Affichage des articles dont le libellé est Hack. Afficher tous les articles
Affichage des articles dont le libellé est Hack. Afficher tous les articles

8 Hackers that preparing the most dangerous in history!

8 Hackers that preparing the most dangerous in history!
the online world contain many things that can be good or bad , such as the hacker !
so The term "hacker" can mean two different things:
1- Someone who is very good at computer programming, networking, or other related computer functions and loves to share their knowledge with other people.
2- Someone who uses their expert computer skills and knowledge to gain unauthorized access to systems, corporations, governments, or networks.
so in this article ,i will report about the eight Hackers that preparing the most dangerous in history!





Gary McKinnon:












He (born 10 February 1966) is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the "biggest military computer hack of all time.

Jonathan Joseph James:





He (December 12, 1983 – May 18, 2008) was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound.

Albert Gonzalez:



He (born 1981) is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007—the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing (specifically, ARP Spoofing) attacks which allowed him to steal computer data from internal corporate networks.


George Francis Hotz:



He (born October 2, 1989), alias geohot, is an American hacker known for unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T's and Apple's intentions. He developed the limera1n jailbreak tooland bootrom exploit for iOS. He is also noted for his technical efforts and publicity with reverse engineering the PlayStation 3 video game console, and for subsequently being sued by and settling with Sony. As of December 2015, he is working on his vehicle automation machine learning company comma.




Adrian Lamo:

He (born February 20, 1981) is a Colombian-American threat analyst and former hacker.
Lamo first gained media attention for breaking into several high-profile computer networks, including those of The New York Times,Yahoo, and Microsoft, culminating in his 2003 arrest. In 2010, Lamo reported U.S. soldier PFC Bradley Manning (now known as Chelsea Manning) to federal authorities, claiming that Manning had leaked hundreds of thousands of sensitive U.S. government documents to WikiLeaks.

David L Smith: 




He is the hacker who released the Melissa virus is 1999. This internet virus ended up clogging and shutting down email systems because it overloaded servers. It caused $80 million in damage, and cost Smith 20 months in jail time.
-------------------------------------------------------------------
I’m quite happy that not all hackers are bad, and hopefully you can now see the difference as well. Hacking has a large number of meanings, and many of them are still disputed by those affected today. At least now you don’t have to scowl every time you hear the mention of “hacker”.
What’s your opinion on this matter? Did I leave something important out? Let us know in the comments!
Read More

[Video] How to Hack a Credit Card in 6 Seconds, Experts Reveal

[Video] How to Hack a Credit Card in 6 Seconds, Experts Reveal

As India attempts an upgrade to a cashless society, cyber security experts have raised serious concerns and revealed how to find credit card information – including expiration dates and CVV numbers – in just 6 Seconds.

And what's more interesting? The hack uses nothing more than guesswork by querying multiple e-commerce sites.

In a new research paper entitled "Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?" published in the academic journal IEEE Security & Privacy, researchers from the University of Newcastle explains how online payments remain a weak spot in the credit card security which makes it easy for fraudsters to retrieve sensitive card information.

The technique, dubbed Distributed Guessing Attack, can circumvent all the security features put in place to protect online payments from fraud. The similar technique is believed to be responsible for the hack of thousands of Tesco customers in the U.K last month.

The issue relies on the Visa payment system, where an attacker can guess and attempt all possible permutations and combinations of expiration dates and CVV numbers on hundreds of websites.

Researchers discovered two weaknesses in the way online transactions are verified using the Visa payment system. They are as follows:
  1. Online payment systems do not detect multiple incorrect payment requests if they're performed across multiple sites. They also allow a maximum of 20 attempts per card on each site.
  2. Web sites do not run checks regularly, varying the card information requested.
Newcastle University PhD candidate Mohammed Ali says neither weakness is alone too severe, but when used together and exploited properly, a cyber criminal can recover a credit card's security information in just 6 seconds, presenting "a serious risk to the whole payment system."

Here's how the attack works:


The attack is nothing but a very clever brute force attack that works against some of the most popular e-commerce sites.

So, instead of brute-forcing just one retailer's website that could trigger a fraud detection system due to incorrect guesses or lock the card, the researchers spread out guesses for the card's CVC number across multiple sites with each attempt narrowing the possible combinations until a valid expiration dates and CVV numbers are determined.

The video demonstration shows that it only takes 6 seconds for a specially designed tool to reveal a card's secure code.

First, an attacker needs a card's 16-digit number, which can be obtained either from black-market websites for less than $1, or from a smartphone equipped with a near-field communication (NFC) reader to skim them.

Once a valid 16-digit number is obtained, the hacker use web bots to brute force three-digit card verification value (or CVV) and expiration date to hundreds of retailers at once. The CVV takes a maximum of 1,000 guesses to crack it and the expiry date takes no more than 60 attempts.
The bots then work to obtain the billing address, if required. The paper suggests the whole attack can be carried out in just 6 seconds.
"These experiments have also shown that it is possible to run multiple bots at the same time on hundreds ofpayment sites without triggering any alarms in the payment system," researchers explain in the paper.
"Combining that knowledge with the fact that anonline payment request typically gets authorized within two seconds makes the attack viable and scalable in real time. As an illustration, with the website bot configured cleverly to run on 30 sites, an attacker can obtain the correct information within four seconds."
The attack works against Visa card customers, as the company does not detect multiple attempts to use a card across its network, whileMasterCard detects the brute force attack after fewer than 10 attempts, even when the guesses are spread across multiple websites.

How to Protect yourself?


The team investigated the Alexa top-400 online merchants’payment websites and found that the current payment platform facilitates the distributed guessing attack.

The researchers contacted the 36 biggest websites against which they ran their distributed card number-guessing attack and notified them of their findings. As a result of the disclosure, eight sites have already changed their security systems to thwart the attacks.

However, the other 28 websites made no changes despite the disclosure.

For Visa, the best way to thwart the distributed card number-guessing attack is to adopt a similar approach to MasterCard and lock a card when someone tries to guess card details multiple times, even tried across multiple websites.

For customers, avoid using Visa credit or debit cards for makingonline payments, always keep an eye on your statements, and keep spending limit on your Visa card as low as possible.
Read More