Hacking Hackers

This is a ten step program to fight hacking attacks. You may or may not choose to ignore it, laugh at it, or ponder on it.

1) Internet security is a billion dollar business which will only grow in size as cloud computing approaches. Pioneers in providing security will earn considerable revenue like McAffee  , Norton did in the PC era. Incidentally it also means the consulting/partner group that is willing to work with virtual workers and virtual payments to offshore consultants.

2) Industrial espionage has existed from the days the West stole Gunpowder and Silk formula from China (and China is now doing the same to its software). The company and country will the best hackers will win. Keep your team motivated mate, or it is very easy for them to defect to the other side of the (cyber) wall.

3) When 2 billion people have access to internet the number of hackers will grow in number and quality much more rapidly than when only 100 million people across the world had access. Thanks to Google Translate, Paypal, Skype video Call, Tor Project, and Google Voice i can and have collaborative with hackers almost in all geographies. You can only imagine what the black hats are doing.

4) Analyzing hackers is like reading Chinese Tea Leaves. If you have experienced analysts, you will slip up. recruit the hackers in the dormitory before China recruits them using Lulz Security as a bogus cover. or USA recruits them as cover for spreading democracy in the Arab countries.

5) get your website audited for security breaches. sponsor a hack my website contest. before someone else does it for you.

6) Fighting hackers was always tough. But now we have part time hackers , people with perfectly respectable jobs who look like Mr Andersen and hack like Neo from the Matrix. Every kid once wanted to be a firefighter. Every geek dreams  of the one ultimate hack.

7) if you cant beat hackers, join them.

8) the more machine data is generated, the more you need external experts and newer software interfaces. Investing in open data, datasets is good. Keeping Bradley manning naked in his cell is bad. ignore the bad PR at your own cost.

9) Stop blaming China for every hack attack. You are a techie not a politician

10) Hack hard. Hack well. If someone hacks you, you will need to hack them off offensively unless you just want to be an easy mark for the rest of your lives. Counter -hacking expertise needs to be strengthened and groomed. hacking is an offense not just a defense game.

 

 

Tools for Hackers:Beginners

How to disguise your IP Address from your most wonderful glorious leaders-

From

 

https://www.torproject.org/projects/torbrowser.html.en

Tor Browser Bundle


The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser, and is self-contained. The Tor IM Browser Bundleadditionally allows instant messaging and chat over Tor. If you would prefer to use your existing web browser, install Tor permanently, or if you don’t use Windows, see the other ways to download Tor.

Freedom House has produced a video on how to find and use the Tor Browser Bundle. If you don’t see a video below, view it at Youtube . Know of a better video or one translated into your language? Let us know!

 

 

 

and if you now want to see or check your own website for a Denial of Service attack , download this

http://sourceforge.net/projects/loic/

This is the software for which 32 Turkish teenagers got arrested for bringing down their govt websites. Do NOT USE it for ILLEGAL purposes,

because 1) it is hosted on a western website that due to Patriot Act would tracking downloads as well as most likely be inserting some logging code into your computer (especially if you are still on Windows)

2) Turkey being a NATO member got rather immediate notice of this – which makes it very likely that this tool is compromised in the Western Hemisphere. You can probably use this in Eastern Hemisphere country excluding Israel, Turkey, China, India ,Korea or Japan because these countries do have sophisticated hackers working for the government as well.

3) This is just a beginners tool to understand how flooding a website with requests work.

http://sourceforge.net/projects/loic/files/

Basically download, unzip the file

Enter URL and click Lock on to know IP address.

use HTTP Method. Make say 1000 threads.

Then press the IMMA CHARGING MY LAZER big button.

Note the Failed Tab tells you how good or bad this method is.

Note – it wont work on my blogs hosted on wordpress.com- but then those blogs had a root level breach some time back. It did work on both my blogspot and my tumblr blogs, and it completely shattered my son’s self hosted wordpress blog (see below)

 

 

Updated Blogging Policy for Decisionstats.com

Once Upon a Time in Mumbaai
Image via Wikipedia

I will be moving and transitioning all cultural,philosophical ,poetry, and political writing to separate blogs.

Decisionstats is for better TECHNICAL decisions by FASTER STATS (on technology).

  • for better political decisions (how to organize protests in Asia when the govt cuts off the internet) (separate culture blog),
  • better cultural decisions (which movie should we go to) (separate culture blog),
  • better poetry reading (seperate TUMBLR blog)

 

Thanks,

Ajay Ohri

Related articles

 

Newer Doctrines for Newer Wars

On the Memorial Day, some thoughts on the convergence of revolutions in technology and war fare-

 

War – 

War is an openly declared state of organized conflict, typified by extreme aggression, societal disruption, and high mortality

1) Disrupting command and control objects is the primary stage of attack. Evading detection of your own command and control objects while retaining secure channels of communication with redundant lines of control is the primary stage of defense.

2) Pre emptive strikes are in. Reactive all out wars are out. Countries will no longer “declare war” before going to war. They already dont.

3) Commando /Special Forces/Terror strikes /Guerrilla warfare weapons, tactics and technology will have a big demand. So will be specialist trainers.

4) Improving the predictability of your own detect and destroy mechanisms, and disrupting the predictability of enemy detect and react mechanisms will be hugely in- even more than commissioning one more submarine and one more aircraft type.

5) Countries will revert to ancient tribal paradigms in fast shifting alliances for economics as well as geo politics. Very stupidly religion can be  factor in warfare even in the 21 st century.

 

6) Number of Kills per Weapons fired will converge to a constant .  Risks of secondary collateral damage will need to have a higher weight-age because they spur more retal attacks. Fewer prisoner of wars, higher KIA/ MIA ratio.

7) Fewer civilian casualties than all previous wars. This includes fewer civilian casualties even in nuclear war than previous nuclear scenarios.

8) War is a business. It will not be allowed to disrupt global supply chains for more than 2-3 weeks (or inventory replenishment of critical goods and /or services). commodities will lead to wars explicitly, especially since nuclear energy is discredited and carbon energy is diminishing. Expect synchronization with financial derivatives activity. War futures anyone.

9) The Geneva Convention is overdue for an update. Call it Geneva Convention 3.0 United Nations will remain critical to preventing or hastening global conflicts (remember the league of extra ordinary nations .)

10) Economic weapons, climate changing weapons, and sky weapons will emerge. Expect newer kinds of gun powder to be invented. Cyber weapons and hackers will be in demand . Thats the only bright spot.

Happy Memorial Day.

 

Enjoy that freedom to eat an barbecue- it was paid for in more blood than you will ever care to know.

 

Do android hackers tweet about electric sheep?

Here is a very amusing site where bunch of hackers discuss black hat techniques to game social media- they meet in the MJ website. LOL

Thats actually the official MJ website. (also see my Poem on MJ at

https://decisionstats.com/2011/04/29/tribute-to-michael-jackson/

and https://decisionstats.com/2009/12/01/obama-and-mj-on-history/)

But back to the funny twitter gamers

http://www.michaeljackson.com/us/node/703109

MICHAEL JACKSON YOU ARE OVER THE STATUS UPDATE LIMIT. PLEASE WAIT A FEW HOURS AND TRY AGAIN.

Julian Assange Dear Chap

Julian Assange a very Dear Chap
couldnt control his pecker
got caught in a honey trap
Should have kept that rubber on, Jules
Nordic Scandinavians may be easy but even they have rules

meanwhile Dear Chap’s Website the eponymous Wikileaks
is leaking revolution and democracy like  Vegas casino magic tricks
The Arabs read his website before Sentor Joe crashed it down
And now  Anglo Saxon allies in Egypy, Tunisia, Libya, Yemen, Bahrain are wearing a frown

Viva La Website Revolution Wikileaks
Merde to the Dear Chap\s pecker squeaks
Time up, time for all dictators to go and hide,
rulers Arabian, or Aussi hackers on a funny ride.

%d bloggers like this: