hack back reading and questions for 7/5

Questions:

* Would ITS approve of HackBack’s actions?

* Is sending money to Rojava “because they can accept money from a criminal and need the attention” an example of good international solidarity?

* In the Hacking Team write-up, HackBack says “That is the beauty and the asymmetry of hacking: with only a hundred hours of work, one person can undo years of work of a multimillion-dollar company. The hacking gives us the possibility of the dispossessed fight and win.” How do you feel about the affect technology can have on power?

https://motherboard.vice.com/read/the-vigilante-who-hacked-hacking-team-explains-how-he-did-it

https://medium.com/@B_meson/hackback-an-interview-320a6ac4a1b4#.a9povrb7f

Excerpts from their Gamma hack write-up:

A DIY Guide for those without the patience to wait for whistleblowers

–[ 1 ]– Introduction

I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started. And trust me, once you’ve learned the basics you’ll realize this really is easier than filing a FOIA request.

–[ 10 ]– Outro

You’ll notice some of this sounds exactly like what Gamma is doing. Hacking is a tool. It’s not selling hacking tools that makes Gamma evil. It’s who their customers are targeting and with what purpose that makes them evil. That’s not to say that tools are inherently neutral. Hacking is an offensive tool. In the  same way that guerrilla warfare makes it harder to occupy a country, whenever it’s cheaper to attack than to defend it’s harder to maintain illegitimate authority and inequality. So I wrote this to try to make hacking easier and more accessible. And I wanted to show that the Gamma Group hack really was nothing fancy, just standard sqli, and that you do have the ability to go out and take
similar action.

Solidarity to everyone in Gaza, Israeli conscientious-objectors, Chelsea
Manning, Jeremy Hammond, Peter Sunde, anakata, and all other imprisoned
hackers, dissidents, and criminals!

Full read available here: http://0x27.me/HackBack/0x00.txt (it gets technical)

Excepts from their Hacking Team write up (poorly machine-translated from
Spanish, sorry):

– [1 – Introduction] ——————————————- —————-

You’ll notice the language change since the last edition [1]. Speaking world English already has books, lectures, guides, and information about spare hacking. In this world there are many better I hackers, but unfortunately They squander their knowledge working for contractors “defense” for intelligence agencies to protect the banks and corporations and
to defend the established order. The hacker culture was born in the US as a counterculture, but that source has remained in mere aesthetics – the rest has It has been assimilated. At least they can wear a shirt, dye her hair blue, hackers use their nicknames, and feel rebels while working for the system.

Before someone had to sneak into the offices to filter documents [2]. a gun to rob a bank was needed. Today you can do it from  bed with a laptop in hands [3] [4]. As the CNT said after the  Gamma hack Group: “we try to take another step forward with new forms of struggle “[5]. The hack is a powerful tool, let us learn and  let’s fight!

[1] http://pastebin.com/raw.php?i=cRYvK4jb
[2] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
[3] http://www.aljazeera.com/news/2015/09/algerian-hacker-hero-hoodlum-150921083914167.html
[4] https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf
[5] http://madrid.cnt.es/noticia/consideraciones-sobre-el-ataque-informatico-a-gamma-group

– [2 – Hacking Team] —————————————— —————-

Hacking Team was a company that helped governments to hack and spy on journalists, activists, political opponents, and other threats to their power [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11]. And, very occasionally, criminals and terrorists [12]. A Vincenzetti, CEO, liked to finish his post with the fascist slogan “boia chi molla”. It would be more successful “boia RCS sells chi”.
They also claimed to have technology to solve the “problem” of Tor and darknet [13]. But seeing that I still have my freedom, I have my doubts about their effectiveness.

[1] http://www.animalpolitico.com/2015/07/el-gobierno-de-puebla-uso-el-software-de-hacking-team-para-espionaje-politico/
[2] http://www.prensa.com/politica/claves-entender-Hacking-Team-Panama_0_4251324994.html
[3] http://www.24-horas.mx/ecuador-espio-con-hacking-team-a-opositor-carlos-figueroa/
[4] https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/
[5] https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/
[6] https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/
[7] http://focusecuador.net/2015/07/08/hacking-team-rodas-paez-tiban-torres-son-espiados-en-ecuador/
[8] http://www.pri.org/stories/2015-07-08/these-ethiopian-journalists-exile-hacking-team-revelations-are-personal
[9] https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/
[10] http://www.wired.com/2013/06/spy-tool-sold-to-governments/
[11] http://www.theregister.co.uk/2015/07/13/hacking_team_vietnam_apt/
[12] http://www.ilmessaggero.it/primopiano/cronaca/yara_bossetti_hacking_team-1588888.html
[13] http://motherboard.vice.com/en_ca/read/hacking-team-founder-hey-fbi-we-can-help-you-crack-the-dark-web

– [3 – Be careful out there] —————————————- ——

Unfortunately, our world is upside down. Enriches you do bad things  and imprisons you do good things. Fortunately, thanks to the work hard for people such as “Tor project” [1], you can keep you from getting into the jail by a few simple guidelines:

– [17 – Conclusion] ——————————————- —————-

It is done. So easy it is to tear down a company and stop their abuses human rights. That is the beauty and the asymmetry of hacking: with only a hundred hours of work, one person can undo years of work of a  multimillion-dollar company. The hacking gives us the possibility of the dispossessed  fight and win.

Hacking guides often end with a warning: This information is
only for educational purposes, I am an ethical hacker, not attacks on computers without permission, gobbledygook. I will say the same, but with a more rebellious concept hacking “ethical”. Filter ethical hacking documents would expropriate money banks, and protect computers of ordinary people. However, the Most people who call themselves “ethical hackers” work only to protect those who pay their consulting fee, which often are the they most deserve to be hacked.

Hacking Team see themselves as part of a tradition of inspiring Italian [1] design. I see them Vincenzetti, your company, and their cronies police, police, and government, as part of a long tradition of Italian fascism. I want to dedicate this guide to the victims of the assault on the Armando Diaz school, and all those who have shed their blood on hands Italian fascists.

[1] https://twitter.com/coracurrier/status/618104723263090688

– [18 – Contact] ——————————————- ——————

To send spearphishing attempts, death threats written in Italian [1] [2] and to give me 0days or access within banks, corporations, governments etc.

[1] http://andres.delgado.ec/2016/01/15/el-miedo-de-vigilar-a-los-vigilantes/
[2] https://twitter.com/CthulhuSec/status/619459002854977537

Full read available here: http://pastebin.com/raw/GPSHF04A (again, gets technical)

Finally, a short write up about their hack of Sindicat de Mossos
d’Esquadra (Catalonian police union):

http://pastebin.com/raw/x2LmFzxT

Leave a Reply

Your email address will not be published. Required fields are marked *

This blog is kept spam free by WP-SpamFree.