Attacking A
Virtual Person
Cloak
Name: Josh Murphy (yes I am ghey)
Phone:
(613) 841 - 7328
DOB:
Larry
Murphy (crazyheadhead dad)
Lisa
Murphy (hot yummy mommy)
Jake
Murphy (retarded bro)
Attack
A. Calling:
How: If you want to call, press *67 before dialing. It makes you untraceable. You will just be displayed as “Public Phone” or “Unknown Caller”.
Update: Use 1-800-Call-ATT, 1-800-Collect, or any other collect services. By
using that, the person who is called is charged for calling, not the caller. So
you can just use home phone without getting charged,
or even pay phone without putting any coin! It costs NOTHING.
Why?: You can call and ask for Larry and talk all the shit
about his son Josh. You can say like you are a lawyer prosecuting him for
downloading porn. Or you can just talk to cloak (josh) and punk him.
Cost: The cost to within the same country is about 75 cents a minute. For a normal family, this amount will go unnoticed by the person who pays the bills (you, parents). Or you can do it from public phone (school, work). The cost for callers from different country (U.S, U.K), is little higher but still should go unnoticed for 1 minute phone call.
There are few
sites that offer few free calls online to real phone address as a promotion.
Ask for such services on webhostingtalk.com, pcmech.com,
forum.hackinthebox.org, or use Google.com.
B. Mail
How: Subscribe him to free trial magazines. (no credit card needed). Google for "request+free+trial+subscription+name+address+zip”. There are about 335,000 sites that offer free trial of their publications (magazines, newspapers, catalogs, etc.). Fill out the forms! You can use Google Toolbar’s AutoFill function to quickly go through those.
If you want to send adult material
(porn), search for "request+free+trial+subscription+name+address+zip+adult+porn”
Why?: Depending on the amount of subscriptions, the victim can be
potentially buried under huge amount of mails. If there are so many mails, the
victim can miss legitimate mails (bills, letters, etc), while discarding false
ones. The victim can also get mad at by his guardians!
Cost : Nothing, except your time and energy (which
are losing as you read this)
C. Financial Fraud
How : Using the guardian’s
information, financially crimple the person.
Why? : This is extreme form of an attack and is
strongly discouraged for amateurs and professionals.
Cost: Less than $100 immediate cost. Can
potentially put your life in jail for 1-15 years.
Defending (The
attacker)
1. Use proxy servers when filling out forms or registering for emails or other services. Google for “free proxy list” or go to atomintersoft.com/products/alive-proxy/proxy-list/ . To use 208.27.166.10:80, for example on IE, go to Tools. Then Internet Options. Then Connections. Then LAN Settings. Under Proxy server, fill in 208.27.166.10 for Address and 80 for Port. Some addresses may not work, so try more and more IPs.
1. Do not use your existing regular email. If possible, sign up for free hotmail, yahoo.com emails.
2. Don’t
be stupid.
Because of different geographical
and political settings, attacks based on the Internet on the real world can be
hard to be prosecuted in a court of law. In this particular case, the law
enforcement of
Even if the police let the victim
file a report, it will be hard to trace the attacker, then
get him to be prosecuted in different parts of the country, let alone the
world! For example, FBI of U.S does not even file a report if the damages do
not exceed $25,000. Even if the damages exceed that amount, the agents have way
higher priorities to purpose multi-million dollars cases. For counties like
Greetings
You can greet the person out of
admiration or friendship. Use phone, post office mail or email. For phone
follow the blow methods. For post office mail, mail from a different part of
town if possible. For email, use a different email account behind a proxy.
Defending (the
victim)
1. Never, ever!, give any real information to free services. Real information includes your first and last names, your parents first and last names, your phone number, your address. Free services include all services except such legitimate Fortune 500 businesses that require credit card. You can establish completely fake entity using real entity. For example, you can use a professor’s name and college address as your entity.
2. Use proxy servers as much as possible though they are slow at times.
3. Don’t
be stupid.
Further
1. DOS Attack Via U.S Postal Office
http://slashdot.org/articles/03/04/15/2027225.shtml?tid=111&tid=172
2. Free Anonymous Proxy list
http://www.atomintersoft.com/products/alive-proxy/proxy-list/
3. Defending against an internet-based attack on the physical world
http://www.avirubin.com/scripted.attacks.pdf
About the author
Anonymous person (people), mostly loser(s).
Disclaimer
All the information can be fictional or real. In either case, upon viewing or accessing the content of this page, you automatically agree that neither the author(s) of this document, nor the ISP or web host of this web account, nor ISP of the users who view this page, nor the actual users who view this page are responsible for its legality. You agree that they will not be detained, persecuted in a court of law nor punished in any forms.
Contact Me/Us
Guestbook: http://pub44.bravenet.com/guestbook/3717008505