Zeus_Hunt Posted November 14, 2007 Share Posted November 14, 2007 A Swedish hacker tells how he infiltrated a global communications network used by scores of embassies over the world, using tools freely available on the internet.In August, Swedish hacker Dan Egerstad gained access to sensitive embassy, NGO and corporate email accounts. Were they captured from the clutches of hackers? Or were they being used by spies? Patrick Gray investigates the most sensational hack of 2007.IT WASN'T supposed to be this easy. Swedish hacker Dan Egerstad had infiltrated a global communications network carrying the often-sensitive emails of scores of embassies scattered throughout the world. It had taken him just minutes, using tools freely available for download on the internet.He says he broke no laws.In time, Egerstad gained access to 1000 high-value email accounts. He would later post 100 sets of sensitive email logins and passwords on the internet for criminals, spies or just curious teenagers to use to snoop on inter-governmental, NGO and high-value corporate email.The question on everybody's lips was: how did he do it? The answer came more than a week later and was somewhat anti-climactic. The 22-year-old Swedish security consultant had merely installed free, open-source software - called Tor - on five computers in data centres around the globe and monitored it. Ironically, Tor is designed to prevent intelligence agencies, corporations and computer hackers from determining the virtual - and physical - location of the people who use it. View : Original Article - Quite a lot of intersting things to read Link to comment Share on other sites More sharing options...
LoKz Posted November 14, 2007 Share Posted November 14, 2007 Does Tor really work is it like PG2?... but anyways that is cool ;) Link to comment Share on other sites More sharing options...
nsane Posted November 14, 2007 Share Posted November 14, 2007 nah, PG2 is a packet scanner/blocker, which is the same reason it's kinda useless to use with torrents. because your IP is freely available to the swarm beforehand any ways, kinda off topic tho...Tor however can be thought of as a P2P based proxy system, where the users act as proxies for each other without the need of centralized servers etc (although it's not impossible for generous people to run it on their server) ;) Link to comment Share on other sites More sharing options...
myidisbb Posted November 15, 2007 Share Posted November 15, 2007 edit. click on the link. a lot more information on it.he should turn over the stuff to his government. Link to comment Share on other sites More sharing options...
LoKz Posted November 15, 2007 Share Posted November 15, 2007 thank you nsane ;) Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.