Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Hackers hacked at infamous DefCon gathering
AFP ^ | Aug 12, 2008 | Glenn Chapman

Posted on 08/12/2008 10:01:16 AM PDT by decimon

LAS VEGAS, Nevada (AFP) - In the end, it was hackers at DefCon that got hacked.

After three days of software cracking duels and hacking seminars, self-described computer ninjas at the infamous gathering in Las Vegas found out Sunday that their online activities were hijacked without them catching on.

A standing-room crowd cheered admiringly as Tony Kapela and Alex Pilosov showed them how they were "pwned" by a simple technique that could be used to "steal the Internet."

(Excerpt) Read more at news.yahoo.com ...


TOPICS: Computers/Internet
KEYWORDS: pwn4g3
We really are d00med.
1 posted on 08/12/2008 10:01:16 AM PDT by decimon
[ Post Reply | Private Reply | View Replies]

To: decimon
Photo of Tony Kapela:


2 posted on 08/12/2008 10:07:23 AM PDT by 1rudeboy
[ Post Reply | Private Reply | To 1 | View Replies]

To: decimon

Dang...that really is scary!


3 posted on 08/12/2008 10:10:26 AM PDT by Devilinbaggypants (He who wishes to give little shouldn't ask for much.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Devilinbaggypants
Dang...that really is scary!

Yeah, that is a scary kid. ;-)

4 posted on 08/12/2008 10:13:17 AM PDT by decimon
[ Post Reply | Private Reply | To 3 | View Replies]

To: decimon

Perhaps the only answer to hacking is to simply dedicate one computer with a very small Hard drive to nothing but internet surfing and leave it completely open to hackers.

A scrubbing each day of anything left new on the hard drive would prevent use of the HD for storing hacker’s info.

With no infomation and no email, wouldn’t they quickly tire of your computer and leave it alone?


5 posted on 08/12/2008 10:37:36 AM PDT by wildbill
[ Post Reply | Private Reply | To 1 | View Replies]

To: wildbill
With no infomation and no email, wouldn’t they quickly tire of your computer and leave it alone?

I doubt that you are often targeted as an individual. A particularly important institution would be consciously targeted but for the rest of us it is catch as catch can.

6 posted on 08/12/2008 10:56:11 AM PDT by decimon
[ Post Reply | Private Reply | To 5 | View Replies]

To: wildbill

I should have added that I like the idea of a dedicated internet computer. You wouldn’t need anything powerful/expensive. A second computer, rarely or never attached to the net, could hold what you would keep to yourself.


7 posted on 08/12/2008 10:59:42 AM PDT by decimon
[ Post Reply | Private Reply | To 5 | View Replies]

To: decimon

I was referring to the reputed practice of hackers/scammers using ‘zombie’ computers for their nefarious deeds.

They certainly can’t get much of any importance off my computers, including my banking ids since I’m chronically broke. ;-)


8 posted on 08/12/2008 11:16:54 AM PDT by wildbill
[ Post Reply | Private Reply | To 6 | View Replies]

To: wildbill
They certainly can’t get much of any importance off my computers, including my banking ids since I’m chronically broke. ;-)

I was an early user of online banking. Citibank gave me a rom cartridge for my Commodore 128 to access my accounts online. These days I avoid online transactions.

9 posted on 08/12/2008 11:26:43 AM PDT by decimon
[ Post Reply | Private Reply | To 8 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

10 posted on 08/12/2008 11:40:12 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wildbill
Perhaps the only answer to hacking is to simply dedicate one computer with a very small Hard drive to nothing but internet surfing and leave it completely open to hackers.

They're called honeypots, and they are in wide use today.

11 posted on 08/12/2008 11:44:13 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 5 | View Replies]

To: wildbill
Perhaps the only answer to hacking is to simply dedicate one computer with a very small Hard drive to nothing but internet surfing and leave it completely open to hackers.

A scrubbing each day of anything left new on the hard drive would prevent use of the HD for storing hacker’s info.

With no infomation and no email, wouldn’t they quickly tire of your computer and leave it alone?

Actually, there is a program you can get that saves your clean system configuration to a separate part of the hard drive, then restores that configuration every time the computer boots up. It's very nice for schools and libraries and such.

DeepFreeze

12 posted on 08/12/2008 11:47:15 AM PDT by TChris (Vote John McCain: Democrat Lite -- 3% less liberal than a regular Democrat!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: decimon

One word: NetBeui.


13 posted on 08/12/2008 11:47:50 AM PDT by papasmurf (This space left blank intentionly.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wildbill

Microsoft makes a program called Steady State that wipes a machine to a known configuration at every boot. It can even be set to wipe everything in the documents folder.

http://www.microsoft.com/windows/products/winfamily/sharedaccess/default.mspx


14 posted on 08/12/2008 11:53:54 AM PDT by MediaMole
[ Post Reply | Private Reply | To 5 | View Replies]

To: papasmurf
One word: NetBeui.

Is that a Howard Stern thing?

15 posted on 08/12/2008 12:07:10 PM PDT by decimon
[ Post Reply | Private Reply | To 13 | View Replies]

To: decimon

No, it’s a non routable networking protcol. Hackers can’t hack what hackers can’t see.


16 posted on 08/12/2008 1:02:22 PM PDT by papasmurf (This space left blank intentionly.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: MediaMole

Thank you, I like that idea. I have uses for it already! :O)


17 posted on 08/12/2008 1:03:04 PM PDT by papasmurf (This space left blank intentionly.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: papasmurf

YIKES! Not the feared NetBEUI! I can see tokens rolling out of my token-ring in fear as we speak!


18 posted on 08/12/2008 1:21:07 PM PDT by paulcissa (The first requirement of Liberalism is to stand on your head and tell the world they're upside down)
[ Post Reply | Private Reply | To 13 | View Replies]

To: wildbill

they would then use YOUR computer as a zombie proxie to attack other computers.

This would leave you wondering why the FBI has you face to the floor and snapping cuffs on you. (oh and they would also shoot your dog, just kidding.)


19 posted on 08/12/2008 2:07:32 PM PDT by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 5 | View Replies]

To: paulcissa

Yes, but I can see a network that you can’t. LOL


20 posted on 08/12/2008 4:25:01 PM PDT by papasmurf (This space left blank intentionly.)
[ Post Reply | Private Reply | To 18 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson