Offensive cybersecurity? |
Offensive cybersecurity? |
Sep 15 2011, 06:53 PM
Post
#1
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
|
|
|
Sep 15 2011, 07:28 PM
Post
#2
|
|
Moving Target Group: Members Posts: 770 Joined: 19-August 11 From: Middle-Eastern Europe Member No.: 36,268 |
I'd rather say "Aaron Barr gets his dumb ass hacked again to prove it's a bad idea".
|
|
|
Sep 15 2011, 07:35 PM
Post
#3
|
|
Moving Target Group: Members Posts: 459 Joined: 2-October 10 Member No.: 19,092 |
Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.
|
|
|
Sep 15 2011, 11:21 PM
Post
#4
|
|
Running Target Group: Members Posts: 1,083 Joined: 13-December 10 From: Rotterdam, The Netherlands Member No.: 19,228 |
|
|
|
Sep 16 2011, 03:08 AM
Post
#5
|
|
Running Target Group: Members Posts: 1,272 Joined: 22-June 10 From: Omaha. NE Member No.: 18,746 |
Black IC here we come? Not from Barr. The man is a threat to himself and his companies, not anyone else. Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work. The only people Barr is ever going to get are those people who know less than Barr. All three of them. |
|
|
Sep 16 2011, 03:14 AM
Post
#6
|
|
Immortal Elf Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 |
If by "Offensive" you mean manners, then, yes, he is offensive. (IMG:style_emoticons/default/nyahnyah.gif)
|
|
|
Sep 16 2011, 06:55 AM
Post
#7
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
You mean Analyze, Trace, Probe, Stealth, Edit, Attack? Or perhaps Black Hammer rather then Attack (IMG:style_emoticons/default/wink.gif) |
|
|
Sep 16 2011, 06:55 AM
Post
#8
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work. If only everyone was that smart... |
|
|
Sep 16 2011, 06:56 AM
Post
#9
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups. From the looks of it, the various police departments around the world have been doing just that. |
|
|
Lo-Fi Version | Time is now: 29th March 2024 - 09:26 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.