|
|
|
Bad script kiddie...
Quote | Accused hacker denies link to 'elite' group
October 14, 2003, 16:05 BST
The teenager accused of bringing down a major US port's computer systems in a denial of service attack was part of an "elite" hacking group, a court heard yesterday.
Aaron Caffrey, 19, claims that his computer was hijacked by two hackers known as Dry Ice and Friction using a Trojan horse to remotely control his PC without his knowledge.
Caffrey was arrested last year after US police traced a denial of service attack that crashed the Port of Houston's website in Texas to a computer at Caffrey's home in Shaftesbury, Dorset.
Giving evidence yesterday at Southwark Crown Court, Caffrey said he had seen evidence of Dry Ice and Friction's hacking ability in scripts for Zombies and Trojan Horses in a chatroom on a .tv domain that the two hackers had set up using stolen credit cards.
But the prosecution counsel said Caffrey had coded a Unicode exploit denial of service tool and put links to a compressed version of the file his own website under the banner "Allied Haxor Elite".
Caffrey said he put the hacking group name up just to annoy other hackers and said the files were just "resource scripts" that allowed people to change the font and type of text in chatrooms and add more visual features.
"If it [the script] was there, it didn't contain anything to do with denial of service and even if it did it wouldn't be illegal. It's perfectly legal to have one," he said.
An expert witness for the prosecution last week dismissed Caffrey's claims that his PC had been hijacked. The witness said there was no evidence of an attack and that it was technically impossible for a hacker to remove all traces of having planted or altered data on the computer.
When the prosecution put this to Caffrey again yesterday he said: "The technology exists and I can even explain how it works."
Caffrey has pleaded not guilty to unauthorised modifications of a computer contrary to Section 3 of the Computer Misuse Act 1990.
The case continues.
Ref:
(http://news.zdnet.co.uk/internet/security/0,39020375,39117136,00.htm)
|
News Source : ChilledIce |
RHF |
Posted 15th Oct 2003 11:20am | |
L4Y Member Post 0 / 676
|
Simple reply, don't use "Internet Explorer", ActiveX exploits love IE as IE has the Exploits |
|
JeaneRedBR |
Posted 15th Oct 2003 2:58pm |
L4Y Member Post 0 / 27
|
just a nOOb question
How do I know that someone is hacking my computer?!!! |
|
SupersonicRobo |
Posted 15th Oct 2003 3:14pm |
Welcome! Post 0 / 4
|
Oh no, this can't be good.
Someone has changed the name of my computer from "Workstation 1" to "Not yours, not anymore" ;/ |
|
Garner |
Posted 15th Oct 2003 3:22pm | |
Post 0 / 4125
|
LOL |
"Science is this extraordinary transnational, transcultural, trans-everything language which is the only way to discover Truth and its regrettable that billions are still stuck in the Middle Ages believing the crap propagated by Popes and priests..."
- Peter Atkins |
|
|
RHF |
Posted 15th Oct 2003 3:44pm | |
L4Y Member Post 0 / 676
|
Quoting JeaneRedBR | just a nOOb question
How do I know that someone is hacking my computer?!!! |
Post your external IP address for all of us to "look at" and you might find out.
Jeane, dont really do it. |
|
JeaneRedBR |
Posted 15th Oct 2003 3:50pm |
L4Y Member Post 0 / 27
|
Quoting RHF | Quoting JeaneRedBR | just a nOOb question
How do I know that someone is hacking my computer?!!! |
Post your external IP address for all of us to "look at" and you might find out.
Jeane, dont really do it. |
Very funny RHF! |
|
Hitokiri Taos |
Posted 15th Oct 2003 8:56pm |
Welcome! Post 0 / 3
|
Stupid hackers, don't do anything unless you can get away with it. |
"A true man is one who can build something with the bricks others have thrown at him." |
|
|
DVL_IAC |
Posted 15th Oct 2003 8:58pm | |
L4Y Member Post 0 / 1417
|
Quoting JeaneRedBR | just a nOOb question
How do I know that someone is hacking my computer?!!! |
buy norton internet security 2003 and that will tell u every time someone tries to hack into ur computer or a website tries to install something on your computer. it will tell u the ip address of the hacker or the website and it will show u on a world map exactally where its comming from and it will tell u their address and it will tell u what internet they have. so u could use all the information it gives u to go to the persons house or where the website is hosted from and beat the person down
also norton internet security 2003 comes with good antivirus software to stop viruses or fix viruses u already have or quorentein viruses u have so they dont spred |
|
RHF |
Posted 15th Oct 2003 9:06pm | |
L4Y Member Post 0 / 676
|
Quoting DVL_IAC | Quoting JeaneRedBR | just a nOOb question
How do I know that someone is hacking my computer?!!! |
buy norton internet security 2003 and that will tell u every time someone tries to hack into ur computer or a website tries to install something on your computer. it will tell u the ip address of the hacker or the website and it will show u on a world map exactally where its comming from and it will tell u their address and it will tell u what internet they have. so u could use all the information it gives u to go to the persons house or where the website is hosted from and beat the person down |
Don't be such a n00b yourself,
yes you could go beat the living crap out this person, but it might not be they're fault, Viruses attempt to spread themselves through n00bies machines, and they dont even know it, use common sense, lock down uneeded services on your machine, use a virus scanner, use norton internet security. keep updated patch-wise.
here is just an example of what I see (something of which I rarely check)..
Quote | 00:42:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10655 PROTO=UDP SPT=520 DPT=520 LEN=52
00:42:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10656 PROTO=UDP SPT=520 DPT=520 LEN=52
00:43:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10657 PROTO=UDP SPT=520 DPT=520 LEN=52
MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.78.15.134 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=1174 DF PROTO=TCP SPT=2636 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
00:43:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10658 PROTO=UDP SPT=520 DPT=520 LEN=52
00:44:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10659 PROTO=UDP SPT=520 DPT=520 LEN=52
00:44:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10660 PROTO=UDP SPT=520 DPT=520 LEN=52
00:45:04 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.37.28.130 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=107 ID=45891 DF PROTO=TCP SPT=3831 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
00:45:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10661 PROTO=UDP SPT=520 DPT=520 LEN=52
00:45:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10662 PROTO=UDP SPT=520 DPT=520 LEN=52
00:46:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10663 PROTO=UDP SPT=520 DPT=520 LEN=52
00:46:24 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=64.159.93.121 DST=192.168.12.2 LEN=404 TOS=0x00 PREC=0x00 TTL=112 ID=5162 PROTO=UDP SPT=2715 DPT=1434 LEN=384
00:46:39 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10664 PROTO=UDP SPT=520 DPT=520 LEN=52
00:46:43 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.78.11.176 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=57777 DF PROTO=TCP SPT=1209 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0
00:47:09 IN=eth2 OUT= MAC=ff:ff:ff:ff:ff:ff:00:a0:c5:55:36:1e:08:00 SRC=192.168.12.1 DST=192.168.12.255 LEN=72 TOS=0x00 PREC=0x00 TTL=1 ID=10665 PROTO=UDP SPT=520 DPT=520 LEN=52
00:47:29 IN=eth2 OUT= MAC=00:50:bf:21:25:91:00:a0:c5:55:36:1e:08:00 SRC=213.78.129.8 DST=192.168.12.2 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=32273 DF PROTO=TCP SPT=2600 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0 |
Useless information eh? well the people that "attack you" is generally useless information, similar to what I have posted above (the output of some of my firewall's data).
You can find out where these people are in seconds in traditional ways (tracert). |
Blog - BBS - Dev |
Modified Oct 15th, 09:11pm by RHF |
|
Page 2 Multiple Page Topic : 1 2 |
|
|
|
|