Home page logo

metasploit logo Metasploit mailing list archives

hack technics
From: myx at amex.ro (myx at amex.ro)
Date: 13 Feb 2007 14:43:22 +0200

Today hacking becomes more and more money based. In early ages of
internet, hacking was more like a "show-off" between good and bad guys.
Unfortunatelly, today, hackers can be divided in  few categories.
Ethical one (lab hackers) , script kiddies (wich includes scam site
builders, phising sites, piracy and more) and ( most dangerous) those
known as on-command hackers (very good skilled and working for a lot of
money). Every category have their own target(s) .
Knowing what they are targeting and why, realising if the network, OS,
software we protect is one of any category target is a good way to start
protecting and defending.
Latest phising metod(s) ? Simple. Pose as a script kiddie in one or more 
underground sites or chat and you'll be "on news" with them.

On 2/12/2007, "lord maximus" <gangstified at gmail.com> wrote:

well to start it off... Hacking in my own opinion, is a state of mind....

I won't go into what exactly a hacker main focuses are, but they should be
to get in any way possible, leaving no footprint or logs. So thinking using
the state of mind factor, you could say if one think doesn't work (like
subverting windows 2003 SP1 kernel integrity protection", you'd find another
way todo the same thing, or some other way into a machine in a given attack.

It also depends if your talking live hacking of a machine, or hacking of

On 2/12/07, Omid Tavakoli <omid.zs at gmail.com> wrote:

Dear mailing list members ,

This is a Network Security specialist (Penetration Testing Asset) who has
been working on the latest methods of the penetration testing; as part of my
research I have some questions and I would be very thankful if you would
help me find the answers.

I believe in order to provide the required level of security for any
application, network or operating system, we need to look at it from the
hacker's point of view because they have been always one step ahead of us. I
need to know what the hacker's main focuses are. For example, "Subverting
Windows 2003 SP1 Kernel Integrity protection"? or "defeating stack based
overflow prevention mechanism". What are the latest phishing methods? and

And in general, what is the direction of the hacking methods in the near


Omid Tavakolli

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]