Hacking

3.3736434108559 (1290)
Posted by r2d2 04/05/2009 @ 05:11

Tags : hacking, security, software, technology

News headlines
Facebook wall gets hacked - Park Record
A girl in the Jeremy Ranch area isn't sure who posted derogatory remarks on her Facebook wall by hacking into her account on the popular social networking Web site. On May 8, her mother reported the occurrence to the Summit County Sheriff's Office....
Teen hacking seen as casual activity - Computerworld
Casual hacking is almost as established a part of teen life as downloading music to an iPod, a new survey of the age group has claimed. Casual hacking is almost as established a part of teen life as downloading music to an iPod, a new survey of the age...
Zemke, Hacking May Race In World Superbike At Miller Motorsports Park - RoadracingWorld.com
Erion Honda's Jake Zemke and Monster Energy Attack Kawasaki's Jamie Hacking may race in the Superbike World Championship event May 29-31 at Miller Motorsports Park, in Tooele, Utah. Zemke, who just returned Wednesday from Monza where he filled in for...
New Jersey Man Admits Scientology Web Hack - FOXNews
Prosecutors say 19-year-old Dmitriy Guzner of Verona entered his plea to computer-hacking charges on Monday in Newark. Assistant US Attorney Wesley Hsu says Guzner attacked Scientology Web sites as part of Anonymous, an underground group that protests...
Chinese military tried to hack into S. Korean embassy in US: report - TMCnet
SEOUL, May 14, 2009 (Asia Pulse Data Source via COMTEX) -- The Chinese military attempted to hack into computers at the South Korean Embassy in the United States last year, a South Korean Air Force publication said Wednesday....
Survey: Internet hacking popular among teenagers - Xinhua
LOS ANGELES, May 13 (Xinhua) -- Two-thirds of teens polled in a recent survey admitted that they have tried to hack into a friend's instant messaging or social networking account, an Internet security firm said on Wednesday....
Wildlife center offers hacking program tour - Mid Columbia Tri City Herald
The open house from 11 am to 3 pm will include showing the center's raptor hacking program. Hacking refers to a method of raising baby raptors, such as owls, by placing them in a box on a pole about 10 feet off the ground, and feeding them so the birds...
As Hacking Hits Home, China Strengthens Cyber Laws - PC World
A year ago, when a Time Magazine reporter told Tan Dailin that he'd been identified as someone who may have hacked the Pentagon, he gasped and asked, "Will the FBI send special agents out to arrest me?" The answer, it turns out, was, "No,...
Organised crime cops seek international hacking powers - Register
By Chris Williams • Get more from this author British law enforcement agents are quietly working with European counterparts on changes to national legislation that will allow them to share intelligence gained by hacking into suspects' PCs....
Court upholds 'hacking' charge against smut-surfing worker - Register
By John Leyden • Get more from this author A US court has turned down an appeal from a man convicted of computer hacking offences for using a workplace computer to post nude pictures of himself onto a swingers website. Richard Wolf used his work PC to...

Hacking tool

Computer-eat.svg

A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking.

Examples include Nmap, Nessus, John the Ripper, SuperScan, p0f, and Winzapper. Chocolate has also been designated as among the most potent hacking tools, due to its potential exploitation in social engineering attacks. Occasionally, common software such as ActiveX is exploited as a hacking tool as well.

Hacking tools such as Cain and Abel, however, are well known as Script Kiddie Tools. Script kiddies are people who follow instructions from a manual, without realising how it happens. These Script Kiddies have been an enormous threat to computer security as there are many hacking tools and keyloggers up for download and are free.

Another example of a hacking tool is a computer worm. These malicious programs detect vulnerabilities in operating systems. Not all worms, however, are malicious. The Nachi Worms have actually fixed operating system vulnerabilities by downloading and installing security patches from the Microsoft website.

Port scanners detect vulnerabilities in firewalls, and are able to find a great deal about the computer system, such as the operating system, ISP, wireless routers and how long the system has been online. However, port scanners are the best security auditing tools.

To the top



Hacking Democracy

Hackingdemocracydvdcover.jpg

Hacking Democracy is a 2006 documentary film by Russell Michaels, Simon Ardizzone, and Robert Carrillo Cohen, shown on HBO. Filmed over three years it documents American citizens investigating anomalies and irregularities with 'e-voting' (electronic voting) systems that occurred during America's 2000 and 2004 elections, especially in Volusia County, Florida. The film investigates the flawed integrity of electronic voting machines, particularly those made by Diebold Election Systems, and the film culminates dramatically in the on-camera hacking of the in-use / working Diebold election system in Leon County, Florida.

In 2007 Hacking Democracy was nominated for an Emmy award for Outstanding Investigative Journalism.

The documentary follows Bev Harris and Kathleen Wynne, director and associate director for nonprofit election watchdog group Black Box Voting, as they attempt to discover the extent to which it would be possible to alter results on the electronic voting machines of Diebold Election Systems (now Premier Election Solutions, a wholly owned subsidiary of Diebold). Andy Stephenson, an employee of Black Box Voting from July-December 2004, assisted with comparisons of audit documents in Volusia County and obtained a secret videotape of Harris interviewing a voting machine testing lab. Kathleen Wynne captured live video of Harris finding voting machine records in a Volusia County trash bag, and captured video of Cuyahoga County elections workers admitting that the initial 3% recount ballots had not been randomly selected during the 2004 presidential election. Harris and Wynne then embarked on a series of five voting machine hack tests with Dr. Herbert Thompson and Harri Hursti in 2005 and 2006. During the course of the documentary, multiple methods of tampering with the votes are shown.

The first is through editing the database file that contains the voting totals. This file is a standard Microsoft Access database, and can be opened by normal means outside of the encompassing voting program without a password. Some jurisdictions have disabled Microsoft Access, making it more difficult to alter the database, but this protection was shown to be bypassed by Dr. Herbert Hugh Thompson through a Visual Basic program which searched for a string of text and edited the file through external means. However, alterations of the results in either of these fashions would be caught if a vigilant elections official compared the results with voting machine tapes.

One of Diebold's objections to the film was that it failed to mention that Avi Rubin, a Johns Hopkins computer science professor and vocal Diebold critic, may have a conflict of interest. Rubin at one point owned stock options in VoteHere, which sells auditing software and systems for voting machines. However, Rubin disposed of his stock options and withdrew from the VoteHere advisory board in August 2003, and says he had not had any meaningful contact since joining over two years before, except occasionally receiving press clippings.

The film was released on DVD on March 20, 2007. It includes deleted scenes, a trailer and director biographies.

To the top



Hacker (computer security)

Computer-eat.svg

In common usage, a hacker is a person who breaks into computers. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.

Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media.

Hacking developed alongside "Phone Phreaking", a term referred to exploration of the phone network without authorization, and there has often been overlap between both technology and participants.

Bruce Sterling traces the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program newsletter.

The computer underground is heavily dependent on technology. It has produced its own slang and various forms of unusual alphabet use, for example 1337speak. Writing programs and performing other activities to support these views is referred to as hacktivism. Some go as far as seeing illegal cracking ethically justified for this goal; the most common form is website defacement. The computer underground is frequently compared to the Wild West: a male-dominated Frontier to conquer. It is common among hackers to use aliases for the purpose of concealing identity, rather than revealing their real names.

The computer underground is supported by regular real-world gatherings called hacker conventions or "hacker cons". These have drawn more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), and H.O.P.E.. They have helped expand the definition and solidify the importance of the computer underground.

The most notable hacker-oriented magazine publications are Phrack and 2600: The Hacker Quarterly. While the information contained in hacker magazines and ezines was often outdated, they improved the reputations of those who contributed by documenting their successes.

Hackers often show an interest in fictional cyberpunk and cyberculture literature and movies. Absorption of fictional pseudonyms, symbols, values, and metaphors from these fictional works is very common.

Several subgroups of the computer underground with different attitudes and aims use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker – cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat (“ethical hacking”), grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker to refer to black hat hackers, or more generally hackers with unlawful intentions.

A white hat hacker breaks security for non-malicious reasons. This type of hacker enjoys learning and working with computer systems, and consequently gains a deeper understanding of the subject. Such people normally go on to use their hacking skills in legitimate ways, such as becoming security consultants. The word 'hacker' was originally used to describe people such as these.

A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

A black hat hacker is someone who subverts computer security without authorization or uses technology (usually a computer or the Internet) for vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or other types of crime. They are also known as "crackers".

A Cyberterrorist uses technology to commit acts of terrorism. Their intentions are to cause physical, real-world harm to social, ideological, religious, political, or governmental establishments. Such as using DOS (Denial of Service) attacks to take down entire websites.

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. These are the outcasts of the hacker community.

A hacktivist is a hacker who utilizes technology to announce a political message.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

A security exploit is a prepared application that takes advantage of a known weakness.

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social Engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Often uses virus-, trojan-, and rootkit-like methods to remain active and hidden.

Kevin Mitnick is a computer security consultant and author, formerly the most wanted computer criminal in United States history.

Eric Corley (also known as Emmanuel Goldstein) is the long standing publisher of 2600: The Hacker Quarterly. He is also the founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s.

Gordon Lyon, known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.

Solar Designer is the pseudonym of the founder of the Openwall Project.

Michał Zalweski (lcamtuf) is a prominent security researcher.

To the top



Lori Hacking

Lori Hacking.jpg

Lori Kay Soares Hacking (December 31, 1976 – July 19, 2004) was a Salt Lake City, Utah, woman who was killed by her husband, Mark Hacking, in 2004. She was reported missing by her husband, and the search earned national attention before her husband confessed to the crime.

Lori was the adopted daughter of Thelma and Herald Soares, formerly of Fullerton, California. Herald is a native of Piracicaba, Brazil. He met Thelma when they both served as missionaries for the Church of Jesus Christ of Latter Day Saints (Mormon or LDS) in Rio de Janeiro. Lori's parents divorced in 1987 and Thelma and Lori relocated to Orem, Utah the following year. Lori and Mark both attended Orem High School, about 40 miles (about 64 kilometers) south of Salt Lake City.

Hacking was 27 years old when she disappeared. Her husband, Mark Hacking, called 9-1-1 to report her missing at 10:49 a.m. on July 19, 2004. He told police she had left home early for a customary jog in the Memory Grove and City Creek Canyon area northeast of downtown Salt Lake, but had not returned home or arrived at work. A woman who said she had seen Lori near the grove that day later withdrew her claim.

According to some family members, Hacking was about five weeks pregnant when she vanished. She had planned to move to North Carolina, where her husband had said he was to study at the University of North Carolina-Chapel Hill medical school, having recently graduated from college. However, police say Mark had never completed an undergraduate degree at the University of Utah as he led family and friends to believe, and the medical school had no record of him having ever applied.

Shortly after Hacking's disappearance, Mark Hacking was reportedly found running naked through the streets, and was admitted to hospital for mental evaluation. While in the hospital, Mark engaged a locally prominent defense attorney, D. Gilbert Athay.

On August 2, 2004, Mark Hacking was arrested on suspicion of the aggravated murder of his wife. Police believed that he acted alone, killing Lori in their apartment with a .22-caliber rifle while she was asleep and disposing of her body in a dumpster. They found blood in several places in the couple's apartment, including on a knife located in the bedroom and on the headboard of the bed, as well as in Lori's car. In addition, Scott and Lance Hacking, Mark's brothers, claim that he confessed to them on July 24, 2004 of having murdered Lori. First-degree murder charges were filed against Mark Hacking on August 9, 2004.

On October 1, 2004 at approximately 8:20 a.m. (Mountain Daylight Time) searchers found human remains in the Salt Lake County landfill. By that afternoon, police had confirmed that the remains were those of Lori Hacking.

On October 29, 2004, Mark Hacking pleaded not guilty to first-degree murder, despite the victim's brother, Paul Soares, begging Mark in a letter earlier in the day to "save your family the grief and cost plead guilty to murder".

On April 15, 2005, Mark Hacking pleaded guilty to first-degree murder in exchange for prosecutors dropping other charges. Because there was a firearm involved, the statutory sentence is six years to life. Some additional hearings have been scheduled before actual sentencing.

On June 6, 2005, Mark Hacking was sentenced 6 years to life in prison, the maximum the judge could give under Utah law. Under Utah's system of indeterminate criminal sentences, first-degree felony murder brings a mandatory five years to life, but Hacking's minimum is increased to six years because he used a firearm.

On March 20, 2006, Utah House Bill 102, also known as "Lori's Law," was signed into law. It increases the minimum penalty for a person convicted of first degree murder in Utah to fifteen years to life.

In June 2006, prison officials in Utah discovered that personal items related to Hacking's conviction, including autographs, a hand tracing, various prison forms, and magazines, were on sale at an on-line site called "Murder Auction". After speaking with Hacking, the prison officials announced that he had agreed to voluntarily discontinue selling anything online.

To the many people I have hurt, I am more sorry than you could ever know. Every day my soul burns in torment when I think of what you must be going through. I wish I could take away your pain. I wish I could take back all the lies I have told and replace them with the truth. I wish I could put Lori back into your arms. My pain is deserved; yours is not. From the bottom of my heart, I beg for your forgiveness.

To the top



Source : Wikipedia