How Malicious Hackers Trap You

  • Thread starter Thread starter hackingsecrets
  • Start date Start date
On star date 22 Jan 2004 20:29:01 -0800,
(e-mail address removed) (hackingsecrets) thought it would be
rather spiffy to spray paint these fine words on the wall..
This website will give the world some insite as to how malicious
hackers trap their victims.

http://geocities.com/trackershackingsecrets

Beware

You mean like this, Debbie?

Hostname: 64-40-62-51.nocharge.com
IP Address: 64.40.62.51

http://www.nocharge.com/

Registrant:
NOCHARGE.COM
417 2nd Ave West
Seattle, WA 98119
US

You're still a glutton for punishment. I like that in a moron.
 
On star date 22 Jan 2004 20:29:01 -0800,
(e-mail address removed) (hackingsecrets) thought it would be
rather spiffy to spray paint these fine words on the wall..


You mean like this, Debbie?

Hostname: 64-40-62-51.nocharge.com
IP Address: 64.40.62.51

http://www.nocharge.com/

Registrant:
NOCHARGE.COM
417 2nd Ave West
Seattle, WA 98119
US

You're still a glutton for punishment. I like that in a moron.

Yeah, I hear she learned about nocharge.com the hard way. ;-)
Ya gotta love it... spamming yet *another* web address. How many have
you lost now, moron? I've lost count. Color that one gone too... ;-)
 
Yeah, I hear she learned about nocharge.com the hard way. ;-)
Ya gotta love it... spamming yet *another* web address. How many have
you lost now, moron? I've lost count. Color that one gone too... ;-)

She'll never learn, bro. We both kno that for a fact. I've lost count
how many times her ass has been handed to her on a platter. ;) This
reminds me of an old song.. "Another one bites the dust."
mwahahahahaha
 
pictures can contain code, or encrypted code, that when run by another
program can be malicious or intrusive.

--

Jonny Durango

http://www.soundclick.com/ratcitymusic.htm

"America will never be destroyed from the outside. If we falter and lose our
freedoms, it will be because we destroyed ourselves." - Abraham Lincoln
 
pictures can contain code, or encrypted code, that when run by another
program can be malicious or intrusive.

Not only that, there's a distinct difference between a "backdoor" (aka
trojan, aka 'RAT') and a virus. :o) I'll never understand why people
get those two confused.
 
This website will give the world some insite as to how malicious


--


(Quote from one who found just the right words)

USENET POST WARNING
====================
The User by the name "Tracker" aka "Debbie", VPNSISHACKERSSECRET, aka
"snailmail" regularly posts incorrect, misleading and damaging information,
to rely on the advice of this person could result in irreparable damage to
your system. It is mypersonal advice not to listen to anything that this
person posts andcertainly to not attempt or believe anything this person
advises.

(End Quote)

Regards

Tocis (commoner AT carcosa DOT de)
For answers include HI-AK 523 in your email subject!
 
hackingsecrets said:
This website will give the world some insite as to how malicious
hackers trap their victims.

http://geocities.com/trackershackingsecrets

Beware

I dont see any information on that site that is insightful as to how
"malicious hackers" trap
people.
Do you even know what a BNC is ?


NOTE TO NEWBIES : All the information listed on that site is false and
shoudl be ignored

--
Mimic

"Without knowledge you have fear. With fear you create your own nightmares."
"There are 10 types of people in the world. Those that understand Binary,
and those that dont."
"He who controls Google, controls the world".
 
pictures can contain code, or encrypted code, that when run by another
program can be malicious or intrusive.

--

Jonny Durango

http://www.soundclick.com/ratcitymusic.htm

"America will never be destroyed from the outside. If we falter and lose our
freedoms, it will be because we destroyed ourselves." - Abraham Lincoln
<damn top posters>

A picture can NOT contain an executable but rather an exe can contain
a picture and run it as if it was just a jpg while hiding the .exe
after a long space.

skrooface.jpg< space >.exe
 
MedEvul said:
A picture can NOT contain an executable but rather an exe can contain
a picture and run it as if it was just a jpg while hiding the .exe
after a long space.

skrooface.jpg< space >.exe

....although I think it is possible to have a malicious program running
and find the running task listed as a jpg (NTFS).
 
MalevolentPirate said:
How can you make an executable contain a jpg and still execute it?

I don't understand your question. My comment was that
non-executable filetypes can appear to be running in the
task list.
 
I think I understand what you are saying. The executable with a hidden
(out of view) extension could conceiveably have the requisite data to
display the promised picture (Britney's or Beyonce's) while also trashing
your BIOS.

Yes, this is an old trick.

....yeah, that too ;o)

However, I was referring to:

"An interesting item to note is how the process appears while running.
For example, running pslist.exe from SysInternals after executing either
of the above two commands displays a process called "myfile.txt"
running with a PID of 1512, as shown in figure 3."

From:

http://patriot.net/~carvdawg/docs/dark_side.html

....relating to the quirky half-assed support of ADS in some
of the MS OSes.
 
Yes, this is an old trick.


...yeah, that too ;o)

Yes, but those two "old tricks" are still deadly and still *very*
effective under the right circumstances. For example, some web mail
interfaces won't display the extension at all if it's been spaced out
far enough with the 1st trick, so the mark will download it and never
see that shs extension. Then once it's on his system, windows *won't*
display that shs extension and the mark will most likely run it if
it's been SE'd properly . Best to assign it's fake extension as a text
file and SE it that way as the icon displayed for the shs extension is
very similar to a text file. Most people won't notice the icon
difference and will click away.

So the trick is:

file.txt .shs

Experiment to get the number of spaces right for the mail client/web
interface that the mark is using.
 
Me said:
Yes, but those two "old tricks" are still deadly and still *very*
effective under the right circumstances.

In fact there appears to be a new Dumaru variant out and
about that is having some success with the old spaced out
extension trick. It reportedly adds a backdoor to the system.
 
Back
Top