What geek doesn’t like a good conspiracy theory? Well, I’ve got one for you – a follow-the-money chain that leads from the head of Russian state to an app that is installed on millions of personal phones.
As an operator of several websites and online stores, I get hit with a multitude of attempted malware attacks on a daily basis. Most of them I can easily identify. This one, however, was quite clever in its execution.
Here’s a pretty cool example of worm code written in Python. Note there are quite a few prereqs including network layer components. This examples uses nmap.PortScanner() to scan ports that are hardcoded in the code. You can change these are write a loop to iterate through a sequence of port numbers.
Anonymous broadcast template. https://www.youtube.com/watch?v=-eKu0LGNMdg Anonymous broadcast template.
Kept getting version conflicts trying to install Suricata 4 IDS on Debian Stretch. Looks like Suricata expects to be installed on Buster which is sort of weird. Here’s how to get past the errors (e.g. libc6 requirement not met). For Ubuntu, the OISF maintains a PPA suricata-stable that always contains the latest stable release. sudo…
This is the code the 13-year-old Japanese girl was arrested for by Japanese police with no sense of humor. I’ve run it on a Windows box and yeah, you can get out of the loop. Works on Chrome and most mobile browsers.
The District of Columbia indicted 11 Russians for crimes against the United States. I reviewed the indictments and came up with the following items I found most interesting (or at least, thought provoking).
Russian hackers are basking in a lot of cred from their recent hacks against US government institutions. In most cases, their most successful attempts where made via spear phishing attacks. Here’s what a Russian targeted spear phishing email attack looks like.