Plateforme de Hacking

HackBBS.org est une communauté faisant évoluer un système de services vulnérables.

Nous apprenons à exploiter de manière collaborative des solutions permettant de détourner les systèmes d'informations.
Cet apprentissage nous permet d'améliorer les technologies que nous utilisons et/ou de mieux comprendre l'ingénierie social.

Nous défendons les valeurs de l'entraide, du challenge personnel et contribuons modestement à rendre l'expérience des utilisateurs finaux la plus agréable possible.

Vous pouvez nous rencontrer via notre salon irc.
Le forum est en cours de remplacement par une version plus moderne, et tout aussi faillible que l'ancien ^^.
A ce jours nous enregistrons plusieurs dizaines de hack réussi contre notre site, et ce chiffre est en constante évolution. Merci a tous les contributeurs!

La refonte est en version alpha. Cette nouvelle plateforme permet de pentester à distance sans avoir son matériel à disposition.
Via l'exécution de scripts python connecté en websocket à l'ihm web, nous pouvons piloter le chargement de scénario
d'attaque/défense en "multijoueur" ^^.
Le système permet de charger des scripts de bibliothèques partagées et de chiffrer les échanges selon les modules déployés.
Vous trouverez dans la rubrique article de nombreux tutoriels afin de mieux comprendre la sécurité informatique,
ainsi que différents articles plus poussés.
Hacker
  • Sniffing
  • Cracking
  • Buffer overflow
  • Créations d'exploits
  • Social engineering
  • L'anonymat sur le web, spoofing
  • Bypass-proxy, Bypass-firewall
  • Injection de code SSI, SQL, etc...
  • Utilisation d'exploits, création de scripts(php, irc, perl)
Nous vous recommandons de sniffer votre réseau lors de votre navigation sur le site. La refonte vous fournira un outillage pour réaliser vos attaques/défenses.
Flux RSS

flux RSS d'HackBBS Abonnez-vous. Soyez prévenu des tournois, challenges, actualités, ...
Recevez nos dernières actualités sur notre flux RSS.



Challenges
Vous pourrez également participer à de nombreux challenges en constant renouvellement (si possible :p)
Dernièrement, les missions relativent aux derniers produits open sources marchent bien :)

Votre ultime challenge sera de défacer HackBBS. De nombreuses failles sont présentes. A vous de les trouver et de les exploiter.

Cet ultime test permettra de constater votre réactions face à une faille.
Black ou White? ^^

Ezine du moment: p42-14.txt
                              ==Phrack Magazine==



                  Volume Four, Issue Forty-Two, File 14 of 14



              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

              PWN                                             PWN

              PWN              Phrack World News              PWN

              PWN                                             PWN

              PWN        Compiled by Datastream Cowboy        PWN

              PWN                                             PWN

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN





              STEVE JACKSON GAMES v. UNITED STATES SECRET SERVICE



 Rights To Be Tested In Computer Trial                         January 20, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Joe Abernathy (The Houston Chronicle)(Page A13)

 *Reprinted With Permission*



                        Summary Judgment Denied In Case



AUSTIN -- A judge Tuesday denied plaintiff lawyers' request for summary

judgment in a case brought against the U.S. Secret Service to set the bounds of

constitutional protections for electronic publishing and electronic mail.



U.S. District Judge Sam Sparks acted after hearing complicated arguments

regarding application of 1st and 4th Amendment principles in  computer-based

communications and publishing.  The case will go to trial at 9 a.m. today.



"Uncontested facts show the government violated the Privacy Protection Act and

the Electronic Communications Privacy Act," said Pete Kennedy, attorney for

Steve Jackson Games, an Austin game company that brought the lawsuit.



Mark W. Batten, attorney for the Department of Justice, which is defending the

Secret Service, declined to comment on the proceedings.



Steve Jackson's company, which publishes fantasy role-playing games -- not

computer games -- was raided by the Secret Service on March 1, 1990, during a

nationwide sweep of suspected criminal  computer hackers.



Agents seized several computers and related hardware from the company and from

the Austin home of Steve Jackson employee Loyd Blankenship.  Taken from the

game publisher was an electronic bulletin board used to play-test games before

they were printed and exchange electronic mail with customers and free-lance

writers.



Another seized computer contained the text of the company's work in progress,

GURPS Cyberpunk, which was being prepared for the printers.



Blankenship's purported membership in the Legion of Doom -- a group of computer

hackers from Austin, Houston and New York -- led the Secret Service to Steve

Jackson's door.



Neither Jackson nor his company was suspected of wrongdoing.



The game publisher is named in two paragraphs of the 42-paragraph affidavit

requesting the 1990 search warrant, which targeted Blankenship -- a fact

Kennedy cited in seeking summary judgment.



Kennedy presented evidence that the original Secret Service affidavit for the

warrant used to raid Steve Jackson Games contained false statements.

Supporting documentation showed that Bellcore expert Henry Kluepfel disputes

statements attributed to him that accounted for the only link between Steve

Jackson Games and the suspicion Blankenship was engaged in illegal activity.



Batten came away visibly shaken from questioning by Sparks, and later had a

tense exchange with Kennedy outside the courtroom.



The lawsuit contends the government violated 1st Amendment principles by

denying the free speech and public assembly of callers to Jackson's bulletin

board system, Illuminati.  This portion of the complaint was brought under the

Privacy Protection Act, which also covers the seized Cyberpunk manuscripts --

if the judge rules that such a book, stored electronically prior to

publication, is entitled to the same protections as a printed work.

The government lawyers argued the Privacy Protection Act applies only to

journalistic organizations -- an argument Sparks didn't seem to buy.



The lawsuit also contends 4th Amendment principles providing against

unreasonable search and seizure were violated, on grounds the Electronic

Communications Privacy Act specifies protection for publishers.



The Justice Department contends electronic mail does not enjoy constitutional

protections.



"They (users of Illuminati) had no expectation of privacy in their electronic

mail messages," Batten said.  The basis of the argument is that Illuminati's

callers were not sending communications to others, but rather "revealing" them

to a third party, Steve Jackson, thus negating their expectation of privacy.

_______________________________________________________________________________



 Computer Case Opens; Agent Admits Errors                      January 27, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Joe Abernathy (The Houston Chronicle)(Page A11)

 *Reprinted With Permission*



AUSTIN -- Plaintiff's attorneys wrested two embarrassing admissions from the

U.S. Secret Service on the opening day of a federal civil lawsuit designed to

establish constitutional protections for electronic publishing and electronic

mail.



Special Agent Timothy Folly of Chicago admitted that crucial statements were

erroneous in an affidavit he used to obtain warrants in a 1990 crackdown on

computer crime.



Foley also conceded that the Secret Service's special training for computer

crime investigators overlooks any mention of a law that limits search-and-

seizure at publishing operations.



The case before U.S. District Judge Sam Sparks was brought by Steve Jackson

Games, an Austin game publisher, with the support of electronic civil rights

activists who contend that federal agents have overstepped constitutional

bounds in their investigations of computer crime.



Jackson supporters already have committed more than $200,000 to the litigation,

which seeks $2 million in damages from the Secret Service and other defendants

in connection with a March 1990 raid on Jackson Games.



Plaintiffs hope to establish that First Amendment protections of the printed

word extend to electronic information and to guarantee privacy protections for

users of computer bulletin board systems, such as one called Illuminati that

was taken in the raid.



Steve Jackson's attorney, Jim George of Austin, focused on those issues in

questioning Foley about the seizure of the personal computer on which

Illuminati ran and another PC which contained the manuscript of a pending

Jackson Games book release, "GURPS Cyberpunk."



"At the Secret Service computer crime school, were you, as the agent in charge

of this investigation, made aware of special rules for searching a publishing

company?"  George asked Foley.  He was referring to the Privacy Protection Act,

which states that police may not seize a work in progress from a publisher.  It

does not specify what physical form such a work must take.



Foley responded that the Secret Service does not teach its agents about those

rules.



Earlier, Foley admitted that his affidavit seeking court approval to raid

Jackson Games contained an error.



During the raid -- one of several dozen staged that day around the country in

an investigation called Operation Sun Devil -- agents were seeking copies of a

document hackers had taken from the computer system of BellSouth.



No criminal charges have been filed against Jackson, his company, or others

targeted in several Austin raids.  The alleged membership of Jackson employee

Loyd Blankenship in the Legion of Doom hacker's group -- which was believed

responsible for the BellSouth break-in -- lead agents to raid Jackson Games at

the same time that Blankenship's Austin home was raided.



Foley's affidavit stated that Bell investigator Henry Kluepfel had logged on to

the Illuminati bulletin board and found possible evidence of a link between

Jackson Games and the Legion of Doom.



But George produced a statement from Kluepfel, who works for Bellcore, formerly

AT&T Bell Labs, disputing statements attributed to him in the affidavit.  Foley

acknowledged that part of the affidavit was erroneous.



The U.S. Department of Justice, which is defending the Secret Service, contends

that only traditional journalistic organizations enjoy the protections of the

Privacy Protection Act and that users of electronic mail have no reasonable

expectation of privacy.

_______________________________________________________________________________



 Judge Rebukes Secret Service For Austin Raid                  January 29, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Joe Abernathy (The Houston Chronicle)(Page A21)

 *Reprinted With Permission*



AUSTIN -- A federal judge lambasted the U.S. Secret Service Thursday for

failing to investigate properly before it seized equipment from three Austin

locations in a 1990 crackdown on computer crime.



U.S. District Judge Sam Sparks' comments came on the final day of trial in a

lawsuit brought by Steve Jackson Games, an Austin publisher, with the support

of national computer rights activists.



The judge did not say when he will issue a formal ruling in the case.  In

addition to seeking $ 2 million in damages from the Secret Service and other

defendants, Jackson hopes to establish privacy and freedom of the press

protections for electronic information.



In a packed courtroom Thursday morning, Sparks dressed down Secret Service

Special Agent Timothy Foley of Chicago, who was in charge of the March 1, 1990,

raid on Jackson, one of his employees and a third Austin man.  No criminal

charges have been filed in connection with the raids.



"The Secret Service didn't do a good job in this case," Sparks said.  "We know

no investigation took place.  Nobody ever gave any concern as to whether

(legal) statutes were involved.  We know there was damage (to Jackson)."



The Secret Service has seized dozens of computers since the nationwide

crackdown began in 1990, but Jackson, a science fiction magazine and game book

publisher, is the first to challenge the practice.  A computer seized at

Jackson Games contained the manuscript for a pending book, and Jackson alleges,

among other things, that the seizure violated the Privacy Protection Act, which

prohibits seizure of publishers' works in progress.



Agents testified that they were not trained in that law at the special Secret

Service school on computer crime.



Sparks grew visibly angry when testimony showed that Jackson never was

suspected of a crime, that agents did no research to establish a criminal

connection between the firm and the suspected illegal activities of an

employee, and that they did not determine that the company was a publisher.



"How long would it have taken you, Mr. Foley, to find out what Steve Jackson

Games  did, what it was? " asked Sparks.  "An hour?



"Was there any reason why, on March 2, you could not return to Steve Jackson

Games a copy, in floppy disk form, of everything taken?



"Did you read the article in Business Week magazine where it had a picture of

Steve Jackson -- a law-abiding, tax-paying citizen -- saying he was a computer

crime suspect?



"Did it ever occur to you, Mr. Foley, that seizing this material could harm

Steve Jackson economically? "



Foley replied, "No, sir," but the judge offered his own answer:



"You actually did; you just had no idea anybody would actually go out and hire

a lawyer and sue you."



The judge's rebuke apparently convinced the government to close its defense

after the testimony from Foley, only one of several government witnesses on

hand.  Justice Department attorney Mark Battan entered subdued testimony

seeking to limit the award of monetary damages.



The judge's comments came after cross-examination of Foley by Pete Kennedy,

Jackson's attorney.



Sparks questioned Foley about the raid, focusing on holes in the search

warrant, why Jackson was not allowed to copy his work in progress after it was

seized, and why his computers were not returned after the Secret Service

analyzed them.



"The examination took seven days, but you didn't give Steve Jackson's computers

back for three months.  Why?" asked Sparks.



"So here you are, with three computers, 300 floppy disks, an owner who was

asking for it back, his attorney calling you, and what I want to know is why

copies of everything couldn't be given back in days.  Not months.  Days.



"That's what makes you mad about this case."



Besides alleging that the seizure violated the Privacy Protection Act, Jackson

alleged that since one of the computers was being used to run a bulletin board

system containing private electronic mail, the seizure violated the Electronic

Communications Privacy Act.



Justice Department attorneys have refused comment on the case, but contended in

court papers that Jackson Games is a manufacturer, and that only journalistic

organizations can call upon the Privacy Protection Act.



The government said that seizure of an electronic bulletin board system does

not constitute interception of electronic mail.



The Electronic Frontier Foundation committed more than $200,000 to the Jackson

suit.  The EFF was founded by Mitchell Kapor of Lotus Technology amid a

computer civil liberties movement sparked in large part by the Secret Service

computer crime crackdown that included the Austin raids.



"The dressing down of the Secret Service for their behavior is a major

vindication of what we've been saying all along, which is that there were

outrageous actions taken against Steve Jackson that hurt his business and sent

a chilling effect to everyone using bulletin boards, and that there were larger

principles at stake," said Kapor, contacted at his Cambridge, Massachusetts

office.



Shari Steele, who attended the trial as counsel for the EFF, said, "We're very

happy with the way the case came out.  That session with the judge and Tim

Foley is what a lawyer dreams about."

_______________________________________________________________________________



 Going Undercover In The Computer Underworld                   January 26, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Ralph Blumenthal (The New York Times)(Page B1)



  [A 36-year old law enforcement officer from the East Coast masquerades

  as "Phrakr Trakr" throughout the nation's computer bulletin boards.

  As the organizer of the High-Tech Crime Network, he has educated other

  officers in over 28 states in the use of computer communications.

  Their goal is to penetrate some 3000 underground bbses where computer

  criminals trade in stolen information, child pornography and bomb

  making instructions.



  "I want to make more cops aware of high-tech crime," he said.  "The

  victims are everybody.  We all end up paying for it."]

_______________________________________________________________________________



 Hackers Breaking Into UC Computers                            January 23, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by T. Christian Miller (The San Francisco Chronicle)(Page A20)



 [According to the University of California, hackers have been breaking

  into the DOD and NASA through UC computer systems.  The investigation

  links over 100 computer hackers who have reportedly penetrated

  computers at UC Davis, UC Berkeley, NYU, FSU, and CSU.  The FBI stated

  that the investigation reached as far as Finland and Czechoslovakia

  but did not comment on any arrests.



  University officials have asked all users to change to more complex

  passwords by April 1.]



_______________________________________________________________________________



 Feds Sued Over Hacker Raid At Mall                            February 5, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Joe Abernathy (The Houston Chronicle)(Page A5)



 [A lawsuit was filed 2-4-93 in the Washington, D.C. federal court to

  force the secret service to disclose its involvement in the disruption

  of a meeting of computer hackers last year.  The meeting, a monthly

  gathering of readers of "2600 Magazine" at the Pentagon City Mall was

  disrupted on November 6, 1992, when mall security and Arlington County

  Police questioned and searched the attendees.



  The suit was filed by the Computer Professionals for Social

  Responsibility.  "If this was a Secret Service operation, it raises

  serious constitutional questions," said Marc Rotenberg, director of

  CPSR.



  The Secret Service declined to comment on the matter.]



----------





[New Info in 2600 Case - from email sent by CPSR]



     One month after being sued under the Freedom of Information

Act (FOIA), the Secret Service has officially acknowledged that

it possesses "information relating to the breakup of a meeting

of individuals at the Pentagon City Mall in Arlington, Virginia."

The admission, contained in a letter to Computer Professionals for

Social Responsibility (CPSR), confirms widespread suspicions that

the agency played a role in the detention and search of

individuals affiliated with "2600" Magazine at the suburban

Washington mall on November 6, 1992.



     CPSR filed suit against the Secret Service on February 4

after the agency failed to respond to the organization's FOIA

request within the statutory time limit.  In its recent response,

the Secret Service released copies of three news clippings

concerning the Pentagon City incident but withheld other

information "because the documents in the requested file contain

information compiled for law enforcement purposes."  While the

agency asserts that it possesses no "documentation created by the

Secret Service chronicling, reporting, or describing the breakup

of the meeting," it does admit to possessing "information provided

to the Secret Service by a confidential source which is

information relating to the breakup of [the] meeting."  Federal

agencies classify other law enforcement agencies and corporate

entities, as well as individuals, as "confidential sources."



     The propriety of the Secret Service's decision to withhold

the material will be determined in CPSR's pending federal lawsuit.

A copy of the agency's letter is reprinted below.



David L. Sobel                               dsobel@washofc.cpsr.org

Legal Counsel                                (202) 544-9240 (voice)

CPSR Washington Office                       (202) 547-5481 (fax)



************************************************





                    DEPARTMENT OF THE TREASURY

                   UNITED STATES SECRET SERVICE



                                    MAR 5 1993



                                    920508





David L. Sobel

Legal Counsel

Computer Professionals for

Social Responsibility

666 Pennsylvania Avenue, S.E.

Suite 303

Washington, D.C.  20003



Dear Mr. Sobel:



This is in response to your Freedom of Information Act (FOIA)

request for access to "copies of all records related to the

breakup of a meeting of individuals affiliated with "2600

Magazine" at the Pentagon City Mall in Arlington, Virginia on

November 6, 1992."



Enclosed, please find copies of materials which are responsive to

your request and are being released to you in their entirety.



Other information has been withheld because the documents in the

requested file contain information compiled for law enforcement

purposes.  Pursuant to Title 5, United States Code, Section

552(b)(7)(A); (C); and (D), the information has been exempted

since disclosure could reasonably be expected to interfere with

enforcement proceedings; could reasonably be expected to

constitute an unwarranted invasion of personal privacy to other

persons; and could reasonably be expected to disclose the

identity of a confidential source and/or information furnished by

a confidential source.  The citations of the above exemptions are

not to be construed as the only exemptions that are available

under the Freedom of Information Act.



In regard to this matter it is, however, noted that your FOIA

request is somewhat vague and very broadly written.  Please be

advised, that the information being withheld consists of

information provided to the Secret Service by a confidential

source which is information relating to the breakup of a meeting

of individuals at the Pentagon City Mall in Arlington, Virginia,

and, therefore, appears to be responsive to your request as it

was written. If, however, the information you are seeking is

information concerning the Secret Service's involvement in the

breakup of this meeting, such as any type of documentation

created by the Secret service chronicling, reporting, or

describing the breakup of the meeting, please be advised that no

such information exists.



If you disagree with our determination, you have the right of

administrative appeal within 35 days by writing to Freedom of

Information Appeal, Deputy Director, U. S. Secret Service,

1800 G Street, N.W., Washington, D.C. 20223.  If you choose to

file an administrative appeal, please explain the basis of your

appeal.



                                    Sincerely,



                                    /Sig/

                                    Melvin E. Laska

                                    ATSAIC

                                    Freedom of Information &

                                    Privacy Acts Officer



Enclosure



*******************************************



For more information, refer to Phrack World News, Issue 41/1:



 Reports of "Raid" on 2600 Washington Meeting                  November 9, 1992

 Confusion About Secret Service Role In 2600 Washington Raid   November 7, 1992

 Conflicting Stories In 2600 Raid; CRSR Files FOIA            November 11, 1992

_______________________________________________________________________________



 Surfing Off The Edge                                          February 8, 1993

 ~~~~~~~~~~~~~~~~~~~~

 by Richard Behar (Time Magazine)(Page 62)



 [This article is so full of crap that I cannot even bring myself

   to include a synopsis of it.  Go to the library and read it

   and laugh.]

_______________________________________________________________________________



 Bulgarian Virus Writer, Scourge in the West, Hero at Home     January 29, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by David Briscoe (Associated Press)



 [The Dark Avenger, believed to be a computer programmer in Sophia, has

  drawn the attention of computer crime squads in the US and Europe.  To

  many programmers the Dark Avenger is a computer master to many young

  Bulgarians.  "His work is elegant. ... He helps younger programmers.

  He's a superhero to them," said David Stang director for the

  International Virus Research Center.



  Neither Bulgaria nor the US has laws against the writing of computer

  viruses]

_______________________________________________________________________________



 Computer Security Tips Teach Tots To Take Byte Out Of Crime   February 3, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Michelle Locke (Associated Press)

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Young Students Learn Why Computer Hacking Is Illegal         February 4, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Bill Wallace (San Francisco Chronicle)(Page A22)



 [In an attempt to teach computer crime prevention, children in

  kindergarten through third grade in a Berkeley elementary school are

  being shown a 30 minute presentation on ethics and security.



  The program consists of several skits using puppets to show the

  children various scenarios from eating food near computer systems to

  proper password management.



  In one episode, Gooseberry, a naive computer user, has her files

  erased by Dirty Dan, the malicious hacker, when she neglects to log

  off.



  Philip Chapnick, director of the Computer Security Institute in San

  Francisco, praised the idea.  "One of the major issues in information

  security in companies now is awareness.  Starting the kids early ... I

  think it will pay off," said Chapnick.]

_______________________________________________________________________________



Tracking Hackers - Experts Find Source In Adolescence       February 25, 1993

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

By Mike Langberg (Knight-Ridder News Service)



[At the National Computer Security Association convention in San

  Francisco, four experts analyzed the psyche of today's hacker.

  The panel decided that hacker bonding came from a missing or defective

  family.  The panel also decided that hackers weren't necessarily

  geniuses, and that a few weeks of study would be enough to begin.



  Panel member Winn Schwartau stated that there should be an end to

  slap-on-the-wrist penalties.  Sending hackers to jail would send a

  clear message to other hackers, according to Schwartau.



  "What strikes me about hackers is their arrogance," said Michael

  Kabay, computer security consultant from Montreal.  "These people seem

  to feel that their own pleasures or resentments are of supreme

  importance and that normal rules of behavior simply don't apply to

  them."]

_______________________________________________________________________________



 Bomb Recipes Just A Keystroke Away                      January 10, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by Tracy Gordon Fox (The Hartford Courant)(Page B1)



 [Teenagers gathering information via computer have contributed greatly

  to the fifty percent increase in the number of homemade explosives

  found last year.



  The computer age has brought the recipes for the explosives to the

  fingertips of anyone with a little computer knowledge and a modem.



  One of the first police officers to discover that computers played a

  part in a recent West Hartford, Connecticut, bombing said that

  hackers were loners, who are socially dysfunctional, excel in

  mathematics and science, and are "over motivated in one area."



  The trend has been seen around the country.  The 958 bombing incidents

  reported nationally to the Bureau of Alcohol, Tobacco and Firearms was

  the highest in 15 years.]

_______________________________________________________________________________



 Hackers Hurt Cellular Industry                                January 25, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by John Eckhouse (The San Francisco Chronicle)(Page C1)



 [With only a little equipment and technical knowledge, telephone

  pirates can make free calls and eavesdrop on cellular conversations.



  "Technically, eavesdroping is possible, but realistically I don't

  think it can be done," said Justin Jasche chief executive of Cellular One.



  The Cellular Telecommunications Industry Association estimates that

  hackers make about $300 million worth of unauthorized calls a year,

  though others put the figure much higher.]



-------------------------------------------------------------------------------



 Cellular Phreaks and Code Dudes                         February 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 by John Markoff  (Wired)  (page 60)



 [Two hackers, V.T. and N.M. have discovered that celluar phones are

  really just little computers linked by a gigantic cellular network.

  And like most computers, they are programmable.  The hackers have

  discovered that the OKI 900 has a special mode that will turn it into

  a scanner, enabling them to listen in on other cellular conversations.



  The two also discovered that the software stored in the phones ROM

  takes up roughly 40K, leaving over 20K free to add in other features,

  They speculate on the use of the cellular phone and a computer

  to track users through cell sites, and to monitor and decode

  touchtones of voice mail box codes and credit card numbers.



  Said V.T. of the OKI's programmers, "This phone was clearly built by

  hackers."]



-------------------------------------------------------------------------------



 Callers Invited To Talk Sex, Thanks To Hacker's Prank     February 5, 1993

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 (The Vancouver Sun) (Page A-9)



 [For the past two weeks, surprised callers to CTC Payroll Services'

  voice-mail system have been invited to talk sex.  Instead

  of a pleasant, professional salutation, callers hear a man's voice

  suggesting that they engage a variety of intimate activities.



  The prankster is a computer hacker who can re-program the greeting message

  on company telephones.  Company owner Cheryl MacLeod doesn't think the joke

  is very funny and says the hacker is ruining her business.]

_______________________________________________________________________________





Manifest
Le but de ce site est de mieux comprendre la sécurité informatique.
Un hacker par définition est une personne qui cherche à améliorer les systèmes d'information dans le seul et unique but de contribuer à la stabilité de ces systèmes!
La croyance populaire laisse entendre que les hackers sont des pirates.
C'est vrai. Mais il y a différents types de pirate.
Tout comme il y a différents types de personnes.
Les bavures courantes auxquelles on pense lorsqu'on évoque le terme de pirate informatique
seraient les hacks de compte msn, ordinateurs lâchement trojantés avec des exploits déjà tous faits
et encore peut-on classifier en tant que hack le fait de spammer
alors que depuis plus de 15 ans des scripts tous faits le font extrêmement bien?

Ce ne sont pas des hackers qui font ça!!!
Nous appelons ces gens des lammers! Quand ils sont mauvais,
ou des black hat lorsqu'ils sont doués dans la mise en application de leurs méfaits.
Aucun amour propre - Aucune dignité
Agissent par dégout, vengeance ou simple plaisir.
Les raisons peuvent être nombreuses et je ne prétends pas devoir juger qui que ce soit.
Je pense juste que l'on ne doit pas utiliser l'épée de fly pour commettre des injustices.
Il est 100 fois plus profitable d'améliorer un système que de marcher sur un château de sable... même si marcher sur un château de sable est rigolo :P
A vous de trouver votre amusement. ;)

Tu peux réagir sur la shootbox


Disclaimer Veuillez lire obligatoirement les règles ci-dessous avant de consulter ce site.
Conformément aux dispositions des différentes lois en vigueur, intrusions et maintenances frauduleuses sur un site, vol et / ou falsification de données.
Vous ne devez en aucun cas mettre en application les stratagèmes mis en place par ce site, qui sont présentés uniquement à titre d’éducation et de recherche dans le domaine de la protection de données.
Vous ne devez en aucun cas utiliser ce que vous aurez découvert, sauf si vous avez une autorisation écrite de l’administrateur d’un site ou que celui-ci vous ai ouvert un compte uniquement pour la recherche de failles.
Tout cela est interdit et illégal ne faites pas n'importe quoi.
Vous acceptez donc que l'administrateur de ce site n'est en aucun cas responsable d'aucun de vos actes. Sinon quittez ce site.
Vous êtes soumis à ce disclaimer.
ET À CE TITRE, NI LA COMMUNAUTÉ, NI L'ADMINISTRATEUR, NI L'HÉBERGEUR, NE POURRONT, NI NE SERONT RESPONSABLE DE VOS ACTES.