Forum

> > Off Topic > Hackers
Forums overviewOff Topic overviewLog in to reply

English Hackers

113 replies
Page
To the start Previous 1 2 3 4 5 6 Next To the start

old Re: Hackers

palomino
User Off Offline

Quote
The Camo has written
XP is the best for games, and I think it will still be in the next 2 years.

Wrong. XP supports DX 9. Best games need DX 10 or 11 (which can't be installed on XP).

old Re: Hackers

The Camo
User Off Offline

Quote
Sunny Autumn has written
The Camo has written
XP is the best for games, and I think it will still be in the next 2 years.

Wrong. XP supports DX 9. Best games need DX 10 or 11 (which can't be installed on XP).


I'm using DX 11 currently on my XP.
Edit, or is it 10, idk, forgot, got it in 2010, it was "new" then.

old Re: Hackers

Banaan
User Off Offline

Quote
You're getting sloppy oxy, there is absolutely no way to actually decode either sha or md5. Even I know that, while we both agree I'm a newb on this subject.

Why is it impossible? Easy one: our great friend the modulus. True one-way encryption.

What you probably mean with your 'decoding' is simply running it through databases of known hashes with belonging passwords. Hopefully mine isn't in there...

@The Camo, every single version of Windows has the same problems. Mac and Linux are getting more and more accessible, so in a few years time they'll be in charge in personal computer world.

old Re: Hackers

The Camo
User Off Offline

Quote
@Banaan, Well, I didn't wright about Mac and Linux, because I don't know about them, though I heard form many people that Linux or mac is bad and one of them is really good(don't know which one is Bad/good), but idk, never tested it, so couldn't start saying its true.

"every single version of Windows has the same problems"
Not exactly, most errors don't occur on XP, as on Win7 they do due to its still new. Though, there are too many variations of hardware configurations, so it will take time for developers to fix every problem for every hardware configuration.
Also, I'm using XP SP2 (fully updated) with no errors whats so ever, I can run every game without any problems (Only for SWKOTOR 1 I need to switch from higher Graphic drivers to low one).

old Re: Hackers

Banaan
User Off Offline

Quote
All OS's are both bad and good one way or another.

Of course all versions of windows (NT) have the same errors; in the end they're all based on the same platform so the only thing they can do is work around them and thereby create new ones. By now, the originally reasonable NT code has become cracked, old, covered with bandages and glued together.

Indeed, many bugs have been fixed over the years and many have been created, but in the end it's the same system with the same problems (crashing, bad security, really really slow, you name it)

old Re: Hackers

palomino
User Off Offline

Quote
The Camo has written
Sunny Autumn has written
The Camo has written
XP is the best for games, and I think it will still be in the next 2 years.

Wrong. XP supports DX 9. Best games need DX 10 or 11 (which can't be installed on XP).


I'm using DX 11 currently on my XP.
Edit, or is it 10, idk, forgot, got it in 2010, it was "new" then.

It is DX9. It doesn't depend when you got it, if you are using XP maximum is DX9.

old Re: Hackers

EngiN33R
Moderator Off Offline

Quote
I like how this discussion has nothing to do with the actual thread topic.

old Re: Hackers

MrShock
User Off Offline

Quote
EngiN33R has written
I like how this discussion has nothing to do with the actual thread topic.


Ehh.. They are discussing here about DirectX 9, right ?

On-topic : He can't even hack you because why ? He need reason. Oh, and yea he can hack you. You do not know what things he can do as far as i know.

old Re: Hackers

oxytamine
User Off Offline

Quote
Banaan has written
What you probably mean with your 'decoding' is simply running it through databases of known hashes with belonging passwords. Hopefully mine isn't in there...

That's what I mentioned, but it ain't no breaking me.

old Re: Hackers

Psytechnic
User Off Offline

Quote
This is all incredibly creative and thank you tobey for your elaboration, but plese guys, don't tarnish this thread like so many others with flame and misdirection.

As of SHA1 and MD5... well...
http://www.zdnet.com/blog/ou/putting-the-cracking-of-sha-1-in-perspective/409
Posted in Jan 2007... So not so secure...

Password cracking has been improving for years though and although BackTrack is a great network tool, an equivelant "key" if you will is Ophrack. This uses a variant of rainbow table calculations to reach longer passwords faster than ever before, so even a 8-11 letter password can be broken fairly quickly (based on the type of computer/network setup you have).
Tools? One word... "NMap" (Ironically included in BackTrack)

DirectX is relevant to this as it does hook into the networking of the OS and can to be exploited to run arbitrary code.

Keep up the thinking, it's not about starting a fight, it's about the knowing how to fight if needed. Talking about this makes people aware of how security isn't always as secure as you think and how seeking out the best security software is like seeking out the best lock on the door. Are you gonna leave that little padlock there or are you gonna go out, get 2 dead-bolts (AV and RegMonitoring), a 5-lever lock (Firewall) and a front cage (IP filter)?

old Re: Hackers

DannyDeth
User Off Offline

Quote
SHA1 and SHA512 are completely different, I'd like to see anyone here decrypt a 512-bit encryption of any kind, especially since it basically a hash-type encryption and has no way to decrypt it.

However, rainbow tables used in programs such as Ophcrack ( which btw can be run on any Linux distro as a program, it doesn't have to be used from boot ).

And your 'tools' section is ironically small, you need some sort of progrm that can be used for more than what it can, which leaves the ever so famous ( and greatly favoured ) network tool that has been 'round since the dawn of computer cracking, netcat. And NMap is included in in BackTrack for obvious reasons: Network MAP. Simple, very efficient port scanning and serious host/packet redirection cannot be messed with.

But your knowledge is wonderfully on track and I admire your wisdom, also your use of "I'm not trying to start a fight" makes good sense, this is a forum and we should use it for intellectual thinking and speaking.

old Re: Hackers

oxytamine
User Off Offline

Quote
It's not very hard to write a program that will go through all the possible keys and try them all. If you really want to know the answer to how long it will take precisely, quickly knock up one of these programs, let it run for 24 hours and see how far through the keys it has got.

old Re: Hackers

DannyDeth
User Off Offline

Quote
Well, by the time 24 hrs has gone the computer will probably off if it is a home computer
And it's not like you can just download the encrypted password files to play with for a little while.

And the writing of program stuff:
You need a pretty decent computer to run through them for more than 13000 pws a second. And any decently long password ( 8 chars ) can still eb uncrackable, especially if say some idiot decides they want there password to be ©opright_Ube®_n00b®

old Re: Hackers

oxytamine
User Off Offline

Quote
Nah, I've got a laptop and I haven't been turning it off for ages.

old Re: Hackers

DannyDeth
User Off Offline

Quote
Well then you are either very confident about your security or you are trying to cut it's life spawn short

old Re: Hackers

oxytamine
User Off Offline

Quote
DannyDeth has written
very confident about your security

old Re: Hackers

DannyDeth
User Off Offline

Quote
I am sure that you are not completely secure. No Windows installation can be 100% secure ( especially in the hands of really young children and middle-aged people that were brought up thinking computers were mechanical ). The main reason Linux is more secure is because of the numerous distros, you can tell roughly what version of Linux it is based on ( thanks, NMap ), but you can never be 100% sure which distro it is, it could be proper red hat, or it could be fedora, it could be Ubuntu Lite, or it could be full on space-hogger Ubuntu.

old Re: Hackers

Psytechnic
User Off Offline

Quote
DannyDeth has written
SHA1 and SHA512 are completely different, I'd like to see anyone here decrypt a 512-bit encryption of any kind, especially since it basically a hash-type encryption and has no way to decrypt it.

However, rainbow tables used in programs such as Ophcrack ( which btw can be run on any Linux distro as a program, it doesn't have to be used from boot ).

And your 'tools' section is ironically small, you need some sort of progrm that can be used for more than what it can, which leaves the ever so famous ( and greatly favoured ) network tool that has been 'round since the dawn of computer cracking, netcat. And NMap is included in in BackTrack for obvious reasons: Network MAP. Simple, very efficient port scanning and serious host/packet redirection cannot be messed with.

But your knowledge is wonderfully on track and I admire your wisdom, also your use of "I'm not trying to start a fight" makes good sense, this is a forum and we should use it for intellectual thinking and speaking.


I was posting quickly as I've been at work all night and didn't really have time to divulge further.

On encryption, yep. It's getting harder and they're using a larger key, but strength also depends on the number of iterations the data is pushed through the encryption algorithm.

As for Ohprack, I was merely demonstrating what is already available to anyone with a PC and the net. But it's pretty cool stuff.

Tools? Pick as many as you like. There are some age old ones like netcat that are still useful, so no point re-inventing the wheel, but there are other times you need to code your own solution and quick. I have some base tools like NMap, but most of what I need, I make on the fly. I believe we shouldn't become too reliant on the tools designed to work with the architecture. Sometimes, you wanna bypass the OS API altogether and keep it on a hardware level, never coming above the HAL. That way, you can keep your activities completely hidden from the user even if they're actually using the PC. There are ways to spot this though. For every system, there are guys trying to make holes and other guys trying to fill them. In the end, all we end up with is wither a shotgunned system that's inadequate for defence (XP) or a system that's pretty much incompatible with anything (Vista).

As you quite rightly say, password strength is in its obscurity. Make a password "secret" and it'll be cracked in seconds, make a password "$3Cr37" and you'll notice it takes considerably longer because any brute force method has to widen it's character map and that dramatically increases the time needed to crack it by a long shot...

For example, make a password using just lower case latin characters (standard a-z) and for a 6 letter password, the cpu has to try 26x26x26x26x26 = 26^6 = 308915776 attempts to guarentee a crack, but simply widen the band to include alpha numeric, upper case and lower, not even including symbols and you have 62x62x62x62x62x62 = 62^6 = 56800235584 iterations before a crack is guarenteed...

Look at those numbers side by side...
308915776
56800235584

include a massive range of symbol characters, extend it to a 13 letter password and you have a password that would be unfreasable to brute force (1000 years or more), but this leads back to what we were talking about before. Cracking passwords by brute force is becoming unrealistic if the target is educated in technology and just like the door lock anaolgy, it's up to the homeowner to decide how big the key (and therefor the lock) is to the house.

As for OS fingerprinting by scanning, you can disable the reply in windows (custom tools or command line) in a very similar fashion to changing your user agent in your browser to stop reporting your info.

Network cracking and decryption are notably easier on linux and there's a lot less exploits, but that doesn't mean you can't do the same on windows and it doesn't mean that linux is secure, it just means, in both cases, you have to be a little more creative.

This is some good stuff guys. I hope people out there are reading all of this and understanding the message.

old Re: Hackers

DannyDeth
User Off Offline

Quote
Hm, yeah I like how you showed the two numbers side-by-side, makes you really think heh

I was also taught that you should write your own told as much as possible. I commonly use a modfied version of GNU Netcat that I re-coded to allow for Python scripting ( just easier to do common things, this way I can save procedures I commonly use in .py modules which makes it flipping awesome and easy to extend [ it further allows me to use Python's higher-level socket interface along with C's lower-level interface to create decent exploits fast ] ). I remember the "Crash-course to network security", as my first lesson's title ( that feels so long behind me... ).
To the start Previous 1 2 3 4 5 6 Next To the start
Log in to replyOff Topic overviewForums overview