[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Tell me about your most important hack.
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 41
Thread images: 5
File: mainframe.png (369 KB, 656x458) Image search: [Google]
mainframe.png
369 KB, 656x458
Tell me about your most important hack.
>>
>>53774558
I'd have to say hacking into your mom's pussy
>>
It was a stormy night outside my window. I was fully adorned in ski mask and fingerless gloves. I turned the computer on and typed on it, started slow, but then slowly increasing in tempo.

After some typing was done, the operating system loaded up. It was Linux, and it was optimised for hacking. I had the Pentagon in my sights. A message appeared: "do you want to hack into the Pentagon? Y/N?, to which I answered Y.

The next day, 9/11 happened.
>>
File: computer.jpg (162 KB, 978x550) Image search: [Google]
computer.jpg
162 KB, 978x550
>military school for training civil engineers
>open wifi rejected me
>started aircrack-ng and recorded MAC addresses.
>Spoofed my own mac with collected address
>I'm in.

Nothing will stop me from 4chan and dank memes
>>
I hacked windows to run ubuntu
>>
>In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker".
I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki (*), when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea.
>First I used my left hand to put three chopsticks into my right hand. That was not so hard, though I had to figure out where to put them so that I could control them individually. Then I used my right hand to put the other three chopsticks into my left hand. That was hard, since I had to keep the three chopsticks already in my right hand from falling out. After a couple of tries I got it done.
>Then I had to figure out how to use the six chopsticks. That was harder. I did not manage well with the left hand, but I succeeded in manipulating all three in the right hand. After a couple of minutes of practice and adjustment, I managed to pick up a piece of food using three sticks converging on it from three different directions, and put it in my mouth.
>It didn't become easy—for practical purposes, using two chopsticks is completely superior. But precisely because using three in one hand is hard and ordinarily never thought of, it has "hack value", as my lunch companions immediately recognized. Playfully doing something difficult, whether useful or not, that is hacking.
>I later told the Korea story to a friend in Boston, who proceded to put four chopsticks in one hand and use them as two pairs—picking up two different pieces of food at once, one with each pair. He had topped my hack. Was his action, too, a hack? I think so. Is he therefore a hacker? That depends on how much he likes to hack.
>>
I hack washing machines and flood peoples houses
>>
Exploited a pay-porn site by looking at the javascript snippets in the html. Fucking ridiculus security system. I can't even code outside a few lines of DELPHI and PHP.
>>
When I was like 7 I learned that you can smash nickels with a hammer to make them approximately the same shape as a quarter and I would go to the vending machines in front of the grocery store and get a bunch of sodas

In high school I'd go with a friend to target and Walmart with a jeweler's scale and weigh out all the yugioh card packs because the difference between getting a rare card vs a super rare or greater was like the extra. 01g of foil used on the cards
>>
>>53775005
If he hacked once he is a hacker. There is no turning back.
>>
I hacked a wooden log with an axe to make firewood.
>>
File: 1386311923602.jpg (7 KB, 205x246) Image search: [Google]
1386311923602.jpg
7 KB, 205x246
I added a few lines of code to my restaurant's POS system for it not to log my activities
>>
>>53774558
cloned RFID security cards on my campus so that I could get access to any building by pretending to be someone else. (need one card for each building though).

Reverse engineered the master key to my floor.
>>
>>53775096
Best hack
>>
>>53775096

impressive
>>
One time I connected to my friend's unsecured wifi without asking him first.
>>
I took a digital clock out of the case, took it to school, scared some morons and got a bunch of free shit from microsoft for it.
>>
>>53775096
This is actually pretty smart.
>>
>>53775096
shit, wish i could've known that back when i was still playing yugishit
>>
>>53774558
>Terminal Type: 3278-2A
>327* Terminals are for IBM Mainframes
>literally the government mainframe
>>
>>53775165
How do you steal cards and return them without getting caught?
Or why do you have to clone them when you can use the real one?
>>
>>53774558
*Searches my keyboard for a PF3 key*

>>53775165
>>53778085
Also interested in this
>>
File: Cb2lLHqUUAAv5zq.jpg (31 KB, 590x394) Image search: [Google]
Cb2lLHqUUAAv5zq.jpg
31 KB, 590x394
I can change the clip/magazine value to 9999 on most vydias using the cheat engine and pretend I have a mini gun.
>>
>>53774558
I go to wal mart and drink monster drink and then walk out
>>
>>53777224
I think it is pensys1.army.pentagon.mil
>>
File: 1456226213181.gif (495 KB, 194x172) Image search: [Google]
1456226213181.gif
495 KB, 194x172
>>53775165
Dooood I've been considering this for so long but don't know what items to get!
I know I can make an RFID scanner myself, but do I need the card skimmer equipment to clone everything else?
>>
>>53774558

Dumped the plaintext password database running the faculty and staff webapp at my highschool. Same password as their domain accounts.

>PF3

Oh man, the nostalgia.
>>
>>53775005
Ebin
>>
Found a method to bruteforce windows user pw from a user with limited privileges at a speed of 1million tests per 5min or so(the method wasn't known when i discovered and still rarely known), only to local users(SAM)(tested since vista to windows 10), so when you know whatever from the victim and can create a specific dictionary it is a matter of seconds, and even created it to once it gets admin pw, automatically installs a rat.

So had to prove how it werks, big ass company moving $$$, had phisical access to a computer that was used to print and everyone used it, asked and they let me use it when i was visiting the place.

Pwned in minutes, every computer had same local admin password, I still remember it to this date(5years ago), all the network was mine, just told them and moved on, thought on selling the software i created but lost the interest, and maybe now is too late, who knows, but one thibg is sure if I can't monetize it I won't bother, I have so much work currently.
>>
>>53782078
For comparison big viruses like cryptolocker if i remember correctly have bruteforce methods to pwn networks, at a speed of ~1 per second.
Adding network resources and looping, but yeah too much time since then I might remember it wrong.
>>
1995 - root'd the Gibson mainframe.
>>
>>53778085
>>53778129

The card is RFID, chances are he has a rfid reader (can make one using arduino) and getting near someone for it to read, its contactless

https://www.youtube.com/watch?v=OUc0p88FTes

similar to this, but all they have to do is "accidentally" bump into them with the reader close to the card.
>>
>>53774558
there was this escort website which brings top class whores from several countries, I bruteforced a bunch of subdomains and directories until I hit an admin panel, turns out the faggot panel didn't even had proper authentication mechanisms, you could access all their shit just by removing a javascript redirection out of the http responses.

I managed to get all of their financial records (they were making quite a lot of dosh), and also got a bunch of scanned passports and IDs from all of the whores.

I proceeded to blackmail a few of them using their personal information by pretending to be law enforcement through email and phone calls, I got around 40k once I harassed the admin of the site as well.
>>
>>53782078
>>53782119
That's really cool
Is it normal for exploits to remain secret for so long?

>>53783291
Thanks
>>
>>53774558
cmatrix
>>
>>53783428

>Is it normal for exploits to remain secret for so long?

Not same guy to the questions we are asking, but exploits that haven't been found for a long time (shell shock was I believe 20+ years) usually has nick name "zero day" exploit.

Same with heartbleed which was only around for 2 years.

Usually zero day exploits only last for ~10 months before being discovered.
>>
>>53783428
oh you meant in secret, well, if a hacker finds a exploit, he/she keeps it to themselves, word spreads pretty quick if talking about exploits. Unless you're in a tight knit group.
>>
>>53774558
Samsung hacked in toploader washing machines to catch on fire and burn down houses. That was a pretty cool hack.
>>
>>53783937
Same with certain hp printers.
>>
I recorded bluebox tone to my sony walkman and pawned payphones via homecountry direct Fuji exchange, like two decades ago.

I wuz such a shit.
>>
>>53783328

this is l33t. Qudos anon
Thread replies: 41
Thread images: 5

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.