this post was submitted on 23 Jun 2025
1186 points (98.4% liked)

Technology

71885 readers
5200 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
you are viewing a single comment's thread
view the rest of the comments
[–] Kazumara@discuss.tchncs.de 97 points 2 days ago (4 children)
[–] sirico@feddit.uk 1 points 19 hours ago

Hacking isn't hacking it's usually cracking

[–] Sinthesis@lemmy.today 2 points 22 hours ago* (last edited 22 hours ago) (1 children)

The word "hack" is pre-internet. A "hack" journalist or a "hack job" is basically something unprofessional. It is movies that turned "hackers" into someone that gained access to the "mainframe". In the realm of computer systems, I would argue that a "hack" is doing anything the system was not intended/designed to do. A successful DoS or DDoS needs to find some component of the system that wasn't designed to handle the amount of traffic about to be sent to it.

There are protections for DDoS (iptables, fail2ban, Cloudflare and so on), you have to figure out a way around them, that's a hack.

[–] ours@lemmy.world 1 points 18 hours ago

The current tech-related usage was coined at MIT to mean working on a system. Funny that the oldest recorded source comes from MIT model railroad team.

[–] null_dot@lemmy.dbzer0.com 1 points 1 day ago (1 children)
[–] Kazumara@discuss.tchncs.de 6 points 1 day ago (2 children)

I'd start with the following, and refine if necessary:

"Gaining unauthorized access to a protected computer resource by technical means."

  • Port scanning --> Not hacking because there isn't any access to resources gained*
  • Using default passwords that weren't changed --> Not hacking because the resource wasn't protected*
  • Sending spam --> Not hacking because there isn't any access to resources gained
  • Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
  • Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published**
  • Distributed denial of service attack --> Not hacking because there isn't any access to resources gained

* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily

[–] outhouseperilous@lemmy.dbzer0.com -1 points 1 day ago (1 children)

When my parents kicked me out, the number of times o got to sleep inside because i could convince people i was the county password inspector was more than zero. It's hacking.

Wrench? No. But an old colleague informs me that the version done with a machete does count as hacking. I concur.

Those are both way more useful than exploiting a lazy coder's fuckup, renaming 'house of many backdoors' to 'that package everyone uses in everything' on github, or some fancy math shit.

Your laws are nonsense bullshit, they're just excuses for power and I'd appreciate you not defiling language fof the rest of us to justify them.

[–] Kazumara@discuss.tchncs.de 1 points 23 hours ago (2 children)

Those are both way more useful than exploiting a lazy coder’s fuckup

I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren't useful. They just aren't hacking to me, otherwise the term is too broad to be very useful.

You're free to come up with your own definition, I was asked to define it and that's my best shot for now.

[–] MajorasMaskForever@lemmy.world 2 points 23 hours ago (1 children)

I think a better definition would be "achieve something in an unintended or uncommon way". Fits the bill on what generally passes in the tech community as a "hack" while also covering some normal life stuff.

Getting a cheaper flight booked by using a IP address assigned to a different geographical location? Sure I'd call that a life hack. Getting a cheaper flight by booking a late night, early morning flight? No, those are deliberately cheaper

Also re: your other comment about not making a reply at all, sometimes for people like us it's just better to not get into internet fights over semantics (no matter how much fun they can be)

Your definition is probably better. I can very much vibe with that.

Mitnick mostly social engineered. Most of the big famous attacks at least involved a component of that.

[–] null_dot@lemmy.dbzer0.com 0 points 1 day ago (1 children)

Oh man.

My comment was intended to imply that the term "hacking" defies definition because it has been grossly overused and misconstrued over many decades.

Sure you might be able to convey what it means to you but of course it means different things to everyone else, with each definition being equally appropriate.

Er go, any discussion is one of semantics.

[–] Kazumara@discuss.tchncs.de 1 points 23 hours ago (1 children)

You know my first instinct wast to reply with: "No."

Maybe I should have stuck with that. I had a feeling this would lead nowhere.

[–] null_dot@lemmy.dbzer0.com 0 points 22 hours ago

I had a feeling this would lead nowhere.

precisely the point I was trying to make.

[–] theherk@lemmy.world -3 points 2 days ago (1 children)
[–] damnedfurry@lemmy.world 22 points 2 days ago (2 children)

Mailing someone more letters than they're capable of replying to is not equivalent to, nor a component of, gaining access to the inside of their home.

[–] theherk@lemmy.world 35 points 2 days ago (1 children)

Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.

Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.

[–] Kazumara@discuss.tchncs.de 2 points 1 day ago (1 children)

I haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.

But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?

[–] theherk@lemmy.world 4 points 1 day ago

By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.

Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.

[–] pachrist@lemmy.world 11 points 2 days ago (1 children)

I mean, I know JK Rowling sucks, and it's been a long time since the first Harry Potter movie came out, but it was definitely a component and precursor to Hagrid beating the shit out of that door.

[–] Kolanaki@pawb.social 0 points 2 days ago* (last edited 2 days ago)

To be fair, they had moved to an unsecure location that was a much softer target by that point. Can a DDOS force someone to move their services over to the equivalent of a century old, weather-beaten lighthouse in the middle of England?