More details on how the hacker managed to break in VP candidate Sarah Palin emerged. The hacker who calls himself “rubico” posted on a blog on the methods he used to break into the account.

He says he used a loop hole in simple password reset module in Yahoo mail. He managed to answer the secret question which Palin used while registering at yahoo. Usually websites ask for pets name, fathers middle name etc. For a vice president candidate these details are available online at the click of the mouse.

The hacker managed to answer

  1. Sarah’s birthday by looking at Wikipedia
  2. Where she met her spouse. Took a while to answer but eventually ‘Wasilla High School’ allowed him him
  3. Zip code : Alaska had only two
  4. Alternative email address : Still unclear on how he managed to read the password reset link email
  5. Hacker reset the password to ‘popcorn’

Both account used Sarah Plain were hacked ([email protected] ; [email protected]) and now deleted.

20-year-old University of Tennessee student has been questioned in connection to the federal investigation of the break-in while the online community accuses Palin of using webmail services such as yahoo to do the official business.

Wikileaks has earlier published the screenshot of sarah’s email account and contacts and is available for download in zip format here

http://wikileaks.org/wiki/Sarah_Palin_Yahoo_account_2008

Sarah Palins email

Sarah Palin’s email

Sarah Palins Inbox

Sarah Palin’s Inbox

Explore More

How to prevent SQL Injection

SQL Injection: What It Is There was once a famous doctor that had it completely right: never trust your patients. Now this doctor may have only been a sitcom doctor

What are the components of a security evaluation?

Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure

Hacking Your Computer – Physical Access is Total Access

Hacking Your Computer – Physical Access is Total Access Table of Contents -Disclaimer -Introduction Part 1: Gaining Access -LiveCDs -Windows Option 1: Cracking the Password -Windows Option 2: Circumventing the