Russians hacked the elections

Spycraft

Member
Jan 10, 2018
192
10
16
It's sickening that the Republicans try to obfuscate, make it seem like the DNC hack (only part of a larger hack) was an easy hack, that any "fat person in their mothers basement" could pull off.

If you want a real understanding of the work that goes into identifying Advanced Persistent Threats like the ones who hacked the DNC then just watch this. It's a perfect summary:

 
Another mindless bed wetter....

What is sickening is that these drones ignore the criminal acts of the DNC at every step and insist every laughable conspiracy theory about republicrats has to be true.

Dumbest mother fuckers on earth.

 
Honey, they emailed passwords to each other over unsecured networks, as well as left their computers open and unprotected in their offices.
It's sickening that the Republicans try to obfuscate, make it seem like the DNC hack (only part of a larger hack) was an easy hack, that any "fat person in their mothers basement" could pull off.

If you want a real understanding of the work that goes into identifying Advanced Persistent Threats like the ones who hacked the DNC then just watch this. It's a perfect summary:

 
  • Thread starter
  • Banned
  • #7
Another mindless bed wetter....

What is sickening is that these drones ignore the criminal acts of the DNC at every step and insist every laughable conspiracy theory about republicrats has to be true.

Dumbest mother fuckers on earth.
Ignore the fact that the government has demonstrated how to prove Russia is behind the attacks, what was attacked, and why, based on the generic principles I opened the thread with.

But what do you know?

https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY STEPPE-2016-1229.pdf
 
  • Thread starter
  • Banned
  • #8
Honey, they emailed passwords to each other over unsecured networks, as well as left their computers open and unprotected in their offices.
It's sickening that the Republicans try to obfuscate, make it seem like the DNC hack (only part of a larger hack) was an easy hack, that any "fat person in their mothers basement" could pull off.

If you want a real understanding of the work that goes into identifying Advanced Persistent Threats like the ones who hacked the DNC then just watch this. It's a perfect summary:


No they did not leave their workstations unlocked and passed passwords across unsecured networks. But I'm sure you know what you're talking about.

Spear-phishing is one of the strongest forms of hacking and requires some of the most work.

In fact, if you watch the video I provided, that is about 90% of the work an APT will do, the rest is highly automated and once they are in they can do a lot more damage with a lot less work. Crafting a successful spear-phishing campaign is the heart of any great Hacker Group.

You only call people "honey" because you don't know what the fuck you're talking about, even the basics.
 
Actually, they did. I don’t know where you get your information, but it isn’t complete.
Honey, they emailed passwords to each other over unsecured networks, as well as left their computers open and unprotected in their offices.
It's sickening that the Republicans try to obfuscate, make it seem like the DNC hack (only part of a larger hack) was an easy hack, that any "fat person in their mothers basement" could pull off.

If you want a real understanding of the work that goes into identifying Advanced Persistent Threats like the ones who hacked the DNC then just watch this. It's a perfect summary:


No they did not leave their workstations unlocked and passed passwords across unsecured networks. But I'm sure you know what you're talking about.

Spear-phishing is one of the strongest forms of hacking and requires some of the most work.

In fact, if you watch the video I provided, that is about 90% of the work an APT will do, the rest is highly automated and once they are in they can do a lot more damage with a lot less work. Crafting a successful spear-phishing campaign is the heart of any great Hacker Group.

You only call people "honey" because you don't know what the fuck you're talking about, even the basics.
 
In 2012, Gawker reported that hackers had broken into Romney’s personal Hotmail account after correctly answering his backup security question: “What is your favorite pet?” Though reporters never confirmed speculation that the pet was Seamus — the Irish setter that Romney had famously transported on the roof of his car — these type of questions are easy for digital intruders to research and answer when they involve famous people. (The culprit who took credit for the intrusion claimed to have not taken any information.)

During the 2008 election, a University of Tennessee student used a similar technique to break into the Yahoo email account of Republican vice presidential nominee Sarah Palin, then disclose some of her messages to WikiLeaks. The student was later sentenced to a year in federal custody.

....
An email from May 16 shows Podesta asking Eryn Sepp, his former special assistant at the White House, whether she knew his Apple ID, which would grant access to his Apple accounts and devices. “I do,” she responded, pasting his password into the email, a practice security specialists highly discourage.

Screenshots of the email quickly made the rounds on the internet. Within hours, a hacker had taken over Podesta’s Twitter account and sent out the pro-Trump tweet. The incident led to speculation that Podesta may have employed the “Runner4567” password for his Twitter account, and that he hadn’t turned on a security feature called “two-factor authentication,” which requires users to enter a one-time code sent to their cellphone in addition to the regular password.
How Podesta became a cybersecurity poster child


To make it sound like it is overall next to impossible, is not the truth.
 
In 2012, Gawker reported that hackers had broken into Romney’s personal Hotmail account after correctly answering his backup security question: “What is your favorite pet?” Though reporters never confirmed speculation that the pet was Seamus — the Irish setter that Romney had famously transported on the roof of his car — these type of questions are easy for digital intruders to research and answer when they involve famous people. (The culprit who took credit for the intrusion claimed to have not taken any information.)

During the 2008 election, a University of Tennessee student used a similar technique to break into the Yahoo email account of Republican vice presidential nominee Sarah Palin, then disclose some of her messages to WikiLeaks. The student was later sentenced to a year in federal custody.

....
An email from May 16 shows Podesta asking Eryn Sepp, his former special assistant at the White House, whether she knew his Apple ID, which would grant access to his Apple accounts and devices. “I do,” she responded, pasting his password into the email, a practice security specialists highly discourage.

Screenshots of the email quickly made the rounds on the internet. Within hours, a hacker had taken over Podesta’s Twitter account and sent out the pro-Trump tweet. The incident led to speculation that Podesta may have employed the “Runner4567” password for his Twitter account, and that he hadn’t turned on a security feature called “two-factor authentication,” which requires users to enter a one-time code sent to their cellphone in addition to the regular password.
How Podesta became a cybersecurity poster child


To make it sound like it is overall next to impossible, is not the truth.
You cite "politico".

I cite the FBI.

That's the difference.

You really don't know what you're talking about.

The DNC had enforced password policies, auto-screen lock GPO enabled, and Podesta was targeted by a well crafted Spearphishing campaign that imitated his own IT administrators.

But you go on believing "Gawker" and think that Podesta was emailed pills for Viagra in exchange for his username and password and his credit card information.

You sot.
 
As for the supposed Romney hack, that's pretty common.

A more advanced form of that is the transitive attack, or answering your security questions to your third party email that you may have used as a security password-reset for the target, such as your Amazon account.

This is how Amazon was owed a few years ago, and why "security questions" are less common and not default with GMail.

As for security questions, don't use them, put in a huge random string of characters and forget they exist.
 
This actually explains the Transitive attack in more advanced terms regarding attacks that owned Romney, for instance.

It's sad you think the DNC wasn't enforcing even the basic security measures. The DNC was a highly secure IT environment, but they were targeted by a highly sophisticated APT. Two APT's actually.

I started the lecture RIGHT at the "Security Question transitive attack" segment.

 
Sarah Palin got owned by the "recovery question" attack as well.
 

Forum List

Back
Top