The first cache of NSA hacking tools contained quite a lot of material, such as zero-day exploits and tools to bypass firewalls (Cisco, Fortinet, Juniper, and TOPSEC), a toolkit to extract VPN keys, backdoors for Linux systems, and several Windows exploits.
This second cache is quite fresh, and security researchers haven't had the time to search it in its entirety. As of now, we know of the following findings:
TheShadowBrokers came out soon after story Russians helped Trump began to appear in MSM.
Luis Mitchell
Most of the tools and exploits from the latest leak are from the 90's and early 2000's.
Don't need to worry about the exploits in the leak unless you are running SunOS or OS/2.
Camden Cooper
...
David Lopez
when will those niggers leak something modern? How are we supposed to abuse the shit out of their own tools when they don't even use it nowadays. Leakers are cucks
The only way this NSA CIA madness will end is when actual criminals get access to all the tools and start wreaking havoc around the world with it. There is no way the situation will improve in any other scenario
Isaiah Davis
The guy who leaked this wants to sell what he got. This is just an hors d'oeuvre to prove that he has something of value.
Luis Perry
why are Americans so evil?
Leo Bennett
mostly israel
John Edwards
They are not evil, they are just powerful and retarded, which is even worse.
Brayden Ortiz
You mean, besides NSA?
Noah Stewart
This is actually helping cracking a rape case as we speak.
Liam Turner
CIA nigger pls
Isaac Scott
I see your boss didn't give you the memo yet: the new official enemy is the Russians.
Luke Howard
So it's freaking nothing. How disappointing.
Liam Robinson
It is, but
Luke Campbell
I am an expert. I just went through it and it appears to be nothing substantial sadly.
Ian Butler
The real meat is in the political and legal implications of some of the data. The Holla Forums related stuff seems mostly boring.
Brody Brooks
How can I learn how to use this tools?
Leo Gutierrez
This second cache is quite fresh, and security researchers haven't had the time to search it in its entirety. As of now, we know of the following findings:
(((You)))
Asher Bennett
It's all old, though. Even the "zero day" stuff is mostly previously unknown exploits for old software.
Mason Moore
This, I already looked through it all and there's basically nothing. What a waste of time. I'm gonna go to sleep and I suggest the rest of you do too. It's late we should rest our eyes and take a quick nap.
Asher Watson
pick 1
Josiah Rogers
A hacker is someone who enjoys playful cleverness—not necessarily with computers. The programmers in the old MIT free software community of the 60s and 70s referred to themselves as hackers. Around 1980, journalists who discovered the hacker community mistakenly took the term to mean “security breaker.”
Please don't spread this mistake. People who break security are “crackers.”
Landon Powell
Its sort of both.
First happened sometimes before August 2016.And probably want hack, someone with access just copied files, or they forgot those tools on some old device that was not wiped.
Somehow TheShadowBrokers got acces to those tools, packed them to gpg encrypted zip, and published few excerpts to prove its real.
Second happened yesterday when ShadowBrokers released password for gpg encrypted they were auctioning in 2016.
Jaxon Clark
Not everyone is in your timezone, faggot.
Isaiah Ross
you kinda need a intermediate to advanced level of understanding of the languages used. I took a quick look and I can read and understand the simpler shell scripts, theres some python, some perl. And a good understanding of what is involved in networking, know all the levels and be familiar with protocols, to the degree where you can quickly at a glance know what something does, as well as being able to spot things that are out of place (because if you just run programs and have no idea what they do, you deserve whatever happens).
It's very daunting, especially to beginners. People study this shit and stumble their way through it for years before really understanding the full utilization and power of a given tool or language or program
Jonathan Hughes
hahaha nobody bought up their shitty nsa cracks/keyloggers hahaha literally BTFO
Owen Robinson
it was never meant to be sold
Q: What if bid and no win, get bitcoins back? A: Sorry lose bidding war lose bitcoin and files. Lose Lose. Bid to win! But maybe not total loss. Instead to losers we give consolation prize. If our auction raises 1,000,000 (million) btc total, then we dump more Equation Group files, same quality, unencrypted, for free, to everyone.
Q: When does auction end? A: Unknown. When we feel is time to end. Keep bidding until we announce winner.
Q: Why I trust you? A: No trust, risk. You like reward, you take risk, maybe win, maybe not, no guarantees. There could be hack, steal, jail, dead, or war tomorrow. You worry more, protect self from other bidders, trolls, and haters.
I'm testing out the tools, however I have only managed to get different responses (nothing vs. instant error code) when trying to connect to different IPs with eternalblue.
Is there a list somewhere of windows servers? Or where can I fish for (recently active) windows IPs, like personal computers?
Help, blz. I want to figure out if there's something to this or is it just bunch of crap.
Isaiah Green
Holy shit, the fact that they write that way is kind of scary. The implications are interesting to say the least.
Dylan Hughes
I'm glad they're calling out Snowden for being a massive cuck.
Jacob Harris
CIA, FBI, and NSA ability to recognize people based on written text patterns confirmed.
David Jenkins
It doesn't take the US's national security budget to do that. You can see all the anti-firefox shill threads on this board follow the same template, for instance.
Cooper Hill
...
Austin Richardson
What are scary is peoples dismiss her on writing those manner. Humans doesn't even learned that stylometrics is a stuff. TOP KEK.
Evan Perez
we gots your an moose, these be NASA, jej
Daniel Hill
So basically all just need start removing random word the middle our sentences.
David Harris
i dont understand any of this, someone pls explain