Anonymous Threatens to Take the Hoods Off of 1,000 KKK Members

  • Thread starter Thread starter New Editor
  • Start date Start date
So its not a good idea to use wireless access points of any random given establishment open to the general public, much less a random desktop PC therein, for the purpose of Internet spying without concern of being traced even when done from a throwaway device?
 
Fosheezy;8472913 said:
So its not a good idea to use wireless access points of any random given establishment open to the general public, much less a random desktop PC therein, for the purpose of Internet spying without concern of being traced even when done from a throwaway device?

Not unless you know how to do it while being a good distance away from that access point.

Here's the problem:

You're on an open wifi at your nearby Starbucks doin your thing, "hacking" or whatever. On the other end, you've tripped somebody's IPS and show ip in their logs. They keep an eye out for that IP address. If they go through historical logs and find you there more than once, they begin an incident response investigation. Part of this is figuring out who that IP address belongs to. Turns out the IP belongs to a block owned by Comcast, Cox,Century Link, etc because that's the ISP Starbucks is using for their open wifi.

The ISP is contacted, the IP address is tracked to a router owned by the ISP sitting at that particular Starbucks. Now we know where you're operating from and if it's comcast and you're using one of their wireless gateways, they have a list of every MAC address that has connected to that router. Doing enough filtering they can narrow it down to a handful of devices, including yours.

The logs shows that the activity is popping up at certain times of the day. This gives us a time frame to watch for your attempts.

The FBI is then contacted. All data is turned over to them. Based on the data they have, they can place an agent at the establishment to run a Man In The Middle attack if they want to be incognito, or they can simply contact the establishment and let them know what they're going to do and run a tap on their connection.

The next day, you show up and do your usual, buy coffee and a piece of carrot cake and sit down at a table in the corner. You start your "activities". Because the FBI has inserted themselves into the network between everyone and the router, they can observe all traffic. If they're grabbing a capture and are watching something like Wireshark in realtime, they can create a filter to watch for any traffic going to a specific IP address (i.e. your target). You start your attack and you show up. Your MAC address is clearly visible to them. All they would need to do is find you using the very same tool I use that I posted before (WiSpy dbx+ device finder). You end up with two dudes at your table asking you questions, then cuffing you.

The key to avoiding all of this is knowing how to access an open wifi from a distance, and masking your network card's MAC address (which is incredibly simple).
 
Fosheezy;8472913 said:
So its not a good idea to use wireless access points of any random given establishment open to the general public, much less a random desktop PC therein, for the purpose of Internet spying without concern of being traced even when done from a throwaway device?

This was intricately written
 
Focal Point;8474120 said:
Fosheezy;8472913 said:
So its not a good idea to use wireless access points of any random given establishment open to the general public, much less a random desktop PC therein, for the purpose of Internet spying without concern of being traced even when done from a throwaway device?

This was intricately written

Lol I swear I tried to compose that question as plainly as I could. Hope it wasn't confusing.
 
konceptjones;8470416 said:
Ghostdenithegawd;8470131 said:
TayGettem ;8469590 said:
Melanin_Enriched ;8469551 said:
I hope y'all niggas don't really have faith in anons.

Niggas couldn't even shut down FB but they gonna take out the kkk.... Yaaaaaaa nope

I have more faith in the people on the dark web than anons

Exposing people in the kkk is alot easier than shutting down fb servers if you gona have an opinion about somethingatleast have some bit of knowledge about it

Ghostdenithegawd;8470212 said:
Thereal_ba;8470157 said:
Ghostdenithegawd;8470131 said:
TayGettem ;8469590 said:
Melanin_Enriched ;8469551 said:
I hope y'all niggas don't really have faith in anons.

Niggas couldn't even shut down FB but they gonna take out the kkk.... Yaaaaaaa nope

I have more faith in the people on the dark web than anons

Exposing people in the kkk is alot easier than shutting down fb servers if you gona have an opinion about somethingatleast have some bit of knowledge about it

And im pretty sure if the hackers got caught by the fbi, they would be charged as terrorists.

Hackers are not getting this info from a database protected by anybody important

There getting it from hacking sites like stormfront

Catching a hacker is not something that's really possible hackers that get caught are,idiots who do it from there moms basement on an every day computer

If i pay cash for an portable pc about 30$ (rasberry pie) and use somebody else's internet hack your shit then destroy the evidence how would you know it was me?

People get hacked everyday and dont know it

Take your own advice, if you're gonna attempt to speak on it at least have some knowledge.

The rest of the IC already knows I'm what's referred to as a White Hat. I've been on and led red teams. I've worked to secure global networks for large clients, including the military. My specialties being wireless security, penetration testing, and incident forensics.
http://community.allhiphop.com/discussion/comment/6651488#Comment_6651488

Anyways... Outside of what you said about exposing the KKK being easier than taking down FB (which is true), the shit you wrote is quite laughable.

1. In 2015, how the hell are you getting on someone else's wireless network? Unless you're going to Starbucks or the Library, your choices are slim as shit. The only wifi encryption that's easy as shit to break is WEP, and almost no one uses it anymore. Very few people still have their shit set to "open" so there's effctively no one in any give area with a wireless you can compromise. WPA/WPA2 are unreasonably breakable via brute force, but the cost involved to set up a CUDA or OpenCL cluster capable of brute forcing an 8 character WPA/WPA2 key in under a week would break the average person. To brute force an 9 character key usually takes months with a with a well stacked CUDA or OCL cluster... you can bring that time down with word lists but if the person is using a 10 char+ key and is including special characters and it's completely random, you ain't brute forcing that shit without a few dozen of the fastest GPU's available and a whole lotta luck (I authored a white paper on IKE cracking for a client that insisted on using aggressive mode on their VPN endpoints with short, weak keys. It's easier to break IKE than WPA/WPA2 and I could compromise their network in a few days with a two card crossfire enabled Radeon setup). Even if you had some fairly long wordlists, it's only speeds things up if your target is using regular words in their keys, if they're not it's useless.

2. A lot of people that do it from their home PC ain't technically doing it from their home PC. You pay for a VPS hosted in a non-extradition treaty country, remote into that and do everything from there. If you want to be cheap about it you run a VM from your desktop (which should have full drive encryption in place in case you're compromised), and pipe it's connection out via VPN.

3. It's Raspberry Pi... And you'd do a whole lot better just buying an older throwaway laptop than buying a Pi for this kind of thing.

4. As for getting the info from Stormfront... Maybe... But since it's just a forum like this one all you're really going to get is a bunch of IP addresses and throwaway email accounts. Correlating the people behind the ip addresses is going to be pretty difficult unless they're stupid as shit and use their email addresses elsewhere (like FB). For those idiots getting their identities might be easy.

Dominican-Republic-Police-arrested-6-Anonymous-hackers.jpg

isn't this used wireless cellcarriers an the software communicating with the hardware or some shit
 
konceptjones;8471467 said:
Ghostdenithegawd;8470608 said:
regardless of all that shit they do to mask there ip's they still eventually get tracked to there moms basement

Nah b. Check the history of Anon, the cats that got tracked did absolutely nothing to conceal themselves. A lot of the cats that got hemmed up after Chanology didn't even know to conceal their addresses. They were just using LOIC like any other application, oblivious to what it could do or what the legal ramifications were for DDoS'ing a website would be.

you don't have to crack a wap there are open access points all over my city

This may be true, but unless you know how to hit that AP from a distance as opposed to being inside or directly outside the building you still run a risk of being compromised. Doesn't take that much of an investment, but you gotta be smart about it.

And people are dumb they don't think to use a bs email and these people are old arrogant ignorant white people who think they cant be touched

Look at how many people got exposed on this site because they used all there real shit, look at all these people getting fired from that jobs for posting stuppidity because you can easily link all there shit to there real fb

They're a lot smarter than you think, but not too smart.

FB is a completely different animal. Technically you're supposed to be "you" on FB so, yes, anything you post there can be tracked. The thing that gets folks caught up is doing shit under their real names. This is why those kids that posted all that racist shit on Twitter right after Obama got re-elected will have that shit to answer to later in life; the did it all under their real names.

people are dumb there are nowhere as technological as us the reason i mention rasberry pi( i admit i dont know much about it) is because its way cheaper than a laptop,your thinking from a place for somebody with resources

In order to use a RasPi, you need extra shit to go with it. Keyboard, mouse, monitor, SD card, and you'll need to get an OS installed on it along with a wireless network dongle... and you need to power it. It makes far more sense to cop a used netbook for $50 on Ebay and a USB wireless adapter that's fully supported under Aircrack-NG to use.

Before you get to typing, I have an old netbook that I currently use for pen testing and whatnot. Copped it on Ebay a few years ago for $75 mainly because it had built-in bluetooth and I can use that with bluediving (among other tools). The onboard wifi is fully supported by Aircrack, but I also use an external usb joint with it.

I remember interning for a senior citizen homes and the girl who gave them there checks computer was infested with over 4000 thousand male-ware and she worked on that shit for years im like dam there giving out international spy retirement packages in this bitch

A lot of that old malware is annoying as shit, but the servers they phone home to are no longer online, so a lot of that data is going nowhere.

A lot of those hits were likely for components of the various pieces of malware installed, not 4000 individual malware apps.

you probably like me you think all the shit you know is common knowledge but it aint people are dumb

True, but not as dumb as you might think.

you know they could of gathered there bs emails sent them an email that looked like it came from what ever bigoted site they post from and got inside there pcs from that

Maybe. A lot of malware is being flagged and stopped on mail servers these days. Gone are the days of sending a "cool new screensaver" in an email and expecting to compromise a target.

@konceptjones

i mean correct me if im wrong i am not a white hat im just coming into being a network engineer

Go out and buy this book:

51J7VLmbyjL._AC_UL320_SR260,320_.jpg

http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071742557

I interviewed with the author of this book, Alan Harper, for contract security gig a couple of years ago (he owns a network security firm). Good dude, extremely knowledgeable. I was a little too green for what he wanted back then, but we still keep in touch.

Also grab this:

51W%2BypahcEL._SX258_BO1,204,203,200_.jpg


Take the CEH test at some point.

i guess im the only one here gonna ask this

do this shit get you noodz
 
TayGettem ;8470621 said:
Abraxas ;8470572 said:
konceptjones;8470416 said:
Ghostdenithegawd;8470131 said:
TayGettem ;8469590 said:
Melanin_Enriched ;8469551 said:
I hope y'all niggas don't really have faith in anons.

Niggas couldn't even shut down FB but they gonna take out the kkk.... Yaaaaaaa nope

I have more faith in the people on the dark web than anons

Exposing people in the kkk is alot easier than shutting down fb servers if you gona have an opinion about somethingatleast have some bit of knowledge about it

Ghostdenithegawd;8470212 said:
Thereal_ba;8470157 said:
Ghostdenithegawd;8470131 said:
TayGettem ;8469590 said:
Melanin_Enriched ;8469551 said:
I hope y'all niggas don't really have faith in anons.

Niggas couldn't even shut down FB but they gonna take out the kkk.... Yaaaaaaa nope

I have more faith in the people on the dark web than anons

Exposing people in the kkk is alot easier than shutting down fb servers if you gona have an opinion about somethingatleast have some bit of knowledge about it

And im pretty sure if the hackers got caught by the fbi, they would be charged as terrorists.

Hackers are not getting this info from a database protected by anybody important

There getting it from hacking sites like stormfront

Catching a hacker is not something that's really possible hackers that get caught are,idiots who do it from there moms basement on an every day computer

If i pay cash for an portable pc about 30$ (rasberry pie) and use somebody else's internet hack your shit then destroy the evidence how would you know it was me?

People get hacked everyday and dont know it

Take your own advice, if you're gonna attempt to speak on it at least have some knowledge.

The rest of the IC already knows I'm what's referred to as a White Hat. I've been on and led red teams. I've worked to secure global networks for large clients, including the military. My specialties being wireless security, penetration testing, and incident forensics.
http://community.allhiphop.com/discussion/comment/6651488#Comment_6651488

Anyways... Outside of what you said about exposing the KKK being easier than taking down FB (which is true), the shit you wrote is quite laughable.

1. In 2015, how the hell are you getting on someone else's wireless network? Unless you're going to Starbucks or the Library, your choices are slim as shit. The only wifi encryption that's easy as shit to break is WEP, and almost no one uses it anymore. Very few people still have their shit set to "open" so there's effctively no one in any give area with a wireless you can compromise. WPA/WPA2 are unreasonably breakable via brute force, but the cost involved to set up a CUDA or OpenCL cluster capable of brute forcing an 8 character WPA/WPA2 key in under a week would break the average person. To brute force an 9 character key usually takes months with a with a well stacked CUDA or OCL cluster... you can bring that time down with word lists but if the person is using a 10 char+ key and is including special characters and it's completely random, you ain't brute forcing that shit without a few dozen of the fastest GPU's available and a whole lotta luck (I authored a white paper on IKE cracking for a client that insisted on using aggressive mode on their VPN endpoints with short, weak keys. It's easier to break IKE than WPA/WPA2 and I could compromise their network in a few days with a two card crossfire enabled Radeon setup). Even if you had some fairly long wordlists, it's only speeds things up if your target is using regular words in their keys, if they're not it's useless.

2. A lot of people that do it from their home PC ain't technically doing it from their home PC. You pay for a VPS hosted in a non-extradition treaty country, remote into that and do everything from there. If you want to be cheap about it you run a VM from your desktop (which should have full drive encryption in place in case you're compromised), and pipe it's connection out via VPN.

3. It's Raspberry Pi... And you'd do a whole lot better just buying an older throwaway laptop than buying a Pi for this kind of thing.

4. As for getting the info from Stormfront... Maybe... But since it's just a forum like this one all you're really going to get is a bunch of IP addresses and throwaway email accounts. Correlating the people behind the ip addresses is going to be pretty difficult unless they're stupid as shit and use their email addresses elsewhere (like FB). For those idiots getting their identities might be easy.

Dominican-Republic-Police-arrested-6-Anonymous-hackers.jpg

Good shit. What's your opinion on the deep web?

Why not just go on the deep web and form ya own a

because, if i go on it, its for specific info, that i have yet to know that the deep web is good for. i dont care for anything the deep web is notorious for, so id rather not take risks just for the sake of being nosy. but i might one day.
 
Last edited:
Abraxas ;8475202 said:
because, if i go on it, its for specific info, that i have yet to know that the deep web is good for. i dont care for anything the deep web is notorious for, so id rather not take risks just for the sake of being nosy. but i might one day.

I'm on enough watch lists already, I won't een fuck around in the corner of the internet.
 
konceptjones;8475009 said:
2stepz_ahead;8474857 said:
i guess im the only one here gonna ask this

do this shit get you noodz

It's possible...

metasploit-1-startup.png

konceptjones;8475009 said:
2stepz_ahead;8474857 said:
i guess im the only one here gonna ask this

do this shit get you noodz

It's possible...

metasploit-1-startup.png

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooohhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
 
But what are we as African Americans gonna do about it. I already know this old white lady at my old job name Ida is on it as well as this other job where I worked around these other young white cats at another job but these companies are owned by white ppl that support white ppl and either play dumb or ignore. Exposing bigots won't prove nothing and we'll just keep seeing them at work, on the streets or continue to get pulled over by them.
 
I guess they're not bluffing...

Prominent US Senators and Mayors Outed as Members of the KKK by Anonymous

Anonymous delivers on its promise to unhood thousands of KKK members.



Several prominent US Senators and mayors have been outed as members of the Ku Klux Klan (KKK) and other racist groups by the hacktivist collective Anonymous, and the group hints that more politicians and public figures will be named in the near future.

In a new post on document-dumping site pastebin, Anonymous names US Senators Thom Tillis (R-N.C.), John Cornyn (R-Tx.), Dan Coats (R-In.) and Johnny Isakson (R-Ga.) as members of the KKK. Anonymous also outed several mayors of major US cities, including Madeline Rogero of Knoxville, Tennessee; Jim Gray of Lexington, Kentucky; Paul D. Fraim of Norfolk, Virginia; Kent Guinn of Ocala, Florida; and Tom Henry of Fort Wayne, Indiana.
http://usuncut.com/politics/anonymous-unhoods-kkk-prominent-politicians/

Anonymous says more coming Thursday.
 
The mayor of Lexington, Kentucky says he's not a member of the Ku Klux Klan. Anonymous postings saying he is are "false, insulting and ridiculous," Jim Gray said in a statement on Monday.

Gray was responding to the release of names of purported KKK members by someone claiming to be with the hacktivist group Anonymous.

"I have never had any relationship of any kind with the KKK. I am opposed to everything it stands for. I have no idea where this information came from, but wherever it came from, it is wrong," Gray said.

Many others also named began to take to Twitter Monday to disavow themselves from the postings.

Someone using the Twitter handle TheAnonMessage and posting as Anonymous, a global online activist network, said last week it would expose Ku Klux Klan members and publish personal details about alleged KKK adherents.

The data dump began to hit PasteBin, a site used to share and store text and computer code, on Sunday evening.

As of Monday morning there had been four listings, including 57 phone numbers and 23 email addresses. Some also included spouses of the supposed KKK members.

Sen. Dan Coates (R-IN), whose name appeared on one list, Tweeted Monday that he was in no way involved with the KKK.
http://www.usatoday.com/story/news/...-names-alleged-ku-klux-klan-members/75039282/
 
BobOblah;8481384 said:
I guess they're not bluffing...

Prominent US Senators and Mayors Outed as Members of the KKK by Anonymous

Anonymous delivers on its promise to unhood thousands of KKK members.



Several prominent US Senators and mayors have been outed as members of the Ku Klux Klan (KKK) and other racist groups by the hacktivist collective Anonymous, and the group hints that more politicians and public figures will be named in the near future.

In a new post on document-dumping site pastebin, Anonymous names US Senators Thom Tillis (R-N.C.), John Cornyn (R-Tx.), Dan Coats (R-In.) and Johnny Isakson (R-Ga.) as members of the KKK. Anonymous also outed several mayors of major US cities, including Madeline Rogero of Knoxville, Tennessee; Jim Gray of Lexington, Kentucky; Paul D. Fraim of Norfolk, Virginia; Kent Guinn of Ocala, Florida; and Tom Henry of Fort Wayne, Indiana.
http://usuncut.com/politics/anonymous-unhoods-kkk-prominent-politicians/

Anonymous says more coming Thursday.

Here we go!

This thread should be the most active thread on this site right now.
 
U.S. Senator John Cornyn (R-Tx.)

o-JOHN-CORNYN-facebook.jpg


U.S. Senator Dan Coates (R-In.)

Dan-Coats.jpg


U.S. Senator Johnny Isakson (R-Ga.)

isakson.jpg


U.S. Senator Thom Tillis (R-N.C.)

10212014_tillis-toll8201.jpg


 
reading the comments on news site with this article...

rather than calling these folks out.....people are saying why dont they out the black panther party and black lives matter.

i tell ya....anything to protect white privilege
 
J.J._Evans;8481525 said:
U.S. Senator John Cornyn (R-Tx.)

o-JOHN-CORNYN-facebook.jpg


U.S. Senator Dan Coates (R-In.)

Dan-Coats.jpg


U.S. Senator Johnny Isakson (R-Ga.)

isakson.jpg


U.S. Senator Thom Tillis (R-N.C.)

10212014_tillis-toll8201.jpg

yea....they look like they hate black folk

the type that speed up when a black man crosses the street and calls the police when their new black neighbor mows his lawn
 

Members online

No members online now.

Trending content

Thread statistics

Created
-,
Last reply from
-,
Replies
87
Views
101
Back
Top
Menu
Your profile
Post thread…