Ciro Santilli
OurBigBook.com
$£
Sponsor
中国
独裁统治 China Dictatorship 新疆改造中心、六四事件、法轮功、郝海东、709大抓捕、2015巴拿马文件 邓家贵、低端人口、西藏骚乱
CIA 2010 covert communication websites
/
Methodology
...
Secret service
Intelligence community
United States Intelligence Community
American intelligence agency
Central Intelligence Agency
CIA 2010 covert communication websites
OurBigBook.com
Words: 19k
Articles: 69
This section tries to explain how the discoveries were made in more detail.
Some of the subsections are quite readable, while others are mostly data dumps and work logs, so bear with us.
Table of contents
19k
69
The Reuters websites
Methodology
330
Fingerprints
Methodology
682
3
HTML analysis
Fingerprints
329
2
Binary files
HTML analysis
97
HTML title element
HTML analysis
191
IP range search
Methodology
7k
3
Hits without nearby IP hits
IP range search
2k
1
Possible hits
Hits without nearby IP hits
368
Hits with nearby IP hits
IP range search
5k
TODO
Methodology
320
4
Find missing hits in IP ranges
TODO
89
How did Alexa find the domains?
TODO
77
Non .com .net TLDs
TODO
154
1
Are there .org hits?
Non .com .net TLDs
85
Data sources
Methodology
6k
27
Reuters article
(2022-09-29)
Data sources
65
Wayback Machine
Data sources
730
4
Wayback Machine CDX scanning
Wayback Machine
606
2
Wayback Machine CDX scanning with Tor parallelization
Wayback Machine CDX scanning
337
JS CDX scanning
Wayback Machine CDX scanning
132
Wayback Machine crawl date search
Wayback Machine
29
viewdns.info
(2010-)
Data sources
184
DomainTools
Data sources
26
DNS Census 2013
Data sources
2k
6
2013 DNS Census virtual host cleanup
DNS Census 2013
660
1
2013 DNS Census virtual host cleanup heuristic keyword searches
2013 DNS Census virtual host cleanup
218
2013 DNS census MX records
DNS Census 2013
383
2013 DNS census secureserver.net MX records intersection 2013 DNS Census virtual host cleanup
DNS Census 2013
92
2013 DNS census NS records
DNS Census 2013
291
2013 DNS census SOA records
DNS Census 2013
6
dnshistory.org
Data sources
240
securitytrails.com
Data sources
153
Common Crawl
Data sources
302
Internet Census 2012
Data sources
1k
2
2012 Internet Census hostprobes
Internet Census 2012
731
2012 Internet Census icmp_ping
Internet Census 2012
246
tb0hdan/domains
Data sources
51
Expired domain trackers
Data sources
1k
1
club.domain.cn
Expired domain trackers
96
"Mass Deface III" pastebin
(2012)
Data sources
272
ipinf.ru
Data sources
112
cqcounter
Data sources
222
Reverse engineering
Methodology
1k
10
Communication mechanism
(Comms)
Reverse engineering
1k
9
CGI comms
Communication mechanism
387
2
CGI comms variant
CGI comms
78
SSL certificate
CGI comms
112
JAR reverse engineering
Communication mechanism
199
JS comms
Communication mechanism
236
4
JavaScript reverse engineering
JS comms
236
3
JavaScript with SHAs
JavaScript reverse engineering
144
1
iraniangoals.com JavaScript reverse engineering
JavaScript with SHAs
42
feedsdemexicoyelmundo.com JavaScript reverse engineering
JavaScript reverse engineering
92
Google searches for known domains and IPs
Methodology
129
Breakthroughs
Methodology
827
4
Non Reuters ranges
Breakthroughs
197
1
secure subdomain search on 2013 DNS Census
Non Reuters ranges
197
Oleg Shakirov's findings
(Communicated January 15, 2024)
Breakthroughs
612
1
Searching for Carson
Oleg Shakirov's findings
469
Work log
Methodology
3k
9
Wakatime redirects
Work log
538
IP and DNS metadata
Work log
961
7
iraniangoals.com
IP and DNS metadata
78
iraniangoalkicks.com
IP and DNS metadata
43
activegameinfo.com
(66.175.106.148)
IP and DNS metadata
95
feedsdemexicoyelmundo.com
(66.175.106.149)
IP and DNS metadata
37
noticiasmusica.net
(66.175.106.150)
IP and DNS metadata
102
atomworldnews.com
(66.175.106.155)
IP and DNS metadata
33
iranfootballsource.com
IP and DNS metadata
Ancestors
(12)
CIA 2010 covert communication websites
Central Intelligence Agency
American intelligence agency
United States Intelligence Community
Intelligence community
Secret service
Espionage
War
Social science
Scientific method
Science
Home