Hack the Media

Posts Tagged ‘understanding’

The Mysterious Anonymous

In Uncategorized on 1 April, 2011 at 12:53 pm

 

Anonymous is fast becoming one of the most influential, or at least, most documented hacking group there is. Linked by the to all manner of notorious hacktivist cases, such as the WikiLeaks backlash [http://www.bbc.co.uk/news/technology-11935539], an attack that saw them take down the MasterCard, PayPal and Visa websites after they removed their services from the website. Similarly, they aided the Egyptian revolution [http://ieet.org/index.php/IEET/more/notaro20110309], and are described by that new media outlet as a hacker group that “takes down websites across the world for the greater good: peace, freedom of information and solidarity.” Anonymous boast many feats, as well as many members, the group itself is very illucid, it’s very easy to take part in some of their hacktivist actions, often they’ll upload programmes that do the work for you, or you’ll simply have to take part in e-mail campains or basic acts of hacking.

 

And Anonymous are more then just an online syndication. Created on the notorious 4Chan board, /b/ (described by many, including itself, as the asshole of the internet), Anonymous has an impressive record of IRL protests too. One of its more noted protest was Project Chanology [http://en.wikipedia.org/wiki/Project_Chanology], a protest that saw members of the loose-knit organisation protest outside the churches headquarters, dressed mostly in cloaks and hats to protect their identities. Alongside this protest came cyberattacks against the church of Scientology; Anonymous utilised DDoS and a variety of other methods to attack and disrupt the churches’ running.

 

Anonymous have fast become one of the most feared cybergroups, arguably, not least due to their size, one of the strongest and most formidable. Previous hacking victims have included the Bank of America [http://content.usatoday.com/communities/ondeadline/post/2011/03/anonymous-hackers-release-bank-of-america-emails/1], BMI [http://www.hollywoodreporter.com/news/anonymous-hacker-group-attacks-bmi-166283], Amazon, PayPal, MasterCard and Visa, Sarah Palin [http://www.timesonline.co.uk/tol/news/world/us_and_americas/us_elections/article4780133.ece], and many, many more. Most recently they have decided to take fight against Sony after Sony repressed information on how to jailbreak the PS3 [http://news.techworld.com/personal-tech/3268344/sony-ps3-websites-attacked-by-anonymous-group/]

 

And it kinda all started, believe it or not, when some kid hurt a cat.

 

 

A Brief Overview

In Uncategorized on 9 February, 2011 at 9:16 pm

When it comes to portraying hacking, many different types of media outlets use many different methods; the newer, younger generation driven media outlets occasionally have a good grasp on the processes involved, whereas occasionally the traditional, old fashioned media outlets sometimes don’t know where to begin. Often, instead of fully explaining (perhaps even fully understanding) the occasionally complex, occasionally simple processes involved when people hack, they choose to simply staple the word “hacking” onto anything that features technology and information manipulation, using it to explain away a number of offences, from news reporters “hacking” into voicemail messages [http://www.guardian.co.uk/media/2011/feb/10/phone-hacking-john-prescott-named], to cyberthiefs “hacking” into websites [http://www.guardian.co.uk/money/2011/jan/21/lush-website-hack-customers-fraud] (arguably, this attack on Lush is a better example of “cracking” then it is of hacking) Because of this umbrella usage of a term not many people fully understand, the act of hacking gains this mysterious allure, becoming a common feature of everyday cyberlife that most people have no understanding of.

Of course the media writers that do have a basic understanding can’t go into depth when it comes to hacking, the last thing they want is to unintentionally educate a league of new cybercriminals. It would perhaps be prudent if they explained it a little better, however. Instead of leaving the readers to imagine a technological wizard tapping away strings of green binary code on a black screen, they could point out that on a basic, yet still profitable level, a lot of hacking is still just a mix of trial and error and dumb luck. For example, a lot of the celebrities affected by the News of the World’s hacking affair [http://www.bbc.co.uk/news/uk-11195407] weren’t caught out by some amazing feat of binary manipulation, but more the simple process of calling their voicemail numbers and typing in the basic password numbers, ie, 1111 or 1234, in the hope that the owner had neglected to change them. Similarity, a lot of e-mail hacks, or computer access hacks are carried out by attaining an e-mail address, then either guessing the password (or using a programme that runs through common English words and phrases), or answering a security question (after all, thanks to the wonders of Google, learning your mothers maiden name or the town she was born in isn’t all that hard).

The realities of hacking aren’t all that glamorous, after all, all hackers have to start from something, and as much as the media would like us to believe that hacking is the big bad wolf, often the realities are a lot less glamorous. But people do just love making mountains out of molehills, after all.

 

Here is a list of the 500 most common passwords a hacker will use. If your password is on this list, it would probably be a good idea to choose a better one.