LulzSec brought down by own leader

lolwut. It would never ever ever take 2 to 3 years for a port scan. On a 56k modem it only takes a couple min. A DDoS attack isn't even in the same realm as actually owning a system. If you knew what I know about the heartland attack lol you wouldn't even be saying what you're saying. It was a REALLY REALLY simple exploit and you'd be loling all over if you knew what it was.

Hmm. Obviously you can do it within minutes/seconds. But if you port scan a well secured system IDS will detect it very simply and alert the admins. So, in order to attack well secured systems port scans are done for months to years in order to avoid detection. I don't mean the straight forward port scanning (port scanning google.com, etc) because such servers get a lot of port scans daily and it's not going to be an issue. But, when you port scan a system that's secured behind some layers you have to do it without their knowledge(Lets say that you've managed to find access to an internal server of google then you have to do it secretly). Usually this is how hackers break, they penetrate the perimeter first and carefully find the next level vulnerabilities.
 
Last edited:


Hackers in movies

hackers-cast.jpg


Hackers in real life

T4qLV.png
 
There are many different forms of hack, I don't see why you're pinpointing on portscans, DOS or any particular method. As an example of naivety, you're on about portscan ranges, right? It doesn't fucking matter how much you spread your scan out - if the system is advanced, as soon as you ping the "right" port then an intrusion detection system will pick it up and alert the administrator. There could easily be a hundred other ways to attack the server.

Not always possible because systems are not always opened to attackers. Hackers attack only when a vulnerability is found and they can't attack all the systems, whenever they want. Financial systems are more secure than other systems and requires very high skills to break in.

A big fat DUUUH comes to mind. Hackers do have to probe a system to find out if it's vulnerable, figure out the configuration and what features it has. Also, hackers have many different forms of motivation and usually have a strong desire to learn.

It's not difficult for a person who is knowledged enough to break in to a complex system to keep himself totally anonymous. 50% of the hackers manage to hack without leaving any trace.

Where the fuck did you get the 50% figure from? The institute of bullshit-made-up studies? There is no possible way you can know and just picked it out of thin air. Sure, you can delete all the logs, use proxy VPNs and a host of other tricks but it only takes a few missed snippets of information to track an intruder.
 
There are many different forms of hack, I don't see why you're pinpointing on portscans, DOS or any particular method. As an example of naivety, you're on about portscan ranges, right? It doesn't fucking matter how much you spread your scan out - if the system is advanced, as soon as you ping the "right" port then an intrusion detection system will pick it up and alert the administrator. There could easily be a hundred other ways to attack the server.

I pinpointed port scan as it's the most common method to analyze the vulnerability but sure there are other methods too but most of them can be detected by IDS/Firewall. That's the point I made there. (You will be detected most of the times). Read my next comment above for more details.

There are many different forms of hack, I don't see why you're pinpointing on portscans, DOS or any particular method. As an example of naivety, you're on about portscan ranges, right? It doesn't fucking matter how much you spread your scan out - if the system is advanced, as soon as you ping the "right" port then an intrusion detection system will pick it up and alert the administrator. There could easily be a hundred other ways to attack the server.

Shows your ignorance.

A big fat DUUUH comes to mind. Hackers do have to probe a system to find out if it's vulnerable, figure out the configuration and what features it has. Also, hackers have many different forms of motivation and usually have a strong desire to learn.

I was replying to your "Hacking for making money" such attacks (financial system) is not possible always, most of the times it can be done only if they find a weakness.

Where the fuck did you get the 50% figure from? The institute of bullshit-made-up studies? There is no possible way you can know and just picked it out of thin air. Sure, you can delete all the logs, use proxy VPNs and a host of other tricks but it only takes a few missed snippets of information to track an intruder.

50% is a rough measure but in fact it more than half - I should have mentioned more than half instead. There are ways and people do.


There is no possible way you can know and just picked it out of thin air. Sure, you can delete all the logs, use proxy VPNs and a host of other tricks but it only takes a few missed snippets of information to track an intruder.

Totally retarded statement. Keep looking into the very basic things and believe that they are the only ways. There are much better and advanced ways to keep yourself anonymous and that's what hackers do.
 
I'd love to reply to your stupidity faceblogger, but you seem to have quoted my message multiple times and I have no way to figure out which points you're trying to address. You just went full retard, never go full retard.
 
I'd love to reply to your stupidity faceblogger, but you seem to have quoted my message multiple times and I have no way to figure out which points you're trying to address. You just went full retard, never go full retard.

Yes, you have no way to figure it out, Because you are just trying to understand it with what you know.