Page 1 of 1

Can Java be used for hacking?

PostPosted: Wed May 06, 2015 2:58 pm
by ghostheadx2
I'm wondering if there is any way to use Java for hacking. I know its used for hexadecimal encryptions (or at least, I THINK it is). Is Java hacking advanced?

Re: Can Java be used for hacking?

PostPosted: Wed May 06, 2015 5:10 pm
by Turn
You could literally hack with any given language. The efficiency of the language is another question. To answer your question and the question about efficiency, yes Java is fine.

Re: Can Java be used for hacking?

PostPosted: Wed May 06, 2015 11:12 pm
by ghostheadx2
How to hack with Java. When I Google it, I just get JS results.

Re: Can Java be used for hacking?

PostPosted: Thu May 07, 2015 1:07 am
by Iblist
The same way you hack with any language; you write tools that hack things for you.

Re: Can Java be used for hacking?

PostPosted: Thu May 07, 2015 2:06 am
by ghostheadx2
What type of project could I start working on after I'm done with summer school in Java, that would let me hack things?

Re: Can Java be used for hacking?

PostPosted: Thu May 07, 2015 5:35 am
by pretentious
ghostheadx2 wrote:What type of project could I start working on after I'm done with summer school in Java, that would let me hack things?

Write a hex editor or something

Re: Can Java be used for hacking?

PostPosted: Thu May 07, 2015 5:37 am
by Turn
ghostheadx2 wrote:What type of project could I start working on after I'm done with summer school in Java, that would let me hack things?


You need to understand that programs are (mostly, but not always) things created to automate processes. You need to actually figure out how to find vulnerabilities, and then how to exploit them. The next step would THEN be to create a program to automate the process of this, which in many cases is nearly essential for efficient exploitation (i.e, large dictionary attacks). Depending on what type of hackery you are doing, you might want to learn different methods of exploitation which corresponds to that software/application. It's not like you tell Java: "Hey, attack this server!". You need to be explicit and tell Java all the steps needed to make that process happen. So again I will iterate, learn to exploit something manually, and then proceed to automate it using Java. Some simple projects could be something like an XSS/SQLi identifier or dictionary/lookup attacks; however like most things, these can be made more difficult by allowing more functionality.