Model Boat Mayhem

Please login or register.

Login with username, password and session length.
Pages: [1]   Go Down

Author Topic: computine hacking ?  (Read 2722 times)

regiment

  • Guest
computine hacking ?
« on: October 09, 2011, 12:41:58 pm »

do not know if i heard right but can some one with a mobile phone hack  ;; in to computers
Logged

johno 52-11

  • Full Mayhemer
  • *****
  • Offline Offline
  • Posts: 301
  • Model lifeboats built to perform
  • Location: Dudley "The Blackcountry" West Midlands
    • lifeboat Models
Re: computine hacking ?
« Reply #1 on: October 09, 2011, 01:03:47 pm »

I theory with a Smart phone YES O0 O0

A smart phone is in effect a small PC and has the processing power of the average desktop of a few years ago.

It connects to the internet in much the same way as a PC with the IP protocol so as long as the hacker can program the device to do his/her bidding it is possible.

It is also possible that to attack a vulnerable website you only need a browser. A good example of this would be SQL injection which only requires access to the URL or a badly configured input on a page.

 



Logged

regiment

  • Guest
Re: computine hacking ?
« Reply #2 on: October 09, 2011, 01:58:04 pm »

 thanks .. it seems that nothing is safe today
Logged

johno 52-11

  • Full Mayhemer
  • *****
  • Offline Offline
  • Posts: 301
  • Model lifeboats built to perform
  • Location: Dudley "The Blackcountry" West Midlands
    • lifeboat Models
Re: computine hacking ?
« Reply #3 on: October 09, 2011, 04:01:08 pm »

True nothing is safe. There is always someone trying to break things. This story was going around a couple of weeks ago that two researchers had broken SSL.

SSL is the security part of sites that are HTTPS.
http://isc.sans.edu/diary.html?storyid=11722

At the end of the day what they showed is possible but you need to have some controls over the client system to make it work.

So what's secure today may be broken in the future and you have to find a new way to secure it.
Logged

ZZ56

  • Guest
Re: computine hacking ?
« Reply #4 on: October 09, 2011, 08:07:55 pm »

Do keep in mind that most cases of 'hacking' are really just password-guessing or finding.  You can do this sort of thing from a variety of devices. 
Logged

deadwood

  • Guest
Re: computine hacking ?
« Reply #5 on: October 10, 2011, 09:49:58 am »

Everything that is connected to a network or temporarily attached to external storage can be cracked.
Even Iranian uranium enrichment plants via tainted USB sticks.

Much of today's applied encryption and access control only relies on the inability or rather impracticality of prime factorisation of a product of big enough relative primes.
This must be an affront to any self-respecting pure mathematician.
What would happen if someone came along with an algorithm to solve this or simply with sufficient computing power for a successful brute force attack within a feasible time? %)
So far most reported attacks seem to concentrate on the latter.
The intriguing question seems to be whether a code breaker of the first kind would promulgate his findings and raise his reputation, or if he clandestinely would exploit his knowledge to raise his material wealth?
Logged

dodgy geezer

  • Full Mayhemer
  • *****
  • Offline Offline
  • Posts: 3,948
  • Location: London
Re: computine hacking ?
« Reply #6 on: October 10, 2011, 09:57:40 pm »


The intriguing question seems to be whether a code breaker of the first kind would promulgate his findings and raise his reputation, or if he clandestinely would exploit his knowledge to raise his material wealth?


He would promulgate his findings, raising his reputation AND his material wealth. 

http://www.theregister.co.uk/2011/10/10/mifare_desfire_smartcard_broken/  refers...
Logged

johno 52-11

  • Full Mayhemer
  • *****
  • Offline Offline
  • Posts: 301
  • Model lifeboats built to perform
  • Location: Dudley "The Blackcountry" West Midlands
    • lifeboat Models
Re: computine hacking ?
« Reply #7 on: October 10, 2011, 11:50:45 pm »

Even the American Military can't keep there systems secure.  %% %%

http://www.theregister.co.uk/2011/10/10/keylogging_bug_infects_predator_drones/

Black hat Hackers do it for the glory and more recently the money they can make selling there findings to cyber crime.

White hat Or ethical hackers look for the vulnerabilities and get them fixed before the black hats find them.

You can usually find a piece of melware or an exploit for a vulnerability a day or so after the vulnerability is made public or a patch has been released.
Logged
Pages: [1]   Go Up
 

Page created in 0.098 seconds with 22 queries.