Government Security?

A

Anonymous

Anybody know anything about this website: www.governmentsecurity.org? I
have been looking at their lo fi archive threads and it looks like a
virus/trojan/hacker forum.

Take a look at this:
# How To Trick Anti-virus Systems .... (69 replies)
http://www.governmentsecurity.org/forum/lofiversion/index.php?t5478.html

or the list:
http://www.governmentsecurity.org/forum/lofiversion/index.php?f40.html
Full Version: Exploit Articles
GovernmentSecurity.org > The Archives > Exploit Articles

1. Spaex Search Engine Input Validation (0 replies)
2. How To Trick Anti-virus Systems .... (69 replies)
3. A Lesson In Defacement (10 replies)
4. Dameware Mini Remote Control V3.73 Remote Exploit (156 replies)
5. Shopping Carts And Weak Security Explained By Fris (2 replies)
6. In Search Of A Password (14 replies)
7. Hacking Games (0 replies)
8. Quick Ftp Access Example (4 replies)
9. Cross-site Scripting (sort Of) Explained! (0 replies)
10. Information Gathering, Blind Penetration Test (21 replies)
11. Web Spoofing Demonstration (0 replies)
12. A Tutorial For Those Unable To Use Tftp (0 replies)
13. Hacking A Windows 2000 System Through Ipc$ (0 replies)
14. Hacking Webpages - Small Guide - Compiled By Tbf (0 replies)
15. Sql Injection Basic Tutorial (0 replies)
16. Hacking Multi-functional Printers (0 replies)
17. Netbios Hacking (1 replies)
18. Basic Jtr Tutorial (0 replies)
19. Steps To Deface A Webpage (about Defacers) (0 replies)
20. Breaking Windows 98 Passwords (0 replies)
21. Back Orifice 2000 Guide For Beginners (0 replies)
22. Hacking The Bios (0 replies)
23. Adminguidetocracking (0 replies)
24. Hacking Techniques: Issue #2 - Bouncing Attacks (0 replies)
25. Hacking Cgi - Security And Exploitation (0 replies)
26. Wireless Hacking Irc Log (0 replies)
27. Uploading Files To Sql Server (0 replies)
28. Hacking Database Servers (1 replies)
29. Hacking Kazaa (0 replies)
 
Y

Yddap

In
Anonymous said:
Anybody know anything about this website: www.governmentsecurity.org?
I have been looking at their lo fi archive threads and it looks like a
virus/trojan/hacker forum.

Take a look at this:
http://www.governmentsecurity.org/forum/lofiversion/index.php?t5478.html

or the list:
http://www.governmentsecurity.org/forum/lofiversion/index.php?f40.html
Full Version: Exploit Articles
GovernmentSecurity.org > The Archives > Exploit Articles

1. Spaex Search Engine Input Validation (0 replies)
2. How To Trick Anti-virus Systems .... (69 replies)
3. A Lesson In Defacement (10 replies)
4. Dameware Mini Remote Control V3.73 Remote Exploit (156 replies)
5. Shopping Carts And Weak Security Explained By Fris (2 replies)
6. In Search Of A Password (14 replies)
7. Hacking Games (0 replies)
8. Quick Ftp Access Example (4 replies)
9. Cross-site Scripting (sort Of) Explained! (0 replies)
10. Information Gathering, Blind Penetration Test (21 replies)
11. Web Spoofing Demonstration (0 replies)
12. A Tutorial For Those Unable To Use Tftp (0 replies)
13. Hacking A Windows 2000 System Through Ipc$ (0 replies)
14. Hacking Webpages - Small Guide - Compiled By Tbf (0 replies)
15. Sql Injection Basic Tutorial (0 replies)
16. Hacking Multi-functional Printers (0 replies)
17. Netbios Hacking (1 replies)
18. Basic Jtr Tutorial (0 replies)
19. Steps To Deface A Webpage (about Defacers) (0 replies)
20. Breaking Windows 98 Passwords (0 replies)
21. Back Orifice 2000 Guide For Beginners (0 replies)
22. Hacking The Bios (0 replies)
23. Adminguidetocracking (0 replies)
24. Hacking Techniques: Issue #2 - Bouncing Attacks (0 replies)
25. Hacking Cgi - Security And Exploitation (0 replies)
26. Wireless Hacking Irc Log (0 replies)
27. Uploading Files To Sql Server (0 replies)
28. Hacking Database Servers (1 replies)
29. Hacking Kazaa (0 replies)

1,192.168.2.1,1ms,None,----
2,10.18.64.1,47ms,None,----
3,62.31.176.1,58ms,gsr01-br.blueyonder.co.uk,----
4,172.18.4.65,10ms,None,----
5,194.117.136.134,26ms,None,----
6,195.66.224.98,24ms,linx.gw-backbone-a.lon.schlund.net,----
7,212.227.120.193,90ms,so-0010.gw-backbone-a.nyc.schlund.net,----
8,217.160.229.104,87ms,a0nycc2.gw-core-a.nyc.schlund.net,----
9,82.165.242.152,91ms,s109174046.onlinehome.us,----



11/23/04 16:51:59 whois (e-mail address removed)

whois -h whois.geektools.com 82.165.242.152 ...
GeekTools Whois Proxy v5.0.4 Ready.

Checking access for 82.37.43.94... ok.

Final results obtained from whois.ripe.net.

Results:
% This is the RIPE Whois tertiary server.
% The objects are in RPSL format.
%
% Rights restricted by copyright.
% See http://www.ripe.net/db/copyright.html

inetnum: 82.165.240.0 - 82.165.255.255
netname: SCHLUND-CUSTOMERS
descr: Schlund + Partner AG
descr: NCC#1999110113
country: DE
admin-c: UI-RIPE
tech-c: UI-RIPE
remarks: INFRA-AW
remarks: in case of abuse or spam, please mailto: (e-mail address removed)
rev-srv: nsa.schlund.de
rev-srv: nsa2.schlund.de
rev-srv: ns.ripe.net
status: ASSIGNED PA
mnt-by: SCHLUND-MNT
changed: (e-mail address removed) 20040705
source: RIPE

route: 82.165.224.0/19
descr: SCHLUND-PA-4 More Specific (New York)
origin: AS8560
notify: (e-mail address removed)
mnt-by: SCHLUND-MNT
changed: (e-mail address removed) 20040705
source: RIPE

role: Schlund NCC
address: Schlund + Partner AG
address: Brauerstrasse 48
address: D-76135 Karlsruhe
address: Germany
remarks: For abuse issues, please use only (e-mail address removed)
remarks: For NOC issues, please look at our AS 8560
phone: +49 721 91374 50
fax-no: +49 721 91374 20
e-mail: (e-mail address removed)
admin-c: SPNC-RIPE
tech-c: SPNC-RIPE
nic-hdl: UI-RIPE
notify: (e-mail address removed)
mnt-by: SCHLUND-MNT
changed: (e-mail address removed) 20040512
source: RIPE
 
O

Ovenpaa

Anybody know anything about this website: www.governmentsecurity.org? I
have been looking at their lo fi archive threads and it looks like a
virus/trojan/hacker forum.

Take a look at this:
http://www.governmentsecurity.org/forum/lofiversion/index.php?t5478.html

It is a nice reference site to see what is happening, it is well
established and informative albeit misguided on occasion

UPX is a standard packer and a bit of a give away signature for many types
of malware, from memory the authors did say at one point they were
dissapointed at it's use

Heh!
 
S

See signature below

Anybody know anything about this website: www.governmentsecurity.org? I
have been looking at their lo fi archive threads and it looks like a
virus/trojan/hacker forum.

Just remember, I bet all official US government (non-military) sites
end with .gov

You know what to do: shdb at slip dot net
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top