Saturday, November 30, 2013

Manpower Ministry finds another duplicate of website, second one in two days

Babe 
This person is a US based hosted hacker.
Yesterday is a Singapore based hosted hacker.


Do a nslookup www.mom.gov.sg show the following which should be the right DNS record to the official website – with URL different from the forged website and also notice is a IPv6 address unlike the forged address which is a IPv4 address.

Non-authoritative answer:
Name :- www.mom.gov.sg
IP address :- 2406:3000:2a:8::66
                203.117.191.66

Do a nslookup www.movgov.sg show the following which should be the duplicate DNS record to the forged website – with a different URL and a different IP address - by saving the real MOM webpage as html web page - can forged like the real one.

Non-authoritative answer:

Name :- movgov.sg
IP address :- 69.162.82.250
Aliases :- www.movgov.sg

Attached below is the trace route for this forged website.

 2    13 ms     9 ms     9 ms  bb116-15-49-1.singnet.com.sg [116.15.49.1]
  3    10 ms     8 ms     9 ms  ge-3-0-0-3489.sapporo.singnet.com.sg [202.166.124.165]
  4    10 ms    10 ms    39 ms  xe-9-0-0-3900.qt-ar04.singnet.com.sg [202.166.120.45]
  5    10 ms    10 ms    10 ms  xe-11-1-2.qt-cr03.singnet.com.sg [202.166.126.209]
  6    11 ms    12 ms    10 ms  ae6-0.singha.singnet.com.sg [202.166.120.186]
  7    10 ms    10 ms    11 ms  ae5-0.beck.singnet.com.sg [202.166.126.41]
  8    10 ms    10 ms    10 ms  203.208.190.57
  9    10 ms    10 ms    10 ms  ge-2-0-0-0.nycec-cr1.ix.singtel.com [203.208.151.217]
 10   181 ms   205 ms   200 ms  so-4-2-2-0.toknf-cr3.ix.singtel.com [203.208.173.106]
 11   191 ms   205 ms   192 ms  so-3-1-1-0.hkgcw-cr3.ix.singtel.com [203.208.171.38]
 12   209 ms   187 ms   187 ms  ge-11-2-0.mpr2.pao1.us.above.net [64.125.12.205]
 13   214 ms   184 ms   190 ms  xe-2-2-0.cr2.sjc2.us.above.net [64.125.31.70]
 14   207 ms   210 ms   219 ms  ae1.cr2.lax112.us.above.net [64.125.31.234]
 15   242 ms   246 ms   252 ms  ae4.cr2.iah1.us.above.net [64.125.25.54]
 16   233 ms   236 ms   235 ms  ae1.cr2.dfw2.us.above.net [64.125.21.137]
 17   244 ms   228 ms   229 ms  xe-0-2-0.mpr1.dfw1.us.above.net [64.125.27.213]
 18   242 ms   259 ms   241 ms  64.125.188.182.t00822-03.above.net [64.125.188.182]
 19   232 ms   231 ms   232 ms  te6-1.bdr2.core1.dllstx3.dallas-idc.com [208.115.192.58]
 20   232 ms   244 ms   217 ms  ge0-1.vl138.cr02-76.dllstx3.dallas-idc.com [208.115.251.146]
 21   232 ms   227 ms   239 ms  domains.freetzi.hosting.free [69.162.82.250]

Trace complete.

Soccerbetting2  
How did you arrive at the conclusion that the hacker is US based not Australia based not New Zealand based etc ? Maybe you can shared your expertise here ?

Babe  
No need. Wait till the hackers got caught.

Soccerbetting2  
You so confident that the hacker is from US based ? OK , trust your expertise knowledge .

Babe  
I say is US based hosted hacker.

Soccerbetting2  

OK . I have stated that it is US based from my first post and also US based from my second post also .
Maybe my second posting is posted at first as stated as US but I did corrected and edited that in less than 30 seconds starting from my second posting of it to be "US based" before you replied.

And "US based" is no difference in meaning as from US based hosted hacker .

Hope this clarified out .

Babe  

"US based" & "US based hosted hacker" - is alot of difference technically.
Anyway, no need to dwell into detail & give things away. Let the authorities handle.

Lee Liat Kuan  
Babe, do you know or just guessing?

Babe  
When the hackers got caught, you will know lor.

World War I battlefield soil arrives in London

The WW1 soil is a good reminder to all humanity that - it is important not to start another World War.
World War 3 will end the World.

Friday, November 29, 2013

Glass door at Jurong mall shatters

Babe 

Jurong East IMM glass door leading from taxi stand also shatter suddenly for no reason before - but never reported in the news.
Jurong East Jem is a replica of what is happening in IMM.

Lee Liat Kuan  
What happened at IMM? Cheers.



Well I guess the surface area of the glass door inside IMM is cold due to aircon temperature. Outside surface area of the glass door is hot due to noon sun temperature.
And then suddenly, the glass door without any sign shatter like what you see in Jems.

One thing I don't understand is that such installation are installed everywhere in the shopping centres and the glass don't shatter in this manner.
Even adult try to walk through the glass will get a bump in the head, if the head bang the glass door which are quite thick.


This may have something to do with feng shui, including the location and orientation of the door that would avoid direct sunlight. I do not suggest, however, that all the accidents that have occurred in this mall were due to bad feng shui.

Feng shui is not all superstition, but aspects of it can have scientific and psychological bases.

In any case, there is no harm believing than being sorry afterwards--kiasuism?. Even some western owners of large buildings and structures in Singapore and Hong Kong listened to the advice of feng shui masters.

Babe  

IMM have been around for many years. The same type glass doors for many entrances in IMM also around for many years.
Not sure why the rest of the glass doors in IMM don't shatter even though they experience the same type of conditions except that one.

China scrambles jets after US, Japan enter air zone: Xinhua(2)

Babe 

Let the Master - Sakyamuni Buddha speak to the Parties - if this is more effective. 有请师父 !!!

Realisation: How The Buddha Prevented A Bloody War

Not only did the Buddha actively teach to promote peace, he actively prevented war too.

In the Buddha's time, the Sakiyas (Sakyas) and Koliyas (Kolis) once directed the Rohini (Rohni) river to to be constricted by a dam between the city of Kapilavatthu (Kapilavastu) and Koliya for irrigation of their fields on its banks. In a certain month, when the crops started to wither and the river ran low, labourers and residents of both cities assembled for a meeting. The Koliyas remarked that if the water continued to be shared by both sides, it would be inadequate for both clans. And since their crops could ripen with one more watering, they should have it. To that, the Sakiyas rebutted that after the Koliyas have stocked their storehouses, they the Sakiyas would not be willing to take their precious minerals, gems and money to visit them door to door in exchange for food.
They too insisted that as their crops could ripen with one more watering, they should have the water. Thus began their bickering, out of mutual reluctance to let the water be taken by the other. When things got more bitter, one man struck another, with the other man retaliating, sparking off a fight. To add fuel to the fire was the casting of aspersions on each other's royal lineage.

The Koliyas' labourers suggested that the Sakiyas should take their
offsprings to where they belong
dogs and jackals, as their men 'cohabit' with their sisters. They expressed disbelief that they could be harmed by their warring animals and weapons. The Sakiyas' labourers retorted that the 'leper-like' Koliyas should take their offsprings to where they belong jujube trees, as they are animal-like destitute outcasts. They too expressed disbelief that they can be harmed by their warring animals and weapons. Both sides reported the quarrel to their ministers, who reported it to their royal
households. Armed for battle, the Sakiyas yelled that they will show what strength and power those who cohabit with their sisters have. Mirroring this, the Koliyas armed for battle and declared that they will show what strength and power those who dwell in jujube trees have. Surveying the world at dawn, the Buddha realised that if he did not go to them, they would destroy one another. Using his supernormal power, he levitated through the air to where the conflict was and sat cross-legged in the air above the middle of the Rohini to catch everyone's attention.

When his Sakiya clansmen saw him, they threw off their weapons to pay homage to him. Although already with knowledge of the matter, the Buddha enquired on the origin of the quarrel to which some expressed their ignorance. He then asked who would be likely to know. When the army's chief commander was directed to, he replied that the viceroy would be likely to know. This went on and on until the labourers were questioned, who replied that the quarrel
is about water. The Buddha next asked the king on how much the water is worth. 'Very little', of course. How much are Khattiyas (Sakiyas) worth then? 'Beyond price.' This, the Buddha reasoned, is why it is not fitting to, for very little water, destroy Khattiyas who are beyond price.
To that, all became silent. The Buddha asked both kings to reflect on their actions, exclaiming that if he was not here, they would have let flow a river of (much) blood (for a little water), that what done should not be done
to live in strife afflicted with disease of evil passions in eager pursuit of (fleeting) sense pleasures. In contrast, he lives free from strife, disease and pursuit. Thus said, he proclaimed the following famous verses

We live indeed so happily,

Unhating [Unailing/ Ungreedy] amidst haters
[ailers/ greedy];

Among those who are hateful [ailing/ greedy],

We dwell free from hate [illness/ greed].

The Buddha (Dhammapada Verse 197-199)

China scrambles jets after US, Japan enter air zone: Xinhua (1)


The chances of military skirmishes and accident could happen - under such hand-trigger split second close encounter.
If unfortunate incidents are triggered - every sides must maintain calm and not let it escalates into big brawl.
The prophecy years back of country-to-country fight that will break the Peace in Asia Pacific will occur in East China Sea is not a hoax - is so real.
Any escalation can trigger into WW3 - if every sides is not careful.

Also already say the WW2 historical karma seeds - will roll-over? Just like the unfinished WW1 roll over to WW2?

The Paranormal consciousness of General Yamashita resurface yesterday & he look very worried - other than shaking head - nothing more can be done - whatever need to be done has been done.

 

NYP sets up new pharmaceutical facility to help students gain hands-on experience

Good to have a strong manufacturing and engineering base in high-value added products.

Police report made on duplicate MOM website

Ay, I thought the DNS record should only have 1 official URL with the correct public IP address of the official website.

How come the DNS record can have duplicate official URL with 2 different public IP address.


Do a nslookup www.mom.gov.sg show the following which should be the right DNS record to the official website – with URL different from the forged website and also notice is a IPv6 address unlike the forged address which is a IPv4 address.

Non-authoritative answer:
IP address :- 2406:3000:2a:8::66
                 203.117.191.66



Do a nslookup www.momgov.sg show the following which should be the duplicate DNS record to the forged website – with a different URL and a different IP address - by saving the real MOM webpage as html web page - can forged like the real one.

Non-authoritative answer:

Name :- momgov.sg
IP address :- 182.50.130.87
Aliases :- www.momgov.sg

Attached below is the trace route for this forged website.

Istana site hacking: Second suspect charged with 'unauthorised modification' of webpage

Babe 
For the 2 local hackers who hack the Government web page and display the vulgar sign to Istana - is highly insulting - the like of defacing the Singapore flag.

As mentioned before..
These are the most unlikely suspects...
The current government had to put the blame somewhere...
It is a BIG leap of faith to believe the below people could hack into the government websites. If they could, then those current government websites' security must really suck!
Delson Moo: businessman who isnt a computer programmer
Melvin Teo: the ITE student who wrote his own name "Melvin Teo" on the hacked website
Jame Raj: Drug addict

 

Forensic result do not lie - especially in computer hacking.
There are many traces, logs that will be captured from 3 fronts.
1. The hacker computers or end-devices - the traces lifted from these devices - is the most potent evidence against them.
2. Traces and logs from the ISPs and Telcos.
3. Traces and logs captured from the Government network - can trace all the way to the hackers.
When the 3 fronts traces and logs - are put together - and point to the hackers - isn't the evidences potent enough to press charges?

If you are not a computer expert - i suggest you should not give the above sweeping statement. Your argument above cannot stand water - because you cannot judge a book by the cover.
In court, evidence have to be proven beyond reasonable doubt.


I thought you previously argued that this is not a hack? Have you eaten your words?

Babe  

You are the one who say compromised. I say you are the one who suggest changing hacking to be a compromiser.

jessie  

Yes ,you did dispute that it was a hack and made fun of
my computer knowledge just as you are doing the same
to sg_research. A seventeen year old hacks and modifies
the Istana webpage. Don't you think the security is questionable?
-Jessie


Babe  

I explain the mechanism on how the hacker did it. Like a post-it. You and blue-light suggest using compromising.

I say in computer industry - there is no one calling defacing of website - compromising. I made fun of you and blue-light - as compromisers.

I still maintain - whatever techniques used - they are still call a hacker - according to the IT industry.



BTW what make you think a 17 years old don't know how to hack?
I think you underestimate what kids can do nowadays. They are more experts in IT literacy than many think they are not.
Don't you know a white hacker class are formed - that comprise all the young kids?


KB Jonsson  

What vulgar sign? He is charged of writing his own name "For the Win". No serious hacker would do this.

Babe  

You should read the other article - the vulgar sign done by the businessman. The businessman and this guy collaborate to do it.

Thursday, November 28, 2013

Neighbours know Singapore will not harm their interests: Shanmugam

Babe 

Singapore will not harm the interests of neighbours and friends.
This is the heartfelt statement - as Singapore thrive by having good relationships with almost All Countries in the World.

There is no reason for us to harm the interests of others - which in turn harm ourselves.

Our long history since Independence - have been operating on this Principle.

Typhoons spread Fukushima fallout, study warns

Babe 

The best is to express "Full Repentance" = erecting the "Hall of Repentance" in the Yashurine Shrine to eradicate the ancestor historical karma seeds - if you believe it.
When mundane scientific way to resolve what supposedly a natural disaster has caused - and is unable to resolve what science and technology should have solved - then it is worth considering the Supramundane resolution.

If atheists do not believe in Supramundane - at least they know that in a mundane world, it will pacify 2 Countries - and at least, it will pose less difficulty and heartache in maintaining relationship with the 2 Countries - that have historical baggage.

Isn't it worth a try?

Mers virus found in camels in Qatar, linked to human spread

Babe 

Will need to engage WHO how to control and eradicate the spread of MERs if the source is identified - and doing it humanely - because animals are still one of the sentinent beings.

Istana site hacking: Businessman and student arrested; to be charged on Friday



Unlikely suspects.. A businessman, with no programming skills, and an ITE student who actually supposedly wrote his FULL name on the hacked website, and James Raj Arokiasamy, who is a drug addict.
These are the LEAST likely people to be hackers!
One word: Scapegoats

IT forensic can pick up all traces and do hop-by-hop tracing to the source address that attack the websites.
To elaborate, a hacker in order to access the Internet will need to establish connectivity with the ISPs or Telcos as a registered Internet user.

For eg. At home the hacker need to login into his ADSL modem via his phone line to access the Internet. His userid, phone no. will be logged by the ISP or Telco he registered with.
If a hacker use his tablets, phablets or smartphone, he will still need to access his Telco through his device number, imei no., mac address, public IP address when he access using his voice plan and data plan just like desktop users.

Upon successful authenication, ISP or Telco will issue him a unique IP address that will tie to his mac address of his machine. His access, will be logged, time-stamp and all his credential that will identify him will be recorded in the log during access including all the website he visit.
There are many mechanism to track all his access information and his surfing activities such as using web proxy, IPS/IDS, firewall log, dhcp log, server access log, event log, security log, syslog etc managed by Central Loggers.

Security Incident Management System will have pick up the intrusion.
Thus forensic IT team can trace all these logs and identify the hackers beyond reasonable doubts.

If the forensic IT team can catch hold of the hackers notebook or end devices, they can easily pick up his access path because there are many traces left behind in the Operating System that will reveal what he did.

There are so many logs like event logs, system logs, security log etc & folders such as temporary folders, internet folders etc.
Even if these files or folders are erased or deleted or clear there are tools that will bring back all the files. The deletion are not permanent as many people think they are. Thus trace cannot be removed as long as the hackers did something funny.

Of course there will be professional hackers that will hide their identity using VPN, NAT, PAT, Proxy, man-in-the-middle attack by IP spoofing etc but there are still ways to track them but require more efforts, more cooperation and more time. (can write a few pages on these)