The comes a time in every conflict that you was treat your wounded and mourn your dead. Well today there is one casualty and it isn't Doc.
At 1422 CDT, Doc noticed a ice attack from Germany referred to as "spytechphone" believe to be from Back Track 5 SP1 emulating from Hetzner Online AG. This is a snoop device. After blocking it from the ASA he noticed that it was still acknowledging the IP. Doc immediately added icmp/8 and after twenty minutes the site was still receiving an [ACK] from the system. Doc then added xchat to the mix. That too did not stop the IP sniff. Doc then pulled up the Windows Command Prompt and typed: ping 188.40.125.5 -t -l 32000 on six different Command Prompts for 40 minutes before the attack stopped. Doc held it for another half hour until he saw that the IP had stopped.
This came in response to Doc and staff whom has been seeding documents secreted from both Level Three and AKAMAI. The documents were seeded to UK API sources which included video statements from the employees whom sold the documents to two Attorneys representing Doc's organization.
The sniffer found in the most advanced security software has the ability to detail messages and fingerprint OS's even through firewalls.
No comments:
Post a Comment