General Chat NEW! The Student Forums Chatroom > Technology

Over 100m Facebook profiles harvested, available in torrent

<< < (2/5) > >>

DrEvil:

--- Quote from: Engraved on July 29, 2010, 12:51:13 pm ---To hack sites like that, you are going to need a very powerful computer, something that you cannot buy actually.

--- End quote ---

Hackers usually use rigs... And in this case, i.e. 100m profiles, it must be a very hi-fi rig.

$tyli$h Executive:
@Engraved

Nothing that money cannot buy. Anyways, I don't think this will require a supercomputer as it just targets vulnerabilities, if they exist, not some kind of brute force attack.

Whatever, I would prefer not getting into a technical argument here.

DrEvil:
This does require an extreme performance computer because collection and compilation of those 100m profiles is not what you can do easily. A normal computer would have taken ages to compile such a huge collection.

And I think that there is nothing technical in this, its just common sense.

Crooked:
THIS IS AWESSSSSOME ! :D :D :D :P

$tyli$h Executive:
Okay. Lets get this clear.

It requires you to exploit a security VULNERABILITY. Its not a simple loop. Once you discover the vulnerability, you just have to repeat it, in a loop, over the facebook website. It requires a high speed internet connection. But a large hard disk capacity would be enough for this, with a common computer, like those used for server.

You do know what is a brute force attack, don't you? If yes, only brute force attack will require a high performance computer, IF PROCESSING is involved. But in this case, the internet is involved. Once you get the logic, you just have to set up the loop. One go, thats it.

Remember the hacker Curador? He was an ordinary school boy who hacked millions of credit card numbers. Thing is, he got the logic and executed it. Now don't tell me he had a high performance computer.

So, better do some research on how many hackers have got a mainframe, or a supercomputer. At best, a server configuration computer is enough for any hacking purposes for the professional hacker. Usually a common computer like we use is enough.

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version