Planet Mu Board Hacked!

Off Topic (Everything besides dubstep)
Forum rules
Please read and follow this sub-forum's specific rules listed HERE, as well as our sitewide rules listed HERE.

Link to the Secret Ninja Sessions community ustream channel - info in this thread
Locked
User avatar
municiple
Posts: 796
Joined: Mon Feb 20, 2006 6:02 pm
Location: Chicago!

Planet Mu Board Hacked!

Post by municiple » Thu Sep 21, 2006 5:36 pm

Looks like the Planet Mu board got hacked by an Anti-War protester. Who knew that Anti-War Dub would have such digital implications?

marsyas
Posts: 3034
Joined: Thu Jan 05, 2006 8:31 pm

Post by marsyas » Thu Sep 21, 2006 11:57 pm

hee hee

hologram
Posts: 191
Joined: Wed Feb 22, 2006 7:58 pm

Post by hologram » Fri Sep 22, 2006 12:23 am

not the first time the sites been hacked. hmmmm

User avatar
seckle
Posts: 12404
Joined: Fri Oct 07, 2005 7:58 pm

Post by seckle » Fri Sep 22, 2006 12:59 am

it's people probably looking for audio files. this is happening more and more every day as labels put their audio online. hackers try and gain access to the mp3's. the warp site went down for nearly two weeks over attacks last year. i can't say this enough, make sure your passwords are numbers,letters and different cases (upper , lower).

User avatar
sek [espionage]
Posts: 727
Joined: Fri Oct 07, 2005 2:45 pm
Location: TOE.RUN.TUH
Contact:

Post by sek [espionage] » Fri Sep 22, 2006 12:33 pm

hey seckle.. I was wondering about this whole phishing thing after we spoke last.
I admit, at the time I was sorta unclear at what phishing actually was. After a bit of research though.. I have a question.
If someone where to try and phish me, and was successful.. they would gain access to the info on my mac right?
What if they're using a pc to do the phishing? what happens when they break through? can they still see all my shit?

pompende
Posts: 2897
Joined: Tue Nov 08, 2005 11:57 am
Location: 38104
Contact:

Post by pompende » Fri Sep 22, 2006 2:29 pm

isnt phishing just when you convince some dumbasshole to give you their credit card number?

pompende
Posts: 2897
Joined: Tue Nov 08, 2005 11:57 am
Location: 38104
Contact:

Post by pompende » Fri Sep 22, 2006 2:30 pm

wait, i mean when youre an asshole and you convince some elderly woman there to give you her credit card number...

User avatar
moderator
Posts: 152
Joined: Wed Feb 15, 2006 5:46 pm

Post by moderator » Fri Sep 22, 2006 3:37 pm

sek [espionage] wrote:hey seckle.. I was wondering about this whole phishing thing after we spoke last.
I admit, at the time I was sorta unclear at what phishing actually was. After a bit of research though.. I have a question.
If someone where to try and phish me, and was successful.. they would gain access to the info on my mac right?
What if they're using a pc to do the phishing? what happens when they break through? can they still see all my shit?
there's two kinds of phishing. the first kind is for credit cards. for example : you get an email with a link to some random net store.

phishing for passwords is a bit different. stupidly, there are people that use password programs. these downloadable programs are designed to keep all the passwrds you'd use in one place, for people that can't be bothered to remember them all. the program , which uses very limited encryption sits on your hard drive. aim, msn and other programs use ports on your PC/MAC. unless you've got a software firewall installed(which i HIGHLY recommend should you use aim,msn,icq,etc) your computer is very easy to compromise.
many people keep aim on all day. these are people that hackers target. they'll phish your active ports using a port scan. once they find a port that's allowing incoming and outgoing traffic(messenging, p2p programs, games, etc.) then they run a phishing program to try and gain entry to your hard disk. an example of phishing, is you'll get a random IM from someone not on your buddy list. the im will be something like :
"Hey. I've been trying to send this to you all day. Here's the link."

you click the link, and depending on the strength of your firewall, they'd have a direct link to your hard drive.

if you run mac in 10.4 or higher, you HAVE to turn on your firewall. go to sys prefs>sharing>firewall>click start>find the "advanced" button on the bottom of the firewall prefs> click on the box that says "stealth mode".

http://en.wikipedia.org/wiki/Phishing

User avatar
sek [espionage]
Posts: 727
Joined: Fri Oct 07, 2005 2:45 pm
Location: TOE.RUN.TUH
Contact:

Post by sek [espionage] » Fri Sep 22, 2006 4:01 pm

seen

deapoh
Posts: 3016
Joined: Tue Jan 03, 2006 3:17 pm
Contact:

Post by deapoh » Fri Sep 22, 2006 8:17 pm

All my passwords are random letters numbers and symbols. Good luck hacking anything I do.
Image

descent
Posts: 211
Joined: Thu Oct 13, 2005 1:52 pm
Location: Providence, RI USofA
Contact:

Post by descent » Fri Sep 22, 2006 8:45 pm

Moderator wrote: if you run mac in 10.4 or higher, you HAVE to turn on your firewall. go to sys prefs>sharing>firewall>click start>find the "advanced" button on the bottom of the firewall prefs> click on the box that says "stealth mode".
what if you're already behind a NAT, using localized IP addressing and with only selective ports opened, do I still have to use my Macs built in firewall ?
next up: Nothing in Providence RI - that's for sure ! fukkas !

http://www.myspace.com/dubstepp0r

User avatar
moderator
Posts: 152
Joined: Wed Feb 15, 2006 5:46 pm

Post by moderator » Fri Sep 22, 2006 9:32 pm

Descent wrote:
Moderator wrote: if you run mac in 10.4 or higher, you HAVE to turn on your firewall. go to sys prefs>sharing>firewall>click start>find the "advanced" button on the bottom of the firewall prefs> click on the box that says "stealth mode".
what if you're already behind a NAT, using localized IP addressing and with only selective ports opened, do I still have to use my Macs built in firewall ?
Stealth mode is a huge leap forward for mac security.
Your nat should be blocking all UDP traffic so, your risks are far lower than your average person just plugged into a cat 5 modem. There's no harm in keeping your mac firewall going. Now that DSL bandwidth is so good, there's next to no noticable difference in speeds either. Stealth mode is particularily useful against phishing ports because it makes your mac undetectable. Meaning, a hacker would have no idea that you're on a mac or pc. Many times hackers tend to search out specific computer companies (Dell, HP, Toshiba) to exploit security holes. Stealth mode stops them for doing this. On the other hand , some top security corporate systems (Banking, Corporate LAN, etc) will immediately refuse your connection if you've got stealth mode on, because they use a kerberos system.
http://docs.info.apple.com/article.html ... h1242.html
Ok, enough. I sound like a consultant now. lol. You get the picture.

Moderator

j_j
Permanent Vacation
Posts: 1947
Joined: Sun Nov 20, 2005 12:20 pm

Post by j_j » Sat Sep 23, 2006 9:19 pm

^ brap...on it.

Locked

Who is online

Users browsing this forum: No registered users and 0 guests