Lulz security or Lulzsec was the famous hacker group that has been involved in the various high profile hacking attack, they are involve in hacktivism and have an affiliation with anonymous and AntiSec hacker groups. You have been heard a lot of news and views about Lulzsec in the websites and on the TV.
In this article I have decided to write something about Lulzsec, or you can say that this article will take a deepest look inside the Lulzsec profile. In this article I will try to analysis the group members the aim and try to get some information from there web server.
Official Website of Lulzsec
Ofiicial website of lulzsec was and is lulzsecurity.com, they have shared there released on that, let suppose we want to ping to the server.
On this ping I have used “www” than we can see that the ping has not provide real IP of the server because the server is protected by cloudflare.com. They are using some sort of DNS tricks so that if we ping with “www” we can get other result.
By looking at the two picture we can say that cloudflare has assigned two IP addresses (Fake) to lulzsecurity.com.
Here is the more relevant information that I have got by using TheHarvester:
[‘www.lulzsecurity.com’, ‘.lulzsecurity.com’, ‘Www.lulzsecurity.com’, ‘…lulzsecurity.com’]
[+] Emails found:
[+] Hosts found
By doing a little research and some Social engineering technique you can get the information about group members and affiliation for this type of information gathering twitter and facebook play an important role.
Lulzsec has six core members:
Kayla (DOS or DDOS expert)
T-flow (Coder,web developer, Scammer)
Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription or become our Facebook fan! You will get all the latest updates at both the places.