Publication Phineas Fisher is not just a detailed account of the attack on the company’s system, but also a kind of political platform, explaining the motives of the attacker. “That’s all you need to close the company and prevent human rights violations. That is the beauty and the asymmetry of resistance: in just one hundred hours, only one person is able to nullify the years a multi-million company. Hacking humiliated gives a chance to fight and win,” said in a statement. According to Phineas Fisher real “ethical hackers” publish documents revealing corruption and abuse of power, rather than advise and help companies deserve to be hacked. As the hacker explained to penetrate the internal network of “Hacking Team”, he exploited a zero-day vulnerability. Since the vulnerability remains unpatched, Phineas Fisher does not report any details of it. Once inside the network, he downloaded e-mails and access other servers. Then the hacker gained administrative privileges basic Windows network and observed the actions of the administrators. Using keylogger Phineas Fisher managed to steal the password of a member of Hacking Team Christian Pozzi and used it to gain access to all the source code of Hacking Team, stored on a separate isolated network. Using password recovery function, the hacker changed the password to the account of the company on Twitter, and on July 5, 2015, Phineas Fisher reported a burglary on behalf of itself Hacking Team. According to Phineas Fisher, he spent six weeks on the corporate network, and the implementation of the attack and the kidnapping of data to it took one hundred hours.

Δ

Hacker Explained Step By Step About The Attack On The  Hacking Team  - 14Hacker Explained Step By Step About The Attack On The  Hacking Team  - 29Hacker Explained Step By Step About The Attack On The  Hacking Team  - 97Hacker Explained Step By Step About The Attack On The  Hacking Team  - 88