Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

How Hackers "live off the land"
microsoft ^ | rodguy911

Posted on 03/31/2024 3:20:03 AM PDT by rodguy911

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-72 next last
To: KrisKrinkle

Have no idea.


21 posted on 03/31/2024 6:54:31 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 16 | View Replies]

To: Manuel OKelley; All

Good.What are we missing? What is your take on what happened?
I build fishing rods dont know much at all about computers but I know a good story when I see one.FR has endless resources here so whatever anyone has to contribute would be great!


22 posted on 03/31/2024 6:56:45 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 18 | View Replies]

To: bankwalker

dont know but heres the authour from the link:

ABOUT THE AUTHOR

Oakley Cox
Analyst Technical Director, APAC
Oakley is a technical expert with 5 years’ experience as a Cyber Analyst. After leading a team of Cyber Analysts at the Cambridge headquarters, he relocated to New Zealand and now oversees the defense of critical infrastructure and industrial control systems across the APAC region. His research into cyber-physical security has been published by Cyber Security journals and CISA. Oakley is GIAC certified in Response and Industrial Defense (GRID), and has a Doctorate (PhD) from the University of Oxford.


23 posted on 03/31/2024 6:58:22 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 17 | View Replies]

To: rodguy911

“The land” is Microsoft Windows OS.


24 posted on 03/31/2024 6:58:59 AM PDT by linMcHlp
[ Post Reply | Private Reply | To 1 | View Replies]

To: linMcHlp

thanks does living off the land like the volt typhoon chicoms use make it harder to find them?


25 posted on 03/31/2024 7:04:44 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 24 | View Replies]

To: All
Great catch bud.

So much shipping goes on at the Baltimore port it's:

1. A likely target

2.Add in hazmat waste floating in the water.

3.A ship with terrible maintenance records

4.Crash happens right over a gas pipeline on the bottom. Huge costs and long time line to fix everything

5.A ship with a historical lousy maintenance record and you could have a well planned attack.

Also we had a post on the TV talk show thread that claimed the computer system on the ship was an older system easy to hack. Could be coincidence but that ship is sailing fast....

26 posted on 03/31/2024 7:48:21 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 1 | View Replies]

To: rodguy911

If you have an old ship:

1. You spend money first on maintaining the operation of the equipment as it exists.

2. If you want to spend more, you can put sensors on critical data acquisition points.

3. If you want to spend even more, you can automate critical systems in the boat.

I’ll go out on limb and say this ship is in phase 1. It floats, but they couldn’t even keep the engines running.

Of course the crew has internet, GPS, and tablets aboard. No one operates without that stuff these days.

But with this ship, I would guess that “hacking into it” means that you might see the videos the crew watched, and that’s about it.


27 posted on 03/31/2024 8:05:29 AM PDT by MV=PY (The Magic Question: Who's paying for it?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: rodguy911

Not ignoring you just have a lot of stuff going on today

Will follow up on this, have some pretty simple explanations on how some of this stuff works and why it makes certain causes improbable


28 posted on 03/31/2024 8:11:44 AM PDT by Manuel OKelley
[ Post Reply | Private Reply | To 22 | View Replies]

To: MV=PY

Contaminated fuel could have been the problem. Apparently that’s a known issue in the maritime industry, particularly if the fuel originated from China.


29 posted on 03/31/2024 8:37:20 AM PDT by Pelham (President Eisenhower. Operation Wetback 1953-54)
[ Post Reply | Private Reply | To 27 | View Replies]

To: rodguy911
There is a strong probability that using Microsoft Windows OS, increases vulnerability of systems that manage and route network traffic.

Next, there are plenty of careless users of Windows OS devices, who desire convenience instead of conservative management of their device and network softwware (such as Internet browsers, e-mail, text messaging, firewalls, javascript and other script DENY/ALLOW) settings.

Such users "simply" will not use complex passwords. Or, they will use the same password at various websites and for various accounts. Or, they will click on links in e-mail messages (that is very helpful for hackers on phishing expeditions).

In addition, millions of users are glued to Google, regardless of plenty of online information that explains: Using Google is HIGH RISK - exposing behavior and words that reveal user patterns.

Hackers come from the botnets and DNS mist that works for communism and criminals, afforded by the Obama Administration:

- - -

[ALL-AMERICAN] List of DNS Root Servers in 1990 - ICANN WIKI (their table:)

Original NameNew NameOrganisation
SRI-NIC.ARPANS.NIC.DDN.MILSRI International
A.ISI.EDUA.ISI.EDUInformation Science Institute, USC
C.NYSER.NETC.NYSER.NETRensselaer Polytechnic Institute
TERP.UMD.NETTERP.UMD.NETUniversity of Maryland
GUNTER-ADAM.ARPAGUNTER-ADAM.AF.MILU.S. Air Force Networking Group
NS.NASA.GOVNS.NASA.GOVNASA Ames
BRL-AOS.ARPAAOS.BRL.MILBallistic Research Laboratory, U.S. Army

On 28 July 1991, the server NIC.NORDU.NET was added to the root zone and became the first non-U.S. root server, located in Sweden. A.ISI.EDU was retired. RSSAC023: History of the Root Server System - Friday 11/04/2016

NameIP AddressOrganisation
NS.NIC.DDN.MIL192.112.36.4Network Solutions, Inc.
KAVA.NISC.SRI.COM192.33.33.24SRI International
C.NYSER.NET192.33.4.12NYSERnet
TERP.UMD128.8.10.90University of Maryland
NS.NASA.GOV128.102.16.10, 192.52.195.10NASA Ames Research Center
NIC.NORDU.NET192.36.148.17NORDUnet [Sweden]
AOS.BRL.ARPA192.5.25.82Ballistic Research Laboratory, U.S. Army

- - -

Attack floods Internet root servers with 5 million queries a second - Wednesday 12/09/2015

[EXCERPTS]

Perhaps more concerning, the junk queries were received by name servers that use IP Anycast, a network routing method that assigns the same public IP address to multiple geographically dispersed servers. Since the attack was observed hitting Anycast machines, that means the significant resources that made them possible were also geographically dispersed rather than being from a handful of sources in just a few locations.

"This event was notable for the fact that source addresses were widely and evenly distributed, while the query name was not," an advisory published Friday noted. "This incident, therefore, is different from typical DNS amplification attacks whereby DNS name servers (including the DNS root name servers) have been used as reflection points to overwhelm some third party."

A large botnet of infected computers or other Internet-connected devices is the most plausible explanation for such an attack.

Since 2003, Intel-based machines have been used exclusively. - Tuesday 09/21/2021

The number of DNS Root Servers grew to 13.

- - -

7 Days Before Obama Gives Away Internet & National Security - Saturday 09/24/2016

Before 10/01/2016, ICANN performed management responsibility under oversight of the National Telecommunications and Information Administration (NTIA), an agency of the United States Department of Commerce. - Wikipedia

- - -

DNS Root Servers: What Are They and Are There Really Only 13? - Friday 07/30/2021

Location of the DNS Root Servers. The 13 root name servers, designated by letters A thru M, are operated by 12 independent organisations. Details about each DNS Root Server Operator, can be found at that Root-Servers.org website. Map of the DNS Root Server System:

A Deep Dive on the Recent Widespread DNS Hijacking Attacks - Monday 02/18/2019



30 posted on 03/31/2024 9:44:33 AM PDT by linMcHlp
[ Post Reply | Private Reply | To 25 | View Replies]

To: rodguy911
How To Start The Ship's Main Engine: From Preparation to Full Away

How We Steer A Cargo Ship | Life At Sea

Why No Tugs MV Dali/Key Bridge Baltimore

Spar Lyra Not Under Command

Ships emergency diesel generator and switchboard

How to let go an anchor - Anchor dropping Step by Step Procedure

- - -

31 posted on 03/31/2024 9:56:14 AM PDT by linMcHlp
[ Post Reply | Private Reply | To 30 | View Replies]

To: MV=PY; All

Somehow it has to be explained how the ship miraculously turned the last minute and hit a vulnerable part of the bridge.


32 posted on 03/31/2024 9:56:26 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 27 | View Replies]

To: rodguy911
So we are being asked to believe that the 24/7 global surveillance structure we live in is not secure?

That our government - and many others - spend BILLIONS if not TRILLIONS - to have complete access to our texts, phone calls, browsing histories, emails, and every single thing we do online, in addition to all of our government data - SSA, IRS, military records, etc; in addition to our electronic medical records. Every computer system in existence could easily be monitored every single second. How would we know? Anonymous internet posters…or globalist-puppet “experts?”

Globalism is a system. Agenda 2030 and Vision 2050 are being implemented whether we like it or not. This implementation doesn’t function properly unless the entirety of human activity is monitored and controlled. Hacking doesn’t work in that environment. So real hacking and all the uncertainties that go with it - have no place in the New Order.

Maybe hacking has become another psychological operation, driving people to purchase “protection” - to the tune of billions of dollars a year, with the added benefit of creating permanent fear and uncertainty. And add it to the list of plausible reasons for events that seem random but aren’t.

Hacking might be lucrative but it can’t touch the financial benefits to be had from publicizing the fear of hacking, the fear of losing (what used to be) our privacy.

33 posted on 03/31/2024 9:59:26 AM PDT by yelostar (Spook codes 33 and 13. See them often in headlines and news stories. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Manuel OKelley

No problem appreciate your interest. Once aganin someone has to figure out how this ship makes a last minute turn, hits a vulnerable part of the bridge, lands over a gas pipeline, below it and has hazmat containers leaking into the water dangerous stuff.Seems like too many coincidences for me but I dont run ships.


34 posted on 03/31/2024 9:59:44 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 28 | View Replies]

To: Pelham

Common problem with diesels on the water. But the smart guys use multiple filters, this boat was clearly not run by smart guys. That could easily be why it starts and stops as well a fuel problem.


35 posted on 03/31/2024 10:01:17 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 29 | View Replies]

To: linMcHlp

Wow cant thank you enough after lunch Im gonna see what i can handle with that post,brilliant stuff!!


36 posted on 03/31/2024 10:03:19 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 30 | View Replies]

To: yelostar
I have no doubt you are correct. My only question would be ow did so many coincidental issues occur with one ship hitting a bridge.I previously listed them all.
37 posted on 03/31/2024 10:05:25 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 33 | View Replies]

To: rodguy911
Marine Traffic dot com

My guess is, there is some probability of Microsoft Windows OS -based Ship Control Management software, that has bugs.

Bridge Command - An interactive 3d ship & radar simulator

Integrated bridge system - K-Bridge

L3Harris Ship Navigation Control Systems

- - -

38 posted on 03/31/2024 10:10:35 AM PDT by linMcHlp
[ Post Reply | Private Reply | To 31 | View Replies]

To: rodguy911
MV Dali and Francis Scott Key Bridge (FSK) - more data

00:39:00 Ship departed from the Seagirt Marine Terminal
01:07:00 Ship entered the Fort McHenry Channel [NOAA Nautical Chart 12281]
01:24:00 Ship traveling at a heading of 141 at about 9.2 mph [8 knots]
01:24:59 Censor data stopped recording, but audio recording continued
01:26:02 Censor data recording resumed
01:26:39 Pilot made a radio call for tugs to assist
01:27:04 Pilot ordered an anchor drop
01:27:25 Pilot radioed that all power was lost and asked for bridge to be closed
01:29:00 Ship was traveling less than 8 mph [less than 7 knots]
01:29:33 VDR recorded sounds consistent with crash, and dash cameras show bridge lights go out
01:29:39 Pilot reports to Coast Guard that the bridge is down

Ref.: NTSB Timeline Reveals Crucial Minutes Leading Up to Baltimore Bridge Strike

- - -

NOAA - Tides & Currents - Baltimore, MD

- - -

My latest guess, is that there was enough out-bound tide current from the Curtis Bay Channel - starboard side of MV Dali - as the ship entered the junction of that channel and Fort McHenry Channel used by the ship.

Such that, the ship bow was pushed a bit to port (left) . . . and the ship's helm responded by a touch of right rudder to compensate - that sent the stern a bit to port (left).

Followed by, the bow was past the Curtis Bay Channel current force, while the stern was still in that current effect.

A trivial adjustment in more open waters, but too late to fix in so short a distance to the bridge - complicated by the "mechanical issues" that coincide with power outage and sensor outage.

- - -

39 posted on 03/31/2024 10:43:12 AM PDT by linMcHlp
[ Post Reply | Private Reply | To 32 | View Replies]

To: linMcHlp

Bridge Command is very highly flexible, with the environmental model, ships, buoys, individual scenarios and almost all aspects of the simulation being configurable to your own needs. Bridge Command can be run on a single computer, with no additional devices needed. It can also be run with physical controls, and has an interface where a trainer can control scenarios in order to carry out training exercises, from a second computer. It can display on a single screen, or can display a full panoramic view across multiple screens using multiple computers. The radar picture is simulated in real-time, and includes standard marine radar controls such as gain and clutter, as well as features such as parallel indexes and ARPA contact tracking.
.................................
above from your link on bridge command “if a trainer can control it” can it be hacked so most anyone could operate the ship?how does that work.?


40 posted on 03/31/2024 10:56:25 AM PDT by rodguy911 (HOME OF THE FREE BECAUSE OF THE BRAVE!! ITS ALL A CONSPIRACY: UNTIL ITS NOT))
[ Post Reply | Private Reply | To 38 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-72 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson