A faction within the Anonymous movement has claimed responsibility for hacking Freedom Hosting II, a hosting company for TOR based onion websites or the darknet.
Visitors to various websites hosted on the darknet were met with the message, “Hello, Freedom Hosting II, you have been hacked.”
The full statement read:
Hello Freedom Hosting II, you have been hacked
We are disappointed… This is an excerpt from your front page ‘We have a zero tolerance policy to child pornography.’?—?but what we found while searching through your server is more than 50% child porn…
Moreover you host many scam sites, some of which are evidently run by yourself to cover hosting expenses.
All your files have been copied and your database has been dumped. (74GB of files and 2.3GB of database)
We are selling all data (excluding cp) for 0.1 BTC. Send 0.1 BTC to 14iCDyeCSp12AmhVfJGxtrzXDabFop4QtU and send your transaction id to
fhosting@tt3j2x4k5ycaa5zt.onion or
fhosting@danwin1210.me and We’ll get back to you with a full dump.
Up to January 31st you were hosting 10613 sites. Private keys are included in the dump. Show full list
We are Anonymous. We do not forgive. We do not forget. You should have expected us.
The hackers claimed that child pornography made up more than half of the data that was hosted on the servers.
This is not surprising considering the fact that the original Freedom Hosting hosted as many as half of the child porn sites on the darknet.
The service was compromised by law enforcement in August 2013, and its owner Eric Eoin Marques was
arrested . The FBI used a firefox tor exploit to exploit javascript, and then trace and capture several pedophiles.
All of the sites hosted by Freedom Hosting—some with no connection to child porn—began showing an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a vulnerability in Firefox to identify users of the Tor Browser Bundle, reporting back to a home server in Northern Virginia.
The latest attack is not suspected to have been done by the FBI, but by online vigilantes who have deemed themselves “pedophile hunters.”
Troy Hunt, a security researcher, noted that there were thousands of .gov email addresses. Although as he said, “how many are real and what purposes they are being used for is another issue,” as not everything hosted on Freedom Hosting II was child pornography. However, he added, “ much of the data is highly explicit ,” with half of the sites in the dump containing illicit sexual pictures of children. An ongoing analysis of the leak can be found on Medium, where Chris Monteiro is looking into the
data .
In the meantime, another hacker “eTrappin,” I personally know is working on a tool to trace these pedophile websites called “tortrace.” He is welcoming all help coding the tool.
New Tool Under Development To Target Underground Pedo Rings TorTrace If U Can Help Code Contact @eTrappin : gi
This is a huge blow to the pedophile darknet, which is mostly hosted by Freedom Hosting. Anonymous has previously gone after the darknet with an operation a few years back called “Operation Darknet.”
GreyHatsHackers
Sunday, 12 February 2017
Anonymous Hacks Darknet Hosting Site, Leaks Pedophile Databases
Thursday, 9 February 2017
Artificial Intelligence defined....
What is artificial intelligence (AI), and what is the difference between general AI and narrow AI?
There seems to be a lot of disagreement and confusion around artificial intelligence right now.
We’re seeing ongoing discussion around evaluating AI systems with the Turing Test , warnings that hyper-intelligent machines are going to slaughter us and equally frightening, if less dire, warnings that AI and robots are going to take all of our jobs .
In parallel we have also seen the emergence of systems such as IBM Watson , Google’s Deep Learning , and conversational assistants such as Apple’s Siri , Google Now and Microsoft’s Cortana. Mixed into all this has been crosstalk about whether building truly intelligent systems is even possible .
A lot of noise.
To get to the signal we need to understand the answer to a simple question: What is AI?
AI: A textbook definition
The starting point is easy . Simply put, artificial intelligence is a sub-field of computer science. Its goal is to enable the development of computers that are able to do things normally done by people -- in particular, things associated with people acting intelligently.
Stanford researcher John McCarthy coined the term in 1956 during what is now called The Dartmouth Conference , where the core mission of the AI field was defined.
SponsoredPost Sponsored by
Brother International
Spend less for more pages with Brother INKvestment
If we start with this definition, any program can be considered AI if it does something that we would normally think of as intelligent in humans. How the program does it is not the issue, just that is able to do it at all. That is, it is AI if it is smart, but it doesn’t have to be smart like us.
Strong AI, weak AI and everything in between
It turns out that people have very different goals with regard to building AI systems, and they tend to fall into three camps, based on how close the machines they are building line up with how people work.
For some, the goal is to build systems that think exactly the same way that people do. Others just want to get the job done and don’t care if the computation has anything to do with human thought. And some are in-between, using human reasoning as a model that can inform and inspire but not as the final target for imitation.
The work aimed at genuinely simulating human reasoning tends to be called “ strong AI ,” in that any result can be used to not only build systems that think but also to explain how humans think as well. However, we have yet to see a real model of strong AI or systems that are actual simulations of human cognition, as this is a very difficult problem to solve. When that time comes, the researchers involved will certainly pop some champagne, toast the future and call it a day.
The work in the second camp, aimed at just getting systems to work, is usually called “ weak AI ” in that while we might be able to build systems that can behave like humans, the results will tell us nothing about how humans think. One of the prime examples of this is IBM’s Deep Blue , a system that was a master chess player, but certainly did not play in the same way that humans do.
Somewhere in the middle of strong and weak AI is a third camp (the “in-between”): systems that are informed or inspired by human reasoning. This tends to be where most of the more powerful work is happening today. These systems use human reasoning as a guide, but they are not driven by the goal to perfectly model it.
A good example of this is IBM Watson . Watson builds up evidence for the answers it finds by looking at thousands of pieces of text that give it a level of confidence in its conclusion. It combines the ability to recognize patterns in text with the very different ability to weigh the evidence that matching those patterns provides. Its development was guided by the observation that people are able to come to conclusions without having hard and fast rules and can, instead, build up collections of evidence. Just like people
How to Hack into Webcams
It’s time to let out your inner creep. In this tutorial, we’ll be taking a look at how we can hack a webcam remotely and take a peek at what’s going on at the other side. We’ll use the powerful Meterpreter to hack into the victim’s webcam. We’ll take full control of the webcam, turn it on and get snapshots without anyone ever finding out.
In early 2014, a hacker was sentenced to 18 months for doing just this to Miss Teen USA 2013. He found a vulnerability in her computer (perhaps some outdated software), took a few clicks from the webcam and blackmailed the victim to send more photos. While the exact method he used is unknown, it’s very likely the same as what we’ll be trying out here. The point of this tutorial is to show just how easy it really is, a proof of concept. While developing your own hacks and discovering loopholes is a whole different level of hacking, quite a lot of hacking can be done just by being in ‘the know’: knowing common vulnerabilities and the tools to exploit them. If successful, it can lead to things like getting your webcam hacked or worse. Finally, we’ll see exactly why you should find some black tape and tape over your camera right now.
Our best friend Meterpreter is going to help us with this hack. With Meterpreter we can install a keylogger, hack the webcam and the list goes on and on. You can basically do almost anything that you can do on your own computer, to your victim. All we need for this hack, is to first break in with Metasploit and install meterpreter on their system. How do we do that?
After picking an attack module to exploit a vulnerability, we have the option to set a payload. The payload tells metasploit what to do on the victim’s computer once it breaks in. Meterpreter is a payload. The command usually looks like:
Set payload windows/meterpreter/reverse_tcp
If the attack was successful, metasploit automatically installs meterpreter on the target system and we can move on to hacking the webcam, in this case. We can also get our meterpreter session by using exploits like Aurora (for IE6). After getting the meterpreter session in our command, you can follow the steps below to hack the webcam.
Step 1: Find if there is a webcam.
Metasploit’s Meterpreter has a built-in module for searching and controlling the remote system’s webcam (Because apparently there are so many creepy hackers that we now have this hack at our fingertips). We can start off by searching if the system even has a webcam or not.me. The command below is used for that, it also returns us the name of the webcam.
meterpreter > webcam_list
If a webcam was found, Meterpreter will them all out. Usually we just find one.
Step 2: Say Cheese!
If the last command gave us a webcam we can go ahead and snap a photo:
meterpreter > webcam_snap
If all went fine a picture will be saved in the directory: /opt/framework3/msf3 We can simply go there and see what we got. We can’t do anything about the quality of the image, it all depends on the webcam. Still, better than nothing, right?
Step 3: Streaming video.
So we got a picture, let’s see how to get a live video stream. We can do this by typing the command below: (We’re using –p parameter to specify the directory we want to give to the video streaming file)
meterpreter > run webcam -p /var/www
This command fires up the victim’s webcam and sends its video output to /var/www/webcam.htm. You can open up this file and check out what’s going on at the other end in live video feed.
Another thing that deservers mention here is the little light that is often found next to many laptop cameras and on some separate webcams too. Will the light be turned on by this hack? It depends on the way the camera manufacture implemented the ‘take a photo’ and ‘take a video’ functions and on which software is set as default to use the camera. So this hack is not all that risk-free. But then again, what’s life without a little risk? (Just kidding, people go to jail for this. Be careful.)
Protecting yourself
In
Subscribe to:
Posts (Atom)

