Results 1 to 32 of 32

Thread: hacking/job opportunity

  1. #1
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default hacking/job opportunity

    just a quick question for this forum's page.how many people are hackers,crackers(no joke intended here),or are just curious how to hack or crack a sysem,password,databases,servers,accounts,e-mails,or whatever?

    the reason i was asking was because the pentagon has had their database hacked,yet once again,in the past two weeks.this time,the person or people stole over 7TB of information that pertained to the air force's newest and highest price fighter jet.they did all this without leaving a single digital trail or footprint.it apparently has made the government so mad that they are opening up opporunities to the general public,mainly hackers and/or crackers,for the NSA.i myself had been contacted and asked if i was intrested.i chose not to because i have just recently had a new baby girl and didn't want to be away from her and my wife for an extended period of time.this will only be cintracted work for a period of time unless you could prove your worth and value to the NSA council.

    just a thought to roll around in your head if you have the skills and/or knowledge to do this kind of stuff.the pay is good.....real good,and the benefits you CAN'T beat.

  2. #2
    iTrack matthewAPM's Avatar
    Join Date
    Nov 2007
    Location
    Otto-Flimm-Straße, Nürburg
    Posts
    4,640
    Rep Power
    22

    Default

    matthewAPM checking in
    Matthew Brueck
    iTrack Motorsports

    www.itrackms.com



  3. #3
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    checking in to want to know more about it or just curious,lol?

  4. #4
    iTrack matthewAPM's Avatar
    Join Date
    Nov 2007
    Location
    Otto-Flimm-Straße, Nürburg
    Posts
    4,640
    Rep Power
    22

    Default

    PM me with a little more info.
    Matthew Brueck
    iTrack Motorsports

    www.itrackms.com



  5. #5
    Don't ya like clowns? Paul's Avatar
    Join Date
    Feb 2001
    Age
    44
    Posts
    29,970
    Rep Power
    1059

    Default

    i'm just wondering how someone can hack in and steal 7 TB? do you know how much data transfer that is? what the fuck do they not monitor bandwidth?
    Paul "your bullshit makes the flowers grow"

  6. #6
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    bandwidth is one one way of monitoring,but in a place of that network size and structure,it would be hard to say that they are actively being hacked.besides,no one said that the data stolen was at one time and then tere is also the fact that all this data i'm sure was broken down into small packets across the network that were not all stored on the same server or database.less data on one source allows for faster and easier networking between them and the rest of the world.just imagine how much traffic is raveled along their network a minute.aside from that,there is also wireless which is even harder rto track because the DNS is always changing whenever the connection is closed and then reopened.there's all kind of holes and that is why the goernment is making this offer to the public.

  7. #7
    iTrack matthewAPM's Avatar
    Join Date
    Nov 2007
    Location
    Otto-Flimm-Straße, Nürburg
    Posts
    4,640
    Rep Power
    22

    Default

    Do they have any idea on the time or day that this was started or how long it took for this to happen?

    Im sure it was not all taken at once. Im sure they would not go unnoticed doing a single download of everything.
    Matthew Brueck
    iTrack Motorsports

    www.itrackms.com



  8. #8
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    no,no time line of the "attack" was reported.my guess is that this was over several weeks in order to gather much data.even on my personal T4 line thati own,it would take a good amount of time to do something like that....a good amount.

  9. #9
    iTrack matthewAPM's Avatar
    Join Date
    Nov 2007
    Location
    Otto-Flimm-Straße, Nürburg
    Posts
    4,640
    Rep Power
    22

    Default

    Thats what im saying. With the amount taken, they would have been noticed before it was finished.
    Matthew Brueck
    iTrack Motorsports

    www.itrackms.com



  10. #10
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    one would think so,but there are several ways to scramble a transmission,signal,process,and so many other things to cover the traffic.the one(s) that did this are definately good,i will give them that,lol!!

  11. #11
    Senior Member NewGen33's Avatar
    Join Date
    Sep 2005
    Location
    Vinings, GA
    Age
    34
    Posts
    3,196
    Rep Power
    24

    Default

    Ya I can't believe they let this happen. You would think with all the brilliant minds there would be someone smart enough to detect something was wrong sooner than it took. They didn't get any info on the operating system or stealth technology only because it wasn't connected to the internet. Which is how all the information should of been stored. I think this is just the beginning of cyber warfare.

  12. #12
    iTrack matthewAPM's Avatar
    Join Date
    Nov 2007
    Location
    Otto-Flimm-Straße, Nürburg
    Posts
    4,640
    Rep Power
    22

    Default

    ^ this guy makes me lol
    Matthew Brueck
    iTrack Motorsports

    www.itrackms.com



  13. #13
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    lol.the reason more sensitive information was not compromised was because it was part of the network and was kept on a seperate system that was not networked.HOWEVER,there is a way to get that information off those machines as well,but i will leave that one alone,lol!!

  14. #14
    Senior Member NewGen33's Avatar
    Join Date
    Sep 2005
    Location
    Vinings, GA
    Age
    34
    Posts
    3,196
    Rep Power
    24

    Default

    LOL Well I'm not really that comp knowledgeable as you guys but just ranting

  15. #15
    iTrack matthewAPM's Avatar
    Join Date
    Nov 2007
    Location
    Otto-Flimm-Straße, Nürburg
    Posts
    4,640
    Rep Power
    22

    Default

    Quote Originally Posted by guinness
    lol.the reason more sensitive information was not compromised was because it was part of the network and was kept on a seperate system that was not networked.HOWEVER,there is a way to get that information off those machines as well,but i will leave that one alone,lol!!
    lol. "IA-how to hack 101"

    Quote Originally Posted by NewGen33
    LOL Well I'm not really that comp knowledgeable as you guys but just ranting
    lol im just giving you a hard time.
    Matthew Brueck
    iTrack Motorsports

    www.itrackms.com



  16. #16
    Senior Member NewGen33's Avatar
    Join Date
    Sep 2005
    Location
    Vinings, GA
    Age
    34
    Posts
    3,196
    Rep Power
    24

    Default

    Quote Originally Posted by matthewAPM
    lol.
    lol im just giving you a hard time.
    It's all good man

  17. #17
    iamgraphicdesign uproot's Avatar
    Join Date
    Mar 2005
    Location
    :noitacoL
    Age
    41
    Posts
    7,332
    Rep Power
    33

    Default

    If there was no trail or footprint, how do they know it happened?

  18. #18
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    Quote Originally Posted by uproot
    If there was no trail or footprint, how do they know it happened?
    the same way that kapernsky,the anti-virus program company,knew they had been internally compromised...someone bragged about it somewhere or they saw the huge change in bandwidth traffic and assumed it had happened.just because there is no footprint or trail,doesn't mean nothing happened.

    with kapernsky,they got a message saying that they were going to have their servers attacked,and then the attacked happened.problem was that the people from romania wo did it weren't very good because they weren't able to take or steal any important information from the servers.it was a simple SQL-injection on their servers.i don't even know why anyone uses SQL-servers anymore.they are so easily compromised.

  19. #19
    Mountain man green91's Avatar
    Join Date
    May 2003
    Location
    Dahlonega, Ga
    Posts
    8,975
    Rep Power
    44

    Default

    They pretty openly admitted it was lamer level trojans spread by the chinese via email that allowed these systems to be compromised.

    Its stupid to me that this is even happening. Any systems containing confidential information should be on a closed circuit network.

  20. #20
    iamgraphicdesign uproot's Avatar
    Join Date
    Mar 2005
    Location
    :noitacoL
    Age
    41
    Posts
    7,332
    Rep Power
    33

    Default

    Quote Originally Posted by guinness
    the same way that kapernsky,the anti-virus program company,knew they had been internally compromised...someone bragged about it somewhere or they saw the huge change in bandwidth traffic and assumed it had happened.just because there is no footprint or trail,doesn't mean nothing happened.

    It also can mean that nothing happened.

    So all of this is based on assumptions?

    You know what they say about people who assume...


    Change in bandwidth? It was probably just some dude downloading Wolverine.

  21. #21
    Mountain man green91's Avatar
    Join Date
    May 2003
    Location
    Dahlonega, Ga
    Posts
    8,975
    Rep Power
    44

    Default

    go gettem guy

  22. #22
    Don't ya like clowns? Paul's Avatar
    Join Date
    Feb 2001
    Age
    44
    Posts
    29,970
    Rep Power
    1059

    Default

    Quote Originally Posted by green91
    They pretty openly admitted it was lamer level trojans spread by the chinese via email that allowed these systems to be compromised.

    Its stupid to me that this is even happening. Any systems containing confidential information should be on a closed circuit network.
    i know this just sounds awful bizarre case b/c a good friend of mine was in charge of the Star Wars project facility in Japan - the infrastructure there seems light years ahead from what he is describing and it was a small facility.
    Paul "your bullshit makes the flowers grow"

  23. #23
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    Quote Originally Posted by green91
    They pretty openly admitted it was lamer level trojans spread by the chinese via email that allowed these systems to be compromised.

    Its stupid to me that this is even happening. Any systems containing confidential information should be on a closed circuit network.
    trojans?that would be like someone sending an email that contained a keylogger or curtain(background) and then accessing it through remote desktop or HyperTerminal or Minicom or TeraTerm.that's how most programs get unlocked or compromised is by a trojan.maybe that's how it happened,but i doubt it was that simple and them to not have seen that that was the way,lol.

  24. #24
    Mountain man green91's Avatar
    Join Date
    May 2003
    Location
    Dahlonega, Ga
    Posts
    8,975
    Rep Power
    44

    Default

    Yes im fully aware of what a trojan is and how they work. The conficker worm works in a similiar fashion and until recently wasn't detected by most antivirus or spyware programs even though its been around for quite some time. If you were to program your own trojan or worm, they are almost impossible to detect until they are known about and virus definitions can spot them.

  25. #25
    3.2L 24v DOHC One_Bad_SHO's Avatar
    Join Date
    Mar 2008
    Location
    Blacklanta
    Posts
    1,800
    Rep Power
    19

    Default

    Quote Originally Posted by green91
    go gettem guy
    I'm not your guy, friend!

  26. #26
    Mountain man green91's Avatar
    Join Date
    May 2003
    Location
    Dahlonega, Ga
    Posts
    8,975
    Rep Power
    44

    Default



    Quote Originally Posted by One_Bad_SHO
    I'm not your guy, friend!

  27. #27
    Don't ya like clowns? Paul's Avatar
    Join Date
    Feb 2001
    Age
    44
    Posts
    29,970
    Rep Power
    1059

    Default

    Quote Originally Posted by One_Bad_SHO
    I'm not your guy, friend!
    lol i'm not your friend, guy!



    Paul "your bullshit makes the flowers grow"

  28. #28
    3.2L 24v DOHC One_Bad_SHO's Avatar
    Join Date
    Mar 2008
    Location
    Blacklanta
    Posts
    1,800
    Rep Power
    19

    Default

    Quote Originally Posted by Paul
    lol i'm not your friend, guy!



    lol best episode ever

  29. #29
    Certified Gearhead
    Join Date
    Nov 2002
    Location
    Duluth, GA, us
    Posts
    713
    Rep Power
    22

    Default

    This just sounds like another Die Hard movie waiting to happen.
    GooKy

    Formerly known as wTnLeGeNd

  30. #30
    Senior Member SL65AMG's Avatar
    Join Date
    Mar 2005
    Age
    36
    Posts
    2,618
    Rep Power
    22

    Default

    Quote Originally Posted by Paul
    i'm just wondering how someone can hack in and steal 7 TB? do you know how much data transfer that is? what the fuck do they not monitor bandwidth?
    in the pentagon 7TB aint shit
    EF SQUAD FTMFW!!!!

  31. #31
    iamgraphicdesign uproot's Avatar
    Join Date
    Mar 2005
    Location
    :noitacoL
    Age
    41
    Posts
    7,332
    Rep Power
    33

    Default

    Quote Originally Posted by One_Bad_SHO
    I'm not your guy, friend!

    ......................LOL

  32. #32
    CCIE guinness's Avatar
    Join Date
    Jun 2005
    Location
    sugarloaf
    Posts
    472
    Rep Power
    19

    Default

    Quote Originally Posted by One_Bad_SHO
    I'm not your guy, friend!
    LMFAO!!!!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
About us
ImportAtlanta is a community of gearheads and car enthusiasts. It does not matter what kind of car or bike you drive, IA is an open community for any gearhead. Whether you're looking for advice on a performance build or posting your wheels for sale, you're welcome here!
Announcement
Welcome back to ImportAtlanta. We are currently undergoing many changes, so please report any issues you encounter with the site using the 'Contact Us' button below. Thank you!