quote:
quote:Typically, the DNS resolvers built into client operating systems ask nameservers (usually the
ones provided by ISPs) to perform recursive queries on their behalf. The lookups then performed by these servers to fulfill the requests are typically iterative.
Here's where the problem arises. The response to a DNS query can be considerably larger than the query itself. In the best (or worst) case, a query of just a few dozen bytes can ask for every name within a domain and receive hundreds or thousands of bytes in response. Every request sent to a DNS server has a source address—an IP address to which the reply should be sent—but these source addresses can be spoofed. That is, a request can be sent from one IP address but the DNS server will think it was sent by a different address.
Using these two things—recursive lookups that return large amounts of data to small queries, and spoofed source addresses—attacks can be made. The attacker first finds a server that is configured to enable recursive lookups. He then sends a large number of requests to the server, spoofing the source address so that the server thinks that the victim machine is making the request. Each of these requests is chosen so that it generates a large response, much larger than the queries themselves. The server will then send these large responses to the victim machine, inundating it with traffic. The disparity between the request size and the response is why these attacks are known as "amplification" attacks.
twitter:AnonymousIRC twitterde op vrijdag 09-03-2012 om 01:11:41Wow. Just learned something from AntiSec core. Thought something was fishy about FBI and the Stratfor case? You were right. Stay tuned. reageer retweet
Er was sprake van moeilijke onderhandelingen met WikiLeaks. Blijkbaar heeft Antisec de files gratis aan WL gegeven en hebben ze de FBI tuk.twitter:AnonymousIRC twitterde op vrijdag 09-03-2012 om 01:22:06Sabu/FBI initially asked for money from #Wikileaks for #GIFiles, to trap Assange. Failed: He didn't fall for it and AntiSec team no want $$$ reageer retweet
quote:Leaked: Police Plan to Raid The Pirate Bay
More than half a decade after Swedish police officers first raided The Pirate Bay, there is talk that a second police raid against the world’s most famous torrent site is in the planning. The Pirate Bay team has learned that local authorities have acquired warrants to take action against the site, and expect that both servers and the new .se domain name may be targeted soon.
pitrate bay raidIn the spring of 2006 a team of 65 Swedish police personnel entered a datacenter in Stockholm. The officers were tasked with shutting down the largest threat to the entertainment industry at the time – The Pirate Bay’s servers.
The raid eventually led to the conviction of four people connected to The Pirate Bay, but the site itself remained online.
Today, the Pirate Bay team has informed TorrentFreak that a second raid is being prepared by the Swedish authorities. The site’s operators, who are well-connected in multiple ways, learned that a team of Swedish investigators is gearing up to move against the site in the future.
The suspicions were also made public by The Pirate Bay a few minutes ago.
“The Swedish district attorney Fredrik Ingblad initiated a new investigation into The Pirate Bay back in 2010. Information has been leaked to us every now and then by multiple sources, almost on a regular basis. It’s an interesting read,” the Pirate Bay crew notes.
“We can certainly understand why WikiLeaks wished to be hosted in Sweden, since so much data leaks there. The reason that we get the leaks is usually that the whistleblowers do not agree with what is going on. Something that the governments should have in mind – even your own people do not agree.”
The Pirate Bay team confirmed to TorrentFreak that the announcement is no prank. The authorities have obtained warrants to snoop around in sensitive places and two known anti-piracy prosecutors, Frederick Ingblad and Henrik Rasmusson, are said to be involved.
Employing a little psychological warfare aimed at putting the investigators off-balance, the Pirate Bay team has chosen to make the news public to make the authorities aware that they are not the only ones being watched.
According to The Pirate Bay team they aren’t doing anything illegal, but nonetheless they noticed that the investigation intensified after the site’s recent move to a .SE domain.
“Since our recent move to a .SE domain the investigation has been cranked up a notch. We think that the investigation is interesting considering nothing that TPB does is illegal,” they say.
“Rather we find it interesting that a country like Sweden is being so abused by lobbyists and that this can be kept up. They’re using scare tactics, putting pressure on the wrong people, like providers and users. All out of fear from the big country in the west, and with an admiration for their big fancy wallets.”
Behind the scenes The Pirate Bay team is working hard to ensure that the site will remain online in the event that servers, domain names and Internet routes are cut off. In this regard The Pirate Bay has learned a valuable lesson from its former operators.
Those who are aware of the site’s history know that without a few essential keystrokes in May 2006, The Pirate Bay may not have been here today. When Pirate Bay founder TiAMO heard that something was amiss, he decided to make a full backup of the site before heading off to the datacenter, where he was greeted by dozens of police officers.
TiAMOs decision to start a backup of the site is probably the most pivotal moment in the sites history. Because of this backup the Pirate Bay team were able to resurrect the site within three days. If there hadnt have been a recent backup, things may have turned out quite differently.
It was a close call at the time, and a defining moment in the history of the site. The determination to get the site back online as soon as possible set the defiant tone for the years that followed. Today, the site prides itself in being the most resilient torrent site around.
In recent years The Pirate Bay has implemented a variety of changes to guarantee that the site remains online. It added several backup domains, placed servers all over the world, and removed resource intensive processes.
Earlier this week The Pirate Bay took another important step by removing .torrent files altogether to become a magnet link site. As a result, the entire site can now be reduced to a few hundred megabytes, small enough to fit on the tiniest thumb drive.
For the police, this makes a successful Pirate Bay raid almost impossible. While they can take steps to put the site out of business briefly, its inevitable that it will re-appear in a matter of hours, or days.
Or to use the words of the Pirate Bay team. Were staying put where we are. Were going no-where. But we have a message to hollywood, the investigators and the prosecutors: LOL.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:Norton Antivirus all Platforms source code leaks to public
After PcAnywhere source code released Anonymous leaks Norton AntiVirus 2006 All Platform’s Source Code via PirateBay. The source code is available for download since 4:10PM today.
quote:. All conflict comes from social inequality and those who use this to their advantage ? Our civilization is facing a radical, imminent mass change. The alternative to the hierarchical power structure is based on mutual aid and group consensus. As hackers we can learn these systems, manipulate these systems, and shut down these systems if we need to.?
~ Jeremy Ham[/quote]mond (alleged hacker sup_g)
FREE sup_g
FREE kayla
FREE palladium
FREE Topiary
FREE pwnsauce
FREE ALL ARRESTED ANONS WORLDWIDE.
we are AntiSec,
we are legion,
we do not forgive,
we do not forget,
expect us.
Hij ondetekende met oud-en-nieuw, terwijl iedereen aan het feesten was, geloof ik?quote:Op vrijdag 9 maart 2012 18:24 schreef Schenkstroop het volgende:
Ik las net dat Obama zei dat hij de NDAA bill zou tegenstemmen. Maar op het laatst toch ondertekende. Ook werd duidelijk dat het witte huis ervoor bepaalde stekende zinnen over ontvoering van Amerikaanse burgers weg liet halen voordat erop gestemd werd. Obama loog dus als een Pinokio.
In the pockets of WallStr.quote:Op vrijdag 9 maart 2012 18:30 schreef Schenkstroop het volgende:
Zoiets begreep ik ook wat een sneak! Tekenend, telling. damning, sign o' the times. Where's the mainstream media?
quote:Man arrested on suspicion of hacking Britain's biggest abortion clinic
West Midlands arrest follow claims on Twitter that British Pregnancy Advisory Service's patients would be made public
A 27-year-old man suspected of hacking the website of Britain's biggest abortion clinic was arrested on Friday morning.
The arrest in the West Midlands follows claims made on Twitter on Thursday that the names of patients who used the British Pregnancy Advisory Service would be made public on Friday.
The man, who police say claims to have links to the loose hackers group online "hacktivists" Anonymous, was detained by officers from Scotland Yard's e-crime unit on suspicion of offences under the Computer Misuse Act.
A spokeswoman for BPAS said there were about 26,000 attempts to break into its website on Wednesday night, adding that there was never any danger that medical or personal information relating to women who had received treatment was accessed.
BPAS said "no client records" were stored on the website but it took the attack very "seriously" and praised the police for its "swift response".
The firm, which treats about 55,000 woman a year for a range of services from abortion to contraception, obtained an injunction on Thursday preventing any information that could have been hacked being put into the public domain.
BPAS first noticed the site had been hacked early on Thursday morning and it became apparent quite quickly that it was under a sophisticated and co-ordinated attack, the spokeswoman said.
"There is no suggestion that the security of our site is weak, but this is a wake-up call to everybody to what could happen," she added.
"It was the kind of thing we've seen happen to the Pentagon, but targeting a health charity is very different to what's gone on before."
She added that the incident appeared to reflect the "escalating" and "aggressive anti-abortion" protests BPAS is experiencing outside its clinics and "some of the language used was redolent of the political language being used such as accusations that woman are being 'coaxed into abortions' by counsellors".
Detective inspector Mark Raymond from the Metropolitan police's central e-crime unit confirmed the website had been compromised but stressed that the stolen data did not contain medical details of anyone in touch with BPAS or who had had an abortion.
"We have taken rapid action to identify and arrest a suspect involved in hacking. This was done to prevent personal details of people who had requested information from the BPAS website being made public. It should be stressed that the stolen data did not contain the medical details of women who had received treatment or why individuals had contacted the BPAS," he said.
Wel als je een religieuze idioot bent.quote:Op vrijdag 9 maart 2012 18:33 schreef YazooW het volgende:
[..]
Wat een mafkees, dat soort gegevens ga je toch niet naar buiten brengen
26.000 pogingen om te hacken? Of hebben we het over een DDOS-aanval?quote:
quote:Google's browser binnen 5 minuten gehackt, binnen 24 uur weer gedicht
De afgelopen jaren wist Chrome, de internetbrowser van Google, de hackerswedstrijd Pwn2Own telkens ongeschonden te overleven. Maar dit jaar lukte het een Frans team al binnen 5 minuten om een lek te vinden. En ook in een andere wedstrijd, Pwnium, werd de browser gekraakt. Dat Google een flink geldbedrag had beloofd voor de vinders van een lek, heeft dat waarschijnlijk bespoedigd.
Een Frans team toonde gisteren op Pwn2Own in Vancouver aan hoe de beveiliging van Chrome te omzeilen is. Het is de eerste keer dat Chrome bij deze wedstrijd niet ongeschonden uit de strijd komt. De hackers kregen drie dagen de tijd om het systeem te kraken, maar de Fransen hadden slechts 5 minuten nodig om dit voor elkaar te krijgen. Hun methode willen ze niet vrijgeven.
Pwnium
Op dezelfde dag organiseerde Google haar eigen hackerswedstrijd: Pwnium. En ook daar werd de browser gekraakt. Hier mocht een Russische hacker met de eer strijken. Hij mag bovendien 60.000 dollar (ruim 45.000 euro) op zijn rekening bijschrijven. Google looft sinds kort namelijk verschillende bedragen uit voor hackers die hun browser weten te kraken, dat demonstreren en de hack vervolgens vrijgeven. Hoe gevaarlijker het lek, hoe groter het te winnen bedrag.
Ook bijzonder: vandaag, amper 24 uur later, meldt Google dat het lek alweer gedicht is. En dat is snel, als je het vergelijkt met concurrent Microsoft, die veel vaker te kampen heeft met hacks, en waarbij het soms wel maanden duurt voordat een lek is gerepareerd. Gedicht of niet, Google wacht met het vrijgeven van nadere informatie over het lek totdat is onderzocht of ook andere browsers, zoals Apple's Safari, erdoor getroffen zouden kunnen worden.
Bounty hackers
Door hackers te stimuleren om hacks in besturingssystemen en browsers te vinden, hopen grote internetbedrijven eventuele kwetsbaarheden sneller en doelmatiger te kunnen opsporen, en zo uiteindelijk hun gebruikers beter te beschermen. Goedaardige hackers kunnen kwaadaardige hackers zo voor zijn. Facebook maakt al langer gebruik van deze zogenoemde 'bounty hackers' (premiehackers).
quote:Voorafgaand aan de hack hebben de Fransen zes weken nodig gehad om deze te ontdekken.
http://www.techzine.nl/ni(...)tijdens-pwn2own.html
Is dit waar? Is dit belangrijk?twitter:oldschooldsl twitterde op vrijdag 09-03-2012 om 20:21:28#Anonymous successful at obtaining full #Microsoft Windows 7 and #Windows 8 Source Code @Windows reageer retweet
quote:Justitie kijkt illegaal in buitenlandse computers
Bij de opsporing van cybercriminelen schendt de Nederlandse recherche soms de soevereiniteit van andere landen door buitenlandse computers te kraken. Dit is verboden, maar in de opsporing van cybercrime soms onvermijdelijk, stelt Lodewijk van Zwieten, landelijk officier voor cybercrime en interceptie.
De wet schiet volgens hem tekort als het gaat om de online jacht op bijvoorbeeld pedofielen. De digitale wereld is grenzeloos, maar veel wetgeving is aan landsgrenzen gebonden.
'Terwijl wij voor opsporingsonderzoek toestemming moeten vragen aan buitenlandse instanties, zit een cybercrimineel met één druk op de knop aan de andere kant van de wereld', zegt Van Zwieten. Criminelen voeren in toenemende mate anoniem handel via verborgen kanalen op het internet. En bestaande kinderporno gaat niet alleen sneller de wereld rond, maar heeft ook geleid tot een toename van het kindermisbruik, stelt Wilbert Paulissen, hoofd van de Nationale Recherche.
Tijdens het onderzoek naar de contacten van Robert M., die maandag terechtstaat wegens het misbruik van tientallen kinderen, stuitten rechercheurs op verborgen sites vol kinderpornografie.
Ook tijdens het onderzoek naar het Bredolab-netwerk, toen cybercriminelen wereldwijd 30 miljoen computers met een kwaadaardig virus besmetten, kraakte de recherche computers in het buitenland.
Paulissen pleit voor meer specifieke, juridische kaders voor online opsporing. Het moet wetgeving zijn 'die de snelheid van deze ontwikkelingen kan bijhouden, anders zitten we er constant als opsporingsdiensten achteraan te jagen'.
Volgens officier Van Zwieten lopen internationaal alle opsporingsinstanties tegen dezelfde problemen aan en moet iedereen 'met een nieuwe bril naar bestaande regels leren kijken'. Ook voor rechters is cybercrime volgens hem relatief onbekend. 'Zij denken nog wel eens bij een cybercrimineel: dat is een 16-jarig puistenkoppie dat met computers heeft lopen klooien. Maar die puistenkop verdient soms veel meer dan de topman van een nationale bank.'
twitter:DiabloAnon twitterde op zaterdag 10-03-2012 om 07:17:32@CrazyLittleOwl A user of the account @LuLzWarfare was killed protesting in Egypt a month or so ago sadly reageer retweet
quote:Websites attacked by Anonymous #March list
Third list of websites attacked by Anonymous. The list has both hacked and DDoSed websites. The list gets updated daily so stay tuned.
Dat deed/doet HBGary ook, of bedrijven waar ze mee samenwerkten.quote:Op zaterdag 10 maart 2012 11:47 schreef heggeschaarbarbaar het volgende:
Over Pwn2Own: Hackwedstrijden zijn een goed initiatief, maar het genoemde Franse 'team' is commercieel bedrijf genaamd Vupen. Dit bedrijf maakt niet alle hacks openbaar, maar verkoopt de informatie over de werking van de hacks aan geïnteresseerden (overheden, criminelen, ...). Echt veiliger ga ik me daar niet door voelen!
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |