Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security through obscurity #17

Open
sparkcodeuk opened this issue Oct 19, 2017 · 4 comments
Open

Security through obscurity #17

sparkcodeuk opened this issue Oct 19, 2017 · 4 comments

Comments

@sparkcodeuk
Copy link

sparkcodeuk commented Oct 19, 2017

curl -s "https://sandbox.vflsruxm.net/plans.rar" | base64 -Do plans.rar; unrar x -y plans.rar

So...

  • encrypted email with link
  • HTTPS webserver (over cloudflare, with directory indexes turned on no less, wtf Elliot?!)
  • base64 encoded rar file
  • png QR code
  • link to public git repo (here)

One sec, someone's at the door—

@Brcrwilliams
Copy link

This isn't Elliot's repo. It's the exploit the FBI used on his monitor. He knew the FBI was watching him. He wasn't sending that email to a real person. He intended the FBI to intercept it, decode it, and realize that he knew what they did. He was sending them a message.

@dryan
Copy link

dryan commented Oct 20, 2017

Life’s too short to “well actually”.

@nukeop
Copy link

nukeop commented Oct 24, 2017

This was on purpose to let them know that he knows they used this exploit to implant a backdoor in his monitor. He was already banging on their door when the FBI pajeet told Dom about it.

@snovvcrash
Copy link

>>> import requests, base64, rarfile, io
>>> rarfile.RarFile(io.BytesIO(base64.b64decode(requests.get('https://sandbox.vflsruxm.net/plans.rar').text))).extractall()

@sparkcodeuk Within this task the Shell's source code has significantly better Kolmogorov complexity than Python's lol.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants