Copy Link
Add to Bookmark
Report
Da Hacker Blunt 10
"You know what you need? What you need is a fatty boom batty blunt. Then
I guarantee you'll see an ocean, a sailboat and maybe some of them
big-tittied mermaids doin' some of that lesbian shit."
da hacker blunt version 10
fuck copyrights! ````
``
`````
```
_______ ```
| | ``
| | __
| --/ /
| ___/
| |
| |
| }}
| |
/~~~~~~~\
| 1001001 |
| 0101010 |
\_______/
ToC for your PC
choose DMT or LSD
Be free with the weed
and light that green
/********************************************\
| 1) marijuana gardening |
| a) n1nj4 smack |
| b) breaking free of the engineer mentality |
| c) autonomon edere |
| d) v0t3 fucK |
| e) hacker wars or why our scene is dying?? |
| f) introducing silicybin |
| g) getting drunk off of the h0n3yp0tZ |
\********************************************/
/* All code included is en pseudo so a number of objectives may be
** accomplished. Those being: a realization of originiality and
** creativity that may be better made, a more intensive learning
** environment so that knowledge is retained, et portability, et al.*/
1) marijuana gardening
Everywhere I go; if I'm going to be in the area for at least a week I
go out to the forests, deserted fields, or even the mountains and
plant a garden of cotyleon seedlings. America has been waging war on
this most beautiful plant for the past century and now is the time to
help weed fight back. The plant is one of the fastest growing plants
known. It is used for everything from from non-petrol plastics to
clothing to food to shelter. It has more cellulose (paper, wood) than
most trees do and its fibers are better than most synthetically made
nylons. It has more protein than beans and more beta carotene than
carrots. That means it will keep you fit and it will improve your
eyesight. It has improved morale and the sick for centuries. You can
get heoroin and codeine and other highly addictive, dangerous meds
from the hospital but they won't let you smoke a joint which will
actually give immediate direct help? Fuck that shit. Spread the seed
everywhere you go and help overgrow the government! (btw: I like
shroom spore syringe juice in water-soakers also, but that's a diff.
story) So how do you grow marijuana anyway? Well, marijuana is a weed
so it is extremely easy to grow on it's own. However, since we want
the bud out of it we are going to try our hardest to make some at
least decent schwag. First thing you should do is collect some seeds.
The light grey to dark brown ones are the best. The white ones are too
premature and the cracked ones will do you no good. Next thing I
usually do is throw them in water for a day. The ones that float are
good and the ones that sink suck. This will also collect some water
for the nutrients locked inside the shell. Next, wrap several (like 10
or so) seeds in a damp paper towel. Put that on a plate and put another
plate on top. During this stage, for some reason, the plants don't
like sunlight. In a couple of days you should see some roots popping
out. Don't let them grow too long before transplanting otherwise the
roots will use up all their nutrients too fast. There are literally
hundreds of soil medium and such to use but we will use a cheap, easy
setup that will get you growing asap. I have used a 10 gallon bucket
in the past--the stuff you can find at construction sites. and lined
the walls with white paper to reflect the light. Then I gathered some
rocks and then sand than some soil from the yard to line the bucket
about a little over half way up the bucket. In the soil I added some
fertilizer--which helps the plant very very much and if you lived in a
place like oh... Missouri where the soil is acidic as shit from
limestone and such you almost need it for indoor growing. Next to make
some breathable soil i cut up some styrofoam take-out boxes that you
could find at a Chinese restraunt and made a good heterogeneous
mixture out of that. I turned on two 20 or 30 watt fluorescent light
bulbs and waited. You will probably see a couple of leaves and an
initial sprout very fast than there will probably be a period of
slowdown. Go ahead and feed it some more fertilizer if you want. 8-12
weeks is the usual vegetative stage followed by at least a couple more
weeks of flowering--the bud. I like to spray the leaves and wipe
everything down every couple of days with an extremely light mixture
of water and ammonia. This helps infections, aphids, and the other
nasties from fucking with your plant. If your plant grows too long of
a stem you can either tie it down and let it bush up or stick a stick
or fork or something in their and tie the plant to it. Basically, take
care of your plant and treat it like you should treat a dog and they
in return will treat you nice. For much more advanced growing details
and the like you might want to visit cannabisculture.com or google.
a) n1nj4 smack
Ever felt the need to lay down the smack on a network but couldn't
really figure out how you wanted to do it? It's a good thing you found
the dojo. Now, prepare yourself for enlightenment. Most people will be
sitting around sniffing and grab a password to a box or maybe they
found a good leech ftp on a network that is running outdated software
or whatever. Then they start analyzing traffic on that network and
setting up clay pigeons on that network until they get all the good
stuff like the mail servers, the web servers, the firewalls, the
honeypots, the routers (actually, the grand majority of 'hackers' for
some reason don't even fuck with the most fun piece of hardware on the
network), etc. But have you ever felt like something was missing? Ever
felt like you could and should do much more to a network but just
didn't have the creative juices flowing? Here are some ideas to
jumpstart your imagination:
1) finding other hackers
Yes! Instead of accidentally bumping into someone why don't you try
actively looking for your fellow kind? Write a program that sends
out in plaintext a username/password combo every minute or two
minutes. In the username/password combo field place an ip address
and port number to a gateway machine for your own hacker network.
Or, you could send messages that will end up in log files asking to
play for machines you can't get into for some reason. (Of course,
you can get into any box can't you? ;) )
2) setup activist consulta partylines
There are a LOT of people using voip convergence type software now
like asterix bbs and the like. Why not use these resources for good
things like setting up partylines for the next upcoming protest or
something similiar? Why not just say the fuck w/it and keep them up
as a primary communication resource? All you fone phreaks out there,
I know have met ma bell on the fone a couple of times and what did
they say? "Hang up now." hahahah!!! What is a sysadmin going to do
when or if he finds logs from your communications? Scratch his
fucking head because the ani from the phreaks on the partyline is
coming from the whitehouse or a baptist church or the president of
the company's private office? h0h0h0h0
3) make it a hacker playground
Remember all those disclaimers and readmes for the wargames servers
that have popped up all over the place since Carolyn and her
fuckfriend Versmaich or whatever the fuck his name is saying that it
is perfectly legal to 'hack' these boxes and use it for educational
purposes? No outbound connections and the like? I forgot who you
are, but I met a friend at the last defcon who was passing out
hundreds of business cards with a free-for-all wargames server with
no rules, outbound connections, do what you wish type of game with a
phat connection. Why not setup a webpage advertising 3 class c
networks composed of 200 boxen each up for the raping? Tell them the
truth--that it has a couple of oc-3s coming in and at least a couple
t3s coming out. Heh! Watch the fun unroll. Of course take it a step
further and make these permanent. Create gateways to each of them
and watch the new hacker generation take over the world. If your not
a hacker and your reading this do you understand us? Do you
comprehend the power we hold? The only weakness is the will power of
the underground. They have been whipped into shape for online ethics
and whimpered into nothing. What happens when you, the reader
decides to take this own life into her/his own hands? What happens
when you can make someone else realize that she/he can do the same?
What happens when those two or more people start banding together in
the common struggle. Empires meet your doom--the real motha'fuk'n
hackaz are here.
b) breaking free of the engineer mentality
Engineers are pawns of the corporations. They have smarts but for some
reason refuse to think for themselves--only for others. Let us examine
some hacker intruded engineering schemes when it comes to computer
design.
For example shared libraries. Engineers thought it would be fucking
great for the company if they wrote some portable code that is used by
many different applications. You find this shit all over in every
operating system now. The problem is that whenever there is a bug or
something else they update the library and problem solved. Of course,
if you write a program that depends on the said library your program
is using code that you do not know about. Sometimes it is extremely
hard to even get to look at the code without dissassembling it and
reverse-engineering it. This process takes for fucking ever. Most
people don't even know this, let alone take the time to look over the
code in the beginning. So, already you are catering and bowing down
before some bullshit corporate interest. Understand now why a shit
load of people love assembly? They don't rely on fucking libraries!
Programming is like a game for mathematics. You might not realize it
but there are a shit load of fucking mechancalities involved. The only
difference, thank those who came before, is that it's not proof based,
nor is it empirical based--it is based on however the fuck you want it
to be based upon is. The problem is that a lot of people are engrained
in the engineer mentality that it is only good for solving a problem,
rather than being art. Programming for the fuck of it! Programming
because you love doing it--not because you have to hack something out
quick and turn it into your boss--not because you know you will make
money off of it--not because you are seeking fame from writing
something original--shouldn't everyone be writing original code? Not
original as in writing a different method to the same problem but
writing code that does different things; not necessarily a problem at
all!
c) autonomon edere
So you have a talent for the written word to move people? You have
bold thoughts that need dissemination but you are stuck in
fucksville, Idaho? You want to reach millions of people at once but
don't know how? Come, come.... of course you know how. Enter the
dprop bot network known as autonomon edere. I know several kids that
use scripts to automate mass defacements once the boxen are rooted.
Basically we are just taking this step further and using it for
propaganda purposes. Also, it allows links to different owned systems
to view their propaganda and the like. This of course has much more
potential but an idea that I really haven't had too much time to
formulate as of yet.
/* we want to pass the file to disseminate */
int main(int argc, char *argv) {
char *rooted_b0xen[];
char *file;
int i;
file=argv[1];
/*hopefully you have kept a list of rooted b0xen in a file..or you
** could modify this program to just pipe it in... eithe way you need
** to obtain this list */
rooted_b0xen=read(file);
for(i=0; i<num_of_b0xen; i++) {
send(file, rooted_b0xen[num_of_b0xen]); }
//this will just send an automated text release to sites like
//textfiles.com, packetstormsecurity.com, neworder.box.sk, and all
//your friend's submission sites
advertise(para, site, file);
return(0);
}
()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()
() SPECIAL FUCK YOUS ARE AWARDED TO ()
() WSIS- ()
() What the fuck do you think you are? The goddamn WTO of the net? ()
() Think again motherfucker! Your in for a surprise soon b1tch3Z!! ()
() And fire fell from the skies! The damned shall seek redemption ()
() but none will be offered quarter! ()
() ()
() John Ashcroft (once again) - ()
() This motherfucker really needs a fucking bullet in his goddamn ()
() head. He throws Tommy Chong in jail for selling glass on the net ()
() but his fucking nephew gets off with probation for having over 35()
() fucking plants in his basement?! Fuck that shit! We are ()
() against any punishment given out to anyone trying to smoke some ()
() pot or grow it or make devices used to smoke it or any other ()
() fucking reason that people get fucking harassed, imprisoned, and ()
() killed for!; but fuck! this is totally not cool! ()
() ()
() United States- ()
() For being complete fucking assholes to the world and the people ()
() living under it's harsh conditions. This empire is past recon- ()
() ciliation. You won't see our WMD's and you won't know who we are ()
() until it's too late. Expect in the next five to ten years the ()
() complete and utter dissolution of the United States of America. ()
() The 'officials' don't got shit on us! We will be busting the ()
() juices of true freedom in their eyes very soon!! ;) We are busily()
() amassing our armies and will soon storm your gates releasing our ()
() sisters and brothers from your treacherous hell. Just you wait ()
() motherfuckers! ()
()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()
d) v0t3 fucK
Well, since voting is a piece of shit memetic warfare used against the
populous I decided it would only be appropriate to use the same offense
against it. Enter v0t3 fucK. v0t3 fucK is a set of scripts that goto
blogs, news sites, and other web bbs and develop profiles,
personalities, etc. to invoke memes that spread like cancer throughout
with it's intended goal to influence a wide variety of people fast.
Yes, this uses ptraits (personality traits) once again creating
character templates for undcov'ah topik agenz! Hell, if we wanted to
get scientific on the bitch we could even implant some graphs and other
goodies in the client browser(s) via php injection lameness to show how
well we are influencing others, what the responses are like, and other
useful information. So how do we implement it? Easy!
#define NUM_OF_CHARACTERS 20;
//each character starts out with a defined set of traits zeroed out...
//then a random event occurs to distribute a set number of points to
//said traits... once the character is finished generating rulesets are
//used to determine action done by the character
//the ruleset int is a number used to reference what ruleset to use when
//generating data
struct character {
int name[NUM_OF_CHARACTERS];
int ruleset;
int trait1 = 0;
int trait2 = 0;
int trait3 = 0;
//etc ...
};
char *create_ptraits(char *topic); /* define traits for characters */
char *create_data(char *topic, character *); /* create data for
characters */
int main() {
char *sites[];
char *characters[];
char *data[];
int i;
sites=obtain_sites(topic); //this can be user-inputed or it can do a spider
//search on the web for relevant sites
characters=create_ptraits(topic); //we have to map the topic to the traits
run_rulesets();
question=obtain_question(); //obtain an argument
for(i=0; i<question_num; i++) {
//this is where we generate questions from our characters
data=create_data(topic, characters[(rand%num_of_charcs)]);
//create argument from question
send(data, rand%sites[num_of_sites]);
}
return(0);
}
char *create_ptraits(char *topic) {
int i;
char *character_array[];
char *traits[];
character *bob;
for(i=0; i<num_of_characters_2_gen; i++) {
//this is simply a referential array with diff. characters of diff.
//traits that will be passed back to the main loop
assign_points(character_array[i], bob.);
}
return(character_array);
}
char * create_data(char *topic, character *) {
char *argument;
lookup_rules(character);
return(construct_argument(characters));
}
e) hacker wars or why our scene is dying??
I remember sometime in the early 90s when the FBI, CIA, etc. et al.,
were cracking down on hackers because bbs' were getting highly popular
and they were usually filled to the brim with insurrectionist,
anarchist material. After that no one really heard too much about
hacker wars unless it was confined to places like irc or web
defacements. Therefore the corporations and the state were free from
hackers fucking their shit up everytime an ego got to big and since
hacker culture is built upon ego...
How do we fix this sorry state of affairs? There are a number of ways
anyone could come up with. However, we are looking at the extinction of
our culture, our way of life, and our well being. We are looking at
either life or death. Thus we must contend that we either fight or we
die like the dinosaurs. Corporations have no qualm about killing a
group's culture, let alone them. Look at Monsanto with it's unholy
alliance with Dynacorp that spray Columbia plants with a highgrade crop
killer that also deforms babies, induces chronic diseases, and destroys
the farmers life. Look at Microsoft that has prevented very
successfully a diverse group of computer technology (both hardware and
software) from sprining up in the US. No, the question you must ask
yourself is whether or not you will fight for yourself or be
assimilated like the rest. Basically, the more chaos and confusion we
can cause as hackers the more we will have to innovate and leave the
hapless weak willed behind in the dust. We need the outlaw image that
the media likes to portray because things will only get worse until
they get better. This is the truth. Stagnation will result in death.
Metamorphisizing seizes life and shoots ftl through the beyond. So let's
jump aboard the chaos theory bandwagon and fuck shit up! Here are some
suggestions:
0: create an automated distributed troll script that uses linguistic
pattern matching to produce highly favorable trolls on web forums
0: start writing destructive office memos for every office win* network
you find asking employees to executing trojaned scripts that blame the
results on a competing group
0: start linking wargame servers together via bridges and gateways and
let everyone know that no computer, no router, no phone, no blackberry
device, no fucking coffee pot is safe from us hackers, of the net.
0: since wardriving is popular, start using it for more than free net
access--I know several banks that I've seen when I go out driving that
have passwordless 802.11 networks with bullshit like access and other
crappy software doing their accounting info--so what the fuck are you
waiting for!? write a scrambler and start fucking that account info up!
0: it's time hackers started leaving the hack computers/code only
paradigm and shifted into hacking everything! who says you can't hijack
a cell fone conversation from some bigshot ceo and amplify it outwards
to every receiver available? Tesla can... and he died over 40 years
ago!
f) introducing silicybin
Silly human, computers and networks are for hackers! Introducing
silicybin, the utility that your friend would have given you head for
life if it wasn't open-source. Silicybin is a three-part set of
programs. It is a parasitie that uses resources on an array of zombie
hosts for storing files, communicating with friends, and having all the
anemities of a regular network but it is entirely parasitical. Basically
you have three components for this thing. You have the zombies which
obviously connect to the central daemon and do all the backbreaking work
of forwarding packets, sending communications and the like. Those on the
a-list are people using your network. The a-list client is a program
that goes into the background and accepts connections on a certain port
to forward communications to the vps/vpn. The master control program is
a ncurses based program that allows control over the entire network. If
this is compromised all shit breaks loose. For each a-list client and
zombie, in the packet header there is a signed key that is transmitted
so that spurious communications may not occur. Changing the encryption
for the key is vital and protects your communications. Remember, that
this information is encapsulated again in regular tcp/ip traffic so
someone would have to write their own client and have your keys to
submit false traffic. Only then can they start spoofing shit. There is no
tunneling allowed so that everyone must be a confirmed user on the
a-list. The daemon and the a-list/zombie clients should be allowed to
have modules so that unforseen options can be added later on. To allow
access from other parts of the net gateways should be added that allow
regular ipv4/ipv6 traffic to gain access to the vpn/vps. Sentinels will
guard the gateways and act as autonomous bots that look for ne'er doers
and wage war on them from the vps. Spurious traffic will accumulate to
hide the real traffic which will be encrypted via a shared key. Here is
some of the pseudo code:
--begin cut--
begin 644 silicybin.tar.gz
M'XL(""5#$4```W-I;&EC>6)I;BYT87(`[#QK=]O&COUJ_8JI[VDL.;(D2K+=
MQE7O<6-U-Z>NG>LXM]N;9G5&Y%!BS%=)RHK<S7]?/&;XT,-VNHE[]M9L8XE#
M#`8#8#``!E3J^9Z]&'MA^XO/=G4Z_<[A_CY\=JS#_0Y^=CJ]??[DZPL+_O2[
MW6ZGU_NB8UF'O8,OQ/[G(ZFX9FDF$R&^L!=A)[P%3LX<+WH(@A[V2G/Y!_)*
MN9ZO/OT8'1#N0;^_6?[]0Y9_IWMPB.U6KP]-HO/I25F]_N+RE[[_K"9$8,>Y
M`@BXOXF"L:?RIMJ?3>;C]9FN8OU+V_=4F'V&?>#^]K]O=;JT_GO[AX_V_R&N
M5?E_^GW@;OMO%?O_(<!9^YW][J/]?XB+[;]MB[V)T!K0@IO(W#Q:_G_O:W7]
MYUKPR<:X8_U;EM4WZ__`ZAWB^K?ZO<?U_Q!7>U=D4R\5<\_WA>^EF0J%%XHH
M%%+$49()-TJ@P8X"+YP(^`AFH6?+S(O"5,C0@=XJK(E=D2J^"<18VE<BFF6(
M!!K$=1RVK^/T"*$6T4R$2@%D)`(9PR`)0"H$A4>)&$?O:409+K`?])<9.J>`
M/IO%*7336("HN#6'I^I:)2-W9E\!?2.D>!3.@A%`C!QE>XX:S6)`OMNNU?X&
MT_!GCA+?PA32S&E-OZO5VFTG"G<R,5="$@>NE%#!W\51H_:WD^$/+\Z&XI\O
MSR\N11_T<U_4:O94)KN:4R,@=80\2>N-HUK-"X%6Z87UAO@=?&CXWY$JB.#^
M2+1W80;"RX0$MA&+)C!S8%F<1+9*TR.!LQ:I%\3@@3\1M@S%6(E9"KP"X@5R
MI7YTQ)@%<5N/O$H*T"+$!_B7`-.2L-Z!A@],N5A'.N'DIX[,Y!'3SG!UFCUA
MG*BL_@0!&AI"H]=-'QZWBO^'5RG^AQ#P\XSQ,?Y_KWL`]K^[W^T]^O\/<57E
M_WER0'?Z_P<]D_\YM#J8_^MWK4?__T$N]OQ!]NSUXU:[Y\<R5#Y\PAX1P$>@
MPAE\A/8L257Z:.;_G:ZE]8]Z\,G'N'W]][K@[R_9_UX?P!_7_P-<QO^'_^-4
MS9QHSXX<=23&X+\G2CKH]6=3<%4G4_1>TVDT\QTQ\:X5^?+DOT^FZ)2#KRU%
MY(II-$?OWH["S`MGBH($W%?T."$\(_\=_/:%B.:AN/(@7I!IBD@@3FBCWP\N
M;^&NHQE"9[UH08M4;2&356T"%]^+5II\;UQM<^TP6^F9P+RK;47,4();I.UL
M$:MTM3F-["N55=M#!1Q16=L+J^TRB64;GU!$\C<'MN!0"8HZ>E:O=UBKX2#0
M+("PF9V)T<OCL^'IZ.3X\AA\]RV,.Z;`_J,MD.;EQ>NA\%S!-APX#D\<11S]
M4'2#:*5V'7D.R,/+1G,O3.L_OS@[.?]9[.[B71,%)4)PZPD*FD8@^GD.!`U-
M'3+X<JQ\AJ>O$%7X46)ZQL#);`3=`R##5U4$V`>77[8H?7_/W^>>DTW-&"P0
MO$-."#,"]8%(""*W.GTW\..9RUAV?95/(E-IE@=KU()3BF**9;&-^MJ)%]?Y
MVU3CN%(+TV.B0K@K$,#@V?L,[]N[4PF+`A33=84[N]H)X6]X=2,6*L-P$@5`
M?0*)D56.(K@QMSA6XG,`R7?9U`H+2!052<HTP+J8R\09Q1)U+36]@#N^LK.\
MF5G"=P!2DD#Z9O_M48VT0NP&I#&E)M8O:AUAC+?R:#=305R.>_&+3":V$0-\
MOW[SEN)+?.1!W`@!-XRK$A!6%(`DITJE"Q"$@N![DLAXZMED)))(3%6B:J+=
M)A6J;\<0;F8+$7LV1)UJ&X/0=AOB8Y%Y@4K0Y*2+,)NJU+M1&M7-$="UP#`:
M87`Q!%$"%BF.DQ;V3GVEXKK%J##`]@:=(^%]VX<_3Y\V(,1MMUF#W?KVK[]Z
M>E!87:Z7I!F-+))9&**5W/L.M4.`>AP)X"/0$`%-)$*8OEO_4DL3<91%R0CG
M"I1)8=(%+.$<9(L'<=E4AL@BL(^8.<!L`3REI`I_T?A;+8TEC#)*R&@]Y=9Z
M`S\+S2TIV5*&H*1SE!,@H36%ZS3%/$J<FR;-SB0+D(0WW[QMTI+)]#<K=OC;
M5'_(1-HH=X%]!YWWKDLV#;$8SM*4`?\SXJ](;1E"ZU?I=I/&H$:4#'S,I\`7
MD)A.@\#DB`KOK1@,Q,ZOG9V&&,.V=75$CWGT@0;1;42L]W:0+W0)^OJ$USCA
M?/K4Y$_TH*XC!B**55C?1AO2@JW-!=K.1Q<GYV>GOS36$(9;9QWY]@2MB&50
MNS#@'<02@"$5N7D_4K4@P5"&=@#`V%5+IBF^;K!\E\Q((6/B,+2G=E)G&:`E
M9DO.#391RM^!@!BF!]LAP#=IQ\'T%Z,`L^,E=:LIGI^?GE^,+H8GYNOWI\?/
M?VP<5>"ZYN%_7`R'9[=!]LS#7X:GI^<_WP;:+QZ^'BX#&DAB`6UU^]2]M/SW
M>?EK41J[B&(3H9J/Z)ZZ0IN61-E*>F];N!L#-'+F2.?K,NXW`HN5Q%E2+]""
M2*O=\_S=&JR#'XY/7Q'260P/%&,E0Z(7L%G=N71I'],IN_L+.8R4/8WN$+C,
MP%"'=>;PR^,7%_4^9Q^#:UK<\_KIB[/A*[$G0'R=IMC^2:89&.OG$5IX7[Q,
M(K#4P?;Z/EWN\QO:N>%[+]LN#>JZ:T9U(F8*4KV5+TI8.2"+B<KL*5A?\26L
MO=]VT+C_OI7./6RUIXW:UN];M@2KO3/=>;:UM56#?[B]0<]Z><MKK)=B!X4&
M76"%8Z^][U@#!H+$U<!'OV]AF]:>Y7Y;Y5Y:;Z#U`_[!S801H+]R+P1:20B#
MV'`M.3\`JXW1EF:$W'GVD5RP_B`7K/\K%]8CN`\7"F]LE0$W'\V`[A]D0/=.
M^N_BP-T8-G(@=T`W0;3;%=>Y8-0R(+-MLO-L(RJD;G`?3O;>WD+0!O9J@[W^
M6L/U6\=@6I<YN0EV,WO)%;R-L#7"?!#"2@[AANM6*6>?0LK]!Y#RK6-\)#/_
MD#0_)0&;K7D1B6X",=8-C,F*[[!5WCI-AW9;NKA;8VR"YY%X,(L2!"\BGM&1
MZ5QBQ!"92)2.;7786<)"A[@RP;B=3I$Q^S.7"PIH\#M&+;#QPPR4HP?)>Z^)
M<9$-6P`\YQAFBUU?T:FZN+<D-8KS3DI8O/FZ\Y8<"W+I.MK-0^R=)OW'SI*.
M5G2ZXU9/)D^7:(Q-H7MU2MPU`UKW'/!X[Q3L]+H!K&(`JU',I'M/Q/^B6D^Q
M"7NWP-XM8>\M8;>L#>C!SJ@$-`N!T9-<-T:ORB(S1O^^8U#Q`98<P!)8A[]?
MY9#1DS^0ULJ]:I.K,OFKJ?(F4XBU*&]%4P"/<ZPFB_=UPFK@N)\Y4`_D>P-0
M0<!,&$?Z6<>H3G`]EXX#+BLULX-\_/S5Z/1R""ZY8(BI[X4JA[`8XC_1J];8
MT;?.H:OXS'/=ZT+CW3+A>BF51UTL(D$GZS3/2HYYF74EQG_&K&`N(%^%$X2%
MGI2S</T(S)!.6='N`J/AMG+V^O047#.Z$QSC:.D8T0`A+#'HQ-1@%-&!3N^I
M"[:4'R_,XX5YO#@R0R)[!_Q4WXBO*<O`]%*'!+[7>78TK/%`C7`8M-$677Q:
MT"">"LS!-7B2L`AT?,9JK9.F)'0=:>6S@S5$^9;2H',39RWU3I2;J'1:BCCO
MD8+-I9)%F?0YK8*WXP6XEKYR,Y@#`IKVD(T`Q6_417Q;0@31Z0`'K<-H,,Y3
M@F@6R`I#"RP/!X,]S,OP]L<[*'5X.@@9*.^WQRT?<&P<30P(\"C/KPA"]O<]
MZQGM-F#$ES/+1)_KC+#:)Z`MXJAHP*S0R'52#KXIE8_G!+`"$U@,(EC@MPT/
M$Q5$F3(`R"/7`>O1U'4Z"N)RL)2NDZ?G@#%ONOL';W.6TC3-W4*E`\O<(-82
M\[VF>$?\_^%D]*_AQ7G]"<^$>)JWF<FPJ3)4#/C@HW[\PPCLS653O#I__N/H
MU>7%\/@G(Q9@!4)!\%DOB']U?CI"6.XSNAB^?C4\/CFY:(HG0"MHIG>C(I?4
MFY68F-5*P8BX,O!\7&IZT*7'_(4^`.;%&6(='9_]L@1&U6X#,<TP(,Z+G@(5
MI%CW5"]!WJ@D:C0I@X>Y-00;>Z"-Q63J2P($!_@)(\@GPK<\%UUJ5?2W.H;7
MKX:7I?:R($C\`_.,A%"M$3,"@DD5FHC<Q].!.G5_"N8[%V23+&'YKUY$I=38
M@+I5\F.TR(#2%Z^05J^$L%'VU0'(&^3D5KUXK7]HQY@YA;)7_%E2\(&T;551
MG77<+C``01I_!9?F+:&L,K9$,3T5WS&O&Q7/FMF?+SESF9SV5ZF8RA1D@&JE
MT"4ES]:9P>9`M8_D/=K:>XS9>Q11N+WDOF_S>A)?.;^&VVA0538*LTB66)0K
M>4.;@-(L3,"P$KG`Y.IL$8#KB;*O47)DL[4(X'L#%VQ#?(N[545>R!GJ.QAT
MJEPQT\^I)B[\-O,R)K_"8-N/4E7WEL7R_/2"U&A%)&O"KW9[`L$#9DA+C:BO
M[U!?W^7Z^JZLKZ8KEZQ&`DM(%U&H*H_+2OVNH&8U_-1XJ.J5S[W3R.=C[W3J
M94O0@/8=>@?%0EB)U\QV^DX+Y`GS>BFR*X>"'U;E73-_/^1.5R7A=U\_EN*4
MLB?+\<P=WBP#K?%HU_B0#+M?]B.WIPVN%L!S_NV*0]EEB[D1ST$%CVR(:P_"
M#KF'_/XX3(<53#<:$[\8)SX>W=<5=).&6(F+/@K=-Q5T64,4(9!ZOXXT4P"\
MX7P;]4$_7\09#$V?`V@3_TT01_EA(3TI.?,FD50^,D3<=VK6#R^&IR=BU_64
M[T`(2$WG%S^)W0`K/K3N\5,3E8_H%H^7K([^5XJ.&-9:#]M;!TLQ,FYU2T=`
MW?(6AX<W!#["15[GGGAN<SQZ?78RO,#(BE<G0\$B2T?H.1>0YZ/CUY?GKWY\
M\3(_W*%)#HA.^,*P^'!EO?7NL]YZ:]8;V29;^HI'H`'!G!BP)P4<S1">8M+$
MP&FTU>?I;&R>.RI!Z/6C4RQI=#A*LQ(%'%R8**(8I1I:5`]OYGQZ8X#S0YS<
M&!<'.85]ICSEC\-?1A!:GA7)2IJ'DWA@],U4+H;_&)T-_^MR1!I9,K0;8(=G
M)Z-"Z'15<Z7YT*]?WCGPRXOA/S_]P-\?/__QU<OCY\,[QS\9GMZ.TU&NG/G9
MK8CLZ:;N'[2ZS\)U>@#R5NO;:.V:Q;^^W7JKE9PJ;V0H>'?#73@WKM*85Q&9
MO"7L]+)3S"(7F5(`+:<0PT^&OY63^!<'J47A*1>_R*%+\`PSL"OD$#L;GN
M3CTB%YP!+)FE2KDY%<Y1PE0*QW/=%HU#)1Z4($4@*F>)C%M8X^2IHJI<NEF[
M'>#BLWK5[<5,G^8TQK6Q?DNH5C'E%AQ=8K),E<H/:)L%(X!,\R`3[;RN-=CU
MO7&R8(%@L03R%XM8B"_,:YBW]",JE0EI%\%O.#HN?N0&>)KE`I'[%%XPF54X
M0!YG#D$^A\#S4OP/]?GY@KY<7KP^>P[L.NCW2X8F+]V@^9)3O*&$0P.05URN
MWT`V0#^]P58*->:)EZFZX>@3S3$KWPM0S.8E+/#D@5U9=*7"W#D5,9A]+*Y$
M;0`!8.[=O$9%)(A9S(H<X:.K,)K#M%3"VC2-8D&.**">PJQ4,LJB$2&&6&(Z
MPG0A[%<HV3K\TXNJH$CG/B2*?PQ1BZ9CG!"-LQ@IXK40^])6_!88+"`9$B*9
M)'(!ELGW@6!2$A2;UJ0!D3^+E\A!.H!1!*WI@1AI+,<0YYM#AP1&C`)HD&GJ
M34)1W<%S52UMY.TVE5EI1TE)V%N6&0MXS?+DA<T.`$7W0`MMYG1@FM=^E#E5
M,CL<^8$1\7T\\]#2@%%P4:1T'))&O/+GBO'@&0OP.O'4M6:B+S%*C,)6JX7F
M`0$4+"=HNU(J-A6U^-Z8LJ$GHZ%5A]5U/";8/=.7S`>6DM';>8EX-TLSQ@2.
M-B;9LH3>W7,9D9?!N%@(C/T##[.3AO=.I.>"97#:[!*VL;(E63$@C;$$*IM&
M#E4&>U1.S`P`RO5;>T+.%9*+X,#`A&+[M;RF6$;S.Y"AG"@NAF/W'BR1-LOZ
MQ4.(E6&M7D$/G(`N71X#^-BGA0'+`=R8)(J;(HA`YF#@P,UHX2D6#($'52&S
M&+%7BS=)GS"@HEM0;73,TJK?,A@LUYR8E_>6G94/M\SM1L_-;#.?96Z,!55$
M^J"5::QLZ(([91/U!)=X1%N?7BF&&&B-54*F'18[+'6;-`'?HH31G2@E/20T
M#(3.A`I3+!^728`.+:[&-)XE7C1+J3@4`>G]TJ8`=/B^),!@X;2?$C&P.$+H
MX8,:`UU43YZB\0#UQ74+*A_BA#2#TKV]%SO08R?C=RFI`)0VW>YAF:?!PK`4
ME^4+D<JY""/``^8I99^"QZ1AN3Z>:TOU#,D.VU.%QGL"RQ8/./5;K04UB-MP
MFK(?Q%JT`:F:X!KD&^`PIDTPT<55GLA0P&)U6N_QOZ*F7H81F0.#GS9;E!`W
M3Z7OHLRL;[HMZ^!K[<1BFJU+>CR"^_I4LY"UR<6+9<K5"NZKSFW9+*?Y3&
MBY+*N[/09AN*(QAO"PE+P;*!Q&EF>M`V+WCTDT)%*I<6*0ZB3I_AP==0!@I'
M+0W%1\HI*;0^5UYW!LWEM86R`]-1Q6GH9\_HC6'0I?$LQ>0S[O#\AK2C6(CX
MUL0<D-AQVXLY,D>+R38/$('OYH``C,%T83N[\MGQ1"KI2`M$I\)K+XE"4@ZS
MZX/]Q+5B["=8;=?U[+T]EAS$_XD*%.!*?1@`)[.3J,G,E\D.S3$!;2'\@`/%
MW6J)PE?E-ZZ5##%YN6>F)5DO_$B2)9<QK`7S%C@LA1KMK';Q;HBDB3*AZVO5
M<U^36^PLX5.A<K6Z3@'`9D-:4T`NE[CGQ>U"UP33RQ?`=E##-+E.X*O.4])6
M7@;7[U^7VSZP0A?C`1JN+EA15NT:D47.G2.C4XFR%3##P57ORH16+>@9KD`0
M@!X8'O-H9'EA]N&$]*C$!J.(]BQ!XZ;Q(S$1FOP<T=W5_\1'G<9!!PF</@W7
M>'R!^R]Y5=__RZ.L3SK&G>__=N#[X>&AU;/ZO5X'W__M[1\\OO_W$!>:Z<=U
M_]>]UJQ_SIY\PC'NL_XM:K/V`1+7_\'AX^\_/LCUC^\O?QW\V40\7G_:5:Q_
M_9.?GV&,C_K]QP[]_F/W\?=?'N9:D?]-)QA;O4_Z*Q!WV/]^_S#__0=P`^GW
M7_K=_4?[_Q!7>U<8B4-\FGE[=A0O$CS)W<7?8]#E#IA#,`DB;*_\FMK#_,["
MNA]4V/#["_?ZG86B625)N$+_*F'XLO<F4M?^:,.]?YW@SA?H:WFQ#C"!SN9F
M05[-J8O?IA$6%`'.J5JM(-4%I)*+1U?*0WDPK&"5H9.^>:OS+IY;1V+$EX.^
MR=NYNL`+Y@UL:XKM62HGZIEH:;M!OR2$M6B8N*0#D"NU^#7<UN=@ZKV7U8MC
MKUI1,!9X-A^XM@QTZ>7\%2@ZP\WFT>W0YH=-Z&!"+J'G`Z56?J+!IS64>:,C
M(*K'2[.%C^<24X69363Q>($)Q3H)!L^?<0XLE?M4OK(,-A:MEAY7JE%)H981
MZ'K6W;HI?S1MNXVIVOMN.LK+)_,:UE+O-36L[5V=3ZT;-=M06"E+9:Q+$%SQ
M8=1S0(6%!ANI?7=_WS##:*#@E^'+DKO0F;-G@JK2L1:1])0*!AE?XXA^%M$H
M[4#.I9>-S"W]Y"(7YLF0W@?R)&;K?INA]NA\6JJ2:Y44AYV4@8MGOL\G+Z:7
MP2G<)`I*'06]'<5'G#/\U85,IT3U[V+*#`@'9)1A;;7PY"`_PRP.;+`B`8_P
M"(_SO^U=36_:0!"]^U=8O32'A&";P+%"":VB)E%4J*KV$AFS(:B6'6$[D/SZ
M[IO9M?E00@Y@6CKO1!R;M;'?>C[>S*8F&!BGR-ER8%'-580>F8@Z<CYN]I!2
MF#4S<5G'M3L=V9.EZ[<$0)$5YA?Z6F>U+R1K#,JKI!-'.Z"0@I.40Z0_.5$:
MVH@V9Y(=4]Z%/.="M-R=T48D"CG^6Y[?RE1#$\MZD1?WXUBM*7-M)1G2.;90
MC(HN3-<#\[5<$40YHP\DIJ;@;QCE=V%V9_]S5/U$G'>`M,H=%WI,;GI4)MGX
MQH=YKL_BM?&H\!"9S84!RVT+0YF8<&;:J^)IH1^5^WVD=,QJCN^5(4>3;*@_
M+@QHMJQ>612KD/+TDSQ3\3T]GF;7ZIDN!SL]Q=/:H,.1I](3'_=J&JD\G""'
MC^/B-!D?;OV'+?]PWZ[_V+?QM@6LV?\[:`&Y,?X3E.M_=)H!^K^W.K[T?ZL%
MB_W?2T?@)#6?#^$)%[R%BO^CYGR/_7^1__&;':_M@?]^J^U+_*<.+-__[F#0
M/?^Z[3$VS?\^>OZ:^]^B^3\(I/]G/1B@EUR*R`%<'=C4U^>W'S-C[<(0AK,S
MB5C_`BU98=1[8VU/Y0UW0&WZH(1)$V@QH0)!"WOH(*9I>L_2D@0E>]J:>LY*
M@<M4:;,T4PUYQ^P3R_S_UNM>7/>V/<9&_GOMDO^=ED?\#R3_5PM^L%2-A6DG
M)XGVV)MS$HYFGYR?ZN&XU"M"#V][!6>%G@.&<:$]->QN`A4OVJVF"0$;3[6+
MJ9W=/)T^.Q`S/H5Q0>+4!86G=711W_#TF,A44#^6^7_1^]R[Z6][`MC$_Z#E
MK]A_04O6_ZH'78IU3EG+:M[@]VJF;8+(5?,0J]&LO;+-$11;&BJG2$9I,<S5
MB`ZN=*(DM7Z,B_$D@:1]Q&DD\)U%X&0C:.H?8YL3LLS=+"G$NO^&VW6'83:)
M2`(^?295]%#1$D64@V&IKI%;LT+7SB=8>D>E,J=LP#+_;Z^^?[F\Z6]YC$W\
M][#FG^%_T(;^+Z#U7X3_NT=?,TDMLWN&OA5%AE(&JUH?I5B="G)Y0V?,%M87
M@.0=VF,W8A>!RX"04'BD<'%9DY#HE_Z3LLTNA)E_`U;\_ZO+_F#K8VSDOW=6
M\M\[8_W/F?"_%L!:IU<O7'IN+%\51-K\5]G`,:?*I.BWFF;HJ1]/7DRJS!'S
M_=_$,O]_[87_S4X5__,"]O^;GO"_#@RLK?UN_IMR.&'[0:#B_VYB?T#3\T'O
M]^5_Z/W?(OVOO[N09(7_G/\"@4`@$`@$`H%`(!`(!`*!0"`0"`2"P\(?HO6S
%-@"@````
`
end
--end cut--
++++================================================================++++
++ SpringTime Phun ++
+ Attack Asterix PBS w/an automated random loop generator connecting +
+ two random people that don't know each other +
+ +
+ Organize a local hack attack challenge--pick a location and via the +
+ mob mentality bullshit gather a crapload of people--any computers +
+ in the area are free game for attack! +
+ +
+ Hack all the gamers at Interz0ne. What the fuck are they playing +
+ games at a fucking hacker con for? Get these detractors out of our +
+ scene at any cost! (hijack johnnyX's pirate radio station! ;)) +
+ +
+ turn that blackberry sploit you have into a worm--all the senators +
+ and representatives use that shit. +
+ +
+ wheatpaste your university with/with-out binary of ppl's grades +
+ +
+ phish some cc and give away free hardware to 'low-class' ppl +
++ ++
++++================================================================++++
g) getting drunk off of the h0n3yp0tZ
You know how to make homemade beer? No? Why the fuck not? It's cheap
or free, depending on how you obtain your ingredients and within a
couple months you too can be rolling drunk off your ass till your next
batch is done. So, what the fuck is the point you say? The point,
dexter, is that sugar or honey is one of the essential ingredients in
alcohol. Yeast is the other. The yeast feeds off of the sugar and when
not exposed to oxygen it creates alcohol.
This will be our basic premiss behind the proof of concept program,
yeast. Yeast uses the honeypot against the owner by hiding files in
the honeypot's client logs and using the regex pattern matching of the
honeypot to snatch lan traffic such as passwords and emails. But this
is only a couple of it's capabilities sire! We can harass via logs and
spoof so-called honeytokens into giving access to ourselves the easy
way. Hrm... not following my drunken ass are you?--well then, let me
re-explain. When a honeypot is trying to capture traffic it logs
pretty much fucking everything. We take advantage of this fact to hide
files on the target system. With a little ingenuity a trojan can be
placed on any system without the target owner knowing shit. It can
also be used to send spurious data to throw the honeypots into a
quagmire. (fuck those memetic words) let's look at some pcode as that
should be easier to understand:
int main() {
do {
selectchoice(fill_up_logs);
selectchoice(hide_data);
selectchoice(be_a_bitch); //this is my favorite cause you turn the
//honeypot into your workhorse...say there is a honeytoken for a
//recent exploit that uses the string /bin/sh...if you send data
//out that has /bin/sh in it the logs will look for data coming
//from that ip/port pair more--let's not stop there..what if that
//string /bin/sh is really a link to a program on that port that
//sends out an arp poision atttack to the local router? the
//limitless choices are in abundance here ladies and gentlemen
selectchoice(scan_for_traffic);
selectchoice(trojan); } while(1);
return(0);
}
/* this is the most easiest util because at it's core is just a
** simple d0s util..we just want to make sure the honeypots are
** collecting enough info..so we send out hotstrings and other data
** very rapidly and we send a shit load of it! */
void fill_up_logs() {
collect_hot_strings(); //find out what the hotstrings are from
//something like packetstormsecurity.com
while(1) {
string=(strings[(rand%NUM_OF_STRINGS_COLLECTED)]);
ip=(rand%256);
port=(rand%65536);
send(string, ip, port, target);
}
//this func will need to be finetuned to diff. honeypot systems...
//perhaps an array where each system can be identified and then
//matched as to where the data should be put... for instance if you
//have one honeypot throwing shit into /var/log/honeypot.log that
//will be a diff. case then some homebrew bullshit that is putting it
//in /root/I'm_not_a_dumbass.log (you'd be surprised at this type of
//shit that exists--thank god the american military machine has
//partnered with lance...heh! dumbasses)
void hide_data() {
data=select_data();
ncrypt_data(data);
ip=(rand%256);
port=(rand%65536);
send(data, ip, port, target);
}
//get your creativity on!
void be_a_bitch() {
}
//this just sets tokens in the logs to traffic found to be
//interesting; an offsite approach to capturing traffic on a network
//that you might not have access to or at least not very long
void scan_for_traffic() {
char *scanned_traffic;
//a very trivial example
scanned_traffic= sniff_network();
place_tokens(scanned_trafic);
send_data(scanned_traffic);
}
//the one and only--the pos generic you'd find anywhere
//say we have that array of honeypot systems lined up and we know a
//couple of things about the target box.. a simple dot file here or a
//seemingly harmless set of weird commands that begs to be executed
//can be a wooden horse anyday
void trojan() {
}
eof