Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Reverse engineering a fake Tor browser bundle (dustri.org)
89 points by lelf on Aug 13, 2014 | hide | past | favorite | 11 comments


> She/he told me that they are a small group (maybe from China) trying to catch pedophiles;

If they indeed are from china, I'd say it's just as likely they're trying to catch people who evade the censorship or press rules.


DNS servers for the domain are ns1.ipchina163.com and ns2.ipchina163.com, but these as well as the site itself appear to be in Malaysia.


>silkroad6cebts64.onion

Maybe the are the hacker version of Omar from The Wire.


It's all in the game


Link is a 404, here's the correct one:

http://dustri.org/b/torbundlebrowserorg.html


http://cuckoosandbox.org/ looks interesting, as does the way of detecting it.


> Their server is a stack of outdated crap, proudly powered by cPanel, feel free to root them for more details.

Hmm. Two wrongs make a right?


Well, I didn't read the part where OP stated that he was doing a right...


The server is running outdated services, and is powered by cPanel.

What is wrong?


More info on the source of this is a good thing, IMHO


yeah better than implementing tcp stack in python :D




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: