💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › MISC › blunt.10… captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-

"You know what you need? What you need is a fatty boom batty blunt. Then
I guarantee you'll see an ocean, a sailboat and maybe some of them
big-tittied mermaids doin' some of that lesbian shit."

da hacker blunt version 10
fuck copyrights!  ````
                 ``
               `````
              ``` 
  _______    ```
  |     |   ``
  |     |  __
  |     --/ /
  |     ___/
  |     |
  |     |
  |     }}
  |     |
 /~~~~~~~\
| 1001001 |
| 0101010 |
 \_______/
 
ToC for your PC
choose DMT or LSD
Be free with the weed
and light that green
/********************************************\
| 1) marijuana gardening                     |  
| a) n1nj4 smack                             |
| b) breaking free of the engineer mentality |
| c) autonomon edere                         |
| d) v0t3 fucK                               |
| e) hacker wars or why our scene is dying?? | 
| f) introducing silicybin                   |
| g) getting drunk off of the h0n3yp0tZ      |
\********************************************/

/* All code included is en pseudo so a number of objectives may be


1) marijuana gardening
  Everywhere I go; if I'm going to be in the area for at least a week I
  go out to the forests, deserted fields, or even the mountains and
  plant a garden of cotyleon seedlings. America has been waging war on
  this most beautiful plant for the past century and now is the time to
  help weed fight back. The plant is one of the fastest growing plants
  known. It is used for everything from from non-petrol plastics to
  clothing to food to shelter. It has more cellulose (paper, wood) than
  most trees do and its fibers are better than most synthetically made
  nylons. It has more protein than beans and more beta carotene than
  carrots. That means it will keep you fit and it will improve your
  eyesight. It has improved morale and the sick for centuries. You can
  get heoroin and codeine and other highly addictive, dangerous meds
  from the hospital but they won't let you smoke a joint which will
  actually give immediate direct help? Fuck that shit. Spread the seed
  everywhere you go and help overgrow the government! (btw: I like
  shroom spore syringe juice in water-soakers also, but that's a diff.
  story) So how do you grow marijuana anyway? Well, marijuana is a weed
  so it is extremely easy to grow on it's own. However, since we want
  the bud out of it we are going to try our hardest to make some at
  least decent schwag. First thing you should do is collect some seeds.
  The light grey to dark brown ones are the best. The white ones are too
  premature and the cracked ones will do you no good. Next thing I
  usually do is throw them in water for a day. The ones that float are
  good and the ones that sink suck. This will also collect some water
  for the nutrients locked inside the shell. Next, wrap several (like 10
  or so) seeds in a damp paper towel. Put that on a plate and put another
  plate on top. During this stage, for some reason, the plants don't
  like sunlight. In a couple of days you should see some roots popping
  out. Don't let them grow too long before transplanting otherwise the
  roots will use up all their nutrients too fast. There are literally
  hundreds of soil medium and such to use but we will use a cheap, easy
  setup that will get you growing asap. I have used a 10 gallon bucket
  in the past--the stuff you can find at construction sites. and lined
  the walls with white paper to reflect the light. Then I gathered some
  rocks and then sand than some soil from the yard to line the bucket
  about a little over half way up the bucket. In the soil I added some
  fertilizer--which helps the plant very very much and if you lived in a
  place like oh... Missouri where the soil is acidic as shit from
  limestone and such you almost need it for indoor growing. Next to make
  some breathable soil i cut up some styrofoam take-out boxes that you
  could find at a Chinese restraunt and made a good heterogeneous
  mixture out of that. I turned on two 20 or 30 watt fluorescent light
  bulbs and waited. You will probably see a couple of leaves and an
  initial sprout very fast than there will probably be a period of
  slowdown. Go ahead and feed it some more fertilizer if you want. 8-12
  weeks is the usual vegetative stage followed by at least a couple more
  weeks of flowering--the bud. I like to spray the leaves and wipe
  everything down every couple of days with an extremely light mixture
  of water and ammonia. This helps infections, aphids, and the other
  nasties from fucking with your plant. If your plant grows too long of
  a stem you can either tie it down and let it bush up or stick a stick
  or fork or something in their and tie the plant to it. Basically, take
  care of your plant and treat it like you should treat a dog and they
  in return will treat you nice. For much more advanced growing details
  and the like you might want to visit cannabisculture.com or google.
  
a) n1nj4 smack
  Ever felt the need to lay down the smack on a network but couldn't
  really figure out how you wanted to do it? It's a good thing you found
  the dojo. Now, prepare yourself for enlightenment. Most people will be
  sitting around sniffing and grab a password to a box or maybe they
  found a good leech ftp on a network that is running outdated software
  or whatever. Then they start analyzing traffic on that network and
  setting up clay pigeons on that network until they get all the good
  stuff like the mail servers, the web servers, the firewalls, the
  honeypots, the routers (actually, the grand majority of 'hackers' for
  some reason don't even fuck with the most fun piece of hardware on the
  network), etc. But have you ever felt like something was missing? Ever
  felt like you could and should do much more to a network but just
  didn't have the creative juices flowing? Here are some ideas to
  jumpstart your imagination:
  1) finding other hackers
    Yes! Instead of accidentally bumping into someone why don't you try
    actively looking for your fellow kind? Write a program that sends
    out in plaintext a username/password combo every minute or two
    minutes. In the username/password combo field place an ip address
    and port number to a gateway machine for your own hacker network.
    Or, you could send messages that will end up in log files asking to
    play for machines you can't get into for some reason. (Of course, 
    you can get into any box can't you? ;) )
  2) setup activist consulta partylines
    There are a LOT of people using voip convergence type software now
    like asterix bbs and the like. Why not use these resources for good
    things like setting up partylines for the next upcoming protest or
    something similiar? Why not just say the fuck w/it and keep them up
    as a primary communication resource? All you fone phreaks out there,
    I know have met ma bell on the fone a couple of times and what did
    they say? "Hang up now." hahahah!!! What is a sysadmin going to do
    when or if he finds logs from your communications? Scratch his
    fucking head because the ani from the phreaks on the partyline is
    coming from the whitehouse or a baptist church or the president of
    the company's private office? h0h0h0h0
  3) make it a hacker playground
    Remember all those disclaimers and readmes for the wargames servers
    that have popped up all over the place since Carolyn and her
    fuckfriend Versmaich or whatever the fuck his name is saying that it
    is perfectly legal to 'hack' these boxes and use it for educational
    purposes? No outbound connections and the like? I forgot who you
    are, but I met a friend at the last defcon who was passing out
    hundreds of business cards with a free-for-all wargames server with
    no rules, outbound connections, do what you wish type of game with a
    phat connection. Why not setup a webpage advertising 3 class c
    networks composed of 200 boxen each up for the raping? Tell them the
    truth--that it has a couple of oc-3s coming in and at least a couple
    t3s coming out. Heh! Watch the fun unroll. Of course take it a step
    further and make these permanent. Create gateways to each of them
    and watch the new hacker generation take over the world. If your not
    a hacker and your reading this do you understand us? Do you
    comprehend the power we hold? The only weakness is the will power of
    the underground. They have been whipped into shape for online ethics
    and whimpered into nothing. What happens when you, the reader
    decides to take this own life into her/his own hands? What happens
    when you can make someone else realize that she/he can do the same?
    What happens when those two or more people start banding together in
    the common struggle. Empires meet your doom--the real motha'fuk'n
    hackaz are here.
  
b) breaking free of the engineer mentality
  Engineers are pawns of the corporations. They have smarts but for some
  reason refuse to think for themselves--only for others. Let us examine
  some hacker intruded engineering schemes when it comes to computer
  design.
  For example shared libraries. Engineers thought it would be fucking
  great for the company if they wrote some portable code that is used by
  many different applications. You find this shit all over in every
  operating system now. The problem is that whenever there is a bug or
  something else they update the library and problem solved. Of course,
  if you write a program that depends on the said library your program
  is using code that you do not know about. Sometimes it is extremely
  hard to even get to look at the code without dissassembling it and
  reverse-engineering it. This process takes for fucking ever. Most
  people don't even know this, let alone take the time to look over the
  code in the beginning. So, already you are catering and bowing down
  before some bullshit corporate interest. Understand now why a shit
  load of people love assembly? They don't rely on fucking libraries!
  Programming is like a game for mathematics. You might not realize it
  but there are a shit load of fucking mechancalities involved. The only
  difference, thank those who came before, is that it's not proof based,
  nor is it empirical based--it is based on however the fuck you want it
  to be based upon is. The problem is that a lot of people are engrained
  in the engineer mentality that it is only good for solving a problem,
  rather than being art. Programming for the fuck of it! Programming
  because you love doing it--not because you have to hack something out
  quick and turn it into your boss--not because you know you will make
  money off of it--not because you are seeking fame from writing
  something original--shouldn't everyone be writing original code? Not
  original as in writing a different method to the same problem but
  writing code that does different things; not necessarily a problem at
  all!
  

c) autonomon edere
   So you have a talent for the written word to move people? You have
   bold thoughts that need dissemination but you are stuck in
   fucksville, Idaho? You want to reach millions of people at once but
   don't know how? Come, come.... of course you know how. Enter the
   dprop bot network known as autonomon edere. I know several kids that
   use scripts to automate mass defacements once the boxen are rooted.
   Basically we are just taking this step further and using it for
   propaganda purposes. Also, it allows links to different owned systems
   to view their propaganda and the like. This of course has much more
   potential but an idea that I really haven't had too much time to
   formulate as of yet.
 
  /* we want to pass the file to disseminate */
  int main(int argc, char *argv) {
   char *rooted_b0xen[];
   char *file;
   int i;
   
   file=argv[1];
   
   /*hopefully you have kept a list of rooted b0xen in a file..or you
   ** could modify this program to just pipe it in... eithe way you need
   ** to obtain this list */
   rooted_b0xen=read(file);
   
   for(i=0; i<num_of_b0xen; i++) {
    send(file, rooted_b0xen[num_of_b0xen]); }
   //this will just send an automated text release to sites like
   //textfiles.com, packetstormsecurity.com, neworder.box.sk, and all
   //your friend's submission sites 
   advertise(para, site, file); 
  return(0);
  }
  
()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()
()  SPECIAL FUCK YOUS ARE AWARDED TO                                ()
() WSIS-                                                            ()
() What the fuck do you think you are? The goddamn WTO of the net?  ()
() Think again motherfucker! Your in for a surprise soon b1tch3Z!!  () 
() And fire fell from the skies! The damned shall seek redemption   ()
() but none will be offered quarter!                                ()
()                                                                  ()
() John Ashcroft (once again) -                                     ()
() This motherfucker really needs a fucking bullet in his goddamn   ()
() head. He throws Tommy Chong in jail for selling glass on the net ()
() but his fucking nephew gets off with probation for having over 35()
() fucking plants in his basement?! Fuck that shit! We are          ()
() against any punishment given out to anyone trying to smoke some  ()
() pot or grow it or make devices used to smoke it or any other     ()
() fucking reason that people get fucking harassed, imprisoned, and ()
() killed for!; but fuck! this is totally not cool!                 ()
()                                                                  ()
() United States-                                                   ()
() For being complete fucking assholes to the world and the people  ()
() living under it's harsh conditions. This empire is past recon-   ()
() ciliation. You won't see our WMD's and you won't know who we are ()
() until it's too late. Expect in the next five to ten years the    ()
() complete and utter dissolution of the United States of America.  ()
() The 'officials' don't got shit on us! We will be busting the     ()
() juices of true freedom in their eyes very soon!! ;) We are busily()
() amassing our armies and will soon storm your gates releasing our ()
() sisters and brothers from your treacherous hell. Just you wait   ()
() motherfuckers!                                                   ()
()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()

d) v0t3 fucK
 Well, since voting is a piece of shit memetic warfare used against the
 populous I decided it would only be appropriate to use the same offense
 against it. Enter v0t3 fucK. v0t3 fucK is a set of scripts that goto
 blogs, news sites, and other web bbs and develop profiles,
 personalities, etc. to invoke memes that spread like cancer throughout
 with it's intended goal to influence a wide variety of people fast.
 Yes, this uses ptraits (personality traits) once again creating
 character templates for undcov'ah topik agenz! Hell, if we wanted to
 get scientific on the bitch we could even implant some graphs and other
 goodies in the client browser(s) via php injection lameness to show how
 well we are influencing others, what the responses are like, and other
 useful information. So how do we implement it? Easy!

#define NUM_OF_CHARACTERS 20;

//each character starts out with a defined set of traits zeroed out...
//then a random event occurs to distribute a set number of points to
//said traits... once the character is finished generating rulesets are
//used to determine action done by the character
//the ruleset int is a number used to reference what ruleset to use when
//generating data
struct character {
 int name[NUM_OF_CHARACTERS];
 int ruleset;
 int trait1 = 0;
 int trait2 = 0;
 int trait3 = 0;
 //etc ...
};

char *create_ptraits(char *topic); /* define traits for characters */
char *create_data(char *topic, character *); /* create data for
                                                characters */

int main() {
 char *sites[];
 char *characters[];
 char *data[];
 int i;
  
 sites=obtain_sites(topic); //this can be user-inputed or it can do a spider
 //search on the web for relevant sites
 characters=create_ptraits(topic); //we have to map the topic to the traits
 run_rulesets(); 
 question=obtain_question(); //obtain an argument
  
 for(i=0; i<question_num; i++) {
  //this is where we generate questions from our characters
  data=create_data(topic, characters[(rand%num_of_charcs)]);
  //create argument from question
  send(data, rand%sites[num_of_sites]); 
 }
 
return(0);
}

char *create_ptraits(char *topic) {
 int i;
 char *character_array[];
 char *traits[];
 character *bob;
 
 for(i=0; i<num_of_characters_2_gen; i++) {
  //this is simply a referential array with diff. characters of diff.
  //traits that will be passed back to the main loop
  assign_points(character_array[i], bob.);
 }
 return(character_array);
}

char * create_data(char *topic, character *) {
 char *argument;

 lookup_rules(character);
 return(construct_argument(characters));
}

e) hacker wars or why our scene is dying??
 I remember sometime in the early 90s when the FBI, CIA, etc. et al.,
 were cracking down on hackers because bbs' were getting highly popular
 and they were usually filled to the brim with insurrectionist,
 anarchist material. After that no one really heard too much about
 hacker wars unless it was confined to places like irc or web
 defacements. Therefore the corporations and the state were free from
 hackers fucking their shit up everytime an ego got to big and since
 hacker culture is built upon ego...
 How do we fix this sorry state of affairs? There are a number of ways
 anyone could come up with. However, we are looking at the extinction of
 our culture, our way of life, and our well being. We are looking at
 either life or death. Thus we must contend that we either fight or we
 die like the dinosaurs. Corporations have no qualm about killing a
 group's culture, let alone them. Look at Monsanto with it's unholy
 alliance with Dynacorp that spray Columbia plants with a highgrade crop
 killer that also deforms babies, induces chronic diseases, and destroys
 the farmers life. Look at Microsoft that has prevented very
 successfully a diverse group of computer technology (both hardware and
 software) from sprining up in the US. No, the question you must ask
 yourself is whether or not you will fight for yourself or be
 assimilated like the rest. Basically, the more chaos and confusion we 
 can cause as hackers the more we will have to innovate and leave the
 hapless weak willed behind in the dust. We need the outlaw image that
 the media likes to portray because things will only get worse until
 they get better. This is the truth. Stagnation will result in death.
 Metamorphisizing seizes life and shoots ftl through the beyond. So let's
 jump aboard the chaos theory bandwagon and fuck shit up! Here are some 
 suggestions:
 0: create an automated distributed troll script that uses linguistic
 pattern matching to produce highly favorable trolls on web forums
 0: start writing destructive office memos for every office win* network
 you find asking employees to executing trojaned scripts that blame the
 results on a competing group
 0: start linking wargame servers together via bridges and gateways and
 let everyone know that no computer, no router, no phone, no blackberry
 device, no fucking coffee pot is safe from us hackers, of the net.
 0: since wardriving is popular, start using it for more than free net
 access--I know several banks that I've seen when I go out driving that
 have passwordless 802.11 networks with bullshit like access and other
 crappy software doing their accounting info--so what the fuck are you
 waiting for!? write a scrambler and start fucking that account info up!
 0: it's time hackers started leaving the hack computers/code only
 paradigm and shifted into hacking everything! who says you can't hijack
 a cell fone conversation from some bigshot ceo and amplify it outwards
 to every receiver available? Tesla can... and he died over 40 years
 ago!
 
f) introducing silicybin
 Silly human, computers and networks are for hackers! Introducing
 silicybin, the utility that your friend would have given you head for
 life if it wasn't open-source. Silicybin is a three-part set of
 programs. It is a parasitie that uses resources on an array of zombie
 hosts for storing files, communicating with friends, and having all the
 anemities of a regular network but it is entirely parasitical. Basically 
 you have three components for this thing. You have the zombies which 
 obviously connect to the central daemon and do all the backbreaking work
 of forwarding packets, sending communications and the like. Those on the
 a-list are people using your network. The a-list client is a program
 that goes into the background and accepts connections on a certain port
 to forward communications to the vps/vpn. The master control program is
 a ncurses based program that allows control over the entire network. If
 this is compromised all shit breaks loose. For each a-list client and
 zombie, in the packet header there is a signed key that is transmitted
 so that spurious communications may not occur. Changing the encryption
 for the key is vital and protects your communications. Remember, that
 this information is encapsulated again in regular tcp/ip traffic so
 someone would have to write their own client and have your keys to
 submit false traffic. Only then can they start spoofing shit. There is no 
 tunneling allowed so that everyone must be a confirmed user on the 
 a-list. The daemon and the a-list/zombie clients should be allowed to
 have modules so that unforseen options can be added later on. To allow
 access from other parts of the net gateways should be added that allow
 regular ipv4/ipv6 traffic to gain access to the vpn/vps. Sentinels will
 guard the gateways and act as autonomous bots that look for ne'er doers
 and wage war on them from the vps. Spurious traffic will accumulate to
 hide the real traffic which will be encrypted via a shared key. Here is
 some of the pseudo code: 

--begin cut--

begin 644 silicybin.tar.gz
M'XL(""5#$4```W-I;&EC>6)I;BYT87(`[#QK=]O&COUJ_8JI[VDL.;(D2K+=
MQE7O<6-U-Z>NG>LXM]N;9G5&Y%!BS%=)RHK<S7]?/&;XT,-VNHE[]M9L8XE#
M#`8#8#``!E3J^9Z]&'MA^XO/=G4Z_<[A_CY\=JS#_0Y^=CJ]??[DZPL+_O2[
MW6ZGU_NB8UF'O8,OQ/[G(ZFX9FDF$R&^L!=A)[P%3LX<+WH(@A[V2G/Y!_)*
MN9ZO/OT8'1#N0;^_6?[]0Y9_IWMPB.U6KP]-HO/I25F]_N+RE[[_K"9$8,>Y
M`@BXOXF"L:?RIMJ?3>;C]9FN8OU+V_=4F'V&?>#^]K]O=;JT_GO[AX_V_R&N
M5?E_^GW@;OMO%?O_(<!9^YW][J/]?XB+[;]MB[V)T!K0@IO(W#Q:_G_O:W7]
MYUKPR<:X8_U;EM4WZ__`ZAWB^K?ZO<?U_Q!7>U=D4R\5<\_WA>^EF0J%%XHH
M%%+$49()-TJ@P8X"+YP(^`AFH6?+S(O"5,C0@=XJK(E=D2J^"<18VE<BFF6(
M!!K$=1RVK^/T"*$6T4R$2@%D)`(9PR`)0"H$A4>)&$?O:409+K`?])<9.J>`
M/IO%*7336("HN#6'I^I:)2-W9E\!?2.D>!3.@A%`C!QE>XX:S6)`OMNNU?X&
MT_!GCA+?PA32S&E-OZO5VFTG"G<R,5="$@>NE%#!W\51H_:WD^$/+\Z&XI\O
MSR\N11_T<U_4:O94)KN:4R,@=80\2>N-HUK-"X%6Z87UAO@=?&CXWY$JB.#^
M2+1W80;"RX0$MA&+)C!S8%F<1+9*TR.!LQ:I%\3@@3\1M@S%6(E9"KP"X@5R
MI7YTQ)@%<5N/O$H*T"+$!_B7`-.2L-Z!A@],N5A'.N'DIX[,Y!'3SG!UFCUA
MG*BL_@0!&AI"H]=-'QZWBO^'5RG^AQ#P\XSQ,?Y_KWL`]K^[W^T]^O\/<57E
M_WER0'?Z_P<]D_\YM#J8_^MWK4?__T$N]OQ!]NSUXU:[Y\<R5#Y\PAX1P{body}gt;@
MPAE\A/8L257Z:.;_G:ZE]8]Z\,G'N'W]][K@[R_9_UX?P!_7_P-<QO^'_^-4
MS9QHSXX<=23&X+\G2CKH]6=3<%4G4_1>TVDT\QTQ\:X5^?+DOT^FZ)2#KRU%
MY(II-$?OWH["S`MGBH($W%?T."$\(_\=_/:%B.:AN/(@7I!IBD@@3FBCWP\N
M;^&NHQE"9[UH08M4;2&356T"%]^+5II\;UQM<^TP6^F9P+RK;47,4();I.UL
M$:MTM3F-["N55=M#!1Q16=L+J^TRB64;GU!$\C<'MN!0"8HZ>E:O=UBKX2#0
M+("PF9V)T<OCL^'IZ.3X\AA\]RV,.Z;`_J,MD.;EQ>NA\%S!-APX#D\<11S]
M4'2#:*5V'7D.R,/+1G,O3.L_OS@[.?]9[.[B71,%)4)PZPD*FD8@^GD.!`U-
M'3+X<JQ\AJ>O$%7X46)ZQL#);`3=`R##5U4$V`>77[8H?7_/W^>>DTW-&"P0
MO$-."#,"]8%(""*W.GTW\..9RUAV?95/(E-IE@=KU()3BF**9;&-^MJ)%]?Y
MVU3CN%(+TV.B0K@K$,#@V?L,[]N[4PF+`A33=84[N]H)X6]X=2,6*L-P$@5`
M?0*)D56.(K@QMSA6XG,`R7?9U`H+2!052<HTP+J8R\09Q1)U+36]@#N^LK.\
MF5G"=P!2DD#Z9O_M48VT0NP&I#&E)M8O:AUAC+?R:#=305R.>_&+3":V$0-\
MOW[SEN)+?.1!W`@!-XRK$A!6%(`DITJE"Q"$@N![DLAXZMED)))(3%6B:J+=
M)A6J;\<0;F8+$7LV1)UJ&X/0=AOB8Y%Y@4K0Y*2+,)NJU+M1&M7-$="UP#`:
M87`Q!%$"%BF.DQ;V3GVEXKK%J##`]@:=(^%]VX<_3Y\V(,1MMUF#W?KVK[]Z
M>E!87:Z7I!F-+))9&**5W/L.M4.`>AP)X"/0


gemini - kennedy.gemi.dev




%-)$*8OEO_4DL3<91%R0CG
M"I1)8=(%+.{body}lt;9(L'<=E4AL@BL(^8.<!L`3REI`I_T?A;+8TEC#)*R&@]Y=9Z
M`S\+S2TIV5*&H*1SE!,@H36%ZS3%/$J<FR;-SB0+D(0WW[QMTI+)]#<K=OC;
M5'_(1-HH=X%]!YWWKDLV#;$8SM*4`?\SXJ](;1E"ZU?I=I/&H$:4#'S,I\`7
MD)A.@\#DB`KOK1@,Q,ZOG9V&&,.V=75$CWGT@0;1;42L]W:0+W0)^OJ$USCA
M?/K4Y$_TH*XC!B**55C?1AO2@JW-!=K.1Q<GYV>GOS36$(9;9QWY]@2MB&50
MNS#@'<02@"$5N7D_4K4@P5"&=@#`V%5+IBF^;K!\E\Q((6/B,+2G=E)G&:`E
M9DO.#391RM^!@!BF!]LAP#=IQ\'T%Z,`L^,E=:LIGI^?GE^,+H8GYNOWI\?/
M?VP<5>"ZYN%_7`R'9[=!]LS#7X:GI^<_WP;:+QZ^'BX#&DAB`6UU^]2]M/SW
M>?EK41J[B&(3H9J/Z)ZZ0IN61-E*>F];N!L#-'+F2.?K,NXW`HN5Q%E2+]""
M2*O=\_S=&JR#'XY/7Q'260P/%&,E0Z(7L%G=N71I'],IN_L+.8R4/8WN$+C,
MP%"'=>;PR^,7%_4^9Q^#:UK<\_KIB[/A*[$G0'R=IMC^2:89&.OG$5IX7[Q,
M(K#4P?;Z/EWN\QO:N>%[+]LN#>JZ:T9U(F8*4KV5+TI8.2"+B<KL*5A?\26L
MO=]VT+C_OI7./6RUIXW:UN];M@2KO3/=>;:UM56#?[B]0<]Z><MKK)=B!X4&
M76"%8Z^][U@#!H+$U<!'OV]AF]:>Y7Y;Y5Y:;Z#U`_[!S801H+]R+P1:20B#
MV'`M.3\`JXW1EF:$W'GVD5RP_B`7K/\K%]8CN`\7"F]LE0$W'\V`[A]D0/=.
M^N_BP-T8-G(@=T`W0;3;%=>Y8-0R(+-MLO-L(RJD;G`?3O;>WD+0!O9J@[W^
M6L/U6\=@6I<YN0EV,WO)%;R-L#7"?!#"2@[AANM6*6>?0LK]!Y#RK6-\)#/_
MD#0_)0&;K7D1B6X",=8-C,F*[[!5WCI-AW9;NKA;8VR"YY%X,(L2!"\BGM&1
MZ5QBQ!"92)2.;7786<)"A[@RP;B=3I$Q^S.7"PIH\#M&+;#QPPR4HP?)>Z^)
M<9$-6P`\YQAFBUU?T:FZN+<D-8KS3DI8O/FZ\Y8<"W+I.MK-0^R=)OW'SI*.
M5G2ZXU9/)D^7:(Q-H7MU2MPU`UKW'/!X[Q3L]+H!K&(`JU',I'M/Q/^B6D^Q
M"7NWP-XM8>\M8;>L#>C!SJ@$-`N!T9-<-T:ORB(S1O^^8U#Q`98<P!)8A[]?
MY9#1DS^0ULJ]:I.K,OFKJ?(F4XBU*&]%4P"/<ZPFB_=UPFK@N)\Y4`_D>P-0
M0<!,&$?Z6<>H3G`]EXX#+BLULX-\_/S5Z/1R""ZY8(BI[X4JA[`8XC_1J];8
MT;?.H:OXS'/=ZT+CW3+A>BF51UTL(D$GZS3/2HYYF74EQG_&K&`N(%^%$X2%
MGI2S</T(S)!.6='N`J/AMG+V^O047#.Z$QSC:.D8T0`A+#'HQ-1@%-&!3N^I
M"[:4'R_,XX5YO#@R0R)[!_Q4WXBO*<O`]%*'!+[7>78TK/%`C7`8M-$677Q:
MT"">"LS!-7B2L`AT?,9JK9.F)'0=:>6S@S5$^9;2H',39RWU3I2;J'1:BCCO
MD8+-I9)%F?0YK8*WXP6XEKYR,Y@#`IKVD(T`Q6_417Q;0@31Z0`'K<-H,,Y3
M@F@6R`I#"RP/!X,]S,OP]L<[*'5X.@@9*.^WQRT?<&P<30P(\"C/KPA"]O<]
MZQGM-F#$ES/+1)_KC+#:)Z`MXJAHP*S0R'52#KXIE8_G!+`"$U@,(EC@MPT/
M$Q5$F3(`R"/7`>O1U'4Z"N)RL)2NDZ?G@#%ONOL';W.6TC3-W4*E`\O<(-82
M\[VF>$?\_^%D]*_AQ7G]"<^{body}gt;)JWF<FPJ3)4#/C@HW[\PPCLS653O#I__N/H
MU>7%\/@G(Q9@!4)!\%DOB']U?CI"6.XSNAB^?C4\/CFY:(HG0"MHIG>C(I?4
MFY68F-5*P8BX,O!\7&IZT*7'_(4^`.;%&6(='9_]L@1&U6X#,<TP(,Z+G@(5
MI%CW5"]!WJ@D:C0I@X>Y-00;>Z"-Q63J2P($!_@)(\@GPK<\%UUJ5?2W.H;7
MKX:7I?:R($C\`_.,A%"M$3,"@DD5FHC<Q].!.G5_"N8[%V23+&'YKUY$I=38
M@+I5\F.TR(#2%Z^05J^$L%'VU0'(&^3D5KUXK7]HQY@YA;)7_%E2\(&T;551
MG77<+C``01I_!9?F+:&L,K9$,3T5WS&O&Q7/FMF?+SESF9SV5ZF8RA1D@&JE
MT"4ES]:9P>9`M8_D/=K:>XS9>Q11N+WDOF_S>A)?.;^&VVA0538*LTB66)0K
M>4.;@-(L3,"P$KG`Y.IL$8#KB;*O47)DL[4(X'L#%VQ#?(N[545>R!GJ.QAT
MJEPQT\^I)B[\-O,R)K_"8-N/4E7WEL7R_/2"U&A%)&O"KW9[`L$#9DA+C:BO
M[U!?W^7Z^JZLKZ8KEZQ&`DM(%U&H*H_+2OVNH&8U_-1XJ.J5S[W3R.=C[W3J
M94O0@/8=>@?%0EB)U\QV^DX+Y`GS>BFR*X>"'U;E73-_/^1.5R7A=U\_EN*4
MLB?+\<P=WBP#K?%HU_B0#+M?]B.WIPVN%L!S_NV*0]EEB[D1ST$%CVR(:P_"
M#KF'_/XX3(<53#<:$[\8)SX>W=<5=).&6(F+/@K=-Q5T64,4(9!ZOXXT4P"\
MX7P;]4$_7\09#$V?`V@3_TT01_EA(3TI.?,FD50^,D3<=VK6#R^&IR=BU_64
M[T`(2$WG%S^)W0`K/K3N\5,3E8_H%H^7K([^5XJ.&-9:#]M;!TLQ,FYU2T=`
MW?(6AX<W!#["15[GGGAN<SQZ?78RO,#(BE<G0\$B2T?H.1>0YZ/CUY?GKWY\
M\3(_W*%)#HA.^,*P^'!EO?7NL]YZ:]8;V29;^HI'H`'!G!BP)P4<S1">8M+$
MP&FTU>?I;&R>.RI!Z/6C4RQI=#A*LQ(%'%R8**(8I1I:5`]OYGQZ8X#S0YS<
M&!<'.85]ICSEC\-?1A!:GA7)2IJ'DWA@],U4+H;_&)T-_^MR1!I9,K0;8(=G
M)Z-"Z'15<Z7YT*]?WCGPRXOA/S_]P-\?/__QU<OCY\,[QS\9GMZ.TU&NG/G9
MK8CLZ:;N'[2ZS\)U>@#R5NO;:.V:Q;^^W7JKE9PJ;V0H>'?#73@WKM*85Q&9
MO"7L]&#+)3S"(7F5(`+:<0PT^&OY63^!<'J47A*1>_R*%+\`PSL"OD$#L;GN
M3CTB%YP!+)FE2KDY%<Y1PE0*QW/=%HU#)1Z4($4@*F>)C%M8X^2IHJI<NEF[
M'>#BLWK5[<5,G^8TQK6Q?DNH5C'E%AQ=8K),E<H/:)L%(X!,\R`3[;RN-=CU
MO7&R8(%@L03R%XM8B"_,:YBW]",JE0EI%\%O.#HN?N0&>)KE`I'[%%XPF54X
M0!YG#D$^A\#S4OP/]?GY@KY<7KP^>P[L.NCW2X8F+]V@^9)3O*&$0P.05URN
MWT`V0#^]P58*->:)EZFZX>@3S3$KWPM0S.8E+/#D@5U9=*7"W#D5,9A]+*Y$
M;0`!8.[=O$9%)(A9S(H<X:.K,)K#M%3"VC2-8D&.**">PJQ4,LJB$2&&6&(Z
MPG0A[%<HV3K\TXNJH$CG/B2*?PQ1BZ9CG!"-LQ@IXK40^])6_!88+"`9$B*9
M)'(!ELGW@6!2$A2;UJ0!D3^+E\A!.H!1!*WI@1AI+,<0YYM#AP1&C`)HD&GJ
M34)1W<%S52UMY.TVE5EI1TE)V%N6&0MXS?+DA<T.`$7W0`MMYG1@FM=^E#E5
M,CL<^8$1\7T\\]#2@%%P4:1T'))&O/+GBO'@&0OP.O'4M6:B+S%*C,)6JX7F
M`0$4+"=HNU(J-A6U^-Z8LJ$GHZ%5A]5U/";8/=.7S`>6DM';>8EX-TLSQ@2.
M-B;9LH3>W7,9D9?!N%@(C/T##[.3AO=.I.>"97#:[!*VL;(E63$@C;$*IM&
M#E4&>U1.S`P`RO5;>T+.%9*+X,#`A&+[M;RF6$;S.Y"AG"@NAF/W'BR1-LOZ
MQ4.(E6&M7D$/G(`N71X#^-BGA0'+`=R8)(J;(HA`YF#@P,UHX2D6#(


52&S
M&+%7BS=)GS"@HEM0;73,TJK?,A@LUYR8E_>6G94/M\SM1L_-;#.?96Z,!55$
M^J"5::QLZ(([91/U!)=X1%N?7BF&&&B-54*F'18[+'6;-`'?HH31G2@E/20T
M#(3.A`I3+!^728`.+:[&-)XE7C1+J3@4`>G]TJ8`=/B^),!@X;2?$C&P.$+H
MX8,:`UU43YZB\0#UQ74+*A_BA#2#TKV]%SO08R?C=RFI`)0VW>YAF:?!PK`4
ME^4+D<JY""/``^8I99^"QZ1AN3Z>:TOU#,D.VU.%QGL"RQ8/./5;K04UB-MP
MFK(?Q%JT`:F:X!KD&^`PIDTPT<55GLA0P&)U6N_QOZ*F7H81F0.#GS9;E!`W
M3Z7OHLRL;[HMZ^!K[&LT1BFJU+>CR"^_I4LY"UR<6+9<K5"NZKSFW9+*?Y3&
MBY+*N[/09AN*(QAO"PE+P;*!Q&EF>M`V+WCTDT)%*I<6*0ZB3I_AP==0!@I'
M+0W%1\HI*;0^5UYW!LWEM86R`]-1Q6GH9\_HC6'0I?$LQ>0S[O#\AK2C6(CX
MUL0<D-AQVXLY,D>+R38/$('OYH``C,%T83N[\MGQ1"KI2`M$I\)K+XE"4@ZS
MZX/]Q+5B["=8;=?U[+T]EAS$_XD*%.!*?1@`)[.3J,G,E\D.S3$!;2'\@`/%
MW6J)PE?E-ZZ5##%YN6>F)5DO_$B2)9<QK`7S%C@LA1KMK';Q;HBDB3*AZVO5
M<U^36^PLX5.A<K6Z3@'`9D-:4T`NE[CGQ>U"UP33RQ?`=E##-+E.X*O.4])6
M7@;7[U^7VSZP0A?C`1JN+EA15NT:D47.G2.C4XFR%3##P57ORH16+>@9KD`0
M@!X8'O-H9'EA]N&$]*C$!J.(]BQ!XZ;Q(S$1FOP<T=W5_\1'G<9!!PF</@W7
M>'R!^R]Y5=__RZ.L3SK&G>__=N#[X>&AU;/ZO5X'W__M[1\\OO_W$!>:Z<=U
M_]>]UJQ_SIY\PC'NL_XM:K/V`1+7_\'AX^\_/LCUC^\O?QW\V40\7G_:5:Q_
M_9.?GV&,C_K]QP[]_F/W\?=?'N9:D?]-)QA;O4_Z*Q!WV/]^_S#__0=P`^GW
M7_K=_4?[_Q!7>U<8B4-\FGE[=A0O$CS)W<7?8]#E#IA#,`DB;*_\FMK#_,["
MNA]4V/#["_?ZG86B625)N$+_*F'XLO<F4M?^:,.]?YW@SA?H:WFQ#C"!SN9F
M05[-J8O?IA$6%`'.J5JM(-4%I)*+1U?*0WDPK&"5H9.^>:OS+IY;1V+$EX.^
MR=NYNL`+Y@UL:XKM62HGZIEH:;M!OR2$M6B8N*0#D"NU^#7<UN=@ZKV7U8MC
MKUI1,!9X-A^XM@QTZ>7\%2@ZP\WFT>W0YH=-Z&!"+J'G`Z56?J+!IS64>:,C
M(*K'2[.%C^<24X69363Q>($)Q3H)!L^?<0XLE?M4OK(,-A:MEAY7JE%)H981
MZ'K6W;HI?S1MNXVIVOMN.LK+)_,:UE+O-36L[5V=3ZT;-=M06"E+9:Q+$%SQ
M8=1S0(6%!ANI?7=_WS##:*#@E^'+DKO0F;-G@JK2L1:1])0*!AE?XXA^%M$H
M[4#.I9>-S"W]Y"(7YLF0W@?R)&;K?INA]NA\6JJ2:Y44AYV4@8MGOL\G+Z:7
MP2G<)`I*'06]'<5'G#/\U85,IT3U[V+*#`@'9)1A;;7PY"`_PRP.;+`B`8_P
M"(_SO^U=36_:0!"]^U=8O32'A&";P+%"":VB)E%4J*KV$AFS(:B6'6$[D/SZ
M[IO9M?E00@Y@6CKO1!R;M;'?>C[>S*8F&!BGR-ER8%'-580>F8@Z<CYN]I!2
MF#4S<5G'M3L=V9.EZ[<$0)$5YA?Z6F>U+R1K#,JKI!-'.Z"0@I.40Z0_.5$:
MVH@V9Y(=4]Z%/.="M-R=T48D"CG^6Y[?RE1#$\MZD1?WXUBM*7-M)1G2.;90
MC(HN3-<#\[5<$40YHP\DIJ;@;QCE=V%V9_]S5/U$G'>`M,H=%WI,;GI4)MGX
MQH=YKL_BM?&H\!"9S84!RVT+0YF8<&;:J^)IH1^5^WVD=,QJCN^5(4>3;*@_
M+@QHMJQ>612KD/+TDSQ3\3T]GF;7ZIDN!SL]Q=/:H,.1I](3'_=J&JD\G""'
MC^/B-!D?;OV'+?]PWZ[_V+?QM@6LV?\[:`&Y,?X3E.M_=)H!^K^W.K[T?ZL%
MB_W?2T?@)#6?#^$)%[R%BO^CYGR/_7^1__&;':_M@?]^J^U+_*<.+-__[F#0
M/?^Z[3$VS?\^>OZ:^]^B^3\(I/]G/1B@EUR*R`%<'=C4U^>W'S-C[<(0AK,S
MB5C_`BU98=1[8VU/Y0UW0&WZH(1)$V@QH0)!"WOH(*9I>L_2D@0E>]J:>LY*
M@<M4:;,T4PUYQ^P3R_S_UNM>7/>V/<9&_GOMDO^=ED?\#R3_5PM^L%2-A6DG
M)XGVV)MS$HYFGYR?ZN&XU"M"#V][!6>%G@.&<:$]->QN`A4OVJVF"0$;3[6+
MJ9W=/)T^.Q`S/H5Q0>+4!86G=711W_#TF,A44#^6^7_1^]R[Z6][`MC$_Z#E
MK]A_04O6_ZH'78IU3EG+:M[@]VJF;8+(5?,0J]&LO;+-$11;&BJG2$9I,<S5
MB`ZN=*(DM7Z,B_$D@:1]Q&DD\)U%X&0C:.H?8YL3LLS=+"G$NO^&VW6'83:)
M2`(^?295]%#1$D64@V&IKI%;LT+7SB=8>D>E,J=LP#+_;Z^^?[F\Z6]YC$W\
M][#FG^%_T(;^+Z#U7X3_NT=?,TDMLWN&OA5%AE(&JUH?I5B="G)Y0V?,%M87
M@.0=VF,W8A>!RX"04'BD<'%9DY#HE_Z3LLTNA)E_`U;\_ZO+_F#K8VSDOW=6
M\M\[8_W/F?"_%L!:IU<O7'IN+%\51-K\5]G`,:?*I.BWFF;HJ1]/7DRJS!'S
M_=_$,O]_[87_S4X5__,"]O^;GO"_#@RLK?UN_IMR.&'[0:#B_VYB?T#3\T'O
M]^5_Z/W?(OVOO[N09(7_G/\"@4`@


gemini - kennedy.gemi.dev




@


gemini - kennedy.gemi.dev




H%`(!`(!`*!0"`0"`2"P\(?HO6S
%-@"@````
`
end

--end cut--

++++================================================================++++
++          SpringTime Phun                                           ++
+  Attack Asterix PBS w/an automated random loop generator connecting  +
+  two random people that don't know each other                        +
+                                                                      +
+  Organize a local hack attack challenge--pick a location and via the +
+  mob mentality bullshit gather a crapload of people--any computers   +
+  in the area are free game for attack!                               +
+                                                                      +
+  Hack all the gamers at Interz0ne. What the fuck are they playing    +
+  games at a fucking hacker con for? Get these detractors out of our  +
+  scene at any cost! (hijack johnnyX's pirate radio station! ;))      +
+                                                                      +
+  turn that blackberry sploit you have into a worm--all the senators  +
+  and representatives use that shit.                                  +
+                                                                      +
+  wheatpaste your university with/with-out binary of ppl's grades     +
+                                                                      +
+  phish some cc and give away free hardware to 'low-class' ppl        +
++                                                                    ++
++++================================================================++++

g) getting drunk off of the h0n3yp0tZ
  You know how to make homemade beer? No? Why the fuck not? It's cheap
  or free, depending on how you obtain your ingredients and within a
  couple months you too can be rolling drunk off your ass till your next
  batch is done. So, what the fuck is the point you say? The point,
  dexter, is that sugar or honey is one of the essential ingredients in
  alcohol. Yeast is the other. The yeast feeds off of the sugar and when
  not exposed to oxygen it creates alcohol.
  This will be our basic premiss behind the proof of concept program,
  yeast. Yeast uses the honeypot against the owner by hiding files in
  the honeypot's client logs and using the regex pattern matching of the
  honeypot to snatch lan traffic such as passwords and emails. But this
  is only a couple of it's capabilities sire! We can harass via logs and
  spoof so-called honeytokens into giving access to ourselves the easy
  way. Hrm... not following my drunken ass are you?--well then, let me
  re-explain. When a honeypot is trying to capture traffic it logs
  pretty much fucking everything. We take advantage of this fact to hide
  files on the target system. With a little ingenuity a trojan can be
  placed on any system without the target owner knowing shit. It can
  also be used to send spurious data to throw the honeypots into a
  quagmire. (fuck those memetic words) let's look at some pcode as that
  should be easier to understand:

  int main() {
   do {
     selectchoice(fill_up_logs);
     selectchoice(hide_data);
     selectchoice(be_a_bitch); //this is my favorite cause you turn the
     //honeypot into your workhorse...say there is a honeytoken for a
     //recent exploit that uses the string /bin/sh...if you send data
     //out that has /bin/sh in it the logs will look for data coming
     //from that ip/port pair more--let's not stop there..what if that
     //string /bin/sh is really a link to a program on that port that
     //sends out an arp poision atttack to the local router? the
     //limitless choices are in abundance here ladies and gentlemen
     selectchoice(scan_for_traffic);
     selectchoice(trojan); } while(1);
   return(0);
   }

   /* this is the most easiest util because at it's core is just a
   ** simple d0s util..we just want to make sure the honeypots are
   ** collecting enough info..so we send out hotstrings and other data
   ** very rapidly and we send a shit load of it! */
   void fill_up_logs() {
     collect_hot_strings(); //find out what the hotstrings are from
     //something like packetstormsecurity.com
     while(1) {
      string=(strings[(rand%NUM_OF_STRINGS_COLLECTED)]);
      ip=(rand%256);
      port=(rand%65536);
      send(string, ip, port, target);
   }

   //this func will need to be finetuned to diff. honeypot systems...
   //perhaps an array where each system can be identified and then
   //matched as to where the data should be put... for instance if you
   //have one honeypot throwing shit into /var/log/honeypot.log that
   //will be a diff. case then some homebrew bullshit that is putting it
   //in /root/I'm_not_a_dumbass.log (you'd be surprised at this type of
   //shit that exists--thank god the american military machine has
   //partnered with lance...heh! dumbasses) 
   void hide_data() {
     data=select_data();
     ncrypt_data(data);
     ip=(rand%256);
     port=(rand%65536);
     send(data, ip, port, target);
   }

   //get your creativity on!
   void be_a_bitch() {
   }

   //this just sets tokens in the logs to traffic found to be
   //interesting; an offsite approach to capturing traffic on a network
   //that you might not have access to or at least not very long
   void scan_for_traffic() {
     char *scanned_traffic;

     //a very trivial example
     scanned_traffic= sniff_network();
     place_tokens(scanned_trafic);
     send_data(scanned_traffic);
   }

   //the one and only--the pos generic you'd find anywhere
   //say we have that array of honeypot systems lined up and we know a
   //couple of things about the target box.. a simple dot file here or a
   //seemingly harmless set of weird commands that begs to be executed
   //can be a wooden horse anyday
   void trojan() {
   }


eof