Skip to content

Commit

Permalink
add more blog layout
Browse files Browse the repository at this point in the history
  • Loading branch information
opsecfail committed Apr 16, 2024
1 parent 9fade0f commit fc31963
Show file tree
Hide file tree
Showing 5 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion storage/blogs/adrianlamo.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
"nickname": "ADRIAN LAMO",
"poster": "bugzorc",
"osf": [ "D", "CC", "ACC", "PO", "Y"],
"blog": "Adrian Lamo, the homeless hacker. His journey into the world of hacking began at a young age, with an exceptional aptitude and curiosity for hacking into computer systems. His nickname, \"homeless hacker\", came from him not have a permanent address had a nomadic lifestyle and he did hate that name. More about him in the links below, we gonna go directly to his OSF. Unlike many hackers, he hacked out off curiosity and not for financial gain.<br>Lamo's OSF was basically arrogance and carelessness despite his technical skip for infiltrating high-profile targets. He had a habit of leaving logs of his hacking activities on compromised systems. Some of them were intentional an example is when he hacked into New York Times, He addead an entry: Adrain Lmao to the Times db, his cell number as 415 505-HACK and declared his areas of exepretise as computer hacking, national security, communications intelligence. He also boasty a lot online.<br>We might say Adrian tried to do bugbounty without permission, some companies were happy others weren't, he did receive alaot of h on the hacker space when he snitched on Manning, this basically followed him his whole life, but I think all Manning wanted is attention. You can check more of his story on the links below. By the way he did commit suicide, peace out.",
"blog": "Adrian Lamo, the homeless hacker. His journey into the world of hacking began at a young age, with an exceptional aptitude and curiosity for hacking into computer systems. His nickname, \"homeless hacker\", came from him not have a permanent address had a nomadic lifestyle and he did hate that name. More about him in the links below, we gonna go directly to his OSF. Unlike many hackers, he hacked out off curiosity and not for financial gain.<br><br>Lamo's OSF was basically arrogance and carelessness despite his technical skip for infiltrating high-profile targets. He had a habit of leaving logs of his hacking activities on compromised systems. Some of them were intentional an example is when he hacked into New York Times, He addead an entry: Adrain Lmao to the Times db, his cell number as 415 505-HACK and declared his areas of exepretise as computer hacking, national security, communications intelligence. He also boasty a lot online.<br><br>We might say Adrian tried to do bugbounty without permission, some companies were happy others weren't, he did receive alaot of h on the hacker space when he snitched on Manning, this basically followed him his whole life, but I think all Manning wanted is attention. You can check more of his story on the links below. By the way he did commit suicide, peace out.",
"links": ["https://www.youtube.com/watch?v=K-FOjZ4JTyM"]
}
2 changes: 1 addition & 1 deletion storage/blogs/alpha02.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
"nickname": "ALPHA02",
"poster": "tarballers",
"osf": ["PO", "ACC", "Y", "CC"],
"blog": "Ah, the cat and mouse game of cybercrime , where one wrong turn equals to a glowie's promotion. It's like a high-stakes poker game, but instead of chips, you're playing with your digital identity and freedom. It's better to be homeless, but still see the sun at your own wish.<br>Now, let's talk about our man of the blog, Cazes, aka Alpha02. If you're not familiar with him, don't worry, I have got you covered with some links to dive into his cybercri career. But here's a pro tip for all you aspiring cybercriminals out there: if you're gonna play in the digital underworld, make sure you've got your OPSEC game on point from day one. Another tip, have a non-unique username eg: mickeymouse but it all depends, pompompurin did get caught.<br>Now, Cazes had a little slip-up in his OPSEC game back in the early days of AlphaBay. Using his personal email, pimp_alex_91@hotmail.com for welcome messages and password resets? That's like wearing a neon sign that says, \"Come arrest me!\" And to top it off, gmails, hotmail and many more, those are glowie emails, a warrant that's it, and to top it again, it was connected to his LinkedIn profile, and to top it off again again, never mind. Blending his real-world identity with his cybercri alias? Talk about a rookie mistake.<br>And let's not forget about the lack of encryption on his laptop. Come on, folks, treat every unencrypted minute like an episode of FBI, OPEN UP, because you never know when they'll come knocking. And using that same laptop for both work and cybercrime? That's like using a Swiss cheese condom—full of holes and bound to end in disaster. It all made easy for the feds to seizure his assets, crypto basically even a homeless man was richer, also his wife's assets did get seized.<br>By the way, remember, this technique of feds while conducting arrest tend to distract you in order to find you logged in ur cybercrime meta verse, is now boring to me, invest in some killer OPSEC and maybe a USB with a self-destruct feature, just in case things go south or don't jump off your computer no matter what. I recommend if conducting your work public, sit where your back is right infront of a wall, so you don't have to worry who is behind you. Oh, Alpha02 did commit suicide, peace out, not him, it's you, the reader.",
"blog": "Ah, the cat and mouse game of cybercrime , where one wrong turn equals to a glowie's promotion. It's like a high-stakes poker game, but instead of chips, you're playing with your digital identity and freedom. It's better to be homeless, but still see the sun at your own wish.<br><br>Now, let's talk about our man of the blog, Cazes, aka Alpha02. If you're not familiar with him, don't worry, I have got you covered with some links to dive into his cybercri career. But here's a pro tip for all you aspiring cybercriminals out there: if you're gonna play in the digital underworld, make sure you've got your OPSEC game on point from day one. Another tip, have a non-unique username eg: mickeymouse but it all depends, pompompurin did get caught.<br><br>Now, Cazes had a little slip-up in his OPSEC game back in the early days of AlphaBay. Using his personal email, pimp_alex_91@hotmail.com for welcome messages and password resets? That's like wearing a neon sign that says, \"Come arrest me!\" And to top it off, gmails, hotmail and many more, those are glowie emails, a warrant that's it, and to top it again, it was connected to his LinkedIn profile, and to top it off again again, never mind. Blending his real-world identity with his cybercri alias? Talk about a rookie mistake.<br><br>And let's not forget about the lack of encryption on his laptop. Come on, folks, treat every unencrypted minute like an episode of FBI, OPEN UP, because you never know when they'll come knocking. And using that same laptop for both work and cybercrime? That's like using a Swiss cheese condom—full of holes and bound to end in disaster. It all made easy for the feds to seizure his assets, crypto basically even a homeless man was richer, also his wife's assets did get seized.<br><br>By the way, remember, this technique of feds while conducting arrest tend to distract you in order to find you logged in ur cybercrime meta verse, is now boring to me, invest in some killer OPSEC and maybe a USB with a self-destruct feature, just in case things go south or don't jump off your computer no matter what. I recommend if conducting your work public, sit where your back is right infront of a wall, so you don't have to worry who is behind you. Oh, Alpha02 did commit suicide, peace out, not him, it's you, the reader.",
"links": ["https://youtu.be/VLF7WCbLw28?si=2ZbnEQAHiLTIUN7w","https://en.wikipedia.org/wiki/Operation_Bayonet_(darknet)"]
}
2 changes: 1 addition & 1 deletion storage/blogs/d3f4ult.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
"nickname": "D3F4ULT",
"poster": "bugzorc",
"osf": ["Y"],
"blog": "Meet d4f3ult, a teenage with a relish for stirring up chaos and shedding light on the shadows of the government's misdeeds. By the way, his father works in government. D3f4ult's journey into the realms of hacking and activism.<br>Formerly a member of AnonSec, an anti-anonymous group, d3f4ult made waves by penetrating into websites, erasing records of indebted students from university databases and exposing the dark underbelly of Denmark's bestiality scandal. Some call him a tech Robin Hood, other a digital vigilante(probably the gov), the verdict is yours to decide.<br>But his most infamous hack, the on that brought him to the attention of the dreaded glowies, was his skylarking alongside his partner in crime, Cracka. He did go further to have a call with the CIA director himself.<br>He did have an exemplary OPSEC, his computer was precisely encrypted, didn't log on onto his own WiFi, but opted for a satellite dish to access a distant WiFi adding layers to his anonymity. This shows his commitment to safeguarding his activities from detection but his flaw was on the non-technical part, yapping.<br>Here is his OSF, while chilling on XBOX LIVE with his friend who we are going to call SixNine. News about the hack came up, an jokingly told him that he participated in the hack.(FLASHBACK: so d3f4ult ask SixNine if he could mingle with ex girlfriend in which he said he was cool with it.) BACKTRACK: not very long he got arrested. D3f4ult does believe SixNine snitched.<br>From his OSF, we do learn that we should keep our mouth shut, and trust no one, not your kid, parents, cat, dog, computer and even yourself, and what lead to Cracka's arrests? probably chat logs between him and D3f4ult, remember, you are on the game yourself, have no emotions.<br>For those interested by d3f4ult's, delve deeper into the lens of the Darknet Diares podcast, or check a well captivating video about him down below. Peace out.",
"blog": "Meet d4f3ult, a teenage with a relish for stirring up chaos and shedding light on the shadows of the government's misdeeds. By the way, his father works in government. D3f4ult's journey into the realms of hacking and activism.<br><br>Formerly a member of AnonSec, an anti-anonymous group, d3f4ult made waves by penetrating into websites, erasing records of indebted students from university databases and exposing the dark underbelly of Denmark's bestiality scandal. Some call him a tech Robin Hood, other a digital vigilante(probably the gov), the verdict is yours to decide.<br><br>But his most infamous hack, the on that brought him to the attention of the dreaded glowies, was his skylarking alongside his partner in crime, Cracka. He did go further to have a call with the CIA director himself.<br><br>He did have an exemplary OPSEC, his computer was precisely encrypted, didn't log on onto his own WiFi, but opted for a satellite dish to access a distant WiFi adding layers to his anonymity. This shows his commitment to safeguarding his activities from detection but his flaw was on the non-technical part, yapping.<br><br>Here is his OSF, while chilling on XBOX LIVE with his friend who we are going to call SixNine. News about the hack came up, an jokingly told him that he participated in the hack.(FLASHBACK: so d3f4ult ask SixNine if he could mingle with ex girlfriend in which he said he was cool with it.) BACKTRACK: not very long he got arrested. D3f4ult does believe SixNine snitched.<br><br>From his OSF, we do learn that we should keep our mouth shut, and trust no one, not your kid, parents, cat, dog, computer and even yourself, and what lead to Cracka's arrests? probably chat logs between him and D3f4ult, remember, you are on the game yourself, have no emotions.<br><br>For those interested by d3f4ult's, delve deeper into the lens of the Darknet Diares podcast, or check a well captivating video about him down below. Peace out.",
"links": ["https://www.youtube.com/watch?v=PmtFtWVrxFE&t=168s", "https://darknetdiaries.com/episode/139"]
}
2 changes: 1 addition & 1 deletion storage/blogs/eldokim.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
"nickname": "ELDO KIM",
"poster": "bugzorc",
"osf": ["N/A"],
"blog": "Eldo Kim's bomb threats were like: \"Bombs placed around campus,\" \"shrapnel bombs,\" \"in four buildings on the school’s main campus in Cambridge. 2/4. guess correctly. Be quick or they will go off soon.\" Eldo's desperate attempt to postpone his final exam by resorting to such extreme measures highlights the intense pressure that academic deadlines can provoke. It seems even the brightest minds aren't immune to exam-induced stress!<br>Eldo's behavior is a curious blend of OPSEC awareness and oversight. While he took the precaution of utilizing Tor and Guerrilla Mail to send bomb threats, avoiding the pitfalls of easily traceable communication channels, he surprisingly neglected to employ a separate, dedicated machine for such sensitive activities. It's akin to wearing gloves to handle something delicate but forgetting to cover your face!<br>Eldo's operational security falters further when considering that he utilized a computer of uncertain origin, specifically one provided by the school. This decision introduces a myriad of potential vulnerabilities. Firstly, the school likely logs all activity on their computers, leaving a digital trail that could easily be traced back to Eldo. Secondly, the possibility of a screen capture feature compounds the risk, potentially documenting every action he took. Moreover, being alone in the school library amplifies these risks, as the network is likely closely administered by the school, granting them visibility into all internet communications and potentially flagging suspicious activity. It's like playing hide-and-seek in a glass house.<br>Eldo could have potentially argued that the school only noticed his use of Tor, which could be dismissed as a coincidence without concrete evidence linking him to any illicit activity. Additionally, he could have enhanced his anonymity by utilizing a bridge or proxy. Moreover, strategically timing his activities during periods of high computer usage and in a corner with limited surveillance coverage could have minimized the risk of detection. Peace out.",
"blog": "Eldo Kim's bomb threats were like: \"Bombs placed around campus,\" \"shrapnel bombs,\" \"in four buildings on the school’s main campus in Cambridge. 2/4. guess correctly. Be quick or they will go off soon.\" Eldo's desperate attempt to postpone his final exam by resorting to such extreme measures highlights the intense pressure that academic deadlines can provoke. It seems even the brightest minds aren't immune to exam-induced stress!<br><br>Eldo's behavior is a curious blend of OPSEC awareness and oversight. While he took the precaution of utilizing Tor and Guerrilla Mail to send bomb threats, avoiding the pitfalls of easily traceable communication channels, he surprisingly neglected to employ a separate, dedicated machine for such sensitive activities. It's akin to wearing gloves to handle something delicate but forgetting to cover your face!<br><br>Eldo's operational security falters further when considering that he utilized a computer of uncertain origin, specifically one provided by the school. This decision introduces a myriad of potential vulnerabilities. Firstly, the school likely logs all activity on their computers, leaving a digital trail that could easily be traced back to Eldo. Secondly, the possibility of a screen capture feature compounds the risk, potentially documenting every action he took. Moreover, being alone in the school library amplifies these risks, as the network is likely closely administered by the school, granting them visibility into all internet communications and potentially flagging suspicious activity. It's like playing hide-and-seek in a glass house.<br><br>Eldo could have potentially argued that the school only noticed his use of Tor, which could be dismissed as a coincidence without concrete evidence linking him to any illicit activity. Additionally, he could have enhanced his anonymity by utilizing a bridge or proxy. Moreover, strategically timing his activities during periods of high computer usage and in a corner with limited surveillance coverage could have minimized the risk of detection. Peace out.",
"links": ["https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/index.html"]
}
2 changes: 1 addition & 1 deletion storage/blogs/kingchilli.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
"nickname": "KING CHILLI",
"poster": "bugzorc",
"osf": ["Y", "ACC", "D", "PO"],
"blog": "Albert Gonazalez, aslo know online as Cumba Johnny. He was the ring leader of shadowcrew. Cumba went form bad guy to good guy to bad guy, imagine being caught because of cybercrime, then the glowies make convenant, you get to even work with the feds as a full time job , the you go right back to your cybercri life, sadly life is not God, you might not get a second chance, now he is serving a 20 year sentence, set to be free in 2028.<br>Despite operating under various aliases and online personas, Gonzalez failed to adequately conceal his identity. He frequently communicated with other hackers using his real name and shared personal details that could be traced back to him. This lack of anonymity made it relatively easy for law enforcement agencies to connect the dots and identify him as the mastermind behind the cybercrimes.<br>Effective OpSec relies heavily on secure communication channels and encryption methods to prevent eavesdropping and interception. However, Gonzalez and his accomplices often communicated via unencrypted channels, including internet chat rooms and instant messaging platforms. These communications left a digital trail that investigators later used to build their case against him.<br>This is what lead to his second arrest, is that he lived a lavish lifestyle that raised suspicion among law enforcement agencies. He flaunted his ill-gotten wealth, purchasing expensive cars, luxury goods, and even hosting extravagant parties. Such conspicuous consumption drew attention to him and ultimately contributed to his arrest. Find some way to show legit source of money. Peace out.",
"blog": "Albert Gonazalez, aslo know online as Cumba Johnny. He was the ring leader of shadowcrew. Cumba went form bad guy to good guy to bad guy, imagine being caught because of cybercrime, then the glowies make convenant, you get to even work with the feds as a full time job , the you go right back to your cybercri life, sadly life is not God, you might not get a second chance, now he is serving a 20 year sentence, set to be free in 2028.<br<br>>Despite operating under various aliases and online personas, Gonzalez failed to adequately conceal his identity. He frequently communicated with other hackers using his real name and shared personal details that could be traced back to him. This lack of anonymity made it relatively easy for law enforcement agencies to connect the dots and identify him as the mastermind behind the cybercrimes.<br><br>Effective OpSec relies heavily on secure communication channels and encryption methods to prevent eavesdropping and interception. However, Gonzalez and his accomplices often communicated via unencrypted channels, including internet chat rooms and instant messaging platforms. These communications left a digital trail that investigators later used to build their case against him.<br><br>This is what lead to his second arrest, is that he lived a lavish lifestyle that raised suspicion among law enforcement agencies. He flaunted his ill-gotten wealth, purchasing expensive cars, luxury goods, and even hosting extravagant parties. Such conspicuous consumption drew attention to him and ultimately contributed to his arrest. Find some way to show legit source of money. Peace out.",
"links": ["https://en.wikipedia.org/wiki/Albert_Gonzalez"]
}

0 comments on commit fc31963

Please sign in to comment.