Jump to content

The Hack of the Year


Zeus_Hunt

Recommended Posts

A Swedish hacker tells how he infiltrated a global communications network used by scores of embassies over the world, using tools freely available on the internet.

In August, Swedish hacker Dan Egerstad gained access to sensitive embassy, NGO and corporate email accounts. Were they captured from the clutches of hackers? Or were they being used by spies? Patrick Gray investigates the most sensational hack of 2007.

IT WASN'T supposed to be this easy. Swedish hacker Dan Egerstad had infiltrated a global communications network carrying the often-sensitive emails of scores of embassies scattered throughout the world. It had taken him just minutes, using tools freely available for download on the internet.

danegerstad_narrowweb__300x378,0.jpg

He says he broke no laws.

In time, Egerstad gained access to 1000 high-value email accounts. He would later post 100 sets of sensitive email logins and passwords on the internet for criminals, spies or just curious teenagers to use to snoop on inter-governmental, NGO and high-value corporate email.

The question on everybody's lips was: how did he do it? The answer came more than a week later and was somewhat anti-climactic. The 22-year-old Swedish security consultant had merely installed free, open-source software - called Tor - on five computers in data centres around the globe and monitored it. Ironically, Tor is designed to prevent intelligence agencies, corporations and computer hackers from determining the virtual - and physical - location of the people who use it.

viewpo0.gif View : Original Article - Quite a lot of intersting things to read

Link to comment
Share on other sites


  • Replies 4
  • Views 2.2k
  • Created
  • Last Reply

nah, PG2 is a packet scanner/blocker, which is the same reason it's kinda useless to use with torrents. because your IP is freely available to the swarm beforehand any ways, kinda off topic tho...

Tor however can be thought of as a P2P based proxy system, where the users act as proxies for each other without the need of centralized servers etc (although it's not impossible for generous people to run it on their server) ;)

Link to comment
Share on other sites


edit. click on the link. a lot more information on it.

he should turn over the stuff to his government.

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...