techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.4K
active users

#cracking

0 posts0 participants0 posts today

Quick-Drying, Fast-Cracking

Water droplets filled with nanoparticles leave behind deposits as they evaporate. Like a coffee ring, particles in the evaporating droplet tend to gather at the drop’s edge (left). As the water evaporates, the deposit grows inward (center) and cracks start to form radially. After just a couple minutes, the solid deposit covers the entire area of the original droplet and is shot through with cracks (right).

Researchers found that the cracks’ patterns and propagation are predictable through a model that balances the local elastic energy and and the energy cost of fracture. They also found that the spacing between radial cracks depends on the deposit’s local thickness. Besides explaining the patterns seen here, these cracking models could help analyze old paintings, where cracks could hide information about the artist’s methods and the artwork’s condition. (Image and research credit: P. Lilit et al.; via Physics Today)

While I am at it anyway; #Phishing meets #SMB: Exploiting network trust to capture #NTLM hashes (#pentesting fun)

One effective phishing method leverages SMB connections to capture #NetNTLM hashes for offline #cracking, providing attackers with credentials for the next phase (for example social engineering or other tech attacks). Oh; BIT B.V. (bit.nl) did send my a set of abuse mails, … sorry 😆 … but very nice and thx 🙏🏼, anyway;

Exploit Path: Initial Phishing Vector: The attack starts with a phishing email or download website or something something, containing a payload (e.g., a malicious document or shortcut file, whatever, choose your poison).

The payload initiates an SMB request to the attacker-controlled server (`\\<C2IP>\share`), tricking the victim’s system into authenticating with it. Modern browsers like edge won’t fly; you need to get a bit more creative to execute this and no it’s not a hyperlink. Think Java. Or macro (although; meh).

Then we have SMB Request Redirection: Tools like Responder on the attacker’s C2 server capture NetNTLMv2 hashes during these authentication attempts. This works over IPv4 and IPv6, with IPv6 often prioritized in networks and less monitored. Hence #mitm6. But that’s another story.

Captured hashes are cracked offline using tools like #Hashcat, potentially giving credentials for further attacks. It’s also an excuse for my new RTX 5090 card. 😉

Observations from recent penetration tests where I executed this attack;

-Firewall Rules: not excisting … at all. 🥹
Many environments have outbound 'any-any' rules on firewalls, even on critical nets like Citrix farms. This unrestricted outbound traffic allows SMB authentication requests to reach attacker-controlled servers on the internet. And there is something with remote workers and open internet access lately…
-#Azure and #2FA Gaps, here we go again (see lnkd.in/g2ctMEDG); 2FA exclusions are another common issue:
- Trusted locations (e.g., `192.168.x.x` or specific IP ranges) configured to bypass 2FA/MFA.. intended to improve usability, such exclusions can be exploited once an attacker gains access to these "trusted" locations; simply put a VM inside a 192.168 range and chances are…. Good.

These misconfigurations reduce the effectiveness of otherwise robust security measures like MFA and firewall segmentation, giving attackers unnecessary opportunities.

The Takeaway: Attackers thrive on overlooked gaps in configuration. Whether it's outbound "any-any" firewall rules or MFA bypasses for trusted locations, these lapses provide unnecessary pathways for compromise. By combining phishing, SMB exploitation, and tools like Responder, we can target foundational weaknesses in even hybrid environments. I’ve seen soc’s only respond after mission target; because most are monitoring just on the endpoint (EDR/XDR), poorly.

#CyberSecurity #Phishing #SMB #NTLM #MFA #FirewallSecurity #infosec

The meme is absolutely intended as shitposting. Sorry 🤣

Difference between the terms Hacking and Cracking stated by Mert sir of Free Software Foundation !
 

Mert sir works at Free Software Foundation. He is my teacher and mentor at FSF from whom i am learning how to create Self-hosted server for website, verification of Freedom software
ethicalsoftware.noblogs.org/po
#General #cracking #FreeSoftwareFoundation #hacking

ethicalsoftware.noblogs.orgDifference between the terms Hacking and Cracking stated by Mert sir of Free Software Foundation ! – Ethical software

“There is a crack in everything…”

When millimeter-sized drops of water infused with nanoparticles dry, they leave behind complex and beautiful residues. As water continues evaporating, the residues warp, bend, and crack. In this video, researchers set their science to the music of Leonard Cohen. The results resemble blooming flowers and flying water fowl. If you’d like to learn more about the science behind the art, check out the two open-access papers linked below. (Video and image credit: P. Lilin and I. Bischofberger; submitted by Irmgard B.; see also P. Lilin and I. Bischofberger and P. Lilin et al.)

PetroStates & Plutocrats pro-plastic politicians push Profits
theguardian.com/environment/20

More theguardian.com/environment/pl

Note: 2023, global plastics market was valued at 712 billion U.S. dollars. projected to reach a value of more than 1,050 billion U.S. dollars by 2033
statista.com/statistics/106058

( Giant Plastic Tap - Benjamin Von Wong, April 2024 #Ottawa Photograph: Dave Chan )
#blamecapitalism #cracking #environment #fracking #fossilfuels #microplastics #nanoplastics #pollution

“Catching Computer Crooks”, Popular Mechanics, 1984

The image at the top of this blog is, from what I can find, the first stock image photo of a hacker in a ski mask that ever appeared in print, carrying on a visual association between hackers and bank robbers or safe crackers that has continued since 1969.

How tropes and stereotypes originated and became perpetuated in the media is one of the main focuses of the realhackhistory project.

We can be almost certain of being wrong about the future, if we are wrong about the past.

Gilbert K. Chesterton

Illustration from “Superzapping in Computer Land”, TIME Magazine, January 12th, 1981

Before I try to define what this website and the associated YouTube and Mastodon accounts are all about I want to discuss what they aren’t.

This history research, documentation and analysis project is not about trying to dox hackers from the past, reveal secrets that could get people into legal peril or fuel hacking scene gossip. I’m not interested in when Java was invented or the anniversary of the first web browser being created here either though, we are talking about hackers. The ‘darkside’.

This project is about documenting the history of people like Neal Patrick in the video below, who became the face of hacking in 1983 after being raided by the authorities, along with his hacking group the 414s.

https://www.youtube.com/watch?v=dA3NuQdhu5U

Behind the blogs, the YouTube videos, FOIA documents, clips of funny hacker related TV shows or movies and the memes, realhackhistory is a genuine desire to keep the knowledge and stories of hackers of the past alive and provide some lessons that can still help people interested in hacking today.

I envision realhackhistory as a trail of breadcrumbs to help get you started on your way to understanding the past, and hopefully the present, of hacking better. Think of this as digital archaeology, if it makes it all sound cooler.

Information on the Internet is frequently wrong

If we start with some basic questions such as “what was the first computer virus?” or “when was the first denial of service attack?” and plug them into your search engine of choice you’ll start to notice something.

It isn’t that there are conflicting answers, some of these questions hinge on a subjective understanding of details such as what defines a computer virus, what operating system did it function on, what language was it coded in, etc. No, you start to notice how many answers that are clearly wrong are stated emphatically as fact.

We need an example, right? Let’s analyse this text below, from the online version of Encyclopedia Britannica:

The first documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon and eBay.

Encyclopedia Britannica, “denial of service attack” entry

Let’s unpack this. While it is true that mafiaboy carried out a widely reported on campaign of distributed denial of service (DDoS) attacks against high profile websites in 2000. This was not the first distributed denial of service attack and definitely not the first denial of service attack either.

Mafiaboy, an aficionado, but not originator, of denial of service attacks

Distributed denial of service attacks, called “Net Strikes” by participants, were organised by hacktivists in the mid 90’s against French government websites which involved getting people to manually refresh those websites at a set time. There was also a huge DDoS attack against Manhattan based ISP Panix in September of 1996.

The first denial of service attack over a computer network is widely believed to have been in 1974, when someone discovered a way to use a newly introduced feature in TUTOR to lock up other PLATO terminals remotely at CERL, the Computer-based Education Research Laboratory, at the University of Illinois Urbana-Champaign.

It doesn’t necessarily matter that there may have been other denial of service attacks before 1974, what matters I think is that the first denial of service attack was definitely not in 2000 and that this is incorrect information being presented as fact.

How did this clearly wrong history sneak into an encyclopedia? I would suspect the loop of incorrect information that begins to be circulated online and eventually becomes, through copying, regurgitation and repetition, accepted fact. Nobody bothers to go back to original sources, lazy journalism becomes grist for a slew of blogs which eventually becomes part of a reference book and then accepted fact.

Incorporating AI into search engines will only make this problem worse, if the average of all the information about the history of hacking is a bunch of copypasta in infosec marketing or lazy journalism then that is what the AI search function will regurgitate. Garbage in, garbage out.

Tracing attitudes to hackers in pop culture

Hackers were not always demonised, hacking was not always a part of pop culture and the word “hacker” itself was not widely used to describe anything other than a bad golfer until mid 1983. I’ve written a whole blog on the topic.

The ‘Whiz Kids’, from the 1983 TV show of the same name about teens who solve mysteries with the aid of computers, social engineering and hacking

We can look at how journalists wrote about hacking and hackers in the past and how hackers evolved as character archetypes and hacking became a trope in movies and television.

We can chart the way hackers are viewed, from novelty or curiosity through to menace and then back to heroic anti-heroes before lately becoming a facet of shadowy criminal gangs, as the view of hackers as professionalised “cybercriminals” takes hold in the public imagination.

The German poster for 1983’s WarGames, a movie about hacking in which the word “hacker” is never used

The 90’s saw an explosion of hacker and hacking related movies as people became unable to ignore the rise of the internet and computers became a part of every day life. I made a YouTube video about one such movie, The Net.

https://www.youtube.com/watch?v=ug3-h7nYV0Q

Hacker related documentaries, news segments and TV specials created by non-hackers provide a fascinating snapshot of the attitudes towards hackers and how hacking touched on current events at the time the documentary was filmed. I’ve put as many as I can find from over the years up on my YouTube channel.

Preserving & promoting hacker culture

While a lot of people have heard of 2600 Magazine, or the phrack e-zine, there is a lot more hacker culture created by hackers themselves out there waiting to be discovered.

Take published books about hacking written by hackers for instance, in the UK there was various editions of Hugo Cornwall’s book “The Hacker’s Handbook”, originally published in 1985. There was also infamous subversive publisher Loompanic’s book “The Computer Underground: Computer Hacking, Crashing, Pirating, and Phreaking” by M. Harry, which was also published in 1985.

  • “The Hacker’s Handbook”, original 1985 edition, by Hugo Cornwall
  • “The Computer Underground: Computer Hacking, Crashing, Pirating, and Phreaking” by M. Harry, Loompanics, 1985

Reading these books not only give us a snapshot of the scene at the time through the author’s eyes, but also a chance to read how hackers themselves defined a hacker.

This book uses the word in a more restricted sense: hacking is a recreational and educational sport. It consists of attempting to make unauthorised entry into computers and to explore what is there. The sport’s aims and purposes have been widely misunderstood; most hackers are not interested in perpetrating massive frauds, modifying their personal banking, taxation and employee records, or inducing one world super-power into inadvertently commencing Armageddon in the mistaken belief that another super-power is about to attack it.

Every hacker I have ever come across has been quite clear about where the fun lies: it is in developing an understanding of a system and finally producing the skills and tools to defeat it. In the vast majority of cases, the process of ‘getting in’ is much more satisfying than what is discovered in the protected computer files.

“The Hacker’s Handbook” – Introduction, Hugo Cornwall, 1985

Documentaries about hackers by hackers or people affiliated with the hacking scene are a more vivid look at some of the personalities who shaped scene history, or notable events that took place. Annaliza Savage’s “Unauthorized Access” released in 1994 is required viewing, as is “Hackers 95” by Phon-E and R.F. Burns, released in 1995 (of course), you can see a short clip of below.

https://youtu.be/7abDgYYXhks?si=8upHxOHKs8wB6jX2

Over at textfiles.com you can find an incredible resource in the form of archived hacker scene text files, from the BBS years up to the era of the world wide web. Among the files archived is a great many hacker e-zines, or electronic magazines, text and text ASCII art documents that were published on a regular or semi-regular schedule.

The most famous hacker e-zine is undeniably phrack magazine.

Basically, we are a group of phile writers
who have combined our philes and are distributing them in a group. This newsletter-type project is home-based at Metal Shop… These philes may include articles on telcom (phreaking/hacking), anarchy (guns and death & destruction) or kracking. Other topics will be allowed also to an certain extent.

phrack issue #1, Taran King, November 17th, 1985

Hacker media is also in print though, with magazines like the now defunct Technological American Party Magazine of the 1970s or Blacklisted! 411 back in the nineties or 2600, which is still going strong.

2600 Magazine issue 1, page 6, January 1984

2600 Magazine began in January of 1984 with an article discussing a criminal case that contributors to the magazine had been involved in the year before the first issue came out. It was a series of raids on young hackers across the U.S. that the FBI called “Operation Mainframe”. I created a video on one of the groups caught up in the FBI investigation, the Inner Circle.

https://www.youtube.com/watch?v=ppbx2POxxZU

2600 staff continued to be involved in hacking related incidents in the years after, as we can see from the article from 1985 below that notes that the editor of 2600 had his BBS seized by New Jersey police.

“Police hunt suspects” – Altus Times, 18th July, 1985

You can find scanned issues of publications like Blacklisted! 411 over at archive.org and you can subscribe to 2600 over at their website.

Freedom of Information Act requests

Locked away in dusty archives is a wealth of information on the history of hacking, specific hackers and hacking groups, held by government bodies and law enforcement agencies.

To paraphrase NatSecGeek, if you are willing to take five minutes to write a FOIA request and then to wait potentially years for that request to be fulfilled you can eventually find yourself with documents that can rewrite our understanding of events in the history of hacking. My inspiration for pursuing FOIA requests as part of realhackhistory has been the aforementioned NatSecGeek as well as hexadecim8 and their Hacking History project.

You can find the documents they have retrieved from various archives here, and you can find my uploads of responsive records over at archive.org.

If requesting FOIA documents can be a bit boring and laborious, receiving them makes me feel like a little kid on Christmas morning.

FOIA archive requests can turn up completely different versions of events that had long been considered to be definitively settled. Records can show us scans or photocopies of newspaper or magazine articles since lost to time, printouts of webpages that are no longer online and the chance to see how government agencies or law enforcement have viewed the computer underground over the years.

In requesting documents I have primarily focused on records relating to hacking incidents between 1980 and 2005, with a particular interest in records from the early to mid 1980’s as records can degrade or get lost over time.

Because of FOIA requests we can see that in 1983 some people were so upset about the FBI raiding high-school age hackers linked to the Inner Circle hacking group that they wrote their Senator in California.

Or we can see the actual photocopies of notes of targeted systems seized by the FBI from those same hackers.

The text files, e-zine and magazine articles written by hackers provide one part of the story, the newspaper articles and TV segments on hacking incidents provide another and FOIA documents are the last piece of the puzzle that we as hacker history enthusiasts can hope to get our hands on in terms of records.

I plan future blog entries on how to file FOIA requests, how to decide what to FOIA and some dead ends I have reached in relation to past hacker events and incidents that someone else might want to pick up the threads from.

In conclusion

So that’s it, an explanation as to why realhackhistory exists, long since overdue and the start of a call to action for others who are interested, to see what they can add to the public knowledge of the roots of the hacking scene.

If I can outline a roadmap for the future of the project, I want to expand my understanding of the history of hacking outside of the English speaking world, start finding countries outside of the U.S, the U.K. and Australia to FOIA and pursue freeing more media from closed archives.

I’d also like to take this time to thank the people who have inspired me along the way, in particular Gabriella Coleman, Emma Best and Emily Crose, for encouragement and guidance on this great journey.

If we don’t preserve our history, nobody else will.

https://realhackhistory.org/2024/10/22/muddled-history-of-the-digital-underground-why-realhackhistory-exists/

#1 #1980s #BBS #computer #cracker #crackers #cracking #darkSide #darkside #DDoS #encyclopedia #FBI #films #FOIA #hacked #hacker #hackers #hacking #historical #history #InnerCircle #IRC #mafiaboy #media #Movies #newspaper #police #television #TV #underground #WarGames

Two things make #Jack #Smith’s brief feel explosive despite much of it being revealed previously.

♦️First, Smith’s narrative is easy to follow because it’s presented chronologically,
beginning before the 2020 election with Trump telling his advisors that if he took an early lead on election night,
he’d simply declare victory before all ballots were counted.

Smith’s brief ends with him describing Trump’s still-ongoing praise of the actions of his supporters who breached the Capitol.

Trump, of course, has promised to pardon insurrectionists convicted of crimes, including those who assaulted police officers.

♦️The other thing that makes Smith brief so gripping is its rich detail.

Going through all the evidence was necessary for the special prosecutor to get around the US Supreme Court decision
where the conservative majority that normally pretends to be very into the actual text of the Constitution invented an entirely new form of immunity just for Trump.

Smith needed to show that Trump was engaging in unofficial, private acts rather than acting as the president when he tried to overturn the election. 

Despite the brief being a #cracking #read, at least as far as legal writing goes, one thing feels depressingly familiar as we live through our third Trump election cycle:
his perpetual assertion that the only way he could possibly lose is because of election fraud

♦️In a previous era, Special Prosecutor Jack Smith’s newly unsealed 165-page brief about whether Donald Trump is immune from prosecution would generate Watergate-level coverage.

These days, though, the document detailing the former president’s frantic efforts to steal the 2020 election had already rolled off the top of the New York Times and Washington Post’s homepages by Thursday morning. 
publicnotice.co/p/jack-smith-t

Public Notice · Jack Smith's bombshell immunity briefBy Lisa Needham