![]() Getting SetupĪll of the code for this project lives in this repository if you want to jump right in, but I’ll explain how it all works below.įirst, you just need to clone the repo, install its dependencies, and symlink the hack command line interface (CLI) tool. ![]() It doesn’t take some hacker genius to wreck your life - any “script kiddy” who can gain physical access to your computer can compromise you by downloading a script containing just 50 lines of code. So keep in mind that the purpose of this article is to show you just how easy it would be for someone with bad intentions to hack you so you can avoid getting hacked yourself. ![]() Specifically: “intentionally access a computer without authorization or exceed authorized access” - The Computer Fraud and Abuse Act (18 U.S.C. Pretty sweet, right? Or perhaps shocking? That’s it! Their computer is now infected and I can run whatever commands I want on this computer remotely. So I’ve created a simple project to hack my friends and show them the importance of computer security.Īll I need to do is wait for them to leave their computer unlocked for a few seconds, open up their terminal, and type a single, short command. I tell them they should probably get in the habit of locking their computers, but they don’t listen to me. My friends often leave their computers open and unlocked.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |