Is this BS????

Status
Not open for further replies.

TROOPS

Banned
Jul 1, 2012
1,348
2
38
In my bum
Sorry in my humble opinion no one able to breath can be that stupid. You are just doing a Simon...... :argue: ends feel free to :blah::blah::blah:
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0
all i am asking you to do is reword your question so it is a little more understandable. i didn't tell you to shut up or anything of the sort. oh and just fyi since my inception here and with all my bannings i created 1 mult that lasted for 1 post and was caught and deleted and it got me an extra month added to my banning. so your claim of me having multiple accounts and creating new nick names is a lie. now please what were you trying to ask ?
Why would you do a "Respond" to my words to someone else and then imply that it had anything to do with you?

re the question.... I was talking to a hacker who gave me all that information and I wanted to verify each part. So I do not know how to make it simpler. I rather hoped that his words made sense to other people who knew about the net. Well my understanding of his words.

re you having multiple nicks. Sorry if I am mistaken. Someone pretended to you in that case. No big deal
 

simon482

internets icon
Feb 8, 2009
9,965
175
63
Why would you do a "Respond" to my words to someone else and then imply that it had anything to do with you?

re the question.... I was talking to a hacker who gave me all that information and I wanted to verify each part. So I do not know how to make it simpler. I rather hoped that his words made sense to other people who knew about the net. Well my understanding of his words.

re you having multiple nicks. Sorry if I am mistaken. Someone pretended to you in that case. No big deal
your understanding of his words is confusing. i know how the net works but i am not following what you are trying to know. are you asking if you can grab a piece of something from one spot then grab another piece from another spot ? if the whole thing is broken down then reassembled when it arrives ? if it is broken down does it all travels the same "wires" or go in different directions to meet up later in the pre determined destination ? what is it you are asking.

as for my 1 time creating a fake account it was before you and as i stated it was caught after 1 post and deleted and i was given longer away. so that was a lie and you can apologize to me anytime for lying about me. as for the first thing you said i have no idea what that means either.
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0

Oh Troops I do not want to appear rude, and do not want to appear to talk down to you, But I recently had it pointed out to me that my foolish attempts to try and respond to people being rude was a mistake, So I am opting out of conversations about the sun rising in the west, studs not being available in Northern Ontario, my being a woman, and several other topics. So when you were just silly and acting in a way I perceive is not genuine and interesting, ..... I mentally tag it as pulling a Simon :)

No big deal, feel free to ignore me.
 

simon482

internets icon
Feb 8, 2009
9,965
175
63
Oh Troops I do not want to appear rude, and do not want to appear to talk down to you, But I recently had it pointed out to me that my foolish attempts to try and respond to people being rude was a mistake, So I am opting out of conversations about the sun rising in the west, studs not being available in Northern Ontario, my being a woman, and several other topics. So when you were just silly and acting in a way I perceive is not genuine and interesting, ..... I mentally tag it as pulling a Simon :)

No big deal, feel free to ignore me.
so you say you are not going to get involved with insulting people and to prove your point you insult someone. the other gentleman that beat you pretty badly over the last few days have been way meaner to you. all i did was prove you wrong repeatedly.
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0
your understanding of his words is confusing. i know how the net works but i am not following what you are trying to know. are you asking if you can grab a piece of something from one spot then grab another piece from another spot ? if the whole thing is broken down then reassembled when it arrives ? if it is broken down does it all travels the same "wires" or go in different directions to meet up later in the pre determined destination ? what is it you are asking.

as for my 1 time creating a fake account it was before you and as i stated it was caught after 1 post and deleted and i was given longer away. as for the first thing you said i have no idea what that means either.
well, the over all issue. If you know some information that is being transmuted..... for example destination the bank of Montreal IP, and something that will be in that transmission... 8234256 for example. Can you set up a (well he said a few) computers on a very high speed internet link and have it collect all the strings that happen to wander through that node?

It seems to sound logical.
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0
so you say you are not going to get involved with insulting people and to prove your point you insult someone. the other gentleman that beat you pretty badly over the last few days have been way meaner to you. all i did was prove you wrong repeatedly.
No you are not stupid enough to think you were right. You played me like a sucker fish. :)
 

simon482

internets icon
Feb 8, 2009
9,965
175
63
No you are not stupid enough to think you were right. You played me like a sucker fish. :)
except i was right and you are a sucker fish. as for the rest i just got a phone call i will answer when i get back. you made things a little clearer. thank you.
 

simon482

internets icon
Feb 8, 2009
9,965
175
63
well, the over all issue. If you know some information that is being transmuted..... for example destination the bank of Montreal IP, and something that will be in that transmission... 8234256 for example. Can you set up a (well he said a few) computers on a very high speed internet link and have it collect all the strings that happen to wander through that node?

It seems to sound logical.
you can catch anything you want if you know where and when to look for it. he was right. if you just set your computers to catch everything that comes along that section for say an hour just cuz you know it will be going during that time period you are going to get a lot of information and it will take you a while to sift through everything you got to find what you are looking for. it would be a lot easier for you if you knew when it was gonna be sent. also if you only know the final destination and not the path it is going to take to get there you would need to get into secure servers of say a bank (your example) and that is illegal.
 

Celticman

Into Ties and Tail
Aug 13, 2009
8,917
88
48
Durham & Toronto
Popcorn time
 

dtjohnst

New member
Sep 29, 2010
425
0
0
That's kind of how it works, but also not at all how it works.

Data is broken up into packets which have headers containing all kinds of information. Will they all take different routes? Not likely. Unless your email is huge, the routers (big routers, not the small ones in your basement) will buffer and transmit as a burst. So most likely all your data goes out at the same time on the same route. Even if it gets split up, you've still got a 99.99999% chance it all follows the same route.

If a hacker needs a string to read your emails, they're a pretty shitty hacker. The vast majority of what you send and receive is unencrypted. All I need to do is get into your network (not hard, at decent hacker can infiltrate Belll/Rogers networks for this purpose) and update routing tables to get all of your data. Then they can know what websites you visit, what links you clink on, what emails you send/receive, etc.

Getting emails and stuff is easy. Getting passwords, which should be transmitted encrypted, is a different story. Your banking information is very safe. Your private email and chats, however, are not.
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0
you can catch anything you want if you know where and when to look for it. he was right. if you just set your computers to catch everything that comes along that section for say an hour just cuz you know it will be going during that time period you are going to get a lot of information and it will take you a while to sift through everything you got to find what you are looking for. it would be a lot easier for you if you knew when it was gonna be sent. also if you only know the final destination and not the path it is going to take to get there you would need to get into secure servers of say a bank (your example) and that is illegal.
It is ok, I made a bet to see. He will look at everything going into a specific mail server, and capture all the strings that match a criteria. If he can send me the header on 12 strings that match the criteria he wins :)

My Chinese urge to bet is emerging ;)
 

simon482

internets icon
Feb 8, 2009
9,965
175
63
That's kind of how it works, but also not at all how it works.

Data is broken up into packets which have headers containing all kinds of information. Will they all take different routes? Not likely. Unless your email is huge, the routers (big routers, not the small ones in your basement) will buffer and transmit as a burst. So most likely all your data goes out at the same time on the same route. Even if it gets split up, you've still got a 99.99999% chance it all follows the same route.

If a hacker needs a string to read your emails, they're a pretty shitty hacker. The vast majority of what you send and receive is unencrypted. All I need to do is get into your network (not hard, at decent hacker can infiltrate Belll/Rogers networks for this purpose) and update routing tables to get all of your data. Then they can know what websites you visit, what links you clink on, what emails you send/receive, etc.

Getting emails and stuff is easy. Getting passwords, which should be transmitted encrypted, is a different story. Your banking information is very safe. Your private email and chats, however, are not.
if you want to grab a certain piece of information of a certain machine wouldn't you need to know the path it was traveling on ? like if i was sending an email to you and someone wanted that email wouldn't the person that wanted that email need to know where it is traveling to grab it ? there are millions of paths between me and you how would you even know where to look. i was under the impression that unless you knew where it was traveling you couldn't grab it and the best way would be to either have hacked the final destination or the sender.
 

smiley1437

Member
Oct 30, 2005
829
0
16
So the question I am asking, is am I being bullshit or is this true?

So is it possible?
Short answer - maybe.

The story is a little tortured but the description of how packets travel on the internet through various routers is essentially correct, although really wild bouncing isn't quite realistic - route flapping is considered undesirable behavior.

Not exactly sure of how the data capture would occur - is it assumed that you have root access to a router that you believe would be on one of the possible routes of the traffic you're trying to capture?
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0
if you want to grab a certain piece of information of a certain machine wouldn't you need to know the path it was traveling on ? like if i was sending an email to you and someone wanted that email wouldn't the person that wanted that email need to know where it is traveling to grab it ? there are millions of paths between me and you how would you even know where to look. i was under the impression that unless you knew where it was traveling you couldn't grab it and the best way would be to either have hacked the final destination or the sender.
I have no idea. He told me getting an entire "communication" was very difficult. Although apparently big brother does it at the border and their computers "read" a significant number of emails and "communications" for trigger words.

Apparently grabbing one of the packet things is pretty much just a question of just knowing something that is in "communication" and watching for it to fly by. Knowing either where it came from, or where it is going makes it infinitely easier. Being 'close' to either end also makes it easier as well. Well I guess it not so much easier, but will make it more likely to happen in a shorter time frame. And apparently 'closer' is linked to physical distance but not tightly linked. Closer is related to the path the packet takes.

Apparently it must be quite a bit of work. It took a bet well into the four figures before he agreed to do it.

This is fun, I am learning so much!

So no ping ball machine model. :) It is more structured and organized.

So using an example he mentioned,

If you owned a store that sold XYZ widgets, and you had only one competitor, it would be possible to set up something that would only look at "communications" going to the competitor's IP. It would be sniffing for any packet that contains the string " XYZ". You sort of need to be watching traffic on the internet to do this. You can pick a place that is more likely to have the packet travelling if you choose the right path. You can guess the tail in of the path as long as you know the destination IP. :)

So if someone sends a packet with XYZ you have a chance of getting it. If they send it more often you get a better chance. If they send it a lot it is likely you will get multiple hits. He tells me this is not illegal, and you can access the header information freely. You just need to be certain the content is in the public domain. Oh bad example with the store order I guess. Not public domain.

I still have not been able to understand how how these hubs/routers know were to send the packets. Well more precisely how they decide who the next hubs/routers will be. I get the impression that the although the odds are the closest router to the destination will see it, there is a possibility it will be routed right around the world. Can any one explain it so a relative novice can understand?


Thank You.
 

dtjohnst

New member
Sep 29, 2010
425
0
0
if you want to grab a certain piece of information of a certain machine wouldn't you need to know the path it was traveling on ? like if i was sending an email to you and someone wanted that email wouldn't the person that wanted that email need to know where it is traveling to grab it ? there are millions of paths between me and you how would you even know where to look. i was under the impression that unless you knew where it was traveling you couldn't grab it and the best way would be to either have hacked the final destination or the sender.
I mentioned updating routing tables... When you do that, you're ensuring every packet within that network hits machines you control. In essence, you're controlling the route of everything.

It sounds hard, but a combination of social engineering and research can get you a decent network map of something even as large as Rogers' network in a neighbourhood to work with. Alternatively, if you can isolate a gateway for a given node on the network, you can manage it by simple invading that machine.

This assumes, of course, you're actually hacking. Most people who claim to be hackers aren't. They're script kiddies or spoofers or sniffers. I can teach someone to sniff networks without them knowing anything about coding, computing, network theory or encryption. If I was teaching them to hack, I'd have to start with psychology and algebra, then expand into sociology and calculus, then acting and discrete math, then networking and hardware architecture, them programming and databases...and then we could actually try to hack something.
 

dtjohnst

New member
Sep 29, 2010
425
0
0
Short answer - maybe.

The story is a little tortured but the description of how packets travel on the internet through various routers is essentially correct, although really wild bouncing isn't quite realistic - route flapping is considered undesirable behavior.

Not exactly sure of how the data capture would occur - is it assumed that you have root access to a router that you believe would be on one of the possible routes of the traffic you're trying to capture?
Fid the neighbourhood, find the network map. Now you know somewhere all the data will go though: the gateway.
 

dtjohnst

New member
Sep 29, 2010
425
0
0
I have no idea. He told me getting an entire "communication" was very difficult. Although apparently big brother does it at the border and their computers "read" a significant number of emails and "communications" for trigger words.
It's not difficult if you know what you're doing. The government has an easier task because they have access to root nodes in the country so they see everything.

Apparently grabbing one of the packet things is pretty much just a question of just knowing something that is in "communication" and watching for it to fly by. Knowing either where it came from, or where it is going makes it infinitely easier. Being 'close' to either end also makes it easier as well. Well I guess it not so much easier, but will make it more likely to happen in a shorter time frame. And apparently 'closer' is linked to physical distance but not tightly linked. Closer is related to the path the packet takes.

Apparently it must be quite a bit of work. It took a bet well into the four figures before he agreed to do it.
If this is for simple, plain-text, unencrypted email, you got ripped off. I know hackers who will just get you the password for $500, then you can read all the email. I guess if he kept telling you how hard it was, he was already setting you up for the whole, "It won't be cheap," bit. As a general rule, if you don't know anything about something, you'll probably overpay.

This is fun, I am learning so much!

So no ping ball machine model. :) It is more structured and organized.

So using an example he mentioned,

If you owned a store that sold XYZ widgets, and you had only one competitor, it would be possible to set up something that would only look at "communications" going to the competitor's IP. It would be sniffing for any packet that contains the string " XYZ". You sort of need to be watching traffic on the internet to do this. You can pick a place that is more likely to have the packet travelling if you choose the right path. You can guess the tail in of the path as long as you know the destination IP. :)

So if someone sends a packet with XYZ you have a chance of getting it. If they send it more often you get a better chance. If they send it a lot it is likely you will get multiple hits. He tells me this is not illegal, and you can access the header information freely. You just need to be certain the content is in the public domain. Oh bad example with the store order I guess. Not public domain.
Why would someone send the same email multiple times? And electronic communication is protected by law. So it's never legal to look at the content. Headers are public because thats the only way networks can know where to send data.

I still have not been able to understand how how these hubs/routers know were to send the packets. Well more precisely how they decide who the next hubs/routers will be. I get the impression that the although the odds are the closest router to the destination will see it, there is a possibility it will be routed right around the world. Can any one explain it so a relative novice can understand?
Routing tables. Think a huge excel spreadsheet that is constantly updated with information on the optimum routes to get to different places. Overly simplified, but the easiest way to visualize it.
 

mrsCALoki

Banned
Jul 27, 2011
4,936
3
0
It's not difficult if you know what you're doing. The government has an easier task because they have access to root nodes in the country so they see everything.
Clearly I do not, but I am learning.


If this is for simple, plain-text, unencrypted email, you got ripped off. I know hackers who will just get you the password for $500, then you can read all the email. I guess if he kept telling you how hard it was, he was already setting you up for the whole, "It won't be cheap," bit. As a general rule, if you don't know anything about something, you'll probably overpay.
LOL I probably am / will. It was worth it to see. And no it not just reading someones email.


Why would someone send the same email multiple times? And electronic communication is protected by law. So it's never legal to look at the content. Headers are public because thats the only way networks can know where to send data.
It does not need to be the same email. Just a common string in each email. I bet you sign your emails? There is a common string. Emails were just an example. I will ask the legal question On Tuesday :). My understanding is it would be illegal to intercept private communications. It is not illegal to harvest the header information based on destination IP and strings that our public domain. But I will look at that next.


Routing tables. Think a huge excel spreadsheet that is constantly updated with information on the optimum routes to get to different places. Overly simplified, but the easiest way to visualize it.
Oh so any one who has access can easily predict the most likely hubs/routers that will be servicing a given destination IP. So yes it would be a lot easier than I imagined to find a convenient place to look.

Thank you !!!!
 
Status
Not open for further replies.
Ashley Madison
Toronto Escorts