ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > Living Room

ALERT! FreewareBB shutting down. And with a warning from Marko?

<< < (5/6) > >>

tomos:
Impressive journey, Tao.

TaoPhoenix:
Impressive journey, Tao.
-tomos (January 09, 2015, 04:13 PM)
--- End quote ---

Thank you!

For completeness it would be interesting to confirm if all/most of the offers "do not complete", which would just make make the "hack facebook" a dumb "chocolate cake lure" just to run the downloader ads.

But wait! More news is developing! They have earned themselves a Set 4!

4a.
http://www.hackfacebookpass.net/
"Cloudflare Ok. Website offline"!?

(A variant of) Whois produces:
https://www.whois.net/
hackfacebookpass.net

Whois Server Version 2.0

Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

Domain Name: HACKFACEBOOKPASS.NET
Registrar: ENOM, INC.
Sponsoring Registrar IANA ID: 48
Whois Server: whois.enom.com
Referral URL: http://www.enom.com
Name Server: KARA.NS.CLOUDFLARE.COM
Name Server: NORM.NS.CLOUDFLARE.COM
Status: clientTransferProhibited
Updated Date: 10-dec-2014
Creation Date: 10-dec-2014
Expiration Date: 10-dec-2015

>>> Last update of whois database: Fri, 09 Jan 2015 22:30:46 GMT <<<

Which is like SEVEN MINUTES AGO. (Aka just now, limited only by my assembling this post!)

4b. So now I went back to the top to fill in a couple of gaps. (In particular I wanted to see how stupid the "hack" graphic script might have been.) Instead, FreewareBB is *down*!

This time the Whois looks a bit less helpful.

Whois Server Version 2.0

Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

Domain Name: FREEWAREBB.COM
Registrar: PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Name Server: NS1.SOFTLAYER.COM
Name Server: NS2.SOFTLAYER.COM
Status: ok
Updated Date: 31-dec-2014
Creation Date: 26-sep-2007
Expiration Date: 26-sep-2016

>>> Last update of whois database: Wed, 31 Dec 2014 13:12:42 GMT <<<

So the guy must have basically just yanked the servers from the web and is thinking about what to do next.

4c.
"Cloudflare/other 'claims there is no cached version available' (at wherever)", but since all this is happening at a good clip today, here is a Google Cache copy of that page.
http://webcache.googleusercontent.com/search?q=cache:Q6ibUwsE-QgJ:www.freewarebb.com/+freewarebb&cd=1&hl=en&ct=clnk&gl=us

4d.
Google Cached versions do apparently keep certain links "live". The "click here to hack" link has a starting address of:
http://www.freewarebb.com/how_strong_is_my_password.html

That apparently also used to go to a (legit?) password security informational service, and they re-wrote that link as well to be the "hack script" link. Looking at Google Cache produces this older content that used to be there. (The new one from today is of course down with everything else when they yanked it.)
http://webcache.googleusercontent.com/search?q=cache:99goWIfzPgUJ:www.freewarebb.com/how_strong_is_my_password.html+http://www.freewarebb.com/how_strong_is_my_password.html&cd=1&hl=en&ct=clnk&gl=us

4e.
Just one of the previous DC threads on this, exactly two years ago in Jan 2013.
https://www.donationcoder.com/forum/index.php?topic=33786.10

4f.
It looks like the former owner was involved and helping!
https://www.facebook.com/freewarebb
"Freewarebb
2 hrs (ago)

Looks like it's 1-0 to me "

I wonder if he was clever enough to put any post-sale clauses in his sales contract, whereupon "using the site for a crime" might have invalidated the sale. Those "Windows Drivers" are "weasel-able", but "click here to break a Facebook password" is a whole other animal! Especially since (again, that facepalm-which brand of stupid was he), his *other* example of who to hack was ... wait for it ... Mark Zuckerberg!! So, maybe the RIAA is lazy, and Ms. Minogue didn't yet get a call from Joe at the police, but you better bet Mark Z's Friendly Borg Henchman Hugh (remember, the nice Borg? Mark Z gave him a nice new job to work on content!   :)  ), who reported that a formerly rather obscure but honest site was now showcasing cheap Hack Facebook scripts... Mark Z though his chain of command said "Oh. That's bad news to hear about them. Boss? How would you like me to destroy this guy? Should I press the blue button with yellow spots, the turquoise button with green stripes, or just dump a tractor trailer of free pizzas in his yard and organize a Teenage Mutant Ninja Turtle costume party?"

I jest, gentle spoofing and all that. But it would be cool if Facebook occasionally lent a hand to help a little guy when someone is dumb enough to say "Hey look! A Hornet's nest! Maybe it's a pinyata and if I hit it hard enough with a bat, I can get candy!"

So ends Chapter 1, for now!!

Let's see what happens next! I expect a couple days of smoke and Like-able hornets to be involved for a few days!

SeraphimLabs:
I see you learned a few things about how websites work Tao.  Lot of people don't realize just how much info you can pick out of someone's web setup just by poking around at information that is already public in order to make everything run smoothly.

There's a good chance that the hack site went down because supporters of the original site are upset about what happened and either attacked it directly to try and kill it, or because you literally saw the transition taking place and they didn't do it right- it resulted in a period where the DNS was pointed to an IP that no longer had a server under it.

This whole situation is downright sad, and just a solid reminder that there are some really bad people out there.

TaoPhoenix:
I see you learned a few things about how websites work Tao.  Lot of people don't realize just how much info you can pick out of someone's web setup just by poking around at information that is already public in order to make everything run smoothly.

There's a good chance that the hack site went down because supporters of the original site are upset about what happened and either attacked it directly to try and kill it, or because you literally saw the transition taking place and they didn't do it right- it resulted in a period where the DNS was pointed to an IP that no longer had a server under it.

This whole situation is downright sad, and just a solid reminder that there are some really bad people out there.
-SeraphimLabs (January 09, 2015, 06:22 PM)
--- End quote ---

... or some combo of all that. I still think it would be cool if Facebook helped and said so in a press release.

I learned a couple of things, but a good chunk of it I already knew, but wanted to try to just do some legwork and save people some time just to see where it was all going. I haven't seen that particular "scam engine" before, so that was educational.

"Something" is back up "and will launch soon", but I would still like that TV-Episode "closing monologue" to finish out the story.



TaoPhoenix:
Well, it's back up. So my notes stand mostly as is.

Someone wanna check and report in on the "hack page"?

To me it looks indeed like it might just be silly graphics going all "whee whizzy!"
There's a few other things there, but it looks pretty light for a high powered hack engine.
--------

<link href="_layout/style.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery-1.7.1.min.js"></script>
<script language="javascript" type="text/javascript">
<!--
var total = 31;
var iteration = 0;
var attempt = 0;
function showProgress()
{
   var url = document.location + '?ajaxRequest=true&total=' + total.toString() +
      '&iteration=' + iteration.toString() + '&attempt=' + attempt.toString();
   $.ajax({
      url: url,
      cache: false,
      dataType: "json",
      success: function(data)
      {
         updateProgress(data);
      }
   });
}

function updateProgress(data)
{
   attempt = data.attempt;
   $('#progressBar').width(data.percentComplete);
   $('#information').html(data.information);
   iteration++;
   if( iteration <= total )
   {
      timeOut = setTimeout(showProgress, 1000);
      updateCombinations();
   }
   else
   {
      $('#status').html('Status: <font color="green"><strong>Complete!<strong></font>');
      $('#unlockcode').show();
   }
}

function updateCombinations()
{
   if( iteration <= total )
   {
      $('#attempt').html(attempt++);
      counter = setTimeout(updateCombinations, 1);
   }
}

function validateAuthCode()
{
   var url = document.location + '?validateAuthCode=' + $('#authCode').val();
   $.ajax({
      url: url,
      cache: false,
      success: function(data)
      {
         alert(data);
      }
   });
}
-->
</script>

---------------

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version