Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I,known as @AnonBroadcast (on twitter),have discovered a suspected backdoor on Lulzsecurity.com server.
- That's during a penetration test i performed on their website (don't ask why).
- Just keep in mind it can be Lulzsec who putted it for mysterious reasons.
- The backdoor is .nsf which means Network File System.
- "A Network File System is a way that allows a client system (such as an iMX51 running Ubuntu Linux) to access files over a network in a manner similar to how local storage is accessed. Sounds pretty neat. This means I can mount files and directories on a host Linux PC and access them on my client just if they were stored locally." (http://imxcommunity.org/)
- the suspected Backdoor is located on that link : http://www.lulzsecurity.com/dba4.nsf
- Keep in mind Lulzsec IP address is masked by CloudFlare but Jester claims to leak 2 IP addresses which the website is located on,on his blog.
- 204.197.240.133
- 111.90.139.155
- I gave the IP addresses so you can port scan or investigate possibilities of an intrusion yourselves or maybe profit of the backdoor ?
- Have Fun
- Learn
- and PROFIT !
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement