Advertisements

Editorial: The Plague

KLONDIKE, CPAC Newsroom – The common plague of so called hacking, deceptiveness, aging of the community and how the older generations formed the new, and more over, how toxic it has become in 2016 compared to the previous generations

The following post is my own own opinion. All the research, interviews, and history is a result of my own conduct. The views that are shared in this post do not reflect CPAC’s or any other organization affiliated with CPAC.

In our recent day and age in this community we often see that the term hacking is thrown around a lot. With that being said, there is a very limited amount of people within our community who can actually do anything on that malicious scale. But that doesn’t mean that they can’t adapt to things and learn how to do it, and that definitely seems to be the case.  You must remember, hacking is just tampering with the system in place. Just because somebody “plays Club Penguin” that doesn’t mean that they’re physically incapable of acquiring such a skill set to break things and/or infect others.

People in this day and age, especially in this community, seem to be close-minded when it comes to things like hacking, malware, and other things relating to that subject. The true definition of hacking is trying to make the system do what you want to (give you passwords, etc.) while still in the ‘rules’ of the system. An analogy would be loopholes in the laws that allow you to evade tax. Then there are hackers that hack to add extra features and to make it work in a new way, rather than maliciously attempting to grab data. In more detail, since this is also a common problem that is swirling around in our community: DDoS and DoS is pretty much just causing so much stress on the system that it shuts down.

SQL Injections/Shell code exploits are pretty much putting in your own code through ‘holes’ in the system that can then do whatever you want. This gets you a list of passwords on a website that allow you to access the administration panel. Kind of like the WordPress Admin cPanel.

This is something that affects us on a much larger scale. Keylogging and Phishing. This is pretty much hacking the human, letting them give you the password themselves. In more detail, a keylogger is a hidden program on your computer that collects all your keystrokes, and sends them to the person that is operating it. If you happen to type in your password, that gets sent as well. Phishing is, simply put, pretending to be somebody else and asking them for their passwords. Very easy to do on the internet where there are no faces, and plenty of trusting people around.

MITM is pretty much tricking computers into thinking that your computer is a part of the network that is connecting you to the website. If you send your password through the network, like when logging in, it will also go through your computer where you can then filter it out to get it. Then there is bruteforcing, which is simply trying every combination of letters until you get the password. Probably the least effective of them all.

Lets wind back all the way to 2011 when people like xiUnknown, SaW, and other prominent figures in the army community would spread malware in order to gain access to another persons machine. I personally have had experience in the past with this. I’m speaking about during the UMA and DCP conflict in 2010. The short backstory to this is that Brandon (DCP’s creator), got mad because UMA colonized DCP and in order to keep his little man ego down he decided to be malicious about the matter and attempt to keylog my computer in order to assert his superiority complex which we all knew he had trouble battling against. Here is a quick snippet of the conversation that took place on that day.

 

Displaying fine intelligence..

Back in those days being keylogged wasn’t such a big problem and nobody had to worry about people logging on to random chat rooms and linking a malicious link that could potentially ruin their computer. In this day and age things seem to have shifted for the worst. Whenever I personally go to a chat room of an army that is conflicting with another, I see random toon accounts logging on to the oppositions chat room and trying to link things to specific and targeted users. This is probably because they have some sort of twisted agenda that is fueled by their inner prepubescent needs.

How do people deploy keyloggers? Fairly simple. They send a person an executable file which installs the keylogger when executed, and then tricks them into executing it. Common methods do this is through email attachments which masquerade as documents (moose.pdf.exe) or by masquerading the program as a legitimate installer for another software. It’s not difficult to create an installer which pretends to install, say, Mozilla Firefox (and maybe even does this), but also installs other software without the person noticing.

People also seem to think that anti-viruses can help. That’s not the case. Anti-malware packages will not detect every form of keylogger. They will detect known ones by hashing, and some may detect certain keylogger-like behaviour via heuristic analysis. What some anti-virus software can detect is applications hooking up into Windows systems listening for keystroke events (made by typing on a keyboard). Some AV software, if properly configured, can also block the keylogger from communicating over the network, effectively preventing it from sending the keystrokes to the attacker. There is a software called “KeyScrambler” that can protect against most keylogging malware so I advise all reads who are worried about being keylogged to use this.

Even after Brandon/Wwebestfan, Andi, and Fiddyy started this whole new trend of keylogging, people like SaW took it on the head and started to use it against people, and more specifically, certain armies that went against his own.

Don’t get it twisted when I say there is a difference between having a specific skill set and just being a self-absorbed moron who roams around chats to assert the fact that they can set up a keylogger (which only take 10 minutes). Having skill in something specific in the area of hacking is manipulating people, hacking their mind, Having skill is breaking into a server by finding vulnerabilities and exploiting them to the fullest degree.

It’s not 2016 and armies have changed. The generation of armies I was involved in maybe long gone, with the odd people still hanging around, but regardless, we’re essentially all gone. The new generation of armies is much more sinister than we were. I’m not downplaying the fact that armies back in my day were picture perfect because we weren’t. It was us that set the bar high for this generation. People who had twisted agendas in my day and age passed up the bar to this generation and made the people who’re keylogging in this day and age idolize them and try to prove to themselves that they can assert their own authority online.

In this day and age, people go by their own intuition and intelligence. My personal perspective is that ‘intelligence’ has negative connotations since it gives the idea that ‘smartness’ is a 2-dimensional quality. Really, that couldn’t be further from the truth. As I see it, everybody just lies somewhere on a spectrum of competency for the trillions and trillions of things that they can be good at. The net value for all of these spectrums is 0; meaning that everybody is better at some things and worse at others.

Most people think just the opposite though, meaning that people whose talents aren’t as valued in today’s community (the majority of people) grow up thinking they just aren’t good at anything; or at least, they’re less competent than others overall. Just as Einstein said, everyone is a genius. It’s just that not everyone has discovered their true talents yet; or their talents aren’t considered ‘good’ by their society. This community needs to start thinking on it’s feet and come to terms with what it has become – a shadow of its former self.

The end point of this is that people should begin to measure intelligence by speed of thought and extensiveness of memory, plus the ability to recognize one’s mistakes and keep learning from them, to consider issues from different angles, to focus on what is important and filter out what is irrelevant, to remove bias and emotion from your deliberations, to see relevant and useful connections where others see none, to be rational and logical when it’s appropriate, to be able to easily see the big picture and fine detail as well as everything in between, to be creative in a constructive way.

I wrote this late at night so if it seems like everything is all over the place then forgive me.

What do you think? Give your opinion on how you think the community has changed over the years and what we can do to potentially fix the growing problem of keylogging and other malicious acts.

dυвya.ɢee❤

Advertisements

11 Responses

  1. Nice post.

  2. Duaya, this is a remarkable work of philosophy. I am thoroughly impressed. The only reason I refer to it as such is due to the fact that this format is more of a philosophy than an editorial. Nonetheless, you’ve done such an amazing job! Keep up the good work!

  3. Brace yourselves.
    Incoming Phin’s “wisdom” about hacking.

  4. Personally, I’ve been around since December 23rd, 2011. 2011 was such a simple time back then, and then there was 2012.. oh yes.. so simple :).

    It wasn’t until late 2014 that this community started going down a decline, and it’s only getting worse. It appears you have the same goals as I do: to influence the community to become a better place.

  5. I do miss the memories… That time when l joined UMA, SaW booted me because he wants all of my powers when he was rich. He booted me muitple times and l never gave up. But yeah he attempt me to join DW which later on l did, DW is my home army… I’m gonna miss SaW… “SaW is the boss” SaW is the guy who as well try to teach me with all of these back when ACiD was ever around.

    • Yeah, good times.
      Sadly your grammar has still not improved.

      • I don’t really want to.

  6. The incompetence of this so called community is disgusting. CPAC has lot any power they once held. If this community is to survive, stop the hacking, and CPAC needs to start giving out Top ten penalties for this!

  7. Awesome

  8. Where was Phin when UMA colonized Doritos?

    • teaching everyone her expertise on hacking

What do YOU think? Comment your opinion!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: