Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi all! We have been experiencing an issue on site where threads have been missing the latest postings. The platform host Vanilla are working on this issue. A workaround that has been used by some is to navigate back from 1 to 10+ pages to re-sync the thread and this will then show the latest posts. Thanks, Mike.
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Lulzsec merge

124

Comments

  • Closed Accounts Posts: 22,565 ✭✭✭✭Tallon


    jester` wrote: »
    Just to clarify for some people, this guy could just be a young and naive guy who got pulled into a "hacking community" and was asked to run a program from his computer to take part in a DDoS (Distributed Denial of Service) attack against the organizations that have been recently targeted by groups like LulzSec. Another situation could be he accidentally installed a virus on his computer, and his computer was used as a zombie in a botnet to aid in performing DDos attacks. A botnet is controlled by a third party.

    He could have been arrested due to his internet traffic showing someone on his connection performing attacks against the targets. The police now need to perform forensic analysis on his computer media looking for evidence to either convict him, or clear him of charges.

    This is going to happen more and more as groups like LulzSec recruit people to help with their cause. People who do not realize they could be committing a crime, and just think they are taking part in something fun, until they get a knock on the door.
    Agreed, I understand that, but if it is Lulz, then it is a big blow for his campaign


  • Moderators, Category Moderators, Music Moderators, Politics Moderators, Society & Culture Moderators Posts: 22,360 CMod ✭✭✭✭Dravokivich


    Tallon wrote: »
    I'm not that stupid, mines
    : Pa55word

    Personally I'd lower cases the 'p,' have a higher case 'A,' throw in a '2,' for the 'r,' and use a reverse 'b,' instead of 'd.'

    :pac:


  • Moderators, Music Moderators Posts: 2,159 Mod ✭✭✭✭Oink


    ejmaztec wrote: »
    He'll be sh1tting himself if he gets extradited to the US.


    Why? I am sure he is well prepared for that.

    You don't hack into the CIA website thinking "Ah well there is no hope I'm going to get caught so no need to worry."

    Right?


  • Closed Accounts Posts: 22,565 ✭✭✭✭Tallon


    Personally I'd lower cases the 'p,' have a higher case 'A,' throw in a '2,' for the 'r,' and use a reverse 'b,' instead of 'd.'

    :pac:
    imustchangemypasswordnow


  • Registered Users, Registered Users 2 Posts: 27 jester`


    Tallon wrote: »
    Agreed, I understand that, but if it is Lulz, then it is a big blow for his campaign

    His campaign? True, he could be a leader in the group, but he could also just be a supporter. This will not affect a group of their size in the slightest.

    It still has not been confirmed he is LulzSec either, it is purely speculation at this stage until they check the evidence.


  • Advertisement
  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    Tallon wrote: »
    imustchangemypasswordnow

    I saw one in the list of 62000 the other day that was "johnsnewpassword", I kid you not :D
    Classic


  • Moderators, Category Moderators, Music Moderators, Politics Moderators, Society & Culture Moderators Posts: 22,360 CMod ✭✭✭✭Dravokivich


    PogMoThoin wrote: »
    I saw one in the list of 62000 the other day that was "johnsnewpassword", I kid you not :D
    Classic

    haha, I have a feeling his next one will be "johnsnewerpassword."

    :P


  • Closed Accounts Posts: 22,565 ✭✭✭✭Tallon


    jester` wrote: »
    His campaign? True, he could be a leader in the group, but he could also just be a supporter. This will not affect a group of their size in the slightest.

    It still has not been confirmed he is LulzSec either, it is purely speculation at this stage until they check the evidence.
    Exactly, he could be a leader, he could be a one man show, heck, he could be leeroy jenkins for all we know.

    I'm obviously completely speculating here, along with everyone else!


  • Registered Users, Registered Users 2 Posts: 4,532 ✭✭✭WolfForager


    04eDf.jpg


  • Registered Users, Registered Users 2 Posts: 184 ✭✭Saviola


    There were some epic passwords in that list, qwertyuiop seems quite popular.

    Anyway considering the tweets have stopped from lulzsec i'd kind of assume that it was him who was caught. I also got the feeling that he was the only guy doing it as there didn't seem to be any communication telling people to co-ordinate attacks.


  • Advertisement
  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin




  • Registered Users, Registered Users 2 Posts: 184 ✭✭Saviola


    04eDf.jpg
    PogMoThoin wrote: »

    Oh well there goes my theory...


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin




  • Registered Users, Registered Users 2 Posts: 2,085 ✭✭✭paddydriver


    Tallon wrote: »
    imustchangemypasswordnow

    Have a check here and see if worth bothering:

    https://shouldichangemypassword.com/

    ;)


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    Have a check here and see if worth bothering:

    https://shouldichangemypassword.com/

    ;)

    Sign up to spam, click here................


  • Registered Users, Registered Users 2 Posts: 184 ✭✭Saviola


    Enter your e-mail address and password here and ill check if they've been compromised...


  • Registered Users, Registered Users 2 Posts: 34,210 ✭✭✭✭Penn


    Doing these things "because they can" or "to highlight flaws in their systems" is about as good of an excuse as "I shot him in the chest because he wasn't wearing a bulletproof vest".

    Hope all the ****ers are caught.


  • Registered Users, Registered Users 2 Posts: 8,813 ✭✭✭BaconZombie


    The LulzSec Twat account is saying it's just some random person.

    LulzSec wrote: »

    Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here! Which poor bastard did they take down?
    42 minutes ago
    LulzSec wrote: »

    But hey, if someone out there hacked the UK government in the name of #AntiSec, well done sirs!
    6 minutes ago
    LulzSec wrote: »

    Anyone in the world can copy and paste The Lulz Boat ASCII art and general lighthearted theme. Smarten up, check the feed first. #AntiSec
    7 minutes ago

    LulzSec wrote: »

    Just saw the pastebin of the UK census hack. That wasn't us - don't believe fake LulzSec releases unless we put out a tweet first.
    10 minutes ago

    https://twitter.com/#!/LulzSec/
    Tallon wrote: »
    Agreed, I understand that, but if it is Lulz, then it is a big blow for his campaign


  • Registered Users, Registered Users 2 Posts: 13,997 ✭✭✭✭Cuddlesworth


    Barrington wrote: »
    Doing these things "because they can" or "to highlight flaws in their systems" is about as good of an excuse as "I shot him in the chest because he wasn't wearing a bulletproof vest".

    Hope all the ****ers are caught.

    They have hacked some of the most major sites on the net and managed to get passwords and credit card details. I can guarantee you this, every site they have taken down has been reamed to shreds for months before by others who say nothing. Think long and hard about the implications of that.

    Online security is becoming a big issue, you wouldn't feel safe if your bank take your cash at the counter and stacked it on a table behind them in open view. Why accept the same with websites online?


  • Moderators, Science, Health & Environment Moderators, Social & Fun Moderators, Society & Culture Moderators Posts: 60,104 Mod ✭✭✭✭Tar.Aldarion


    Basically, they arrested the person who set up the lulsec IRC channel, nice! although i heat he independently attacked other sites


  • Advertisement
  • Closed Accounts Posts: 6,048 ✭✭✭Da Shins Kelly


    Smart kid. The CIA should hire him.


  • Registered Users, Registered Users 2 Posts: 710 ✭✭✭TheReverend


    Smart kid. The CIA should hire him.

    He ran the IRC channel, probably helped the DDoSing but that about it


  • Registered Users, Registered Users 2 Posts: 17,190 ✭✭✭✭IvySlayer


    Haha they caught one ****er, hopefully they catch the rest.


  • Registered Users, Registered Users 2 Posts: 7,938 ✭✭✭ballsymchugh


    he's not one of them apparently.
    Ryan Cleary is not part of LulzSec; we house one of our many legitimate chatrooms on his IRC server, but that's it.


  • Closed Accounts Posts: 22,565 ✭✭✭✭Tallon


    http://www.unveillance.com/latest-news/unveillance-official-statement/

    Reports coming out that they are in it for the money and not the LulZ :eek:
    Over the last two weeks, my company, Unveillance, has been the target of a sophisticated group of hackers now identified as “LulzSec.” During this two week period, I was personally contacted by several members of this group who made threats against me and my company to try to obtain money as well as to force me into revealing sensitive data about my botnet intelligence that would have put many other businesses, government agencies and individuals at risk of massive Distributed Denial of Service (DDoS) attacks.

    In spite of these threats, I refused to pay off LulzSec or to supply them with access to this sensitive botnet information. Had we agreed to provide this data to them, LulzSec would have been able to grow the size and scope of their DDoS attack and fraud capabilities.

    Plain and simple, I refused to comply with their demands. Because of this, they followed through in their threats – and attacked me, my business and my personal reputation.

    IRC convo is in the link.

    What are they playing at?


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    They are slimeballs.


  • Registered Users Posts: 1,806 ✭✭✭D1stant


    Lizbeth Salander is behind the whole thing


  • Closed Accounts Posts: 3,243 ✭✭✭LighterGuy


    Tallon wrote: »
    http://www.unveillance.com/latest-news/unveillance-official-statement/

    Reports coming out that they are in it for the money and not the LulZ :eek:

    IRC convo is in the link.

    What are they playing at?

    Lets be honest, a large percent of hacking always has some alterior motive.
    Its all twisting the reason why. Like, hackers saying they "hack" only after something "unethical" a company did. Its all bs.

    Theres a personal gain for every action we do.


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    LighterGuy wrote: »
    Lets be honest, a large percent of hacking always has some alterior motive.
    Its all twisting the reason why. Like, hackers saying they "hack" only after something "unethical" a company did. Its all bs.

    Theres a personal gain for every action we do.

    Uh, wrong.

    That may be the case for 'cracking'. The motive of hacking is to purely understand how something works.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 5,112 ✭✭✭Blowfish


    Tallon wrote: »
    http://www.unveillance.com/latest-news/unveillance-official-statement/

    Reports coming out that they are in it for the money and not the LulZ :eek:



    IRC convo is in the link.

    What are they playing at?
    I hate to point out the obvious, but if you are going to do anything black hat wise, claiming you are doing it in the name of Lulzsec and/or Anonymous is pretty much a given. As it stands they are both ridiculously easy to use as patsys because they are deliberately putting themselves in the limelight.


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    I'm glad they're doing it, to show people that the organisations we trust to keep our private information safe are not reliable. In fact, they don't take online security seriously at all.

    They hacked the Arizona Department of Public Safety. The officers e-mail passwords were included in what they released, and demonstrate a very low level of awareness of computer security, passwords include "12345", "password" and officers badge numbers.

    You must ensure your own safety online, no site can be trusted.


  • Registered Users, Registered Users 2 Posts: 1,217 ✭✭✭brimal


    lol @ the people thinking LulzSec is one person


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    PogMoThoin wrote: »
    I'm glad they're doing it, to show people that the organisations we trust to keep our private information safe are not reliable. In fact, they don't take online security seriously at all.

    They aren't doing it for that though. They are doing it because they are media whores and want attention. They have no interest in highlighting security concerns, or attacking targets for the 'principle' of it. They are whoring up the media and loving every minute of it.

    If you were one of those 60,000 people who had an array of strangers reading your personal e-mails, you might not be so glad.


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    dlofnep wrote: »
    If you were one of those 60,000 people who had an array of strangers reading your personal e-mails, you might not be so glad.

    I'm not daft enough to use the same password in any two places so it wouldn't happen. Re-using passwords is lazy, too lazy to spend 5 minutes learning a better method. Anyone who does this deserves what they get tbh.

    I have a relative who's password for everything is his name with "1234" after it. He's got a degree so its not like he can't devise or learn a better method. He handles some serious legal documents as part of his job. Its just absolute laziness.


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    PogMoThoin wrote: »
    I'm not daft enough to use the same password in any two places so it wouldn't happen. Re-using passwords is lazy, too lazy to spend 5 minutes learning a better method. Anyone who does this deserves what they get tbh.

    Nonsense. Most people use the same password out of convenience. If a burglar breaks into a house with a weak lock, does the home-owner equally deserve it?

    The reality is - Lulzsec irresponsibly released usernames and passwords for 60,000 people. It's irrelevant how weak or strong their passwords were - they personal information was compromised, and their personal e-mails scoured by thousands of scumbags with ulterior motives.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 7,041 ✭✭✭Seachmall


    dlofnep wrote: »
    Nonsense. Most people use the same password out of convenience. If a burglar breaks into a house with a weak lock, does the home-owner equally deserve it?
    Do they deserve it? No.
    Should they expect sympathy? No.

    With programs out there to generate and securely store passwords for multiple accounts convenience is no longer an excuse for having the same weak password on different sites. It's just laziness and ignorance plain and simple.


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    dlofnep wrote: »
    Nonsense. Most people use the same password out of convenience. If a burglar breaks into a house with a weak lock, does the home-owner equally deserve it?

    The reality is - Lulzsec irresponsibly released usernames and passwords for 60,000 people. It's irrelevant how weak or strong their passwords were - they personal information was compromised, and their personal e-mails scoured by thousands of scumbags with ulterior motives.

    Would you trust a bank that didn't store your money in a safe, but on the desk in full view to everyone?

    Of the 62,000 leaked usernames and passwords, the people involved wouldn't have any security risks if they hadn't re-used their passwords, it wasn't their email/paypal/amazon etc password that was leaked, but the one for that specific site.

    convenience = laziness
    Its not that hard to develop a system, there are plenty of guides. There are addons to do it also.
    http://antivirus.about.com/od/securitytips/a/passwords.htm


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    PogMoThoin wrote: »
    Would you trust a bank that didn't store your money in a safe, but on the desk in full view to everyone?

    That's not a comparable scenario. There are far too many 0-days out there, which means that securing web-applications, no matter how much effort is put in - there can always ultimately be a security issue.
    PogMoThoin wrote: »
    Of the 62,000 leaked usernames and passwords, the people involved wouldn't have any security risks if they hadn't re-used their passwords, it wasn't their email/paypal/amazon etc password that was leaked, but the one for that specific site.

    Look - Lulzsec had absolutely no right to release those details. It's irrelevant if they were used on another website. You can't blame people solely for their own convenience. It was Lulzsec who compromised their details and shared them - Lulzsec is 100% to blame for anything that occurred because of it.
    PogMoThoin wrote: »
    Its not that hard to develop a system, there are plenty of guides. There are addons to do it also.
    http://antivirus.about.com/od/securitytips/a/passwords.htm

    As someone who is a regular contributor to the security forum on boards, you're preaching to the preached. But you're overlooking the reality that the majority of internet users are casual users.

    What Lulzsec did was wrong, and for you to say that they deserved it is immature.


  • Closed Accounts Posts: 3,243 ✭✭✭LighterGuy


    dlofnep wrote: »
    Uh, wrong.

    That may be the case for 'cracking'. The motive of hacking is to purely understand how something works.

    I'm well aware of the difference from cracking and hacking.
    thing is, just because someone says they did it out of 'hacking' - could really be 'cracking'.


    "eh yeah i only did it cause i was testing your security :P" (in reality i was looking for the credit card details) :pac:


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    dlofnep wrote: »
    As someone who is a regular contributor to the security forum on boards, you're preaching to the preached. But you're overlooking the reality that the majority of internet users are casual users.

    What Lulzsec did was wrong, and for you to say that they deserved it is immature.



    To say they're mostly casual users is wrong, some like my relative actually use pc's every day of the week and know the dangers, some like the Police officers have been briefed on online safety but still use something like "password" or "12345". These people do know better, but don't bother.

    I never said what Lulzsec are doing was right, but if it proves to convince everyone to tighten up then I'm all for it, make a bigger issue of it. We trust sites to keep our information secure, but how secure is that info, does getting access to that info give anyone enough information to get elsewhere? And You're right, we need to inform casual users of easy methods of security, but we also need to insist that non-casual users don't be so lazy, the only way to do this is make it a big worldwide issue, open their eyes.

    Along with that we also need sites to take their security more seriously. Lulzsec claimed most of the sites they hack are pretty simple to get into, some like Sony even stored un-encrypted passwords in plain text files, completely unacceptable. I'm glad they highlighted that.


  • Advertisement
  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    A 19-year-old charged with hacking the website of the UK Serious Organised Crime Agency has been diagnosed with Asperger's syndrome, a court has heard.

    Ryan Cleary, from Wickford, Essex, was arrested as part of a Scotland Yard and FBI probe into online hacking group LulzSec.

    His counsel told City of Westminster Magistrates' Court he suffers from the form of autism, along with agoraphobia.

    http://www.bbc.co.uk/news/uk-13916090


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    Gary McKinnon was diagnosed with the same. It makes sense - locked up in your room with only a computer to yourself - you're going to become naturally curious. Still - it doesn't excuse him using botnets to crash random servers. At least McKinnon had legitimate motives, and didn't intend to cause any problems to the network.

    I've no inherent problems with greyhat hackers who are a little bit mischievous in the pursuit of understanding a system, or an attack vector - But people who purposely crash systems are arseholes.


  • Closed Accounts Posts: 13,874 ✭✭✭✭PogMoThoin


    Lulzsec have sailed away into the horizon leaving one last stash
    AOL: While you may have been secretly hoping for some juicy memos akin to The AOL Way, what we actually have is a text file that begins: “The purpose of this document is to provide the AOL Network Engineering Staff, Management and any other pertinent persons a detailed review, analysis and recommended ‘best practices’ document for the implementation of layer 4 through 7 switching configurations.” – it’s an incredibly technical document.
    AT&T: A large .rar archive includes a huge number of internal documents related to AT&T’s LTE rollout. It includes meeting memos, emails, media reports, PDFs, Powerpoint presentations and more.
    Battlefield Heroes: This text file appears to be a list of account details for over 550,000 users of social game Battlefield Heroes.
    FBI Being Silly: This text file includes the output of a URL on the FBI website. We’ll admit to not knowing the technical significance of why this is ‘silly’ as yet.
    Hackforums.net: This appears to be 200,000 user details for Hackforums.net in a .csv file.
    Nato-bookshop.org: Similarly, this appears to be 220,000 user logins for a NATO online bookshop (the URL currently redirects to the main NATO site).
    Evidence that LulzSec hacked the US Navy website: An image is included showing the phrase “Pablo Escobar AntiSec” inserted multiple times on a list of Navy salary grades.

    Office networks of corporations: A text file seemingly listing IP numbers of internal Corporate networks, including Disney, EMI and Universal.

    Email login details supposedly for a number of private investigators: Self-explanatory.
    User login details for “Random gaming forums”: It’s unclear which forums.
    “Silly routers”: A list of IP numbers for routers with passwords set to either ‘root’ or ‘admin’.
    http://www.thehackernews.com/2011/06/50-days-of-lulz-lulzsec-says-goodbye.html

    The vitual machines are most likely already wiped leaving no traces


  • Closed Accounts Posts: 99 ✭✭Turkana


    I think the jig is up!

    http://www.bbc.co.uk/news/world-us-canada-14212110
    Police in the US, Britain and the Netherlands have detained more than 20 people as part of an investigation into major cyber attacks.

    Most of the arrests were in the US, where the FBI said 16 people had been held for alleged computer hacking.

    Fourteen of them were suspected of an online attack on PayPal, claimed by hacking group Anonymous, said the FBI.

    In Britain, a teenager was arrested in London, while four other suspects were detained by police in the Netherlands.


  • Registered Users Posts: 3,808 ✭✭✭FatherLen


    oh no not lulzsecs twitter account!!!!


  • Closed Accounts Posts: 14,762 ✭✭✭✭stupidusername


    looks like someone's hacked the BBC now


  • Registered Users, Registered Users 2 Posts: 7,041 ✭✭✭Seachmall


    LulzSec announced they'd stopped a couple of weeks ago, now AntiSec are on the scene (LulzSec + others).

    They also stated the teen arrested in London was not related to their "operations", he hosted their IRC server.


  • Closed Accounts Posts: 99 ✭✭Turkana


    Seachmall lulzec have not stopped. They just hacked the Sun and were threatening to release some Murdoch email accounts... Anyway the twitter account is back up. Never mind! But it hasn't been updated in a while...


  • Closed Accounts Posts: 17,918 ✭✭✭✭orourkeda


    How I lulzeced


  • Closed Accounts Posts: 12,456 ✭✭✭✭Mr Benevolent


    I don't care.


  • Advertisement
Advertisement