Featured Discussions - 12160 Social Network2024-03-28T17:08:43Zhttps://12160.info/forum/topic/list?groupUrl=anonymous-antisec-lulzsec-ows&feed=yes&xn_auth=no&featured=1Storyville How Hackers Changed The World We Are Legiontag:12160.info,2013-03-02:2649739:Topic:11377262013-03-02T22:42:36.284Zguest_bloghttps://12160.info/profile/fishing
<p><a href="http://www.radiotimes.com/rt-service/image/render/Storyville__How_Hackers_Changed_the_World___We_Are_Legion.jpg?imageUrl=http://static.radiotimes.com.edgesuite.net/pa/37/34/webANXstoryvihackchangeworld.jpg&width=580&height=327&quality=85&specialisation=tv&mode=crop" target="_blank"><img class="align-full" src="http://www.radiotimes.com/rt-service/image/render/Storyville__How_Hackers_Changed_the_World___We_Are_Legion.jpg?imageUrl=http://static.radiotimes.com.edgesuite.net/pa/37/34/webANXstoryvihackchangeworld.jpg&width=580&height=327&quality=85&specialisation=tv&mode=crop"></img></a></p>
<p><a target="_blank" href="http://www.radiotimes.com/rt-service/image/render/Storyville__How_Hackers_Changed_the_World___We_Are_Legion.jpg?imageUrl=http://static.radiotimes.com.edgesuite.net/pa/37/34/webANXstoryvihackchangeworld.jpg&width=580&height=327&quality=85&specialisation=tv&mode=crop"><img class="align-full" src="http://www.radiotimes.com/rt-service/image/render/Storyville__How_Hackers_Changed_the_World___We_Are_Legion.jpg?imageUrl=http://static.radiotimes.com.edgesuite.net/pa/37/34/webANXstoryvihackchangeworld.jpg&width=580&height=327&quality=85&specialisation=tv&mode=crop"/></a><a href="http://www.watchseries-online.eu/2013/03/storyville-how-hackers-changed-the-world-we-are-legion.html">http://www.watchseries-online.eu/2013/03/storyville-how-hackers-changed-the-world-we-are-legion.html</a></p> #OpFreeAssange - British governmental websites attacked by hacktiviststag:12160.info,2012-08-21:2649739:Topic:9574232012-08-21T00:32:01.463Ztruthhttps://12160.info/profile/adap2k
<p><a href="http://i.stpl.gr/image.ashx?m=Fit&f=L2ZpbGVzLzEvbmV3X2ltYWdlcy8yMDEyLTA4LTIxLzQzMjUvMTA2MjQ5MDYuanBn&t=634811010900802950&w=300&h=204" target="_blank"><img class="align-left" src="http://i.stpl.gr/image.ashx?m=Fit&f=L2ZpbGVzLzEvbmV3X2ltYWdlcy8yMDEyLTA4LTIxLzQzMjUvMTA2MjQ5MDYuanBn&t=634811010900802950&w=300&h=204"></img></a> Several British governmental websites, including the Ministry of Justice, have been attacked by hacktivists in retaliation for Britain’s handling of WikiLeaks founder Julian Assange.</p>
<p>Under the campaign, which was branded “#OpFreeAssange,” Anonymous undertook a mission to take down justice.gov.uk…</p>
<p><a target="_blank" href="http://i.stpl.gr/image.ashx?m=Fit&f=L2ZpbGVzLzEvbmV3X2ltYWdlcy8yMDEyLTA4LTIxLzQzMjUvMTA2MjQ5MDYuanBn&t=634811010900802950&w=300&h=204"><img class="align-left" src="http://i.stpl.gr/image.ashx?m=Fit&f=L2ZpbGVzLzEvbmV3X2ltYWdlcy8yMDEyLTA4LTIxLzQzMjUvMTA2MjQ5MDYuanBn&t=634811010900802950&w=300&h=204"/></a>Several British governmental websites, including the Ministry of Justice, have been attacked by hacktivists in retaliation for Britain’s handling of WikiLeaks founder Julian Assange.</p>
<p>Under the campaign, which was branded “#OpFreeAssange,” Anonymous undertook a mission to take down justice.gov.uk and number10.gov.uk, the official site of the British Prime Minister’s Office. The websites are now operating normally once again.</p>
<p>Several Twitter accounts associated with the loose-knit Anonymous collective have acknowledged that the UK Ministry of Justice and the PM Office's websites had been targeted with a distributed denial-of-service, or DDoS, attack.</p>
<p><em>“#OpFreeAssange: TANGO DOWN! <a href="http://www.justice.gov.uk/">http://www.justice.gov.uk/</a> [500 Internal Server Error] [#Anonymous #WikiLeaks]</em>,” reads one tweet sent from the @Anon_Central Twitter account.</p>
<p>The hackers also claim to have taken down the website of another British government department – the Department of Work and Pensions. “<em>Gov. of UK Expect Us!</em>” reads a related tweet by Anonymous.</p>
<p><a href="http://rt.com/news/anonymous-uk-justice-site-down-157/">http://rt.com/news/anonymous-uk-justice-site-down-157/</a></p> Want brand spanking Linux based security and hacking tools?tag:12160.info,2012-04-12:2649739:Topic:8292142012-04-12T12:49:36.047ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<div class="meta"><div class="date">March 15, 2012 <a href="http://anonymissexpress.cyberguerrilla.org/?p=2170">http://anonymissexpress.cyberguerrilla.org/?p=2170</a></div>
</div>
<p><a href="http://anonymissexpress.cyberguerrilla.org/?attachment_id=2172" target="_blank"><img class="align-right" src="http://anonymissexpress.cyberguerrilla.org/wp-content/uploads/2012/03/linux-logo.jpeg?width=188" width="188"></img></a></p>
<p>If you are new to Linux, read <a href="http://www.wikihow.com/Choose-Your-First-Linux-Distribution" title="http://www.wikihow.com/Choose-Your-First-Linux-Distribution">How to Choose Your First Linux…</a></p>
<div class="meta"><div class="date">March 15, 2012 <a href="http://anonymissexpress.cyberguerrilla.org/?p=2170">http://anonymissexpress.cyberguerrilla.org/?p=2170</a></div>
</div>
<p><a target="_blank" href="http://anonymissexpress.cyberguerrilla.org/?attachment_id=2172"><img class="align-right" src="http://anonymissexpress.cyberguerrilla.org/wp-content/uploads/2012/03/linux-logo.jpeg?width=188" width="188"/></a></p>
<p>If you are new to Linux, read <a title="http://www.wikihow.com/Choose-Your-First-Linux-Distribution" href="http://www.wikihow.com/Choose-Your-First-Linux-Distribution">How to Choose Your First Linux Distribution</a> and install one of those distro’s first. Linux is very intuitive and once you get the hang of it, including command line practice, you can move over to more exotic distributions taking the intuitive learnings with you.</p>
<p>For those having some practice with Linux, and ready and eager for exploring the world of the unseen:</p>
<h2><span class="font-size-6"><a href="http://www.backtrack-linux.org/">BackTrack Linux</a></span></h2>
<p>BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack you <a href="http://www.backtrack-linux.org/tutorials/backtrack-hard-drive-install/">Install BackTrack</a>, boot it from a Live DVD or <a href="http://www.backtrack-linux.org/tutorials/usb-live-install/">thumbdrive</a>, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.</p>
<p>BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.</p>
<p>Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by <a title="Information Security Training" href="http://www.offensive-security.com/" rel="nofollow">Offensive Security</a>. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.</p>
<p style="text-align: right;"><a title="http://www.backtrack-linux.org/" href="http://www.backtrack-linux.org/">Read more</a></p>
<h2><span class="font-size-6"><a href="http://www.livehacking.com/live-hacking-cd/">Live Hacking CD</a></span></h2>
<p><strong>Live Hacking DVD</strong> is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live DVD” runs directly from the DVD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders.</p>
<p>As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities.</p>
<p style="text-align: right;"><a title="http://www.livehacking.com/live-hacking-cd/" href="http://www.livehacking.com/live-hacking-cd/">Read more</a></p>
<h2><span class="font-size-6"><a href="http://samurai.inguardians.com/">Samurai Web Testing Framework</a></span></h2>
<p>The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.</p>
<p>Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.</p>
<p style="text-align: right;"><a title="http://samurai.inguardians.com/" href="http://samurai.inguardians.com/">Read more</a></p>
<h2><span class="font-size-6"><a title="http://securitystartshere.org/page-training-oswa-assistant.htm" href="http://securitystartshere.org/page-training-oswa-assistant.htm">Organizational Systems Wireless Auditor Assistant</a></span></h2>
<p align="justify">The OSWA-Assistant™ is a free, self-contained, wireless-auditing toolkit for both IT-security professionals and End-users alike.</p>
<p align="justify">This toolkit is our contribution to the wireless security/auditing community and, as the “Assistant” moniker implies, and is designed for the following groups of people:</p>
<ul>
<li>IT-security auditors and professionals who need to execute technical wireless security testing against wireless infrastructure and clients;</li>
<li>IT professionals who have responsibility for ensuring the secure operation and administration of their organization’s wireless networks;</li>
<li>SME (Small & Medium Enterprise) and SOHO (SmallOffice-HomeOffice) businesses who do not have either the technical expertise or the resources to employ such expertise to audit their wireless networks;</li>
<li>Non-technical-users who run wireless networks at home and who would like to audit the security of their wireless home networks and laptops but don’t know how.</li>
</ul>
<p style="text-align: right;"><a title="http://securitystartshere.org/page-training-oswa-assistant.htm" href="http://securitystartshere.org/page-training-oswa-assistant.htm">Read more</a></p>
<h2><span class="font-size-6"><a href="http://networksecuritytoolkit.org/nst/index.html">Network Security Toolkit</a></span></h2>
<p>This bootable <acronym>ISO</acronym> live <acronym>CD</acronym>/<acronym>DVD</acronym> (<acronym>NST</acronym> <strong>Live</strong>) is based on <a id="__autoId7" href="http://fedoraproject.org/" target="_blank" name="__autoId7">Fedora</a>. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms.</p>
<p>The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: <a id="__autoId8" href="http://www.insecure.org/tools.html" target="_blank" name="__autoId8">Top 125 Security Tools</a> by <a href="http://www.insecure.org/" target="_blank">INSECURE.ORG</a> are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, geolocation and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.</p>
<p style="text-align: right;"><a title="http://networksecuritytoolkit.org/nst/index.html" href="http://networksecuritytoolkit.org/nst/index.html">Read more</a></p>
<h2><span class="font-size-6"><a href="http://www.tdisecurity.com/tdi-labs/arudius.htm">Arudius</a></span></h2>
<p>Arudius is a Linux live CD with tools for penetration testing and vulnerability analysis. A so-called “Linux live CD” is essentially a Linux operating system that is bootstrapped and run directly from a standard CD-ROM. This allows for improved portability of the operating system and for running a variety of Linux software on almost any physical system without affecting the host operating system installed on the hard disk. This is the concept that Arudius exploits as well. Currently, Arudius features more than 140 different security tools and packages. This collection contains most of the tools on the SANS Top 75/100 list of security tools plus many other tools not covered by those lists. The CD will also include tools developed by TDI, including network sniffers for Instant Messaging (IM) and Peer-to-Peer (P2P) applications.</p>
<p style="text-align: right;"><a title="http://www.tdisecurity.com/tdi-labs/arudius.htm" href="http://www.tdisecurity.com/tdi-labs/arudius.htm">Read more</a></p>
<h2><span class="font-size-6"><a href="http://www.ussysadmin.com/operator/">Operator</a></span></h2>
<p>Operator is a complete Linux (Debian) distribution that runs from a single bootable CD and runs entirely in RAM. The Operator contains an extensive set of Open Source network security tools that can be used for monitoring and discovering networks. This virtually can turn any PC into a network security pen-testing device without having to install any software. Operator also contains a set of computer forensic and data recovery tools that can be used to assist you in data retrieval on the local system.</p>
<p>The technique to allow Operator to boot and run from RAM is based on a project called KNOPPIX. KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue system, or adapted and used as a platform for commercial software product demos. It is not necessary to install anything on a hard disk. Mastering of this CD uses on-the-fly decompression which allows for up to 2 GB of stored data.</p>
<p>Starting with the 3.3 version of Operator, we have started completely from scratch by installing a basic Debian installation then adding the KNOPPIX functionality afterwards. This allowed us to have more control and understanding of what is on the CD.</p>
<p style="text-align: right;"><a title="http://www.ussysadmin.com/operator/" href="http://www.ussysadmin.com/operator/">Read more</a></p>
<h2><span class="font-size-6"><a href="http://www.hackfromacave.com/katana.html">Katana</a></span></h2>
<p>Katana is a portable multi-boot security suite which brings together many of today’s best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more.</p>
<p style="text-align: right;"><a title="http://www.hackfromacave.com/katana.html" href="http://www.hackfromacave.com/katana.html">Read more</a></p> Scrubbing pdf metadata with hexedittag:12160.info,2012-04-12:2649739:Topic:8294832012-04-12T12:42:26.531ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><a href="http://lilithlela.cyberguerrilla.org/?p=603">http://lilithlela.cyberguerrilla.org/?p=603</a></p>
<p>This blog intends to augment <a href="http://www.cyberguerrilla.org/?p=5459" title="http://www.cyberguerrilla.org/?p=5459">USP no. 3: The danger of metadata [digital footprints]</a> (original <a href="http://www.textfiles.com/uploads/diz-usp3.txt" title="http://www.textfiles.com/uploads/diz-usp3.txt">here</a>) for *nix distros:</p>
<blockquote>In order to modify the dates and times…</blockquote>
<p><a href="http://lilithlela.cyberguerrilla.org/?p=603">http://lilithlela.cyberguerrilla.org/?p=603</a></p>
<p>This blog intends to augment <a title="http://www.cyberguerrilla.org/?p=5459" href="http://www.cyberguerrilla.org/?p=5459">USP no. 3: The danger of metadata [digital footprints]</a> (original <a title="http://www.textfiles.com/uploads/diz-usp3.txt" href="http://www.textfiles.com/uploads/diz-usp3.txt">here</a>) for *nix distros:</p>
<blockquote>In order to modify the dates and times you’ll need to use a hex editor to manually change the data yourself. A simple free hex editor for Windows is called HexEdit (<a href="http://www.expertcomsoft.com/download.htm">http://www.expertcomsoft.com/download.htm</a>) and will allow you to perform the changes you need to the PDF file that PDF Info and Acrobat don’t allow you to (you can also always open the PDF file in Notepad, but this can take a while and will cause slower computers hang).</blockquote>
<p><br/> <em>Note: The link <a href="http://www.expertcomsoft.com/download.htm">http://www.expertcomsoft.com/download.htm</a> is no longer leading to anything useful, but that is not a problem. There are many hexeditors available for windows like <a title="http://rhack.sourceforge.net/" href="http://rhack.sourceforge.net/">Hack</a>, <a title="http://sourceforge.net/projects/hexplorer/" href="http://sourceforge.net/projects/hexplorer/">Hexplorer</a> and <a title="http://frhed.sourceforge.net/en/" href="http://frhed.sourceforge.net/en/">Frhed</a>.</em></p>
<p><em>An alternative to using hexedit is using sed, see <a title="http://lilithlela.cyberguerrilla.org/?p=568" href="http://lilithlela.cyberguerrilla.org/?p=568">here (at bottom: the less elegant scrubbing)</a></em></p>
<h2><span class="font-size-6">For *nix</span></h2>
<p><strong>hexedit</strong> is a program that gives the user the ability to view a file in hexadecimal and ASCII view. It offers the ability to read a device as a file. It includes build in key shortcuts to make it fast and easy to edit and analyze file, including skipping to specific memory locations, cutting and pasting, changing views, modes, and syntaxes <strong>similar to that of emacs</strong>: <a title="http://linux.die.net/man/1/hexedit" href="http://linux.die.net/man/1/hexedit">online manpage on die.net</a></p>
<p><em>Note: You can also use vi as a hex editor. It isn't a real 'hex mode', what actually happens is that vi’s buffer is streamed through the external program ‘xxd’, but it works well for some cases of scrubbing.</em></p>
<p>Open a file in vi as usual, hit escape and to switch into hex mode type:<br/> <code>:%!xxd</code></p>
<p>And when your done, to exit from hex mode, hit escape again and type:<br/> <code>:%!xxd -r</code></p>
<h2><span class="font-size-6">For MacOS</span></h2>
<p><a title="http://www.ifd.com/product_info.php?products_id=87" href="http://www.ifd.com/product_info.php?products_id=87">HexEdit</a> is a Macintosh hexadecimal file editor that handles both data and resource forks. It is the most widely used editor of it's kind on the platform, and can handle file sizes of up to four gigabytes with ease, yet has memory requirements of less than a megabyte (with color turned off). It can compare whole files for similarities or differences and will soon be able to do so for any subset within the files. You can <a title="http://sourceforge.net/projects/hexedit/" href="http://sourceforge.net/projects/hexedit/">download it from sourceforge</a>.</p>
<p> </p>
<h2><span class="font-size-6">Usage for scrubbing pdf's</span></h2>
<p>Be sure to backup your data before operating any hexedit code.</p>
<p>In general, switch to ASCII mode, turn off "read only" mode, and start searching through the file. For scrubbing pdf's look for "created" (metadata appears in the PDF file more than once). If and when you find metadata, change to fake data or delete. Then repeat your search again for the terms ‘create,’ ‘creation,’ ‘modified,’ and ‘modify,’ and similarly either replace or delete the dates, once again being sure to repeat each search so that any potential multiple instances of the field can be located and modified or blanked out.</p>
<p> </p>
<p style="text-align: center;"><a href="http://lilithlela.cyberguerrilla.org/wp-content/uploads/hexedit.png"><img class="aligncenter wp-image-607" title="hexedit" src="http://lilithlela.cyberguerrilla.org/wp-content/uploads/hexedit.png" alt="" height="491" width="645"/></a></p> Scrubbing pdf metadata with pdftk and sedtag:12160.info,2012-04-12:2649739:Topic:8293002012-04-12T12:30:37.167ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><a href="http://lilithlela.cyberguerrilla.org/?p=568">http://lilithlela.cyberguerrilla.org/?p=568</a></p>
<p>This blog intends to augment <a href="http://www.cyberguerrilla.org/?p=5459" title="http://www.cyberguerrilla.org/?p=5459">USP no. 3: The danger of metadata [digital footprints]</a> (original <a href="http://www.textfiles.com/uploads/diz-usp3.txt" title="http://www.textfiles.com/uploads/diz-usp3.txt">here</a>) for *nix distros:</p>
<blockquote>There is a freeware program by the name…</blockquote>
<p><a href="http://lilithlela.cyberguerrilla.org/?p=568">http://lilithlela.cyberguerrilla.org/?p=568</a></p>
<p>This blog intends to augment <a title="http://www.cyberguerrilla.org/?p=5459" href="http://www.cyberguerrilla.org/?p=5459">USP no. 3: The danger of metadata [digital footprints]</a> (original <a title="http://www.textfiles.com/uploads/diz-usp3.txt" href="http://www.textfiles.com/uploads/diz-usp3.txt">here</a>) for *nix distros:</p>
<blockquote>There is a freeware program by the name of PDF Info (<a href="http://www.bureausoft.com/pdfinfo.exe">http://www.bureausoft.com/pdfinfo.exe</a>) which lets you edit not only the aforementioned Title/Author/Subject/Keywords fields, but also the PDF Producer and Creator Application fields. It doesn’t, however, let you change the file creation and modification dates and times.</blockquote>
<p>The <a href="http://www.accesspdf.com/pdftk/">PDF Toolkit</a>(pdftk) claims to be that all-in-one solution. The closest thing to Adobe Acrobat for Linux.</p>
<p>You can <a href="http://www.accesspdf.com/article.php/20041130153545577">download</a> pdftk as source or as a Debian or RPM package, FreeBSD port, or Gentoo Ebuild. Binaries are available for Windows and Mac OS X too. If you decide to compile pdftk, check the <a href="http://www.accesspdf.com/article.php/20041129180128366">build notes</a>before you begin, in order to find out about any dependencies for your Linux distro or your platform.</p>
<p>I am lazy, I chose to install package. Installing the pdftk package on Ubuntu and Backtrack requires having "universe" enabled. Then:</p>
<p><code>$ sudo apt-get install pdftk</code></p>
<p> </p>
<p>The following extra packages will be installed: gcj-4.4-base gcj-4.4-jre-lib libbcmail-java libbcmail-java-gcj libbcprov-java libgcj-bc libgcj-common libgcj10 libgnuinet-java libgnujaf-java libgnumail-java libitext-java libitext-java-gcj</p>
<p>After this operation, 66.5MB of additional disk space will be used.</p>
<h1><span class="font-size-6">Looking at the metadata</span></h1>
<p>To look at the metadata that Adobe Reader does not show by default (replace 034045 with your pdf filename):</p>
<p><code>$ pdftk 034045.pdf dump_data</code></p>
<p> </p>
<p><a href="http://lilithlela.cyberguerrilla.org/wp-content/uploads/dump_data.png"><img class="aligncenter size-full wp-image-569" title="dump_data" src="http://lilithlela.cyberguerrilla.org/wp-content/uploads/dump_data.png" alt="" height="684" width="502"/></a></p>
<h1><span class="font-size-6">Altering the metadata</span></h1>
<p>To alter the metadata first put the metadata in a file (replace 034045 with your pdf filename):</p>
<p><code>$ pdftk 034045.pdf dump_data output pdf-metadata</code></p>
<p>Open the pdf-metadata file and remove the data you wish scrubbed:<br/> <a href="http://lilithlela.cyberguerrilla.org/wp-content/uploads/metadatafile.png"><img class="aligncenter size-full wp-image-570" title="metadatafile" src="http://lilithlela.cyberguerrilla.org/wp-content/uploads/metadatafile.png" alt="" height="501" width="443"/></a></p>
<p>Save the pdf-metadata file. Now you can use that data to scrub the metadata from your file (replace 034045 with your pdf filename):</p>
<p><code>$ pdftk 034045.pdf update_info pdf-metadata output 034045-no-metadata.pdf</code></p>
<p>And check the result with:</p>
<p><code>$ pdftk 034045-no-metadata.pdf dump_data</code></p>
<p> </p>
<p><a href="http://lilithlela.cyberguerrilla.org/wp-content/uploads/scrubbeddumpdata.png"><img class="aligncenter size-full wp-image-571" title="scrubbeddumpdata" src="http://lilithlela.cyberguerrilla.org/wp-content/uploads/scrubbeddumpdata.png" alt="" height="445" width="572"/></a></p>
<h1><span class="font-size-6">And now the somewhat less elegant scrubbing on *nix</span></h1>
<p>The creation date is gone and a new modification date has appeared. And the iText gives away the use of pdftk. These infokeys can be removed with sed:</p>
<p><code>sed -i 's/iText\ 2\.1\.7\ by\ 1T3XT//;s/D:20120409144213+02'\''00'\''//' 034045-no-metadata.pdf</code></p>
<p> </p>
<p>The '\'' are for breaking out of the single quoted string <em>then</em>escaping the single quote.</p>
<p>PdfID0 and PdfID1 are file identifiers. They are an md5 of various info about the file so that it has a unique string to identify the doc without having to use the filename. If you want to scrub those too, use sed as above. There's no geeky tricks needed for cleaning those two from the metadata with sed, it's pretty straightforward.</p> 'Anonymous' says it won't shut down internettag:12160.info,2012-03-31:2649739:Topic:8168932012-03-31T03:25:54.182ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<p></p>
<div id="sshow"><div class="cnt" style="margin-top: 3px; margin-left: 4px; width: 310px; display: inline; float: left;"><div id="bellyad" style="padding-left: 3px;"><div class="mainimg1"><div style="float: left; xg-p: relative;"><a><img alt="'Anonymous' says it won't shut down internet" border="0" src="http://timesofindia.indiatimes.com/thumb/msid-12471666,width-300,resizemode-4/Operation-Global-Blackout.jpg" style="border: 4px solid #e1e1e1;" title="'Anonymous' says it won't shut down internet" vspace="0" width="300"></img></a> <a style="font-size: 11px; font-family: georgia; bottom: 7px; left: 275px; xg-p: absolute;"><img align="left" border="0" src="http://timesofindia.indiatimes.com/photo/5766056.cms"></img></a></div>
<div class="zoomimg1" style="width: 300px;"></div>
</div>
</div>
</div>
</div>
<p><span><span><span></span></span></span></p>
<div id="sshow"><div style="margin-top: 3px; margin-left: 4px; width: 310px; display: inline; float: left;" class="cnt"><div style="padding-left: 3px;" id="bellyad"><div class="mainimg1"><div style="float: left; xg-p: relative;"><a><img style="border: 4px solid #e1e1e1;" alt="'Anonymous' says it won't shut down internet" title="'Anonymous' says it won't shut down internet" src="http://timesofindia.indiatimes.com/thumb/msid-12471666,width-300,resizemode-4/Operation-Global-Blackout.jpg" border="0" vspace="0" width="300"/></a><a style="font-size: 11px; font-family: georgia; bottom: 7px; left: 275px; xg-p: absolute;"><img src="http://timesofindia.indiatimes.com/photo/5766056.cms" border="0" align="left"/></a></div>
<div style="width: 300px;" class="zoomimg1"><div style="font-size: 11px; text-align: left; padding-right: 5px; color: #757575; font-style: italic;">"Operation Global Blackout 2012 looks to shut down the internet for a whole day on Saturday by disabling its core DNS servers, making websites inaccessible," says Interpol official.</div>
</div>
</div>
</div>
</div>
</div>
<p><span id="advenueINTEXT"><span id="advenueINTEXT">NEW DELHI: Will hackers, allegedly associated with a group called Anonymous, shut down internet on March 31? According to the group's <a href="http://timesofindia.indiatimes.com/topic/Twitter">Twitter</a> account, from where it communicates with the world, the answer is no. <br/> <br/> "What is this #OperationGlobalBlackout nonsense? I thought we settled this back in February? It won't happen. Stop asking us about it! >.<," the group's account (@youranonnews) tweeted on March 29. <br/> <br/> Another account (@AnonymousIRC), added, "Dear Netizens, Internet will remain online. And to the death we will defend it. Always. Sail strong and do not get distracted by trolls." REST 'O Da Story here: <a href="http://timesofindia.indiatimes.com/tech/news/internet/Anonymous-says-it-wont-shut-down-internet/articleshow/12473563.cms">http://timesofindia.indiatimes.com/tech/news/internet/Anonymous-says-it-wont-shut-down-internet/articleshow/12473563.cms</a><br/></span></span></p>
<p><span id="advenueINTEXT"><span id="advenueINTEXT"></span></span></p>
<p><span id="advenueINTEXT"></span></p> Anonymous: Cyber-Superheroes or Master Manipulators?tag:12160.info,2012-03-30:2649739:Topic:8164132012-03-30T21:28:49.080Zguest_bloghttps://12160.info/profile/fishing
<p><a href="http://www.thedailysheeple.com/wp-content/uploads/2012/03/anonymous2-235x300.jpg" target="_blank"><img class="align-left" src="http://www.thedailysheeple.com/wp-content/uploads/2012/03/anonymous2-235x300.jpg?width=235" width="235"></img></a> The Patriot Resistance is looking for a hero.</p>
<p>Anonymous, the group of hacker activists, has applied for the position.</p>
<p>Their resume includes hacking the US Federal Trade Commission and taking down the Department of Justice website. They send sternly worded warnings before the cyber-attacks take place. It’s the kind of thing that makes the rest of us yearn to…</p>
<p><a target="_blank" href="http://www.thedailysheeple.com/wp-content/uploads/2012/03/anonymous2-235x300.jpg"><img class="align-left" src="http://www.thedailysheeple.com/wp-content/uploads/2012/03/anonymous2-235x300.jpg?width=235" width="235"/></a>The Patriot Resistance is looking for a hero.</p>
<p>Anonymous, the group of hacker activists, has applied for the position.</p>
<p>Their resume includes hacking the US Federal Trade Commission and taking down the Department of Justice website. They send sternly worded warnings before the cyber-attacks take place. It’s the kind of thing that makes the rest of us yearn to learn Linux and code so that we can participate in the fun.</p>
<p>But are we jumping on a bandwagon designed to take us for a quick ride to the closest Fema Re-education Center? Is Anonymous actually on our side, or is the group actually a psy-ops plant – an agent provocateur?</p>
<p>The members of Anonymous have set themselves up as the cyber-Robin Hoods of the internet. They have issued a statement informing the world of their plan to take down the ‘net this Saturday.</p>
<blockquote><p>“To protest SOPA, Wallstreet, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun, on March 31, anonymous will shut the Internet down.”</p>
</blockquote>
<p>The <a href="http://www.shtfplan.com/headline-news/march-31-operation-global-blackout-hackers-intend-to-shut-down-the-internet-by-disabling-core-dns-servers_03282012" target="_blank">attack</a> will target the Domain Name Servers, which will make it impossible to reach a destination on the net without knowing the actual IP address of that website.</p>
<p>In the spirit of resistance, I’d like to applaud any effort to slow down the efforts of the global elite and the de facto government (or at the very least, really annoy them). HOWEVER………………….</p>
<p>This reeks of the <a href="http://en.wikipedia.org/wiki/COINTELPRO" target="_blank">CO-INTEL</a> program. “COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveiling, infiltrating, discrediting, and disrupting domestic political organizations.”</p>
<p>I’m far from the only person who is suspicious of Anonymous. While it’s a topic of conjecture, there are too many links to federal agencies for me to be on the Hackers R Us bandwagon.</p>
<p style="text-align: center;"><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="266" width="320"><param name="src" value="http://www.youtube.com/v/gsPHCgyxaWc&fs=1&source=uds"></param><param name="allowscriptaccess" value="never"></param><param name="wmode" value="opaque"></param><embed wmode="opaque" type="application/x-shockwave-flash" src="http://www.youtube.com/v/gsPHCgyxaWc&fs=1&source=uds" allowscriptaccess="never" height="266" width="320"></embed> </object>
</p>
<p>Remember how quickly the <span style="text-decoration: line-through;">un</span>Patriot Act followed the 9/11 attacks? It only took 6 weeks for that particular attack on our Constitutional rights to pass through the Congress to the desk of President Bush.</p>
<p>The internet take-down (if it does indeed occur on Saturday) will be a <a href="http://daisyluther.blogspot.ca/2012/01/defining-false-flag-event.html" target="_blank">false flag event</a> that will allow the de facto government to come up with a new internet <span style="text-decoration: line-through;">un</span>Patriot Act law. The new restrictions will make SOPA, PIPA and ACTA look like games at a Libertarian Party picnic. By exposing the vulnerability of our grid and our financial systems, the de facto government will frighten people into believing the coming censorship is, as always, “for our own good.”</p>
<p>Another clue that Anonymous is not what it presents itself to be is the group’s visibility in the mainstream media.</p>
<p>more<br/> <a href="http://daisyluther.blogspot.ca/" target="_blank">Inalienably Yours</a></p>
<p> </p>
<p><a href="http://12160.info/group/anonymous-antisec-lulzsec-ows">#Anonymous #AntiSec #LulzSec #OWS</a></p>
<ul>
<li><a href="http://12160.info/group/anonymous-antisec-lulzsec-ows/forum" class="xg_sprite xg_sprite-back">Back to #Anonymous #AntiSec #LulzSec #OWS Discussions</a></li>
</ul>
<object id="obj_1333146337328" height="500" width="500"><param name="movie" value="http://12160mhz.chatango.com/group"></param><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1333146337328&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0"></param><embed wmode="opaque" id="emb_1333146337328" src="http://12160mhz.chatango.com/group" allowscriptaccess="never" allownetworking="all" type="application/x-shockwave-flash" allowfullscreen="false" flashvars="cid=1333146337328&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0" height="500" width="500"></embed> <param name="wmode" value="opaque"></param></object>
<br/> [ <a href="http://12160mhz.chatango.com/clonegroup?ts=1333146337328">Copy this</a> | <a href="http://chatango.com/creategroup?ts=1333146337328">Start New</a> | <a href="http://12160mhz.chatango.com">Full Size</a> ] What the Sabu revelation means for hackers - an informant for the FBI - #Anonymous #AntiSec #LulzSec #OWStag:12160.info,2012-03-13:2649739:Topic:8016492012-03-13T13:20:10.429Ztruthhttps://12160.info/profile/adap2k
<p>What the Sabu revelation means for hackers</p>
<p>Posted by Ryan Gallagher - 12 March 2012 22:06</p>
<p>Everyone, no matter who they profess to be, is potentially an informant.</p>
<p>To most observers he seemed unpredictable, dangerous and so highly skilled that he could evade the long arm of the law. But in an astonishing revelation, last week it emerged that Sabu, the notorious figurehead of hacking group LulzSec, had for almost nine months been working secretly as an informant for the…</p>
<p>What the Sabu revelation means for hackers</p>
<p>Posted by Ryan Gallagher - 12 March 2012 22:06</p>
<p>Everyone, no matter who they profess to be, is potentially an informant.</p>
<p>To most observers he seemed unpredictable, dangerous and so highly skilled that he could evade the long arm of the law. But in an astonishing revelation, last week it emerged that Sabu, the notorious figurehead of hacking group LulzSec, had for almost nine months been working secretly as an informant for the FBI.</p>
<p>The identity of 28-year-old Hector Xavier Monsegur, who led a rampage against government websites and multi-national corporations, had been uncovered when he failed to mask his computer's IP address using an internet chat room on just one fateful occasion.</p>
<p>Soon after, FBI agents appeared at the door of his apartment on the sixth floor of a 14-story housing project in Manhattan. The agents reportedly played "good cop bad cop", convincing the infamous hacker - almost immediately, according to court documents - that his only way out was to cooperate with an international investigation into his former comrades.</p>
<p>Monsegur, under his Sabu guise, proceeded to continue operating aggressively online - in some cases encouraging fellow hackers to commit crimes - all while under apparent instruction of the FBI.</p>
<p>Some suspected he had been "turned" - but the hacker world is rife with conspiracy theories and there was no hard evidence to prove it. "Sabu was identified, apprehended by the FBI and turned to an informant," one perceptive group wrote in November last year. Yet the claim never gained substantial traction.</p>
<p>From the perspective of the authorities, it was a tactical masterstroke. They had managed to flip the most notorious, the most feared, and the most accomplished of the LulzSec members. Due to his close ties and wide respect among hacker collective Anonymous and other splinter groups such as AntiSec, Sabu was a goldmine to the FBI. With his help, they were able to level charges against five accused hackers based in Britain, Ireland and America.</p>
<p>There are concerns, however, about how far the Bureau went to pursue its goals.<br/> <a href="http://www.newstatesman.com/blogs/the-staggers/2012/03/sabu-fbi-hackers-informant">http://www.newstatesman.com/blogs/the-staggers/2012/03/sabu-fbi-hackers-informant</a></p> Startpage's New Proxy Service! Blocks Google from doing nasty stuff...tag:12160.info,2012-02-29:2649739:Topic:7923382012-02-29T16:33:25.182Zguest_bloghttps://12160.info/profile/fishing
<p><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="360" width="640"><param name="allowFullScreen" value="false"></param><param name="allowScriptAccess" value="never"></param><param name="src" value="http://www.youtube.com/v/qv3SCbI5KFM&hl=en_US&feature=player_embedded&version=3"></param><param name="allowfullscreen" value="false"></param><param name="allowscriptaccess" value="never"></param><param name="wmode" value="opaque"></param><embed allowfullscreen="false" allowscriptaccess="never" height="360" src="http://www.youtube.com/v/qv3SCbI5KFM&hl=en_US&feature=player_embedded&version=3" type="application/x-shockwave-flash" width="640" wmode="opaque"></embed> </object>
</p>
<p>Startpage blocks Google from doing nasty stuff...</p>
<p><br></br> <a href="/users/uksecrets">UKSecrets</a></p>
<div class="content"><p>Run a proxy....that's like a firebreak between Google and you.</p>
<p>Google only see's their IP not yours. Google will never see you.</p>
<p>Here's how it works.<br></br></p>
<p>Startpage runs from the Netherlands - under EU law if you do not consent, they can't store your IP and do nasty stuff.…<br></br></p>
</div>
<p><object width="640" height="360" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="false"></param><param name="allowScriptAccess" value="never"></param><param name="src" value="http://www.youtube.com/v/qv3SCbI5KFM&hl=en_US&feature=player_embedded&version=3"></param><param name="allowfullscreen" value="false"></param><param name="allowscriptaccess" value="never"></param><param name="wmode" value="opaque"></param><embed wmode="opaque" width="640" height="360" type="application/x-shockwave-flash" src="http://www.youtube.com/v/qv3SCbI5KFM&hl=en_US&feature=player_embedded&version=3" allowfullscreen="false" allowscriptaccess="never"></embed> </object>
</p>
<p>Startpage blocks Google from doing nasty stuff...</p>
<p><br/> <a href="/users/uksecrets">UKSecrets</a></p>
<div class="content"><p>Run a proxy....that's like a firebreak between Google and you.</p>
<p>Google only see's their IP not yours. Google will never see you.</p>
<p>Here's how it works.<br/></p>
<p>Startpage runs from the Netherlands - under EU law if you do not consent, they can't store your IP and do nasty stuff.<br/> <object id="obj_1330496209421" width="652" height="587" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1330496209421&a=999999&b=100&c=333333&d=FFFFFF&g=333333&j=333333&k=FF0033&l=000000&p=16&s=1"></param><param name="src" value="http://12160mhz.chatango.com/group"></param><param name="allowscriptaccess" value="never"></param><param name="allownetworking" value="all"></param><param name="allowfullscreen" value="false"></param><param name="wmode" value="opaque"></param><embed wmode="opaque" id="obj_1330496209421" width="652" height="587" type="application/x-shockwave-flash" src="http://12160mhz.chatango.com/group" flashvars="cid=1330496209421&a=999999&b=100&c=333333&d=FFFFFF&g=333333&j=333333&k=FF0033&l=000000&p=16&s=1" allowscriptaccess="never" allownetworking="all" allowfullscreen="false"></embed> </object>
<br><br/></p>
</div>