A while ago I wrote a post about having stumbled across a site on the uwnews domain that had been attacked. Yoshi reported the problem after determining it to be genuine and uwnews fixed the problem promptly. At the time, I took a snapshot of what the hacked site looked like and wanted to share it here for the curious.
UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Speaking of UW comps getting hacked, here’s a telnet connection to a UW computer that got brute forced recently. Apparently it was being rented out as online storage by a somewhat legit looking web service (psyBNC). I’ve blocked out the ip to protect the innocent. Just another reminder to use strong passwords, as even campus computers are constantly being attacked.
[oystr@maui ~]$ telnet 128.208.4.** 9000
Trying 128.208.4.**…
Connected to 128.208.4.25 (128.208.4.**).
Escape character is ‘^]’.
:Welcome!psyBNC@lam3rz.de NOTICE * :psyBNC2.3.2-7