Hacking Team hacked, attackers claim 400GB in dumped data
49 replies, posted
what a bunch of hacks
this is better than when lizardsquad got doxed and arrested
[QUOTE=wickedplayer494;48132659]Rumor has it they were also using cracked stuff in their business operations. Namely, an old VMware Workstation version.[/QUOTE]
I don't think its really a rumour given that you can look around those files and quickly find cracked software and a vmware keygen.
[URL="http://ht.transparencytoolkit.org/c.pozzi/Desktop/you.txt"]Also found a file containing links to videos on YouPorn[/URL]. :v:
[QUOTE=TheCreeper;48135944]I don't think its really a rumour given that you can look around those files and quickly find cracked software and a vmware keygen.
[URL="http://ht.transparencytoolkit.org/c.pozzi/Desktop/you.txt"]Also found a file containing links to videos on YouPorn[/URL]. :v:[/QUOTE]
[img]http://i.imgur.com/8U2Wwwq.png[/img]
This guy sucks at passwords.
[QUOTE=TheCreeper;48135944]I don't think its really a rumour given that you can look around those files and quickly find cracked software and a vmware keygen.
[URL="http://ht.transparencytoolkit.org/c.pozzi/Desktop/you.txt"]Also found a file containing links to videos on YouPorn[/URL]. :v:[/QUOTE]
[quote]youporn. com/watch/5904/[B]hamburger-pussy[/B]/?from=vbwn[/quote]
aaaaaaaaaahahahahaha what the fuck
[QUOTE=Ott;48137885]
This guy sucks at passwords.[/QUOTE]
Dude's been pirating a lot of films..
[URL]http://ht.transparencytoolkit.org/c.pozzi/screenshots/wohdCKID.jpeg[/URL] (original if its still hosted)
[t]http://i.imgur.com/enCqUjh.jpg[/t]
[B]Edit:[/B]
Playing some solitaire to pass the time of course..
[URL]http://ht.transparencytoolkit.org/c.pozzi/screenshots/eflMbLTM.jpeg[/URL] (original if its still hosted)
[t]http://i.imgur.com/XegXCbc.jpg[/t]
[B]Edit:[/B]
Bunch of old e-books (including hacking e-books)
[URL]http://ht.transparencytoolkit.org/FileServer/FileServer/OLD Fileserver/books/[/URL]
[URL]http://ht.transparencytoolkit.org/FileServer/rcs-dev-old/Books/[/URL]
[B]Edit:[/B]
I've seen exes called SkypePM, SkypeDecode, SkypeACLKeyGen, wouldn't dare run them but I wonder what they're for.
[B]Edit:[/B]
I lost. :v:
[IMG]http://i.imgur.com/Zwko3Ig.png[/IMG]
[B]Edit:[/B]
There's a program to detect if you have 'government' spyware on your PC too.
[QUOTE=dot.rich;48138610]Dude's been pirating a lot of films..
[t]http://ht.transparencytoolkit.org/c.pozzi/screenshots/wohdCKID.jpeg[/t]
[B]Edit:[/B]
Playing some solitaire to pass the time of course..
[t]http://ht.transparencytoolkit.org/c.pozzi/screenshots/eflMbLTM.jpeg[/t]
[B]Edit:[/B]
Bunch of old e-books (including hacking e-books)
[URL]http://ht.transparencytoolkit.org/FileServer/FileServer/OLD Fileserver/books/[/URL]
[URL]http://ht.transparencytoolkit.org/FileServer/rcs-dev-old/Books/[/URL]
[B]Edit:[/B]
I've seen exes called SkypePM, SkypeDecode, SkypeACLKeyGen, wouldn't dare run them but I wonder what they're for.
[B]Edit:[/B]
I lost. :v:
[IMG]http://i.imgur.com/Zwko3Ig.png[/IMG]
[b]Edit:[/b]
There's a program to detect if you have 'government' spyware on your PC too.[/QUOTE]
It seems the last one might be the one huge thing to come of this.
[img]http://i.imgur.com/VLhZ39p.png[/img]
Damage control :v:
I remember seeing a line of code of this leak from a security guy I follow on twitter, it was a thing that created CP evidence on a PC, but it just created empty files with obviously incriminating names, can someone tell me how is that bad? I mean, I'm pretty sure you can't make a person go to jail over a file name of an empty file.
[QUOTE=eirexe;48139902]I remember seeing a line of code of this leak from a security guy I follow on twitter, it was a thing that created CP evidence on a PC, but it just created empty files with obviously incriminating names, can someone tell me how is that bad? I mean, I'm pretty sure you can't make a person go to jail over a file name of an empty file.[/QUOTE]
Recently there was a dude on twitch that revealed such a file name when searching in the start menu. It blew up big and he was accused horribly of being a pedophile so in the slightest it is career threatening.
[QUOTE=dot.rich;48139911]Recently there was a dude on twitch that revealed such a file name when searching in the start menu. It blew up big and he was accused horribly of being a pedophile so in the slightest it is career threatening.[/QUOTE]
Oh shit right.
[QUOTE=formatme;48135299][url]https://github.com/hackedteam?tab=repositories[/url]
all the gits were uploaded[/QUOTE]
Gone now. I suppose hosting stolen content isn't exactly legal :v:
[editline]7th July 2015[/editline]
[QUOTE=Egonny;48139869][img]http://i.imgur.com/VLhZ39p.png[/img]
Damage control :v:[/QUOTE]
The account has been deleted, but [URL="https://twitter.com/AnonKrauts/status/618093461800099841"]here are some more[/URL].
[editline]edit[/editline] [URL="https://archive.is/Ca8Kz"]Here's an archive of the account[/URL], [URL="https://netzpolitik.org/2015/hacking-team-wird-zu-hacked-team-400-gb-interne-daten-von-ueberwachungssoftware-hersteller-veroeffentlicht/"]courtesy of a commenter on netzpolitik.org[/URL].
[QUOTE=Tamschi;48139945]Gone now. I suppose hosting stolen content isn't exactly legal :v:
[editline]7th July 2015[/editline]
The account has been deleted, but [URL="https://twitter.com/AnonKrauts/status/618093461800099841"]here are some more[/URL].
[editline]edit[/editline] [URL="https://archive.is/Ca8Kz"]Here's an archive of the account[/URL], [URL="https://netzpolitik.org/2015/hacking-team-wird-zu-hacked-team-400-gb-interne-daten-von-ueberwachungssoftware-hersteller-veroeffentlicht/"]courtesy of a commenter on netzpolitik.org[/URL].[/QUOTE]
[IMG]http://i.imgur.com/yTWuYG1.png[/IMG]
The irony meter is going off the fucking charts.
[QUOTE=dot.rich;48139911]Recently there was a dude on twitch that revealed such a file name when searching in the start menu. It blew up big and he was accused horribly of being a pedophile so in the slightest it is career threatening.[/QUOTE]
that's kind of the most scary thing -- if you have any kind of reputation, evidence of CP will tarnish that -- it's the end all. if someone wants to take you down hard enough and knows how to get it, all they have to do is send you an exe and you're fucking done for
Nice and secure SSH details
[img]http://i.imgur.com/xkiYXB0.png[/img]
This guy was fucking asking to be hacked.
[editline]7th July 2015[/editline]
[t]http://ht.transparencytoolkit.org/c.pozzi/screenshots/BqpmBaTb.jpeg[/t]
Does this guy actually do anything at work?
Hes only been working for them for a year, he really fucked them over.
it boggles my mind when people use passwords like P4ssword for ssh because that could be brute forced really fast, most people use ssh keys now days.
[QUOTE=Egonny;48139869][img]http://i.imgur.com/VLhZ39p.png[/img]
Damage control :v:[/QUOTE]
well no shit. It's probably got the source code on it too
[QUOTE=Tamschi;48139945]Gone now. I suppose hosting stolen content isn't exactly legal :v:[/QUOTE]
Still up [url=https://github.com/informationextraction?tab=repositories]here[/url]
[QUOTE=meharryp;48141698]Nice and secure SSH details
[img]http://i.imgur.com/xkiYXB0.png[/img]
This guy was fucking asking to be hacked.[/QUOTE]
And this is why you disable root account on ssh
[QUOTE=itisjuly;48142373]And this is why you disable root account on ssh[/QUOTE]
or setup honeypot to gather attacking IPs ;)
Sorry, you need to Log In to post a reply to this thread.