ALL COMMENTS ARE ANONYMOUSCoinbase is a secure platform that makes it easy to buy, sell, and store cryptocurrency like Bitcoin, Ethereum, and more. You can also thumbs up for your favorite sites or thumbs down for those sites that you don't like. Wave browser allows you to post your comments on any internet page you visit. Wave browser does not track your browsing. Get Wave browser and experience a higher level of security. "Seriously, you want to pretend to be a paedo, so you can lure in the FBI and fuck with them? That is some next level warped shit."Wave Browser.I bought these laptops from a heroin addict in another city. And what if they chain the sploits? They'll bounce out of your sandbox and be kicking the door down in minutes.""No, no, it's ok. Anything that's gonna make them zero-day you is some dark shit that you can't just laugh off. Doesn't have to be a paedo.""I don't give a fuck.
It's a regular laptop, but it's only connection is a single wired Ethernet. This one," he tapped the metallic blue case, "is the bait. And when their payload fires they'll trace us through a ToR bypass.""That's why we need three laptops. And we never speak of this.""You get a proxy running on that. When they deliver their exploit we'll catch it here, do some reverse engineering, and get ready for the fun bit!""What the hell. We proxy everything from the bait browser through here. Live a little.""It's hardened Kali too. "Ready" They both plugged into the hub, and Cal watched as John connected the bait laptop, accessed the proxy settings and linked it to the listener.He accessed a non-descript site to check the setup. Cal started the intercepting proxy, exposed its listener and looked at John. With the connection active he configured the iptables firewall so outbound traffic was permitted only through ToR. He connected the 4G dongle, started the ToR service and watch its status update. I got a 4G dongle off the same guy."John removed a small ethernet hub from his bag, connected its power but held off from plugging in the laptops. Metamask Trojan Vulnerabilityon Chrome For A Series Of PacketsBut that didn't stop him typing and Cal watched with grim fascination as he navigated around dark net markets, registering accounts, searching vendors and sending onimous enquiries. We'll make it an American prosecutor, that'll get the FBI going."Cal stared at him. We go on the dark net and try to order a murder for BitCoin. That's too dark to mess about with.""Old school," John replied, "I guess it's a bit of a cliche. "Seriously, show me a packet trace." John started a sniffer, gestured to Cal to refresh the bait browser, while a series of packets scrolled up the screen, all safely encrypted by ToR."So what now?" a pause "And definitely no paedo stuff. "Are we sure it's going through ToR?" Cal asked. If we allow it, we'll just get a lame zero day that requires WebGL. Stands to reason too, we always knews that had huge attack surface." He was about to permit it, but Cal stopped him. Until the browser popped up with "Do you want to allow this site to access WebGL?""That's it," John smiled, "there's no way that site really uses WebGL. This went on for hours, with no sign of any incoming exploits. He grabbed Cal's arm, "this is it!" Fear in the room intensified. John carried on his ruse, until he noticed the browser stutter. But it was just a stager - no exploit there. "It's not like one I've seen before," Cal said, "it's tighter coded than a typical rootkit. Sign off naturally and shut it down."Cal joined him with the binary anaysis and gradually they formed a picture of its armory. 20 minutes in he told Cal to stop. He loaded the malware into a binary analysis tool and begun the painstaking process of unpicking its workings. Yeah, that's the payload for sure. And it looks like self-decrypting machine code. That's gotta be a heap spray. "You can see it repeatedly copying this string. "We're nearly there! Everything's in place.""That's why we had to do this today. On the 20th he told Cal to stop.There was a sparkle in his eyes. One by one, the servers came online, and John installed the C&C software, configuring each to only respond to instructions signed by their private key. What I need you to do is use BitCoin to rent a couple of dozen virtual servers in different data centres around the world."As Cal started registering the servers, John used the third laptop to generate a public/private key pair. I've got the C&C software figured out already, it was a fun project from long ago. They watched in delight as a fully-patched browser accessed their delivery site, churned the laptop's CPU, then registered a ping back on the console.The next step was to incorporate a real payload."Persist itself to disk, then sit quietly and await further instructions. Digital scrapbooking for mac free downloadJohn accessed the vulnerable major site, saved the HTML code locally, and modified it to include an exploit URL. Uploaded the exploit delivery mechanism into the control cloud, and generated a list of exploit URLs. Scripted a mechanism to dynamically generate payloads containing a random sample of C&C servers. This was not real.They completed their final maneouvers. A cache poisoning vulnerability on a major site."Cal stared at him. John cancelled it with a smile.Running a grep count on the log showed over 900,000 payload activations. The rate of scrolling on the C&C console exploded. Cal watched in horror as John repeated the cache poison process across multiple clusters in different data centres. Each time a new node joined their botnet, a line was logged to their console, and soon the screen was scrolling uncontrollably.John was elated, Cal terrified. Each time, under the hood, the zero day exploit fired, the payload persisted itself to disk, and made a connection to their C&C network to receive further instructions. Around the world, thousands of unsuspecting web users experienced an annoying pause while their web pages loaded. Some nudes of an office chick that had been circulating. He created an encrypted container, and into it put his decoy. Now, we cover our tracks."John removed two USB drives from his bag. After a secure erase of both drives, then of the ToR relay itself, John started putting everything in a bag.They left the hotel room in silence. The ToR relay was unlikely to have been compromised that night, a trustworthy system he could use to erase the others. Removed the hard drive and connected it via USB to the ToR relay. It almost felt like a dream. He awoke a few hours later. They both got out, John retrieved the bag, and with a big hurl, launched it over the fence into the landfill.Back home, John smoked a large joint of double zero hash and fell fast asleep. He went out of town, down lanes Cal didn't recognise, and stopped by a chain link fence. Cal was acutely aware of the USB drive in his pocket, the angled corners pressing into his leg.
0 Comments
Leave a Reply. |
AuthorReggie ArchivesCategories |