Advertisement
Guest User

Untitled

a guest
Apr 9th, 2014
155
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.30 KB | None | 0 0
  1. [21:06] <Nitro> they dont know who/what/when/why etc they are just guessing
  2. [21:08] <Nitro> i reported a list of 15 ssl changes that they should have made and it fell on death ears
  3. [21:09] <Nitro> only kalish was allowed access to the website code
  4. [21:11] <Nitro> and they spent alot of money of ad revenue on servers and never spent a dime on security scans or PCI scans
  5. [21:11] <szejdi> i have no idea what it means
  6. [21:12] <Nitro> well lilpwny has no income revenue
  7. [21:12] <Nitro> and even it manages to get scanned daily by mcafee security scans for vulnerabilities with the website
  8. [21:13] <szejdi> so making it short
  9. [21:13] <szejdi> they're idiots?
  10. [21:14] <Nitro> making it short, they didn't take security serious
  11. [21:15] <Nitro> tbh i wouldnt be surprised if the hack was a simple password brute force
  12. [21:15] <Nitro> they were keen on using short passwords in the 6 character range.
  13. [21:20] <Nitro> raider was lashing out at the community focusing his angry issues in the wrong places as usual.
  14. [21:22] <Nitro> tbh the website cms was old too, and was needing a major upgrade anyways
  15. [21:23] <Nitro> the cms was also a heavily modified 5 year out of date ipboard forum software.
  16. [21:24] <Nitro> but we'll never know because they never got a third party company to run a PCI scan.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement