CICBK

Iranian Hacking – Saudi Sites – Bruteforcing facebook zhacker

zhacker

Read More

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided

Read More

Plague of the Cyber RATS

a new era of warfare… a destructive and deadly mix of conventional military might and malicious cyber attacks

Read More

Intelligence Training – Timely, focused, hands-on

Intelligence Tradecraft CounterIntelligence Clandestine Cyber HUMINT Cyber Psyops Persona Creation and Management Cyber Influence Operations Middle Eastern Cyber Warfare Tradecraft Blended courses Courses on demand Courses developed per your needs, quietly and quickly Treadstone 71    

Read More

Twitter Brute Force – Iranian hack

Iranian password cracking for twitter - within the last 72 hours   #!/usr/bin/env python ################################### # Password cracking twitter V 1.0 # # # # : # # # ################################### import os import time import twitter import json import random from datetime import datetime from hashlookup.LookupTable import LookupTable CONSUMER_KEY = "" CONSUMER_SECRET = "" ACCESS_TOKEN_KEY = "" ACCESS_TOKEN_SECRET = "" POLL = 60 WORDLIST = './crackstation-dist/crackstation.txt' W = "\033[0m" # default/white R = "\033[31m" #…

Read More

Behzad Mesri – #HBO Hack – Silent Terror

البته سوال اصلی من از همون اول که این دیفیسر رو میشناختم این بود که چرا اسمش یه o کم داره skote vahshat -  BehzadMasri - skote_vahshat Get the scoop here (PDF) بهزاد مصری فکر کنم اول اشتباه نوشته و همون معروف شده و توی رو در بایستی مونده Wired Article حالا امیدوارم که زندگیش خراب نشه، ولی کاش مقامات به این سوال هم پاسخ میدادن این لاگ ها و پیست ها و دیتابیس هایی که…

Read More

Zapad Exercises – 2nd/3rd Order Effects

  The recent Russian Zapad wargaming exercises included a plethora of electronic capabilities demonstration and potentially more. Russia is known to recently been involved in illegal immigration efforts in Sweden, Finland, and Norway along with hostile intent along its northern borders (Estonia, Latvia, Lithuania) including cell/communication tower tampering. Could the recent Zapad exercises be more than just wargaming? Some What If thoughts on these non-linear actions: - Testing capabilities, distance, strength, impacts - Testing responses like…

Read More

Drone Wars! Threats, Vulnerabilities and Hostile Use

References Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2009) EW 103 Tactical Battlefield Communications Electronic Warfare, Boston: Artech House. Adamy, D. (2015) EW 104 EW against a New Generation of Threats, Boston: Artech House. Anonymous, (2017) GPS/SBAS Signal Generator, GSS4100, Spirent Communications Data Sheet. Satellite AIS, Exact Earth, Ltd. Anonymous, (9/8/2017) Innovation:…

Read More

Valery Vasilevich Gerasimov – Валерий Васильевич Герасимов

Chief of the General Staff of the Armed Forces of the Russian Federation / First Deputy Minister of Defence of the Russian Federation, General of the Army. Валерий Васильевич Герасимов Born      8 September 1955 (age 62) Kazan, Tatar Autonomous Soviet Socialist Republic Married – one son Russian hackers reportedly stole NSA data via Kaspersky Lab software http://algo.fyi/5vhjug Born on 8 September 1955 in the city of Kazan. In 1977, he graduated from the Kazan Higher…

Read More

Treadstone 71 Announces Cyber Intelligence Capability Maturity Model

8 Years In the Making - The Treadstone 71 Cyber Intelligence Capability Maturity Model with the Common Body of Knowledge

Read More