[ / / / / / / / / ] [ b / news+ / boards ] [ operate / meta ] [ ]

/gentoo/ - Technology

Install gentoo.

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options
Password (For file and post deletion.)

Allowed file types: jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


File: 1417573063064.jpg (63.94 KB, 500x327, 500:327, hacking.jpg)

 No.475

Hey /g/ents. I'm new to computer science, so this is going to come off as a retarded question. Still, it's one I'm interested in asking.

I was wondering how hackers gain information from people. I know that getting people to download / click things online is one way, but for example, people who "dox" someone and get information from them that is not publicly accessible - well, how do they do it?

Finding information via social media isn't that difficult, but if it's an anonymous person onsay a tumblr page and the hacker doesn't have any information about them, how would he go about getting it? What's exploitable about the site, if anything?

Also, what's a good place to start if I'm interested in learning about the subject? I'm not going to be hacking anyone, but I'd like to learn about the subject for general knowledge.

Thanks.

 No.499

We mostly pray to the gods of Hacking and sacrifice virgins at the full moon.

 No.500

They either rely on >>499, social engineering or insecure systems.
There was a talk a while back at DEFCON of some guy who got the address of some CEO's gf. (https://www.youtube.com/watch?v=fEmO7wQKCMw) He showed some of the best social engineering/insecurities, and how they can be used in conjunction with each other. To be a cracker (not Hacker, because a hacker is somebody who enjoys playful cleverness, not cracking into systems) you have to know a lot about the systems in use, about how people work, and you have to dedicate a lot of time to it.
To gain the knowledge, you need to just accumulate as much general networking, security and hardware knowledge as possible, and when you see patterns that can lead to vulnerability, you should be able to know how to research further. Search engines are a great tool, and in doubt, you can always start a thread on your beloved /gentoo/, which needs some more traffic anyway.
It's good that you're starting out interested and relatively knowledgeable, instead of thinking that computers are magical black boxes, you acknowledge the fact that most of it is social engineering.



Delete Post [ ]
[]
[Return][Go to top][Catalog]
[ / / / / / / / / ] [ b / news+ / boards ] [ operate / meta ] [ ]