : 7:10:36 PM
Knight Chat X do u have a blog? cause what u writed could be in a blog lol
Knight Chat X Posted - Nov 17 2004 : 5:30:29 PM
Boy oh boy, ya know these days, it's good advice to just take your knowledge and create something constructive, if you have the time and energy to do something you enjoy, do it, just don't cause problems for others and get overly emotional, remember, heed my warnings, ****from the time you connect to the internet, to the time you disconnect, <<even before that>>, everything you do is recorded****, and someone or something has seen it. From the time you turn on computer to the time it's turned off information is logged, information is kept in sync remotely these days as well. Never ever hack a website, that's the dumbest thing you could ever do, even the simplest of websites have logging built in, if you've ever heard of a log before, if your software doesn't do it your hardware will, don't forget big companies get paid big bucks and rely on heavy security that is monitored well, they also usually have good contacts which handle problems rather quickly. AIM, MSN, Yahoo, no need to even bring those up, anytime I hear that stuff it's got script kiddie written all over it, the programs are the way they are because they were designed to be that way, many script kiddies claim big hacks using or making script kiddie tools, copies others have developed using but they fail to realize these programs have one thing in common, it's called free source code, you can even manipulate objects directly and/or use components in your own programs which mimics features, if it looks like MSN, has same features as MSN, uses the MSN protocol, and connects to MSN's server it just might be MSN. Encryption challenges, haha, all encryptions have the same basic standard idea in common, <<make things unreadable yet readable using an algorithm>>, you just have to be able to see right through them, your focus is all wrong. Here's info I know that will drop alot of jaws, but today us developers use development tools and things made by someone else, we use a higher level langauge that makes life a little easier and covers up deeper code which in reality is much simpler in function, we use re-usable code over and over again, stacking things up higher and higher, like a building. Sadly, things are really only as simple as change a single value from 0 to 1 upon an if statement assuming a default of 0 for an incorrect answer, simply break, it's no different for encryption. You see, a mathmatician can create a long drawn out algorithm, it takes knowledge to apply it, and it's at the very application where it is able to be defeated. ***For every encryption there is a procedure.**** In knowing the procedure we can bypass the encryption, suddenly, encryption becomes useless, see, if ya know how to hotwire the elevator door, there's no since wasting anytime trying to pick a lock when it's ready to open now, hehe.

Laterz..........
Brykovian Posted - Nov 17 2004 : 2:15:37 PM
quote:
Originally posted by Hacker9988

ok, i'll send u an email once i've got the encryption. I should be done shortly.



Cool ... I'll be awaiting the e-mail with baited breath! (Actually, it won't really be "baited" ... but it may smell that way.)

-Bryk
Hacker9988 Posted - Nov 17 2004 : 11:34:47 AM
ok, i'll send u an email once i've got the encryption. I should be done shortly.

VBGamer © Go To Top Of Page
This page was generated in 0.11 seconds. Snitz Forums 2000

Copyright © 2002 - 2004 Eric Coleman, Peter Kuchnio , et. al.