Gary McKinnon

Discussion in 'Chit Chat' started by Iona, Sep 12, 2008.

  1. Iona

    Iona New Member

    Joined:
    Sep 30, 2007
    Messages:
    14
    Likes Received:
    0
    Trophy Points:
    0
    What method did Gary McKinnon use to compromise the US military?.

    regards Iona
     
  2. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,375
    Likes Received:
    388
    Trophy Points:
    83
    Please do not create the same thread over and over again in the wrong forum.

    Also I guess you should have such threads on some military forums and not here
     
  3. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    They say he used normal hacking tools found on the Internet but he has the know how of how to utilise those tools in a masterful way. He also have a very very good understanding of the Internet and its protocols. That guy is clever.
     
  4. seangtz

    seangtz New Member

    Joined:
    Jun 6, 2008
    Messages:
    126
    Likes Received:
    3
    Trophy Points:
    0
    Really I'm wondering how hacking tools helps....
     
  5. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    Well, you can't port scan a target computer without a port scanner, you can't sniff packets without a proper sniffer, you can't crack passwords without a password cracker, you can't break WEP keys without a wireless password cracker like Aircrack-ng, you can't inject packets into wireless networks (Like deauth attack) without Aireplay-ng, you can't scan for certain SQL or other vulnerabilities on websites and target computers without a proper vulnerability scanner, you can't crash a server without a proper flooder (if you have linux you can use the ping -f command). It's easier to spoof yourself using utilities, you can get more info of the target by using nmap's x-mas tree scan. Need I say more?
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice