posted on Apr, 20 2008 @ 08:16 PM
Simply, theres no target... plus its not as easy as it used to be.
The networks I handle are for a Tier 2 telecom/isp company up here in Canada so the hardware being used is easily something like "nasa-level". With
measures like rotating synchronized keys, secure vpn tunneling on top of multiple personal keys that are changed every week or two you can't just
brute force your way in, the days of that kind of hacking is long over.
If you say organized a group of 100+ skilled network administrators (at least current CCIE level) and setup an attack on the DoD or NASA or the
Pentagon, etc. You would require either inside help or you'd have to be damn good at phishing on a real world level. If you had someone inside, you
could at least get yourself into the network on some level and from there I'm sure 100+ people could find a way to exploit their way up the chain of
user rights. If you had no help you'd want to go phishing, and not in the email sense where you get redirected to a fake Paypal address scam. You'd
call someone at NASA, pretend to be an administrator in the building and phish information from them over the phone with you people skills (biggest
concern in the corporate world in terms of hacking attempts).
Or if you have balls walk in the front door with a fake tag and look for post-it notes on people PC's that have login info (also legit concern that
does take place). Since passwords on secure networks are often letters, numbers and symbols, most everyone will write it down somewhere near by.
If you organize it, they will come... but no one has.