You need to be a Blogger, and Using a Pen name. Legal in all fifty states. Use this template... print and laminate at staples or kinkos. http://www.freephototool.com/
Read this carefully.
The IP Address is legally invalid.
A. As it means you cannot reliably Prosecute cyber-crimes based on IP Address alone until the problem is fixed.
B. Cases in which the IP address was used in Prosecution must be reopened by law.
C. This also makes tracking people reliably next to impossible.
D. Anyone can be framed.
1.Where are they (or the Empty House?)
Modems are registered to a specific household.
These modems don't have to be in that household, and can be connected anywhere on the network. As in any place with a coaxial cable connected to the open ISP network.
2.Anyone can be framed.
Modems identify themselves via Mac address to the ISP, This Mac address is printed on the side of the modem. The Modem is then given an IP address based on that Mac Address.
The issue is The Mac Address can be cloned in a new modem and that can be anywhere on the open network. The new modem appears to be the registered user at the registered address. The ISP sees 2 IPs assigned but cannot tell if it is the same modem, as the Mac address is the same.
There are two modems currently on the market that can configure the Mac address at will.
Solutions Now.
Quick Solution: Put up a captive portals at the ISP level. The user must enter a password and username every-time the modem is plugged in somewhere. Usename and Password must be kept secret. (Some ISP already use captive portals, but not in this configuration). This should take a day to implement nation wide. I could do this alone in a day.
Secure long term solution: Include a hardware based Random Alpha Numeric Integer Authentication Token of extreme length. Transmit the Token via SSL To the ISP. Include this with the captive portal and the problem is solved long term.
It turns out until then the concept of the IP address has always been and will always be invalid.
Post Script: I didn't make the hole I just found it & I've given two solutions.
Heart, Lung, Liver and Kidneys thus far. The size of a Beer Cooler. Will keep the Patient alive for 10 hours on UPS battery supply in transit or indefinitely on mains power. #First Response #EMT, #Field Medic, #Hospice. #3rd world.
3d printed Carbon fiber pipe and piston + rubber gasket
gray, red and blue) (valves, inside green inside red and inside blue) $560
This costume is fiberglass, but can be used as a mold for Ballistic Carbon Fiber Parts. The CNT Ballistic Carbon Fiber should be applied with CNT epoxy and layered in a random clockwise and counter-clockwise pattern to prevent uniform weak spots. LEVEL IV Protection. Lite as plastic stronger than steel.
Detect Smartphone (or bug) location via signal strength and direction. Map on google maps overlay. (optional as this blinds you) g3/g4 short range Cell phone/bug jammer aswell, Jam every frequency but the one you are on .
See where the closest people are, or track in real time or open a bubble of complete privacy. 420 and talk in peace. (or find a person buried under rubble who has a cell phone on, or finding a lost child.)
Pretend to be a g3 cell tower, Scan airwaves for cell phone signals and sniff traffic (as in intercept smartphone calls and internet traffic). Clone un-encrypted unique ID in transit MITM.
Appear to be that user (from every dimension) run up cell phone bill.
Glycerin in a breakable plastic capsule, inserted into a semi-sealed aluminum pouch filled potassium permanganate. break and toss into the hearth.
2. waterproof design Long 6 inch Glowsticks filled with potassium permanganate & oxygen with Glycerin in a breakable glass capsule insert. break and toss into the hearth.
3. design 3 (burns under water, but why?) Long 6 inch Glowsticks filled with sodium + wax & oxygen with water in a breakable glass capsule insert.
Solar powered electric lighter, Flashlight and IR LED + Emergency taser attachment
Solar panel
charging circuit
Super capacitor
voltage step up circuit
Capacitor
6 LED
6 IR LED
Small Electromagnet
Carbon fiber case the size of a pack of cigarettes
A adapter that plugs into a USB stick that fries the internal chip. consisting of a step up voltage regulator a female usb adapter and large capacitor and switch.
LIDAR is a surveying technology that measures distance by illuminating a target with a laser light. Lidar exists as an acronym of Light Detection And Ranging, and was originally created as a portmanteau of "light" and "radar" RAdio Detection And Ranging.
Scan the ip with nmap + proxychains to route it over tor;
anon@1337-817chs:~$sudo proxychains nmap -v -Pn -Ss -T4 -A -p 1-65535 104.28.##.105 Scan the site with nikto and uniscan + proxychains to route it over tor;
anon@1337-817chs:~$sudo proxychains nikto -h www.Jihadist.ps && proxychains nikto -h 104.28.##.105 anon@1337-817chs:~$sudo proxychains ./uniscan -u https://www.Jihadist.ps/
that will take awhile...check on your sqlmap results from chapter 1
any usernames or passwords? ooh goody...
on too metasploit!!
The following info should have been obtained with the help of the tor cloaked scanning
Target ip (from nslookup) 104.28.##.105
Target OS and Version (from nmap set to zero ping "-Pn" to avoid detection The
-Ss option tells nmap to perform a stealth scan, the -A option tells it to try to discover OS)
kick it oldschool by googling "OS version Exploit Metasploit" to check for any quick exploit modules in Metasploit.
We need to find out the OS and ports and services running on the target system.
Once you find the open ports and service like a samba port its party time.