Hacking: Legal and Ethical Problems

In summary: I forget what they are called.In summary, this hacker has participated in a hacking and cybersecurity competition and won a Wi-fi Pineapple Nano Basic. They would like to know how they could infringe with the law in any possible way with network and port scans, the Pineapple module, any connections to open ports and so on. Does anybody know any possibilities of law infringement? Precautions?
  • #1
ISamson
Gold Member
438
151
On the weekend I have participated in a hacking and cybersecurity competition.
We were assigned some capture the flag challenges in teams and we had an awesome weekend of hacking!
My teammate and I have won the high school division and as a prize we get a Wi-fi Pineapple Nano Basic. This is a cool wireless hacking module. I also want to continue with my interests in technology and cybersecurity.
However, as I do not know much about Governmental Laws, I would like to know how I could infringe with the Law in any possible way with network and port scans, the Pineapple module, any connections to open ports and so on. Does anybody know any possibilities of law infringement? Precautions?
Thank you.
 
Technology news on Phys.org
  • #2
Make your own off net network sandbox with a few raspberry pis and windows machines and explore your penetration testing there.

Once you start playing on the internet you run the risk of crossing a line and getting into big trouble.

Remember the famous case of Robert Morris who created the first internet worm. He wanted to see if he could make a self-replicating program to explore the size of the internet and unleashed it on the real network with disastrous results. He became famous, embarrassed his father, a noted security expert and now works at MIT as a tenured professor.

At the time he got 3 years probation and was fined $10K.

https://en.wikipedia.org/wiki/Robert_Tappan_Morris
 
  • Like
Likes Janosh89, QuantumQuest and ISamson
  • #3
The simplest rule is to assume that you're breaking the law if you don't have written permission.
 
  • Like
Likes jedishrfu
  • #4
jedishrfu said:
Make your own off net network sandbox with a few raspberry pis and windows machines and explore your penetration testing there.

I do not have raspis.
I don't think I know how to make my own network, unfortunately. However, yes, I was thinking about this, good idea, but I don't know how to make thw network and raspis are not my speciality.
What if I hack my own phone for example? I have my permission.
Thank you.
 
  • #6
How to make an inner network?
 
  • #7
ISamson said:
I do not have raspis.
I don't think I know how to make my own network, unfortunately. However, yes, I was thinking about this, good idea, but I don't know how to make thw network and raspis are not my speciality.
What if I hack my own phone for example? I have my permission.
Thank you.

Your phone has connections to the outside world. No wifi, no cellular, no connections to any network.

Creating a network isn't that hard. You just need connect your machines to your router and disconnect it from the internet. Gamers used to do this all the time for group play aka a LAN party.
 
  • #8
jedishrfu said:
Creating a network isn't that hard. You just need connect your machines to your router and disconnect it from the internet.

Ok. Yep, I remember we did this with a multiplayer game. Would that waste mobile data?
 
  • #9
Only if you use the cellular network to transfer data. Thats why folks try to connect to wifi whenever possible.

Caveat: Never connect to a public wifi unless you absolutely have to and you then take on the risk of not divulging private inof or cc card numbers...

Its too easy to do a man-in-the-middle attack or some other similar attack and read your transmissions.
 
  • #10
Does this have anything to do with web servers/servers?
 
  • #11
jedishrfu said:
You just need connect your machines to your router and disconnect it from the internet.
How can you do that?
How can you disconnect something from the internet and still wirelessly communicating between devices?
 
  • #12
Are we talking about VPNs?
 
  • #15
There are lots of sites on the internet that have public wargames servers. You could use one of those.
 
  • Like
Likes ISamson
  • #16
DavidSnider said:
There are lots of sites on the internet that have public wargames servers. You could use one of those.
Yes, but I wanted to experiment with my own things.
Thanks.
 
  • #17
ISamson said:
Yes, but I wanted to experiment with my own things.
Thanks.

The "offline" route is creating a virtual network and have the edges of the network have VMs with images of "damn insecure linux". They have prepackaged docker images that set up a pretty good out of the box lab for you.
 
  • Like
Likes ISamson
  • #18
Anyone know of Wi-fi Pineapple?
 
  • #19
ISamson said:
What if I hack my own phone for example? I have my permission.
What if I hack my phone? I have my permission...
@jedishrfu, I don't get your answer:
jedishrfu said:
Your phone has connections to the outside world. No wifi, no cellular, no connections to any network.
 
Last edited:
  • #20
Ask yourself "Do I want yo go to jail for hacking?" and then answer "NO!"

Solution: Don't connect to wifi, don't connect to cellular, don't connect to any system connected to the internet.

Consider your experiments like a contagious virus. You don't want to create a pandemic right?

https://en.wikipedia.org/wiki/Biosafety_level#Biosafety_level_4

So you must play in total isolation. Learn from your experiences and become a successful computer security expert. Anything beyond that will lead to prison.

Skilled hacker:
https://en.wikipedia.org/wiki/Hacker

Wannabe hacker:
https://en.wikipedia.org/wiki/Script_kiddie

Hacked hackers:
https://en.wikipedia.org/wiki/List_of_computer_criminals

Don't be these guys! Don't go to prison! Don't be Mr Robot! Watch Mr Robot instead.

https://en.wikipedia.org/wiki/Mr._Robot
 
  • Like
Likes ISamson, OCR and Borg
  • #21
jedishrfu said:
Don't be Mr Robot! Watch Mr Robot instead.

The prize for the competition I mentioned earlier, that I won, was seasons 1 & 2 of Mr Robot. But since it is an MA rated show, the organisers did not give it to us, because we are only in year 7 and thay did not expect such young people. Instead they will give us a Pineapple Nano Basic. :smile:
 
  • #22
ISamson said:
The prize for the competition I mentioned earlier, that I won, was seasons 1 & 2 of Mr Robot. But since it is an MA rated show, the organisers did not give it to us, because we are only in year 7 and thay did not expect such young people. Instead they will give us a Pineapple Nano Basic. :smile:

Oh well, it’s a pretty good show. It’s the most accurate portrayal of a hacker on tv to date.
 
  • Like
Likes ISamson
  • #23
jedishrfu said:
Your phone has connections to the outside world. No wifi, no cellular, no connections to any network.

Creating a network isn't that hard. You just need connect your machines to your router and disconnect it from the internet. Gamers used to do this all the time for group play aka a LAN party.

So, must I put the "Mobile hotspot" on without data, connect to it and that is it?
 
  • #24
jedishrfu said:
Creating a network isn't that hard.

I get it. Just connect all the devices as in the picture and disconnect from the big Earth icon...:smile:
home-solution-wifi-devices-network-184281306-57f795863df78c690f36336d.jpg
 

Attachments

  • home-solution-wifi-devices-network-184281306-57f795863df78c690f36336d.jpg
    home-solution-wifi-devices-network-184281306-57f795863df78c690f36336d.jpg
    35.8 KB · Views: 242
  • Like
Likes jedishrfu
  • #25
Yes that's a great setup.

The one limitation is that you have only one PC whereas I think you need a second to be the hacking master console.

How did you downsize the Earth?
 
  • #26
ISamson said:
Can this be done with streamed mobile data? We don't have a router and my mother streams her limited mobile data.
If you don't have a wifi router you have very little use for the wifi pineapple device.
 
  • #27
jedishrfu said:
The one limitation is that you have only one PC whereas I think you need a second to be the hacking master console.

To my disposal anytime I want I have a phone and a Mac Pro Pc. + another PC if I want to.
jedishrfu said:
How did you downsize the Earth?
I did not. What do you mean?
 
  • #28
It was a joke reference to a new Matt Damon movie called Downsizing where people get reduced to 5” tall and live in a community specially built for them and essentially saving money because they use less resources or something like that.

What I meant about the second pc is that you’d use it to do hack testing on all the devices in your picture as I thought that was your intent to make a legit hackers test setup. The second pc would allow you to do hacking penetration on the first pc as well as the other devices.
 
  • Like
Likes ISamson

1. What is hacking?

Hacking refers to the unauthorized access and manipulation of computer systems and networks. It involves finding vulnerabilities and exploiting them to gain access to sensitive information or control over the system.

2. Is hacking illegal?

In most cases, hacking is considered illegal as it violates privacy and security laws. However, there are some exceptions such as ethical hacking, which is done with permission to test and strengthen a system's security.

3. What are the ethical problems associated with hacking?

One of the main ethical problems with hacking is the violation of privacy and unauthorized access to sensitive information. Additionally, hacking can also cause financial and reputational harm to individuals and organizations.

4. How can we prevent hacking?

There are several measures that can be taken to prevent hacking, such as regularly updating software and using strong and unique passwords. It is also important to educate individuals and organizations about the potential risks and how to protect against them.

5. What are the legal consequences of hacking?

The legal consequences of hacking can vary depending on the severity of the offense and the laws in the specific jurisdiction. In general, hacking can result in fines, imprisonment, and damage to one's reputation and career. It can also lead to civil lawsuits for damages caused by the hacking.

Similar threads

Replies
23
Views
2K
Replies
7
Views
13K
Replies
16
Views
3K
Replies
12
Views
3K
Replies
17
Views
6K
  • Introductory Physics Homework Help
Replies
2
Views
3K
Replies
2
Views
2K
  • Special and General Relativity
Replies
13
Views
2K
  • General Discussion
2
Replies
65
Views
8K
Replies
6
Views
3K
Back
Top