Advertisement
Guest User

[ superhacker ~db from irc.insecurity.zone ]

a guest
Aug 6th, 2017
535
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.45 KB | None | 0 0
  1.  
  2. _ _ _ ____ ____ ____ _ _ ____ _ ___ _ _
  3. | |\ | [__ |___ | | | |__/ | | \_/
  4. | | \| ___] |___ |___ |__| | \ | | |
  5. irc.insecurity.zone:6697
  6. #insecurity
  7.  
  8. starring: ~db
  9.  
  10. Topic for #insecurity: RIP MWT </3
  11. Topic set by BooZer [Fri Aug 04 2017 01:33:30]
  12. -Bopm-: You are now being scanned for open proxies. If you do not like this, feel free to disconnect.
  13. Channel modes: [+ntrlf 50 [7c#C15,30j#i10,30k#K10,40m#m10,10n#N15]:15]
  14. Channel created: Tue Jul 11 2017 15:17:07
  15. Users: [Total: 43, Owners: 4, Admins: 3, Ops: 6, HalfOps: 7, Voices: 22, Normal: 1]
  16. <~db> surprised u remember that
  17. <&NTTITON> ye ppl keep saying defiler
  18. <~db> i got bored of the bot man i finished mine b4 betamonkey
  19. <&NTTITON> andim like who dat
  20. <&NTTITON> then smoeone said rebel
  21. <&NTTITON> im like oh ye
  22. <&NTTITON> i remember him
  23. <~db> lol
  24. <~db> whos ppl
  25. <&NTTITON> now im writing windows r00tkits
  26. <&NTTITON> uhh
  27. <&NTTITON> i swear just random people
  28. <&NTTITON> and mt's IRC too
  29. <~db> ye i figure i mean
  30. <~db> voidptr -> this // mwt
  31. Quit: mib_mm609g [Quit: http://www.mibbit.com ajax IRC Client]
  32. <~db> broke up sectional
  33. <&NTTITON> wish i knew what i knew
  34. <&NTTITON> right now
  35. <&NTTITON> back then
  36. <&NTTITON> would've made best http bot
  37. <&NTTITON> no lie
  38. <~db> wanna know the story
  39. <~db> of what happened
  40. <&NTTITON> sure
  41. <~db> voidptr touchme lost admin cause i was better at it and betamonkey trusted me with his servers better than he did touchme with all the hackers we had around
  42. <~db> i got in the server and saw very clear mistakes and to be a security researcher it amazed me how lazy his securing was
  43. <~db> betamonkey never ran his servers
  44. <~db> betamonkey gave me oper
  45. <~db> touchme eventually got mad cause i had scripts to pretty much revert anything he did
  46. <~db> cause he kept banning w0ne and bosko
  47. <~db> and betamonkey didnt like that
  48. <~db> neither did i
  49. <&NTTITON> yeah why'd he hate bosko
  50. <~db> i didnt think banning was cool
  51. <&NTTITON> so much
  52. <~db> at all
  53. <&NTTITON> i understand w0ne trolled him alot
  54. <~db> cause they went at him
  55. <&NTTITON> and leaked his dox or something
  56. <~db> about him being iarkey
  57. <&NTTITON> oh
  58. <~db> nonstop
  59. <~db> and he hated that
  60. <~db> to the bone
  61. <~db> he hated his skid past
  62. <~db> HATED it
  63. <~db> probably had some illegality issues there
  64. <%sipa> db: i like weechat better than irssi
  65. <~db> probably really tried to sell some shit or got exposE'd as iarkey on some src or as a whitehat researcher
  66. <%sipa> better plugin support
  67. <~db> same sipa if u set it up right
  68. <%sipa> ye
  69. <~db> changes are a bitch
  70. <~db> lo
  71. <~db> l
  72. <%sipa> i've figured out now how to handle targeted flooding attacks ^^
  73. <~db> u get used to it tho
  74. <~db> what do u mean
  75. <~db> oh like ctcp
  76. <&NTTITON> so
  77. <%sipa> disabled all ctcp shit
  78. <&NTTITON> i was writing my formgrabber
  79. <~db> dcc requests n shit
  80. <&NTTITON> like
  81. <~db> yea u have to
  82. <&NTTITON> and mt was like
  83. <&NTTITON> "ive been writing formgrabbers before u were born"
  84. <~db> never have that enabled
  85. <%sipa> and if someone tries to flood queries
  86. <~db> ever on irc
  87. <&NTTITON> funniest stuff :d
  88. <%sipa> i can stop it
  89. <~db> ppl get ur real ip
  90. <%sipa> ^^
  91. <~db> i can get ur real ip
  92. <~db> from dcc request
  93. <~db> u dont even have to accept it
  94. <~db> if ur on ur real ipi
  95. <~db> ip
  96. <~db> ill get it
  97. <&NTTITON> yeah
  98. <%sipa> dcc doesn't work if serverside cloaking is done properly
  99. <~db> i did that for ages
  100. <~db> still do it
  101. <~db> lol
  102. <%sipa> but ye
  103. <~db> actuaully ive chilled
  104. <%sipa> point still stands
  105. <%sipa> freenode etc. don't do cloaking :P
  106. <~db> efnet
  107. <~db> no cloak
  108. <~db> hello push__eax
  109. <%sipa> ye
  110. <%sipa> speaking of ips
  111. <%sipa> mibbit xD
  112. <%sipa> mib_mm609g (2e13e1a4@Clk-9C98A32E.mibbit.com) has quit (Quit:
  113. <%sipa> 2e13e1a4 = ip in hex
  114. <~db> 2e13e1a4
  115. <%sipa> :P
  116. <~db> ya
  117. <~db> same for kiwiirc
  118. <~db> and irccloud is exploitable
  119. <~db> <--knows how
  120. <~db> can pull active connections via uid
  121. <~db> get ip
  122. <~db> all via http
  123. <~FuZi0N> nice!
  124. <~FuZi0N> db the master h3kkrrr
  125. <%sipa> ^^
  126. <~db> nah im not the only one that knows about irccloud
  127. <~db> apparently some supernets fags found it too but they found something diff i think
  128. <~db> i didnt see any proof of what they had
  129. <~db> NETIM has the same thing going on
  130. <~db> funny enough, its just a fucking link
  131. <push__eax> you talking about the old irccloud bug that vapor found? ~> http://supernets.org/dl/irccloud_poc.txt
  132. <push__eax> btw, where is MWT?
  133. <~db> u think vapor found that?
  134. <~db> lol
  135. <~db> u think he found it first?
  136. <~db> lol
  137. <~db> hey push__eax since ur here and you're on that name
  138. <~db> what are some of the main pivotal points in popping aslr for a program
  139. <~db> what do we throw to find that libc address
  140. <~db> you've had time to google it by now
  141. Join: verve [Clk-F7B718B2.brasshorncomms.uk]
  142. <~db> brrrrrrrrnt
  143. <&Southern_B|tch> xD
  144. <~db> exposE
  145. <push__eax> <~db> and irccloud is exploitable
  146. <push__eax> <~db> <--knows how
  147. <push__eax> <~db> can pull active connections via uid <~db> get ip
  148. <push__eax> <~db> all via http
  149. <push__eax> <~db> nah im not the only one that knows about irccloud
  150. <push__eax> <~db> apparently some supernets fags found it too but they found something diff i think
  151. <push__eax> <~db> i didnt see any proof of what they had <~db> NETIM has the same thing going on <~db> funny enough, its just a fucking link
  152. <push__eax> sounds exactly like what vapor put out ~> http://supernets.org/dl/irccloud_poc.txt
  153. <~db> what are some of the main pivotal points in popping aslr for a program push__eax
  154. <~db> yes sounds like vap0r stumbled on it later than me
  155. <push__eax> maybe ~db can correct me.
  156. <~db> and exposed the shit and wrote a poc
  157. <~db> when i just
  158. <~db> stealthily retrieved ip's for months
  159. <push__eax> oh so you found it first
  160. <~db> i didnt report it
  161. <~db> im not a nub
  162. Join: BooZer [17274051.6B96C85D.D0D0CE60.IP]
  163. Mode: [+ao BooZer BooZer] by ChanServ
  164. Mode: [+v push__eax] by BooZer
  165. <~db> but your name is like that
  166. <~db> and
  167. <~db> what are some of the main pivotal points in popping aslr for a program
  168. <+push__eax> wow, very coincidental that you both found the same thing, but you found it first.
  169. <~db> you cant answer this to me
  170. <~db> no its not coincidental
  171. <~db> i kept saying theres a vuln on irccloud
  172. <~db> for ages
  173. <~db> in #LRH
  174. <~db> it was only inevitable for someone else to find it...
  175. <+push__eax> i mean, you wouldn't be lying, would you?
  176. <~db> i was giving out ip's to other peoples shit on irccloud
  177. <~db> if you were around lrh ud know
  178. <~db> lol
  179. <&BooZer> ^ i remember when irccloud ip's could be exposed
  180. <&BooZer> but
  181. <&BooZer> i don't think you still can?
  182. <~db> yes
  183. <~db> its been active for over a cpl years
  184. <~db> and dipshit over here
  185. <~db> thinks supernets 'vap0r' found it
  186. <~db> cause he wrote a PoC on it
  187. <&BooZer> lol
  188. <~db> like a 'dipshit'
  189. <~db> for fame
  190. <~db> and hopes of glory
  191. <~db> when real niggas have been knowing about that shit
  192. <~db> lol
  193. <+push__eax> you found a bug, didnt report it cause you're not a nub but bragged about a bug existing on irccloud? that doesn't make much sense.
  194. <~db> i didnt braag about it people were getting on irccloud feeling secure to talk shit
  195. <+push__eax> how old are you?
  196. <~db> and i was exposing the fact they werent
  197. <~db> by handing them their ip addresses
  198. <~db> how old are you?
  199. <&BooZer> push__eax
  200. <~db> what are some of the main pivotal points in popping aslr for a program
  201. <~db> ^^
  202. <~db> still willing to take an answer
  203. <~db> what do we throw to get that address we want to get around aslr
  204. <+push__eax> wait, you said earlier that you told people that there is a bug with irccloud. now you claim you didn't brag about it?
  205. <+push__eax> which is it?
  206. <~db> i didnt brag about using it directly, no
  207. <~db> i did in fact hand people their ip as they were acting obnoxious
  208. <~db> publicly
  209. <~db> and sometimes privately to other LRH hackers
  210. <~db> so they could do as they wanted with it
  211. <&BooZer> db an I have been around longer then everyone here
  212. <~db> doxing by IP is an easy thing
  213. <+push__eax> are there any logs of this?
  214. <~db> why would there be
  215. <~db> and if there were (which there arent)
  216. <~db> why would they be handed to you
  217. <~db> dude who the fuck do you think we are rofl
  218. <~db> and who the fuck are you
  219. <+push__eax> wow... thats amazing. so basically, there is no proof of what you have said other than you saying it.
  220. <&BooZer> push__eax you probably weren't even born when we were already in the scene
  221. <+push__eax> got it.
  222. <&BooZer> you have no idea
  223. <&BooZer> but tbh i don't know what's going on just came in.
  224. <&BooZer> but
  225. <+push__eax> oh noes! are you guys both gangsta4lyf?
  226. <~db> why would we want proof
  227. <~db> ive been in so many diff eras of the scene now boozer lol
  228. <~db> it makes me sick
  229. <&BooZer> <&BooZer> push__eax you probably weren't even born when we were already in the scene
  230. <&BooZer> <+push__eax> oh noes! are you guys both gangsta4lyf?
  231. <&BooZer> confirmed
  232. <&BooZer> lol
  233. <~db> lola passed out a pw
  234. <~db> but ur name is push__eax
  235. <~db> and you cant tell me
  236. <~db> what are some of the main pivotal points in popping aslr for a program
  237. <~db> ill even throw an easier question
  238. <~db> if you'd like
  239. <~db> about canaries?
  240. <~db> .got entries?
  241. <~db> anything that has to do with asm x86_64?
  242. <~db> any syntax GAS / Intell?
  243. <~db> tell me what the difference is between the 2
  244. <~db> why can i easily write GAS just because i have an understanding of intel and an intimate knowledge of AT&T syntax
  245. <+push__eax> sure are getting defensive, aren't you? do you normally lie to people to make them believe you are something which you aren't?
  246. <~db> why can i write in both push__eax?
  247. <~db> is this a lie?
  248. <~db> does this seem like a lie im asking you questions about your nick
  249. <~db> that you obviuosly dont seem to know dick about
  250. <~db> do you even know why you're using an a instead of a b
  251. <~db> or what the a or b stands for
  252. <+push__eax> how quickly we change the subject. i thought we were discussing the irccloud bug that you found?
  253. <~db> that's been discussed and that book was closed
  254. <~db> i opened a new chapter on your bitch ass
  255. <~db> the art of you lying and trying to seem cool through a nickname
  256. <~db> fuck outta here
  257. <~db> !k push__eax come back when you have a legit answer to ANYTHING ive asked
  258. <+d-parse> push__eax has been kicked from #insecurity.
  259. <~db> oops
  260. <&BooZer> sound's like another pastebin log incoming
  261. You were kicked from #insecurity by db [come back when you have a legit answer to ANYTHING ive asked]
  262. Disconnected
  263.  
  264. efnet.port80.se
  265. #EfNetNews #ENN
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement