- Joined
- Dec 16, 2019
this is the eternal journey of the a-log and why they all become lolcows; once they start comparing themselves they put themselves in the same classIt's like saying "Look! I'm smarter than this kid with Down's"
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
this is the eternal journey of the a-log and why they all become lolcows; once they start comparing themselves they put themselves in the same classIt's like saying "Look! I'm smarter than this kid with Down's"
I distinctly remember Claire mentioning the Brave Browser's integrated password manager, which all you need to copy is to get the user profile's seed words, then you can sync it on any other computer and get all the password, bookmarks, search history, even cookies I believe.Here's a decrypted string dump ofa.class
:
Code:SELECT origin_url, username_value, password_value FROM logins file_roots FILE_ROOTS file_info aix path dQw4w9WgXcQ: \AppData\Local PROXY_DEAD proxy_send Local State FILE_INFO encrypted_key \discordcanary os_crypt 209.141.40.241 host_key FILE_ROOTS \AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ darwin chromium_cookie os.name KIT_STATE \Google(x86)\Chrome user.name APPDATA chromium_pass encrypted_key origin_url \Microsoft\Edge file_list user.name \Chromium mac kit SHA-256 PROXY_DEAD \User Data\Local State \Epic Privacy Browser FILE_LIST .log C:\Users\ sessions SESSIONS username_value nix C:\Users\ PASSWORDS jdbc:sqlite: encrypted_value nux SELECT * FROM cookies \Google\Chrome TEMP_LGN_ .ldb COOKIES \BraveSoftware\Brave-Browser \User Data\Default\Login Data file_download File org.sqlite.JDBC Folder Local Storage\leveldb dQw4w9WgXcQ:[^.*\\['(.*)'\\].*$][^"]* password_value APPDATA os_crypt \discord BAD proxy_tunnel image_capture KIT_STATE \User Data\Default\Network\Cookies TEMP_CKE_ jdbc:sqlite: \User Data\Local State \AppData\Local
Still having look at it but it seems to also access some Chrome databases (probably passwords and bookmarks) also seems to make some Win32 API calls.
Sometimes less *is* more.Smaller and fewer tits, though.
I am doing it on my lab Mac that doesn't have Java installed.I cannot even begin to imagine why you would not do this on an isolated device.
The strings imply info stealer so going after session cookies and browser stored passwords. But I'd be worried the malmod dropped something too, maybe in AppData. It's unlikely but it did but should be ruled out (if Claire is reading). In fact.. just reimage your computer.I distinctly remember Claire mentioning the Brave Browser's integrated password manager, which all you need to copy is to get the user profile's seed words, then you can sync it on any other computer and get all the password, bookmarks, search history, even cookies I believe.
So if they got access to that and she was using it to store her passwords, that's game over at that point.
so the strings are pretty shotgun; I wonder if this was customized for her or if was an off-the-shelf exploit. I see Edge, Epik Privacy Browser, Chrome, Brave all listed, and some other standard windows locations that could contain COOKIES and shitI distinctly remember Claire mentioning the Brave Browser's integrated password manager, which all you need to copy is to get the user profile's seed words, then you can sync it on any other computer and get all the password, bookmarks, search history, even cookies I believe.
So if they got access to that and she was using it to store her passwords, that's game over at that point.
SELECT origin_url, username_value, password_value FROM logins
you ALWAYS reimage - reinstall from original OS media and do NOT use ANY backups that you cannot be guaranteed are safeThe strings imply info stealer so going after session cookies and browser stored passwords. But I'd be worried the malmod dropped something too, maybe in AppData. It's unlikely but it did but should be ruled out (if Claire is reading). In fact.. just reimage your computer.
If you are referring to Claire, I think she just didn't know any better, she was apparently learning as she went.I cannot even begin to imagine why you would not do this on an isolated device.
Here's a decrypted string dump ofa.class
:
Well, she definitely learned one thing. Fuck around=Find out.If you are referring to Claire, I think she just didn't know any better, she was apparently learning as she went.
Completely possible to deobfuscate the code itself, looks like spaghetti I used to write to create my own silly "algorithms". It may be a tool to deobfuscate it too. I'm too lazy to peep the source code myself but I'm handing the key to anyone interested.
The string dump alone though gives enough hints nonetheless. Content is being uploaded to http://209.141.40.241/, but pinging that doesn't seem to give any results. There's snippets of regex that's "[^.*\\['(.*)'\\].*$][^"]*", but I can't tell what it's being used for and playing with it doesn't deem anything other than being intentionally obfuscated. There's also Youtube Rickroll links, which I wonder if there was code to open a Rickroll in the browser or something upon loading the modpack. Cannot tell otherwise.
I cannot even begin to imagine why you would not do this on an isolated device.
Per DNS records, storage.thehormanns.net is hosted at that IP. Looks like some boomers running a severely out of date hobby website got hacked and used as deniable infra. But the http://thehormanns.net resolves to 50.116.60.82, weird.Completely possible to deobfuscate the code itself, looks like spaghetti I used to write to create my own silly "algorithms". It may be a tool to deobfuscate it too. I'm too lazy to peep the source code myself but I'm handing the key to anyone interested.
The string dump alone though gives enough hints nonetheless. Content is being uploaded to http://209.141.40.241/, but pinging that doesn't seem to give any results. There's snippets of regex that's "[^.*\\['(.*)'\\].*$][^"]*", but I can't tell what it's being used for and playing with it doesn't deem anything other than being intentionally obfuscated. There's also Youtube Rickroll links, which I wonder if there was code to open a Rickroll in the browser or something upon loading the modpack. Cannot tell otherwise.
Imagine not keeping your passwords in your autistic brain (or, failing that, an inconspicuous .ini file in SysWOW64 folder on a machine that is not connected to the Internet)Password manager bros, you got too cocky!
Always test any .exe you just downloaded from some randy in an isolated VM. Any shitposter worth their salt should know this.I cannot even begin to imagine why you would not do this on an isolated device.
Always test any .exe you just downloaded from some randy in an isolated VM. Any shitposter worth their salt should know this.
This truly was a woman moment.
Another W for the Geckochads!I see Edge, Epik Privacy Browser, Chrome, Brave all listed, and some other standard windows locations that could contain COOKIES and shit
firefox not listed
This is likely what happened. I also think it's worth pointing out that she "never imagined someone would be so dedicated to attacking the site, me, my husband and our children to go to the lengths that these people have". Like...really? I genuinely do not understand how she could have underestimated the power of autism so much.If you are referring to Claire, I think she just didn't know any better, she was apparently learning as she went.
Oh boy do I have the perfect OS for that ?remove computer from internet completely