-
Notifications
You must be signed in to change notification settings - Fork 20
/
dd01.html
174 lines (112 loc) · 10 KB
/
dd01.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
<!--
=============================
_ ______ ____ ______
/ | / / __ \/ __ \/ ____/
/ |/ / / / / / / / __/
/ /| / /_/ / /_/ / /___
/_/ |_/\____/_____/_____/
=============================
-->
<!DOCTYPE html>
<html>
<head>
<title>N O D E</title>
<meta name="google-site-verification" content="KAh0wcTC2Anz5ea6Kq26RuhsiUKx5FD3D4HZAJdfaf4" />
<link rel="shortcut icon" href="images/avatar.png">
<link rel="alternate" href="https://n-o-d-e.net/rss/rss.xml" type="application/rss+xml" title="N O D E"/>
<link href='https://fonts.googleapis.com/css?family=Share+Tech+Mono' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="css/style.css" media="screen">
</head>
<body>
<div id="page">
<div id="content">
<!--HEADER SECTION -->
<div id="header"><pre>
<a class="node" href="http://n-o-d-e.net">
×× ×× ××××× ×××××× ××××××
××× ×× ×× ×× ×× ×× ××
×× × ×× ×× ×× ×× ×× ×××××
×× ××× ×× ×× ×× ×× ××
×× ×× ××××× ×××××× ××××××</a>
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------</pre>
</div>
<!--CONTENT -->
<div id="list">
<div class="title">
DEAD DROP 01 / USB ETHERNET HACK, RAMBLER BREACH, KALI, AIRGAP ATTACK<br>
--
</div>
<div id="post">
<p>Welcome to Dead Drop number 1, a new series all about what's happening in the worlds of computer security and internet freedom. </p>
<p>There's so much going on, so many data breaches, new exploits found, and attempts to curb digital freedoms, that I think it might be useful to make a short round up of all these happenings.</p>
<p>OK, let's get on with it. All source links mentioned are below.</p>
<div class="videowrapper">
<iframe src="https://www.youtube.com/embed/EmX_tic8D8o?rel=0&showinfo=0" frameborder="0"></iframe>
</div>
<p class="description">
- <a href="https://www.youtube.com/watch?v=EmX_tic8D8o" target="_blank">Youtube link</a><br>
- <a href="https://archive.org/download/deaddrop01/dd01.mp4" target="_blank">Archive.org mirror</a><br>
- <a href="https://archive.org/download/deaddrop01/deaddrop01_archive.torrent" target="_blank">Torrent</a><br>
- <a href="https://keybase.pub/nodefiles/dd01.mp4" target="_blank">Keybase mirror</a>
</p>
<p class="subtitle">BREACHES</p>
<p>Nearly 800,000 account details were recently stolen from the forum of porn site Brazzers. This was due to an attack on the vBulletin forum software used by 1000's of sites across the net. As of now, the site is offline, and Brazzers say they're taking steps to ensure the login details cannot be used.</p>
<p>http://www.bbc.co.uk/news/technology-37285715<br>
https://motherboard.vice.com/en_uk/read/nearly-800000-brazzers-porn-site-accounts-exposed-in-forum-hack<br>
http://www.brazzersforum.com/</p>
<p>A 2012 hack has resurfaced again, with Russian portal Rambler.ru reportedly having 100 million usernames and passwords leaked, all plaintext and unencrypted. It is thought to have been carried out by the same person who hacked Last.fm, also in 2012.</p>
<p>https://thehackernews.com/2016/09/russias-largest-portal-hacked-nearly.html<br>
https://www.leakedsource.com/blog/rambler<br>
http://rambler.ru</p>
<p class="subtitle">SOFTWARE</p>
<p>Kali launched the new 2016.2 version of it's security focused OS recently. There are now stand alone ISO images you can download to try Kali on various non-GNOME desktop environments, as well as other updates.</p>
<p>https://www.kali.org/news/kali-linux-20162-release/<br>
https://www.youtube.com/watch?v=Fynh7oP9Lio</p>
<p>Wireshark also released version 2.2.0 of their network analysis tool this week. Link to full release notes are in the description.</p>
<p>https://www.wireshark.org/docs/relnotes/wireshark-2.2.0.html</p>
<p class="subtitle">CENSORSHIP</p>
<p>A report by Yoani Sanchez and Reinaldo Escobar has concluded that the Cuban government is automatically blocking text messages that contain words such as democracy, human rights, and hunger strike, amongst others. Reuters verified this, saying messages are confirmed as being sent locally, but never actually reach their destinations.</p>
<p>http://www.theverge.com/2016/9/7/12828202/cuba-filtering-blocking-text-message<br>
http://www.reuters.com/article/us-cuba-censorship-idUSKCN11B265</p>
<p class="subtitle">WEB TRACKING</p>
<p>Princeton researchers carried out a massive, automated survey of the tracking capabilities for the top 1 million websites on the internet. Unsurprisingly, they found sites like Google, Facebook and Twitter had third party trackers in more than 10% of those sites, with an additional 80,000 third party trackers being present. They also found new fingerprinting techniques being used more, like the previously unknown AudioContext attack, WebRTC local IP discovery, device font lists and battery fingerprinting.</p>
<p>https://nakedsecurity.sophos.com/2016/08/03/massive-new-study-lifts-the-lid-on-top-websites-tracking-secrets/<br>
http://randomwalker.info/publications/OpenWPM_1_million_site_tracking_measurement.pdf</p>
<p class="subtitle">USB</p>
<p>The USBKiller 2.0 has been announced, and is for sale for $50. When the user plugs in to a USB port, it takes the 5volts, puts it through a bunch of capacitors, then delivers 200volts back through the data pins, bypassing built in power protection, and frying computers.</p>
<p>https://www.usbkill.com/<br>
https://thehackernews.com/2016/09/usb-kill-computer.html<br>
https://www.youtube.com/watch?v=3hbuhFwFsDU</p>
<p>In other USB news, a team of Israeli researchers have found a way to extract data from airgapped machines. It does this by turning existing USB devices into RF transmitters, and all without any hardware modification. I've got a feeling these electromagnetic type attacks are going be a big deal in the future.</p>
<p>https://thehackernews.com/2016/09/usbee-airgap-computer.html<br>
https://www.youtube.com/watch?v=E28V1t-k8Hk</p>
<p class="subtitle">MALWARE</p>
<p>Earlier in the year, researchers found the Mokes malware in the wild, with the ability to work on both Linux and Windows machines. Now the backdoor, which can steal screenshots, audio & video capture, keystrokes and more has been found on Mac OS X, making this sophisticated malware fully cross-platform.</p>
<p>https://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered/<br>
https://securelist.com/blog/research/73503/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/<br>
https://thehackernews.com/2016/09/cross-platform-malware.html</p>
<p class="subtitle">HACKING</p>
<p>Hak5 made a really interesting video showing you how to use a USB Rubber Ducky to steal a username and password hash in about 2 seconds. Pretty fascinating to see how this stuff works.</p>
<p>https://www.youtube.com/watch?v=BH4M7djZfew</p>
<p>Another Hak5 team member, Rob Fuller, aka Mubix has found a way to steal login credentials from screen locked Windows and Mac systems. The attack uses a USB Armory that pretends to be an ethernet adaptor, and takes advantage of the implicit trust many operating systems have for these USB adaptors. The whole process takes about 13 seconds, and Rob has included all details in his writeup.</p>
<p>https://room362.com/post/2016/snagging-creds-from-locked-machines/<br>
https://www.youtube.com/watch?v=Oplubg5q7ao</p>
<p>--<br>
BY NODE</p>
</div>
</div>
<!--FOOTER SECTION -->
<div id="footer">
<pre>------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------</pre>
<div class="filter">
<a href="http://n-o-d-e.net">HOME</a>
<span class="footdogs"> × </span>
<a href="http://N-O-D-E.net/shop/">SHOP</a>
<span class="footdogs"> × </span>
<a target="_blank" href="http://patreon.com/N_O_D_E_">PATREON</a>
<span class="footdogs"> × </span>
<a target="_blank" href="https://github.com/N-O-D-E/N-O-D-E.net">GITHUB</a>
</div>
</div>
</body>
</html>