The  pseudo hackers (and not crackers) are curious people (Like me ;-) ) who
wish to explore other's operating system.

If you have shell access on any *nix server, running a few basic command
like ls, cd, cat is not unethical. You are valid user on the server and
using commands which are made available to you.  It may surprise you that on
all the vsnl / dot server 95% percent of file have rwxr-xr-x permission. Now
if any one calls (specially media) this as hacking then it is ignorance of
their knowledge.

Now to your first and second question -
The real hacker try to get an account the server by exploiting various
software which have bugs. Then make a back door entry on the server from
where he can again come back.  Clean the system logs to hide their presence,
and enjoy.

In most of the cases the stupidity of server admin (like leaving the ftp
directory writtable or having guest account with password as guest etc) is
also exploited.
For example on many of dot/vsnl server if you run following commands at
shell
( or try Kermit shell ) prompt

WWW_HOME=/
export WWW_HOME
lynx

you will be able to browse the entire server directory.  One of the vsnl
server bom4 has its complete /var directory writtable to world. So the point
is, in  most of the cases stupid server admin only offer their server on
platter to hackers.

Now to your second question-
If you are incharge of the an important server then, you should be fully
conversant with the operating system, get the latest exploit list from the
mailing list like BUGTRAQ, CERT etc. Remember punishing  a hacker (only if
it involved a finacial loss ) is a daunting task even in states.
Unfortunately In India there is no legislation in place also. The prevention
is the only cure like for AID.

I did not get your last question correctly, And our big brothers also would
certainly mind such an lengthy mail on OFF-TOPIC.

Best Regards,
M.S.Deshmukh,
Director.
Beta Computronics  Pvt. Ltd.
Web Site - http://betacomp.com


>> Hi All,
>>    don't fire me down for this unethical questions, i am asking as i am
>> really impressed by them.
>>
>> "how do hackers hack the system ?"
>> "what all ways they use ?"
>> "what all we do to stop them ?"
>> "what all they do in reality and practicality for doing this ?"
>>
>> --
>>   _
>> |^|^|                         -^-                     Love to Linux
>>  \-/ G  A  U  R  A  V          |
>> mailto:[EMAIL PROTECTED] / mailto:[EMAIL PROTECTED]
>>   | Sea/She is nature's art/\/ Everybody likes to get the feel of it
>> |-=-----------------------/-----------------------------------------|
>> |_|f  I  can  I m a g i n/e  it  I  can  A c h i e v e  it_._.-.-._.|




-----------------------------------------------------------------------
For more information on the LIH mailing list see:
http://lists.linux-india.org/lists/LIH

Reply via email to