I was born a bit too late to live through the wild wild west days of hacking, but I do remember the days of IRC groups, Kazza, Morpheous and direct connect P2P networks. Based on documentaries about hacking in 1980 and 1990 there seems to be two distinct attack patterns: exploiting open networks and social engineering. It seems that the ball-field of viruses did not change much since then, someone sends you a piece of code, you run it and if your AV does not know about it yet, you get infected (happens to my parents once a year like on a clock and I can't teach them any better). But in terms of server or PC hacking, how has it changed since then? Is the single node hacking still possible? Now days any "average" net admin will know about SSH tunneling as well as private/public key authentication. So if a "worlds greatest hacker" was given my public IP number and lets say he knew that there is a windows and a Linux box sitting on a properly configured router (only selected ports are open for SSH connections, no default password for router admin, administration over wan port is disabled etc.) behind that IP number are there still any viable "direct" attacks he could do to gain root access or code execution access to those machines without resorting to social engineering?
Often it is said that hackers find and exploit holes in the system. While I am sure that there are still plenty holes to be exploited, will the bulk of these holes be an operator error (leaving default password on a router) or would most of these errors be a manufacturer design flaws (allowing router administration from WAN port by default or something equivalently bad)?
I can see how hackers could explode PHP GET vs. POST on a webserver if there is no back end validation, but that is not the type of hacking I am talking about, I am asking about well organized hackers ability to enter private users computer remotely (assuming user did not do anything stupid like hosted teamviewer and gave Chinese scammer the access code...)
This can also tie into windows 10 privacy issues. As a system architect Microsoft could very easily build in a back door into windows essentially allowing them to "remote desktop" into an "IP number", but how much harder would it be for a brilliant hacker but an outsider to the system to do the same given todays best security practices?
Often it is said that hackers find and exploit holes in the system. While I am sure that there are still plenty holes to be exploited, will the bulk of these holes be an operator error (leaving default password on a router) or would most of these errors be a manufacturer design flaws (allowing router administration from WAN port by default or something equivalently bad)?
I can see how hackers could explode PHP GET vs. POST on a webserver if there is no back end validation, but that is not the type of hacking I am talking about, I am asking about well organized hackers ability to enter private users computer remotely (assuming user did not do anything stupid like hosted teamviewer and gave Chinese scammer the access code...)
This can also tie into windows 10 privacy issues. As a system architect Microsoft could very easily build in a back door into windows essentially allowing them to "remote desktop" into an "IP number", but how much harder would it be for a brilliant hacker but an outsider to the system to do the same given todays best security practices?