| I once started building a program in Visual Basic that did the same sort of thing. It was basically a "hack" simulator. I got to the point of where it had a GUI, with buttons that said portscan, dump pwd hash, brute force, you know, stuff that 1337 h4x0rz do. you could put in an ip or a domain name into a field. Then a sort of dos style debug window would come up and start saying things like "initiating hack..., connecting with [insert whatever you put into the host field], scanning known vulnerabilities..., beginning brute force.." It was all a bunch of lamer script kiddie speak, but it would have been fun. I had a house fire and i lost all my files so i was never able to finish,hmmm maybe later.
The reason i started to do that was cause when i was in school, the network admin was a total wench. She banned us from using telnet (even for email) 'cause it was "a hacking tool" we could use it to hack into bank accounts, and to telnet into windows boxen. Everybody knows that telnet is the most powerful network penetration tool in the world, and that it can be used (by itself) to crack into anything. [please infer LOTS of sarcasm] i had originally intended to just one day start running that program in here presence, and see what she would do. maybe i could have gotten kicked out of the class like achiles did.
I would now like to apologize for that rant. Every once in a while, i feel the urge to scream and yell about that whole chain of events. |