April 12, 2006

Online Terrorists Attack Blogger (Again)

Aaron is the victim of online terrorism...again. He's been put on a hit list at jihadi websites because of his over-the-top mocking of Mohammed. I'm soo jealous. Here's a screenshot of his website now. Good luck in getting it back up. Thanks to The National Institute of Truth for the tip.

aarons_hacked.jpg

Update: Egyptian Sandmonkey has a translation of the original message left by the infamous al3isnet crew the other day.

Posted by: Rusty at 07:08 AM | Comments (4) | Add Comment
Post contains 80 words, total size 1 kb.

1 Darn, I'm so jealous! *posts pic of the prophet mohammed spanking his monkey* That should do it!

Posted by: Princess Kimberley at April 12, 2006 09:32 AM (7b8BZ)

2 Mwahahahahahahaha. "install.php" hahahahahahahahahaha

Posted by: caltechgirl at April 12, 2006 11:49 AM (jOkK0)

3 Aaron: I'm subscribed to several of the software vulnerability tracking lists, and this was sent to one of them in March: Severity: Normal Title: WordPress: SQL injection vulnerability Date: March 04, 2006 Bugs: #121661 ID: 200603-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== WordPress is vulnerable to an SQL injection vulnerability. Background ========== WordPress is a PHP and MySQL based content management and publishing system. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-apps/wordpress = 2.0.1 Description =========== Patrik Karlsson reported that WordPress 1.5.2 makes use of an insufficiently filtered User Agent string in SQL queries related to comments posting. This vulnerability was already fixed in the 2.0-series of WordPress. Impact ====== An attacker could send a comment with a malicious User Agent parameter, resulting in SQL injection and potentially in the subversion of the WordPress database. This vulnerability wouldn't affect WordPress sites which do not allow comments or which require that comments go through a moderator. ......... I'm not sure if you had patched that or not, but Your sites current state, made me wonder if they did not inject a "DROP" statement, to delete your database.

Posted by: davec at April 12, 2006 09:02 PM (CcXvt)

4 I'm back.

Posted by: Aaron's cc: at April 18, 2006 06:00 AM (ov6Vw)

Hide Comments | Add Comment

Comments are disabled. Post is locked.
19kb generated in CPU 0.0235, elapsed 0.1456 seconds.
119 queries taking 0.1367 seconds, 253 records returned.
Powered by Minx 1.1.6c-pink.