CgAn – Rogue Media: Introductory Guide To DarkNet’s

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks.

The 3 Layers of The Internet:

ClearNet. The “World Wide Web,Surface Web, ClearNet or simply referred to as the Web. Quite simply, the Surface Web refers to the portion of the internet only accessible by standard search engines – such as Yahoo, Bing and Google. While Google search results may feel endless at times and while you might think of them as being quite large in size, in reality, the Surface Web only consists of roughly 7% of the combined browse-able/accessible internet. Typically, it’s used for Email, Fax, File sharing, File transfer, Games, Instant messaging, Podcasts, Voice over IP, Searches, Streaming – etc.

Deep Web. The “Deep Web,” invisible web, or hidden web are parts of the World Wide Web whose contents aren’t indexed by standard search engines – for any reason. Rather, the content is hidden behind HTML forms, Javascript and custom code to protect it from the public eye. Generally speaking, the Deep Web is host to roughly 92% of anything which can be found on the internet. Typically, the Deep Web consists of information such as web archives, scholarly articles/resources and network databases such as cloud servers. While this isn’t the case 100% of the time, you usually also need a 3rd party software system, such as the “Tor Browser,” in order to access at least some of its content as well.

To describe how it works, think about all of the web pages you can visit on your bank accounts homepage or email account. While all of those sites, links, addresses and emails technically exist on the internet, and while you can still search Google for Bank of America‘s website, this doesn’t mean you can search Google for the web pages associated with each Bank of America’s customers accounts. Nor can you search Google to find everyone elses emails hosted on Gmail – get it? Those web archives still exist on the internet all the same as their homepages, but are not indexed on the Surface Web to be publicly available – which is why we say they exist on the Deep Web, below the normal surface layer of the internet.

DarkNet. While the Deep Web is in reference to any site that cannot be accessed through traditional search engines, the “DarkNet” or “Dark Web” is a small portion of the Deep Web that has been intentionally hidden to hide in plain site, and is completely inaccessible via standard browsers and search methods. The DarkNet is by far the smallest layer of the Internet, estimated to consist of less than 40,000 websites in total – less than 1% of the browse-able internet.

Not only will you need to install a special type of software to access a DarkNet website, but the URL Address associated with it will almost certainly be encrypted with a randomized sequence of numbers and letters – literally making it impossible to find or type in by accident. Instead, you must know exactly what this sequence is – usually from someone else who already knows or has it. Even then, once there, you will also most likely need to enter a custom password in order to enter – making it virtually impossible to browse any DarkNet webpage without the proper permission.

As explained by CyberGuerrilla, DarkNet websites don’t rely on the IP/DNS system (typing mysite.org in a web browser will take you to an IP address like 10.11.12.13). Darknet websites are accessible only through networks such as Tor “The Onion Router” and I2PInvisible Internet Project” and their respective software. Identities and locations of DarkNet users stay anonymous and cannot be tracked due to the layered encryption system. The DarkNet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. Due to the high level of encryption, websites are not able to track geo-location and IP of their users, and users are not able to get this information about the host; communication between DarkNet users is highly encrypted allowing users to talk, blog, and share files confidentially.

The DarkNet is also used for illegal activity such as illegal trade, forums, and media exchange, making it a prime target for Law Enforcement Agencies around the world. The 2 main DarkNet‘s networks are TOR (The Onion Router) and I2P ( Invisible Internet Project). While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing “anonymous” hosting of websites called “Eepsites.

Active Darknets worth mentioning:

Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship
GNUnet another peer-to-peer network that offers users full link encryption.

Decentralized network 42 (not for anonymity but research purposes)

Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.

Riffle is a client-server Darknet system that provides secure anonymity and minimal bandwidth

Tor Browser and Tor-accessible sites are widely used among the Darknet users and can be identified by the domain (.onion). Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server’s IP address (and thus its network location), a hidden service is accessed through its onion address,

The TOR Network works by bouncing your communications around a distributed network of relays (nodes) run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Tor passes your traffic through at least 3 different servers before sending it on to the destination. Encrypting your packets and bouncing them around the Internet isn’t cost less. All that extra work means that browsing the Web via Tor feels sluggish compared to using a conventional browser. Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user. Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges. Also, Bittorrent over Tor is not anonymous.

References:

https://en.wikipedia.org/wiki/Internet
https://en.wikipedia.org/wiki/Dark_web
https://en.wikipedia.org/wiki/I2P
https://en.wikipedia.org/wiki/Tor_(anonymity_network)

Software:

The FreeNet Project: https://freenetproject.org/pages/download.html
The Tor Project: https://www.torproject.org/
I2P: https://geti2p.net/en/download

Projects Using TOR:

Tor Browser: https://www.torproject.org/projects/torbrowser.html.en – comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable)

TAILS Operating System (Linux): https://tails.boum.org/about/index.en.html – Tails is a live system that aims to preserve your privacy and anonymity

Whonix Operating Systems (Linux): https://www.whonix.org/ – Whonix is a Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet

Orbot (Tor for Android OS’s): https://guardianproject.info/apps/orbot/

Warnings:

Some links may be disturbing and dangerous to visit.

To avoid be tracked or watched online, I strongly recommend you to run a VPN service on the system that you access. VPN will give you a double layer protection against the unknown.

** DISCLAIMER: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT. VISIT THEM AT YOUR OWN RISK. WE RECOMMEND TO USE THOSE DEEP WEB LINKS ONLY FOR RESEARCHING PURPOSES! WE ARE NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY YOUR ACTIONS! **

Some Popular TOR .onion Sites:

http://hss3uro2hsxfogfq.onion/ (notEvil search engine)
http://xmh57jrzrnw6insl.onion/ (TORCH search engine)
http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page (Uncensored Hidden Wiki onion link)
http://answerstedhctbek.onion/ (uncensored General-subject Q&A forum)
http://torvps7kzis5ujfz.onion/ (VPSSHell .onion hosting)
http://grrmailb3fxpjbwm.onion/ (TorGuerrillaMail – Disposable Temporary E-Mail Address)
https://protonirockerxow.onion/ (Fully encrypted email hosted in Switzerland offering free accounts)

Clearnet HTTPS signup & JavaScript! Must pay or verify via previously existing email or SMS to get an account

http://nzh3fv6jc6jskki3.onion/ – Riseup provides online communication tools for people and groups working on liberatory social change
http://tetatl6umgbmtv27.onion/ (Tor Chat roulette style service)
http://6dvj6v5imhny3anf.onion/ (CyberGuerrilla leAkboX)
http://76qugh5bey5gum7l.onion/status.xsl (Deep Web Radio)
http://deepdot35wvmeyd5.onion (DeepDotWeb -Surfacing the News)
http://grams7enufi7jmdl.onion (Search Grams)
http://kpynyvym6xqi7wz2.onion main.paraZite (Anarchy files and Underground)
http://valhallaxmn3fydu.onion (Valhalla Market)
http://silkkitiehdg5mug.onion (Silkkitie Market)
http://lchudifyeqm4ldjj.onion (Dream Market Dark Web Market)

Some I2P:

http://direct.i2p/ (Direct Search)
http://forum.i2p (Main i2p Forum)
http://imgbi.i2p img.bi (Secure Image Hosting)
http://pastethis.i2p/ (Pastebin)
http://zerobin.i2p (ZeroBin)
http://git.repo.i2p/ (Anonymous Git Hosting)
http://freedomforum.i2p/ (Privacy Forum)
http://leakager.i2p/ (A Cat’s Mirror of Wikileak)

General Chatter Putting In Perspective:

[Mink] oh, then go go go
[Mink] right, today we are going to talk about Darnets and TOR in particoular
[Mink] *darknets
[Mink] i made few notes to read to get us started
[Mink] https://pad.riseup.net/p/r.50b7831a5a3e919781433e4819976169
[Chanlog] Title: Riseup Pad (at pad.riseup.net)
[Mink] please, wait 10 minutes before starting to ask questions
[Aspire] ok
[n1ck1] yeah
[Mink] i’ll just write few points here while you read
[Mink] the Internet is big, really big
[Mink] what we think of the internet are webpages, blogs, email, instant messaging, webradio, voip (like skype) etc
[Mink] most of those services use the tcp/ip protocol to connect the resouces together
[amoruxX] When do we start ?
[RedAcor] Already started.
[Mink] oh amoruxX , we just did
[Mink] fundamental to make the internet work is the IP/dns concept, where a number (like 176.23.98) gets translated to a name (like mysite.com) and back
[Mink] this makes these resources available to the public and available to Search Engines (like google and yahoo)
[Mink] once a new website name is registered, a IP address is assigned to it
[Mink] this is what most people call “the internet” but there is much more
[Mink] there is a part most people will never see
[Mink] it is hidden on purpose
[B[U]G] where the address is assigned by your isp Internet Provider Service , where are two ip address ( public ) and ( local ) with mask subnet and principal gateway , the public have han UDP connetion to the internet call other service and TCP have an entrance connection to localhost
[Mink] imagine big companies networks, government agencies, or really anyone that doesn’t want their site or resources been indexed by search engines
[Mink] that we will call “DARKNET” or hidden web
[Mink] sorry “deepweb”
[Mink] :”)
[Mink] deepweb/invisible/hidden, basically not available to the public
[Mink] unless you have a login/password or a very precise address
[Mink] the deepweb is the biggest part of the internet
[B[U]G] This is because it is not possible to search through a search engine because each address is generated randomly
[Mink] in the deepweb, there is a small portion that we can only see with “special software”
[Mink] that we will call “darknet”
[Mink] for today we will talk about the main Darknet networ, the TOR (onion) network
[Mink] with TOR software (like torbrowser) we can access the normal web AND the onion network
[Mink] onion sites end with .onion and use different protocols from the norm
[Mink] the TOR network anonimize both the user and the server, automatically
[Mink] as a user, your traffic will pass trough at least 3 different servers, before reaching the target site
[n1ck1] what are the names of the different protocols for me to look for later?
[B[U]G] thanks to a connection called “onion”, by most users who share the relay
[Mink] sock
[B[U]G] “cipolla”
[n1ck1] ok tks
[n1ck1] I need t reed more about socks
[Mink] all the traffic from those servers (called “nodes” or “relay nodes” is encrypted
[Mink] making using the tor network slower than normal
[Mink] surfing the web is the main use of TOR, but it can be used to send/receive mail, IRC (like i’nm doing right now) or even voip (IF YOU CAN GET A FAST CONNECTION
[Aeolus] you can voip through tor?
[Mink] yes, with a bit of luck
[Aeolus] cool, didnt know that
[Mink] TOR can be used pretty much like any other proxy
[Mink] u could plug it in Thunderbird for emails
[Mink] in Hexchat for IRC
[B[U]G] using the gpg encryption with thunderbird or claws mail for more security
[Mink] in Mozilla for ftp, etc
[n1ck1] voip + “proxuchains firefox(TOR)”
[n1ck1] three at a time, using a VPN to open the terminal with the configured proxychains and run the TOR browser??
[Arkhangel] why with torrent no, p2p
[Arkhangel] ?
[n1ck1] VPN….voip=error
[Mink] no, but you can use vpn+TOR
[Aeolus] like me
[n1ck1] why not proxychains too?
[n1ck1] tor first or VPN first?
[B[U]G] proxychains is a simple script
[Aeolus] vpn then tor
[Aeolus] for me
[B[U]G] tht filter tor
[Aeolus] others prefer elseway
[Mink] Bittorrent over Tor is not anonymous, becouse needs to aware of other seeds/leecher sharing the files
[B[U]G] you can use for launch any application
[l0t3D_] what difference does it make
[Mink] also would put too much stress on the network
[Arkhangel] Aeolus, if someone uses TOR then VPN, I dont think he can access to onion network xD
[l0t3D_] Mink how do you even Bittorrent over tor?
[Mink] so p2p with TOR: possible, but really a waste of time
[n1ck1] yeah…rsrsrs I see
[B[U]G] l0t3D_, set tor as proxy socks
[B[U]G] or http
[B[U]G] (client)
[B[U]G] or generate
[Mink] again, it’s just possible to plug TOR port in your client
[B[U]G] iptables rules
[n1ck1] VPN + TOR is the best right?
[Mink] yes n1ck1
[Arkhangel] Mink do u mean that seeders/leechers should know your real IP?
[B[U]G] the best configuration are , tor – vpn – tor ,
[Mink] but now.. the bad part
[Aeolus] Arkhangel i used to be able to do that especially with my whonix settings
[l0t3D_] so to “torrent over tor” you need to plug TOR into my bittorent client
[Aeolus] i talk about normal browsing when you want to use tor as an extra layer
[Arkhangel] Aeolus U think that the best configuration is the config shown by B[U]G XD
[l0t3D_] but if i torrent normally and TOR is running that’s okay right?
[Mink] yes Arkhangel ,serius bitorrent users should use proxies or VPNs , not TOR
[Aeolus] Arkhangel xD
[Mink] yes l0t3D_
[l0t3D_] okay
[Arkhangel] what is the bad part? Mink
[Mink] ok, let me make one more point, then u free to ask questionbs
[Mink] right, bad part is TOR is not perfect
[n1ck1] a few days ago they tracked the IP of many users
[Mink] and it’s been under scrutiny for vulnerabilies for years
[Arkhangel] I think* (I wrong to write before lol)
[Mink] “”Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user””
[Mink] there are ways and attacks to “deanonimize” a small portion of TOR users
[n1ck1] how?
[B[U]G] for example
[Aeolus] like FBI running nodes
[B[U]G] a plugin
[Aeolus] 😀
[B[U]G] in browser
[B[U]G] you can deanonymize you
[Mink] ” Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges.”
[Arkhangel] why?
[B[U]G] by an javascript exploit
[Arkhangel] how a plugin can do this?
[l0t3D_] Aeolus do they?
[Aeolus] yes ofc they do
[B[U]G] or you find it on an exit node,
[Arkhangel] a javascript exploit that affects the TOR software or the plugin itself?
[Mink] the NSA is known to have run TOR “nodes” , also known as a man-in-the-middle attack
[n1ck1] TOR over TOR?
[l0t3D_] Tor over Tor? Mink
[Mink] never tor-over-tor
[l0t3D_] hahaha n1ck1
[l0t3D_] how do you even TOR over TOR
[n1ck1] so far so goof rsrsrs
[Mink] that would be running 2 instances of TOR
[Arkhangel] in which manner TOR over TOR can make u not anon?
[l0t3D_] Mink tor stops you from doing that
[n1ck1] like in the real machine and the VM use TOR?
[B[U]G] sure
[Mink] it’s like an internal thing, the “relay” will just not work, 2 likely result, no traffic go trogh, or worse no encryption between the relays
[Arkhangel] lol
[n1ck1] I’m going to print this
[Mink] if you don’t like the 3 “hops” of a standard TOR connection, you can ofcourse increase it
[forceMajeure] the problem with using tor to browse is that 99 out of 100 people will deanonymize themselves by accident without ever realizing it. User error
[Arkhangel] n1ck1 this lesson will be printed later
[Arkhangel] n1ck1 u can access it on the site of cg
[B[U]G] you can use a gateway into your vm as whonix , then use a vpn on you local machine host , and reuse tor setting of your vm gateway
[Mink] ok, now, to cover my ass
[n1ck1] ok thanks Arkhangel
[Mink] WARNING: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT.
[Mink] VISIT THEM AT YOUR OWN RISK.
[Arkhangel] forceMajeure how an user can realize it?
[n1ck1] ok….send please
[Mink] you can see from the list at the bottom of the pad
[Mink] there is a bit of everything
[Mink] email services, blogs, forums, chats
[forceMajeure] lets say you visit your own website, log into ANY account associated with your real identity, attack a cpu of someone you know, just little things
[Arkhangel] forceMajeure and what are the user errors that bring the user to be deanonymized?
[Aeolus] use tor to log to FB
[forceMajeure] look up
[Mink] of course all end in .onion, and using a normal browser won’t work
[Aeolus] something stupid like that
[Arkhangel] forceMajeure ah ok… this should answer to my second question
[forceMajeure] turn on js to access a site, etc.
[Arkhangel] ty
[Arkhangel] forceMajeure why if I use js to access a site, I m not anon anymore? js stores my real IP over TOR?
[Mink] remember, and this is for clearnet aswell, your browser is the single most dangerous point of failure
[forceMajeure] if the site is compromised, someone can use something like burp to insert a malicios js
[forceMajeure] they did it at defcon years ago
[forceMajeure] you should always be using noscript
[Mink] ok, questions, and please let me answer first before giving your opinion
* Aeolus agrees with Mink
[Arkhangel] forceMajeure so if I am on TOR network, if I go on a onion malicious website and I click where I have to not click, this malicious js can decrypt the routing information to get my real IP?
[Mink] yes Arkhangel
[Arkhangel] lol
[forceMajeure] ))
[n1ck1] Is it set by default to accept or reject scripts?
[Arkhangel] sorry but, at this point
[n1ck1] TOR Browser
* Aeolus thinks we all tell shit and not let Mink who knows educate us
[Arkhangel] why didnt they do a strong encryption?
[Arkhangel] that cannot be decrypted?
[Arkhangel] like
[Mink] even worse, it can inject code into your browser, activate your webcam and mic, take screen shots and much more, no kidding
[forceMajeure] true story
[Arkhangel] not inverse hash algorithms
[Arkhangel] not invertible*
[Mink] nothing to do with encryption, JS runs on your computer, not the server
[Arkhangel] Mink if I click on a js hosted on an onion website, it runs on my pc?
[B[U]G] depends
[B[U]G] you can
[Mink] not only .onion
[B[U]G] disable flash/javascript
[Aeolus] js runs client-side
[B[U]G] and disable WebRTC leak
[B[U]G] on you browser settings
[Arkhangel] good to know XD
[Arkhangel] y
[Arkhangel] I have other different questions
[Mink] ok
[Arkhangel] the onion websites store the (false) IP of each user accessing to it?
[Mink] no
[m00trix] Let’s just agree on that TOR is great. If used out of the “box” the TOR Browser will in most cases keep you safe. If you decide to disable or allow sites through the build in TOR Browser plugins, you are taking a risk that not even TOR, nor any other level of anon tools can protect you from.
[RedAcor] For webrtc settings: https://www.privacytools.io/#webrtc
[Chanlog] Title: Privacy Tools – Encryption Against Global Mass Surveillance (at http://www.privacytools.io)
[B[U]G] or simply edit your about:config asd
[Arkhangel] Mink, if today TOR gives me a certain IP address, tomorrow or after a month, another user of another part of the world can be assigned to that same IP?
[B[U]G] to http.refer and media.peer connection
[m00trix] Arkhangel, yes that is the hole point…
[Mink] the TOR network will not need your IP address, the danger of that comes from javascript/ajax/bad code
[B[U]G] how all – all store a log , depends if the owner delete it
[Arkhangel] m00trix why “hole point”?
[m00trix] yea
[m00trix] if 200 users on that exit node
[m00trix] with the same “ip”
[B[U]G] but the node change every time
[m00trix] you get plausible deniability
[Arkhangel] is it a problem if an IP assigned by TOR is used in the future by another user?
[m00trix] no
[m00trix] its a bonus
[Arkhangel] ah ok xD
[Mink] again, TOR will not give you an IP address, but an “identity”
[m00trix] yea Mink
[Arkhangel] Ok Mink so that “IP” address does not work on IP protocol?
[m00trix] I think he means when using the browser, it tells the exit nodes ip
[m00trix] 🙂
[Arkhangel] yes, in practice
[l0t3D_] okay so if i have scripts disabled globally but lets say i enable it only on youtube to play a video
[n1ck1] how many connections can a node make with the same IP
[Mink] yes Arkhangel , TOR architecture does not use the same IP ]DNS as normal internet
[m00trix] that IP is your source proxy IP when browsing trough the TOR browser
[m00trix] or using any service to proxy through it
[n1ck1] and how many users can be on the node at the same time?
[l0t3D_] could another malicious website use that youtube tab to attack me?
[Mink] when a new .onion site is created it doesn’t get a IP address, but a .omnion address
[n1ck1] sorry…. my mistake
[n1ck1] but a node can handle how many requests?
[n1ck1] and perform how many for another node?
[B[U]G] all it’s possible this it happens if youtube link it’s embedded in page builded ad hoc
[m00trix] Mink, still, when you use the TOR Browser, it will tell you what the exit nodes IP is when you start it. That exit node IP is also the source of the browser requests you make and the source of any program you proxy trough it
[Arkhangel] Mink in practice you are saying that, unlike normal internet where a service like a website is on the 3rd level (IP level ISO/OSI), the onion network is completely on the 7th level (application level) of the
[Mink] ok, to spend those few minutes: TOR isn’t the only darknet network
[Arkhangel] ISO/OSI?
[m00trix] okay stop
[l0t3D_] if it’s a normal youtube link i opened myself B[U]G?
[Mink] wot?
[B[U]G] depends if in source
[B[U]G] a function
[B[U]G] call
[m00trix] When you are using the TOR browser, to go on midgetporn.org or whatever. Midgetporn.org will see your source IP as the exit nodes public IP
[B[U]G] a malicious “file”
[B[U]G] or host
[m00trix] simple as that
[Aeolus] guys thanks for today info. i suppose logs will be up later so i can read again, got to go.
[Aeolus] good work Mink thx 🙂
[Mink] you welcome Aeolus
[Arkhangel] in practice m00trix your machine is overlapped on the exit node
[l0t3D_] but if there is nothing in this source but there is a malicious “file” in another tab i have opened in the same time but I have no scripts enabled?
[m00trix] fire up the TOR browser, and press the “test tor…” thingy
[forceMajeure] Is it possible for tor to assign you a new circuit while an existing connection is still established say through a python script ran through port 9050
[B[U]G] for example : [script src=”DownloadThisEvilCode.js”/] [iframe]youtube embedd[/iframe]
[Mink] Arkhangel, , you want to rephase your question?
[B[U]G] afk
[forceMajeure] thus severing the connection
[m00trix] any site that want’s to can see the visitors source IP – and with TOR browser, that source IP is the IP of the current exit node your are on.
[Arkhangel] Mink, about the https://en.wikipedia.org/wiki/OSI_model
[Chanlog] Title: OSI model – Wikipedia (at en.wikipedia.org)
[m00trix] really pretty simple
[m00trix] jesus
[Mink] yes forceMajeure , not only possible, but advisable, tor will change nodes randomly to add anonimity
[Mink] Arkhangel, i know the OSi model :/
[forceMajeure] but what happens to the connection that was established before the circuit changes
[Arkhangel] Mink, if the normal websites have associated IP
[forceMajeure] is it passed into the new connection
[Arkhangel] so the 3rd level of OSI model
[Arkhangel] the onion network, since it does not have IP, it is completely on the application level of OSI model?
[m00trix] no
[forceMajeure] I guess I could see what happens by sending newnym to 9051 I just thought of that
[Arkhangel] since it does not have IP ( i mean the onion websites)
[Mink] no Arkhangel
[m00trix] you need to not compare hosting an onion site with using the TOR browser
[Mink] lets’ amke it clear TOR and TORbrowser are 2 different things
[Arkhangel] y
[m00trix] I think Mink covered all the questions really good already
[Arkhangel] in the pad
[Mink] torbrowser connects to tor
[Arkhangel] it talks about the Freenet platform
[Mink] yes?
[Arkhangel] continue xD I was thinking u finished to answer my prev question xD
[Arkhangel] ok so torbroweser, application level, connects to TOR network
[Mink] yes, trough socks
[Arkhangel] socks is an application protocol?
[Mink] taht’s 5 i think
[Arkhangel] ah ok
[m00trix] Arkhangel, you need to unleash your mind from that OSI layer shit 😀
[Arkhangel] ahahahah
[Arkhangel] ok xD
[n1ck1] socks is a protocol right? the TOR Browser is the application?
[Arkhangel] y
[Mink] yes n1ck1 , but it’s easy to confuse “an application(like a program) and the “application layer” of the stack
[Mink] so yes
[Arkhangel] tell me when I can continue with another question
[m00trix] Arkhangel, if you fire up a VM with like parrotsec.org OS – It have a build in function that routes all traffic through TOR. There are other distros that does this as well. But any way, if you do that, you can look into how the traffic flows using the terminal – when all traffic is routed using TOR. Might give you more insight
[l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] or “obfs”
[Arkhangel] m00trix traceroute?
[forceMajeure] lsof -i -n -P
[m00trix] well for a start heh
[m00trix] and many more
[Arkhangel] ah ok
[m00trix] but it will show you the traffic flow
[Arkhangel] nice to know
[Mink] one thing i wanted to talk about, but we have no time, whonix
[Arkhangel] another doubt is: since ISP knows what I am visiting as website, if I access to an onion website, my ISP can know it?
[vivek] m00trix: you can achieve the same with almost any distro
[m00trix] and if there are like 200 others using the same exit node that you are on, for that current TOR connection – it’s all good.
[m00trix] vivek, I know
[Mink] the ISP will know you are using TOR, but not which sites you are visiting
[Arkhangel] Mink the ISP cannot know the onion address?
[m00trix] no
[vivek] Parrot one is highly unstable and my exp. Was not very good
[m00trix] And if you combine TOR with an OpenVPN on port 443 then even less
[Arkhangel] Mink it because ISP can see destination IP but onion website are not based on IP scheme? this is the reason?
[Arkhangel] or one of the reasons
[m00trix] vivek, I only have a VM with it. But yes, it’s Debian aka unstable heh
[Mink] no Arkhangel , unless the ISp is running the last TOR exit node
[Arkhangel] normally, an ISP in the clearnet precisely what can see from me? Only the IP of website that I am visiting?
[m00trix] Arkhangel, your ISP cant see what sites your are browsing trough TOR
[l0t3D_] [l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] [l0t3D_] or “obfs”
[m00trix] all your DNS lookups and what you are doing
[m00trix] if you use the ISP’s dns servers
[Mink] in clearnet, your IS know your favourite pornhub page
[Arkhangel] guys so the ISP can read only the DNS lookup table inside the router?
[m00trix] they can see all, but not https login data
[l0t3D_] lol
[Arkhangel] ah ok
[Mink] sorry l0t3D_ , obfuscated are another kinfd of “relay nodes” to help tranport info
[m00trix] Arkhangel, if you use the DNS servers provided by the ISP you have. They can see what sites you visit, the IP of the sites, what traffic you generate, they can see close to anything
[l0t3D_] obfuscated servers are used to access vpn or tor in some places like the great firewall of china?
[Arkhangel] cannot I change the DNS server where I want to go?
[Mink] yes l0t3D_ , and Iran and N korea
[l0t3D_] well i think ill be up on that list soon too
[Arkhangel] provided by other companies?
[m00trix] If you change the DNS servers on your router to some that does not log and are not your ISP’s. They loose the ability to view your DNS req
[l0t3D_] thath’s the only way i can access tor or vpn
[m00trix] next step is then, VPN and TOR
[Arkhangel] m00trix so you mean that then internet in my location does not work lol
[l0t3D_] makes the connection very f’in slow tho
[m00trix] I would advice any one to NOT use the default ISP provided DNS servers as a pure basic step
[m00trix] should be the first step you do on the router
[Mink] l0t3D_, remember for help with anonimity and privacy you can always ask in #opnewblood, we will be happy to help with that
[Arkhangel] m00trix how can we do this?
[m00trix] set WAN DNS to manual and find some good non logging DNS
[Arkhangel] do u know some non logging DNS?
[m00trix] Arkhangel, depends on what router you have
[m00trix] sure
[l0t3D_] thanks Mink
[m00trix] Also you will get arround of most censorship
[m00trix] by stat step alone
[Arkhangel] can you list some of them here?
[m00trix] gov dns blocks
[m00trix] I switch it up
[m00trix] but run
[m00trix] https://blog.uncensoreddns.org/
[l0t3D_] should i call them and ask them nicely to change my DNS? 🙂
[m00trix] some places
[Arkhangel] ty
[m00trix] just login to your router
[m00trix] and change it
[m00trix] if in doubt give me a priv
[Arkhangel] ty very much
[l0t3D_] WAN settings right?
[m00trix] yea
[m00trix] and then
[m00trix] set DNS do manual
[m00trix] not the IP 😀
[m00trix] only dns
[Arkhangel] another question: the pad talks about the freenet platform… is it a software to be installed on my computer?
[Mink] yes Arkhangel
[m00trix] l0t3D_, priv me if you need help
[Arkhangel] what is the difference between freenet platform sw and tor bundle sw?
[m00trix] If I run with my basic ISP DNS servers sites like http://1337x.to/ are blocked 🙂 a torrent site. Gov block
[Chanlog] Title: Torrent Search Engine | 1337x.to (at 1337x.to)
[n1ck1] if I change my DNS the VOIP stops working in my house
[Arkhangel] or better: if torbrowser allows me to access to the tor network, freenet and other shown platforms on pad, what do they allow me to do?
[m00trix] wut n1ck1?
[m00trix] makes no sence
[n1ck1] my ISP has a separate physical VOIP phone but connected by cable to the router
[n1ck1] minha mae é velha e não sabe usar muitas tecnologias e o telefone é similar ao antigo porém funciona como VOIP
[n1ck1] sorry
[n1ck1] my mother is old and does not know how to use many technologies and the phone is similar to the old one but it works like VOIP
[n1ck1] if I switch to any other, VOIP does not work, it has been months of technical visits, tests, and unsolvable configurations.
[RedAcor] Set DNS on your network manager.
[RedAcor] So that will not affect your router.
[RedAcor] Also you can use unbound on your system.
[RedAcor] You can check lesson 4 logs for that.
[m00trix] yes
[m00trix] thx to Mink for a great course 🙂
[RedAcor] There many different and hybrid solutions.
[RedAcor] Anyways. Mink Thanks for delicious lesson. 🙂
[Arkhangel] guys is better vpn tor vpn tor or tor vpn tor?
[Arkhangel] is better starting with vpn or tor?
[n1ck1] YES
[n1ck1] This worked …. It’s simple but I had not thought of it.
[RedAcor] Arkhangel Tor VPN Tor
[Arkhangel] why starting with tor RedAcor?
[RedAcor] Some people use VPN ] VPN ] Tor also
[RedAcor] Because it is secure than VPN. jijiji
[n1ck1] tails pendrive, VPN, TOR, break everything later and throw it in the trash lol
[Arkhangel] instead, when I connect to tor network, when I reach the exit node, the IP of my computer is in clear there?
[RedAcor] If i talk about last bug of TOR: Nah.
[l0t3D_] 2 tor?
[m00trix] Arkhangel, really depends what you are doing also 🙂
[l0t3D_] [RedAcor] Arkhangel Tor VPN Tor
[n1ck1] RedAcor thanks for the DNS tip
[RedAcor] But they fixed that issue.
[RedAcor] n1ck1 You’re welcome.
[Arkhangel] to discover some user, agency like NSA what look for?
[Arkhangel] they use only their exit node and check for all users that go in, or they can know information also about exit node that are not theirs?
[m00trix] hard to say
[m00trix] you need to stop overthinking it
[Arkhangel] im afraid to forget these questions and these doubts xD
[m00trix] I get that bro. But I can’t answer you how the FEDS, CIA or NSA track people on TOR 🙂
[m00trix] or if they even can and with what success
[Arkhangel] dont worry. I have a last question: why tor works on SOCKS and not HTTP/HTTPS protocol?
[m00trix] Arkhangel, per design I think
[Arkhangel] in the network settings, for HTTP/HTTPS I cannot use the 9050 or 9150 port to use TOR, right?
[m00trix] network settings for what?
[m00trix] program
[Arkhangel] for example if you want to use a proxy on the system of the operating system
[m00trix] what OS Arkhangel
[m00trix] You want to route all traffic out through TOR
[Arkhangel] windows or linux-based
[Arkhangel] y
[Arkhangel] in that case for HTTP/HTTPS I cannot use port 9150
[Arkhangel] right?
[Aspire] i have to go bye all and thanks for the lesson
[Arkhangel] since SOCKS and HTTP/HTTPS talk different “languages”
[m00trix] Arkhangel, are you trying to run another browser through TOR?
[m00trix] what are you trying to do, that would help heh
[Arkhangel] no
[Arkhangel] I want to use just the normal browser with no opening torbrowser
[Arkhangel] but where I can surf on tor
[m00trix] you have to have the TOR Browser running to proxy the traffic
[m00trix] unless you run a plain tor from a terminal
[Arkhangel] exactly
[Arkhangel] on windows I should run tor browser
[m00trix] and there is a reason for why the TOR browser is at is is. And have the plugins it have
[m00trix] to protect you
[m00trix] you can do what you are trying to do, but even TOR warns against it
[Arkhangel] i know that torbrowser is better for that, but just for information, if I start torbrowser and I enable a proxy that route the data to the tor network by a normal browser, it is not a connection tor over tor right?
[m00trix] when you start the TOR browser, you can tell most programs yo use 127.0.0.1:9150 as a proxy and it will proxy over TOR
[m00trix] but on Windows, the TOR Browser needs to be running
[Arkhangel] exactly, so it is simple one tor connection, is not tor over tor, right?
[Arkhangel] in case of windows I mean
[m00trix] tor over tor?
[Arkhangel] y, since it s not a good idea running tor over tor, I would like to know if, on windows, open torbrowser and proxying the other programs to 127.0.0.1:9150 is not a tor over tor
[l0t3D_] alright thanks all for the lesson i need to go
[l0t3D_] bye
[n1ck1] no
[n1ck1] not is
[Arkhangel] ok ty
[Arkhangel] Im so sorry I forced everyone to run away
[n1ck1] you only configure that program to use this network
[n1ck1] ahsuhahsauhsauhusa
[Arkhangel] ahaha
[n1ck1] but use linux
[n1ck1] windows sucks
[Arkhangel] I use Linux, but I need to have all possible information
[n1ck1] try ubunto first, it is easy
[n1ck1] yes
[n1ck1] this is right
[Arkhangel] culture is power
[n1ck1] y
[n1ck1] tks all

Anonymous CyberGuerrilla & AnonOps IRC Launch #OpCopyWrong In Attempt To Lobby EU Parliament To Vote Against Impending Copyright Reform

This weekend members of the AnonOps Internet Relay Chat (IRC) and Anonymous CyberGuerrilla announced the formation of “Operation Copy Wrong” (#OpCopyWrong), an international protest movement aimed at lobbying European Parliament against passing new changes to existing Copyright laws – laws which are set to be put into motion by the European Union for the first time later this month. At the present moment in time however, the operation appears to be nothing more than a legitimate activism/protest movement, rather than a hacktivism movement, though it does remain to be seen if any Government websites or infrastructure will come under cyber attack as a result of it.

For the time being, you are invited to learn more through the video and resources provided below. If this is an issue you also feel strongly about, you are invited to participate in the movement and/or reach out to your elected officials to let them know how you feel.

#OpCopyWrong Original Press Release: https://www.cyberguerrilla.org/blog/anonymous-operation-copywrong-save-your-internet/

Transcript from Video:

Greetings citizens of Europe,

The biggest threat to the internet is at our doorsteps, and we need you to fight against it.

On the 25-28 of March, the European Parliament will most likely vote the European Copyright Directive into law. Under the final text, any online community, platform or service is responsible for ensuring that no user ever posts anything that infringes copyright, even momentarily. This is impossible, and the closest any service can come to it is spending hundreds of millions of euros to develop automated copyright filters. Those filters will subject all internet traffic of every European citizen to interception and arbitrary censorship if a black-box algorithm decides their text, pictures, sounds or videos are a match for a known copyrighted work. They are a gift to fraudsters and criminals, to say nothing of censors, both government and private.

Under article 13 of the copyright directive every online community, service or platform is required to make “best efforts” to license anything their users might conceivably upload, meaning that they have to buy virtually anything any copyright holder offers to sell them, at any price, on pain of being liable for infringement if a user later uploads that work.

Article 11, which allows news sites to decide who can link to their stories and charge for permission to do so, is also a huge threat to our internet freedom. The final text clarifies that any link that contains more than “single words or very short extracts” from a news story must be licensed, with no exceptions for noncommercial users, nonprofit projects, or even personal websites with ads or other income sources, no matter how small.

In order to save the internet, we are launching Operation CopyWrong.

Join us by getting informed about the European Copyright directive and by contacting your representatives. To let our voices be heard, we will be leaving our keyboards and we will take to the streets throughout Europe on the 23rd of March. Our peaceful protest will send a clear message to the European Parliament that we want them to represent European citizens, not industry lobbyists.

Resources:

Learn More: https://roguemedia.co/2019/03/03/anonymous-announces-stopacta2-an-international-call-to-action-protests-scheduled-throughout-europe-march-23rd-2019/

Contact Your Representatives: https://saveyourinternet.eu/act/
Protest Map: https://www.google.com/maps/d/viewer?mid=1tHaOiCgjION6hK0rrajIJyuHnG5FgBzH&ll=48.1990715154411%2C21.658833242961123&z=4&fbclid=IwAR26FpLf_NQGKNfJEZ8pTPxDw-wEk-TE4cmjM5E9m-ZBzhynq7hP0gkTPoA

Transcript from IRC Chatroom Leaked Online Detailing Connections Between Guccifer 2.0, Donald Trump, Russia & The DNC

This afternoon I managed to stumble across an interesting transcript leaked online from an Internet-Relay-Chatroom attached to rizon.net. In the leak provided below, different hackers discuss Guccifer 2.0 and the 2015 hack of the Democratic National Committee (DNC), discussing different details surrounding the incident including how the hack was pulled off, what network infrastructure was compromised to make it possible, the different implications between the hack, Russia and Donald Trump, as well as how they are all related to one another.

The leak was interesting enough for me to post here today, especially because the transcript provides access to information and resources I have never seen before. For example, one of the URL’s attached to the transcript links directly to Guccifer 2.0‘s personal website, which has been updated as recently as within the course of the last month. This site also includes direct links to various file downloads stolen from DNC servers, as well as a whole host of other information chronicling the hack of the DNC, the media coverage which surrounded it and a timeline of events involving the hack and the prosecution of Guccifer leading up on through to today. Most notably included within the files are the DNC’s “Trump Report” and Barack Obama’s strategy guide for assuming Presidential office. Access to these websites and files is also provided below.

Transcript Leak from IRC Chat: https://pastebin.com/raw/xpmbHCM0

G-Space | Guccifers Private Website: http://g-2.space/
Guccifer 2.0 Year In Review – Published December 2018: https://disobedientmedia.com/2018/12/guccifer-2-0-game-over-year-end-review/

DNC Confidential Trump Report: https://anonfile.com/U9IfSds6b7/DNC_Confidential_Trump_Report_rtf
Obama Presidential Strategy: https://anonfile.com/Z8IdS2s4b4/Obama_Presidential_Transition_Strategy_rtf

Government of Sudan Shuts Down National Internet Access, So Anonymous Shuts Down The Government

This Christmas the Government of Sudan had the entirety of their internet infrastructure hacked and taken offline, more than 260 Government domains in total. Not only this, but two of the country’s largest television news network, Sudania 24 and the Sudan News Agency, have also been hacked and taken offline. The cyber attacks are a result of a joint operation between multiple international hackers and hacking groups, namely Lorian Synaro, Anonymous CyberGuerrilla and the AnonOps IRC. The operation itself stems from a December 19th decision by the Government of Sudan to restrict national internet access and block access to social media applications – actions which have continued on through today.

As for why they did this, at the present moment in time there are rumblings of a revolt or revolution throughout Sudan, something that the current Sudanese regime, whom has been in political power for the last 30 years, does not want to see happen. Consequentially, as more and more people have started taking to the streets, and as these protests have grown larger, the Government of Sudan has begun sealing off/restricting internet access Nationwide whilst simultaneously blocking access to social media applications to prevent protesters from organizing with or coordinating to work with one another to make the movement larger.

Observing this from afar was something that internet community simply could not tolerate, so activists around the world got together and did what they could to begin fighting back in support of the oppressed people of Sudan. Beginning December 22nd, Anonymous CyberGuerrilla organized chatrooms on the ClearNet and IRC, AnonOps prepared a care package, Rogue Media Labs manipulated social media algorithms to land said care packages and chatrooms across Sudan’s border while Lorian Synaro put word out to all Anonymous to stand up and participate – which is exactly what they did.

As previously mentioned, starting Christmas morning Anonymous launched a massive and coordinated hacking campaign against the Government of Sudan, managing to take down over 260 Sudanese Government websites and knock several state run news outlets offline. Not only this, but thousands of individuals across Africa have signed up for and begun learning more about cyber security and how to freely bypass Government implemented controls or restrictions on their systems. On through December 26th 2018, the Government of Sudan remains under attack, the care packages continue to be pushed throughout Africa and much of Sudan’s Governmental infrastructure remains inaccessible. Meanwhile, the citizens of Sudan are currently organizing massive protests and demonstrations across the country for December 30th 2018.

In a message attached to the operation, Anonymous hackers stated the following:

We are communicating with you today because something is very wrong with Sudanese Government. We can not tolerate injustice, inequality, and denial of the peoples rights. The Sudanese Government is restricting free speech and seeking to limit and control internet access. This Government is even punishing the people for expressing their ideas and opinions. We will fight back! In response to Sudan’s situation, we are issuing a wide call to protest. We will protest against this Government, it’s blasphemy laws, censorship laws, restrictions on internet access, restriction to internet access, and any and thought crime legislation.

We are Anonymous
We are Legion
We do not forgive
We do not forget
To the Government of Sudan, expect us.

Massive and coordinated attack against the central government of Sudan. More than 260 Government domains have been #Downed. We will have no mercy. You have killed innocent protesters, now it’s time to pay for it.

Sudan Government Hit List: https://www.hastebin.com/acolilixac.sql

https://twitter.com/CgAn_Doemela/status/1076580410166001664?s=19


No automatic alt text available.

Connecting The Online Hacking World – The Ultimate Anonymous Handbook

I’m not sure if it’s a result of all the protests and riots around France, or the political fallout following the perceived failures/letdowns of international conservatives elected throughout the course of 2015 and 2016, or its the new treasure troves of hacks and leaks coming out of Brasil and Europe, but it certainly feels as though more and more people around the world are starting to become interested in hacking, Anonymous and online activism in general. In that spirit, a group of hackers known as LulzSecITA is leading the charge for #OpPaperStorm to close out the year 2018, explaining to the world that:

“You do not have to be a HACKER if you want CHANGE. Important events do not just occur on the internet. The revolution of consciousness is already taking place all around the world, and now is a unique time in history to make all of our voices count! You can participate too. In fact, you MUST participate. There is the global battle taking place online and in our streets to conquer your minds, freedom and to hide you from the truth. Our goal is to get our voices in the ears of all politicians in all rooms of Parliament, Ministry’s and Government Agencies worldwide. Collectively, we use our right to free speech in the war against corruption and equality. Join us!

Politicians do not represent you, the media deceives and lies to you while distorting the truth, and your government censors critical information at the heart of many important issues. What you must realize is that you are the media, you are the truth. In out modern time, the internet and social media is a tool which allows any and all of us to be our own reporter, so go and make the news! Create your own accounts, tell your stories and share truth with the world. Collectively we CAN change the world.

In spirit of their message and overall goal, I too would like to add to the discussion and resources. For those of you whom may be unfamiliar with the movement, here is a little information to help teach and get you started down the path towards becoming an online activist or part of the Anonymous movement. First off, while it might be a little cliche, anyone whom has ever “joined” Anonymous or thought about doing so has indubitably come across the following video:

All The Tools Necessary To Find or Become Anonymous:

AnonOps IRC | Home To AntiSec & LulzSec:

https://anonops.com
https://webchat.anonops.com
https://newblood.anonops.com/

CyberGuerrilla IRC | Home To The Undergrounds Best:

https://www.cyberguerrilla.org/
https://irc.cyberguerrilla.org (ClearNet)
https://aldfqlbwtsagq2gy.onion (Tor)
https://webchat.cyberguerrilla.org (WebChat)

Other Places To Look:

4Chan Random Board: https://boards.4chan.org/b/
Reddit Anonymous Board: https://www.reddit.com/r/anonymous/
Reddit WTF Board: https://www.reddit.com/r/WTF/

Security Resources:

VPN’s: https://newblood.anonops.com/vpn.html
The Onion Network: https://newblood.anonops.com/tor.html
Security Handbook: https://newblood.anonops.com/security.html
Email Encryption Basics: https://newblood.anonops.com/securemail.html
Connecting To The IRC: https://newblood.anonops.com/basics.html
HexChat IRC On Windows or Linux: https://newblood.anonops.com/hexchat.html
How To Write Un-Hackable Passwords: https://roguesecrutiylabs.ltd/how-to-write-un-hackable-passwords
Phone Security: https://roguesecuritylabs.ltd/phone-security
Email Security Strategies: https://roguesecuritylabs.ltd/email-security-strategies
Making The Switch To Encrypted Emails: https://roguesecuritylabs.ltd/making-the-switch-to-encrypted-emails/
Securing Your Social Media Accounts: https://roguesecuritylabs.ltd/securing-social-media-accounts
Building & Selecting Safer Web Browsers: https://roguesecuritylabs.ltd/building-selecting-safer-web-browsers
The Value of Copy & Paste Services: https://roguesecuritylabs.ltd/copy-paste-services
Data Servers, Country of Origin & Cyber Security: https://roguesecuritylabs.ltd/misconceptions-nationalism-and-security/
Encrypted Chatrooms & VoIP Apps: https://roguesecuritylabs.ltd/encrypted-chatrooms-voip-apps
Internet Router Security: https://roguesecuritylabs.ltd/internet-router-security
Miscellaneous Tips, Tricks & Security ‘Hacks’: https://roguesecuritylabs.ltd/miscellaneous-tips-tricks-security-hacks
Anonymous Security Guide 2.0: https://anonhq.com/anonymous-security-guide-2-0/
Operation Security: https://iamanonymous.com/dont-be-burnt-toast-unknown-guide-to-operation-security/

Operating Systems:

Alternative Hacker OS: https://ghostbin.com/paste/79ht8
Kali Linux: https://www.kali.org/downloads/
ParrotSec OS: https://www.parrotsec.org/download.php
BlackArch OS: https://blackarch.org/downloads.html
Tails OS: https://tails.boum.org/install/
Installing Duel OS’s Through Virtual Machines: https://www.vmware.com/pdf/dualboot_tech_note.pdf

Linux Commands Encyclopedia: https://ss64.com/bash/
Windows cmd Encyclopedia: https://ss64.com/nt/
macOS Commands Encyclopedia: https://ss64.com/osx/

Pirates Guide To Anonymous:

** Note: Some, but not all links/downloads have been taken down by authorities **

Leak 1 | EC-Council’s Certified Ethical Hacker (CEH) Course: 

Reconnaissance/Footprinting: http://www.mediafire.com/download/5tex1gndiis0rz3/Reconnaissance+-+Footprinting.rar
SQL Injection: http://www.mediafire.com/download/1bap7hf82clm9dy/SQL+Injection.rar
Scanning Networks: http://www.mediafire.com/download/22t74lyof149u41/Scanning+networks.rar
Enumeration: http://www.mediafire.com/download/h285291nt7w8trh/Enumeration.rar
Hacking Web Servers: http://www.mediafire.com/download/g4di658xb9stz8g/Pentesting+Web+Servers.rar
Hacking Web Applications: http://www.mediafire.com/download/waqslt6jhk6ph1a/Pentesting+Web+Applications.rar
Cryptography: http://www.mediafire.com/download/1cujirp51m911k8/Cryptography.rar
Sniffing: http://www.mediafire.com/download/fzbq3zzzqspzw15/Sniffing.rar
Session Hijacking: http://www.mediafire.com/download/5irzrhub4r6mva3/Session+Hijacking.rar
Social Engineering: http://www.mediafire.com/download/2xqgt9g7044n683/Social+Engineering.rar
System Hacking: http://www.mediafire.com/download/zf2d20969azd887/System+hacking.rar
Denial of Service: http://www.mediafire.com/download/x5zxdvv1h3k54nk/Denial+of+Service.rar
Hacking Wireless Networks: http://www.mediafire.com/download/r9hrz8zotis74f1/Hacking+wireless+networks.rar
Malware Threats: http://www.mediafire.com/download/8caooodccdnc608/Malware+threats.rar
Evading IDS, Firewalls, and Honeypots: http://www.mediafire.com/download/33z5epburhu1xgy/Evading+IDS%2C+Firewalls%2C+and+Honeypots.rar
Hacking Mobile Platforms: http://www.mediafire.com/download/l45v3ne52qr9llw/Mobile+platforms.rar

Leak 2 | More Hacking Courses:

Introduction to Pentesting and Ethical Hacking with Kali Linux: http://www.mediafire.com/download/492h7o887yxexha/PT+and+EH+with+Kali+Linux.rar
Introduction to Firewalls: http://www.mediafire.com/download/2kczrn29gt6fdp3/Introduction+to+Firewalls.rar
Introduction to Browser Security Headers: http://www.mediafire.com/download/t98r47bpo9hy5n1/Introduction+to+browser+security+headers.rar
Introduction to Wireshark: http://www.mediafire.com/download/ou45m7o4xqt1qdu/Introduction+to+Wireshark.rar
Troubleshooting with Wireshark: http://www.mediafire.com/download/n5exc1bomahud9m/Troubleshooting+with+Wireshark+Fundamental+Protocol+Analysis.rar
Wireshark 2.0: http://www.mediafire.com/download/n98viipaz131fhq/Wireshark+2.0.rar
Network Security Testing with Nmap: http://www.mediafire.com/download/3guhkfrhfbvs01b/NMAP.rar
All about buffer Overflows: http://www.mediafire.com/download/sbst1evvisywe62/Buffer+Overflow.rar
Network Pentesting using Python and Kali Linux: http://www.mediafire.com/download/7rq1ujn9424d3hb/Network+PT+Using+Python+and+K_4li+Linux.rar
Metasploit Basics: http://www.mediafire.com/download/mnulcdbw817f9q0/Metasploit+Basics.rar
CloudFlare Security: http://www.mediafire.com/download/qchaazzxrdsmwja/CloudFlare+Security.rar
Hack your API First: http://www.mediafire.com/download/1qqm5pcj6pz37wn/Hack+your+API+First.rar
Risk Identification, Monitoring, and Analysis: http://www.mediafire.com/download/roaeau041zx8byx/SSCP%3B+Risk+Identification%2C+Monitoring%2C+and+Analysis.rar
Check Point Certified Security Administrator; Install & Deploy: http://www.mediafire.com/download/ysvx972ymd57gme/Check+Point+Certified+Security+Administrator%3B+Install+%26+Deploy.rar
Cloud Security: http://www.mediafire.com/download/ka9qu9136x8on4j/Cloud+security.rar
Cloud Computing: http://www.mediafire.com/download/6ctvkguxr9g4609/Cloud+computing.rar
Introduction to Pentesting using Metasploit: http://www.mediafire.com/download/5ut59in0l6okeaq/Introduction+to+Penetration+Testing+Using+Metasploit.rar

Leak 3 | Coursera Training Courses:

Software Security: http://www.mediafire.com/download/mvk782rt6k28yha/Software+Security.rar
Hardware Security: http://www.mediafire.com/download/vxd0998dmniuccz/Hardware+Security.rar
Bitcoin & Cryptocurrency Tech: http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z

Leak 4 | Programming:

C++ Fundamentals: http://www.mediafire.com/download/su02297mbmlxq27/C%2B%2B+Fundamentals.rar
C++ Advanced Topics: http://www.mediafire.com/download/9tgfpx8pzwakrjc/C%2B%2B_Advanced_Topics.rar
C Fundamentals: http://www.mediafire.com/download/com5mg5fda6mwd6/C+Fundamentals.rar
C In Action: http://www.mediafire.com/download/dzr3d2jymdhdqs6/C+in+Action.rar
Java Fundamentals: http://www.mediafire.com/download/t5rygwbb45izg71/Java+Fundamentals.rar
Java from Scratch: http://www.mediafire.com/download/rr8kjao0zaxld3o/JavaScript+from+Scratch.rar
Introduction to Java: http://www.mediafire.com/download/fd9r8hc6u6zouga/SitePoint-Introduction.to.JavaScript.7z
Introductions to HTML: http://www.mediafire.com/download/w37r7339ouih7lg/Introduction+to+HTML+for+Designers.rar
Introduction To JQuery: http://www.mediafire.com/download/0j09qr98vtbdjab/Introduction+to+jQuery+for+Designers.rar
Introduction To CSS: http://www.mediafire.com/download/jj466s79n75ns46/Introduction+to+CSS+for+Designers.rar
Introduction To Arduino: http://www.mediafire.com/download/pvmstcc4abura43/Arduino.rar
Getting Started with AngularJS: http://www.mediafire.com/download/sbrgwwksehmz8rc/Angular_Js_-_Get_Started.rar
Building Angular & Node JS Apps: http://www.mediafire.com/download/e5ynwz4th5g3bvo/Building+Angular+and+Node.js+Apps+with+the+MEAN+Stack.rar
ExtJS Desktop Fundamentals: http://www.mediafire.com/download/ooulsej4ui421q6/ExtJS+Desktop+Fundamentals.rar
Python Fundamentals: http://www.mediafire.com/download/gsc0epd3jvgayfb/Python+Fundamentals.rar
Python, Beyong The Basics: http://www.mediafire.com/download/dbn6i84zfsb8566/Python_%E2%80%93_Beyond_the_Basics.rar
An Introduction To Concurrent Python: https://hackaday.com/2018/12/18/thread-carefully-an-introduction-to-concurrent-python/
Ruby 2.0: http://www.mediafire.com/download/p9oappfwmb5mdvb/SitePoint-Ruby2.7z
Getting Started with BackBone JS: http://www.mediafire.com/download/9anvrv6dxaaacbn/SitePoint-Getting.Started.with.BackBone.js.7z
Introduction To Powershell: http://www.mediafire.com/download/8b63ljih3cjl426/PowerShell_
Raspberry Pi Home Server: http://www.mediafire.com/download/sl36dmuomdld4qa/RaspberryPi+HomeServer.rar
Raspberry Pi for Developers: http://www.mediafire.com/download/5u2g1svecr1iukm/Raspberry+for+Devs.rar

Leak 5 | Cisco CCNA Security:

Introduction To Network Security: http://www.mediafire.com/download/yraijpmuzoa1zpn/Cisco+CCNA+Security%3B+Introduction+to+Network+Security.rar
AAA & IP Security: http://www.mediafire.com/download/lmj3ri990ou3j64/Cisco_CCNA_Security%3B_AAA_and_IP_Security.rar
Firewalls & VPN’s: http://www.mediafire.com/download/lhajdkufn9oi5ta/Cisco+CCNA+Security%3B+Firewalls+and+VPNs.rar

Leak 6 | # CompTIA A+:

Computer Hardware: http://www.mediafire.com/download/f5013b98tc40fj8/CompTIA+A%2B+Part+1%3B+Computer+Hardware.rar
Networking: http://www.mediafire.com/download/38q520p66a5a68q/CompTIA+A%2B+Part+2%3B+Networking.rar
Peripherals & Best Practices: http://www.mediafire.com/download/psmkodtkcy440rz/CompTIA+A%2B+Part+3%3B+Peripherals+and+best+practices.rar
Operating Systems: http://www.mediafire.com/download/mi3mvleyyd8ayu4/CompTIA+A%2B+Part+4%3B+Operating+Systems.rar
Mobile Devices & Troubleshooting: http://www.mediafire.com/download/5scd91h4gkaefoa/CompTIA+A%2B+Part+5%3B+Mobile+Devices+and+Troubleshooting.rar

Leak 7 | CompTIA Security+:

Network & Domain Security: http://www.mediafire.com/download/wbdho927tnl1p26/CompTIA+Security%2B.rar
Network Architecture: http://www.mediafire.com/download/2j9vbybrqab3x5q/Network+Architecture+for+CompTIA+Network%2B.rar
Network Operations: http://www.mediafire.com/download/y65xsb8n6rfdcp8/Network+Operations+for+CompTIA+Network%2B.rar
Network Security 2: http://www.mediafire.com/download/d4qdr3jwh337033/Network+Security+for+CompTIA+Network%2B.rar

Leak 8 | Linux:

Linux Installation and Initial Configuration: http://www.mediafire.com/download/xxz33o4tq1obpzk/Linux+Installation+and+Initial+Configuration.rar
Introduction to the Bash Shell: http://www.mediafire.com/download/i24oogco4ch9ma4/Introduction+to+the+Bash+Shell.rar
Shell Scripting with Bash: http://www.mediafire.com/download/t5eha9cr4eckayb/Shell+Scripting+with+Bash.rar
Linux Command Line Interface Fundamentals: http://www.mediafire.com/download/27hfeldyqrs2ae8/Linux+Command+Line+Interface+%28CLI%29+Fundamentals.rar

Leak 9 | Video Editing:

Adobe Premiere Pro CC Fundamentals: http://www.mediafire.com/download/6pn0jr7nlb7rmc0/Adobe+Premiere+Pro+CC+Fundamentals.rar
Animation and Video Editing in Photoshop: http://www.mediafire.com/download/ys44ptebw6tk4o8/Animation+and+Video+Editing+in+Photoshop+CS6.rar
Color Correction and Grading in Adobe Premiere Pro and SpeedGrade: http://www.mediafire.com/download/evuudd9t6dtc3ej/Color+Correction+and+Grading+in+Adobe+Premiere+Pro+and+SpeedGrade.rar
Action Scene Editing Techniques in Adobe Premiere Pro: http://www.mediafire.com/download/0gu7x007mpaclwd/Action+Scene+Editing+Techniques+in+Adobe+Premiere+Pro.rar
Adobe Premiere Pro CS6 Setup (Software Itself, Not A Course): http://www.mediafire.com/download/u6dko8ug5ysbrw2/Adobe+Premiere+Pro+CS6.rar

Leak 10 | Miscellaneous:

Clean Code: http://www.mediafire.com/download/6ny3ybv2ojzr6vt/Clean+Code.rar
Test Driven Development with Brad Wilson: http://www.mediafire.com/download/cc6ibqxbhdcivea/TDD+with+Brad+Wilson.rar
The Fundamentals of Scrum Methodology: http://www.mediafire.com/download/cp8w28mcl1258o4/ScrumFundamentals.rar
Building A Successful Blog: http://www.mediafire.com/download/0u690ecz1q8lj1k/1.+Building+a+successful+blog.rar
Building A High Traffic Profitable Blog: http://www.mediafire.com/download/653jtq5261zuapx/2.+Building+a+High+Traffic%2C+Profitable+Blog.rar
Fiddler: http://www.mediafire.com/download/xvgjnq2ispauz3v/Fiddler.rar

Leak 11 | Other Resources:

Hacking PDF’s Extracted from repository.root-me.org: http://www.mediafire.com/download/0i9b46gjcqzr2jc/root-me-docs.rar
Alternative Cloud Services: http://github.com/juandecarrion/awesome-self-hosted

Accounts To Follow:

@CgAn_Doemela | @JTSEC3313 | @LulzSec_ITA | @4n0nGh05t | @LulzSeguridad | @nonymousNews | @ArgGhostHackers |@Scode404 | @Shad0wS3C ‏‏| @LorianSynaro ‏| @__s1ege ‏| @GhostSquadHack | @NamaTikure ‏| @urharmful | @LabDefCon ‏| @SH4RPSH0OTER ‏| @NewWorldHacker ‏| @Mecz1nho ‏| @ergo_hacker ‏| @M1r0x__ ‏| @Knushh ‏| @zglobal_ ‏| @La9deAnon | @Lil_Sh4wtyy ‏| @YourAnonArg ‏| @yellowvestanons ‏| @AnonyResistance ‏| @AnonFrance ‏| @AnonsCouncil ‏| @campuscodi

Best Sources for Hacking News:

Rogue Media Labs: https://roguemedia.co/category/hacking-news/
Softpedia: https://news.softpedia.com/
SC Media: https://www.scmagazine.com/home/security-news/
Bleeping Computer: https://www.bleepingcomputer.com/
ZDNET: https://www.zdnet.com/
Security Affairs: https://securityaffairs.co/wordpress/
The Hacker News: https://thehackernews.com/
HackRead: https://www.hackread.com/
InfoSec Magazine: https://www.infosecurity-magazine.com/

Latest Human Rights News Worldwide:

Human Rights Watch: https://www.hrw.org/
Amnesty International: https://www.amnesty.org/en/latest/news/

As LulzSecITA closes out their press release, once you get the hang of the online stuff you should next take to the streets – #OpPaperStorm:

1. Be creative, serious and maybe even a little ironic, use direct messages. Express your opinions and criticisms against the state. You must want change.

2. Organize, prepare, photocopy leaflets, banners, posters, stickers, indelible markers or color cans, or simply download the existing images and print them! With a few euros you can create masterpieces. Be your own artist and express yourself in a way only you can.

3. Distribute flyers, hang your banners, paste your posters with adhesive tape, spray with the can on the walls to create real street-art, put images on the bulletin boards around the city. Create a team and join forces with other. Talk to as many people as possible about ANONYMOUS, about corrupt politics and about poverty or whatever you are passionate about!

4. Document what you create! Capture your art with a photo in order to get as many people as possible your message!

5. Work at night or whenever there are few people! Pay attention to the cameras and the police, leave no traces except your art! Activism is not a crime! But unfortunately in recent times you have to be very careful!

ATTENTION: All work is good for Anonymous, there is no fixed ideology of Anonymous, but carefully use our logos, emblems, existing images, posters / banners, the V mask (Guy Fawkes) or our well-known slogan!

Create with us,
Be Anonymous,
Be a street warrior!

We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Wait for us!

OpPaperStorm Press Release 2018: https://pastebin.com/t7wMgwPu

AnonOps Leaks ‘A Pirates Guide To Anonymous’ – Complete Online Hacking, Security, Programming & Video Tutorial Handbook

In all my years online I have never quite seen anything like this, but earlier today members of the AnonOps IRC released a comprehensive hacking guide featuring full lectures, tutorials and online courses from various pirated sources. Included in the leaked files are full certified Ethical Hacking training courses from The International Council of Electronic Commerce Consultants, study guides on hardware, software and crypto-currencies from Coursera, programming tutorials from the the Computing Technology Industry Association (CompTIA), and IT certification courses from the Cisco Certified Network Associate programme (CCNA), along with a ton of miscellaneous information.

A hacker going by the name of “ClaudiaD” is said to have been the primary source behind the leaked information below, allowing for the pirated material to be downloaded and published online in the first place. The study guide itself was assembled and released to the pubic by a hacker going by the name of “J0rn,” with contributions from “Anominous” – both presumably working off the AnonOps IRC. Due to the sensitive nature of the content contained, for the purposes of this article I am choosing to keep the exact location of the leak redacted – contact me via email if you would like more information.

Credit: https://anonops.com/

No automatic alt text available.

Leak 1 | EC-Council’s Certified Ethical Hacker (CEH) Course: 

Reconnaissance/Footprinting: http://www.mediafire.com/download/5tex1gndiis0rz3/Reconnaissance+-+Footprinting.rar
SQL Injection: http://www.mediafire.com/download/1bap7hf82clm9dy/SQL+Injection.rar
Scanning Networks: http://www.mediafire.com/download/22t74lyof149u41/Scanning+networks.rar
Enumeration: http://www.mediafire.com/download/h285291nt7w8trh/Enumeration.rar
Hacking Web Servers: http://www.mediafire.com/download/g4di658xb9stz8g/Pentesting+Web+Servers.rar
Hacking Web Applications: http://www.mediafire.com/download/waqslt6jhk6ph1a/Pentesting+Web+Applications.rar
Cryptography: http://www.mediafire.com/download/1cujirp51m911k8/Cryptography.rar
Sniffing: http://www.mediafire.com/download/fzbq3zzzqspzw15/Sniffing.rar
Session Hijacking: http://www.mediafire.com/download/5irzrhub4r6mva3/Session+Hijacking.rar
Social Engineering: http://www.mediafire.com/download/2xqgt9g7044n683/Social+Engineering.rar
System Hacking: http://www.mediafire.com/download/zf2d20969azd887/System+hacking.rar
Denial of Service: http://www.mediafire.com/download/x5zxdvv1h3k54nk/Denial+of+Service.rar
Hacking Wireless Networks: http://www.mediafire.com/download/r9hrz8zotis74f1/Hacking+wireless+networks.rar
Malware Threats: http://www.mediafire.com/download/8caooodccdnc608/Malware+threats.rar
Evading IDS, Firewalls, and Honeypots: http://www.mediafire.com/download/33z5epburhu1xgy/Evading+IDS%2C+Firewalls%2C+and+Honeypots.rar
Hacking Mobile Platforms: http://www.mediafire.com/download/l45v3ne52qr9llw/Mobile+platforms.rar

Leak 2 | More Hacking Courses:

Introduction to Pentesting and Ethical Hacking with Kali Linux: http://www.mediafire.com/download/492h7o887yxexha/PT+and+EH+with+Kali+Linux.rar
Introduction to Firewalls: http://www.mediafire.com/download/2kczrn29gt6fdp3/Introduction+to+Firewalls.rar
Introduction to Browser Security Headers: http://www.mediafire.com/download/t98r47bpo9hy5n1/Introduction+to+browser+security+headers.rar
Introduction to Wireshark: http://www.mediafire.com/download/ou45m7o4xqt1qdu/Introduction+to+Wireshark.rar
Troubleshooting with Wireshark: http://www.mediafire.com/download/n5exc1bomahud9m/Troubleshooting+with+Wireshark+Fundamental+Protocol+Analysis.rar
Wireshark 2.0: http://www.mediafire.com/download/n98viipaz131fhq/Wireshark+2.0.rar
Network Security Testing with Nmap: http://www.mediafire.com/download/3guhkfrhfbvs01b/NMAP.rar
All about buffer Overflows: http://www.mediafire.com/download/sbst1evvisywe62/Buffer+Overflow.rar
Network Pentesting using Python and Kali Linux: http://www.mediafire.com/download/7rq1ujn9424d3hb/Network+PT+Using+Python+and+K_4li+Linux.rar
Metasploit Basics: http://www.mediafire.com/download/mnulcdbw817f9q0/Metasploit+Basics.rar
CloudFlare Security: http://www.mediafire.com/download/qchaazzxrdsmwja/CloudFlare+Security.rar
Hack your API First: http://www.mediafire.com/download/1qqm5pcj6pz37wn/Hack+your+API+First.rar
Risk Identification, Monitoring, and Analysis: http://www.mediafire.com/download/roaeau041zx8byx/SSCP%3B+Risk+Identification%2C+Monitoring%2C+and+Analysis.rar
Check Point Certified Security Administrator; Install & Deploy: http://www.mediafire.com/download/ysvx972ymd57gme/Check+Point+Certified+Security+Administrator%3B+Install+%26+Deploy.rar
Cloud Security: http://www.mediafire.com/download/ka9qu9136x8on4j/Cloud+security.rar
Cloud Computing: http://www.mediafire.com/download/6ctvkguxr9g4609/Cloud+computing.rar
Introduction to Pentesting using Metasploit: http://www.mediafire.com/download/5ut59in0l6okeaq/Introduction+to+Penetration+Testing+Using+Metasploit.rar

Leak 3 | Coursera Training Courses:

Software Security: http://www.mediafire.com/download/mvk782rt6k28yha/Software+Security.rar
Hardware Security: http://www.mediafire.com/download/vxd0998dmniuccz/Hardware+Security.rar
Bitcoin & Cryptocurrency Tech: http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z

Leak 4 | Programming:

C++ Fundamentals: http://www.mediafire.com/download/su02297mbmlxq27/C%2B%2B+Fundamentals.rar
C++ Advanced Topics: http://www.mediafire.com/download/9tgfpx8pzwakrjc/C%2B%2B_Advanced_Topics.rar
C Fundamentals: http://www.mediafire.com/download/com5mg5fda6mwd6/C+Fundamentals.rar
C In Action: http://www.mediafire.com/download/dzr3d2jymdhdqs6/C+in+Action.rar
Java Fundamentals: http://www.mediafire.com/download/t5rygwbb45izg71/Java+Fundamentals.rar
Java from Scratch: http://www.mediafire.com/download/rr8kjao0zaxld3o/JavaScript+from+Scratch.rar
Introduction to Java: http://www.mediafire.com/download/fd9r8hc6u6zouga/SitePoint-Introduction.to.JavaScript.7z
Introductions to HTML: http://www.mediafire.com/download/w37r7339ouih7lg/Introduction+to+HTML+for+Designers.rar
Introduction To JQuery: http://www.mediafire.com/download/0j09qr98vtbdjab/Introduction+to+jQuery+for+Designers.rar
Introduction To CSS: http://www.mediafire.com/download/jj466s79n75ns46/Introduction+to+CSS+for+Designers.rar
Introduction To Arduino: http://www.mediafire.com/download/pvmstcc4abura43/Arduino.rar
Getting Started with AngularJS: http://www.mediafire.com/download/sbrgwwksehmz8rc/Angular_Js_-_Get_Started.rar
Building Angular & Node JS Apps: http://www.mediafire.com/download/e5ynwz4th5g3bvo/Building+Angular+and+Node.js+Apps+with+the+MEAN+Stack.rar
ExtJS Desktop Fundamentals: http://www.mediafire.com/download/ooulsej4ui421q6/ExtJS+Desktop+Fundamentals.rar
Python Fundamentals: http://www.mediafire.com/download/gsc0epd3jvgayfb/Python+Fundamentals.rar
Python, Beyong The Basics: http://www.mediafire.com/download/dbn6i84zfsb8566/Python_%E2%80%93_Beyond_the_Basics.rar
Ruby 2.0: http://www.mediafire.com/download/p9oappfwmb5mdvb/SitePoint-Ruby2.7z
Getting Started with BackBone JS: http://www.mediafire.com/download/9anvrv6dxaaacbn/SitePoint-Getting.Started.with.BackBone.js.7z
Introduction To Powershell: http://www.mediafire.com/download/8b63ljih3cjl426/PowerShell_
Raspberry Pi Home Server: http://www.mediafire.com/download/sl36dmuomdld4qa/RaspberryPi+HomeServer.rar
Raspberry Pi for Developers: http://www.mediafire.com/download/5u2g1svecr1iukm/Raspberry+for+Devs.rar

Leak 5 | Cisco CCNA Security:

Introduction To Network Security: http://www.mediafire.com/download/yraijpmuzoa1zpn/Cisco+CCNA+Security%3B+Introduction+to+Network+Security.rar
AAA & IP Security: http://www.mediafire.com/download/lmj3ri990ou3j64/Cisco_CCNA_Security%3B_AAA_and_IP_Security.rar
Firewalls & VPN’s: http://www.mediafire.com/download/lhajdkufn9oi5ta/Cisco+CCNA+Security%3B+Firewalls+and+VPNs.rar

Leak 6 | # CompTIA A+:

Computer Hardware: http://www.mediafire.com/download/f5013b98tc40fj8/CompTIA+A%2B+Part+1%3B+Computer+Hardware.rar
Networking: http://www.mediafire.com/download/38q520p66a5a68q/CompTIA+A%2B+Part+2%3B+Networking.rar
Peripherals & Best Practices: http://www.mediafire.com/download/psmkodtkcy440rz/CompTIA+A%2B+Part+3%3B+Peripherals+and+best+practices.rar
Operating Systems: http://www.mediafire.com/download/mi3mvleyyd8ayu4/CompTIA+A%2B+Part+4%3B+Operating+Systems.rar
Mobile Devices & Troubleshooting: http://www.mediafire.com/download/5scd91h4gkaefoa/CompTIA+A%2B+Part+5%3B+Mobile+Devices+and+Troubleshooting.rar

Leak 7 | CompTIA Security+:

Network & Domain Security: http://www.mediafire.com/download/wbdho927tnl1p26/CompTIA+Security%2B.rar
Network Architecture: http://www.mediafire.com/download/2j9vbybrqab3x5q/Network+Architecture+for+CompTIA+Network%2B.rar
Network Operations: http://www.mediafire.com/download/y65xsb8n6rfdcp8/Network+Operations+for+CompTIA+Network%2B.rar
Network Security 2: http://www.mediafire.com/download/d4qdr3jwh337033/Network+Security+for+CompTIA+Network%2B.rar

Leak 8 | Linux:

Linux Installation and Initial Configuration: http://www.mediafire.com/download/xxz33o4tq1obpzk/Linux+Installation+and+Initial+Configuration.rar
Introduction to the Bash Shell: http://www.mediafire.com/download/i24oogco4ch9ma4/Introduction+to+the+Bash+Shell.rar
Shell Scripting with Bash: http://www.mediafire.com/download/t5eha9cr4eckayb/Shell+Scripting+with+Bash.rar
Linux Command Line Interface Fundamentals: http://www.mediafire.com/download/27hfeldyqrs2ae8/Linux+Command+Line+Interface+%28CLI%29+Fundamentals.rar

Leak 9 | Video Editing:

Adobe Premiere Pro CC Fundamentals: http://www.mediafire.com/download/6pn0jr7nlb7rmc0/Adobe+Premiere+Pro+CC+Fundamentals.rar
Animation and Video Editing in Photoshop: http://www.mediafire.com/download/ys44ptebw6tk4o8/Animation+and+Video+Editing+in+Photoshop+CS6.rar
Color Correction and Grading in Adobe Premiere Pro and SpeedGrade: http://www.mediafire.com/download/evuudd9t6dtc3ej/Color+Correction+and+Grading+in+Adobe+Premiere+Pro+and+SpeedGrade.rar
Action Scene Editing Techniques in Adobe Premiere Pro: http://www.mediafire.com/download/0gu7x007mpaclwd/Action+Scene+Editing+Techniques+in+Adobe+Premiere+Pro.rar
Adobe Premiere Pro CS6 Setup (Software Itself, Not A Course): http://www.mediafire.com/download/u6dko8ug5ysbrw2/Adobe+Premiere+Pro+CS6.rar

Leak 10 | Miscellaneous:

Clean Code: http://www.mediafire.com/download/6ny3ybv2ojzr6vt/Clean+Code.rar
Test Driven Development with Brad Wilson: http://www.mediafire.com/download/cc6ibqxbhdcivea/TDD+with+Brad+Wilson.rar
The Fundamentals of Scrum Methodology: http://www.mediafire.com/download/cp8w28mcl1258o4/ScrumFundamentals.rar
Building A Successful Blog: http://www.mediafire.com/download/0u690ecz1q8lj1k/1.+Building+a+successful+blog.rar
Building A High Traffic Profitable Blog: http://www.mediafire.com/download/653jtq5261zuapx/2.+Building+a+High+Traffic%2C+Profitable+Blog.rar
Fiddler: http://www.mediafire.com/download/xvgjnq2ispauz3v/Fiddler.rar

Leak 11 | Other Resources:

Hacking PDF’s Extracted from repository.root-me.org: http://www.mediafire.com/download/0i9b46gjcqzr2jc/root-me-docs.rar
Alternative Cloud Services: http://github.com/juandecarrion/awesome-self-hosted

Image may contain: night and text