Avatar feed
Responses: 3
SPC David S.
2
2
0
Hacking back should be legal - users should have a right to protect their data as well discourage hackers.
(2)
Comment
(0)
SPC David S.
SPC David S.
7 y
A reverse shell (also known as a connect-back).
(0)
Reply
(0)
Maj Kevin "Mac" McLaughlin
Maj Kevin "Mac" McLaughlin
7 y
It's not that easy and you could also find yourself being wrong and attacking a system owned by an innocent individual(s) or even a nation state (which look at those actions as an act of war). Even if you're right, you still have not removed the threat as the individual(s) behind the attack are still out there, fully capable of changing their vector.
(1)
Reply
(0)
SPC David S.
SPC David S.
7 y
Yes with botnets its more complicated as you need to hijack the bot by taking over its C&C server (s) which is running on a poorly manage network.
(0)
Reply
(0)
Maj Kevin "Mac" McLaughlin
Maj Kevin "Mac" McLaughlin
7 y
Which is also assuming the attacker is using botnets. Not all use these as their primary attack vector. Especially those I'd be most worried about. My point is, a return fire attack has to be intricately planned and executed, with a high degree of intel confirming the identity of the attacker.
(1)
Reply
(0)
Avatar small
SSgt Ryan Sylvester
1
1
0
They will be trusted by CEHs, though. Legal documentation giving you authorization to wreck someone's day? Hell yeah.
(1)
Comment
(0)
Avatar small
PO1 William "Chip" Nagel
1
1
0
PO3 Steven Sherrill A Recruiting Tool that has been used since back in the Black Box/Captain Crunch Days.
(1)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close