SmokiestGrunl Posted September 29, 2008 Report Posted September 29, 2008 Hacker's Guide To Gaining Root On A Girl: Mysteries Revealed * * * 1.Analyzing the target * * * Purpose: to make sure $she is really worth it all. Be *sure* she isn'tjust another incompatible one before you take any action. All you need to do is check for dependancies. Find out what she givespriorities to. If looks are all that counts, it tells you she pays attention to youonly because of your GUI. She might even call your $parents someday andsay, "The product you released XY years ago has a considerably pleasinggraphical interface. Thank you ever so much. I'm trying to upgrade him byadding some minor development paths." What is wrong with this, payingattention to the GUI only and not putting efforts to dig deeper revealsher being a weak hacker. The development she'd make on you wouldn't bethe development you need (and, actually, want). Meanwhile, the following statements show her have the right attitude (checkif she's prone to adapt any of them to you): - "I appreciate him because of his kernel (aka: personality), it's reallystable."- "he's well documented" (aka: honest/fair).- "the source is pretty clear" (aka: simple, easy-going).- "debugging doesn't require much effort" (aka: flexible).- "he's easy to update" (aka: open-minded).- "modules are easily handled" (that is, moods).- "he's got several ports open for me" (aka: aproachable).- "... still he doesn't accept anonymous connections" (aka: faithful anddevoted).- "a minor data leak occurs occasionally, but i guess it's ok" (aka:talkative).And, most important of all:- "he wasn't all the above before I did some coding on him. I've done asignificant improvent to his source, and generally all the merits belongto me." (several things come out from this one: 1- she thinks she rootsyou;2- that is only in her mind that she roots you, indeed; 3- you'vesucceeded in making her believe she roots you, that is good 'cos thisattitude simplifies the process of you getting the root on *her* ---- onceagain, that reveals you being an experienced hacker). Once you finish analyzing the target, you may proceed to the second part ofthe process. * * * 2.Gaining access to the target * * * This step is a little complicated, you'll have to try combinedtactics. Still the types of tactics can be roughly sorted: --> Man-in-the-Middle Tactic. Two typical approaches have been specified:-A- with such schematic appearance:Victim -------------------------> X Person(the girl) ^||Attacker(you)Explanation. Look for a data leak or weaknesses while watchingher communicate with another person. Pick up the compatibleinformation. Regard the whole action as data sniffing. -B- with such schematic appearance:Victim -------------------------> Attacker(the girl) ^ (you)||X PersonExplanation. A custom person provides her with positive informationabout you. Benefits: improves the reliability. --> Client To Server Tactic - requires direct communication. This tacticis a very important part of the proccess. Your aims are:- analyze her system and its behavior (aka: get to know her), locatepossible vulnerabilities. Regard this action as port scanning.- get her linked (finding common interests seem to work well). --> Physical Access Tactic - usually has the lowest priority, because basicknowledge of the system is required which can only be handled afterworking with other tactic types. Don't try physical access unlessyou'resure you're acquaintant with victim's weaknesses enough. Take intoconsideration that if you request for physical access and $she doesn'tgrant it, the consequences will lead to a severe slow-down of thewholeprocess. Considerable note: You might wish to try some social engineering on herfriends or parents before actually taking any other action. That mightprovide u with useful information on possible logic errors or knownweaknesses. * * * Gaining root on the remote system * * * Permissions of an ordinary user is entirely sufficient at the begining, thothe next step is much more demanding: your aim now is to become asuper-user. The most reliable way to do that is by exploring such vulnerabilities aslogic errors and weaknesses which you could locate in her source code whilespectating her behaviour (see the previous step). --> When Buffer Overflow is a good choice to count on: consider a situationwhen you cannot locate any weaknesses or compilation errors. Insuch case,check if $she does the check for input errors and how $she behaves atreceiving bigger amounts of data than $she can handle. Buffer OverflowUsage: if $she seems to be able to handle "A", feed her with "A +A^n".This might lead to the confusion of the victim which you can usefor yourpersonal purposes (aka: shock her a little, then use it). Note: besure"A + A^n" is less than "A + A^6", otherwise it can lead to kernelpanicand the remote system might stop responding.Buffer Overflow exploration might lead to a temporary hole in hersecuritysystem. --> Just after you've located a hole: fill it with *your* pre-written data(aka: when you realize what she wants, *give* it to her. Or promiseyou'llgive it later. Note that keeping promises is a nice, yet entirelyoptional, thing).
sillybob123 Posted September 29, 2008 Report Posted September 29, 2008 (edited) wtf this is sooo random what is it on about :S i gave up reading halfway Edited September 29, 2008 by sillybob123♥
SmokiestGrunl Posted September 29, 2008 Author Report Posted September 29, 2008 wtf this is sooo random what is it on about :S i gave up reading halfway You need to know a bit about programing and systems otherwise this isn't going to make sense.
Decatur Posted September 29, 2008 Report Posted September 29, 2008 i understand it cause i have IT/cisco for 90 minutes a day =D
someGuyOnIbotmodz Posted October 1, 2008 Report Posted October 1, 2008 what...the....******..was....that....
Gaming Royalty Posted October 1, 2008 Report Posted October 1, 2008 what...the....******..was....that.... It's a nerdy/programer way of how to pick up women.
SmokiestGrunl Posted October 1, 2008 Author Report Posted October 1, 2008 (edited) Maybe I'll make a translation a bit later for all the noobies. Edited October 1, 2008 by SmokiestGrunl
Xx Legacy xX Posted October 2, 2008 Report Posted October 2, 2008 Maybe I'll make a translation a bit later for all the noobies.i ahte the word newbies because i hate when people grag when there good at something to too with computers or gming. It's sooo annnoying "I BEAT YOU AT A VIDEO" me> Wow really holly s***. Because this video is my life and i play it 24 7. I am aboout to cry.
SmokiestGrunl Posted October 2, 2008 Author Report Posted October 2, 2008 you do now the real meaning for the word noobie don't you? Someone new. No need to go off your nut.
Decatur Posted October 2, 2008 Report Posted October 2, 2008 A good one would be 'He has no security system/his anti-virus software is outdated' which could mean, hes easily accessable, easy to change.
Xx Legacy xX Posted October 2, 2008 Report Posted October 2, 2008 you do now the real meaning for the word noobie don't you? Someone new. No need to go off your nut. xD i hate the word its like a pet peeve lol look how badly i typed, thats how i type when i am tired. but wee you guys in a few days heading off again.
Dark Slipstream Posted October 2, 2008 Report Posted October 2, 2008 LOL MFAO WROF LAMF. Explanation: 1) It tells you how the girl will check you out (in lamens terms, using programming code)2) It says go ask her out, or attempt to (if you have the guts)3) ... the relationship ...4) The Deed. SI. - All I am allowed to say
sowrd Posted October 3, 2008 Report Posted October 3, 2008 wtf this is sooo random what is it on about :S i gave up reading halfway me 2
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now