Daniel Goodman / Business Insider
It was able to do this by interfering with these sites' domain name systems (DNS), altering high-level details about how people access these web pages.
It began in Australia at a company called Melbourne IT, which handles the New York Times' Web hosting. The SEA used phishing tactics (which usually means tricking someone to type in a password and capturing it as it's typed) in order to break in.
Once inside, the hackers knocked the Times offline by reassigning its DNS information. DNS is best understood as the phone book of the Internet ? when you type ?"newyorktimes.com" into your URL bar and press enter, DNS turns this into a query of the server at the appropriate IP address. It's much easier to remember "New York Times" than it is to remember "170.149.168.130," for example.
By severing the NYT's connection to DNS, the only way anyone could actually access the site was by typing in the IP address, and this is just not information people care to remember. Since everyone types out the DNS-enabled URL ? newyorktimes.com ? and because the hackers had total control of the DNS settings, they were able to reroute anyone attempting to access the site to a different web page of their own choosing.
In fact, some people who tried to access the Times' site yesterday were redirected to this image instead:
Screenshot
If this is the first time you've heard of the SEA, it isn't some brand-new organization. The group's been active since 2011 and hasn't been afraid to cause all kinds of big-time trouble since then. This is just the group's most recent display of its capabilities.
Source: http://www.businessinsider.com/syrian-electronic-army-hacks-2013-8
toure patti smith lottery winners lottery winners april fools day pranks ohio state vs kansas daniel von bargen
কোন মন্তব্য নেই:
একটি মন্তব্য পোস্ট করুন