[ / / / / / / / / / ] [ dir / 2hu / egy / fur / newbrit / pone / sl / tk / v9k ][Options][ watchlist ]

/pol/ - Politically Incorrect

Politics, news, happenings, current events

Catalog

banner
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

INTERNET PEOPLE NEED HOTPOCKETS AND A HOLOCAUST

File (hide): 13ae1ed43154c9f⋯.jpg (84.26 KB, 747x566, 747:566, Secret CIA Tools That Atta….jpg)

[–]

f3e1d8 (1) No.9858137>>9858594 [Watch Thread][Show All Posts]

WikiLeaks published on May 5 "Archimedes", a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA.

https://wikileaks.org/vault7/#Archimedes

This technique is used by the CIA to redirect the target's computers web browser to an exploitation server while appearing as a normal browsing session, the recent leak discovered.

Release today of CIA 'Archimedes' malware documentation includes hashes which can be used for virus detection https://t.co/wkLiuM1iaW pic.twitter.com/3Eoj2bPzYl

— WikiLeaks (@wikileaks)

"Today, May 5th 2017, WikiLeaks publishes 'Archimedes', a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target's computers web browser to an exploitation server while appearing as a normal browsing session," the press release read.

The previous batch of the documents called The Scribbles was released on April 28.

On March 7, WikiLeaks began publishing what it said was a large archive of classified CIA-related files. The first part of the release shed light on hacking techniques developed and employed by the agency, including programs targeting all major computer operating systems.

According to the website, a large archive comprising various viruses, malware, software vulnerability hacks and relevant documentation, was uncovered by US government hackers, which is how WikiLeaks gained access to some of the data from the trove.

The "Year Zero" batch was followed by the "Dark Matter" released on Match 23. The third batch called "Marble" was released on March 31. The "Grasshopper" batch revealing a platform for building malware was released on April 4. The HIVE batch revealing top secret CIA virus control system was released on April 14.

The first batch of Wikileaks' CIA revelations shed light on a technology allowing to turn on a Samsung smart TV set's audio recording capabilities remotely which had been designed by the CIA and the UK Security Service MI5.

In March 2016, WikiLeaks published over 8,700 classified CIA documents that revealed the agency's hoarding hacking technologies and listed major operating system vulnerabilities.

On April 21, WikiLeaks presented a user guide for CIA's "Weeping Angel" tool, a surveillance program using Samsung smart TV sets.

https://archive.fo/0OwFA

https://sputniknews.com/world/201705051053304895-wikileaks-cia-archimedes/

ad2a04 (1) No.9858180>>9858375 >>9862567

Notice how this is being slid? Bump.


bd6dbc (1) No.9858375>>9858626

>>9858180

Well, the thread title/subject line is pretty crappy, but it is important.


c0ece5 (1) No.9858594

>>9858137 (OP)

Thanks Mendax


caee45 (1) No.9858626>>9858758

>>9858375

Isn't this the 3rd or 4th time they've released alphabet agency hacking tools in the past month or so?


c455a7 (1) No.9858758>>9858921

>>9858626

are you illiterate?

in this thread

> "Year Zero" on March 7

> "Dark Matter" on Match 23

>"Marble" on March 31

> "Grasshopper" on April 4.

> "HIVE" on April 14.

>"Weeping Angel" on April 21

>"Today, May 5th 2017, WikiLeaks publishes 'Archimedes'

so ya… 3 or 4


7488b7 (1) No.9858921

[pop]YouTube embed. Click thumbnail to play.

>>9858758

>Archimedes

Obligatory video


afe036 (1) No.9858939>>9860695 >>9861971

File (hide): 19311969d9fb8ee⋯.jpg (104.28 KB, 1024x768, 4:3, Uplink LAN hacking.jpg)

wikileaks.org/vault7/document/Archimedes-1_0-User_Guide/page-2/#pagination

>Archimedes is used to redirect LAN traffic from a target's computer through an attacker controlled computer before it is passed to the gateway. This enables the tool to inject a forged webserver response that will redirect the target's web browser to an arbitrary location. This technique is typically used to redirect the target to an exploitation server while providing the appearance of a normal browsing session. For more tool information please refer to the original Fulcrum 0.6.1 documentation.

wikileaks.org/vault7/document/Fulcrum-User_Manual-v0_62/

>There are two basic components to this pivoting technique: the ARP based man-in-the-middle (MITM) and TCP session hijack for HTTP traffic injection. Specially crafted HTTP responses are sent to the target in response to HTTP requests made by the target by hijacking the TCP session. These responses deliver the originally requested content as well as the wax.

I was expecting something a bit fancier, like a way to bypass router security or something. This thing only works if you can execute arbitrary code on a machine on the LAN, right? Not really useful for 400-pound basement-dwellers, although I suppose it could be extremely useful for corporate moles.


36be46 (1) No.9859017>>9860695 >>9862240

File (hide): 9bc4e366bf00621⋯.png (1.78 MB, 960x1440, 2:3, ClipboardImage.png)

Why is it that every time I see the code names these programs were given by the CIA, I automatically think they watched too much of pic related?


436d84 (1) No.9860067

bump


66f31d (2) No.9860695>>9860783

>>9859017

Fucking true, or CSI……. ugh seriously, who wastes this much time into making

>>9858939

This gui, I haven't read have to save it for tomorrow, but by the looks of it, they have actually wasted 6 million hours on creating their own GUI rather than just using some existing framework and focus on le hack. Sure it's handy to render on d3d surface some times for illustration purposes, but for a hack…. c'mon… No wonder this has been a costy affair. some hours on the actual malware, 6 million hours and shitloads of shekels cuz TV movies and series


66f31d (2) No.9860712

Also the GUI/HMI looks like absolute

SHIT

hey look the bottom right viewport there, man that's a good ol 90ies look. Reminds me when I started coding assembly and was limited to 256 colors.

YAY I shade the blues

Kill me.

Left part looks like a typical HMI in factory - the vaults, pressure and whatnot sensors


406ad8 (1) No.9860783

>>9860695

>this gui

thats a vidya gaem, not the CIA hack


b76604 (1) No.9861757

Get'cher guns'ere, boyos!


b74f75 (1) No.9861971

>>9858939

>using gradients on icons

>hackereze colour palette

kek.


e1a7d5 (1) No.9861975>>9862068

mods please sticky


d4422f (1) No.9862068

>>9861975

Looks like right on cue lol


b9f107 (1) No.9862146>>9862158 >>9862168

File (hide): 0ec8ce950b60777⋯.jpg (99.58 KB, 627x572, 57:52, Untitled.jpg)

Has anyone noticed the wikileaks tweets about the french election???

Dont trust these leaks.

The alphabets outed themselves.

Marine Le Pen has no chance goyim, the (((polls))) said so.


2b6a11 (2) No.9862158>>9862168

>>9862146

You can always see things from an accelerationist point of view if Macron wins. Obama did more to wake up white people than Trump ever did.


1344d9 (1) No.9862168>>9862182

>>9862146

D-Don't look goyim please

>it's all nothing

>wikileaks isn't both challenging the French to step up and deflecting the blame.

>>9862158

>than Trump ever did

1005 days in faggot, have fun with the 7+ years


2b6a11 (2) No.9862182

>>9862168

He's already set a bad precedent, if he wants re-election he'll have to do a lot better.


e4b0b7 (1) No.9862240>>9862571 >>9862574

>>9859017

Some of the best programmers have trouble naming variables or projects due to autism or the concept itself being difficult to explain in a simple word by natural language. Because programming at an advanced level is more philosophy than arithmetic. If you look at most of the complex algorithms you'll find in research papers its mostly _v1, (_f2 arg1 arg2) and _c3:m0


3e30a9 (1) No.9862567

>>9858180

Not everything is a deliberate conspiracy

Sometimes important news get few replies simply because there isnt much for the overage reader to comment on.


a4d07b (2) No.9862571>>9862574

>>9862240

This. I've given shit I've programmed more "accessible" names just so that other programmers who step in can grasp it when, technically, I should've titled them something more "abstract" (generalized).


a4d07b (2) No.9862574

>>9862240

>>9862571

Also, if you ever hear a programmer state that:

"Now you're just arguing semantics…"

… then they're probably shit. Semantics is everything when it comes to programming.




[Return][Go to top][Catalog][Screencap][Update] ( Scroll to new posts) ( Auto) 10
24 replies | 3 images | 22 UIDs | Page ???
[Post a Reply]
dead baby
[ / / / / / / / / / ] [ dir / 2hu / egy / fur / newbrit / pone / sl / tk / v9k ][ watchlist ]