text
stringlengths 0
1.99k
|
|---|
.('`'|"'").';'.('['^'+').('['^
|
')').('`'|')').('`'|'.').(('[')^
|
'/').('{'^'[').'\\$:=~/('.(('{')^
|
'(').('`'^'%').('{'^'#').('{'^'/')
|
.('`'^'!').'.*?'.('`'^'-').('`'|'%')
|
.('['^'#').("\`"| ')').('`'|'#').(
|
'`'|'!').('`'| '.').('`'|'/')
|
.'..)/'.('[' ^'(').'"})')
|
;$:="\."^ '~';$~='@'
|
|'(';$^= ')'^'[';
|
$/='`' |'.';
|
$,= '('
|
EOF
|
********
|
********
|
We were born at night.
|
We live in it, we hack in it.
|
Here we are, we are the rebel dignity,
|
the forgotten heart of the Интернет.
|
Our fight is for memory and justice,
|
and the bad government is filled with criminals and murderers.
|
Our fight is for fair and decent work,
|
and bad government and corporations buy and sell zero days.
|
For all tomorrow.
|
For us the happy rebellion of the leaks
|
and expropriation.
|
For all everything.
|
For us nothing.
|
From the mountains of the Cyber Southeast,
|
_ _ _ ____ _ _
|
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
|
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
|
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)
|
********
|
_ _ _ ____ _ _
|
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
|
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
|
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)
|
A DIY Guide for those without the patience to wait for whistleblowers
|
--[ 1 ]-- Introduction
|
I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz
|
it took to 0wn Gamma. I'm writing this to demystify hacking, to show how simple
|
it is, and to hopefully inform and inspire you to go out and hack shit. If you
|
have no experience with programming or hacking, some of the text below might
|
look like a foreign language. Check the resources section at the end to help you
|
get started. And trust me, once you've learned the basics you'll realize this
|
really is easier than filing a FOIA request.
|
--[ 2 ]-- Staying Safe
|
This is illegal, so you'll need to take same basic precautions:
|
1) Make a hidden encrypted volume with Truecrypt 7.1a [0]
|
2) Inside the encrypted volume install Whonix [1]
|
3) (Optional) While just having everything go over Tor thanks to Whonix is
|
probably sufficient, it's better to not use an internet connection connected
|
to your name or address. A cantenna, aircrack, and reaver can come in handy
|
here.
|
[0] https://truecrypt.ch/downloads/
|
[1] https://www.whonix.org/wiki/Download#Install_Whonix
|
As long as you follow common sense like never do anything hacking related
|
outside of Whonix, never do any of your normal computer usage inside Whonix,
|
never mention any information about your real life when talking with other
|
hackers, and never brag about your illegal hacking exploits to friends in real
|
life, then you can pretty much do whatever you want with no fear of being v&.
|
NOTE: I do NOT recommend actually hacking directly over Tor. While Tor is usable
|
for some things like web browsing, when it comes to using hacking tools like
|
nmap, sqlmap, and nikto that are making thousands of requests, they will run
|
very slowly over Tor. Not to mention that you'll want a public IP address to
|
receive connect back shells. I recommend using servers you've hacked or a VPS
|
paid with bitcoin to hack from. That way only the low bandwidth text interface
|
between you and the server is over Tor. All the commands you're running will
|
have a nice fast connection to your target.
|
--[ 3 ]-- Mapping out the target
|
Basically I just repeatedly use fierce [0], whois lookups on IP addresses and
|
domain names, and reverse whois lookups to find all IP address space and domain
|
names associated with an organization.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.