backtop


Print 74 comment(s) - last by EricMartello.. on Jun 20 at 12:15 AM


The Lulz ship is busy firing its DDoS "cannons" at hapless gamers.  (Source: LulzSec)

The group claims to infected users of 4Chan's "random" (/b/) board to use as a botnet for DDoS attacks.  (Source: StarCraft Mazter)
Group is waiting to address more takedown requests, says DDoS attacks aren't real hacks

Legendary griefers LulzSec ("Lulz Security") -- the self-proclaimed "concentrated-success" of 4Chan's 2005-era /b/ message board -- don't seem overly concerned about being "hunted down" by 2011-era /b/ fans ("damn furries" or "/b/tards" as LulzSec calls them). Fans flocked to the message board upset about LulzSec's attacks on popular gaming services like EVE Online.

The group proclaimed on Tuesday:

Call into 614-LULZSEC and pick a target and we'll obliterate it. Nobody wants to mess with The Lulz Cannon - take aim for us, twitter. #FIRE

In addition to attacks on League of LegendsEVE Online, and Minecraft, the group attacked gaming magazine The Escapist, and government-software contractor Finfisher, as we summarize here.

But the group also let slip that it's waiting on 8 phone requests for additional targets.  It's unclear whether the group will hit those targets today, or take a break from firing its DDoS "cannon".

LulzSec implied in one tweet that it's infecting 4Chan users and using their machines in a distributed denial of service (DDoS) botnet.  The group writes:

The best part about making 50% of all /b/tards our bots is that they leave their daddy's laptops on 24/7, more bandwidth for us. :3

The fact that the group is taking phone calls at a time when they've attacked the U.S. government from several angles is rather bold -- some would say foolish.  Clearly the art of phone obfuscation is not dead, given that no arrests have been made yet, despite the group's active call line, which is surely being observed by the U.S. Federal Bureau of Investigation and others.

DDoS hacks aren't "official" hacks according to the band of bandits.  They state:

We didn't hack any games, we just DDoS'd them with our not-to-be-messed-with Lulz Cannon. :D We did hack these though: lulzsecurity.com/releases

We'll keep you updated on who gets hacked/DDoSed next "for the lulz".

Update: Wed. June 15, 2011 12:50 p.m. --

It appears that LulzSec has taken down the server for MMORPG Heroes of Newerth (a game very similar to World of Warcraft).  The group mocks that Defense of the Ancients ("DotA") custom scenario for Warcraft III: Reign of Chaos "is better."

The group also posted to Twitter that it's preparing for another EVE Online attack.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

OK, now they're just being d1cks...
By Motoman on 6/15/2011 10:38:06 AM , Rating: 4
Hack Sony? Sure - that poster child of DRM and tech arrogance needed a good smack in the face.

PBS? Mmmm...well...

Eve Online? Minecraft? What? Why? What purpose does that serve?

There's no political or consumer agenda to be pursued at Eve Online et al. Lulzsec just lost their validity.




RE: OK, now they're just being d1cks...
By Iaiken on 6/15/2011 10:48:31 AM , Rating: 5
<ficticiousnewsticker>

The website DailyTech.com was the victim of a distributed denial of service attack today; consequently, worker productivity in the IT and engineering departments of the world increased by 12%.

</ficticiousnewsticker>


RE: OK, now they're just being d1cks...
By BugblatterIII on 6/15/2011 2:15:24 PM , Rating: 5
If they took down facebook we'd probably solve world hunger!


By SAmely on 6/15/2011 3:06:33 PM , Rating: 2
The people who spend exorbitant amounts of time on Facebook would probably not redirect their attention to something useful. To think that would be a fallacy.


By Gondor on 6/16/2011 5:12:04 AM , Rating: 1
Hear hear. Now that would be some great "lulz".


RE: OK, now they're just being d1cks...
By borismkv on 6/15/2011 12:21:23 PM , Rating: 2
Who says hacking has to have a political or consumer agenda? They've already said that they do it for the lulz. And seriously, online games need to start beefing their security big time anyway. I'm waiting for them to hack WoW.

And did they lose their validity because their not hacktivists, or because they've attacked the holy ground of Anonymous?


By BZDTemp on 6/15/2011 2:30:42 PM , Rating: 2
quote:
Who says hacking has to have a political or consumer agenda? They've already said that they do it for the lulz. And seriously, online games need to start beefing their security big time anyway. I'm waiting for them to hack WoW.


Are you the type of person that get off on other peoples misfortune or what is your problem?

You do realize that the ones paying the bill for that beefed up security is the users!? Plus it's likely to not only be costly but also make login and so on more cumbersome.


RE: OK, now they're just being d1cks...
By Motoman on 6/15/2011 2:48:24 PM , Rating: 1
quote:
Who says hacking has to have a political or consumer agenda?


Before they were painting themselves as sort of hacktivist Robin Hoods.

Now they're just jackasses.


By FaaR on 6/15/2011 3:51:12 PM , Rating: 3
They were always jackasses right from the start, anyone who ever thought otherwise was a blind fool. They're doing exactly what a bunch of childish sociopaths with delusions of grandeur would be expected to do; wreck things for no particular reason.


By EricMartello on 6/20/2011 12:15:12 AM , Rating: 2
Hack WoW? Not gonna happen. There's really no way they can do anything other than possibly phish a few kids' accounts - at best they can DDoS a realm or two. The game is too big and has more advanced security than any other MMO out there. I'm sure the chinese have been trying to hack it for years since WoW gold is their bread and butter.


By icanhascpu on 6/15/2011 5:04:03 PM , Rating: 2
HERD DURP. Its for the lulz. Your terms of validity are invalid.


By infidel01 on 6/19/2011 1:16:36 PM , Rating: 2
Lol, everyone seems to forget what hackers are, people who have gotten up to do something about the things they don't like. They don't care if you think what they are doing is justfiable. The wild west is a good thing to call it. Everyone on the internet has a gun, you just need to know how to use it and not have one used on you. They have no need to meet your demands of reason, they have you all doing exactly what they need, generating fake news. The fact that they are doing something about it should be the point, as we all know attacking people is wrong, we should be looking for the cause of what got these people mad enough to start shooting in the first place.


4chan
By FallenHero on 6/15/2011 11:55:12 AM , Rating: 5
attacking 4chan? Poking the bear isn't good. They actually may stop the lulz from happening.




RE: 4chan
By borismkv on 6/15/2011 12:22:36 PM , Rating: 2
I dunno. I'm lolling pretty hard over it, myself.


RE: 4chan
By rudolphna on 6/15/2011 5:29:52 PM , Rating: 2
I have to agree. As an occasional 4chan lurker myself, I'm getting really tired of LULZsec. Hacking sony was funny the first time, because let's be honest, they deserved it. However since then, they've gotten way out of hand. Releasing personal information on elderly people? Repeatedly hacking sony? PBS? Now attacking 4chan and online games for no reason other than to be malicious?

There is "lulz" and then there is crossing the line. They've repeatedly crossed it. Anon (the good anon) won't let this stand, that you can count on.


so
By smackababy on 6/15/2011 10:47:11 AM , Rating: 2
LulzSec is implying that the average person who browses 4chan is a moron who enjoys posting pictures of penises? Who would have ever thought...




RE: so
By Uncle on 6/15/2011 11:52:24 AM , Rating: 4
I wonder if Congressman Wiener started his career in 4 chan.


You Need to Understand...
By mmatis on 6/15/11, Rating: 0
RE: You Need to Understand...
By Motoman on 6/15/2011 11:18:24 AM , Rating: 3
...it would appear that your tinfoil hat is a couple sizes too small.


RE: You Need to Understand...
By mmatis on 6/15/2011 4:46:47 PM , Rating: 1
Not quite:
http://www.latimes.com/media/acrobat/2011-06/62372...

But y'all keep on suckin' that FedPig now...


RE: You Need to Understand...
By Motoman on 6/16/2011 10:19:21 AM , Rating: 2
Sounds to me like someone needs to find a new country to live in.

I'd ask exactly what the eff you think your linked info has to do with Lulzsec, but the fact is no one cares. You've capably identified yourself as a lunatic, so your opinions are invalid.

STFU and GTFO.


Going after EVE is so lame
By BZDTemp on 6/15/2011 2:24:54 PM , Rating: 2
Targeting a unique relative small player shows no class what so ever :-(




RE: Going after EVE is so lame
By cerx on 6/15/2011 4:52:27 PM , Rating: 2
Isn't Sony behind EVE?


RE: Going after EVE is so lame
By Regected on 6/15/2011 6:08:10 PM , Rating: 2
Eve is produced by CCP, and Icelandic company. The only tie CCP has with Sony is that the recently announced console FPS game will be on the PS3, so CCP obviously must work with Sony.

The lulzsec DDOS attack on Eve was nothing more than annoying. They didn't crash anything. CCP took the servers offline to make sure that there was nothing malicious happening that they did not see on the surface. I was even playing at the time, and had no idea there was even an attack happening until the COO from CCP posted a blog explaining the reason for the servers being taken offline. The traffic increase from the DDOS "gun" was nothing more than a 50% increase as compared to normal traffic.


Heroes of Newerth
By zShowtimez on 6/15/2011 4:54:16 PM , Rating: 2
"It appears that LulzSec has taken down the server for MMORPG Heroes of Newerth (a game very similar to World of Warcraft). The group mocks that Defense of the Ancients ("DotA") custom scenario for Warcraft III: Reign of Chaos "is better." "

HoN is not a MMORPG like World of Warcraft, its nothing like WoW. Its a clone of Defense of the Ancients built on a new platform.




RE: Heroes of Newerth
By Adonlude on 6/15/2011 6:06:45 PM , Rating: 2
They hit the EVE servers again last night too. My damn Ferox is stranded out in space somewhere :-(


RE: Heroes of Newerth
By KoolAidMan1 on 6/15/2011 8:29:35 PM , Rating: 2
You beat me to it. I mean, DT isn't where I go for good, accurate reporting (unfortunately it is unavoidable since its on the Anandtech sidebar), but even I'm surprised they got details like this wrong.


Whanckers
By Justin Case on 6/15/2011 10:25:25 PM , Rating: 4
LulzSec aren't hackers, they're wankers.

Anonymous (the real ones, not the offshoot composed of kiddies with inflated egos) at least have some sort of philosophy about freedom of information, etc. "LulzSec" seem to just go around looking for random websites with crappy security or narrow pipes and then say "look at us, we managed to hack / DDoS the website for some game you've never heard about".

They're like those protesters who break shop windows and set fire to things, drawing the attention of all the media but (in the process) tarnishing the reputation of the remaining 99% of protesters, who had a valid point. I guess they're just desperate for attention, and failed at achieving anything productive with their lives.

The more they do this kind of useless "whancking", the more likely it is that big corporations will secure their systems against similar attacks, essentially making them immune if / when they deserve to be hacked and have their secrets exposed.

Efficient intelligence services spend half their time finding the enemy's weaknesses, and the other half making sure the enemy doesn't know they've found them. LulzSec would be crap at poker.




4Chan is down
By Acanthus on 6/15/2011 1:26:55 PM , Rating: 3
As of this posting :x

Is lulzsec using 4chan posters to attack itself?




Sad, Pathetic, Little Losers
By LulzSuks on 6/15/2011 1:56:56 PM , Rating: 2
LulzSec - Losers United Lacking Zyprexa - Sadly Erectile Challenged

Get a job, move out of mommy's basement and contribute something useful to society. If the only way you can feel good about yourself (or have a LULZ) is to tear down something that someone else has built then you have serious issues. The good news is... they make medication for that. Try some!!!

:(




Think big
By ganjha on 6/15/2011 2:31:51 PM , Rating: 2
Try taking down an entire (small) country. A small island state would suffice :P




Correction!
By Mumrik on 6/15/2011 8:49:43 PM , Rating: 2
There's a pretty clear mistake in this update: "It appears that LulzSec has taken down the server for MMORPG Heroes of Newerth (a game very similar to World of Warcraft). "

HoN is not an MMO and has nothing to do with WoW genre-wise. It's a DotA clone.




By captainBOB on 6/16/2011 10:39:44 AM , Rating: 2
quote:
It appears that LulzSec has taken down the server for MMORPG Heroes of Newerth (a game very similar to World of Warcraft). The group mocks that Defense of the Ancients ("DotA") custom scenario for Warcraft III: Reign of Chaos "is better."


Did you even GO to the Heroes of Newerth site? Its not an MMORPG, its a DotA clone.




hello
By n3ak on 6/15/11, Rating: 0
I called, nobody home.
By RadnorHarkonnen on 6/15/11, Rating: -1
RE: I called, nobody home.
By Flunk on 6/15/11, Rating: 0
RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 11:13:49 AM , Rating: 1
I'n not american, whats this ?

OrgName: Level 3 Communications, Inc.
OrgId: LVLT
Address: 1025 Eldorado Blvd.

Although still considered mine better. If they could get in ofc !


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 11:20:30 AM , Rating: 1
Nevermind the ignorance of my last post but attacking that is like attacking 80.157.150.73.

You just can't DDoS that.


RE: I called, nobody home.
By theArchMichael on 6/15/2011 11:55:25 AM , Rating: 2
Oh I get it so you mean like the internet itself... right???


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:22:48 PM , Rating: 2
Uh, yea, you can. It wouldn't matter that much though, cause they use a distributed model like most of the Internet backbone services do.


RE: I called, nobody home.
By theArchMichael on 6/15/2011 11:53:55 AM , Rating: 2
I thought Level 3 was the company that hosts Netflix and such. I don't get it?


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 11:59:49 AM , Rating: 1
Yes, but IANA is hosted there. And if IANA is there,really cool and secure targets would be there.

Thats what the initial IP is about. IANA - Internet Assigned Numbers Authority. Taking that down would just.....be horribly beautiful in a completely anarchist point of view.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:20:16 PM , Rating: 2
I think you misunderstand what the IANA is and how they work. I also think you have a misunderstanding of how networks work and the Internet in general.


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 12:36:09 PM , Rating: 1
Soz, but this 8.15.7.10 is inside this 4.79.17.37. Thats in LVL3 ISP (server location:Takoma Park in United States ISP:Level 3 Communications). From that one fo the best targets would be INTERNET-CO.car1.LosAngeles1.Level3.net (4.71.140.222), where IANA is hosted. Honestly i can't distinguish with alarm bells go off in the ISP if they are just connected there or just hosted.

IANA makes a formidable target. I though you gave a reference to the real target. Level 3 and Akamai (80.157.150.73) that i refered earlier on are not doable target for a normal script kiddie with a half wit botnet.

You pointed LVL3 ISP, i found IANA and other nice targets are inside their network or are customers of LVL3. Attacking LVL3 by it self isn't doable. Like AT&T, Telefonica and others, the infrastructure is just too big especially if they have failover links waiting.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:42:32 PM , Rating: 2
This is probably the most incomprehensible thing I have ever read. Explain to me how taking down an IANA server will actually do anything. The only real thing that IANA does that is network affecting would be root DNS and they have distributed servers. Again, we are assuming a DDOS attack, which would not do anything to anything else they run. Are you saying they DDOS a border router? Cause they usually have multiple exits and gigs of throughput, good luck with that.


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 1:00:11 PM , Rating: 2
So far they have been just playing script kiddies. Why just they don't move to better targets ?

Taking down some network gear would be cool for starters. There are several ways to do it. Taking down root DNS servers would be an excellent point. You don't need to take down everything,you just need to know where the exit point is for example. With time and preparation that is easly planned. Now that would be what i call a sophisticated and structured attack.

SQL Injections and Botnets are so blunt and last century.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 2:14:20 PM , Rating: 2
How do you propose they take it down? Even if they took it down, do you really think it will matter? The entire Internet backbone, especially at Level 3, is redundant as hell. Exit points on Tier 1 providers are usually multiple gigs and have multiple exits. On top of that, you likely run through them at some point, so you will be knocking yourself down.


RE: I called, nobody home.
By Laereom on 6/15/2011 2:52:27 PM , Rating: 2
I agree, which is why I think this is good thing.

If we can't defend against these pitiful attacks a freshman CS major could write the code for, what are we going to do in a cyber war? I hope this forces the world to wake up and start taking computer security seriously.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 3:16:38 PM , Rating: 2
If I send you five million letters, how do you defend your mailbox? You can throw them away, but if I did it non-stop for a period of time, you can't do much except get them and throw them away, but if I do it fast enough, you can't keep up. There are mitigation techniques, but DDOS is a hard thing to defend against.

SQL attacks on the other hand are clearly administrator issues, but don't lump everything together.


RE: I called, nobody home.
By Mitch101 on 6/16/2011 8:41:43 PM , Rating: 2
Simple turn on my mailbox to only accept messages from people in the address book and to delete all others.


RE: I called, nobody home.
By Gzus666 on 6/17/2011 12:02:39 PM , Rating: 2
quote:
Simple turn on my mailbox to only accept messages from people in the address book and to delete all others.


Cool, didn't know your real life mailbox has an address book and a delete option. Not real up on analogies, are you chief?


RE: I called, nobody home.
By Mitch101 on 6/18/2011 9:20:01 PM , Rating: 2
Return to Sender


RE: I called, nobody home.
By nevermore781 on 6/15/2011 2:58:57 PM , Rating: 2
they could easily write a program to DDoS a whole ASNumber rather than 1 IP. Take out the ASNumber and you've killed BGP and failover. Botnets are powerful if you know what you're doing with them but it would still have to be a very large botnet to kill a whole AS.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 3:11:38 PM , Rating: 2
How do you DDOS an AS number? It is not an addressable thing. Any carrier worth their weight only allows communication with specific peers on the edge. You can't kill an AS, cause it is just a domain, you might have 100 routers in that one domain. I would have to see what you actually plan to do, but I have no Earthly idea how you would take down an AS number. The AS is literally just an identifier used in the BGP header, it isn't an actual device. I don't think you really understand how BGP works.

I suspect what you actually mean, unbeknownst to you, is send out fake updates to BGP and either black hole a whole routing block or the entire table or just shutdown the peering. Again, this is a complex feat and there are multiple exits so BGP will recover just fine.


RE: I called, nobody home.
By chrnochime on 6/15/2011 5:03:06 PM , Rating: 2
Do you have any idea what you're babbling about? If you know your BGP you wouldn't be spouting stuff like "take out ASNumber". That's like saying trying to "take out" OSPF process number.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 5:08:29 PM , Rating: 2
quote:
Do you have any idea what you're babbling about? If you know your BGP you wouldn't be spouting stuff like "take out ASNumber". That's like saying trying to "take out" OSPF process number.


What, you don't know you can totally send directed DDOS attacks to internal process IDs? Much in the same way you can stab ideas and shoot thoughts. TAKE THAT ABSTRACT!


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 6:34:29 PM , Rating: 2
While im not in the area of external routing protocols like BGP or IS-IS and others, OSPF has several vulnerabilities. Most of the attack you CAN make is not at OSPF process ID, but link state calculations and and election events.

L2, spanning tree at first seems bullet proof. And it is. But is also highly complex, and i rarely see it 100% well implemented leaving plenty of room for an "ICE 9" type of attack on election and VTP routines.

A Denial Of Service can come in different forms. And soemtimes there is no need to hack anything. Just expect tecnology to work "as designed"

Honestly, if i knew more about BGP, i could have better ideas.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 7:45:54 PM , Rating: 2
quote:
While im not in the area of external routing protocols like BGP or IS-IS


And you lose all credibility. IS-IS is an internal routing protocol, link state no less, just like OSPF. BGP is the only external routing protocol currently used.

I wasn't sure if you were dumb or just didn't understand the language, but you obviously have no idea what you are talking about.

I'm sure everyone is hacking spanning tree and friggin' OSPF, what a joke. None of this stuff seems bulletproof, but you have to point out valid vulnerabilities, not made up garbage stemming from a complete lack of knowledge on the subject.

Honestly, if you knew more about BGP, I would be terrified about what garbage you would make up.


RE: I called, nobody home.
By theArchMichael on 6/15/2011 12:42:58 PM , Rating: 1
Oh lol! Thanks dude! I feel like I'm in the 'in' crowd now.

Radz n the house droppin jewelz yo!


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:12:18 PM , Rating: 2
Level 3 is a MASSIVE Tier 1 carrier. They rival the likes of AT&T and Verizon as far as network size goes. They are the largest CLEC in the US last I looked.


RE: I called, nobody home.
By ians55 on 6/15/2011 11:20:30 AM , Rating: 5
Hack 127.0.0.1 :)


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 11:31:57 AM , Rating: 1
Uninstall IPv4 and then slap your self to sleep.


RE: I called, nobody home.
By Motoman on 6/15/2011 11:35:48 AM , Rating: 2
Or 192.168.0.1 - or wherever your own router/modem is ;)


RE: I called, nobody home.
By themaster08 on 6/15/2011 12:07:32 PM , Rating: 2
Or how about 169. IP ;)


RE: I called, nobody home.
By Mitch101 on 6/16/2011 8:44:02 PM , Rating: 2
I had my old router set up that way. If you targeted specific ports on my router it would send the command to the source IP address. In effect you could hack yourself. For most other ports I send them to dead end IP addresses that wont ever exist.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:15:52 PM , Rating: 2
Dell? Cause that is who shows to own that IP.


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 12:21:09 PM , Rating: 1
Yes, but the World DB are behind that IP. Thats is just the one of the login servers.

Easy catch if you can get in.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:25:35 PM , Rating: 2
What? What "World DB" are we talking about? It is a Dell owned IP, they host their crap from it. There is no magic button on the Internet to shut it down, everything is distributed. You are worrying me, cause it seems like you don't understand networks at all.


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 12:42:31 PM , Rating: 2
I wasn't talking about shutting down. There is a Dell World Database behind login server. Its just a login server for Dell Intranet. The european one BTW. The databases are in the US and AUS. You can track them easy when after you entered it. And yes, their databases are centralized, not distribuited around the world. Don't ask me how i know this.

I didn't talked about DDoSing it would be just a mild annoyance. Or I wasn't completely clear about it.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:49:41 PM , Rating: 2
OK, and? Why would this be advantageous? They said you call the number and they will DDOS the thing, not hack it. What exactly are you expecting them to accomplish by taking down a Dell login server?

Side note, if it is Intranet, I doubt it would be public facing.


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 1:04:39 PM , Rating: 2
It is accessible from the outside. Just ICMP is off and has one or two limitations. It is basically a login server.

DDoS would be a mild annoyance anyway. DBs are up, but login servers would be down.


RE: I called, nobody home.
By Gzus666 on 6/15/2011 2:17:02 PM , Rating: 2
So this all goes back to what would be the point? You took down an intranet for a little while? They could just turn off the route from the outside and they still have internal company Intranet and they could just VPN to hit it. I guess I'm confused why you are targeting Dell most of all, considering they haven't done anything.


RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 6:43:51 PM , Rating: 1
Maybe to you they didn't. But even the tin man sometimes has to take a fall.

I would love to see Dell in the attacks, first for personal reasons, and second because that network is shit easy to take down and the whole IT infrastructure is a castle of cards.

Sony and others that suffered silly attacks, only fell for it, because they cheapened too much what was supposed to be safe. Dell has a massive centralized DB (Support/Sales/Logistics and much much more) with weak IT infrastructure and little protection or redundancy. Sitting Duck,


RE: I called, nobody home.
By Gzus666 on 6/15/2011 7:53:25 PM , Rating: 2
You are either a complete fool or the greatest troll I have seen in a while. If you are the latter, hats off to you sir.

Hacking actual network equipment or taking down actual networks is VERY tough beyond just DDOSing things. Most of these hacks are just known server vulnerabilities, they aren't amazing, they are just taking advantage of crappy admins.

I hope you aren't in IT, but if you worked in IT you would see a large portion of the people you encounter there, especially your regular old Windows admins, are not that good. On top of that, people are naturally lazy and companies are cheap, so patches and updates don't happen and things aren't secured all that well.


"Paying an extra $500 for a computer in this environment -- same piece of hardware -- paying $500 more to get a logo on it? I think that's a more challenging proposition for the average person than it used to be." -- Steve Ballmer

Related Articles
Welcome to 2011, Year of the Hacker
June 14, 2011, 9:40 PM













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki