Hi All! In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked (?) and a number of other references that say that it happened to them. However, I couldn't find anything that actually said what it is. Any info is greatly appreaciated. Regards, jimmo -- --------------------------------------- "Be more concerned with your character than with your reputation. Your character is what you really are while your reputation is merely what others think you are." -- John Wooden --------------------------------------- Be sure to visit the Linux Tutorial: http://www.linux-tutorial.info --------------------------------------- NOTE: All messages sent to me in response to my posts to newsgroups, mailing lists or forums are subject to reposting.
On Mon, Jan 13, 2003 at 06:34:17PM +0100, suse_mailing_list@jimmo.com wrote:
In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked (?) and a number of other references that say that it happened to them. However, I couldn't find anything that actually said what it is. Any info is greatly appreaciated.
h4x0red is hacker speak for "Hacked". Some people think it is cool to 'encrypt' their messages by replacing letters with other characters which either look similar (e.g. A -> 4) or sound similar. For example, someone might describe themselves as a "133t h4x0r", or "elite hacker". Of course, the fact that they do not appear to know the correct definition of "hacker", nor do they have anything resembling a life is beside the point... Oh, and these are my opinions, not ST's... -- David Smith Work Email: Dave.Smith@st.com STMicroelectronics Home Email: David.Smith@ds-electronics.co.uk Bristol, England GPG Key: 0xF13192F2
On Monday 13 January 2003 17:14, Dave Smith wrote:
On Mon, Jan 13, 2003 at 06:34:17PM +0100, suse_mailing_list@jimmo.com wrote:
In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked (?) and a number of other references that say that it happened to them. However, I couldn't find anything that actually said what it is. Any info is greatly appreaciated.
h4x0red is hacker speak for "Hacked". Some people think it is cool to 'encrypt' their messages by replacing letters with other characters which either look similar (e.g. A -> 4) or sound similar. For example, someone might describe themselves as a "133t h4x0r", or "elite hacker". Of course, the fact that they do not appear to know the correct definition of "hacker", nor do they have anything resembling a life is beside the point...
Oh, and these are my opinions, not ST's...
Thanks to all who replied. So it's not a specific hack, just the fact that someone got in (i.e. hacked the site). I also so an archived post where someone said he h4x0red some file. All that work looking for a description and or countermeasure! Argh! Personally, I think spelling things like that is not kewl just 57UP1D. Regards, jimmo -- --------------------------------------- "Be more concerned with your character than with your reputation. Your character is what you really are while your reputation is merely what others think you are." -- John Wooden --------------------------------------- Be sure to visit the Linux Tutorial: http://www.linux-tutorial.info --------------------------------------- NOTE: All messages sent to me in response to my posts to newsgroups, mailing lists or forums are subject to reposting.
In the past couple of days, I have seen a number of references to
There is a reason that this form of chat was started. It's a long story, but back in the days when the internet was not as it is now, the only real things up there were bb's and news servers and email. Web pages (html) had not been thought of. The word 'hacker' did not have the same meaning then as it does not. In fact most of the older unix admins, security pros, coders and people with a large interest in technology with a thirst for knowledge still refer to themselves as hackers (myself included) Anyway, the bb's were regularly scanned for words that were regarded as 'unacceptable'. Considering most of the people using these boards were hackers, the main topics were about computer exploration and thus, many of the topics were taboo. To get around the programs that regularly scanned the bb's the users used to alter the words so they were not seen. As the programs were updated the hackers adopted their language to avoid detection. If you are interested in learning a bit more about this, (personally I find the history of it interesting) grab yourself a copy of this season's 2600 magazine. There is an article in there. Although the script kiddies spoil it these days, it is actually not as lame as most people think. There was actually a reason for it in the same way as there was a reason for smilie faces :) but that's another story. Think of sending an email on a 300 baud modem. Then you could see why shorter was faster -----Original Message----- From: dave smith [mailto:dave.smith@st.com] Sent: Monday, January 13, 2003 4:15 PM To: suse-linux-e@suse.com Subject: Re: [SLE] What is h4x0red? On Mon, Jan 13, 2003 at 06:34:17PM +0100, suse_mailing_list@jimmo.com wrote: h4x0red. I
googled on it, but found only sites that have been hacked (?) and a number of other references that say that it happened to them. However, I couldn't find anything that actually said what it is. Any info is greatly appreaciated.
h4x0red is hacker speak for "Hacked". Some people think it is cool to 'encrypt' their messages by replacing letters with other characters which either look similar (e.g. A -> 4) or sound similar. For example, someone might describe themselves as a "133t h4x0r", or "elite hacker". Of course, the fact that they do not appear to know the correct definition of "hacker", nor do they have anything resembling a life is beside the point... Oh, and these are my opinions, not ST's... -- David Smith Work Email: Dave.Smith@st.com STMicroelectronics Home Email: David.Smith@ds-electronics.co.uk Bristol, England GPG Key: 0xF13192F2 -- Check the headers for your unsubscription address For additional commands send e-mail to suse-linux-e-help@suse.com Also check the archives at http://lists.suse.com Please read the FAQs: suse-linux-e-faq@suse.com
Hi All! In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked
On Monday 13 January 2003 5:34 pm, James Mohr wrote: h4x0red is "hacked" in "leet speak" or "l337 sp34k" where numbers replace letters due to a similarity in shape [3 is E mirrored ;o)] The ones I know of are: 0 O 1 I 2 3 E 4 A 5 S 6 7 T 8 9 G Oh, and the "x" tends to refer to a "ck" or "cks" and "0red" or "0r" is just kind of a slang extenstion. :o) Look up "leet speak" on google - it may provide more of an insite. HTH :o) Jon
On Monday 13 January 2003 10:16, The Purple Tiger wrote:
On Monday 13 January 2003 5:34 pm, James Mohr wrote:
Hi All! In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked
h4x0red is "hacked" in "leet speak" or "l337 sp34k" where numbers replace letters due to a similarity in shape [3 is E mirrored ;o)] The ones I know of are: 0 O 1 I 2 3 E 4 A 5 S 6 7 T 8 9 G
Oh, and the "x" tends to refer to a "ck" or "cks" and "0red" or "0r" is just kind of a slang extenstion. :o) Look up "leet speak" on google - it may provide more of an insite.
HTH :o)
Jon
So, as an avid online gamers I'm faced with this constantly. My call sign "Crusher-1" would appear as Cru5h3r-1 and L33t 5p84k is commonly used by script kiddies and people that have some ablility to compromise systems or Hack (Hax) a system, game/game file. Most likely I would avoid any indepth involvement from such individuals because they are generally adolescent and mailcious by nature. The are commonly associated in the gaming world as cheaters. One such case I found particularly distastful was one individual that was playing on a popular Counter-Strike sever. This person would spam the ingame chat line with "BYE" repeatedly and then execute a script that would crash each persons game AND the game server (which coincidently was a Linux server). They tend to pride themselves in defacing, control, and otherwise screwing up indisciminant end-users' systems, most exclusively (of course) Windblows. They are known for planting trojans and consider it a point of honor to brag about how many "zombies" they have control over. More sophisticated H4x0r5 can do some pretty substantial damage and have been know to have, at least, some unix admin skills and may have the knowledge related to spoofing IP addresses, email address, etc... Of course a real malicious "hacker" will generally keep their identity unkown and perfers to operate in stealth and in the shadows. One such case of a group of H4xo5s can be found on Steve Gibson site: www.grc.com Wherein he discusses a DDoS attack his server suffered at the hands of a known script kiddie (13 or 14 y.o) from Wisconsin (my own backyard) and how he got his hands on one of Trojans, re-engineered it to return to it home (place of origin) and covertly send information about the site back to him (as well as the owner/admin responsible). Seems he discovered a series of "secret" (aka non-listed) IRC channels frequented by script kiddies. It's a long but interesting read. Cheers, Curtis. -- The reasons behind the DMCA, TCPA, and Palladium that are presented to the public are only secondary to their real purpose. That is to lock in markets, stiffle competition and pidgeon hole consumers from any viable alternatives that the sponsers see as competitive and a threat to their market shares and business models.
So, as an avid online gamers I'm faced with this constantly. My call sign "Crusher-1" would appear as Cru5h3r-1 and L33t 5p84k is commonly used by script kiddies and people that have some ablility to compromise systems or Hack (Hax) a system, game/game file. Most likely I would avoid any indepth involvement from such individuals because they are generally adolescent and mailcious by nature. The are commonly associated in the gaming world as cheaters. One such case I found particularly distastful was one individual that was playing on a popular Counter-Strike sever. This person would spam the ingame chat line with "BYE" repeatedly and then execute a script
You seem to be referring to the word 'hacker' in the new context of somebody who purposely uses computers for malicious purposes. This is not true, you are referring to a cacker. The writer of linux, linus torvalds refers to himself as a hacker as do all the linux developers (hence the term 'kernel hacking' in the kernel config menus) The worlds best computer experts are all refered to as hackers e.g. Kevin Mitnick, Bernie S, Stuart McLure etc The pioneers at places like Sun, HP, IBM, bell are all computer hackers. Even the good ole Bill Gates was a common computer hacker back in the 70's. 95% of todays computer security experts are hackers. If it weren't for these kinds of people, the internet would not be as advanced as it is today. Computer hackers find the holes and bugs in todays digital environment and help to patch these holes. If it weren't for the likes of these geniuses, the net would be an incredibly unsafe place to visit. The best site to potray this is www.securityfocus.com. It is an incredible database of past and present computer news and vulnerabilities, and is entirely run by....computer hackers :) that
would crash each persons game AND the game server (which coincidently was a Linux server). They tend to pride themselves in defacing, control, and
otherwise screwing up indisciminant end-users' systems, most exclusively >(of course) Windblows. They are known for planting trojans and consider it a point of honor to brag about how many "zombies" they have control over. More sophisticated H4x0r5 can do some pretty substantial damage and have been >know to have, at least, some unix admin skills and may have the knowledge related to spoofing IP addresses, email address, etc...
Of course a real malicious "hacker" will generally keep their identity unkown and perfers to operate in stealth and in the shadows.
One such case of a group of H4xo5s can be found on Steve Gibson site: www.grc.com Wherein he discusses a DDoS attack his server suffered at the hands of a >known script kiddie (13 or 14 y.o) from Wisconsin (my own backyard) and how he >got his hands on one of Trojans, re-engineered it to return to it home (place >of origin) and covertly send information about the site back to him (as well >as the owner/admin responsible). Seems he discovered a series of "secret" (aka non-listed) IRC channels frequented by script kiddies. It's a long but
interesting read.
Cheers, Curtis.
Yes, very true. I fall into the habit of confusing these terms in the same manner as the general public/media do. I would speculate the~90% of the people on this list are "hackers" (as you said) - and I include myself. My bad, forgive_tk (oops wrong forum - lol). Cheers, Curtis. :) On Monday 13 January 2003 14:00, Gedi wrote:
You seem to be referring to the word 'hacker' in the new context of somebody who purposely uses computers for malicious purposes. This is not true, you are referring to a cacker.
The writer of linux, linus torvalds refers to himself as a hacker as do all the linux developers (hence the term 'kernel hacking' in the kernel config menus) The worlds best computer experts are all refered to as hackers e.g. Kevin Mitnick, Bernie S, Stuart McLure etc
The pioneers at places like Sun, HP, IBM, bell are all computer hackers. Even the good ole Bill Gates was a common computer hacker back in the 70's.
95% of todays computer security experts are hackers. If it weren't for these kinds of people, the internet would not be as advanced as it is today.
Computer hackers find the holes and bugs in todays digital environment and help to patch these holes. If it weren't for the likes of these geniuses, the net would be an incredibly unsafe place to visit.
The best site to potray this is www.securityfocus.com. It is an incredible database of past and present computer news and vulnerabilities, and is entirely run by....computer hackers :)
So, as an avid online gamers I'm faced with this constantly. My call
sign
"Crusher-1" would appear as Cru5h3r-1 and L33t 5p84k is commonly used
by
script kiddies and people that have some ablility to compromise systems
or
Hack (Hax) a system, game/game file. Most likely I would avoid any
indepth
involvement from such individuals because they are generally adolescent
and
mailcious by nature. The are commonly associated in the gaming world
as
cheaters. One such case I found particularly distastful was one
individual
that was playing on a popular Counter-Strike sever. This person would
spam
the ingame chat line with "BYE" repeatedly and then execute a script
that
would crash each persons game AND the game server (which coincidently
was a
Linux server). They tend to pride themselves in defacing, control, and
otherwise screwing up indisciminant end-users' systems, most
exclusively >(of
course) Windblows. They are known for planting trojans and consider it
a
point of honor to brag about how many "zombies" they have control over. More sophisticated H4x0r5 can do some pretty substantial damage and have
been >know
to have, at least, some unix admin skills and may have the knowledge related to spoofing IP addresses, email address, etc...
Of course a real malicious "hacker" will generally keep their identity unkown and perfers to operate in stealth and in the shadows.
One such case of a group of H4xo5s can be found on Steve Gibson site: www.grc.com Wherein he discusses a DDoS attack his server suffered at the hands of
a >known
script kiddie (13 or 14 y.o) from Wisconsin (my own backyard) and how
he >got
his hands on one of Trojans, re-engineered it to return to it home
(place >of
origin) and covertly send information about the site back to him (as
well >as
the owner/admin responsible). Seems he discovered a series of "secret" (aka non-listed) IRC channels frequented by script kiddies. It's a long but
interesting read.
Cheers, Curtis.
-- The reasons behind the DMCA, TCPA, and Palladium that are presented to the public are only secondary to their real purpose. That is to lock in markets, stiffle competition and pidgeon hole consumers from any viable alternatives that the sponsers see as competitive and a threat to their market shares and business models.
On Monday 13 January 2003 17:34, James Mohr wrote:
Hi All!
In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked (?) and a number of other references that say that it happened to them. However, I couldn't find anything that actually said what it is. Any info is greatly appreaciated.
Regards,
jimmo
Hi Jimmo, Check out this useful and character-building link, which makes this and much more clear: http://www.tuxedo.org/~esr/jargon/html/ HTH Best Fergus -- Fergus Wilde Chetham's Library Long Millgate Manchester M3 1SB Tel: +44 161 834 7961 Fax: +44 161 839 5797 http://www.chethams.org.uk
Wow! Thanks to everyone who posted. I really expected this to be quick answer. I didn't at all expect a history lesson or an discussion on hacker mentality. It's "kewl" just how much you learn in this form. It's also interesting how many peripheral aspects of computers there are and how easy it is to be oblivious of them. Regards, jimmo -- --------------------------------------- "Be more concerned with your character than with your reputation. Your character is what you really are while your reputation is merely what others think you are." -- John Wooden --------------------------------------- Be sure to visit the Linux Tutorial: http://www.linux-tutorial.info --------------------------------------- NOTE: All messages sent to me in response to my posts to newsgroups, mailing lists or forums are subject to reposting.
participants (6)
-
Curtis Rey
-
Dave Smith
-
Fergus Wilde
-
Gedi
-
James Mohr
-
The Purple Tiger