Stop Microsoft

Miscellaneous => Intellectual Property & Law => Topic started by: voidmain on 22 September 2002, 19:42

Title: How RIAA was hacked...
Post by: voidmain on 22 September 2002, 19:42
http://www.theregus.com/content/6/26386.html (http://www.theregus.com/content/6/26386.html)

Too funny. Maybe they shouldn't have used IIS and had Kim Komando as their web master?
Title: How RIAA was hacked...
Post by: KernelPanic on 22 September 2002, 20:26
Ha, love it
Title: How RIAA was hacked...
Post by: Master of Reality on 22 September 2002, 20:51
i assume the robots.txt files only used on IIS???
I noticed recently someone tried t access robots.txt on my server, of course i dont have it.... maybe i should block them from my server.
Title: How RIAA was hacked...
Post by: lazygamer on 22 September 2002, 20:55
Wow! So it's script kiddies? Or skilled crackers who can only target vunerable sections of websites to beat security?
Title: How RIAA was hacked...
Post by: voidmain on 22 September 2002, 21:13
Neither. The web site administrator thoughtfully left the web based administration section of IIS open with no password. Duh!! And they still didn't figure it out until the intruders (if you can call them that) that was how they got in. Now it hardly took any brains to do what they did and they really didn't break into anything when you leave administrator access open to the world.
Title: How RIAA was hacked...
Post by: Master of Reality on 22 September 2002, 21:16
didnt all they have to do is type in www.thatsite.org/admin (http://www.thatsite.org/admin) or somethin?
Title: How RIAA was hacked...
Post by: voidmain on 22 September 2002, 21:17
Exactly... Microsoft makes it easy to rule your site with their extreme default security.  (http://smile.gif)