text stringlengths 0 1.99k |
|---|
[1] http://pastebin.com/raw.php?i=cRYvK4jb |
[2] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI |
[3] http://www.aljazeera.com/news/2015/09/algerian-hacker-hero-hoodlum-150921083914167.html |
[4] https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf |
[5] http://madrid.cnt.es/noticia/consideraciones-sobre-el-ataque-informatico-a-gamma-group |
--[ 2 - Hacking Team ]---------------------------------------------------------- |
Hacking Team was a company that helped governments hack and spy on |
journalists, activists, political opposition, and other threats to their power |
[1][2][3][4][5][6][7][8][9][10][11]. And, occasionally, on actual criminals |
and terrorists [12]. Vincenzetti, the CEO, liked to end his emails with the |
fascist slogan "boia chi molla". It'd be more correct to say "boia chi vende |
RCS". They also claimed to have technology to solve the "problem" posed by Tor |
and the darknet [13]. But seeing as I'm still free, I have my doubts about |
its effectiveness. |
[1] http://www.animalpolitico.com/2015/07/el-gobierno-de-puebla-uso-el-software-de-hacking-team-para-espionaje-politico/ |
[2] http://www.prensa.com/politica/claves-entender-Hacking-Team-Panama_0_4251324994.html |
[3] http://www.24-horas.mx/ecuador-espio-con-hacking-team-a-opositor-carlos-figueroa/ |
[4] https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ |
[5] https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/ |
[6] https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/ |
[7] http://focusecuador.net/2015/07/08/hacking-team-rodas-paez-tiban-torres-son-espiados-en-ecuador/ |
[8] http://www.pri.org/stories/2015-07-08/these-ethiopian-journalists-exile-hacking-team-revelations-are-personal |
[9] https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |
[10] http://www.wired.com/2013/06/spy-tool-sold-to-governments/ |
[11] http://www.theregister.co.uk/2015/07/13/hacking_team_vietnam_apt/ |
[12] http://www.ilmessaggero.it/primopiano/cronaca/yara_bossetti_hacking_team-1588888.html |
[13] http://motherboard.vice.com/en_ca/read/hacking-team-founder-hey-fbi-we-can-help-you-crack-the-dark-web |
--[ 3 - Stay safe out there ]--------------------------------------------------- |
Unfortunately, our world is backwards. You get rich by doing bad things and go |
to jail for doing good. Fortunately, thanks to the hard work of people like |
the Tor project [1], you can avoid going to jail by taking a few simple |
precautions: |
1) Encrypt your hard disk [2] |
I guess when the police arrive to seize your computer, it means you've |
already made a lot of mistakes, but it's better to be safe. |
2) Use a virtual machine with all traffic routed through Tor |
This accomplishes two things. First, all your traffic is anonymized through |
Tor. Second, keeping your personal life and your hacking on separate |
computers helps you not to mix them by accident. |
You can use projects like Whonix [3], Tails [4], Qubes TorVM [5], or |
something custom [6]. Here's [7] a detailed comparison. |
3) (Optional) Don't connect directly to Tor |
Tor isn't a panacea. They can correlate the times you're connected to Tor |
with the times your hacker handle is active. Also, there have been |
successful attacks against Tor [8]. You can connect to Tor using other |
peoples' wifi. Wifislax [9] is a linux distro with a lot of tools for |
cracking wifi. Another option is to connect to a VPN or a bridge node [10] |
before Tor, but that's less secure because they can still correlate the |
hacker's activity with your house's internet activity (this was used as |
evidence against Jeremy Hammond [11]). |
The reality is that while Tor isn't perfect, it works quite well. When I |
was young and reckless, I did plenty of stuff without any protection (I'm |
referring to hacking) apart from Tor, that the police tried their hardest |
to investigate, and I've never had any problems. |
[1] https://www.torproject.org/ |
[2] https://info.securityinabox.org/es/chapter-4 |
[3] https://www.whonix.org/ |
[4] https://tails.boum.org/ |
[5] https://www.qubes-os.org/doc/privacy/torvm/ |
[6] https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy |
[7] https://www.whonix.org/wiki/Comparison_with_Others |
[8] https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack/ |
[9] http://www.wifislax.com/ |
[10] https://www.torproject.org/docs/bridges.html.en |
[11] http://www.documentcloud.org/documents/1342115-timeline-correlation-jeremy-hammond-and-anarchaos.html |
----[ 3.1 - Infrastructure ]---------------------------------------------------- |
I don't hack directly from Tor exit nodes. They're on blacklists, they're |
slow, and they can't receive connect-backs. Tor protects my anonymity while I |
connect to the infrastructure I use to hack, which consists of: |
1) Domain Names |
For C&C addresses, and for DNS tunnels for guaranteed egress. |
2) Stable Servers |
For use as C&C servers, to receive connect-back shells, to launch attacks, |
and to store the loot. |
3) Hacked Servers |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.