mailing list archives
Re: How we caught an Identity Thief
From: Barrie Dempster <barrie () reboot-robot net>
Date: Mon, 20 Feb 2006 13:53:08 +0000
From the article linked:
1. The domain name
2. Who registered it
3. Who was serving DNS for it
4. The IP address of the web site
5. The Service Provider for the IP address
6. The OS of the host
7. The Web Server
8. Some general information about the application the site was using
Within hours we had collected all of the above information. It was my
recommendation to > the client that we contact the FBI at this point.
It took you "hours" to run nmap/dig/whois ?
Not a very good advertisement of your talents, which the post seemed to
be attempting. Even giving you the benefit of the doubt and assuming the
phishers employed basic obfuscation of the host (Which I would doubt as
usually it's someone else machine anyway) hours is a seriously long time
to run a few basic commands.
Barrie Dempster (zeedo) - Fortiter et Strenue
"He who hingeth aboot, geteth hee-haw" Victor - Still Game
sites: http://www.bsrf.org.uk - http://www.security-forums.com
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/