- /====================================================================================\
- | _____ ___ _ __ __ ___ ___ ___ ___ ___ ___ _ __ |
- | |_ _| | __| /_\ | \/ | | _ ) | __| | _ \ / __| | __| | _ \ | |/ / |
- | | | | _| / _ \ | |\/| | | _ \ | _| | / \__ \ | _| | / | ' < |
- | |_| |___| /_/ \_\ |_| |_| |___/ |___| |_|_\ |___/ |___| |_|_\ |_|\_\ |
- \====================================================================================/
- | - T E A M B E R S E R K -
- | Corporations, Governments and PsyOps Regarded as Apostles.
- | Without hatred your life is pointless, but this hellfire, isn’t it what supports your legs ?
- | IRC >> IIP->127.0.0.1 6668 << Channel: #TeamBerserk
- | https://www.Twitter.com/TeamBerserk
- --------------------------------------------------------------------------------------
- /=====================================================================================\
- | __ __ _ __ ____ __ __ |
- | __/ // /_____ ____ / | / /__ _ __/ __ )/ /___ ____ ____/ / |
- | /_ _ __/ __ \/ __ \/ |/ / _ \ | /| / / __ / / __ \/ __ \/ __ / |
- | /_ _ __/ /_/ / /_/ / /| / __/ |/ |/ / /_/ / / /_/ / /_/ / /_/ / |
- | /_//_/ \____/ .___/_/ |_/\___/|__/|__/_____/_/\____/\____/\__,_/ |
- | /_/ |
- \=====================================================================================/
- | Anonymous Operation: New Blood
- | Articles and Guides written by Gutts of TeamBerserk
- | IRC.AnonNet.ORG - IRC.AnonOps.COM - IRC.AnonPlus.COM - IRC.AnonPlusRadio.COM
- | IRC.AnonSet.COM - IRC.Cryto.NET - IRC.CyberGuerrilla.ORG - IRC.VoxAnon.SE
- ---------------------------------------------------------------------------------------
- /======================================================================================\
- | ___ __ _ __ ____ _____ |
- | / | ____ ____/ /________ (_)___/ / / __ \/ ___/ |
- | / /| | / __ \/ __ / ___/ __ \/ / __ / / / / /\__ \ |
- | / ___ |/ / / / /_/ / / / /_/ / / /_/ / / /_/ /___/ / |
- | /_/ |_/_/ /_/\__,_/_/ \____/_/\__,_/ \____//____/ |
- \======================================================================================/
- | Google Android Operating System
- | Local and Remote Security Hardening, Mitigation and Carrier Service Exploits
- | Updated: 11-30-2013
- ----------------------------------------------------------------------------------------
- HashTags: #Anonymous, #opNewBlood, #Setup, #Security, #Google, #Android, #Windows #Phone, #iOS, #Apple, #Operating, #System
- [ Computer Security ] -> [ Operating System Security Hardening ] -> [ Google Android, Windows Phone, iOS, Operating System ]
- ============================================
- + Building a Strong Foundation of Security +
- ============================================
- ** This is the second text/video tutorial of a series of tutorials ( For Google Android ( and Windows Phone, iOS ) Operating System ) that I am making for the New-Blood **
- - This Tutorial will cover Carrier Service Tethering Methods, Bypassing Carrier Service Firewalls, Torrenting on Carrier Services and Evading Carrier Service Bandwidth Limitations -
- ---------------------------------------------------------------------------------------
- /=====================================================================================\
- | ____ __ __ __ _ |
- | / _/___ / /__________ ____/ /_ _______/ /_(_)___ ____ |
- | / // __ \/ __/ ___/ __ \/ __ / / / / ___/ __/ / __ \/ __ \ |
- | _/ // / / / /_/ / / /_/ / /_/ / /_/ / /__/ /_/ / /_/ / / / / |
- | /___/_/ /_/\__/_/ \____/\__,_/\__,_/\___/\__/_/\____/_/ /_/ |
- \=====================================================================================/
- | Guide Introduction
- ---------------------------------------------------------------------------------------
- This tutorial is for any carrier service provider, whatever downlink speeds are given to your tier. Whether you're on 2G, 3G, 4G, HSDPA, 3GPP, UMTS, CDMA/GSM, etc.
- Although this guide will cover all carrier service providers such as AT&T, Boost Mobile, Simple Mobile, T-Mobile, Sprint, etc. we will focus more on the T-Mobile
- carrier network since this is what we have to work with in this guide. This guide will cover how to tether your Laptop/Desktop computer to your mobile device-
- ( even if it is restricted or you didn't pay for that service ! ) for free and bypass any BitTorrent blocks/Firewall blocks from the carrier network and set yourself
- outside of the DMZ/Firewall and also receive the maximum possible downlink speeds from the network as well as encrypt all of your traffic so the network cannot
- sniff or detect your incoming and outgoing transmissions/packets.
- Why would someone want to do this? Well I'm glad you ask! If you're new to the Anonymous universe or hacker universe in general ( and yes, a 'cracker' is still a hacker
- by definition so don't argue with me there ) this information can be extremely useful. What other individuals or parties could use this knowledge/skill ? Activists,
- Hacktivists, Anyone that needs unfiltered and encrypted Internet access on the go, Individuals with good carrier service coverage in their area but no Cable Internet or
- Satellite Internet providers, Individuals that are unable to pay for Cable Internet or Satellite Internet, Individuals which live in the middle of no where with no
- Cable Internet or Satellite Internet providers but could have good carrier service coverage in that area, Anonyone that needs to be anonymous, etc.
- Now, before you start thinking: "How can you be anonymous with a cell phone Internet, hurrdurr can't they Triangulate you derp this is ENTRAPMENT HURRRR DURRRRR"
- Well I suggest you give it some more thought before you start going full retard and do some more research on how carrier networks actually work before thinking such
- retarded things.
- Now, if you want full anonymity the first thing that is absolutely required is that you purchase a smart phone outright with cash and you must activate it with
- all false information, such as a fake name, fake address, etc. Never give them your real information or SSN or anything. Make sure you purchase prepaid service and
- make sure you do your research on the coverage of the service provider that you intend to get. T-Mobile for example now offers "unlimited 4G LTE" for $50 per month,
- but there's always a catch, they claim that you get unlimited bandwidth but they will cap you at 10 Gigabtyes and then throttle you to high speed 3G after that on
- this specific tier plan with their service, however with this guide and with T-Mobile specifically you will be shown how to receive truly unlimited 4G LTE at max speeds
- 100% of the time.
- We advocate that you acquire the cell phone for free with our TeamBerserk made fraudulent coupons. If you're a member of TeamBerserk you will have already acquired these
- with the #opNewBlood 2.0 Encrypted Package. Current coupons allow for acquiring for free: Any T-Mobile brand phone, unlocked phones for any SIM-type carrier service provider.
- Unfortunately you shouldn't card a cell phone and then pick it up at your drop point(s), because it's too risky to use a phone that was carded unless it's going to be a burner phone.
- So remember to activate the phone and phone service anonymously either with cash and false identity information or for free and with false identity information.
- Once you're actually using this service it's not really necessary to use a VPN on top of this layer, but using a VPN will definitely add an additional layer of security and anonymity to your
- activites. Naturally you're going to be hacking web servers and boxes across the Internet and even if anyone gets your IP address or your IP address from this carrier service is logged
- somewhere, it doesn't matter! Why ? Because the IP address that you are assigned at any given moment is shared among thousands of other cell phone users! They couldn't possibly
- round down the IMEI number that was assigned to the IP address that hacked some web server! Because all of your transmissions are encrypted! And even if they did somehow round it
- down to your IMEI number ( which would be impossible ), what are they going to do? Go arrest some guy named: Robert Fagot at address: 69 Faggot Way!? very, very unlikely indeed.
- And if you ever need to change your IP address at any time you simply need to turn on airplane mode so it forces the radio off and then turn it back on again and bam! You get a fresh, new IP instantly!
- With this system you can never be DoSd, booted or directly hacked either because you're behind a dedicated system and Cell Phone Tower!
- Another requirement of this guide is that you completed all of the Windows OS guides that we made for security hardening, ricing, etc. Whether you're running
- a different Operating System which the Windows 8/8.1 guides are for or not, you can still use those methods. Make sure you are running PeerBlock and DNSCrypt and
- make sure that your network adapter DNS is configured for Google's DNS Servers @ 8.8.8.8, 8.8.4.4. So you're forward DNS Servers are set for OpenDNS DNSCrypt Servers
- and the reverse DNS Servers are pointed to Google's DNS Servers -- You don't have to use Google's DNS Servers, you can use whatever DNS Servers you want.
- So, let's begin!
- ---------------------------------------------------------------------------------------
- Tethering Restriction Bypass:
- (01): - If you paid for the $50 Tier Service with T-Mobile by default they allocate you 2.5 GB of tethering bandwidth and there is infact a wireless tethering application
- that comes with all newer T-Mobile phones. If you didn't pay for the $50 Tier Service and they block your tether don't worry about that because the later steps of this
- will still allow for you to tether for free. If you don't have the built in wireless tethering application you will need to root your phone and install a wireless tethering application.
- T-Mobile ( and many other carrier service providers ) can only detect if you're tethering and block it by sniffing the browser User-Agent String for standard TCP ( and now UDP ) connections.
- So all you have to do is download User-Agent Switcher Add-On if you're using FireFox or Chrome Web Browser and then change the User-Agent to any User-Agent with the word "Linux" in it.
- If you're already using some Linux-Distribution you won't have to do that, but if you're on Windows OS you will and that's the first step.
- ---------------------------------------------------------------------------------------
- Blocking DNS Sniffing/Routing:
- (02): - T-Mobile will attempt to hijack your DNS and route all your queries through their DNS. These DNS IP Addresses will be different based on your location. You can get the DNS IP Addresses from
- your PeerBlock log or use WireShark to monitor where your packets are going ( make sure you run WireShark with no other applications running ) Once you have the T-Mobile DNS you can then
- block that IP and IP Range in your Firewall Tables Rules. Block All Protocols on All Local IP Addresses from Sending or Receiving any Data to that IP Range.
- Do a WhoIS on the IP to verify that it belongs to T-Mobile Networks. Do a tracert command ( Trace Route ) from your command line interface to google.com --
- Command: tracert google.com
- And you will find that your raw route after doing the previous configurations will route from your local IP and outward through a few dedicated boxes with LAN addresses and then out to google.com
- ---------------------------------------------------------------------------------------
- Blocking Packet Sniffing:
- (03): - Now that you have blocked the T-Mobile DNS and you have Encrypted your DNS with DNSCrypt, Changed your User-Agent String and verified that your connections are being routed through the dedicated boxes
- you're almost done. T-Mobile will now try to sniff your packets usually only the TCP and UDP protocols, and they do this for various reasons: They want to know if you are using BitTorrent, exceeding bandwidth limitations,
- they also try to log your Internet activity so they can target you for advertisements and sell those logs to third-parties for additional profit at your expense. They also block certain websites and networks.
- You can block their sniffing by encrypting all of your TCP and UDP transmissions by using ToR - Expert from the command line and then route your TCP and UDP Application Connections through that or a much faster and reliable
- method is to simply use a Free VPN Service and use OpenVPN with that VPN Services Certificates. Once you have encrypted the transmissions that are using these protocols you won't need to use the User-Agent switcher any longer.
- Even though most Free VPN Services are logged they still can't get you for any illegal activity because your service is prepaid with all falsified identity information attached to it.
- ---------------------------------------------------------------------------------------
- Unblocking BitTorrent:
- (04): - Although you can Torrent while on the VPN it won't necessarly be as fast as it could be, so if you want to Torrent at maximum speeds ( usually around 5 megabytes per second since T-Mobile advertises: "Up to 50 MBits/p/s! DURR!"
- Of course a bit is not a byte :P when they say it's 50 megabits per second, that's a little trick on their advertising so it's going to be 10x lower which is 5 megabytes per second which is actually still pretty decent. You can still-
- game on that, download your movies, music, pc games, etc. and do whatever you need to do. So you should instead use qBitTorrent which is a fantastic BitTorrent application which gives you the option to randomize the port it uses on each start up and it also enables you to Encrypt
- the torrent traffic so the ISP/Carrier Service doesn't know what you're doing and therefor it can never be blocked or throttled :D
- ---------------------------------------------------------------------------------------
- Potential Attack Vectors:
- (05): - Even though you are pretty much protected from any DoS attacks, direct hacking attempts, Doxing attempts, etc by being beind a dedicated system and cell tower with all falsified identity information it is still possible to get into quarrels with enemy groups or enemies of any kind which will attempt
- to social engineer you into joining their communications servers or instant messaging etc or any method which would require you to download their malware etc, or get you into a chat that they control or they could have a exploit for TeamSpeak, Pidgin etc and they
- could then get a remote shell on your system if that Application that you are running is vulnerable to such an exploit. So just use your head and you'll be perfectly ok. Unfortunately as useful as TeamSpeak and Pidgin are for communications they are very vulnerable to
- arbitray code execution as in if someone social engineers you into joining their TS3 box and they get your IP and even if all your ports are closed etc, since you are connected into their box or you are connected to them by those means it is still possible for them
- to exploit those vulnerabilities in those applications and get a remote shell on your box where they can then issue commands directly to your Operating System and fuck up your box. So be careful and use your head.
- ---------------------------------------------------------------------------------------
- Congratulations you are untouchable!
- And remember folks, if you ever encounter a Federal Agent or Intelligence Agent, don't run, disinform them to hell and back and troll hard!
- This Tutorial ( AnonPST: )
- This Tutorial ( YouTube: )
December SPECIAL! For a limited time only. Get 20% discount on a