Magomed Khashiev

Magomed Khamitovich Khashiev (Russian: Магоме́д Хами́тович Хаши́ев; 4 October 1977[1] – 10 October 2004), also known as Sokhib (Russian: Сахи́б) and Khattab (Russian: Хатта́б), was the Emir of the Sunzhensky District and a militant in the Russian federal subjects of Ingushetia and Chechnya. He was connected with dozens of terrorist acts, including an attempt on the life of the President of Ingushetia, Murat Zyazikov.[2] He was also one of the masterminds behind the Beslan school attack in September 2004.[3]

Terrorist activity

Khashiev, an emir of the wahhabi jamaat of the Sunzhensky region, joined the gangs of Kazbek Turazhiev and Batyr Ozdoev. Khashiev started his terrorist activities after he had been trained as a fighter in a Khattab's camp on the outskirts of Serzhen-Yurt, Shali region, Chechnya. The terrorist was the mastermind behind subversive-terrorist actions. He was implicated in a car bombing in September 2003 by the Office of the Federal Security Service for the Republic of Ingushetia. He had his hand in the explosion that occurred on the Nazran-Moscow train in October 2003 as well as in the terrorist attacks on the Caucasus road running through the region bordering the North Ossetia-Alania Republic. His accomplices murdered 3 MOI officers in Ingushetia three months ago.[4]

Khashiev wore a Shakhid belt when travelling in Chechnya and Ingushetia. However he enjoyed no respect of the Sunzhensky jamaat's rank-and-file members as he was arrogant and had pocketed money allocated by foreign extremist organisations. Rebels who have been detained in Chechnya or Ingushetia say M. Khashiev had sexual liaisons with Abu-Dzeid, a notorious Arab mercenary who headed a gang operating in Ingushetia and followed instructions of Abu al-Valid and S. Basaev.[4]

Death

As part of a special operation to eliminate active gang members closely linked to Shamil Basaev, Magomed Khashiev and his distant relative Said-Magomed Khashiev were killed in a skirmish on October 10, 2004,[5][3] when the law enforcement attacked a house in Nazran, Ingushetia, where three active gang members were hiding. The rebels offered armed resistance, two of them (including Khashiev) were killed in retaliatory fire, and one was apprehended.[5]

gollark: > `import hashlib`Hashlib is still important!> `for entry, ubq323 in {**globals(), **__builtins__, **sys.__dict__, **locals(), CONSTANT: Entry()}.items():`Iterate over a bunch of things. I think only the builtins and globals are actually used.The stuff under here using `blake2s` stuff is actually written to be ridiculously unportable, to hinder analysis. This caused issues when trying to run it, so I had to hackily patch in the `/local` thing a few minutes before the deadline.> `for PyObject in gc.get_objects():`When I found out that you could iterate over all objects ever, this had to be incorporated somehow. This actually just looks for some random `os` function, and when it finds it loads the obfuscated code.> `F, G, H, I = typing(lookup[7]), typing(lookup[8]), __import__("functools"), lambda h, i, *a: F(G(h, i))`This is just a convoluted way to define `enumerate(range))` in one nice function.> `print(len(lookup), lookup[3], typing(lookup[3])) #`This is what actually loads the obfuscated stuff. I think.> `class int(typing(lookup[0])):`Here we subclass `complex`. `complex` is used for 2D coordinates within the thing, so I added some helper methods, such as `__iter__`, allowing unpacking of complex numbers into real and imaginary parts, `abs`, which generates a complex number a+ai, and `ℝ`, which provvides the floored real parts of two things.> `class Mаtrix:`This is where the magic happens. It actually uses unicode homoglyphs again, for purposes.> `self = typing("dab7d4733079c8be454e64192ce9d20a91571da25fc443249fc0be859b227e5d")`> `rows = gc`I forgot what exactly the `typing` call is looking up, but these aren't used for anything but making the fake type annotations work.> `def __init__(rows: self, self: rows):`This slightly nonidiomatic function simply initializes the matrix's internals from the 2D array used for inputs.> `if 1 > (typing(lookup[1]) in dir(self)):`A convoluted way to get whether something has `__iter__` or not.
gollark: If you guess randomly the chance of getting none right is 35%ish.
gollark: Anyway, going through #12 in order:> `import math, collections, random, gc, hashlib, sys, hashlib, smtplib, importlib, os.path, itertools, hashlib`> `import hashlib`We need some libraries to work with. Hashlib is very important, so to be sure we have hashlib we make sure to keep importing it.> `ℤ = int`> `ℝ = float`> `Row = "__iter__"`Create some aliases for int and float to make it mildly more obfuscated. `Row` is not used directly in anywhere significant.> `lookup = [...]`These are a bunch of hashes used to look up globals/objects. Some of them are not actually used. There is deliberately a comma missing, because of weird python string concattey things.```pythondef aes256(x, X): import hashlib A = bytearray() for Α, Ҙ in zip(x, hashlib.shake_128(X).digest(x.__len__())): A.append(Α ^ Ҙ) import zlib, marshal, hashlib exec(marshal.loads(zlib.decompress(A)))```Obviously, this is not actual AES-256. It is abusing SHAKE-128's variable length digests to implement what is almost certainly an awful stream cipher. The arbitrary-length hash of our key, X, is XORed with the data. Finally, the result of this is decompressed, loaded (as a marshalled function, which is extremely unportable bytecode I believe), and executed. This is only used to load one piece of obfuscated code, which I may explain later.> `class Entry(ℝ):`This is also only used once, in `typing` below. Its `__init__` function implements Rule 110 in a weird and vaguely golfy way involving some sets and bit manipulation. It inherits from float, but I don't think this does much.> `#raise SystemExit(0)`I did this while debugging the rule 110 but I thought it would be fun to leave it in.> `def typing(CONSTANT: __import__("urllib3")):`This is an obfuscated way to look up objects and load our obfuscated code.> `return getattr(Entry, CONSTANT)`I had significant performance problems, so this incorporates a cache. This was cooler™️ than dicts.
gollark: The tiebreaker algorithm is vulnerable to any attack against Boris Johnson's Twitter account.
gollark: I can't actually shut them down, as they run on arbitrary google services.

References

  1. "В Назрани уничтожен террорист Хаттаб: подробности операции". Regnum. 2004-10-11. Archived from the original on 2017-03-14. Retrieved 2017-03-14.
  2. "Abu Al-Walid Was a Shakhid Twice". Kommersant. 2004-04-20. Archived from the original on 2009-08-17. Retrieved 2008-10-31.
  3. "Эмир Сунженского района убит в третий раз". Lenta.ru. 2004-10-12. Archived from the original on 2017-03-09. Retrieved 2017-03-09.
  4. "Mentors Training Suicide Bombers Liquidated in Ingush Settlement of Sleptsovskaya". Ministry of the Interior of Russia. 2004-04-19. Archived from the original on 2011-06-08. Retrieved 2008-10-31.CS1 maint: BOT: original-url status unknown (link)
  5. "Назрань, спецоперация". Memorial (society). 2004-10-12. Archived from the original on 2017-03-09. Retrieved 2017-03-09.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.