➠ When Scriptkiddies Attack
If you don't follow me on twitter (Why don't you follow me on twitter?

Within a couple of minutes of tweeting, I received the following email from someone with a name matching that of one of my followers.
Basically, he's mistaken my botnet tracker for me posting screenshots of my botnet on twitter (I guess there are probably people who do that???), and wants me to give him the code.
I was still in the process of updating the tracker, so I didn't notice the email until a follow-up was send 20 minutes later.
I particularly like this one for a couple reasons: If I wasn't such an upstanding citizen, I think my idea of being "blackhat for one second" would involve something a little more profitable and ambitious than giving out free malware to scriptkiddies (but I guess that's what blackhats do???) and the fact that he claims to have a remote RDP exploit and flash zeroday, but the best monetary amount he can offer is $50.
You can probably guess what the next email is if you're familiar with the popular phrase: "If at first you don't succeed, then result to blackmail".
I wasn't really sure if this was a troll or not, so I just replied with my standard canned response to such threats.
I also looked up his facebook page and went through the pictures, but due to some CIA grade redaction I doubt we'll ever know his real name.
Over the next hour I didn't notice anything in my access logs to suggest any attempt at hacking or DDoS, but I wasn't really looking hard as the site is behind cloudflare and I designed the backend in such a way that all user-input is canned to reduce the surface for web based attacks. Ofcourse if he somehow did managed to get into my server, there is no bot source or botnet for him to steal, so he's going to be very disappointed. Although there was no clear evidence of any attacks, I did however notice I'd been very busy sending myself emails.
Quite interestingly gmail doesn't mark spoofed emails from myself as spam, despite the fact that my email address uses DKIM and the spoofed emails were obviously not authenticated. Usually I'm very overzealous with writing regex rules for emails (sending me an email containing phrase such as "I await your reply", "first page of google" and "Mobile App Development" will result in instant deletion of said mail and all subsequent emails from that address), but in this case all the emails were grouped into a single thread so I could delete with one click, making it not really worth it to log in to the server and add a new rule.
The hosting service he was using to "bumb" me kept killing the flood due to failures, so my inbox was hardly being overwhelmed by the volume. After about an hour of the world's lamest email flood, it ceased and i received another few mails from our friendly neighborhood hacker.
![]() |
Damn it Paul, stop chmodding your directory to 777 |
As of writing this the deface page is still up, but that's not really a surprised seeming as it's not even an index page or in an actively used directory.
I was also able to find publicly accessible logs from a cookie stealer running on the same sub-domain and according to a discussion in one of my tweet threads, this could potentially be high risks as sub-domains have the ability to read certain cookies set using the parent domain, i.e .harvard.eu.
But wait! The fun didn't even stop there: before I went to bed I received a few more threats.
What is option 2? I must known! Also notice indexx.php as I assume index wasn't writable.
This is the point where he realized I'd been live tweeting the whole thing and decided to instead blackmail me into deleting my tweets (because obviously blackmailing me had gone well for him so far?).
I then received one final email before he gave up with the threats (or at least I assume he did).
Now as a not entirely incompetent webmaster, I instantly noticed that IP is not in any of my provider's IP ranges, so I decided to look it up.
lol, gg.
Zur Startseite
Kommentiere zu When Scriptkiddies Attack
➤ Ähnliche Beiträge für 'When Scriptkiddies Attack'
MHDDoS - DDoS Attack Script With 56 Methods
vom 405.05 Punkte
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods Please Don't Attack websites without the owners consent. Features And Methods Layer7 GET | GET Flood POST | POST Flood OVH | Bypass OVH RHEX | Random HEX STOMP | Bypass chk_captcha STRESS | Send HTTP Packet Wi
AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks
vom 371.3 Punkte
Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework.
CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks
vom 306.04 Punkte
SUMMARY
The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory (CSA) detailing activity and key findings from a recent CISA red team assessment—in coordination with the assessed organization—to provide network defenders re
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
vom 245.28 Punkte
A plea for network defenders and software manufacturers to fix common problems.
EXECUTIVE SUMMARY
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to h
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
vom 245.28 Punkte
A plea for network defenders and software manufacturers to fix common problems.
EXECUTIVE SUMMARY
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to h
Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475
vom 222.78 Punkte
SUMMARY
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Cyber National Mission Force (CNMF) identified the presence of indicators of compromise (IOCs) at an Aeronautical Sector organization as early
AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector
vom 216.03 Punkte
Original release date: March 24, 2022SummaryActions to Take Today to Protect Energy Sector Networks:
• Implement and ensure robust network segmentation between IT and ICS networks.
• Enforce MFA to authenticate to a system.
• Manage the creation
Scattered Spider
vom 216.03 Punkte
SUMMARY
The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) in response to recent activity by Scattered Spider threat actors against the commercia
AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware
vom 202.53 Punkte
Original release date: February 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This joint advisory is the result o
AA22-320A: Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester
vom 193.53 Punkte
Original release date: November 16, 2022SummaryFrom mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) ac
Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester
vom 193.53 Punkte
Summary
From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident
Crypton - Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms
vom 180.02 Punkte
Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated