It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by mr-lizard
Originally posted by hillynilly
Wow great job anom!!!!
WHERE THE HELL WERE YOU WHEN IRAN WAS PROTESTING AGAINST AHMUD DINAJAD?
Do you just pick and choose who you want to stand up for? Bunch of wimps!!
forums.whyweprotest.net...
2009
Hello, leaders of Iran. We are Anonymous.
As the eyes of the entire world hold you under close scrutiny, the eyes of the internet have taken a similar notice of your recent actions. While the governments of the world condemn you for your suppression of human rights, Anonymous has taken a particular interest in your recent attempts to censor the internet, not only for your own people, but for the citizens of the entire world.
Such suppression of dissent cannot go unpunished. By cutting off communication of the Iranian citizens to the rest of the world, you have made it clear to us that the most revered of human rights - the right to free speech - is no longer important to you. By seeking to silence the voice of the people in an election and subsequently seeking to silence criticism of such a gross cover-up, you have perpetuated the anger and rage of your people. Anonymous has therefore made it our mission to see to it that the voice of the Iranian people can be heard around the world.
Just like another authoritarian religious extremist group, Anonymous will tear down the walls of silence using only the truth - the truth that you are trying so hard to suppress by use of violence, intimidation, and fascist laws.
As your people continue to riot and to speak out against you; as you continue to beat and shoot your own citizens in the street; as you continue to lie to the face of the entire world; know that the internet is watching - and we do not like what we see.
Knowledge is free.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
2009 Iranian election protests
Front page of The Pirate Bay, June 20, 2009. Anonymous, together with The Pirate Bay, launched an Iranian Green Party Support site.[63]
Main article: 2009 Iranian election protests
Following allegations of vote rigging after the results of the June 2009 Iranian presidential election were announced, declaring Iran's incumbent President Mahmoud Ahmadinejad as the winner, thousands of Iranians participated in demonstrations. Anonymous, together with The Pirate Bay and various Iranian hackers, launched an Iranian Green Party Support site Anonymous Iran.[63] The site has drawn over 22,000 supporters world wide and allows for information exchange between the world and Iran, despite attempts by the Iranian government to censor news about the riots on the internet.
en.wikipedia.org...(group)#2009_Iranian_election_protests
The above was 2009.
Now for 2011...
ghostofvanzetti.wordpress.com... ous-begins-opiran/
To the noble people of Iran-
We know how great you are. You have been killed, jailed, tortured and silenced by the illegal regime which has hijacked your country for the past thirty-two years, and yet you still rose up last year against a force that you knew meant you harm. They may kill one person every eight hours, but they can’t kill your fighting spirit. They can’t kill your freedom. Know that we support you. Know that you are not alone.~statement from participants in #OpIran
Oh and a forum dedicated to the very subject you were too quick to shout and rant about not existing, but since you couldn't be arsed researching... I've done it for you.
iran.whyweprotest.net...edit on 10-2-2011 by mr-lizard because: (no reason given)
#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...
1) First off, it's l33t h4x07. (what you have there is haxoa) notwitstanding,
If you have friends ya don't pay. Ask Kevin Mitnik or Gary McKinnon how it feels to "do it yourself".
As the book "The 48 Laws of Power" says,....(Law 26) "You must seem a paragon of civility and efficiency: Your hands are never soiled by mistakes and nasty deeds. Maintain such a spotless appearance by using others as scapegoats and cat's paws to disquise your involvement." ...that's right, you get yourself a Lee Harvey Oswald to do your dirty work.
#2 I ran a test. Ran my proxy, I only routed through 3 nodes. One is your own local host, (several times) and then 2 more (pertaining to the proxy).
#3 Sure no ones perfect but only one thing to say .....Squid in reverse proxy - web/http accelerator
4# I meant DNS Timestamp (which can be forensically audited)...mistake by haste.
5) Don't know about linux (and doing it yourself) but in the Windows world A proxy works like this (My computer)(My IP and Port forward) to---> (middleman Server) ------->(using new servers IP)--------->connection to (victim/destination). Here is a wiki link proving that. Proxy Servers...notice there is one system between the two, nodes would be minimal... (refer to #2)
6)
"another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right away."
...?? I'll have to be honest, I don't have a clue what this means. I know of SQL injections to hack but why would you inject to get information that you didn't want??? ( Why would I do this to myself if I wanted to be anonymous?) If you're talking about forensics, they would have to know prior to my actions to be able to do this anyway. They would have to be waiting (fully aware of my intentions) ...down the road of my signals travels.
7) UDP (user datagram protocol) is an internet protocol (set of rules), not a tool to inject with. TTL = Time To Live which is also not a tool.....it is a time limit set by datagram and DNS. How you inject time and internet rules to manipulate an IP number is beyond me.
Wiki (below) describes UDP as just as unstable and unreliable as your accusations about the aforementioned proxies. This doesn't appear to be fool-proof either.
"UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level."
Source
8) Although MFM can recover data magnetically on a nano scale (recovering partial data from broken discs etc.) It has yet to be proven what you have claimed.
www.nber.org..." target="_blank" class="postlink" rel="nofollow">Souce for below - Gutteman himself.
Claims that intelligence agencies can read overwritten data on disk drives have been commonplace for many years now. The most commonly cited source of evidence for this supposed fact is a paper (Secure Deletion of Data from Magnetic and Solid-State Memory) by Peter Gutmann presented at a 1996 Usenix conference. "I found this an extraordinary claim, and therefore deserving of extraordinary proof."
"There is a large literature on the use of Magnetic Force Scanning Tunneling Microscopy (MFM or STM) to image bits recorded on magnetic media. The apparent point of this literature is not to retrieve overwritten data, but to test and improve the design of drive read/write heads."
"So I can say that Gutmann doesn't cite anyone who claims to be reading the under-data in overwritten sectors, nor does he cite any articles suggesting that ordinary wipe-disk programs wouldn't be completely effective."
Gutmann claims that "Intelligence organisations have a lot of expertise in recovering these palimpsestuous images." but there is no reference for that statement. There are 18 references in the paper, but none of the ones I was able to locate even referred to that possibility. Subsequent articles by diverse authors do make that claim, but only cite Gutmann, so they do not constitute additional evidence for his claim. (end)
In fact there has been a challenge laid out to any security professional or security firm or individual to use MFM to recover data after it has been wiped and written over JUST ONCE with 1's and 0's. To this day no one has accepted and therfore it has not been proven.
(source)- hostjury.com...
..................I'll stop here, read the rest for yourself.
9)
Ahh, but to a certain extent. hackers are people who have to make money too, not all of them get accepted into the 'hacker hall of fame' like yourself. There are some who actually have to sell their services for provisions.....they are not like you White Hat, they are not the evil Bin Laden hacker called Black Hats......they are Grey Hats and they work alone.
"ps: "real hackers" won't make you pay for it... they give it away for free"
Sorry, I didnt feel the need to nerd things up to the point where it is hard to understand what one is saying, not necessary.
edit on 10-2-2011 by Phenomium because: (no reason given)
Originally posted by _R4t_
#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...
1) First off, it's l33t h4x07. (what you have there is haxoa) notwitstanding,
If you have friends ya don't pay. Ask Kevin Mitnik or Gary McKinnon how it feels to "do it yourself".
As the book "The 48 Laws of Power" says,....(Law 26) "You must seem a paragon of civility and efficiency: Your hands are never soiled by mistakes and nasty deeds. Maintain such a spotless appearance by using others as scapegoats and cat's paws to disquise your involvement." ...that's right, you get yourself a Lee Harvey Oswald to do your dirty work.
#2 I ran a test. Ran my proxy, I only routed through 3 nodes. One is your own local host, (several times) and then 2 more (pertaining to the proxy).
#3 Sure no ones perfect but only one thing to say .....Squid in reverse proxy - web/http accelerator
4# I meant DNS Timestamp (which can be forensically audited)...mistake by haste.
5) Don't know about linux (and doing it yourself) but in the Windows world A proxy works like this (My computer)(My IP and Port forward) to---> (middleman Server) ------->(using new servers IP)--------->connection to (victim/destination). Here is a wiki link proving that. Proxy Servers...notice there is one system between the two, nodes would be minimal... (refer to #2)
6)
"another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right away."
...?? I'll have to be honest, I don't have a clue what this means. I know of SQL injections to hack but why would you inject to get information that you didn't want??? ( Why would I do this to myself if I wanted to be anonymous?) If you're talking about forensics, they would have to know prior to my actions to be able to do this anyway. They would have to be waiting (fully aware of my intentions) ...down the road of my signals travels.
7) UDP (user datagram protocol) is an internet protocol (set of rules), not a tool to inject with. TTL = Time To Live which is also not a tool.....it is a time limit set by datagram and DNS. How you inject time and internet rules to manipulate an IP number is beyond me.
Wiki (below) describes UDP as just as unstable and unreliable as your accusations about the aforementioned proxies. This doesn't appear to be fool-proof either.
"UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level."
Source
8) Although MFM can recover data magnetically on a nano scale (recovering partial data from broken discs etc.) It has yet to be proven what you have claimed.
www.nber.org..." target="_blank" class="postlink" rel="nofollow">Souce for below - Gutteman himself.
Claims that intelligence agencies can read overwritten data on disk drives have been commonplace for many years now. The most commonly cited source of evidence for this supposed fact is a paper (Secure Deletion of Data from Magnetic and Solid-State Memory) by Peter Gutmann presented at a 1996 Usenix conference. "I found this an extraordinary claim, and therefore deserving of extraordinary proof."
"There is a large literature on the use of Magnetic Force Scanning Tunneling Microscopy (MFM or STM) to image bits recorded on magnetic media. The apparent point of this literature is not to retrieve overwritten data, but to test and improve the design of drive read/write heads."
"So I can say that Gutmann doesn't cite anyone who claims to be reading the under-data in overwritten sectors, nor does he cite any articles suggesting that ordinary wipe-disk programs wouldn't be completely effective."
Gutmann claims that "Intelligence organisations have a lot of expertise in recovering these palimpsestuous images." but there is no reference for that statement. There are 18 references in the paper, but none of the ones I was able to locate even referred to that possibility. Subsequent articles by diverse authors do make that claim, but only cite Gutmann, so they do not constitute additional evidence for his claim. (end)
In fact there has been a challenge laid out to any security professional or security firm or individual to use MFM to recover data after it has been wiped and written over JUST ONCE with 1's and 0's. To this day no one has accepted and therfore it has not been proven.
(source)- hostjury.com...
..................I'll stop here, read the rest for yourself.
9)
Ahh, but to a certain extent. hackers are people who have to make money too, not all of them get accepted into the 'hacker hall of fame' like yourself. There are some who actually have to sell their services for provisions.....they are not like you White Hat, they are not the evil Bin Laden hacker called Black Hats......they are Grey Hats and they work alone.
"ps: "real hackers" won't make you pay for it... they give it away for free"
Sorry, I didnt feel the need to nerd things up to the point where it is hard to understand what one is saying, not necessary.
edit on 10-2-2011 by Phenomium because: (no reason given)
Ok, I expected you to challenge my intellect. You have 10 more years more experience, glad to see you KNOW that. You don't know as much as you're leading on either. You fail to point out all of the areas in the last post where I proved you wrong......I would be enraged too if a neophyte such as myself called you out and then proved you wrong. Read the last post again. I added wiki because you clearly didn't know what you were talking about, it was proof of what I was talking about....you can't inject a UDP or a TTL. If you can, then in your next response put up a link to prove me wrong as I did with your claim about the Magnetic Force Scanning Tunneling Microscopy. You have yet to prove anything i said above is wrong. I proved you were wrong and gave you links. All you are doing is questioning my intelligence and claiming you know everything about me almost as if you personally know me. I think i'm finished as well, if anyone has any doubt about either of us........they can just page back to the previous conversations. Im not enraged though, in this heated debate I actually learned about MFM and a couple of other things. I never claimed to know everything, but I do learn more and more by pissing people off to the point that they flood me with their collegiate knowledge. To you I say thanks. I did get some answers I needed, but I did prove you wrong back there too.
No free people EVER became free without killing the people in power, or at least their soldiers.
Originally posted by _R4t_
Ok, I expected you to challenge my intellect. You have 10 more years more experience, glad to see you KNOW that. You don't know as much as you're leading on either. You fail to point out all of the areas in the last post where I proved you wrong......I would be enraged too if a neophyte such as myself called you out and then proved you wrong. Read the last post again. I added wiki because you clearly didn't know what you were talking about, it was proof of what I was talking about....you can't inject a UDP or a TTL. If you can, then in your next response put up a link to prove me wrong as I did with your claim about the Magnetic Force Scanning Tunneling Microscopy. You have yet to prove anything i said above is wrong. I proved you were wrong and gave you links. All you are doing is questioning my intelligence and claiming you know everything about me almost as if you personally know me. I think i'm finished as well, if anyone has any doubt about either of us........they can just page back to the previous conversations. Im not enraged though, in this heated debate I actually learned about MFM and a couple of other things. I never claimed to know everything, but I do learn more and more by pissing people off to the point that they flood me with their collegiate knowledge. To you I say thanks. I did get some answers I needed, but I did prove you wrong back there too.
Man I can't challenge whats not there... you don't have the knowledge, I didn't answer because what you were saying isn't making sense you clearly don't understand how IPv4, packets, network work at the core level you'd be like WOW did I really say that if you did... and YES you can created/inject packets... you created a packet whether TCP or UDP... this packet contains a HEADER... within the HEADER there's a certain set of values predefined by the protocol (tcp/udp) certain of these values extend further and are used in other situation such as TTL... in the event of a packet the TTL is the amount of times the packet will be handled if you want between the source and the destination. The packet should arrive at the source and hit 0 as it decrease of 1 everytime it goes through a node... When injecting packets whether TCP/UDP you modify those in ways they weren't originally meant to in such ways where you will create circumstances that weren't mean to be... you literally exploit the "IPv4 protocol" in ways that will allow you to do things with it that it wasn't suppose to and the end result is a reaction that isn't suppose to happen neither.. as in getting information you wouldn't normally be suppose to received...
Example... ARP poisoning...
You have 3 computers...
You = computer A
Router = B
Target = C
You create ARP packets and modify the headers/payload and send "modified" packets to B and C... essentially telling B that you are C and telling C that you are B by spoofing the source/destination MAC address within the packets... "ITS NO SUPOSED TO HAPPEN" however you can manipulate and "inject" those which will lead in the Device B sending you data suposed to go to Device C and Device C sending you data suposed to go to Device B
therefor you created a MITM condition... "man in the middle" you then relay the information between both which allow you to sniff everything going in between... all of this due to "packet modification/injection" you can see all data going to/from device B and C and even interact with it in such ways you can alter them to worst...
That's an example of packet injection and alteration... hell you can even intercept packets on the flow and alter them then re-inject them... as example your chating with a friend and send "lol"... an attacker can create a filter and set a rule that grabs the packets containing "lol" modify it to "your cute" than re-inject it as if nothing happen in the network... therefor your friend receive "your cute" instead of "lol"...
I used this example because its easier to explain than how to manipulate UDP packets to force errors and things to happen that will give you data that will help you identify things past a firewall/proxy or whatever... But the concept is pretty much the same.. you "create" packets and alter them in ways they weren't suposed to all of this to force a response that will also be abnormal..
You aren't there yet... just learn IPv4 and networking you'll start understanding what I'm talking about... You can't do car mechanic if you don't understand how the whole process of combustion is used and transferred into energy by the engine... Its the base and you have to start there... else its useless and will just lead in a major argument that is simply hijacking the thread... Learn to walk first and I'll show you how to run after... I won't reply to you in the thread anymore I feel bad to have high-jacked it to bad so far... although feel free to u2u me if you need help in your learning process.edit on 11-2-2011 by _R4t_ because: (no reason given)