Hack the Media

Posts Tagged ‘methods’

Hacktivism

In Uncategorized on 20 March, 2011 at 10:22 am

A portmanteau of hack and activism, hacktivism is the term coined to describe activists who choose to make their stand via the computer. Often hacktivists are portrayed neutrally, occasionally even sympathetically by the media, with a clear distinction made between “hacktivism” and “cyberterrorism”. This is most probably due to the issues many hacktivists hack against. Often the media and the hacktivist will find themselves on the same side, notable cases being the defence of WikiLeaks [http://www.bbc.co.uk/news/technology-11935539], the rebellion in Egypt [http://www.msnbc.msn.com/id/41407082/ns/technology_and_science-security/], and many other key political issues.

Due to the media’s previous history of vilifying all forms of hackers and hacking, hacktivists are treading new, uncertain territory. For a while now hacking and the cyberworld have been changing the way wars are fought, introducing the acts of data warfare, secret stealing, and cyberfighting. Yet these hacktivists are also changing who these wars are fought by. Hacktavists aren’t exclusively versed hackers. Often versed hackers will create and upload hacking tools and programmes, programmes that can be downloaded and used by anyone, turning any computer into a hacktivist device, and anyone into a basic little hacktivist. Below is a copypasta list of the most common tools used by hacktivist;

 

1. Defacing Web Pages Between 1995-1999 Attrition.org reported 5,000 website defacements. In such a scenario, the hacktivist will significantly alter the front page of a company’s or governmental agency’s website.

2. Web Sit-ins In this form of hacktivism, hackers attempt to send so much traffic to the site that the overwhelmed site becomes inaccessible to other users in a variation on a denial of service.

With the advent of geotagging and the ability to geo-bomb Google Earth with YouTube videos, an alternative definition of a web sit-in can be the targeting of a particular locale such as a government building with an overwhelming amount of geo-tagged videos.

3. E-mail Bombing Hacktivists send scores of e-mails with large file attachments to their target’s e-mail address.

4. Code Software and websites can achieve political purposes. For example, the encryption software PGP can be used to secure communications; PGP’s author, Phil Zimmermann said he distributed it first to the peace movement. Jim Warren suggests PGP’s wide dissemination was in response to Senate Bill 266, authored by Senators Biden and DeConcini, which demanded that “…communications systems permit the government to obtain the plain text contents of voice, data, and other communications…”. WikiLeaks is an example of a politically motivated website – it seeks to “keep governments open”.

5. Website Mirroring is used as a circumvention tool to bypass censorship blocks on websites. It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.

6. Geo-bombing is a technique in which netizens add a geo-tag while editing YouTube videos so that the location of the video can be displayed in Google Earth.[8]

7. Anonymous blogging is a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as free email accounts, IP masking, and blogging software to preserve a high level of anonymity. [Wikipedia]

 

There are many different forms of hacktivists, hacktivists who hack for their homeland, hacktivists who hack against oppression, hacktivists who hack for one issue, and one issue alone. More recently however we have seen the rise of online, mass hacktivist groups, the most notable being the group called Anonymous.

 

 

 

 

Copypasta Explanation of Hacking Methods

In Uncategorized on 10 February, 2011 at 12:56 pm

Below is a list of many of the key methods used to hack and crack computers. This pay prove to be a handy reference point when decoding exactly what process or concept the media are talking about when they talk about “hacking” in a generic state, or a useful list to understand excatly what these terms mean when used by educated media outlets in context.

“Vulnerability scanner
vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are “open” or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
Password cracking
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Packet sniffer
packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack
spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
Rootkit
rootkit is designed to conceal the compromise of a computer’s security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
Social engineering
Social engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.
Trojan horses
Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
Viruses
virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to abiological virus, which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes most computer viruses are considered malicious.
Worms
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms “virus” and “worm”, using them both to describe any self-propagating program.
Key loggers
key logger is a tool designed to record (‘log’) every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user’s password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud. [http://en.wikipedia.org/wiki/Hacker_(computer_security)]”