I didn't see anyone explicitly mention "social engineering".  IMO this may be 
an easier way to get a not-very-technical user's id, but then you are back to 
how to hack with a "normal" user TSO account.  But if a system guy gave out a 
password for an reason then, well, you know.

What about digging through the trash?  Dropping some USB sticks around with 
interesting programs on them?  

A few people mentioned some few months back how to get a program authorized 
from a non-authorized library (or something like that), but nobody gave any 
details.

For sure no script kiddies should ever get in, and if they did they wouldn't 
know what to do.

One thing I didn't see in this thread, was what is the purpose of this hacking. 
  What is to be gained?  Sensitive information would be one thing I can think 
of.

Lindy

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to