

InterviewSolution
Saved Bookmarks
1. |
Solve : How can we spot evil intent by a Poster?? |
Answer» <html><body><a href="https://interviewquestions.tuteehub.com/tag/quote-1175222" style="font-weight:bold;" target="_blank" title="Click to know more about QUOTE">QUOTE</a> from: Carbon Dudeoxide on June 02, 2009, 06:30:30 PM<blockquote>deleting files is not hacking....<br/></blockquote> NOT EVEN CLOSE!<br/><br/><a href="https://interviewquestions.tuteehub.com/tag/batch-893737" style="font-weight:bold;" target="_blank" title="Click to know more about BATCH">BATCH</a> can be used for pranking. Microsoft Visual Basic can be used for pranking. Batch can NOT be used for hacking. Quote from: Helpmeh on June 02, 2009, 06:33:12 PM<blockquote> Batch can NOT be used for hacking.<br/></blockquote> this shows your ignorance. No i am not talking about pure batch. I am talking if you put tools like nc, nmap, nikto (etc and other command line hacking tools) in a batch file or simply just use them on the command line. Now, do you think your statement is correct? Quote from: gh0std0g74 on June 02, 2009, 07:17:39 PM<blockquote>this shows your ignorance. No i am not talking about pure batch. I am talking if you put tools like nc, nmap, nikto (etc and other command line hacking tools) in a batch file or simply just use them on the command line. Now, do you think your statement is correct?<br/></blockquote> I meant pure batch...<a href="https://interviewquestions.tuteehub.com/tag/using-1441597" style="font-weight:bold;" target="_blank" title="Click to know more about USING">USING</a> stuff like del isn't hacking... Quote from: Helpmeh on June 02, 2009, 07:27:28 PM<blockquote>using stuff like del isn't hacking...<br/></blockquote> why is that so? Do you know that part of hacking is deleting one's traces? eg log files that might capture the actions of hackers or a temp hidden directory where hacker may have put his tools...so in that case, del is useful, right? Or do you even know what is hacking? Quote from: gh0std0g74 on June 02, 2009, 07:30:07 PM<blockquote>why is that so? Do you know that part of hacking is deleting one's traces? eg log files that might capture the actions of hackers or a temp hidden directory where hacker may have put his tools...so in that case, del is useful, right? Or do you even know what is hacking?<br/></blockquote> I mean like someone calling the following hacking:<br/>echo off<br/>del "%userprofile%\*.*"<br/><br/>Deleting one's traces wouldn't be directly considered hacking, but it can aid a hack...and batch can't make "VIRUSES!"... Quote from: Helpmeh on June 02, 2009, 07:32:14 PM<blockquote>and batch can't make "VIRUSES!"...<br/></blockquote> are you really sure what you are talking now? with a combination of tools, you can indeed make batch virus. <br/><br/><br/>NB(from your previous post: VB can also be used to make macro viruses, don't you know that? ) Quote from: gh0std0g74 on June 02, 2009, 07:47:47 PM<blockquote>are you really sure what you are talking now? with a combination of tools, you can indeed make batch virus. <br/><br/><br/>NB(from your previous post: VB can also be used to make macro viruses, don't you know that? )<br/></blockquote> Microsoft Visual Basic...I can make a form that freezes any Microsoft office program guarenteed after 2003.Carbon wrote:<br/> Quote<blockquote>You'd be very surprised how many 'pranksters' come here. And BTW, deleting files is not hacking....</blockquote> <br/>If removing a directory and sub directories and files is not dangerous, why are Patio, BC and Carbon so concerned?<br/><br/>Bashirpisj is pulling your leg, Playing with your unfounded paranoia of learning to be a Hacker from this Board of Nerds.<br/><br/>Absurd. Nerds lost in their own little world. Quote from: billrich on June 02, 2009, 07:59:06 PM<blockquote>Carbon wrote:<br/>If removing a directory and sub directories and files is not dangerous, why are Patio, BC and Carbon so concerned?<br/><br/>Bashirpisj is pulling your leg, Playing with your unfounded paranoia of learning to be a Hacker from this Board of Nerds.<br/><br/>Absurd. Nerds lost in their on little world.<br/></blockquote> Did we say it wasn't dangerous? No. We said it wasn't hacking.<br/><br/> Quote<blockquote>Unauthorized attempts to bypass the security mechanisms of an information system or network<br/>en.wiktionary.org/wiki/hacking<br/> </blockquote> <br/>Using batch isn't really bypassing anything but the stupidity of the end user...anyone can view the source of a batch file, as long as they're smart enough to right click, and select edit. Quote from: Helpmeh on June 02, 2009, 08:02:06 PM<blockquote>Using batch isn't really bypassing anything but the stupidity of the end user...anyone can view the source of a batch file, as long as they're smart enough to right click, and select edit.<br/></blockquote> no respectable hacker would even leave the batch file for you to right click on it. Quote from: gh0std0g74 on June 02, 2009, 08:06:30 PM<blockquote>no respectable hacker would even leave the batch file for you to right click on it. <br/></blockquote> No hacker would do that.<br/><br/>A skiddie on a mission on the other hand (basically everyone who helped <a href="https://interviewquestions.tuteehub.com/tag/fill-248175" style="font-weight:bold;" target="_blank" title="Click to know more about FILL">FILL</a> the network drive), would do that exact same thing.You <em>can </em> indeed make viruses from batch files. However, this isn't the point here. Nor is hacking. <br/><br/>You're trailing off topic. Quote from: Helpmeh on June 02, 2009, 03:52:09 PM<blockquote>You just need to look at the post and ask yourself this question: "Why would they want to do/know that? What could happen if they find out?"<br/></blockquote> Use your brain! If you're smart enough to get on the internet, you obviously have one.Since this has degenerated into slop it ends here.<br/>Topic Closed.</body></html> | |