General Chat NEW! The Student Forums Chatroom > Technology

Over 100m Facebook profiles harvested, available in torrent

<< < (4/5) > >>

$tyli$h Executive:
LOL, he is astar! ;D

But what he said is true. It is just that they are valued so much, due to the large user base and advertising potential. Microsoft valued facebook at 15 billion and purchased 1% stake in it.

DrEvil:
LOL...  :D Why is astar making fake accounts?  :P

Saladin:

--- Quote from: $tyli$h Executive on July 29, 2010, 04:16:25 pm ---Okay. Lets get this clear.

It requires you to exploit a security VULNERABILITY. Its not a simple loop. Once you discover the vulnerability, you just have to repeat it, in a loop, over the facebook website. It requires a high speed internet connection. But a large hard disk capacity would be enough for this, with a common computer, like those used for server.

You do know what is a brute force attack, don't you? If yes, only brute force attack will require a high performance computer, IF PROCESSING is involved. But in this case, the internet is involved. Once you get the logic, you just have to set up the loop. One go, thats it.

Remember the hacker Curador? He was an ordinary school boy who hacked millions of credit card numbers. Thing is, he got the logic and executed it. Now don't tell me he had a high performance computer.

So, better do some research on how many hackers have got a mainframe, or a supercomputer. At best, a server configuration computer is enough for any hacking purposes for the professional hacker. Usually a common computer like we use is enough.

--- End quote ---

Yes, but in most cases, the vulnerability is spotted by the anti-virus system, whenever unauthorised changes are made, the system is made in such a way to prevent that, so finding a vulnerability on a server is very hard. Often, people have to use a combination of both brute force and other techniques such as loop hole plunging to actually get the access code necessary. Before, computers were not so easily available and they were a lot more expensive, because of the companies spent little on protection, as compared to now.

Yes, and the person who got that info, was already working with Face-book, he is a part of a security group actually. I actually happen to know a lot of people who hack for a hobby, but the conclusion they came to is that now internet intervention is impossible, you at least need to get into the LAN and know the LAN well enough, to hide behind the computer IDs.

And brute force and computer loop holes are not the only hacking methods. Brute force is not extremely processor hogging, there are other more intelligent methods that require even more processor power as well as network infrastructure.

$tyli$h Executive:
Safest way is to get a job at the security department of a bank somehow.

Whatever.

$tyli$h Executive:
Whatever it is, exploiting loopholes and brute force attack are the only ways to hack.  Hacking can be done with simple tools and PC as I explained earlier provided you know how to. Complexities will, at best, require a server configuration computer.

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version