[identity profile] 1stinkinpercent.livejournal.com
Class was in the computer lab today but there were no lectures prepared or programs booted up on the computers in front of the students. He wasn't going to be the guy that made everyone work after something like that a murderous carnival.

"So hey," he said easily, smiling at everyone. "Pretty tough weekend. I spent most of it in the library so I have no lesson plan for today. But, I know we need a class so we're still here in the computer lab and I've made sure there's a nice selection of games on these computers. Puzzles, board, adventure, action -- "

And absolutely nothing carnival related, thank you.

" -- for you guys to pick from. I know typically these kind of classes would involve a movie but eh, I wanted to be a little different and at least keep you on computers. If you'd rather, you can practice what we've already learned but take it easy and take care of yourselves, okay?"

With that, he let them get to work or get to playing.
[identity profile] 1stinkinpercent.livejournal.com
Once again, class was in the computer lab and Riley was at the front of the room, tapping away on his laptop while he waited for everyone to settle down. When it was time for class to start, he got up and got right to it.

"Today, we're gonna work on spoofing attacks," Riley started. "It's basically what it says on the tin, right there. A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. In simpler terms, it means that the hacker poses as a legitimate site or person or anything and successfully lures the victim into believing it. Once the victim is lured in, the hacker either now has access to their system or might have even convinced the poor victim to send them money. Ever heard of those Nigerian email scams? That's similar to a spoofing attack."

He hoped no one had fallen for one of those here because, yeah. Those didn't turn out fun in the end.

"Your task today is to work up something that might fool the layman in terms of spoofing. Whether it be a website that you can convince someone to visit and log into so you now have all their information or an email that someone downloads and attachment from and the attachment's really a rootkit which means you're into their system or anything else. I'm going to pass out some more information on spoofing attacks and your computers are all set up with the tools you need to create whatever you might wanna create so it's really up to you. Just remember that it has to look like it's the real deal and it can't be kooky because while the savvy user will know to avoid, that's not who you're looking to lure in. Try to lure in the person who barely knows what social media is and thinks that the email saying they won ten thousand dollars for a contest they don't remember entering is a blessing. Go."

And Riley let them get to work.
[identity profile] 1stinkinpercent.livejournal.com
The class was back in the computer lab today and Riley was busily typing on his laptop while everyone filtered in. Once everyone was there and settled, he stood up.

"Good morning," he greeted. "Today, we're going to change gears slightly. We're not going to learn any hacking techniques but rather a few of the different types of hackers there are out there."

He passed out a worksheet of the different classifications before moving on.

"The hacker that I am, for the most part, is a white hat. I hack systems for various companies and corporations to make sure their security is strong. If I can get in, they know they have to tighten things up. Conversely, you then have the black hat hackers who hack systems for their own personal gain. These are the guys who get the notoriety for hacking banks and highly secure systems. A grey hat is the in between. They're the guys that break into a system but then go and tell the system admins that they did it and offer to fix the security hole for free. Maybe not the best way of doing things but helpful, at least."

He paused for a moment. "There are more but I just wanted to touch on the big three during the lecture. For today's activity, I'm going to give you a few scenarios and I want you to try and choose which type of hacker would be the one doing the hacking. Easy, yeah? Let's go."
[identity profile] 1stinkinpercent.livejournal.com
Class was back in the computer lab once again and Riley was leaning against the wall at the front of the classroom. He waited till everyone got settled before he got his lecture started.

"Good morning, everyone," he said, nodding. "Glad to hear nothing weird happened this past weekend so let's get started, shall we? Last week we went over password cracking which is typically one of the easier forms of hacking into a system. But, when you start hacking, you'll find that most of the good stuff is hidden behind more than just some heavy duty passwords."

Riley booted up his own laptop and left it going for a minute. "Most of the time there'll be firewalls, networks, security programs, malware blockers, and sometimes there will be layers upon layers of things. So, you need to know how to bring certain things down or how to wiggle your way around them, right?"

Right. "Ever heard of a rootkit? Rootkits are nasty little things that basically can take over an operating system and are very hard to detect. Their installation is usually obscured and hard to remove. If a hacker is smart, this is what they'll try and make an unsuspecting victim download and install by going to an infected webpage or opening an infected email attachment. It gives the hacker a way into the system and can give them an in to install other forms of malware like keyloggers and other computer viruses. Your job today is to try and get into my system with a rootkit. I've gotten all your computers at least past some of my security but you'll have to crack a few passwords and then get a rootkit past my security software. Now, I've got some pretty stringent security software that's been specially designed to find and delete the most common places for rootkit installation so you're going to have to be both inventive and quick. Think you can do it?"

Riley smiled and gave them all quick instructions on how to build a rootkit, install one and how to properly use it to get the maximum amount of information without being detected by the computer's security software. And then he sent them on their merry way to try and get into his laptop.
[identity profile] 1stinkinpercent.livejournal.com
"So, it seems I missed some craziness," Riley said once he'd gotten back. He'd listened to the radio podcasts and was pretty glad he'd decided to go to DC that particular weekend. "I hope everyone's feeling better and I'll try and keep things light today."

Class was still meeting in the computer lab and there weren't any disassembled computers to piece together. Today, they were actually going to be working on computers! Hurrah!

"While I was in DC, I built a website with some weak security," he explained. "The biggest thing you guys have to get at to find my data? A password. For personal passwords, people tend to go with something familiar to them as the meat of the password before they add in a few letters or numbers or something like that. For companies? They go with long strings of letters and numbers that mean absolutely nothing. In this case, you either go with the brute force attack where you can set your computer up to guess every possible combination of password or the dictionary attack which is exactly what it sounds like. The first step is basically figuring out what type of password I've used. For this lesson, I'll tell you that I've used an actual real word that can be found in a dictionary but there are letters and random characters included. On your computer, there are programs for setting up brute force attacks and there's also a way to start a dictionary attack. It won't always be this easy, though. You'll have to get your own programs if you're really gonna hack something."

Riley paused and nodded. "First one to crack the code will get the adulation of their peers. Good luck and let me know if you need any help."
[identity profile] 1stinkinpercent.livejournal.com
Today's class was back in the computer lab. When the students walked in, they'd see both the computers booted up with some possibly unrecognizable program going and they'd also see a long table of disassembled computers. Riley figured they had to start with the basics before they really got into hacking.

"Morning," he said, giving them all a little salute. "Hope you guys had a good weekend and a good holiday if you did celebrate. Today, we're going to really get into the meat of the class. To be a good hacker, you have to know a little bit about computers. So, that's what we're gonna spend today on. On the computers in front of you, you'll see a program that'll help you learn one of the basic languages of computing, Python. If you're gonna hack, you gotta know how a computer works. Python's a lot easier to learn than C and it doesn't take as long either. Python is intended to be a highly readable language. It is designed to have an uncluttered visual layout, frequently using English keywords where other languages use punctuation. That's what makes it easier to learn."

He paused for a second and moved over to the table of computer parts. "Second, we're all gonna be putting together computers. Yes, this might seem more suited to a class on mechanics but if you know the bits and pieces of a computer, it'll make you a better hacker. You'll be able to visualize what you're hacking and you'll know that not all computer is built the same. I've left instructions for each computer but I'll also be around to help you out with both learning the language and the assemblage of the computers. Let's get started."
[identity profile] 1stinkinpercent.livejournal.com
Today's class (and all subsequent classes unless Riley got creative) were meeting in the computer lab. Riley was already there, laptop open and projected on a screen in front of the class. When everyone had filed in, he stood up and gave them a little wave.

"Morning, hey, how's it going?" he asked. "I'm Riley Poole and if you're here, you're interested in learning the skills and science behind hacking. If you're not here for that, you're welcome to stick around anyway at least for the first class."

He smiled and slid his glasses off his face for the moment. "Hacking gets kind of a bad rap. When we hear about hackers, it's because they've broken into some major, secret system and stolen secrets or they've found a way through Amazon's firewalls and stolen credit card information. Hackers do that, yeah, but they do a lot of other things do. A lot of companies employ them to try and consistently crack their sites to find security weaknesses so they can plug them up before any malicious hacker finds it. The bad hackers are the black hats while the good hackers are the white hats. Makes senses, right? There are other classifications which we'll touch on but not today."

Riley went back to his computer and booted up a Washington DC bank's website. "I'm gonna give you a quick demonstration before we move on. This is a bank I've contracted with to find any exploits. So, we're gonna see if there are any."

He went to work, starting with some crude rootkit devices that he managed to install to gain some control over the system before cracking the firewall password (which were really weak). After a bit longer, he was in and the class would see a list of accounts come up on the screen. Riley shut it down quickly enough.

"Obviously, that bank's security needs some work," he told them. "So, that's what we're gonna learn how to do. Today, let's just start off easy. Give me your name, your level of skill with computers and something you'd like to hack. Karolina here is my TA so if you need help and I'm not available, let her know."

Then, he nodded at the first student to take it away.

Fandom High RPG



About the Game

---       Master Game Index
---       IC Community Tags
---       Thinking of Joining?
---       Application Information
---       Existing Character Directory

In-Character Comms

School and Grounds
---       Fandom High School
---       Staff Lounge
---       TA Lounge
---       Student Dorms

Around the Island
---       Fandom Town
---       Fandom Clinic

Communications
---       Radio News Recaps
---       Student Newspaper
---       IC Social Media Posts

Off-Island Travel
---       FH Trips

Once Upon a Time...
---       FH Wishverse AU


Out-of-Character Comms

---       Main OOC Comm
---       Plot Development
---       OOC-but-IC Fun





Disclaimer

Fandom High is a not-for-profit text-based game/group writing exercise, featuring fictional characters and settings from a variety of creators, used without permission but for entertainment purposes only.

Tags