Model Boat Mayhem

Mess Deck: General Section => Chit-Chat => Topic started by: regiment on October 09, 2011, 12:41:58 pm

Title: computine hacking ?
Post by: regiment on October 09, 2011, 12:41:58 pm
do not know if i heard right but can some one with a mobile phone hack  ;; in to computers
Title: Re: computine hacking ?
Post by: johno 52-11 on October 09, 2011, 01:03:47 pm
I theory with a Smart phone YES O0 O0

A smart phone is in effect a small PC and has the processing power of the average desktop of a few years ago.

It connects to the internet in much the same way as a PC with the IP protocol so as long as the hacker can program the device to do his/her bidding it is possible.

It is also possible that to attack a vulnerable website you only need a browser. A good example of this would be SQL injection which only requires access to the URL or a badly configured input on a page.

 



Title: Re: computine hacking ?
Post by: regiment on October 09, 2011, 01:58:04 pm
 thanks .. it seems that nothing is safe today
Title: Re: computine hacking ?
Post by: johno 52-11 on October 09, 2011, 04:01:08 pm
True nothing is safe. There is always someone trying to break things. This story was going around a couple of weeks ago that two researchers had broken SSL.

SSL is the security part of sites that are HTTPS.
http://isc.sans.edu/diary.html?storyid=11722 (http://isc.sans.edu/diary.html?storyid=11722)

At the end of the day what they showed is possible but you need to have some controls over the client system to make it work.

So what's secure today may be broken in the future and you have to find a new way to secure it.
Title: Re: computine hacking ?
Post by: ZZ56 on October 09, 2011, 08:07:55 pm
Do keep in mind that most cases of 'hacking' are really just password-guessing or finding.  You can do this sort of thing from a variety of devices. 
Title: Re: computine hacking ?
Post by: deadwood on October 10, 2011, 09:49:58 am
Everything that is connected to a network or temporarily attached to external storage can be cracked.
Even Iranian uranium enrichment plants via tainted USB sticks.

Much of today's applied encryption and access control only relies on the inability or rather impracticality of prime factorisation of a product of big enough relative primes.
This must be an affront to any self-respecting pure mathematician.
What would happen if someone came along with an algorithm to solve this or simply with sufficient computing power for a successful brute force attack within a feasible time? %)
So far most reported attacks seem to concentrate on the latter.
The intriguing question seems to be whether a code breaker of the first kind would promulgate his findings and raise his reputation, or if he clandestinely would exploit his knowledge to raise his material wealth?
Title: Re: computine hacking ?
Post by: dodgy geezer on October 10, 2011, 09:57:40 pm

The intriguing question seems to be whether a code breaker of the first kind would promulgate his findings and raise his reputation, or if he clandestinely would exploit his knowledge to raise his material wealth?


He would promulgate his findings, raising his reputation AND his material wealth. 

http://www.theregister.co.uk/2011/10/10/mifare_desfire_smartcard_broken/  refers...
Title: Re: computine hacking ?
Post by: johno 52-11 on October 10, 2011, 11:50:45 pm
Even the American Military can't keep there systems secure.  %% %%

http://www.theregister.co.uk/2011/10/10/keylogging_bug_infects_predator_drones/ (http://www.theregister.co.uk/2011/10/10/keylogging_bug_infects_predator_drones/)

Black hat Hackers do it for the glory and more recently the money they can make selling there findings to cyber crime.

White hat Or ethical hackers look for the vulnerabilities and get them fixed before the black hats find them.

You can usually find a piece of melware or an exploit for a vulnerability a day or so after the vulnerability is made public or a patch has been released.