Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

any hackers out there? i need a favor.

Dr.M said:
I almost laughed.


im watching hannibal and it's the part where the fbi guy enters his password to log on the website.

it seems weird so much information could be accessed with just a series of 10 numbers/letters.

the government tries to crack passwords to get foreign information.

students try to crack passwords to change grades.

elite members do it to read the mod board.

some people even do it to read other people's email.
 
mylife said:



it seems weird so much information could be accessed with just a series of 10 numbers/letters

Most of the high security sites that are on the net are not on C class operating systems, plus those guys have air gaps and all kinds of fancy equipment. Most of the time though its default configurations or default backdoors and worms that create backdoors for people, if the people weren't involved though then their stuff could be pretty secure.

Most of the times its just little screw ups, not neccessarily just a 10 digit key. Lets see, there are devices that AOL uses on thier own networks that generate a passkey that changes every 2 minutes, where 2 sets of these keys are needed to access something, similar to the theory of 2 keys having to be turned at the SAME time to access a vault. There is all kinds of cool stuff out there, its just screw ups most of the time that let these people in, and social engineering. "Hey this is Paul down in engineering, whats the number on that box u pthere? I'm kind of in a hurry, have to do something for the boss YESTERDAY..."

On NT4 you can lock out an account after 3 invalid attempts, so you also have simple stuff like that. If a password is going to be gotten its more likely to be sniffed/intercepted than "cracked".
 
Dr.M said:


Most of the high security sites that are on the net are not on C class operating systems, plus those guys have air gaps and all kinds of fancy equipment. Most of the time though its default configurations or default backdoors and worms that create backdoors for people, if the people weren't involved though then their stuff could be pretty secure.

Most of the times its just little screw ups, not neccessarily just a 10 digit key. Lets see, there are devices that AOL uses on thier own networks that generate a passkey that changes every 2 minutes, where 2 sets of these keys are needed to access something, similar to the theory of 2 keys having to be turned at the SAME time to access a vault. There is all kinds of cool stuff out there, its just screw ups most of the time that let these people in, and social engineering. "Hey this is Paul down in engineering, whats the number on that box u pthere? I'm kind of in a hurry, have to do something for the boss YESTERDAY..."

On NT4 you can lock out an account after 3 invalid attempts, so you also have simple stuff like that. If a password is going to be gotten its more likely to be sniffed/intercepted than "cracked".



That's interesting stuff. It'd be cool to see what some of the great thinkers/mathematicians from way back when could do with technology today.
 
Thats basically what it is, guys that used to fuck with calculators went into computers, the guys that wrote C, then Unix, Vint Cerf and Bob Kahn (TCP/IP), all kinds of facinating history.

There are several History of the Internet books, the History of Intel, all good reading for nerds. I've got one of the books on Intel and it definately opens your eyes to what big companies are like, death threats and all.
 
mylife said:
could you please get me access to everything on these 3 sites. i need to find out a few things, not real important.


thanks.


pm me when you're done.



www.nsa.gov
www.nasa.gov
www.elitefitness.com/forum/mod
www.cia.gov

LOL

First off, both CIA and NSA use stand-alone systems.
NASA? Probably too, but not sure here.

A stand-alone system is NOT hard-wired into the internet and does not have a physical address.

Most intel agencies communicate via encrypted communications channels(i.e.satellites) or dedicated landlines for their communications.

An STU phone is what is used by most agencies. It has a 512-bit
encryption key. Impossible to brute force it with a Cray unless
you have a whole century to do it with.

Moral of my post?

You CANNOT break INTO CIA and NSA via computer.

However, you CAN steal their encrypted electronic transmissions
and decipher them.

Which is just as bad I guess.

Fonz
 
Re: Re: any hackers out there? i need a favor.

Fonz said:


LOL

First off, both CIA and NSA use stand-alone systems.
NASA? Probably too, but not sure here.

A stand-alone system is NOT hard-wired into the internet and does not have a physical address.

Most intel agencies communicate via encrypted communications channels(i.e.satellites) or dedicated landlines for their communications.

An STU phone is what is used by most agencies. It has a 512-bit
encryption key. Impossible to brute force it with a Cray unless
you have a whole century to do it with.

Moral of my post?

You CANNOT break INTO CIA and NSA via computer.

However, you CAN steal their encrypted electronic transmissions
and decipher them.

Which is just as bad I guess.

Fonz


you sure do know alot about alot. look at my post entitled 'college and jobs' and let me know what you think. thanks.
 
Re: Re: any hackers out there? i need a favor.

Fonz said:


LOL

First off, both CIA and NSA use stand-alone systems.
NASA? Probably too, but not sure here.

A stand-alone system is NOT hard-wired into the internet and does not have a physical address.

Most intel agencies communicate via encrypted communications channels(i.e.satellites) or dedicated landlines for their communications.

An STU phone is what is used by most agencies. It has a 512-bit
encryption key. Impossible to brute force it with a Cray unless
you have a whole century to do it with.

Moral of my post?

You CANNOT break INTO CIA and NSA via computer.

However, you CAN steal their encrypted electronic transmissions
and decipher them.

Which is just as bad I guess.

Fonz

Go Uber Geek!

This is part of what an air gap is, I dont know alot about them but its obviously not CAT5/6, supposed to in short be a way to determine without the ability to fool it if an attacker is on the LAN or WAN regardless of IP.

NASA gets broken into all the time, since the 80s, and again most of the time its stupid stuff that they never fix even when told how someone got in.
 
Top Bottom