fbpx

Lulzsec- Lulz Security Wiki

Lulz security or Lulzsec was the famous hacker group that has been involved in the various high profile hacking attack, they are involve in hacktivism and have an affiliation with anonymous and AntiSec hacker groups. You have been heard a lot of news and views about Lulzsec in the websites and on the TV.
In this article I have decided to write something about Lulzsec, or you can say that this article will take a deepest look inside the Lulzsec profile. In this article I will try to analysis the group members the aim and try to get some information from there web server.

Official Website of Lulzsec

Ofiicial website of lulzsec was and is lulzsecurity.com, they have shared there released on that, let suppose we want to ping to the server.

On this ping I have used “www” than we can see that the ping has not provide real IP of the server because the server is protected by cloudflare.com. They are using some sort of DNS tricks so that if we ping with “www” we can get other result.




By looking at the two picture we can say that cloudflare has assigned two IP addresses (Fake) to lulzsecurity.com.
173.245.60.84:www.lulzsecurity.com
199.27.135.18:Www.lulzsecurity.com
Here is the more relevant information that I have got by using TheHarvester:
[‘www.lulzsecurity.com’, ‘.lulzsecurity.com’, ‘Www.lulzsecurity.com’, ‘…lulzsecurity.com’]
[+] Emails found:
————-
[+] Hosts found
———–
173.245.60.84:www.lulzsecurity.com
199.27.135.18:Www.lulzsecurity.com

LulzSec Members

By doing a little research and some Social engineering technique you can get the information about group members and affiliation for this type of information gathering twitter and facebook play an important role.
Lulzsec has six core members:
  • Sabu (Might be Leader)
  • Topiary (Media representative)
  • Kayla (DOS or DDOS expert)
  • T-flow (Coder,web developer, Scammer)
  • Avunit
  • Pwnsauce
How the Lulzsec master mind caught? Lulzsec is now no longer be active but they has released their last message called 50 days of Lulz.


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...