Come In IT Security Guys

DR OSMAN

AF NAAREED
VIP
What's the latest information on security industry? are the kids still just copy/pasting legit code into their editors to target systems for theft/denial of service. I think it was called reverse engineering. Hackers don't program cause it's to time intensive, but need to understand programming only so they can 'cut n paste' blocs of code from the internet into their editors.

An example if u want to monitor a system just 4 monitoring, u will take legit code from established programs like say Microsoft remote service app and copy/paste that to your script. For example if they want to key log you, key log code exist, all they need to know is cut n paste into programming editor. If they want to set up bot-farms same thing.

Basically every hacker is just a glorified cut/paster of code, they won't sit there doing pathetic application development coding kkkkk. Has the industry changed in terms of this style of hacking, is there any new concepts? Infact some r so lazy they will just cut/paste directly from a hacker program by uploading into their editor and do slight modifcations to remove virus tripping signatures in the code. U do need to understand tho operating system kernel whether linux-windows-mac so u can cut n paste scripts to 'scan directories' for watever ur purpose is.

You really do start to appreciate the mathamaticians and academics who invent these technology from scratch and it's a shame Somalis r focusing on CODE MONKEY crap like anyone in the industry really does that.

Why aren't any of these dulis mathamaticians, they are the nobel peace prize winners. Why are they following me into this career where I am trying to gain access to the mathamaticians in academia.
 
Last edited:
Sounds like you are talking about script kiddies, which is how every offensive security guy starts off as.
 

DR OSMAN

AF NAAREED
VIP
Sounds like you are talking about script kiddies, which is how every offensive security guy starts off as.

Yes that's the word script kiddy are they still 90% of cyber issues? breaking kernels/protocols like getting an .exe protocol to run as an image protocol that type of hacking is different. But any 'instruction' level coding, all of that already exists on the net to cut/paste. Protocols like HTTP-Email or anything at the 'network' layer is different, cuz once u penetrate that, the rest is just 'instruction' level coding.
 

Trending

Top