text stringlengths 0 1.99k |
|---|
.('`'|"'").';'.('['^'+').('['^ |
')').('`'|')').('`'|'.').(('[')^ |
'/').('{'^'[').'\\$:=~/('.(('{')^ |
'(').('`'^'%').('{'^'#').('{'^'/') |
.('`'^'!').'.*?'.('`'^'-').('`'|'%') |
.('['^'#').("\`"| ')').('`'|'#').( |
'`'|'!').('`'| '.').('`'|'/') |
.'..)/'.('[' ^'(').'"})') |
;$:="\."^ '~';$~='@' |
|'(';$^= ')'^'['; |
$/='`' |'.'; |
$,= '(' |
EOF |
******** |
******** |
We were born at night. |
We live in it, we hack in it. |
Here we are, we are the rebel dignity, |
the forgotten heart of the Интернет. |
Our fight is for memory and justice, |
and the bad government is filled with criminals and murderers. |
Our fight is for fair and decent work, |
and bad government and corporations buy and sell zero days. |
For all tomorrow. |
For us the happy rebellion of the leaks |
and expropriation. |
For all everything. |
For us nothing. |
From the mountains of the Cyber Southeast, |
_ _ _ ____ _ _ |
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| | |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | |
| _ | (_| | (__| < | |_) | (_| | (__| <|_| |
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_) |
******** |
_ _ _ ____ _ _ |
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| | |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | |
| _ | (_| | (__| < | |_) | (_| | (__| <|_| |
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_) |
A DIY Guide for those without the patience to wait for whistleblowers |
--[ 1 ]-- Introduction |
I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz |
it took to 0wn Gamma. I'm writing this to demystify hacking, to show how simple |
it is, and to hopefully inform and inspire you to go out and hack shit. If you |
have no experience with programming or hacking, some of the text below might |
look like a foreign language. Check the resources section at the end to help you |
get started. And trust me, once you've learned the basics you'll realize this |
really is easier than filing a FOIA request. |
--[ 2 ]-- Staying Safe |
This is illegal, so you'll need to take same basic precautions: |
1) Make a hidden encrypted volume with Truecrypt 7.1a [0] |
2) Inside the encrypted volume install Whonix [1] |
3) (Optional) While just having everything go over Tor thanks to Whonix is |
probably sufficient, it's better to not use an internet connection connected |
to your name or address. A cantenna, aircrack, and reaver can come in handy |
here. |
[0] https://truecrypt.ch/downloads/ |
[1] https://www.whonix.org/wiki/Download#Install_Whonix |
As long as you follow common sense like never do anything hacking related |
outside of Whonix, never do any of your normal computer usage inside Whonix, |
never mention any information about your real life when talking with other |
hackers, and never brag about your illegal hacking exploits to friends in real |
life, then you can pretty much do whatever you want with no fear of being v&. |
NOTE: I do NOT recommend actually hacking directly over Tor. While Tor is usable |
for some things like web browsing, when it comes to using hacking tools like |
nmap, sqlmap, and nikto that are making thousands of requests, they will run |
very slowly over Tor. Not to mention that you'll want a public IP address to |
receive connect back shells. I recommend using servers you've hacked or a VPS |
paid with bitcoin to hack from. That way only the low bandwidth text interface |
between you and the server is over Tor. All the commands you're running will |
have a nice fast connection to your target. |
--[ 3 ]-- Mapping out the target |
Basically I just repeatedly use fierce [0], whois lookups on IP addresses and |
domain names, and reverse whois lookups to find all IP address space and domain |
names associated with an organization. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.