It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by aivlas
reply to post by thatonedude
I don't have a playstation I haven't since the first xbox came out so I'am not sure how I can be a fanboy, what I can be sure about though is hacked firmware is used at the owners risk, sony dosen't control what it does and if you can't show a case of the same details being obtained from a clean playstation then the protection is pretty good, no?
In the ops case we don't know enough to decide anything until more information is provided by either side.
Originally posted by aivlas
reply to post by thatonedude
The latest attack might not have anything to do with the hacked firmware unless the hacked firmware allowed a hacked update to be pushed to all consoles. You can put hacked firmware on your playstation if you want, but trying to blame sony for what the hacked firmware does is absurd, they didn't make it someone out to rip you off did and as I said I would like to see the same info obtained from a clean playstation before writing off the security they use.
You are right in that only bits of info have been released by sony and internet chat is mostly speculation.I don't have a link never claimed to.I understand your firmware argument and yes security is the only issue at hand here so unless you take the speculation of the web I can't say anything else to convince you.Know this....two people I know are getting bank letter's and money has come up missing from both accounts.They both have psn and the timing adds up so cross your fingers it's not true
Originally posted by aivlas
reply to post by thatonedude
Firstly the ops article which is sounding like an actual attack on sony which at the moment we have no info on so can't draw any conclusions. If it turns out security was lacking then they will pay in a manner of ways but we will have to wait and see what happens.
Just sayin man.
Originally posted by studio500
Found out a few days ago that my debit card was compromised and the only place I used it online was via my playstation network.
Took me for a few thousand with an authorisation to a company called The five kings family or something similar in the US. Never heard of them myself.
Thanks Sony
Read [link=http://translate.google.nl/translate?js=n&prev=_t&hl=nl&ie=UTF-8&layout=2&eotf=1&sl=nl&tl=en&u=http%3A%2F%2Fwww.psx-sense.nl%2F46008%2Fplaystati on-network-log-van-de-hacker-leaked%2F]here[/link]
I hope this doesn't get locked, because if Sony's security is really this terrible, it deserves it's own thread.
The website takes awhile to load so I'll just post it here:
[image=http://www.psx-sense.nl/plaatjes_2011/img_4db7364c22be0.jpg]
Above is a screenshot of their PSN servers access logs. This log is created on the main server of the PlayStation Network. Likely many of you have no idea what exactly a log would be. Sony itself has this log file are also publicly retrievable through the URL. Mistake number two, perhaps? Here also some interesting logs:
214.1.211.251 - - [15/Apr/2011: 9:40:11 -0700] "GET / OfficeScan / cgi / cgiChkMasterPwd.exe HTTP/1.1" 404 336 "-" "-"
178.202.110.92 - - [22/Apr/2011: 7:05:00 p.m. -0700] "GET / admin / cdr / counter.txt HTTP/1.1" 404 343 "-" "Mozilla/5.0 (compatible; Windows NT 6.1, de; rv: 1.9.2.16) Gecko/20110319 Firefox/3.6.16 "
214.1.211.251 - - [15/Apr/2011: 9:40:09 -0700] "GET / _vti_bin / fpcount.exe? Page = default.htm | Image = 3 | Digits = 15 HTTP/1.0" 404 325 "- "" - "
214.1.211.251 - - [15/Apr/2011: 9:39:51 -0700] "GET / scripts / foxweb.exe / HTTP/1.0" 404 324 "-" "-"
214.1.211.251 - - [15/Apr/2011: 9:39:48 -0700] "GET / phpwebfilemgr / index.php? F =../../../ etc / services HTTP/1.0" 404 328 " - "" - "
What we see here again include the use of an FVC, local file inclusion, in the last row. With this is that the ip 214.1.211.251, this is possibly the IP of the attacker. Nor has a number of Javascript injections occurred:
214.1.211.251 - - [15/Apr/2011: 9:39:49 -0700] "GET / board.php? FID = alert (document.cookie) HTTP/1.0" 404 314 "- "" - "
214.1.211.251 - - [15/Apr/2011: 9:39:38 -0700] "GET / servlet / webacc? User.id ="> alert ('eeye2004') HTTP/1.0 " 404 319 "-" "-"
214.1.211.251 - - [15/Apr/2011: 9:39:30 -0700] "GET / modules.php? Name = Reviews & rop = post & title =% 253cscript comment> alert 2528document.cookie%)% 253c/script> HTTP / 1.0 "404 316" - "" - "
It is frightening to know that Sony is so easy to hack, because come on Sony, FVC and Javascript injections? Really? This looks like the work of a 14 year old boy. Thanks to SKFU Blog for the announcement of the log.
Originally posted by lifeissacred
reply to post by Conciliatore
I don't know, I'm skeptical about the whole thing right about now to be honest. Until they tell us exactly how they were hacked theres a whole bunch of possible reasons for the PSN being down. To me it seems unlikely they would lie about being hacked, given the bad publicity it will result in and the likely law suits they will have to deal with. What would you consider their motivation be for lying about their users' data and credit cards being stolen?
Q: Was my personal data encrypted?
A: All of the data was protected, and access was restricted both physically and through the perimeter and security of the network. The entire credit card table was encrypted and we have no evidence that credit card data was taken. The personal data table, which is a separate data set, was not encrypted, but was, of course, behind a very sophisticated security system that was breached in a malicious attack.
ICANN names computer hacker as security chief
SAN FRANCISCO (AP) - Jeff Moss, a prominent computer hacker who founded the annual Black Hat and DefCon security conferences in Las Vegas, has been hired as the chief security officer for the organization that coordinates names of the world's Web sites.
The organization, the Internet Corporation for Assigned Names and Numbers, or ICANN, plays a vital role in making sure that when you type a site name into a Web browser, your computer knows where to go to find the site you're trying to reach. ICANN manages the domain name system that underlies that chain of communication.
"I can think of no one with a greater understanding of the security threats facing Internet users and how best to defend against them than Jeff Moss," Rod Beckstrom, ICANN's CEO and formerly the director of the U.S. National Cybersecurity Center, said in a statement. "He has the in-depth insider's knowledge that can only come from fighting in the trenches of the ongoing war against cyber threats."
Moss, who also serves on the U.S. Department of Homeland Security's advisory council, takes on the new post Friday at ICANN's offices in Washington, D.C.