Rules Of This Board
Okay, let me start off by saying this is not /baphomet/
=========GENERAL RULES==========
You will not request a PA here.
You will not post a D-O-X here unless it is via the form of a Pastebin link.
I do not want to have my board derailed by your actions and potential backlash.
You will not be a skiddie here. Neophyte, okay. Skiddies, gfl.
You will not post illegal imagery here.
You will not raid this board.
You will not spam this board.
You will not post pornography here unless it is of a goth/alternative model variety and 18+ here.
This is a nihilistic board of nihilistic views. No god/devilfagging here.
Jk, be a godfag at your own peril.
No trolling. No flaming.
No baiting others here.
Come as you are.
If you do not know how to hack, and want to learn, stick around.
If you use tools 24/7, you can not hack.
If you want to cause mayhem, stick around.
=============================
And for fucks sake, use the onion.
Welcome to my board.
The mascot here is a black widow spider.
The CSS here is buggy. It will be fixed.
I do not log your actions.
I have forced anonymity.
I promise I have not put any questionable JS in the page of the board.... yet.
=============================
Only code, tutorials for hacking, some pictures, text logs, anarchy, fuckery, life-hacks, and, utter havoc-inducing threads are allowed here.
This is a board for binders, crypters, virii, anarchy, malware, Custom CSS, javascript, anonymity, security and learning.
No personal army bullshit. I won't help you pussies by raiding your former Pre-K bully if you can't raise a finger to help yourself.
=============================
NO BINDED FILES.
If I find anything to indicate a file has something binded to it by you to hurt the board community for lulz or whatever the fuck, I will fuck your holes with a tire iron. Your eye holes.
=============================
And, yes, the stylesheet is similar to /cyber/
It's my favorite and it's temporary.
First Tutorial
FOR SKIDS WHO WANT TO STOP BEING SKIDS AND BE REAL HACKERS BY Hexachromatic:
===============================================================
~ For IPs you want:
Use Fuglekos IP grabber.
Some people are smarter than you skids.
Fuglekos hosts an image.
You upload an image and give them the link to it
They'll see an image you uploaded when they click it (the link)
You get the image viwer's IP address and user agent.
This is very inconspicious and won't raise flags as a "phishing site"
Use Social Engineering. Make them (Your target) want to click the link. Convince them.
Hacking is like this,
10% not getting frustrated at failure, 10% willing to experiment and try new combos,
5% not being a tool-using skid, 25% doing work and learning, writing code,
searching for exploits, making your own tools, and 50% social engineering.
Social Engineering is key to hacking. Psychology is key. It works with getting IPs,
Getting slaves on your RAT, Phishing, Accessing systems, almost everything.
DO NOT USE:
~ Grabify
~ whatistheirip
~ Blazse.tk
~ For Skype:
Use Skypegrab for IPs & Email (Only works if they are online)
===============================================================
OSs
GET LINUX:
Fuck these fucking faggot skids who use LOIC on Windows or some web booter on MAC OS X from home
while logging into Facebook on Tor, while holding their mask
with their Totino's pizza roll grease soaked fingers in their mom's basement
thinking they are real hackers that can hack.
You are not Anonymous, You're not the leader of Anonymous, You don't speak for Anonymous.
Anonymous has no leader, Anonymous is not even a hacktivist group.
Anonymous is an idea.
An idea in the minds of many at the same time who realize it is time to act and do so.
Stop speaking for the collective as if you are a part of it if you are not there for the cause but only the reputation.
You are not a hacker because you can dox or DDOS on Windows,
You're worse than a skid on Linux using every tool
in the main menu on fuckin' Kali and I command you to stop consuming oxygen at once.
Take your leet hacks bullshit to mpgh.org and stop saying the word hack in any context.
I used SQLMap one fucking time and I make my own tools in Python and Ferret.
You want to be a hacker and not some black-hat faggot skid wannabe, Get Linux.
So funny how many black-hat wannabes are out there on Instagram, calling themselves hackers and
they don't even use Tor. They don't even know what a Nitko scan is.
You don't hear shit about them on the darknet.
Also, fuck blackhat wannabe skids that say "they're in Anonymous" to try to punk someone into fear.
Don't use some noble ideology for intimidation.
Don't call yourself a hacker when you don't even use BTC, gift cards, or Cash-only.
Don't call yourself a hacker if you have a Gmail, Yahoo, Instagram account.
Only skids brag on Instagram like most faggots claiming to be Anonymous members.
Real hackers would have psuedonymity on clearnet and NO or VERY FEW social media accounts.
True black-hat hackers stay on the darknet and use opsec so they don't get locked up.
Some good distros are:
For Black Hat & Grey Hat Hacking:
~ ParrotSec OS (Has every Kali Linux Tool and more including Cryptography & Anti-Forensics)
~ Kali Linux (#1 Skid Favorite, You're a leet haxor on Kali, especially if you install on the HDD)
~ BlackArch (Steganography tools, cryptography tools, anti-forensics)
For White Hat Hacking:
~ Slackware
~ Pentoo
~ Arch Linux
For Anonymity:
~ Ubuntu Privacy Remix (Offline Only)
~ Tails OS
~ Whonix (VM only)
To surf casually, dual-boot or to use as a secondary OS:
~ Xubuntu (has full disk encryption included)
~ Ubuntu
~ Linux Mint
KALI IS OVERRATED SKID BULLSHIT.
Do not get Windows. It is NSA backdoored to fucking hell.
You will be meeting your local federales and get to know them well if you hack on Windows.
So don't use Windows unless you use it on a VM in Virtualbox so you can
cross-platform in working with .DLLs, .EXEs, .BATs, and .VBS
================================================================
FOR LIVE USBs
Tails OS is automatically live. It can not be put on an HDD.
Whonix OS is a VM OS. It can not be put on an HDD nor a LIVE USB.
ParrotSec, Tails, BlackArch, Xubuntu, and Kali Linux can be put on live USBs
(Unless I wasn't clear, fuck Kali Linux)
To make a live USB with Persistence, you will need:
~ A fucking 8GB or 16GB Flash Drive
~ GParted
~ A terminal with root access
~ Commands
~ An .iso file for the OS of choice
~ One brain. Preferrably not scrambled.
1) Get the .iso
2) Format the USB if unclean to FAT32 in GParted. If clean skip this step.
3) Use the DD command in a root terminal to write the iso to USB.
ISO Writing Command:
dd if=/home/home/your-fucking-iso-file.iso of=/dev/sdb bs=1M
Persistence Writing:
~ Enter GParted
~ Make /dev/sdb3 partition in /dev/sdb
~ sdb3 = 3rd /sdb partition
~ make partition fat32
~ Enter the following commands below
mkfs.ext3 -L persistence /dev/sdb3
e2label /dev/sdb3 persistence
mkdir -p /mnt/my_usb
mount /dev/sdb3 /mnt/my_usb
echo "/ union" > /mnt/my_usb/persistence.conf
umount /dev/sdb3
~ Power off your device
~ Enter boot menu
~ Boot from USB
~ Select "Live With Persistence" option
Voila. You now have a live Usb that you can save files and install programs to.
Once on, Get the following plugins for Firefox/Iceweasel:
~ Adblock Plus (Blocks trackers)
~ BetterPrivacy (Autodeletes LSOs) LSOs = Flash cookies
~ HTTPS Everywhere (Encrypted browsing)
~ NoScript (No embedded JS)
~ User Agent Overrider (Protects you partially by spoofing your User Agent ***
~ Page Hacker (Good for falsifying screenshots and chats)
~ DownThemAll (Download Accelerator)
Notes ***
====================
User Agent Overrider can make your computer/browser look like another. Use it.
Socks5 proxies can help you better than HTTP proxies when carding, RATting, whatever. Use it.
Mullvad, ovpn.se, Nord, and ra4w VPN do not log at all. Use them.
If you use Tor, have good fucking opsec. Do not say anything that can be linked with you.
~~~Ex: If you like Doctor Who, never tell anyone on Tor that or make a username related to it.
So basically, while on whatever Linux distro you use:
~ Spoof your UA to Windows & IE, MAC OS X & Safari, etc.
~ Fire up Mullvad VPN and use a non-US server
~ Just to finish up, use a Socks5 web application proxy
~ Maybe use Proxychains. Maybe..
~ Clean RAM when done
And you're anonymous as fuck. Pat yourself on the back, you fucker. You deserve it.
Sites to use when on a VPN + Proxy combination to verify your opsec is good:
~ panopticlick.eff.org
~ ip-tracker.org
~ dnsleaktest.org
~ Startpage.com
~ Duckduckgo.com
~ Frozenbox.org
==================
Programs You Should Have:
~ Python
~ ollydbg
~ HTTrack
~ Reaver
~ proxychains
~ Metasploit
~ AnonSurf
~ Pandora's Box Manager
~ Audacity
~ VLC Media Player
==================
READ THIS:
The following is obsolete for info gathering for doxxing but if you want to wreak havoc,
You can send crackheads to break in the slave's house with their schematics so no evidence is viable
and you don't need to risk your ass casing the houses of the targets you want to get rekt,
or, cut their gas & electric off in sub-zero temperatures during a blizzard, or,
get their SSN and fuck up their credit score by maxing out new credit cards in their names.
I didn't write it.
===============================================================
= How To Get DETAILED Information on ANYBODY =
===============================================================
This is a publication form the dank vaults of DTS.
First of all, the primary information that you need to get are the three primary
information points that are easily available:
1] A first and last name.
2] An address.
3] A phone number.
=========================================================================
Its easy to get all this information from WWW.SWITCHBOARD.COM, just need
a name and it will tell you the phone number and address of that person.
** The information there is about 1 1/2 years old, and it doesn't list people
who are UNLISTED in the phonebook. -LamahCop #warez-waldo '96
=========================================================================
With these three you can do several things.... We shall see several of these.
1
=============================================================
= Getting plans to a house =
=============================================================
The first thing that you do to get the plans to a house, truckyard, building,
etc... is to have the correct address. The address MUST be correct otherwise
you could be looking for a house and get a twin-bedroom lesbian romper-room,
SO YOU DON'T WANT TO HAVE A WRONG ADDRESS. Next you need the person(s) full
name, this helps in aiding the finding of the building.
Next look in the white pages for the government section of the city that the
address is in and look for the title ZONING INFORMATION. This is the person(s)
that keep tabs on what land is for sale, who lives there, what type of
building(s) are there, etc... call the number and ask for a DISTRICT number and
a LAND LOT number, WRITE THESE DOWN BECAUSE THESE ARE IMPORTANT!!!!!!. Next,
give him/her the address that you are looking for, then she/he will give you a
land lot number and district number, next call the city's planning department,
give the land lot number and district number and ask what type of structure is
on that land. The person will ramble off the specification of the structure and
stuff, then ask can you pick up a copy of the plans to it, don't worry I will
give you a good aliby.
Next look in the yellowpages for a lawyer, look for one that is close to you and
go there, make up something to talk to him/her about and on your way out grab a
handfull of his/hers business cards, THESE ARE NEEDED TO GET THE PLANS.
Then go to the planning department in a shirt and tie and slacks, look like a
college intern, if they ask you why you need the plans, just say that your boss
(the lawyer) has a personal injury case and he/she needs them for evidence.
Give the person the business card if they ask for any I.D., then sit back and
relax, they are copying the plans for you.
2
============================================================
= How to get a persons utilities cut off =
============================================================
Now the first thing that you need is the magic three elements, name, address,
phone number. Then call up the utilities department and say something like
this:
OPERATOR: "This is (your city) utilities department, how may I
help you?"
YOU: "My mother/father/grandparent(s) recently died and I
need their utilities cut off".
OPERATOR: "Ok, what is her/his name?"
YOU: "(name of person) at (address of person)."
OPERATOR: "Where would you like to send the bill to?"
YOU: "Send the bill to me at (make up a name and
address)"
OPERATOR: "Ok Mr. (whatever), the utilities at (the person(s)
name) (address) will be shut off in (whatever time
they tell you) and the bill will be sent to you at
(the fake address you gave them)."
That is all there is to it.
3
============================================================
= How to get a persons medical/police/school records =
============================================================
The first thing that you need to know is where this person went to the hospital
or what police department they were at or what school they went or are going to.
Here is where you use those lawyer business cards again. Call up the hospital
or police (DON'T USE 911!!!!!) and ask for the records depatment, then tell the
name of the person and say that you are representing them in a case that is
comming up, tell them that you are sending your assistant down there to pick
them up.
For medical records, you need a medical record authorization letter, so out of
the kindness of my heart I will include one here:
MEDICAL AUTHORIZATION
TO: ALL HOSPITALS, DOCTORS, NURSES AND MEDICAL PERSONNEL:
YOU ARE HEREBY authorized and directed to permit the examination
of, and the copying of reproduction in any manner, whether mechanical,
photographic, or otherwise, by my attourney, (put attorney's name,
address here) or such other person as he may authorize, of all or any
portion desired by him of the following;
(a) Hospital records, x-rays, x-ray readings and reports, laboratory
records and reports, all test of any type, character and reports
thereof, statement of charges, and any and all of my records
pertaining to the hospitalization, history, condition, treatment,
diagnosis, prognosis, etiology or expense.
You are further authorized and directed to furnish oral and written
reports to my attorney, or his delegate, as requested by him on any of
the foregoing matters.
By reasons of the facts that such information that you have acquired as
my physician or surgeon is confidential and requested not to furnish
any of such information in any form to anyone, without written
authorization form me.
I also authorize my attorney or his delegate to photograph my person
while I am present in any hospital.
I further authorize the sending of medical and hospital bills to my
attorney, and in the event of recovery by trial or settlement to allow
my attorney to withhold an amount sufficient to cover these bills and
to make payment directly to you and to deduct the same from any recovery
which may be due me.
When you ask for the records and present the form, they will give them to you.
NOTE: for police records, use the same format but change all of the medical
stuff to relate to police records.
"Wear a full modem condom, and stay PHED free."
l8tr.......
^^ Source: ParaZite ^^
=======================
IF YOU GET MET BY THE FEDS AND THEY JUST WANNA TALK:
Say the following:
~ "I invoke and refuse to wave my fourth amendment right to resist warrantless
unlawful search and seizure."
~ "Give me your card, I'll have my lawyer call you."
~ "I invoke and refuse to waive my fifth amendment right to remain silent"
Do the following:
~ Do not consent to a search or let them in.
~ Do not open the screen door or front door if you have no screen door.
~ Talk through the window.
~ Get names, badge/personnel numbers, times and dates.
~ Film the encounter.
~ Do not buy their bullshit.
Know the following:
~ They may meet you before they get a warrant.
~ They may watch your internet traffic. Research CALEA.
~ They will tell you they can help you. They can not and will not.
~ LEOs are on the team of the state and the Prosecutor.
~ If they have no warrant, they have nothing. Give them nothing.
Tell them to get the fuck off your property.
~ Get a trial. Take no pleas unless it has time served or probation.
It's all or nothing when you get in court.
~ Some cases get dropped and evidence made unadmissible due to illegal searches.
Learn loopholes.
Destroy proof of your hacking. Encrypt your drives with LUKS + Cryptsetup
~ All it takes for you is to convince 1 juror to say not guilty.
They have to convince 12.
~ Do not talk to any LEOs. Tell them you invoke your rights,
Tell them to call your lawyer. Say nothing else.
~ Consult a Federal Criminal Defense Attorney
~ The judge is a neutral magistrate. The US justice system is adversarial. Not inquistorial.
The judge can not help your ass. Only the jury can, hence, jury of YOUR peers. Not theirs.
~ Judges can and will sign search warrants without reading them. Be wary.
~ Search Warrants are specific.
They can not search your analhole or snatch if the warrant says House.
They can not and most likely will not search a car without probable cause
unless you are charged for drugs. When they leave, if you don't get picked up.
bash out your car window and have thirty witnesses verify they searched your car
while you looked like a faggot saying "Dude, that's my car!! Stop!!!"
Case dismissed.
~ Request a FOIA on your FBI file.
~ Appeal
~ Request a copy of the search warrant.
~ A search warrant is not an arrest warrant.
~ If you are taken to the station on search day, they'll send in a network/computer
forensic analyst to examine evidence while you are being interrogated. They will fish and try
to break you. They will tell you they know you did it. This is a mind game.
~ Try to make bail. If you make bail, do not FTA, DO NOT UFTAP.
~ The law
~ Your rights
~ A public defender fails 2% more than an amateur paid attorney
~ A powerful good lawyer will get you off for the right price.
~ Feds lie, Cops lie.
~ The NSA provides them info.
~ Faggot ass IT Security firms make programs to help feds and now cops.
This software assesses threat level, your purchases, and deep web Tor searches.
EX: Beware, XKeyScore
^^This software is unfuckingconstitutional. Appeal to the Governor, the DOJ, the president.
==================================
IF THE COPS COME:
~ If a local cop shows up asking if you harassed someone online
or dropped a dox and you used good opsec, tell them to make like
Hansel and Gretel then GFL. (get fuckin' lost)
~ Tor protects from cops, not feds.
~ Encryption can make you or break you. Some encryption software is backdoored.
~ Cops have no power over you. Film them.
===================================
In General:
~ Whole cases have been thrown out because the data was obtained illegaly by the NSA
and the feds. Cops piggieback off of NSA data to arrest and harass. This is illegal.
~ Never use anything that is closed-source. Always use open-source.
~ If your mouse cursor moves and you didn't move it, you've been bugged or hacked.
~ If you're typing and the cursor moves to a point you typed before, it's a skid or a fed
who needs to get a fucking life and stop being a creeper.
~ Live in the UK or Russia
~ In hacking cases, there are no witnesses.
They must prove beyond a reasonable doubt you are guilty.
You are a banana, don't get peeled and you're fine.
====================================
There are 4 types of hacker personas:
~ The Skid:
> Loves Penis 1000%
> Uses tools made by others
> Brags excessively and tries to show off
> Uses LOIC, has an Instagram account
> Never used Tor
> Typical Job:
Teenager
Student
~ The White Hat:
> Protects faggot companies from you.
> Ethical Hackers.
> They help corrupt corporations with their security.
> They get paid for hacking.
> Typical Job:
Network Analyst
IT Security
~ The Grey Hat:
> Jack of all trades, master of none.
> Follows no one, learns from all.
> Philosophically speaking, I feel they are called grey because their path is obscure.
> Greys can protect companies, hack companies, hack companies and tell them of the vulns they have.
> Greys are helpful hackers with some degree of a moral compass.
> Grey Hats are hobby hackers. They love hacking.
> Intrigued by the unknown
> Typical Job:
Penetration Tester
Mathematicitian
Malware Analyst
~ The Black Hat:
> Hacks for personal/financial gain.
> Loves being a douche.
> Thinks everyone is a skid.
> May use a RAT at first.
> Cracks systems for lulz.
> Locks your box with Tox
> Typically condescending.
Typical Job:
Freelance Hacker
Pentester
If you loved this guide and it helped you to stop being a skid or neophyte, You're welcome.
Five terms you should all know:
Cryptography
Steganography
Counter-Forensics
Secure Erase
Anti-Stylometry
XirtaivaEmitraw a.k.a Hexachromatic