Jump to content

Windows


Foxx

Recommended Posts

this is not a drill, i repeat, this is not a drill.

 

 

The Latest Dump of Alleged NSA Tools Is ‘The Worst Thing Since Snowden’

Thanks to the Shadow Brokers, any hacker can now easily attack and pwn millions of Windows computers on the internet.

 

On Friday, the group known as The Shadow Brokers dropped the hacking equivalent of a bomb, or perhaps several bombs, giving hackers all over the world the tools to easily break into millions of Windows computers. [/size]

 

"This is internet god mode for Microsoft computers," a security researcher that goes by the handle Hacker Fantastic, told Motherboard in an online chat. ...

 

NSA's arsenal of Windows hacking tools have leaked

The latest dump of hacks and exploits target most versions of the operating system. ...

 

Shadow Brokers Release New Files Revealing Windows Exploits, SWIFT Attacks

EASYBEE appears to be an MDaemon email server vulnerability source, source,source

EASYPI is an IBM Lotus Notes exploit source,source that gets detected as Stuxnet source

EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 to 7.0.2 source, source

EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor source, source

ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges source, source

EDUCATEDSCHOLAR is a SMB exploit source, source

EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 source, source

EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino source, source

ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users source, source

ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003 source, source

ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 source, source, source

ETERNALBLUE is a SMBv2 exploit source that also works on Windows 10, even if it wasn't designed to source

ETERNALCHAMPION is a SMBv1 exploit source

ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers source, source

ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003 source, source

ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later source, source

ETRE is an exploit for IMail 8.10 to 8.22 source

FUZZBUNCH is an exploit framework, similar to MetaSploit source, source

EquationGroup had scripts that could scrape Oracle databases for SWIFT data source, source

ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later source, source, also not detected by any AV vendors source

Metadata [possibly faked, possibly real links NSA to Equation Group source

NSA used TrueCrypt for storing operation notes source

Some of the Windows exploits released today were undetectable on VirusTotal source

Some EquationGroup humor in the oddjob instructions manual source, source

JEEPFLEA_MARKET appears to be an operation for collecting data from several banks around the world source], previously linked to the NSA by Snowden source, source

The Equation Group targeted EastNets, a SWIFT connectivity provider source, source, source, source, source

Best to move to Linux. Edited by Foxx
Link to comment
Share on other sites

  • Replies 72
  • Created
  • Last Reply

Top Posters In This Topic

elite haxors have had this stuff well before this drop. and elite haxors are the only ones who really matter

 

the rest are just kids jumping in to other kids computers to mess around. this is so much a big fat nothing of an event it doesn't matter

Link to comment
Share on other sites

elite haxors have had this stuff well before this drop. and elite haxors are the only ones who really matter

 

the rest are just kids jumping in to other kids computers to mess around. this is so much a big fat nothing of an event it doesn't matter

 

That's a very poor analysis. :nana::beer:

Link to comment
Share on other sites

  • 4 weeks later...

False flag operation. More fear porn to justify government control of the internet. Not saying it's not real just that it could be intentional by the peeps that rule us.

Link to comment
Share on other sites

I guess I should stop running Windoze on my Mac. :ph34r: Practice safe computing my friends.

 

Linux users have the luxury of having no one to blame when hacked, and Apple has the policy of denying any problem exists at all. I would like to point out that the reason we got "the Fappening 2.0" in 2017 is because of celebrities continuing to believe the lies of Apple's safety.

 

There is no such thing as safe computing. The only defense is to hope to blend in with the billions, or be a hermit.

Link to comment
Share on other sites

 

Linux users have the luxury of having no one to blame when hacked, and Apple has the policy of denying any problem exists at all. I would like to point out that the reason we got "the Fappening 2.0" in 2017 is because of celebrities continuing to believe the lies of Apple's safety.

 

There is no such thing as safe computing. The only defense is to hope to blend in with the billions, or be a hermit.

Linux Users = People who know what they are doing and take responsibility for their own actions

Apple Users = Smug hipsters who think their sh*t don't stink

 

That said when you buy a new PC with Windows (not much choice really), install VMWare or Virtualbox and then a Linux Guest

Link to comment
Share on other sites

Linux Users = People who know what they are doing and take responsibility for their own actions

Apple Users = Smug hipsters who think their sh*t don't stink

 

That said when you buy a new PC with Windows (not much choice really), install VMWare or Virtualbox and then a Linux Guest

Or install esxi and windows in a vm.

Link to comment
Share on other sites

Mac user and virus free since1986. That one was via a floppy disc. Never have had any anti-virus crud on my Mac and no problem.

I've used windows machines for twenty years and never had a virus. You'd have to be an idiot to get infected.

Link to comment
Share on other sites

×
×
  • Create New...