ZDNet's definition of skids: Person... who uses scripts or programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own.... objective is to try to impress their friends or gain credit in computer-enthusiast communities
I could agree with you with the immature part, but 1st I developed this, with no help from any known scripts/exploits...2nd my identity is unknown I get nothing but statistics and stalking...so I'm not pleasing my friends/family/anyone significant
If it was a skid it could have been easily circumvented and the website would probably have protection against it before hand (assuming webadmins are skiddies in hacking)
A real hacker only leaks..#USCLeaks...yes really
and going underground is a requirement? who defined that? you?
and I'd gladly and openly provide my source code to you if you are IRM/ISMIS Web Admin...but I don't see any identification. So yeah your conclusion & accusations is based on your assumption without concrete evidence.
arrogant, immature... a character of a script kiddies... you made a tool based from the posted exploit (thats not called hacking), you are merely the tool maker... not the hacker... going underground is not a requirement but its nice place to learn the underbelly of technology... you know what you will be a good joke to talk with my mates the next time we meet... script kiddies.... im done here....
Look who doesn't read...and understand
I would have no hesitations to share my tool & exploit if it was a known exploit...but to no avail...it's my own exploit....sadly you still can't believe that I made my own algorithm. (Whether you like it or like it very much)you made a tool based from the posted exploit (thats not called hacking), you are merely the tool maker... not the hacker...
and if you basically sum it up. You are more immature because you assume and conclude for the sake of antagonizing me without any plausible explanation & evidence (OR EVEN ANYTHING AT ALL) for your counter argument.
And it was worth the time citing the definition, because you still don't basically know the very definition of it.
TL;DR
And haters can antagonize all they want to their heart's content.
Because in the end..only me and IRM/ISMIS Web Admins will know every single character, every single line of code and every single bit that's within that exploit.
And at this point those who basically accuse me of something I'm not, basically are just basing all their accusations on their self-made-up assumptions.
But I know why you're acting this way though. Because so many "hackers" claim they can hack as well, that's why I was labeled to be one of them.
TS mailhan gani kang Bumaat kulatahon jud ka ato..naa pbas Bumaat's talamban? palihug daw tag tan aw sa imong progam diha..
![]()
Similar Threads |
|