-
October 13th, 2005, 05:41 AM
#1
" The Brain " is watching you!
This screen shows that members of hackweiser include hackers using pseudonyms such as 'r4ncid', Hackah Jack', 'The Milk Man' and 'bighawk'.
The Brain also detects hackers appearing under multiple pseudonyms and tracks their relationships with one another - for example the above diagram shows 'phel0n' is connected to 'ch3wb4k4'. The Brain provides details of what those relationships involve as well as detailing all known activity by those individuals.
http://software.silicon.com/security...53189-2,00.htm
Photos: Tracking the hackers - Security Strategy - Breaking Business and Technology News at silicon.com
-
October 13th, 2005, 06:36 AM
#2
So, if im understanding this correctly, this proggy is used by, shall we say, the Feds, to track known hackers/groups/attacks done by those groups? How does it update its information? (ie..is data about known hackers/orgs/hacks intered manually into a database of sorts, or is it all done by the proggy itslef?) The site didnt have much info, other than the picture captions, so im just a little bit fuzzy on the details.
man...big bro really is watching hehee
-z3
-
October 13th, 2005, 08:39 AM
#3
So now I wonder... Where's Pinky? You got to have Pinky with the Brain...
-
October 13th, 2005, 09:03 AM
#4
CyberTrust's application known as 'The Brain' tracks and monitors the activity of hackers and hacker groups who are involved in everything from virus writing to around 3,000 website defacements each day.
Their strategy seems to be similar as that of 'HoneyNet Project's'.
www.honeynet.org
There too some systems configured as honeypots are used to track down the attacker. The system uses well defined Data Control, Data Capture and Data Analysis tools. some of these tools are provided by the project co-ordination team to the individual honenet participants.. but participating agencies may develop their own tools too.. Their participating agencies are primarily university research houses, govenment funded security agencies etc. The participating parties have to stick to some guidlines like complete disclosure of the tools used, data captured and log details.
Please view the following link:
http://www.leurrecom.org/week_20050723-20050730.htm
which provides the related information about tracking of attackers/ unauthorised hackers. The complete statistics gathered by these projects/initiatives will be helpful in analysing the attacker behaviour (their technical skills and vulnerability explotaition) and attack patterns, which may be helpful in developing more advanced security tools.
For a successful technology, reality must take precedence over public relations, for Nature cannot be fooled.
Lets make Poverty a History
http://www.makepovertyhistory.org/
-
October 13th, 2005, 03:04 PM
#5
If I am not mistaken, JP used to do this too.
AntiOnline has five full-time employees and 11 part-time employees working in flashy new offices in downtown Beaver, Pa. The company has transitioned itself from tracking and visiting hacker chat rooms to developing software that automates the process of monitoring Web sites.
http://news.com.com/2100-1017-242685.html?legacy=cnet
CNet::June, 2000
-
October 18th, 2005, 10:40 AM
#6
Member
Originally posted here by Katja
So now I wonder... Where's Pinky? You got to have Pinky with the Brain...
probably he wrote the code for the brain
but srlsy how do you manag to keep track of somthing that changes as much as hacker group names I mean I might deciede to chqnge my name every day or somthing how can you keep track of the relations there but then ... dunno if some on does please explain it to me . .
anything that doesn\'t kill you or your dreams only makes you stronger
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|