This week only. Pastebin PRO Accounts Christmas Special! Don't miss out!Want more features on Pastebin? Sign Up, it's FREE!
Guest

#OpDarknet Press Release 10/15/2011

By: a guest on Oct 15th, 2011  |  syntax: None  |  size: 7.08 KB  |  views: 3,281  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. _        __        ___                 __               _                
  2. | |     / /__     /   |  ________     / /   ___  ____  (_)___  ____      
  3. | | /| / / _ \   / /| | / ___/ _ \   / /   / _ \/ __ `/ / __ \/ __ \    
  4. | |/ |/ /  __/  / ___ |/ /  /  __/  / /___/  __/ /_/ / / /_/ / / / / _ _ _
  5. |__/|__/\___/  /_/  |_/_/   \___/  /_____/\___/\__, /_/\____/_/ /_(_|_|_)_)
  6.                                               /\_/ /
  7.                                               \ _ /                                      
  8. #OpDarknet Press Release - 10/15/2011
  9.  
  10. ------------------------
  11.    Timeline of Events
  12. ------------------------
  13. At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Hard Candy which was dedicated to links to child pornography. We then removed all links on the website, within 5 minutes the links were edited back in by an admin. For this reason, we will continue to make the Hidden Wiki unavailable.
  14. --
  15.  
  16. At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden Wiki shared a digital fingerprint with the shared hosting server at Freedom Hosting.
  17. --
  18.  
  19. At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the host of the largest collection of child pornography on the internet. We then issued a warning to remove the illegal content from their server, which they refused to do.
  20. --
  21.  
  22. At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting server of Freedom Hosting and shutdown services to all clients due to their lack of action to remove child pornography from their server.
  23. --
  24.  
  25. At apprx 5:00pm CST on October 15, 2011 Freedom Hosting installed their backups and restored services to their child pornography clients. We then issued multiple warnings to remove all child pornography from their servers, which Freedom Hosting refused to do.
  26. --
  27.  
  28. At apprx 8:00pm CST on October 15, 2011 despite new security features, we once again infiltrated the shared hosting server at Freedom Hosting and stopped service to all clients.
  29. --
  30.  
  31. ------------------------
  32.      Our Statement
  33. ------------------------
  34. The owners and operators at Freedom Hosting are openly supporting child pornography and enabling pedophiles to view innocent children, fueling their issues and putting children at risk of abduction, molestation, rape, and death.
  35.  
  36. For this, Freedom Hosting has been declared #OpDarknet Enemy Number One.
  37.  
  38. By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography.
  39.  
  40. We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography.
  41.  
  42. ------------------------
  43.       Our Demands
  44. ------------------------
  45. Our demands are simple. Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target.
  46.  
  47. ------------------------
  48.    Previous Releases
  49. ------------------------
  50. Dead Server Screenshot: http://i55.tinypic.com/vy9w7k.jpg
  51. --
  52. Death of Pedo Bear: http://pastebin.com/SPjPgFRB (First attack on Freedom Hosting)
  53. --
  54. Our Releases: http://pastebin.com/LZU7MTYE (Contains links to CP sites, irc networks, etc)
  55. --
  56. http://pastebin.com/EccyEgtN (The user data for Lolita City, one of the largest CP websites)
  57. --
  58. http://pastebin.com/j1SECHwz (Our message to the CP'ers)
  59. --
  60.  
  61.   #Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSteet | #OWS
  62.  
  63.  
  64. ~Arson~
  65.  
  66. We are Anonymous.
  67. We are Legion.
  68. We do not forgive.
  69. We do not forget.
  70. Expect us.
  71.  
  72.  
  73. -----------
  74. phpinfo() of FreedomHosting:
  75. System  FreeBSD server 8.2-RELEASE-p3 FreeBSD 8.2-RELEASE-p3 #0: Tue Sep 27 18:45:57 UTC 2011 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64
  76. Build Date      Aug 26 2011 03:00:30
  77. Configure Command       './configure' '--with-layout=GNU' '--localstatedir=/var' '--with-config-file-scan-dir=/usr/local/etc/php' '--disable-all' '--enable-libxml' '--with-libxml-dir=/usr/local' '--with-pcre-regex=/usr/local' '--with-zlib-dir=/usr' '--program-prefix=' '--disable-cgi' '--with-apxs2=/usr/local/sbin/apxs' '--with-regex=php' '--with-zend-vm=CALL' '--disable-ipv6' '--prefix=/usr/local' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-portbld-freebsd8.2'
  78. Server API      Apache 2.0 Handler
  79. Virtual Directory Support       disabled
  80. Configuration File (php.ini) Path       /usr/local/etc
  81. Loaded Configuration File       /usr/local/etc/php.ini
  82. Scan this dir for additional .ini files         /usr/local/etc/php
  83. Additional .ini files parsed    /usr/local/etc/php/extensions.ini
  84. PHP API         20090626
  85. PHP Extension   20090626
  86. Zend Extension  220090626
  87. Zend Extension Build    API220090626,NTS
  88. PHP Extension Build     API20090626,NTS
  89. Debug Build     no
  90. Thread Safety   disabled
  91. Zend Memory Manager     enabled
  92. Zend Multibyte Support  disabled
  93. IPv6 Support    disabled
  94. Registered PHP Streams  php, file, glob, data, http, ftp, zip, compress.zlib
  95. Registered Stream Socket Transports     tcp, udp, unix, udg
  96. Registered Stream Filters       convert.iconv.*, string.rot13, string.toupper, string.tolower, string.strip_tags, convert.*, consumed, dechunk, zlib.*
  97.  
  98. Configuration
  99. apache2handler
  100. Apache Version  Apache
  101. Apache API Version      20051115
  102. Server Administrator    you@example.com
  103. Hostname:Port   xqz3u5drneuzhaeo.onion:0
  104. User/Group      www(80)/80
  105. Max Requests    Per Child: 10000 - Keep Alive: off - Max Per Connection: 100
  106. Timeouts        Connection: 900 - Keep-Alive: 60
  107. Virtual Server  Yes
  108. Server Root     /usr/local
  109. Loaded Modules  core prefork http_core mod_so mod_authz_host mod_file_cache mod_cache mod_disk_cache mod_filter mod_deflate mod_env mod_expires mod_headers mod_setenvif mod_mime mod_status mod_autoindex mod_dir mod_alias mod_rewrite mod_bw mod_php5 mod_alias_basedir mod_vhost_alias_frdmhst
  110.  
  111. Apache Environment
  112. Variable        Value
  113. HTTP_HOST       xqz3u5drneuzhaeo.onion
  114. HTTP_CONNECTION         close
  115. HTTP_USER_AGENT         Mozilla/5.0 (Windows NT 6.1; rv:5.0)
  116. HTTP_ACCEPT     text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  117. HTTP_ACCEPT_LANGUAGE    en-us,en;q=0.5
  118. HTTP_ACCEPT_CHARSET     ISO-8859-1,utf-8;q=0.7,*;q=0.7
  119. HTTP_DNT        1
  120. HTTP_COOKIE     visitz=0; sort=0a
  121. PATH    /bin:/usr/bin:/usr/ucb:/usr/bsd:/usr/local/bin
  122. SERVER_SIGNATURE        no value
  123. SERVER_SOFTWARE         Apache
  124. SERVER_NAME     xqz3u5drneuzhaeo.onion
  125. SERVER_ADDR     10.0.1.2
  126. SERVER_PORT     80
  127. REMOTE_ADDR     10.0.1.2
  128. DOCUMENT_ROOT   /home/fh/www
  129. SERVER_ADMIN    you@example.com
  130. SCRIPT_FILENAME         /home/fh/users/l/i/lolitacity/www/index.php
  131. REMOTE_PORT     56818
  132. GATEWAY_INTERFACE       CGI/1.1
  133. SERVER_PROTOCOL         HTTP/1.0
  134. REQUEST_METHOD  GET
  135. QUERY_STRING    no value
  136. REQUEST_URI     /users/lolitacity/index.php
  137. SCRIPT_NAME     /users/lolitacity/index.php
  138.  
clone this paste RAW Paste Data