[AusNOG] Hacked site reports boy to police | theage.com.au

Keith Anderson keitha at apcs.com.au
Thu Jan 9 08:21:49 EST 2014


Indexing and .gov.au seem to be all over the place. 

http://education.qld.gov.au/corporate/hr/ap/

http://www.climatechangeinaustralia.gov.au/documents/resources/

the list just went on and on.



Keith Anderson
Managing Director | APCS / WIP
Australia Power Control Systems

C/o Coffs Harbour Media Centre
2 Peterson Road,
Coffs Harbour NSW 2450

T: 1300 3000 56 | F: 1300-765-427
E: keitha at apcs.com.au






On 08/01/2014, at 11:30 PM, Patrick Webster wrote:

> I hope for his sake it is quickly realised he is just trying to help them and that will be the end of it.
> 
> There was enough fuss about my FSS incident by changing a bloody number in a URL. Sounds like he went a little further than just changing a number.
> 
> I read it as SQL injection which is harder to brush off as a simple URL typo. The today tonight (?) video of him appears to show him playing around with a JSON interface. But that could just be for show. I hope it isn't as silly as +Indexes.
> 
> But regardless, police and Melbourne Transport or whatever they are called should look at intent, and intent alone.
> 
> All these accidental cracker stories are getting tiring. Why is there never a focus on how stupid of a mistake the corporation made? It is getting to the point where the layman is starting to understand there are good samaritans and they aren't to blame.
> 
> It is time law enforcement caught up with the Australian community acceptable standards.
> On 8 Jan 2014 23:20, "Tim March" <march.tim at gmail.com> wrote:
> 
> Anyone know what the actual "hack" was? A couple of links I found
> implied he "found an old database while browsing," which just sounds
> like they had +Indexes and Google found it.
> 
> FWIW I found a directory indexing issue in $GovAUAgency a couple of
> years back with db dumps, credentials, admin scripts, SSH keys, bash
> logs (lock, stock, the lot...) and tried to notify their infrastructure
> provider. It was a nightmare. I ended up talking Ralph
> Wiggum^H^H^H^H^H^H^H^H^H^H^Ha support punter through it on the phone...
> 
>         "open your browser... now go to Google... Now search for
> 'site:$GovAUAgency filetype:sql'"
> 
>         "What is it?"
> 
>         "Umm... Show that to your security punters"
> 
>         "My tummy feels funny *mouth breathing*"
> 
> 
> ... The site was like it for months afterwards.
> 
> TL;DR; If the kid was Google hacking, responsibly disclosed and they
> called the Fuzz that's pretty poor form.
> 
> 
> 
> T.
> 
> On 8/01/14 10:35 PM, Damian Guppy wrote:
> > Oh Good. Now watch as prosecutors press the courts to enhance the
> > charges so he can be tried as an adult and sentenced to more time behind
> > bars than the latest murder.
> >
> > --Damian
> >
> >
> > On Wed, Jan 8, 2014 at 7:28 PM, Patrick Webster <patrick at aushack.com
> > <mailto:patrick at aushack.com>> wrote:
> >
> >     http://m.theage.com.au/it-pro/security-it/hacked-site-reports-boy-to-police-20140108-hv7tl.html
> >
> >
> >     _______________________________________________
> >     AusNOG mailing list
> >     AusNOG at lists.ausnog.net <mailto:AusNOG at lists.ausnog.net>
> >     http://lists.ausnog.net/mailman/listinfo/ausnog
> >
> >
> >
> >
> > _______________________________________________
> > AusNOG mailing list
> > AusNOG at lists.ausnog.net
> > http://lists.ausnog.net/mailman/listinfo/ausnog
> >
> 
> --
> PGP/GNUPG Public Key: http://d3vnu11.com/pub.key
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140109/180a2fd4/attachment.html>


More information about the AusNOG mailing list