Written for people that are already experienced in Hacking
NEWBIES BEGONE!
I strongly suggest you don't
use these techniques to actually hack a gov or mil site.
You'll end up in jail unless
you are a MASTER of COVERING your tracks.
Even then, you should only
do it against a minor league country.
If you try any of the big
governments, you'll end up in Prison.
In the US all Military sites
have a MIL ending and Government sites have a GOV ending.
So, pentagon.mil would be a
name for a MIL site while nasa.gov will be a name for a GOV site.
The White House has a site
that's been Hacked and Cracked.
Most of these sites function
just like any other site, they use the same TCP and IP protocols and most of
the servers use the same OS as other types of sites.
I've heard some top secret
servers that use custom OS's and such, but I've never seen any examples of it.
Still, basic rules apply to
any 2D server.
You have a processor that
understands two things 1 and 0.
If you want to really HACK a
Mil or Gov site, brush up on Absolute and Assembler, since any pseudo programs
have to eventually get to binary to be processed.
Make sure you only use a
weak link to enter the system and chain proxy out the ying yang to cover your
dial up.
The Gov and Mil security
will find you even if you use fake dialups. The Phone system is fully traceable
while you are HOT.
A erver that doesn't keep
classified info is your entry point in this type of Hack, you come in from a
proxy chain, then you search for a door to some more sensitive info or a bunch
of similar low level machines.
By chaining through the
lower levels of GOV and Mil sites when you attack the real target, you can
then put in safety nets to mislead the real security guys you will encounter
when you finally hit the sensitive material secure servers.
Upon your final Attack, you
will need to put into your low level root machines all types of shadow tricks,
log creators log trashers etc. Because when the higher level machines discover
you, they will rely upon the lower machines to ID you, and you will use them to
hide you. Pure cat and mouse this type of HACK!
By having a TEMPORARY NET
under the High Level machines, you can CONTROL what they are looking for to
ID you, when you are discovered.
Think of it like this, the
GOV and Mil sites are like a pyramid. The Top of the Pyramid is the real
sensitive info, your entry will be discovered there, GUARANTEED.
Before you attempt to ROOT
the Top of the GOV or MIL sites, you core out the base of the Pyramid. You gain
Root Control server by server of the overall pyramid. If you do your HACK right
on the low level machines before you HACK the higher levels, you can daisy
proxy and shadow through the Gov and Mils own sites UNTRACEABLE at the time of
your ATTACK, making temporary false logs to cover you with their own servers.
And then TRASHING the Logs and Nets at the end of the ATTACK.
The end result, a trace gets
lost in their own systems during the ATTACK, since YOU CONTROL their
routing searches into your entry machines by having root over about 20
machines.
To do such a HACK correctly
you would need a TEAM of Hacks communicating to intercept the Gov and Mil
commands when your trail is being researched by the security guys in the top.
A scenario would look like
this, you spend a ton of time Hacking low level unsecure servers to eventually
build a safety net so when you are at the top, you can FALL BACK into
a controlled enviornment, to lose the security people at the top secure server.
You own root of about 20
unsecure servers through back doors from all your low level Hacks, you may have
preinstalled some security nets in your low level Hacks to
TURN ON when the Heat from above starts looking for who is
HACKING into the Top Level Servers, I would suggest you have Team Players
in control of root servers that will be used as a Net. You should be uploading
the Nets as the action gets hot.
That way, your Nets aren't
in files that have been backed up for days or weeks, when a Net is needed, your
Team puts it in through Root control as soon at it is loaded and after it is
used an auto delete and trash program is run to CRACK your Net so the
Security guys can't even see what you built to deceive them.
You will most likely find
security defenses in the low level machines, programs installed to safeguard
against an attack into a higher level machine. Downloading them and learning
how they work will be your best offense when you ATTACK the top.
If you try this type of HACK
yourself, you probably can't monitor all the roots and upload all the nets when
you get discovered, you would have to have several machines going at once and
put in dormant Nets to activate when they are needed. Your clever progamming of
Nets will be discovered in the backups of your low level machines that took
time to Hack.
Now, if this type of Hack is
done right, you eventually reach very secure machines that rely on lower
machines to find out where an attack is coming from. When the security team
hits a server that you CONTROL, you can temporarilty mislead the security team
by telling their secure severs what ever you want. However, if you leave the
logs in place they will find out how you did it, so erasing your foot steps is
the key.
You can't HACK a mil or gov
system without also CRACKING it.
You must DESTROY LOGS
in this type of Hack and DESTROY various sectors of hard drives that
temporarilty held your nets. If you don't destroy harddrives, then erased logs
and nets will be undeleted.
When I say DESTROY, I mean
you to have use erase programs that the Pentagon uses, it writes say 100 times
OVER the info you need to DESTROY.
That way Mil and Gov
defragmenting programs can't unerase what you deleted.
The Hard Drives are useable
after such an erase, so you don't DESTROY them physically, but you must
CRACK the Logs and Nets or you will be found even if you delete logs and nets.
Also, by only uploading your
Nets at the last moment to activate when you are found while HACKING the
top of the pyramid, makes your ID during the Hack all that more protected.
The key to a Gov or Mil
attack is to be prepared for what the security team will throw at you, that is
tracers. Their job is find you, turn off your entry and then arrest you.
If you realize Logs of entry
machines is their only trail, you have to CONTROL the low level Logs and roots
to stop or delay searches while you are in the Hack. If your Hack is
compromised, your phone will be traced to. So the last precaution is to use a
non traceable connection to your intitial entry point.
That way, if the nets don't
work, when the Feds find the originating source for the dialup they will be
looking for you in a Hotel Room, or a leased apartment to a fake ID.
Don't leave fingerprints
behind when the final attack is done, don't brag about it, and do it from a
place you have never been in. Far away from where you live.
Now, if you plant dormant
Nets before you do your FINAL ATTACK, they will exist on BACKUP files of
the machines you controlled before the final HACK is done. The safest step
is to only leave low level root doors to bounce from Net to Net in your FINAL
ATTACK, your path is again less traceable, since your Nets are only uploaded
when you need to start your smoke and mirrors routine.
You don't use low level
servers you Hack to do anything once you root them.
This is a sample of such a
Hack, lets say some ancient low level servers with old non classified crap is
your entry machines, lets say there are 12 machines you Hack in this level, you
CONTROL them through Root, you always shadow log or erase logs in your proxy so
there is no trace to your outside proxy chains when ever you enter to Hack this
type of machine. Once you gain root of such a machine, DON'T
USE IT UNTIL the FINAL ATTACK!
The time comes to move up
the ladder, some newer servers still with non classified crap is your next
level of Hack. You need about 6 machines that you again own through Root, you
don't put in any Nets yet. You may come across security at this point and if
you do, you must trash any low level entry points or bs remote roots you used
to Hack into this level if you get locked onto.
Now you own two levels of
the pyramid, the third level is the toughest, it is secure severs where you
have to use completely new unknown programs to Hack these targets. They
shouldn't be TOP LEVEL Servers, just machines with low to mid level
security. If you use some of your lower level servers to hack at this level,
you might have to trash most of your lower level to reach say 3 servers in this
point. You need to replace what ever you lose below to maintain this final
level before you attempt the Top.
For this example, you would
need 12 low level non secure servers, 6 mid level non secure or low secure
servers, 3 mid level mid secure servers. That's 21 Gov or Mil Roots you need to
OWN. All with no programs or nets left behind by you so your chances of being
discovered before the real HACK is moot.
You simply gained Root and
left it in the BANK as a valuable asset to use in your real HACK of the Top of
the Pyramid.
When you attempt to mount
the top and take root, the pyramid becomes like a house of cards. The Mil and
Gov people use systems you CONTROL to see who you are. You have 21 servers they
need to find you, all doing WHAT YOU WANT!
As you lose control of the
low level machines, your house of CARDS starts to fall. They can simply turn
off comprmised low level servers once they realize you are shadowing yourself.
When you hit the Top of the
Pyramid and knock on their front door from one server, you bang it again with
another, then another, when they trace the lower level bangs on their front
door, you create all kinds of smoke and mirror routes to shadows.
Your nets start being
uploaded right before the assault beings, your log erasers and trashers start
to kick in as you lose low level nets.
With enough time you could
Hack Root of the top through various methods, however what took most likely
months to organize could all be shot in minutes.
You would be the commander
in the largest assualt on a secure Mil or Gov server if you follow this
GAME PLAN.
What would you end up
controlling?
Root of the world perhaps.
If you have targets in mind
for what is at the top, you could install programs if you gain Root, to change
protocols for other servers and programs and launch who knows what.
As long as the world and
governments depend upon 2D Technolgy, there is no such thing as a Secure
Server.
As long as it has an OS, a
keyboard, a Floppy or a port to another machine, it isn't SECURE.
Remember, if you attempt a
Hack like this, you will be hunted and if not KILLED for being the most
dangerous person on Earth, you will end up in Prison.
I've only done this Hack on
paper and pencil, and in my dreams.
I enjoy freedom, so I would
never use this attack.
However, if a certain
country became a facist regime, I would join an opposition force and employ
this Hack to CRACK EVIL!
Tidak ada komentar:
Posting Komentar