SCF Advanced Search


Members
Stats
  • Total Posts: 34160
  • Total Topics: 10158
  • Online Today: 1304
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)










Recent Posts

Pages: [1] 2 3 ... 10
1
DearOpenLedger DEX users!
Starting from today, https://t.me/OpenLedgerCorp will be the only official OpenLedger Telegram channel.

 Subscribe to it to keep abreast of latest news and updates about OpenLedger and its services, solutions, and products, including OpenLedger DEX. Latest company announcements can be also found at https://dex.openledger.io/news/.

All other channels will be closed from July 18, 2018.

The new channel will serve informational purposes only. For any technical questions, contact our support team at https://openledger.freshdesk.com/support/home.
Before submitting a ticket, please see our FAQ at https://dex.openledger.io/faq/







2
Hello,
 Thank you for Share your informative knowledge.
3


If you want to hack someone's network then learn your target. This starts with recon. What does your target run? What information can you find out about them? Remote scanning will tell you lots about a target system ... unless their sysadmins are good and have changed all the banners to throw you off.

So you learn about the people involved. Who are they? Have any of the technical staff or managers done talks? Where did they work before? People are sloppy and leave information lying around all over the place ... and the internet is forever.

That talk or blog about how a big problem was solved can give you lots of clues about how a company's network is designed, what applications they use and so forth. Social media feeds are a gold mine; techs love nothing more than to complain about frustrating applications, or talk about new ones that they are trying out.

A really good hack can be months or even years in the recon stage. It probably involves building a duplicate network in your own lab at which you can make dry runs.

Cloud offerings can really help with this because the more people use public cloud computing, the more they are using a pre-canned offering that you can duplicate with a minimum of effort. After you know all that you are likely to know, you move to coding stage.

The coding stage overlaps recon somewhat, in that a lot of the recon stage will be spent designing the code you'll be using to attack your target. You'll need to assemble a list of exploits you can try, based on what you know the target runs. You'll also want to learn the operating systems, monitoring solutions and intrusion detection systems in play so that you can hide your tracks.

The coding stage is assembling your payloads into deployable weapons. You might need to try several before you find one that managed to get you a beachhead into the target network. Once there, you can then spool out your payloads onto different systems – covering your tracks the whole time – and deploying your other beachhead tools (including those which failed; they may work from behind the perimeter) to make sure that you have multiple access points.

All of this is a lot of work, but gaining access to a network is the easy part.

Sneaking out is always hard

There is an economic incentive for companies not to pay too close attention to people trying to sneak in to their networks. Simply put: if they don't know about it, they can't be held accountable. Companies can point to the industry-standard, off-the-shelf security solutions they've deployed and say they did their due diligence.

On the other hand, companies are absolutely paranoid about people trying to remove data from the network. They're also paranoid – for completely different reasons – about what their staff might be doing with the company network. Are the proles wasting time on Facebook? The bigger the company the more likely they will see every single bit that leaves the network.

If you manage to embed a remote access application in your target's network making it something that people won't notice is actually pretty easy. Have it talk something innocuous or nerdy. Nobody really notices SSL traffic to a website hosted on Amazon.

If you have a legitimate looking website living in a VM on Amazon then you can have your remote access tool talk to an API interface buried at some sub-URL in order to exchange commands. So long as the traffic usage isn't high, it will probably be overlooked.

However, try to pull 2TB worth of data off of that network and alarms will go off everywhere.

Large volume transfers are suspicious. Protocols such as RDP are suspicious. SSH maybe not so much, but that really depends on the company. Many are getting wise to it.

Everyone monitors cloud applications such as Dropbox nowadays, so you're not going to take your bounty, stuff it into a cloud storage application, and use that to exfiltrate data unless your target's sysadmins are massively underfunded. Similarly, if there's this connection to a random website on Amazon that's open for eight consecutive months, always at exactly 50KiB/sec, someone will eventually notice.

This is why bulk data theft is so much rarer than simple compromises to mine bitcoin, pump out spam or encrypt everything and demand ransom. Getting in is easy. Getting out is hard.

Hacking from the back of beyond

You don't need a good internet connection to hack. Most hacking isn't real time anyways; you use robots and scripts to do the leg work because they are more precise than humans. If the robots you send in to do the job are well coded then they won't forget things when they're tired and they won't get caught.

This means that you can hack a target over the crappiest network connections available. If you can get enough bandwidth through whatever series of relays and anonymisers you are using to your virtual machine on Amazon, then you can use that virtual machine to issue all the commands you want. It has great network connectivity. You just need to pass it some text and the occasional script file.

You probably need a lot more downstream bandwidth than upstream, because you need to comb through directory listings, the results of searches and filters, etc. This, however, is still all text and you can still functionally push it through a wet string. It should be pointed out that today's satellite connections are more than up to the task of this sort of work.

The network connectivity to do the recon portion of the exercise is orders of magnitude higher, but it also isn't time sensitive. Data that's exfiltrated can be stored and manipulated in the public cloud, to be slowly downloaded over crappy infrastructure at the attacker's leisure.

All of the above should serve as a lesson – hopefully more of a reminder – for those who are defending. Good attackers try to hide in plain sight.

Network defence focused solely on keeping the bad guys out will fall to any remotely skilled crew. Proper defence is going to rely on catching them once they've managed to get past the outer defences, and on preventing them from extracting any payloads once they're in.

---

Researchers think they have figured out how Sony was hacked: https://www.damballa.com/damballa-discovers-new-toolset-linked-to-destover-attackers-arsenal-helps-them-to-broaden-attack-surface/
Long story short: the hackers knew what they were doing and covered their tracks with some clever, but really basic, tricks. I'm not particularly surprised by this, but I am surprised that others are surprised by it.

The Register commenter Yet Another Anonymous Coward had a topical comment titled "Let me get this straight", saying that "The world's most backward country executed the world's most advanced cyber attack and chose as its target the American subsidiary of a Japanese entertainment company?"

"Or, perhaps it has secretly infiltrated every other military and government computer system in the west and are actually running everything?"

Neither possibility should be particularly surprising.

Hacking isn't hard

First off, let's start with the statement that I don't have any idea if North Korea did, in fact, hack Sony. It may have. It may not have. You can't trust anything North Korea has to say on the matter. Sadly, we also can't trust anything any of our governments say.

That all said, I absolutely believe North Korea has the capability to do this. Yes, North Korea is backwards. It doesn't have enough bombs and missiles and guns to really make anyone except South Korea really sit up and take notice.

Even South Korea isn't really all that worried, because if you tried to get those bombs and missiles and guns from A to B then everyone on earth would see it happening and a cloud of cruise missiles would rain down on the North Korean military movement, making for a short but exciting news cycle.

North Korea's leadership know this. So what's a megalomaniacal false demigod of a leader to do in order to strike at the hearts of his perceived enemies? Develop "cyber" capabilities. Being a good hacker doesn't take some mystical skill. It doesn't take a super computer and it doesn't take a country full of cloud providers.

A half decent hacker can penetrate almost any system with nothing more than a netbook and good operational security. You can use any operating system or device if you know your tools well enough, or you write good enough tools. For the difficult hacks you're realistically going to have to do both.

Hacking isn't about technology. It's about process. It's about procedure. It's about discipline, knowledge, study and caution.

We portray hackers as people who have a stroke of genius and then mash the keyboard really hard and poof! They've reversed the polarity on the tachyon inverter and suddenly used the thermostat to overwrite the hidden sectors on the tablet that controls the nuclear reactor. Oh noes!

State-level hacking

Anyone who has the resources to hire a full-time research team and a pair of decent developers can build credible offensive hacking capabilities. This means that most 50-individual companies on the planet theoretically have the resources to build both malware and network-based deployment capabilities.

Not only does this make every government on earth a threat, but by dint of the low cost of developing this capability, industrial espionage hacking teams are guaranteed to be practically everywhere. Organised crime will, without question, have extensive capabilities as well.

The idea of "state-level" capabilities moves the needle a bit, but in all honesty not by much. The primary advantage that state sponsorship brings to a hacking team is not additional nerds or computer infrastructure. It is spies and saboteurs.

Governments have people around the world, or they can hire mercenaries and consultants to get the job done. People cost money and this means that only a handful of organisations can manage the global reach of even a small government.

Any large enterprise has the financial resources to develop this capability. The large organised religious groups would as well. The larger organised crime groups have global reach, but many are loose collections of small families or clans and may not have the cohesion for unified long-term investments on this level.

Network activist and hacktivist body Anonymous and other loose – but large – populist collectives or organisations could theoretically bring state-level resources to bear. In the case of Anonymous it would be easier to herd cats than to develop any true state-level offensive capabilities, but there are plenty of non-commercial, non-governmental, non-religious organisations with global presences to be considered, and state-level hacking capabilities are more about the ability to physically access networks, people and research resources than the software cooked up by the nerds.

I don't doubt that North Korea could have cut through Sony's defences like they weren't even there. Every state-level actor out there could probably go through most corporate or personal networks with similar ease. This doesn't, however, mean that these state-level actors could get into an actively well defended network.

Beyond state-level: defending your IT world

Defending a network properly costs a lot of money. If you want to do it, you cannot simply rely on off-the-shelf software and tools. You need to hire hackers to defend against hackers. People who are trained in operational security and who look as much for what isn't there as what is.

Shelfware isn't going to catch gaps in logs or other fairly simple tricks to cover one's tracks. Someone who has actually spent time penetrating other systems and had to think about these things just might. These people are not cheap, and there aren't many of them.

Those networks which are defended by teams of the best will not fall to your average state-level, organised crime or industrial espionage hacking crew. They will understand, amongst other things, that eggshell security doesn't cut it: http://www.theregister.co.uk/2015/08/22/next_generation_security_startups_emerge/
That breaches will occur will have been foreseen, and they will have built traps, isolation procedures and much, much more to counter attacks.

To get into these networks you need more than a state-level hacking apparatus. You need a hacking industry. You need to have billions of dollars being spent every year to identify new zero-day exploits, employ professional spies to gather data and be able to perform physical attacks against networks (such as compromising data centres or backhaul data links).

No one nation – not even the US – can pull this off. Developing this level of capability takes international cooperation. It takes the cooperation of nations with private industry. It requires tens – if not hundreds – of thousands of people working together to industrialise network compromise.

It really could have been North Korea

So, yes, Sony's breach absolutely could have been the work of the North Koreans. It is even a logical target if their goal is to train their hacking team against a live target. North Korea has no love for Japan or the US, so taking on what was once an iconic corporation in those countries might have some symbolism.

More to the point, Sony was soft. It wasn't expecting an attack, it wasn't particularly well defended, and it didn't have the resources (that larger, more profitable corporations have or are developing) to react in real time.

I don't buy the proposed political motivations of North Korea hacking Sony one bit. Sony is a stupid target if you want to make an actual statement. But it is exactly the right target to train against.

We are all viable targets. Even if we are not a tempting target because what we have squirreled away on our networks, we might just be useful to train against. It could be that the only purpose the compromise of our network serves is target practice for someone going after meatier game.

Given the above, it's time for us to stop thinking that quality attackers are few and far between, or that our networks will only be attacked for good reason. It's time to make network security something we constantly evolve and refine and hire full-time professionals to oversee.

(ElReg)
Thank you for provide greate info.
4
http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/

(short introduction below; go to original link for all the goodies :) )

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn a new skill, these suites and utilities will help you conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging and mobile forensics. As such, they all provide the ability to bring back in-depth information about what’s “under the hood” of a system.

This is by no means an extensive list and may not cover everything you need for your investigation. You might also need additional utilities such a file viewers, hash generators, and text editors – checkout 101 Free Admin Tools for some of these. My articles on Top 10 Free Troubleshooting Tools for SysAdmins, Top 20 Free Network Monitoring and Analysis Tools for Sys Admins and Top 20 Free File Management Tools for Sys Admins might also come in handy since they contain a bunch of tools that can be used for Digital Forensic Investigations (e.g. BackTrack and the SysInternals Suite or the NirSoft Suite of tools).

Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two amongst this list.
Hello,
Thank you for Sharing free forensic investigation tool.
5
Just mins left in @slatecurrency #tokensale, join the $SLX community today! slate.io

6
From the Modex team:

It is our greatest pleasure to invite you to the Focus on Blockchain meet & greet event on July 18, at 19:00. The event is hosted by Modex Blockchain Labs and organized in partnership with Business Review.

7
It seems this is a tutorial.
8
genEOS – Blockchain 4.0 for Business Announced – Crowdsale Is Launched



genEOS is a blockchain 4.0-driven ecosystem that enables building and running decentralized applications (Dapps) the enterprise-grade performance in an operating system-like environment.

The crowdsale has already begun!

More details about the project in the official press release at https://news.bitcoin.com/pr-geneos-blockchain-4-0-for-business-announced-crowdsale-is-launched/
9
With Cryptocurrencies still in the very early days of becoming adopted by the mainstream, there is still a huge space for new blockchain projects to break through. The World-wide $40B film industry is a prime example of needing blockchain transparency and new routes: to investment, to market and ultimately profit!

Is the World’s 1st crypto currency feature film and it’s Ethereum based tokens the answer? Possibly…


With that, let us to introduce you to KevCoin the erc20 (ethereum) token and the feature film movie it funded!


KevCoin: The Movie – A Crypto themed hybrid Documentary, funded by KevCoin: The Token, is the world’s FIRST Crypto Feature Film.

Created by a multi award winning producer team, lead by British duo; Danny Wimborne and Jason Attar. Both highly experienced in feature films, online viral hits and Blockchain tech, having taken part in many successful ICO’s, won numerous awards for feature films and scored multiple viral hits online. These people have a real and rare combination of experience in this exciting environment.

The film is built around KevCoin, a REAL ERC20 token on the Ethereum Blockchain. The KevCoin the Movie story is an outrageous mixture of reality, fantasy, and comedy. The story follows the ambitions of Kevin Powder, an ex rock star “Fixer”, as he attempts to kick start a trillion-dollar Crypto dream, by creating KevCoins, and spreading them as far and as wide as possible.

The very unusual aspect of this project, is that these coins/tokens, really exist and can be bought and traded. There is no reason why the KevCoin token could not become a significant technology in the entertainment industry in the near future.

This is no dodgy ICO! When people buy this newly released movie from it’s own website (for only $5), via Paypal or Bitcoin - You get 5000 KevCoin tokens For free!!!!

The idea behind the time-limited give-away is to build the KevCoin ecosystem.

This is the first phase of the KevCoin blockchain project.

There are so many scam projects, asking for billions of dollars, and have not created anything and possibly never will! KevCoin the Movie is real. The tokens are live. The ecosystem is building. And for $5, the risk is practically non-existent, but the upside, well as Kevin Powder says “Let no shadows be found where dreams are born”

With over 15 unique pieces of international press, including Nasdaq, and Yahoo Finance, Get in early, enjoy the film and keep those tokens safe!

YOUR 5000 KevCoin tokens and Movie download:

https://kevcointhemovie.com/product/kevcoin-movie-download

Movie Trailer:



Some of the press:

https://kevcointhemovie.com/press
10
XRP Now Tradeable on OpenLedger DEX


OpenLedger DEX Team is glad to inform you that from today XRP coin is traded on OpenLedger.io!

Ripple is a real-time gross settlement system, currency exchange and remittance network created by the Ripple company. Also called the Ripple Transaction Protocol (RTXP) or Ripple protocol, it is built upon a distributed open source internet protocol, consensus ledger and native cryptocurrency abbreviated as XRP (ripples). Released in 2012, Ripple purports to enable “secure, instantly and nearly free global financial transactions of any size with no chargebacks.”

It supports tokens representing fiat currency, cryptocurrency, commodity or any other unit of value such as frequent flier miles or mobile minutes. At its core, Ripple is based around a shared and public database or ledger, which uses a consensus process that allows for payments, exchanges and remittance in a distributed process.

Used by companies such as UniCredit, UBS and Santander, Ripple has been increasingly adopted by banks and payment networks as settlement infrastructure technology, with American Banker explaining that “from banks’ perspective, distributed ledgers like the Ripple system have a number of advantages over cryptocurrencies like bitcoin.

XRP is the third largest coin by market capitalization.

Available Markets:

XRP / BTS https://openledger.io/market/XRP_BTS

XRP / BTC https://openledger.io/market/XRP_BTC

XRP / ETH https://openledger.io/market/XRP_ETH

XRP / EOS https://openledger.io/market/XRP_EOS

XRP / BitUSD https://openledger.io/market/XRP_bitUSD

XRP / BitCNY https://openledger.io/market/XRP_bitCNY






Pages: [1] 2 3 ... 10

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Atomic vapor | Toronto dispensary | Advertising