Demonstration of Internet-Based Attacks on the Real World

Attacking A Virtual Person

Cloak

 Guestbook: http://pub44.bravenet.com/guestbook/3717008505

 

Target:        CloaK (X{ESG},-iCe-)

Name: Josh Murphy (yes I am ghey)

Phone: (613) 841 - 7328

Cell: 761-0853

DOB: Sept,6, 1989

Larry Murphy (crazyheadhead dad)

Lisa Murphy (hot yummy mommy)

Jake Murphy (retarded bro)

1516 Rumford Drive, Orleans, ON K4A 4B7, Canada

 

Attack

 

A. Calling:

 

How:    If you want to call, press *67 before dialing. It makes you untraceable. You will just be displayed as “Public Phone” or “Unknown Caller”.

Update: Use 1-800-Call-ATT, 1-800-Collect, or any other collect services. By using that, the person who is called is charged for calling, not the caller. So you can just use home phone without getting charged, or even pay phone without putting any coin! It costs NOTHING.

 

Why?:             You can call and ask for Larry and talk all the shit about his son Josh. You can say like you are a lawyer prosecuting him for downloading porn. Or you can just talk to cloak (josh) and punk him.

 

Cost:    The cost to within the same country is about 75 cents a minute. For a normal family, this amount will go unnoticed by the person who pays the bills (you, parents). Or you can do it from public phone (school, work). The cost for callers from different country (U.S, U.K), is little higher but still should go unnoticed for 1 minute phone call.

There are few sites that offer few free calls online to real phone address as a promotion. Ask for such services on webhostingtalk.com, pcmech.com, forum.hackinthebox.org, or use Google.com.

 

B. Mail

 

How:    Subscribe him to free trial magazines. (no credit card needed). Google for "request+free+trial+subscription+name+address+zip”. There are about 335,000 sites that offer free trial of their publications (magazines, newspapers, catalogs, etc.). Fill out the forms! You can use Google Toolbar’s AutoFill function to quickly go through those.

If you want to send adult material (porn), search for "request+free+trial+subscription+name+address+zip+adult+porn

 

Why?:  Depending on the amount of subscriptions, the victim can be potentially buried under huge amount of mails. If there are so many mails, the victim can miss legitimate mails (bills, letters, etc), while discarding false ones. The victim can also get mad at by his guardians!

 

Cost :   Nothing, except your time and energy (which are losing as you read this)

 

C. Financial Fraud

 

How : Using the guardian’s information, financially crimple the person.

 

Why? : This is extreme form of an attack and is strongly discouraged for amateurs and professionals.

 

Cost: Less than $100 immediate cost. Can potentially put your life in jail for 1-15 years.

 

 

 

Defending  (The attacker)

 

1.      Use proxy servers when filling out forms or registering for emails or other services. Google for “free proxy list” or go to atomintersoft.com/products/alive-proxy/proxy-list/ . To use 208.27.166.10:80, for example on IE, go to Tools. Then Internet Options. Then Connections. Then LAN Settings. Under Proxy server, fill in 208.27.166.10 for Address and 80 for Port. Some addresses may not work, so try more and more IPs.

1.      Do not use your existing regular email. If possible, sign up for free hotmail, yahoo.com emails.

2.      Don’t be stupid.

 

Because of different geographical and political settings, attacks based on the Internet on the real world can be hard to be prosecuted in a court of law. In this particular case, the law enforcement of Orleans, Ontario, Canada may or may not have laws that prohibit such attacks (harassment, fraud, identity theft). But then again, thousands of companies are sending thousands of commercial advertisements to the people.

Even if the police let the victim file a report, it will be hard to trace the attacker, then get him to be prosecuted in different parts of the country, let alone the world! For example, FBI of U.S does not even file a report if the damages do not exceed $25,000. Even if the damages exceed that amount, the agents have way higher priorities to purpose multi-million dollars cases. For counties like China and Netherlands, it would be impossible to extradite the attacker.

 

Greetings

 

You can greet the person out of admiration or friendship. Use phone, post office mail or email. For phone follow the blow methods. For post office mail, mail from a different part of town if possible. For email, use a different email account behind a proxy.

 

Defending  (the victim)

 

1.      Never, ever!, give any real information to free services. Real information includes your first and last names, your parents first and last names, your phone number, your address. Free services include all services except such legitimate Fortune 500 businesses that require credit card. You can establish completely fake entity using real entity. For example, you can use a professor’s name and college address as your entity.

2.      Use proxy servers as much as possible though they are slow at times.

3.      Don’t be stupid.

 

Further Reading

 

1.      DOS Attack Via U.S Postal Office

http://slashdot.org/articles/03/04/15/2027225.shtml?tid=111&tid=172

2.      Free Anonymous Proxy list

http://www.atomintersoft.com/products/alive-proxy/proxy-list/

3.      Defending against an internet-based attack on the physical world

http://www.avirubin.com/scripted.attacks.pdf

 

About the author

           

            Anonymous person (people), mostly loser(s).

 

Disclaimer

 

All the information can be fictional or real. In either case, upon viewing or accessing the content of this page, you automatically agree that neither the author(s) of this document, nor the ISP or web host of this web account, nor ISP of the users who view this page, nor the actual users who view this page are responsible for its legality. You agree that they will not be detained, persecuted in a court of law nor punished in any forms. 

 

 

 

Contact Me/Us

 

Guestbook: http://pub44.bravenet.com/guestbook/3717008505