How realistic is Uplink?
Moderators: jelco, bert_the_turtle, Chris, Icepick, Rkiver
Hey guys,
I was just curious - technically speaking, how realistic is Uplink? I've been using computers for about 10 years, but I've never messed around with networking, administration, and what not. Does a real hacker do many of the same things, or are the steps much more complicated? I know they'd be at least slightly more complicated, because he wouldn't have a giant list of IP addresses, and he can't click on a map for bounces... but do real hackers have things like 'password breaker' and 'proxy bypass'?
I was just curious.
I was just curious - technically speaking, how realistic is Uplink? I've been using computers for about 10 years, but I've never messed around with networking, administration, and what not. Does a real hacker do many of the same things, or are the steps much more complicated? I know they'd be at least slightly more complicated, because he wouldn't have a giant list of IP addresses, and he can't click on a map for bounces... but do real hackers have things like 'password breaker' and 'proxy bypass'?
I was just curious.
Krieg
- NeoThermic
- Introversion Staff
- Posts: 6256
- Joined: Sat Mar 02, 2002 10:55 am
- Location: ::1
- Contact:
I'm having a sense of Deja vu here...
The only tool that is some what real is the IP lookup tool. That does exsist in real life (DNS lookups is basically it).
As for the rest? Either they are way to simplistic, or don't exsist for reasons that are too lenghty to mention. (but just think about the fact that if you were to disable the proxy, you would loose a connection, and most firewalls lock internet control if they are taken offline without user interaction.)
Thats just general stuff. As for the password breaker, you can't really do that to a real system (although I can say that SMB shares on 9x systems can be cracked the same way...). To password break on any system, you need to brute force it in length, as in for LM hashes, you just do the first 8 letters, so you crack at a, then b, then escilate to aaaaaaaa, aaaaaaab, etc. Eventually you get the password, but cracking takes literly days rather than hours (although LM hashes are a bad example, I can crack my password in 23 hours (thats 14 characters, upper case, lower case, and a few numbers)).
I'll stop there before I illeterate the list that you don't want to see.
NeoThermic
The only tool that is some what real is the IP lookup tool. That does exsist in real life (DNS lookups is basically it).
As for the rest? Either they are way to simplistic, or don't exsist for reasons that are too lenghty to mention. (but just think about the fact that if you were to disable the proxy, you would loose a connection, and most firewalls lock internet control if they are taken offline without user interaction.)
Thats just general stuff. As for the password breaker, you can't really do that to a real system (although I can say that SMB shares on 9x systems can be cracked the same way...). To password break on any system, you need to brute force it in length, as in for LM hashes, you just do the first 8 letters, so you crack at a, then b, then escilate to aaaaaaaa, aaaaaaab, etc. Eventually you get the password, but cracking takes literly days rather than hours (although LM hashes are a bad example, I can crack my password in 23 hours (thats 14 characters, upper case, lower case, and a few numbers)).
I'll stop there before I illeterate the list that you don't want to see.
NeoThermic
Aww, but I wanted to hear it all. I figured most of it was bogus. Oh well. Still fun.
Edit: btw... you said you basically have to try aaaaaa, then aaaaab, and so forth... wouldn't most systems that have any security system that's worth anything lock the login once you'd hit it with three or four bad passwords? Kind of like an ATM card - three strikes, and the card is dead for a day.
(Edited by Krieg at 3:41 pm on Mar. 17, 2004)
Edit: btw... you said you basically have to try aaaaaa, then aaaaab, and so forth... wouldn't most systems that have any security system that's worth anything lock the login once you'd hit it with three or four bad passwords? Kind of like an ATM card - three strikes, and the card is dead for a day.
(Edited by Krieg at 3:41 pm on Mar. 17, 2004)
Krieg
- NeoThermic
- Introversion Staff
- Posts: 6256
- Joined: Sat Mar 02, 2002 10:55 am
- Location: ::1
- Contact:
You can set up security restrictions like that. However, some systems just add a reporting delay after a failure, say I added... 20 seconds delay before they can try the next combo, that limits them to three combos a minuite. At that rate, they would never be able to crack a password that is sufficently long enough, and with a password expriation time, it would be changed every so often, thus making the attempt pointless.
NeoThermic
NeoThermic
-
- level3
- Posts: 324
- Joined: Thu Jun 06, 2002 5:15 pm
- Contact:
Well most admins would wonder why there were so many trys at the users password
keep your computer locked up or its gonna be broken.
visit my forum: www.fightforinfo.tk
visit my forum: www.fightforinfo.tk
-
- level5
- Posts: 11553
- Joined: Wed Jul 10, 2002 7:44 pm
- Location: Nashville, TN
- Contact:
/me goes for the really childish one here.
Hey everyone has to make "logs" :p
Ok you can hit me now for that one.
(Edited by Rkiver at 8:33 pm on Mar. 17, 2004)
Hey everyone has to make "logs" :p
Ok you can hit me now for that one.
(Edited by Rkiver at 8:33 pm on Mar. 17, 2004)
Uplink help: Read the FAQ
-
- level3
- Posts: 324
- Joined: Thu Jun 06, 2002 5:15 pm
- Contact:
-
- level3
- Posts: 324
- Joined: Thu Jun 06, 2002 5:15 pm
- Contact:
-
- level2
- Posts: 168
- Joined: Mon Mar 11, 2002 11:53 am
- Contact:
some of the 'hacks' major corporations suffer is from employee's being pissed off for some reason and releasing the data, (or even plain old corruption),
Since we cannot know all that there is to be known about anything, we ought to know a little about everything. Blaise Pascal (1623 - 1662)
<damn 255 char sig limit>
<damn 255 char sig limit>
Who is online
Users browsing this forum: No registered users and 36 guests