Friday, October 12, 2018

so worldwide.ciberwar.com do we hv the game set now?


BAD NEWS...!!! For the Empiry of Hypocrits!!! Take a look, at this Hacking:


It builds in a (derived) RAZZLE/DAZZLE/WDK/DDK/VC++DOS build environment AND it outputs NTOSKRNL.EXE which can then be used to DIRECTLY AND COMPLETELY replace/file-overwrite/slip-stream/patch/pre-install-by-WAIK+WINPE; ie: either way you look at it YOU GET NTOSKRNL.EXE WITH WHATEVER CODE WRITTEN IN IT (including your rootkit/custom code) AND IT WILL WORK. Because this is RING 0 the entire system is yours. In fact: if you look at how NTLDR/OSLOADER+NTDETECT (or even EFI/DEC-ALPHA/MAC systems) boot up --> there is a lot of initialzation done before the actual "system process" and/or "idle thread" and/or "worker threads" are created. This includes the actual creation of the object manager and the HAL and CPU code as well as 'DOS' switches that are passed to NTOSKRNL.EXE in command line fashion. But yes: WINDOWS/NT sees everything as OBJECTS. And to do this it must create an OBJECT ORIENTED ENVIRONMENT (OBJECT MANAGER) first. THEN it creates the SYSTEM PROCESS and flows on from there. Also look at SINGULARITY: this bootstraps up the .NET (C#) FRAMEWORK and COMMON LANGUAGE RUNTIME/INFRASTRUCTURE and BYTECODE-INTERPRETER/MANAGEMENT and then allows a 'MANAGED' KERNEL (C# WRITTEN/.NET) TO EXECUTE. Very interesting concepts. Put these two together and think: imagine a NTOSKRNL.EXE that had it's object manager hacked so that it 'SAW' the objects of other machine's (IE: other enumerated system's object manager tree is fleshed out along with registry by loader/strapper/kernel and pooled) and then THE FINAL SERVER MACHINE OF - SAY - TEN MACHINES - (the first nine are SLAVES whose objects are 'donated' and who run nothing but NTOSKRNL.EXE and HAL+DRIVERS) ---> [THE FINAL SERVER...] gets all these objects (RAM, DEVICES, FILES, DRIVERS, PROCESSES, MEMORY, ADDRESS, INTERRUPTS, PROCESSORS, ETC). and maybe in a NUMA fashion or TERMINAL-SERVER (\Windows ? \Sessions ? \Winsta* \Global \??) merge-multiple-sessions-and-object_trees TYPE FASHION: gives a SINGLE SYSTEM IMAGE SUPER WINDOWS ???
You could definetley get there. Just look at AZURE. But anyway: yes: the ultimate goal here is to
FIRST CREATE A NTOSKRNL.EXE THAT CAN REPLACE THE REAL FILE ON ANY RTM/RETAIL/STANDARD SERVER 2003 DISTRIBUTION AND DO THE FOLLOWING: THE BEST BACKDOOR/FULL CONTROL/ULTIMATE WOULD BASICALLY BE THIS: TO BE ABLE TO LIVE DEBUG+DISASSEMBLE+SEND-SYSTEM-CALLS DIRECTLY. THIS IS HOW IT WILL BE DONE: PUT CODE INTO NTOSKRNL.EXE BEFORE SYSTEM PROCESS IS EVEN CREATED. COULD EVEN DO THINGS BEFORE THE 'PROCESS' AND 'THREAD' AND 'PROCESSOR' CONCEPTS (OBJECTS) ARE EVEN DEFINED... NO HASHING OR CRYPTOGRAPHY OR EVEN TRUSTED PLATFORM MODULE (UNLESS SPECIFICALLY DESIGNED TO TARGET THIS FILE - BUT JUST LOOK AT THE V1-XBOX !) COULD GET AROUND THIS BECAUSE NTOSKRNL.EXE ***IS THE OS*** ITSELF !!! SO YOU CAN DEFINE EXACTLY WHAT CRYPTO/HASHING/NSA-STYLE-STUFF EVEN MEANS !!! THE CPU/SYSTEM/FIRMWARE ARE 'BLANK' SO TO SPEAK. AND IN RESPECT TO THE SOURCE TREE NOT BEING THE FULL CODE OF WINDOWS 2003 WELL ***IT IS*** FOR ALL INTENTS AND PURPOSES AND THE OTHER CODE IS NOT MISSING BUT JUST PARTIALLY PRE-COMPILED INTO .OBJ FILES WHICH ARE MORE SYMBOLIC THAN ANY DEBUG FILES SO IT IS ***VERY*** EASY TO DISASSEMBLE AND GET FULL CODE; NOT TO MENTION IF YOU COMBINE RESEARCH KERNEL WITH LEAKED NT4, WIN2K, AND TINYKRNL (tinykrnl.org), and MSDOS-leaks, and BIOS-leaks, and even some REACTOS and EFI/BIOS; YES YOU ARE THERE ! ESPECIALLY NT4+WIN2K+WRK ! JUST LOOK AT THE CODE IN NT4 TREE ! IT IS MORE THAN COMPLETE; MAYBE A BIT MESSY; BUT IT HAS ALL THE BOOT-CODE AND INIT CODE (NTOS) AND EVEN SHELL; EVERYTHING TO THIS DAY IS BASED ON THAT \private\ntos\ TREE IN SOME WAY... THANKS stevewo !!!!!!!!!!! ANYWAY: THE ULTIMATE WILL BE THIS: USING TECH/CONCEPT/VIRT

..Some malware disguises itself as inspect.sys.....and I hv to get rid of this little shit...ntoskrnl.exe


so...if I never had administrator privileges at my OS's...and therefore, never could install no jamming software...he got in trought the bluethooth...but he has a remote access, to define the bluethooth permissions...


...because Sean hacked the system by normal router hacking WAP, and checked the DLL library, and the libsip directory


...and finally ...
....so...1999 connection became

1989-2018 unplug

the problem now...is: if the bluethooth is normally connected to my router, than...guess?...ok...so...folllowing the permissa that this system is based on a CCTV, meaning a phone line, I should have a private anonymouse number associated to the video streaming...that would need administrator privileges escalation, inside the operador and a a firewall against spoofing on my OS, concerning exclusive the video line...which actually was the first MKIN Pentagon hack backdoor.
now that I hv two PhD's ..wow...and several graduations...including...electronics...well, the transmitter here at my roof, is turned to that antenna...which is a satellite one...which is not turned to the sky ...but turned to the receptor...somewhere on the rich area of town...to know where its tansmitting you meauste the distances pulse...
GostoMostrar mais reações
Comentar
Comentários
Elsa David JIm is not James Mc something but Sean...Ibrahim is not Ibrahim...but Shamir...
Gerir
GostoMostrar mais reações
Responder2 min
Elsa David and I'm not Elsa David ...
Gerir
GostoMostrar mais reações
Responder2 min
Elsa David life is full of mysteries...

Jim...Shamir...



HELLO WORLD. the gigantic 5000 years old hypocrits Empiry will fall.

BREAKING MATRIX #8

countdown...
Here's the introduction! After accessing a level of (SCADA type= SDN network...) you send a worm to wireless routers, why so simple? Because routers work on CW carrier, meaning that has a multipath propagation to reach the receivers, that frequencies paths might find lenghts..and so, then it complicates a little, and then they placed filters for protecting interference...and so on...but my code (!!!???) is only the most simple thing in the world...morse code! when you cross the overflow with arp attack having the same playtime of packets send and send back...you are inside...you drop "any" morse code...taking from any stupid sample...because morse code, has a specific noise carrier, that creates intersymbol interference...meaning...it will distorce the signal (any Gz)and all the subsequence symbols will be affected, reset all machines responses...in scientific terms " the spreading of the pulse beyond its allotted time interval causes it to interfere with neighboring pulses"....simple as this!
GostoMostrar mais reações
Comentar
Comentários
Elsa David no virus developer...no courses at Black Hat conferences...NSA - National Security Agency ...but SOS Morse Code

the prize,,,,is beyond your imagination

I'm thirty seconds to Mars...because i just woke up for the last day of my life. we are at 12th, and this saga started at 13rd october, the day all will be over. God's game reach very high. I hv no idea what His plan is. Thta's the mystery belonging only to the Creator. One thing I'm sure...all His decisitions were based on a simple fact..I would never get my money. And I won't! So, how far you want to risk it, depends on all of you. Or is about on someone completly hidden..I know someone is...So, I'll do stuff today, I'll try to hv a regular nobody's day, fighting the "system" ...that moment will come, and I don't absolutly know when...When I'm gonne whatever happens around this mediocre planet earth...I end up here...on a hurricane song.

Cielo e terra (duet with Dante Thomas)