News: The Consequences of Hacking

The Consequences of Hacking

Mostly all hackers like to have a laugh. We like to have fun! We like to troll. And maybe, even cause some havoc once in a while. But, while we do this, we must always stay in the line of the law.

In the United States (Where I live), the government will get involved in almost every hack you do. The most common agency you will meet if you do something illegal is the FBI.

Wherever you live, there will most likely be a cyber crime unit, a local one. There just always is. Now, I'm going to quote something a good ol' black-hat efriend told me: "To be truly anonymous on the internet, you must follow a few steps.

1.) Never talk about your hacks. You just don't need to. To anyone. Especially in real life friends.
2.) Don't go magically getting 50 bitcoin and put it all in your bank account. The cops will investigate it.
3.) Proxies are your friends, VPN's are just acquaintances."

Let's take note that you need to do at least $5,000 dollars in damages for any illegality to be done. At least, $5,000 in damages are needed for something like the FBI to get involved with.

Some people here (Keyword: SOME) are teens. Curious teens. If not teens, preadolescent. And we get curious. Some people here know more than even me, and I've been in Cyber Security for quite some time... I've known people to hack government databases looking for 'Information' on something specific. Not meaning to cause harm, of course. Has anyone heard of the Gary McKinnon story? A hacker who hacked Military computers & NASA just to find 'U.F.O' sightings? Curiosity get's the best of all of us.

Now, let's talk about what an illegal hack is.

A hacker, defined by Google is:

"A person who uses computers to gain unauthorized access to data."
while this definition although seems idiotic for me, being a white-hat hacker... I'm going to go by it.

What this means is that to do something illegal, you must "Gain unauthorized access to data". But this isn't the only illegal part. You do not necessarily need to gain authorization to anything. A simple DDoS/DoS attacks would do it.

A DDoS (Distributed Denial of Service) is a type of DOS attack where multiple compromised systems, which are usually infected by some sort of Trojan/Virus are used to target a single system causing a Denial of Service (DoS) attack. A DoS is a type of attack on a network that is designed to bring a specific network down to it's last breath by flooding it with useless traffic.

These types of attacks make something unavailable, whether it's your internet access or a website, it take's it offline for a specific amount of time. If you want to get more into the subject, or do a DDoS attack test, there are multiple Network Stress Testing tools you can use for a price.

Now, a DDoS attack can cause a lot of damage. I mean a lot. If we right now, send 1.2Tbps of traffic to a specific IP (Internet Protocol) the chances of that website going offline are beyond huge. If we were to manage to take down Amazon.com offline for more than 10minutes, we would cause more than $1,000,000 in revenue! A lot!!! Amazon can lose about $66,240 per minute every time it is down, if not, a lot more. But if you add the lawyer fees, the cyber security investigation to find the attacker, etc, it'd be a lot more than 1,000,000. And a DDoS attack is actually really famous around the e-world.

I just want to leave this with, BE CAREFUL ON THE WEB.

Just updated your iPhone? You'll find new emoji, enhanced security, podcast transcripts, Apple Cash virtual numbers, and other useful features. There are even new additions hidden within Safari. Find out what's new and changed on your iPhone with the iOS 17.4 update.

7 Comments

A very nice article and well written I enjoyed reading it and learned a lot thanks.

Really good one.

Very good and interesting article, thanks.

It had me wondering about one sentence though:

3.) Proxies are your friends, VPN's are just acquaintances.

What's that supposed to mean?

I am in the process of looking for a really good payed, non logging VPN at the moment, but should I be looking for proxies instead?

At the moment I just want some privacy, but you never know what I might use it for in the future.
What should I be looking for?

FYI: The whole reason I go into this whole privacy thing is because of this site.

It really got me thinking, and now I'm on a somewhat paranoid (more educated?) path of trying to protect myself, and my family.

Thanks Null-byte

VPNs you usually pay for, and even the ones that SAY they don't track often don't know how NOT to be tracked.

Proxies are open and anonymous, and you don't (usually) have to pay for them. paying for something creates a link back to you, which, as a hacker, should be something you try to avoid...

VPN is fine for legit use, and fairly secure, but for any...under the table deals, you should be proxied up.

Thank you for replying to him Bob!

A VPN will only encrypt your traffic, whereas L2P, Tor, etc will anonymize your traffic. A VPN itself won't keep you safe, just encrypted.

For legal uses, a VPN is quite useful! But a proxy will always work amazingly well. If you're not wanting to use a VPN/Proxy, you can use 'The Whonix Project' which is a Debian based project that anonymizes your traffic and sends it all over Tor. You can always use A VPS and tunnel everything to it, it will keep you anonymous and safe online. A VPS will also be pretty good, it'd be a public IP address which works wonderfully as you might want to connect to back shells.

To put it all in a basic way: A VPN is not as useful as a VPS (Paid with Bitcoin) or a proxy. A Proxy will hide your IP and well, of course, it's free and easier to host.

Here cops still use windows 98 on their systems and they can hardly open their facebook accounts :D

There is nothing called cyber crime here, you just need to avoid making the FBI mad so that they will go through all the diplomatic stuff to get you in their country

Share Your Thoughts

  • Hot
  • Latest