Friday, August 31, 2012

Antisec penetrated

Antisec #2 was penetrated at 0145 UDT. The PC contained 3,206 contacts with more than 1/2 of those were victims at one point or another. The server file log contained history and surfing habits along with times and dates of site contacts. Virtual remounts of the systems will be conducted later today.

An atta-boy was sent via email to those responsible for the penetration. This is now a game of spook versus hackers.

Thursday, August 30, 2012

Anon #8 and Antisec next

Three-ten stack T4 servers using bayscon remote access technology are now parked out side three Russian IP addresses. They are sleepers. Once they awaken, will fire their payload  at Antisec #2, believed to be a real prize. The action usually involves the extraction on information from all of the devices on the server. The servers are private, which means, the ISP's do not have to give ip owner information protected by the Russian Government. They remain undisturbed for now.

Yesterday's hacking brought forth contact information that was urgently needed and we now have surfing data that can identify most of the perpetuents in a game that is unruly and mean.

The Antisec hacking, deemed to be most important in the scheme because this is a strong tie between Antisec, Anonymous and thirty or more US public entities.

Yesterdays information was installed on a server and contains everything-everything on that server. (emphasized)

Three Canadian IP's implicated by taking part of DDoS and hacking. Bluehost, Level Three, Level Eight and BHE (Hurricane Electric) have also been used in the past.


Wednesday, August 29, 2012

Wordpress Bullies



I guess they forgot, Doc doesn't like bullies, neither does his server!

Anon#9-hacked

Ten stacked servers dealt a blow to an anonymous hacker only known to me as Number 9, whom claimed he had hacked into several  U.S. Corporations and two unidentified agencies from a server in the United States according to two Active Duty Military personnel from Lewis McChord.

The contents of Number 9's server was copied and the server was shut down.


Order given to hack Antisec and Anonymous

At 1630 hrs 8/29/2012 an order was secured by Doc to arrange the hacking of three accounts belonging to ANTISEC and ten accounts belonging to ANONYMOUS. These will take place during the Labor Day weekend.

This takes place after the recent hacking of Wellsfargo and others were reported by Anonymous.

Splash Anonymous

Sixteen servers from outside the United States will now identify top members of the hacker group Anonymous using lure sites. The sites owned by private interests inside the United States, agreed yesterday to use the sites to lure Anonymous into a trap, while servers back trace to the original IP address. How successful will they be?

Names, addresses and IP addresses will be announced on 61 blogs (including this one) throughout the world. 

Join us while we expose the true identities of Americas #1 and #2 threats.

Friday, August 24, 2012

City of Seattle-given notice

Loss of a virtual firewall to a "service provider" is an unacceptable circumstance after the hacking of Wellsfargo in April of  this year.  Therefore the city was given notice that if the circumstance continued after September first, NAIDI was given notice to drop the offending server with technology not-yet -released to the public. Bayscon, a remote access trojan has been programmed to
drop offending servers at a predisposed time after injection.

This stems after an attack on a NAIDI owned firewall dropped a Dell tier A (1 Tera-byte) hub server was dropped by DHCP server  began a nine hour ICMP attack on Doc's IP address.

Internet activist are stumped by the action and began organizing consumer groups tonight.

The Tony Perez,  City of Seattle responded in the complaint:

"Sorry to hear about the loss of your server. I was unaware of this situation and any impending legal action. Let me know if there is something you would like us to do."
 
Well, Tony, here's the problem:

You cannot go around attacking private interest-especially after the victim was hacked in April of this year.

As of tonight the server was still considered hostile and was still emiting ICMP and probing for the Linux server after an ASA behind a masked as an Server for Millenium was brought online tonight.

ICMP still occur-post attack several hours after, which was type three. Doc paid for his 15 MB/s  and is only getting 7.2 mb/s.

The Dell 910 was two months old and cost $16,000.00 as configured with Linux. Doc informed NAIDI to drop the offending server on the next attempt. Another server was brought in tonight with a ICMP reject command in the IP TABLES which will send ICMP recursively to the offending service.As you recall, this happened with Insight after they intentionally dropped their firewall. (which didn't work anyway) Attorney's will address the issue after September 1st.

John.
 



 

Wave Service cancellations begin

Paying for 15 Megabit service?  Your probably not getting it. Does your screen freeze leaving the picture frozen but your audio is still running perfectly?

Welcome to Wave. Recently we contacted 1,000 wave customers about these issues. Guess what,
Those thousand customers will repeat the Comcast Jinx by dropping the service.

Well what do you know.

Tuesday, August 21, 2012

Private Research

Since the recent hacking of Wellsfargo announced in April of this year, Doc began working on a linux based smart firewall for Windows using three to four SPI's before it reaches Window's and features a Windows friendly GUI. (Graphical user interface)

As designed, Camel is ran first-partitioning the drive in two formats, one for Linux and the other for Windows in separate partitions, then installs (currently) three layers. The first two which addresses viruses, mangled packets, DDOS (Distributed Denial of Service) including brute force, Bad TCP flags all based on signatures, the third handles real time security threats.

Next the Windows Operating System is placed on the NTFS partition, not the VFAT linux.

Once installed, you must run Camel software again to access the internet. Camel will place a accessible GUI in the Windows operating system. The purpose of the GUI is to identify the attackers IP  can be blocked, dropped or rejected.

There are two prototypes in the field right now surfing backbones (pipelines from other websites) that are not using antivirus software. (probably best to AV software) Meanwhile, Doc purely intends to pick a fight with some the Internets worst.

The goal is to make Windows safer. Period.


Sunday, August 19, 2012

WAVE to be next Insight

Insight Communications now Time Warner-Insight, created a lot of enemies, as did Broadstripe. Wave is starting to make the same mistakes.

My buddy, Doc, has been meeting with five consumer groups representing about 1,000 former Broadstripe customers, listening, discussing current issues with them. He disclosed the truth about the cable industry- showed facts obtained about the online attacks some faced, Level Three Communication's and the Akamai Content Delivery Service.

He closed with an hour long discussion of how he obtained his information, the cyber-bullies that are taking over the internet and how to stop domestic online bullying permanently.

He has a plan.