For those who don't know, they are referring to the 2001 Armando Diaz school attack  (warning: graphic), where hundreds of G8 pacific protesters were brutalized and tortured by Italian police. Whilst the police has been found guilty of this, none of the policemen is serving any jail time.
My friends went inside the school after the raid and took pictures that I can't get out of my head to this day. The whole building looked like a slaughterhouse with blood everywhere. Blood-stains on radiators indicating that peoples heads were repeatedly smashed against them. I also remember the screams you could hear on the live-stream. First it was people yelling "pacifisti" and then just screams for 20min until the screaming stopped and ambulances arrived.
That shit really paves the way for young activists continuous fight against facism of any kind.
Fisher is experienced enough to know any information they leak will be used against them. My guess is that the event is either symbolic or meant build on a persona used to find people like them; post provides a means of contact.
Regardless of their intent, as made clear by my other comment, this was a tragic event, and the police should be held accountable.
If police commit crimes, they must be held accountable.
And I say that as an activist against police corruption here who also lives in a murder capital. Police pulling shit that bad here is rare outside the "hoods" where it's thugs and low income people nobody cares about. Still usually just a ticket, thrown on a car, or a brief taser. The worst plant shit on people but they're very rare.
Doubt it would help much at this point. Damage is done. Still pisses me off though.
Terrorism is not quite the same thing, but many are similarly notable.
(I'm probably only aware of a couple of them; I'm not grandstanding about awareness here)
I'm grateful for the information. It's incredibly interesting, but it might come at great expense to the author.
Presumably, given that they talk about EU culture^W^W^W^W (see comment below) have a https://securityinabox.org/es/… link, the author is from Spain, which would make it easier to pinpoint an origin, as Spain has a wider spectrum of language differences than in most other Spanish-speaking countries.
Since there is a link to http://madrid.cnt.es/, they maybe live in the capital, which weighs 3 million inhabitants.
I'm glad to find people that still fight the system in this side of the world.
They could be dropping some contradictory clues, BTW. I could definitely see that.
This guy seems to be pretty good at googling around for stuff.
Is there some global force that would be active on him?
Some people even do it out of curiosity: https://news.ycombinator.com/item?id=11304752
So I'm not sure what your trying to say.
1. Great choice of targets where the leaks are less questionable in terms of ethics.
2. A great write-up with references that could benefit attackers, defenders, and students alike.
This stuff is gold:
> NoSQL, or rather NoAuthentication, has been a great gift to the hacker community . Just when I was worrying that all MySQL's sins of omission had finally been patched , these new databases appear, lacking authentication by design. Nmap found a few in Hacking Team's internal network:
Not to mention:
> As fun as it was to listen to captures and watch webcam images of Hacking Team developing its malware, it wasn't very useful. Their insecure security backups were the vulnerability that threw the doors open. According to the documentation , their iSCSI systems should have been on a separate network, but nmap count a few of them in their 192.168.1.200/24 subnet:
I can just hear some one saying to themselves, four years ago, "This backup stuff should be on a separate subnet, but for now this appears to be working. Make a note-to-self to secure it later." ....
I think people should be grateful to the ones that as he did, fight against what is legal but definitely wrong.
Better yet, when was the lat time you got to vote on a law that was passed in your country?
Whoisology  is good for this, though they've been more aggressively pushing their paid options as of late. Also WhoisMind , to some extent.
site:whois.domaintools.com "Y Combinator"
>Thanks to the hardworking Russians and their exploit kits... many businesses already have compromised machines in their network. Almost all of the Fortune 500, with their enormous networks, have a few bots on the inside
I could definitely believe that, having worked at a few, they have massive infrastructure and many users that are extremely relaxed about security in general.
What then struck me was the way he casually decided to hack a VPN (!) is it really so straightforward? And the way he seemed confident about testing his exploit on other compromised machines without detection.
I'm always paranoid every time I type 'last' on my Linux box, wondering if the thing is really compromised and totally lying to me - now I'm even more so!
He's intentionally vague, but given he mentions two routers and two vpn systems, it's highly probable that he's referring to one of the two routers (which is embedded, and has firmware).
Furthermore, he refers to a website which predominately deals with routers.
> is it really so straightforward?
Routers, yes, VPN daemons, not as much.
: http://www.devttys0.com/training/ - which can also contain a vpn daemon of course.
AFAIK, they are still operating and still doing exactly the same thing.
HackingTeam latest sample is a very fresh sample compared with what we got in the past, it is a sample created post July 2015 hack, and it’s using the same code base as before. HackingTeam is still alive and kicking but they are still the same crap morons as the email leaks have shown us.
"We can sell everywhere in Europe without a license. We can sell everywhere in the world but we have to ask for a license every time we sell."
This means they sell black market now to outside EU.
DNS, HTTPS to some random AWS/Azure/etc. endpoint, etc. are common as dirt and enough harder to monitor that many places either don't try or struggle to do do effectively.
I was curious to read this piece to see how closely the approach, techniques and tools he uses compare to how penetration testers are formally trained in the info sec industry. For what it's worth, the methodology in terms of reconnaissance, privilege escalation and lateral movement within the network are typical. Also, most of the tool set he uses (e.g. mimikatz, responder, meterpreter, powersploit, psexec) are part of any good penetration tester's arsenal.
I'm not trying to down play the achievement though. He is clearly very skilled and knowledgeable. Of particular note, it seems that the initial intrusion was only possible because 'after about two weeks of reverse engineering, I discovered a remote root exploit' in an embedded system. He doesn't provide technical details of the exploit but finding a 0-day in an embedded system is usually far from child's play.
Yeah, right. Most of the tools and knowledge he used would have taken much longer than that to acquire.
Bitcoin is anonymous? Time to go to jail.
Thinking this through- an adversary who's watching the block chain probably knows some inputs and some outputs. As in, these addresses belong to an exchange, these addresses belong to a hosting company.
Okay, fine. Now remember than any user can literally create wallets out of thin air, and in fact doing so is considered basic security hygiene. Let's say Joe User transfers one coin from one wallet to another wallet under their control. Let's say they do this 20 times, sometimes with the full amount, sometimes less.
How does the adversary attach an identity to those transactions?
So as long as you don't do a transaction that connects your identity to any bitcoin address, you are fine. but to use bitcoins you are almost always required to do it (its an electronic financial transaction, they are governed by law to have an identity, but of course you can find entities who do not follow these laws).
As for where the Bitcoins came from, I'm sure the author of this document would have some digital assets they could sell on the darknet to acquire some Bitcoin. Where those Bitcoin originated then would not be their problem.
I would imagine others use JoinMarket to mix up the coins, use coin control to exchange for other cryptocurrency p2p, or other obfuscation methods like buying up high demand items with bitcoin then selling them remotely for other bitcoins.
Telling the blockchain about your bitcoins and their transactions would also leak your IP.
To be anonymous you need to do all transactions from anonymous internet and get all your stuff anonymously.
Perhaps a purchased ebook downloaded from TOR.
You can wash your coins of course, I think it currently requires trust in the company doing it and if not done correctly might still leave a trace.
Of course the real world is different, would the FBI do enormous op sec to catch a small time crook. It's more about risk management.