
Yeah, the man who came to our college to preach ethical hacking copied the Tagline from me... I always had a great passion on hacking... Being a "white-hat", I hesitate to get into unethical ways of working upon vulnerabilities (:P)... I guess almost everyone s interested in hacking... if not, 200 people wouldn't be rushing to give 1k bucks just on hearing the word "hacking" and without even knowing wat the preaching s all about... Even I wouldn't ve organized it if it was not hacking, leaving behind all my project works to abhi n roshi (;-))...Even some of the mechanical n non-IT guys asked me if they're "eligible(?)" to attend the workshop as they were so interested in hacking... I turned them down by saying that its all about hacking into a computer in network environment and not related to hacking some machinery or a lathe...
What to do guys?? The world s like that... We always love to sneak into others mobiles, computers to see what he/she s doin... Or scared if someone might get a SUDDEN knowledge by attending all those preaching sessions and try to attack us... Usually, "humans" tend to develop a strong liking for "hacking" coz of the first case... Anyway I guess, the preaching was helpful for most of them, though I had no chance of listening to it...
My life of hacking started in the era when the FCP n AFCP guys ruled our class... (I guess they wont take this "confession" quite seriously).. Actually, some of the mails sent by the FCP and the AFCP, to everyone in our class, were not sent actually by them... I sent them... I did it jus for fun.. to check if the software which i developed for a Freelancer project is working... It was an 'Automatic mailer n re-mailer'... Both mine and their mails will look exactly similar... U cant find the difference so easily... Like all hackers do, I too made a mistake, which the AFCP guys found out... Later I rectified the mistake but stopped testing it further coz I felt that I've done enough damage already... I used to send mails to ppl (incl. FCP) from their own mail ids...
The image shown above is a variant of Linux, "Backtrack"... It contains *ALL* the tools required for hacking and hacking-detection... I'll tell you more about Backtrack in the following posts along with some simple but unfamiliar techniques... The next few posts will be about hacking unless I get something to write...
sounds interesting......
ReplyDeletethe HTC here is., leaving d project to work to abhi n roshi oly coz organizing d seminar.... u do have some sense of humour bala.. i acccept it... lol
ReplyDeleteseri seri... chillll...
ReplyDelete