@Mudge

2.6K Followers
12 Following
21 Posts

Hacker, public servant, researcher, executive, ( Chairperson of Cyber-ITL a 501(c)3 non-profit )

Don't do it for money, do it to make a difference.

Ahh the joy of moving...

On the plus side, I found an old VHS recording of one of the benefit shows did while in college.

Here's a snippet of a guitar solo (circa 1989-1992) with prog-metal band Raymaker at Berklee College, benefiting the Pine Street Inn homeless shelter.

From 12am to 5-6am I would be at MIT hacking in the Athena clusters... the rest of the time shedding (practicing/studying).

Nowadays I actually need sleep!

https://youtu.be/M_wGstWn45o

Here's the Debian Project's statement about the arrest of Dmitry Bogatov, a Debian Maintainer who worked in the Debian Haskell group and currently maintains several packages for command line and system tools. He was arrested by Russian authorities, and Debian has removed his keys from their servers in case they're compromised. https://www.debian.org/News/2017/20170417
@cynicalsecurity no worries :) thanks for the extra data. Fascinating!
@cynicalsecurity great, thanks!

@cynicalsecurity not surprising to hear that modern thought on Starfish Prime is that it was overstated.

Do you have any pointers or references to these interpretations?

I'd like to read more.

Tnx!

@cynicalsecurity I like armscontrilwonk's work. Additionally, I haven't seen any reports on efforts towards high gamma yield from NK but I acknowledge that media coverage in the topic is likely very opinionated in slant (and that they may not be going that direction at all).

Not sure what you're disagreeing with, as I was stating that I find it an interesting thought that I had not really considered before, but I do appreciate your comments and armscontrolwonk has some good work :)

Fascinating to consider North Korea's missile efforts aimed at delivering a nuclear EMP rather than traditional nuclear ordnance.

Explode high in the air w/o requiring the precision or re-entry capability of traditional ICBMs.

Changes whole flavor of the aperiodic missile launches from NK into Sea of Japan.

Interesting writeup / sources:

http://www.israelnationalnews.com/News/News.aspx/193908

Great Frank Rieger writeup:

https://medium.com/@frank_rieger/some-wild-speculation-6fbcf856007d

@HalvarFlake in larger organizations and agencies, people and teams specialize. I'm sure you see it in your corporate experiences.

I remember bursting into laughter walking through the halls of NSA when I heard: "specialization... it's not just for insects!". Very true!

More specialization and focus is needed to eek out the remaining wins in a well picked over field. What I don't see, and I think of you as a kindred soul here, are lots of folks really looking for new *applied* green fields. :)

@donb cool, please share with me earlier if you can.

Other off the top of the head tricks (some need a different sig):

Password: quarantine pw files that aren't encrypted

username: utmp/wtmp

syslog to local/remote: zorch certain logs based on log level etc.

Browser strings: logs

DNS additional records: local lookup caches

SMTP X-headers: mail files/spools

Anything across the net to bork IDSes running AV.

This is a gift that keeps on giving!

Other ideas?

Have fun planting virus signatures in strange places that touch remote disks somehow/somewhere.

Example:

Change your mail sig to:
X5O!P%@ap[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Or send it in a browser var, as a password (quickly find the sites that don't encrypt passwords), send to open syslogs, etc.

The some AV actually delete/quarantine the file (weblogs, mailspool, {u,w}tmp etc.)!

What are your ideas?

Inspired by: https://www.sec.cs.tu-bs.de/pubs/2017-asiaccs.pdf