Announcement

Collapse
No announcement yet.

How to leave an evidence trail

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • How to leave an evidence trail

    Step One: Post detailed logs, screenshots, and examples of stolen files in your web log:

    "I discovered an open AP near work, I was able to guess their administrator password. I was most interested in a backed up Outlook database floating around in an "admin files" folder. Once home, I opened the .pst file with Outlook. Since it didn't take me long to rob those files, I thought I would take a quick run through some condos closer to home." - http://rayhaque.blogspot.com/

    "I found another AP on the same street. The system was wide open. He was running 2 PC's one was XP the other Linux RedHat. The RedHat box was secure, however, the XP box was wide open with 100's of shares." - http://www.spacemonkey-studio.com/wardriving.asp

    I know these are thebroken idiots, but someone should either tell them that writing down your crimes is a bad idea, or just turn them into the police and get two more morons off the street.
    --- The fuck? Have you ever BEEN to Defcon?

  • #2
    This kind of crap give the "Wardriving isnt a crime...but it ought to be' folks more ammo to go with. When you are trying to explain that what you are doing isn't illegal and that no one is penetrating the systems they find, its these morons that prove you wrong. Get enough of them and we'll all be looking at a new cybersecurity law that prohibits 'actively searching for network node access points' or prohibits 'possession of any radio or computer equipment or access software that is designed for locating and identifying wireless network nodes'

    I return whatever i wish . Its called FREEDOWM OF RANDOMNESS IN A HECK . CLUSTERED DEFEATED CORn FORUM . Welcome to me

    Comment


    • #3
      connecting to ap's that you find is NOT hacking/cracking IMHO. People finding remote holes in net services and different types of apps and informing and fixing IS (part) of hacking, exploting it to your benifet is cracking (flame me if I'm wrong).

      AP penetrations is literally point n' click, what's the skill in that? And these ppl feel special for doing this?
      "Never Underestimate the Power of Stupid People in Large Groups"

      Comment


      • #4
        Originally posted by hackajar
        connecting to ap's that you find is NOT hacking/cracking IMHO. People finding remote holes in net services and different types of apps and informing and fixing IS (part) of hacking, exploting it to your benifet is cracking (flame me if I'm wrong).

        AP penetrations is literally point n' click, what's the skill in that? And these ppl feel special for doing this?

        I tend to agree. Accessing a wireless network is easy as hell. It takes no skill...and is getting easier by the day...hell all it takes now is Windows XP.
        perl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'

        Comment


        • #5
          I am personally noticing alot of posts about connecting to ap....it is always refered to as "hacking" there was no use of any cunning or skill, you hit the little tab ing the network connections. Another problem I have notice is how easy people some to think wep cracking is, it takes alot of data, and the min the aps are upgraded, there is no way of getting weak IV packets. I think a clear guide and rule book should be created....the wardriver's book to ethics and morals. I also fequent the netstumbler forum, which is getting just as bad at times, I can only hope that soon everyone can be better informed.
          ~:CK:~
          I would like to meet a 1 to keep my 0 company.

          Comment

          Working...
          X