.

real hackers....

<<

jinwald12

User avatar

Jr. Member
Jr. Member

Posts: 77

Joined: Thu Nov 05, 2009 5:42 pm

Post Thu Mar 25, 2010 11:03 am

real hackers....

i thought i'd start a topic similar to the old "real programmers <programming related joke>"

i'll start: "real hackers don't use web browsers they telnet all the info  off the servers"  or "real hackers wish the celebrated the day before their birth because it was the greatest exploit of all time" or " real hackers don't drink coffee they inject it into their arm's vein that has the most traffic"

jump on in
where did all the fun go?
<<

j0rDy

User avatar

Hero Member
Hero Member

Posts: 591

Joined: Tue Feb 23, 2010 4:55 am

Location: Netherlands

Post Thu Mar 25, 2010 11:47 am

Re: real hackers....

not a real programmers joke but still on topic:

In the beginning the Internet was a bunch of smart users with dumb terminals. Now...
CISSP, CEH, ECSA, OSCP, OSWP

earning my stripes appears to be a road i must travel alone...with a little help of EH.net
<<

geekyone

User avatar

Full Member
Full Member

Posts: 180

Joined: Fri Oct 26, 2007 12:45 pm

Location: Peoria, IL

Post Thu Mar 25, 2010 12:38 pm

Re: real hackers....

I copied this from somewhere.  I can't remember where sorry if I am stepping on some ones IP.  Enjoy!!

You know you're a computer security professional when:

You not only lock your laptop with a physical cable leash, but you change the combination of the lock when it's not in use so that it can't be "compromised".

Although you have no ill intent, you spend no small amount of your downtime in airports thinking of ways to circumvent TSA security -- and you've come up with several can't-miss terrorist ideas that even Jack Bauer couldn't stop.

You lock your screensaver with twice as much insistence when security friends are around than when strangers are, because you're not nearly as worried about a stranger's intentions.

You're immediately discontent with all newly announced security solutions, even before you know anything beyond the name.

Having extralong passwords that you must type over and over again to get correct is not a bother.

You have a database program to store all your passwords, but even it doesn't contain a single, decoded password.

When you read industry-mandated security guidelines, you chuckle at all the newbie mistakes.

You secretly hope you don't miss a big virus outbreak while you are out on vacation.

Any security book you read is covered in pen from the technical corrections you've made.

Your Internet browser home page is a computer security news bundling Web site.

You've so fine-tuned your personal computer's host-based firewall that you are sure it is causing problems with legitimate programs, but you really don't care.

You fantasize about a job where you could bust into the house of unsuspecting malicious hackers and take them away to jail.

You've got a new car with a built-in GPS and computer, but you are constantly worried about how easy it would be to hack.

You suspect that every banner and Flash ad on every Web site is hosting malicious JavaScript.

You loath government interference with the Internet because you know they will only mess it up more and not fix the problem (see CAN-SPAM Act).

When you hear that we've arrested some big spammer, you have the same nonreaction as when you hear we've arrested Al-Qaeda's No. 2 person ... again.

You resist every new application install because of the new attack vector opportunities it will bring.

You know that mobile small-form-factor computers have almost no security.

Your cell phone is password-protected.

You resent having to give out your Social Security number to any person or company, especially because you have never given it when dealing with the Social Security administration.

You already own or covet one of those special screen covers that prevent people on either side of you of from reading your screen.

You can't prevent yourself from laughing out loud when someone announces they think that computer viruses, buffer overflows, or whatever will be solved in five years.

You hate upgrading your computer because it means spending days trying to copy and convert all your cool hacker and anti-hacker tools to the new system.

You have solid friends on computer security discussion lists, whom you know would be there for you in a life-crisis pinch but that you've never met in person or talked to on the phone.

Although you never try to shoulder surf other people's passwords, you can always tell by sound alone when they haven't typed one that is eight characters or more, and you chuckle inside.

When someone hands you their USB key to copy something, you always decline, and instead offer your known, clean USB key. You would also prefer one-time, disposable, Tupperware-like memory drives if they existed.

You always slow down when reading security guidance looking for the words "should," "must," "never," and "always" -- and you understand their importance.

By the time you read a CERT security bulletin, you've known about the issue for several days.

You always investigate SSL certificate errors when they come up in your browser.

Finally, you know you're a computer security person when you have so frequently spoken passionately to complete strangers about computer security and the frustration it entails that you know what it's like to be covered in sweat -- and the listening party to have a look on their face that says they didn't know what they were in for.
CISSP, CEH, GPEN, GCIH, GCFA
<<

pizza1337

Full Member
Full Member

Posts: 156

Joined: Mon Mar 08, 2010 5:29 pm

Post Thu Mar 25, 2010 1:24 pm

Re: real hackers....

TOP 10 SIGNS YOUR CO-WORKER IS A COMPUTER HACKER

10) You ticked him off once and your next phone bill was for $20,000.

9) He's won the Publisher's Clearing House sweepstakes 3 years running.

8) When asked for his phone number, he gives it in hex.

7) Seems strangely calm whenever the office LAN goes down.

6) Somehow gets HBO on his PC at work.

5) Mumbled, "Oh, puh-leeez" 95 times during the movie "The Net".

4) Massive 401k contribution made in half-cent increments.

3) His video dating profile lists "public-key encryption" among turn-ons.

2) When his computer starts up, you hear, "Good Morning, Mr. President".

1) You hear him murmur, "Let's see you use that Visa card now, Professor I-Don't-Give-A's-In-Computer-Science!"


http://www.unwind.com/jokes-funnies/com ... cker.shtml


:D
Knowledge Resource is Power.
<<

j0rDy

User avatar

Hero Member
Hero Member

Posts: 591

Joined: Tue Feb 23, 2010 4:55 am

Location: Netherlands

Post Thu Mar 25, 2010 2:07 pm

Re: real hackers....

lol @ previous posts...just remembered:

Hackers do more before 4am then most people do in a day

Hacker 4 hire: will work for 0-day spl0itz!
CISSP, CEH, ECSA, OSCP, OSWP

earning my stripes appears to be a road i must travel alone...with a little help of EH.net
<<

unsupported

User avatar

Sr. Member
Sr. Member

Posts: 318

Joined: Sun Feb 08, 2009 3:38 pm

Location: 407

Post Thu Mar 25, 2010 2:13 pm

Re: real hackers....

Man, I fit into most of the categories on the original post, and some in the second.... this is funny.
-Un
CISSP, GCIH, GCIA, C|EH, Sec+, Net+, MCP
<<

hayabusa

User avatar

Hero Member
Hero Member

Posts: 1662

Joined: Mon Jan 29, 2007 2:59 pm

Post Thu Mar 25, 2010 2:16 pm

Re: real hackers....

No doubt... was gonna post similar, but glad someone beat me to it!!!  :D
~ hayabusa ~ 

"All men can see these tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved." - Sun Tzu, 'The Art of War'


OSCE, OSCP , GPEN, C|EH
<<

jinwald12

User avatar

Jr. Member
Jr. Member

Posts: 77

Joined: Thu Nov 05, 2009 5:42 pm

Post Fri Mar 26, 2010 7:39 pm

Re: real hackers....

real hackers don't understand why they can't inject code into their parking meters after all it is not clean
where did all the fun go?
<<

j0rDy

User avatar

Hero Member
Hero Member

Posts: 591

Joined: Tue Feb 23, 2010 4:55 am

Location: Netherlands

Post Mon Mar 29, 2010 4:54 am

Re: real hackers....

a while back i was meeting a customer that requested some services from us and we wanted to meet to get some more information about the issue and scope of the project.

After half an hour talking management stuff about the project i got the question what my role would be in this project. i explained i was going to be the one that would perform the pentest/security audit and they looked at me like they saw water burn.

immediately i got the question why i didnt look like a hacker (i was wearing a suit as always when i need to look representative). i explained that not all computer intellects look like either a 13 yr old, pony tailed script kiddie living in the attic of his parents house with a semi-black iron maiden shirt from a concert back in '92 with paled skin and skinny arms or like a 40 yr old with a huge beard, "linux inside" shirt, living in the basement of his parents house with a weight problem. ofcourse i put it out there a little more subtle but the reaction was great!

gotta love stereotypes...
Last edited by j0rDy on Mon Mar 29, 2010 4:55 am, edited 1 time in total.
CISSP, CEH, ECSA, OSCP, OSWP

earning my stripes appears to be a road i must travel alone...with a little help of EH.net
<<

jinwald12

User avatar

Jr. Member
Jr. Member

Posts: 77

Joined: Thu Nov 05, 2009 5:42 pm

Post Sat Apr 10, 2010 12:46 pm

Re: real hackers....

real hackers don't use Ip addressed they go by ethernet frames
where did all the fun go?
<<

inf3kt1d

User avatar

Newbie
Newbie

Posts: 21

Joined: Mon Nov 09, 2009 8:59 pm

Post Fri May 07, 2010 1:02 pm

Re: real hackers....

Real hackers don't read books. They just parse what interests them...
CEHv7
MCSA:Security
CompTIA Security+
CompTIA A+
<<

f4csimil3

User avatar

Newbie
Newbie

Posts: 22

Joined: Fri May 06, 2011 9:10 am

Post Wed May 11, 2011 2:00 pm

Re: real hackers....

JAJAJAJA really Funny stuff!!
I found myself in a couple of them :D
<<

Data_Raid

User avatar

Full Member
Full Member

Posts: 165

Joined: Fri Nov 09, 2007 5:55 am

Post Wed May 11, 2011 3:37 pm

Re: real hackers....

01010010 01100101 01100001 01101100 00100000 01101000 01100001 01100011 01101011 01100101 01110010 01110011 00100000 01110100 01111001 01110000 01100101 00100000 01101001 01101110 00100000 01100010 01101001 01101110 01100001 01110010 01111001 00100001 00100000 00111010 00101101 00101001
All men by nature desire knowledge.

Aristotle
<<

tturner

User avatar

Sr. Member
Sr. Member

Posts: 435

Joined: Thu Jun 26, 2008 4:50 pm

Post Wed May 11, 2011 4:41 pm

Re: real hackers....

Real hackers can cut and paste from an ASCII to binary converter  :D *ducks*

Although if you can honestly claim you typed it in binary from your head I'd have to be very impressed.
Certifications:
CISSP, CISA, GPEN, GWAPT, GAWN, GCIA, GCIH, GSEC, GSSP-JAVA, OPSE, CSWAE, CSTP, VCP

WIP: Vendor WAF stuff

http://sentinel24.com/blog @tonylturner http://bsidesorlando.org

Return to Opinions

Who is online

Users browsing this forum: No registered users and 2 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software