If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Reuters)   Companies now using "Active Defense" and "Strike Back" technology to hack the hackers: Begun, the Trojan War has   (reuters.com) divider line 74
    More: Interesting, active protection system, hacking attacks, computer networks, Computer Crime, collateral damage, Lulz Security  
•       •       •

8911 clicks; posted to Main » on 18 Jun 2012 at 12:59 PM (2 years ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



74 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread

First | « | 1 | 2 | » | Last | Show all
 
2012-06-18 11:50:25 AM
Wake me up when they can fry the hacker's brain.
 
2012-06-18 11:50:52 AM
Step 1: Backtrace their address
Step 2: ????
Step 3: Consequences will never be the same.
 
2012-06-18 12:08:44 PM
one nice thing about chinese hackers - you can do anything you want to 'em and you never feel guilty about it the next morning.
 
2012-06-18 01:00:24 PM
Seems like we're goin' to Helen a bucket
 
2012-06-18 01:01:05 PM
You maan I can't Stand My Ground against hackers? Most of them wear hoodies, after all.
 
2012-06-18 01:01:09 PM
But only if there're Skittles and SYG in effect.
 
2012-06-18 01:02:28 PM
I felt a DDOS in the force.... and then nothing.... its like a million operating systems were snuffed out.......
 
2012-06-18 01:03:30 PM
Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.
 
2012-06-18 01:06:29 PM

Weaver95: one nice thing about chinese hackers - you can do anything you want to 'em and you never feel guilty about it the next morning.


My brother works in the .edu space on the security side and he feels the exact same way.
 
2012-06-18 01:07:06 PM
4.bp.blogspot.com

"The sky above the port was the color of TV tuned to a dead channel"
 
2012-06-18 01:11:34 PM
Subby

www.information-condom-source.comVS. geturswurve.com
/have at it.
 
2012-06-18 01:12:51 PM
"What about escalation?"

and

"They damaged his nervous system with a wartime Russian mycotoxin.

Strapped to a bed in a Memphis hotel, his talent burning out micron by micron, he hallucinated for thirty hours.

The damage was minute, subtle, and utterly effective. "
 
2012-06-18 01:13:06 PM

fireclown: [4.bp.blogspot.com image 307x500]

"The sky above the port was the color of TV tuned to a dead channel"


Yup. Intrusive Counter-Electronics.
 
2012-06-18 01:16:57 PM
www.universalexports.net
'Come at me, lugheads'
 
2012-06-18 01:17:14 PM

abfalter: Yup. Intrusive Counter-Electronics.


you and silverkey have reaffirmed my faith in fark. Twice if SilverKey is a Lovecraft reference.
 
2012-06-18 01:26:05 PM
2.bp.blogspot.com
 
2012-06-18 01:30:21 PM

fireclown: abfalter: Yup. Intrusive Counter-Electronics.

you and silverkey have reaffirmed my faith in fark. Twice if SilverKey is a Lovecraft reference.


Heh, indeed it is.
 
2012-06-18 01:31:38 PM

Endrick: Wake me up when they can fry the hacker's brain.


"Press Enter" by John Varley

A good read.
 
2012-06-18 01:33:52 PM

SDRR: [2.bp.blogspot.com image 615x281]


j.wigflip.com
 
2012-06-18 01:35:14 PM

fireclown: [4.bp.blogspot.com image 307x500]

"The sky above the port was the color of TV tuned to a dead channel"


That quote is from Neuromancer....having just gotten around to reading it this weekend.

///Yes, yes, I know I am way behind in my required reading, the Kindle I bought a few months ago is helping me tremendously.
 
2012-06-18 01:36:48 PM

anuran: Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.


You're right, but that botnet needs to be shut down one way or another.
 
2012-06-18 01:36:55 PM
i.imgur.com
 
2012-06-18 01:40:27 PM
How about "Active defense" in that you actively try and defend your network instead of throwing up your hands saying it's "too expensive" and shooting down every idea the security guys have?

Companies that can't even get defense right think that going offensive is going to help? Begun the lawsuit wars have.
 
2012-06-18 01:43:05 PM
1.bp.blogspot.com
/obscure?????????????????????????
 
2012-06-18 01:53:18 PM

anuran: Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.


I'm not sure I have a problem with this. If people can't be bothered to keep their computers secure, I'm not going to feel bad about whatever damages they receive, as a result. A computer is not like a refrigerator or a toaster; it requires some effort to maintain. If you can't handle that, don't own a computer - or at least, don't connect it to the Internet.

Since I'm sure someone will respond with "So if you leave your doors unlocked, you deserve to have your house robbed?", I'll preemptively reply with: "Not necessarily, but if you're a rich white family, living in South-Central LA, and you don't lock your doors, I don't really see how you can complain."
 
2012-06-18 01:58:48 PM
Sounds like cyber versions of make-my-day laws which, for the most part, are used reasonably.
Break into my house, expect to be shot.
 
2012-06-18 02:02:00 PM

ChipNASA: SDRR: [2.bp.blogspot.com image 615x281]


Well, looks like that's covered. *rimshot*
 
2012-06-18 02:03:07 PM
Dadoo: I'm not sure I have a problem with this. If people can't be bothered to keep their computers secure, I'm not going to feel bad about whatever damages they receive, as a result.

10: Attack Microsoft servers while spoofing Bank of America server IP addresses
20: Watch Microsoft's active response attack Bank of America servers
30: Watch Bank of America's active response attack Microsoft servers
40: Goto 20
 
2012-06-18 02:03:38 PM
Been going on for a long time already, especially if the BBC has finally caught on to it.
 
2012-06-18 02:05:00 PM
I run an FTP service at home to move large files back and forth, and if I leave it up for more than a few hours invariably some address(es) from Asia will start trying to brute-force their way on with lists of usernames and passwords. So I did a few things...

Moved the FTP service to a non-standard port.

Created a honeypot program that faked an FTP server but waited an additional 10ms between each authentication attempt, thereby soaking up more and more of the attacker's time and threads. It also compiled a nice list of usernames and passwords for me.

Created a little program that parsed the logs from the honeypot and checked to see if the attacker had HTTP or HTTPS ports open. From that it kicked out a webpage so I could see what they had on the attacking machine. I've found and reported 8-10 paypal spoof pages that way.

/ why yes, I was bored that weekend.
 
2012-06-18 02:13:30 PM

TheSilverKey: fireclown: abfalter: Yup. Intrusive Counter-Electronics.

you and silverkey have reaffirmed my faith in fark. Twice if SilverKey is a Lovecraft reference.

Heh, indeed it is.


Nerd. ;)
 
2012-06-18 02:16:59 PM

anuran: Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.


If Grandma lets her comp get sucked into a botnet, she probably shouldn't be on the Internet anyway. If you can't use it responsibly...
 
2012-06-18 02:20:22 PM

PsyLord: [www.universalexports.net image 150x150]
'Come at me, lugheads'


"I am INVINCIBLE!"
 
2012-06-18 02:21:38 PM

DoBeDoBeDo: How about "Active defense" in that you actively try and defend your network instead of throwing up your hands saying it's "too expensive" and shooting down every idea the security guys have?

Companies that can't even get defense right think that going offensive is going to help? Begun the lawsuit wars have.


Agreed.

One of the biggest problems i see is companies want to be more secure but view security as a cost center when it comes to spending. After the SAIC/VA and Stanford Hospital debacles health care companies are still cutting security budgets and see controls as a barrier to getting work done.

Even PCI is getting weaker. It started out on the right track but recently audits and requirements have been watered down. Two reasons. First, clients object to having spend money in an area that does not generate income. Constantly and bitterly. At some point the members of PCI felt the rules may be a barrier to growing their own business. Second, PCI members do not want to piss of clients such as Cisco, IBM, CSC and ATT. PCI was going to set tighter standards on what was acceptable for WIPS/NIPS but demurred due to objections from Cisco and others. You can meet PCI requirements with any systems in place and no commitment to it.
 
2012-06-18 02:25:24 PM

GroverCleveland: anuran: Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.

You're right, but that botnet needs to be shut down one way or another.


I'd worry that false-positives might result in attacking an innocent person's computer or network and getting some legal or publicity fallout for your trouble. Or worse, piss off the Russian mob.

On my home computer that I leave running all the time, ssh is the only port open to the outside world. I noticed lots of fail login attempts, some of them apparently just trying a few default passwords for common user accounts like "oracle" and "guest". Others would hammer it mercilessly in an attempt to authenticate as "root". Now I've got denyhosts installed, setup to permanently ban an IP after 2 failed login attempts. For a while, though, I ran a tweak I made that would first do an intense nmap scan of the offending IP before banning it. I always wondered if (even hoped) any of the perps noticed. Anyway, I decided that my scans might bring unwanted and un-nice attention to myself, so I stopped. Still use denyhosts, though. It's beautiful.
 
2012-06-18 02:30:08 PM
Well. Once more reality inches closer to Ghost In the shell.
 
2012-06-18 02:40:57 PM
i718.photobucket.com
 
2012-06-18 02:41:14 PM

RatOmeter: GroverCleveland: anuran: Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.

You're right, but that botnet needs to be shut down one way or another.

I'd worry that false-positives might result in attacking an innocent person's computer or network and getting some legal or publicity fallout for your trouble. Or worse, piss off the Russian mob.

On my home computer that I leave running all the time, ssh is the only port open to the outside world. I noticed lots of fail login attempts, some of them apparently just trying a few default passwords for common user accounts like "oracle" and "guest". Others would hammer it mercilessly in an attempt to authenticate as "root". Now I've got denyhosts installed, setup to permanently ban an IP after 2 failed login attempts. For a while, though, I ran a tweak I made that would first do an intense nmap scan of the offending IP before banning it. I always wondered if (even hoped) any of the perps noticed. Anyway, I decided that my scans might bring unwanted and un-nice attention to myself, so I stopped. Still use denyhosts, though. It's beautiful.


Firewalls only allow my server to access their systems and I tunnel into my server from where I am. I disable the SSH service when not in use. So far so good.
 
2012-06-18 02:42:10 PM

GroverCleveland: RatOmeter: GroverCleveland: anuran: Stupid farks the vendors and their customers are.
They'll be "striking back" at widows in Paducah whose PCs are parts of a botnet
And even if they get the right targets (not bloody likely) they are committing crimes themselves.

You're right, but that botnet needs to be shut down one way or another.

I'd worry that false-positives might result in attacking an innocent person's computer or network and getting some legal or publicity fallout for your trouble. Or worse, piss off the Russian mob.

On my home computer that I leave running all the time, ssh is the only port open to the outside world. I noticed lots of fail login attempts, some of them apparently just trying a few default passwords for common user accounts like "oracle" and "guest". Others would hammer it mercilessly in an attempt to authenticate as "root". Now I've got denyhosts installed, setup to permanently ban an IP after 2 failed login attempts. For a while, though, I ran a tweak I made that would first do an intense nmap scan of the offending IP before banning it. I always wondered if (even hoped) any of the perps noticed. Anyway, I decided that my scans might bring unwanted and un-nice attention to myself, so I stopped. Still use denyhosts, though. It's beautiful.

Firewalls only allow my server to access their systems and I tunnel into my server from where I am. I disable the SSH service when not in use. So far so good.


But I need to checkout DenyHosts .. I'm too paranoid to just leave SSH on right now.
 
2012-06-18 02:47:08 PM
images.wikia.com

/hot like Idrin
 
2012-06-18 02:47:10 PM

floor: DoBeDoBeDo: How about "Active defense" in that you actively try and defend your network instead of throwing up your hands saying it's "too expensive" and shooting down every idea the security guys have?

Companies that can't even get defense right think that going offensive is going to help? Begun the lawsuit wars have.

Agreed.

One of the biggest problems i see is companies want to be more secure but view security as a cost center when it comes to spending. After the SAIC/VA and Stanford Hospital debacles health care companies are still cutting security budgets and see controls as a barrier to getting work done.

Even PCI is getting weaker. It started out on the right track but recently audits and requirements have been watered down. Two reasons. First, clients object to having spend money in an area that does not generate income. Constantly and bitterly. At some point the members of PCI felt the rules may be a barrier to growing their own business. Second, PCI members do not want to piss of clients such as Cisco, IBM, CSC and ATT. PCI was going to set tighter standards on what was acceptable for WIPS/NIPS but demurred due to objections from Cisco and others. You can meet PCI requirements with any systems in place and no commitment to it.


Yep, the stupid thing is that they skip testing because that cuts from dev time, they skip dev standards because that means proper training, etc. But if somone dares provide them with a shiat service or product they are they first to raise a stink about "do you know who I am" etc.

Yeah you're the fark who lost all your customer data because you couldn't bother to have someone code against and/or test for a simple SQL injection. Sorry I couldn't take the time to replace the oil I drained from your Bentley.
 
2012-06-18 02:53:43 PM
Ah, the old vigilante "eye for an eye" justice. What could possibly go wrong?
 
2012-06-18 02:57:56 PM

pswdfreak:
10: Attack Microsoft servers while spoofing Bank of America server IP addresses
20: Watch Microsoft's active response attack Bank of America servers
30: Watch Bank of America's active response attack Microsoft servers
40: Goto 20


That's only a problem when you don't have access to the network between the two sites. I'm sure that, when companies like Microsoft and Bank of America call their ISPs, they get all the access they want - even if it's indirect.
 
2012-06-18 02:58:15 PM
let's make ICE and be done with it.

//damn console cowboys
 
2012-06-18 02:58:31 PM
Black ICE.
 
2012-06-18 03:06:42 PM
At this rate datajacks and cyberdecks will be necessary within a few years.
 
2012-06-18 03:08:43 PM
4.bp.blogspot.com

/hot like brainburn
 
2012-06-18 03:20:48 PM
www.netrunneronline.com

How could I forget my favorite?
/still hot in here
 
2012-06-18 03:42:31 PM

ChipNASA: [1.bp.blogspot.com image 256x192]
/obscure?????????????????????????


Midnight Madness is one of the greatest movies ever made.
 
2012-06-18 03:49:32 PM
Came for Black Ice/Gibson references. Leaving satisfied...
 
Displayed 50 of 74 comments

First | « | 1 | 2 | » | Last | Show all

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »






Report