Monday, November 11, 2013

'The Messiah' charged with hacking; more being investigated for PMO, Istana hacking

Ha Ha !

The honeypot traps works !

Kudos for the MHA IT forensic team !
Solid !



Though the actions of this group is illegal, it has shown the weakness
of our govt. websites. Even our PM's office was hacked and if it was 
just this group that was involved, it doesn't speak well of our security. Govt. agencies have once again failed .
-Jessie


Babe  jessie 
 
You don't understand "set honeypot traps" ah?
It means set up
陷阱 for the hackers to fall inside and get caught.
Those who know TCP/IP inside out - can easily trace them and catch them. They think they can escape?
These hackers even get confused with DNS cache poisoning and link swings through hsrp and vrrp - active-standby - priority, preempt.
They only seems to know dns service and internet services but not the underlying network archi tech.
Sure get caught.


The network infrastructure did not get penetrated despite 3 days of hackers incessant vulnerability scanning and searching for loopholes to penetrate.

The network infrastructure security has hold its fort and protected from hacker penetration.
And then they manage to find a "search function" that are compromised and redirect to the hacker web page. Web surfers that try to use the search function got redirected to the hacker page - giving the impression the system got penetrated.

But the systems and network did not get penetrated, it is just like "post-it" - pasted on the legitimate web page giving the impression that the websites got hacked.
By doing so, the hackers leave a trail of who they are, and hey presto - the IT forensic team can track them and arrest them.

Solid MHA IT forensic team !!!

Ng Chun Yi  Babe 

Actually if they are smart enough to use VPNs or proxies or IP address spoofing, then it will be virtually impossible to catch them.

    Avatar

    Babe  Ng Chun Yi 

    Harder but still possible to catch - more efforts.
    These techniques is to hide their source IP.
    I don't want to elaborate further.


    I think you are IT illiterate. You basically don't understand the whole text here.对牛弹琴。

    jessie
      Babe 
    Perhaps you are right that I am IT illiterate but you are unable to even define what "being hacked" means.
    Please learn from Blue_Light.
    -Jessie


    Blue_Light  Babe 
    IT what is your unhappiness. A hack on a computer systems is an unauthorised access and/or manipulation of the systems after gaining access. Was the systems not hacked by your definition?


    Oh yah, you could euphemistically say the systems has been compromised instead of been hacked.

    jessie  Blue_Light 

    Thank-you Blue_Light for the clear definition of a "hack". 
    -Jessie
     
    There was attempt to hack but fail - for the 2 websites - PMO and Istana.

    Failing to hack, the 5 hackers exploit a "compromised search function" to compromise the system by redirect to hackers' page.
    Should it be prosecute as hack - even though the hacked attempt failed?
    In the industry, only the label "hackers" is used. Never heard of "compromisers being used". Have you?
    So Blue-Light and Jessie, are you calling the IT industry and ST Online to change the label as "Compromisers" instead of "Hackers".
    Wow Blue-Light and Jessie are in a "compromising position".

    "Compromisers" - ha ha ha ha ha ha..... oh it has been a long time i have not laugh so heartily...... "Compromisers" ...... i pengsan....... want to wayang English ......

    Next time the hacker will say - I will "compromise" you. Another hacker will say, since you "compromise" me, I will "compromise" you. Wow all my goose pimples start to come out. Oh what the "hack"!

    The hacker say "I hack you", "you hack me" - at least doesn't sound so bad......

    hahahahahahaha.......

    No comments:

    Post a Comment