Unsolved Mysteries |
Big Foot/Yeti Loch Ness Monster Ghosts Life-after-Death Experiences Psychic abilities UFOs/aliens Alien Abduction Shadow People How the Pyramids Were Built Stonehenge | Bermuda Triangle Angels Auras Out-of-Body Experiences Mayan Calendar (end of the world) Time Travel/Time Slips Spontaneous Human Combustion Miracles Psychic Prophesy Crop Circles |
Click here to save a copy of the notetaking form and project instructions:
https://docs.google.com/document/d/1K6_vAF8IpyNQv8QHx_CGkbK78Tim6oSi9ctvH4u-gSg/edit?usp=sharing
https://docs.google.com/document/d/1K6_vAF8IpyNQv8QHx_CGkbK78Tim6oSi9ctvH4u-gSg/edit?usp=sharing
Tell me some information about hackers and hacking from yesterday's activities. You can look back at the article or think about the steps in the game.
Try to come up with at least 5 facts, and at least 1 should be about "ethical" hacking (people who hack for good reasons rather than to cause harm).
Try to come up with at least 5 facts, and at least 1 should be about "ethical" hacking (people who hack for good reasons rather than to cause harm).
Today you are going to explore computer threats such as hacking and viruses. Be ready to write a reflection tomorrow on what you learn today!
First:
Listen to the news article about kids learning how to hack. You can follow along as it plays and read silently along on their own computer.
http://www.npr.org/blogs/alltechconsidered/2013/08/13/211669208/hacking-real-things-becomes-childs-play-at-this-camp
Things to think about:
Next:
Play the hacking game at this website: http://www.hdtrailerz.com/full-flash/the-hacker
(Read carefully and just follow the directions.)
Optional: Want to try a more realistic hacking game?
Try: http://www.slavehack.com/.
You can either log in with my account (username: gsmstech, password: c0ug4rs) OR create your own account with a real email address (you will have to check this email for an activation link. Mine went straight to my Spam filter, so you may have trouble with this). Then follow these directions to get started:
Then:
Explore the website http://howsecureismypassword.net/ to experiment with strategies to make passwords more secure (but still easy to remember!) by adding capitals, numbers, and symbols. Can you make a password that can be hacked in googol (1 followed by 100 zeroes) years or infinity?
First:
Listen to the news article about kids learning how to hack. You can follow along as it plays and read silently along on their own computer.
http://www.npr.org/blogs/alltechconsidered/2013/08/13/211669208/hacking-real-things-becomes-childs-play-at-this-camp
Things to think about:
- How safe do you feel using the same log-in and password as Facebook, Twitter, or Google on other websites, knowing that a 10-year-old kid can hack these SaaS (Software as a Service) accounts?
- Are you surprised that devices like TVs and thermostats are being hacked? What are the consequences of Internet access on these devices?
- What is “white hat” or ethical hacking? Why will some business reward kids for hacking by paying them real money for doing this for them?
Next:
Play the hacking game at this website: http://www.hdtrailerz.com/full-flash/the-hacker
(Read carefully and just follow the directions.)
Optional: Want to try a more realistic hacking game?
Try: http://www.slavehack.com/.
You can either log in with my account (username: gsmstech, password: c0ug4rs) OR create your own account with a real email address (you will have to check this email for an activation link. Mine went straight to my Spam filter, so you may have trouble with this). Then follow these directions to get started:
- Click on the green 'Internet' button.
- Look through the list and find 'Freeware 4 All'.
- Click on the IP address for this website. Look for the password and copy it.
- Click on 'go to login screen' and paste in the password.
- Click on the link to 'Files'.
- Find the button to download software, which looks like two pieces of paper next to each of these 3 files:
-OpenRelay-backdoor.vspam (virus to send spam using a slave)
-Marketing.mailer (required to send spam)
-Password bruteForce.crc (to crack passwords) - After you have downloaded all 3 files, go back to the green 'Internet' button.
- Log out of 'Freeware 4 All', go back to the list of servers and find 1.1.1.1
- Click on 'go to login screen'.
- Because you got the cracker, you can now press a link to attempt starting hacking.
- Start cracking and try a few times, you might need to crack several times before you get the password of this server.
- This server, 1.1.1.1, is now your slave because you now have admin access to it. You probably want to make some money with it now.
- You can make money by clicking 'upload a file' and choosing the virus 'OpenRelay-backdoor.vspam' to send to the slave you just hacked.
- Once the spam virus file is uploaded, run it by clicking the little gear to the left of the file name.
- Once the virus is installed, go to the 'Slaves' page. You should now see the server 1.1.1.1 as your slave in the list, assign it to send spam by clicking on the link.
- Congratulations! Your slave is now sending spam. You will see how long it has been sending spam, if it has been sending spam for quite a time you should press the link 'Collect profit' and select a bank account to send the money to. Servers change their passwords a few times per day, they will also clean and reset their hard disks.
- Until now you have probably left your IP in the logs of every server you connected to. This means people could try to hack your PC just like you've cracked 1.1.1.1. To prevent people from breaking in and deleting all your files You should always clean the log files on the target (but also at your own, in case someone does get in).
- These directions only explained 3 file types, but there are more different files. Here is the manual tell you all about all software: http://www.slavehack.com/includes2/forum.php?&action=viewtopic&topic=46434&cat=6
Then:
Explore the website http://howsecureismypassword.net/ to experiment with strategies to make passwords more secure (but still easy to remember!) by adding capitals, numbers, and symbols. Can you make a password that can be hacked in googol (1 followed by 100 zeroes) years or infinity?