Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Elite Tactically Offensive/Defensive Hacking SOP's(Standard Operating Procedures)
- Rules..
- Rule 1A: Understand the Ethical Hacking Definition(This portion is borrowed from the web[Source:
- https://www.infosecinstitute.com/courses/ethical-hacking-boot-camp?gclid=CMK5wenI9NQCFUtqfgodaAQPQQ ]); Ethical hacking refers to the
- act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious
- hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming.
- Rule 1B: No unnecessary motions, movements, and interference's.
- Rule 2: Though you may gain contact with other high profile individuals DO NOT INTERACT. If negative effects on ultimate objective DO
- NOT LOSE DISCIPLINE AND STEALTH BY "Not giving a hoot" and start pranking and horse-playing on their machines for fun!!! If you wish
- compensation for a loss and the gratification of being a "highly effective hacker" isn't enough, you can take copies of souvenirs(non
- financial!!!) and disconnect.
- Rule 3: Absolute stealth and a quiet presence.
- Rule 4: At all times ensure armor is up!
- Rule 5: Every necessary movement is to be planned and drilled and revised before execution.
- Mission: Locate objectives, prioritize list, and carefully
- revise necessary movement.
- Priority 2: Gather data from server from 2 weeks before next
- movement. (data will be specified).
- Name Chain list(In connection to each-other in hierarchy.
- Hacking Strategy
- Armor:
- IP spoofing(external IP hides NAC) Location diversion provided by list,
- MAC spoofing (Fake physical ID) manufacturer can't trace,
- IPv6 spoofing: Don't have one... Don't worry about it.
- VPN(Virtual Private Network[Specifically a VPN dedicated router]): It's basically an encrypted tunnel to send your data through.
- Proxy Server: Chains spoofed IP addresses also provides
- available IP's you can list and you can consistently change ip's.
- Tor: Top of the line encryption software to secure your
- coming and going online. A highly secure browser.
- Tor is important to keep your identity secret as
- use websites & emails... Provides new identity &
- new IP on top of that. (IP is what the website uses
- to identify you, the email servers do the same).
- Basically you'll be covered in IP addresses and false identity, all over
- the place, and internet surfing will be locked
- down like the virginity of catholic Nuns.
- Regardless retain a disciplined demeanor cause they will look for clues in that (observed area for personal info contradicting what they say validating that ip though they will not be able to crack it as, false)
- Elite Hacking strategy Armor Update!!!:
- Fast Free Proxy Link: https://www.us-proxy.org/
- Free Proxy Server download: http://download.cnet.com/CCProxy/3000-2651_4-10062250.html
- Tor Browser download: https://www.google.com/#q=Tor+browser+download
- SMAC 2.0 Download: http://download.cnet.com/SMAC-MAC-Address-Changer/3000-2085_4-10536535.html
- Free VPN Download: https://hide.me/en/software/windows
- How to disable remote access windows 7(borrowed from the web):
- To configure remote access, follow these steps:
- 1. In Control Panel, click System And Security, and then click System.
- 2. On the System page, click Remote Settings in the left pane. This opens the System Properties dialog box to the Remote tab.
- 3. To disable Remote Desktop, select Don’t Allow Connections To This Com¬puter, and then click OK.Skip the remaining steps.
- Change your DNS to Google's Public DNS; If windows 7 go to Control Panel>Network & Internet>Network & Sharing Center>Change Adapter settings>Local Area Connection/Wireless Connection>Properties>
- Networking>IPv4>Click Properties>Advanced>DNS>Ok (Google's DNS Servers is 8.8.8.8). This is basically allowing google to designate your IP address.
- Turn off IPv6. If windows 7 go to Control Panel>Network & Internet>Network & Sharing Center>Change Adapter settings>Local Area Connection/Wireless Connection>Properties>
- Networking>IPv6 (I think it's disconnect or turn off when you right click it).
- Here's a list of other DNS options:
- Here's a list of other DNS options:
- Free & Public DNS Servers (Valid January 2017)
- Provider Primary DNS Server Secondary DNS Server
- Level31 209.244.0.3 209.244.0.4
- Verisign2 64.6.64.6 64.6.65.6
- Google3 8.8.8.8 8.8.4.4
- DNS.WATCH4 84.200.69.80 84.200.70.40
- Comodo Secure DNS 8.26.56.26 8.20.247.20
- OpenDNS Home5 208.67.222.222 208.67.220.220
- DNS Advantage 156.154.70.1 156.154.71.1
- Norton ConnectSafe6 199.85.126.10 199.85.127.10
- GreenTeamDNS7 81.218.119.11 209.88.198.133
- SafeDNS8 195.46.39.39 195.46.39.40
- OpenNIC9 96.90.175.167 193.183.98.154
- SmartViper 208.76.50.50 208.76.51.51
- Dyn 216.146.35.35 216.146.36.36
- FreeDNS10 37.235.1.174 37.235.1.177
- Alternate DNS11 198.101.242.72 23.253.163.53
- Yandex.DNS12 77.88.8.8 77.88.8.1
- censurfridns.dk13 91.239.100.100 89.233.43.71
- Hurricane Electric14 74.82.42.42
- puntCAT15 109.69.8.51
- Disable remote desktop.
- 25... Names(I.e targets)
- Priority of this expansion.
- Ultimate target (High Profile Target)...
- Xtreme Ascension
- Hierarchy Strategy...
- LEVEL 1 High Profile Target Lesser known, Lesser security going
- l
- LEVEL 2
- Well Known(1) Well Known(2) Downwards
- LEVEL 3 l l
- lesser known(3) lesser known(4) lesser known(5) lesser known(6)
- LEVEL 4 l l l l
- little known little known L.known L.known L.known L.known L.known L.known
- l l l l l l l l
- Level 5 Grunt Grunt Grunt Grunt G. Grunt G. Grunt G. Grunt G. Grunt G. Grunt G. Grunt
- In this example 5 levels
- 1: Impossible
- 2: Nearly Impossible
- 3: Unlikely
- 4: Good Chance
- 5: Great Chance
- Note: The profiles of individuals must decrease downwards... If all high profile individuals defenses(Security) will be rigid and impenetrable. Defenses should decrease downwards as well.
- Nuclear Rat (Name of hacking software)
- Island hopping:
- Send tempting email message according to intel.
- Once executed using data from email to forward up to
- next level in hierarchy. Archive name & Network IP address(Local looks like 192.169.0.1 or something) level
- in hierarchy toward high profile target.(Tempting message)
- (Used 1-3 in the morning) Victims likely inactive.
- Non-suspicious based off social media intel.
- (log in as them at night & study them & mimick) No actions!
- (Note the first spoofed email is all that is needed
- after that the email of the closest friends/relatives
- to increase the likelyhood of the execution of .exe
- all the way up to the top.
- Once at High profile individual. Checkmate.
- a 2 dimensional outward expansion spiderweb like to
- all other high profile individuals.
- At this point only record IP address and names,
- the server will run silently on their machines.
- Penetration Technique: Avoid what is strong. Attack what is weak. Eventually a weak-spot will arise. (i.e. an email address)
- Also only target CLOSE relatives and CLOSE friends in each connecting level of the hierarchy. Use email
- with FUD(Fully undetectable server for your RAT... Remote Access Tool.... binded with an image/document/video sent
- from friend/relative email to next up in hierarchy.
- Be advised you must archive name and IP address of infected machines.... and their relative position in the hierarchy...
- whose above and whose below.... This helps if for whatever reason a server goes dead you can re-infect without starting
- the hierarchy strategy all over again. This shouldn't happen.
- It should work like this.... You recon(observe) a social media site... Such as Facebook or twitter. After you attain positive ID's(close relatives or friends of lower profile) to
- the target. You search them up via the social media site. This will evade all fake celebrity accounts and the actual will most likely be connected to these.
- You have your level 2, which is 2 well known individuals connected to your level one, "High Profile Target". Now the defenses of level 2 are expected to be high, you look
- on their friends list for level 3 individuals(lesser known). Keep in mind close relatives or friends.... More than likely the level 1 & 2 will have no emails openly provided.
- On level 3 the chances for weak-spots in which you are scanning are doubled.... Keep in mind these individuals must be close friends or relatives of level 2.....
- (A little foreshadowing this optimizes probability of your email attached server being clicked on from that email address and not sent to spam after the key logger attains
- the data and you forward email). Remember to record the hierarchy of which your using and the level your on. Basically who's connected to who and their level.
- A weak-spot(Such as an email) should occur at levels 3 or lower. You gather intel of the individual you gained this email from.... Use a fake email sending it under
- the Tor browser while your IP and mac is spoofed, proxy chain & No IP on.... It will be based on the intel you gathered off of their social media site(Facebook)
- More than likely this critical link will click and be infected unknowingly with your pic/vid/download. Picture recommended. You gather intel stealthily using
- Nuclear Rats key logger. Eventually you'll gain the victims email username and password of their smtp service..... You recall your hierarchy to see whose directly
- above. Using their email in the hours of 1 to 3 in the morning you send the email(based on intel gathered by recon their social media account). Nine times out
- of ten they click and become infected..... This process repeats until you get to the ultimate objective or high profile target.
- Each level you ascend, delete all other material gained except the name of the infected individual, their Network IP address, email user and pass and their hierarchy info. It saves your mind focus
- and allows you to immediately reconnect and or identify this individual if you lose contact with the server of an upper or lower individual in the hierarchy.
- This is basically the conquer and move on style approach which is recommended.
- **Update**:
- The reason email is being retained for the reviewing logs process(slow) would have to be started all over again to attain email for rat transport in relation
- to key logging to regain it on each victim, also it is efficient to resend the server in the e-mail(while tor browser and all forms of spoofing is up!)
- Without having to re-infect each individual one at a time back up the hierarchy. Also in effect, attaining other high profile info is essential
- toward re-infecting the ultimate objective. So from directly, to bottom up(hierarchy), to encirclement(High profile, laterally) WILL greatly enhance the chances of quickly regaining
- lost objectives.
- *Update 2* You can go through a checklist and see a set number of infections and if one or two loses connection.
- After you work your way up to the top and have verified all beast servers below are active. The protocol will be beast servers on main pc, and cerberus/xtreme rat on labtop. You can your main rat slots and re allocate
- them laterally to other high profile
- individuals. This way, if you have already worked your way up to your ultimate objective and are now in the process
- of planning for a mission regarding which, for redundancy, spread laterally outwards to other high profile targets. In this way bottom up and all around.
- *Weakspots* Sometimes people's email is already inputted and they just type in the password. Your going to have to gain screenshots using the trojan. But the level of difficulty is
- this, that can happen at any time when your not present monitoring the trojan! So, patience is a virtue. Additionally the trojan could be activated on their phone.
- In which should have a windows styled operating system. But it is not known how this works. Normally, when people check their emails for business related issues is at
- home sitting at a computer or at a public place sitting at the laptop. Other activities on the phone other than calling and text messaging are usually viewed as recreational.
- The more serious things are usually done not quickly going through things on the phone or while relaxing with games but on the pc. Hopefully the individuals arent attention
- to detail in the IT field oriented individuals and check the size of the content sent over email to see if its off. Which normally the average individual pays this little to no attention.(I.e. a little too big to be a picture)
- Also, not being too complex to encourage prolonged mental stimulation by sending a vid instead of a pic (a vid showing something related to observed interests of the individual).
- Encouraging that person to ask possibly. "Hey, that's a cool video why'd you send? or state: Cool video, thanks for sending! and the other person responding "i didn't send you anything.
- Then there's the O shit moment. Keep it simple and sweet. A picture with an understandable prompt and tactful statement with reconned info making it believable that this
- person sent it. Also sent in a way to imply the least likely-hood of response. I.e. Don't send anything with a question mark. No big deal on the O shit moment.
- It is a, "thats a bit odd" and a simple docile easy to forget movement. Not like they have an experience network admin as a butler looking over their shoulder every time they
- go online. Additionally, revamping on the aspect of using email as a transport for trojans. Emails have virus scanners which prevent the trojan from reaching it's destination.
- Since your paying a bit of money to crypt it. It should pass through as anything else. Also this decreases the number of would be hackers because of the expense significantly.
- So people are in effect complacent checking and using email with this assurance. That is if their above average and experienced and check.
- Resources to accomplish Task:
- Xtreme RAT/Cerberus & BEAST(Please SPOOF with proxies and make connections all loopback 127.0.0.1!!!)
- Proxy server software(Backup proxies),
- MAC address spoofing software,
- Additional IP addresses(Proxies on list) from Hidemyass.com
- Tor browser software,
- Send Xtreme RAT/Cerberus/Nuclear Rat & BEAST binded(Binded by the top of the line crypter) together to a file, for all victims under ultimate objective.
- Unpin the internet explorer icon from the taskbar and put the Tor application and folders and click Tor every-time you wish to surf the web so your IP, identity can be spoofed and all packets can be crypted.
- (Every Internet connection is spoofed EXCEPT RAT connection, that requires spoofed IP and proxy switching!)
- VPN
- Remember Invincibility lies in defense, and the possibility of victory in the attack. Defense first, attack second!
- How to's...
- This is how it's gonna be done. Download your stored remote access tools from the website. Select "Elite Hacker" winrar file and unrar it. Afterwards you venture to dawn your "armor".
- Setup your proxy from list or install proxy server software. Also, install your MAC address spoofing software. After this go install your TOR browser which encrypts your coming and
- going protecting your IP and identity online when surfing the (Slower but necessary). After this use one of the best proxies on the list provided, so your "websurfing" isn't limited, strange, or agonizingly slow using other distant and less
- secure/anonymous proxies.
- Keep them up there. Do this for the main pc in the room and your labtop. Both Ip's spoofed, MAC spoofed, TOR browser spoofing and encrypting you,
- proxy server installed on both machines. Also an additional number of the best Hidemyass IP's you can find so if you feel iffy change them periodically(WHEN TROJAN CLIENT IS NOT CONNECTED TO SERVER). Make sure
- all armor is up! Also ensure you update clean and
- maximize performance on main pc before this is done. Even if a new clean installation is necessary. Also on the main pc after re-installation and backup of sentimental material,
- create an additional account, name it "MC" with the password of, hackingmission. This is so, no one else accesses this machine and remind you to discipline up. Also if you mess up your laptop from varying curiosities and have to
- perform a clean installation,
- you don't have to break your back for another hardware ID for the purchased crypter. The crypter on the machine will be used to crypt the server of "Cerberus"(Main RAT) and (Supporting RAT) server binded with the sent binded file.
- Beast, for the (Static IP notifier)SIN, (dynamic connection) I.e. victims connect to you whenever your online(appears to the client after a short delay) revealing their IP address in the bottom pane.
- Will ONLY be used on the main pc. The cerberus server will be put on external storage media and transferred to the main pc, in which both servers will be crypted there. Both cerberus and Beast will be binded
- to an image using the trusted crypter purchased. On execution of the picture, the main rat server(1 of the 3), and the supporting rat server, will simultaneously execute on the machine. Also to each RAT only one server can be used in
- relevance to it per machine!(Client and server) Only use ONE client copy or you might mess up!
- The next step is testing(On YOUR LABTOP via virtual machine), before sending anything, ensure that you test ALL features that will be used to both remote access tools
- on a virtual machine and test the "Message sending" portion of the additional mission attached to the hacking mission if its a resounding success. In addition, a crucial step, ensure that both servers binded with the image can be
- transported over email, using quantimez@yahoo.com to quantimez@mail.com.
- Again, this is after the servers are crypted. After doing this you would have verified that, the servers are transportable over email(one hurdle), the servers work(crypted and non-crypted testing on vm).
- The next critical factor is getting fake email and using "social engineering" just to push a picture across(the first and toughest step). Use a spoofed email site and borrow an email or create
- a temporary one(reminiscent of a bottom hierarchy victims associate or close knit individuals based off recon), recon a social media site about the victims likes, interests and concerns and construct an educated guess on what most likely
- they will click on. Seeing that one was discovered
- who likes to respond to fan mail you will send a image via fake email posing as a star craving adoring fan(Option for one observed victim in the hierarchy based off recon) from the spoofed mail. A second email will be sent spoofing
- ONE close friend or relative
- also using a picture. In such the two servers will lie. Now get a piece of paper and create a hierarchy with empty blanks of 5 levels. 1 for level 1, 2 for level 2, 4 for level 3, 8 for level 4 and
- 16 for level 5(stop at level 4 by default). Two connecting to each one individual of each ascending level in the hierarchy. Now if all 16 individuals on level 5 are attained for instance it is unwise to forward all 16 email
- messages to the lower hierarchy, as you would not know who's ip is who causing confusion and failing the mission. Rather, pick one individual at a time and after the server notifies you the victim
- is online you record the IP address and match it to the name and email to which you sent. Also fill in the blanks toward the few ascertained connections. Hint, all other hierarchy blanks empty
- except for the level 4 Name and email you attained and their IP you just attained from notification. 3, 2, and 1 above that are still names with blanks where the I.P is supposed to be.
- Ensure level 4 is filled hence (all victims attained in connection to the ultimate objective) which is 8 individuals in total. Only 2 shots for each(minimize the risk for suspicion & scrutiny and maintaining stealth). So on Facebook people
- have many friends and family
- select the closest ones to them and infect. Then send it up to level 3(4 in total) Then send it up to level 2. Keep in mind for the bottom level of the hierarchy use a spoofed email. Everything above that
- use "prisoner emails" of hierarchy individuals with no other purpose but to forward trojans(In compliance with the low profile rules). -OR- You can skip the thorough redundancy approach, and do the "fast-lane" approach. A straight quick
- single route up the hierarchy but
- STILL record available names and emails(as well as their contacts) for one individual route of re-infection, in case of connection loss(recommended) saving time and energy reduces redundancy of on hand machines but limits the
- possibility for eyebrows raising in good number.
- Expect a dead end at level 2, so do a lateral move and infect both victims(at that height the high few often intermingle making an easy lateral movement) in hierarchy to level one by sending trojan laterally. After which recon all social
- media passwords, emails, and such.
- Expect the ultimate objective to be a contact or a friend in which their email is exposed. I.e. if not Facebook and your buddy was right, twitter, Instagram or however. Recon both individuals
- information and assess a "personality type" as to not sound, off, and again simple, direct, with the least possibility of response using their, "prisoner email". After such, the ultimate objective
- is attained. Verify that this is indeed the individual by reconning all data to match expectations of what's supposed to be there. Once verified, go back to the main pc, open up the beast client.
- Look at the paper you've recorded of the direct route in the hierarchy. Now create a checklist, highest to lowest of each connected individual. Verify all connections are still active.
- Now, should ONE of those connections go down you create 2 more routes connecting to level 2 without sending the email to level 2 as to not arouse suspicion. so it would be, 4 to 3 or 5 to 3.
- Record all in hierarchy only, and attempt to re-infect individual lost from level 3 before which, assess if an idiot used virus total.
- So if you want to emphasize more sophisticated tools on another target, you can easily choose a BEAST machine to forward or bind the crypted Cerberus server to some commonly accessed file on their machine,
- If you lose connection, evaluate if your still FUD(I.e. your virus is still fully undetectable), if not get upgrade, re-infect via email through some route in the hierarchy.
- Once again it is important in this long step by step process to remember the, "How can I get caughts"
- 1. By web-surfing(Off of protective Tor) in which in order to connect to a website your IP address(A.k.A area code and address, while recklessly boasting providing hints and clues to any investigators if you become proud and
- reckless and decide to mess wit people for a laugh.)
- 2. By giving or hinting personal information at the ultimate objective during a positive response(That might be a deceptive use to turn the tables and bust your butt!) Which can be avoided if you follow the Elite hacking rules and recon
- thoroughly communications and carefully assessing a decision to interact(INTERACTION OTHER THAN SENDING THE 7 MESSAGES IS AGAINST RULES!)
- 3. By opening the client(which controls the server on the victims machine), without having a spoofed IP address up, and mess up, be careless and be located!
- 4. By not spoofing the mac address(which is the physical I.D which many hackers overlook in defensive measures, having them contact the manufacturer of the machine sold and have your behind dialed in!
- 5. By having a bad day at work and suddenly deciding, "I'mma fuck wit a bitch today", and make jokes and pranks on selected high profile individuals computers.
- 6. By breaking the secrecy of the hacking mission and telling everyone you know that you got all their pc's on your pinky and having as a result the previous action because of your mood be a result
- of a nationally televised response on social media/cnn and having those very same individuals be the proud mugs that turn your arse in!
- 7. Though this is not in your heart, being maliciously destructive on any machine to any degree.
- The next objective would be lateral information branching outwards from the ultimate objective in 4 directions. The only aim is to record the ultimate objectives email and 4 contacts in that email (DO NOT ATTEMPT TO INFECT but
- just take contacts if available! If connection with ultimate objective lost use the ultimate objective's "prisoner email").
- DO NOT SEND ANY EMAILS LATERALLY, AS THAT WOULD INCREASE THE ODDS OF AROUSED SUSPICION(LIKELY TO ADD BOTH LOWER HIERARCHICAL AND LATERAL HIERARCHICAL SUSPICION
- AND COMMUNICATION) AND FAIL THE MISSION!!! Those lateral pc's of possibly close relatives and other high profile individuals emails will be recorded for extra redundancy.
- Now not only the information such as the name, Ip, and hierarchy info will be recorded in written form but virtual form on a notepad document.
- Remember Invincibility lies in defense and the possibility of victory in the attack,
- Furthermore every "attack" or method to progress in an "advance", there is a potential for failure negating set defenses.
- Unnecessary, and unplanned for advances, carry the highest risk for failure and should not be taken.... Such as fooling around.
- Follow rules and this should be a quick, clear, decisive and magnificent victory demonstrating elite wisdom carrying both practical and sentimental value.
- Also if all 3 trojans fail the tests and/or not compatible with windows 7 or 8, a more advanced/complicated trojan(Like Dark comet) is to be implemented in their
- place solely and solitarily.
- This is worth 1 elite credibility point.
- Link on how to hack android phones: https://www.youtube.com/watch?v=9DUNhWAdNII
- Personally made IT acronyms:
- Acronym 1
- S.T.E. Technique:
- S: Software download Link
- T: Tutorial (Video on site or on YouTube)
- E: Expedient Printing time
- Acronym 2
- L.O.E. Technique
- L: Lengthy writing time
- O: One hour typing time
- E: Expedient printing time(redundantly)
- Acronym 3:
- W.W.R.E. Technique
- W: Write down link
- W: Watch the video
- R: Record steps in fine detail
- E: Execute rapidly.
- How to screenshot with windows 7: https://www.youtube.com/watch?v=Y-8ccq7-9l4
- How to kick someone of your network with windows 7: https://www.youtube.com/watch?v=O76JL2OhzSQ
- How to DoS someone with windows 7: https://www.youtube.com/watch?v=TsCkyY43TOo
- How to see who's on you network with windows 7: https://www.youtube.com/watch?v=O76JL2OhzSQ
- How to set up a proxy windows 7: https://www.youtube.com/watch?v=xUoY9FA2NiM
- How to disable remote connections windows 7: https://www.youtube.com/watch?v=C2pki7KNaMs
- How to screenshot with windows 10:
- How to kick someone of your network with windows 10: https://www.youtube.com/watch?v=O76JL2OhzSQ
- How to DoS someone with windows 10: https://www.youtube.com/watch?v=_2i72uPgFdc
- How to kick someone of your network with netcut: https://www.youtube.com/watch?v=O76JL2OhzSQ
- How to change mac address with windows 10: https://www.youtube.com/watch?v=ihNgjoronjk
- How to see who's on you network with windows 10: https://www.youtube.com/watch?v=6nEKPtIiIxg
- How to set up a proxy windows 10: https://www.youtube.com/watch?v=H0idTEdlID8
- How to disable remote connections windows 10: https://www.youtube.com/watch?v=u23XAyw06DA
- How to hack with a web browser: http://null-byte.wonderhowto.com/how-to/hack-like-pro-hack-web-browsers-with-beef-0159961/
- How to use a honeypot to help maintain network security: https://www.youtube.com/watch?v=LjEdmjr7pwY
- How to obtain an IP address with a link: https://www.youtube.com/watch?v=M59PBblgKz0
- How to setup home network: https://www.cnet.com/how-to/home-networking-explained-part-5-setting-up-a-home-router/ and https://www.youtube.com/watch?v=vyL71b1DtJs
- Triumphant Notes perserverance:
- Free online storage(for file redundancy):
- Photo file storage site(www.smugmug.com):
- Text file storage site(www.pastebin.com):
- Data storage in general(google drive, free 15GB[Beware data diminishes with use! Keep creating new emails to compensate!]: Simple google "Google Drive".
- In order to protect identity online "Anonymous Shopping" helps link:
- Layer 1 Defense: https://www.moneygram.com/RegisterReceiverNumber/partner/select
- Layer 2 Defense: http://abine.com/maskme/marketing/referral/letfriends/?k=pkVOytAtt
- (Note: People can stealing data(personal info) easily online, so don't use a prepaid card or gift card, they are subject to federal law and must disclose data,
- data that other hackers can manipulate to their advantage).
- Elite Hacking strategy update:
- Additional(Spoof email[For the elite hacking strategy{update}): Google "Spoof Email":
- Phone number Spoof: https://www.spoofcard.com/free-spoof-caller-id
- Nuclear RAT download: http://www.nuclearwintercrew.com/Products-View/21/Nuclear_RAT_2.1.0/
- Nuclear RAT tutorial : https://www.youtube.com/watch?v=PWDYkoVzI0U
- Bandook RAT download: http://www.nuclearwintercrew.com/Products-View/57/Bandook_RAT_v1.35__NEW_/
- Bandook RAT tutorial : https://www.youtube.com/watch?v=FrrzAO0fKX0
- Bandook RAT tutorial(off of google): http://hakd.weebly.com/bandook.html
- XProtect Crypter tutorial(Used to make Trojan Client and server invisible to virus scanners): https://www.youtube.com/watch?v=ddMGk6-cAXM
- Ubot Studio tutorial: https://www.youtube.com/watch?v=a2AGRYwyUqU
- Ubot Studio download: https://greenhatworld.com/download-ubot-studio-5-0-5-full-free/
- Deleting files from command prompt in windows tutorial: https://www.youtube.com/watch?v=8zv3EW11QOs
- How to hack a Linux system: https://www.youtube.com/watch?v=8D4hQTjEtF0
- How to hack a Mac pc: https://www.youtube.com/watch?v=YeYAR_RZetI
- Zues in the mobile link(ZITMO): https://securelist.com/analysis/publications/36424/zeus-in-the-mobile-facts-and-theories/
- Keylogger for the Iphone(No Physical access required): https://www.youtube.com/watch?v=fE4yzzPEYhA
- Keylogger for the Android(requires physical access): https://www.youtube.com/watch?v=LkiLQWMgBgI
- Free voice changer link: http://download.cnet.com/Free-Voice-Changer/3000-2170_4-76149902.html
- Free phone calling software link: https://call2friends.com/
- Caller ID spoofing: https://www.spooftel.com/freecall/
- (Note microphone is needed)
- Google translate: https://www.google.com/webhp?sourceid=chrome-instant&rlz=1C1CHBD_enUS732US732&ion=1&espv=2&ie=UTF-8#q=google+translate&*
- Free iso creater: http://www.freeisocreator.com/
- How to download Facebook videos: https://www.youtube.com/watch?v=5FIhkFldTFc
- How to recover deleted Facebook photos and/or videos: https://www.youtube.com/watch?v=DAa6T3u4R08
- How to see who viewed your Facebook(Google Chrome): https://www.youtube.com/watch?v=dscn2OQndCA
- How to see who viewed your Facebook(Google Chrome) #2: https://www.youtube.com/watch?v=6K0J0qxAyGQ
- How to use a Valhala Honeypot for network security: https://www.youtube.com/watch?v=LjEdmjr7pwY
- Valhala download link: https://sourceforge.net/projects/valhalahoneypot/
- Free VMware download: http://onthehub.com/download/software-discounts/vmware
- How to Upload a video on youtube: https://www.youtube.com/watch?v=Hlxqk0iHp5w
- how to use YouTube ads: https://www.youtube.com/yt/advertise/launch-ad.html?subid=us-en-bs-v_ads_search_aware_&sourceid=awo&utm_source=online_ads&utm_medium=adcpc&utm_campaign=google_search&utm_term=%2Badvertising%20%2Byoutube&utm_content=en_us&gclid=Cj0KEQjwofHHBRDS0Pnhpef89ucBEiQASEp6LKVVq7S4uzKq9n03_ebVOznNtylB-PHErjpZ3iHwMTQaAurH8P8HAQ&gclsrc=aw.ds
- How to use a firewall in windows 7: https://www.youtube.com/watch?v=YIUDDKeKdDY
- Free screen recorder for tutorials(Debut Video Capture): http://www.nchsoftware.com/capture/index.html?gclid=CjwKEAiAoOvEBRDD25uyu9Lg9ycSJAD0cnBy21FYy_BgvGCVMJaPPq7bbIiG3ZLm0XU4LKFDikNCcBoCDy_w_wcB
- Debut Video Capture tutorial: https://www.youtube.com/watch?v=cO5M5wW1G68
- (Note microphone and webcam is needed)
- Any Video Converter Ultimate: http://www.any-video-converter.com/products/for_video_ultimate/
- Any Video Converter Ultimate Serial Key: https://www.youtube.com/watch?v=PVjx1K5W5E0
- Any Video Converter Ultimate Tutorial: https://www.youtube.com/watch?v=L_BlHE0Acbk
- Video Recorder Glasses(1080P Hidden Covert Sophisticated Glasses DVR HD Spy Camera): https://www.deluxecctv.com/catalog/hidden-cameras/1080p-hidden-covert-sophisticated-glasses-dvr-hd-spy-camera-2503.html?gclid=CjwKEAjwpJ_JBRC3tYai4Ky09zQSJAC5r7rueIIfsU2JA7TYiT-LsKrSiBP5H4RcbG4c1G0lse3meRoCAK_w_wcB
- How to remotely shutdown a pc with an IP address: https://www.youtube.com/watch?v=ue6jLTHz3VE
- How to shutdown a pc's internet access: https://www.youtube.com/watch?v=iA-Q4AQJanM
- Free Windows 7/8/10: https://www.youtube.com/watch?v=EPyiz0YPv-U (Note if the pc has a 32 bit processor only 32 bit OS's can be
- installed)
- How to Create a bootable Windows 7 USB and Install Windows from a USB : https://www.youtube.com/watch?v=o8I600ToTOQ
- An additional Create a bootable USB drive for Windows 7: https://www.youtube.com/watch?v=nZVgInbhTAw
- How to boot from usb on windows 8: https://www.youtube.com/watch?v=Kjjg46EQ3pk
- How to enable IPv6 on the Xbox One: https://www.youtube.com/watch?v=nu_gguJIKNQ
- How to Open all ports on the Xbox One to boost performance: https://www.youtube.com/watch?v=AoNCoRkXmEg
- How to make faster internet speed on the Xbox One: https://www.youtube.com/watch?v=phdCGOTVgWc
- Free Registry Cleaners: https://www.lifewire.com/free-registry-cleaners-2626176
- Easy to use and build website that costs $4.08 per month : www.wix.com
- A wix.com tutorial: https://www.youtube.com/watch?v=3C2VL4xIy9Y
- How to create a cd or dvd label: https://www.youtube.com/watch?v=x1jXFUaEMKs
- Custom Printed Disc Label Service: http://www.disclabels.com/?gclid=CJzk1LHN99ICFUoq0wodiZ4NcA
- Video Recorder Pen(WriteShot HD Hidden Camera Pen): http://www.brickhousesecurity.com/product/hd+hidden+camera+pen.do?sortby=bestSellers&from=fn
- Web based content assisting in information gathering on a person: https://www.truepeoplesearch.com/
- How to install fire TV stick with voice remote: https://www.youtube.com/watch?v=q610eBJDTn8
- Email Provider that does not require Phone number: Protonmail.com
- Phone Number Spoofing: https://www.spoofcard.com/free-spoof-caller-id
- IP Address Obtaining
- Link 1: https://www.youtube.com/watch?v=fPD0hJ-BxU8
- Link 2(for facebook): https://www.youtube.com/watch?v=M00YFLOipXY
- Link 3: https://www.youtube.com/watch?v=4pEPL-PRN_I
- Link 4: https://www.youtube.com/watch?v=n_yS1k841Zs
- Sell DVD's of Emulators(with instructions) and Roms with modified roms(to include modified game content[Alot of people do not know their favorite oldschool
- games has cool modifications and they would gladly pay for convenience]). Use these links to obtain emulators and modified games: https://www.emuparadise.me/Sega_Genesis_-_Sega_Megadrive_ROMs/Games-Starting-With-S/6
- and http://info.sonicretro.org/Category:Hacks
- Visual Exam Cert Suite: https://www.youtube.com/watch?v=P18-gAqVHNo
- Professor Messor's Security+ Study Group: https://www.youtube.com/watch?v=9vw2ttyak_M
- Exam voucher(for security+): https://certification.comptia.org/testing/buy-exam
- Access Belkin router by typing this in the address bar: http://192.168.2.1/
- At Barnesandnoble.com a CompTIA Security+ book can be purchased for about $31.00(plus shipping and handling[Use the Elite Study Strategy{it should take about 3 months}]
- The exam voucher alone for security+ is $300: https://certification.comptia.org/testing/buy-exam
- Use a combination of a Trojan/Xprotect/Ubot Studio(With Armor up!) and acquire inspiration from the concept of "Outtelligence" via the
- link below(for automated aggressive/passive maneuvers): https://www.youtube.com/watch?v=Wu8s0tp9yzY
- Malware/trojan weeding: Download a virtual machine, use antivirus after, if there was any additional malware it was backdoored.
- Have initially 2 types of trojans; Both from the nuclear rat download link. Have a tutorial for the second link.
- The malware risk is higher with torrents than normal browsing so NO BITLORD!
- Buy the Xprotect with western union, they only require the card(no account number needed), it's the quickest mode of purchase for Buycrypter.com.
- If you can pass a trojan server from one email to another it's Crypted(I.e. it passed the virus scanners).
- Crypt 20 pics by default as to have leverage between crypter payments(when crypter service drops). Trojan Binded and Crypted Videos and larger file
- sizes can be put on a 1TB drive for increased flexibility inbetween crypter purchases.
- Crypt the client and server(of any number or form) so they can be transferred between antivirus holding pc's.
- Incorporate Professional Gaming into youtube:
- How to Upload a video on youtube: https://www.youtube.com/watch?v=Hlxqk0iHp5w
- The most important things when it comes to the hacking victim is the webcam, Keylogger, and the C: Drive. The first or the second can match the name with the IP address.
- External Media: Flash Drives, DVD RW discs, and 1 TB drives.
- Useful connectors: Micro USB to USB, Micro USB to HDMI, Micro USB to car charger;
- USB to USB, USB to HDMI, USB to car charger;
- HDMI to HDMI.
- Remove these pc's at your convenience:
- Here's the list of IP addresses connected to my pc(It was hidden from NETSTAT):
- 31.13.69.228 (This one's Irish)
- 31.13.69.197 (This one is also Irish)
- 216.58.217.206 (This one's from Mountain View, California)
- 216.239.32.6 (Same as previous, Google Inc. is ISP)
- 216.58.219.14(Same as previous)
- 216.58.217.206(Same as previous)
- 216.58.216.10(Same as previous, makes sense, cali is the tech area).
- 70.186.30.81(New York City, New York)
- Angry IP Scanner Download Link: https://sourceforge.net/projects/ipscan/
- Angry IP Scanner Tutorial: https://www.youtube.com/watch?v=l2WX8dFYGNM
- Hacker Removal Procedure:
- Step 1: Open command prompt and type in the "NETSTAT" command.
- Step 2: A list of Network IP's could come up(other than 192.168 LAN IP's;Record them[written])
- Step 3: Turn off Remote assistance in whichever version of windows you have.
- Step 4: Alphanumeric styled connections with dashes could appear(You can still pull IP addresses from them as they are still foreign connections in the foreign address column
- (i.e. unwanted). Examples: edge-star-shv-01-iad3 and lax17s03-in-f14 .
- Step 5: Resolve the Alphanumeric addresses into IP addresses using www.iplocation.net which also gives the locations of the given IP's.
- Step 6: Using those IP addresses you now know who to block access to on your router(beefing up security on your router is a good idea).
- Step 7: Purposely turn on Remote Assistance, the previous hacker IP addresses could reconnect; record those and the resolved alphanumeric connections(under the foreign address
- column of command prompt[which should now be resolved into IP addresses via www.iplocation.net and block those IP addresses on your router. If in the circumstance
- the hacker attempts to gain unauthorized access from both IP addresses and the alpanumeric(to be resolved) addresses, repeat these steps daily(Steps 1-7, continually
- updating your router to reject these IP addresses.
- Step 8: Get foreknowledge of all devices connecting to your network(Desktops, labtops, smartphones, game consoles, etc.) and purposely turn on remote access(again for the version
- of windows you have). They will come up on the netcut software. Configure your router to only accept these connections and block all other connections. Then turn remote
- access back off.
- Step 9: Change your DNS to Google's Public DNS; If windows 7 go to Control Panel>Network & Internet>Network & Sharing Center>Change Adapter settings>Local Area Connection/Wireless Connection>Properties>
- Networking>IPv4>Click Properties>Advanced>DNS>Ok (Google's DNS Servers is 8.8.8.8). This is basically allowing google to designate your IP address.
- Here's a list of other DNS options:
- Free & Public DNS Servers (Valid January 2017)
- Provider Primary DNS Server Secondary DNS Server
- Level31 209.244.0.3 209.244.0.4
- Verisign2 64.6.64.6 64.6.65.6
- Google3 8.8.8.8 8.8.4.4
- DNS.WATCH4 84.200.69.80 84.200.70.40
- Comodo Secure DNS 8.26.56.26 8.20.247.20
- OpenDNS Home5 208.67.222.222 208.67.220.220
- DNS Advantage 156.154.70.1 156.154.71.1
- Norton ConnectSafe6 199.85.126.10 199.85.127.10
- GreenTeamDNS7 81.218.119.11 209.88.198.133
- SafeDNS8 195.46.39.39 195.46.39.40
- OpenNIC9 96.90.175.167 193.183.98.154
- SmartViper 208.76.50.50 208.76.51.51
- Dyn 216.146.35.35 216.146.36.36
- FreeDNS10 37.235.1.174 37.235.1.177
- Alternate DNS11 198.101.242.72 23.253.163.53
- Yandex.DNS12 77.88.8.8 77.88.8.1
- censurfridns.dk13 91.239.100.100 89.233.43.71
- Hurricane Electric14 74.82.42.42
- puntCAT15 109.69.8.51
- Step 10: Turn off IPv6. If windows 7 go to Control Panel>Network & Internet>Network & Sharing Center>Change Adapter settings>Local Area Connection/Wireless Connection>Properties>
- Networking>IPv6 (I think it's disconnect or turn off when you right click it).
- This is for expedient Crypter Purchase
- Contact Buycrypter support on Buycrypter.com
- Choose western union option.
- Ask if their bankwire info has updated
- (Type, Copy, and paste)
- Bank Name: ING
- Routing/BIC/IFSC : INGBNL2A
- Account Number/IBAN:NL66INGB0004239866
- Account Name: ANSoft
- Receiver: Samim Kabiri
- Utilize the Western Union at food lion.
- Furthermore, it is important to note the CIA can hack smart phones, TV's and cars(source): https://www.washingtonpost.com/news/the-switch/wp/2017/03/07/why-the-cia-is-using-your-tvs-smartphones-and-cars-for-spying/?utm_term=.8069a6f58ecc
- Source #2: https://www.extremetech.com/internet/245475-cia-may-hacking-cars-also-smart-tvs-smartphones-snapchat-whatsapp-says-wikileaks
- Here's an example of a car hack(that only 2 guys created): https://www.youtube.com/watch?v=MK0SrxBC1xs
- Do not be suprised if they can manipulate power outlets, create energy surges, etc. Here's an example of hackers hacking into a U.S. power grid: https://www.youtube.com/watch?v=pL9q2lOZ1Fw
- Here's one of the many smartphone hacks: https://www.youtube.com/watch?v=hoCqy9ndVXk
- Here's an example of a smart TV hack: https://www.youtube.com/watch?v=ELU5g2eXi70
Add Comment
Please, Sign In to add comment