What does hacking actually LOOK like? For example, what interface is the hacker using, what’s their goal, and are they typing in a bunch of passwords like in the movies?

1.25K views

What does hacking actually LOOK like? For example, what interface is the hacker using, what’s their goal, and are they typing in a bunch of passwords like in the movies?

In: Technology

27 Answers

Anonymous 0 Comments

Late nineties it was a simple case of Netbios sharing.

Windows at that time, if you enabled your hard drive to be shared across a network then it would have no security by default. So if someone had your IP address and typed the Netbios command in Windows command prompt then it would share your drive onto their machine, and they could access your files.

People would make a program to scan IP ranges for the Netbios port, 139, to see if it was open. At the end of the scan you’d have a text file with IPs of machines found with this port open.

Then, some people would make “bots”, a small program that would connect to an IRC server and channel. You could upload this program and edit the… iirc start.ini file or whatever the file was that determined which programs ran at startup. When the person rebooted, your program would be ran and the bot would connect to an IRC server.

The most fun I ever had though was putting… I think it was called Sub7, a trojan onto my mates brother’s computer. We were in the next room and pressing all of the buttons – open cd tray, turn monitor off and on, bleep bleep etc. Hearing his brother raging was hilarious. Until he heard us laughing and stormed into the room.

You are viewing 1 out of 27 answers, click here to view all answers.