Sunday, September 23, 2012

Study being conducted on hacking technology

Recently a study began on hacking technology by simply mounting an image on a virtual disk, and booting the Apple operating system and entering the original password and waoh-lah! We now have a history of both Anonymous and Antisec. All of the information intact and as it was as of the time of extraction.

The person ( Fort Lewis Staff Sergeant) responsible for the extraction was just compensated $130,000.00 a piece for each drive. The Staff Sergeant, a pathfinder, extracted the drive complete, decrypted it and handed it over to the attorney's preparing a claim for the victims of the group.

Though the technology difference, is not even comparable, the technology used to decrypt and extract the operating systems was recently developed by two former Stanford students.

Friday, August 31, 2012

Antisec penetrated

Antisec #2 was penetrated at 0145 UDT. The PC contained 3,206 contacts with more than 1/2 of those were victims at one point or another. The server file log contained history and surfing habits along with times and dates of site contacts. Virtual remounts of the systems will be conducted later today.

An atta-boy was sent via email to those responsible for the penetration. This is now a game of spook versus hackers.

Thursday, August 30, 2012

Anon #8 and Antisec next

Three-ten stack T4 servers using bayscon remote access technology are now parked out side three Russian IP addresses. They are sleepers. Once they awaken, will fire their payload  at Antisec #2, believed to be a real prize. The action usually involves the extraction on information from all of the devices on the server. The servers are private, which means, the ISP's do not have to give ip owner information protected by the Russian Government. They remain undisturbed for now.

Yesterday's hacking brought forth contact information that was urgently needed and we now have surfing data that can identify most of the perpetuents in a game that is unruly and mean.

The Antisec hacking, deemed to be most important in the scheme because this is a strong tie between Antisec, Anonymous and thirty or more US public entities.

Yesterdays information was installed on a server and contains everything-everything on that server. (emphasized)

Three Canadian IP's implicated by taking part of DDoS and hacking. Bluehost, Level Three, Level Eight and BHE (Hurricane Electric) have also been used in the past.


Wednesday, August 29, 2012

Wordpress Bullies



I guess they forgot, Doc doesn't like bullies, neither does his server!

Anon#9-hacked

Ten stacked servers dealt a blow to an anonymous hacker only known to me as Number 9, whom claimed he had hacked into several  U.S. Corporations and two unidentified agencies from a server in the United States according to two Active Duty Military personnel from Lewis McChord.

The contents of Number 9's server was copied and the server was shut down.


Order given to hack Antisec and Anonymous

At 1630 hrs 8/29/2012 an order was secured by Doc to arrange the hacking of three accounts belonging to ANTISEC and ten accounts belonging to ANONYMOUS. These will take place during the Labor Day weekend.

This takes place after the recent hacking of Wellsfargo and others were reported by Anonymous.

Splash Anonymous

Sixteen servers from outside the United States will now identify top members of the hacker group Anonymous using lure sites. The sites owned by private interests inside the United States, agreed yesterday to use the sites to lure Anonymous into a trap, while servers back trace to the original IP address. How successful will they be?

Names, addresses and IP addresses will be announced on 61 blogs (including this one) throughout the world. 

Join us while we expose the true identities of Americas #1 and #2 threats.