NEWBIES BEGONE!

Written for people that are already experienced in Hacking
NEWBIES BEGONE!


I strongly suggest you don't use these techniques to actually hack a gov or mil site.
You'll end up in jail unless you are a MASTER of COVERING your tracks.
Even then, you should only do it against a minor league country.
If you try any of the big governments, you'll end up in Prison.
In the US all Military sites have a MIL ending and Government sites have a GOV ending.
So, pentagon.mil would be a name for a MIL site while nasa.gov will be a name for a GOV site.
The White House has a site that's been Hacked and Cracked.
Most of these sites function just like any other site, they use the same TCP and IP protocols and most of the servers use the same OS as other types of sites.
I've heard some top secret servers that use custom OS's and such, but I've never seen any examples of it.
Still, basic rules apply to any 2D server.
You have a processor that understands two things 1 and 0.
If you want to really HACK a Mil or Gov site, brush up on Absolute and Assembler, since any pseudo programs have to eventually get to binary to be processed.
Make sure you only use a weak link to enter the system and chain proxy out the ying yang to cover your dial up.
The Gov and Mil security will find you even if you use fake dialups. The Phone system is fully traceable while you are HOT.
A erver that doesn't keep classified info is your entry point in this type of Hack, you come in from a proxy chain, then you search for a door to some more sensitive info or a bunch of similar low level machines.
By chaining through the lower levels of GOV and Mil sites when you attack the real target, you can then put in safety nets to mislead the real security guys you will encounter when you finally hit the sensitive material secure servers.
Upon your final Attack, you will need to put into your low level root machines all types of shadow tricks, log creators log trashers etc. Because when the higher level machines discover you, they will rely upon the lower machines to ID you, and you will use them to hide you. Pure cat and mouse this type of HACK!
By having a TEMPORARY NET under the High Level machines, you can CONTROL what they are looking for to ID you, when you are discovered.
Think of it like this, the GOV and Mil sites are like a pyramid. The Top of the Pyramid is the real sensitive info, your entry will be discovered there, GUARANTEED.
Before you attempt to ROOT the Top of the GOV or MIL sites, you core out the base of the Pyramid. You gain Root Control server by server of the overall pyramid. If you do your HACK right on the low level machines before you HACK the higher levels, you can daisy proxy and shadow through the Gov and Mils own sites UNTRACEABLE at the time of your ATTACK, making temporary false logs to cover you with their own servers. And then TRASHING the Logs and Nets at the end of the ATTACK.
The end result, a trace gets lost in their own systems during the ATTACK, since YOU CONTROL their routing searches into your entry machines by having root over about 20 machines.
To do such a HACK correctly you would need a TEAM of Hacks communicating to intercept the Gov and Mil commands when your trail is being researched by the security guys in the top.
A scenario would look like this, you spend a ton of time Hacking low level unsecure servers to eventually build a safety net so when you are at the top, you can FALL BACK into a controlled enviornment, to lose the security people at the top secure server.
You own root of about 20 unsecure servers through back doors from all your low level Hacks, you may have preinstalled some security nets in your low level Hacks to TURN ON when the Heat from above starts looking for who is HACKING into the Top Level Servers, I would suggest you have Team Players in control of root servers that will be used as a Net. You should be uploading the Nets as the action gets hot.
That way, your Nets aren't in files that have been backed up for days or weeks, when a Net is needed, your Team puts it in through Root control as soon at it is loaded and after it is used an auto delete and trash program is run to CRACK your Net so the Security guys can't even see what you built to deceive them.
You will most likely find security defenses in the low level machines, programs installed to safeguard against an attack into a higher level machine. Downloading them and learning how they work will be your best offense when you ATTACK the top.
If you try this type of HACK yourself, you probably can't monitor all the roots and upload all the nets when you get discovered, you would have to have several machines going at once and put in dormant Nets to activate when they are needed. Your clever progamming of Nets will be discovered in the backups of your low level machines that took time to Hack.
Now, if this type of Hack is done right, you eventually reach very secure machines that rely on lower machines to find out where an attack is coming from. When the security team hits a server that you CONTROL, you can temporarilty mislead the security team by telling their secure severs what ever you want. However, if you leave the logs in place they will find out how you did it, so erasing your foot steps is the key.
You can't HACK a mil or gov system without also CRACKING it.
You must DESTROY LOGS in this type of Hack and DESTROY various sectors of hard drives that temporarilty held your nets. If you don't destroy harddrives, then erased logs and nets will be undeleted.
When I say DESTROY, I mean you to have use erase programs that the Pentagon uses, it writes say 100 times OVER the info you need to DESTROY.
That way Mil and Gov defragmenting programs can't unerase what you deleted.
The Hard Drives are useable after such an erase, so you don't DESTROY them physically, but you must CRACK the Logs and Nets or you will be found even if you delete logs and nets.
Also, by only uploading your Nets at the last moment to activate when you are found while HACKING the top of the pyramid, makes your ID during the Hack all that more protected.
The key to a Gov or Mil attack is to be prepared for what the security team will throw at you, that is tracers. Their job is find you, turn off your entry and then arrest you.
If you realize Logs of entry machines is their only trail, you have to CONTROL the low level Logs and roots to stop or delay searches while you are in the Hack. If your Hack is compromised, your phone will be traced to. So the last precaution is to use a non traceable connection to your intitial entry point.
That way, if the nets don't work, when the Feds find the originating source for the dialup they will be looking for you in a Hotel Room, or a leased apartment to a fake ID.
Don't leave fingerprints behind when the final attack is done, don't brag about it, and do it from a place you have never been in. Far away from where you live.
Now, if you plant dormant Nets before you do your FINAL ATTACK, they will exist on BACKUP files of the machines you controlled before the final HACK is done. The safest step is to only leave low level root doors to bounce from Net to Net in your FINAL ATTACK, your path is again less traceable, since your Nets are only uploaded when you need to start your smoke and mirrors routine.
You don't use low level servers you Hack to do anything once you root them.
This is a sample of such a Hack, lets say some ancient low level servers with old non classified crap is your entry machines, lets say there are 12 machines you Hack in this level, you CONTROL them through Root, you always shadow log or erase logs in your proxy so there is no trace to your outside proxy chains when ever you enter to Hack this type of machine. Once you gain root of such a machine, DON'T USE IT UNTIL the FINAL ATTACK!
The time comes to move up the ladder, some newer servers still with non classified crap is your next level of Hack. You need about 6 machines that you again own through Root, you don't put in any Nets yet. You may come across security at this point and if you do, you must trash any low level entry points or bs remote roots you used to Hack into this level if you get locked onto.
Now you own two levels of the pyramid, the third level is the toughest, it is secure severs where you have to use completely new unknown programs to Hack these targets. They shouldn't be TOP LEVEL Servers, just machines with low to mid level security. If you use some of your lower level servers to hack at this level, you might have to trash most of your lower level to reach say 3 servers in this point. You need to replace what ever you lose below to maintain this final level before you attempt the Top.
For this example, you would need 12 low level non secure servers, 6 mid level non secure or low secure servers, 3 mid level mid secure servers. That's 21 Gov or Mil Roots you need to OWN. All with no programs or nets left behind by you so your chances of being discovered before the real HACK is moot.
You simply gained Root and left it in the BANK as a valuable asset to use in your real HACK of the Top of the Pyramid.
When you attempt to mount the top and take root, the pyramid becomes like a house of cards. The Mil and Gov people use systems you CONTROL to see who you are. You have 21 servers they need to find you, all doing WHAT YOU WANT!
As you lose control of the low level machines, your house of CARDS starts to fall. They can simply turn off comprmised low level servers once they realize you are shadowing yourself.
When you hit the Top of the Pyramid and knock on their front door from one server, you bang it again with another, then another, when they trace the lower level bangs on their front door, you create all kinds of smoke and mirror routes to shadows.
Your nets start being uploaded right before the assault beings, your log erasers and trashers start to kick in as you lose low level nets.
With enough time you could Hack Root of the top through various methods, however what took most likely months to organize could all be shot in minutes.
You would be the commander in the largest assualt on a secure Mil or Gov server if you follow this GAME PLAN.
What would you end up controlling?
Root of the world perhaps.
If you have targets in mind for what is at the top, you could install programs if you gain Root, to change protocols for other servers and programs and launch who knows what.
As long as the world and governments depend upon 2D Technolgy, there is no such thing as a Secure Server.
As long as it has an OS, a keyboard, a Floppy or a port to another machine, it isn't SECURE.
Remember, if you attempt a Hack like this, you will be hunted and if not KILLED for being the most dangerous person on Earth, you will end up in Prison.
I've only done this Hack on paper and pencil, and in my dreams.
I enjoy freedom, so I would never use this attack.
However, if a certain country became a facist regime, I would join an opposition force and employ this Hack to CRACK EVIL!

Tidak ada komentar:

Sumber: http://mahameruparabola.blogspot.com