Advertisement
Guest User

a backdoor with backdoors

a guest
Feb 2nd, 2017
62,440
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.18 KB | None | 0 0
  1. Release 1 - the supply chain - a backdoor with backdoors.
  2.  
  3. In this release find a small sample of the 900GB of mere 'user accounts and basic contact
  4. information' recently liberated from Cellebrite.
  5.  
  6. The exploit techniques that Cellebrite employ are wrapped in various encryption schemes
  7. in an attempt to protect 'their' intellectual property. The custom routines for
  8. decrypting this lame ass protection are included in this release along with an
  9. accompanying sample .eas (DLL designed to target devices and applications) and .epr
  10. (bootloaders, exploits and shellcode) files.
  11.  
  12. The more discerning eye will notice that some of the Apple exploits bear a remarkable
  13. resemblance to those available to any teenager interested in the jailbreaking scene;
  14. perhaps not all those tax dollars have been wasted, the Blackberry epr is still worth
  15. a look at.
  16.  
  17. The ripped, decrypted and fully functioning python script set to utilize the exploits
  18. is also included within.
  19.  
  20. Download links:
  21. https://mega.nz/#!sZUkSbDT!l740KTf5TG-TgjN-YNZcejSOfhUn43jZ8jR3Lw_w7dY
  22. https://mega.nz/#!0d9zBQLI!DdKhZDXoMEnO6RpZDHWMGVV7nBXXZ98cPzjzVqLsVuw
  23.  
  24. Coming soon.....
  25.  
  26. Release 2 - watching the watchers - pivot to win.
  27.  
  28. In this release find a small sample of files retrieved via the weaponized Cellebrite
  29. update service deployed on MS Windows based devices and desktops (SYSTEM privs) within
  30. the customer infrastructure.
  31.  
  32. Analysis of the compression and obfuscation employed by Cellebrite on products supplied to
  33. British MOD juxtaposed with the protection free versions supplied to SOCOM and others is
  34. also included within.
  35.  
  36. @FBI Be careful in what you wish for.
  37.  
  38. .-> .->
  39. '-'---.\ / ,---. \-,-----.'-'. ,--.\ .'_ (`-')----. (`-')----. ,------,),(_/----.
  40. | .-. (/ | \ /`.\ | .--./| .' /'`'-..__)( OO).-. '( OO).-. '| /`. '|__, |
  41. | '-' `.) '-'|_.' | /_) (`-')| /)| | ' |( _) | | |( _) | | || |_.' | (_/ /
  42. | /`'. |(| .-. | || |OO )| . ' | | / : \| |)| | \| |)| || . .' .' .'_
  43. | '--' / | | | |(_' '--'\| |\ \| '-' / ' '-' ' ' '-' '| |\ \ | |
  44. `------' `--' `--' `-----'`--' '--'`------' `-----' `-----' `--' '--'`-------'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement