Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 55 56 [57] 58 59 ... 249
841
Seriously there have been exploits in the past for turning somebodies computer on the Gnutella network into a remote proxy, tricking it into downloading whatever you want it to, from whatever server you want it to, and storing it in its shared files ( which actually allows you to turn Gnutella into an anonymity network for yourself as well ;) ) . I wonder how many people arrested for sharing CP on this network even realize that such an attack is possible. In the majority of cases I highly HIGHLY doubt that the forensic analysts (who are sometimes trained for only a few months prior to being certified) going over the seized computers realize that such an attack is possible. They are not trained to look for things like this, they are trained to run P2P spidering software and basic software forensic tools that do all of the real work for them. Guess what, anybody who went to prison for having CP obtained from the Gnutella network, or who went to prison for having CP while running one of the many vulnerable Gnutella clients, did NOT get a fair trial if they did not know about this attack!

www.ics.forth.gr/~elathan/papers/gdos.acns06.pdf

Quote
3.2
Exploiting the HTTP protocol
A large number of HTTP requests that result in an HTTP 404 response code
may not be difficult to handle for a Web Server. The attack can be more efficient
if we can force the Gnutella peers to perform an actual download from the Web
Server. The download may not even be relevant to their search criteria Server.
This can be achieved by embedding a specifically constructed file name in the
QueryHit packet. For example, consider that a Query with search criteria “foo
bar” is received. The file name:

Quote
We have demonstrated how unstructured P2P systems can be misused for
launching DoS attacks against third parties. We have developed an attack that
exploits a number of weaknesses of unstructured P2P systems and manages to
instruct innocent Gnutella peers to generate a significant amount of traffic to a
victim host. The victim can be another Gnutella peer, but also a host outside
the Gnutella system, such as a Web Server.
Although the basic attack relies primarily on the ability to spoof QueryHit
responses, we also took advantage of the HTTP protocol used by Gnutella peers
for data transfers. This allowed us to construct malicious QueryHits that result in
downloads of arbitrary files from a target Web Server. An interesting observation
is that the use of HTTP in this case allowed the attack to “leak” to other systems
as well.
Finally, we have developed SEALING, an algorithm which aims at keeping
a local “Safe List” on each peer, containing IP addresses and port numbers of
hosts that have been characterized as non-Gnutella participants. Our algorithm
assumes that any connection from Gnutella participants to non-Gnutella partic-
ipants is a possible DoS attack.


Quote
Indeed, with modest effort we have managed to
develop techniques, which, if adopted by bogus peers, can result in DoS attacks
to third parties by redirecting a large number of peers to a single target host. In a
nutshell, whenever they receive a query, these bogus peers respond by saying that
the victim computer has a file that matches the query. As a result, a large number
of peers may try to download files from the unsuspected victim, increasing its
load significantly. Furthermore, we have developed mechanisms which trick this
large number of peers to actually download files from the unsuspected victim.
To make matters worse, in our methods, the victim does not even need to be
part of the P2P network but could also be an ordinary Web Server. Therefore,
it is possible for a significant number of peers attempt downloading files from a
Web Server, increasing its load and performing the equivalent of a DoS attack.

This attack can be used to get arbitrary people to download CP and put it in their shared files, and if it is carried out correctly Mr. 6 month forensic certificate is not going to be able to tell that this is what happened. Forensic analysts often are not going to be able to tell if somebody fell victim to this attack or if they actually downloaded and shared CP. And yet there are hundreds of thousands of people in prison right now for having downloaded CP off of gnutella and shared it. And probably NONE of them know about this!

842
I am going to talk about CP but only indirectly as computer forensics relates to it. First I need to define what I mean by computer forensics, as this title is used as a sort of catch all, applying to everything from cryptanalysis to traffic analysis to data recovery to data locating to remote hacking and spying. The goal of cryptanalysis is to decrypt encrypted data, it is not voodoo science and is actually essentially applied mathematics. The goal of traffic analysis is often to determine where a target is located, it is not really voodoo science because it can be extremely useful, especially when no countermeasures are being taken against it (however it can also be, and often is, extremely misleading).  The goal of data recovery is to obtain data that somebody has attempted to destroy, either via physical damage of a drive platter or possibly by overwriting a file. This is not voodoo science, people really try to delete or destroy electronic files and people in data recovery really do use techniques that sometimes allow them to recover deleted files. The goal of data locating is to find files that somebody tried to hide, this is not voodoo science either, an example would be using a database of fuzzy hash signatures to quickly scan a drive looking for previously identified illegal files. Remote hacking and spying is not really voodoo science either, it has the goal of penetrating a suspect computer and obtaining evidence off of it covertly. Remote hacking can give misleading results, but there are real vulnerabilities and there are real ways to exploit them.

However, all of these things taken as a whole, and coupled with the art of analyzing system logs looking for intelligence and evidence (ie: traditional computer forensics, building a timeline of activity, linking activity to a specific user, etc), are essentially voodoo science when used in the context of criminal investigations. Let me give you some examples. Let's say that Alice downloads a bunch of CP (I suppose she is a high school teacher..) , but since she doesn't want to get caught she uses her neighbors WiFi. Now the police pick up on the downloading of the CP due to traffic analysis (ie: Alice's neighbors IP address shows up in the logs of a CP site). Now the police send a team to raid Alice's neighbors house based on the intelligence their traffic analysts have gathered. Now Alice's neighbor probably doesn't have much to worry about these days, since in recent times (although not historically), the police analyze the WiFi around the modem detected accessing CP, and they will likely detect Alice if she engages in a pattern of behavior (although if she only does it once and never again, and she makes sure to spoof her MAC address, then she will likely never be identified and the buck will stop at her neighbor). Fortunately for Alice's neighbor Bob, even if Alice only uses his WiFi once with a spoofed MAC address, the police are going to very likely determine that Bob did not download CP, because they will seize his computer and send it to a forensics lab. They will scan his computer looking for illegal images and find likely none or just a few older jailbait pictures that are present on the drives of most people who look at amateur pornography, and which the police do not give a fuck about. They will analyze various logs looking for a sign that Bob accessed the CP site in question (or any CP sites at all) and they will find no evidence of this. They will look for signs that Bob wiped or deleted illegal images, such as traces in his swap space, logs of titles of known illegal images, etc, and they will find nothing. After a few weeks, Bob will get his computer back and the case will be closed.

Now let's imagine that Alice is a bit more sophisticated. She wants to prove that computer forensics are not capable of obtaining evidence beyond a reasonable doubt. So she creates a virus that infects computers through a vulnerability in Firefox. Bob goes to one of the malicious websites and becomes infected with the virus. First the virus determines that Bob is running a popular P2P file sharing program. Then it searches for some canned keywords looking for child pornography. Then it downloads the CP and stores it in Bobs shared files, perhaps hidden in such a way that Bob cannot easily detect the presence of the files. Then the virus deletes all traces of itself. Hell, it never even really needs to leave RAM in the first place! After a while the police traffic analysts discover that somebody with Bob's IP address is sharing CP. They raid Bob as before, first checking for the presence of a WiFi thief (and finding that there is none, hell Bob has his internet connection encrypted with WPA 2 even!). Now they send the computer to the forensic lab as before. Except this time, the forensics agents quickly detect thousands of CP images in Bob's shared folder! Furthermore, they find logs that Bob was active on the computer during the time the CP was downloaded in the first place! They know it must be Bob because Bob was also checking his E-mail at the same time the files were downloaded! Now Bob is charged with downloading and distributing CP. At court Bob argues that he must have been infected with a virus, but the forensic experts counter that they scanned his entire drive with every leading commercial anti virus software out there, and absolutely nothing was detected! The jury quickly sentences to Bob to twenty years in prison and lifetime registration as a sex offender, and the case is closed.

It is so easy for a skilled hacker to completely fool computer forensics, entirely, from traffic analysis all the way to the analysts at the lab. In fact, it is so easy that I would never be convinced of somebodies guilt based upon a forensic analysis of their computer system, even when accompanied with traffic analysis, hell even when coupled with cryptanalysis. Even remote hacking and spying can be misleading if there is an active agent attempting to create misleading results. Basic things like using your neighbors WiFi are not likely to get them in trouble, at least not these days, but it is still essentially trivial to frame anybody you want for a CP crime in such a way that they *will* be convicted. Computer forensics is *always* hoping that there is not such an agent, they are *always* hoping to be one step ahead of the 'bad guys' and in 98% of the cases they come to the correct conclusion with their analysis. The fact of the matter is though in those other 2% of cases they are going to come to an incorrect conclusion, and their training is not going to be sufficient enough that they can even consider it as a possibility, and certainly the jury is going to not believe the person who attributes his problems to a virus that was never detected because it literally left no trace.

843
Silk Road discussion / Re: ANONYMOUS
« on: July 05, 2013, 09:10 am »
I'm really not arguing with any of your logic. But I am not getting into any discussions about CP. I think Anonymous needs a purge and a little more structure or everyone just looks like a bunch of script kiddies and nerds.

Anonymous reminds me of the proletariat in 1984. Not the part about them being ignorant and whatnot, the future lies with the proles because they are human.

Probably should expect some serious amounts of George Orwell in here...

I am not discussing CP, I am discussing how retarded anonymous is and how much the media eats it up. It isn't my fault that Anonymous "hacked" a CP site.

844
Philosophy, Economics and Justice / Re: To catch a predator
« on: July 05, 2013, 09:09 am »
Yeah they are idiots beyond any doubt. It is a stupid risk to take, at least from my perspective. A lot of them don't seem to be exclusive ephebophiles or hebephiles either, although for the ones who are I guess I can understand why they would take such a risk. If they are trying to meet up with 12 year olds or 13 year olds I don't feel so bad for them, although they are still clearly no where near as bad as someone trying to fuck a 5 or 6 year old. I think the law in USA differentiates between over 12 and under 12, as well as over 16 and under 16 in the states that have an age of consent over 16. I mostly just feel bad for the ones who get busted trying to fuck 14+ year olds though, particularly so if they are 16+ considering that is legal in the majority of the USA as well as the vast majority of the world. It makes no sense that somebody doing something in one state is a sexual predator, but somebody doing the same thing just a few miles away across state lines is considered to be normal. Then again, it doesn't make much sense that somebody doing something in Spain should be considered normal while somebody doing the same thing in the USA is considered a dangerous sexual predator. It is very arbitrary and people tend to just go along with whatever their own microscopic community has predetermined for them, even if they claim otherwise. Obviously pretty close to nobody wants their 12 year old daughter to have sex with some 50 year old, but it seems strange to me that people seem to think that 12 year olds want to have sex with 50 year olds in the first place. 99 percent of the time I imagine that if a 50 year old proposes sex with a 12 year old, the 12 year old will be disgusted and probably freak out about it. Hell, in most cases a 20 year old wouldn't want to have sex with a 50 year old.

845
Security / Re: Fucking infowars spam bot
« on: July 05, 2013, 04:09 am »
Hm probably rater. Anybody remember him?

846
Security / Re: US Postal Service Photographs All Paper Mail
« on: July 05, 2013, 03:17 am »
But how much priority and express mail goes through the US each week? You would have to flag a package (priority or express) that is probably out of any major sorting facilities in 48 hours and en route to rural areas.

So you specifically target and intercept one or two packages and do what with them exactly?

Open them?

Where's the warrant?

Unless your return address is flagged (from LE knowing the return address) I don't see the grounds for a lost or opened package via a warrant if the package is simply linked to being tracked with TOR. Logistically it makes no sense. If you have a dick fuck ton of orders going out and whatnot then yeah, probably not good to use TOR via USPS.

But who actually does that? You can check tracking via a third party with TOR, so now we're discussing tradecraft and semantics instead of TOR tracking flagging packages.

What about a vendor who sends one or two orders every few days and checks them 48-72 hours or even later via TOR?

The warrant is issued after the dogs hit on the package. Also, customs doesn't need a warrant to open whatever the fuck they want. Yes even the shipping address could be flagged, checking tracking with Tor is a horrible idea whether it is the customer doing it or the vendor doing it. I am thankful that I work with vendors who know not to look up my shipping address on Google Maps with Tor, or to check the tracking on my packages with Tor, but I am under the impression that a lot of noob vendors are under estimating or disregarding the extremely serious intelligence leaks caused by this sort of behavior.

847
Silk Road discussion / Re: ANONYMOUS
« on: July 05, 2013, 02:49 am »
l33t hackers don't think hide my ass is going to anonymize them, especially after they publicly announce that they use HMA as their VPN. Some of the hackers in anonymous are intermediate level, but they are few and far between. And I have not seen any elite hackers claiming to be part of anonymous. And considering the intermediate hackers are few and far between, they are essentially rough diamonds in a sea of shit.

Fact: Anonymous logs into lolita city (felony punishable by minimum five years imprisonment and registration as sex offenders) and gets the public member list of pseudonyms, then posts it on less illegal parts of the internet

Fiction: Anonymous brings CP traders on Tor to their knees after using l33t haxx0ring skillz to penetrate the darkest corners of the ciphernet, releasing the names of thousands and thousands of pedophiles!!!!111111

Fact: Anonymous gets a few thousand people to run primitive DDoS script causing temporary traffic spikes and transient unreachability to government sites

Fiction: Leet anonymous haxx0rs totally pwn highly sensitive government sites, they must have penetrated through world class security, muahahhaha

anonymous fiction is what is always reported in the media, but the facts are always completely meh. Half the time they are completely fucking wrong about the conclusions that their l33t haxx0ring brings them to as well.

848
Security / Re: US Postal Service Photographs All Paper Mail
« on: July 05, 2013, 02:36 am »
There isn't much of a debate about checking tracking with Tor. Even if we stupidly assume that they do not monitor for this, it only takes a basic level of tech education to realize how trivial it would be for them to check for this and flag all packages checked with Tor. Packages checked with Tor almost certainly contain contraband, and given how trivial it is to detect packages which have tracking checked with Tor, it is obviously a trivial system that would result in a high success rate.

849
Security / Re: US Postal Service Photographs All Paper Mail
« on: July 05, 2013, 02:17 am »
Let's just everyone relax.  I'm not lawyer, but I do know I'm innocent until proven guilty here in the US of A!  That means that they must prove that I received contraband in the mail.  A paper trail isn't going to mean a thing if they can't obtain the evidence.  If I was accused of receiving contraband but they have not found any contraband I'd hire a good lawyer and say nothing.  I'd hire a good lawyer and say nothing anyways.

Intelligence != evidence. There is a high chance that this system resulted in multiple interceptions in the past, if a vendor ships out ten big packages at once and then one of them is intercepted, guess which packages are going to be scrutinized most heavily? The ten sent immediately before and after the one that was intercepted. I have noticed that bulk interceptions tend to happen in clusters, if one person has 1 kg of MDMA intercepted then all of the people sent MDMA in that shipping period have their orders intercepted as well. I have seen the same thing happen with bulk crystal LSD and other things. I would bet that it went something like this:

A. Vendor sends 10 people bulk orders at the same time
B. Dumbfuck customer checks his packages tracking with Tor which flags it
C. Customs discovers it is loaded with bulk amounts of drugs
D. Customs queries for all packages sent immediately before and after the intercepted package
E. Customs intercepts 10 packages that are now flagged

I am almost positive scenarios like this have unfolded before.

850
Silk Road discussion / Re: ANONYMOUS
« on: July 04, 2013, 10:47 pm »
I think anonymous is stupid. 95% of what they have done is either nothing-related-to-hacking that they call hacking and then get the stupid as shit media to call hacking, basic script kiddie shit or volunteer botnet DDoS. They get way more credit than they are due for such trivial forms of computer mischief, and more than anything else they are just egotistical media manipulators.

851
I've said it before and I'll say it again, where's the incentive to bust SR vendors and buyers from the USPS stand point?  The DEA is an entirely different entity than the USPS.  Sure they may collaborate when a USPS worker discovers a stinky package or something obvious, but other than that the USPS is surely willing to look the other way for a few pills or a sack of weed.  It's just hurting their bottom line if they try to muscle us out of sending packages.  Last time I made a similar comment someone posted that we are a very small percentage of the USPS bottom line.  I can't argue against that, but what I will say is if you were a business owner and your business was in the shitter, would you really be going out of your way to remove and prevent packages from being sent?  The USPS has made public statements saying we don't want postal workers putting themselves at risk by carrying around drugs on the streets and delivering them.  That makes sense, but when's the last time you heard about a postal worker getting jumped and robbed for his package of drugs he was delivering?  I think the USPS just made a public relations statement and it stops there. 

Anyone watch that show American Greed?  I watched an episode one time where a guy was running a ponzi scheme and kept writing bad checks to people.  The bank he was using allowed him to run the ponzi scheme though.  Later the victims of the fraud stated that the bank must have known.  Why didn't the bank turn him in?  Because every time his checks bounced he paid the bank their fees.  They said that this guy paid over $100,000 in bad check fees over the year or two he was doing this fraud. 

My point is money talks.  In the US of A it's all about where the money's at.  And the fact is we're providing money to the USPS and they don't have the money and resources to tackle the issue.  We've got terrorism to fight.  That's top priority.  That's why the dogs sniff for bombs not drugs at the USPS.  If they sniffed for drugs the dogs would be barking non stop and an entire postal inspectors day would be spent busting people for drugs and a bomb might slip through the cracks and that's the worst possible thing.

Have you never heard of the USPI or ICE? The USPI is the agency that has the job of detecting illegal packages sent through the USPS. It is their entire damn job.

852
Another day / it's just the same as the last
Think of the past - I used to cry, now I try till' I laugh , why?
time flies fast, watched it pass by - the futures here /
Once pictured freedom in my mind / but it never appeared
only more misery and fear, but no more tears
because I'm far from lonely here, surrounded by peers
and we're on the same page, in the same cages
the same slaves just at different stages, hey,
beats wonderin' if today's the day, police take me away,
or tokin' haze - to glaze my open eyes / to our broken lives /
the product of their hopeless lies

Is that original?  I really like that one, man.  I really like that one a lot.

Yeah it is original and thanks :). I would say the style is influenced by tupac though. I can rap like lil wayne too and it is actually the most fun to write rhymes in that style, but it tends to be more frivolous and just demonstrating a technical expertise of rhyme rather than meaningful from the heart. I actually wrote several poems on SR under the name poems, I can post under that name if anyone needs confirmation but just to highlight

more lyrically fun:

im a fire spidda you could call me a dragon man
im fuckin widda crew of loose cannons and baggin grams
instrumental killa - get a beat ill decapitate it
fuck spittin out whack - im calibrated
in fact i'm elevated , while hella faded collaborated with the beat
 but then I gotta fade it, cuz it cooperated, corroborated so I spit sprayed it
slayed it, that shit be weapon graded
my wits sharp , i'm quick shit i'm switch bladed
haters they some big bitches like fat ladies
im blazed up smokin that kush lookin to raise up
was aged up broken then booked and caged up

(I never found a good way to finish this. Wrapping down is a challenge. Starting is often a challenge as well but generally something that signifies genesis works the best, tho if it is just for lyrical fun then i'm --- is a good starter as well).



and more meaningful things, here is my LSD ego death

Once released,
I rose up and decayed into little pieces
then everything blew away
leaving infinite peace
revealing everywhere through space and time
unveiling the concealing by my human mind of what's whole
many bodies and kinds yet one soul
in my vision our division appeared clearly separated
then it faded away, alleviating my fear and pain


mostly I just write rhymes because it is fun and gives me something to do, and I have done it pretty consistently since I was 12 or so and that makes it fun to see improvement (tho I rarely save anything other than to memory). I never really intended to share anything. I actually wouldn't even say any of these are finished, I take from old material and redo it and mix it up quite frequently.

853
Another day / it's just the same as the last
Think of the past - I used to cry, now I try till' I laugh , why?
time flies fast, watched it pass by - the futures here /
Once pictured freedom in my mind / but it never appeared
only more misery and fear, but no more tears
because I'm far from lonely here, surrounded by peers
and we're on the same page, in the same cages
the same slaves just at different stages, hey,
beats wonderin' if today's the day, police take me away,
or tokin' haze - to glaze my open eyes / to our broken lives /
the product of their hopeless lies

854
Oh I didn't realize it was still possible for people to delete their own threads. That is probably what happened in at least some of the cases. I think that 'feature' should be removed personally, it sucks to have a ten page thread full of great info entirely disappear because the OP saw a cop car drive by and wants to delete all traces of their account.

855
Silk Road discussion / Re: I Believe
« on: June 30, 2013, 06:21 am »
I belieeeeeveee I can fllllllyyyyyeeeeeeyyeyeyeyyeyeyey

Pages: 1 ... 55 56 [57] 58 59 ... 249