- Joined
- Aug 17, 2018
They have to fly in a security expert from Bangladesh to fix their security problems.That's exactly it. In my experience, a website that's down this long simply doesn't come back up
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
They have to fly in a security expert from Bangladesh to fix their security problems.That's exactly it. In my experience, a website that's down this long simply doesn't come back up
Pajeet++ has already visited, got confused, and defaulted to scamming as a Microsoft representative. Expect delays while he keeps nervously typing mscfg into the bash shell.They have to fly in a security expert from Bangladesh to fix their security problems.
How many iTunes cards has Ralph paid them so far?Pajeet++ has already visited, got confused, and defaulted to scamming as a Microsoft representative. Expect delays while he keeps nervously typing mscfg into the bash shell.
However much doesn't trigger Target or Walmat shift managers to look at a purchase. The Ralphamale needs the same social considerations and protections as your 90 year old grandmother.How many iTunes cards has Ralph paid them so far?
Hmm, about paypigs.Why would he ever do that? I can't think of a reason he would ever consider it. He cancelled a week of shows in the most beta cuck way possible during this past Lost Wages trip. Did any paypigs challenge him? Paypigs are some of the most contemptible faggots alive today. They will not only blindly follow whatever exceptional individual validates their worldview, but they will pay for the privilege of getting scammed.
It's probably going to become a hobby of antifag "hacktivists" just to fuck this site up the ass every few days for shits and giggles. And probably some others who don't even have an ideological reason, they just see a wide open goatse.What makes me laugh, the Pajeets want to put Ralph on a "more secure setting", yet how is this different to just straight up admitting that they are continuing to leave their other customers vulnerable?
It's like an NYC restaurant with a "Closed for Remodeling" sign. That shit isn't going to be open ever again.That's exactly it. In my experience, a website that's down this long simply doesn't come back up.
It already is just a hobby for some from what I can tell - not that I am an expert.It's probably going to become a hobby of antifag "hacktivists" just to fuck this site up the ass every few days for shits and giggles. And probably some others who don't even have an ideological reason, they just see a wide open goatse.
That's pretty clearly fraud at this point. They're definitely on notice at this point that their shitty servers are basically goatseated beyond belief and still selling it as "secure." It isn't. There are probably Windows 98 boxes still in existence more secure than this bullshit.I do find it shocking though, if I was pulling in the kind of money Secure Server was - while touting security as my brand - I would have at least outsourced this to someone competent.
You are probably correct, again I am no expert but Windows 98 is a known system with known flaws but equally these flaws have been identified and patched over time. In addition to this, older hardware is probably difficult to compromise just due to it not being commonplace anymore - if there are further exploits that are not patched is anyone really putting effort into finding them now?That's pretty clearly fraud at this point. They're definitely on notice at this point that their shitty servers are basically goatseated beyond belief and still selling it as "secure." It isn't. There are probably Windows 98 boxes still in existence more secure than this bullshit.
Hard agree.My bet is this site, a literal ISP that is a lolcow, gets hacked a few more times until something really big, then disappears along with its scamming pajeet owners.
How old is this retard? In his mid-30s or something? I have actually known 80 year old grandmothers with a better grasp of the Internet. How is he an utter boomer in his 30s?However much doesn't trigger Target or Walmat shift managers to look at a purchase. The Ralphamale needs the same social considerations and protections as your 90 year old grandmother.
>TheyThey have to fly in a security expert from Bangladesh to fix their security problems.r
I do find it shocking though, if I was pulling in the kind of money Secure Server was - while touting security as my brand - I would have at least outsourced this to someone competent.
See, I'm not shocked at all that a site that caters to qboomers and has the opportunity to type "Ethan Ralph Killstream" into Google before taking on killstream hosting duties is run by incompetent dipshits. They don't have to be good at their jobs, they just have to be the platform of last resortMy bet is this site, a literal ISP that is a lolcow, gets hacked a few more times until something really big, then disappears along with its scamming pajeet owners.
After the team's recent payment infrastructure upgrade, Ralph had to send $5,000 wrapped in copious layers of aluminium foil to Tyrone's AirBnB via FedEx NextDay(tm) delivery service for an updated server.How many iTunes cards has Ralph paid them so far?
Interesting. Secureserver.tv still has a whois entry, but an nslookup returns "no authoritative answer/can't find secureserver.tv" when querying the dns server I connect to, and the page (and all subpages such as /killstream) doesn't even get far enough in the internet to load an error message like 404. Tried again on a web service and got 0 global secureserver.tv results. Killstream.tv still works, but still points at nothing
Just a dns hiccup? For a company enduring months of embarrassing web intrusions? I wouldn't presume to speculate on matters like that
Chances of killstream.tv coming back up this week, fellow ayyylawwwgs?
$ nmap --open secureserver.tv
Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-02 16:39 MDT
Nmap scan report for secureserver.tv (107.180.105.10)
Host is up (0.11s latency).
rDNS record for 107.180.105.10: ip-107-180-105-10.ip.secureserver.net
Not shown: 948 closed ports, 39 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
Nmap done: 1 IP address (1 host up) scanned in 3.09 seconds
Can you explain in simple terms why this is so fucked, just imagine I'm a neanderthal... Wait no, imagine I'm Ralph.View attachment 2682317
Fucking lol. This is supposed to be a serious business with actual clients paying hundreds of dollars a month and they can't even put up a basic HTML "Under Maintenance" page? And directory listings turned on exposing the cgi-bin directory too. /cgi-bin returns a 403 Forbidden error, but it shouldn't even be visible in the first place. Who knows what other holes are.
$ nmap --open secureserver.tv Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-02 16:39 MDT Nmap scan report for secureserver.tv (107.180.105.10) Host is up (0.11s latency). rDNS record for 107.180.105.10: ip-107-180-105-10.ip.secureserver.net Not shown: 948 closed ports, 39 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 111/tcp open rpcbind 143/tcp open imap 443/tcp open https 465/tcp open smtps 587/tcp open submission 993/tcp open imaps 995/tcp open pop3s 3306/tcp open mysql Nmap done: 1 IP address (1 host up) scanned in 3.09 seconds
MySQL and SSH ports still show open as well. If the admin responsible for this host worked for me he would be fired so fucking fast.
I really, really like the part of the screenshot that showsView attachment 2682317
Fucking lol. This is supposed to be a serious business with actual clients paying hundreds of dollars a month and they can't even put up a basic HTML "Under Maintenance" page? And directory listings turned on exposing the cgi-bin directory too. /cgi-bin returns a 403 Forbidden error, but it shouldn't even be visible in the first place. Who knows what other holes are.
$ nmap --open secureserver.tv Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-02 16:39 MDT Nmap scan report for secureserver.tv (107.180.105.10) Host is up (0.11s latency). rDNS record for 107.180.105.10: ip-107-180-105-10.ip.secureserver.net Not shown: 948 closed ports, 39 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 111/tcp open rpcbind 143/tcp open imap 443/tcp open https 465/tcp open smtps 587/tcp open submission 993/tcp open imaps 995/tcp open pop3s 3306/tcp open mysql Nmap done: 1 IP address (1 host up) scanned in 3.09 seconds
MySQL and SSH ports still show open as well. If the admin responsible for this host worked for me he would be fired so fucking fast.
I really, really like the part of the screenshot that shows
"Not secure", " secureserver.tv"
Ps. My nmap returns nothing. Try to flush your dns cache and see if you can still reach sstv by name




Those services are available to anyone, anywhere, with a computer and PuTTy.Can you explain in simple terms why this is so fucked, just imagine I'm a neanderthal... Wait no, imagine I'm Ralph.
I think @Mr E. Grifter is looking for something a little more layman's terms, as useful as this isThose services are available to anyone, anywhere, with a computer and PuTTy.
So if someone were to look deeper, they could pull a version number and look for any vulnerabilities applicable, or if they were to get REALLY froggy, try to get some creds via OSINT or just brute-forcing (which would probably work considering what we know so far).
Ideally, you want critical services, such as SSH/SQL/(Also, that DNS-53 is TCP, not UDP, so uhh could be bad if someone got access to that) to be accessible to admins via specific connections and not completely fucking open.
Edit: At least they aren't using Telnet