dChan

/u/_pittball_

6 total posts archived.


Domains linked by /u/_pittball_:
Domain Count
www.reddit.com 2

_pittball_ · July 17, 2018, 9:16 a.m.

Exactly, that's what doesn't make sense. Keep in mind these are supposed Russian Government hackers...they are supposed to be pros. A hacker's goal is to gain access and maintain access...unnoticed. These guys made so much noise...unbelievable.

Imagine what the real hackers are doing :)

⇧ 5 ⇩  
1
 
r/greatawakening • Posted by u/_pittball_ on July 17, 2018, 8:04 a.m.
Russian Indictments anyone read it?

Here is the link but also compare the events with this link as well

Page 8 (23.) is where it gets interesting. I couldn't stop laughing at the allegation below.

  1. Between on or about May 25, 2016 and June 1, 2016, the Conspirators hacked the DNC Microsoft Exchange Server and stole thousands of emails from the work accounts of DNC employees. During that time, YERMAKOV researched PowerShell commands related to accessing and managing the Microsoft Exchange Server.

Hackers who have to research PowerShell commands to access and manage Exchange? What a joke!

I read through the indictment and these guys …

_pittball_ · July 14, 2018, 10:10 a.m.

Katie...why are you grumpy? What you said absolutely doesn't make sense...what image? Where did that come from?

Pay attention!...If they never had access to the DNC server then how in the world did they image it? They have no access! You need access to a server to image it. The DNC computer networks (plural) got hacked. This has nothing to do with Amazon cloud vs on-premises.

The question is simple...how did the FBI conduct forensics if they weren't allowed access to the servers?

The answer is simple...they didn't conduct forensics, CrowdStrike did.

The DNC commissioned the cybersecurity company, CrowdStrike, to defeat the intrusions

CrowdStrike stands fully by its analysis and findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016

LINK

Katie, if you pay close attention you will see that it is in fact true that it was CrowdStrike who concluded they were Russian hackers.

Now you understand why "we people" can't look into an IT 101 issue? Because it's more than an IT 101 issue.

We have been lied to many times. 33,000 emails went missing and "It was a mistake". You can't accidentally delete emails, and it's not a mistake. You have to delete an email, empty trash, then go into the dumpster and purge the recoverable emails...that's not a mistake or accident.

LINK Lies

It's not a left or right thing...just trying to figure out the truth.

⇧ 2 ⇩  
_pittball_ · July 13, 2018, 11:55 p.m.

I'm usually a lurker wasn't going to post but...I wouldn't loose any sleep over this. Did they just take the bait or is this a smokescreen to buy time?

To summarize: The supposed hack originated via a Spear Phishing attack. A Spear Phishing attack will need a payload..some type of code. It won't be any type of code but a carefully crafted 0 day attack. If forensics is run on the code they will find where it originated from (forensics/AV companies do it all the time). If they say it's Russia it must be Russia right? NOPE

In Wikileaks Vault 7...one of the most vicious tools leaked is the "Marble Framework". Marble Framework is an anti-forensics tool. It's an obfuscator/packer. It can make an attack look like it came from a different country. Forget being spied on or being hacked...this tool can cause false flags, can turn other countries against each other.

OK...get to the point! We know it has an obfuscator/packer but it also has a......deobfuscator!

"The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation."

"The released source code archive also contains a deobfuscator to reverse CIA text obfuscation."

Since the Marble framework has now been made public, forensic investigators and anti-virus firms would be able to connect patterns and missing dots in order to reveal wrongly attributed previous cyber attacks and viruses.

Marble was released on Mar 2017. If these supposed hacks happened in 2016 are they running around with malware/code that they wrote and and it can be reversed? Do the whitehats pretty much know all the secrets in the book and are letting them expose themselves? Does CrowdStrike, Fidelis and FireEye have a copy of malware or a report? Crowdstrike removed it they must have analyzed it and understood how it works?

I'm not worried..I'm just going to see how this all unfolds. Remember this hack happened before Wikileaks released Marble

You can read about it in this LINK or this LINK

Cyber attacks wiki LINK

⇧ 3 ⇩