A client of mine was hacked, seriously.

Descartes

Lifer
Oct 10, 1999
13,968
2
0
This isn't your typical histrionic "Oh noes, my machine rebooted. I've been hacked!"; no, one of my clients was really compromised.

What's interesting is that all the compromised systems are artifacts of esoterica; the Unix flavor is not widely known, and the software they trashed is known to very few.

Anyway, this is how they left their mark. No joke.
 

artikk

Diamond Member
Dec 24, 2004
4,172
1
71
Originally posted by: Descartes
This isn't your typical histrionic "Oh noes, my machine rebooted. I've been hacked!"; no, one of my clients was really compromised.

What's interesting is that all the compromised systems are artifacts of esoterica; the Unix flavor is not widely known, and the software they trashed is known to very few.

Anyway, this is how they left their mark. No joke.

:confused: The name of your thread has lead me to assume something totally different to what the thread is actually about. Hacked can be used as:
  • hacked into an operating system
  • hacked someone's head/body
 

kwo

Golden Member
Mar 18, 2002
1,318
0
0
Now there's a bummer - but they just trashed programs, not files or data?

Did they attempt to hijack at all, or was it more of a prank hack?

Still, I hate having that happen to clients......
 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
There doesn't appear to be any further compromise beyond just random trashing. I don't maintain their network, but I'm already quite certain how they got in.

I just found it ironic: To know the systems the person obviously does he would have to have legitimate ability beyond the use of your widely available tools. It seems strange that they'd effectively graffiti the systems and nothing more. We'll see...
 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
Originally posted by: russianpower
Originally posted by: Descartes
This isn't your typical histrionic "Oh noes, my machine rebooted. I've been hacked!"; no, one of my clients was really compromised.

What's interesting is that all the compromised systems are artifacts of esoterica; the Unix flavor is not widely known, and the software they trashed is known to very few.

Anyway, this is how they left their mark. No joke.

:confused: The name of your thread has lead me to assume something totally different to what the thread is actually about. Hacked can be used as:
  • hacked into an operating system
  • hacked someone's head/body

They did. This is an old Unix box that houses their business software. The package used to manage this data is not well known, so that's why it was so curious.

Yes, I am 100% serious. The only reason I posted it here is because ATOT is one of the few groups of people who would actually know what the message means. I showed it to my client and they said, "What?"

 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
Originally posted by: FoBoT
maybe that is a diversion and there is something you haven't found yet

Well, if they were legitimately wishing to control the network they wouldn't have left such an egregious mark.

BTW, he got in through an FTP exploit after one of the admins removed the firewall rule that only allowed a certain range of addreses to use the FTP service. He was going to "leave it open for a moment", but neglected to add it back. A little policy can go along way....
 

Looney

Lifer
Jun 13, 2000
21,938
5
0
Originally posted by: Descartes
There doesn't appear to be any further compromise beyond just random trashing. I don't maintain their network, but I'm already quite certain how they got in.

I just found it ironic: To know the systems the person obviously does he would have to have legitimate ability beyond the use of your widely available tools. It seems strange that they'd effectively graffiti the systems and nothing more. We'll see...

How do you know there aren't any tools out there to help the scriptkiddies do this? Are you that involved in the 'hacking' community to know there aren't any?
 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
Originally posted by: Hardcore
Originally posted by: Descartes
There doesn't appear to be any further compromise beyond just random trashing. I don't maintain their network, but I'm already quite certain how they got in.

I just found it ironic: To know the systems the person obviously does he would have to have legitimate ability beyond the use of your widely available tools. It seems strange that they'd effectively graffiti the systems and nothing more. We'll see...

How do you know there aren't any tools out there to help the scriptkiddies do this? Are you that involved in the 'hacking' community to know there aren't any?

Yes I am, and I know for certain.

I know a vulnerability scanner was used, and it's likely that one of the known exploits was also used after identifying the vulnerability; however, defacing the software requires intimate knowledge of the software, the language in which it was written, the directory structure, etc. It's just not going to happen. Either the person realized the value of the data and decided to do their research, or they found the quickest way to leave their mark and felt that was sufficient; I'm hoping the latter.
 

NogginBoink

Diamond Member
Feb 17, 2002
5,322
0
0
Most of the cases I see like this, there's a large stash of MP3 files or porn somewhere on the hard drive.
 

BrokenVisage

Lifer
Jan 29, 2005
24,771
14
81
Originally posted by: Descartes
This isn't your typical histrionic "Oh noes, my machine rebooted. I've been hacked!"; no, one of my clients was really compromised.

What's interesting is that all the compromised systems are artifacts of esoterica; the Unix flavor is not widely known, and the software they trashed is known to very few.

Anyway, this is how they left their mark. No joke.

lmao, good one.
 

KLin

Lifer
Feb 29, 2000
30,224
568
126
Why the hell would you bump a 3 month old thread just to say "lmao, good one."? :roll: