Back / Index / Frames / Next

Return To Main MIRC Menu

  IRC Warfare  

Hacking Attacks

Hacking attacks as meant here do not include nukes and trojans, although those may be used as part of an over-all cracking attack. Hacking attacks are not likely to be attacks by hackers either. These are more likely to be the actions of a cracker.

When the definition between a hacker and a cracker seems cloudy to you remember to look at motivation. A true hacker is a tinkerer, one with a curious mind, they push to the limits and take things apart in order to further their own understandings.

The Cracker may be teaching himself to do more too, but his motive is to use what he learns, to exploit weaknesses and to do harm. Where the hacker is an explorer, the cracker is an exploiter. The hacker explores and takes notes, while the cracker explores and takes advantage.

Hackers don't leave tracks. About the only changes they make to any systems they get in to are to change the logs to hide that they got inside. Crackers are the ones who delete files, make changes, and generally need to show off that they finally managed to enter a machine.

People generally don't have complaints about hackers unless they are really concerned about anyone reading sensitive information. Crackers are a whole different matter however. Crackers are in the system to take advantage where and how they can.

Why do hackers take the rap for crackers you may ask. Well there are three reasons for it. First, early hackers while in it to learn were just as tempted as anyone else would be to find themselves with control of the transfers of money inside a financial institution's mainframe. Hackers can be tempted too and so some high profile cases came to light.

Second, Hollywood likes the term hacker. They don't want to use terms they have to explain. In a film they can say hacker and you immediately know roughly what the guy does. Hacker was the word in the papers when the screenplays were written and hackers is still the word known to the uninitiated today.

Third, Crackers like to be thought of as hackers. As with Hollywood, its the word people know. A hacker gets more respect than a cracker, and a cracker wants respect desperately. Even the no-brain flooders of IRC would like to be thought of as hackers. The Kewl d00dz even came up with the word haxor to try to boost their claim to hacker status.

In fact, about the only group that don't call themselves hackers are the actual hackers themselves. They use titles like systems analyst, security consultant and programmer. Microsoft and Netscape both rely on hackers to improve their systems, since these people have repeatedly found bugs that could be exploited.

I take these definitions from the latest versions of the terms. Like most others before I got into the net myself I used the term hacker to cover crackers as well. Many terms change over time due to the sheer weight of common useage, so it may be that the term hacker comes to be a catch-all term for all the groups once more.

What kinds of attacks are possible?

Well in general these have nothing at all to do with IRC, except where some scripts have bugs than can be exploited. A hacking attack relies on knowledge of your systems and software. Unfortunately a reasonably skilled IRC warrior can begin collecting information about you as soon as he has your ip address.

From an ip address you can easily resolve a hostname, which generally reveals the name of your ISP company at the least (sometimes also your account name). It may not be too hard to guess the location of your website from that if you have a space allocation from your isp.

They may try to crack your website at this point replacing its contents with whatever they wish. This requires some guesswork, sluething and a password-cracker, but it can be (and sometimes is) done. Most websites that get taken over by crackers and IRC warriors are actually gained through trojans however. Serious cracking is as rare as an intellectual IRC warrior.

E-mail accounts may also be cracked. Most passwords are not really very hard to guess. The vast majority of passwords are made of actual words so a program that simply tries every word in the dictionary would crack about 90% or more of all passwords.

A good password should, where possible contain both upper and lower case characters and numerals too. Luckily, most things make it easy for you to change passwords. So you can now go and change all those one real word passwords you have :o)

Seriously, if you have a hotmail account or free webspace, change those passwords tonight for something far harder to crack. These are the accounts that will be most easily found, along with your ISP. Make them safer now and you won't need to regret it later.


Choose a Subject from the list to continue. (Some subjects contain several tutorials.)

  1. What's New Here
  2. What is mIRC?
  3. Setting mIRC options
  4. Basic IRC chat
  5. Basic mIRC use
  6. MIRC Text Controls
  7. MIRC Commands
  8. MIRC Identifiers
  9. MIRC Variables
  10. MIRC If-Then-Else
  11. MIRC Aliases
  12. MIRC Popups
  13. MIRC Remote Events
  14. MIRC Multi-Scripts
  15. Script Writing Applet
  16. Downloads Area
  17. IRC Warfare *New
  18. Useful MIRC Links
  19. About The Author
 


Back to Top of Page

Return To Main MIRC Menu

Back / Index / Frames / Next

©1999 The Black Knight (Contact)