TeamBerserk

Anonymous [#opNewBlood - #Hacking] How To Utilize a Compromi

Apr 27th, 2013
445
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 4.46 KB | None | 0 0
  1. /====================================================================================\
  2. |      _____   ___     _     __  __   ___   ___   ___   ___   ___   ___   _  __      |
  3. |     |_   _| | __|   /_\   |  \/  | | _ ) | __| | _ \ / __| | __| | _ \ | |/ /      |
  4. |       | |   | _|   / _ \  | |\/| | | _ \ | _|  |   / \__ \ | _|  |   / | ' <       |
  5. |       |_|   |___| /_/ \_\ |_|  |_| |___/ |___| |_|_\ |___/ |___| |_|_\ |_|\_\     |
  6. \====================================================================================/
  7.     | - T E A M B E R S E R K -
  8.     | Corporations, Governments and PsyOps Regarded as Apostles.
  9.     | Even if we painstakingly piece together something lost,
  10.     | - it doesn't mean things will ever go back to how they were.
  11.     | IRC >> IIP->127.0.0.1 6668 << Channel: #TeamBerserk
  12.     | https://www.Twitter.com/TeamBerserk
  13. --------------------------------------------------------------------------------------
  14.  
  15. /=====================================================================================\
  16. |             __ __              _   __             ____  __                __        |
  17. |          __/ // /_____  ____  / | / /__ _      __/ __ )/ /___  ____  ____/ /        |
  18. |         /_  _  __/ __ \/ __ \/  |/ / _ \ | /| / / __  / / __ \/ __ \/ __  /         |
  19. |        /_  _  __/ /_/ / /_/ / /|  /  __/ |/ |/ / /_/ / / /_/ / /_/ / /_/ /          |
  20. |         /_//_/  \____/ .___/_/ |_/\___/|__/|__/_____/_/\____/\____/\__,_/           |
  21. |                     /_/                                                             |
  22. \=====================================================================================/
  23.     | Anonymous Operation: New Blood
  24.     | Articles and Guides written by Gutts of TeamBerserk
  25.     | IRC.AnonNet.ORG - IRC.AnonOps.COM - IRC.AnonPlus.COM - IRC.AnonPlusRadio.COM
  26.     | IRC.AnonSet.COM - IRC.Cryto.NET - IRC.CyberGuerrilla.ORG - IRC.VoxAnon.SE
  27. ---------------------------------------------------------------------------------------
  28.  
  29. HashTags: #Anonymous, #opNewBlood, #opNewBlood2013, #Hacking, #DoS, #DDoS, #SQLi, #Root
  30.  
  31. [ Web Exploitation ] -> [ Denial of Service and Distributed Denial of Service Attacks ]
  32.  
  33. ============================================
  34. + Building a Strong Foundation For Hacking +
  35. ============================================
  36.  
  37. *** This is the fifth video tutorial of a series I am making for the New-Blood Hacker ***
  38.  
  39. - How to Utilize a Compromised Server Politically -
  40.  
  41. If you watched my previous video tutorials you will already know how to compromise a web server from
  42. its web application system. This tutorial will show you what you can do with such a server.
  43. In this tutorial I will be demonstrating how to utilize a web server I have compromised in a way
  44. to perform a DDoS attack on http://www.justice.gov, the reason being, members of this agency had
  45. harrassed Aaron Swartz, the god father of RSS, which in part, lead to his suicide.
  46. Why was the DoJ harrassing him ? Because he released thousands of books from MIT to the public.
  47. ---------------------------------------------------------------------------------------
  48.  
  49. (1): - Compromise a Web Server by exploiting an SQL vulnerability within it's web application.
  50. ---------------------------------------------------------------------------------------
  51.  
  52. (2): - Modify the web application by injecting a simple or advanced DDoS attack script in the
  53.       scripting language appropriate for the web application. In this case it would be javascript.
  54.     - Upload a shell into the web directory with sqlmap using --os-shell or --sql-shell and-
  55.       install netcat, back connect and force the shell to execute a DoS attack against the target.
  56. ---------------------------------------------------------------------------------------
  57.  
  58. (3): - Get people to visit the web site thereby executing the DDoS script within the web application
  59.       against the target.
  60. ---------------------------------------------------------------------------------------
  61.  
  62. (4): - Watch the target crash and lulz ensues.
  63.       Keep in mind I am only demonstrating this tactic on one web server, in order for a DoS attack
  64.       to be successful the firepower of the DoS attack needs to be greater in bandwidth than the
  65.       target. I have already arranged serveral servers for this attack.
  66. ---------------------------------------------------------------------------------------
  67.  
  68. This Tutorial ( AnonPST: https://pastebin.com/raw.php?i=6UkMc6BM )
  69. This Tutorial ( YouTube: https://www.youtube.com/watch?v=75jAtFxY5rA )
Add Comment
Please, Sign In to add comment