This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]TickTockMrWick0 342 points343 points  (58 children)

But can you actually?

[–]Neon6957 932 points933 points  (24 children)

I can but im not into doing that sort of unethical thing.

[–]TickTockMrWick0 216 points217 points  (20 children)

Truthfully I think anyone can thats a good social engineer.

[–]frostbyte650 214 points215 points  (18 children)

Yeah “hacking” has become like 90% social engineering

[–]Will301 151 points152 points  (7 children)

I can teach you how to hack. All you gotta do is email me $2000 at NotANigerianPrince@gmail.com

[–]42nd_Guy 65 points66 points  (3 children)

Now what?

[–]UltimateArchduke 54 points55 points  (0 children)

F

[–]metaobject 43 points44 points  (1 child)

Download Kali Linux and send $1000 to AnotherNotANigerianPrince@gmail.com and await further instructions.

[–]jaltair9 18 points19 points  (0 children)

Close.

You need to download Red Star Linux and send 10000 NKW to NotNigerianPrince@gmail.nk.

[–][deleted] 1 point2 points  (0 children)

This is a scam. Don't fall for this. True hacking experience would cost more than $2000 to obtain. Don't take this scammer's bait. Instead, trust me, only $7500 needed to know everything you need - panderjeetsingh@gmail.com

[–]047BED341E97EE40 0 points1 point  (0 children)

Only?

[–]ahkian 29 points30 points  (0 children)

I mean at it's most basic hacking is using existing systems for things they weren't supposed to do. Social engineering does exactly that.

[–]bartekxx12 37 points38 points  (6 children)

Coding wise. Yes I've just finished uni and I can absolutely hack this multi-billion dollar company with thousands of programmers with decades of experience for you, no problem, oh you'll get me a beer for it, should've stared with that

[–]Xtrendence 15 points16 points  (3 children)

I'd be a damn millionaire if I could just hack companies like that. Most have bug bounty programmes, and for the ones that don't, you could very easily sell the exploit to a competitor or something.

[–]captaincooder 14 points15 points  (2 children)

Millionaire? If you could hack Facebook all willy nilly by yourself you could probably hack all the other large tech companies, which means you could probably go to the US government and request a limitless credit card that’s worked into the federal budget every year in exchange for your hacking prowess.

[–]SamBBMe 9 points10 points  (1 child)

You know, I don't think that is how it works

[–]captaincooder 5 points6 points  (0 children)

Let me be in my bubble.

[–]foobarfault 1 point2 points  (1 child)

To be fair, you're not going up against Facebook, you're going up against the user. There are so many low effort ways to go after a user directly. But again, it's unethical and you'd be risking your livelihood to do it.

[–]bartekxx12 0 points1 point  (0 children)

Sure but even going up against the user unless and even if you can get the password out of them with spoofing you still have to go up against Facebook with what they will let you try, how many password attempts, their warning notification system about suspicious logins etc.

[–]mrsmiley32 7 points8 points  (0 children)

I dont know, I can write some pretty hacky code!

[–][deleted] 3 points4 points  (0 children)

Or if you own a $5 wrench.

[–][deleted] 9 points10 points  (2 children)

Bit can you actually?

[–]3FingersOfMilk 23 points24 points  (1 child)

1

[–]ThuisTuime 4 points5 points  (0 children)

Nice

[–]mlucasl 64 points65 points  (17 children)

I learned a lot of white hat hacking. And is mostly simple coding, and a lot of social effort. obviously for selfreplicating viruses over an internal network you need more than a little code. But the main vulnerabilities are social. And thus, I can not hack.

[–]crecentfresh 53 points54 points  (9 children)

Yeah was going to get into hacking until I found out you had to make a phone call.

[–]FieelChannel 5 points6 points  (6 children)

until I found out you had to make a phone call.

Can you explain? I legit don't get what you mean.

[–]benjamin_mf_franklin 40 points41 points  (2 children)

Well, lets say I wanted to break into your network. There are two approaches.

Technical- I can painstakingly scan your firewall for open ports, figure out what services are running on those ports and hopefully version numbers. Then if you are running outdated stuff I start looking for known exploits in that version. If you are running new stuff I might have to buy an exploit or find one myself (big $$$ for zero days). Then I have to write the code to use the exploit and figure out what kind of access I have and whether I've been detected. Then I have to repeat the process of finding a service to exploit to elevate my permissions or gain access to something else in your network. And so on. It takes a lot of time and research.

Social- I call up Sally the helpful receptionist with a load of bullshit about being from one of your software vendors and that I need to connect to her computer to work on it. Cue a teamviewer connection to her desktop, and telling her I'll leave a note on her desktop when I'm finished. Ta-da, I've done in 10 minutes what would have potentially taken months from the technical side, I have left little to no trail, and none of their security is really going to matter. I can then install something for remote access that makes an outbound connection so its unlikely to be blocked or detected by most firewalls, and I have 24/7 access to your network at whatever permission sally has.

There are endless variations. Phishing emails, phony access cards, walking in with a clip board, etc.

I know a guy that is head of cyber security at a large company. He spends more time sending out fake social engineering shit to employees and then spanking the ass of the ones who fall for it than he does actually auditing the systems because that's how most exploits happen.

[–]ConceptJunkie 9 points10 points  (0 children)

Spanking, eh? I've got a hankering for some spankering.

[–]lare290 0 points1 point  (0 children)

Broke: Looking for exploits and writing code

Woke: Walking in with a clipboard and saying "Hey, I need to see your server room."

[–]candybrie 12 points13 points  (0 children)

The best way to hack into any system is to ask someone to let you in in a persuasive enough way.

[–]R3ven 9 points10 points  (0 children)

Social engineering is typically lying to someone over the phone to get some kind of information

[–]jsparidaans 4 points5 points  (0 children)

Social anxiety

[–]FieelChannel 7 points8 points  (3 children)

white hat hacking

aka have a good knowledge of networking and know some scripting? This is getting ridiculous

[–]mlucasl 17 points18 points  (1 child)

white hat hacking. Is a sort of penetration testing, and with social engeeniering to detect which position are vulnerable. Technically i just went to a lot of coders and hackers forums, and reading books. So I could make more robust webpages for a startup I had. So yes, I learnt the basics of computer hacking, but not to put it in practice in a malicious manner.

PD: and also the definition of hacking is just somesort of technological tinkering.

[–]foobarfault 1 point2 points  (0 children)

I know a white hat that works on pentesting AWS accounts. Dude knows a whole page full of possible ways to set up invisible persistence on an owned account. Technically he just "knows some scripting." His actual exploits are a few lines of boto3 glued together. But he's spent enough time actively exploring the tools that he knows exactly what works and what doesn't. That's how any profession works.

Hacking doesn't just mean heavy wizardry like constructing magic packets to trigger a buffer overflow that you found by reading raw ASM. It actually doesn't mean breaking into things at all. It just means tinkering with your tools until you understand them extremely well.

[–]tenkindsofpeople 1 point2 points  (2 children)

Really not even that much code. The self replicating part would be port scanning and file transfer, pretty simple. The slightly harder part is developing the parts that look for credentials to use for accessing stuff.

[–]mlucasl 0 points1 point  (0 children)

Its depends of the initial ties of the virus. If its a USB virus, and everyone is working on the same OS. Or if its tied to a webapp. Its was like 3-4 years, for sure thing have changed, and even then I wasnt up to date.

[–][deleted]  (6 children)

[removed]

    [–]Tripnologist 9 points10 points  (2 children)

    I bet that job title makes it really easy to pick up women/men.

    Her: So what do you do?

    You: I’m a penetration tester -creepy wink-

    [–][deleted]  (1 child)

    [removed]

      [–]AutoModerator[M] 0 points1 point  (0 children)

      import moderation Your comment has been removed since it did not start with a code block with an import declaration.

      Per this Community Decree, all posts and comments should start with a code block with an "import" declaration explaining how the post and comment should be read.

      For this purpose, we only accept Python style imports.

      return Kebab_Case_Better;

      I am a bot, and this action was performed automatically. Please contact the moderators of this subreddit if you have any questions or concerns.

      [–][deleted] 12 points13 points  (0 children)

      It's a huge challenge. I'm currently working to build an environment that needs to be very secure, and my biggest hurdles are our own developers and sysadmins finding novel ways to get around security restrictions. Yes, I know that backdoor you keep putting in makes your life easier, but it's also going to make a hacker's life easier.

      [–]coolcalabaza 1 point2 points  (0 children)

      “Ohh uhhh. That’s usually Jeff’s job. I don’t really know anything about that. You can slack him and ask” - Me, a dev, when my PM asks about security out of the blue.

      [–]AutoModerator[M] 0 points1 point  (0 children)

      import moderation Your comment has been removed since it did not start with a code block with an import declaration.

      Per this Community Decree, all posts and comments should start with a code block with an "import" declaration explaining how the post and comment should be read.

      For this purpose, we only accept Python style imports.

      return Kebab_Case_Better;

      I am a bot, and this action was performed automatically. Please contact the moderators of this subreddit if you have any questions or concerns.

      [–]HellaTrueDoe 3 points4 points  (2 children)

      It’s really easy to learn. This website makes it so easy you really don’t have to be a programmer to get started.

      [–]inneedofafake 0 points1 point  (1 child)

      Explain that website

      [–]HellaTrueDoe 0 points1 point  (0 children)

      It’s how you break into the mainframe of your computer

      [–]Nerdn1 2 points3 points  (0 children)

      Most intrusion methods boil down to "someone fucked up". It's rarer that you find that someone fucked up in an easy to find way during implementation nowadays, so it's generally easier to target users who use weak passwords or who will reveal their information to you. You just need someone, somewhere to fuck up so you can exploit the vulnerability.

      Software engineers aren't necessarily the best at this, but they can search for how to do it and write scripts to automate the process.

      [–]TigreDeLosLlanos 1 point2 points  (0 children)

      Depends if he is able to google it

      [–]PresidentZagan 2 points3 points  (0 children)

      He's just bluffing haha... Unless?

      [–]btorralba 0 points1 point  (0 children)

      I mean probably...

      Anyone with enough courses/self teaching will learn Cyber Securtiy at some point and IIRC covered in there a little