(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for the ‘Uncategorized’ Category

Ethics In Hacking and Dropping Code

leave a comment »

With the release of Autosploit, a tool for automatically scanning and exploiting hosts located via, a shit storm erupted on the ethics of releasing a tool like this. The problem has become just how easy it may now be to automate the attacks on vulnerable systems en masse that this tool could potentially provide. In an age where IoT devices as well as SCADA and ICS are sitting online in vulnerable states makes the possiblity of great damage to large networks more probable with such a tool. It also brings to the table the idea that the barrier to success on such attacks has been lowered to a new class of individuals with a limited knowledge base and creates an asymmetric threat model of a single individual able to wield greater attack capabilities with one tool.

Many arguments have been made on Twitter about the efficacy of releasing code like this but most have not focused on tools per se but instead on malcode or 0day’s. Now that there are bug bounty programs and companies that sell vulnerabilities we are living in a more dangerous time where the few with the money could buy exploits and do mass damage or commit mass surveillance and espionage. This also applies to countries willing to pay for 0day exploits to be in control of the attacks and have the upper hand. Think about that, our politics and our lives are at the mercy of code being sold to the highest bidder. We have weaponized code and tools made from it on a medium that was supposed to enlighten and bring us all together. Instead our baser nature has made the internet and everyone’s devices a tool for repression or subversion.

After the release of Autosploit, the hue and cry went up, and rightly it did. In a time where we have people releasing code and remarking “Let the world burn” I think it is time that we began to talk about the ethics of doing these things. Ethics kids is a philosophical discipline where you consider the moral responsibilities of what you do and the effects your actions could have. I think that too many people of a certain age group have had little to no training on ethics and this has helped to lead us to where we are today. In this specific case let’s talk about the ethics of releasing any code or tool that would lead to potential disastrous effect.

Many tools over the years have been dropped for free by hackers out there that could and were abused by others who downloaded and used them for their own desires. I have been exhorted to mention things like BackOrifice or L0phtcrack in the past and, well, there you go. Both tools were used for bad purposes as well as ostensibly good in the hands of penetration testers. Of course these were just placed on the net for free for anyone to have at first and this is where the quandary starts right? Did L0pht or CDC consider the potential damage that could be done with their tools? Did they put them out there with some self awareness that they may in fact be complicit in crimes because the tools that they created and distributed, for good or for ill, could be misused?

I point you all to Alfred Nobel, the inventor of Dynamite. He created a tool that would help in mining but in the end that tools devastating effects were used in other ways to hurt people and wage war. In an obituary that was accidentally run about him instead of his brother, he learned what the world perhaps thought of him regarding his invention. This bothered him so much that to atone for his actions he created the Nobel Prize to further science and other pursuits that do not further the harm of others. The idea that his inventions use for ill and how he would be perceived by history prompted his ethical response.

Today, we have people creating tools that could be misused and in some cases are for the sole purpose of misuse. The Autosploit tool may be a boon for some penetration testers, but the reality is that it is just another mass scan tool that seeks out vulnerable systems throughout the whole of the internet and loads the exploit potential to just break into them. This is not a refined tool for a scoped penetration test, this is a tool for mayhem. This is why I think others have made comments about the way it was released and the dangers in doing it so. The ethics though seem to have been glossed over concerning this release. What are the ethics of Autosploit’s creation and release on a Git repo? What is the morality behind doing so? Are there arguments for either of those or is it just another hacker saying; “Let the world burn” with no thought or accountability because it is the internet?

The problem we have today is that there are no ethical demands being placed on these coders and hackers. In fact, the whole notion of hacking has a very troubled side where illegal activities are the norm because the ethical and moral question of “should I do this” has not even been contemplated over the desire to know things. Sometimes I personally think that there is a fair bit of sociopathic behaviour in this community to begin with so that actually kind of aligns with the argument that ethics have not even been contemplated in some of these works. So as we move forward into a world of cyber warfare we have to care for the ethics and morality of what we do just as we have in all other forms of warfare in the civilized world.

While people like Katie Moussouris advocates for penetration testing tools being classified in ways that they are not declared illegal, we too have to look at the ethical concerns of the tools and how they are released to the world at large. Wassenar is a great idea but I feel that it is a myopic approach to larger issues in our ever more connected world. If you look at the actions of the Balkanization of the internet, you can see the actions of China and Russia joining together in a pact to repel the US hegemony in the internet you have to follow that all the way back to the tools that make such issues possible. The tools that you all create for hacking and exploitation that you should have some ethical concerns over when they are used perhaps in ways you did not intend.

Thus, take the ethical pause before you just dump them online …Unless all you care about is watching the world burn.


Written by Krypt3ia

2018/02/02 at 20:12

Posted in Infosec, Uncategorized


with 2 comments

Written by Krypt3ia

2017/10/03 at 20:33

Posted in Uncategorized


with 2 comments


Still the page is marked as bad yet no malware can be shown to live here.

Written by Krypt3ia

2017/10/02 at 13:16

Posted in Uncategorized


with 3 comments

Trawling the darknet as one does, I came across this little simple page this morning. It claims to be the real EQUIFAX hackers, unlike the last darknet site that was soon taken down by morons. I have looked at all the data on the pages (see screen shots below) and have come to the conclusion that whoever this is they too had access to Equifax. As this is an evolving nightmare I thought it prudent to do a quick write up on this site and let you all know. These actors are offering a crowd source solution to the whole database for the same amount as the fake site the other day (600btc) but also are offering single records as well as 1,000,000 entries for 4 bitcoins or 56 ETC for the same amount of records.

This time the actors actually give you samples, a taste, as they say on the street as bona fides…


These samples are what makes me think that this actor had access. I know for a fact that as the ongoing arguments take place online over what the compromise consisted of (what attack worked) that I personally saw a tweet from an alleged Russian actor claiming to have shell access on one of their servers online. This later was proven out to have ADMIN/ADMIN as the log and pass which is just horrid security, or should I say lack thereof? Anyway, you can see above that those records seem legit as do the screen shots of the access to the systems using real internal server names etc.

An onion scan of the site turns up no real vulnerabilities…

The bitcoin wallet shows no activity as yet.


In the process of watching this a change has been made to a small point of data that leads me to believe that this is a fake. Someone pointed out that the data for Bill Gates address was incorrect. Since then it has changed…

Oopsies… State : WA


Screenshot from 2017-09-14 14-16-55


Screenshot from 2017-09-14 14-07-43


A new story has surfaced online that makes the claim that the site creators have access to Equifax and there are other screen shots. I am still concerned with the changes to the data seen here but for what it’s worth here’s the link to the story.

Written by Krypt3ia

2017/09/14 at 11:38

Posted in Uncategorized

Asymmetric Propaganda Warfare & Network Warfare

leave a comment »

Why is it that the military just can’t grasp that on the net you can’t just use a sledge hammer to make things go away? It seems they finally have gotten a taste of reality in the war against Da’esh with their cyber weaponry hitting their targets only for the Da’eshbags to re-constitute from backups and new domains bought cheaply. I for one have been saying that it is pointless to just DoS them offline or fuck with them in hopes they would go away for many a year, guess now they might get it after their failures.

Ya see kids, it is not about big cyber booms and these guys go away and unless you are using some super software that pops GPS coords into a Raptor’s telemetry and launch a hellfire, you are pretty much gonna be shit outta luck in making a big difference here. Now the prosecution of the war itself may be benefited by such tools (if they exist) but when you see things like the text from the NYT’s article you see that even the administration just fundamentally did not get it. The NSA is a SPY agency and that is their charter, so asking them to dismantle portable networks that are easily re-constituted with new off the shelf hardware and software bespeaks a fundamental lack of understanding about the technology.

So here’s my advice to all you cyber warriors; Use the technologies that SPIES use to gather intelligence and then pass that intel to the HUMINT folks. Hell, for that matter have a two way connection here and use the tech to watch them, interact with them, and then use the information to make kinetic retaliation possible. You know what made AQAP’s propaganda machine slow down? It was when we blew their propaganda team off the face of the earth. In essence kill them. End them. Use the technology to get at them and end them. Stop it with all this whiz bang idiocy thinking you can take them offline and have them not come back in a day or so with a backed up copy of their shitty jihadi boards.

Just one man’s opinion, but you don’t need a sledge hammer to put a thumb tack in the wall.

There are no quick fixes here.

Just sayin.


Written by Krypt3ia

2017/06/15 at 18:08

Posted in Uncategorized

The Russia Connection: Paul Manafort

leave a comment »


Back when the Russian hacking revelations started around the DNC hack people started to ask questions about Trump’s connections to Russia. Personally for me one of the more spooky connections was in fact Paul Manafort. His connections to Russia come from his connections to Ukraine and Viktor F. Yanukovych. Of course I had heard about Manafort before he had become the campaign chairman for Trump so once he was installed I had to wonder about those ties to Ukraine and it’s leader, who fled to Russia because he is Putin”s boy. What flashed in my head though when this all started was the fact that some documents had come to light about Manafort’s access to monies by proxy of Yanukovych (and being paid about 12 million dollars for his services there) which as it turns out, once his (Yanukovych) files were searched a slush fund was found and the fact that Manafort had access to that slush fund as well.

Fast forward to today and now we have leaks talking about a “number” of Trump acolytes talking consistently with Russian intelligence officers and Manafort making the comment that “How should I know if they are Russian intelligence? it is not like they wear badges!” Well Paul, it seems that maybe you should just have assumed they all were because you were working for Yanukovych in Ukraine during the last days before he fled to Russia, an unstable place because Russian intelligence and the army have made it so. See, the whole point of Putin’s plan is to destabilize Ukraine and take it over. So yeah, you were surrounded by Russian officers man. So Manafort was there, working with the Putin puppet and he claims he had no knowledge of Russian intelligence being close to him… Right. Who knows what kompromat they have on you and since you were placed at the right hand of Trump for this election (until the heat came on over your ties) you were perfectly placed to run Trump and his minions as a de-facto case agent.

Then today I am trawling the Darknet, as is my wont, when I come across a tantalizing dump about you! On February 8th on a darknet site to be named later, Anon’s have given us a taste of their hacking of your daughter it seems. From the look of the data presented, they owned her phone and they owned some other SQL system with data as well. (pics below) In the dump there are allegations of someone using a address and a mail.pravda@icloud email address sending messages to your daughter about your misdeeds in Ukraine. Allegations of monies being taken and things like that. I have looked at these and for what it’s worth these look to be potentially real, but there isn’t much else to go on than some screen captures and then there is the SQLi dbase. In the screen captures though, we can see your daughter responding to all the allegations on the iPhone and then we can see in the dbase dump phone numbers for her and others as well as an email address.







man13 man06





I have withheld the images with the phone numbers in full for obvious reasons but to those who dumped this, I would like to see more if you have it that can prove that these are bona fide dumps. I also contacted someone who has hacked the Ukraine government in the past and asked if they had had any additional data in their dumps concerning Manafort and I am waiting on more. It would be interesting if more dox showed up connecting Manafort to the FSB in Ukraine huh?

Well I would be interested….



PS, since the kerfuffle with Politico (who just copies shit) as a bona fide check my next post on this debacle which has more interesting tidbits.

Written by Krypt3ia

2017/02/16 at 18:10

Posted in Uncategorized

with one comment


Written by Krypt3ia

2015/12/10 at 12:31

Posted in Uncategorized