jean claud 45 Posted ... https://thehackernews.com/2017/06/cia-linux-hacking-tool-malware.html Quote Share this post Link to post
cm0s 118 Posted ... https://github.com/adamcaudill/EquationGroupLeak https://gist.github.com/iam1980/0155d277b03ec535291a1b0a788b3812 https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit https://github.com/hackedteam/ Quote Share this post Link to post
jean claud 45 Posted ... https://github.com/adamcaudill/EquationGroupLeak https://gist.github.com/iam1980/0155d277b03ec535291a1b0a788b3812Thank you pr1v and splif for the fast reply ... Quote Share this post Link to post
OpenSourcerer 1442 Posted ... Someone on Reddit noted that this "invisible" driver can be shown with lsmod. You can even unload it manually. Not sure about other mechanisms which reenables the module, though. Sent via Tapatalk. Means, I don't have a computer available now. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
serenacat 83 Posted ... "the project allows the CIA hackers to redirect all outbound network traffic on the targeted computer to CIA controlled computer systems for exfiltrate and infiltrate data."https://thehackernews.com/2017/06/cia-linux-hacking-tool-malware.htmlleft me wondering if a VPN connection from an infected system can be redirected to a "fake" openvpn server run by the "hackers" for decrypting and matching and capturing and falsifying traffic, with man-in-the-middle pass-thru to destination urls/ips. Not motivated to "drill down" on this. The CIA was more interesting when I worked in a university unit in the early 80s which did political science / survey / opinion / quantitative research and analysis, and attracted people with various political views and affiliations. Back then, the CIA had to use "warm ware" and the American Woman we speculated might be a CIA agent (ex University of Chicago, ...) was intelligent and attractive and hot. Sex and drugs and rock and roll for the patriotic mission and glory and promotion.More interesting to have CIA in your bed than your computer."Those were the days my friend ..." Quote Share this post Link to post
cm0s 118 Posted ... speaking of the old days serenacat that reminded me for jean clead's point,about linux being open also, it's just less popular out therebut yeah, old hardware, go as old as you can and still have your config function i do not trust anything new at all right now my boxes are pentium 4s with about a gig of ram in themone is literally out of a dumpster and i love that box it's all in the config, i can down a torrent with rtorrent, dump via t-shark, run suricata ids, my firewallbrowse the net with firefox and run my tor site plus other stuff around a gig of ram on a pentium 4 now the torrent app if it starts to really pull in will slow firefox down at times but most time it doesn't the average phone out there crushes my boxes but there ya go, bloat config probably one really good thing about microsoft getting so big jean clead, they took a lot of the malware bizwith them, i'll run clamav, unhide etc once in a while but like anyone else, get lazy on it that's the thing to remember kinda a diff between the general junk you encounter online and say stuff writtenfor your distro or specifically getting targeted Quote Share this post Link to post
zhang888 1066 Posted ... speaking of the old days serenacat that reminded me for jean clead's point,about linux being open also, it's just less popular out therebut yeah, old hardware, go as old as you can and still have your config function i do not trust anything new at all right now my boxes are pentium 4s with about a gig of ram in themone is literally out of a dumpster and i love that box it's all in the config, i can down a torrent with rtorrent, dump via t-shark, run suricata ids, my firewallbrowse the net with firefox and run my tor site plus other stuff around a gig of ram on a pentium 4 now the torrent app if it starts to really pull in will slow firefox down at times but most time it doesn't the average phone out there crushes my boxes but there ya go, bloat config probably one really good thing about microsoft getting so big jean clead, they took a lot of the malware bizwith them, i'll run clamav, unhide etc once in a while but like anyone else, get lazy on it that's the thing to remember kinda a diff between the general junk you encounter online and say stuff writtenfor your distro or specifically getting targeted This statement is basically useless without describing your threat model.Your CPU is missing basic security mechanisms such as SMAP and SMEP, I would not describe that as an advantage.http://www.phoronix.com/scan.php?page=news_item&px=MTE5NzIOf course if your threat model is just random internet malware there is nothing you should be concerned about. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
cm0s 118 Posted ... i don't think the reply was useless,simply pointing out ya don't need newer hardwareto get performance for me, i trust the older hardware more than the newer stuffby far, the other thing is tends to be less tracks on itsince older computers were bought/sold many times and if someone is at your cpu probably game over anyway right? have a good day Quote Share this post Link to post