Hacking Instant Messaging
Malicious hacking Instant Messaging means either attacking the medium itself or using it as a method to attack the computers attached to it. Attacking the medium means knocking other people off the chat network, taking control of a channel, joining a private chat, or causing enough disruption to a chat channel that the other participants simply give up. Attacking computers using IM merely as a transport medium involves moving viruses, worms, and Trojans onto remote computers and compromising their security.
Hacking AIM and ICQ
There are hundreds of web sites, mostly run by teenagers, offering hundreds of rogue hacking utilities to compromise AIM or ICQ.
Punters and busters
Many AOL-
hacking utilities
are aimed at knocking off other users from the chat medium. These
programs are called punters. Punters generate
hundreds of information inquiries to a legitimate user’s
client, such as invitations to chat. The multiple invitations causes
a window to open up for each request. This will either overwhelm the
user’s local computer resources, or end up with them being
disconnected from the server because of the congested traffic. The
user is punted from the channel, and must rejoin to gain access. Some
hackers have even developed anti-punters, which automatically respond
to and close information requests, so that the system cannot be
overwhelmed. Busters
are programs that allow rogue hackers to gain access to a private chat even though they have not been invited. ...
Get Malicious Mobile Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.