Search This Blog

Sunday, February 27, 2011

Domain Stealing Part 5

SOURCE and more info at: www.darknet.org.uk

Now launch your anonymous remailer or mailbomber.
-From: the domain admin (ADMINEMAIL@EXAMPLE.COM in this case).
-To: hostmaster@
networksolutions.com
-Subject: (do not enter any subject, leave the field blank!)
-Body: the template you created above.
-You are ready to go but before you send this email to InterNIC, remember to bomb ADMINEMAIL@EXAMPLE.COM with similar emails but different tracking numbers as we did in the first procedure.
-After sending 10-20 emails, send the above template to InterNIC.
-Continue bombing your 40 messages. Remember to generate 40-50 tracking numbers.
This is basically it.
-The domain would be transferred to freeservers or hypermart and then you could simply activate it from there on your own email address. Remember to use a fake email.

Nameservers and Handles:
Freeservers Technical Handle:
FS4394
Primary Nameserver:
NS3.FREESERVERS.COM
Primary Nameserver IP Address:
209.210.67.153
Secondary Nameserver:
NS4.FREESERVERS.COM
Secondary Nameserver IP
Address: 209.210.67.154

Hypermart Technical Handle:
DA3706-ORG
Primary Nameserver:
NS1.HYPERMART.NET
Primary Nameserver IP Address:
206.253.222.65
Secondary Nameserver:
NS2.HYPERMART.NET
Secondary Nameserver IP
Address: 206.253.222.66

_______________________________
_______________________________
Possible Fixes:
Enable the CRYPT-FW password mechanism. This should prevent anyone without this password from changing your domain information (see the Internic contact form for more information)

Originally By Lucifer Mirza aka Bufferman
– Updated by Darknet.


Part 1
Part 2
Part 3
Part 4
Part 5

SOURCE and more info at: www.darknet.org.uk

No comments: