Go Back   Computer Forums > General Computing > Cyber Safety and Computer Security
Click Here to Login
Join Computer forums Today


Reply
 
Thread Tools Search this Thread Display Modes
 
Old 04-17-2013, 07:20 AM   #11
Baseband Member
 
Join Date: Feb 2012
Location: aus
Posts: 89
Default Re: Hacking through network

Quote:
Originally Posted by dale View Post
"Copy emails, documents, web pages, PDF files, and more; paste them into Speak it!, and have the text spoken back to you..." This is from the Details page of the app. I did not download it.

In any case, (going back to the topic...) this is very far from hacking. Hacking is finding new ways to use or achieving new results with existing tools, outside the intended design or outcome of the tools. To accomplish this, a hacker needs: a.) enough knowledge with the tools and b.) enough creativity to not be limited by existing tools. So knowledge does have a part here, and not a small part.
iPhone Backup Extractor - Software Informer. iPhone Backup Extractor can recover contacts, pictures, call histories, etc.

this can access the phones backup which contains sms, call history and so on? It would be easy to decompile and use some of the code to make a quick hack.


How to explore an iPhone application bundle - Mac OS X Hints


here is a quick guide to decompiling apps.
Your making hacking sound like some mystical activity when in fact hacking is easier than programming. Have you ever heard the saying “ its easy to find the problem but harder to find a solution”. Hackers just find problems to exploit for gains.


African kids learn to read, hack Android on OLPC fondleslab ? The Register


If anything, this article should demonstrate that knowledge is not needed to become a hacker, just determination, and yes, I know its not an iphone.




I know you probably have an iphone and this is troubling to hear but you need to smell the roses. Iphone is the most common phone used in the world. If you want a secure phone, use a phone that is very uncommon as to not be so easy to understand and hack.

How to Remote Wipe an iPhone or iPad

you're living in a dream world


Critical iOS vulnerability in Configuration Profiles pose malware threat - Hacking News
__________________

threadmark is offline   Reply With Quote
Old 04-17-2013, 08:41 AM   #12
Daemon Poster
 
dale's Avatar
 
Join Date: Mar 2012
Location: Taiwan
Posts: 1,008
Default Re: Hacking through network

Where do I begin...

Firstly, the backup extractor? That's not even an app from the App Store. It's just a parser used to change the format of backup files already made. How is this even a security issue?

And the second link... What, we are scared of file exploration now?

Look, I am a busy guy. I am here to contribute and learn. I expect the people I converse with to at least read the stuff they post.

You claim that hacking does not require knowledge. You have a serious misunderstanding of what hacking really is, but you are not open to correction. You call me a mystic. Your citation is irrelevant -- and I don't know if you just don't get it or you were in a hurry, but you don't seem to have read what you posted.

Not trying to be mean or anything, but if this is the quality of discussion that we are having, then you can count me out.
__________________

__________________
distrACT -- an open community
● It helps to ask questions effectively
● Please join Server admins social group if you are into servers
dale is offline   Reply With Quote
Old 04-17-2013, 09:20 AM   #13
Baseband Member
 
Join Date: Feb 2012
Location: aus
Posts: 89
Default Re: Hacking through network

Quote:
Originally Posted by dale View Post
Where do I begin...

Firstly, the backup extractor? That's not even an app from the App Store. It's just a parser used to change the format of backup files already made. How is this even a security issue?

And the second link... What, we are scared of file exploration now?

Look, I am a busy guy. I am here to contribute and learn. I expect the people I converse with to at least read the stuff they post.

You claim that hacking does not require knowledge. You have a serious misunderstanding of what hacking really is, but you are not open to correction. You call me a mystic. Your citation is irrelevant -- and I don't know if you just don't get it or you were in a hurry, but you don't seem to have read what you posted.

Not trying to be mean or anything, but if this is the quality of discussion that we are having, then you can count me out.
Ok, lets start over.

The top example wasn’t the best but the decompiling resource explorer method is very valid. What’s stopping someone from using this method to inject their own commands and recompiling it?



You’re not making sense when you say I don’t understand what hacking is. The term hack is a cultural term only and the proper meaning does not refer to computers at all.




My underlining point is still the same. Hacking does not require a “knowledgeable person “.

What knowledge does it take to install a keylogger and use the captured passwords to access the targets emails, facebook and so on. By most cultural definitions I just hacked there email and facebook. The fact is that because iphone is so common it makes it very easy to find communities and information online to hack and take advantage of the vulnerabilities.


I am sorry I didn’t give you exact example of how to hack the iphone but I think if I did, I would be banned or at least warned for sharing tips on how to hack.
The answer to the op's question is, yes, It is very easy to hack an iphone if you install applications.
threadmark is offline   Reply With Quote
Old 04-17-2013, 09:28 AM   #14
Baseband Member
 
Join Date: Feb 2012
Location: aus
Posts: 89
Default Re: Hacking through network

Quote:
Originally Posted by LawnBranch View Post
And is that possible that someone can hack in my computer if I play online games without getting in websites? (like games and stuff...)
it is very possible through java vulnerabilities, malicious code in the online games client application, pirated games like in this article and many more.



90% of pirated games are infected with Malware - Hacking News



whether you have been hacker or are hacked is a different question. Do you suspect that someone has hacked your computer?
threadmark is offline   Reply With Quote
Old 04-17-2013, 11:53 AM   #15
Daemon Poster
 
dale's Avatar
 
Join Date: Mar 2012
Location: Taiwan
Posts: 1,008
Default Re: Hacking through network

You have nothing to contribute on the subject except for false information. Have fun with your FUD. I have unsubscribed this thread.
__________________
distrACT -- an open community
● It helps to ask questions effectively
● Please join Server admins social group if you are into servers
dale is offline   Reply With Quote
Old 04-17-2013, 05:13 PM   #16
Baseband Member
 
Join Date: Feb 2012
Location: aus
Posts: 89
Default Re: Hacking through network

Quote:
Originally Posted by dale View Post
iPhone is unlikely to be exploited to the extent of losing control of your phone if you do not JB. PC, on the other hand, depend on a lot more circumstances (usually related to user behaviour and mentality) because in general, users are given more control.
i agree with this.

Quote:
Originally Posted by dale View Post
JB'd iPhone maybe. This is simply not true for iPhone in its default state.
but when you said this about accessing sms history and so on is wrong.


You are upset that a user posted negative to what you were saying and it set you off. You are wrong for thinking that iphones are some top of the line security devices. News flash, they aren’t. and I don’t think you understand what a jail break is.
A jail break wouldn’t give applications access to the iphones system. A jail break just makes the ROM part of the phone accessible to install or modify with a computer. So even with a jail break, if the os hasn’t been altered the phone is 100% the same as it was out of the box until you modify the rom.
__________________

threadmark is offline   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off



All times are GMT -5. The time now is 06:18 AM.


Powered by vBulletin® Version 3.8.8 Beta 4
Copyright ©2000 - 2017, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0