Flashback bygger pepparkakshus!
  • 1
  • 2
2011-02-20, 11:04
  #13
Medlem
Simson1s avatar
Denna info tyckte jag var mest intressant från HBGary-dumpen:

how HBGary wrote backdoors for the government
http://arstechnica.com/tech-policy/n...overnment.ars/
Citera
2011-03-14, 22:30
  #14
Medlem
WriteMasterTMs avatar
Citat:
http://english.aljazeera.net/indepth...026464808.html

The emails make it clear that HBGary sold rootkits and keyloggers (tools to record and exfiltrate keystrokes surreptitiously) to government contractors for prices between $60,000 and $200,000 each.


Even next generation rootkits were explored - to remain active despite the removal of a hard drive or to persist on a machine through the video card.


Antar att de menar grafikkortet när de skriver video card.
Har alla grafikkort svängdörrar eller finns det säkra grejer att köpa.

Och man blir tydligen inte av med rootkitet genom att formattera ?
Citera
2014-02-02, 15:56
  #15
Medlem
gaphalsens avatar
Citat:
Ursprungligen postat av Flu
Här är en jävligt intressant artikel som beskriver i detalj hur hacket genomfördes:

Arstechnica: Anonymous speaks - The inside story of the HBGary hack

Mycket intressant att läsa!!

Citat:
Alas, two HBGary Federal employees—CEO Aaron Barr and COO Ted Vera—used passwords that were very simple; each was just six lower case letters and two numbers. Such simple combinations are likely to be found in any respectable rainbow table, and so it was that their passwords were trivially compromised.

For a security company to use a CMS that was so flawed is remarkable. Improper handling of passwords—iterative hashing, using salts and slow algorithms—and lack of protection against SQL injection attacks are basic errors. Their system did not fall prey to some subtle, complex issue: it was broken into with basic, well-known techniques. And though not all the passwords were retrieved through the rainbow tables, two were, because they were so poorly chosen.

HBGary owner Penny Leavy said in a later IRC chat with Anonymous that the company responsible for implementing the CMS has since been fired.

Still, badly chosen passwords aren't such a big deal, are they? They might have allowed someone to deface the hbgaryfederal.com website—admittedly embarrassing—but since everybody knows that you shouldn't reuse passwords across different systems, that should have been the extent of the damage, surely?

Unfortunately for HBGary Federal, it was not. Neither Aaron nor Ted followed best practices. Instead, they used the same password in a whole bunch of different places, including e-mail, Twitter accounts, and LinkedIn. For both men, the passwords allowed retrieval of e-mail. However, that was not all they revealed. Let's start with Ted's password first.

Along with its webserver, HBGary had a Linux machine, support.hbgary.com, on which many HBGary employees had shell accounts with ssh access, each with a password used to authenticate the user. One of these employees was Ted Vera, and his ssh password was identical to the cracked password he used in the CMS. This gave the hackers immediate access to the support machine.

Most frustrating for HBGary must be the knowledge that they know what they did wrong, and they were perfectly aware of best practices; they just didn't actually use them. Everybody knows you don't use easy-to-crack passwords, but some employees did. Everybody knows you don't re-use passwords, but some of them did. Everybody knows that you should patch servers to keep them free of known security flaws, but they didn't.

http://www.hbgary.com/

Är det jag som letat dåligt eller finns inget om det som ägt rum tillgängligt via deras hemsida?
Citera
2014-02-04, 07:27
  #16
Medlem
länk
Den 10 mars 2012 skriver Peter Bright

With arrests, HBGary hack saga finally ends

A little over a year ago, small security firm HBGary Federal made the news for all the wrong reasons: it had been hacked, its CEO had been made a laughing stock, and its private e-mails were splashed across the Internet.

28 year-old Hector Xavier "Sabu" Monsegur was arrested by federal agents in June last year, and has since been co-operating with the FBI. That co-operation led to the capture of Ryan "Kayla" Ackroyd, 23, Jake "Topiary" Davis, 19, and unnamed teenager "tflow", 16, in the UK for, among other crimes, their participation in the HBGary hack. Darren "pwnsauce" Martyn, 19, in Ireland, has been named and indicted, but not yet arrested.

The HBGary hackers collectively called themselves Internet Feds. They then started working under the name LulzSec, rapidly achieving infamy for a series of high-profile break-ins (victims including PBS, Sony, and Nintendo) and denial-of-service attacks. But by late September 2011, everyone in LulzSec except one member, avunit, had been identified, and every identified member except pwnsauce had been arrested.

Who exactly did what in the HBGary hack remains unclear. The hack had several stages: the initial break-in, the theft of the e-mails, and then the destruction of Hoglund's server. Publicly, the hacking of Hoglund's server was the work of a "16 year-old girl," with Kayla habitually claiming to be a female teenager. In chatlogs leaked by Wesley "Laurelai" Bailey and published by Backtrace Security (the group that successfully named Sabu months before he was arrested), however, Sabu claimed responsibility for the entire attack.

Citat:
Speaking to Ars this week, Butterworth said that HBGary was pleased at the arrests, and warned "There really is no such thing as anonymity on the Internet."
Citera
  • 1
  • 2

Skapa ett konto eller logga in för att kommentera

Du måste vara medlem för att kunna kommentera

Skapa ett konto

Det är enkelt att registrera ett nytt konto

Bli medlem

Logga in

Har du redan ett konto? Logga in här

Logga in