Padrino Posted August 3, 2010 Share Posted August 3, 2010 Ah, but Macs of today are running on intel, right? Right Quote Link to comment
rangerhound Posted August 17, 2010 Share Posted August 17, 2010 some Macs run on AMD.. Yes they run on Intel and AMD... The processor is the easy part, as long as they have SSE2 - SSE3 capability its fine (which most processors are today - even the Atom) however, its the motherboard that has a lot of compatibility problems. People who have built hackintoshes suggest the use of Gigabit, ASUS, Foxconn boards, but they just don't work straight out of the box, the BIOS should be modified too. Quote Link to comment
knoll1234 Posted September 30, 2010 Share Posted September 30, 2010 If you are looking for the ultimate ethical hacker, it is the NSA, in DC. their sc , I have seen in recent pictures occupies the whole of SM megamall and trinoma combined. Quote Link to comment
bitterfrost_20 Posted October 15, 2010 Share Posted October 15, 2010 hello....just wanna know if possible bang malaman nung isang hacker or mahack nya ung incoming at outgoing message ng isang account or marestore nya lhat ng deleted mail sa inbox at sent items....at malaman agad na me new account akong ginawa????? If your looking for an email message you can sniff the network to intercept and capture data packets. Some available freeware tools includes "wireshark" formerly known as ethereal For the restoration of email messages, hmmm, this can be done in your exchange server mailbox and run some recovery tools like Encase and other recovery tools such as Pandora Recovery etc. check also the exchange server logs for possible new domain account email created. Quote Link to comment
bitterfrost_20 Posted October 15, 2010 Share Posted October 15, 2010 what are we looking into po ba? sa internal lang yung hacker or sa external? Kasi pwede deploy ng parang wormlike file na mag a act na mag phone home sa PC sa WAN eh. Or kung internal yan, nakalimutan ko yung technical term na pwedeng gamitin para mag act yung workstation niya as a decoy server eh. I think it's mac spoofing??? Oh, I forgot, the answer is yes. quite correct, Although this can be done thru internal network, if you want to intercept all email messages to your account you better be skillful enough to do a lot of hacking techniques. Let's say you are in the same network using Outlook as your mail service. The easiest way to hack the account is to brute force the victim's account password. although this may take some time if the victim's password Complexity is strong (Combination of Symbols, Numbers, Special Characters etc.) but if it uses weak password, you'll be lucky enough to crack the password within minutes. Reliable and strong password cracker is John The Ripper. google it for the download but take precaution for possible trojans. If you have no patience for cracking passwords, you may try Session Hijacking and Session Replay. this also can be done thru sniffing. just pray that you can find cleartext username and passwords during your capture. although, some drawback of sniffers is that they cannot sniff data if your network uses layer 2 devices or switches. This is where you can use the technique Mac Spoofing and Port Mirroring. I have given you some ideas try researching and studying..it pays. B) B) B) Quote Link to comment
keyholder Posted February 13, 2012 Share Posted February 13, 2012 I'm just curious lang about hacking. Pag sinabing hacking sa company or corporations, gumagamit lang ba ang crackers ng nakukuhang application from underground or sila talaga yung gumagawa ng code? Naging interesado lang akong malaman dahil sa kaguluhan ng 'We are Anonymous' sa Pentagon at DoD. Quote Link to comment
evilson Posted April 30, 2012 Share Posted April 30, 2012 yup.pero ang info na nakuha ko dati yung mga dating nilabas na software,di na gumagan kasi mas mataas na security na ginagamit nila Quote Link to comment
JayZip Posted May 14, 2012 Share Posted May 14, 2012 would you hack into somebody else's computer if your boss tells you? Quote Link to comment
magaling na lalake Posted May 15, 2012 Share Posted May 15, 2012 depende siguro, if part yun ng work mo to find out kung sino ang corporate espionage or nagaaccess ng mga files na dapat di nya makita, why not Quote Link to comment
lunchchow Posted June 12, 2012 Share Posted June 12, 2012 MGA MASTERS, I need an advice or some general or even first hand knowledge about this one, i know off to sa topic thread na to, recently i got robbed in my office, dumaan ata sa bintana yung magnanakaw kasi walang force entry sa main door...anyhow....whats really concern me is the data in my laptop, it has a original windows OS, three account on my windows, two admin one guest, one admin is not password protected the other is password protected, the admin which is not admin protected cannot access the files in admin with password....ano ba usually modus operandi ng mga magnanakaw ng laptop.....once they get my laptop do they format it immediately to sell? kalkalin ang files? or any tips about this matter...thanks in advance please do pitch in. Quote Link to comment
zairus Posted June 21, 2012 Share Posted June 21, 2012 MGA MASTERS, I need an advice or some general or even first hand knowledge about this one, i know off to sa topic thread na to, recently i got robbed in my office, dumaan ata sa bintana yung magnanakaw kasi walang force entry sa main door...anyhow....whats really concern me is the data in my laptop, it has a original windows OS, three account on my windows, two admin one guest, one admin is not password protected the other is password protected, the admin which is not admin protected cannot access the files in admin with password....ano ba usually modus operandi ng mga magnanakaw ng laptop.....once they get my laptop do they format it immediately to sell? kalkalin ang files? or any tips about this matter...thanks in advance please do pitch in. Your admin password will not protect you or your files if someone has physical access to the laptop. And since yours was stolen, I suggest you prepare for the worse... financial records, bank accounts, online purchases, important , sensitive documents... find ways to prevent additional damage. The simplest way to access files on a windows hard drive is by making it a slave drive or an external drive of a linux or mac system. Password crackers are readily available. There even exist a free and open source software where one can create a live-cd and boot from it. this will do the rest of the job, and after a few minutes, appears the admin password. If the drive is reformatted, there are data recovery softwares that can be used to recover most of the files inside a drive regardless of how many times it has been reformatted. Quote Link to comment
simplyeric Posted June 22, 2012 Share Posted June 22, 2012 Your admin password will not protect you or your files if someone has physical access to the laptop. And since yours was stolen, I suggest you prepare for the worse... financial records, bank accounts, online purchases, important , sensitive documents... find ways to prevent additional damage. The simplest way to access files on a windows hard drive is by making it a slave drive or an external drive of a linux or mac system. Password crackers are readily available. There even exist a free and open source software where one can create a live-cd and boot from it. this will do the rest of the job, and after a few minutes, appears the admin password. If the drive is reformatted, there are data recovery softwares that can be used to recover most of the files inside a drive regardless of how many times it has been reformatted. Most ng mga magnanakaw ay kailangan lang ibenta ang goods once na naacquire. hindi nila gaano pinapakealam ang laman kasi mabusisi at most of them do not know anything about cracking a laptop but the problem now is yung pagbebentahan, usually mga computer stores at repair yung mga bibili nun. the least they can do is format the laptop and use it for spare parts(since yung whole laptop is a "hot item") but take note that scandals are a big thing right now. i dont want to scare you but if ever you have personal videos there, beware. tinatyaga nilang hanapin yun and they have programs to open your pc, lalo na pag windows XP, then search your hard disk for videos or pics.they can even scan your deleted items for your recent browsing history, kapag pinili mo ay "save this password to your pc" then you may have a problem, kasi i-open lang nila ang browser then auto log in sa FB at social sites as for your bank passwords, so far our criminals are not that sophisticated enough to delve into that kasi kailangan ng advance skill set to pull it off but the best you could do is this:1. never store very important information in your laptop/desktop like bank accounts2. dont lose your laptop! Quote Link to comment
simplyeric Posted June 22, 2012 Share Posted June 22, 2012 would you hack into somebody else's computer if your boss tells you? if you are a network security analyst or it is your job to ensure the network security of your company, then it is ok. but take note that if it is your job, you are only allowed to break into the computer and not look at the contents. ibig sabihin, pag naaccess mo na ang system files and/or desktop ng target pc mo, then your job ends there.pag sinilip mo ang files niya then that is invasion of privacy. if it is not your job, the i strongly suggest not to do it kasi may deniability ang boss mo, ikaw wala, so pag nahuli ka, tigok ka kasi you have no right to access other pc. Quote Link to comment
simplyeric Posted June 22, 2012 Share Posted June 22, 2012 would you hack into somebody else's computer if your boss tells you? if you are a network security analyst or it is your job to ensure the network security of your company, then it is ok. but take note that if it is your job, you are only allowed to break into the computer and not look at the contents. ibig sabihin, pag naaccess mo na ang system files and/or desktop ng target pc mo, then your job ends there.pag sinilip mo ang files niya then that is invasion of privacy. if it is not your job, the i strongly suggest not to do it kasi may deniability ang boss mo, ikaw wala, so pag nahuli ka, tigok ka kasi you have no right to access other pc. to those who are interested in hacking, please take note that in order for someone to hack into something, you have to know all the inner workings of the system. this mean that you have to study a lot of things in order to have the proper skill set to do the job. i for one am not a full on hacker. i am just curious on how things work and what i can do with it. i am also considered as a lazy hacker since i constantly try to look for a simple program to do all those commands. but believe me when i tell you, you still have to study a lot. there are only a handful of one click programs you can use and they can only do limited things in the movies, they portray hackers as knowing simple commands to break in any pc. that is not the case in reality. in order to hack into something, you have to know what system they are using (in order to know what vulnerabilities that they have). then you have to know where you are in that system.you also have to learn how computers think and speak. Quote Link to comment
JayZip Posted July 16, 2012 Share Posted July 16, 2012 if you are a network security analyst or it is your job to ensure the network security of your company, then it is ok. but take note that if it is your job, you are only allowed to break into the computer and not look at the contents. ibig sabihin, pag naaccess mo na ang system files and/or desktop ng target pc mo, then your job ends there.pag sinilip mo ang files niya then that is invasion of privacy. if it is not your job, the i strongly suggest not to do it kasi may deniability ang boss mo, ikaw wala, so pag nahuli ka, tigok ka kasi you have no right to access other pc. to those who are interested in hacking, please take note that in order for someone to hack into something, you have to know all the inner workings of the system. this mean that you have to study a lot of things in order to have the proper skill set to do the job. i for one am not a full on hacker. i am just curious on how things work and what i can do with it. i am also considered as a lazy hacker since i constantly try to look for a simple program to do all those commands. but believe me when i tell you, you still have to study a lot. there are only a handful of one click programs you can use and they can only do limited things in the movies, they portray hackers as knowing simple commands to break in any pc. that is not the case in reality. in order to hack into something, you have to know what system they are using (in order to know what vulnerabilities that they have). then you have to know where you are in that system.you also have to learn how computers think and speak. say you are not a network security analyst but a systems admin. and the CEO wants you to check out the emails of an employee. would you do it? Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.