This group claimed that they have been successful in gaining access
to the LAN of Israeli Aviation Organization (iaa.gov.il) and has got
sensitive information regarding domestic and international flight maps.
This site is out of service at the moment.
It is mentioned in the announcement that despite of ability to cause absorptions in services such as flight routing, communications between plane and ground stations, weather condition and etc. this group did not take any action due to humanitarian considerations, but instead wiped the whole server data.
Wikileak.IR cannot confirm this, but published information indicates that they have had full control over the above mentioned site and servers.
This group that introduced itself as “Islamic Cyber Resistance Group” had gained access to Jeddah (Saudi Arabia) International Airport server in previous operations and published sensitive and vital information regarding infrastructural maps, explosive detection devices and etc.
Read the complete announcement below.
Once again, Islamic Cyber Resistance Soldiers shook a nest which is weaker than a spider web to make the occupiers realize that now it is time to vanish.
The Islamic Cyber Resistance Group is proud to add another one to its line of success and announces access to the LAN of Israeli aviation organization, in a move to render the fake legend of Israel's security and invincibility obsolete.
By the grace of God, we could gain access to iaa.gov.il LAN and in addition to obtaining sensitive information, seized full control over the management panel.
But as the world knows, killing women, children and innocent people is a profession exclusive to Israel and its neophytes, and we, as ordered by Islam, do condemn such moves and, thus, find it sufficient to release sensitive information to prove that we have had the access to the servers and downed the website.
In this operation, we gained access to the flight management plans and were able to make online changes to them. Also by gaining access to ATIS/VOLMET system, disruption in data communications (such as flight routing and weather conditions) between plane and ground stations was possible.
Cooperating with our friends in op-Israel, we could maintain our access for months that provided us enough time to download a huge amount of data and analyze and study different modules of Israel's air traveling and aviation systems. This brought us valuable information regarding flight communication structures and processes in Israel.
The information released to the public includes:
1. Domestic and international flight information Database,
2. Some of the flight briefing files which are only provided to pilots and control towers,
3. Management and flight routing software information,
4. Weather condition maps (NOTAM).
At present all the data and information on the server has been wiped and the website is down.
But to those who simply gift death to innocent people:
Be aware that death is close to you,
Closer than what you can even think of,
And is getting closer day by day,
In your army,
In your infrastructure,
In your airplanes,
And in your houses,
We are everywhere to present you a gift,
Which is nothing but death!
So get very well ready for it since you are going to have a painful departure.
The Islamic Cyber Resistance presents this operation to the souls of Islamic Resistance martyrs, Maysara Abu Hamdiya, HassanAbdulAlhlym al-Turabi and Rami Bajes Alzlbany. Prisoners who became martyred innocently in Israeli jails.
It is mentioned in the announcement that despite of ability to cause absorptions in services such as flight routing, communications between plane and ground stations, weather condition and etc. this group did not take any action due to humanitarian considerations, but instead wiped the whole server data.
Wikileak.IR cannot confirm this, but published information indicates that they have had full control over the above mentioned site and servers.
This group that introduced itself as “Islamic Cyber Resistance Group” had gained access to Jeddah (Saudi Arabia) International Airport server in previous operations and published sensitive and vital information regarding infrastructural maps, explosive detection devices and etc.
Read the complete announcement below.
Once again, Islamic Cyber Resistance Soldiers shook a nest which is weaker than a spider web to make the occupiers realize that now it is time to vanish.
The Islamic Cyber Resistance Group is proud to add another one to its line of success and announces access to the LAN of Israeli aviation organization, in a move to render the fake legend of Israel's security and invincibility obsolete.
By the grace of God, we could gain access to iaa.gov.il LAN and in addition to obtaining sensitive information, seized full control over the management panel.
But as the world knows, killing women, children and innocent people is a profession exclusive to Israel and its neophytes, and we, as ordered by Islam, do condemn such moves and, thus, find it sufficient to release sensitive information to prove that we have had the access to the servers and downed the website.
In this operation, we gained access to the flight management plans and were able to make online changes to them. Also by gaining access to ATIS/VOLMET system, disruption in data communications (such as flight routing and weather conditions) between plane and ground stations was possible.
Cooperating with our friends in op-Israel, we could maintain our access for months that provided us enough time to download a huge amount of data and analyze and study different modules of Israel's air traveling and aviation systems. This brought us valuable information regarding flight communication structures and processes in Israel.
The information released to the public includes:
1. Domestic and international flight information Database,
2. Some of the flight briefing files which are only provided to pilots and control towers,
3. Management and flight routing software information,
4. Weather condition maps (NOTAM).
At present all the data and information on the server has been wiped and the website is down.
But to those who simply gift death to innocent people:
Be aware that death is close to you,
Closer than what you can even think of,
And is getting closer day by day,
In your army,
In your infrastructure,
In your airplanes,
And in your houses,
We are everywhere to present you a gift,
Which is nothing but death!
So get very well ready for it since you are going to have a painful departure.
The Islamic Cyber Resistance presents this operation to the souls of Islamic Resistance martyrs, Maysara Abu Hamdiya, HassanAbdulAlhlym al-Turabi and Rami Bajes Alzlbany. Prisoners who became martyred innocently in Israeli jails.
Operation POC and Intelligence Code To Enemy
Access To Flight Planning and Flight Routing Management
Access To Many Information About Station And Radars Area
Sample Of Weather Plan And Access To Volmet and NOTOAM
Sample of Pre-Flight Information (ICR Climed Have Many of Them)
Sample Of Access To IAA LAN And Air Side Devices (They Calls Intelligence Code To Enemy )
#########################################################
# #
# AIR SIDE CPU Systems #
# #
#########################################################
#
10.14.81.10 iae1 IAE1 aftn1 AFTN1 # New aftn1 Air Side eth0 LAN A
#
10.14.81.11 ine1 INE1 notam1 NOTAM1 # New aftn1 Air Side eth0 LAN A
#
10.14.81.12 ide1 IDE1 dev1 DEV1 # New dev1 Air Side eth0 LAN A
#
172.31.70.2 ibs1 IBS1 pilot1 PILOT1 # New pilot1 Air Side eth0 LAN A
#
#########################################################
# #
# LAND SIDE CPU Systems #
# #
#########################################################
#
10.14.33.10 iae2 IAE2 aftn2 AFTN2 # New aftn2 Land Side eth0 LAN A
#
10.14.33.11 ine2 INE2 notam2 NOTAM2 # New aftn2 Land Side eth0 LAN A
#
10.14.33.12 ide2 IDE2 dev2 DEV2 # New dev2 Land Side eth0 LAN A
#
172.31.70.3 ibs2 IBS2 pilot2 PILOT2 # New pilot2 Land Side eth0 LAN A
#
#########################################################
#########################################################
# #
# Moxa Terminal Servers and R6000 Splitter Chassis #
# #
#########################################################
#
10.14.81.210 moxa1a MOXA1A # Moxa CNS2610 Terminal Server 1a Air Side LAN A connected to aftn1
10.14.81.211 moxa1b MOXA1B # Moxa CNS2610 Terminal Server 1b Air Side LAN A connected to aftn1
#
10.15.81.210 moxa2a MOXA2A # Moxa CNS2610 Terminal Server 2a Air Side LAN B connected to aftn2
10.15.81.211 moxa2b MOXA2B # Moxa CNS2610 Terminal Server 2b Air Side LAN B connected to aftn2
#
10.14.33.210 moxa1c MOXA1C # Moxa CNS2610 Terminal Server 1c Land Side LAN A connected to aftn1
10.14.33.211 moxa1d MOXA1D # Moxa CNS2610 Terminal Server 1d Land Side LAN A connected to aftn1
#
10.15.33.210 moxa2c MOXA2C # Moxa CNS2610 Terminal Server 2c Land Side LAN B connected to aftn2
10.15.33.211 moxa2d MOXA2D # Moxa CNS2610 Terminal Server 2d Land Side LAN B connected to aftn2
#
10.14.81.212 splitter1 SPLITTER1 # R6000 Splitter Chassis #1 Air Side LAN A
10.14.81.213 splitter2 SPLITTER2 # R6000 Splitter Chassis #2 Air Side LAN A
#
10.14.33.212 splitter3 SPLITTER3 # R6000 Splitter Chassis #3 Land Side LAN A
10.14.33.213 splitter4 SPLITTER4 # R6000 Splitter Chassis #4 Land Side LAN A
10.15.81.7 atis atis_a ATIS ATIS_A # ATIS Server
10.14.81.6 volmet volmet_a VOLMET VOLMET_A # VOLMET Server
10.15.81.10 iae1b IAE1B aftn1b AFTN1B # New aftn1b Air Side eth1 LAN B
10.15.81.11 ine1b INE1B notam1b NOTAM1B # New aftn1b Air Side eth1 LAN B
10.15.81.12 ide1b IDE1B dev1b DEV1B # New dev1 Air Side eth1 LAN B
10.15.81.13 ibs1b IBS1B pilot1b PILOT1B # New pilot1 Air Side eth1 LAN B
10.15.33.10 iae2b IAE2B aftn2b AFTN2B # New aftn2b Land Side eth1 LAN B
10.15.33.11 ine2b INE2B notam2b NOTAM2B # New aftn2b Land Side eth1 LAN B
10.15.33.12 ide2b IDE2B dev2b DEV2B # New dev2 Land Side eth1 LAN B
10.15.33.13 ibs2b IBS2B pilot2b PILOT2B # New pilot2 Land Side eth1 LAN B
10.15.81.1 old_iae1b OLD_IAE1B old_aftn1b OLD_AFTN1B # Operational no.1, tu1
10.15.33.2 old_iae2b OLD_IAE2B old_aftn2b OLD_AFTN2B # Operational no.2, tu1
10.15.81.3 old_ine1b OLD_INE1B old_notam1b OLD_NOTAM1B # AIS no.1, tu1
10.15.33.4 old_ine2b OLD_INE2B old_notam2b OLD_NOTAM2B # AIS no.2, tu1
10.15.81.5 old_ide1b OLD_IDE1B # Development no.1, tu1
10.14.33.51 xpc11 XPC11 # Xwindows PC no.11
10.15.81.74 xpc12 XPC12 # Xwindows PC no.12
10.15.81.73 xpc10 XPC10 # Xwindows PC no.10
10.14.81.7 atis_b ATIS_B # ATIS_B Server
10.15.81.6 volmet_b VOLMET_B # VOLMET_B Server
#OVO servers
10.2.90.203 robigo
10.2.33.203 lucifer
10.3.250.24 vmappolo
1800 Flight Route Leaked Here
PART1 https://www.quickleak.org/myWprF5O
PART2 https://www.quickleak.org/x3vWBDqT
PART3 https://www.quickleak.org/rPXwmrRa
PART4 https://www.quickleak.org/W9sxUNcq
PART5 https://www.quickleak.org/lHUbBNbQ
PART6 https://www.quickleak.org/AnRvVS0f
PART7 https://www.quickleak.org/tHt1lIif
PART8 https://www.quickleak.org/wV9VAsRc
PART9 https://www.quickleak.org/9xQ2feOv
PART10 https://www.quickleak.org/cNVYDNCf
Access To Many Information About Station And Radars Area
Sample Of Weather Plan And Access To Volmet and NOTOAM
Sample of Pre-Flight Information (ICR Climed Have Many of Them)
Sample Of Access To IAA LAN And Air Side Devices (They Calls Intelligence Code To Enemy )
#########################################################
# #
# AIR SIDE CPU Systems #
# #
#########################################################
#
10.14.81.10 iae1 IAE1 aftn1 AFTN1 # New aftn1 Air Side eth0 LAN A
#
10.14.81.11 ine1 INE1 notam1 NOTAM1 # New aftn1 Air Side eth0 LAN A
#
10.14.81.12 ide1 IDE1 dev1 DEV1 # New dev1 Air Side eth0 LAN A
#
172.31.70.2 ibs1 IBS1 pilot1 PILOT1 # New pilot1 Air Side eth0 LAN A
#
#########################################################
# #
# LAND SIDE CPU Systems #
# #
#########################################################
#
10.14.33.10 iae2 IAE2 aftn2 AFTN2 # New aftn2 Land Side eth0 LAN A
#
10.14.33.11 ine2 INE2 notam2 NOTAM2 # New aftn2 Land Side eth0 LAN A
#
10.14.33.12 ide2 IDE2 dev2 DEV2 # New dev2 Land Side eth0 LAN A
#
172.31.70.3 ibs2 IBS2 pilot2 PILOT2 # New pilot2 Land Side eth0 LAN A
#
#########################################################
#########################################################
# #
# Moxa Terminal Servers and R6000 Splitter Chassis #
# #
#########################################################
#
10.14.81.210 moxa1a MOXA1A # Moxa CNS2610 Terminal Server 1a Air Side LAN A connected to aftn1
10.14.81.211 moxa1b MOXA1B # Moxa CNS2610 Terminal Server 1b Air Side LAN A connected to aftn1
#
10.15.81.210 moxa2a MOXA2A # Moxa CNS2610 Terminal Server 2a Air Side LAN B connected to aftn2
10.15.81.211 moxa2b MOXA2B # Moxa CNS2610 Terminal Server 2b Air Side LAN B connected to aftn2
#
10.14.33.210 moxa1c MOXA1C # Moxa CNS2610 Terminal Server 1c Land Side LAN A connected to aftn1
10.14.33.211 moxa1d MOXA1D # Moxa CNS2610 Terminal Server 1d Land Side LAN A connected to aftn1
#
10.15.33.210 moxa2c MOXA2C # Moxa CNS2610 Terminal Server 2c Land Side LAN B connected to aftn2
10.15.33.211 moxa2d MOXA2D # Moxa CNS2610 Terminal Server 2d Land Side LAN B connected to aftn2
#
10.14.81.212 splitter1 SPLITTER1 # R6000 Splitter Chassis #1 Air Side LAN A
10.14.81.213 splitter2 SPLITTER2 # R6000 Splitter Chassis #2 Air Side LAN A
#
10.14.33.212 splitter3 SPLITTER3 # R6000 Splitter Chassis #3 Land Side LAN A
10.14.33.213 splitter4 SPLITTER4 # R6000 Splitter Chassis #4 Land Side LAN A
10.15.81.7 atis atis_a ATIS ATIS_A # ATIS Server
10.14.81.6 volmet volmet_a VOLMET VOLMET_A # VOLMET Server
10.15.81.10 iae1b IAE1B aftn1b AFTN1B # New aftn1b Air Side eth1 LAN B
10.15.81.11 ine1b INE1B notam1b NOTAM1B # New aftn1b Air Side eth1 LAN B
10.15.81.12 ide1b IDE1B dev1b DEV1B # New dev1 Air Side eth1 LAN B
10.15.81.13 ibs1b IBS1B pilot1b PILOT1B # New pilot1 Air Side eth1 LAN B
10.15.33.10 iae2b IAE2B aftn2b AFTN2B # New aftn2b Land Side eth1 LAN B
10.15.33.11 ine2b INE2B notam2b NOTAM2B # New aftn2b Land Side eth1 LAN B
10.15.33.12 ide2b IDE2B dev2b DEV2B # New dev2 Land Side eth1 LAN B
10.15.33.13 ibs2b IBS2B pilot2b PILOT2B # New pilot2 Land Side eth1 LAN B
10.15.81.1 old_iae1b OLD_IAE1B old_aftn1b OLD_AFTN1B # Operational no.1, tu1
10.15.33.2 old_iae2b OLD_IAE2B old_aftn2b OLD_AFTN2B # Operational no.2, tu1
10.15.81.3 old_ine1b OLD_INE1B old_notam1b OLD_NOTAM1B # AIS no.1, tu1
10.15.33.4 old_ine2b OLD_INE2B old_notam2b OLD_NOTAM2B # AIS no.2, tu1
10.15.81.5 old_ide1b OLD_IDE1B # Development no.1, tu1
10.14.33.51 xpc11 XPC11 # Xwindows PC no.11
10.15.81.74 xpc12 XPC12 # Xwindows PC no.12
10.15.81.73 xpc10 XPC10 # Xwindows PC no.10
10.14.81.7 atis_b ATIS_B # ATIS_B Server
10.15.81.6 volmet_b VOLMET_B # VOLMET_B Server
#OVO servers
10.2.90.203 robigo
10.2.33.203 lucifer
10.3.250.24 vmappolo
1800 Flight Route Leaked Here
PART1 https://www.quickleak.org/myWprF5O
PART2 https://www.quickleak.org/x3vWBDqT
PART3 https://www.quickleak.org/rPXwmrRa
PART4 https://www.quickleak.org/W9sxUNcq
PART5 https://www.quickleak.org/lHUbBNbQ
PART6 https://www.quickleak.org/AnRvVS0f
PART7 https://www.quickleak.org/tHt1lIif
PART8 https://www.quickleak.org/wV9VAsRc
PART9 https://www.quickleak.org/9xQ2feOv
PART10 https://www.quickleak.org/cNVYDNCf
No comments:
Post a Comment