Skip to main content

Anonymous Publishes Three Guides To Teach You “How To Hack” And Fight ISIS

The war between the hackers and terrorists is escalating quickly in the wake of the recent Paris attacks. In the short time frame of past two days, Anonymous hacktivist group has declared an open war on ISIS. In response, ISIS was quick to retaliate and called Anonymous ‘idiots’ who just know how to ‘hack email and Twitter accounts’.
In another development, Anonymous has released a series of guides urging the people to take part in their biggest ever operation called #OpParis. The guides include how-to instructions that tell the ways to hack the ISIS-affiliated websites and social media accounts.
The rivalry of ISIS and Anonymous dates back to the Charlie Hebdo massacre in January. Anonymous has continued its attacks on ISIS and already exposed more than a thousand Twitter accounts. To train and bring the newer generation of hacktivists, Anonymous has released three how-to guides.
These guides were posted on an IRC channel and Anonymous encouraged everyone to join this war against ISIS regardless of their computer skills.
The three hacking guides include, a “NoobGuide” for the people willing to learn how to hack and a “Reporter” guide explaining how to deploy and set up a Twitter bot for unmasking Islamic State accounts. The third guide is basically a “Searcher” guide for finding ISIS-affiliated websites.
An anonymous member, posting the guides to IRC, states: “There should be plenty of work to keep you occupied so get going. If you wish to submit anything of value, place your findings on ghostbin.com and share to the link to one of the channel operators and we can talk about what to do next.”
These guides have detailed instructions on how to carry out a cyberattack against ISIS websites using DDoS attacks and MITM (Man in the Middle) attacks.
Here are the instructions mentioned by Anonymous for finding ISIS-related website (thanks to IBTimes):
  1. Get Python at https://www.python.org/downloads/ unless you already have it (Mac does)
  2. Open Terminal (or Command Prompt for Windows) and type (without quotes) “python”
  3. Now, this step requires a little explanation. Let’s set this out neatly, shall we…
  • Copy the contents of the following link to your clipboard http://pastebin.com/pDb7yeVS
  • The contents of that link are some search terms that relate to ISIS and their content, allowing you to narrow down the results to specific ones
  • Paste the strings into the Terminal and press Enter
  1. Choose a couple of strings (3 recommended) from the list of strings. For this example we will use strings 3+38+46
  2. Once chosen, continue in terminal (without quotes) “print(str3+str38+str42)” and copy the results
  3. Paste the results in https://www.google.iq and analyze the new results To translate pages, it is recommended to use Google Chrome, which has integrated translation
  4. Submit any valid ones to one of the channel operators and we will deal with the info accordingly

Comments

Popular posts from this blog

How to Unlock (and Play) Hidden Chess Game Inside Facebook Messenger

What can you do with Facebook Messenger? Chat with your friends Send GIFs, stickers, and photos Make video calls Send people money in Messenger Have you ever wondered to Play a game while you chat with friends? Yes, it is possible. Facebook had made it to the reality by building a hidden built-in functionality in Facebook Messenger that lets you play Chess with your friends without having to install a third-party app. It just takes one simple step to unlock this hidden game. All you need to do is: type " @fbchess play " and hit Enter, during a conversation, and a small square box would appear in the chat box. Here's how to play: The person who initiated the game would be assigned "White" side, to make the first movement. Although there is some standard algebraic notation like:- B for “Bishop” R for “Rook” Q for “Queen” K for “King” N for “Knight” P for “Pawn” Pawns could b

How to Build a Successful Incident Response Plan

The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself. When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status. According to SANS, there are 6 key phases of an incident response plan. Preparation -  Preparing users and IT to handle potential incidents in case they happen Identification -  Figuring out what we mean by a “security incident” (which events can we ignore vs. which we must act on right now?) Containment -  Isolating affected systems to prevent further damage Eradication -  Finding and eliminating the root cause (removing affected systems from production) Recovery -  Permitting affected systems back into the production environment (and watching them closely) Lessons Learned -  Writing everything down and reviewing

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the