If you don't already know from my name, I am a hacker. Normally a quite good one at that, but I'm stuck on something. I can't say much because of the sensitivity of this topic, but i will say that it has to do with an encryption that is claimed to be uncrackable (if you know what i'm talking about, please please don't post the site's name). I have discovered a few important java files regarding their encryption and think i might have the encryption style.
Cryptograhpy | |
Hacker9988 | Hello All,
I hope I can get some answers in this post (no reference to the 3d Help post i made). I am at a stand still...
If you don't already know from my name, I am a hacker. Normally a quite good one at that, but I'm stuck on something. I can't say much because of the sensitivity of this topic, but i will say that it has to do with an encryption that is claimed to be uncrackable (if you know what i'm talking about, please please don't post the site's name). I have discovered a few important java files regarding their encryption and think i might have the encryption style. If you want the name of the site, send me an e-mail and i'll tell you. If you know what site it is and think u may be able to help, e-mail me and I'll set up a private room on my web site to talk. Thanx |
Scorpion_Blood | lol? u refer the page for a crypto chalenge? |
Hacker9988 | no. and like i said, DON"T POST IT"S NAME IF YOU KNOW!!! Please. |
Eric Coleman | You'll have a difficult time finding company here. The people at this website are actually programmers, which means we work hard to write code and create games. If you're going to proudly identify yourself as someone that likes to steal other people's hard work, then you won't find much help here, because chances are you'll probably try to steal some of our work or break into this website to fruitcake it up. |
Sr. Guapo | quote:Ditto... Unless it is some sort of "legal" hacking. Like Scorpion_Blood mentioned above, is it some sort of crypto challenge, or are you actually hacking a legit site? |
Hacker9988 | well, i can guarentee i won't crash this site mainly because there is no point in doing so. The only reason i'm tring to crack this encryption is to prove that it can be done. Yes, this is a legit site. They have no knowledge of what I am tring to do. |
sdw | quote:I question whether you're capable of doing that which you propose. What does this have to do with Visual Basic or gaming? And furthermore, why are you identifying yourself as a hacker who uses VB? I don't understand the point of this post on a VB Gaming site. Perhaps Script Kiddie is a more appropiate title for yourself. :D |
Hacker9988 | well, u know what. First, i came to this site for help in 3d game programing. Now I'm just asking a simple question for anyone who wants in on this action. But as i can see now, all of you guys are "Anti-Hacker" people. I just don't get that. If you don't want in on this action, then don't respond to my freakin post. |
Zarneth | The question is, will cracking their encryption, cause any damages to this site, like bringing it down, or spreading confidential information? |
Sr. Guapo | We are anti-hacker because its the jackass hackers that send our email, home address, and credit card numberrs out to all the world to make our life a living hell. I get around 5 spams a day in my email. What I don't get is the motivation to hack into stuff. Sure there are real world uses (government Intelligence, mainly), but why do you have to "practice" on legit sites? There are plenty of pages that's only purpose is to hack. there are competitions you could be involved in. There is no reason to ruin someone else's years of hard work just to "prove a point". |
Scorpion_Blood | well Guapo is right... anyway theres a lot of encryption sites... and what u want to prove? that their encrypton metod IS breakable? why we want to know that? u know that everything that is cryptable can be decryptable... something like "nothing is impossible"... u just have to know how or work alot... |
Hacker9988 | Hacking this site will mainly be used to place then encryption key in a program me and some friends are making in Java. With the key, people can do w/e they want to the site (not just server side editing like adding $, making people talk, etc.). and yes, i do want to deface the hell out of this site!!
Now, who in their right mind would want to hack a "hacking game" site!?!?! I mean, what point is there in that. No fame. No discruction of private property. NO FUN!! I don't know why you all got to be losers about this, Hackers aren't all evil! Most just want to prove that it can be done, and will be! Why, w/o hackers, chats like yahoo, MSN, AIM, etc. would not go through a proxy and give out ur IP to n e one that wanted it. Would that be a good idea?! No. If it wasn't for hackers, then we probablly wouldn't have an internet that works as smoothly as it does. Hackers find errors in things, then exploit it. Think about that next time you want to dis a hacker!!! |
Zarneth | What is it with viloence and distruction? I honestly don't see how people can find it so appealing. Sure I play the odd viloent game, but it's certianly not the viloence in them that I play them for. (more often just bordem and the occasional skerrick of plot) I much prefer constructive games though. I like to create things. |
VBBR | How'd you like something like mega man legends? I'm working on it, but I'm in urgent need of decent models. Currently I have a "Mr. Square" temporary model created by me. [:P] |
Hacker9988 | you all are freakin losers!! I can't see how u think u live in a world of peace and happieness. If you don't want in on this, DONT RESPOND!! |
ballistik | Look, I don't condone you hacking anyone's site... but at the same time, if you're gonna get p/o'd everytime someone disagrees with you, you are gonna go through life miserable. You're gonna have to accept the fact that most people aren't criminals and wish not to partake in those activities and frankly, they probably wish people like you didn't exist.. harsh but true.
The same way I disagree with walking into WalMart(tm) and walking away with five-finger discount items which then costs the store more money and guess who gets to pay for it? Me, you and everyone else who sees the prices of goods continue to go through the roof.
quote:Without hackers... we wouldn't need the extra security... without criminals, we wouldn't need cameras in stores and banks... without terrorists, I wouldn't have to wait in line for 2 hours at the airport... [sarcasm]criminals make the world run so much smoother don't they?[/sarcasm] Anyway, this probably isn't going to make any difference to you one way or the other because the only person you think about is yourself, and the rest of the world, especially those on the receiving end of your "hack", you couldn't care less about. |
Scorpion_Blood | look.. do u know how hackers are are chaut? like this... u r telling something that u descovered... if i were i hacker and discovered something.. do u think that i was telling my discovery to anyone? |
VBBR | Of course, because that's the entire point in hacking, proving that you've done it. |
sdw | quote:It's fine you came for 3D help, and I hope you solved your problem. The point is that people don't want to see posts about hacking on a VB Gaming site. Take it to some security site like Blackcode. quote:You're mixing the terms. Hacker is an excelled computer user, normally a programmer like ourselves who might try cracking programs so that they can learn how to protect from it themselves. A cracker is not only a poor white man but also is someone who uses their advanced computer knowledge to engage in illegal activities. Then there are the script kiddies who fall under another category. Probably 14 years of age, they don't realize that when tampering with remote computer systems that they place themselves in danger. Also a malicious cracker, who they idolize, does not want to be noticed. This seems to be a key point that most script kiddies most likely learn the hard way. At the rate you're going, your "1337 h4xx0ring" will land you in a not so 1337 cell because you just wanted to have a little fun to brighten your life which is otherwise depressingly boring. You tell me who the loser is. If it's fame you seek, then do something more productive and challenging like creating the best game instead of trying to root a system. And yes, you did make a good point earlier. Because of script kiddies like yourself exploiting flaws in programs discovered by people far beyond your capabilities, you've prompted programmers like us to fix them; therefore making them more secure. P.S. What kind of bad-ass hacker needs to use the word "freakin" instead of "fruitcakeing" when they condescendingly call others losers. Maybe rethinking your thoughts before posting them would be a good idea. EDIT: ^ Haha--nice filter there, Eric ;) |
VBBR | Try putting an * in the middle. [:D] |
Scorpion_Blood | well ppl lol do u know something? i will keep work on my game lol |
Hacker9988 | You all are fúcking retarted (lol, just seeing if that would work!!). You think all hackers are the same and are just out to steal other peoples information and work. You have no clue what a real hacker is. I don't need your help any more, but if any of you still want to change your heathen ways, then i still leave my offer to join open. This will in no way get you fame, but it will give you the satisfaction of knowing you were part of the hack of the year!! |
Brykovian | Here's a new challenge for you, Hack ... a different kind of "hack of the year", if you're up for it ... How 'bout you actually figure out that *.obj format that you asked about in your "3D Help" thread? Wotsit *does* have a pretty comprehensive language-neutral description of the spec ([url]http://www.wotsit.org/download.asp?f=w_obj[/url]) ... I would think that any good hacker (or average programmer) would be able to turn that over pretty easily. Probably more constructive than trying to figure out someone else's encryption that they don't really want you to figure out. And ... as a secondary side challenge, I still have been looking for someone to be able to "solve" my "Brick Crypt" routine ... Almar, Raggy, Gherkin and others (i.e. *good* programmers) helped me out quite a bit during the development phase of that thing ... but, in the end, even the great Raggy threw in the towel. You wanna shot at it? -Bryk |
VBBR | Who changed his title to "script kiddie"? ...LOL. [:D] (no offence at all, I just found it funny) |
Lachlan87 | quote:I never heard of that particular problem. . . It sounds intriguing. Care to give any more details? |
Scorpion_Blood | quote:who are de admins here? lol |
Brykovian | I wrote a DLL for handling packed binary files a couple years ago ... it included an encryption routine. In an attempt to see how easy the thing was to crack, I enlisted a handful of the best and brightest around the VB scene at the time to try their hand. I sent them the encrypted version of a text file that contained a poem. Their challenge was to figure out my encryption routine and return the unencrypted version of the poem. During the first trials, a couple of the guys came within the "ballpark" of figuring out my method. Rag-on-a-stick was even nice enough to share how he went about his process. One guy who hasn't been around for a while (a Greek physics grad student with a name like "VX"-something and some interesting politics) simply returned my exact algorythm without explaining how he came about it. Thanks to Raggy's info, I was able to make some adjustments, and sent a second batch of trial files out ... but everyone at the time gave up at that point. I don't actually think the routine would be very difficult to crack for someone really good at that sort of thing, but I think it's far enough along to keep the honest folks honest. In any case, here's a link to the library: [url]http://www.mwgames.com/BrickCnP.htm[/url] -Bryk |
sdw | quote:Hehe, it's momments like this that make my day. Somebody calling another stupid while making themselves look foolish in the process. You're the one who described yourself as a criminal wanting to damage data on another person's machine, not us. I think I already gave a decent explanation of what a hacker, cracker, and script kiddie is. Since your posts are not very intelligent, you refer to C as too difficult (and is therefore gay), and want to be publicly acknowledged as a hacker, you have been awarded the title of "script kiddie". Press your luck elsewhere, script kiddie. Although I'm sure your consistent ignorance will earn you more flames. For future help: quote:That's more of a hacker reply, not "u r 4ll retarted i r 1337 i kn0w h4xx0ring." |
Eric Coleman | All your base are belong to us. |
Brykovian | Hey Eric ... Can I get a cool personalized title like "script kiddie" ... how 'bout "Writes Scripts; Has Kiddies"? [;)] ... or something equally ... um, creative? [:D] -Bryk |
sdw | quote:*speechless* :D |
Eric Coleman | uff da! |
Brykovian | quote:Um yah yah! [8)] -Bryk p.s. Although, as a Packer fan, I'll try my best not to be offended by getting the "Viking" label from you. [:D] |
Hacker9988 | Bryk- How hard is it to crack a dll?!?!?! Just reverse the program into hex and decode it. lol. I've never tried a dll in VB, but i'm sure i can manage it. Send it! |
Sr. Guapo | quote:Have you never tried this before? |
Brykovian | quote:{Sigh} ... Of course, someone who really wanted to could walk through the compiled code and figure out the routine ... that wasn't the point of the exercise. I wanted to see if the routine could be figured out simply from the encrypted file. nm ... you saw the link to the library in my earlier post. If you want to pull it down and figure it out go ahead. If you want me to setup a new encrypted file for you to look at, I can do that too. Just let me know. And if you get it, I'd appreciate it if you'd send me an e-mail instead of posting it on a public forum. -Bryk |
Eric Coleman | quote:I went out on a limb and assumed that you would be a Viking fan since you live in MN. I guess this would be an appropriate time for an uff da! |
Zarneth | quote:You really think from what he's said so far that just sending it in an email would be his style though? |
Brykovian | quote:Actually, to be very honest ... from what he's posted here, I don't really expect that he would be able to get it. But I'm always open to the possibility of being proven wrong. [;)] -Bryk |
Brykovian | quote:It was a good guess ... don't forget that I was born and raise smak-dab in the middle of America's Dairyland ... so the Cheesy-Puff reference it much more accurate now. [:D] -Bryk |
Hacker9988 | ok, i'll send u an email once i've got the encryption. I should be done shortly. |
Brykovian | quote:Cool ... I'll be awaiting the e-mail with baited breath! [:D] (Actually, it won't really be "baited" ... but it may smell that way.) -Bryk [8D] |
Knight Chat X | Boy oh boy, ya know these days, it's good advice to just take your knowledge and create something constructive, if you have the time and energy to do something you enjoy, do it, just don't cause problems for others and get overly emotional, remember, heed my warnings, ****from the time you connect to the internet, to the time you disconnect, <<even before that>>, everything you do is recorded****, and someone or something has seen it. From the time you turn on computer to the time it's turned off information is logged, information is kept in sync remotely these days as well. Never ever hack a website, that's the dumbest thing you could ever do, even the simplest of websites have logging built in, if you've ever heard of a log before, if your software doesn't do it your hardware will, don't forget big companies get paid big bucks and rely on heavy security that is monitored well, they also usually have good contacts which handle problems rather quickly. AIM, MSN, Yahoo, no need to even bring those up, anytime I hear that stuff it's got script kiddie written all over it, the programs are the way they are because they were designed to be that way, many script kiddies claim big hacks using or making script kiddie tools, copies others have developed using but they fail to realize these programs have one thing in common, it's called free source code, you can even manipulate objects directly and/or use components in your own programs which mimics features, if it looks like MSN, has same features as MSN, uses the MSN protocol, and connects to MSN's server it just might be MSN. Encryption challenges, haha, all encryptions have the same basic standard idea in common, <<make things unreadable yet readable using an algorithm>>, you just have to be able to see right through them, your focus is all wrong. Here's info I know that will drop alot of jaws, but today us developers use development tools and things made by someone else, we use a higher level langauge that makes life a little easier and covers up deeper code which in reality is much simpler in function, we use re-usable code over and over again, stacking things up higher and higher, like a building. Sadly, things are really only as simple as change a single value from 0 to 1 upon an if statement assuming a default of 0 for an incorrect answer, simply break, it's no different for encryption. You see, a mathmatician can create a long drawn out algorithm, it takes knowledge to apply it, and it's at the very application where it is able to be defeated. ***For every encryption there is a procedure.**** In knowing the procedure we can bypass the encryption, suddenly, encryption becomes useless, see, if ya know how to hotwire the elevator door, there's no since wasting anytime trying to pick a lock when it's ready to open now, hehe. Laterz.......... |
Scorpion_Blood | Knight Chat X do u have a blog? cause what u writed could be in a blog lol |
Brykovian | quote:I hope this was meant as sarcasm, because you didn't say anything overly surprising or novel. You *did* assemble some good points together, though. Hope our friendly SK took some notes. [;)] -Bryk |
Hacker9988 | Well, you can think what you want, but i can assure you i have taken precautions for my hacks and am ready and willing to take any punishment that may come from my hacks to better mankind. |
Brykovian | quote:Wow -- aren't you the noble one! [;)] Let me know which e-mail you're sending the BrickCrypt solution to ... thanks! [8D] -Bryk |
masterbooda | Um....What's a Hack? :>)Lol... Can my title be "Talentless Fool"...hmmm...lol DaBooda out.... P.S. Hack doesn't ryme with Game, so why is it here on a site dedicated to Games?...Hmmm...Does not compute... |
Brykovian | quote:[:o)] Still waiting, and ... {breathes heavily into cupped hand ... sniffs hand} ... yep! My breathe's still baited!! [:D] [8D] -Bryk |
Brykovian | Excellent post, Crysstaafur! That perfectly fits what I think of a "real" hacker ... but perhaps that has to do with my age.
quote:Sounds familiar ... And Hacky ... I'm still waiting. [;)] Something tells me that Cryss already has my routine figured out. [:D] -Bryk |
Knight Chat X | quote:It's kinda funny but that sounds like the start of a game. Here's a little fun game called Uplink, could learn somethin from this: http://www.introversion.co.uk |
Hacker9988 | I have seen that game and it is very far off from real hacking. Real hacking you have to locate a server, not just click on a location and connect. Advice from expirence, that game sux. |
Knight Chat X | It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts. Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here. Think I'm done here, about to watch some new game trailors. Laterz! |
ballistik | quote:That's what I'm talkin' about! [8D] ... well said. |
Crysstaafur | http://www.thisisnotporn.com If you can make to the hidden forums at this site, then I honestly verify your skill. I am a retired hacker/phreak. Sadly, actual hackers are vanishing. Ok, being one of the surviving few that still operate from time to time, let me give you some ideas to try, purpose, well,.. that's for you to decide. Learn how win32 memory addresses are setup, create a program that uses only peek and poke to write and read values from a lpt port, has an embedded controller receive those signals from a homebrew dev cable to activate a beer catching robot. The point:A true hacker will seem to waste time on things that others would find mind-numbingly pointless. History lesson/another example:Do you know the name of the first hacker to exist? The father of phone phreaking.. Captain Crunch was his nick. He was the first person who discovered that if you blow a 'captain crunch' whistle (not made anymore...) into a freshly picked up telephone you could dial a single digit. Slight alterations of that signal produce the other tones. even tech tones. 8P Thus the first blue box was born in 1969 at Berkley U. 2nd piece of advice:Unless you can actually crack keyless quantum encryption, always play lame like you don't know a thing. Only share with those who you trust, or in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know. 3rd project:Try to write an AI with Heuristic reasoning in VB. Final point:Not all hackers are theives, not all hackers will call themselves hackers, many aren't even aware that is what they are doing (old Berkley definition of it anyway..). One of the values we hold is that of freedom of information with non-conformity. This is what drives you to your current project does it not? If you really want to buff up in that sense(and I don't condone it, as I have already shown you the white hat direction) then make your own web server, learn to administrate it. Then from another computer connected to the internet elsewhere try to 0wn yourself. That a way, no one innocent is hurt. Think about it. l8trz |