218 lines
6.8 KiB
HTML
218 lines
6.8 KiB
HTML
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
|
|
|
|
<!--Converted with LaTeX2HTML 2K.1beta (1.50)
|
|
original version by: Nikos Drakos, CBLU, University of Leeds
|
|
* revised and updated by: Marcus Hennecke, Ross Moore, Herb Swan
|
|
* with significant contributions from:
|
|
Jens Lippmann, Marek Rouchal, Martin Wilck and others -->
|
|
<HTML>
|
|
<HEAD>
|
|
<TITLE>8. Hacking</TITLE>
|
|
<META NAME="description" CONTENT="8. Hacking">
|
|
<META NAME="keywords" CONTENT="unx">
|
|
<META NAME="resource-type" CONTENT="document">
|
|
<META NAME="distribution" CONTENT="global">
|
|
|
|
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
|
|
<META NAME="Generator" CONTENT="LaTeX2HTML v2K.1beta">
|
|
<META HTTP-EQUIV="Content-Style-Type" CONTENT="text/css">
|
|
|
|
<LINK REL="STYLESHEET" HREF="unx.css">
|
|
|
|
<LINK REL="next" HREF="node10.html">
|
|
<LINK REL="previous" HREF="node8.html">
|
|
<LINK REL="up" HREF="unx.html">
|
|
<LINK REL="next" HREF="node10.html">
|
|
</HEAD>
|
|
|
|
<BODY >
|
|
<!--Navigation Panel-->
|
|
<A NAME="tex2html270"
|
|
HREF="node10.html">
|
|
<IMG WIDTH="37" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="next"
|
|
SRC="../img/latex2html/next.png"></A>
|
|
<A NAME="tex2html266"
|
|
HREF="unx.html">
|
|
<IMG WIDTH="26" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="up"
|
|
SRC="../img/latex2html/up.png"></A>
|
|
<A NAME="tex2html260"
|
|
HREF="node8.html">
|
|
<IMG WIDTH="63" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="previous"
|
|
SRC="../img/latex2html/prev.png"></A>
|
|
<A NAME="tex2html268"
|
|
HREF="node1.html">
|
|
<IMG WIDTH="65" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="contents"
|
|
SRC="../img/latex2html/contents.png"></A>
|
|
<A NAME="tex2html1"
|
|
HREF="../"><IMG
|
|
ALIGN="BOTTOM" SRC="../img/latex2html/root.png"
|
|
ALT="root">
|
|
</A>
|
|
|
|
<BR>
|
|
<B> Next:</B> <A NAME="tex2html271"
|
|
HREF="node10.html">9. Meta</A>
|
|
<B> Up:</B> <A NAME="tex2html267"
|
|
HREF="unx.html">Introduction to Unix &</A>
|
|
<B> Previous:</B> <A NAME="tex2html261"
|
|
HREF="node8.html">7. Programming</A>
|
|
  <B> <A NAME="tex2html269"
|
|
HREF="node1.html">Contents</A></B>
|
|
<BR>
|
|
<BR>
|
|
<!--End of Navigation Panel-->
|
|
|
|
<H1><A NAME="SECTION00900000000000000000">
|
|
8. Hacking</A>
|
|
</H1>
|
|
|
|
<P>
|
|
So you want to hack? To break into computers? Take them
|
|
over? Get root access? Crash them or use their CPU cycles
|
|
to do work for you?
|
|
|
|
<P>
|
|
Aim high, but I have some advice. Those activities aren't
|
|
<A NAME="tex2html22"
|
|
HREF="http://catb.org/~esr/jargon/html/H/hack.html">hacking</A>.
|
|
Those activities are part of
|
|
<A NAME="tex2html23"
|
|
HREF="http://catb.org/~esr/jargon/html/C/cracking.html">cracking</A>.
|
|
For more information about the meaning of <EM>hack</EM>, you
|
|
might read two other chapters from The Jargon File:
|
|
|
|
<UL>
|
|
<LI><A NAME="tex2html24"
|
|
HREF="http://catb.org/~esr/jargon/html/meaning-of-hack.html">The Meaning of
|
|
'Hack'</A> and
|
|
</LI>
|
|
<LI><A NAME="tex2html25"
|
|
HREF="http://catb.org/~esr/jargon/html/crackers.html">Crackers, Phreaks, &
|
|
Lamers</A>.
|
|
</LI>
|
|
</UL>
|
|
|
|
<P>
|
|
You might find some people in COM Mode who would like to
|
|
talk about these things, but most of them are really tired
|
|
of kiddies coming into the lobby & asking ``Do any of you
|
|
know how to hack?'' So you'll need to be more subtle. It's
|
|
like real life; you don't walk into a room, interrupt the
|
|
current conversation, & loudly ask if anyone will sell you
|
|
nose candy. It's just rude.
|
|
|
|
<P>
|
|
Information about security holes is pretty easy to
|
|
find without help. Just use Google to search for things
|
|
like ``computer security virus hole exploit''.
|
|
What you need is the knowledge to make use
|
|
of that information. You need to learn
|
|
straightforward programming techniques, especially
|
|
networking<A NAME="tex2html21"
|
|
HREF="footnode.html#foot493"><SUP>8.1</SUP></A>,
|
|
before you can make use of all that security
|
|
information that is readily available. So instead of
|
|
asking people to teach you to crack, it might be more
|
|
worthwhile & fun to talk programming with people.
|
|
|
|
<P>
|
|
While we're on the topic, I guess I can throw out a bone.
|
|
Take a look at ``CIFS: Common Insecurities Fail Scrutiny''
|
|
([<A
|
|
HREF="node11.html#hobbit:cifs">Hob77</A>]).
|
|
|
|
<P>
|
|
Also, be aware that most of the
|
|
protocols in use on the Internet are defined in the Request
|
|
For Comment (RFC) documents. One database of RFCs is
|
|
<A NAME="tex2html26"
|
|
HREF="http://www.rfc-editor.org/">The RFC
|
|
Editor</A>. Another such database
|
|
is <A NAME="tex2html27"
|
|
HREF="http://www.cis.ohio-state.edu/cs/Services/rfc/index.html">RFCs at Ohio State University</A>.
|
|
|
|
<P>
|
|
Why do you care about the RFCs? Because to find a hole in
|
|
some protocol, you need to know the actual protocol, not
|
|
just heresay that people slip to you in a chat room. To
|
|
know the protocol, you need to refer to its definitive
|
|
source. For most protocols on the Internet, that's the
|
|
RFCs.
|
|
|
|
<P>
|
|
For example, let's say you wanted to research holes in
|
|
Internet multicast. You could go to either of those RFC
|
|
databases & search for ``multicast''. You conclude that
|
|
any of these RFCs were worth your time
|
|
<TABLE CELLPADDING=3 BORDER="1">
|
|
<TR><TD ALIGN="RIGHT"><B>id</B></TD>
|
|
<TD ALIGN="LEFT"><B>title</B></TD>
|
|
<TD ALIGN="LEFT"><B>author</B></TD>
|
|
<TD ALIGN="LEFT"><B>data</B></TD>
|
|
</TR>
|
|
<TR><TD ALIGN="RIGHT">RFC1112</TD>
|
|
<TD ALIGN="LEFT">Host extensions ofr IP multicasting</TD>
|
|
<TD ALIGN="LEFT">S.E. Deering</TD>
|
|
<TD ALIGN="LEFT">1 Aug 1989</TD>
|
|
</TR>
|
|
<TR><TD ALIGN="RIGHT">RFC3513</TD>
|
|
<TD ALIGN="LEFT">Internet Protocol Version 6 (IPv6) Addressing
|
|
Architecture</TD>
|
|
<TD ALIGN="LEFT">R. Hinden, S. Deering</TD>
|
|
<TD ALIGN="LEFT">Apr 2003</TD>
|
|
</TR>
|
|
<TR><TD ALIGN="RIGHT">RFC3261</TD>
|
|
<TD ALIGN="LEFT">SIP: Session Initiation Protocol</TD>
|
|
<TD ALIGN="LEFT">lots of blokes</TD>
|
|
<TD ALIGN="LEFT">Jun 2002</TD>
|
|
</TR>
|
|
</TABLE>
|
|
|
|
<P>
|
|
That's just an example. By the way, if none of those title
|
|
make you at least a little curious to know what's in those
|
|
documents, then you might not be cut-out to be a computer
|
|
hacker or a cracker.
|
|
|
|
<P>
|
|
<HR>
|
|
<!--Navigation Panel-->
|
|
<A NAME="tex2html270"
|
|
HREF="node10.html">
|
|
<IMG WIDTH="37" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="next"
|
|
SRC="../img/latex2html/next.png"></A>
|
|
<A NAME="tex2html266"
|
|
HREF="unx.html">
|
|
<IMG WIDTH="26" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="up"
|
|
SRC="../img/latex2html/up.png"></A>
|
|
<A NAME="tex2html260"
|
|
HREF="node8.html">
|
|
<IMG WIDTH="63" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="previous"
|
|
SRC="../img/latex2html/prev.png"></A>
|
|
<A NAME="tex2html268"
|
|
HREF="node1.html">
|
|
<IMG WIDTH="65" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="contents"
|
|
SRC="../img/latex2html/contents.png"></A>
|
|
<A NAME="tex2html1"
|
|
HREF="../"><IMG
|
|
ALIGN="BOTTOM" SRC="../img/latex2html/root.png"
|
|
ALT="root">
|
|
</A>
|
|
|
|
<BR>
|
|
<B> Next:</B> <A NAME="tex2html271"
|
|
HREF="node10.html">9. Meta</A>
|
|
<B> Up:</B> <A NAME="tex2html267"
|
|
HREF="unx.html">Introduction to Unix &</A>
|
|
<B> Previous:</B> <A NAME="tex2html261"
|
|
HREF="node8.html">7. Programming</A>
|
|
  <B> <A NAME="tex2html269"
|
|
HREF="node1.html">Contents</A></B>
|
|
<!--End of Navigation Panel-->
|
|
<ADDRESS>
|
|
Gene Michael Stover
|
|
2005-07-07
|
|
</ADDRESS>
|
|
</BODY>
|
|
</HTML>
|