Blog Posts Tagged with "Krypt3ia"
April 24, 2012 Added by:Scot Terban
I fundamentally disagree with Jester’s method and his goals, as much as they have been explained of breaking their communications. I pretty much explained myself in rather clear, albeit terse, language on several occasions including my rant about getting off the lawn...
April 24, 2012 Added by:ʞɔopuooq ʇuıɐs
I would like to state that although everything above is factually true, I am in no way inferring that Mr Terban is in any way supportive of Jihad, quite the opposite. I have been ignoring his rants for a long time and felt that now was a good time to address him...
March 05, 2012 Added by:Scot Terban
Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...
February 23, 2012 Added by:Scot Terban
To really have an attack that merits all this hand wringing you would have to have considerable money, time, and effort. Never mind the access that one would need to innumerable systems, and this is not Anonymous even if they made boasts that they could or would do it...
February 22, 2012 Added by:Scot Terban
Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?
February 21, 2012 Added by:Scot Terban
We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...
February 16, 2012 Added by:Scot Terban
Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...
February 14, 2012 Added by:Scot Terban
There have been tutorials on SQLi and Metasploit online for a long time, but only recently have we seen them translated into Arabic and placed on the technical forums. This means that even the low end of the technically capable Jihadist's can now boot up these tools hack a site…
February 10, 2012 Added by:Scot Terban
They can use the most elegant of solutions and nimbly change their tactics, on the fly create/edit code to defeat the defender's tactics, and use the most simplistic of attacks in the effort to gain access KEEP it as long as possible to succeed in their own ends...
February 09, 2012 Added by:Scot Terban
China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...
February 08, 2012 Added by:Scot Terban
Everyone is all over the fact that the Symantec code had been hacked back in 2006 right? I have not seen anything about the real elephant in the room. Where has the code been lo’ these many years? Who had it? Who hacked Symantec in the first place? Anyone? Anyone? Bueller?
February 05, 2012 Added by:Scot Terban
Over the last year we have seen an evolution within Anonymous and its various movements. The latest being the AntiSec movement, the more cohesive core of Anonymous, one that has a set group of leaders at its center, leaders with an agenda... Anarchy....
January 31, 2012 Added by:Scot Terban
Anarchists who want nothing more than to just sow chaos for their own nihilistic animus produced what I call the “Monkeys with guns effect”: Scattershot and useless hacks and pranks that further no other agenda than the Lulz or to sow chaos anywhere they strike...
January 25, 2012 Added by:Scot Terban
An Orwellian software development project that the Navy has invested in called “E-MEME” will be able to sift through the internet for ideas and meme’s to analyze them for predictive behavior assessment. Predictive behavioral analysis via meme’s... Whatever could go wrong?
January 24, 2012 Added by:Scot Terban
A Pastebin dump alleged to be from Anonymous has forty-nine IP addresses with SCADA systems on them. Furthermore, those systems were claimed to not have any authentication on them whatsoever. I checked the IP’s and I have to say “meh” on this little dump by the skiddies...
January 20, 2012 Added by:Scot Terban
The SCADA were not in default state for passwords, and in general did not seem to be important systems - like government or large power company hardware. Hell, for that matter, none were even water facilities, which I should think in a desert would be kinda important, no?
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013
Projectile Dysfunction... ryan mccarthy on 12-01-2013
Mobile Security: Tips for Using Personal Dev... Shah Alam on 11-30-2013