Bitcoin Forum
November 13, 2024, 08:08:10 PM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: FBI Reveals Exactly How They Hacked Silk Road  (Read 1244 times)
MicroGuy (OP)
Legendary
*
Offline Offline

Activity: 2506
Merit: 1030


Twitter @realmicroguy


View Profile WWW
September 06, 2014, 06:24:20 PM
 #1



The defense in Ross Ulbricht’s case has accused the government of conducting illegal searches, and questioned exactly how law enforcement officials could have pinpointed the location of the Silk Road data center, considering it was hidden inside the TOR network.

The answer came just a hours ago in new court filings published by the prosecution as part of its rebuttal, describing the precise method used by the FBI to track down the marketplace used primarily for illegal drug trafficking.

As investigators typed “miscellaneous” strings of characters into the Silk Road login page’s entry fields, they noticed an IP address that didn’t match any known Tor “nodes,” the computers that bounce information through Tor’s anonymity network to obscure its true source.

And when they entered that IP address directly into a web browser, the Silk Road’s CAPTCHA prompt appeared, the garbled-letter image designed to prevent spam bots from entering the site.

“This indicated that the Subject IP Address was the IP address of the SR server,” writes former FBI agent Christopher Tarbell, “and that it was ‘leaking’ from the SR server because the computer code underlying the login interface was not properly written to work on the TOR network.”

That discovery by the FBI, the prosecuting attorneys in Ulbricht’s case argue, means that no illegal spying techniques were used or needed to pinpoint the world’s largest anonymous market for illicit drugs.

In fact, they stated, the evidence revealing the server’s physical location was left in plain sight due to faulty website code.

Full Story: http://altcoinpress.com/2014/09/fbi-reveals-exactly-how-they-hacked-silk-road/
dankkk
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250



View Profile
September 06, 2014, 07:11:54 PM
 #2

I would not be surprised if Ross's defense team question just what the FBI agent's definition of "entering misc text" in the Capha field on the login screen means. I would think this would be something much more then an FBI agent simply typing the incorrect code, or even typing it incorrectly multiple times in a manual fashion. If this was the case then another attacker would almost certainly have been able to figure out the IP address of the SR servers. I would suspect that the FBI agent was likely using somewhat of a more sophisticated method of attack, maybe something to do with DDoS, or maybe something else.
wasserman99
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
September 06, 2014, 10:51:00 PM
 #3

I would not be surprised if Ross's defense team question just what the FBI agent's definition of "entering misc text" in the Capha field on the login screen means. I would think this would be something much more then an FBI agent simply typing the incorrect code, or even typing it incorrectly multiple times in a manual fashion. If this was the case then another attacker would almost certainly have been able to figure out the IP address of the SR servers. I would suspect that the FBI agent was likely using somewhat of a more sophisticated method of attack, maybe something to do with DDoS, or maybe something else.
I think the former FBI agent likely left out material details in his affidavit. It took the government too long to take down SR in order for them to find the location that easily. They either found a backdoor and changed the settings of the capha or there is something more to the story.

Tomatocage
Legendary
*
Offline Offline

Activity: 1554
Merit: 1222

brb keeping up with the Kardashians


View Profile
September 06, 2014, 10:53:13 PM
 #4

Very sneaky, sis...

Recommended Exchanges: Binance.com | CelsiusNetwork
GPG ID: 4880D85C | 1% Escrow | 8% IPO/ICO Escrow services Temporarily Closed | Bitcointalk is the ONLY place where I use this name (No Skype/IRC/YIM/AIM/etc) | 13CsmTqGNwvFXb7tD9yFvJcEYCDTB8wQTS | Beware of these SCAM sites! | *Sponsored Link
itsAj
Hero Member
*****
Offline Offline

Activity: 588
Merit: 500



View Profile
September 07, 2014, 03:02:38 AM
 #5

As investigators typed “miscellaneous” strings of characters into the Silk Road login page’s entry fields, they noticed an IP address that didn’t match any known Tor “nodes,” the computers that bounce information through Tor’s anonymity network to obscure its true source.
I don't buy this. I am not a fan of people of buying and selling drugs (or using drugs), on the internet or otherwise, but I am a fan of people getting a fair trial in court.

If it was really this easy then one of the many people that wanted to blackmail/extort DPR and SR would have likely figured this out before the FBI did.
twiifm
Hero Member
*****
Offline Offline

Activity: 784
Merit: 500



View Profile
September 07, 2014, 03:14:54 AM
 #6

Thats cool that they have to wear the jackets with giant FBI letters on it in the office
herebittybittybitty
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile
September 07, 2014, 03:51:05 AM
 #7

Eh. I don't believe anything a 3-letter agency says anymore.

Congrats though, now there's nowhere to buy drugs on Tor.  Roll Eyes
haploid23
Legendary
*
Offline Offline

Activity: 812
Merit: 1002



View Profile WWW
September 07, 2014, 05:09:37 AM
 #8

I don't buy this either. It sounds like an extremely simplified version so the nubs in court can understand, but I'm sure the hack job was much more stringent.

grappa_barricata
Full Member
***
Offline Offline

Activity: 154
Merit: 100

playing pasta and eating mandolinos


View Profile
September 07, 2014, 08:23:02 PM
 #9

I've read the report... seems legit. I think it was something like a faulty Securimage (or similar) setup. They probably used the Securimage code as-is, and when found out that it wasn't working over the tor pseudo-device (or proxy), they messed with iptables until it worked  Roll Eyes.

Fortune cannot take away what she has not given.
oceans
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile
September 07, 2014, 08:32:26 PM
 #10

I'm another who is not buying this either. Something just does not seem right about this. I understand that they want to track down and eliminate problems such as this, but I always thought that every human being had a right which meant also a right to a fair trial.
dankkk
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250



View Profile
September 07, 2014, 08:57:27 PM
 #11

I've read the report... seems legit. I think it was something like a faulty Securimage (or similar) setup. They probably used the Securimage code as-is, and when found out that it wasn't working over the tor pseudo-device (or proxy), they messed with iptables until it worked  Roll Eyes.
My concern is that they did not provide the technical details of what exactly they did to get the IP address via the headers. I would speculate that the FBI launched an attack that would likely be considered to be malicious against the SR site.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!