Anonymous SriLanka Skids – Exposed Part 1

There are so many Anons, and LULZ now on Twitter, from Anon NyanCats, to LULZ Rats. Sometimes I wonder whether all these Anons know the real reason why Anonymous guys are fighting for. They just use the Anon badge to get famous and kill Anonymous rep points.

One of these n00bs who have recently used Anon badge to become famous is the AnonymousSriLanka. Which they call themselves as the Sri Lankan branch of Anonymous. Who are no more than script kids, which their releases are no more than bunch of IP addresses and DNS data. However it seems like the Anonymous Sri Lanka are not Anonymous anymore. Let the LULZ begin.

http://twitter.com/AnonymousLK/status/107080605954617344

These Anonymous Sri Lanka guys are telling they deal with only layer 4 to layer 6 hacking and are doing DNS cache poisoning. I think they don’t even know the meaning of DNS cache poisoning.

DNS cache poisoning is a method through which hackers are able to insert malicious and fake records into the cache of DNS servers. As a result, the hackers can then spoof a response to a DNS query, forcing users to go to a phony Web site instead of the real one.

DNS cache poisoning is not just dumping IP addresses and DNS information.

And this is not even hacking. They are using a perl script called fierce programmed by RSnake who programmed the SlowLoris DOS program. Anyone can get the perl script and use it to get DNS information like these n00bs.

http://ha.ckers.org/fierce/

Because this is not a hacking tool they’ve not been able to poison any of these servers. Spokesman of Symantec has told that they are unaffected and detected no suspicious activities of their servers.

Symantec is one of the most visible targets in the world for cyber attacks on a daily basis. We do not delineate the identity of individuals or organizations who may or may not be the source of said attacks. We monitor our networks closely on a 24/7 basis and have not detected any inordinate or suspicious rates of traffic or activity. To date, we have found no evidence that any of our business critical servers have been breached or that any information on our networks belonging to Symantec or our customers has been exposed. We take these scenarios very seriously and will continue to monitor the situation closely to ensure that there are no further attempts to compromise the system and to ensure that any customer information remains protected.

Poor script kids 😀 I don’t know why people like CNET and Cyber War News are posting about these good for nothing DNS dumps.

Wanna know more? Well a friend of mine has run through some of these DNS dumps by Anonymous Sri Lanka and found a paste which they forgot to cover their tracks. LOL 😀 Post about that  soon. Cya

1 thought on “Anonymous SriLanka Skids – Exposed Part 1

  1. Message to the worthless trash who call themselves Anonymous SriLanka

    Hey Retards,

    Seriously dudes, do you even know what a DNS server is, let alone DNS cache snooping/poisoning? Bandying about terms will not get you respect, only contempt by those who actually possess some talent.

    You do all the hacking/ego-satisfying child’s play you want, just keep Sri Lanka out of it. Don’t insult our motherland through your mediocrity.

    I intend to waste no more time lecturing those who have no more than the average vegetable’s level of intelligence.

Leave a comment