[ / / / / / / / / / / / / / ] [ dir / animu / arepa / general / komica / leftpol / smb5k / tot / vg ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 6ee230adf3d4e71⋯.jpg (49.31 KB, 400x600, 2:3, applecore.jpg) (h) (u)

File (hide): 8e7e2e494ca9f9d⋯.png (223.26 KB, 1312x1132, 328:283, fail.png) (h) (u)

[–]

 No.956713>>956719 >>956721 >>956722 >>956763 >>956787 >>956858 >>958602 >>958655 [Watch Thread][Show All Posts]

>An Australian high school student repeatedly hacked into Apple servers, succeeding in downloading 90GB of what were described as ‘secure files.’ The teenage boy also reportedly accessed customer accounts.

Yada yada boy wonder. Right, but here's the interesting part:

>His access is said to include ‘authorised keys [which] grant log-in access to users.’

This really shouldn't be possible. You don't see fuckups like this in small companies, how on earth can a company with a trillion dollar market cap do this? They can literally afford the best of the best whitest of the white scientists to make sure this shit is secure. And I'm supposed to believe a 16 year old broke through this? Look I was a smart 16 year old, half of you here probably are 16 -- some I assume are smart people, but a 16 year old still has plenty to learn, and with this guy's limited knowledge, still got through? This tells me it wasn't some sophisticated timing attack, or a cryptographic breakthrough, but Apple being insanely fucking stupid. Again.

But wait... there's more. So being a 16 year old, he got caught (which is why you're reading this)

>Two Apple laptops were seized and the serial numbers matched the serial numbers of the devices which accessed the internal systems.

>A mobile phone and hard drive were also seized and the IP address … matched the intrusions into the organisation.

So there we have it. Apple is logging the serial numbers of its users on a periodic basis and maintaining a history. Everyone here assumes that, but here is your confirmation. Also note that it is clearly done frequently enough that the FBI were able to correlate it to the VPN he was using, so it's unlikely a once every week, or once every update. Moral of the story is, that if you're using a fagbook, at least do your "hacking" from a VPN running inside a VM that is running an OS you can trust.

>Amusingly, the downloaded material was saved in a folder titled ‘hacky hack hack.’

https://9to5mac.com/2018/08/16/melbourne-apple-hack/

Archive wasn't working, so see attached.

 No.956719

>>956713 (OP)

I absolutely guarantee he did not actually do any interesting exploits and just found one of their shitty passwords set by a low level employee or some basic social engineering.


 No.956721>>956722

>>956713 (OP)

>Archive wasn't working

You didn't use web proxies for that. That is in need of more web servers and security

http://archive.is/RHWBT

MORAL: MACBOOKS ARE BOTNETS WHATEVER YOU LIKE IT OR NOT


 No.956722>>956725

>>956713 (OP)

https://web.archive.org/web/20180817031607/https://9to5mac.com/2018/08/16/melbourne-apple-hack/

>The student’s lawyer said that the boy carried out the attacks ‘because he was such a fan of the company’ and hoped to work there

kek

>>956721

>MORAL: MACBOOKS ARE BOTNETS WHATEVER YOU LIKE IT OR NOT

and this isn't anything new


 No.956725>>956804

>>956722

Tim Cuck is probably quite excited by the prospect of a 16 year old boy sucking him off.


 No.956741>>958529

>melbfag

>not getting away with it because he used a macbook like a poofter

>not using a perfectly secure ThinkPad (TM) like a true chinese spy

bloody idiot


 No.956751

>but Apple's system logged the serial numbers of the MacBooks used to carry out the attacks

kek, to think he paid a thousand shekels to get caught and go to jail.


 No.956762>>956860

>hacked into Apple servers

>downloading 90GB of ‘secure files.’

>Two Apple laptops were seized

>downloaded material was saved in a folder titled ‘hacky hack hack.’

>hacky hack

which one of you faggots did this?


 No.956763

>>956713 (OP)

>folder called hacky hack hack

Bet you guys one big bag of dicks that if he'd named it ".hacky hack hack" instead they would have never found it.


 No.956787>>958500 >>959171

>>956713 (OP)

>The teen -- who is said to be well-known in the hacking community – used VPNs and other tools to try to avoid being traced, but Apple’s systems logged the serial numbers of the MacBooks used to carry out the attacks.


 No.956804>>956806

File (hide): b075a6f339d57ad⋯.jpg (1.09 MB, 1377x1600, 1377:1600, Barron.jpg) (h) (u)

FAPPENING THE TRILOGY?

>>956725

Aren't we all? Haha


 No.956806

>>956804

If the Shitpostistani finished his opus magnum and uploaded it somewhere, maybe.


 No.956858

>>956713 (OP)

>using his personal device as hacking machine

>doesn't know laptops and phones have SN, FCC ID, and among that are a bunch of more identifiers

>any wireless broadcast like WWAN or routers or wifi connections in general can reveal your SN also to another unsuspecting device on the same network (arp) and/while the network card also have its very own UUID

>SN can be traced from where devices are bought

Rule #1 - no extra life.


 No.956859

Either one of his family member or relative/acquaintance is an employee.

I doubt that kid bought those apple devices or maybe it was a gift from an employee relative who forgot to delete the "remember my password" dialog or he just shouldersurfed it.


 No.956860

>>956762

like nooky nook


 No.956907>>956910 >>956923

File (hide): 325fcdf6c3bfa33⋯.jpg (20.89 KB, 552x640, 69:80, 1533485370035.jpg) (h) (u)

Are you retarded my boy.

Running it in a vm absolutely does nothing, omfg.

t. 15 year old


 No.956910>>956912

>>956907

No. A VM (running trusted software) is orders of magnitude better, but the VPN connection needs to be made there, not on the host.

Perhaps when you're old enough to post here you'll know why.


 No.956912>>956914

>>956910

You do realize that the vm has to depend on the host os.

The VM itself would never have enough privilieges to write to the real mmio'd network shit itself.

Also please no ageism.


 No.956914>>956953 >>958535 >>958641

>>956912

The first two are obvious. What do you think a TCP/IP packet looks like? It doesn't matter where it originated from, they're not stamped with serial numbers or MAC addresses.

The reason the host+VPN is insecure, is that it's making background connections with the VPN IP to Apple, with username and S/N information. Simultaneously, that IP is being used for 'evildoer' stuff. That's why it is traceable.

The VM could get you in trouble if there is a possibility for a counter-attack, in which the remote target breaches your VM to reveal a real identity (not unheard of).


 No.956923

>>956907

Get the fuck out gramps

t. 13 year old


 No.956953>>956961 >>958498 >>958655

>>956914

Dude I don't believe you're conspicary crap, since someone who uses proprietary software deserves that, if something like that WOULD happen.

But as I said it would make no difference.

The fucking VM is a network bridge so when the VM sends a packet it would be handled like every packet from another application.

Do some proper research.


 No.956961>>958498

>>956953

>it would be handled like every packet from another application

No kidding. So what? You present no facts to refute what I've said. I can also tell from your reply that you have no idea what you're talking about. Since most criticism is self-critism, here's some pointers so you can "do some proper research." A VM can make a secure connection to a VPN (read about handshake protocols, and encryption), the host is then blindly passing along packets like every other piece of hardware the packet encounters from hop to hop (remember, you don't control these either).

Tell me where you're getting stuck and I'll help, but if you continue to be a moron we'll have to end this here.


 No.958498>>958546

>>956953

>>956961

you fucking idiot larpers you use only burner computers over long range directional wireless to open or cracked wifi, from concealment, always from a pseudorandom direction.


 No.958500

>>956787

This is actually the interesting bit.


 No.958529

>>956741

>implying apple isn't the chinese spy in this situation


 No.958535>>958546

>>956914

>they're not stamped with serial numbers or MAC addresses

Well, sometimes they are. They might still be.

TCP initial sequence numbers are chosen via RNG and some government-tier spyware has used that to exfiltrate encrypted data. Your OS today is using RDRAND to fill those sequence numbers with "random" data. How do you know that ME isn't just encrypting a CPU ID and handing it to the TCP stack? If I was still a spook that's what I'd have done.


 No.958546

>>958498

Do you have trouble following an argument?

>if you're using a fagbook, at least do your "hacking" from a VPN running inside a VM

>>958535

>TCP sequence numbers

>Unchanging across a VPN connection. Jesus, they weren't kidding about the glow niggers being incompetent.


 No.958602>>958641 >>958655

>>956713 (OP)

>Implying a safe OS in a VM is safe regardless of host

fuck off


 No.958641

>>958602

It is. It is much safer than to not (see >>956914

). It isn't the safest possible, but it's significantly better. If you disagree, it's because somewhere along the line you lack the understanding of how computers and networks operate.


 No.958655

>>956713 (OP)

>This really shouldn't be possible. You don't see fuckups like this in small companies, how on earth can a company with a trillion dollar market cap do this?

Because, I'm guessing that they literally store the auth-key along with your data in icloud, it's on purpose. Don't be surprised, the second version of firefox sync does the same damn thing, it's why I'm on Palememe running my own sync 1.1 server. I seem to remember apple giving up data that got a few major pirates in trouble, I guess this is how they do it.

As for the logging, this is how they do it, dribble news of it out in tiny artciles like this, so people don't rebel. I wonder if Snowden was theatre for this reason.

>>956953

I want to believe this is trolling, like some kind of blanket campaign to distrupt the evil natzee known as 8ch, but really, what is his game? Shilling for apple? 90 iq and he believes what he says?

>>958602

Depends if you're considering just this case of the serial number bullshit, which I think the guy you're talking to is.


 No.959171

File (hide): fc0f4c4aa33bd59⋯.jpg (33.09 KB, 425x283, 425:283, TimEric7.jpg) (h) (u)

>>956787

>not mac spoofing

>using botnet to hacky hack hack




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
30 replies | 3 images | Page ???
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / animu / arepa / general / komica / leftpol / smb5k / tot / vg ][ watchlist ]