Tuesday, December 31, 2019
Monday, December 30, 2019
hello world! ... end of 2019 warfare today, last working day, monday, 08.55 am! Presenting you how to connect the SPDT switch relay (double throw toggle switch turns one of two circuits on and off)..absolutly a big fuck for bombs squads from the "system" ...if they jam and shut off the rf circuit, ignitions is on again..and bum! This video shows you how to control the direction of rotation for a DC motor, using a DPDT (double pole double throw) slide switch (with center off).
Saturday, December 28, 2019
nuclear ied detonator (electronics folder)
honey bees...what you call volt multiplier, to be replaced by
GPMSURPLUS.COM
Manufacturer: General Electric (GE) Model/Part #: EG-1 Condition: New Surplus Type: Expulsion Fuse Amperage: 40E Voltage: 14,400 Notes: This item is in excellent condition. NIS-3759 JH
Manufacturer: General Electric (GE) Model/Part #: EG-1 Condition: New Surplus Type: Expulsion Fuse Amperage: 40E Voltage: 14,400 Notes: This item is in excellent condition. NIS-3759 JH
Welcome back to war, end of the last 2019 saturday , 18.50 pm...Presenting you a very specific resistor for a very special bomb
Friday, December 27, 2019
nuclear ied intel (improvise nuclear generator)
ok here we hv the CIA with the Ukranian secret service, running for a big, big promotion ;) ...so, let me simplify...the neutron generator is /heavy water (deuterium and tritium) tube, now we need some replacement , exacly with the function of an ion chamber..and this is the thing!
nuclear ied intel
Hello worldwide, welcome back to war, friday, last weekend from 2019, 10.55 am "Krytrons and sprytrons handling voltages of 2,500 V and above, currents of 100 A and above, and switching delays of under 10 microseconds are typically suitable for nuclear weapon triggers." All about cover FBI pieces of shit here, trying to caught some big promotion )nuclear intel=
Thursday, December 26, 2019
(intel folder, nuclear)
Maybe next year, i leave my bad luck behind, maybe not. But if not..I want to say a couple of things about the nuclear IED. 1st the hardest part to achieve is the neutron generator, but let me tell you that some countries did improvised the device. The 2nd is a litle detonator switch for the primary explosive, bcz, if the detonation starter is not at 7.4 micro seconds, the neutrons chain self destroys. To tell you the truth, after all this study years, neither US, Russia, China have 75% of correctness about the true nuclear detonation. Hiroshima's weight 700 kilos, and the US had only that one, since the 2 first prototypes just killed the scientists. But it would be really odd, if 700 kilos wouldn't damage nothing..for the IIWW concerns that convinced the nazis. In the 50ths lots of old movies at Nevada, with nuclear implosions, that don't say nothing about the construction. Then the russians started saying they had it..and finally chinese..etc...This issue is complex. Not only about the fissile material itself. Not only bcz, nuclear bombs hv a dead line time, bcz the enrichment is lost with the radioactive natural decay. The israeli's are always robbering vessels, bcz their arsenal gets obselet. So, Saddam actually had..the improvied "stuff" that in my opinion was exacly the same the so called super powers have. The iranians, either have some very close detonation timer switch, or they will never have nothing to blow up. Conclusion, 1st if you get ur hands on a nuclear suitcase be sure to ask how much years it has, or is probably useless, not more than 7 years. If you get ur hands on fisslie material, don't make no mistake on "improvising" the time detonation...so, next time I return with the nuclear..we will talk about that. .
Iranian National and His Company Charged in Plot Involving Export of Military Antennas from the United States (Intel Folder)
Amin Ravan, a citizen of Iran, and his Iran-based company, IC Market Iran (IMI), have been charged in an indictment unsealed today with conspiracy to defraud the United States, smuggling, and violating the Arms Export Control Act (AECA) in connection with the unlawful export of 55 military antennas from the United States to Singapore and Hong Kong.
The indictment was announced by Lisa Monaco, Assistant Attorney General for National Security; Ronald C. Machen Jr., U.S. Attorney for the District of Columbia; John Morton, Director of the Department of Homeland Security’s U.S. Immigration and Customs Enforcement (ICE); Stephanie Douglas, Executive Assistant Director of the FBI’s National Security Branch; and Eric L. Hirschhorn, Under Secretary for Industry and Security at the Commerce Department.
According to the indictment, which was returned under seal by a grand jury in the District of Columbia on Nov. 16, 2011, Ravan was based in Iran and, at various times, acted as an agent of IMI in Iran and an agent of Corezing International, Pte, Ltd, a company based in Singapore that also maintained offices in Hong Kong and China.
On Oct. 10, 2012, Ravan was arrested by authorities in Malaysia in connection with a U.S. provisional arrest warrant. The United States is seeking to extradite him from Malaysia to stand trial in the District of Columbia. If convicted of the charges against him, Ravan faces a potential 20 years in prison for the AECA violation, 10 years in prison for the smuggling charge and five years in prison for the conspiracy charge.
According to the indictment, in late 2006 and early 2007, Ravan attempted to procure for shipment to Iran export-controlled antennas made by a company in Massachusetts, through an intermediary in Iran. The antennas sought by Ravan were cavity-backed spiral antennas suitable for airborne or shipboard direction finding systems or radar warning receiver applications, as well as biconical antennas that are suitable for airborne and shipboard environments, including in several military aircraft.
After this first attempt was unsuccessful, Ravan joined with two co-conspirators at Corezing in Singapore so that Corezing would contact the Massachusetts company and obtain the antennas on behalf of Ravan for shipment to Iran. When Corezing was unable to purchase the export-controlled antennas from the Massachusetts firm, Corezing then contacted another individual in the United States who was ultimately able to obtain these items from the Massachusetts firm by slightly altering the frequency range of the antennas to avoid detection by the company’s export compliance officer.
In March 2007, Ravan and the co-conspirators at Corezing agreed on a purchase price of $86,750 for 50 cavity-backed antennas from the United States and discussed structuring payment from Ravan to his Corezing co-conspirators in a manner that would avoid transactional delays caused by the Iran embargo. Ultimately, between July and September 2007, a total of 50 cavity-backed spiral antennas and five biconical antennas were exported from the United States to Corezing in Singapore and Hong Kong.
According to the indictment, no party to these transactions -- including Ravan or IMI -- ever applied for or received a license from the State Department’s Directorate of Defense Trade Controls to export any of these antennas from the United States to Singapore or Hong Kong.
Two of Ravan’s co-conspirators, Lim Kow Seng (aka Eric Lim) and Hia Soo Gan Benson (aka Benson Hia), principals of Corezing, have been charged in a separate indictment in the District of Columbia in connection with this particular transaction involving the export of military antennas to Singapore and Hong Kong. The two Corezing principals were arrested in Singapore last year and the United States is seeking their extradition.
This investigation was jointly conducted by ICE agents in Boston and Los Angeles; FBI agents and analysts in Minneapolis; and Department of Commerce, Office of Export Enforcement agents and analysts in Chicago and Boston. Substantial assistance was provided by the U.S. Department of Defense, U.S. Customs and Border Protection, the State Department’s Directorate of Defense Trade Controls, and U.S. Department of Justice, Office of International Affairs.
The prosecution is being handled by Assistant U.S. Attorney Anthony Asuncion of the U.S. Attorney’s Office for the District of Columbia and Trial Attorney Richard S. Scott of the Counterespionage Section of the Justice Department’s National Security Division.
An indictment is merely a formal charge that a defendant has committed a violation of criminal law and is not evidence of guilt. Every defendant is presumed innocent until, and unless, proven guilty.
Tuesday, December 24, 2019
Monday, December 23, 2019
2019 years ago, so tell us History, might not been on the 24th december, but somewhere in August after the crops, and the tax payment season...a girl with not more than 20 years old, and a boy, travelled from Belem to Jerusalem, with a donkey helping the girl pregnant unconfort ...They were not for sure, much poor, since owning a donkey was a richness sign until half of the late XX century , at the end of the evening, the girl Mary gave birth, to a baby she called Jesus, that was an incovenient baby annoucmenet, since she was single, when she "made up" a story of an angel messenger of God, to get away from society merceless critizise. Jesus was raised . shaped on a form of His mother excuses, and he convince Himself he was the Messiah. There were many men, at Israel, calling themselfs the Messiah. But Jesus developed a mind and a heart of His own, convinced of His judgement of God's words, was the true one. Convinced He would make a difference, on a world so much look like ours today. Jesus had the Faith of a Heart that won't fail. He brought to His hands, the miracles, the things no one could. That was His faith. I leave you with a beautiful music, that stands up to Jesus path. And the magnetism Jesus had on His hands...either no one of us, knows we have it, either He was the only man with it. One day will growp up, beeing inteligent, and find an answer.
Sunday, December 22, 2019
Friday, December 20, 2019
Wednesday, December 18, 2019
This anti static storm protection towers are constructed with thorium 90, working the same method that polonium 210 works on small discs devices at some industries, like paper, wood, or pyrotechnics, (one of the reasons there's explosions accidents times to times, is bcz either the failure, either the industries are not obligèe of the equipment) ; 4 of these towers were stolen at North Ireland, in 2017. If not properly working, on any storm, the airport would be in danger of airplanes collision, and tower control electronic failure.
Tuesday, December 17, 2019
Monday, December 16, 2019
we are talking here about e-food, and stuff...for instance crazy motherfuckers should take this lithium...essential suplement for the brains...also about e-food..we have silica..also an electronic component..which comes from bambu ...as a curiosity, if we are starving of hunger, we can feed ourselfs from nitrouse oxide gas...it will keep us alive..(intel)
Constituent: Industrial Pure Air Grade Standard: Medical Grade Chemical Property: Inflammable Gas CAS No: 10024-97-2 General Description: Colorless, Non-Flammable, Cryogenic Liquid Un No.: Un1070
Sunday, December 15, 2019
Thursday, December 12, 2019
with love..Elsa PLENZ.COM Julius Plenz - Tunnel everything through SSH ( hack folder)
https://plenz.com/tunnel-everything.php
In this Tutorial I'll cover how you can tunnel any TCP traffic through an encrypted SSH connection or a SOCKS server, even if a certain program doesn't support proxying of connections natively.
The only requirement for SSH tunneling to work is a shell account on a machine connected to the internet (and, optionally, a HTTP Proxy server). I will refer to this account as your server (it doesn't matter if you may not become root).
The next step is to establish a tunnel from your computer to your server's Privoxy. That is done with the following SSH command:
Once you have established the connection you will want to edit your browser's proxy settings accordingly. Just set the HTTP (and, with some browsers, the HTTPS) proxy to localhost, port 8118.
On your computer, all connections to port 3333 will be forwarded over the secure SSH channel and will then be forwarded by the proxy to their destination.
Now you'll have to configure the program you want to connect through that tunnel to use localhost, port 3333 as it's SOCKS server (if you have the choice, select SOCKS version 5).
Not many programs support SOCKS proxy forwarding natively (hardly any CLI programs). But there is a workaround for that: tsocks. It enables arbitrary programs which don't support the SOCKS protocol natively to establish connections via a SOCKS server.
I won't go into detail about how this program works, but it basically does the following:
The tsocks program itself is just a simple shell wrapper script. All the actual redirecting stuff is done via the library.
Editing the
Now you'll have to edit the file
All other programs which's connections you want to tunnel through your server are prefixed with tsocks. This would look like some of the following program calls (if you wrote a shell script, use that instead of tsocks):
In this Tutorial I'll cover how you can tunnel any TCP traffic through an encrypted SSH connection or a SOCKS server, even if a certain program doesn't support proxying of connections natively.
The only requirement for SSH tunneling to work is a shell account on a machine connected to the internet (and, optionally, a HTTP Proxy server). I will refer to this account as your server (it doesn't matter if you may not become root).
Tunneling HTTP
In case you just want to tunnel HTTP traffic (to surf safely, to let the request appear to originate from a different IP and/or to not disclose HTTP clear text passwords to your LAN) best practise is to set up Privoxy on your server. By default, Privoxy binds to 127.0.0.1:8118 (thus only allowing connections from localhost), which is good for us. No configuration must be done for this.The next step is to establish a tunnel from your computer to your server's Privoxy. That is done with the following SSH command:
ssh -NL 8118:localhost:8118 user@serverThis command opens a tunnel on your computer: All connections to port 8118 will be forwarded (encrypted, of course) over the SSH connection and come out at your server's port 8118 (where Privoxy is running).
Once you have established the connection you will want to edit your browser's proxy settings accordingly. Just set the HTTP (and, with some browsers, the HTTPS) proxy to localhost, port 8118.
Advantages
The great advantage over SOCKS tunneling (see below) is, that even the DNS requests are made from your server. No-one on your LAN can gather information on what kind of site you're surfing. Another advantage is that Privoxy already filters out some advertisements and removes sensitive headers from your requests.Tunneling Arbitrary Protocols (Dynamic Forward/SOCKS)
If you want to tunnel not just HTTP traffic but arbitrary other TCP protocols as well, a HTTP Proxy isn't adequate any more. Instead, you'll have to set up a SOCKS proxy. That also is possible with SSH:Setting up the SSH proxy
Setting up the SSH SOCKS proxy is really easy. On your computer, just enter the following command:ssh -ND 3333 user@serverThat command establishes a connection to your server, logs in as user user (you'll have to enter your password though, of course) and then starts a little SOCKS proxy on your server.
On your computer, all connections to port 3333 will be forwarded over the secure SSH channel and will then be forwarded by the proxy to their destination.
Now you'll have to configure the program you want to connect through that tunnel to use localhost, port 3333 as it's SOCKS server (if you have the choice, select SOCKS version 5).
Not many programs support SOCKS proxy forwarding natively (hardly any CLI programs). But there is a workaround for that: tsocks. It enables arbitrary programs which don't support the SOCKS protocol natively to establish connections via a SOCKS server.
How tsocks works
On your computer, install the tsocks program.I won't go into detail about how this program works, but it basically does the following:
- Before the actual program is loaded tsocks loads its own shared library.
- This library overwrites the kernel's
connect()
function and replaces it with its own. - Whenever the program tries to send a request the request is forwarded through your proxy server (and then over the secure tunnel).
/usr/lib/libtsocks.so
.The tsocks program itself is just a simple shell wrapper script. All the actual redirecting stuff is done via the library.
Editing the /etc/tsocks.conf
Now you'll have to edit the file /etc/tsocks.conf
to relay all connections through your proxy. Open the file and delete all lines. Then enter just the following two lines:server = 127.0.0.1 server_port = 3333
If you may not become root ...
... just enter the two lines from above into a file called.tsocks.conf
and place it in your home directory. Then, write a little shell script:#!/bin/sh TSOCKS_CONF_FILE=$HOME/.tsocks.conf export TSOCKS_CONF_FILE exec tsocks "$@"I call this script
viaservername
. Place this script in a directory contained in your $PATH
and make it executable.Tunneling Connections
For programs who natively support proxying connections (e.g. Mozilla Firefox) you can now set the proxy address to localhost port 3333. I don't recommend to do that for browsers; instead, use HTTP tunneling (see above).All other programs which's connections you want to tunnel through your server are prefixed with tsocks. This would look like some of the following program calls (if you wrote a shell script, use that instead of tsocks):
tsocks dog http://www.google.com tsocks netcat example.com 80 tsocks irssi -c irc.freenode.net -p 6667If you call tsocks without parameters it executes a shell witht the LD_PRELOAD environment variable already set and exported. That means that every program called from this shell will be redirected through the external server and every subsehll started from this shell will also have the LD_PRELOAD variable set. So if you started tsocks directly after logging in all your traffic would be redirected through your external server.
Example
$ cat =myip #!/bin/sh lynx -dump http://tnx.nl/ip $ ssh -fND 3333 xxx@feh # -f: goes to background after prompting for password xxx@feh.name's password: $ IP=`myip`; host $IP Name: p54XXXX8B.dip.t-dialin.net Address: 84.143.XXX.XXX $ IP=`tsocks myip`; host $IP 16:15:23 libtsocks(26802): Call to connect received on completed request 3 Name: feh.name Address: 217.160.108.109Have fun!
hack robbering folder
Intended use cases
Security researchers performing red team assessments.
Capturing card values to later be cloned.
Replaying raw binary captures.*(see note below)
Fuzzing access control systems.*(see note below)...
Subscribe to:
Posts (Atom)