Welcome, Guest. Please login or register.

Author Topic: Computer Social Experiment gone wrong MooBunny site Broken  (Read 12715 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline Piru

  • \' union select name,pwd--
  • Hero Member
  • *****
  • Join Date: Aug 2002
  • Posts: 6946
    • Show all replies
    • http://www.iki.fi/sintonen/
Re: Computer Social Experiment gone wrong MooBunny site Broken
« Reply #14 from previous page: July 14, 2012, 09:54:05 PM »
Quote from: dammy;700136
His was using a static IP last year. If it is him, his ISP should have logs showing him connecting to the proxy server(s) that was used in the recent attack on Moo during the recent attack.
No, that won't work. See https://www.torproject.org/about/overview.html.en#whyweneedtor

TL;DR: The ISP would only see that the user has connected to tor (and maybe not even that if the perpetrator knows how to use a bridge). The target site only sees someone coming from a TOR exit-node IP address. There is no direct way to connect these two. You could try to perform some time based analysis but that would require access to some very accurate packet logs, and that alone still would not be enough to legally tie the user to the tor activity.

One possibility would be to attempt to reveal the identity through some external application by luring the perpetrator to open some file while browsing with tor. This only works if the perpetrator is careless enough to mix normal and tor browsing.
« Last Edit: July 14, 2012, 10:03:00 PM by Piru »
 

Offline Piru

  • \' union select name,pwd--
  • Hero Member
  • *****
  • Join Date: Aug 2002
  • Posts: 6946
    • Show all replies
    • http://www.iki.fi/sintonen/
Re: Computer Social Experiment gone wrong MooBunny site Broken
« Reply #15 on: July 16, 2012, 01:42:09 AM »
The amiga section is back now (with posting). It is now using reCAPTCHA to filter out the automated spam.

http://moobunny.dreamhosters.com/cgi/mbmessage.pl/amiga/225541.shtml