More details on how the hacker managed to break in VP candidate Sarah Palin emerged. The hacker who calls himself “rubico” posted on a blog on the methods he used to break into the account.

He says he used a loop hole in simple password reset module in Yahoo mail. He managed to answer the secret question which Palin used while registering at yahoo. Usually websites ask for pets name, fathers middle name etc. For a vice president candidate these details are available online at the click of the mouse.

The hacker managed to answer

  1. Sarah’s birthday by looking at Wikipedia
  2. Where she met her spouse. Took a while to answer but eventually ‘Wasilla High School’ allowed him him
  3. Zip code : Alaska had only two
  4. Alternative email address : Still unclear on how he managed to read the password reset link email
  5. Hacker reset the password to ‘popcorn’

Both account used Sarah Plain were hacked ([email protected] ; [email protected]) and now deleted.

20-year-old University of Tennessee student has been questioned in connection to the federal investigation of the break-in while the online community accuses Palin of using webmail services such as yahoo to do the official business.

Wikileaks has earlier published the screenshot of sarah’s email account and contacts and is available for download in zip format here

http://wikileaks.org/wiki/Sarah_Palin_Yahoo_account_2008

Sarah Palins email

Sarah Palin’s email

Sarah Palins Inbox

Sarah Palin’s Inbox

Explore More

Is your IP Leaking? Find out here

The first link shows your IP.http://www.whatismyip.com/This site will show more information like your town…http://www.geobytes.com/IpLocator.htm?GetLocationIf you pass this test your Proxys / Programs are doing their job…https://grc.com/x/ne.dll?bh0bkyd2 Privacy Check – checks

Its not just war; its cyber war! Israel and Gaza engaged in cyber war

News of cyber war fare is reported from the warzone! News bases sites, telecommunication etc are the initial targets on both sides. Israel and the Arab world are showing mastery

How to Detect a Hacker Attack?

How to Detect a Hacker Attack Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same