Thursday, May 31, 2018

North Korea ..cynicals...and who gives a shit?

welcome back to war! LOL...Intel! check it out ...UN sanctions against NK, banned Green Pine Associated Corporation. Looks very chinese, even if the "panel" knows its not...its UK and North Ireland, selling pressure switches for long range missiles  Then, we go on, and find this fellow Kevin Leech...which has a very convenient fake passport Kenneth Leech, with lots and lots of cash at the Virgin Islands Funds; But his name starts on the NK mining industry, and not on the switches and steal cutters. However, Leech works with a shell company called Pacific Century, based on who cares? ...which..actually is also known as to be the same as, the Hong Kong Telecom , PCCW .Which of course , have friends at the british , CK Hutchison Holdings Ltd...which....oh well....who f* cares about NK nuclear program? the very polite educated politicians ??? ...oh yes, indeed...polite, educated, and ...cynical

welcome back to war Jihad! Do you want a deadly spread virus, easy to get, that hurts ? :) Seoul Virus....exist in black rats! You can isolate the virus,,, piece of cake on your improvised labs, even I could use this kit and follow the instructions...this virus, cause hemorogic fever...kills in 15 days of incubation...can be spread, even by breeding!


Good morning! welcome back to war" thursday, 8.45 am! Let me tell you something! x ray detectors, and imaging scanners, detect critical mass on a proportion 10 cm mass for 1 meter range. This means this gun CAN be totally undetectable...if you cut 2 cm of the barrel. and ONLY this way
https://www.youtube.com/watch?v=i0XSScbS-HA
(Sponsored) North American Arms introduces their newest…
YOUTUBE.COM

Wednesday, May 30, 2018

shaped charge ied for girls

welcome back to war! I'm looking for some one who can get the hands on this missile part cone, which has high enriched uranium. Its only what's need.
GostoMostrar mais reações
Comentar
Comentários
Elsa David Viktor Bout ...give the "buyer" one phone tapped...only this phone for communications. 1. delete all conversations 2 block spyware for police recording
Gerir
Responder55 min
Elsa David make the business, inside a supermaket, with a supermaket bag

Tuesday, May 29, 2018

Operation OPEC - Terroranschlag in Wien

SYND 21 12 75: TERRORIST ATTACK ON OPEC MEETING IN VIENNA


Let me say something to you, all Muhamads ...Chacal was the "one"...killing hundreds of joseph nobodies, and what you get, is that, they stay even more pretty in the picture, putting flowers at the funerals. You, over there, in little Loures city, justify the maids existence...without you...no "jobs for the boys" you want to go to paradise, go ahead...you did nothing! Chacal was the "one" . The moment he blow up the ass of the CIA director, he placed all world maids after him! He has the Game! And he was only caught, because the russians gave him away! Either you become Che, and take control of political systems in countries, and then you hunt to kill, either you're Chacal...because being Allah lovers, is a club it doesn't scare them. By the way...the other day, that hundreds of joseph nobodies ass killing at Paris, at 3 different spots...what about the bomb exploding inside a little restaurant...the press maids don't talk about? That! Their balls blowing up! Hurts the "system"! So..."Help me God"


this is not difficult level, and Cobalt is using this effective payload (after connecting to their server...) to fuck the "system" in a way they never have been fucked " Hijack allows you to connect to any ruby process and execute code as if it were a normal irb session. Hijack does not require your target process to require any hijacking code, hijack is able to connect to any ruby process. It achieves this by using gdb to inject a payload into the process which starts up a DRb server, hijack then detaches gdb and reconnects via DRb."


Using Hijack

$ hijack 16451
=> Hijacked 16451 (my_script.rb) (ruby 1.8.7 [i686-darwin9])
>>

Using ruby-debug

Hijack can be used to start ruby-debug in your target process, for example:
$ hijack 61378
=> Hijacked 61378 (/opt/local/bin/thin) (ruby 1.8.7 [i686-darwin9])
>> hijack_debug_mode
=> true
We've enabled debug mode, but we still need to insert a breakpoint:
>> ActionController::Dispatcher.class_eval do
>>   class << self
>>     def dispatch_with_debugger(cgi, session_options, output)
>>       debugger
>>       dispatch_without_debugger(cgi, session_options, output)
>>     end
>>     alias_method :dispatch_without_debugger, :dispatch
>>     alias_method :dispatch, :dispatch_with_debugger
>>   end
>> end
Now tell hijack that we can start debugging:
>> hijack_debug_start
Connected.
Point your browser at 0.0.0.0:3000 to trigger the breakpoint and ruby-debug's console will appear:
>> hijack_debug_start
Connected.
(eval):5
(rdb:4) step
/Users/ian/Projects/zioko/vendor/rails/actionpack/lib/action_controller/dispatcher.rb:28 new(output).dispatch_cgi(cgi, session_options)
(rdb:4) backtrace
--> #0 /Users/ian/Projects/zioko/vendor/rails/actionpack/lib/action_controller/dispatcher.rb:28 in 'dispatch_without_debugger'
    #1 (eval):5 in 'dispatch'
    #2 /opt/local/lib/ruby/gems/1.8/gems/thin-1.2.2/lib/rack/adapter/rails.rb:81 in 'call'
    #3 /opt/local/lib/ruby/gems/1.8/gems/thin-1.2.2/lib/rack/adapter/rails.rb:69 in 'call'
    #4 /opt/local/lib/ruby/gems/1.8/gems/thin-1.2.2/lib/thin/connection.rb:76 in 'pre_process'
    #5 /opt/local/lib/ruby/gems/1.8/gems/thin-1.2.2/lib/thin/connection.rb:74 in 'pre_process'
    #6 /opt/local/lib/ruby/gems/1.8/gems/thin-1.2.2/lib/thin/connection.rb:57 in 'process'
    #7 /opt/local/lib/ruby/gems/1.8/gems/thin-1.2.2/lib/thin/connection.rb:42 in 'receive_data'
(rdb:4)
One caveat is that ruby-debug's 'irb' command will not work because the debug connection is remote, you also can't use hijack's irb console whilst debugging. A future version of hijack will hopefully allow you to switch between the two.

Monkey Patching

Just as in a normal irb session, you can redefine the code running in your target process.
This example redefines ActionController's dispatcher to print basic request activity (the example can be found in examples/rails_dispatcher.rb).
Start up a Thin web server:
$ thin start
>> Using rails adapter
>> Thin web server (v1.2.2 codename I Find Your Lack of Sauce Disturbing)
>> Maximum connections set to 1024
>> Listening on 0.0.0.0:3000, CTRL+C to stop
In another console hijack the Thin process:
$ ps | grep thin
61160 ttys001    0:01.43 /opt/local/bin/ruby /opt/local/bin/thin start

$ hijack 61160
=> Hijacked 61160 (/opt/local/bin/thin) (ruby 1.8.7 [i686-darwin9])
>> ActionController::Dispatcher.class_eval do
?>   class << self
>>     def dispatch_with_spying(cgi, session_options, output)
>>       env = cgi.__send__(:env_table)
>>       puts "#{Time.now.strftime('%Y/%m/%d %H:%M:%S')} - #{env['REMOTE_ADDR']} - #{env['REQUEST_URI']}"
>>       dispatch_without_spying(cgi, session_options, output)
>>     end
>>     alias_method :dispatch_without_spying, :dispatch
>>     alias_method :dispatch, :dispatch_with_spying
>>   end
>> end
Point your browser to 0.0.0.0:3000.
Back in hijack you'll see your browsing activity:
2009/08/22 14:24:48 - 127.0.0.1 - /
2009/08/22 14:24:53 - 127.0.0.1 - /login
2009/08/22 14:24:54 - 127.0.0.1 - /signup
Instead of pasting your code into hijack, you can pass hijack the -e option execute a local file on the target process.

Process Output

By default hijack will forward your process output to the hijack client. This can get a little messy if your trying to write code at the same time as the target process writes to STDOUT/STDERR. You can mute and unmute the process with:
>> hijack_mute
=> true
>> hijack_unmute
=> true
For ease of use, hijack helper methods are discoverable with tab completion. hi will give you a list of available helpers.

Process Mirroring

DRb cannot dump objects to the hijack client for types that are not loaded in the client process. E.g if the remote process had required ActiveRecord and you tried to dump ActiveRecord::Base back to the client, DRb would instead return a DRb::Unknown object as ActiveRecord isn't loaded in the hijack client.
To work around this, when hijack connects to a remote process it will inspect all the files required by the process and also attempt to require them itself. This may not work for all object types however so you may still get a warning when an object cannot be dumped.

SECHIN-BOUT-CIA

Buenas! Intel! welcome back to war! Sechin is out of the league of Bout . What to the CIA motherfuckers want, fuck the man behind saving Russia, from economic collapse of sanctions. They were highly fucked for redrawing from Ukraine, now they want revenge. Sechin just sold Rosfneft in Qatar (bigger oil producer competitor of Saudi Arabia) by using Glencore company there, which their equities are not subject of sanctions. This deal, covers the russian national debt. What's the trap for fucking Sechin, that fucks the americans? Is that Sechin is using Intesa Sanpaolo bank, which just "said" it would back the business loan...biggest italian bank (EU babes) with a very hight probabilty of total bankrupcy, (total insolvence) that ...would be bad news for the american friends around here. So, the fucks need the business deal, to save the banker italian whoores, and a big EU disaster. Not referring that Sechin has a great game, and he's using Mercury as cover to buy US pipe lines...another story...So, what kind of "exchange" information do the fuckers want from you Bout? Something that could swipe Rosfneft out of the map...that would be mean, fucking Russia for the next decade...and occupying Ukraine....if however the Chinese weren't funding Gazprom...that's another fuck...So, does Sechin is envolved on financing Likud at Israel? Bout...just say he is.  because...actually, he is.

Sunday, May 27, 2018

And finally, sunday, 13.00 pm! pigs lunch hour! the Improvised Micro Nuclear Bomb!
as we want to build this micro nuclear at the garage...we will improvise, paying attention to the power voltage and radio frequency is needed for the ions acceleration...
welcome back to war! at the end of the afternoon I'll have the micro nuclear builded! So, this is their new concept of neutron generator (the most important aspect for a nuclear device construction...everything else, is bullshit) , they call it scallation neutron generator, and all this little device produces is an electron-ion collider. " this single return loop is constructed from permanent Halbach magnets (an arrangement of permanent magnets that augments the magnetic field on the beam side while cancelling the field on the outside"

Saturday, May 26, 2018

...back to war! scheme 3

the connection between our wave signal generator and the tweeter, its simpler than this tutorial, however let's see it, so we have an idea of the (acoustic weapon) that will amplify the sound to ultrasonic, from the laser (frequency) and initiate the nuclear fusion

as we are trying to build the bomb at the garage...I found this wave signal generator...that then, after coupled with the dpss laser...will hit the target, initiating the nuclear fusion... it seems to be, right now, that the initiator its an audio speaker..
Frequency: 1Hz - 1MHz. Flatness: 0.05dB 1Hz - 100kHz. Waveforms: Square, Sine & Triangle. SINE WAVE. 1 set Function Signal Generator DIY Kit. TRIANGLE WAVE.…
EBAY.COM

welcome back to war! First thing to build the micro nuclear bomb at the garage, is to find the right laser pressure...which is DPSS laser 

Friday, May 25, 2018

draw number 2
Ok, everybody, 1st schematic of the micro bomb

Good morning, everybody...welcome back to war! Like I promissed you, I'm attempting to "draw" the micro nuclear bomb...(You just can not just google it, ok  ) so...before the drawings, just a quick explanation 1 . the bombs consists on a very small ammount of HEU (or another type of non radioactive explosive) 2. the bomb consists on a nucleous, where a laser pressure the ions on a plasma (rf resonator) , when the beam reaches the core, the HEU is covered with magnetic elastometer, and it begins the neutron fusion. I'm starting by posting this link, so this particularity laser, plasma, not only produces more than 3Kw, as well it runs on 5G frequencies, and one of its components is nitrogen gas.
Pulsed Technologies proudly presents the new plasma systems capable of running frequencies over 500,000 Hz, PURE PLASMA, unlike other manufacturers there are NO RF (Radio Frequency), NO modulation…
PULSEDTECH.COM

Thursday, May 24, 2018

Black Mask

robbering bmw's

back to war! robbering BMW...even a girl can do it!
If your engine do not start because of Key chip, EWS module, EWS issue or even got your software down, we can help you to get Ecu back to work. After changing your…
EBAY.COM

redirect all traffic...and maybe steal credentials

welcome back to war! So, we want to redirect all traffic...and maybe steal credentials ..."I want to convert the json data to java object automatically.."
class Foo {
private String str;
private Bar bar;
getter/setter
}
class Bar {
private String ss;
getter/setter
}
...which makes change on server side, just create a constructor for Bar, like
public Bar(String ss) {
this.ss = ss
}

..starting warfare...the attack today is....hacking diplomatic call signs permission for flights, and smuggle guns under diplomatic undercover....so, we have to hack satellite internet based communications...like epic turla group does...first thing we need is to hide our ass

I would like hosts located on the internal network to resolve "host1.example.com", "host2.example.com" and "example.com" to internal IP addresses instead of that of the gateway. 

EDIT: Let's do this properly then. I will document what I've done based on the tutorial linked above.
My OS is Raspbian 4.4 for Raspberry Pi, but the technique should work without any changes on Debian and Ubuntu, or with minimal changes on other platforms.
Go to where your Bind config files are kept on your system - here it's in /etc/bind. Create in there a file called db.rpz with the following contents:
$TTL 60
@            IN    SOA  localhost. root.localhost.  (
                          2015112501   ; serial
                          1h           ; refresh
                          30m          ; retry
                          1w           ; expiry
                          30m)         ; minimum
                   IN     NS    localhost.

localhost       A   127.0.0.1

www.some-website.com    A        127.0.0.1

www.other-website.com   CNAME    fake-hostname.com.
What does it do?
  • it overrides the IP address for www.some-website.com with the fake address 127.0.0.1, effectively sending all traffic for that site to the loopback address
  • it sends traffic for www.other-website.com to another site called fake-hostname.com
Anything that could go in a Bind zone file you can use here.
To activate these changes there are a few more steps:
Edit named.conf.local and add this section:
zone "rpz" {
  type master;
  file "/etc/bind/db.rpz";
};
The tutorial linked above tells you to add more stuff to zone "rpz" { } but that's not necessary in simple setups - what I've shown here is the minimum to make it work on your local resolver.
Edit named.conf.options and somewhere in the options { } section add the response-policyoption:
options {
  // bunch
  // of
  // stuff
  // please
  // ignore

  response-policy { zone "rpz"; };
}
Now restart Bind:
service bind9 restart
That's it. The nameserver should begin overriding those records now.
If you need to make changes, just edit db.rpz, then restart Bind again.
Bonus: if you want to log DNS queries to syslog, so you can keep an eye on the proceedings, edit named.conf.local and make sure there's a logging section that includes these statements:
logging {
    // stuff
    // already
    // there

    channel my_syslog {
        syslog daemon;
        severity info;
    };
    category queries { my_syslog; };
};
Restart Bind again and that's it.
I've used this technique with great success to override the CNAME for a website I was working on, sending it to a new AWS load balancer that I was just testing. A Raspberry Pi was used to run Bind, and the RPi was also configured to function as a WiFi router - so by connecting devices to the SSID running on the RPi I would get the DNS overrides I needed for testing.

    Satellite hacking Intel 1 (BACK@WAR CyberArmy friends let´s start Satellite GPS navigation hack IT WILL HV A PRICE)

      https://stackoverflow.com/questions/63010812/how-to-access-http-port-5001-from-public-internet