Free Republic
Browse · Search
News/Activism
Topics · Post Article

This thread has been locked, it will not receive new replies.
Locked on 11/07/2006 2:33:44 PM PST by John Robinson, reason:

Dup. http://www.freerepublic.com/focus/f-news/1734119/posts



Skip to comments.

FBI: Hackers Shut Down Bouchard Web site
Click On Detroit ^ | November 7, 2006

Posted on 11/07/2006 1:56:22 PM PST by jamesrichards

FBI: Hackers Shut Down Bouchard Web site

The FBI is investigating an attack by hackers on Republican Candidate for Senate Michael Bouchard's Web site, www.mikeformichigan.com.

The site was also hacked three weeks ago, but at the time it was believed to be because of interest in Bouchard's daughter, the FBI said.

The FBI said it traced the activity back to Maryland, and is on its way to investigate.


TOPICS: News/Current Events
KEYWORDS:
Menendez name appearing pre selected in hudson and union counties.

Few ballots in gop precincts for heather wilson but plenty for madrid.

In philly few republicans are being intimidated to vote dem in polling places.

Steele and chafee signs taken down over nigh

1 posted on 11/07/2006 1:56:24 PM PST by jamesrichards
[ Post Reply | Private Reply | View Replies]

To: jamesrichards
Liberals play dirty: fraud, lies, and LameStream Media bias.

And yet, when they DO win, it is always a threadbare one. :)

2 posted on 11/07/2006 2:00:00 PM PST by Recovering_Democrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Recovering_Democrat

they can't win an election honestly. They have to pull this stuff. Then they try to get one of their judges to overturn the election. They don't believe in "one man, one vote."


3 posted on 11/07/2006 2:01:48 PM PST by berkley
[ Post Reply | Private Reply | To 2 | View Replies]

To: jamesrichards
According to Michelle Malkins post, the denial of service attacks are originating from IP addresses:

66.82.9.55
66.82.9.56

http://michellemalkin.com/archives/006299.htm

Doing a lookup on that IP range I find they are leased to DirecPc, which was recently bought by Hughes Network Systems, a broadband internet provider in Germantown, Maryland.

The time is currently 5pm eastern, it should be stupidly-easy to find out who has those two IP addresses checked out (dhcp or static) at this time. Just call the network security manager below (with a warrant) and get it.

http://www.arin.net/whois/
Fully WHOIS lookup below:

  Search results for: 66.82.9.55


    OrgName:    Hughes Network Systems 
    OrgID:      HNS
    Address:    11717 Exploration Lane
    Address:    DirecWAY Network Management Center
    Address:    attn: Network Security Manager
    City:       Germantown
    StateProv:  MD
    PostalCode: 20876
    Country:    US

    NetRange:   66.82.0.0 - 66.82.255.255 
    CIDR:       66.82.0.0/16 
    NetName:    DIRECPC-1BLK
    NetHandle:  NET-66-82-0-0-1
    Parent:     NET-66-0-0-0-0
    NetType:    Direct Allocation
    NameServer: NS1.DIRECPC.COM
    NameServer: NS2.DIRECPC.COM
    Comment:    ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
    RegDate:    2001-02-28
    Updated:    2003-01-21

    RTechHandle: ZD63-ARIN
    RTechName:   Abuse 
    RTechPhone:  +1-301-601-7205
    RTechEmail:  abuse@hughes.net 

    OrgTechHandle: NSM5-ARIN
    OrgTechName:   Network Security Manager 
    OrgTechPhone:  +1-301-601-7205
    OrgTechEmail:  abuse@hughes.net

    # ARIN WHOIS database, last updated 2006-11-06 19:10
    # Enter ? for additional hints on searching ARIN's WHOIS database.

4 posted on 11/07/2006 2:04:19 PM PST by monkeybrau
[ Post Reply | Private Reply | To 1 | View Replies]

To: jamesrichards
http://www.freerepublic.com/focus/f-news/1734119/posts
5 posted on 11/07/2006 2:07:38 PM PST by quantim (Only one thing is universally incurable: Senators that think they should be President.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jamesrichards

It's the only way they can win. Pathtic dimwits.


6 posted on 11/07/2006 2:08:34 PM PST by Just Lori (Blessed are the peacemakers : ARMY, NAVY, AIR FORCE, MARINES, COAST GUARD!!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: monkeybrau

It is highly unlikely that that is correct. If they are claming it is a DDoS, then two machines couldn't be responsible. The most likely possibility would be a distributed SYN flood, and they wouldn't have valid source IPs to learn anything from. The attacking machines are probably botnet infected Windows machines with their owners completely unaware.


7 posted on 11/07/2006 2:09:24 PM PST by sigSEGV
[ Post Reply | Private Reply | To 4 | View Replies]

To: monkeybrau

Those two IPs are likely part of a larger web cache cluster. We get heaps of legitimate traffic from those addresses and thereabouts.


8 posted on 11/07/2006 2:24:34 PM PST by John Robinson
[ Post Reply | Private Reply | To 4 | View Replies]

To: sigSEGV

I'd say that depends on what server resource is being attacked. If the attackers are exploiting a bug or inefficiency in the system they may not need to employ many of their own resources.


9 posted on 11/07/2006 2:29:50 PM PST by John Robinson
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson