[ / / / / / / / / / / / / / ] [ dir / random / abdl / cute / cuteboys / cyber / femdom / hnt / komica / x ]

/pnd/ - Politics, News, Debate

and shitslinging
Email
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
dicesidesmodifier

Allowed file types:jpg, jpeg, gif, png, webp, webm, mp4, mov, swf, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


Rules Log Spot Those Who Glow Protect Yourself
I can't believe Martha hates niggers

File: e146cf6d515eefe⋯.jpg (34.55 KB, 620x506, 310:253, CIA_Can_Hack_Track_Windows….jpg)

a94ed9  No.351747

CIA Can Hack, Track Windows Devices Via WiFi

RELATED: >>>/realnews/2003 (https://archive.fo/hXjld)

New documents released on Wednesday as part of WikiLeaks' series of CIA hacking revelations detail a method the agency uses to geolocate computers and the people using them. The agency infects target devices with malware that can then check which public Wi-Fi networks a given computer can connect to at a given moment, as well as the signal strengths of those networks. From there, the malware compares the list of available Wi-Fi options to databases of public Wi-Fi networks to figure out roughly where the device is.

The leaked documents detailing the project, which is known as ELSA, date back to 2013, and specifically address laptops and PCs running Windows 7. But experts say that the technique is straightforward enough that the CIA could have a version of it for every Windows release.

"This technique has been done and known about for a long time," says Alex McGeorge, the head of threat intelligence at the security firm Immunity. “It’s like give me all the information from the radios on your [device] to try to get a better fix on your location.”

ELSA only works on Wi-Fi-enabled workstations, but that’s … pretty much everything at this point. The specific process involves installing malware on a target computer, using that to access the victim device’s Wi-Fi sensor to check for nearby public Wi-Fi points, logging each one’s MAC address and Extended Service Set Identifier (the fingerprints of a Wi-Fi network), and then checking those identifiers against publicly available Wi-Fi databases maintained by Google and Microsoft. By combining this location data with signal strength readings, the malware can calculate the device’s approximate longitude and latitude at a given time. It then encrypts this data and stores it until a CIA agent can work to exfiltrate it. ELSA also includes a removal process so the CIA can cover its tracks.

https://archive.fo/WCJuA

ELSA was initially created in 2012, according to a 2013 user manual obtained by WikiLeaks. The manual is marked as ‘secret, noforn’ - meaning it’s not to be shared with other countries.

When the target device is connected to the internet, ELSA attempts to use public geolocation databases from Google or Microsoft to track the device’s location, and stores the longitude, latitude and timestamp in encrypted form on the device for the CIA to extract at a later time.

ELSA was developed by the Engineer Development Group (EDG), the division that manufactures the CIA’s hacking tools. The EDG is part of the Center for Cyber Intelligence (CCI).

ELSA is designed to be injected into an existing process on a device’s system. “It’s delivered in the form of a DLL,” the manual reads. A Windows DLL (Dynamic Link Library) is a library of code and data that can be used by more than one program at the same time. It helps operating systems and programs run faster and use less space.

ELSA also uses a configuration tool (patcher) and post processor. It uses the command-line tool, Microsoft Windows RegSvr32, to perform the installation.

https://archive.fo/9Mgwo

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

19ebb8  No.351752

File: 2fa2a91cfe97de9⋯.jpg (135.07 KB, 1323x1080, 49:40, Picsart_22_09_02_14_16_22_….jpg)

>>351747

LOL @ how LITTLE you know about tech

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

19ebb8  No.351753

File: b97afaf56cbd548⋯.jpg (108.08 KB, 1157x1080, 1157:1080, Picsart_22_09_02_15_22_32_….jpg)

Well……. at least that explains Gates tattoo

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

19ebb8  No.351754

File: 0921ac7b23c06d1⋯.jpg (53.51 KB, 640x550, 64:55, Tablets2021_Hero_Mobile.jpg)

>>351747

Good news !!

I found a computer even YOU can understand

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

19ebb8  No.351755

File: a6e269540191869⋯.png (108.13 KB, 300x253, 300:253, Tablet_Family_2021_Mobile_….png)

>>351747

sure, those one syllable words like YOU'RE can be confusing…

but even you can master things like ABC or 123

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

19ebb8  No.351757

File: 6d111c477b5ed46⋯.png (743.93 KB, 1375x1080, 275:216, Picsart_22_09_02_16_12_09_….png)

>>351747

Plus, you're already familiar with most 3 letter words

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4a1c2e  No.351842

>>351757

And I really could care less what you think, or the other losers on this here board.

BUMPED

AND DUMPED.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

cb4d93  No.351967

BUMP!!!!!!!!!!!

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aba0ec  No.352106

>>351747

>CIA Can Hack, Track Windows Devices Via WiFi

lolurkitry.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

cee438  No.352112

>>351747

Jerry said you died last night

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]

[ / / / / / / / / / / / / / ] [ dir / random / abdl / cute / cuteboys / cyber / femdom / hnt / komica / x ]