Lulzsec- Lulz Security Wiki

Lulz security or Lulzsec was the famous hacker group that has been involved in the various high profile hacking attack, they are involve in hacktivism and have an affiliation with anonymous and AntiSec hacker groups. You have been heard a lot of news and views about Lulzsec in the websites and on the TV.
In this article I have decided to write something about Lulzsec, or you can say that this article will take a deepest look inside the Lulzsec profile. In this article I will try to analysis the group members the aim and try to get some information from there web server.

Official Website of Lulzsec

Ofiicial website of lulzsec was and is lulzsecurity.com, they have shared there released on that, let suppose we want to ping to the server.

On this ping I have used “www” than we can see that the ping has not provide real IP of the server because the server is protected by cloudflare.com. They are using some sort of DNS tricks so that if we ping with “www” we can get other result.




By looking at the two picture we can say that cloudflare has assigned two IP addresses (Fake) to lulzsecurity.com.
173.245.60.84:www.lulzsecurity.com
199.27.135.18:Www.lulzsecurity.com
Here is the more relevant information that I have got by using TheHarvester:
[‘www.lulzsecurity.com’, ‘.lulzsecurity.com’, ‘Www.lulzsecurity.com’, ‘…lulzsecurity.com’]
[+] Emails found:
————-
[+] Hosts found
———–
173.245.60.84:www.lulzsecurity.com
199.27.135.18:Www.lulzsecurity.com

LulzSec Members

By doing a little research and some Social engineering technique you can get the information about group members and affiliation for this type of information gathering twitter and facebook play an important role.
Lulzsec has six core members:
  • Sabu (Might be Leader)
  • Topiary (Media representative)
  • Kayla (DOS or DDOS expert)
  • T-flow (Coder,web developer, Scammer)
  • Avunit
  • Pwnsauce
How the Lulzsec master mind caught? Lulzsec is now no longer be active but they has released their last message called 50 days of Lulz.


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...