Wednesday, February 24, 2016

INVISIBLE TO RADAR

....to test the invisibility idea by making sheets of the material. Each sheet consists of arrays of tiny copper cubes—individually about 4 millimeters on each side—all connected together by thin, square-shaped copper rods. The copper array was sandwiched between two polysulfone covers that act as a dielectric material coating, creating a solid slab of material. Each slab was about the size of a sheet of paper.

shield of spaceship :
http://www.alibaba.com/product-detail/100-Virgin-PSU-Sheet-with-Good_1949417545.html?spm=a2700.7724838.38.1.BCgVIe

Tuesday, February 23, 2016

How to Deploy a Keylogger from a USB Flash Drive Quickly

This guide will explain how to configure a USB Flash Drive / Memory Stick so that you can run a keylogger within just a few seconds of plugging it in any computer.
It is important to note that in some countries, including the U.S., covertly intercepting electronic information is against the law. This guide is therefore intended to instruct you on how to use a keylogger on your own computer.

Step 1: You Will Need...

For this guide you will need a few things first:
  • A cheap memory stick / USB flash drive (any capacity)
  • Shadow Keylogger (free) which you can download free from here
  • The computer you want to record (i.e, your own)

Step 2: A Few More Things Before We Start...

You will also need to ensure that the computer you want to record:
  • Is running some version of Windows (this will not work on Mac or Linux)
  • Has the .NET Framework 2.0 or later (almost all do, but if not you candownload free from here)

Step 3: Download Shadow Keylogger

We will need to set things up on the USB Flash Drive first, so on anothercomputer, plug in your Flash Drive and open it through 'My Computer' or it may pop up a small window automatically. Leave this window open.
Now, download the keylogger from this link. This will download a .ZIP folder, which you will need to open. Inside the folder there will be a file called 'sk.exe', this is the keylogger program.
Click on the program and drag it across into your USB Flash Drive. Once it has been copied, you can close the .ZIP folder.

Step 4: Create an Automatic Setup File

Although the program will run fine at the moment, when you open Shadow Keylogger, you will have to create a password in order to start recording. However, this will take a little bit of time, which you may not have. So Shadow Keylogger has a clever feature where you can tell it to run automatically with a few pre-defined settings. For a full guide on how to create one of these files, you can watch our YouTube video.
In this guide, I will show you how you can configure it to start recording automatically. Open Notepad, or any other half-decent text editor, thencopy this block of XML and paste it into your document:


password123
1
Automatic

1
0


0


I have highlighted the password bit above, since this is where you enter your own password. You will need to remember the password you chose, because after you have finished recording, you need to type it on the keyboard to see all of the recorded keystrokes.
For this guide, you don't need to change any of the other values.
Lastly, click 'Save As' and navigate to the USB Flash Drive and make sure it is in exactly the same folder as the program (sk.exe). Save the file as'config.xml' (without the quotation marks) and make sure the dropdown menu is changed to 'All Files', and not 'Text files'. Then hit 'Save'!

Step 5: Now Try It!

You're done! Now, just pull the USB Flash Drive out of your computer. Approach the target computer, plug the USB Flash Drive in any available port.
On some computers, it may open the drive folder automatically, on others it may have a small prompt box, where you need to click on the 'Open Files and Folders' option. In a handful of cases, you may even need to open 'My Computer'.
When the drive folder opens, just double-click on the 'sk.exe', or click it and hit enter.
Shadow Keylogger will open immediately, realise you've already given it a password, and just start recording automatically.
You can then immediately pull out your USB Flash Drive from the computer. The folder will close automatically, and you can walk away.
Return later (for this particular setup, it has to be before the user shuts the computer down) and simply type your password onto the keyboard, it doesn't matter where.
The results window will then appear with all of the recorded keystrokes.

http://cons.wonderhowto.com/how-to/deploy-keylogger-from-usb-flash-drive-quickly-0140972/

Good evening! Nice hour to work !!! Please ATTENTION



The Door 
1. Combination dial (0-99) 
2. Keyed lock 
3. Seismic sensor (built-in) 
4. Locked steel grate
5. Magnetic sensor
6. External security camera
The Vault
7. Keypad for disarming sensors
8. Light sensor
9. Internal security camera
10. Heat/motion sensor (approximate location)


 Approached it slowly from behind a large, homemade polyester shield. The low thermal conductivity of the polyester blocked his body heat from reaching the sensor (...) placed the shield directly in front of the detector, preventing it from sensing anything.

covered the security cameras with black plastic bags and flipped on the lights




used this custom-made slab of aluminum to reposition the magnetic field away from the vault door.


women's hair spray to temporarily disable the vault's combined heat/motion sensor.
(body... projecting heat into the vault—the hair spray on the infrared sensor won't last)

bypassed the vault security system's main inbound and outbound wires and then covered this light sensor with tape, rendering it useless



used a tool to strip the plastic coating off the wires. (...) One slip could cut through, instantly breaking the circuit and tripping the alarm.

Once the copper wires were exposed,,,, clipped a new, precut piece of wire between the inbound and outbound cables. This bridge rerouted the incoming electric pulse over to the outbound wire before the signal reached the sensors

 blinded the heat/motion detector with a Styrofoam box, covered the light detector with tape

unloaded a homemade, hand-cranked drill and fitted it with a thin shaft of metal. ...jammed the shaft into one of the locks and cranked for about three minutes—until the lock broke, snapping open the box.

ATTENTION turned off the lights—DO NOT want to trigger the light detector in the vault when the door opened....turned the key and spun a four-pronged handle


safe manufacturers ... that their precious key could be copied ???????????????
NOW guys!!!!!! the vault combination !!!!! FORGET IT!!!! use very hot water (HOT HOT BURNING)  to fuck the lock!!!!

Sunday, February 21, 2016

Anonymizing your attacks with Tor and Proxychains Are you using some anomyzer?

think you could split your network and lets say half that packet goes through china and the other half goes through Finland and then come together again as the same packet.
What you could do is have the network traffic go from US to China to Finland to destination. The traffic itself would be encrypted and would only become unencrypted once it reaches the destination.
Maybe not even split the packet, just split groups of packets.


If you use a proxy that is not on port 80 or 443, it may work



http://www.behindthefirewalls.com/2013/06/anonymizing-your-attacks-with-tor-and.html

roxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project

https://github.com/rofl0r/proxychains-ng
Achieve a 100% Vapor Barrier with polyethylene coated radiant barrier from Ecofoil. ... later as a top secret material for insulating military radar used in airplanes....

http://www.ecofoil.com/Applications/Polyethylene-Vapor-Barrier
  so its like reaching 15 miles nautics from shore and then the drone does the rest

PETN Synthesis

HOW TO MAKE C4

INGREDIENTS:

12 oz. spackling putty or 20 packs of Silly Putty

1 container Petroleum Jelly (Vasaline)

Candle Wax

12 Oz. Isopropol (rubbing) alcohol

A heat source (hot plate, stove, etc.)

A hydrometer or battery hydrometer

A large Pyrex, or enameled steel container

6 inch length of polyester yarn

Flour or Corn Starch

24 Oz. cooking oil (Canola Oil works best)

1 package wire pipe cleaners

2 packages (2.8 Oz) clear gelatin

Place four cups of tap water in your Pyrex container, and begin heating it until it boils. Add the gelatin, and mix thoroughly. Remove from heat, and allow it to cool completely, then add 4 Oz. of cooking oil, and stir. You should notice a thin layer of solids beginning to form near the top. Scrape off the solids, and place them in a small container. Place them in the freezer.

Next, light your candle, allowing the melted wax to accumulate. In your bowl, mix the petroleum jelly, cooking oil, putty, and corn starch until well blended. Test the mixture with the hydrometer. You should get a reading of 17. If you do not get this reading, keep mixing.

Now remove the chilled mixture from the freezer. BE CAREFUL. The mixture is highly unstable at this point. Add it to the compound in the bowl - the blend should have the consistency of ice cream. Stir in the mixture VERY CAREFULLY.

Now, take approximately 1/3 of your compound, and form it into a ball shape. Often you will see C4 molded into a square, but a sphere-type charge guarantees the highest detonation velocity. You should mold the shape to a density of 1.3 grams in a cube. Dip the ball into the candle wax to seal the compound from moisture. Form a second ball, slightly smaller than the first, and also dip it into the wax. Stack this ball on top of the first. Finally, make a third ball, smaller than the first two, and stack it on top. This three-tiered formation will cause a cascading detonation effect that is absolutely devastating.



You will need your pipe cleaners now. You will insert them into each side of the middle ball - this is where your detonator will attach to the device. There will be three hookups for each side, so you must twist together three pipe cleaners so that they branch out (see Illustration).



Insert the pipe cleaners on opposite sides of the 3-tiered shape. Next you will need your yarn. Tie the yarn around the compound, at the joint between the top second and third sections. Tie it loosely, and let the remaining yarn hang down in front of the charge. This will form a secondary fuse, should it become necessary.

Now, to mark your bomb. This is extremely important. You will need to identify your device according to the internatinal munitions protocol. The first marking will be two black dots near the top of the charge, on the top sphere (use a fine-point black magic marker for this). These dots should be horizontal, about one inch apart. This signifies that it is a class 2 explosive (meaning it’s homemade). Below these dots, place a single third dot. This means it is a class 1 hazardous material (meaning the most dangerous). Then, below this formation line up five dots close together - that will indicate that this is Composition 4. REMEMBER: IT IS ILLEGAL TO MAKE YOUR OWN EXPLOSIVES IF YOU DO NOT MARK THEM PROPERLY.

The finished product is below. As I stated before, it is dangerous to store this material in a closed area. The ideal storage medium is out in the open, preferably on a coffee table, where you can keep a close eye on it. You will probably want to leave it there during the winter and holiday months, but it is wise to dispose of it during spring and summer, when the chemicals become the most volatile. 

Friday, February 19, 2016

 Agent Staining is a technique that
involves writing a unique marker (or stain)
onto a target machine. Each stain is
visible in passively collected SIGINT
and is stamped into every packet, which
enables all the events from that stained
machine to be brought back together to
recreate a browsing session.”
  
http://cryptome.org/2013/10/gchq-mullenize.pdf
  
http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
  
¤ Packet Staining ::
  
http://prezi.com/p5et9yawg2c6/ip-packet-staining/
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
http://cryptome.org/2013/10/packet-stain/packet-staining.htm
  
¤ NSA Peeling Back the Layers of Tor ::
  
http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
  
¤ NSA ; Tor Source Code Vulnerabilities ::
  
 “We have seen several targets using Tor.
Our goal was to analyze Tor source code
and determine any vulnerabilities in
the system. We set up an internal Tor
network to analyze Tor traffic, in the
hopes of discovering ways to passively
identify it. We also worked to create
a custom Tor client which allows the
user finer control.” ... ...
  
 “This accomplishes several things.
Most basically, the Tor servers, many
of which are listed on publicly advertised
directory servers, are chosen to act as
a series of proxies. This may seem to
be excessively complex, as a single
proxy server can be used to hide one’s
location, but a single-hop proxy is
vulnerable in two ways. First, by
analyzing the pattern of the traffic
going to and from the proxy server,
it is possible to deduce which clients
are making which requests. Second, if
an attacker owns the proxy server, then
it certainly knows who is asking for what,
and anonymization is ruined. By using
multiple hops, Tor is much more resistant
to both of these attacks. Traffic analysis
becomes extraordinarily difficult, as it
must be coordinated across several machines,
and an attacker must own all the hops
along the circuit in order to trace
requests back to the originating client.”
  
... ...
  
 “In our time in the lab, we found that
running an nmap on a node that is offering
a hidden service will turn up the port
that the hidden service is using to deal
with incoming connections. It can then be
directly connected to, outside of Tor.”
  
... ...
  
 “We would have to try to connect to
each of the ports we see open on a
machine to determine if there is a
hidden service being run. We would not
even know which protocol the hidden
service is running. It may be an HTTP
server, an FTP server, an SMTP server,
etc. The only thing we know is that
the protocol must run over TCP. It is
not enough to attempt to connect once
to each port, using an HTTP GET request.
Several protocols must be tried.”
  
... ...
  
 “It may also be useful to study Tor
directory servers in more detail. Our
work focused solely on the client, but
many attacks would be much easier with
access to more Tor servers. The directory
servers ultimately control which Tor
servers are used by clients. We have found
that a server can put itself on a directory
server multiple times; all it takes is the
server running several Tor processes, each
having a different nickname, open port,
fingerprint, and LOG FILE. This only
requires different configuration files
for the different processes, which are
easy to set up. That machine will handle
a disproportionate amount of traffic,
since it is listed several times. This
increases the density of friendly servers
in the cloud without increasing the number
of servers we have set up. Unfortunately,
each listing has the same IP address,
which would be very noticeable to anyone
who inspecting the directories.”
  
http://cryptome.org/2013/10/nsa-tor.pdf
http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
  
¤ NSA ; Types of IAT ::
  
http://cryptome.org/2013/10/nsa-iat-tor.pdf
  
¤ NSA Link Removed by Guardian ::
  
http://cryptome.org/2013/10/nsa-link-removed.htm
  


The classified files – provided previously by NSA
whistleblower Edward Snowden – contain new details
about groundbreaking surveillance technology the
agency has developed to infect potentially millions
of computers worldwide with malware “implants.” The
clandestine initiative enables the NSA to break into
targeted computers and to siphon out data from foreign
Internet and phone networks.
  
https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf

NSA TURBINE Automated Hacking Documents (Mirrored) ::
  
http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
http://cryptome.org/2014/03/nsa-industry-exploit.pdf
http://cryptome.org/2014/03/nsa-converged.pdf
http://cryptome.org/2014/03/nsa-quantum-insert.pdf
http://cryptome.org/2014/03/nsa-thousands-implants.pdf
http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
http://cryptome.org/2014/03/nsa-hammerchant.pdf
http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm

NSA Hacking Routers & Social Media (Misc) ::
  
http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
http://cryptome.org/2014/03/nsa-selector.pdf

GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
  
http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
  
http://cryptome.org/2013/11/gchq-royal-concierge.jpg
  
¤ GCHQ Monitors Diplomats Hotel Bookings ::
  
 Britain’s GCHQ intelligence service monitors
diplomats’ travels using a sophisticated
automated system that tracks hotel bookings.
Once a room has been identified, it opens
the door to a variety of spying options.
So the non radioactive detected constainer is made of :
Lead container with 5.7% antimony;
Paraffin wax charged with 23% barium chromate;
— Polyurethane foam;
— Borosilicate glass


on cargo : air condicioners mislead the gamma detectors