[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord


File: 1608526080361-0.png ( 58.33 KB , 1200x1200 , hacktivism.png )

File: 1608526080361-1.pdf ( 307.87 KB , rs1.pdf )

 No.2934

pdf on left wing hacktivism
>>

 No.2935

File: 1608526080518.png ( 9.66 KB , 708x787 , swarm.png )

>>

 No.2936

tankie larping without any connection to reality
>>

 No.2940

>>2936
>tankie
most hacktivism is actually anarchist, anon
>>

 No.2941

>>2940
RedHack?
>>

 No.2942

>>2941
exception. go look at lainchan or w/e its all anarcho transhumanists
>>

 No.2943

CEH v10 full course
https://www.youtube.com/watch?v=4DQtZo3RAO0

Practical hacking course
https://www.youtube.com/watch?v=3Kq1MIfTWCE

Pastebin hackback guides
https://www.exploit-db.com/papers/41913 &lt– A DIY Guide for those without the patience to wait for whistleblowers
https://www.exploit-db.com/papers/41915 &lt– hackback A DIY Guide
https://www.exploit-db.com/papers/47682 &lt– A DIY guide to rob banks

Training grounds for first timers
https://pentesterlab.com/bootcamp &lt– web hacking and training guide
https://tryhackme.com &lt– beginner hacking courses alot free some paid, alot of handholding
https://www.hackthebox.eu/ &lt– have to hack your way in ( you can google a walkthough, boxes ranging from easy to hard 10 free boxes a week all retired boxes and networks are pay to hack
https://www.vulnhub.com/ &lt– all free download a vm to put in personal lab

If you want any more resources or idea's let me know, I'll post more.
>>

 No.2951

>>2943
good post.
>>

 No.2977

>>2943
very good post.
>>

 No.3001

Has anyone done anything worked on any projects to get better?
>>

 No.3014

>>2942
Can confirm. A lot more hacktivists (or at least skiddies) are more post-left illegalism types than MLs. But then, that's a gross generalization too, I'm sure there's a few great tankie haxxors.
>>

 No.3026

>>2943
I can't even code with Python, is there even a point me trying to learn this stuff for counter-awareness (as in, I can't do it per se, but can recognise when it's being done to me and/or take precautions against)?
>>

 No.3028

>>3026
sure.
>>

 No.3029

File: 1608526088932.png ( 3.28 MB , 1000x1822 , 2020-07-06 13-03-10 2.png )

>>3026
No. There's nothing useful to learn from the details of these attacks unless you are actually a programmer writing code (or the wannabe attacker).

If you are an "average" user you should instead
1) install GNU/Linux and never touch Windows ever again,
2) install Firefox and never browse the web without an ad-blocker ever again,
3) keep your software up-to-date,
4) separate your online identities (don't reuse passwords, etc.)
5) learn how to recognize phishing,
6) don't visit shady websites and download random shit.

If you are more of a sysadmin, you can start looking into "hardening" GNU/Linux and proper network administration. Even then I don't think knowing the attacks themselves is much help in defending against them.

Of course if you are just interested in it, go on and learn it.
>>

 No.3032

>>3028
>sure.
>>3029
>No.

fuck.
>>

 No.3167

>>3032
If you want to learn it, just learn it. You don't have to justify it.
>>

 No.3170

>>3026
You don't need to be a expert coder, im sure not. that being said the pratical hacking course assumes just basic computer usage and is a good beginner guide.

If I had to pick between being a good sysadmin, or a good programmer. The sysadmin is a better background. Knowing how to build systems and how they work together is more important. especially how windows servers works, 90% of corporate systems are windows.

>>3029
I disagree far from it, knowing how attackers attack is essential for understanding how to harden, and knowing how to defend is important on how to attack and bypass security systems.


Fundamentally computer security ( or anything really) the most important part is getting started any bit of studying is better than none.
>>

 No.3171

>>3170
It doesn't really, knowing how to do a ROP attack in no way helps you in turning on ASLR. For a regular user there's very little to gain from understanding the technical details of these attacks.
>>

 No.3256

>>3171
for a regular user the nitty gritty isn't that important, but knowing how it works you can put settings on your system, my post was more trying to encourage >>3026 to start trying and start learning.
>>

 No.3702

Has anyone practice in their personal lab yet?
>>

 No.4278

bump
>>

 No.4329

>>2934
Did whomever made that pdf do it in Hawaii?

>>3702
Been getting back into it yes
>>

 No.4336

>>4329
Nice, I've been trying to get back into it for awhile. Anything in specifically or general pentesting.
>>

 No.4339

>>4336
Been going back and trying to learn sql injection by hand, I know there's sqlmap just would like to know how to do it rather than just spamming a database.

what have you been doing?
>>

 No.4393

>>4339
playing with macro malware and av bypassing.
>>

 No.4431

>>4329
>Did whomever made that pdf do it in Hawaii?
what makes you think that
>>

 No.4437

Mods this autist is back. Thanks for the swift clean up last time &lt3
>>

 No.4468

>>4431
The timezone of it's creation was UTC-10
>>

 No.4489

What's a good tool for anonymization of document files?
>>

 No.4495

Does Bunkerchan have a canary set up, btw?
also are the passwords for deletion salted and hashed so they can't be used to identify different posts? with, for example, the post timestamp or post humber?
>>

 No.4496

>>2943

Would you consider running a Leftypol course on how to hack?
Kind of like a book club, but more focused around hacking?

I know how to pirate books, but that's really just using software thats readily available. I want to learn how to get past paywalls, hack into emails etc
>>

 No.4498

>>4496
I could do some blog posting about specific topics, but as for a club prob not, my work schedule is all over the place, almost always if you're interested in a specific topic their is a blog about it for free.
>>

 No.4513

>>4498

Do some blog posting then.
As a priority for me it's:

1) Getting past paywalls, specifically things like the Economist, Financial Times, Jacobin, Catalyst, New Left Review and Tribune.
2) How to hack into individual email accounts.
3) How to not get caught and improve my security. Cause I know nothing about that
>>

 No.4523

>>4495
>Does Bunkerchan have a canary set up, btw?
no and that would be a good idea
>>

 No.4528

WATCH OUT FOR ANONYMOUS
HE DOES NOT FORGIVE
>>

 No.4543

HE DOES NOT FORGET
>>

 No.4557

File: 1608526243748.png ( 730.45 KB , 1366x768 , Screenshot_3.png )

>>3001
you could alway start with something simple like XSS Hunter
>>

 No.4565

>>4513
>1) Getting past paywalls, specifically things like the Economist, Financial Times, Jacobin, Catalyst, New Left Review and Tribune.
https://www.online-tech-tips.com/computer-tips/12-ways-to-get-past-a-paywall/

2) How to hack into individual email accounts.
https://www.phishing.org/phishing-techniques
https://getgophish.com/

3) How to not get caught and improve my security. Cause I know nothing about that
https://ssd.eff.org/en/module/your-security-plan
>>

 No.4576

>>4513
>script/cookie blocker
some of those Demsucc sites require credential login, so those typical measures for evasion are quite difficult.

>don't do illegal, petty acts

don't give the feds a stupid excuse.

>the >>4565 linked resource is good, even if libby bunch.
>>

 No.4578

>>2943
If anyone is keeping this post for copypasta it would be worth adding:

https://theanarchistlibrary.org/library/anonymous-novelty-of-an-overloaded-transformer &lt– Hacking The System as The Nihilist Approach to Uncaptured Insurrection
>>

 No.4579

File: 1608526246424.jpg ( 413.07 KB , 1491x1136 , htz1.jpg )

>>3170
>90% of corporate systems are windows.
Outside of client machines i have not seen this to be true in my personal experience.

>>3702
>Has anyone practice in their personal lab yet?
It is hard to emulate real world and most vms dont do it well. The only way to really practice is in the wild, anon.

>>4339
>I know there's sqlmap just would like to know how to do it rather than just spamming a database.
Big tip is to turn on verbose mode in sqlmap to easily see what is sending. this helps with types of attacks you not used to and lets be real most sqli still out there is rare your standard in-band basic-bitch vulns anymore.

>>4339
>playing with macro malware and av bypassing.
What tools are you using, anon? And do you care to tell us of your successes? I have not used a windows desktop in a long long time and it is my barrier to doing this.

>>4489
>What's a good tool for anonymization of document files?
exiftool for exif data scrubbing but this entirely depends on your use-case and threat level.

>>4496
>Would you consider running a Leftypol course on how to hack?
>Kind of like a book club, but more focused around hacking?
Not OP but i would potentially be interested in helping do with this. Keyword: Potentially.

>>4329
Did whomever made that pdf do it in Hawaii?
Big Keks.
>>

 No.4643

>>4579
>What tools are you using, anon? And do you care to tell us of your successes? I have not used a windows desktop in a long long time and it is my barrier to doing this.

Luckystrike and Malicious macro msbuild are decent tools to play around with, but get picked up by AV so modifying them, even with some junk code help get past av
https://www.blackhatethicalhacking.com/tools/malicious-macro-msbuild
https://github.com/curi0usJack/luckystrike

If you need a windows env to test on you can try using virtualbox or any other hypervisor

updated and legacy verisons of windows
https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/

developer machine and environment, for compiling malware and other tools.
https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/

server 2019 domain, to put this all together
https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2019

just use the free trials, you can reinstall or use a snapshot before first boot to revert back if you're lazy. Since 90% of business use active directory knowing both how it works and common misconfiguration is important for exploiting networks.

p.s. make sure to go into settings and turn windows defenders auto sample submission off.
>>

 No.4704

File: 1608526260148.jpg ( 543.99 KB , 576x776 , cybercom.jpg )

The Open Source Degree/Reading List in CyberSecurity

This is a reading list of books, based on the syllabuses of two degrees. You can get 80%+ of the value of a degree simply by downloading the syllabus and reading the required textbook. The next 20% is practical/labs work which you can do on your own through practical experience. Both source degrees are “National Centers of Academic Excellence” approved by the NSA, so your knowledge will at least be as much as an average glow in the dark. Gen Ed’s and any courses related to pure math, management, risk compliance etc are skipped since they are irrelevant.

Get all PDFs from libgen and other sources.

Baby Tier Knowledge

- CSEC 101: Intro to Python – Introductory Programming with python. Every hacker should know at least basic coding. BOOK: Guttag, John. Introduction to Computation and Programming Using Python: With Application to Understanding Data Second Edition. MIT Press, 2016. ISBN: 9780262529624. You can substitute any of the dozens of books and or tutorials and or online courses on Python programming (or the basics of any common language).
https://www.youtube.com/playlist?list=PLRJdqdXieSHN0U9AdnmwD-9QcR9hmw04d

- CSEC 102: Intro to Databases – Basic SQL programming, for use on relational SQL database systems. BOOK: Sams Teach Yourself in SQL in 10 Minutes (Fourth Edition) ISBN: 0672336073. Tons of resources to go with this, such as Stanford’s introductory course on databases. https://www.youtube.com/playlist?list=PLroEs25KGvwzmvIxYHRhoGTz9w8LeXek0

- CSEC 103: Intro to Computer Networks – Basic Computer Networking. BOOK: CompTIA Network+ Study Guide (latest edition). Youtube tutorial: Professor Messer’s Network+ Training Course https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd

- CSEC 104: Intro to Operating Systems/Linux – Basic Linux Knowledge. BOOK: LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-400 and Exam 102-400 by Christine Bresnahan or CompTIA Linux+ Study Guide. Also Helpful: Linux Bible 10th Edition by Christopher Negus, Christine Bresnahan.

You should also be familiar with virtual machines at this point, using software like virtual box, and installing/using linux.

CSEC 105: Intro to Security. Obviously there should be basic knowledge of security. BOOK: CompTIA Security+ Study Guide. Youtube Tutorial: https://www.youtube.com/playlist?list=PLG49S3nxzAnnVhoAaL4B6aMFDQ8_gdxAy

Dimwit Tier Knowledge

- CSEC 200: Secure Programming

“Threat Modeling, Designing for Security” by Adam Shostack

- CSEC 201: Introduction to Proactive System Security

Certified Ethical Hacker (CEH) Cert Guide (latest)
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide (latest)

- CSEC 202: Digital Forensics

Guide to Computer Forensics and Investigations, Processing Digital Evidence by Bill Nelson, Amelia Phillips, and Chris Steuart Paperback: 752 pages, Publisher: Course Technology; 5 edition (January 15, 2015)ISBN-10: 1285060032, ISBN-13: 978-1285060033

- CSEC 203: Information Security Engineering

Harris, S. (2012). CISSP All In One Exam Guide (6th ed.).

- CSEC 204: Modern Cyber Conflicts

Andress, J., & Winterfeld, Steve (2011). Cyber Warfare Technique: Tactics and Tools for Security Practitioners.
Healey, Jason (2013). A fierce Domain: Conflict in Cyberspace, 1986 to 2012

Midwit Tier Knowledge

- CSEC 300: Intermediate Networks

Data Communications and Networking 5th Edition by Behrouz A. Forouzan
CCNA Routing and Switching Complete Study Guide, Todd Lammle, Sybex, 2016, ISBN 978- 1119288282

- CSEC 301: Network Security

CCNA Security Official Cert Guide (latest)
LAN Switch Security – What Hackers Know About Your Switches by Eric Vyncke and Christopher Paggen
Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel and David J. Smith

- CSEC 302: Intermediate Offensive Security

Engegretson, P. (2013). The Basics of Hacking and Penetration Testing (Second ed.).
Clark, B. (2013). RTFM: Red Team Field Manual (this is more of a cheat sheet/reference)
Simpson, M. T., Backman, K., & Corley, J. E. (2011). Hands-on Ethical Hacking and Network Defense (Second ed.)
Skoudis, E., & Liston, T. (2006). Counter Hack Reloaded (Second ed.)

I skipped some books on cyber-physical systems security (SCADA hacking). Please LMK if I missed anything. Also please try to use the latest available edition of any given book, if it's higher than what is stated there.
>>

 No.4712

>>4643
I only have a meh thinkpad, not currently the resources for running hypervisor. thx tho. :)


Anons do you want to make a infosec collective?
I am thinking a cross between like old school #leftsec on i2p and 200X hackbloc?
>>

 No.4713

>>4712
>I only have a meh thinkpad
Based
>>

 No.4714

>>4704
- CSEC 101: Intro to Python – Introductory Programming with python. Every hacker should know at least basic coding. BOOK: Guttag, John. Introduction to Computation and Programming Using Python: With Application to Understanding Data Second Edition. MIT Press, 2016. ISBN: 9780262529624. You can substitute any of the dozens of books and or tutorials and or online courses on Python programming (or the basics of any common language).
https://www.youtube.com/playlist?list=PLRJdqdXieSHN0U9AdnmwD-9QcR9hmw04d

- CSEC 102: Intro to Databases – Basic SQL programming, for use on relational SQL database systems. BOOK: Sams Teach Yourself in SQL in 10 Minutes (Fourth Edition) ISBN: 0672336073. Tons of resources to go with this, such as Stanford’s introductory course on databases. https://www.youtube.com/playlist?list=PLroEs25KGvwzmvIxYHRhoGTz9w8LeXek0

- CSEC 103: Intro to Computer Networks – Basic Computer Networking. BOOK: CompTIA Network+ Study Guide (latest edition). Youtube tutorial: Professor Messer’s Network+ Training Course https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd

- CSEC 104: Intro to Operating Systems/Linux – Basic Linux Knowledge. BOOK: LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-400 and Exam 102-400 by Christine Bresnahan or CompTIA Linux+ Study Guide. Also Helpful: Linux Bible 10th Edition by Christopher Negus, Christine Bresnahan.

You should also be familiar with virtual machines at this point, using software like virtual box, and installing/using linux.

CSEC 105: Intro to Security. Obviously there should be basic knowledge of security. BOOK: CompTIA Security+ Study Guide. Youtube Tutorial: https://www.youtube.com/playlist?list=PLG49S3nxzAnnVhoAaL4B6aMFDQ8_gdxAy


>“Threat Modeling, Designing for Security” by Adam Shostack

http://libgen.rs/book/index.php?md5=D45FAEFD50B7072B97628A32B63EBCAB

>Guide to Computer Forensics and Investigations, Processing Digital Evidence by Bill Nelson, Amelia Phillips, and Chris Steuart Paperback: 752 pages, Publisher: Course Technology; 5 edition (January 15, 2015)ISBN-10: 1285060032, ISBN-13: 978-1285060033

http://libgen.rs/book/index.php?md5=C3447CB408D570CD68054A7E5E20E7B8

>Harris, S. (2012). CISSP All In One Exam Guide (6th ed.).

http://libgen.rs/book/index.php?md5=9586B84A970FC181E3209D765787B9C2
[8th ed]

>Andress, J., & Winterfeld, Steve (2011). Cyber Warfare Technique: Tactics and Tools for Security Practitioners.

Healey, Jason (2013). A fierce Domain: Conflict in Cyberspace, 1986 to 2012
???

>Data Communications and Networking 5th Edition by Behrouz A. Forouzan

http://libgen.rs/book/index.php?md5=F90841D02431AF5010FB9CEA31665E4E [4th]

>CCNA Routing and Switching Complete Study Guide, Todd Lammle, Sybex, 2016, ISBN 978- 1119288282

http://libgen.rs/book/index.php?md5=55C5C9D3F3DED4413FB59B22CBF7EB47

>CCNA Security Official Cert Guide (latest)

http://libgen.rs/book/index.php?md5=A5863B64330931EFD2BD21A5A92D764F [2015]

>LAN Switch Security – What Hackers Know About Your Switches by Eric Vyncke and Christopher Paggen

http://libgen.rs/book/index.php?md5=81C735356FD4267FE269B578F3CB93BB

>Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel and David J. Smith

http://libgen.rs/book/index.php?md5=70B8B62F1E07DAD41D14A4A906B6F60F

>Engegretson, P. (2013). The Basics of Hacking and Penetration Testing (Second ed.).

???

>Clark, B. (2013). RTFM: Red Team Field Manual (this is more of a cheat sheet/reference)

http://libgen.rs/book/index.php?md5=51E0448CE4F9757F6939D74508BFEE6D

>Simpson, M. T., Backman, K., & Corley, J. E. (2011). Hands-on Ethical Hacking and Network Defense (Second ed.)

http://libgen.rs/book/index.php?md5=CB0AA1E04C92DA05A1FD36A2CEE816C3 [3rd]

>Skoudis, E., & Liston, T. (2006). Counter Hack Reloaded (Second ed.)

http://libgen.rs/book/index.php?md5=E86552E60B0708BAB56C0AD6C790152B
>>

 No.4717

>>4714
>Engegretson, P. (2013). The Basics of Hacking and Penetration Testing

this is that

http://libgen.rs/book/index.php?md5=F9EDC62C559F1C3D610348C55157A969
>>

 No.4718

>>4714
also this:
http://libgen.rs/book/index.php?md5=3A1A8BEEB074DF75F7F577D54B5719F0

is
>Andress, J., & Winterfeld, Steve (2011). Cyber Warfare Technique: Tactics and Tools for Security Practitioners.
>>

 No.4719

>>4714
>Healey, Jason (2013). A fierce Domain: Conflict in Cyberspace, 1986 to 2012
PDF request for this, book details the history of cyber warfare. Hard to find pdf
>>

 No.4720

also request tutorial, pdf, or youtube tut on how to make a cyber range/pen testing lab
>>

 No.4721

>>

 No.4730

>>4720
local lab
https://resources.infosecinstitute.com/how-to-make-your-own-penetration-testing-lab/

remote lab ( other lab )
https://www.hackthebox.eu/
https://tryhackme.com/
https://www.cyberseclabs.co.uk/

There was this big russian lab, like an actual AD network with 11 machines you had to piviot, if I can find it ill post it

I also recommend looking at walkthoughs of machines and taking notes if your a beginner and still learning, that's what I've been doing.
>>

 No.4778

Why is this guy so based?!

>DEF CON Safe Mode - Christopher Wade - Beyond Root

https://youtu.be/aLe-xW-Ws4c?list=PL9fPq3eQfaaBk9DFnyJRpxPi8Lz1n7cFv
>>

 No.5113

>>2934
Are botnets communism
?
>>

 No.5115

>>4730
Skid shit, do CTFS and find/exploit n-days (not just downloading from metasploit)
By far the best ctf wargame for linux systems: https://pwnable.tw/
More newbie friendly game: https://www.microcorruption.com

Project Zero is an amazing resource as well for finding targets you may be interested in attacking: https://googleprojectzero.blogspot.com/
https://bugs.chromium.org/p/project-zero/issues/list
>>

 No.5116

>>5115
Also word of warning that every public target in the last ten years has become FUCKING HARD to exploit
>>

 No.5670

bump
>>

 No.5671

>>5115
>Skid shit,
bs. your little games are as skiddy as ops little games.
Learn in the wild or gtfo.
>>

 No.5853

>>2943
>CEH v10 full course
https://www.youtube.com/watch?v=4DQtZo3RAO0
been following this course and it's decent
>>

 No.5854

>>4576
>>2943
>>2934
This entire thread is gay and OP is a giant faggot for posting it. I might even go as far as to say he is a fedposter.
In fact, this hacktivist shit is retarded fedposting. Look at all the shit Jeremy Hammond put himself through, and also Snowden, Manning and Assange. Anyone worth their salt knew about mass NSA surveillance that they exposed LONG BEFORE official documents were published/leaked. Look up Jam ECHELON Day ffs. You want to feed more young impressionable college students into the criminal-justice meatgrinder? Literal professional spies have been caught, and you think you will do better?
What happened to Hammond was him literally asking for it: He has a track record of being a retarded smashie since the early 2000s, and Lulzsec/Antisec were running on publicly accessible IRC servers WITH NO AUTHENTICATION OR ANY VETTING. They also let in fucked-in-the-head megalomaniacs like Laurelai Bailey who posted dox on the entire crew, and consequently Sabu turned snitch, with Hammond getting ten years, and Commander X going innawoods in Canada. Smashie shit has no long-term perspective, and they literally just spent themselves like retarded coomers. Wasted lives all around that chapter.
Assange's involvement with Manning was retarded but important enough to expose the plans of the globalist neoliberals with the diplomatic cables. Snowden was just the cherry on top concerning the NSA/Military/Industrial/Contracting complex. Insofar as he redpilled normies on surveillance, most of those fuckers don't really care, and just get on with their lives and consoom more product off Amazon and happily trade their security and lives in for immediate convenience. All their lives, effort and skills wasted.
>So what am I supposed to do?
Two words: "something constructive"
Your job should be learning how choose the right characteristics of computer and how to harden your computer against access by corporate and state actors, and then apply them religiously. The various /g/ boards have info on how to do this, as well as any jinteki.industries mirror and especially this guy:
https://digdeeper.neocities.org/
https://digdeeper.neocities.org/ghost/botnet.html
and this guy:
http://tripcodeq7.xyz/8/8.html
and his youtube channel.
This means an old-model 2005-2012 thinkpad (not all will work, do pay attention) and learning how Linux works, from basic utils to the kernel. Learn to use it from the shell, and how to access system calls. Then basic webdev/scripting to understand web vulnerabilites and then learn how to flash its bios to eliminate the IME/hardware whitelists. This will enable you to use whatever wifi adapter you want to deal with hardware fingerprinting.
IMO don't even begin unless you have at least 3-4 trannybooted xx00-series thinkpads with either gentoo, trisquel, arch or heads, and know how to flash new MAC addresses and know how to use aircrack-ng/airsnort and know basic tradecraft. None of you are Snowden, and are out of your respective depths compared to him, and he had intelligence training.
The next thing to do is learning how to use and build/maintain encrypted infrastructure like the original cypherpunks.
This means religious use and in-depth knowledge of public-key encryption, PGP encryption of mailing, rolling your own proxy, Tor, i2p, the works, and also making sure that you are changing your browsing habits. This means no "fun" on those laptops, either: packet inspection to browsing habits are easy fingerprints, and I can assure you that any person who has accessed torproject.org, a chan, or a booru EVER is on a list. That means YOU right now. This is your fair warning: never mix business and pleasure, so you don't get doxed or framed. The FBI is the biggest purveyor of cp for a reason.
Then the next thing to do is to make sure that your work that you are doing is positive: you should be figuring out how to build computer networks for rural areas and co-ops using AX.25 packet radio for starters, and even using SDR modules to build computer network nodes and links that are beyond corporate control. The point is to build usable people-based alternatives to corporate-owned and administrated technology so that you are no longer beholden to them. Once you can find an ISP that can peer with you, you can create dead zones in the corporate surveillance network. Then you go out and evangelize this to people who also would like this: there are plenty of old curmudgeonly paranoid boomers who would like to join this if given the chance.
The point is to have a constructive program towards a usable alternative to capitalism, not merely sabotage it. Hacktivism doesn't do that, and in light of recent events, it is a fool's errand.
>>

 No.5856

>>5854
>and then apply them religiously
This is where I fuck up, but doing anything at all to stop exposing myself to the botnet is better than nothing… right?
>>

 No.5857

>>2934
>>5856
>doing anything at all to stop exposing myself to the botnet is better than nothing
Either do it all or don't bother. This means a totally libre software stack from bios to apps, connecting to the internet through a VPN that accepts crypto, preferably Monero. Also, you will have to connect from somewhere that isn't connected to a surveilled isp that has your name on it, preferably from some chain restaurant or public library. In a pinch, an ethernet hardline will work from your university if they still haven't removed that yet, but that is pushing it. They mostly omit auth on that, but you don't want to be anywhere near that when they come to call.
>>

 No.5858

>>5857
>connecting to the internet through a VPN that accepts crypto, preferably Monero
Is this really necessary? VPNs can't be trusted more or less than ISPs.
>>

 No.5859

>>5857
>>5854
>you either use a modern intel cpu with windows and google chrome or a librebooted old computer with tails and tor browser through a no logs(tm) vpn, absolutely no in betweens
come on now
>>

 No.5874

>>5859
>>5858
>Is this really necessary? VPNs can't be trusted more or less than ISPs.
That is why you build your own lol. I'll leave how to do so up to your own imagination. The one clue I will give you is this: learn how to set up diy reverse tunnels and use sbcs, and also learn how to use different radio technologies.
>>5859
>come on now
Either go big or go home
>>

 No.5875

>>5874
>Either go big or go home
I agree but not everyone can do this, sadly.
>>

 No.6025

>>5859
VPNs are retarded for hacking. use tor and your own proxies.
>>

 No.6026

>>5116
False.

>>5854
Ignore this fed.
>>

 No.6027

>>5875
>I agree but not everyone can do this, sadly.
Why? Cam only learn!
>>

 No.6030

>>5115
What kinda programming knowledge/languages do you need to play these games? Do you use python for them or something?
>>

 No.6101

>>5858
>>6026
>Ignore this fed.
Lol at this smashie. Enjoy getting tortured at some CIA blacksite to expose shit that we already know you retard.
>>

 No.6141

>>6030
Nah, you're usually just running tools and simple bash commands.

>>6101
Except i aint gon to jail yet no matter how many times my doors been kicked in, so do fuck off, armchair.
>>

 No.6144

>>6141
>Except i aint gon to jail yet no matter how many times my doors been kicked in, so do fuck off, armchair.
Suicidal motherfucker, ain't you? Go larp as Johnny Silverhand somewhere else.
>>

 No.6153

>>6144
Why isn't PhinPhisher in jail? why aint the thousands of carder kids in jail? why aint the kids rootin boxes for lulz in jail? you are delusional or you glow.
>>

 No.6159

>>6153
Since they are not Bunkerchan users, they can actually use their brains.
>>

 No.6214

>>6153
whonix, opsec, actual skill.
>>

 No.6220

>>6153
>Why isn't PhinPhisher in jail? why aint the thousands of carder kids in jail? why aint the kids rootin boxes for lulz in jail? you are delusional or you glow.
This isn't the point. There are enough both political and technological solutions to neutralize you:
https://crimethinc.com/2018/06/05/hackback-talking-with-phineas-fisher-hacking-as-direct-action-against-the-surveillance-state
>In May 2016, after watching the documentary “Ciutat Morta,” Phineas thought about trying a simple attack on the Catalan Police Forces. Ciutat Morta is a film about the 4F case, a famous case in the history of the Spanish state in which repressive forces tortured and imprisoned several young people from South America as an act of revenge after a policeman was put into a coma by the impact of a stone following a police charge in downtown Barcelona.

>As a result of this new hacking action, using a well-known vulnerability, Phineas defaced the website of the union of the Catalan police with an ironic manifesto declaring that the organization “was refounded as a union in favor of human rights.” A data dump with personal details of some 5000 police accounts appeared, along with a 40-minute video tutorial on the techniques used in the hack.


>Shortly afterwards, the police carried out several raids on social centers and hacklabs in Barcelona, then claimed to have caught the famous hacker. Only hours later, journalists reported that the same person had contacted them to say that “he was alive and well” and that the police forces had only imprisoned a scapegoat who happened to have retweeted the info in the dumps.

The point isn't that he wasn't arrested and still tweeting. The point is, nobody knows who he truly was, and that because of this, the police could say they got him and that it is only a copycat or confederate tweeting. In the meantime, the arrestee is held in indefinite pre-trial detention in the vein of Assange until he gives up and agrees to confess that he did it or get his friends framed or some other shit. Phineas is free only because some other idiot is taking the heat for him, and terrorism and pedoshit will get anything justified nowadays. You are a faggot who simply wants to provoke police terrorism and get kids fed to cops.
Also
>rooting boxes for lulz
Don't think for a second that they haven't been trapped and tagged. Who's to say that your VPN isn't feeding your traffic on the side to the NSA? The FSB? The PLA? or the Mossad? You can also forget about using the Tor network, either as a user or as a host: The Naval Research Laboratory has documented a structural vulnerability to the tor, the "Sniper Attack":
http://www.nrl.navy.mil/itd/chacs/biblio/sniper-attack-anonymously-deanonymizing-and-disabling-tor-network
Further info from Nachash's 2600 article:
https://rmusser.net/docs/Rants&Writeups/Opsec_rant2-nachash.html
Nobody's becoming your idiot martyr here.
>>

 No.6224

>>6220
So we shouldn't do anything because the corps and the State are going to use someone else as a meat shield? This is cuck reasoning, same garbage you see some idiots bring up when the topic is stuff like looting, shoplifting, or even regular rioting.
>>

 No.6246

>>6224
You can do far more outside of prison than inside it.
Also
>cuck reasoning
How stupid do you think we are? You have no power here.
>>

 No.6249

>>6246
Just don't get caught. :^)
>>

 No.6346

bump
>>

 No.6373

>>6220
if you are using vpn or tor, no rank and file nsa agent is going to be following you.
you must have already done something other than posting online or shoplifting for the feds to bother enough to pay someone to track you, specifically
>>

 No.6426

>>6220
im not clicking on that .mil link

TOR deanonymization is high effort and would probably take the NSA 1-2 months even with extreme motivation to get someone like Osama or w/e. doubt the skids have anything to worry about
>>

 No.6427

>>6220
plus the "sniper attack" is literally just ddosing tor exit nodes you don't own so theres a higher chance of directing to nodes you do own. again, this isnt reliable and also it requires you to degrade the performance of the whole tor network
>>

 No.6985

bump
>>

 No.8442

bump
>>

 No.9512

>>4719
this looks interesting
>>

 No.9559

>>3029
mike is gay
>>

 No.9597

>>6427
It also implies that the person your trying to identify isn't using ssl.
>>

 No.9600

>>9559
No U
>>

 No.9655

>>9600
What's everyone's opinion on kirtaner going full anarcho-hackerman and hacking myanmar, parlor, etc.
https://www.youtube.com/channel/UC-igeMJ4Azc1HgRqeK4Rn-Q
>>

 No.9666

>>9655
who ?
>>

 No.9835

>>9666
admin of 420chan and one of the original og anon's during chanology.
>>

 No.9841

>>9655
based and red
>>

 No.10442

>>9655
based

Unique IPs: 14

[Return][Catalog][Top][Home][Post a Reply]
Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]
ReturnCatalogTopBottomHome