Pizza bomb: Difference between revisions

From /i/nsurgency W/i/ki
Jump to navigationJump to search
>Anon42
m Removing {{Methods}} because {{tutorials}} have the same purpose
>CrackRabbit
m quick fix
 
(7 intermediate revisions by 5 users not shown)
Line 1: Line 1:
'''Pizza''' Bombing (or any other fast food for that matter) is a lulzy way of causing grief for your target, all from the comfort of your Mom's basement. '''Pizza''' bombing consists of sending copious amounts of '''pizza''' or fast food to a target. The food is delivered to the target's place of residence or business where they will have to deal with a deliver order of 4 large Pepperoni's and a side of Coke and garlic bread.
"Pizza bombing" is term that encompasses techniques employed by insurgents to inundate marks with pizzas (or other delivered fast-food items) ordered from an online form.


'''PROTIP:''' Some companies will not allow you to send too much to one place at any given time. Therefore, only send a typical amount of food. Also, don't send food first thing in the morning, that is too suspicious. '''PROTIP:''' If there are several '''pizza''' companies near your target, have each bring a few pizzas.
==Execution Methods==
===Telephone===


== Ordering by phone ==
For extensive tips, see [[Prank calls]]. This is the obvious (and traditional) method. Thusly, it is the most often AVOIDED method (see below).


See [[Prank calls]] for tips on how to stay anonymous and not get angry '''pizza''' companies coming after you. Some have even convinced '''pizza''' companies to write "/b/" with the toppings and open the door screaming "POOLS CLOSED!" as was the case with [[WitnessX]], who's mom thought it was poisoned and called the cops, for epic win. Too bad it was the wrong target.
'''TACTICAL PITFALLS:'''
*Most calling methods lack anonymity (read [[Prank calls]] to work around this).
*Calling is incompatible with macro software (It would be much too cumbersome to program a "pizza bomb via telephone" script).


== Ordering over the internet ==
===Online Forms===
This technique employs the use of online order forms to place your order and special requests.
<br>
'''TACTICAL ADVANTAGES:'''
<br>
*Compatible with macros.
*Offers more anonymity than telephone method (Read PITFALLS for details).
*Ludicrous "special requests" can be added to most online order forms (read SUCCESS STORIES for examples).


Potentially the lulziest method, also the easiest for all you lazy fgts out there.
<br>
'''TACTICAL PITFALLS:'''
<br>
*This method can reveal the IP address of the insurgent.
::*To avoid and work around this pitfall, use anonymity-preserving tactics (The use of proxies will typically suffice).


'''OBVIOUSLY USE TOR!!!'''
*This method may tempt an insurgent to abuse the form (by ordering enormous amounts of products from one service in a short amount of time), which may result in complete ignorance on behalf of the delivery service.
::*To avoid and work around this, simultaneously order typical portions from multiple forms (from SEPARATE delivery services).


* [http://anonym.to/http://www.papajohns.com Papa Johns] - a very good site
*Dominos has been reported as employing Flash objects on their form's page to bypass a proxy.
* [http://anonym.to/http://www.dominos.com Dominos] - some people have reported this site forces Flash that bypasses proxies.  Just install noscript on firefox and have javascript on but flash blocked and it will not do this
::*To work around this pitfall, disable Flash while enabling JavaScript (via NoScript or a similar utility).
* [http://anonym.to/https://quikorder.pizzahut.com/phorders2/register.php Pizza Hut] - this site was designed by evil people purely to be sadistic.  Each page requires 100 megabytes to load (and you'll be squeezing that through Tor) and trying to order means fighting with their website litterally for hours with their broken javascript and reloading the page (remember 100MB per page so it's very slow to load) endlessly as their javascript won't let you order anything (e.g. "Order this pizza" button--which is a javascript link like everything link on their site because their web designers don't know anything about HTML, only javacsript--just does nothing) and then their popups that are unclosable will block the screen as you have to click through tons of custom design options just to order a basic pizza.  By the way, be sure to register first as if you don't, you'll discover their website just won't let you finish your order or anything due to bugs so you have to clear cookies and start over if you tried without registering.  Make sure to start this by 6pm wherever your target lives because their website really does take hours to complete a single order and 99% of the time it won't even finish loading its javascript-bloated thing and if you don't plan ahead, it won't be done until after it closes and you can't start in the morning because as mentioned before, they get suspicous.


*Pizza Hut's order form has been reported to be enormous in size, rendering the utilization of a proxy quite hindering for an insurgent.
::*To work around this, you may want to use CURL to submit the forms.
==Examples of Success==
*This technique was employed during the raid of [[WitnessX]]. Insurgents used the online order form to specify that they needed to write "/b/" with toppings on the pizza and exclaim, "Pool's closed!" when they opened the door.
::*This led the mark's mother to believe the pizza was poisoned. She called the police in her panic, showing that minor steps can prove to be lucrative.


[[Category:Methods]]
[[Category:Methods]]
[[Category:Tutorials]]{{tutorials}}
[[Category:Tutorials]]

Latest revision as of 19:49, 21 April 2013

"Pizza bombing" is term that encompasses techniques employed by insurgents to inundate marks with pizzas (or other delivered fast-food items) ordered from an online form.

Execution Methods[edit]

Telephone[edit]

For extensive tips, see Prank calls. This is the obvious (and traditional) method. Thusly, it is the most often AVOIDED method (see below).

TACTICAL PITFALLS:

  • Most calling methods lack anonymity (read Prank calls to work around this).
  • Calling is incompatible with macro software (It would be much too cumbersome to program a "pizza bomb via telephone" script).

Online Forms[edit]

This technique employs the use of online order forms to place your order and special requests.
TACTICAL ADVANTAGES:

  • Compatible with macros.
  • Offers more anonymity than telephone method (Read PITFALLS for details).
  • Ludicrous "special requests" can be added to most online order forms (read SUCCESS STORIES for examples).


TACTICAL PITFALLS:

  • This method can reveal the IP address of the insurgent.
  • To avoid and work around this pitfall, use anonymity-preserving tactics (The use of proxies will typically suffice).
  • This method may tempt an insurgent to abuse the form (by ordering enormous amounts of products from one service in a short amount of time), which may result in complete ignorance on behalf of the delivery service.
  • To avoid and work around this, simultaneously order typical portions from multiple forms (from SEPARATE delivery services).
  • Dominos has been reported as employing Flash objects on their form's page to bypass a proxy.
  • To work around this pitfall, disable Flash while enabling JavaScript (via NoScript or a similar utility).
  • Pizza Hut's order form has been reported to be enormous in size, rendering the utilization of a proxy quite hindering for an insurgent.
  • To work around this, you may want to use CURL to submit the forms.


Examples of Success[edit]

  • This technique was employed during the raid of WitnessX. Insurgents used the online order form to specify that they needed to write "/b/" with toppings on the pizza and exclaim, "Pool's closed!" when they opened the door.
  • This led the mark's mother to believe the pizza was poisoned. She called the police in her panic, showing that minor steps can prove to be lucrative.