Posts in Hacking and Security

How we know Russia hacked the US election – analysis of the DNC hack (and why Assange and Guccifer 2.0 are best buds)

// December 13th, 2016 // No Comments » // Hacking and Security

Assange served as the gateway for stolen US government documents that appeared to be an attempt to influence the US election process. The documents were rumored to come from the Russian government and an enigmatic lone-wolf hacker known as Guccifer 2.0.

Rule 41 changes pass – long live legalized electronic eavesdropping of all Americans!

// November 30th, 2016 // No Comments » // Hacking and Security

The new Rule 41 dictate is going to be law and it’s a doozy, both mind-boggling (for its stupidity) and stomach-churning (for its stupidity) at the same time. Effectively, what the law does is allow any judge, anywhere (including Podunk, Texas), to grant a warrant for electronic surveillance of any US citizen. If you thought […]

The Shadow Brokers dropped another server list today–is it relevant?

// October 31st, 2016 // No Comments » // Hacking and Security

The Shadow Brokers published another encrypted drop today on Medium which they say reveals NSA IP addresses linked to the Equation Group (some believe Equation Group is a NSA hacking cooperative). TSB’s drop uses the same PGP as previous drops so it appears to be legit.

Why we should fear Mirai and IoT botnets (and how stupidly simple it is to quash those fears)

// October 24th, 2016 // No Comments » // Hacking and Security

The first thought for anyone who has examined the Mirai codebase is how well the application was coded. The second thought is how easy it would be to disable. Being a C&C server inherently means you can control the Mirai botnet with it – even to the point of shutting it down – permanently.

If you own a D-Link router, stomp it, burn it, and never buy D-Link again

// September 30th, 2016 // No Comments » // Hacking and Security

Maybe other router manufacturers are as magnificently dumb as D-Link but regardless, get rid of all D-Link routers and vow to never buy another D-Link product for a long as your lungs suck in air. The security vulnerabilities present in their devices, especially the DWR-932B router, are so far beyond stupid, well, you’d swear the […]

Well, that didn’t last long – DDoS record broken again with 990Gbps flood

// September 28th, 2016 // No Comments » // Hacking and Security

Just a week after Brian Krebs was hit with a 620Gbps IoT attack, reports are hitting the wires that OVH has been hit with an even larger attack – two simultaneous barrages of 799Gbps and 191Gbps for a whopping 990Gbps total. And this may only be the beginning…

Akamai’s decision to drop Krebs’ DDoS protection wasn’t an infrastructure thing – yeah, right

// September 26th, 2016 // No Comments » // Hacking and Security

I wasn’t too happy to hear that Akamai dropped security researcher/writer Brian Krebs last week after Kreb’s website sustained the largest-ever DDoS attack. In short, they basically offered Krebs protection from DDoS attacks until, well, they said they couldn’t. Then they dropped him leaving Krebs to fend for himself.

Security researcher Brian Krebs’ website hit with largest ever DDoS attack – 665 Gbps!

// September 21st, 2016 // No Comments » // Hacking and Security

Security researcher Brian Krebs of KrebsOnSecurity reported today that his site was hit with a walloping 665 Gbps DDoS attack. The attack included SYN and HTTP floods and peaked at 153 Mpps (million packets per second). Krebs’ site remained online, the attack mitigated by Akami’s DDoS protection service.

How to tell if you’re on a government watchlist (and how to get on and off the wild ride)

// September 21st, 2016 // No Comments » // Hacking and Security

People often wonder if their names have somehow made it to the “the list”, that watchlist of US citizens whom the government suspects may be up to something. I would venture to say, the best way to know if you’re on the watchlist would be to recognize how often you find yourself forced into unique […]

A day in the life of a Bug Bounty hunter – demo of productive hacking session against Yelp

// September 9th, 2016 // No Comments » // Hacking and Security

Offering bounties worth thousands, even millions of dollars, bug bounties pay hackers to report vulnerabilities. The process is pretty simple. The hacker sends the vulnerability report to the company, the company patches the vulnerably, the bounty paid, and finally, the vulnerability disclosed. Everyone wins. Usually.

Who’s really behind the DNC/NSA hacks? Russia, Snowden, independent hacker, or hybrid of all three?

// August 17th, 2016 // No Comments » // Hacking and Security

Regardless of whether you consider Edward Snowden’s leaks of classified information to be self-sacrificial acts of patriotism or the deeds of a traitor, the recent DNC data dump and NSA cyber weapons malware (milware?) code drops have all the markings of a Snowden escapade. If you disagree, consider the timing of the code drop and […]

Windows Subsystem for Linux (WSL) – how to create a Linux hacking toolkit that runs on Windows 10

// August 6th, 2016 // No Comments » // Hacking and Security

Forget running Kali in a virtual machine (well, at least put it aside for a while). The Windows 10 Anniversary Update includes a whack new feature – Windows Subsystem for Linux or WSL. Using the new LxssManager service, WSL lets you run a full-featured Ubuntu Linux subsystem on Windows 10.

Poodlecorp DDoS attack brings down Blizzard’s battle.net servers

// August 2nd, 2016 // No Comments » // Hacking and Security

I tweeted a few hours ago about a DDoS attack hammering Blizzard’s game servers.  Around 7:00 PM Central Time, players in the game began noticing severe lagging.  Within 30 minutes, the Battle.net servers were completely offline and unavailable for game play.

The United States is outsourcing its Cyberspace (Cyber Command) Operations – really?

// November 16th, 2015 // No Comments » // Hacking and Security

It’s a draft title Task Order Request for Cyberspace Operations Support Services in support of United States Cyber Command (USCYBERCOM). Oh, brother. That means the U.S. has bungled their cybersecurity so badly they’re now willing to outsource, and trust, this critical national security task to an outside contractor. Even a partner outside of the U.S. […]

Probe finds that contractors working on military code outsourced some tasks to Russian coders

// November 6th, 2015 // No Comments » // Hacking and Security

After conclusion of a four-year probe, contractors who worked on U.S. military code are being fined a combined $12.75 million. As it turns out, some contractors outsourced coding tasks to Russian. No words can convey the level of stupidity here (hey, let’s get Al-Qaeda to build US airplanes!).

Interesting geographic attack vector from a Russian launched cyber counter-attack

// July 14th, 2015 // No Comments » // Hacking and Security

I love the Russians. I know, strange to hear that from an American in modern day with a new “cold war” (seemingly) beginning to gain steam. Let’s say, I respect them. Their hackers in particular. Their response to a cyberattack is to launch a full-on offensive attack against the attacker, quite a different response from […]