Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


Sign in to follow this  
hammermtl

Question about hacking

Recommended Posts

First of all i would like to say that i have no intention or ability to hack anything.

I'm fairly uninformed when it comes to the inner workings of a computer. How exactly does a hacker get into a system and what do they see when they are there? do they have the same experiance as if they were logged into windows or do they just have access to files?

How does something like a internet explorer bug give a hacker access to your system?

I'm asking this because I have no clue and would feel better if i wasnt so blind about it.

Thanks

Share this post


Link to post
Share on other sites

Hackin a computer is a very general term. But more or less via certian vunerabities within applications or the Os itself, the computer can be accessed and or exploted.

Through these vulerabilities and open ports a Hacker can have limited to full control of your system. This depends on the particular port or vulerablity he has explioted.

For instance:

A low lvl hack would be seeing the contents of your harddrive

While a full hack a person would take full control of your system, capable of deleting reading and writing anything to your drive.

I hope that helps somewhat

|Drew|

Share this post


Link to post
Share on other sites

The basic idea of hacking is either tricking your computer into running program code it shouldn't be, or bypassing the authentication system (whether by finding a flaw in it or just guessing the password). What they see depends what they're doing. If they're logged in to something like a remote control system it's probably no different than using the computer normally. If they're using an exploit to run code then they'll only see whatever output the code sends back to them, which could be anything from a full remote control app to a simple command line.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...