Return to site

Hacking And Spy Tools For Script Kiddies Tools

broken image


  1. Hacking And Spy Tools For Script Kiddies Tools And Supplies
  2. Hacking And Spy Tools For Script Kiddies Tools Free

At the inception of the computer age, computer hacking was limited to elite hackers – those with high-level computer science knowledge. Many of them, known as white hat hackers or blue hat hackers, aimed to strengthen computer systems security through finding weaknesses. PCMag.com describes white hat hackers as 'people who break into a computer system and inform the company that they have done so. They are either concerned employees or security professionals who are paid to find vulnerabilities. White hat hackers are the ‘good guys.''

Jan 31, 2018 The software, posted publicly on GitHub this week by someone calling themselves Vector, is called AutoSploit. It makes mass hacking exceedingly easy. After collecting targets via the Shodan search engine – an API key is required – the Python 2.7 script attempts to run Metasploit modules against them. A script kiddie in my eyes is someone that completely uses tools created by some else AND doesn't under stand how it works. Especially with encryption I don't program any tools that I use for security even though I have programmed various encryption algorithms for research/understanding. In programming and hacking cultures, a script kiddie, skiddie, or skid is an unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites.It is generally assumed that most script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective. Some people may say that a real hacker does not use any Hacking tools, who use the tools coded by others is a script kiddie. I will say this is their misconception. An operating system is also a software or tool for a hacker. If the hacker does not have a target software, then he has nothing to hack.

But the days of a hacking culture dominated by good guys are long gone. A report produced by usaid.gov states that 'cyber crime has been increasing in complexity and financial costs since corporations started to utilize computers in the course of doing business. As technology increases between governments that are involved in international business, criminals have realized that this is a cost-effective method to make money.'

Hacking And Spy Tools For Script Kiddies Tools

It was the tool's ability to manifest the intent of the user that was at issue. Suddenly, thousands of script kiddies with neither talent nor an ethical compass were able to penetrate networks far more easily. To parrot anti-gun control lobbyists, guns don't kill people, people kill people. Similarly, hacking tools don't cause damage to systems.

Over the decades, cybercrime has evolved, branching out into many strains. There are black hat hackers – (the criminally motivated). crackers, (those breaking into systems to steal information), hacktivists, (infiltrators of computer systems to use them as platforms for public movements), and script kiddies, defined by WiseGeek.com as 'teenagers who use readily available tools written by experienced hackers to deface websites or break into computer systems, usually done for peer recognition and attention.'

As computer technology has grown integral to personal and business endeavors, and as dependency on computers has increased, the impacts of cyberattacks have escalated. NetStandard.com reported that in 2014, the US was hit with 5,000 cybersecurity attacks every hour, and the Pentagon sees 10 million hacking attempts per day. Mark VanOrden, the CIO of the Utah Department of Technology Services reports on KSL.com that 'two years ago, the average number of cyber attacks was approximately one million malicious attacks per day. Now, the attacks are up to 20 million per day,' and this just within Utah's secure government networks.

Cyberattacks pose a greater danger now than in the past because, as technology improves, the technology used to conduct cybercrimes becomes more accessible, easier to use, more effective, and more dangerous. According to cybersecurity expert Lloyd Borrett, 'not all cybercriminals have sophisticated computer and networking skills. Today, the vast majority of cybercriminals simply use the malicious tools and kits marketed for profit by those creating them.' He goes on to say, 'in effect, most cybercriminals are simply up-to-date script kiddies, but now they're motivated by profit, not notoriety. For about US$400, almost anyone can buy appropriate scripts and after about four hours of working through the instructions, be fully set up as a cyber-criminal. Scary stuff.'

Script kiddies, motivated by peer competition and oftentimes oblivious to the implications of their hacking, are capable of wreaking havoc using readily available resources such as password cracking tools, packet sniffers, denial of service (DOS) tools, port scanners, and integrated attack tools. Computerworld.com quotes Mandy Andress, president of ArcSec Technologies, Inc., as stating, 'The fact that script kiddies will blindly launch scripts against large IP blocks without any thought as to who they are attacking makes them dangerous, especially for those administrators who do not take security seriously.'

Lil Bub may become the first Script Kitty

Caliper Guide Pins. If the caliper is not free to move, the culprit might be bent or binding mounting. How to install disc brake anti rattle clips brakes. Step 13: Install Caliper Bracket & Brake Pads. Install the caliper bracket and torque the caliper bracket bolts to the manufacturer's specifications. Then, install the new pads. Apply a small amount of brake lube on the back of the pads where they contact the caliper, as shown in the photo below. Thanks for your response. The information that you sent was great the problem is that all of it was for the rear brake pad installation which I am very familiar with. I have attached a picture of the clips that I need installation instructions for. Once again thanks for your help and timely response. How to Install the Anti Rattle Clip on Brake Pads Step 1. Unbolt the brake caliper from its mounting point using a socket wrench. Turn the caliper over and remove the. Place the anti-rattle clip between the new brake pads. Align the holes on the brake pads' metal backing plates.

Script kiddies, having little computer science training or skill, can gain basic knowledge of hacking resources such as Kali Linux, Armitage, and Metasploit, and they can even contribute to the attacks of more capable, more dangerous elite hackers, sometimes without even knowing it. According to Computerworld.com, 'script kiddies—mostly teen Web page defacers—often unwittingly aid and abet serious criminals through their reckless probing and compromising of systems… the more sophisticated criminals are then able to exploit the work of the script kiddies while remaining anonymous.'

Using phishing schemes such as link manipulation, website forgery, and pop-ups, script kiddies are capable of inflicting major damage. In June 2017, ZDNet.com reports that script kiddies were likely responsible for a major diplomatic crisis when a television station in Qatar was compromised and false information planted. According to the website, 'the hackers were reportedly able to take complete control of the news agency's web server, content management system (CMS), and all social media accounts. The hack itself was ‘nothing special,' but still was able to compromise the ‘entire QNA.''

The impacts of cybercrime committed by script kiddies and more proficient hackers are not only economical – there are psychological and social impacts as well. Endnotes.com points out that social and psychological professionals are called upon to 'help victims cope with the fallout from identity theft, sexual abuse, or financial ruin.'

As computing technology continues to evolve, so will hacking and the infiltration tools accessible to cybercriminals, whether low-skilled script kiddies or elite hackers. Steve Taylor, contributor to Forbes.com, reports that 'from 2013 to 2015 the cybercrime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019. Juniper research recently predicted that the rapid digitization of consumers' lives and enterprise records will increase the cost of data breaches to 2.1 trillion globally by 2019.'

Tools

To protect yourself, Anthillonline.com recommends having Internet security in place on all computer devices, limiting users, and utilizing strong passwords. They also suggest that 'giving up administrator privileges is a simple way to remove 90% of the risk of malware.'

Organizations aiming to secure themselves against cyberattacks can take proactive measures, such as running run phishing exercises, risk assessments, audits, penetration tests, implementing digital forensics services, and training personnel. Alpine Security can assist with cybersecurity assessment and testing services as well as cybersecurity training, offering trainers who have practical, real-world experience. Their trainers work as penetration testers, incident response handlers, forensic analysts, auditors, etc. We offer both Live In-Person and Live Online certification training. Our courses include the exam voucher and have an exam pass guarantee. We guarantee findings with our penetration testing and phishing campaigns. We are based in the Greater St. Louis area and add value to clients worldwide.

and Script Kiddies!

History

Hacking And Spy Tools For Script Kiddies Tools

Over time, technology has crept closer and closer to the street. By 2005,many countries were talking about 'a browser on every corner and email inevery home;' in 2006-7, IBM made that a reality in Ethiopia, striking fearinto the super powers' hearts that they'd lost the 'Net Race.' By 2010,every corp-nation and nation-corp had begun such efforts. The cities ofNorth America, and at least most of the cities of Europe, are completelywired, and virtually all of South America and Africa are as well. Outsidethe cities, most small towns and villages have at least a few computers,with wireless networks for the company bigwigs on vacation. Asia is moreconflicted, with Japan garnering 'Most Wired Nation' status several years ina row, China all but forbidding access, while Indochina and the Phillipinesare inconsistent, fighting off computers and the social homogeneity thatcomes with them to the last man, or else throwing all of their money intotraining their best and brightest to hack the people who would own them.

The result of this, of course, has been an explosion in the script kiddypopulation, because not only can any two-bit hack with something to proveget software to do the dirty work of finding weaknesses automatically, butany two-bit hack in any of dozens of countries can getthat software. As in all things, the more two-bit hacks there are, the moreartists, fortunately.

For every two hundred script kiddies, there's one guy who wrote thoseautomated programs back when he was script kiddie, and has since moved on towork for a corporation. Such white hats are viewed with derision, even bythe non-hacker community -- going from writing kiddie scripts to corporate'Net muscle is a step up economically, but a step down socially. For everyhundred white hats, there's a black hat that hasn't sold out yet, and forevery 50 black hats, there's a hacker that was never in it for the easymoney.

Many of the best hackers grew up on the street -- too small to live offmugging, too smart to sell their bodies, but who managed to get on the webenough to learn more. Some of them stole credit card numbers to buygroceries online, some of them faked (or stole from someone else) an onlineID to get an online job. They are the urchins that hang around theterminals, but don't ask for change, or the gangers that try to get turfwith terminals on it. For most of them, their only acquaintance withAuthority is the local cop's stungun. They typically have very littleformal education, and they rarely bother 'expanding their minds.' Butthey're better with computers than all the white hats with fancy collegedegrees, and they might even know it.

Being one of the elite, and having access to hackerly skills, equipment, andfriends, is an Unusual Background (Elite) for 25 points. Being as'kiddie is the not-so Unusual Background (S'kiddie) for 10 points.You like to play with the computer when your parents are asleep.

The Computers

Interfaces

Immersive environments are restricted to people willing to go through thesurgery and training that datajacks require, or else deal with the responsepenalties of external input devices (such as wired gloves). For games, thedatajack is widely regarded as essential; for other people, simplyinterested in enjoying online environments, private voice chats, and threedimensional images, the delay is more than acceptable. They are generallynot well regarded as more productive than voice control and two-dimensionaldisplays (unless there is some legitimate relevance to three-dimensionaldata).

As such, computers able to follow relatively complex commands as verbalsentences are in use in more and more offices, and Ethiopia/IBM haspioneered 'industrial' applications, such as 'do what I mean' voice commandprocessing on street corners, bars, and other loud places. Voice-controlledcomputers vary in use from being the future PDA, to letting executiveslounge back in their comfy leather chairs while evaluating business plans,and records, to scientists verbally describing the tests they want to runsamples through.

Most people have always used only a fraction of the power their computershave; by 2025, the tide of Network Computers is once again rising. Mostpeople are quite content using touch screens and keyboards with microphonesto send/receive voicEmail, follow their favorite hobbies online indiscussion groups, chat rooms, and libraries. There are even timelessly fungames available on these systems, although all the Real Gamers(tm) play inimmersive environments.

Some people still use more archaic interfaces, such as keyboards andmonitors (without the ability to function as a touch screen). However, given the growing popularity of three dimensional sites, and theentrenched popularity of two dimensional interfaces, it's a wonder nobodyhas put them out of their misery.

The Computers Themselves

There is dizzying variety in computers; red ones, blue ones, smart ones,dumb ones, new ones, old ones. They typically talk to each other throughIPv6/IPSEC, with all kinds of other protocols built on top. Every system'sinterface is a little different, and almost every computer manufacturerdiddles around with the systems software. The ISP market has, in mostplaces, become government regulated, in large part as a response to the newcorp-nations' clear superiority in the 'Net Race and their use of in-houseproviders for their adopted nations; in the US, each state has developed itsown laws for regulating the industry (or not).

Computer speed doesn't matter and isn't noticed; software developers havefinally given up on spurring next year's hardware sales with their newsoftware, because most things have been handled already. Except in 'hard'computing environments, such as weather forecasting, chemical and biologicalmodelling, etc., computers are just furniture. People who are not opposedto either the potential (and still largely unrecognized andunsubstantiated) risk of sticking a lot of radio emmissions next to theirhead, having computers 'do it for them,' or else who are too dirt-poor toafford it, have earcomps capable of handling voicEmail, standard schedulingtasks, and phone calls. In most places, as well, ISPs provide freebasically functional applications on their servers for customers to use; asan extension, since most users don't buy their own software anymore, thesoftware industry is unofficially regulated (as companies that piss offthe ISP lose the fat contracts off of which most of them live).

As for the network, well.. there are a wide variety of networks,not just the Internet. Most of them are built upon the sameprotocols, with their own layers and software on top. Others use nothingspecial, but use strict encryption and routing policies to delineatethemselves. Virtually everything is wireless, and wireless bandwidth andlatency have dropped remarkably in relation to wired connectivity, sincewired connectivity reached a plateau 10 years ago. Only people terriblyconcerned about security still use wires, and fat shielded wires at that.At the same time, wireless 'jamming' technology has also developed quitestrongly, in order to restrict and monitor network access. For instance,the networks in many corporate offices end get killed at the borders oftheir buildings, to prevent snooping or free rides.

Hacking Rules

Hacking Skills

Computer Interface (variable)

This is the ability to get things done using a particular type of computerinterface. It includes figuring out program functions, getting programs torun, etc. This is the TRULY basic user skill. This skill must be taken foreach type of interface (see below).

Using any given interface still requires familiarity to use well, as thespecific commands will be different. You are automatically familiar with onesystem upon taking the skill, and you are also automatically familiar withany system for which you have the O/S skill.

Mechanical/Binary (MA, no default, unfamiliar -5):Punch Cards, Switch Flipping
Command Prompt (ME, no default, unfamiliar -4):Linear Typed Text Commands, Esoteric Verbal Commands: DOS, Unix, VMS
Iconic (ME, IQ-4, unfamiliar -3):Windowing, Point & Click Command Selection: MacOS, MS Windows, Modern Linux
Conversational (ME, IQ-3, unfamiliar -2):Full Language Parser But Limited Understanding
Immersive (ME, IQ-2, unfamiliar -1):Interactive House Automation, POV Enhancement
O/S (MA, Computer Interface-4, prereq appropriate Computer Interface)

This is the ability to fiddle with the system running your computer. Thisincludes things like setting up a network, tweaking/tuning for performance,installing and checking software, modifying your setup, etc. For operatingsystems which include administrative powers, this includes knowledge of howto use those administrative powers. This skill must be taken separately forevery sperating system.System Security (MH, IQ-6, prereq any O/S skill)

This is training in the mindset and logical approach to computer securityrequired to run a tight ship. This is used to secure a machine (byanticipating possible vectors of attack and putting preventative measures inplace), find signs of hackers (and trace them), find security breaches (andpatch them) and so on.

All operating systems come with a default security level (Windows is about a10, BSD is about a 14). You can roll System Security when firstsetting up the machine to improve this; each 2 points you make the roll bygives a +1, to a maximum final value equal to your own skill or theoperating system's security +1, whichever is higher, to the security levelof the system. If your O/S skill is lower than your SystemSecurity, subtract -1 per 2 points of difference. This takes an amountof time equal to the bonus to the system's security in hours. You mayreduce the bonus to speed things up.

You can also reduce the security. This requires no roll - just set the levelto whatever lower level you want.

As new holes in systems are discovered, the security of the systemeffectively decreases; every month that goes by without tightening down asystem, the security level of the system decreases by 1 (down to a minimumof half the system's base security). You can eliminate this loss byupdating the system; roll System Security every time you go throughthe security of the system, and for every two points by which you make yourroll negates 1 month's decline. This can be done at most once a week, andtakes 4 hours.

Say a system has been sitting in the machine room for a year withoutupdates, because the admin you replaced was lazy. If you immediatelystarting fixing it up, and were able to consistently make your roll by 6points, it would take 20 hours spread out over 5 weeks to bring the securityback up to its initial point (4 weeks of reducing the penalty by 3 eachweek, at which point a month has passed and the security is reduced by 1,requiring just a little more time..). It could take less time, but thenyou're not being very conscientious, are you?Hacking (MH, System Security-5, prereq appropriate O/S skill)

This is the ability to find loopholes, cracks and security holes in amachine, whether it is a software security issue or a hardware physicallimit. By exploiting these holes and limitations, you can crash the machine,compromise information stored on it, control it to do things for you, gainadministrative access, etc.

To use Hacking, roll an opposed contest with the target machine'sSecurity level. The default time this takes is 4 hours; each point you beatthe machine by halves this time (so if you beat it by five, it takes youabout 8 minutes). If you lose the roll, you can not try again for another 4hours. Also if you lose the roll, the admin for the system can make aSystem Security Pj trailers vin location. roll to detect your attempts (she can also make aroll any time she decides to check the system for attempts to hack in).

Once you have gotten in and done whatever it is you chose to do, you canmake a roll to cover your tracks. This is handled in exactly the same way,except that you only get to roll once, and the base time is 1 hour (insteadof 4 hours). The GM should mark down how much you made it by - the admin hasto beat this to detect your attempt later.

You can also cover your tracks as you go, although this is less efficient.Take a penalty to your roll to penetrate the system; the admin then takes anidentical penalty whenever she finally attempts to detect you. Sealand t 12 manual. Note thatyou must still roll your Hacking to cover tracks as you leave, so that finaltraces are erased (and the GM has a number to beat later).

Once you have penetrated a system, you may enter it at will afterward untilthe hole you used gets patched. Holes can get patched in a number of ways:the admin may discover where you snuck in and fix the problem, the OScreators may issue a program-level patch, the hole may have been dependanton hardware limitations which are removed in the next upgrade cycle, etc.Reversing (ME, Programming-5, prereq appropriate programparadigm)

This is the ability to analyze machine code and/or translate the machinecode into its original programming language. A small program (<1000 lines)can take several hours of dedicated work, but for a dedicated reverser theend outcome is rarely in doubt. Assume 1 hour per 100 lines of code,although obfuscation techniques can double or triple the time required.

Prereq: Note that basic machine code is a programming language, and can beused in lieu of any other language, BUT takes four times as long.

Rolling: Mainly, this is to determine how well you do. If you fail, itsimply means that you misunderstood some parts of the code. The better yousucceed, the more you 'own' the code in terms of knowing its little quirksand whatnot.

Hacking And Spy Tools For Script Kiddies Tools And Supplies

Using Scripts (for the K1dd13z in the audience)

Hacking and spy tools for script kiddies tools online

A Hacker can encode a particular hack into a script which does the workautomatically. This requires programming, but creates an automated programwhich uses its own Hacking skill for a specific task ('Get rootaccess on a targetted Windows NT machine', for example). Once a Script iswritten, it can be used by anyone who gets their hands on it. Unfortunately, as scripts spread, occasionally admins find them. Wheneveran admin tightens down security on a system, he discovers and fixes theholes exploited by scripts (rendering them useless against that system) thatachieved widespread distribution on or before the time to which the adminupdated the system.

Going back to our admin in the previous example, in the first week hediscovered the holes exploited by scripts that were easily accessible 9months ago; in the second week, he closed the gap to half a year. Inanother two weeks, only relatively new and secret scripts had a chance.Hackers who keep a lid on their scripts get much more benefit out of them.

Hacking and spy tools for script kiddies tools download

It was the tool's ability to manifest the intent of the user that was at issue. Suddenly, thousands of script kiddies with neither talent nor an ethical compass were able to penetrate networks far more easily. To parrot anti-gun control lobbyists, guns don't kill people, people kill people. Similarly, hacking tools don't cause damage to systems.

Over the decades, cybercrime has evolved, branching out into many strains. There are black hat hackers – (the criminally motivated). crackers, (those breaking into systems to steal information), hacktivists, (infiltrators of computer systems to use them as platforms for public movements), and script kiddies, defined by WiseGeek.com as 'teenagers who use readily available tools written by experienced hackers to deface websites or break into computer systems, usually done for peer recognition and attention.'

As computer technology has grown integral to personal and business endeavors, and as dependency on computers has increased, the impacts of cyberattacks have escalated. NetStandard.com reported that in 2014, the US was hit with 5,000 cybersecurity attacks every hour, and the Pentagon sees 10 million hacking attempts per day. Mark VanOrden, the CIO of the Utah Department of Technology Services reports on KSL.com that 'two years ago, the average number of cyber attacks was approximately one million malicious attacks per day. Now, the attacks are up to 20 million per day,' and this just within Utah's secure government networks.

Cyberattacks pose a greater danger now than in the past because, as technology improves, the technology used to conduct cybercrimes becomes more accessible, easier to use, more effective, and more dangerous. According to cybersecurity expert Lloyd Borrett, 'not all cybercriminals have sophisticated computer and networking skills. Today, the vast majority of cybercriminals simply use the malicious tools and kits marketed for profit by those creating them.' He goes on to say, 'in effect, most cybercriminals are simply up-to-date script kiddies, but now they're motivated by profit, not notoriety. For about US$400, almost anyone can buy appropriate scripts and after about four hours of working through the instructions, be fully set up as a cyber-criminal. Scary stuff.'

Script kiddies, motivated by peer competition and oftentimes oblivious to the implications of their hacking, are capable of wreaking havoc using readily available resources such as password cracking tools, packet sniffers, denial of service (DOS) tools, port scanners, and integrated attack tools. Computerworld.com quotes Mandy Andress, president of ArcSec Technologies, Inc., as stating, 'The fact that script kiddies will blindly launch scripts against large IP blocks without any thought as to who they are attacking makes them dangerous, especially for those administrators who do not take security seriously.'

Lil Bub may become the first Script Kitty

Caliper Guide Pins. If the caliper is not free to move, the culprit might be bent or binding mounting. How to install disc brake anti rattle clips brakes. Step 13: Install Caliper Bracket & Brake Pads. Install the caliper bracket and torque the caliper bracket bolts to the manufacturer's specifications. Then, install the new pads. Apply a small amount of brake lube on the back of the pads where they contact the caliper, as shown in the photo below. Thanks for your response. The information that you sent was great the problem is that all of it was for the rear brake pad installation which I am very familiar with. I have attached a picture of the clips that I need installation instructions for. Once again thanks for your help and timely response. How to Install the Anti Rattle Clip on Brake Pads Step 1. Unbolt the brake caliper from its mounting point using a socket wrench. Turn the caliper over and remove the. Place the anti-rattle clip between the new brake pads. Align the holes on the brake pads' metal backing plates.

Script kiddies, having little computer science training or skill, can gain basic knowledge of hacking resources such as Kali Linux, Armitage, and Metasploit, and they can even contribute to the attacks of more capable, more dangerous elite hackers, sometimes without even knowing it. According to Computerworld.com, 'script kiddies—mostly teen Web page defacers—often unwittingly aid and abet serious criminals through their reckless probing and compromising of systems… the more sophisticated criminals are then able to exploit the work of the script kiddies while remaining anonymous.'

Using phishing schemes such as link manipulation, website forgery, and pop-ups, script kiddies are capable of inflicting major damage. In June 2017, ZDNet.com reports that script kiddies were likely responsible for a major diplomatic crisis when a television station in Qatar was compromised and false information planted. According to the website, 'the hackers were reportedly able to take complete control of the news agency's web server, content management system (CMS), and all social media accounts. The hack itself was ‘nothing special,' but still was able to compromise the ‘entire QNA.''

The impacts of cybercrime committed by script kiddies and more proficient hackers are not only economical – there are psychological and social impacts as well. Endnotes.com points out that social and psychological professionals are called upon to 'help victims cope with the fallout from identity theft, sexual abuse, or financial ruin.'

As computing technology continues to evolve, so will hacking and the infiltration tools accessible to cybercriminals, whether low-skilled script kiddies or elite hackers. Steve Taylor, contributor to Forbes.com, reports that 'from 2013 to 2015 the cybercrime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019. Juniper research recently predicted that the rapid digitization of consumers' lives and enterprise records will increase the cost of data breaches to 2.1 trillion globally by 2019.'

To protect yourself, Anthillonline.com recommends having Internet security in place on all computer devices, limiting users, and utilizing strong passwords. They also suggest that 'giving up administrator privileges is a simple way to remove 90% of the risk of malware.'

Organizations aiming to secure themselves against cyberattacks can take proactive measures, such as running run phishing exercises, risk assessments, audits, penetration tests, implementing digital forensics services, and training personnel. Alpine Security can assist with cybersecurity assessment and testing services as well as cybersecurity training, offering trainers who have practical, real-world experience. Their trainers work as penetration testers, incident response handlers, forensic analysts, auditors, etc. We offer both Live In-Person and Live Online certification training. Our courses include the exam voucher and have an exam pass guarantee. We guarantee findings with our penetration testing and phishing campaigns. We are based in the Greater St. Louis area and add value to clients worldwide.

and Script Kiddies!

History

Over time, technology has crept closer and closer to the street. By 2005,many countries were talking about 'a browser on every corner and email inevery home;' in 2006-7, IBM made that a reality in Ethiopia, striking fearinto the super powers' hearts that they'd lost the 'Net Race.' By 2010,every corp-nation and nation-corp had begun such efforts. The cities ofNorth America, and at least most of the cities of Europe, are completelywired, and virtually all of South America and Africa are as well. Outsidethe cities, most small towns and villages have at least a few computers,with wireless networks for the company bigwigs on vacation. Asia is moreconflicted, with Japan garnering 'Most Wired Nation' status several years ina row, China all but forbidding access, while Indochina and the Phillipinesare inconsistent, fighting off computers and the social homogeneity thatcomes with them to the last man, or else throwing all of their money intotraining their best and brightest to hack the people who would own them.

The result of this, of course, has been an explosion in the script kiddypopulation, because not only can any two-bit hack with something to proveget software to do the dirty work of finding weaknesses automatically, butany two-bit hack in any of dozens of countries can getthat software. As in all things, the more two-bit hacks there are, the moreartists, fortunately.

For every two hundred script kiddies, there's one guy who wrote thoseautomated programs back when he was script kiddie, and has since moved on towork for a corporation. Such white hats are viewed with derision, even bythe non-hacker community -- going from writing kiddie scripts to corporate'Net muscle is a step up economically, but a step down socially. For everyhundred white hats, there's a black hat that hasn't sold out yet, and forevery 50 black hats, there's a hacker that was never in it for the easymoney.

Many of the best hackers grew up on the street -- too small to live offmugging, too smart to sell their bodies, but who managed to get on the webenough to learn more. Some of them stole credit card numbers to buygroceries online, some of them faked (or stole from someone else) an onlineID to get an online job. They are the urchins that hang around theterminals, but don't ask for change, or the gangers that try to get turfwith terminals on it. For most of them, their only acquaintance withAuthority is the local cop's stungun. They typically have very littleformal education, and they rarely bother 'expanding their minds.' Butthey're better with computers than all the white hats with fancy collegedegrees, and they might even know it.

Being one of the elite, and having access to hackerly skills, equipment, andfriends, is an Unusual Background (Elite) for 25 points. Being as'kiddie is the not-so Unusual Background (S'kiddie) for 10 points.You like to play with the computer when your parents are asleep.

The Computers

Interfaces

Immersive environments are restricted to people willing to go through thesurgery and training that datajacks require, or else deal with the responsepenalties of external input devices (such as wired gloves). For games, thedatajack is widely regarded as essential; for other people, simplyinterested in enjoying online environments, private voice chats, and threedimensional images, the delay is more than acceptable. They are generallynot well regarded as more productive than voice control and two-dimensionaldisplays (unless there is some legitimate relevance to three-dimensionaldata).

As such, computers able to follow relatively complex commands as verbalsentences are in use in more and more offices, and Ethiopia/IBM haspioneered 'industrial' applications, such as 'do what I mean' voice commandprocessing on street corners, bars, and other loud places. Voice-controlledcomputers vary in use from being the future PDA, to letting executiveslounge back in their comfy leather chairs while evaluating business plans,and records, to scientists verbally describing the tests they want to runsamples through.

Most people have always used only a fraction of the power their computershave; by 2025, the tide of Network Computers is once again rising. Mostpeople are quite content using touch screens and keyboards with microphonesto send/receive voicEmail, follow their favorite hobbies online indiscussion groups, chat rooms, and libraries. There are even timelessly fungames available on these systems, although all the Real Gamers(tm) play inimmersive environments.

Some people still use more archaic interfaces, such as keyboards andmonitors (without the ability to function as a touch screen). However, given the growing popularity of three dimensional sites, and theentrenched popularity of two dimensional interfaces, it's a wonder nobodyhas put them out of their misery.

The Computers Themselves

There is dizzying variety in computers; red ones, blue ones, smart ones,dumb ones, new ones, old ones. They typically talk to each other throughIPv6/IPSEC, with all kinds of other protocols built on top. Every system'sinterface is a little different, and almost every computer manufacturerdiddles around with the systems software. The ISP market has, in mostplaces, become government regulated, in large part as a response to the newcorp-nations' clear superiority in the 'Net Race and their use of in-houseproviders for their adopted nations; in the US, each state has developed itsown laws for regulating the industry (or not).

Computer speed doesn't matter and isn't noticed; software developers havefinally given up on spurring next year's hardware sales with their newsoftware, because most things have been handled already. Except in 'hard'computing environments, such as weather forecasting, chemical and biologicalmodelling, etc., computers are just furniture. People who are not opposedto either the potential (and still largely unrecognized andunsubstantiated) risk of sticking a lot of radio emmissions next to theirhead, having computers 'do it for them,' or else who are too dirt-poor toafford it, have earcomps capable of handling voicEmail, standard schedulingtasks, and phone calls. In most places, as well, ISPs provide freebasically functional applications on their servers for customers to use; asan extension, since most users don't buy their own software anymore, thesoftware industry is unofficially regulated (as companies that piss offthe ISP lose the fat contracts off of which most of them live).

As for the network, well.. there are a wide variety of networks,not just the Internet. Most of them are built upon the sameprotocols, with their own layers and software on top. Others use nothingspecial, but use strict encryption and routing policies to delineatethemselves. Virtually everything is wireless, and wireless bandwidth andlatency have dropped remarkably in relation to wired connectivity, sincewired connectivity reached a plateau 10 years ago. Only people terriblyconcerned about security still use wires, and fat shielded wires at that.At the same time, wireless 'jamming' technology has also developed quitestrongly, in order to restrict and monitor network access. For instance,the networks in many corporate offices end get killed at the borders oftheir buildings, to prevent snooping or free rides.

Hacking Rules

Hacking Skills

Computer Interface (variable)

This is the ability to get things done using a particular type of computerinterface. It includes figuring out program functions, getting programs torun, etc. This is the TRULY basic user skill. This skill must be taken foreach type of interface (see below).

Using any given interface still requires familiarity to use well, as thespecific commands will be different. You are automatically familiar with onesystem upon taking the skill, and you are also automatically familiar withany system for which you have the O/S skill.

Mechanical/Binary (MA, no default, unfamiliar -5):Punch Cards, Switch Flipping
Command Prompt (ME, no default, unfamiliar -4):Linear Typed Text Commands, Esoteric Verbal Commands: DOS, Unix, VMS
Iconic (ME, IQ-4, unfamiliar -3):Windowing, Point & Click Command Selection: MacOS, MS Windows, Modern Linux
Conversational (ME, IQ-3, unfamiliar -2):Full Language Parser But Limited Understanding
Immersive (ME, IQ-2, unfamiliar -1):Interactive House Automation, POV Enhancement
O/S (MA, Computer Interface-4, prereq appropriate Computer Interface)

This is the ability to fiddle with the system running your computer. Thisincludes things like setting up a network, tweaking/tuning for performance,installing and checking software, modifying your setup, etc. For operatingsystems which include administrative powers, this includes knowledge of howto use those administrative powers. This skill must be taken separately forevery sperating system.System Security (MH, IQ-6, prereq any O/S skill)

This is training in the mindset and logical approach to computer securityrequired to run a tight ship. This is used to secure a machine (byanticipating possible vectors of attack and putting preventative measures inplace), find signs of hackers (and trace them), find security breaches (andpatch them) and so on.

All operating systems come with a default security level (Windows is about a10, BSD is about a 14). You can roll System Security when firstsetting up the machine to improve this; each 2 points you make the roll bygives a +1, to a maximum final value equal to your own skill or theoperating system's security +1, whichever is higher, to the security levelof the system. If your O/S skill is lower than your SystemSecurity, subtract -1 per 2 points of difference. This takes an amountof time equal to the bonus to the system's security in hours. You mayreduce the bonus to speed things up.

You can also reduce the security. This requires no roll - just set the levelto whatever lower level you want.

As new holes in systems are discovered, the security of the systemeffectively decreases; every month that goes by without tightening down asystem, the security level of the system decreases by 1 (down to a minimumof half the system's base security). You can eliminate this loss byupdating the system; roll System Security every time you go throughthe security of the system, and for every two points by which you make yourroll negates 1 month's decline. This can be done at most once a week, andtakes 4 hours.

Say a system has been sitting in the machine room for a year withoutupdates, because the admin you replaced was lazy. If you immediatelystarting fixing it up, and were able to consistently make your roll by 6points, it would take 20 hours spread out over 5 weeks to bring the securityback up to its initial point (4 weeks of reducing the penalty by 3 eachweek, at which point a month has passed and the security is reduced by 1,requiring just a little more time..). It could take less time, but thenyou're not being very conscientious, are you?Hacking (MH, System Security-5, prereq appropriate O/S skill)

This is the ability to find loopholes, cracks and security holes in amachine, whether it is a software security issue or a hardware physicallimit. By exploiting these holes and limitations, you can crash the machine,compromise information stored on it, control it to do things for you, gainadministrative access, etc.

To use Hacking, roll an opposed contest with the target machine'sSecurity level. The default time this takes is 4 hours; each point you beatthe machine by halves this time (so if you beat it by five, it takes youabout 8 minutes). If you lose the roll, you can not try again for another 4hours. Also if you lose the roll, the admin for the system can make aSystem Security Pj trailers vin location. roll to detect your attempts (she can also make aroll any time she decides to check the system for attempts to hack in).

Once you have gotten in and done whatever it is you chose to do, you canmake a roll to cover your tracks. This is handled in exactly the same way,except that you only get to roll once, and the base time is 1 hour (insteadof 4 hours). The GM should mark down how much you made it by - the admin hasto beat this to detect your attempt later.

You can also cover your tracks as you go, although this is less efficient.Take a penalty to your roll to penetrate the system; the admin then takes anidentical penalty whenever she finally attempts to detect you. Sealand t 12 manual. Note thatyou must still roll your Hacking to cover tracks as you leave, so that finaltraces are erased (and the GM has a number to beat later).

Once you have penetrated a system, you may enter it at will afterward untilthe hole you used gets patched. Holes can get patched in a number of ways:the admin may discover where you snuck in and fix the problem, the OScreators may issue a program-level patch, the hole may have been dependanton hardware limitations which are removed in the next upgrade cycle, etc.Reversing (ME, Programming-5, prereq appropriate programparadigm)

This is the ability to analyze machine code and/or translate the machinecode into its original programming language. A small program (<1000 lines)can take several hours of dedicated work, but for a dedicated reverser theend outcome is rarely in doubt. Assume 1 hour per 100 lines of code,although obfuscation techniques can double or triple the time required.

Prereq: Note that basic machine code is a programming language, and can beused in lieu of any other language, BUT takes four times as long.

Rolling: Mainly, this is to determine how well you do. If you fail, itsimply means that you misunderstood some parts of the code. The better yousucceed, the more you 'own' the code in terms of knowing its little quirksand whatnot.

Hacking And Spy Tools For Script Kiddies Tools And Supplies

Using Scripts (for the K1dd13z in the audience)

A Hacker can encode a particular hack into a script which does the workautomatically. This requires programming, but creates an automated programwhich uses its own Hacking skill for a specific task ('Get rootaccess on a targetted Windows NT machine', for example). Once a Script iswritten, it can be used by anyone who gets their hands on it. Unfortunately, as scripts spread, occasionally admins find them. Wheneveran admin tightens down security on a system, he discovers and fixes theholes exploited by scripts (rendering them useless against that system) thatachieved widespread distribution on or before the time to which the adminupdated the system.

Going back to our admin in the previous example, in the first week hediscovered the holes exploited by scripts that were easily accessible 9months ago; in the second week, he closed the gap to half a year. Inanother two weeks, only relatively new and secret scripts had a chance.Hackers who keep a lid on their scripts get much more benefit out of them.

To create a script, you must first do what you want the script to do. Youmust then decide on the skill you want the script to have, relative to yourown skill. For every point above Hacking-4 you want the script tobe, you have a -2 penalty to your Programming roll; the script cannot have skill greater than your own. To modify a script, you must haveaccess to the source code, or suffer a -2 penalty to any rolls to modify it;many scripts take their name from the fact that their useful form *is* thesource, and so having the one means having the other, but this is not alwaystrue.

To simply update the script, you must be familiar with the techniques usedby the script, as well as the techniques used to defend against it. If yourHacking skill is less than the skill of the script, you suffer a -2penalty for each point of difference; if your Hacking skill isgreater, you enjoy a +2 bonus for each point of difference. RollProgramming with this modifier; if you make it, the script will onceagain work. However, if your Hacking skill is less than that of thescript, the script's Hacking skill is now equal to your own. If yourHacking skill is greater than that of the script, then for each 2points by which you make your roll the script's skill is improved by 1, upto a maximum of your skill.

Additional Skills Hackers Use or Need

Hacking And Spy Tools For Script Kiddies Tools Free

  • Fast Talk (standard GURPS skill)
  • Acting (standard GURPS skill)
  • Cryptology (standard GURPS skill)
  • Programming Paradigm (MH, similar paradigm-3): each paradigm of programming -- assembly, procedural, object oriented, functional, etc.-- is its own skill, and to be able to write or modify a program, you must be familiar with the language (to be) used; however, languages are themselves simply familiarities within each paradigm.
  • Research (standard GURPS skill)
  • various technical hardware skills that might come in handy..




broken image