[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

How Does A Hack Actually Work?

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 11
Thread images: 4

File: 7.jpg (41KB, 300x100px)
7.jpg
41KB, 300x100px
What are the rough (don't give explicit instructions) to a hack? I've always been curious but not educated enough to know it. My understanding of hacks comes largely from Mr. Robot and other tech-based shows/films.
>>
>>58748527
You put the target system in a state that was not anticipated by its creator.
>>
>>58748527
You eat with four chopsticks I think
Or five
>>
>>58748527
https://en.wikipedia.org/wiki/Buffer_overflow
here you go read the whole page
>>
>>58748573

C/C++ btfo?
>>
>>58748726
That's also what makes them so fast and efficient.
>>
>>58748726
Okay, I'll bite.

Anyone who knows anything about C/C++ knows manual memory management (which enables buffer overflows) is a double-edged sword, and it's where the power of the language comes from. Being able to manipulate memory manually can reap enormous performance benefits, but in incompetent hands, it's disastrous. Even in large, mission critical open source projects that thousands of programmers have contributed towards, it's possible to miss a buffer overflow that tears a piece of software a new one; for example, Heartbleed.
>>
>>58748726
>Bounds checking can prevent buffer overflows, but requires additional code and processing time

It literally requires a one line if statement, while the languages with built-in protection require a metric fuckton of layered libraries and overhead to do the same thing.
>>
File: 1473575868748.png (152KB, 500x500px) Image search: [Google]
1473575868748.png
152KB, 500x500px
>>58748527
>How Does A Hack Actually Work?
>>
>>58749029
What's your hourly rate, programmer who never makes mistakes and writes 100% flawless code?
>>
File: 1484456188803.png (279KB, 500x500px) Image search: [Google]
1484456188803.png
279KB, 500x500px
>>58748527
>My understanding of hacks cones largely from Mr. Robot and other tech-based shows/films.
Thread posts: 11
Thread images: 4


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.