Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
If you don't want to go that route, research "Certified Ethical Hacker" certification and spend the next several years studying for many multiple certification exams through Comptia and/or Cisco, Juniper, LPI, Red Hat, ISC^2. You also need to be "Very Good" at linux and linux shell scripting, in namely Kali Linux. There are plenty of books on Amazon that discuss this. I am going for my BS in Network Security and about 8 certs are required for graduation. (A+, N+, Security+, Project+, Linux+, CCENT, CCNA, CCNA Security)
The dangerous side is that any unlawful use of the programs in Kali Linux can result in jail time because you can easily stray from any "internal activities" like securing your network or hacking a secondary computer, preferably yours and go rogue against the ISP.
While Anonymous does hack for good at times, even then they have to maintain within the law or risk jail time. They are not as "anonymous" as they seem. IP addresses can be tracked, MAC addresses (hardcoded on the hardware) can be tracked. Just like a cell phone. It's just better to do it ethically and make 6 figures in the process. Sitting at Starbucks, drinking coffee, using the wifi to hack a contracted client across the street or in the cafe inside the building.
Regardless, the IT world needs people in Security.
*Main thing is this a game that just dispenses very basic theory for entertainment value only.*
I'm sorry? Anonymous is practically in the game.
But i won't spoil it for you. :^)
In Hacknet your at best a script kiddie.
What on earth are you talking about? It's basically a suite of tools. If you can easily "go rogue against the ISP" then you can just as easily buy a bunch of guns and "go rogue" against the county government and shoot up a library. While there are some seriously ass backward ISPs out there who don't even bother to change default passwords it's not like you can accidentally crash the Internet with an OS designed for penetration testing.
I did network security for 15 years, it's not very exciting, even when some ♥♥♥♥♥♥♥♥ manages to drop a 400 site multinational intranet. It's just a lot of people yelling.
If you know how to run the tools, it isn't hard to start branching out and see what else is out there through curiosity. That is what I meant by "going rogue". I didn't actually mean that some script kiddie is going to go and crash a company network "by accident".
Yes, and generally if you know how to operate the tools then you know enough that what you're doing is illegal. The implication that you can "easily go rogue" is that anyone can pick it up, play with it, figure out enough of how it works and then do something illegal without understanding the full consequences of their actions. This isn't true. The fact is that it's only easy because these tools are just all conveniently located in one place. Handing someone a set of locksmith tools and providing a rudimentary understanding of how they work, then sticking that person in front of a safe doesn't suddenly mean they're any more likely to take a crack at private property just because they were handed the tools and put in front of the obstacle. That's an issue of character, not tools.
Hence why I mentioned to get ethical hacker certified and get employment with a client with legal contracts. Any other kind of real hacking would be illegal UNLESS you keep it all within your own network. Like finding open ports and closing them to protect yourself from attack especially with all the ransomware floating around.
Yes, but I am directly speaking to the phrase "easily go rogue." It's way more melodramatic than the reality.
edit:
And ransomware tends to get onto machines because people are stupid.
PHONE: RING RING
SILLY PERSON: {ANSWERS PHONE} Halloo??
RANSOM SCAMMER: Hello to you sir I am from the Microsoft and we see you are having a Virus on the computer of your ownings.
SILLY PERSON: Oh dear me no!
RANSOM SCAMMER: Yes, please to be doing the following so I can fix the virus that is virusing the networks! {proceeds to walk SILLY PERSON through a series of steps that enable remote control of his PC}
SILLY PERSON: Boy, I'm so glad you called out of the blue, Microsoft Technician!
RANSOM SCAMMER: Now you will be paying me 250 dollars for the fixing of the computer.
Lets make it a choose your own adventure! Does SILLY PERSON a) Pay? or b) refuse to pay?
a)
SILLY PERSON: Sure! Here is my credit card information!
RANSOM SCAMMER: Thanking you. {Hangs up, hands over financial information}
b)
SILLY PERSON: My goodness that's too much! I don't want to pay that much!
RANSOM SCAMMER: {spews a stream of obscenities, rips as much financial info from the machine as possible, damages random files and encrypts the drive}
RANSOM SCAMMER: You will be paying me 500 dollars now if you are wanting your pornography back.
SILLY PERSON: Oh no!
If they call you and you have some free time, see how long you can keep them on the line.
Also:
>ip adresses can be tracked
yep, but you can always make it so hard to track, so - it wont worth it. Like by mixing vpns, bought for 'coins with tor (moreover - if you dont wanna to hack muricans, but only your friend's facebook, tor will be enough)
>mac adresses can by tracked
mac adresses can be masked, no?
Yep, you cant be absolutely anonymous. But you always can make identification hard as ♥♥♥♥, so - it wont worth it (until IBM will polish their AI, lol)