Sometimes folks are feeling mean spirited, maybe because they were not given enough love as a child, or perhaps they received the wrong type of love. I was feeling this way a few weeks back, so I made the following post on the front page of my site:
Two quick updates. First, I’ve put up a forum at http://irongeek.com/forum/index.php so I can show how to crack md5 hashes and why it’s a bad idea to use the same password everyplace. Please feel free to sign up, but keep in mind I may use you as a test example for password cracking. 🙂 Also, for those interested in DoSing my site or trying exploits on it, please feel free to attack the host name hackme.irongeek.com . Enjoy.
http://www.irongeek.com/forum/viewtopic.php?t=3
I have to believe the main guy in question was just playing along and was in on the joke, but here are some of the choice quotes:
«I’m hitting this box with everything I’ve got! It seems to be locked down pretty tight. But I think I’ve found a way in now, he’s running Linux, in fact Ubuntu just as I am so that give’s me an edge. Wonder if I’ll just do an «rm -rf /» right away or something more sophisticated like slowly corrupting the files on the drive»
And
«Thanks! I’ve set a cronjob to start overwriting the files with /dev/urandom exactly 12.00 tomorrow. Muhhahahhaha.»
And of course the inevitable:
«Hmm. Irongeek I thought you said I could hack your box????! Mere seconds before the cronjob was to start I suddenly couldn’t log in to my own box anymore?!? Did you hack me in return!! That’s pretty low! All my files are gone too!!! Please if you have them restore them. I’ve got tons of memories in there! I’m sorry I mocked you, I’ll doing anything you want if you can restor my computer. I freely admit your a much greater hacker than me… just restore the files ok, lets call it quits! I don’t want to have to bring the law into this……….. So how will it be»
I sort of feel bad about it now, sort of. I could set this up because I control the DNS entries for the Irongeek.com domain, but you could also pull it off by using a dynamic DNS provider likehttp://www.dyndns.com/ if you don’t have your own domain. All it is is a simple «A Record» for mapping a host name to an IP. If you are feeling really mean spirited you could set up a DNS entry to map to a host in the IP range of the FBI, NSA or CIA’s network for skiddies, to attack but that might be a bit over the top.
Another interesting idea for messing with skiddies is to add redirects to shock sites like Goat.cx, Lemonparty or Tubgirl to your robots.txt file (thanks for the idea Tokachu). For those that don’t know what the robots.txt file is check out the Wikipedia entry http://en.wikipedia.org/wiki/Robots.txt . Robots.txt is a text file that can be put at the root of a web server that webmasters will use to specify parts of their site they don’t want indexed by search engines like Google and Yahoo when they come by to spider the site (assuming the spider honors the robots.txt file). Since robots.txt list parts of a site that the webmaster does not want indexed, attackers know that there may be some interesting information in these locations and so will deliberately request robots.txt to look for hidden goodies. For an example of a robots.txt file see http://www.google.com/robots.txt . For a great list of shock sites visit:
If you have any other ideas for messing with Skiddies please email them to me. I’d love to add more ideas to this short article and will of course give you credit for the addition. I hope that you have enjoyed this quick and informal article. Happy Skiddy baiting!
Добавить комментарий