Anonymous Italia Promotes Million Mask March & Fights for Climate w/ Hack/Leak of 5 Institutions Across Italy

Just this evening, November 3rd 2019, my Anti-Fascist friends over at “CyberGuerrilla Anonymous Nexus” and “Anonymous Italia” announced a massive round of hacks and leaks targeting agriculture companies and organizations not doing their part to help fight back against climate change not just in their county, Italy, but all around the world as well. Despite most of their leaks stemming in conjunction with “Operation Green Rights” (#OpGreenRights), this time, Anonymous Italia actually released the data to celebrate this years upcoming Million Mask March (MMM) – helping to raise more awareness ahead of it on November 5th.

Message from the Hackers

Hello Italians, this press release is from Anonymous Italy.

Today we have decided to make ourselves known to those institutions of our country, which should be the first to inform us and fight against our farmers and artisans against climate change, by starting to use different methods of more organic farming without preservatives and/or products harmful to both the environment, the flora and fauna of our country.

But not only this! The whole world is now aware of the environmental problem of our planet, demonstrations of millions of people have been held and are held to try to sensitize our Governments whom ignore the imminent danger here, instead interested only in profit and their own well-being, never interested to what according to them is a problem only for the people.

Studies done by great scientists easily found online have made it clear, we are killing our planet and little or nothing is being done to curb this genocide of nature and man. The posted data reveal the very little or even lack of security in the infrastructure of our country, and once again our privacy is not taken into account at all. Sabatoged to use a simple encryption of passwords, or even more simply not informed against using passwords like the ones you can see below.

But don’t worry !!
We are the terrorists, criminals, outlaws !!

We are Anonymous
We are Legion
We do not Forgive
We do not Forget
Expect Us!

All Leaked Data:

Target: hxxp: confagricolturapiemonte.com
About: The Regional Federation of Farmers of Piedmont is the territorial branch of Confagricoltura (the General Confederation of Italian Agriculture), the oldest agricultural organization in Italy whose origin dates back to 1895.
Dump: Admin password in the clear
Raw Leak: https://privatebin.net/?2ebaae23a34ee559#BXKWvMvWK37qyvXjmmiwT8NwUBTQapcvpciq94CnCTze

Target: hxxp://codima.info
About:CO.DI.MA. CONDIFESA Mantova-Cremon – the Agricultural defense consortium. Agricultural insurance with public contributions.
Dump: 800+ subscribers, emails, clear passwords. Hacked and Defaced
Raw Leak: https://privatebin.net/?ef3316378ab3345f#E9kg9mHwbyebdUFwuJgGwEK7M3oQy3URBBHXu6wQsPDV

Target: hxxp://periti-industriali.rieti.it
About: Industrial experts, L’INI-PEC is a portal created and managed by info Rooms and is divided into two sections called ‘Business Section’ and ‘Professional Section’ respectively.
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?4160f625ff10bc8a#EU4wVXZE2iBjEF2jUvWbZnpdPaCqGapzCTCWeKvhjrwm

Target: hxxp://agrotecnicipiemonte.it
About: Colleges of Agricultural Technicians and Agricultural Technicians Graduates of Piedmont and Valle d’Aosta
Dump: admin, users, clear passwords
Raw Leak: https://privatebin.net/?47382f87beb8b8b2#HC3ZPf4eUuNNtfZ4Aoj4hSYRafVjg7XcjwJKbZ2fF4ot

Target: hxxp://agrotecnicicuneo.it
About: Provincial College of Agricultural Technicians and Agricultural Technicians Graduates of Cuneo
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?90f17654fd13550c#Dhd6GqyStJCuhAsULLVxvBofi8mXjzD9Vo83VL6beohX

Target: hxxp://ebiter.fvg.it
About: Ebiter (tourism trade services fvg)- Bilateral trade and tourism agency Friuli
Dump: users, passwords
Raw Leak: https://privatebin.net/?48d5bb255bee8fe8#DQ5VmB1w4CKqaiSHU725b6uREncWZa66Jv5m68vVCCBA

#OpChile – Anonymous Chile Hacks Carabineros Troops, Chilean Police Forces, Leaks Data Online

A group of hackers affiliated with the AnonOps IRC going by the name of “Anonymous Chile” has claimed responsibility for a large string of hacks targeting Chile’s national uniformed police forces – otherwise known as the “Carabineros.” Exposed in the leaks provided below is information such as officers names, user names and passwords, RUT, sex, addresses, ranks and the police stations they work at, as well as instructions for others to compromise Chilean data entry interfaces.

The hacks/leaks themselves are being carried out in conjunction with “Operation Chile” (#OpChile) and “”Operation Chile Desperato” (#OpChileDesperato), as well as with the Marcha Mas Grande De Chile” – supporting protesters actively being repressed by Chilean police forces and their Government. It should be noted that the group is not finished yet, and promises more leaks will soon be on the way – the longer these demonstrations continue in the streets. More importantly, the group has already had their social media accounts taken down and the location of some of the files removed – which is why I am hosting their files here – in case their index gets taken down too. Should any more leaks be published over the coming days, I will make sure to provide updates here for Rogue Media – stay tuned!

Leak Location: https://pacos.rebelside.pw/pacoleaks/

Leak Backups 11/02/2019:

25 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/funcionarios.zip | Bases de datos con Nombres, RUT, Sexo, Zona, Prefectura, Comisaría de TODOS los Pacos de Chile (1.7MB)

https://pacos.rebelside.pw/pacoleaks/instructivos.zip | Instructivos de uso de plataforma de Documentación electrónica (DOE) (6.7MB)

26 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/informativo.html | INFORMATIVO #1 ACERCA DEL HACKEO A CARABINEROS DE CHILE

https://pacos.rebelside.pw/pacoleaks/codigofuente.tar.gz | Código fuente plataforma de Documentación Electrónica (DOE) de Carabineros (12MB)

https://pacos.rebelside.pw/pacoleaks/dump_intranet.txt | Dump de cuentas de acceso al intranet DOE (1.02MB)

https://pacos.rebelside.pw/pacoleaks/grabaciones-walkie-talkie.zip | Algunas grabaciones de comunicaciones radiales de Carabineros (se viene más) (0.53M)

27 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/informativo-2.html | INFORMATIVO #2 ¿EL FINAL? NO LO CREEMOS

https://pacos.rebelside.pw/pacoleaks/msg.zip | Algunos mensajes desencriptados intercambiados en la plataforma DOE (140KB)

https://pacos.rebelside.pw/pacoleaks/adjuntos-10-2019-10k.tar.gz | 10K de archivos adjuntados a los mensajes (3.11GB) Checksum de archivos

https://pacos.rebelside.pw/pacoleaks/check.txt | Checksum MD5 y SHA1 de archivos (ultima actualizacion: 29/10)

01 de Noviembre 2019:

https://pacoleaks.rebelside.pw/pacoleaks/informativo-3.html |

INFORMATIVO #3 MADE IN CHILE: https://pacos.rebelside.pw/pacoleaks/Adjunt09.zip | 20K de archivos adjuntados a mensajes (6GB)

 

Putnam County State Government Hacked by Ghost Squad Hackers

As if you need yet another reminder why our local elections and Government are not safe, earlier today, October 30th 2019, “M1rox” of Ghost Squad Hackers announced a hack of the Putnam County State Government of Ohio. Though no data was leaked in conjunction with today’s announcement, the defacement of the counties website indicates that hacker was able to gain full root access over the entire website itself – theoretically along with all of its data.

While the hacker may not necessarily have had any political motives, at least in terms of conducting espionage for other countries, the news comes within weeks of Mississippi’s warning that close to 75% of the states offices are not prepared to mitigate,deflect or handle a cyber attacks again them. Expectedly enough, upon analyzing the website myself, Putnam Counties home website lacks even an SSL. Regardless, as M1rox once again reminds us, our state and local Governments are far from safer as we continue to inch closer towards 1 year until elections.

Target: hxxp://putnamcountyohio.gov/
Deface: http://putnamcountyohio.gov/index.htm
Deface Mirror: https://defacer.id/archive/mirror/7291500

 

CgAn – Rogue Media: Introductory Guide To DarkNet’s

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks.

The 3 Layers of The Internet:

ClearNet. The “World Wide Web,Surface Web, ClearNet or simply referred to as the Web. Quite simply, the Surface Web refers to the portion of the internet only accessible by standard search engines – such as Yahoo, Bing and Google. While Google search results may feel endless at times and while you might think of them as being quite large in size, in reality, the Surface Web only consists of roughly 7% of the combined browse-able/accessible internet. Typically, it’s used for Email, Fax, File sharing, File transfer, Games, Instant messaging, Podcasts, Voice over IP, Searches, Streaming – etc.

Deep Web. The “Deep Web,” invisible web, or hidden web are parts of the World Wide Web whose contents aren’t indexed by standard search engines – for any reason. Rather, the content is hidden behind HTML forms, Javascript and custom code to protect it from the public eye. Generally speaking, the Deep Web is host to roughly 92% of anything which can be found on the internet. Typically, the Deep Web consists of information such as web archives, scholarly articles/resources and network databases such as cloud servers. While this isn’t the case 100% of the time, you usually also need a 3rd party software system, such as the “Tor Browser,” in order to access at least some of its content as well.

To describe how it works, think about all of the web pages you can visit on your bank accounts homepage or email account. While all of those sites, links, addresses and emails technically exist on the internet, and while you can still search Google for Bank of America‘s website, this doesn’t mean you can search Google for the web pages associated with each Bank of America’s customers accounts. Nor can you search Google to find everyone elses emails hosted on Gmail – get it? Those web archives still exist on the internet all the same as their homepages, but are not indexed on the Surface Web to be publicly available – which is why we say they exist on the Deep Web, below the normal surface layer of the internet.

DarkNet. While the Deep Web is in reference to any site that cannot be accessed through traditional search engines, the “DarkNet” or “Dark Web” is a small portion of the Deep Web that has been intentionally hidden to hide in plain site, and is completely inaccessible via standard browsers and search methods. The DarkNet is by far the smallest layer of the Internet, estimated to consist of less than 40,000 websites in total – less than 1% of the browse-able internet.

Not only will you need to install a special type of software to access a DarkNet website, but the URL Address associated with it will almost certainly be encrypted with a randomized sequence of numbers and letters – literally making it impossible to find or type in by accident. Instead, you must know exactly what this sequence is – usually from someone else who already knows or has it. Even then, once there, you will also most likely need to enter a custom password in order to enter – making it virtually impossible to browse any DarkNet webpage without the proper permission.

As explained by CyberGuerrilla, DarkNet websites don’t rely on the IP/DNS system (typing mysite.org in a web browser will take you to an IP address like 10.11.12.13). Darknet websites are accessible only through networks such as Tor “The Onion Router” and I2PInvisible Internet Project” and their respective software. Identities and locations of DarkNet users stay anonymous and cannot be tracked due to the layered encryption system. The DarkNet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. Due to the high level of encryption, websites are not able to track geo-location and IP of their users, and users are not able to get this information about the host; communication between DarkNet users is highly encrypted allowing users to talk, blog, and share files confidentially.

The DarkNet is also used for illegal activity such as illegal trade, forums, and media exchange, making it a prime target for Law Enforcement Agencies around the world. The 2 main DarkNet‘s networks are TOR (The Onion Router) and I2P ( Invisible Internet Project). While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing “anonymous” hosting of websites called “Eepsites.

Active Darknets worth mentioning:

Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship
GNUnet another peer-to-peer network that offers users full link encryption.

Decentralized network 42 (not for anonymity but research purposes)

Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.

Riffle is a client-server Darknet system that provides secure anonymity and minimal bandwidth

Tor Browser and Tor-accessible sites are widely used among the Darknet users and can be identified by the domain (.onion). Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server’s IP address (and thus its network location), a hidden service is accessed through its onion address,

The TOR Network works by bouncing your communications around a distributed network of relays (nodes) run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Tor passes your traffic through at least 3 different servers before sending it on to the destination. Encrypting your packets and bouncing them around the Internet isn’t cost less. All that extra work means that browsing the Web via Tor feels sluggish compared to using a conventional browser. Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user. Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges. Also, Bittorrent over Tor is not anonymous.

References:

https://en.wikipedia.org/wiki/Internet
https://en.wikipedia.org/wiki/Dark_web
https://en.wikipedia.org/wiki/I2P
https://en.wikipedia.org/wiki/Tor_(anonymity_network)

Software:

The FreeNet Project: https://freenetproject.org/pages/download.html
The Tor Project: https://www.torproject.org/
I2P: https://geti2p.net/en/download

Projects Using TOR:

Tor Browser: https://www.torproject.org/projects/torbrowser.html.en – comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable)

TAILS Operating System (Linux): https://tails.boum.org/about/index.en.html – Tails is a live system that aims to preserve your privacy and anonymity

Whonix Operating Systems (Linux): https://www.whonix.org/ – Whonix is a Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet

Orbot (Tor for Android OS’s): https://guardianproject.info/apps/orbot/

Warnings:

Some links may be disturbing and dangerous to visit.

To avoid be tracked or watched online, I strongly recommend you to run a VPN service on the system that you access. VPN will give you a double layer protection against the unknown.

** DISCLAIMER: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT. VISIT THEM AT YOUR OWN RISK. WE RECOMMEND TO USE THOSE DEEP WEB LINKS ONLY FOR RESEARCHING PURPOSES! WE ARE NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY YOUR ACTIONS! **

Some Popular TOR .onion Sites:

http://hss3uro2hsxfogfq.onion/ (notEvil search engine)
http://xmh57jrzrnw6insl.onion/ (TORCH search engine)
http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page (Uncensored Hidden Wiki onion link)
http://answerstedhctbek.onion/ (uncensored General-subject Q&A forum)
http://torvps7kzis5ujfz.onion/ (VPSSHell .onion hosting)
http://grrmailb3fxpjbwm.onion/ (TorGuerrillaMail – Disposable Temporary E-Mail Address)
https://protonirockerxow.onion/ (Fully encrypted email hosted in Switzerland offering free accounts)

Clearnet HTTPS signup & JavaScript! Must pay or verify via previously existing email or SMS to get an account

http://nzh3fv6jc6jskki3.onion/ – Riseup provides online communication tools for people and groups working on liberatory social change
http://tetatl6umgbmtv27.onion/ (Tor Chat roulette style service)
http://6dvj6v5imhny3anf.onion/ (CyberGuerrilla leAkboX)
http://76qugh5bey5gum7l.onion/status.xsl (Deep Web Radio)
http://deepdot35wvmeyd5.onion (DeepDotWeb -Surfacing the News)
http://grams7enufi7jmdl.onion (Search Grams)
http://kpynyvym6xqi7wz2.onion main.paraZite (Anarchy files and Underground)
http://valhallaxmn3fydu.onion (Valhalla Market)
http://silkkitiehdg5mug.onion (Silkkitie Market)
http://lchudifyeqm4ldjj.onion (Dream Market Dark Web Market)

Some I2P:

http://direct.i2p/ (Direct Search)
http://forum.i2p (Main i2p Forum)
http://imgbi.i2p img.bi (Secure Image Hosting)
http://pastethis.i2p/ (Pastebin)
http://zerobin.i2p (ZeroBin)
http://git.repo.i2p/ (Anonymous Git Hosting)
http://freedomforum.i2p/ (Privacy Forum)
http://leakager.i2p/ (A Cat’s Mirror of Wikileak)

General Chatter Putting In Perspective:

[Mink] oh, then go go go
[Mink] right, today we are going to talk about Darnets and TOR in particoular
[Mink] *darknets
[Mink] i made few notes to read to get us started
[Mink] https://pad.riseup.net/p/r.50b7831a5a3e919781433e4819976169
[Chanlog] Title: Riseup Pad (at pad.riseup.net)
[Mink] please, wait 10 minutes before starting to ask questions
[Aspire] ok
[n1ck1] yeah
[Mink] i’ll just write few points here while you read
[Mink] the Internet is big, really big
[Mink] what we think of the internet are webpages, blogs, email, instant messaging, webradio, voip (like skype) etc
[Mink] most of those services use the tcp/ip protocol to connect the resouces together
[amoruxX] When do we start ?
[RedAcor] Already started.
[Mink] oh amoruxX , we just did
[Mink] fundamental to make the internet work is the IP/dns concept, where a number (like 176.23.98) gets translated to a name (like mysite.com) and back
[Mink] this makes these resources available to the public and available to Search Engines (like google and yahoo)
[Mink] once a new website name is registered, a IP address is assigned to it
[Mink] this is what most people call “the internet” but there is much more
[Mink] there is a part most people will never see
[Mink] it is hidden on purpose
[B[U]G] where the address is assigned by your isp Internet Provider Service , where are two ip address ( public ) and ( local ) with mask subnet and principal gateway , the public have han UDP connetion to the internet call other service and TCP have an entrance connection to localhost
[Mink] imagine big companies networks, government agencies, or really anyone that doesn’t want their site or resources been indexed by search engines
[Mink] that we will call “DARKNET” or hidden web
[Mink] sorry “deepweb”
[Mink] :”)
[Mink] deepweb/invisible/hidden, basically not available to the public
[Mink] unless you have a login/password or a very precise address
[Mink] the deepweb is the biggest part of the internet
[B[U]G] This is because it is not possible to search through a search engine because each address is generated randomly
[Mink] in the deepweb, there is a small portion that we can only see with “special software”
[Mink] that we will call “darknet”
[Mink] for today we will talk about the main Darknet networ, the TOR (onion) network
[Mink] with TOR software (like torbrowser) we can access the normal web AND the onion network
[Mink] onion sites end with .onion and use different protocols from the norm
[Mink] the TOR network anonimize both the user and the server, automatically
[Mink] as a user, your traffic will pass trough at least 3 different servers, before reaching the target site
[n1ck1] what are the names of the different protocols for me to look for later?
[B[U]G] thanks to a connection called “onion”, by most users who share the relay
[Mink] sock
[B[U]G] “cipolla”
[n1ck1] ok tks
[n1ck1] I need t reed more about socks
[Mink] all the traffic from those servers (called “nodes” or “relay nodes” is encrypted
[Mink] making using the tor network slower than normal
[Mink] surfing the web is the main use of TOR, but it can be used to send/receive mail, IRC (like i’nm doing right now) or even voip (IF YOU CAN GET A FAST CONNECTION
[Aeolus] you can voip through tor?
[Mink] yes, with a bit of luck
[Aeolus] cool, didnt know that
[Mink] TOR can be used pretty much like any other proxy
[Mink] u could plug it in Thunderbird for emails
[Mink] in Hexchat for IRC
[B[U]G] using the gpg encryption with thunderbird or claws mail for more security
[Mink] in Mozilla for ftp, etc
[n1ck1] voip + “proxuchains firefox(TOR)”
[n1ck1] three at a time, using a VPN to open the terminal with the configured proxychains and run the TOR browser??
[Arkhangel] why with torrent no, p2p
[Arkhangel] ?
[n1ck1] VPN….voip=error
[Mink] no, but you can use vpn+TOR
[Aeolus] like me
[n1ck1] why not proxychains too?
[n1ck1] tor first or VPN first?
[B[U]G] proxychains is a simple script
[Aeolus] vpn then tor
[Aeolus] for me
[B[U]G] tht filter tor
[Aeolus] others prefer elseway
[Mink] Bittorrent over Tor is not anonymous, becouse needs to aware of other seeds/leecher sharing the files
[B[U]G] you can use for launch any application
[l0t3D_] what difference does it make
[Mink] also would put too much stress on the network
[Arkhangel] Aeolus, if someone uses TOR then VPN, I dont think he can access to onion network xD
[l0t3D_] Mink how do you even Bittorrent over tor?
[Mink] so p2p with TOR: possible, but really a waste of time
[n1ck1] yeah…rsrsrs I see
[B[U]G] l0t3D_, set tor as proxy socks
[B[U]G] or http
[B[U]G] (client)
[B[U]G] or generate
[Mink] again, it’s just possible to plug TOR port in your client
[B[U]G] iptables rules
[n1ck1] VPN + TOR is the best right?
[Mink] yes n1ck1
[Arkhangel] Mink do u mean that seeders/leechers should know your real IP?
[B[U]G] the best configuration are , tor – vpn – tor ,
[Mink] but now.. the bad part
[Aeolus] Arkhangel i used to be able to do that especially with my whonix settings
[l0t3D_] so to “torrent over tor” you need to plug TOR into my bittorent client
[Aeolus] i talk about normal browsing when you want to use tor as an extra layer
[Arkhangel] Aeolus U think that the best configuration is the config shown by B[U]G XD
[l0t3D_] but if i torrent normally and TOR is running that’s okay right?
[Mink] yes Arkhangel ,serius bitorrent users should use proxies or VPNs , not TOR
[Aeolus] Arkhangel xD
[Mink] yes l0t3D_
[l0t3D_] okay
[Arkhangel] what is the bad part? Mink
[Mink] ok, let me make one more point, then u free to ask questionbs
[Mink] right, bad part is TOR is not perfect
[n1ck1] a few days ago they tracked the IP of many users
[Mink] and it’s been under scrutiny for vulnerabilies for years
[Arkhangel] I think* (I wrong to write before lol)
[Mink] “”Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user””
[Mink] there are ways and attacks to “deanonimize” a small portion of TOR users
[n1ck1] how?
[B[U]G] for example
[Aeolus] like FBI running nodes
[B[U]G] a plugin
[Aeolus] 😀
[B[U]G] in browser
[B[U]G] you can deanonymize you
[Mink] ” Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges.”
[Arkhangel] why?
[B[U]G] by an javascript exploit
[Arkhangel] how a plugin can do this?
[l0t3D_] Aeolus do they?
[Aeolus] yes ofc they do
[B[U]G] or you find it on an exit node,
[Arkhangel] a javascript exploit that affects the TOR software or the plugin itself?
[Mink] the NSA is known to have run TOR “nodes” , also known as a man-in-the-middle attack
[n1ck1] TOR over TOR?
[l0t3D_] Tor over Tor? Mink
[Mink] never tor-over-tor
[l0t3D_] hahaha n1ck1
[l0t3D_] how do you even TOR over TOR
[n1ck1] so far so goof rsrsrs
[Mink] that would be running 2 instances of TOR
[Arkhangel] in which manner TOR over TOR can make u not anon?
[l0t3D_] Mink tor stops you from doing that
[n1ck1] like in the real machine and the VM use TOR?
[B[U]G] sure
[Mink] it’s like an internal thing, the “relay” will just not work, 2 likely result, no traffic go trogh, or worse no encryption between the relays
[Arkhangel] lol
[n1ck1] I’m going to print this
[Mink] if you don’t like the 3 “hops” of a standard TOR connection, you can ofcourse increase it
[forceMajeure] the problem with using tor to browse is that 99 out of 100 people will deanonymize themselves by accident without ever realizing it. User error
[Arkhangel] n1ck1 this lesson will be printed later
[Arkhangel] n1ck1 u can access it on the site of cg
[B[U]G] you can use a gateway into your vm as whonix , then use a vpn on you local machine host , and reuse tor setting of your vm gateway
[Mink] ok, now, to cover my ass
[n1ck1] ok thanks Arkhangel
[Mink] WARNING: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT.
[Mink] VISIT THEM AT YOUR OWN RISK.
[Arkhangel] forceMajeure how an user can realize it?
[n1ck1] ok….send please
[Mink] you can see from the list at the bottom of the pad
[Mink] there is a bit of everything
[Mink] email services, blogs, forums, chats
[forceMajeure] lets say you visit your own website, log into ANY account associated with your real identity, attack a cpu of someone you know, just little things
[Arkhangel] forceMajeure and what are the user errors that bring the user to be deanonymized?
[Aeolus] use tor to log to FB
[forceMajeure] look up
[Mink] of course all end in .onion, and using a normal browser won’t work
[Aeolus] something stupid like that
[Arkhangel] forceMajeure ah ok… this should answer to my second question
[forceMajeure] turn on js to access a site, etc.
[Arkhangel] ty
[Arkhangel] forceMajeure why if I use js to access a site, I m not anon anymore? js stores my real IP over TOR?
[Mink] remember, and this is for clearnet aswell, your browser is the single most dangerous point of failure
[forceMajeure] if the site is compromised, someone can use something like burp to insert a malicios js
[forceMajeure] they did it at defcon years ago
[forceMajeure] you should always be using noscript
[Mink] ok, questions, and please let me answer first before giving your opinion
* Aeolus agrees with Mink
[Arkhangel] forceMajeure so if I am on TOR network, if I go on a onion malicious website and I click where I have to not click, this malicious js can decrypt the routing information to get my real IP?
[Mink] yes Arkhangel
[Arkhangel] lol
[forceMajeure] ))
[n1ck1] Is it set by default to accept or reject scripts?
[Arkhangel] sorry but, at this point
[n1ck1] TOR Browser
* Aeolus thinks we all tell shit and not let Mink who knows educate us
[Arkhangel] why didnt they do a strong encryption?
[Arkhangel] that cannot be decrypted?
[Arkhangel] like
[Mink] even worse, it can inject code into your browser, activate your webcam and mic, take screen shots and much more, no kidding
[forceMajeure] true story
[Arkhangel] not inverse hash algorithms
[Arkhangel] not invertible*
[Mink] nothing to do with encryption, JS runs on your computer, not the server
[Arkhangel] Mink if I click on a js hosted on an onion website, it runs on my pc?
[B[U]G] depends
[B[U]G] you can
[Mink] not only .onion
[B[U]G] disable flash/javascript
[Aeolus] js runs client-side
[B[U]G] and disable WebRTC leak
[B[U]G] on you browser settings
[Arkhangel] good to know XD
[Arkhangel] y
[Arkhangel] I have other different questions
[Mink] ok
[Arkhangel] the onion websites store the (false) IP of each user accessing to it?
[Mink] no
[m00trix] Let’s just agree on that TOR is great. If used out of the “box” the TOR Browser will in most cases keep you safe. If you decide to disable or allow sites through the build in TOR Browser plugins, you are taking a risk that not even TOR, nor any other level of anon tools can protect you from.
[RedAcor] For webrtc settings: https://www.privacytools.io/#webrtc
[Chanlog] Title: Privacy Tools – Encryption Against Global Mass Surveillance (at http://www.privacytools.io)
[B[U]G] or simply edit your about:config asd
[Arkhangel] Mink, if today TOR gives me a certain IP address, tomorrow or after a month, another user of another part of the world can be assigned to that same IP?
[B[U]G] to http.refer and media.peer connection
[m00trix] Arkhangel, yes that is the hole point…
[Mink] the TOR network will not need your IP address, the danger of that comes from javascript/ajax/bad code
[B[U]G] how all – all store a log , depends if the owner delete it
[Arkhangel] m00trix why “hole point”?
[m00trix] yea
[m00trix] if 200 users on that exit node
[m00trix] with the same “ip”
[B[U]G] but the node change every time
[m00trix] you get plausible deniability
[Arkhangel] is it a problem if an IP assigned by TOR is used in the future by another user?
[m00trix] no
[m00trix] its a bonus
[Arkhangel] ah ok xD
[Mink] again, TOR will not give you an IP address, but an “identity”
[m00trix] yea Mink
[Arkhangel] Ok Mink so that “IP” address does not work on IP protocol?
[m00trix] I think he means when using the browser, it tells the exit nodes ip
[m00trix] 🙂
[Arkhangel] yes, in practice
[l0t3D_] okay so if i have scripts disabled globally but lets say i enable it only on youtube to play a video
[n1ck1] how many connections can a node make with the same IP
[Mink] yes Arkhangel , TOR architecture does not use the same IP ]DNS as normal internet
[m00trix] that IP is your source proxy IP when browsing trough the TOR browser
[m00trix] or using any service to proxy through it
[n1ck1] and how many users can be on the node at the same time?
[l0t3D_] could another malicious website use that youtube tab to attack me?
[Mink] when a new .onion site is created it doesn’t get a IP address, but a .omnion address
[n1ck1] sorry…. my mistake
[n1ck1] but a node can handle how many requests?
[n1ck1] and perform how many for another node?
[B[U]G] all it’s possible this it happens if youtube link it’s embedded in page builded ad hoc
[m00trix] Mink, still, when you use the TOR Browser, it will tell you what the exit nodes IP is when you start it. That exit node IP is also the source of the browser requests you make and the source of any program you proxy trough it
[Arkhangel] Mink in practice you are saying that, unlike normal internet where a service like a website is on the 3rd level (IP level ISO/OSI), the onion network is completely on the 7th level (application level) of the
[Mink] ok, to spend those few minutes: TOR isn’t the only darknet network
[Arkhangel] ISO/OSI?
[m00trix] okay stop
[l0t3D_] if it’s a normal youtube link i opened myself B[U]G?
[Mink] wot?
[B[U]G] depends if in source
[B[U]G] a function
[B[U]G] call
[m00trix] When you are using the TOR browser, to go on midgetporn.org or whatever. Midgetporn.org will see your source IP as the exit nodes public IP
[B[U]G] a malicious “file”
[B[U]G] or host
[m00trix] simple as that
[Aeolus] guys thanks for today info. i suppose logs will be up later so i can read again, got to go.
[Aeolus] good work Mink thx 🙂
[Mink] you welcome Aeolus
[Arkhangel] in practice m00trix your machine is overlapped on the exit node
[l0t3D_] but if there is nothing in this source but there is a malicious “file” in another tab i have opened in the same time but I have no scripts enabled?
[m00trix] fire up the TOR browser, and press the “test tor…” thingy
[forceMajeure] Is it possible for tor to assign you a new circuit while an existing connection is still established say through a python script ran through port 9050
[B[U]G] for example : [script src=”DownloadThisEvilCode.js”/] [iframe]youtube embedd[/iframe]
[Mink] Arkhangel, , you want to rephase your question?
[B[U]G] afk
[forceMajeure] thus severing the connection
[m00trix] any site that want’s to can see the visitors source IP – and with TOR browser, that source IP is the IP of the current exit node your are on.
[Arkhangel] Mink, about the https://en.wikipedia.org/wiki/OSI_model
[Chanlog] Title: OSI model – Wikipedia (at en.wikipedia.org)
[m00trix] really pretty simple
[m00trix] jesus
[Mink] yes forceMajeure , not only possible, but advisable, tor will change nodes randomly to add anonimity
[Mink] Arkhangel, i know the OSi model :/
[forceMajeure] but what happens to the connection that was established before the circuit changes
[Arkhangel] Mink, if the normal websites have associated IP
[forceMajeure] is it passed into the new connection
[Arkhangel] so the 3rd level of OSI model
[Arkhangel] the onion network, since it does not have IP, it is completely on the application level of OSI model?
[m00trix] no
[forceMajeure] I guess I could see what happens by sending newnym to 9051 I just thought of that
[Arkhangel] since it does not have IP ( i mean the onion websites)
[Mink] no Arkhangel
[m00trix] you need to not compare hosting an onion site with using the TOR browser
[Mink] lets’ amke it clear TOR and TORbrowser are 2 different things
[Arkhangel] y
[m00trix] I think Mink covered all the questions really good already
[Arkhangel] in the pad
[Mink] torbrowser connects to tor
[Arkhangel] it talks about the Freenet platform
[Mink] yes?
[Arkhangel] continue xD I was thinking u finished to answer my prev question xD
[Arkhangel] ok so torbroweser, application level, connects to TOR network
[Mink] yes, trough socks
[Arkhangel] socks is an application protocol?
[Mink] taht’s 5 i think
[Arkhangel] ah ok
[m00trix] Arkhangel, you need to unleash your mind from that OSI layer shit 😀
[Arkhangel] ahahahah
[Arkhangel] ok xD
[n1ck1] socks is a protocol right? the TOR Browser is the application?
[Arkhangel] y
[Mink] yes n1ck1 , but it’s easy to confuse “an application(like a program) and the “application layer” of the stack
[Mink] so yes
[Arkhangel] tell me when I can continue with another question
[m00trix] Arkhangel, if you fire up a VM with like parrotsec.org OS – It have a build in function that routes all traffic through TOR. There are other distros that does this as well. But any way, if you do that, you can look into how the traffic flows using the terminal – when all traffic is routed using TOR. Might give you more insight
[l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] or “obfs”
[Arkhangel] m00trix traceroute?
[forceMajeure] lsof -i -n -P
[m00trix] well for a start heh
[m00trix] and many more
[Arkhangel] ah ok
[m00trix] but it will show you the traffic flow
[Arkhangel] nice to know
[Mink] one thing i wanted to talk about, but we have no time, whonix
[Arkhangel] another doubt is: since ISP knows what I am visiting as website, if I access to an onion website, my ISP can know it?
[vivek] m00trix: you can achieve the same with almost any distro
[m00trix] and if there are like 200 others using the same exit node that you are on, for that current TOR connection – it’s all good.
[m00trix] vivek, I know
[Mink] the ISP will know you are using TOR, but not which sites you are visiting
[Arkhangel] Mink the ISP cannot know the onion address?
[m00trix] no
[vivek] Parrot one is highly unstable and my exp. Was not very good
[m00trix] And if you combine TOR with an OpenVPN on port 443 then even less
[Arkhangel] Mink it because ISP can see destination IP but onion website are not based on IP scheme? this is the reason?
[Arkhangel] or one of the reasons
[m00trix] vivek, I only have a VM with it. But yes, it’s Debian aka unstable heh
[Mink] no Arkhangel , unless the ISp is running the last TOR exit node
[Arkhangel] normally, an ISP in the clearnet precisely what can see from me? Only the IP of website that I am visiting?
[m00trix] Arkhangel, your ISP cant see what sites your are browsing trough TOR
[l0t3D_] [l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] [l0t3D_] or “obfs”
[m00trix] all your DNS lookups and what you are doing
[m00trix] if you use the ISP’s dns servers
[Mink] in clearnet, your IS know your favourite pornhub page
[Arkhangel] guys so the ISP can read only the DNS lookup table inside the router?
[m00trix] they can see all, but not https login data
[l0t3D_] lol
[Arkhangel] ah ok
[Mink] sorry l0t3D_ , obfuscated are another kinfd of “relay nodes” to help tranport info
[m00trix] Arkhangel, if you use the DNS servers provided by the ISP you have. They can see what sites you visit, the IP of the sites, what traffic you generate, they can see close to anything
[l0t3D_] obfuscated servers are used to access vpn or tor in some places like the great firewall of china?
[Arkhangel] cannot I change the DNS server where I want to go?
[Mink] yes l0t3D_ , and Iran and N korea
[l0t3D_] well i think ill be up on that list soon too
[Arkhangel] provided by other companies?
[m00trix] If you change the DNS servers on your router to some that does not log and are not your ISP’s. They loose the ability to view your DNS req
[l0t3D_] thath’s the only way i can access tor or vpn
[m00trix] next step is then, VPN and TOR
[Arkhangel] m00trix so you mean that then internet in my location does not work lol
[l0t3D_] makes the connection very f’in slow tho
[m00trix] I would advice any one to NOT use the default ISP provided DNS servers as a pure basic step
[m00trix] should be the first step you do on the router
[Mink] l0t3D_, remember for help with anonimity and privacy you can always ask in #opnewblood, we will be happy to help with that
[Arkhangel] m00trix how can we do this?
[m00trix] set WAN DNS to manual and find some good non logging DNS
[Arkhangel] do u know some non logging DNS?
[m00trix] Arkhangel, depends on what router you have
[m00trix] sure
[l0t3D_] thanks Mink
[m00trix] Also you will get arround of most censorship
[m00trix] by stat step alone
[Arkhangel] can you list some of them here?
[m00trix] gov dns blocks
[m00trix] I switch it up
[m00trix] but run
[m00trix] https://blog.uncensoreddns.org/
[l0t3D_] should i call them and ask them nicely to change my DNS? 🙂
[m00trix] some places
[Arkhangel] ty
[m00trix] just login to your router
[m00trix] and change it
[m00trix] if in doubt give me a priv
[Arkhangel] ty very much
[l0t3D_] WAN settings right?
[m00trix] yea
[m00trix] and then
[m00trix] set DNS do manual
[m00trix] not the IP 😀
[m00trix] only dns
[Arkhangel] another question: the pad talks about the freenet platform… is it a software to be installed on my computer?
[Mink] yes Arkhangel
[m00trix] l0t3D_, priv me if you need help
[Arkhangel] what is the difference between freenet platform sw and tor bundle sw?
[m00trix] If I run with my basic ISP DNS servers sites like http://1337x.to/ are blocked 🙂 a torrent site. Gov block
[Chanlog] Title: Torrent Search Engine | 1337x.to (at 1337x.to)
[n1ck1] if I change my DNS the VOIP stops working in my house
[Arkhangel] or better: if torbrowser allows me to access to the tor network, freenet and other shown platforms on pad, what do they allow me to do?
[m00trix] wut n1ck1?
[m00trix] makes no sence
[n1ck1] my ISP has a separate physical VOIP phone but connected by cable to the router
[n1ck1] minha mae é velha e não sabe usar muitas tecnologias e o telefone é similar ao antigo porém funciona como VOIP
[n1ck1] sorry
[n1ck1] my mother is old and does not know how to use many technologies and the phone is similar to the old one but it works like VOIP
[n1ck1] if I switch to any other, VOIP does not work, it has been months of technical visits, tests, and unsolvable configurations.
[RedAcor] Set DNS on your network manager.
[RedAcor] So that will not affect your router.
[RedAcor] Also you can use unbound on your system.
[RedAcor] You can check lesson 4 logs for that.
[m00trix] yes
[m00trix] thx to Mink for a great course 🙂
[RedAcor] There many different and hybrid solutions.
[RedAcor] Anyways. Mink Thanks for delicious lesson. 🙂
[Arkhangel] guys is better vpn tor vpn tor or tor vpn tor?
[Arkhangel] is better starting with vpn or tor?
[n1ck1] YES
[n1ck1] This worked …. It’s simple but I had not thought of it.
[RedAcor] Arkhangel Tor VPN Tor
[Arkhangel] why starting with tor RedAcor?
[RedAcor] Some people use VPN ] VPN ] Tor also
[RedAcor] Because it is secure than VPN. jijiji
[n1ck1] tails pendrive, VPN, TOR, break everything later and throw it in the trash lol
[Arkhangel] instead, when I connect to tor network, when I reach the exit node, the IP of my computer is in clear there?
[RedAcor] If i talk about last bug of TOR: Nah.
[l0t3D_] 2 tor?
[m00trix] Arkhangel, really depends what you are doing also 🙂
[l0t3D_] [RedAcor] Arkhangel Tor VPN Tor
[n1ck1] RedAcor thanks for the DNS tip
[RedAcor] But they fixed that issue.
[RedAcor] n1ck1 You’re welcome.
[Arkhangel] to discover some user, agency like NSA what look for?
[Arkhangel] they use only their exit node and check for all users that go in, or they can know information also about exit node that are not theirs?
[m00trix] hard to say
[m00trix] you need to stop overthinking it
[Arkhangel] im afraid to forget these questions and these doubts xD
[m00trix] I get that bro. But I can’t answer you how the FEDS, CIA or NSA track people on TOR 🙂
[m00trix] or if they even can and with what success
[Arkhangel] dont worry. I have a last question: why tor works on SOCKS and not HTTP/HTTPS protocol?
[m00trix] Arkhangel, per design I think
[Arkhangel] in the network settings, for HTTP/HTTPS I cannot use the 9050 or 9150 port to use TOR, right?
[m00trix] network settings for what?
[m00trix] program
[Arkhangel] for example if you want to use a proxy on the system of the operating system
[m00trix] what OS Arkhangel
[m00trix] You want to route all traffic out through TOR
[Arkhangel] windows or linux-based
[Arkhangel] y
[Arkhangel] in that case for HTTP/HTTPS I cannot use port 9150
[Arkhangel] right?
[Aspire] i have to go bye all and thanks for the lesson
[Arkhangel] since SOCKS and HTTP/HTTPS talk different “languages”
[m00trix] Arkhangel, are you trying to run another browser through TOR?
[m00trix] what are you trying to do, that would help heh
[Arkhangel] no
[Arkhangel] I want to use just the normal browser with no opening torbrowser
[Arkhangel] but where I can surf on tor
[m00trix] you have to have the TOR Browser running to proxy the traffic
[m00trix] unless you run a plain tor from a terminal
[Arkhangel] exactly
[Arkhangel] on windows I should run tor browser
[m00trix] and there is a reason for why the TOR browser is at is is. And have the plugins it have
[m00trix] to protect you
[m00trix] you can do what you are trying to do, but even TOR warns against it
[Arkhangel] i know that torbrowser is better for that, but just for information, if I start torbrowser and I enable a proxy that route the data to the tor network by a normal browser, it is not a connection tor over tor right?
[m00trix] when you start the TOR browser, you can tell most programs yo use 127.0.0.1:9150 as a proxy and it will proxy over TOR
[m00trix] but on Windows, the TOR Browser needs to be running
[Arkhangel] exactly, so it is simple one tor connection, is not tor over tor, right?
[Arkhangel] in case of windows I mean
[m00trix] tor over tor?
[Arkhangel] y, since it s not a good idea running tor over tor, I would like to know if, on windows, open torbrowser and proxying the other programs to 127.0.0.1:9150 is not a tor over tor
[l0t3D_] alright thanks all for the lesson i need to go
[l0t3D_] bye
[n1ck1] no
[n1ck1] not is
[Arkhangel] ok ty
[Arkhangel] Im so sorry I forced everyone to run away
[n1ck1] you only configure that program to use this network
[n1ck1] ahsuhahsauhsauhusa
[Arkhangel] ahaha
[n1ck1] but use linux
[n1ck1] windows sucks
[Arkhangel] I use Linux, but I need to have all possible information
[n1ck1] try ubunto first, it is easy
[n1ck1] yes
[n1ck1] this is right
[Arkhangel] culture is power
[n1ck1] y
[n1ck1] tks all

All About Hacking Based Operating Systems

I almost hate to admit it because it takes some of the “Prestige” away from “Being a Hacker,” but the fact of the matter is that most of the worlds most famous hackers and/or hacktivists aren’t really hackers at all – they merely just run Operating Systems designed around “Ethical Hacking” and “Penetration Testing,” the field of legalized hacking. In fact, I’m willing to bet that 95% of “Hackers,” or at least 95% of anyone whom calls themselves a hacker, aren’t necessarily hackers at all – they merely just run any one of the operating systems disclosed below. The people whom design these systems and/or build, program or code the tools inside of them are the real hackers – though they make up an extreme minority of the overall hacking population.

You might also be surprised to learn that nearly all of the worlds top hacking programs and operating systems aren’t necessarily some sort of big secret either, but rather, they are all free and open source – open to the public and 100% legal for anyone to own or download. On top of this, one of the most famous websites used by hackers to post and retrieve source codes for various exploits and tools – Github.com – is actually one of the worlds top 100 most trafficked websites.

However, it must be noted that while owning these programs, tools and systems is legal, using them without the proper licenses, certifications, consent or permissions can be illegal. For example, in order to perform their work, Penetration Testers usually have to pass some sort of written exam for certification/licensing, register with the Government as a public hacker, then sign a contract with a given company to attack their systems – usually designated on a certain time or day(s) and launched from behind a pre-defined or pre-designated number of IP Addresses. However, just as with anything else in life, there are ways around everything.

How To Hack Legally?

There are many ways you can learn computer hacking or the hacking arts, legally, from your home. For example, you can learn how to set up security on one computer, by hacking it from a different computer. Or, you can join an online chatroom and agree to hack some of your friends or friends systems. It is important to understand that the US Computer Fraud and Abuse Act directly states that “any unauthorized access to another persons devices, systems  or networks” is illegal, meaning that it is not illegal if you have authorization. Just find the right group of people and/or friends, and you can learn as much as you want – really.

Also, you can learn more about hacking and how to hack by simply entering different searches on Google or YouTube than any article you could possibly ever read – just saying.

Top Open Source Hacking Systems:

Kali Linux

See the source image

For anyone whom has ever watched the hit series “Mr. Robot,” you would know that this is Elliot’s Operating System of choice. Outside of television, Kali Linux is hands down the most popular hacking OS on the market. In fact, I’m willing to bet that anyone/everyone whom has ever thought about becoming a hacker or went on to become one has at one point or another used/run Kali Linux in their lifetime. It’s not for no reason that I top today’s list of hacking OS’s with Kali, it’s pretty much king.

Download: https://www.kali.org/downloads/

ParrotSec

See the source image

In terms of Ethical Hacking distro’s, ParrotSec OS is one of the newest systems on the market – but has quickly developed a massive following. For whatever reason, ParrotSec tends to be particularly popular amoungst some of the worlds newest or youngest hackers/hacking groups. What has always been the systems biggest claim to fame, and what I think has made it so popular over recent years, is it’s graphic package – which has essentially turned a world class hacking OS into something that’s visually stunning, which people therefore do not mind running on their computers on a regular basis.

Download: https://www.parrotsec.org/download.php

BlackArch

See the source image

BlackArch Linux just so happens to be my personal Operating System of choice, or at least used to be. This is because the OS itself is extremely simple and straight forward, with literally thousands of exploits, tools programs built in. In terms of sheer quantity, the system is virtually unmatched. However, BlackArch has always had somewhat of a smaller following due to its generic user interface. While some people prefer things simple and straight to the point, seeing this as a positive, others look at it as boring – and therefore see it as a negative. Honestly, it’s all relative to your personal preferences.

Download: https://blackarch.org/downloads.html

Backbox

See the source image

Truth be told I never heard of Backbox until very recently, but it just so happens to the OS of choice for Al1ne3737 – an international hacker, formerly of Pryzraky, whom has made a number of appearances on Rogue Media Labs. In an interview earlier this week, Al1ne3737 said that BackBox is her Operating System of choice because it only hosts a few hacking tools/exploits – only tools/exploits relevant to modern hackers. In addition to this, the OS comes in an extremely light weight package, therefore making it easier and faster to use – especially when duel booting.

Download: https://www.backbox.org/

TAILS

See the source image

TAILS OS is typically known as an “incognito live system,” and this is because it’s almost exclusively designed around cyber security and privacy – which is why I include it here today. While you can not hack anything outright with this system, you can duel boot on it – creating a world class security system you can then utilize for hacking. While it may be a bit extreme, there is perhaps no better way to hide your tracks whilst hacking – which is growing ever more important to hackers worldwide.

Download: https://tails.boum.org/install/

Windows cmd

Yes, you read that right. Most people think that Windows cmd has no seat at the drivers table when it comes to hacking – but they are sorrily mistaken. In fact, you might not know it, but a mastery of Windows cmd is demanded of all of the US Governments top hackers – including the FBI. Combining Windows cmd with a duel boot of any hacking OS of your choosing for example, quite literally provides hackers with the best of both worlds – from both Linux and Windows.

Other Hacking OS’s:

Alternative Hacker OS: https://ghostbin.com/paste/79ht8
Anonymous Operating System: https://www.whonix.org/wiki/VirtualBox/XFCE
Cyborg Hawk: https://archiveos.org/cyborg-hawk/

Mastering The Command Lines:

cmd Commands Encyclopedia for Windows: https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/ntcmds.mspx?mfr=true
Windows cmd Encyclopedia: https://ss64.com/nt/
Linux Bash Commands Encyclopedia: http://ss64.com/bash/
Terminal Commands Encyclopedia for Mac: http://ss64.com/osx/
DOS Commands Encyclopedia: http://www.computerhope.com/msdos.htm#02

Understanding Linux:

Linux Installation and Initial Configuration: http://www.mediafire.com/download/xxz33o4tq1obpzk/Linux+Installation+and+Initial+Configuration.rar
Introduction to the Bash Shell: http://www.mediafire.com/download/i24oogco4ch9ma4/Introduction+to+the+Bash+Shell.rar
Shell Scripting with Bash: http://www.mediafire.com/download/t5eha9cr4eckayb/Shell+Scripting+with+Bash.rar
Linux Command Line Interface Fundamentals: http://www.mediafire.com/download/27hfeldyqrs2ae8/Linux+Command+Line+Interface+%28CLI%29+Fundamentals.rar

Miscellaneous:

Network Pentesting using Python and Kali Linux: http://www.mediafire.com/download/7rq1ujn9424d3hb/Network+PT+Using+Python+and+K_4li+Linux.rar
Operating Systems: http://www.mediafire.com/download/mi3mvleyyd8ayu4/CompTIA+A%2B+Part+4%3B+Operating+Systems.rar
Installing Duel OS’s Through Virtual Machines: https://www.vmware.com/pdf/dualboot_tech_note.pdf

Duel Boot Tutorial:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/dualboot_tech_note.pdf”%5D

** If you can’t navigate the document, hover you mouse over the pdf (above) and look down at the bottom left and you will see an up and down arrow. These will help you flip the pages **

 

🤓 Coding Resources 🤓

In all of my years managing online chatrooms and forums one of the questions I seem to get asked the most is if I know of any good places to learn coding? Well, I’m glad you asked! Because as it turn out, I do. Below you can find various resources, tutorials and guides I’ve collected over the years to help internet users better understand coding. Please note that all of the downloads featured below are certified safe to the public, but may not be available online forever – so best get them while you still can 😉.

Websites/Online Resources:

W3 Schools: https://www.w3schools.com/
Code Academy: https://www.codecademy.com/
Cybrary: https://www.cybrary.it/

File Downloads/Tutorials:

C++ Fundamentals: http://www.mediafire.com/download/su02297mbmlxq27/C%2B%2B+Fundamentals.rar
C++ Advanced Topics: http://www.mediafire.com/download/9tgfpx8pzwakrjc/C%2B%2B_Advanced_Topics.rar
C Fundamentals: http://www.mediafire.com/download/com5mg5fda6mwd6/C+Fundamentals.rar
C In Action: http://www.mediafire.com/download/dzr3d2jymdhdqs6/C+in+Action.rar
Java Fundamentals: http://www.mediafire.com/download/t5rygwbb45izg71/Java+Fundamentals.rar
Java from Scratch: http://www.mediafire.com/download/rr8kjao0zaxld3o/JavaScript+from+Scratch.rar
Introductions to HTML: http://www.mediafire.com/download/w37r7339ouih7lg/Introduction+to+HTML+for+Designers.rar
Introduction To JQuery: http://www.mediafire.com/download/0j09qr98vtbdjab/Introduction+to+jQuery+for+Designers.rar
Introduction To CSS: http://www.mediafire.com/download/jj466s79n75ns46/Introduction+to+CSS+for+Designers.rar
Introduction To Arduino: http://www.mediafire.com/download/pvmstcc4abura43/Arduino.rar
Getting Started with AngularJS: http://www.mediafire.com/download/sbrgwwksehmz8rc/Angular_Js_-_Get_Started.rar
Building Angular & Node JS Apps: http://www.mediafire.com/download/e5ynwz4th5g3bvo/Building+Angular+and+Node.js+Apps+with+the+MEAN+Stack.rar
ExtJS Desktop Fundamentals: http://www.mediafire.com/download/ooulsej4ui421q6/ExtJS+Desktop+Fundamentals.rar
Python Fundamentals: http://www.mediafire.com/download/gsc0epd3jvgayfb/Python+Fundamentals.rar
Python, Beyong The Basics: http://www.mediafire.com/download/dbn6i84zfsb8566/Python_%E2%80%93_Beyond_the_Basics.rar
Getting Started with BackBone JS: http://www.mediafire.com/download/9anvrv6dxaaacbn/SitePoint-Getting.Started.with.BackBone.js.7z
Introduction To Powershell: http://www.mediafire.com/download/8b63ljih3cjl426/PowerShell_
Raspberry Pi Home Server: http://www.mediafire.com/download/sl36dmuomdld4qa/RaspberryPi+HomeServer.rar
Raspberry Pi for Developers: http://www.mediafire.com/download/5u2g1svecr1iukm/Raspberry+for+Devs.rar
Cryptography: http://www.mediafire.com/download/1cujirp51m911k8/Cryptography.rar
Network PenTesting using Python and Kali Linux: http://www.mediafire.com/download/7rq1ujn9424d3hb/Network+PT+Using+Python+and+K_4li+Linux.rar
Shell Scripting with Bash: http://www.mediafire.com/download/t5eha9cr4eckayb/Shell+Scripting+with+Bash.rar

Study: Does Heavy Gaming Manifest Negative Psychosocial Effects in Early Adolescents?

The results of a new study have just been made public by Oxford University, whom investigated whether or not heavy “gaming” or “online gaming” results in higher levels of mental illness, dysfunctional thinking, or other psychsocial problem in young adolescents – such as violence, social isolation or dystopia. To do this, researches studied a group of 1,004 self admitted gamers along with their care givers for period of a couple weeks. Of the 1,004 gamers studied, over half (525) stated that they played games at least 3 hours each and everyday. And of those, “over 55% showed at least one of the nine indicators for Internet Gaming Disorder, and even 23% showed at least three indicators.

Full Results from Study: https://journals.sagepub.com/doi/pdf/10.1177/2167702619859341

This means that, according to Oxford University, at least 1 in 4 (25%) adolescent gamers suffered from the effects of “gaming disorder” or “hazardous gaming” – as defined by the World Health Organization in 2017.

Definition of Gaming Disorder from WHO: https://icd.who.int/dev11/l-m/en#/http%3A%2F%2Fid.who.int%2Ficd%2Fentity%2F1448597234

 

Browse Study (9 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/2167702619859341.pdf”%5D

** If you cant browse through the documents, hover your mouse over the pdf (above) and notice the up and down arrows in the bottom left, this will help you navigate the file **

 

My Interview w/ Project Hacktivism (Europe)

It may have been a couple months in the making, but earlier this month I finally agreed to an interview with a European based group of researchers known as “Project Hacktivism,” seeking to learn more about the underground world of hackers, who they are (so to speak), what motivates them, why it continues and why it all exists in the first place. Led by a man going by the name of Marco Romagna, I was submitted a series of questions that I will share the the viewing public here today as a sneak peak before the final research is published, produced or presented.

Here’s what I was sent, and how I replied…..

These are the first questions. Based on your answer I would be happy to ask more. If you can’t answer because it is too private, just let me know. Reading some of your blogs, I noticed you have been highly involved with Anonymous, likely not only as an observer. Therefore, my questions for you are…

1.) First, do you have hacking skills yourself, or are you passionate for technology but not a computer hacker.

Answer:I am not a computer hacker, but I am passionate about learning and view the internet as the greatest library on planet Earth, so I used to spend as much time as possible on it learning. Hacking culture always fascinated me so I began to research it and the more I researched it the more I found myself within it. I was never a hacker, but people seemed to gravitate to me because I have a high IQ and hackers tend to be some of the smartest people in the world actually, and the people who want to affiliate with them are always seeking to learn more about the world in general. I think you will find that some of the deepest corners of the hacking world are also some of the most intellectual corners of the world these days, all full of people whom spend nearly full time hours reading, learning, consuming new information. Couple this with different perspectives from different, cultures, religions, countries, etc, people wind up learning so much from one another – making it addictive.

2.) Have you directly been involved with Anonymous and hacktivism more in general (meaning: participating in active operations)? If so, what did (does) motivate you?

Answer:I have been directly involved in many Anonymous operations all around the world, led many myself, invented many myself, wrote transcripts for others, drafted press releases, made pictures – etc. What motivates me is what motivates everyone; being the change you wish to see in the world. Everyone in this world has different interests, goals or concerns. So people act on this individualism. Whether it be pedophiles, racists, animal abusers, terrorists, you name it, there is always going to be someone out there looking to fight back against it. So this is how people build their different Ops, based on what they want to fight for – which is always relative to the individual.

Hackers are some of the poorest, most oppressed people in this world that you will ever meet – believe me. In real life they have nothing, no possessions, no social power or political influence, often times social outcasts from their own schools or societies, geeks or losers, come from abusive families, lower class – etc. Just people who are accustomed to live without. So this is why they fight so hard online, because the internet levels out the playing field. With the right amount of knowledge, even the biggest of bums in the material world can be a God online. So this is why people fight, why they are willing to steal or pirate so much information/data from people online, because in real life they have nothing and this serves as their motivation to do whatever they can however they can.

What motivates us? It also works, meaning we get results. Look at operation Sudan in 2018 – 2019. We literally changed the course of African history. I started it with a few others from a homeless shelter computer lab in NYC, and helped a revolution in Africa. Just think about that. Anonymous was once one of Time Magazines top 100 people at one time, I have helped INTERPOL and the FBI make dozens of arrests internationally worldwide, been given lines to Air Force Intelligence in Yemen, all because Anonymous operations and online activism. You CAN change the world from a key board, and Anonymous knows this. You just have to work hard enough for it, so this is what many try to do.

3.) Hacktivism is a complex term: could you provide a definition of it and what ‘being a hacktivist’ mean?

Answer:I think my answer to #2 answers your question here.

4.) The golden age of hacktivism was probably the period 2010-2016. Do you think we are witnessing its decline? If so, what are the reasons behind it?

Answer:Well it all started with the FBI crackdowns which hit Anonymous very hard prior to 2015. Then we built up again and got mixed in with the whole Russian propagandist and fake news fiasco, so US Congress, Google, Facebook, and the President of the United States literally all teamed up to fight us, because no one knew who we were or what our true motivations were. As a ghostwriter, The Washington Post, Google and Facebook cited my work and the work I sourced to other websites as Russian Propaganda through the prop or not list and nearly all were banned offline/censored. Meanwhile, in real life, I had 3 verified pages on Facebook, 4 inclusions into Google News index and was an American conservative. But that doesn’t matter to them, anyone whom was Anonymous at the time was the enemy – automatically. The 2016 US Presidential election changed the course of history, including for hacktivism. All of our top platforms, pages and websites were essentially attacked and banned offline. Then, when the money stopped flowing in, the platforms shutdown, stopped running and people scattered. By 2017 everything was remnants of the year beforehand and there were no more central points of contacts for random or new people to find us. Anonymous HQ was the biggest Anonymous forum and webchat in the world in 2015-2016, sometimes thousands of people on at a time – millions of views/reads daily. After what Google and Facebook did to us, it was destroyed.

Getting back into hacktivism in 2018/2019 what I am finding is that the death of hacktivism is relative to geography. Meaning in the USA and Europe where it flourished during its Golden Age as you say, it is dead in the USA and Europe now. But on the other hand hacktivism is exploding in the Middle East, Africa, South America and South East Asia. These are also some of the least advanced countries/territories in the world in terms of cyber security, which is a direct correlation to the rise of hacktivism there I think.

For question number 4 I also think you need to look at the age of the people behind the movement. Many were inspired by movies like the Matrix and V for Vendetta. Maybe these people were teenagers or in their early 20s when these movies and these movements came out. The Matrix is 20 years old at this point. If you were 13 then, you are 33 now. If you were 20, you are 40 now. So the older people get the less time they have to play online or do things online because of adult life. Indubitably, this has also led to the death of the movement – the people originally behind it just got too old to keep playing games online and became remedial wage earners like the rest of society and it just kind of fell off.

** EDITORS NOTE: For the record, it might sound like I am saying Anonymous is dead, but I do not believe this at all, that was just the direction the question took me in that case. **

 

CyberGuerrilla – Anonymous Gearing up for Operation Targeting Turkey Over Syrian Invasion

While I personally may be in favor of the Turkish invasion of Afrin and Rojava, it is not my job to care about which side is doing what when writing the news, I just report whats actively going on out there. But, getting into the hacktivist scene myself lately, I can not help but notice a ton of international outcry over what Turkey is presently doing in Syria and around their borders. I’m not talking about new reporters, politicians or anyone like that here, I’m specifically talking about some of the larger hacking networks the world over.

For example, over the course of just 1 week there were three different posting to CyberGuerrilla Anonymous Nexus (CgAn) indicating that operations against Turkey will soon be underway, and CgAn is not know to just f*ck around – so to speak. These postings, by the way, included a message from people inside Turkey, a posting from the United States and a posting from France – indicating a large scale effort is soon underway. It should also be noted that their operations are not entirely cyber and not entirely Black-Hat either, rather the groups are using whatever platforms they have to share the message about the Kurdish people and what is happening to them. In solidarity with them, I too share their messages here today with my audience.

Message from Kurds……..

Greeting citizens of the world

The Kurdish people who destroyed jihadist ISIS are now bombed by the Turkish State, the chief supporter of ISIS.
Unfortunately, we read the news of the deaths of many elderly women and children.
This is very sadly.
we shouldn’t stay silent more and not be part of this crime of humanity.
it is time to be sound to that scream echoing to stop this genocide.
Kurdish people should not be sacrificed to the dirty alliance of terrorist Trump and terrorist Erdogan.
All Anonymous members and all hacktivist groups should take action against that genocide.

Biji Berxwedana Rojava Biji Rojava

Message from Anonymous France…….

#OPSafeKurde #AnonymousFrance

Le collectif Anonymous ces lancé dans opération #OpsafeKurde à la suite que les force Turques ont traversé la frontière Syrienne.
Le collectif Anonymous France s’engage de manière indéterminé dans le conflit afin de permettre la paix entre les deux nations.

Et pour éviter toutes nouvelles guerre qui pourrait meurtrie des familles Turques, Kurdes, Syrienne.

Nous sommes légion
Nous pardonnons pas
Nous n’oublions pas
Attendez vous à nous

Message from BlackRat (CgAn)…..

Greeting Brothers and Sisters,

All those wars! All that devastation! All those victims, blood and reaction’s fury! Who is to blame? Who stands behind those who threw the burning torch into the keg of gunpowder? Who had long desired these wars and prepared them? The ruling classes! With their cronyism and kleptocracy, their bureaucracy and ideology, their police and spies calling us criminals. The governments and imperialist cliques, together with their press, tell you that the war(s) must be continued in order to destroy terrorism. Do not be deceived! Terrorism can only be eliminated by peace itself, and the task of bringing it down is posed in every country. Your governments and your press also tell you that the war’s must be continued so that it can be the last war on… This too is a deception. Never has a war put an end to war or terrorism. On the contrary, each war awakens the lust for revenge. Violence begets violence. Thus, after each sacrifice, your tormentors will demand new ones. Nor do the ruling pacifist zealots offer an escape from this vicious circle.

There is only one way to prevent future wars, namely for the Brothers, Sisters to conquer political power and abolish capitalist property. Enduring peace can only be achieved by victorious empowerment of the people.

A revolution not only to free the Kurdish population in Syria, but also the Middle East from the centuries of colonialism, oppression and dictatorships. And it has been an internationalist Revolution, because many internationalists joined this revolution, on the front line against the Islamic State and the Turkish fascism, we helped in hospitals, planted trees and worked to build up a democratic, ecological society, based on the liberation of women. And many revolutionaries joined the struggle all over the world, because the revolution in Syria has shown to all of us, that another world is not just theoretically possible, but it’s actually being built up in everyday life.

Social injustice and class rule are even more apparent in war than in peacetime. In peace, the capitalist system robs workers of the joys of life; in war(s) it robs them of everything, including life itself. And let us be done with devastation. It is you, the people, who will bear the burden of these heaps of ruins today and in the future. The hundreds of billions in cash thrown into the maw of the god of war are unavailable for maintaining the people’s well-being, for cultural purposes, and for social reform that could ease your lot, promote popular education, and alleviate poverty.

And tomorrow new and heavy taxes will be laid on your stooped shoulders. So let us end the squandering of your labor, your money, and your life’s energy. Rise up in struggle for an immediate peace with no annexations! Use every means possible to bring a rapid end to the human slaughter! Take up the slogan: For an immediate armistice! Rise up in struggle, peoples suffering ruin and murder! Take courage! Bear in mind that you are the majority and, when you so desire, you can assume power. Let the governments know that hate against war’s is growing in every country and with it, the desire for social retribution. This is bringing closer the hour of peace among the peoples.

Down with the War’s!
No Masters No Slaves!
Long live Liberty!
Long live Peace, immediate peace, without annexations!
Long live the Revolution!

At the time of this article, October 20th 2019, according to Amnesty International, “at least 218 civilians have been killed in Syria, including 18 children, since the offensive began” – something Turkey denies. If you want to learn more or hear first hand eyewitness accounts about Turkeys current offensive, you’re invited to read more here: https://www.amnesty.org/en/latest/news/2019/10/syria-damning-evidence-of-war-crimes-and-other-violations-by-turkish-forces-and-their-allies/

 

Join Rogue Media Labs New Online Chatroom

Earlier this year I managed to create a fairly large and successful online chatroom through the Discord service, but abruptly closed its doors for reasons I can not entirely understand/explain myself. Regardless, now that I have changed my website and begun writing again, I figure now is the perfect time to re-launch that platform and begin inviting everyone in once again.

Please note that it will take some time to build again and put all of the proper resources together, which might take a little longer now that I work full time offline. This includes stuff like security tutorials, nerd resources and weaponry, things like this. None the less, it will get there and I invite anyone interested to join in and watch/participate as we continue to build. If you don’t have Discord for your phone or PC yet, you should install this first, then click on the link. But you will still be able to join in the chat with your browser too, by clicking on the link below – though it will be as temporary as long as your browser window stays open, which is why I recommend to download first.

Chat Invitation – Click To Join: https://discord.gg/b3hmKYU

Here’s A Look at Leaked Passports from MI6 Agents

Unfortunately, you will not find James Bond on here or any other 007’s, but interestingly enough a hacker by the name of “neptuneX3c,” the same hacker behind a leak of MOSSAD emails earlier this year, has released another batch of leaks, this time exposing agents known to have worked with MI6 – England’s version of the Central Intelligence Agency. For those of you whom might not be aware, MI5 refers to any agents of England’s Government working on National Intelligence, on the island. On the other hand, MI6 refers to a group of “private” or “secret” agents working in the field of international intelligence gathering and espionage. Trust me, as someone whom has worked with many international intelligence agencies and offices over the years through the Anonymous Intelligence Agency, I’ve found MI6 to be by far the most impenetrable – or least responsive to any outside assistance.

As for the back drop to the story, there really isn’t much to tell, so I’ll just get on then with the leaks – enjoy!

Download File: https://roguemedia.co/wp-content/uploads/2019/10/mi6-passports.pdf

Browse Leaks (9 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/mi6-passports.pdf”%5D

 

** If you cant browse the documents, hover you mouse over the pdf (above) and look at the bottom left where you will see up and down arrows, this will help you navigate the document **

Anonymous Hacker Known As XeljomundoX Arrested by Spanish Authorities – Faces 11 Years

Unfortunately, upon logging back online this evening I was met with a bit of bad news. This would be the news that the Anon known as “XeljomundoX,” one of the primary leaders of #OpCatalonia2019, was arrested for their alleged role in advertising and encouraging not just the Catalonian protests which took place this week, but also for their role in encouraging cyber attacks against the Spanish Government with a video shared to social media this past Monday.

As was first reported to me by Anonymous News this afternoon, roughly 5 hours ago, “The former hacktivist arrested again #Anonymous @YourAnonXelj. He was also arrested for cyber attacks on 1-O and they ask him for 11 years in jail. Now accused of spreading a video of which he is not part of the attacks.” On top of that, as was reported by the Spanish news paper El Confidencial today “One of the ‘hackers’ linked to the one known as #OpCatalonia2019, a series of cyberattacks launched this week in protest of the ‘procés’ ruling, has been arrested this morning by the National Police at his home in Tarragona. He is accused of alleged crime of computer damage for being behind a video announcing the cyberattack campaign that occurred as of Monday.

In case you had not seen it or were curious, here is the video he was arrested for………

This is also the second time XeljomudoX has been arrested. They were previously arrested by Spanish authorities earlier this calendar year, in January 2019, following their participation in various international hacking campaigns. Most notably, the hacks and leaks associated with the original #OpCatalonia which took place throughout 2017 and the months/years to follow.

For example, other members of Anonymous put out a video this evening in support of XeljomudoX, stolen video footage detailing the search of Xel’s home and seizure of his computer and social accounts from this past March – lulz……..

Additionally, in protest/support of XeljomundoX myself, I sent a private message to his previously seized Twitter account with my DoB, SSN, home phone number and address, telling Spanish National PoliceArrest me you cowards. I will post the video every single day until he is free. Want to arrest someone for a video, now I know the Spanish Government is desperate. Then you wonder why all these people despise and protest you. DO you actually have pride for Spain? Has any country in the world fallen off any more significantly than Spain the last 600 years? You used to own part of the USA, Central America and South America. Now what are you? A shell of your former shelf, lost all your territory, lost your glory. Now your just a single nation with a failing economy, at the bottom end of the EU. What would you even do without the international bailouts? It’s pathetic. Now you try to stop on anyone who speaks negatively of your country? That’s fucking sad. Ask your boy Mussolini how well Fascist approaches worked for him. You will fall, and it’s because of your own actions. Spend half the effort looking into a mirror that you do trying to squash free speech. This is why you are cowards, and why I would love to speak my piece in your shithole country.

Not unexpectedly, at the time of this article I have not received a response from Spanish authorities, and have no further update on Xel’s situation. Stay tuned.

If you’d like to learn more about this weeks cyber campaign, you can read more here:  https://roguemedia.co/2019/10/15/the-highlights-fallout-damage-from-opcatalonia2019/