Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

YouDig

(2,280 posts)
Thu May 5, 2016, 08:50 AM May 2016

Some of the many dumb things about the Guccifer story.

The most obvious is that Guccifer's MO is to break into people's emails and then publish them, because he got a thrill out of it. So believing that he hacked Hillary's server and then published nothing and got no glory out of it is a bit like believing that Joseph Smith found golden plates with the word of god on them but then forgot where he put them. What is believable is that Guccifer, who is now going to be spending a long time in prison, would try to draw attention to himself by claiming to have hacked Hillary or claiming that he can prove the Rockefellers were part of some Illuminati conspiracy, or any of the other crazy things he has said.

The way Guccifer hacked people is by social engineering or guessing security questions, not by actually exploiting technical vulnerabilities. He was good at that, but there is no indication that he had the skills necessary to perform a technical hack, and there also isn't any indication that he socially engineered his way into Hillary's email account. The truth is, it's harder to socially engineer your way into a private server than a gmail or AOL account because there are no security questions to guess or tech support people that you can convince to reset your password.

He claims he described how he got into her server, by scanning for open ports, but scanning for open ports doesn't get you into a server. If he had actually gotten in, he would have described which port he used, and how he was able to use whatever service was running on it to obtain access. Finding open ports is easy, anyone can do it, but getting access to the computer through an open port is hard. An open port is not itself a vulnerability unless the service running on that port is vulnerable. Saying you hacked a server by scanning for open ports is a bit like saying that you were able to break into a bank vault by using google to figure out the bank's address and business hours.

One last thing. I see people thinking that because the server was "unsecured" for a few months that somehow means it would be easy for Guccifer to break into. But the thing that was unsecured was the email server running on the computer, not the computer itself. What that means is that communications to and from the server were not encrypted, and could be vulnerable to for example a man-in-the-middle attack. But that does not make it any easier to get in by scanning ports. For a man-in-the-middle attack, you actually have to be "in the middle", and Guccifer wasn't. If you connect to an unencrypted email server using hotel wi-fi, the hotel is in the middle, and they can read your correspondence, possibly spoof you or get your password. But there was no way for Guccifer to place himself "in the middle", nor is there any indication that he has ever done this kind of attack or would even know how.

Is it possible that someone broke into Hillary's server? Sure, after all, with Snowden and Manning and the rest, we know that no digital information is really secure. But Guccifer saying so doesn't make it any more likely.

43 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Some of the many dumb things about the Guccifer story. (Original Post) YouDig May 2016 OP
I don't put much stock in it. cherokeeprogressive May 2016 #1
I look at the main issue being Sid's was hacked and then her server could be tracked. mmonk May 2016 #2
He hacked his e-mail address. As the OP states that's different than hacking a server. DemocratSinceBirth May 2016 #3
You didn't need to hack Sid's email to get Hillary's email address. YouDig May 2016 #5
I doubt many thought that email address was SoS official business. mmonk May 2016 #8
Any lie about Hillary Clinton will be plausible enough to those deep enough into derangement. IamMab May 2016 #4
It really is derangement on their part. LiberalFighter May 2016 #39
Kick! mcar May 2016 #6
K'n'R ucrdem May 2016 #7
Sigh. Go to the "Smoking Gun" website and search for Guccifer. IdaBriggs May 2016 #9
The internet is full of RW noise. ucrdem May 2016 #10
Is that from the "data is for losers" playbook? Lol! nt IdaBriggs May 2016 #12
That one's been reissued as "Shining Path to Victory." nt ucrdem May 2016 #16
Screenshots of Sid Blumnethal's emails, yes. YouDig May 2016 #11
Guess you'll just have to wait for the FBI report to explain. IdaBriggs May 2016 #14
The extradited him because he is a wanted criminal in the US. YouDig May 2016 #15
For hacking NWCorona May 2016 #18
Yes, for hacking, via social engineering. Hacking other people, not Hillary. YouDig May 2016 #19
A bit. Why what's up? NWCorona May 2016 #20
Just curious if, for example, you understand that "scanning open ports" like Guccifer claimed YouDig May 2016 #21
Of course it doesn't NWCorona May 2016 #22
OK, so Guccifer's explanation of how he got in is bogus. YouDig May 2016 #25
Um pinebox May 2016 #32
Yes, that's what I said. He's a social engineerinig hacker who hit some high-profile YouDig May 2016 #33
I see it as both personally pinebox May 2016 #35
Who was already in jail in Romania. IdaBriggs May 2016 #24
What you have is a conspiracy theory, with no evidence. YouDig May 2016 #26
I believe the term will end up being IdaBriggs May 2016 #30
"I'm not a lawyer but I've watched enough Law & Order..." YouDig May 2016 #31
Probably extradited to establish probable cause unc70 May 2016 #23
Actually, it was because he hacked several high-level US officials. YouDig May 2016 #27
Your OP argued he did not hack Clinton unc70 May 2016 #28
You're right. Because he didn't. YouDig May 2016 #29
Hacked or not, Clinton still has troubles unc70 May 2016 #37
Thanks. Kick. lamp_shade May 2016 #13
K&R! stonecutter357 May 2016 #17
k&r obamanut2012 May 2016 #34
Great post. And I love how you shred the bullshit within this thread as well. SunSeeker May 2016 #36
Thank you for the post! Very informative! Lucinda May 2016 #38
There are a lot of things wrong with what you are saying. bobbobbins01 May 2016 #40
Brute forcing only works in movies, or if you're the NSA. YouDig May 2016 #41
You don't really know what you're talking about. bobbobbins01 May 2016 #42
Hilarious, coming from someone talking about brute forcing through SSH. YouDig May 2016 #43

mmonk

(52,589 posts)
2. I look at the main issue being Sid's was hacked and then her server could be tracked.
Thu May 5, 2016, 09:43 AM
May 2016

Then a hacker could sell that address to the highest bidder.

YouDig

(2,280 posts)
5. You didn't need to hack Sid's email to get Hillary's email address.
Thu May 5, 2016, 09:49 AM
May 2016

Anyone she ever sent an email to had it, and anyone they forwarded the emails to. Also, selling it would be useless once Sid's emails were posted on the internet.

 

IamMab

(1,359 posts)
4. Any lie about Hillary Clinton will be plausible enough to those deep enough into derangement.
Thu May 5, 2016, 09:48 AM
May 2016

I think some folks are failing to realize how desperate they're appearing when they try to rely on a criminal's cry for attention as some form of evidence.

 

IdaBriggs

(10,559 posts)
9. Sigh. Go to the "Smoking Gun" website and search for Guccifer.
Thu May 5, 2016, 09:59 AM
May 2016

You can see the screen shots and other info he posted back in 2013. (He made the background pink and used Comic Sans font so people thought it was a joke.)

Then visit the Network-that-shall-not-be-named and again search for him; they have more details that answer your questions, including a more recent interview.

Last, search for "pailthompson" and his posts about this from yesterday; his timeline explains the significance of the hack period (the IT guy wasn't taking care of the server anymore, and they hadn't hired the new company yet).

Enjoy!

YouDig

(2,280 posts)
11. Screenshots of Sid Blumnethal's emails, yes.
Thu May 5, 2016, 10:03 AM
May 2016

He got into those by socially engineering his way into Sid's AOL account, which had nothing to do with Hillary's email server.

I saw the "paulthompson" posts and quickly learned that "paulthompson" doesn't understand the first thing about computer security.

 

IdaBriggs

(10,559 posts)
14. Guess you'll just have to wait for the FBI report to explain.
Thu May 5, 2016, 10:07 AM
May 2016

They extradited him for a reason, so apparently whatever he says is important to them.

NWCorona

(8,541 posts)
18. For hacking
Thu May 5, 2016, 10:17 AM
May 2016

It seems like you are trying to hard to poke holes in his story. Understandable but his claim isn't far fetched.

YouDig

(2,280 posts)
19. Yes, for hacking, via social engineering. Hacking other people, not Hillary.
Thu May 5, 2016, 10:25 AM
May 2016

Out of curiosity, do you know anything about computer security?

YouDig

(2,280 posts)
21. Just curious if, for example, you understand that "scanning open ports" like Guccifer claimed
Thu May 5, 2016, 10:34 AM
May 2016

to do doesn't actually get you into a server.

NWCorona

(8,541 posts)
22. Of course it doesn't
Thu May 5, 2016, 10:41 AM
May 2016

But the fact the server had an outdated and vulnerable remote client program running and you could use brute force tactics on her log in is troubling.

YouDig

(2,280 posts)
25. OK, so Guccifer's explanation of how he got in is bogus.
Thu May 5, 2016, 10:51 AM
May 2016

The outdated email software has absolutely nothing to do with the Guccifer story, because Guccifer didn't claim he hacked the email server, he claimed that he hacked in through an open port, but somehow declined to specify which port and how he got access through it.

Running outdated software is obviously not ideal, but it doesn't make it "easy" to hack by any means. Like I said in the OP, even if client-server communications are unencrypted, to sniff packets or spoof you actually have to control a node in between the client and the server. I don't know if it had any protection against brute-force attacks or not, but brute-force attacks definitely leave traces in logs, and there were no traces found in the logs.

And the bottom line is, email is insecure. It's arguable whether a private server, even running outdated software, is less secure than gmail or .gov, for a lot of reasons. Most hacks aren't spoofing or anything technical, they are social engineering, bad passwords, etc. With a large administered system, there are a lot more ways in. There are a lot more IT people to convince to reset your password. And then there are Edward Snowdens, who it is really hard to protect against in a big organization.

The biggest leaks of classified information we've seen, Snowden and Manning, didn't arise from weak encryption software or outdated certificates, they were simply due to humans who had access. So I think, all things considered, her emails were likely more secure on that home server than on .gov.

YouDig

(2,280 posts)
33. Yes, that's what I said. He's a social engineerinig hacker who hit some high-profile
Thu May 5, 2016, 11:31 AM
May 2016

American officials, which is why he is being extradited to the US.

 

pinebox

(5,761 posts)
35. I see it as both personally
Thu May 5, 2016, 11:33 AM
May 2016

I think he probably went ahead and did as you say and did as the others say.
One thing is for sure, we'll know more in the coming weeks and it is going to get damn interesting.

 

IdaBriggs

(10,559 posts)
24. Who was already in jail in Romania.
Thu May 5, 2016, 10:46 AM
May 2016

But if you believe its just a coincidence, you can be surprised later.

YouDig

(2,280 posts)
26. What you have is a conspiracy theory, with no evidence.
Thu May 5, 2016, 10:52 AM
May 2016

While we're at it, maybe Ted Cruz's dad really did kill JFK.

 

IdaBriggs

(10,559 posts)
30. I believe the term will end up being
Thu May 5, 2016, 11:24 AM
May 2016

"criminal conspiracy" and the explanation of charges will come from the FBI and DOJ. The emails she had deleted and edited and her "private server" will become "evidence".

I'm not a lawyer but I've watched enough "Law & Order" to know those folks investigate crimes. Spin all you want; you aren't as credible as they are.

YouDig

(2,280 posts)
31. "I'm not a lawyer but I've watched enough Law & Order..."
Thu May 5, 2016, 11:25 AM
May 2016

I think that pretty much sums it up.

unc70

(6,501 posts)
23. Probably extradited to establish probable cause
Thu May 5, 2016, 10:42 AM
May 2016

And to establish basis for evidence regarding Blumenthal emails and thus probable cause for investigating Clinton's server for containing national security information and through that the Clinton Foundation emails. Everything is being done carefully by the book for probable cause, chain of custody, etc. and avoid any risk from the exclusionary rule.

Whether Guccifer himself actually hacked Clinton's server or email may be interesting or even otherwise important, it is not required for establishing the cases in the likely criminal investigations of Blumenthal or Clinton and her staff. It is mostly a distraction from the core issues.

YouDig

(2,280 posts)
27. Actually, it was because he hacked several high-level US officials.
Thu May 5, 2016, 10:54 AM
May 2016

But conspiracy theories are fun too.

unc70

(6,501 posts)
28. Your OP argued he did not hack Clinton
Thu May 5, 2016, 11:11 AM
May 2016

That was why I discussed how his possibly hacking her server was not necessary for investigating the likely issues concerning Clinton, et al.

The fact that Guccifer actually hacked others like Powell undermines your arguments in OP. Hacking his personal email and posting pictures of Powell at Bohemian Grove isn't quite the same as exposing national security information.

YouDig

(2,280 posts)
29. You're right. Because he didn't.
Thu May 5, 2016, 11:14 AM
May 2016

He's got nothing to do with Clinton, except that he hacked Blumenthal's account which had emails from Clinton on it. If I had sent Blumenthal emails, then he would have accessed those too. It has nothing to do with the security on Clinton's side.

And, like I said in the OP, the way he hacked those others is by social engineering, not exploiting security vulnerabilities. He claims to have hacked Hillary in a totally different way, and yet can't even explain how he did it, nor provide any evidence of it. It's no wonder that the Right Wing Media is running with this.

unc70

(6,501 posts)
37. Hacked or not, Clinton still has troubles
Thu May 5, 2016, 12:14 PM
May 2016

Guccifer's hack of Blumenthal is how we learned first of Clinton's server. What we have learned since is serious, very serious. Whether she or her staff will be indicted is another matter. I see it likely that she and some of her staff knowingly circumvented several laws and regulations and then took specific actions to obfuscate and cover up such actions. Things like editing copies of certain emails before the were printed and delivered to State go a long way in establishing intent and proving conspiracy.

If even a single associate is indicted, the political damage will be huge for all Democrats.

Blumenthal and his sources are in big trouble of their own, and it would have similar political fallout for Clinton and all of us.

FYI I have over 40 years of professional experience in and around security and technology, though I no longer deal with day-to-day operations. I am appalled by the incompetence exhibited in this episode. There are several DUers with specific and detailed knowledge of the specific security systems and practices current at State and other Federal agencies. Their posts attest to the seriousness of these problems.

bobbobbins01

(1,681 posts)
40. There are a lot of things wrong with what you are saying.
Fri May 6, 2016, 12:02 AM
May 2016

For instance...if he gets the IP address, he can attempt to log in via SSH(port 22), which then gives him access to a login screen which accepts a username and password.

He'd then need a username and a password, and depending on how secure the server was(and indications show it wasn't secure at all), assuming it was a ubuntu server, which is pretty common, there is a default user 'ubuntu', so from there he could just brute force his way in by trying different passwords.

Also, many email servers are configured so that each email account is also a user on the server, so he'd already have a username(Hillary Clinton's) to try. That would probably be even easier than trying to guess the ubuntu user's password, because there is a chance that her server password is the same as her email password, and likely easy to guess.

YouDig

(2,280 posts)
41. Brute forcing only works in movies, or if you're the NSA.
Fri May 6, 2016, 07:47 AM
May 2016

Brute forcing over SSH is not going to work unless the password is something like 4 characters. The number of attempts per second is limited both by bandwidth and by the capacity of the server to accept them. And even if you get 10,000 per second, which you can't, that would mean 15 years to crack even an 8 character password with no digits and no capitals. Besides, most servers are configured to deny access after N repeated failed login attempts.

Brute forcing is only really feasible if you have an encrypted file and you can keep trying passwords on your own hardware, so you try passwords much more quickly and with parallelism. This is why passwords for encrypting files need to be longer than passwords for logging in to servers.

Also, no, Ubuntu does not have a default user "ubuntu". On some versions "ubuntu" is the default username if you boot from a live CD, but not on an installed system. It is possible that she also had a username on the server that matched her email, but this is pure speculation, you certainly don't have to have an account on the machine in order to have an email account.

As far as guessing passwords, sure, that is always possible, that's actually how Guccifer got into other people's email. That's possible with any email account, including state.gov and gmail and whatever.

Oh, and either a brute force attack or attempts at guessing passwords would show up in server logs, which they didn't. And he wouldn't have been able to clean the logs unless he hacked into someone with root privileges, which neither hillary's account nor any guest account would have had.

Finally, if Guccifer had either brute forced his way in or guessed her password, he would have said "I guessed her password" or "I brute forced the password" instead of "I ran a port scan".

Like I said in the OP, knowing an IP address and running a port scan gets you nowhere towards actually hacking a system. It is like saying that you robbed a bank by googling its address and business hours.

bobbobbins01

(1,681 posts)
42. You don't really know what you're talking about.
Fri May 6, 2016, 08:11 AM
May 2016

They didn't check the logs until after he got access, so it showing up on the logs during the attack would be irrelevant. He could clean up after the fact.

"you certainly don't have to have an account on the machine in order to have an email account" - Many email server configuration do require you to have an account on the machine in order to have an email account. It is an extremely common setup.

Considering most people use extremely simple passwords, and this server has been criticized for its lack of security, it probably wasn't configured to deny access after failed attempts, and a brute force attempt could very well be successful since good ones go through a dictionary of the most common passwords first, and don't just randomly start plugging through the alphabet.

Paragraphs 4 and 7 of yours directly contradict each other. If he could guess the passwords as he had in the past and had access to ssh with which to do so, then running a port scan does get him somewhere. Maybe running a port scan gave him access to ssh because it wasn't running on the standard port.

Whatever the case is, your argument seems to be that since he said he said he searched for open ports, and not the verbiage you think he should use, that he didn't do it, but that of course is just an arbitrary standard you set.

YouDig

(2,280 posts)
43. Hilarious, coming from someone talking about brute forcing through SSH.
Fri May 6, 2016, 11:08 AM
May 2016

Cleaning up logs requires root access. Do you even know what that is? You think any user can just go in and tamper with logs? I guess you're used to computer systems where everyone is a superuser. That in itself is a great reason to not listen to anything you say regarding this topic. That and the "ubuntu" user thing, unless you think the server was running of a live CD boot.

Bottom line, the only way in is if he actually guessed her password, and unless he guessed it on the first try, the attempts would have shown up in logs. Which they didn't.

There's no indication that he got in by guessing a password, he didn't claim to have guessed her password like he did for other people, he has no evidence that he ever got in, and he is a criminal with a penchant for exaggeration and conspiracy theories. His description of how he got in, by running a port scan, is a joke. It impresses clueless people who don't know what an "open port" is, but means nothing.

Many email server configuration do require you to have an account on the machine in order to have an email account. It is an extremely common setup.

That's a common setup for large organizations like universities, where the people using the system actually use their account for other things too. Which this was not, it was a dedicated email server. If you just want to set up an email server, you certainly don't need to create user accounts for everyone with an email account.

And the lack of security was respect to the encryption of client connections to the email server. That has nothing to do with password guessing. If you guess someone's password, you get in even if the connections are encrypted.

But, if you put together a bunch of assumptions that have zero evidence behind them, I guess you can get there. You have to assume (a) all email users had accounts they could SSH to (b) her password was easy to guess (c) there was no failed login limit (d) all users had root access (e) instead of telling the world he guessed her password he decided to talk about a port scan and (f) unlike his other hacks, he decided to produce zero evidence of getting in.

And if you can convince yourself of all that, you probably also think Bernie has more delegates than Hillary.
Latest Discussions»Retired Forums»2016 Postmortem»Some of the many dumb thi...