Offensive Cyber Capabilities

Companies Need Offensive Cyber Capabilities

gAtO hEaR – about banks seek U.S Help on Iran Cyberattack’s. We hear about cyber attacks in the financial sector, the oil and energy sectors, then Leon Panetta warned perpetrators to cease hacking the US while we have all kinds of sanctions against Iran -/ this is insanity. Your telling unknown hackers (we suspected Iran) to  just stop, or what. What can we do to prevent them from launching cyber attacks against America.

So Iran has only 3 NAT-access points and 1 submarine cable (Al-Faw, Iraq submarine cable)


Then you have all these security people putting up defenses without building a firewall so bad-ass that they cannot do business. If we keep building these defenses it will get to a point where it defeats the purpose of the Internet. So what is the logical next move, offensive cyber weapons and capabilities. We can find these attacks and pinpoint the IP of where they are coming from then all we need is offensive tools to find them and do a seal-team 6 extraction of something like that and get the word out that we will find you and hunt you down.

One little hacker can keep a bank tied up for days in the middle of the desert. They could go after our traffic system, our rail system we know that SCADA is so messed up and in some cases open with defaults passwords. So we beat our chest like some mad gorilla and hope to scare these hackers.

My friends we must take initiative and find ways to counter these attacks no more just defense and I don’t mean a Ddos attack that can be circumvented. We need to plant Bot-nets on these people’s machines and monitor them and if we have to go physical and bring them to justice. Forget about Iran and let’s just talk about Chinese hacker attacks of our intellectual property. They just denied it and go about planning the next attack. We seen Skynet were thousands of computers were given a disk wipe and the blue screen of death. Why don’t we do the same to these hackers going after our infrastructure.

We must change our tactics and be a little more aggressive and become real cyber warriors not just defenders but attacking them and destroying their machines, their servers and routers. How about we just monitor the 1 submarine cable and 3 access points in Iran that should lead us to some of these people. The US monitors our own people then we stand by and allow other hostile countries to go and hack us. This is cyber insanity – gAtO OuT



Government Spying on everyone -Thanks Microsoft

gAtO lEaRnOn 01-01-213 we hear that Microsoft buys Skype and makes changes to allow Police surveillance. Then on 01-07-2013 we hear that a professor at the Warsaw University of Technology, Wojciech Mazurczyk, found a way to insert secret 70 bits of data and add secret information similar to steganography.spy-spy

Lawful Intercept is what it’s called and we just heard punch – counter-punch from the government. I just posted about corporations and governments using offensive cyber weapons to fight crime, but this looks like just plain old spying on citizens like China, Iraq and Syria does. Skype is owned by Microsoft and we know that Word and other products have back doors for them to snoop and governments to use in criminal cases. I guess they do it the proper way and get a real FISA document to monitor us it’s citizens.

mEoW 12-30-2012 our re-elected President Obama signs FISA Warrantless Wiretapping Program. STOP – SAY WHAT. mEoW – Forget about gun control how about the privacy of citizens, are we becoming like China, Iraq and Syria the more I find out about this the crazier it becomes. I hate Skypes but now finding this out NO WAY DUDE-

I did a little digging and I found a document from the Straford hack from the LutzBoat crew and this has been on the play board for a long time. More and more governments that play nice with the America and Microsoft will have to live with the fact that they are spying on us, the people. I voted for Obama but I’m pretty sure any president would want to be able to justify this abuse of power to monitor it’s citizens, what get’s me is we scream and yell when other countries do it but here we are doing to ourselves and nobody is talking about this- Hay press wake up. I have nothing to hide but if you do you have been warned – enjoy your government spying on you behind your back – gAtO oUt

Lab Notes:

IT security continues to be the greatest challenge facing government CIOs worldwide. Most experts agree that governments require stronger partnerships between the public and private sectors for both better protection of government IT systems from intruders and for greater visibility into operators’ network traffic to fight crime. However, government systems and intelligence activities constitute a very sensitive information environment. Governments must proceed with caution when forming technology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February 2009 was named to be the Obama Administration’s top cyber security official, points out how

Lawful Intercept


Criminals, predators and hackers now use chats, blogs, webmail and Internet applications such as online gaming and file-sharing sites to hide their communications.


Qosmos provides law enforcement agencies with a powerful solution to identify a target using multiple virtual IDs and intercept all related IP- based communications. Any trigger, such as a “user login = target” initiates intercept of all IP traffic related to the “target.”

Example of recognized applications and protocols

VoIP Email (POP, SMTP)

Webmail (Gmail, Hotmail, Live Mail, SquirrelMail, Yahoo mail, etc.)

Instant Messaging (Aim, SNM, Skype, Yahoo, Google Talk, QQ, Maktoob, Paltalk, etc.)

Online games (World of Warcraft)

Online classified ads

Audio/Video (H.323, SIP, MGCP, RTP, RTCP, MMSE, RTSP, SHOUTcast, Yahoo Video,

MSN Video, SCCP, etc.)

Web applications (Dailymotion, Google, eBay, Google Earth, HTTP, MySpace, Wikipedia,

YouTube, etc.)

Example of information extracted

Caller, phone number, called party, duration of call

Webmail login, email address, sender, receiver, subject matter, attached documents

Instant messaging sender, receiver, contact lists and status

Forum login, IP address, MAC address, mobile ID (IMSI, IMEI)

Protocols identified even for unidirectional traffic (e.g. email by satellite).





Iran Cyber Problems -bad antivirus software

Iran Cyber Problems

gAtO mOnItOrEd – Iran Tor-Relays last night they had blocked all public relays so nobody could use the ToR network. Of course as long as you have private unlisted ToR relay people from Iran could still use the ToR network on the Internet. On the other side of Iran’s Cyber Warfare the Flame cyber worm – is still kicking ass and taking names in Iran. U.S and Israel have accepted the role of chief cyber warrior of the Stuxnet, DuQu and Flame. Some of the first cyber weapons ever made and deployed on a covert mission’s. Do you think that this cyber weapons did not use ToR networks to hide their C&C server never to be found??? So here we have a country suppressing ToR communication  (and suppressing Flame, DuQu and StuxNet C&C ToR Communication) and being attacked by 2 of the largest countries in the world. gAtO would call this cyber warfare. 

cyber war profiteers –> Who stands to make the most business ($$$) in this cyber warfare. We in the west have Norton, McAfee and other’s to protect our computers and business and government computer enterprise systems – but they cannot do business with Iran- We just had Symantec pull out of a deal with China’s Huawei because of a U.S-DOD contracts-/ a friend pointed to eset.com as the number one anti-virus software distributor to Iran./ When the Iranian government want’s to protect their computers they turn to Eset corporation for their enterprise cyber security support and service. So who are they?

Alexa the number one SEO company – http://www.alexa.com/siteinfo/eset.com – shows Iran is their number one customer—. Why? Eset is based out of the Slovak Republic , Bratislava the capital of Slovakia. It’s not silicone valley – I never heard of a high tech center and educated cyber security experts from that side of the world—  We know this area more for cyber criminals but now this little company out in the middle of know-where has some interesting customer. Those countries that nobody wants are becoming their cyber customers, and it looks like Eset is a growing business.

Eset – Contact info: – http://www.eset.com/us/about/contact/ – They have offices in Czech Republic, Singapore, Argentina and the U.S.A – —/$#@! – So the company that is providing the anti-virus software for Iran has offices in America, with American business as customers- gAtO don’t like that much that is why I mentioned it.

Anti-virus software controls every aspect of the safety and security of your computer, your anti-virus software has deep ties to your computers. So this little anti-virus company is now a world player. It could also be our allied and work with us.

From a business point of view – First of all I would fire them. If I was the Iranian government, Stuxnet, DuQu and Flame the same MO and my anti-virus software does not catch it -new business but, oh well if Iran fires them who else would step into this position. This show to gAtO that the old weapon dealers have turn to legit, cyber counter weapons dealers/

customers metric’s: Imagine the statistics from Eset on Iranian government sites? 

As a security researcher I just don’t like that Eset is in the U.S.A if they get American customers they can maybe sell their stats to Iran. Security companies like anti-virus have a lot of power. Just a simple update and the new spy-ware can get in and turn on your camera or just record your speech in your house or office. I would stay away from Eset anti-virus software solution – just for me gAtO oUt…


Iran Top Sites : http://www.alexa.com/topsites/countries;0/IR

Bratislava: http://en.wikipedia.org/wiki/Bratislava

Alexa-Eset – http://www.alexa.com/siteinfo/eset.com

Eset about page –  http://www.eset.com/us/about/contact/ .

WhoIs – http://whois.domaintools.com/eset.com


ESET, spol. s r.o.

Peter Pasko

Einsteinova 24 Aupark Tower, 16th Floor

Bratislava,   85101


Phone: +421.232244111

Email: sysadmin@eset.com


Registrar Name….: Register.com

Registrar Whois…: whois.register.com

Registrar Homepage: www.register.com


Domain Name: eset.com

Created on…………..: 2001-04-18

Expires on…………..: 2013-04-18


Administrative Contact:

ESET, spol. s r.o.

Anton Zajac

610 W Ash St, Ste 1900 Suite 1900

San Diego, CA 92101


Phone: +1.6198765404

Email: sysadmin@eset.com


Technical  Contact:

ESET, spol. s r.o.

Anton Zajac

610 W Ash St Suite 1900

San Diego, CA 92101


Phone: +1.6198765404

Email: sysadmin@eset.com


DNS Servers:







Cyberwar Iran vs Britain Extra -read all about it

Cyberwar Iran and Britain Read all about it

 gAtO hEaRd –that Iran started this cyber conflict (war ) with a post from the Washington Post Posted at 08:00 AM ET, 03/12/2012 “Iran an era of cyber infection”- are you scared now get ready… Like it or not, we’ve entered a new era in which the global geopolitical balance may be determined by hackers and cyber-activists in hooded sweatshirts rather than career diplomats in fashionable pantsuits. After President Barack Obama’s March 4 address to the American Israel Public Affairs Committee supporting Israel against the threat of a nuclear-armed Iran. There is mounting evidence that the U.S. and Israel mounted a similar type of attack against Iran’s nuclear facilities in 2010. On March 4, CBS News’ “60 Minutes” covered the so-called Stuxnet virus.

Young Muslin Revolutionary

We next see the Iranian women rights activists of the “Change for Equality”on their website. In 2011 the Netizen Prize was awarded to the Tunisian group blogging site Nawaat.org for their coverage of the green movement.  This does not sit well on Iranina male power base. These guy suffer another slap to the face they hear more about how great Stuxnet was kicking their Iranian butt’s— “By Sydney J. Freedberg Jr. The Stuxnet computer worm that damaged Iranian nuclear facilities – widely suspected to be an Israeli or even US covert action – was a model of a responsibly conducted cyber-attack, said the top lawyer for the US military’s …” Tehran boy and boys are getting pretty pissed off that Israel and the US are making them a laughing stock of the world. That’s what our propaganda machine can do to our enemies.

So they strike  the UK news media of the world the BBC – So the great Cyber War begin by Iran attacking a company that has no military cyber team —The BBC has suffered a sophisticated cyber-attack following a campaign by Iranian authorities against its Persian service, director-general Mark Thompson said on Wednesday. Thompson also reported attempts to jam satellite feeds of the British Broadcasting Corporation services into Iran and to swamp its London phone lines with automated calls.

The first stike of the cyber war is a dud DUDE< Your going to jam the feeds and start a cyber war against the BBC, come on how about Dude that’s lame. Big powerful Iran fights a single company—the you go and try to justify your attack on the BCC — On March 6, Iranian state television network Press TV accused U.S. and Israeli hackers of attempting to take down its website. Press TV said it was able to foil the attack with security measures. How about Iran if we start small cyber attack something more mangle to your cyber capability like —Monaco – 0.7 square miles – The tiny state of Monaco lies along the French Riviera on the French Mediterranean coast near Nice. Look Iran gAtO has gotten you an attack site for Monaco Prince Rainier Marries Grace Kelly Web Site: This will show your strength to the world, your cyber prow-less.

gAtO WaTcHiNg U iRaN

While your busy attacking a simple company your youth are learning how to get outside your cyber bubble — Cyber resistance takes centre stage at “[1]One World Festival” It shows the world what this cyber generation can do —”Young generations are contesting the existing power in the West but also in the rest of the world, especially in the East. We want to reflect these changes”, festival director Alexandru Solomon told a press conference.

A special section called “Revolution Online” will showcase “Rouge Parole”, the story of the Tunisian revolution and the expulsion of strongman Zine El Abidine Ben Ali. The Internet and social networks played a crucial role in the mobilization against the regime in several countries, such as Egypt.

“Fragments of a Revolution” shows how Iranian exiles depended on the Internet to follow the “Green movement” in their home countries, trying to find images and comments on social networks, anxiously expecting mails from their friends and families who were left behind.

Ayatollah Khamenei  and Iranian President, Mahmoud Ahmadinejad sorry DUDES but the BBC is not a Nation and they don’t have an military cyber arm like Israel or the US the people that hacked you Nuclear Plants and put you back into the stone age. Next time Iran as Janis Joplin said “Try —Jusat a bit harder , Yeah Baby” You may find out what a real Cyber attack on your country and your total infrastructure that you sent billion to build with a little help from Huawei and the Chinese and Russian – Cyber toys for Oil program we know all about it —When will this cold cruel cyberwar that Iran is waging on the BCC ever stop!— Stay tunes my friends…-gAtO oUt 


[1] http://news.yahoo.com/power-internet-heart-one-world-festival-160848906.html



Iran will reciprocate cyber attack by US: Army commander says

Iran will reciprocate cyber attack by US: Army commander saysIran will reciprocate cyber attack by the United States or its allies, head of the Operations Department of the Iranian Armed Forces Brigadier-General Ali Shadmani said on Wednesday.Ahlul Bayt News Agency – Iran will reciprocate cyber attack by the United States or its allies, head of the Operations Department of the Iranian Armed Forces Brigadier-General Ali Shadmani said on Wednesday.      The official noted that any cyber attack against Tehran would be risky for the US and its allies. Cyber warfare refers to hacking to conduct sabotage and espionage. He said that enemies of the Islamic Republic of Iran tried all their means in different economic, cultural, social, military and security fields in the past three decades to deal a blow to the Islamic Revolution, but to no avail.

via Iran will reciprocate cyber attack by US: Army commander says.