3790 posts
Location
Lincoln, Nebraska
Posted 01 January 2013 - 06:59 PM
Quite often, I see that people are hacked or hijacked. I would like to start a simple discussion on the ethics of hacking.
I know that many times hacking could be a good thing. Such as when people post a security flaw, and a way to work around that issue. This has been used many times with Google quite successfully.
So please, discuss….
Why would there be an acceptable reason to hack and why would you do it?
2217 posts
Location
3232235883
Posted 01 January 2013 - 07:31 PM
i only hack to point out flawls in peoples code
not to actually do harm to the person
for example there was that one guys mail server that had a really insecure PHP file
right now im working on a worm for firewolf that spreads by responding to all http requests and runs malicious code
unless the person says no, then i dont do anything at all :s
1619 posts
Posted 01 January 2013 - 07:32 PM
I assume you're talking about NDF-OS, and I just wanna say that the user who hacked the database was not being helpful. Being helpful would be PM'ing NDF and letting him know about the flaw, rather than posting the entire contents of the database on the forums. Just my 2¢.
513 posts
Location
Australia
Posted 01 January 2013 - 08:09 PM
Ethical discussions are very hard to have as every person has different interpretations on right and wrong. I preface this argument by saying these are coloured by my personal beliefs and acknowledge and respect others may differ.
It very much depends of course on what is done by the hacker. For simplicity we'll consider a typical hack as discovering a limitation or hole in a system that results in providing a user with access beyond that which the service owners had intended. This of course is entirely ethical- we can analogise this to spotting a corner of a store with no security camera. What you choose to do with that information however is the crux of the argument.
To do nothing and explicitly report the error to the developer is probably the best thing you can do. They can then act on that information, and you'd do this if you genuinely want the service to be improved. I expect this is rarely done because for those searching for security flaws actively (unless at the behest of the developer themselves), this is probably not the desired outcome.
Most will instead probe the security flaw to see exactly how much damage can be done with it, a mindset I believe cultivated by the experimentation necessary in the process of becoming an advanced computer user. I would say hackers that genuinely don't want to see harm done to the developer or any users reliant on the system would most likely attempt to make their attempts innocuous, not recording personal data or deleting anything system-critical.
Depressingly there is an attitude of entitlement with some people who perform hacks, suggesting that any damage they do is justified because the security flaw was there. This is akin to using a security hole in a convenience store to steal a large amount of merchandise, and then justify the theft as being perfectly ethical because no one could feasibly stop them. We've seen instances of hacking on these very forums and in popular media where misguided idealism will lead people to believe that seriously compromising security is well within their rights and entirely justifiable, going so far as to consider themselves heroes or martyrs for their defiance while men in the unit (or sometimes, horrifically en mass) must suffer the loss of service and sometimes more seriously money and personal identity in the name of that same heroism.
To take another more negative stance, I would suggest a lot of hackers aren't interested in being helpful. A lot of attacks performed will be done for the sake of satisfaction achieved by the hacker, which is why it bothers me a little to see such acts followed with a pious defence of their harmful behaviour as "doing us all a favour". It's of little comfort to those missing their names and wallets.
278 posts
Posted 02 January 2013 - 04:22 AM
Don't damage computer systems you break into (including crashing them);
Don't change the information in those systems (except for altering logs to cover your tracks);
And share information.
That is taken from the wikipedia page on Julian Assange. That is ethical (maybe except for the last bit, if it's something major, just tell the owner of the script) although, even though he never did anything wrong, he is still being hunted. Moral of the story: learn to work out the moral of the story
3790 posts
Location
Lincoln, Nebraska
Posted 02 January 2013 - 04:26 AM
As always, well said Nitro. I am always a strong believer of the golden rule, and I feel that it has guided me well so far in life.
If you don't want bad things to happen to you, then don't do it to others.There should be no reason to start an argument, or cause grief, because all it gets in return is more grief.
3790 posts
Location
Lincoln, Nebraska
Posted 02 January 2013 - 04:30 AM
Don't damage computer systems you break into (including crashing them);
Don't change the information in those systems (except for altering logs to cover your tracks);
And share information.
That is taken from the wikipedia page on Julian Assange. That is ethical (maybe except for the last bit, if it's something major, just tell the owner of the script) although, even though he never did anything wrong, he is still being hunted. Moral of the story: learn to work out the moral of the story
I just finished reading a book by
Kevin Mitnick, one of the most notorious hackers. In his book, he always goes into systems just because he can. Yes, he does keep 'trophies', such as Sun Microsystem's source code for their newest project, but he never uses that information for personal gain. His style of finding loopholes is definitely in the realm of 'do no harm'(except when he causes grief for some naughty people).
25 posts
Location
A flatland world with 100's of computers and a village that was covered with lava with a parkour course about it; Minecraftia.
Posted 03 January 2013 - 07:07 PM
Don't damage computer systems you break into (including crashing them);
Don't change the information in those systems (except for altering logs to cover your tracks);
And share information.
That is taken from the wikipedia page on Julian Assange. That is ethical (maybe except for the last bit, if it's something major, just tell the owner of the script) although, even though he never did anything wrong, he is still being hunted. Moral of the story: learn to work out the moral of the story
I just finished reading a book by
Kevin Mitnick, one of the most notorious hackers. In his book, he always goes into systems just because he can. Yes, he does keep 'trophies', such as Sun Microsystem's source code for their newest project, but he never uses that information for personal gain. His style of finding loopholes is definitely in the realm of 'do no harm'(except when he causes grief for some naughty people).
I just read the preview of that book. (Yes, all of it) and i completely agree with you. I hack peoples programs quite alot so i can let them know what flaws they have in their system. I call them flaws because they arnt holes. A hole can be filled in, however a program can always be hacked. A program has no holes that can simply be filled in. however, a program does have flaws that can last forever. Im sure i could hack into the worlds most secure program ever if i had enough time and money.
4 posts
Posted 03 January 2013 - 09:48 PM
the only time i see hacking as ok is when your working with the company/person you are hacking and only doing so to find security issues and help fix them
404 posts
Location
St. Petersburg
Posted 03 January 2013 - 10:02 PM
you're forgetting that the first hackers were just college students who broke the locks off of windows to use their college computers at night (back when computers took up rooms).
hacking just means using a clever method to solve a problem.
cracking is writing malicious code to break through security in networks or computers.
1548 posts
Location
That dark shadow under your bed...
Posted 03 January 2013 - 10:39 PM
–snip–
That was very well put. you can explain yourself much better than I can… My view on hacking is very different though
I hack to "crack" systems as tesla1889 put it however my motivation for doing so is to gain personally, not to damage the owner, if he is inconvenienced in the process I can live with that as I expect that in return. as a coder people have always tried to hack my programs and sometimes succeeded with… unwanted… results and I hold no personal grudge against them as this is common behavior.
perhaps my view on this is a result of my competitive nature and I will continue to hack for personal gain however I do not justify it as "doing them a favor" or in any way absolve myself of the blame. if I am caught then they will attempt to retaliate and that is fine. I will not willingly allow myself to be retaliated against but once again I will not blame the person retaliating
536 posts
Posted 04 January 2013 - 01:31 AM
Simply put I believe that the ethics of hacking is case specific,
you cannot simply say all hacking is bad nor say all hacking is good, obviously people hack for personal gain at the cost of someone else but people also hack with other people in mind.
There are the very obvious examples of "ethical" hacking groups, such as
AnonymousThere have also been some very public examples of people hacking to point out security holes but resulting in a service going down for several weeks, if not months, one such example is the hacking of PSN, although it is still unknown who did this (it is presumed to be Anonymous though that hardly narrows it down) the intensives were clear and, in some ways, ethical. However it got out of hand and the hack resulted in not only PSN going down (which meant they had affected the users, something they try to avoid) but also that apparently PSN user's money was being taken and spent. Anonymous claimed that they were attempting a "cease fire" on PSN and were not attacking PSN at this time… These are of course, big time example and because of the amount of attention a group will get from attacking big time companies or sites such as PSN there reasons must be ethical to at least some else they will get no support and a lot of hate, usually something they want to avoid.
404 posts
Location
St. Petersburg
Posted 04 January 2013 - 11:06 AM
i am forever grateful for the works of Anonymous, but they often attack the wrong people. Anon should be focusing its efforts on china and north korea, breaking through security such as the great firewall of china
686 posts
Posted 04 January 2013 - 11:19 AM
WTF I thought I made a post on this thread, but it's gone…
25 posts
Location
A flatland world with 100's of computers and a village that was covered with lava with a parkour course about it; Minecraftia.
Posted 04 January 2013 - 11:27 AM
you're forgetting that the first hackers were just college students who broke the locks off of windows to use their college computers at night (back when computers took up rooms).
hacking just means using a clever method to solve a problem.
cracking is writing malicious code to break through security in networks or computers.
Thats a good way of putting it. A program is always hackable. Like a lock is always pick'able. (Pick a boo! I see you!)
1852 posts
Location
Sweden
Posted 13 January 2013 - 08:10 AM
Don't damage computer systems you break into (including crashing them);
Don't change the information in those systems (except for altering logs to cover your tracks);
And share information.
That is taken from the wikipedia page on Julian Assange. That is ethical (maybe except for the last bit, if it's something major, just tell the owner of the script) although, even though he never did anything wrong, he is still being hunted. Moral of the story: learn to work out the moral of the story
I just finished reading a book by
Kevin Mitnick, one of the most notorious hackers. In his book, he always goes into systems just because he can. Yes, he does keep 'trophies', such as Sun Microsystem's source code for their newest project, but he never uses that information for personal gain. His style of finding loopholes is definitely in the realm of 'do no harm'(except when he causes grief for some naughty people).
I just gonna say that It sounds like a pretty good book and
I'm gonna see if I can get a hold of it!
3790 posts
Location
Lincoln, Nebraska
Posted 13 January 2013 - 09:10 AM
I just gonna say that It sounds like a pretty good book and
I'm gonna see if I can get a hold of it!
I definitely recommend it. It really makes me wish I had some of his skillz.
235 posts
Location
/dev/earth1aus5
Posted 13 January 2013 - 09:35 PM
A program is always hackable. Like a lock is always pick'able.
You can't really compare the two. A lock is designed to be able to be undone. A program is not.
It's sort of like saying any hashing algorithm can be cracked because encryption can be cracked too.
3790 posts
Location
Lincoln, Nebraska
Posted 13 January 2013 - 10:01 PM
Well, to be honest, it is really true. There does not exist a single system, whether that be mechanical or computational, that cannot be hacked/cracked/bypassed. Yeats ago it was thought that we would never be able to crack the human genome. That by far has been the most difficult cryptological puzzle in the last several years in my humble opinion.
Given enough time, patience, and resources, anything can be cracked. The discussion I wanted to emphasize was what to do after said system has been cracked. Do you take that flaw to the owner to be patched, or do you do as much damage as possible to leave a 'calling card'?
Personally, I have never had a reason, the skill, or the opportunity to do such a thing. However, being the nice guy that I am, I would most likely report the issue.
392 posts
Location
Christchurch, New Zealand
Posted 13 January 2013 - 10:30 PM
Actually computers in some ways are exactly like padlocks, In the most simple form, it's access control, Let in someone, but not everyone.
But then you have the other end of it, instead of a padlock, you have a giant solid wall, instead of a password.. you have no remote or local login, instead of a computer having a connection to the outside world, it doesn't.
There ARE programs that can't be hacked, simply because to gain access, access has to have been intended for someone at some point. If a computer has a shell daemon, it's there because it's intended to be, getting in without the appropriate credentials is then it's flaw.
Just wanted to say this to clear something up, If someone didn't want anyone or anything having access to a system, not even themselves. Security is easy. It's the Access CONTROL part that is what makes a system from a padlock to an advanced authentication system vulnerable.
Anyway, this doesn't address the OP, Ethics of hacking. All the hacks I've done in the past I'd like to hope didn't damage any services, and if they did, I probably wouldn't apologize not because I'm a horrible bastard, just because I wouldn't wanna be caught for damaging something :P/> I'd never intentionally deface or damage anything, Some of my friends in the past have found it to their entertainment to disrupt services and deface websites. For me I find that wrong, But I don't mind attempting to exploit some access control for the sake of seeing if it can be exploited.
If someone posted some access control system on these forums, I'd download it, and I'd try and crack it. Then I'd tell them, and depending on their level of understanding I'd either correct them on where they went wrong and help them, or say nothing and let them figure it out because they might not understand why it was insecure anyway.
Wow I feel like I've written a lot but nothing at all, No where near as literate as nitro, Whom's post I agree with entirely for the most part. I'm not sure how actively he would seek to check for exploits, but I actively check most systems I see, maybe only for a few seconds, but always.. I just find it interesting to see what habits people have, You wouldn't believe how common a passwords.txt file is.
In the end of the day, I do it to learn, not to damage property. That's my stand on it
148 posts
Posted 13 May 2014 - 03:30 PM
I found a huge flaw in computercraft(java). What the flaw allows you to do is access a second(hidden) terminal through rednet. I am not going to tell anyone how to do it because I know everything will go wrong. And mods/admins you can't fix it because java is responsible.
Why is the exploit useful? To allow the person to secretly run someone else's computercraft computer in your own.
Will you tell me how to do exploit? Never even when it is patched.
Is it fixable? Yes but only by the java community
Are you attemting to fix it? Yes I am working on a program wich blocks and redirects unknown rednet transmission before allowing the second terminal to open.
Are you gonna use it for evil things? Nope.
Are you the only person who knows about this? Yes.
8543 posts
Posted 13 May 2014 - 04:34 PM
I've approved your post only because new accounts can't use the PM system. What versions is this supposed flaw present in? What are the reproduction instructions? I find it rather difficult to believe you without significantly more details. We also can't fix the bug if we can't find it, so the responsible thing to do is to provide all of the pertinent details through the correct channels (i.e., a topic in the Bugs section).
1610 posts
Posted 13 May 2014 - 04:55 PM
I found a huge flaw in computercraft(java). What the flaw allows you to do is access a second(hidden) terminal through rednet. I am not going to tell anyone how to do it because I know everything will go wrong. And mods/admins you can't fix it because java is responsible.
Why is the exploit useful? To allow the person to secretly run someone else's computercraft computer in your own.
Will you tell me how to do exploit? Never even when it is patched.
Is it fixable? Yes but only by the java community
Are you attemting to fix it? Yes I am working on a program wich blocks and redirects unknown rednet transmission before allowing the second terminal to open.
Are you gonna use it for evil things? Nope.
Are you the only person who knows about this? Yes.
Errrr…. Ummm…. Isn't this just nsh? Because it sounds a lot like nsh…
148 posts
Posted 17 May 2014 - 05:34 PM
Ok
I've approved your post only because new accounts can't use the PM system. What versions is this supposed flaw present in? What are the reproduction instructions? I find it rather difficult to believe you without significantly more details. We also can't fix the bug if we can't find it, so the responsible thing to do is to provide all of the pertinent details through the correct channels (i.e., a topic in the Bugs section).
The version it is in is: Computercraft 1.53 - latest version I think it is 1.53
Java version: 7
I can't really tell you how to do it I sent the info to Dan200 with email hope he reads it soon.
I sent him:
Instructions + code + computercraft.jar I am using and java info along with some logs.
And I can't post it anywhere in the forums because it uses "melicious code" and you can't even realize what can happen if I post it.
Ask your self what would you do if you had 100% full control over any server anything you want and you will see what would happen.
And nsh what does that mean?
If you wish for more details please pm me and not a thing in the world will get me to tell the code to anyone except dan and admins.
8543 posts
Posted 17 May 2014 - 06:48 PM
Okay, PM me the information and I'll take a look at what you've got.
1029 posts
Location
Missouri, United States, America, Earth, Solar System, Milky Way, Universe 42B, Life Street, Multiverse, 4th Dimension
Posted 18 May 2014 - 05:56 AM
To release to the public dirty government secrets that are morally wrong and should not be done, but gain no profit off doing so.
541 posts
Location
Melbourne, Australia
Posted 28 May 2014 - 10:52 AM
I was up late last night watching several videos on the topic of hacking and I am very interested in starting a team of hackers. This team won't be destructive but more of a learning curve. If you join you will also receive a custom email address e.g - connordelaneyy@kryypt.tk If at least two people join this group it will be official and then we can create an official name which we can use for our emails etc. :D/> :)/>
if you are legitimate and want to join feel free to private message me or email me at - connordelaneyy@gmail.com
Edited on 28 May 2014 - 08:54 AM
280 posts
Location
Earth
Posted 28 May 2014 - 06:34 PM
This is a good artical to throw into this debate:
http://www.edge-online.com/news/hacker-helps-fix-rift-security-exploit/ A hacker uses an exploit to fix the exploit.
1281 posts
Posted 28 May 2014 - 06:57 PM
This is a good artical to throw into this debate:
http://www.edge-onli...curity-exploit/ A hacker uses an exploit to fix the exploit.
I'd suggest you read the article first, seems like a case of mis-leading headlines to generate more clicks. He didn't actually use the exploit, just found and reported it