Tuesday, March 6, 2012

Tails, an Anonymous OS

Today im going to talk about this Operating System I found a month or so ago, I havent used it till recently, but its a great Live Disk to use when you truly want to be Anonymous

This OS is called “Tails”

This OS has TOR wired though it, its the most secure OS ive seen so far, they continue to update it (March 5th 2012 is the newest update as of this post) And make it better. It is possible that it has some bugs, but it should be nothing to serious, and ive personally had no problems with it.

Just download this, and burn it to a DVD-RW and boot it up! Its very nice, and even has an ability to look like Windows, so nothing you do looks suspicious :D (Go to System, Preferences, Appearance)

I hope you guys like this new find :)

~The Dyzaster

Ive been locked out of my Facebook for over a week now. I cant seem to get back in, though it is still up, i cant get back in.

If you would like, you can add me on MSN TheDyzaster@live.com

Stay safe

~The Dyzaster

Sunday, February 26, 2012

Facebook dropped the "BanHammer"

Facebook dropped a serious BanHammer on many Anonymous, and Lulsec members a few days ago. Yes, i did say "Members" Deal with it!

Anyways, they deleted somewhere around 5,000 accounts, most Facebook pages and groups were lost as well, to include some of the "Anon" pages, but most of the "Anon" Pages were backed up with other accounts so their harder to get rid of :D

Ive been spending the last few days trying to get my account back, and setting up my new account. Once i get it completely set up, with a good URL and everything i will share it on here for everyone to add me, but as of right now search for "The Dyzaster" Or "Teh Dyzaster"

  ~The Dyzaster

Sunday, February 19, 2012

Think your safe when using HOIC/LOIC? Guess again.

So I was talking to a friend of mine, and he said that I should talk about “LOIC” and “HOIC”. Me and him both agree that many people believe that this is the best Hacking Tool there is. They believe that when using this “tool” they can not get caught. Im about to tell you the truth.

“DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).”

Ddos is the same, but there are multiple IP's being used so depending on how the attack is set up it might be difficult to locate the real attacker. Here ill explain it a little bit more:

Ddos is a Distributed Denial of Service. What this means is that there is many computers working together to overload a website. This is usually done by use of a botnet. A botnet is a server which holds bots/zombies/victims. The person who controls this network of bots can use these bots/zombies to Ddos a site, because of this many machines who are Ddosing a computer do not get investigated because it was by force and not by choice, but with how things are now people are using HOIC and LOIC more and more, and the percentage of Ddos's that are done by willing machines has gone up, and they are investigating more and more every day.

When you study HOIC/LOIC and virus's you see how they act, what kind of packets they send and what kind of information is in those packets. Thats how they catch you. If they see that your using HOIC/LOIC with a packet sniffer then you are done for. Attacking a government website is Treason, and soon instead of charging you for it they will have Soldiers bust in your house to shoot you on site because its soon going to be considered an act of terrorism.

“40 warrants out for the arrest of members of the Hacker group known as “Anonymous”

Do you remember seeing that back in the day? The reasoning for it is that these people were either talking about doing attacks, or got caught because they were at home using one of these tools.

Though I do want to stress that using one of these tools does NOT make you a Hacker, I still want to tell you how to use these tools safely.

Heres how you use LOIC and HOIC safely:

Use a Linux OS like BT5 or BlackBuntu (Or if you use Linux on a day-to-day basis then use that)
Open (Or install) macchanger (sudo apt-get macchanger-gtk” if your using a Debian based OS, BT5 and BlackBuntu should already have this program installed, but if they dont then install it with that command)
Now that you have it installed open up a terminal and type:
It will say something like this after you press “Enter”:
lo no wireless extensions.

eth0 no wireless extensions.

wlan0 IEEE 802.11bgn ESSID: “DisIsMyInterwebzConnection”
(More information will be here)
You see how “wlan0” has information behind it instead of saying “no wireless extensions. ”? Thats good, that means that “wlan0” is your wireless driver, it might look different “wlan1” or something smiler, remember this is for WiFi, not for Dial up or any Ethernet connection. You should use WiFi because you will be at a location other then your house, McDonalds or somewhere else that offers free internet to customers (Make sure there are no cameras in the store before you go there)

Now for the commands I enter next change “wlan0” to whatever your drivers name is, if yours is “wlan0” then leave it how it is.

Sudo ifconfig wlan0 down

(If you are connected to the internet, you have just lost connection, you might want to temporarly disable your ability to connect to the internet because if it connects you automatically then you wont be able to do the next commands)

Now type:
macchanger –show wlan0
This will show something like this:
Current MAC: 99:t5:g4:69:98:36 (unknown)

That shows your MAC Address, which is built into your Wireless Card and is only yours, no one will have the same MAC Address by default, only if they change it. Take note of the digits ( 99:t5:g4:69:98:36) and see if it changes later

Sudo macchanger-gtk

Wait a few seconds and this box should show up, click the drop down next to “options” and press “Another (Any kind)” Then for “Network interface” put “wlan0” or whatever your interface is. Then press “Change MAC” and exit out

Now type:
macchanger –show wlan0 again and see if it changed, if it did then it worked! If it didnt then type “sudo macchanger-gtk” again and try until it works. There are times it will tell you its successful when its actually not.

Now almost nothing can go back to you, once you restart your computer your MAC Address will go back to normal. As long as you dont allow shoulder no one will be able to see what your doing, and you will be safe.

Be careful, there are always ways for you to be taken down. One of the most humorus ways is for you to run up to your friend and say “HEY DUUUUUUDE I HACKERD THE GOVERNMENT!” Although Dosing and Ddosing is not Hacking it is still illegal, do not get caught doing anything illegal, and make sure that if you Ddos its for a reason and no “for teh lulz”.
Hopefully this helped answer some questions and I hope it helps keep at least the majority of people safe.

P.S. If you dont know how to get BlackBuntu or BT5 then google “Backtrack5” “Blackbuntu” and youll find the downloads, then burn the .ISO to a DVD-RW, put it in your laptops CD/DVD drive and turn your computer off. When you turn it on youll see a logo (“HP” “DELL” or whatever type of computer you have) then press “ESC” “F10” “F12” Or something smiler to boot up the DVD. After BT5 loads it will tell you to type “startx” to start it, so do just that and then follow my instructions.

~The Dyzaster

EDIT: Also, big_willy didnt know that all this should be done on a network other then your own, like a McDonalds that has no cameras in or around the store, or some other place that offers open WiFi and has no cameras. I personally use McDonalds because they have no cameras.

Friday, February 17, 2012

What is "Anonymous"?

Today ill explain the group know as “Anonymous” A bit more. In the past year or so things have changed and Anonymous has changed.Originally Anonymous was the voice of people which was heard but not seen. They fought for the rights and freedoms of those all across the world. They have done more for the people of this world then most governments have.

The reason they chose the name “Anonymous” Is because real “Anons” Follow the definition of “Anonymous” which can be found on Google (http://www.google.com/#sclient=psy-ab&hl=en&site=&source=hp&q=Definition+of+Anonymous&pbx=1&oq=Definition+of+Anonymous&aq=f&aqi=&aql=&gs_sm=3&gs_upl=950l950l0l1153l1l1l0l0l0l0l0l0ll0l0&bav=on.2,or.r_gc.r_pw.,cf.osb&fp=19b59b6572733bc8&biw=1366&bih=610)

Anonymous does not “Exist” Just like “V” from the movie “V for Vendetta” Anonymous is an idea, the idea of freedom. Its a voice that speaks when most wont or cant. They ARE however full of real people who hide behind identities and masks. I know what most of you are thinking: “Why hide when you fighting for what you believe in?” Or “God their pussies, hiding behind a god damn mask, they got no balls, NOOO BAAAAALLS!"

1. The mask represents an idea and is what Anonymous is all about. Freeing the people from tyrant governments who abuse or mistreat their citizens.

2. They hide their identity because their going against people who will have them killed for it. Some things that they do are considered treason (Like Ddosing FBI.gov which happened recently... Many times recently) And if they reveal who they are they will do time or be punished for Treason.

Now this was Anonymous a while back, as of right now they do very idiotic things. They had beef with Sony for a legit reason a year or so ago, they broke into Sony's server and did a lot of god for the users of Sony! They showed how shitty Sony was treating you and how un-secure they left all of your information. Now they attack Sony for no reason, the point has been proved and Sony is better now, but they continue to attack out of boredom. They do this with many sites and corporations. Back in the day there were actual Hackers in Anonymous (Though Anonymous says its not a group, by definition it IS), who did good and worked their asses off, but then a bunch of people who know nothing about computers and who are unwilling to learn jumped in with dreams of becoming one of the UBER HAXORS they see in movies and on T.V.

This is why Anonymous has went to shit and many of the true Anons have left. I for one no longer affiliate myself with Anonymous and neither do many of the people I know. I still represent what they do but I make my OWN movement with more order and I still fight for the same rights as Anonymous.

Because of the actions Anonymous has made I do not recommend affiliating yourself with them, this is however up to you.

Thats explaining Anonymous a bit.. I wont let them have much more of my time. I hope you make your choices very carefully, maybe join a group that is like Anonymous but thats better. Though it might sound stupid to many, but a Democracy would help a group like this be more organized and make them heard more. Yes Democracy in America and some other countries have went bad, but they were corrupted by politicians, not by the everyday citizen. We could run it better then they could, were not power or money hungry. Thats just something to look into, or think about.

    •   ~The Dyzaster

Hacking and Security sites

This is a list of sites to help you learn about Hacking and Security. I will add to it when i find a new good site, so keep an eye open!





~The Dyzaster

Sunday, February 12, 2012

What is "Hacking"?

This time I want to talk about “Hacking” Im not going to break it down as much as possible but I am going to explain things so new “Hackers” Can understand what Hacking is and what it means.

Most people who are viewing this have most likely Ddosed before. I want to start pointing out that Ddosing is not Hacking, if you wrote the program yourself then you can still be considered a “Hacker” but you are not Hacking. Confused? Let me explain.

The term “Hacker” Was used back in the day to define or explain a lumberjack. After years of it being used for that, MIT (Yes, the college) Used it to describe someone who knows the “Ins and outs” Of a train engine. An expert. Those who knew more then most people about trains. Sometime down the road it started to mean the same thing, but only with a different system. With a “Computer System”. The term “Hacker” now defines someone who is able to manipulate a Computer System to do whatever he or she wants.

With that being said, “Hacking” is not necessarily braking into someones server, or cracking someones WiFi. It is much more then that. As long as you know enough about a computer to control it and make it do anything you want, you ARE a Hacker. Yes Hacking into someones shit does most the time make you a Hacker, because you are breaking the rules of that system and you made it do what you wanted it to do, but another type of Hackers are programmers. You know the guys that made “Open Office”? Though they might not have Hacked their computer to make the code, but the fact that they know enough of whatever programming language that was used to make a program like this means they know the program enough to write small codes or programs to do anything they want. So they are considered Hackers.

The reason Ddosing is NOT considered (And never will be) Hacking is because you do nothing but send empty packets to a site. Its like pressing refresh over and over and over and over and over (And it doesnt stop). Or its like pinging a site. You are doing no damage by yourself, but if you have zombies helping you then you can overload a site and take it down as long as the attack continues, if your real lucky it will last even after the attack is finished. This is usefull for groups like Anonymous and Antisec to make a statement but it is NOT Hacking. If you really want to Hack a site then you must learn SQLI Which is pretty simple if you have time to read.

Now that ive explained what “Hacking” is, I can describe the 3 different types of Hackers:

White Hat: These are the good guys. Their the one who might Hack something small like a website you or I own, or they might Hack the pentagon itself (Yes it has been done by a White Hat). However they do not do any damage. They find out whats wrong and either fix it themselves, let the owner of whatever it was they Hacked know whats wrong and offer to fix it for free, or some just take note of the vulnerability for fear that the owner will press charges if they find out. Some are also CEH's (Certified Ethical Hackers) And actually Pentest for a living. This is where they go into a business's building and Hacks them with permission. They test physical and electronic security and make corrections when needed.

Black Hat: These are the bag guys. They Hack for bad reasons, money, power, fun, jokes, or for no reason at all. They do real damage, defacing websites, deleting everything off a whole server, they are the ones that make the bad virus's and rouge programs.

Grey Hat: This is a mix of White Hat and Black Hat. Some do White and Black Hacks equally but most are White Hats who like to play a prank or have fun and deface something every once and a while. It all depends on the person, but they do both Black and White Hat Hacks.

Those are the 3 different types of Hackers. You can break down Hacking even more but I might do that in a later post. If you have any comments or suggestions please feel free to comment here or on Facebook