Advertisement
CyberAktivist

#Setup

Jul 16th, 2015
727
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.66 KB | None | 0 0
  1. _ _ ____ _
  2. _| || |_ / ___| ___ | |_ _ _ _ __
  3. |_ .. _|\___ \ / _ \| __|| | | || '_ \
  4. |_ _| ___) || __/| |_ | |_| || |_) |
  5. |_||_| |____/ \___| \__| \__,_|| .__
  6.  
  7.  
  8. Welcome anons to #Setup
  9. Here we will cover the basics you need to know in order to stay safe and get your software configured.
  10.  
  11. Stop asking us how to hack, how to take down a web site, how to get revenge on someone you know online,
  12. this is _NOT_ what we are about and you will not get support. So stay on topic or kick/ban
  13.  
  14. VPN:
  15. A vpn hides your real ip and replaces it with the tunnel you are connecting through, this means that you are extremely hard to trace back - not impossible however.
  16. DO NOT use free VPN's, proxies or TOR. Free VPN's keep logs of users activity and would happily hand it over to any law enforcement agency. Some suggestions VPN providers that are trusted and don't keep logs.
  17.  
  18. When selecting your VPN make sure you choose Openvpn and not pptp, unless you are using it strictly on your mobile device. Most mobile phones especially Android DO NOT support openvpn unless you are running a custom ROM.
  19.  
  20. Commonly Used (swedish servers)
  21. 1. Anonine: http://www.anonine.com/en - Payment: Prepaid Cards, PayPal02
  22. 2. ibVPN: http://www.ibvpn.com/ - Payment: Prepaid Cards, PayPal, AlertPay, and more
  23. 3. Mullvad: http://mullvad.net/en/ - Payment: Prepaid Cards, Cash, PayPal, Bitcoin, Bankgiro
  24.  
  25. Also using a VPS and your own vpn is another good option.
  26.  
  27. Also perform a dns leak test after your vpn is installed and configured.
  28. http://www.dnsleaktest.com/ (Follow the site instructions)
  29.  
  30. More info regarding your VPN and making it more secure can be found here:
  31. http://torrentfreak.com/how-to-make-vpns-even-more-secure-120419/
  32.  
  33. Network testing tools, alternatives to LOIC: (Do NOT use LOIC)
  34.  
  35. Hping:
  36. hping is a command-line oriented TCP/IP packet assembler/analyzer.
  37. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
  38. Easy to use system, when it has downloaded for your appropriate OS please install and choose to use
  39. Homepage: http://www.hping.org/download.php - Windows/Linux
  40. Pastebin: http://pastebin.com/zzewmMcn
  41. http://www.youtube.com/watch?v=fagjmQi-sBY
  42. http://www.youtube.com/watch?v=fRxnzAWX5ag
  43. HPING COMMAND: hping3 -i u1 -S -p 80 (site)
  44.  
  45. Slowloris
  46. The low bandwidth, yet greedy and poisonous HTTP client!
  47. This is a Perl program requiring the Perl interpreter with the modules IO::Socket::INET, IO::Socket::SSL, and GetOpt::Long. Slowloris works MUCH better and faster if you have threading, so I highly encourage you to also install threads and threads::shared if you don't have those modules already.
  48. You can install modules using CPAN:
  49. perl -MCPAN -e 'install IO::Socket::INET'
  50. perl -MCPAN -e 'install IO::Socket::SSL'
  51. Homepage: http://ha.ckers.org/slowloris/ - Linux
  52. http://www.youtube.com/watch?v=kPo8wVxsXAA
  53.  
  54. Hoic:
  55. - High-speed multi-threaded HTTP Flood
  56. - Simultaenously flood up to 256 websites at once
  57. - Built in scripting system to allow the deployment of 'boosters', scripts designed to thwart DDoS counter measures and increase DoS output.
  58. - Easy to use interface
  59. - Can be ported over to Linux/Mac with a few bug fixes (I do not have either systems so I do
  60. - Ability to select the number of threads in an ongoing attack
  61. - Ability to throttle attacks individually with three settings: LOW, MEDIUM, and HIGH
  62. and its written in a language where you can do a bunch of really nifty things
  63. just read the RealBasic manual, ;] also no Dependencies (single executable)
  64. Homepage: http://hoic.99k.org/
  65. Download: http://www.mediafire.com/?jkc7924jsa0161z
  66. http://www.youtube.com/watch?v=qmhDQtsbPAk
  67. HOIC BOOSTER Guide: http://pastebin.com/csqLqY9N
  68.  
  69. Pyloris:
  70. PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
  71. Homepage: http://motomastyle.com/pyloris/
  72. Sourceforge: http://sourceforge.net/projects/pyloris/
  73. Pastebin http://pastebin.com/MTyHYXJe
  74.  
  75. Do NOT use Tor for Dos all it does is hit Tor.
  76. Test DOS tools on 127.0.0.1
  77.  
  78. Do NOT click on random links posted in channels.
  79. Some of these are IP grabbers, honeypots or may contain executable code. Do so at your own risk.
  80.  
  81. Do NOT give out personal information: name, email, passwords, etc. (Use your head)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement