View Single Post
Old 18-04-2018, 23:04   #31
pip08456
Sad Doig Fan!
 
pip08456's Avatar
 
Join Date: Aug 2007
Location: Barry South Wales
Age: 68
Services: With VM for BB 250Mb service.(Deal)
Posts: 11,654
pip08456 has a nice shiny starpip08456 has a nice shiny star
pip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny starpip08456 has a nice shiny star
Re: KRACK security hole in WPA2 - VM fixes incoming?

Quote:
Originally Posted by tidder23 View Post
the arguments seem to be

a) there's not a lot of people who can boot up linux (if it's not that simple now somebody will package it up so it is soon)

b) somebody with the software (if you're into hacking you will find a software or some variant of it)

c) somebody is going to take the time(I spend hours and hours fiddling with tech I don't see this as a barrier for somebody who like's hacking)

d) going to specifically target you (they are going to target somebody)


so you are comfortable. Playing the odds that the guy who is hacked isn't you
I'm saying it will happen to some people
the more that they leave it the easier it will be to do and the more it will be combined with other attacks and the more common it will become
Linux is easy to boot up, no need to install it you can do it from a live DVD.

Someone into hacking or pentesting can get the software needed.

There's a world of difference between "fiddling with tech" and writing hack scripts or even using the command line to run readily prepared hack scripts.

Once you've spent the time getting in (if you manage it) what are you going to do? A hacker has to have a reason to hack. Yes there's the "because I can" scenario but once done they don't tend to go any further unless they are looking for something specific on the person or company.
pip08456 is offline   Reply With Quote