LulzSec Teen Bailed Out, Had 750,000 Records

Page 3 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
[citation][nom]therabiddeer[/nom]I am saying that the ambiguity has no indication on what he is doing. Having a bunch of stuff running does not show you are a hacker... but to many laymans it scares them into thinking, "oh my, hes good with computers and has everything running!" When you talk about a hacker to a layman, they envision the crazy setup with 6 monitors in a dark room constantly typing away at a terminal or something... so when you say something like "40 programs running with 16 virtual computers" people might actually think hes hacking, even if he wasnt.Also, just because he has 750k usernames/passwords doesnt mean he hacked at all. PS: I am merely saying that nothing we are given in this article tells us anything.[/citation]

Ohh I see. I misunderstood you as saying hackers SHOULD have a crapload of programs open. I agree with you then and point out again that a true hacker would have a very efficient computer running. Having a bunch of crap open is not helpful for someone like that.
 
[citation][nom]11796pcs[/nom]Wouldn't his IP adress be a private one that wouldn't be possible to track? (ex. 10.0.0.0, 172.16.0.0 or 192.168.0.0) I thought ISPs didn't have a certain IP adress for customers and instead used (I believe they're called) dynamic IP adresses. Any clarification anyone?[/citation]
Despite the fact that dynamic IP addresses are being randomly assigned, ISP's DNS servers log those actions using MAC addresses. If IP address of source of some action is known and time frame of it using ISP's logs it can be easily traced.

Btw debating whether 5.5 MB/s or Mb/s is "broadband" "high speed" or w/e internet connection is pointless. He is not accused of streaming BR 3D movie, but of uploading 2-3 MB at most of compiled code, though more likely in the range of less than 300KB, in situation where even if uploading it takes few minutes is not critical. People usually base their presumption on TV portraying of hacking, things just don't work that way. 5.5 Mb/s is more than enough for extremely broad network scans, but if you are targeting single computer 36.6 Kb/s is enough. So argument that he couldn't hack because his connection is slow is as silly as argument that hackers do not use Dell.
 
[citation][nom]therabiddeer[/nom]I am saying that the ambiguity has no indication on what he is doing. Having a bunch of stuff running does not show you are a hacker... but to many laymans it scares them into thinking, "oh my, hes good with computers and has everything running!" When you talk about a hacker to a layman, they envision the crazy setup with 6 monitors in a dark room constantly typing away at a terminal or something... so when you say something like "40 programs running with 16 virtual computers" people might actually think hes hacking, even if he wasnt.Also, just because he has 750k usernames/passwords doesnt mean he hacked at all. PS: I am merely saying that nothing we are given in this article tells us anything.[/citation]
Programs mentioned in the article are not named, you can't be sure that those are not network scanners or some decryption tools working on some hashed password file, also those virtual machines could have been used with some victim's hashed password file for cracking password with brute force attack. The things stated here can say a lot about what could have been going on on his laptop, desktop or w/e. But anyway it also says that analisy of his computer is not finished, yet.
 
[citation][nom]beayn[/nom]Ohh I see. I misunderstood you as saying hackers SHOULD have a crapload of programs open. I agree with you then and point out again that a true hacker would have a very efficient computer running. Having a bunch of crap open is not helpful for someone like that.[/citation]
He could also have 40 very useful programs running. Computer with 0 programs running is not highly efficient, but highly unused one. Efficiency is not measured by number of programs but by workload done per unit of time, some times you need one program, some times you need hundred and one.
 
[citation][nom]therabiddeer[/nom]I am saying that the ambiguity has no indication on what he is doing. Having a bunch of stuff running does not show you are a hacker... but to many laymans it scares them into thinking, "oh my, hes good with computers and has everything running!" When you talk about a hacker to a layman, they envision the crazy setup with 6 monitors in a dark room constantly typing away at a terminal or something... so when you say something like "40 programs running with 16 virtual computers" people might actually think hes hacking, even if he wasnt.Also, just because he has 750k usernames/passwords doesnt mean he hacked at all. PS: I am merely saying that nothing we are given in this article tells us anything.[/citation]

Not trying to pick on but of posting, seem have more of a topic, Yes? Anyways...

Its a new article of highlight of issues maybe relevence or not. All i can say. Rather Toms have a better source or actual able to post more is subjective and perspective, Yes?

And as much as saying , Yes, and the such is probably annoying so is using it. But don't worry on some thoughts i probbaly wont get away from it for awhile, cause in some thoughts its not.

Only some posts dont work or go through so, not much to complain and if could, wouldnt matter.
 
[citation][nom]K-zon[/nom]Not trying to pick on but of posting, seem have more of a topic, Yes? Anyways...Its a new article of highlight of issues maybe relevence or not. All i can say. Rather Toms have a better source or actual able to post more is subjective and perspective, Yes? And as much as saying , Yes, and the such is probably annoying so is using it. But don't worry on some thoughts i probbaly wont get away from it for awhile, cause in some thoughts its not. Only some posts dont work or go through so, not much to complain and if could, wouldnt matter.[/citation]
Dude, I don't know if you've realized it yet, but I don't think anyone here can understand you. It seems like you're just copying and pasting from some translating software, and I'm sorry to say it, but it's not working real well.
 
[citation][nom]K-zon[/nom]Not trying to pick on but of posting, seem have more of a topic, Yes? Anyways...Its a new article of highlight of issues maybe relevence or not. All i can say. Rather Toms have a better source or actual able to post more is subjective and perspective, Yes? And as much as saying , Yes, and the such is probably annoying so is using it. But don't worry on some thoughts i probbaly wont get away from it for awhile, cause in some thoughts its not. Only some posts dont work or go through so, not much to complain and if could, wouldnt matter.[citation][nom]K-zon[/nom]@.therabiddeer: Then you are a threat from users who get attacked cause your computer can be hacked and used withuot you knowing it. Not all hackers are able to find and use such hardware. And for them to hack other hardware they'd need hardware probably not seen as much as your hardware. Cause if all you need at times is an access point, whats it matter if you have a 10,000$ computer? But for sack of excuse, my arguement should end your use of use of your computer for the sack of issues of relevence, despite any efforts of hacking or not. But hopefully it dont, yes? But at least though to say, your computer doesnt have 750,000 things of interest, yes? But to not have something of usefulness of your own self invites trouble. But maybe not trouble enough, but to say on your part trouble enough might just be. Who knows...I take you dont hack. Yes? Or Right??So, so far despite anything you do, dont matter, for sack of arguement. Its a bd one, but whats wrong it in terms of issues? I dont know, hard saying or telling really, yes? But rather hacking within its ownself should say anything different is anyones guess, yes? Complicated to a point of almost the idea of how anything could be said or told. I would say, but of what i say and is is probably two different things and at times i would hope so. But still speculative and subjective. Otherwise, why even the mention, yes? I don't know. But whats it matter, yes? Hackers hack and systems are in use. But how access of some systems that are in use is subjective and perspective, yes? I would say at times for some reason. Until then the otherwise, Yes? Still, i find regualr use of many things probably worse of then hcking sometimes, cause of the interest of it has regular use of something always in question, yes? I don't know, this a ramble topic if it wasn't called one.[/citation]
[/citation]
[citation][nom]K-zon[/nom]threw* not through, maybe through is all honesty.[/citation]

What is this I don't even...
 
[citation][nom]SoundsGoodToMe[/nom]"I thought for a long time about how it would be possible to truly lock out one's computer, and I've concluded that you would actually need to encrypt files with an algorithm that only you knew. No kind of password could save you. If you put any kind of unreasonably long password on Windows, you could still access the hard drive with a Linux Live CD. And if you decided to put a password for powering-on via the motherboard, all you would need to do is reset the mobo or hook up the hard drive to another computer. You would seriously need to encrypt everything and make it not obvious how to decrypt it. I imagine the best way would be to have a flash drive with some kind of decryption algorithm, so that even if they caught your main setup, they would literally have no idea how to decrypt it unless they found out you had the flash drive...Damn confusing..."or... use truecrypt software to encrypt the entire drive with a combination of the three available methods, and a password that's 60+ characters. By the time they decrypt it, if they do, the statute of limitations may expire lol[/citation]
It's impossible to fully protect data with encryption. Every encryption method has one big flaw, it uses mathematical algorithm and keys. If algorithm is known key can be guessed, and the other way around. Even if both are unknown guesses could be made. Strength of encryption lays in the difference between time and resources needed to decrypt it and time frame those data is useful and expense of resources needed to be employed. Think about war time for example. One side sends encrypted messages about aerial attacks that will be committed in 3 days, other side need 6 days to decrypt them. So it's pointless to decrypt it because because those aerial attacks already happened.
 
[citation][nom]dragonsqrrl[/nom]I'm guessing you two live in either the US or Australia. In any other part of the developed world 5.5 Mbps probably wouldn't be considered "high-speed broadband".[/citation]

I live in what's considered to be Rural Australia and i have access to FTTH.
 
[citation][nom]hetneo[/nom]Programs mentioned in the article are not named, you can't be sure that those are not network scanners or some decryption tools working on some hashed password file, also those virtual machines could have been used with some victim's hashed password file for cracking password with brute force attack. The things stated here can say a lot about what could have been going on on his laptop, desktop or w/e. But anyway it also says that analisy of his computer is not finished, yet.[/citation]
"some victims hashed password file for cracking password with brute force attack"? Doesnt make sense. You dont use VM's when bruteforcing, you just want a program that is trying to brute force. Taking away 2-4GB's of your memory, and a portion of your CPU/GPU usage does not increase the throughput of a bruteforce program.
 
[citation][nom]K-zon[/nom]@.therabiddeer: Then you are a threat from users who get attacked cause your computer can be hacked and used withuot you knowing it. Not all hackers are able to find and use such hardware. And for them to hack other hardware they'd need hardware probably not seen as much as your hardware. Cause if all you need at times is an access point, whats it matter if you have a 10,000$ computer? But for sack of excuse, my arguement should end your use of use of your computer for the sack of issues of relevence, despite any efforts of hacking or not. But hopefully it dont, yes? But at least though to say, your computer doesnt have 750,000 things of interest, yes? But to not have something of usefulness of your own self invites trouble. But maybe not trouble enough, but to say on your part trouble enough might just be. Who knows...I take you dont hack. Yes? Or Right??So, so far despite anything you do, dont matter, for sack of arguement. Its a bd one, but whats wrong it in terms of issues? I dont know, hard saying or telling really, yes? But rather hacking within its ownself should say anything different is anyones guess, yes? Complicated to a point of almost the idea of how anything could be said or told. I would say, but of what i say and is is probably two different things and at times i would hope so. But still speculative and subjective. Otherwise, why even the mention, yes? I don't know. But whats it matter, yes? Hackers hack and systems are in use. But how access of some systems that are in use is subjective and perspective, yes? I would say at times for some reason. Until then the otherwise, Yes? Still, i find regualr use of many things probably worse of then hcking sometimes, cause of the interest of it has regular use of something always in question, yes? I don't know, this a ramble topic if it wasn't called one.[/citation]

...... Why do you keep talking about your sack? hahahahaha
 
Those words just mean that the police and court don't have a clue about computer security. If you can remotely access computers with high bandwidth, why you need high bandwidth on your local? And any experienced hacker knows how to cover tracks and make it look like another person did it. Best way to run is to blame someone else rather than a just too suspicious nothing.
 
I don't think this kid had any hand in the damage done. Sounds to me like he was a messenger with a few scripting tools.

I believe that most of Anon and LuLz are script kiddies who think they are cool by riding the coattails of a few really talented individuals. The mark of any good cracker is maximizing damage by utilizing as little of your own resources as possible. You socially engineer people to carry out an activity that gets a lot of attention while the house talent minimizes their apparent involvement of the high profile attack.
 
Who cares if he is the mastermind or only a script kiddie?? Just crucify him!

They really need to make an example. Lock this kid up with all the rapist, I bet his hacking skill wouldn't do much in such situation.
 
[citation][nom]aidanjc[/nom]I live in what's considered to be Rural Australia and i have access to FTTH.[/citation]
That's nice... although I was specifically referring to the Australian average, not the max in a given region.
 
Status
Not open for further replies.