Today I read this article from Wired.com, It's an Excerpt from Kevin Poulsen's book "Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime Underground" . A book about Max Vision, a hacker who stole 1.8 Million Credit Cards and sold the "Dumps" on the black market. I once ask "How do you "hack" XYZ program?" in another forum long ago.
Someone once told me "Go online get tools (e.g Port Scanner), Scan targets, see what ports are open and find Exploits for that certain program and apply the exploit." I know better now that this would make me a "Script kiddie" and not learn much.
Would you say this would apply here? I searched online and news got out about the vulnerability and that's how Max vision found out about it.
Also I did a search and It's being share online on youtube on how it's being done.
Here's some questions.
What do you think about this article?
Would you read this book (Kingpin)?
How can I AVOID being a "script kiddie"?
Do you think this was a situation where opportunity (Massive Exploit discovered) meets a person willing to break the law for money?
Your thought, thanks.
-Cipher
Someone once told me "Go online get tools (e.g Port Scanner), Scan targets, see what ports are open and find Exploits for that certain program and apply the exploit." I know better now that this would make me a "Script kiddie" and not learn much.
Would you say this would apply here? I searched online and news got out about the vulnerability and that's how Max vision found out about it.
In June 2006, a stroke of good luck gave him a chance to expand. A serious security hole emerged in the software RealVNC, for virtual network console — a remote-control program used to administer Windows machines over the internet."
Here's some questions.
What do you think about this article?
Would you read this book (Kingpin)?
How can I AVOID being a "script kiddie"?
Do you think this was a situation where opportunity (Massive Exploit discovered) meets a person willing to break the law for money?
Your thought, thanks.
-Cipher
Comment