An anonymous author who claims to be the hacker who penetrated controversial UK-based Gamma Group International and aired 40 gigabytes of data, has published a "how-to" guide for other hacktivists.
The Hacker Writes...
"I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma,
I'm writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started."
The do-it-yourself guide explains how hackers can map entryways into a target's network, scan for vulnerable services and exploit any that are found. It also lists some of the most common methods hackers use to keep their IP addresses and other digital fingerprints off their attacks. Among other things, the how-to suggests installing Whonix inside a hidden encrypted volume created by TrueCrypt and carrying out all operations from there. It also counsels against using Tor and instead using hacked servers.
Well you know...all this is illegal.
Well it's not confirmed that the author had any connection to the Gamma Group hack. Most notable of the news accounts so far is one reporting the government of Bahrain used the Gamma Group's FinFischer software to spy on citizens who were later tortured. With 40 GB of e-mails and other data in the open, it wouldn't be surprising for many similar other news to pop up.
Via
The Hacker Writes...
"I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma,
I'm writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started."
The do-it-yourself guide explains how hackers can map entryways into a target's network, scan for vulnerable services and exploit any that are found. It also lists some of the most common methods hackers use to keep their IP addresses and other digital fingerprints off their attacks. Among other things, the how-to suggests installing Whonix inside a hidden encrypted volume created by TrueCrypt and carrying out all operations from there. It also counsels against using Tor and instead using hacked servers.
Well you know...all this is illegal.
Well it's not confirmed that the author had any connection to the Gamma Group hack. Most notable of the news accounts so far is one reporting the government of Bahrain used the Gamma Group's FinFischer software to spy on citizens who were later tortured. With 40 GB of e-mails and other data in the open, it wouldn't be surprising for many similar other news to pop up.
Via
No comments:
Post a Comment