What do hackers actually do?

I'm not interested in becoming one... I'm just a curious person...

http://list25.com/25-biggest-cyber-attacks-in-history/

Is that the worst of it?

I think I touched on it briefly when I asked for a password cracking tool to get my administrator password and someone told me to Google opcrack. (password cracking being the motivation to invent computers in the first place)...

I also know what the dark web is, but have not visited it and not sure I want to...

There was a guy that I briefly rented a house from when I was younger that earned money fixing computers, and he also installed software on girls computers to spy on them from their webcameras. He was arrested for that.

I also know there were some guys in high school who somehow got into parts of the schools computer system that "normal" people didn't know how to do. I'm not sure they actually did anything.

Not trying to get kicked off here...
 
Depends, there are a lot of layers and services that can be exploited.

For instance, if you had the same SSID and VLAN for your wireless RV park setup, anyone can access your connected PC on a network level. Depending on the patch or what services were available might dictate what access they might be able to achieve.
 
Depends, there are a lot of layers and services that can be exploited.

For instance, if you had the same SSID and VLAN for your wireless RV park setup, anyone can access your connected PC on a network level. Depending on the patch or what services were available might dictate what access they might be able to achieve.

When you say "access," do you mean they would be able to move my cursor and type on my keyboard without being on the computer? And how would they do this?
 
When you say "access," do you mean they would be able to move my cursor and type on my keyboard without being on the computer? And how would they do this?


This can be done with malware. It can be their own crafted driver, etc.

If you want to learn the tricks of the trade I would read info from the Sans Institute. That would be a start. There are a lot of hackers, Exhackers on Twitter. Start here: https://twitter.com/maldevel

https://www.sans.org/reading-room/
 
Last edited:
You really have three kinds of hackers mainly...

Black Hat - these are your hackers who do the bad stuff. Such as write infection, break into systems and keep the darknet going.

White Hat - These are hackers who usually work with security firms or government agencies to help prevent the attempts of the Black Hat hackers.

Grey Hat - They can be either or, depends on where the money is for them.
 
You really have three kinds of hackers mainly...

Black Hat - these are your hackers who do the bad stuff. Such as write infection, break into systems and keep the darknet going.

White Hat - These are hackers who usually work with security firms or government agencies to help prevent the attempts of the Black Hat hackers.

Grey Hat - They can be either or, depends on where the money is for them.

What do they commonly do when they break into systems?

Also, don't they do "denial of service" attacks and things of that nature?
 
What do they commonly do when they break into systems?


Really would depend on the target server they're after. In the case of the Chinese it could be government secrets, anything.

Some hackers just like to take a server down. Like PlayStation.

Anybody can do a DDoS or syn flood. Not saying how of course.

This guy knows how to DDoS. BAHAHAHAHAH!!!

 
Really would depend on the target server they're after. In the case of the Chinese it could be government secrets, anything.

Some hackers just like to take a server down. Like PlayStation.

Anybody can do a DDoS or syn flood. Not saying how of course.

This guy knows how to DDoS. BAHAHAHAHAH!!!


Does a DDoS work only for the time that the target is being flooded, or is a permanent thing?
 
Just as long as the server/s are DDoSing.

What type of hacker attack would it be to get into the server of a company and delete a file (web site) that it is hosting?

And would this actually work? Because obviously, any large company would back up their files.

I'm not looking to actually do this... I'm just wondering what it would be called.
 
What type of hacker attack would it be to get into the server of a company and delete a file (web site) that it is hosting?


Hacker?

And would this actually work? Because obviously, any large company would back up their files.

Yeah, most companies or whatever have backups. For me personally I have a couple sites and they are backed up to no less than five locations that are encrypted and on optical media at least once a month.

Usually a hacker is not interested in deleting a file, but rather obtain a file.
 
Back
Top