Forums | Hello Guest, Login or Register | > > L4Y Files: No longer here! < <
  Levels-4-You News [Forum Rules]  
Page 2
Multiple Page Topic : 1 
Back to Forum Thread List

Levels-4-You
Tsk Tsk Tsk...
Posted Oct 14th, 08:45pm by Garner
Bad script kiddie...

Quote
Accused hacker denies link to 'elite' group
October 14, 2003, 16:05 BST

The teenager accused of bringing down a major US port's computer systems in a denial of service attack was part of an "elite" hacking group, a court heard yesterday.

Aaron Caffrey, 19, claims that his computer was hijacked by two hackers known as Dry Ice and Friction using a Trojan horse to remotely control his PC without his knowledge.

Caffrey was arrested last year after US police traced a denial of service attack that crashed the Port of Houston's website in Texas to a computer at Caffrey's home in Shaftesbury, Dorset.

Giving evidence yesterday at Southwark Crown Court, Caffrey said he had seen evidence of Dry Ice and Friction's hacking ability in scripts for Zombies and Trojan Horses in a chatroom on a .tv domain that the two hackers had set up using stolen credit cards.

But the prosecution counsel said Caffrey had coded a Unicode exploit denial of service tool and put links to a compressed version of the file his own website under the banner "Allied Haxor Elite".

Caffrey said he put the hacking group name up just to annoy other hackers and said the files were just "resource scripts" that allowed people to change the font and type of text in chatrooms and add more visual features.

"If it [the script] was there, it didn't contain anything to do with denial of service and even if it did it wouldn't be illegal. It's perfectly legal to have one," he said.

An expert witness for the prosecution last week dismissed Caffrey's claims that his PC had been hijacked. The witness said there was no evidence of an attack and that it was technically impossible for a hacker to remove all traces of having planted or altered data on the computer.

When the prosecution put this to Caffrey again yesterday he said: "The technology exists and I can even explain how it works."

Caffrey has pleaded not guilty to unauthorised modifications of a computer contrary to Section 3 of the Computer Misuse Act 1990.

The case continues.

Ref:
(http://news.zdnet.co.uk/internet/security/0,39020375,39117136,00.htm)

News Source : ChilledIce
RHF   Posted 15th Oct 2003 11:20am
L4Y Member
Post 0 / 676

Simple reply, don't use "Internet Explorer", ActiveX exploits love IE as IE has the Exploits
Blog - BBS - Dev    
JeaneRedBR   Posted 15th Oct 2003 2:58pm
L4Y Member
Post 0 / 27

just a nOOb question
How do I know that someone is hacking my computer?!!!
   
SupersonicRobo   Posted 15th Oct 2003 3:14pm
Welcome!
Post 0 / 4

Oh no, this can't be good.

Someone has changed the name of my computer from "Workstation 1" to "Not yours, not anymore" ;/
SupersonicRobo.com    
Garner    Posted 15th Oct 2003 3:22pm
Post 0 / 4125
LOL
"Science is this extraordinary transnational, transcultural, trans-everything language which is the only way to discover Truth and its regrettable that billions are still stuck in the Middle Ages believing the crap propagated by Popes and priests..."
- Peter Atkins  
 
RHF   Posted 15th Oct 2003 3:44pm
L4Y Member
Post 0 / 676

Quoting JeaneRedBR
just a nOOb question
How do I know that someone is hacking my computer?!!!


Post your external IP address for all of us to "look at" and you might find out.

Jeane, dont really do it.
Blog - BBS - Dev    
JeaneRedBR   Posted 15th Oct 2003 3:50pm
L4Y Member
Post 0 / 27

Quoting RHF
Quoting JeaneRedBR
just a nOOb question
How do I know that someone is hacking my computer?!!!


Post your external IP address for all of us to "look at" and you might find out.

Jeane, dont really do it.

Very funny RHF!
   



Hitokiri Taos   Posted 15th Oct 2003 8:56pm
Welcome!
Post 0 / 3

Stupid hackers, don't do anything unless you can get away with it.
"A true man is one who can build something with the bricks others have thrown at him."    
DVL_IAC   Posted 15th Oct 2003 8:58pm
L4Y Member
Post 0 / 1417

Quoting JeaneRedBR
just a nOOb question
How do I know that someone is hacking my computer?!!!


buy norton internet security 2003 and that will tell u every time someone tries to hack into ur computer or a website tries to install something on your computer. it will tell u the ip address of the hacker or the website and it will show u on a world map exactally where its comming from and it will tell u their address and it will tell u what internet they have. so u could use all the information it gives u to go to the persons house or where the website is hosted from and beat the person down




also norton internet security 2003 comes with good antivirus software to stop viruses or fix viruses u already have or quorentein viruses u have so they dont spred
My Main Youtube Page - My Second Youtube Page - My Files - My Deviant Art    Modified Oct 15th, 09:01pm by DVL_IAC
RHF   Posted 15th Oct 2003 9:06pm
L4Y Member
Post 0 / 676

Quoting DVL_IAC
Quoting JeaneRedBR
just a nOOb question
How do I know that someone is hacking my computer?!!!


buy norton internet security 2003 and that will tell u every time someone tries to hack into ur computer or a website tries to install something on your computer. it will tell u the ip address of the hacker or the website and it will show u on a world map exactally where its comming from and it will tell u their address and it will tell u what internet they have. so u could use all the information it gives u to go to the persons house or where the website is hosted from and beat the person down



Don't be such a n00b yourself,

yes you could go beat the living crap out this person, but it might not be they're fault, Viruses attempt to spread themselves through n00bies machines, and they dont even know it, use common sense, lock down uneeded services on your machine, use a virus scanner, use norton internet security. keep updated patch-wise.

here is just an example of what I see (something of which I rarely check)..

Quote
00:42:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10655 PROTO=UDP SPT=520 DPT=520 LEN=52
00:42:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10656 PROTO=UDP SPT=520 DPT=520 LEN=52
00:43:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10657 PROTO=UDP SPT=520 DPT=520 LEN=52
MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.78.15.134 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=1174 DF PROTO=TCP SPT=2636 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
00:43:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10658 PROTO=UDP SPT=520 DPT=520 LEN=52
00:44:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10659 PROTO=UDP SPT=520 DPT=520 LEN=52
00:44:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10660 PROTO=UDP SPT=520 DPT=520 LEN=52
00:45:04 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.37.28.130 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=107 ID=45891 DF PROTO=TCP SPT=3831 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
00:45:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10661 PROTO=UDP SPT=520 DPT=520 LEN=52
00:45:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10662 PROTO=UDP SPT=520 DPT=520 LEN=52
00:46:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10663 PROTO=UDP SPT=520 DPT=520 LEN=52
00:46:24 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=64.159.93.121 DST=192.168.12.2 LEN=404 TOS=0x00 PREC=0x00 TTL=112 ID=5162 PROTO=UDP SPT=2715 DPT=1434 LEN=384
00:46:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10664 PROTO=UDP SPT=520 DPT=520 LEN=52
00:46:43 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.78.11.176 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=57777 DF PROTO=TCP SPT=1209 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0
00:47:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10665 PROTO=UDP SPT=520 DPT=520 LEN=52
00:47:29 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.78.129.8 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=32273 DF PROTO=TCP SPT=2600 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0


Useless information eh? well the people that "attack you" is generally useless information, similar to what I have posted above (the output of some of my firewall's data).

You can find out where these people are in seconds in traditional ways (tracert).
Blog - BBS - Dev    Modified Oct 15th, 09:11pm by RHF
Page 2
Multiple Page Topic : 1 


Copyright © 2000-2025 Levels-4-You
Your request was handled in 0.14 seconds.