New here.... (split from MSP thread)

crackers refers to a person who gains access to computers through methods such as brute force dictionary checker/scans/whatever it is

hacker is someone who generally changes code and does not do unethical cracking.

phreaking = phone hax0ring, etc.

we're not all morons about this stuff. :D
 
IF you're going to Defcon this year, I'll more than likely be there with a friend. Maybe a Mazdameet is in order!@#
 
heh, defcon is lame. nothing but a bunch of punk rock kids with spiked hair. real hackers don't go to conferences :) btw, hacker = coder/geeky guru guy, the type that reads source for vulns and tries to find workarounds. Cracker is not just limited to bruteforce attacks :) A cracker by true definitions is what people think of a hacker as. Crackers illegal break into systems with the mean of destruction/obstruction. Amd **** a phone looser :) Atleast that's what the terms mean in a whitehat security standpoint (those of you who post to bugtraq know what I'm talking about). I like to consider myself a hacker in the sense that I get extremely excited (horny) when i get a segmentation violation on a binary with SxID bits attributed :) Then you write you own code for the flaw... crackers, just gcc -Wall -ggdb -o somescript somescript.c && ./somescript some-box-out-there. They have no know how on what the exploit is doing or why and how the vulnerability takes place :) So there is an updated version for you... and damnit, ARE YOU THE GIRL IN THE PIC OF NOT?
 
gpx- said:
heh, defcon is lame. nothing but a bunch of punk rock kids with spiked hair. real hackers don't go to conferences :)
Hmmm.. "Real hackers" are about obtaining as much information as they can in what ever way they can. Defcon is an excellent resource for that. Steretype number one.
btw, hacker = coder/geeky guru guy, the type that reads source for vulns and tries to find workarounds. Cracker is not just limited to bruteforce attacks :) A cracker by true definitions is what people think of a hacker as. Crackers illegal break into systems with the mean of destruction/obstruction. [snip] Atleast that's what the terms mean in a whitehat security standpoint (those of you who post to bugtraq know what I'm talking about).
Is that not exactly what i just said? I think it is.
Amd **** a phone looser :)
Riiiiiiiiight. Stereotype number two.
I like to consider myself a hacker in the sense that I get extremely excited (horny) when i get a segmentation violation on a binary with SxID bits attributed :) Then you write you own code for the flaw...
It sounds like you're just a worked up computer geek that needs to get laid to me.
crackers, just gcc -Wall -ggdb -o somescript somescript.c && ./somescript some-box-out-there. They have no know how on what the exploit is doing or why and how the vulnerability takes place :)
Whoa, stereotype three. How cool is that? Amazing how most crackers know more about vital operating system parts than "hackers". What you're referring to is a "script kiddie" not a "cracker". You get YOUR terms right before trying to act cool, especially when it comes to someone that may own you by using your own words against you.
So there is an updated version for you... and damnit, ARE YOU THE GIRL IN THE PIC OF NOT?
That's nothing you need to concern yourself with right now and from what you wrote, you should have larger priorities right now.

Also, you seem to have a huge arrogant attitude. I've never met a true "hacker" that is so obsessed with trying to be better than people with their "knowledge". It sounds like you're just a kid who reads too much 2600 on the weekend.

Thanks for playing.
 
Last edited:
t3ase said:
Hmmm.. "Real hackers" are about obtaining as much information as they can in what ever way they can. Defcon is an excellent resource for that. Steretype number one.

Is that not exactly what i just said? I think it is.
Riiiiiiiiight. Stereotype number two.
It sounds like you're just a worked up computer geek that needs to get laid to me.

Whoa, stereotype three. How cool is that? Amazing how most crackers know more about vital operating system parts than "hackers". What you're referring to is a "script kiddie" not a "cracker". You get YOUR terms right before trying to act cool, especially when it comes to someone that may own you by using your own words against you.

That's nothing you need to concern yourself with right now and from what you wrote, you should have larger priorities right now.

Also, you seem to have a huge arrogant attitude. I've never met a true "hacker" that is so obsessed with trying to be better than people with their "knowledge". It sounds like you're just a kid who reads too much 2600 on the weekend.

Thanks for playing.


DAYUM!!! can u say OWNED!
 
I apologize in advance to all offended parties, I couldn't help myself.

heh, defcon is lame. nothing but a bunch of punk rock kids with spiked hair. real hackers don't go to conferences

I consider winning CTF, and not being able to remember most of it due to the level of entoxication a feat unto itself.

Defcon is less about real security, and more about meeting up with old friends and having a good time.

Cracker = FOO, Hacker=BAR
yeah... you guys are debating on the usage of words...

A+, Net+, Linux+, CCNA (as well as a cisco cnap graduate)
Nobody cares that you walk around wearing thinkgeek shirts and your LINUX+ certification pin, putting that sort of thing in your sig here doesn't make any sense.

I'm more into the whitehat security scene now

What people with certs and no real experience don't realise, is that security is one of the easiest things to obtain. Security in general is a very simple area of computer science. There are far more interesting (and profitable) things to do with your time than to scare some CTO into hiring you to nmap a network and submit a report that tells them to recompile with the latest patches. Your attempt to trick the less informed is easily spotted by those who actually know what they are talking about.

nice discussion on inter-vlan communication without the use of an l3 device
Buzzwords for Dummies?

it's just nice to find people interested in computers on boards not pertaining to computers/security
We are here, more than you would expect, it is just that we don't feel the need to impress everyone else with our l33t c3rts+

oh btw t3ase, if that's you in the pic, let me tell you this: I just broke up with my girlfriend for a year and a half, would you like to be my new girlfriend?
Why don't you just quit the foreplay and propose to t3ase now?

It's how we keep sane from the hours upon hours of coding/troubleshooting/configuring/etc...
You know how most people deal with it? They have a life outside the realm of computers. Try it, it works.

DAYUM!!! can u say OWNED!
Yes, yes I can.
 
tbl said:
I apologize in advance to all offended parties, I couldn't help myself.



I consider winning CTF, and not being able to remember most of it due to the level of entoxication a feat unto itself.

Defcon is less about real security, and more about meeting up with old friends and having a good time.


yeah... you guys are debating on the usage of words...


Nobody cares that you walk around wearing thinkgeek shirts and your LINUX+ certification pin, putting that sort of thing in your sig here doesn't make any sense.



What people with certs and no real experience don't realise, is that security is one of the easiest things to obtain. Security in general is a very simple area of computer science. There are far more interesting (and profitable) things to do with your time than to scare some CTO into hiring you to nmap a network and submit a report that tells them to recompile with the latest patches. Your attempt to trick the less informed is easily spotted by those who actually know what they are talking about.


Buzzwords for Dummies?


We are here, more than you would expect, it is just that we don't feel the need to impress everyone else with our l33t c3rts+


Why don't you just quit the foreplay and propose to t3ase now?


You know how most people deal with it? They have a life outside the realm of computers. Try it, it works.


Yes, yes I can.
Bahahahahahahahahahahah....
 
so friendly here :) i feel right at home! i doubt either one of you (tbl & t3ase) posses the ability to carry this any further. so we'll end it here. keep thinking you're leet, and i'll keep knowing i am :)
 
If you mean the ability to continue a useless and redundant pissing contest, then you are absolutely right sir!

I never said I was elite, I think there are few people in the world who can say that with merit. I am not one of them, and from reading your posts, you are definitely not.

if you are an elite whitehat, show me some of your papers, what posts have you made to bugtraq, full-disclosre?. please enlighten me of your l33tness

85% of the people in the world think they are above average intelligence...

go back to administrating your parents home network, come back when you have some merit.
 
Nobody cares that you walk around wearing thinkgeek shirts and your LINUX+ certification pin...

I don't wear anything from thinkgeek, and as far as I know, comptia doesn't pass out pins when you recieve a cert.

What people with certs and no real experience don't realise, is that security is one of the easiest things to obtain. Security in general is a very simple area of computer science. There are far more interesting (and profitable) things to do with your time than to scare some CTO into hiring you to nmap a network and submit a report that tells them to recompile with the latest patches. Your attempt to trick the less informed is easily spotted by those who actually know what they are talking about.

// BEWARE! BUZZWORD FRIENDLY!!!!
Certs and no experience eh? OKAY! Since when has system/network security been easy? It's one of the largest growing branches in the IT industry, especially after 911. I also hope you don't believe network security is wraped up loosley to scanning a network and suggesting patches. I always thought things such as hps, acls, vpns (pptp, l2tp, ipsec), idss, design, se protocols, firewalls (packet filtering, kernel proxy, application level, sifs, dpfs,etc.) policy based routing, etc... (sorry for all the "buzzwords" but i assume a discussion at this level would accept that) had things to do with it. But of course me being a clueless newbie that has no experience and a few certs to throw around could be wrong! And finally, no i'm not trying to trick anyone. If you read the post that started all this, you should have understood that. I care about this much --> . what anyone here thinks about my technical background/knowledge.

Why don't you just quit the foreplay and propose to t3ase now?

Ah, come on! I don't even know for sure if she's a girl yet!

Owned? Okay, if you say so :)
 
I care about this much --> . what anyone here thinks about my technical background/knowledge.

yes, that is why your certs are in your sig, and why you continue to reply to me in this thead.

I always thought things such as hps, acls, vpns (pptp, l2tp, ipsec), idss, design, se protocols, firewalls (packet filtering, kernel proxy, application level, sifs, dpfs,etc.) policy based routing, etc... (sorry for all the "buzzwords" but i assume a discussion at this level would accept that)

Heh, did you just recite every firewall buzword you know? you could of simply said "setup a firewall". Yes, it is super complicated to plug in a PIX / Netscreen and config it via a web interface (my secretary could do it).

I also hope you don't believe network security is wraped up loosley to scanning a network and suggesting patches
Well, network security has mostly to do with network traffic, and network services, all of which can be observed through scanning...

Since when has system/network security been easy
system security in a nutshell:
a) grep /home/LUSER/src gets
b) non-exececutable stack (most stack overflow sploits no longer work due to this)

network security in a netshell:
a) don't run dumb services (telnet, wftpd, sendmail)
b) chroot everything else

Wow, that was complicated.

It's one of the largest growing branches in the IT industry, especially after 911.
People get scared... network / app security is no secret. People get lazy, how many exploits (assuming they are public) are preventable with a patch? I would guess at 99%. If it is not public, it is folly to worry about it extensivly. However you chroot and use non exec stacks to prevent this (there are very few heap exploits about, anyways).

Ah, come on! I don't even know for sure if she's a girl yet!
That didn't seem to stop you.
 
you do have a point on the stack gaurds, however there seems to be an increasing uprise in heap exploits. but what ever happened to overwritting .dtors? race conditions? who knows... yes this conversation is getting boring, move on. think what you want about me :) all i can say is that i tried to ease this over...
 

New Threads and Articles

Back