Atheistforums.com

Science Section => Science General Discussion => Math and Computers => Topic started by: Baruch on January 02, 2017, 08:29:06 AM

Title: Technical Analysis of Russian Hacking?
Post by: Baruch on January 02, 2017, 08:29:06 AM
https://turningpointnews.org/exposing-political-corruption/dhs-fbi-claim-of-russian-hacking-is-fake-news

This analysis was done by a retired teacher.  Probably the FBI and CIA can do better than he can.  The NSA could have the real evidence of file transfer ... but won't share it.  But this isn't proof that the NSA did it and puts the blame on Russia.
Title: Re: Technical Analysis of Russian Hacking?
Post by: chill98 on January 02, 2017, 11:29:33 AM
I read an analysis of the same info done by a wordpress security firm.  Rough conclusion:

QuoteThe IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don’t appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.

The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.

This attempt to convince the public the ruskies did it makes our own gov look like a bunch of amateurs.  Laughable even.
Title: Re: Technical Analysis of Russian Hacking?
Post by: Baruch on January 02, 2017, 01:06:16 PM
We can't tell at this point.  A private party (with lots of zombie nodes) or a state actor (which we assume isn't the US only because of propaganda) could be involved.  Or it could have been a disgruntled insider.  My most recent Ethical Hacker training claims that 60% of all attacks are insider attacks.  So on that basis, it was a DNC operative that released the Pedesta and DNC emails.
Title: Re: Technical Analysis of Russian Hacking?
Post by: fencerider on April 11, 2017, 01:30:39 AM
too much yooge bigley talk. I ground my teeth in creating data sets for data entry and accounting software. I also managed the test for CNA but that is as far as my training goes. Don't know anything about the details of how hacking is done.

There is one thing I do know. Just like telemarketers can call your phone with a fake telephone number, the better software can change the ID of the origination before it sends a packet to the next router. Add on to that the use of shell organizations of every government it gets complicated really quickly. A msg that appears to be from Russia could actually be coming from Mexico City. The only way to get anywhere is if you make a deal with computer manufacturers for a back door or have the ability to remotely hack a router.

I wish I could have learned that level of internet programming. If I did I would probably spend sometime to see what I could find out. Internet traffic is a much more exciting part of computer programming than meticulous repetition of accounting software.
Title: Re: Technical Analysis of Russian Hacking?
Post by: Jason78 on April 11, 2017, 12:36:31 PM
That was not a technical analysis.  Not even close.
Title: Re: Technical Analysis of Russian Hacking?
Post by: Baruch on April 11, 2017, 01:28:46 PM
Quote from: Jason78 on April 11, 2017, 12:36:31 PM
That was not a technical analysis.  Not even close.

So you were the one who did it?  Have you turned yourself into the FBI?
Title: Re: Technical Analysis of Russian Hacking?
Post by: Sorginak on April 11, 2017, 06:54:09 PM
I am certain that the FBI is not the foremost expert on technical analysis. 
Title: Re: Technical Analysis of Russian Hacking?
Post by: Baruch on April 11, 2017, 07:55:22 PM
Quote from: Sorginak on April 11, 2017, 06:54:09 PM
I am certain that the FBI is not the foremost expert on technical analysis.

Yes, clearly the CIA is, now that we know, since this article came out, that the CIA can do any hack they want, and make it look like any perpetrator they want to frame.