Internet Anthropologist Think Tank: EXCLUSIVE: Update:" Hack of Jihadist DOS program."

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Wednesday, May 02, 2007

    EXCLUSIVE: Update:" Hack of Jihadist DOS program."

    From previous post:

    My off the record sources told me James Manning from Earthlink Inc. could help me with this story.
    I showed this Email to James Manning, Senior Threat Analyst, EarthLink, Inc.

    Copy of email I recieved:

    start start start

    "On 4/28/07, XXXXXX wrote:........Private sector Sources have seen an exploit within the Hackers DOS programs allowing an authority to monitor and track the wanabe Jihadist hackers back to their nest right around their proxys.

    While the flaw doesn't allow access to root, it has lead to a collection of VERY interesting IP addresses,

    In the silver dos program the login authentication routine for the program does not properly sanitize entered information or the credentials that are transmitted, opening the MySQL database and PHP scripts to compromise, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    in turn putting all login data and ongoing user xxxxxxxxxxxxxxxxxx activity that the database stores opening it to the authority. Also the transmission of login data is not properly encoded or encrypted and someone xxxxxxxxxxxxxxxx using the proper packet sniffer captured login packets and stole and recorded the users login data.

    This means that an "authority" has captured this data and they have isolated the true location and have a record of them logging in and engaging in "terrorist activities".

    There is a fake email associated with this, which they are back tracking.

    A privacy vulnerability exists in the applications interaction xxxxxxxxxxxxxxx with the Windows firewall and how it authorizes itself for use. One of the methods is xxxxxxxxxxxx value to the ProxyEnable key in the registry xxxxxxxxxxx. If you are using a proxy for any purpose but especially for anonymity, the xxxxxxxxxxxxxxxxxxxxxxxxxx of this registry key will temporally disable your proxy and leave your raw IP visible.

    The ones that track back to Internet cafes, the security cams, available on the Internet are used to collect photos of the "terrorist hackers"

    The IP's have been collected and processed. Their is nothing the terrorists can do but wait for the knock.

    After analyzing that program and data someone worked with two pro-Muslim, Christian sites and just recently worked with the Radio Vatican site informing them of impending attacks and who and where the attackers are..

    .They monitor their program and activities then proactively notify and work with target sites to mitigate any potential outages and loss. Eventually they will take down the program distributors and users, PRISON or worse.

    The wanabe jihadist have exposed their entire network, IPs, passwords, Emails, even some photos. Just a matter of time. Nice work fascists hackers.

    They know about the exploit which is why membership is currently almost dead, and they go begging.

    MORE: turning the Snort 2.6.1 DCE/RPC flaw into a working exploit."

    end end end

    James while "on the RECORD " said: " he could confirm parts of it.", went off record, and refused to talk anymore about it on the record.

    Islamofacsists top hackers, known:

    croconile ( owner, programer, )
    some of his Hacking activity by Croconile: [Open in new window]
    "stoshhar" knows who he is too, he was showing off for him.

    الناصر العربى

    ابن مكة





    شام الإسلام


    عبدالقادر أبوعلي






    More BREAKING:


    Labels: , , , ,


    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home