What will come of all the hacking ?

Are LulzSec actually hacking?

Pre-made tools to carry out SQLi etc, none of the real stuff.

Scripts are all anyone uses now. The only thing that strikes as them being amateur is 'hackers' don't normally DDoS a server down then go in steal all they can and run away laughing.

They'll 'normally' ,and this is why so much goes unnoticed, make a distraction etc. DDoS then go in and make backdoors so they can happily get back in when they want and then sneak out so as far as server administrators are aware no data was touched.
 
I'm not really sure what the point is in this recent hacking. All they seem to be doing is showing they can do something powerful and shocking. It's just a bit chaotic. Anyone can grab a gun from the street and start causing unprecedented mayhem, but if we all did that, what would we have left?
 
That's a point, can you be tracked when using tor?

Yes, for really isn't safe. Someone can just set up an end node and take all the data that comes through it. Not go mention the fact someone else may be using your own IP for something dodgy.

If you really needed to be secure you'd buy an SSL VPN offshore somewhere (probably with a stolen/anonymous card) and then run your connection through that and hope they don't log anything...

MAC address obtained from TCIP/IP transactions being traced/recorded.

Manufacturer advises which stores are the most likely to have sold that MAC address based on whatever shipping records they keep.

Store CCTV has recorded you purchasing the 3G dongle.

Simples. :)

Spoof your MAC address for a start, or run through a virtual machine. The CCTV may be a harder proposition though.
 
Yes, for really isn't safe. Someone can just set up an end node and take all the data that comes through it. Not go mention the fact someone else may be using your own IP for something dodgy.

Tor is for anonymity not for confidentiality, yes people can see what your doing but not where it's coming from.
 
Tor is for anonymity not for confidentiality, yes people can see what your doing but not where it's coming from.

They could work that out pretty sharpish. I can't see anyone who really thinks of themselves as a hacker using it, just people thinking they are "cool" spamming forums and the like.

In other words if you use for for nefarious deeds then you're probably a bit stupid and in for a shock!
 
I just got an email from 'freedomhub.net' saying my email was found on their latest release. Sure enough, it was. On "Random gaming forums (50k users).txt."

The "password" is just in a e56e22e5b8ac... etc format, is this just an encrypted sql password return or something? There's also 3 characters next to it in a separate column, for example: `e$ - what do those represent?

Anything to worry about?
 
They could work that out pretty sharpish. I can't see anyone who really thinks of themselves as a hacker using it, just people thinking they are "cool" spamming forums and the like.

In other words if you use for for nefarious deeds then you're probably a bit stupid and in for a shock!

Presumably you'd use it as another layer of defense in depth, running an end to end encrypted connection through it.
 
AFAIK the passwords in that file are md5 hashes of the plaintext password - relatively trivial especially with that many to produce a working password from.
 
The "password" is just in a e56e22e5b8ac... etc format, is this just an encrypted sql password return or something? There's also 3 characters next to it in a separate column, for example: `e$ - what do those represent?

Anything to worry about?

If the hashes are salted (probably what the additional chars next to the hash are), then if it's a strong password it's still relatively safe. Obviously change it anyway though.
 
Last edited:
I disagree, if used correctly it's a very sound technology for maintaining anonymity.



If the hashes are salted (probably what the additional chars next to the hash are), then if it's a strong password it's still relatively safe. Obviously change it anyway though.

I doubt it was, I don't even know what forum it was for though. Unfortunately, I do use the same passwords for a lot of things, so I have changed a lot of them...
 
I disagree, if used correctly it's a very sound technology for maintaining anonymity.

TOR is from the perspective of direct IP back tracing... however its not so secure any more from other perspectives (there are ways to essentially skip the middle ground with a fair chance of success these days if your a big government agency).
 
Just got this email in my spam filter.... Any ideas of it is legit?

Hi there

Please note that in Lulzsec's final release before ending their game
you email address was found.
Lulzsec's message can be found here http://pastebin.com/1znEGmHa

The file specifically is called "Random gaming forums (50k users)" and
contains details of email address username and password.

We suggest that you change your login details straight away.
If you want to look at the release and your details please see the
torrent link below.
http://thepiratebay.org/torrent/6495523/50_Days_of_Lulz

If you have any comments of questions please comment in the blog posts
below and the community will be happy to reply.

Regards

http://www.freedomhub.net

http://www.freedomhub.net/archives/288/50-days-of-lulz
http://www.freedomhub.net/archives/297/lulz-final-release
Jcb33.
 
Yep I am on that list, no idea how to tell what site the account is with or what password they have though....

##83f6fa9...... C{N

Is what they have on there... Any ideas what to do?

Jcb33.
 
Last edited:
Back
Top Bottom