It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.
Originally posted by ckno1What hope does that leave for the rest of us?
Originally posted by ckno1
So there are clearly two lessons to be learned here
It is set in 2010 and charts the actions of Net Force: a special division of the FBI set up to combat increasing crime on the internet.
Originally posted by Prince Of Darkness
Originally posted by ckno1
So there are clearly two lessons to be learned here
You forgot the most important lesson you don't mess the Anonymous, you don't attack a beehive and expect no results. Leave them alone and they won't bother you indulge with them and you always loose.
And this is the bulk of anon. Sadly..
Originally posted by Blackmarketeer
And this is the bulk of anon. Sadly..
They don't call it a cancer for nothing, lol. But keep in mind anon and 4chan are two different things, even if they overlap in many ways.
Originally posted by Blackmarketeer
And this is the bulk of anon. Sadly..
They don't call it a cancer for nothing, lol. But keep in mind anon and 4chan are two different things, even if they overlap in many ways.
Originally posted by silent thunder
Originally posted by Blackmarketeer
And this is the bulk of anon. Sadly..
They don't call it a cancer for nothing, lol. But keep in mind anon and 4chan are two different things, even if they overlap in many ways.
I wonder how all those nihilistic channers like being lumped in with whoever these self-appointed "representatives" of Anon are. Anon is inherently chaotic and something tells me a sizable portion will not like marching behind whoever happens to jump to the front of the parade. What happens when the foot soldiers are told to aim the cannons somewhere they don't wish to?
It's only a matter of time before Anon turns on itself in a paroxyism of autocannibalism. The consequences will never be the same.
"two HBGary Federal employees, CEO Aaron Barr and COO Ted Vera, used passwords that were very simple; each was just six lower case letters and two numbers."
"Neither Aaron nor Ted followed best practices. Instead, they used the same password in a whole bunch of different places, including e-mail, Twitter accounts, and LinkedIn. For both men, the passwords allowed retrieval of e-mail. However, that was not all they revealed. Let's start with Ted's password first."
"Their system did not fall prey to some subtle, complex issue: it was broken into with basic, well-known techniques"
"One of these employees was Ted Vera, and his ssh password was identical to the cracked password he used in the CMS. This gave the hackers immediate access to the support machine."
"Aaron's password yielded even more fruit. HBGary used Google Apps for its e-mail services, and for both Aaron and Ted, the password cracking provided access to their mail. But Aaron was no mere user of Google Apps: his account was also the administrator of the company's mail. With his higher access, he could reset the passwords of any mailbox and hence gain access to all the company's mail—not just his own. It's this capability that yielded access to Greg Hoglund's mail."
"And what was done with Greg's mail? A little bit of social engineering, that's what."
Originally posted by EnhancedInterrogator
All I can say is "wow", they pretty-much f'd themselves ... I wouldn't be suprised for somebody to be able to do this to my hobby web-site, but I'm not a security consulting firm doing work for the Fed's! Here's a few tid-bits ...
"two HBGary Federal employees, CEO Aaron Barr and COO Ted Vera, used passwords that were very simple; each was just six lower case letters and two numbers."
Why is it always the "Exec's"?
From: Jussi
To: Greg
Subject: Re: need to ssh into rootkit
did you open something running on high port?