tutes-dump/site-tutorials/unx/node9.html

218 lines
6.8 KiB
HTML

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<!--Converted with LaTeX2HTML 2K.1beta (1.50)
original version by: Nikos Drakos, CBLU, University of Leeds
* revised and updated by: Marcus Hennecke, Ross Moore, Herb Swan
* with significant contributions from:
Jens Lippmann, Marek Rouchal, Martin Wilck and others -->
<HTML>
<HEAD>
<TITLE>8. Hacking</TITLE>
<META NAME="description" CONTENT="8. Hacking">
<META NAME="keywords" CONTENT="unx">
<META NAME="resource-type" CONTENT="document">
<META NAME="distribution" CONTENT="global">
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="LaTeX2HTML v2K.1beta">
<META HTTP-EQUIV="Content-Style-Type" CONTENT="text/css">
<LINK REL="STYLESHEET" HREF="unx.css">
<LINK REL="next" HREF="node10.html">
<LINK REL="previous" HREF="node8.html">
<LINK REL="up" HREF="unx.html">
<LINK REL="next" HREF="node10.html">
</HEAD>
<BODY >
<!--Navigation Panel-->
<A NAME="tex2html270"
HREF="node10.html">
<IMG WIDTH="37" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="next"
SRC="../img/latex2html/next.png"></A>
<A NAME="tex2html266"
HREF="unx.html">
<IMG WIDTH="26" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="up"
SRC="../img/latex2html/up.png"></A>
<A NAME="tex2html260"
HREF="node8.html">
<IMG WIDTH="63" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="previous"
SRC="../img/latex2html/prev.png"></A>
<A NAME="tex2html268"
HREF="node1.html">
<IMG WIDTH="65" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="contents"
SRC="../img/latex2html/contents.png"></A>
<A NAME="tex2html1"
HREF="../"><IMG
ALIGN="BOTTOM" SRC="../img/latex2html/root.png"
ALT="root">
</A>
<BR>
<B> Next:</B> <A NAME="tex2html271"
HREF="node10.html">9. Meta</A>
<B> Up:</B> <A NAME="tex2html267"
HREF="unx.html">Introduction to Unix &amp;</A>
<B> Previous:</B> <A NAME="tex2html261"
HREF="node8.html">7. Programming</A>
&nbsp <B> <A NAME="tex2html269"
HREF="node1.html">Contents</A></B>
<BR>
<BR>
<!--End of Navigation Panel-->
<H1><A NAME="SECTION00900000000000000000">
8. Hacking</A>
</H1>
<P>
So you want to hack? To break into computers? Take them
over? Get root access? Crash them or use their CPU cycles
to do work for you?
<P>
Aim high, but I have some advice. Those activities aren't
<A NAME="tex2html22"
HREF="http://catb.org/~esr/jargon/html/H/hack.html">hacking</A>.
Those activities are part of
<A NAME="tex2html23"
HREF="http://catb.org/~esr/jargon/html/C/cracking.html">cracking</A>.
For more information about the meaning of <EM>hack</EM>, you
might read two other chapters from The Jargon File:
<UL>
<LI><A NAME="tex2html24"
HREF="http://catb.org/~esr/jargon/html/meaning-of-hack.html">The Meaning of
'Hack'</A> and
</LI>
<LI><A NAME="tex2html25"
HREF="http://catb.org/~esr/jargon/html/crackers.html">Crackers, Phreaks, &amp;
Lamers</A>.
</LI>
</UL>
<P>
You might find some people in COM Mode who would like to
talk about these things, but most of them are really tired
of kiddies coming into the lobby &amp; asking ``Do any of you
know how to hack?'' So you'll need to be more subtle. It's
like real life; you don't walk into a room, interrupt the
current conversation, &amp; loudly ask if anyone will sell you
nose candy. It's just rude.
<P>
Information about security holes is pretty easy to
find without help. Just use Google to search for things
like ``computer security virus hole exploit''.
What you need is the knowledge to make use
of that information. You need to learn
straightforward programming techniques, especially
networking<A NAME="tex2html21"
HREF="footnode.html#foot493"><SUP>8.1</SUP></A>,
before you can make use of all that security
information that is readily available. So instead of
asking people to teach you to crack, it might be more
worthwhile &amp; fun to talk programming with people.
<P>
While we're on the topic, I guess I can throw out a bone.
Take a look at ``CIFS: Common Insecurities Fail Scrutiny''
([<A
HREF="node11.html#hobbit:cifs">Hob77</A>]).
<P>
Also, be aware that most of the
protocols in use on the Internet are defined in the Request
For Comment (RFC) documents. One database of RFCs is
<A NAME="tex2html26"
HREF="http://www.rfc-editor.org/">The RFC
Editor</A>. Another such database
is <A NAME="tex2html27"
HREF="http://www.cis.ohio-state.edu/cs/Services/rfc/index.html">RFCs at Ohio State University</A>.
<P>
Why do you care about the RFCs? Because to find a hole in
some protocol, you need to know the actual protocol, not
just heresay that people slip to you in a chat room. To
know the protocol, you need to refer to its definitive
source. For most protocols on the Internet, that's the
RFCs.
<P>
For example, let's say you wanted to research holes in
Internet multicast. You could go to either of those RFC
databases &amp; search for ``multicast''. You conclude that
any of these RFCs were worth your time
<TABLE CELLPADDING=3 BORDER="1">
<TR><TD ALIGN="RIGHT"><B>id</B></TD>
<TD ALIGN="LEFT"><B>title</B></TD>
<TD ALIGN="LEFT"><B>author</B></TD>
<TD ALIGN="LEFT"><B>data</B></TD>
</TR>
<TR><TD ALIGN="RIGHT">RFC1112</TD>
<TD ALIGN="LEFT">Host extensions ofr IP multicasting</TD>
<TD ALIGN="LEFT">S.E. Deering</TD>
<TD ALIGN="LEFT">1 Aug 1989</TD>
</TR>
<TR><TD ALIGN="RIGHT">RFC3513</TD>
<TD ALIGN="LEFT">Internet Protocol Version 6 (IPv6) Addressing
Architecture</TD>
<TD ALIGN="LEFT">R. Hinden, S. Deering</TD>
<TD ALIGN="LEFT">Apr 2003</TD>
</TR>
<TR><TD ALIGN="RIGHT">RFC3261</TD>
<TD ALIGN="LEFT">SIP: Session Initiation Protocol</TD>
<TD ALIGN="LEFT">lots of blokes</TD>
<TD ALIGN="LEFT">Jun 2002</TD>
</TR>
</TABLE>
<P>
That's just an example. By the way, if none of those title
make you at least a little curious to know what's in those
documents, then you might not be cut-out to be a computer
hacker or a cracker.
<P>
<HR>
<!--Navigation Panel-->
<A NAME="tex2html270"
HREF="node10.html">
<IMG WIDTH="37" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="next"
SRC="../img/latex2html/next.png"></A>
<A NAME="tex2html266"
HREF="unx.html">
<IMG WIDTH="26" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="up"
SRC="../img/latex2html/up.png"></A>
<A NAME="tex2html260"
HREF="node8.html">
<IMG WIDTH="63" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="previous"
SRC="../img/latex2html/prev.png"></A>
<A NAME="tex2html268"
HREF="node1.html">
<IMG WIDTH="65" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="contents"
SRC="../img/latex2html/contents.png"></A>
<A NAME="tex2html1"
HREF="../"><IMG
ALIGN="BOTTOM" SRC="../img/latex2html/root.png"
ALT="root">
</A>
<BR>
<B> Next:</B> <A NAME="tex2html271"
HREF="node10.html">9. Meta</A>
<B> Up:</B> <A NAME="tex2html267"
HREF="unx.html">Introduction to Unix &amp;</A>
<B> Previous:</B> <A NAME="tex2html261"
HREF="node8.html">7. Programming</A>
&nbsp <B> <A NAME="tex2html269"
HREF="node1.html">Contents</A></B>
<!--End of Navigation Panel-->
<ADDRESS>
Gene Michael Stover
2005-07-07
</ADDRESS>
</BODY>
</HTML>