All script kiddies must die!

Forgive me bretheren for it has been more than a week since my last wittering..

This is going to be one of those catching up posts, so bear with me: so a quick resume…


Thursday 22nd: Parents arrive for long weekend.

Friday
23rd: Parents pop off to my Nan’s in Derbyshire for day whilst I’m at work.
I pop into Oxford and buy DVDs of “2001: A Space Odyssey”
and “Galaxy Quest” from the 2 for 1 sale.

Saturday 24th: Do shopping, do DIY with my dad.

Sunday 25th: Do DIY.

Monday 26th: Do DIY and find out in the evening that our web server was hacked Sunday afternoon.

Tuesday 27th: Diagnose hacking incident & start rebuild of web server. Fight off some sort of gastric flu-y thing. Parents drove back to Cornwall.

Wednesday 28th: Continue web server rebuild. In the evening go out to pub with Katie, Sam et al.

Thursday 29th: Finish web server rebuild and add extra security.


OK, that’s the quick run-down. Now for some proper comments.

(1)
I Wish I’d discovered that /etc/init.d/sshd on the web server had been pointing
to the correct sshd binary.. it would have made life a whole lot easier.
Still, ALL SCRIPT KIDDIES MUST DIE. Sorry.. 🙂

(2) Last night at
the pub was fun. However, it seemed as far as Sam was concerned the BBQ hug
etc. never existed and she seemed somewhat remote and disinterested. C’est
la vie.

Anyway, that’s all that’s happened, for better or worse.

2 thoughts on “All script kiddies must die!

  1. (1) I Wish I’d discovered that /etc/init.d/sshd on the web server had been pointing to the correct sshd binary.. it would have made life a whole lot easier. Still, ALL SCRIPT KIDDIES MUST DIE. Sorry.. 🙂

    Wouldn’t it make more sense for all those irresponsible people who write the scripts and release code hacks to die? Rather than the kiddies who would be nowhere without them?

    • Well, yes and no. It depends upon the original reason the specific exploits were written. If they were originally proof of concept exploits which have then leaked into the script kiddie world then no.. If the scripts etc. have been developed with the express intent to break into other computers then yes.

      The problem it that there are very few purely white hat hackers out there, most are varying shades of grey through to black.

Leave a Reply to redtangent Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.