IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Hey, more noob questions!, Thanks!
tagz
post Apr 27 2010, 03:42 AM
Post #26


Moving Target
**

Group: Members
Posts: 492
Joined: 28-July 09
Member No.: 17,440



Well, one of the other fun uses of spoof is to take actions above your access rights. If you hack in with user rights and spot a security spider then you can get his Access ID and use spoof to do anything that has security rights (or maybe even admin) requirements without having to hit the higher threshold when hacking in. Great for on the fly hacks when you're worried about your stealth getting noticed on a long extended exploit.

Even better, log into a PUBLIC node owned by same corp, etc, and look for a spider or someone with clearance. You shouldn't be the only person on a public node, ask for "Help" and someone with User rights might come along to ask how they can help you (sell you NERPS or whatever the corp makes, etc). Use the Access ID of that person to do tricks with your spoof to get even higher access IDs. With an admin or security, you could likely just spoof a new user account, or maybe higher for yourself. All without exploit. Just some ideas.
Go to the top of the page
 
+Quote Post
Eratosthenes
post Apr 27 2010, 01:49 PM
Post #27


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (Karoline @ Apr 26 2010, 10:04 PM) *
Agreed. I've always thought it was kind of silly to have to go find the access ID (Which is likely to be fairly hard, though I like the sniffer idea), and then with that access ID, still have to spoof. It's kind of like having to go get a legitimate user ID before you can hack into a system.


Well, just because you have their access ID, doesn't mean you know how their command protocols are configured. I suppose the Spoof program (and the skill to use it) is the technomagical way of fabricating false commands so that they are acceptable, and not discarded out of hand.

And obtaining the Access ID isn't that difficult (an intercept wireless test?), especially giving how useful spoofing is.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 2nd February 2026 - 11:13 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.