"Those who deny freedom to others deserve it not for themselves."
- Abraham Lincoln
"He who sacrifices freedom for security deserves neither."
– Benjamin Franklin
Hello World. We are Anonymous. What you do or do not know about us is irrelevant. We have decided to write to you, the media, and all citizens of the free world at large to inform you of the message, our intentions, potential targets, and our ongoing peaceful campaign for freedom.
"True, This! —
Beneath the rule of men entirely great,
The pen is mightier than the sword. Behold
The arch-enchanters wand! — itself a nothing! —
But taking sorcery from the master-hand
To paralyse the Cæsars, and to strike
The loud earth breathless! — Take away the sword —
States can be saved without it!"
- The Cardinal
Richelieu; Or the Conspiracy by: Edward Bulwer-Lytton
The message is simple: Freedom of Speech. Anonymous is peacefully campaigning for Freedom of Speech everywhere in all forms. Freedom of Speech for: The Internet, for journalism and journalists, and citizens of the world at large. Regardless of what you think or have to say; Anonymous is campaigning for you.
The recent news of our campaigns has been, at best, misinformed. Anonymous is not always the same group of people. The Constitution of the United States is said to be a living document, because it can be edited, amended; changed at the will of the people to suit the peoples' needs. In that same vein, Anonymous is a living idea. Anonymous is an idea that can be edited, updated, remanded, changed on a whim. We are living consciousness. We are not a terrorist organization as governments, demagogues, and the media would have you believe. At this time Anonymous is a consciousness focused on campaigning peacefully for Freedom of Speech. We ask the world to support us, not for our sake, but for your own. When governments control freedom they control you. The Internet is the last bastion of freedom in this evolving technical world. The Internet is capable of connecting us all. When we are connected we are strong. When we are strong we have power. When we have power we are able to do the impossible. This is why the government is moving on Wikileaks. This is what they fear. They fear our power when we unite. Do not forget this.
"...Now, we must all fear evil men. But there is another kind of evil which we must fear most, and that is the indifference of good men."
- Monsignor, Boondock Saints
Anonymous' intentions are very clear. We are not vigilantes, regardless of the sentiment of quoting Boondock Saints, we are people on a campaign for freedom. Anonymous' intentions are to change the current way the governments of the world and the people view true Freedom of Speech and The Internet. Anonymous is willing, ready, and able to campaign for the freedom for all. We are campaigning right now as you read the news, watch the television, fight with your
significant other, love your children, hate your neighbor, criticize the man or woman next to you. We are campaigning. The goal is simple: Win the right to keep the Internet free of any control from any entity, corporation, or government. We will do this until our, proverbial, dying breath. We do this not only for our selves, but for the world and its people at large.
"Truth is treason in the empire of lies."
- Ron Paul
Pay attention citizens, governments, and the world. Anonymous' peaceful campaign will focus on any organization, corporation, government, or entity until the Internet is truly free.
Anonymous is doing what many successful campaigns have done in the past; a sit-in. It may be hard to comprehend, but a digital sit-in is our most effective method to show that all of us deserve Freedom of Speech and a free Internet. Our methods may appear, on the outside, to be cruel to those the entities that we are campaigning against, but remember buy supporting censorship they are denying everyone a basic human right. Any person, corporation, government, or miscellaneous entity that stops supporting censorship and starts promoting Freedom of Speech and a free Internet will become our allies. Anonymous, at this time, wants to persuade our counterparts rather than hurt them. We are campaigning for freedom for everyone, even the opposing side.
Do not fear us. Anonymous' campaign does not intend to harm the individual citizen, any organizations, any websites, or government, that supports true freedom of speech. Anonymous' past is not our present. We are here for all of you; to campaign for all of you. Where others have made this promise and failed; we make this promise and aim to keep it for everyone.
Anything attributed, credited, or tagged to Anonymous is not always what we do. We arenot always the same consciousness on a yearly, monthly, or even hourly basis. Do not believe everything you hear or read on the news. Anonymous is often credited with actions that are not campaigned for by Anonymous. The true core of Anonymous is here to help the free world for now. Anonymous wishes to represent the truth and ask that you as a citizen, media organization, or government do the same.
all about go, ruby, python, perl, java, scala, osgi, RCP computing, network, hacking, security, encryption. and other interesting stuff
Donnerstag, 9. Dezember 2010
Freitag, 26. November 2010
GO BASE64: small stdin to stdout copy
package main
import (
"encoding/base64";
"io";
"os";
)
func main() {
e := base64.NewEncoder(base64.StdEncoding, os.Stdout)
io.Copy(e, os.Stdin)
e.Close()
}
Go: GoClipse
GoClipse is an Eclipse plugin that adds IDE functionality to the Eclipse platform for the Go programming language. The purpose of GoClipse is to create an environment in which development of Go is easy for a beginner and has enough rich features to be attractive to an expert.
GoClipse
GoClipse
Montag, 22. November 2010
TOOLS: interesting tools
THC-RUT
is a tool for monitoring networks. It offers a wide range of network discovery utilities like arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprinting, high-speed host discovery, ...
thcrut arp 10.10.10.1-10.10.10.20
scan a network with arp-discovery.
ArpAlert
is a discovery tool for unauthorized request on MAC address. Some more info manpage
SendIP
a packet generator (IPv4, IPv6, NTP, BGP, RIP, TCP, UDP, ICMP, ...). Some complex, but very usefull packet genrator (see manpage)
Attention: the order of parameter is important to build correct packet ;)
Tor
is an anonymous proxy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Knock
knockd is a port-knock server. It listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
is a tool for monitoring networks. It offers a wide range of network discovery utilities like arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprinting, high-speed host discovery, ...
thcrut arp 10.10.10.1-10.10.10.20
scan a network with arp-discovery.
ArpAlert
is a discovery tool for unauthorized request on MAC address. Some more info manpage
SendIP
a packet generator (IPv4, IPv6, NTP, BGP, RIP, TCP, UDP, ICMP, ...). Some complex, but very usefull packet genrator (see manpage)
Attention: the order of parameter is important to build correct packet ;)
Tor
is an anonymous proxy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Knock
knockd is a port-knock server. It listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
Freitag, 19. November 2010
Qualitätskriterien für eine Theorie.
Eleganz: Ein Modell sollte so möglich wie einfach sein.
Sparsamkeit: nur wenig willkürliche Elemente enthalten (nur die sich an Beobachtung anpassen)
Erklärungskraft: Daten und Beobachtungen sollten übereinstimmen und verständlich sein.
Vorhersagefähigkeit: Beobachtungen vorhersagen können.
Das letzte trifft zurzeit nicht auf String Theorie. Aber abwarten.
Sparsamkeit: nur wenig willkürliche Elemente enthalten (nur die sich an Beobachtung anpassen)
Erklärungskraft: Daten und Beobachtungen sollten übereinstimmen und verständlich sein.
Vorhersagefähigkeit: Beobachtungen vorhersagen können.
Das letzte trifft zurzeit nicht auf String Theorie. Aber abwarten.
Donnerstag, 23. September 2010
HACKS: Tutorial Zero
The problem nowadays to learn buffer overflow is:
- linux kernel has protection (va_randomize, exec_shield,...)
- distribution has protection (armor, selinux, ...)
- gcc has protection (stack canary, ...
That is good, because it protect us. But bad for learning.
To learn "buffer overflows" you must deactivate the protection
some tips:
to deactivate gcc protection:
-fno-stack-protector
-fnomudflap
-D_FORTIFY_SOURCE=0
gcc overflow.c -o overflow -fno-stack-protector
gcc -fno-stack-protector -z execstack -o bug bug.c
to deactivate kernel protection:
echo "0" > /proc/sys/kernel/randomize_va_space
echo "0" > /proc/sys/kernel/exec-shield
echo "0" > /proc/sys/kernel/exec-shield-randomize
info about execstack
If you look at the programm with objdump (objdump -x cmd):
STACK off 0x0000000000000000 vaddr 0x0000000000000000 paddr 0x0000000000000000 align 2**3
filesz 0x0000000000000000 memsz 0x0000000000000000 flags rw-
The stack is not executable!
you can do it executable with
gcc -fno-stack-protector -z execstack -o bug bug.c
If you want to learn heap or bss overflow you must do them executable too.
DYNAMIC off 0x0000000000000e40 vaddr 0x0000000000600e40 paddr 0x0000000000600e40 align 2**3
filesz 0x00000000000001a0 memsz 0x00000000000001a0 flags rw-
- linux kernel has protection (va_randomize, exec_shield,...)
- distribution has protection (armor, selinux, ...)
- gcc has protection (stack canary, ...
That is good, because it protect us. But bad for learning.
To learn "buffer overflows" you must deactivate the protection
some tips:
to deactivate gcc protection:
-fno-stack-protector
-fnomudflap
-D_FORTIFY_SOURCE=0
gcc overflow.c -o overflow -fno-stack-protector
gcc -fno-stack-protector -z execstack -o bug bug.c
to deactivate kernel protection:
echo "0" > /proc/sys/kernel/randomize_va_space
echo "0" > /proc/sys/kernel/exec-shield
echo "0" > /proc/sys/kernel/exec-shield-randomize
info about execstack
If you look at the programm with objdump (objdump -x cmd):
STACK off 0x0000000000000000 vaddr 0x0000000000000000 paddr 0x0000000000000000 align 2**3
filesz 0x0000000000000000 memsz 0x0000000000000000 flags rw-
The stack is not executable!
you can do it executable with
gcc -fno-stack-protector -z execstack -o bug bug.c
If you want to learn heap or bss overflow you must do them executable too.
DYNAMIC off 0x0000000000000e40 vaddr 0x0000000000600e40 paddr 0x0000000000600e40 align 2**3
filesz 0x00000000000001a0 memsz 0x00000000000001a0 flags rw-
Mittwoch, 15. September 2010
run Linux in Windows
there is a possibility to run Linux in a Windows environment. No partition, no extra linux on disk. You can install your linux in windows partition (ntfs, fat?) and start it running windows. No reboot anymore. Ok I virtually don't need it, because I use only linux (have any windows).
But here are the link: andLinux
andLinux based on coLinux.
coLinux, ulteo Desktop
But here are the link: andLinux
andLinux based on coLinux.
coLinux, ulteo Desktop
Abonnieren
Posts (Atom)