We talked with Dr. Valentin Weber about his research on secure messenger services inside the PLA, their flaws and limitation and how a system obsessed with surveillance, even compromises on security to keep tabs on what their soldiers talk about: open.substack.com/pub/netaskar...
Posts by Marc Hofer
Chinese pen-testers know about the Chinese eco system as much as they know about western tools and techniques. While western researchers often never step inside the Chinese world of red-teams: tinyurl.com/48z9etwk
See how Chinese red-team / pen-testers see China's e-government infrastructure and witness how they assess security flaws in the govt run service infrastructure ( has diagrams and pictures ) : tinyurl.com/ynp4ahzk
Read the full report here 9/9: netaskari.substack.com/p/chinas-gua...
5. Provide granular access control to specific files, for user-device combos, based on daily use and launching alerts if those rules are broken. Even enabling automated shutdown of client system if rule breaking is detected. 8/9
4. Monitor http, ftp and smtp traffic from a client to see for example if the user logs into web email systems ( and stores login to those systems ) or if otherwise trying to get files "off device". 7/9
3. Provide an enumeration and overview of confidential files found on a client machine plus the ability to remotely delete them by an administrator or supervisor. 6/9
2. Scan content on a client along a combination of list-fed and hardcoded keywords, especially text based documents ( docx, pdf, http, txt, md, xlsx etc. ) 5/9
1. Kill processes that might jeopardize or bypass the tool's ability to oversee the data integrity of a client system. 4/9
It was build by the well known Chinese cyber security government SuperRed but relies heavily on open source technology to provide its core functionality. 3/9
Designed mainly for WinXP and Win7, it lodges itself rather deep inside the system to have full file system access, controls hardware/USB devices, dynamic content analysis and enumeration, provides network traffic proxies and enables remote control and granular file behavior. 2/9
We got our hand on a Chinese DLP program the government and national security agencies use to monitor state employees computers for leakage and usage of confidential documents. Meet 保密管理系统. 1/9
Why do so little internal documents leak from China, compared to its sizable digital administrative infrastructure ? NetAskari got their hands on an internal document monitoring and control software for government workstations: open.substack.com/pub/netaskar...
As the year is coming to an end, here are our picks of the five best stories on netaskari.online . If you have some time over the holidays, please check them out: open.substack.com/pub/netaskar...
An example of an HikVision powered neighborhood surveillance and access-control system, that you can find all across China's cities. In the past often stand-alone, they are increasingly getting integrated into the nation wide "Sharp eyes" ( 雪亮 ) project.
Read our primer on how the big-data analysis system operated by the Chinese police can track people across country, via having almost real time access to their means of travel, bank account activities, phone calls and online activity. netaskari.substack.com/p/smart-poli...
Welcome to PART 2 of NetAskari’s analysis of “Expedition Cloud”, a Cyber Range operated by the Ministry of Public Security of China to improve their offensive cyber capabilities : open.substack.com/pub/netaskar...
China’s hacking training grounds, gunning or foreign nations’ critical infrastructure: tinyurl.com/y67z79ve
Internal documents from a Chinese cyber security company reveal how the Ministry of Public Security is commissioning “cyber ranges” to explore attack methods against adversaries digital critical infrastructure: open.substack.com/pub/netaskar...
China created its digital surveillance state with the eager help of US’s BigTech, Dake Kang reports: open.substack.com/pub/netaskar...
A new comcept for a locked down DNS for China, will strengthen the country’s digital censorship: open.substack.com/pub/netaskar...
We interviewed Benjamin Mixon-Baca on his reaearch on Free VPNs, who is behind them and their links to Chinese cyber security companies and ex-PLA members. substack.com/@netaskari/n...
A patent shows how China’s security services keep tabs on citizens mobile devices combining WiFi-probes and big-data collusion : open.substack.com/pub/netaskar...
“The source told CBS News that [Kash Patel and Dan Bongino] asked for "large, beefy" agents to conduct an arrest of Comey "in full kit," including Kevlar vests and exterior wear emblazoned with the FBI logo.” The leadership of the FBI is now in the hands of infantile psychopaths.
Xinjiang 912: The evolution of the Great Firewall forged in one of the world’s most surveilled and controlled regions. open.substack.com/pub/netaskar...
We took a stroll among the less sexy “study” documents of MESA Lab but still found some interesting little nuggets on the future of China’s cyber strategy and developments : open.substack.com/pub/netaskar...