Friday 21 August 2009

NSW Nats caught namejacking in cyberspace. Labor not amused


ABC TV let the cat out of the bag last night and the NSW Nats are red faced and protesting that purchasing this domain name and setting it up with Melbourne Information Technologies Australia Pty Ltd was sooooo innocent - not namejacking the Premier at all, at all:

Whois Record

Domain Name: nathanrees.com.au
Registrar ID: Melbourne IT
Registrar Name: Melbourne I
Status: ok

Registrant: NATIONAL PARTY OF AUSTRALIA - NSW
Registrant ID: ABN 40538388169
Eligibility Type: Registered Business

Registrant Contact ID: 0322O988805
Registrant Contact Name: NATIONAL PARTY OF AUSTRALIA - NSW
Registrant Contact Email: Visit whois.ausregistry.com.au for Web based WhoIs

Tech Contact ID: 0323T988805
Tech Contact Name: Nathan Quigley
Tech Contact Email: Visit whois.ausregistry.com.au for Web based WhoIs

Name Server: rns1.melbourneit.com.au
Name Server IP: 203.27.227.123
Name Server: rns2.melbourneit.com.au
Name Server IP: 203.27.227.124

Update:

A Cameron Jackson of Rosebery, NSW has owned nathanrees.org since September 2008.
Ownership expires in September this year unless renewed.
The same person appears to own
nathanrees.net.au
While Privacy Protect hides registration details for nathanrees.com, nathanrees.net and nathanrees.info since September 2008 and is probably a domain name reseller.
It seems Nathan is a popular boy.

Thursday 20 August 2009

What do they say? No press is bad press - just spell the name right


The hard working North Coast Labor MP for Page Janelle Saffin found herself picked out for a rather truncated mention in a bible-quoting Canadian market opinion blog post courtesy of Joel Bowman, reporting from Taipei, Taiwan on 17 August 2009.

This post was apparently echoing seven other blogs or media reports, mostly from earlier in the year, which commented on the fact that $900 2008-09 tax refunds sent out as part of the Australian Government stimulus package also went to the estates of taxpayers who had died in or after the last financial year.

Apparently the general sentiment was; when it comes to tax refund money you're not supposed to take it with you no matter how hard you worked when alive.

Never mind, Janelle - at least they all spelt your name correctly!

A case of the biter bit, but few are chortling over AFP intelligence fiasco


I was watching ABC Four Corners last Monday when this little comment came up:
"ANDREW FOWLER: The site was called root-you.org, and for the last two weeks the Australian Federal Police in cooperation with the South Australian Police have run the perfect sting.
TIM DAVIS, FEDERAL AGENT, HIGH TECH CRIME OPS. AFP: We've infiltrated that site and so now we've got control as well.
NEIL GAUGHAN: What we've done with that particular network is we've captured all the identities of all the people that've been using that network. We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration.....
ANDREW FOWLER: In the case of root-you.org, the Federal Police decided the best result was to effectively blow up the site by posting a notice that it was under law enforcement control.
TIM DAVIS, FEDERAL AGENT: Mate are you right to post that message on the forum.
MAN (on phone): Yep.
TIM DAVIS, FEDERAL AGENT: Well if you can do that now that'd be great."

I did idly wonder if there would be a cyber response and thought - "Naw, won't happen".

Then it well and truly did and F-Secure has links to this not so funny episode of counter-hacking, which was the almost inevitable result of all that televised bragging by the boys in blue (this also saw police computer files of actual bank, building society and corporate credit card details exposed to the view of at least one other hacker).

Some of the hacker chatter {A little **** covers words which offend those bluidy filters}:
"After the authorities FINALLY posted their little "ohhh, we have been monitoring this website", we finally said "Enough is enough, we are sick of these f**ks acting like they are hackers, lets see what they really know".
So After writing another FTP report yesterday.. I decided I would move on to getting control of r00t-y0u.org. See what the authorities know about server maintenance.. and how secure they can make stuff.
Lo and behold, their server was windows! I couldn't stop laughing at the sight of this, but I soon moved on. After visiting a 404 page, I instantly noticed that they were using Xampp. Those lazy f***s
can not even just install apache, and php themselves. So instead, they download some application to do it all for them.
Figures.
Now, of course.. they were just SO F***KING SMART, that they left the MYSQL password BLANK! After screwing around with their database, I dumped a vulnerable query into a php file, thus giving me full access to their servers.
After taking a look at the r00t-y0u database, lookie what we find.
User: "h1t3m" (Administrator)
Email: macrobber@gmail.com
These dipsh*ts are using an automatic digital forensics and incident response tool.
They can't do sh*t all themselves, because like I have said before, they have no skill. Anyways, after looking on their win32 machine for a while, I noticed some really awkward stuff. They have credit cards, and bank accounts all on a seperate drive (G:\)."

Four Corners transcript

Pic from Google Images

Wednesday 19 August 2009

Obama and Newsmax online polling


There is a rather badly constructed Newsmax poll out there in cyberspace at the moment which is yielding these results concerning U.S. President Barack Obama:


Full 'Obama is the anti-christ' survey results here.