Cryptome: HBGary Federal

Cryptome has broken down the HBGary data dump for review.

HBG-Anon-WL.zip       HBGary Anonymous and Wikileaks                   February 13, 2011 (317KB)
HBG-VE-IR.zip         HBGary Venezuela and Iran                        February 13, 2011 (697KB)
HBG-EC-APT.zip        HBGary E-Crime and Advanced Persistent Threats   February 13, 2011 (554KB)
HBG-JHU-APL.zip       HBGary Secure Applied Physics Lab                February 13, 2011 (874KB)

HBG-NSA.zip           HBGary National Security Agreements              February 13, 2011 (1.3MB)
HBG-TENPP.pdf         HBGary Targeting Exelon Nuclear Power Plant      February 13, 2011
HBG-CIRC.zip          HBGary Corporate Information Spying Cell         February 13, 2011 (288KB)
HBG-TMC.zip           HBGary Threat Monitoring Center                  February 13, 2011 (792KB)
HBG-EA.zip            HBGary Exploitation Assessment                   February 13, 2011 (712KB)

HBG-SMSR.zip          HBGary Social Media Security Reset               February 12, 2011 (5.5MB)
HBG-ETT.zip           HBGary Emerging Threats and Trends 2011          February 12, 2011 (4.2MB)
dodi-3305-01.pdf      National Intelligence University                 February 12, 2011

HBG-LE-Intel.zip      HBGary Scoutvision Law Enforcement-Intel Cases   February 11, 2011 (6.7MB)
HBG-SME.zip           HBGary Social Media Exploitation                 February 11, 2011 (5.8MB)
HBG-APT.zip           HBGary Advanced Persistent Threat                February 11, 2011 (3.0MB)
HBG-Mandiant.zip      HBGary Mandiant Advanced Persistent Threat       February 11, 2011 (2.0MB)

HBG-McAfee.zip        HBGary McAfee Integration                        February 11, 2011 (1.5MB)
HBG-Aurora.zip        HBGary Aurora Malware Report                     February 11, 2011 (400KB)
HBG-Splunk.zip        HBGary Splunk Brief-IT Management Is Broken      February 11, 2011 (3.2MB)
HBG-TVA.zip           HBGary Topological Vulnerability Analysis        February 11, 2011 (2.4MB)
HBG-Fed-OA.pdf        HBGary Federal Operating Agreement               February 11, 2011
This isn't everything in the HBGary feed, but it certainly is interesting

Quote: The Hacker Ethic

Great excerpt from the book The Hacker Ethic: And the Spirit of the Information Age by Pekka Himanen on NYTimes. Here is an excerpt from the excerpt:

“The spirit behind other hackers’ creations is very similar to this. Torvalds is not alone in describing his work with statements like “Linux hackers do something because they find it to be very interesting.” For example, Vinton Cerf, who is sometimes called “the father of the Internet,” comments on the fascination programming exerts: “There was something amazingly enticing about programming.” Steve Wozniak, the person who built the first real personal computer, says forthrightly about his discovery of the wonders of programming: “It was just the most intriguing world.” This is a general spirit: hackers program because programming challenges are of intrinsic interest to them. Problems related to programming arouse genuine curiosity in the hacker and make him eager to learn more.

source: http://www.nytimes.com/books/first/h/himanen-hacker.html

After Action from 12/28/10

What did I do you last night at the hacker space:

  • Built the contact mic (pictured)
  • Fired up & logged into the Cisco 2600 router, figured out that the IOS it’s running isn’t new enough to support VLANS. Need to sort that out.
  • Figure out that the ALFA I got from china is busted. (SAD puppy)
  • Got GPS/Kismet working on the toughbook.
  • Took out the trash

Not bad for a couple of hours at the space.