Advertisement
Guest User

Backdoor On Lulzsecurity.com

a guest
Jul 19th, 2011
2,518
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.09 KB | None | 0 0
  1. I,known as @AnonBroadcast (on twitter),have discovered a suspected backdoor on Lulzsecurity.com server.
  2. That's during a penetration test i performed on their website (don't ask why).
  3. Just keep in mind it can be Lulzsec who putted it for mysterious reasons.
  4. The backdoor is .nsf which means Network File System.
  5.  
  6. "A Network File System is a way that allows a client system (such as an iMX51 running Ubuntu Linux) to access files over a network in a manner similar to how local storage is accessed. Sounds pretty neat. This means I can mount files and directories on a host Linux PC and access them on my client just if they were stored locally." (http://imxcommunity.org/)
  7.  
  8. the suspected Backdoor is located on that link : http://www.lulzsecurity.com/dba4.nsf
  9.  
  10. Keep in mind Lulzsec IP address is masked by CloudFlare but Jester claims to leak 2 IP addresses which the website is located on,on his blog.
  11.  
  12. 204.197.240.133
  13. 111.90.139.155
  14.  
  15. I gave the IP addresses so you can port scan or investigate possibilities of an intrusion yourselves or maybe profit of the backdoor ?
  16.  
  17. Have Fun
  18. Learn
  19. and PROFIT !
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement