Site hosted by Build your free website today!
Close WindowHacking a System
Flowing through the net is an all day activity. Many people don't leave their workplaces anymore. The virtual world offers all somebody needs. Intruding an other system however is nothing one should do while taking lunch. A hack is always risky. If you are not afraid about intruding someone else's system anymore, you are dead.

The story of a successful one is usually at least a 2 step approach. First you spy on the system. Find weakpoints. Monitor defenses. Note updates. Learn as much as you can without being seen.

It is of course normal that the defenses of a place are very carefully adapted to the system itself. So the home team already got an advantage here, but if you know what you are up to you can try to use the defenses against themselves. Of course some people just take a big gun and ram through the main portal. However, unless you plan to hack the diary of a kid, that is not recommended behavior.

Once you got enough information about the system it is time to load up an intrusion AI. You should by now know which one would be suited best for the task.
Also one better prepares the procedures that might be useful; all the libs usually have a huge procedure cache, space is not the problem here.

Like a predator the hacker will wait outside the security perimeter. Then when the system is at low protection it is time to make ones run. No matter how well picked, one will always encounter security bots, more likely even a human beings. Now the tricky part starts. It is obvious that sooner or later an intruder will be caught. So to make your day you have to get in, disable the defenses for a second, grab your data and then move your butt out of the region fast.

No matter from which side one views a hack (attacker or defender) the basic principle is always the same. Get rid of your opponent(s) fast. Getting rid as in disconnect him. Doing so by attacking his sockets, by intruding his lib or by crashing his deck is purely a matter of taste. Of course some attack forms are more mean then others.

Whatever you decide for, make it fast. Don't toy with your prey. Once the opponent is out you got your will. If you are the defender - congrats; you will probably not see the attacker again, especially if you damaged his deck. If you are the attacker - quick - grab the data and run. Other defense mechanisms will soon start up. Cover your traces any enjoy the data packets you menaged to take. Just hope they are the right ones, for same backdoors won't work again...
Back To Index