Help - Search - Members - Calendar
Full Version: How accurate is SR's depiction of hackers?
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
emo samurai
QUOTE (SL James @ Oct 4 2006, 02:05 PM)
QUOTE (Vaevictis @ Oct 4 2006, 06:11 AM)
They don't usually do that unless they think you might be armed.

Thank you for ruining the joke.

Did you come here just to say that?

Anyway, thanks for telling me. And how is the WWW different from the modem banks of old? Is there a central server everyone gets routed through now?
Kagetenshi
Well, the WWW is a bunch of hypertext and a protocol attached to it. That's one difference. As for the real difference, if no one explains it before I get back from this afternoon's exam I'll try to clear that up for you.

Edit: a short explanation for one possible source of confusion, though: it's not like there was one central modem bank that everyone dialed into to reach anything they needed. No, each individual organization and/or individual providing services had a modem or modem bank that you dialed into to access the resources that they provided. To access someone else's resources, you dialed into that someone else's modem bank. Unless you had two modems and phone lines, that meant hanging up from the first modem bank.

~J
nezumi
QUOTE (EMO SAMURAI)
Anyway, thanks for telling me. And how is the WWW different from the modem banks of old? Is there a central server everyone gets routed through now?

I've never had to use modem banks (I was overseas when we got our first modem, and my dad wasn't big on paying international rates for this stuff). I'm not a hardware guy either, but I'll give you the general idea...

Like Kage said, a modem bank means you call the service you're trying to get in touch with directly. It's kinda like how a fax machine works, except without the paper (generally). I'm guessing they'd use something like telnet or teletype to communicate, so you'd mostly be using text menus and stuff. Watch the movie Wargames for a great example of this.

The modern internet (not the WWW) works because each computer has an IP address, kinda like having a home address. All of the IPs are connected into networks, which are parts of bigger networks and so on until you get to the top few networks. So when you send a message, it goes up to your most local network, determines if it needs to look in the network or leave the network, goes up a level, etc. (At least that's my basic understanding of it. Someone can stop me here if I'm making a fool of myself.)

The WWW works because you send the URL to one of several special servers called DNS servers. They translate the URL to an IP address. Everything continues more or less normally at that point. Sometimes if your web is down but other normal internet activity works, that's because your DNS server isn't working. If you know the IP address to websites, you can still access them through that.


That give you a general answer to your questions?

As for my 'most famous hacker' question, yes, I admit, I've been in government too long. I have made the terrible mistake of labelling a computer criminal with only limited actual computer skill a hacker. Kevin Mitnick is currently considered one of the most famous CRackers (feel better?) He's famous mostly because he got something like a fifteen or twenty year sentence for something of only questionable legality. By calling up AT&T and acting like a techie, he got them to send him maintenance manuals and the like, which he then distributed among a few friends. AT&T claimed he caused millions in damage. A good lesson both in what methods are effective when trying to access computers illegally, and what happens if you're caught.

As a side note, one of my computer security publications had a quick blurb on the blue pill, the new hacking script for windows vista. While a lot of old hacks depended on buffer overflows, poorly secured password fields and the like, this one actually goes through one of the drivers to directly manipulate the registers in the processor itself! Very neat.
krayola red
Lemme get this straight...so, hackers are the guys who are really good at computers and contribute towards the development of the field as a whole, and crackers are the guys who break into databases and make viruses and stuff?
hyzmarca
QUOTE (krayola red)
Lemme get this straight...so, hackers are the guys who are really good at computers and contribute towards the development of the field as a whole, and crackers are the guys who break into databases and make viruses and stuff?

Generally speaking, yes. However, creating a virus does not make one a cracker unless it is specificly designed to gain control of a system. Defeating security measures makes one a cracker. This could mean gaining control of databases or it could mean stripping security measures from PC games so that they can be played without the original CD.


There is some overlap. Hackers may defeat security measures during their endeavors and crackers are generally enthusiests who are good at computers and contribute to devolpment of the field as a whole.
Vaevictis
QUOTE (Kagetenshi)
He might mean Mitnick, but he'd be wrong. Mitnick was a cracker.

~J

Having fun tilting at that windmill, Don Quixote?
Vaevictis
QUOTE (SL James)
QUOTE (Vaevictis @ Oct 4 2006, 06:11 AM)
They don't usually do that unless they think you might be armed.

Thank you for ruining the joke.

My raison d'etre is to piss in your cornflakes. Enjoy! wink.gif
krayola red
QUOTE (hyzmarca)
QUOTE (krayola red @ Oct 4 2006, 03:12 PM)
Lemme get this straight...so, hackers are the guys who are really good at computers and contribute towards the development of the field as a whole, and crackers are the guys who break into databases and make viruses and stuff?

Generally speaking, yes. However, creating a virus does not make one a cracker unless it is specificly designed to gain control of a system. Defeating security measures makes one a cracker. This could mean gaining control of databases or it could mean stripping security measures from PC games so that they can be played without the original CD.


There is some overlap. Hackers may defeat security measures during their endeavors and crackers are generally enthusiests who are good at computers and contribute to devolpment of the field as a whole.

So how come the media uses hacker as a synonym for cracker? Is it just ignorance on their part, or are there more devious machinations at play? smile.gif
mfb
QUOTE (Vaevictis)
Having fun tilting at that windmill, Don Quixote?

that... that doesn't even make sense. Don Quixote was laughed at because he couldn't differentiate between windmills and monsters, whereas in this situation, it's the population at large who can't tell the difference. you just made exactly the opposite point you were trying to make.
Frag-o Delux
Ignorance. When does the media get anything correct? Well in a very few cases.

Also for anybody that really is worried about being traced and or want to look for computer. You should look as MAC addresses, they are permanent on most devices, and they are programmed by the factory. Logging an IP only gives you the Network its associated with.

Lets say the kid in college decides to hack something, unless they are using static IP addresses that are specifically assigned to the client the IP can and does change periodically. Like when you log off and back on to the network. Thats part the DHCP Server, next to the DNS ans NAT servers (mind you they can all be the same machine).

How the cops prove it was your computer is getting the log file of the voilated computer. Find out who owns the public IP address (which by now they are all owned, which is why they are going to the 16 bit IP addresses, sort of liek when the phone companies made people start dialing area codes for local calls also. but it uses Hexadecimal). Then they get the logs of the IP addresses and then find out who was assigned that IP address at the time. When they raid your house theyll take everything. Theyll then check the MAC address of the router/hubs/switches (the smart stuff that has a MAC) and your computers because all NICs and WiFi cards have mac addresses so to access poiints and signal repeaters. Once they find the computer that has the logged MAC addresses they now know its you that they want.

One way people are now hiding their tracks is to find a unsecured wireless network and then hack from their. Your home wireless network can be used if its not secured and you wont know its happening unless you have the log. The police may get the MAC of the actual hackers computer, but since there is no record of who owns what MAC they cant do anything about it. Also most people that dont secure their wireless networks also dont change the defaults of their routers, which is generally username: admin and no password, if they do its generally admin. Once you have control of the router you can your self destroy the logs the router has created for the offending computer.

Since most people are now using routers the police will have to use the MAC of the router. Escpecially since ISPs dont liek people using the one line to allow many people in line, the routers act as residental gateways. They have a DHCP server built in and a NAT server. The DHCP hands out private IPs behind the router to allow all your computers get on the network. The NAT then truns you generic 192.168.x.x IP intot he IP address givent to you as a static IP or by your ISPs DHCP server. For all intents and purposes the ISPs DUCP server only seens one computer, which is actually your router.

As for the security people finding out you have a port sniffer is fairly easy. A port sniffer basically pings every IP address and port you tell it to. ANd well, Since there are somethig like 65553 IP addresses and 65555 ports per internet device thats a lot of your computer yelling "Hey, can I come in?" Not many people like that, especially on a porrly planned network where you can broadcast across the entire network and cause major lag.

Port scanning is a great idea for a security person in IT, it lets them see if some one left a firewall vulnerable adn such, but like any diagnostic tool, it can be used to find holes.

Some people have also been known to use CD OSs. I know of one that is filled with ass loads of "Diagnostic" tools and other less then level programs all ran on a Linux OS that is writtent to a CD. You pop the CD into any computer then run the software, it runs a Linux shell on any computer, mac or windows that will then let you run any of these diagnostic progs. It will map entire networks, count hops, port sniff everything.

I hate computers though, so I dont pay much attention to all this stuff.
nezumi
Frag-o gave a very good low down of some common dirty tricks. As a home user, the only one you really have to worry about is getting a personal firewall, securing your wireless router, and regular patching. All of that takes about twenty minutes to set up and is free (for a firewall, I recommend zone alarm). Of course, a dedicated hacker may still be able to find a vulnerability, but generally it's just not worth the trouble.

Another common trick is finding online anonymizers. These are popular not just for hackers, but for anyone interested in preserving their privacy. Basically your computer connects to another computer. You send your internet requests to that computer, which sends them out, then encrypts and sends the results back to you. So suppose you're sending death threats to the president (not that this is a particularly good idea). You send the encrypted death threat to the anonymizer. It decrypts it and sends it to the white house. When the Secret Service trace it, they find an anonymizer with, in theory, no record of who used it. Anyone tracing the anonymizers traffic will find half of the traffic is the unencrypted net traffic and half of it is encrypted traffic to an assortment of users, so as long as there are enough users, there's no way to connect one user to a session. This makes more sense if you use an anonymizer overseas, where it's a pain to get a warrant, or multiple anonymizers. It's also good behavior not just for illegal use, but for general web surfing, as the current administration seems to be losing respect for the privacy of computer users.
Drraagh
QUOTE (Frag-o Delux)
Some people have also been known to use CD OSs. I know of one that is filled with ass loads of "Diagnostic" tools and other less then level programs all ran on a Linux OS that is writtent to a CD. You pop the CD into any computer then run the software, it runs a Linux shell on any computer, mac or windows that will then let you run any of these diagnostic progs. It will map entire networks, count hops, port sniff everything.

I have a Windows disk like that I use for recovery, and there are the Ubuntu disks. They are a sample Linux OS for people that has everything you need in a 'boot' disk, or you can do an install to have it on your HD. It helps because you can put it into any computer and have your tools ready to go, but at the same time, you are limited on storage.
Vaevictis
QUOTE (mfb)
QUOTE (Vaevictis)
Having fun tilting at that windmill, Don Quixote?

that... that doesn't even make sense. Don Quixote was laughed at because he couldn't differentiate between windmills and monsters, whereas in this situation, it's the population at large who can't tell the difference. you just made exactly the opposite point you were trying to make.

"Tilting at windmills" is (sometimes) understood to mean "fighting a pointless battle, with conviction". Sometimes it means fighting imaginary enemies.

In this case, I mean the first. Hacker used to not be the same thing as a cracker, but in the public lexicon now, it means the same thing. And no matter how you fight it, you ain't gonna change it.

Ergo, tilting at windmills.

hyzmarca
There is also onion routing to consider. Onion networks such as Tor pass your data through dozens of different computers before sending out to the internet and vice versa. Combined with an anonymizing proxy, it is very difficult to actually trace anything.
Kagetenshi
QUOTE (Frag-o Delux @ Oct 4 2006, 04:13 PM)
You should look as MAC addresses, they are permanent on most devices, and they are programmed by the factory.

They are also spoofable, as is anything that is accessed via software. MAC addresses are a trivial problem (unless, like most problems, you don't know that that potential problem exists).

Frag-O, regarding port scanning, that's true only in a naive implementation. NMap, for example, has the ability to not ping before scanning, scan with techniques that are unlogged or difficult to log, throttle its scanning to an extreme degree (literally minutes between requests), randomize request orders, restrict to given addresses/port ranges, and a whole bunch of other things that makes it actually quite difficult to identify port scanning (as opposed to legitimate traffic over time).

As for firewalls, they're highly overrated in the incoming direction. In the outgoing direction, they're useful but a pain in the neck for casual users.

~J
Vaevictis
QUOTE (Frag-o Delux)
You should look as MAC addresses, they are permanent on most devices, and they are programmed by the factory.


Clever hackers will never get caught by their MAC addresses. It's trivial to tell your NIC that you'll be forwarding packets, put your NIC in promiscuous mode and pack your own frames with arbitrary MAC addresses.

Sometimes I do it just to annoy people -- on a switched network, pop a few frames out with the MAC address of someone you want to irritate. Snicker as the victim asks the room, "Hey, is the network down!?" Wait 15 minutes, repeat. smile.gif
mfb
in general, i use the term 'hacker' myself, when i mean 'cracker'. this is because, in general, the difference isn't important, and trying to clarify it would, indeed, be tilting at windmills--i would be displaying an inability to differentiate between when it's appropriate to use the correct term, and when it isn't. in this particular discussion, however, the difference between hackers and crackers is not just important, it's the basis of the entire discussion. the Don Quixotes in this thread are the guys trying to argue that 'hacker' and 'cracker' mean the same thing, because the question the thread is trying to answer relates directly to the definitions of those words.
Frag-o Delux
I never said I was a Hacker guys. smile.gif In fact I havent done anything like that in years when Online was BBSs, when modem banks where mentioned I almost cried a tear for nostalegia the internet was still something only professors used and kids that had rich parents.

Not to mention Im not giving out all the secrets I do know, I still occasionally talk to my old hack buddies about current updates and things. But only to see how far technology has gone. Like port snifing. I know pinging is the worst way to go about lookign for open ports, like I said its yelling out 65000 times can i come in, you dont break into a house kicking on every door in the neighborhood looking for that one door thats unlocked.

I mean you can also look up common open ports by hardware maker. I know one company that leaves 443 open on one model but on their "more secure" model its locked tight, too bad its sometimes needed open so you have to set up stuff for that. Some services that you install forces ports open that a lot of people dont know about, we all know port 80 is for the internet, but AOL has been known to force port 10080 to open amongst others, and thats not the only software to do it. I mean alog witht he tricks mentioned I have seen port sniffers that just lay in wait and wait for traffic to come out of the port then lets you know its being used, then it tries to reply to the message it seen being sent out. I think they are called packet sniffers or something, they grab bits of data for you to read later, looking for things like passwords, encyrption keys and all that.

I can sit here and outline step by step how to hack a system but that person will get caught then Im an accessory. I could even tell you how to get into ATM machines very easily and get away with thousands of dollars easily. But I wont.

And believe it or not I have still been given clearence to work in the Pentagon and work in High Finance businesses where hundreds of thousands of dollars lay around like its normal. I wont say I know all there is to know about hacking, but I also leave out a lot on purpose, because I also kind of find it funny thinking someone here may try the things we suggest and go to jail for being stupid.

Also while I admit to commiting crimes and will not shirk away from my past, I dont like telling people how to do the things I have done because really this world is full of people that dont take the blame for their own actions.
SL James
QUOTE (EMO SAMURAI)
QUOTE (SL James @ Oct 4 2006, 02:05 PM)
QUOTE (Vaevictis @ Oct 4 2006, 06:11 AM)
They don't usually do that unless they think you might be armed.

Thank you for ruining the joke.

Did you come here just to say that?

Since this whole thread is a joke? Yeah, pretty much.
emo samurai
Your mom.
Jestercat
You're right...the script-kiddie aspect IS terrifying. I think once you get a sufficient skill level you should be able to handle yourself to some degree, setting up your own spoofing and packet-slinging.

As a software engineer I have a pretty good idea what real hacking is about. I'll definitely be writing my hacking rules more realistically once SR is ported over to the system I'm working on.
Critias
QUOTE (Jestercat)
You're right...the script-kiddie aspect IS terrifying. I think once you get a sufficient skill level you should be able to handle yourself to some degree, setting up your own spoofing and packet-slinging.

Which was the coolest thing about SR1. Decking "naked" with nothing but raw skill and your Decking pool (no programs). Ahh, the good old days.
Kagetenshi
You can still do it. You need a deck now, of course, but if you don't mind 6+ TNs on absolutely everything and a DF probably not higher than 6, you can go right ahead and not use any programs.

~J
Drraagh
QUOTE (Critias)
Which was the coolest thing about SR1. Decking "naked" with nothing but raw skill and your Decking pool (no programs). Ahh, the good old days.

I actually included the program carrier into my SR3 rules, because I liked the idea of that naked decking. Made the combat decker a fair bit more covert, and kept his power level controlable until he decided to go cranial deck.
RunnerPaul
QUOTE (Drraagh)
I actually included the program carrier into my SR3 rules, because I liked the idea of that naked decking.

Did you put in rules to support the bit of fluff from the Denver book about program carriers causing brain cancer?
cyber.gif

Anyway, after you've finished Hacker Crackdown, two other books I can recommend are Kevin Mitnick's The Art of Deception which has many good examples of Social Engineering at work, and The Cuckoo's Egg by a guy named Clifford Stoll, which is a story about how an early hacker got caught by an astrophysicist who was working for his university's computer department and was tasked by his boss to track down an accounting error that amounted to little more than pocket change.
lorechaser
Cuckoo's Egg is good book. I'd forgotten that one. I highly recommend it.

Lindt
Sadly, that has historicaly been my single biggest gripe about SR (and not just 3 or 4, but 1 & 2 as well).


Its kinda funny now, the 'golden age' of hacking is pretty much over. It used to be so much more... fun? I guess Im just getting old, but I dont enjoy getting into someones PC, or my university file server, anywhere near as much I used to love 'remote admining' my old HS's NT4 system, or my first roomates laptop.
Sure, the holes get plugged way faster then they used to, and people in general are better about security, but the courisity hackers just arnt out there much anymore. Free data isnt hacking anymore, its piracey.
Kagetenshi
It's the corruption of capitalism. Once upon a time a virus would do something either humorous (3Tunes, for example) or destructive (wiping data, etc. etc. etc.). Nowadays, it's all about finding ways to make money with the virus.

~J
hobgoblin
like wrapping the whole "my documents" folder (basicly dont use it for important data, and keep a backup at all times) in heavy encryption and requesting cash for the key...

digital backmailing, didnt see that one coming...

greed to a lot of things to people...
Kagetenshi
I was thinking more in terms of turning machines into spam-zombies or foisting pop-ups onto the machine user directly, but that works too.

~J
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012