AnonTalk: Difference between revisions

From /i/nsurgency W/i/ki
Jump to navigationJump to search
>AnonRAGE
No edit summary
>AnonRAGE
Line 13: Line 13:


A mass of complaints to anti-pedo organizations as well as shitstorm user complaints may get Anontalk to lose this host. So let's try to get things moving.
A mass of complaints to anti-pedo organizations as well as shitstorm user complaints may get Anontalk to lose this host. So let's try to get things moving.
PS: The Anontalk bot is still spamming the gay bar. RAGE.
PS: The Anontalk bot is still spamming the gay bar. RAGE.



Revision as of 07:04, 30 December 2008

Disregard that anontalk was always the intended target

RECENT DEVELOPENTS

As of 12/29/2008, Anontalk is back up under a Swiss webhost that has anti DDOS filtering: http://anonym.to/http://www.dragonara.net/ Apparently some retard(s) donated $500 to Sysop within hours of his butthurt post asking for donations.

However, reading the their terms of service here, we find that Dragonara is against hosting material witch:

  • constitutes, fosters, or promotes child pornography content;
  • is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
  • is defamatory or violates a person's privacy;

A mass of complaints to anti-pedo organizations as well as shitstorm user complaints may get Anontalk to lose this host. So let's try to get things moving.

PS: The Anontalk bot is still spamming the gay bar. RAGE.

WTF ANONTALK

 
 
people started talking about it less than two weeks ago when everyone got really fed up with the ads of AT so someone suggested we ddos it like old times and some people didn't agree, but some people did, so it continued, the sysop of AT said he wanted some people to raid the chans back, there are rumors of him wanting to take down the server etc
 

 

- Anonymous

The myriad *chan sites has a history of being free and open, not being full of moralfags and all that. A person was fed up with some of the parts of the culture that he disagreed with (*chan memes, etc.) That person, who calls himself 'Sysop' (also known as Anonymous 47ae211000a6a8.34833955) was fed up with some of the bans committted by some of the *chan sites, which he disagreed with and considered 'wrong'. He wanted to make his own anonymous textboard, that would be relatively free of chan memes and references and discuss things in more 'formal' ways. He originally was relatively slow on blocking words, and was lax in his administration. Unfortunately, due to various reasons he went fucking NAZI (over time) and banned anyone using a chan meme or reference, nimped random innocents, and began spamming several chan sites with bots advertising anontalk. Many people wondered, "Was this guy sodomized by moot as a child or something?" There have been several incidents and skirmishes between AT and *chan due to those issues, spamming on both sides. During the Chanapocalypse, anontalk was hit decently hard by 4chan's /b/ but they also inflicted losses on the /b/ raiders. The bots still continue to spam *chan; Sysop continues to rule like a tyrant and does not relinquish control (or lessen it). Therefore, we must attack his site to prevent this threat from growing further. A raid will be commenced, lead by 4chan's /b/, as well as any /i/nsurgents who also participate in this battle.

Regarding anontalk. AnonTalk and kimmoa.se are hosted on the same computer on a high speed home connection (as opposed to professional hosting or leased servers). KimmoA is in fact a known Swedish e-mail spammer and his real name is Kimmo Alm. He resides in Stockholm.

  • Update* On Dec. 13, 2008, Epic win was achieved by the collapse of anontalk.com. Have some Cake.

The site was down for approximately one week, resulting in plenty of L-O-L corruption.

They are currently up again. Perhaps it's time for an 'aftershock'?

DDoS tools

Some of the many DDoS tools you can to to fight this cancer is the Longcat Flooder. Longcat Flooder is a multi-protocol flooding tool written during the Subeta raids, by the same creator as the newer bandwidth raeping tool, BWRaeper.NET. It quickly became popular amongst Anonymous due to its simplicity in use and powerful features. The protocols supported are TCP (SYN flooding), UDP and HTTP.

Research has shown that SYN and UDP provide the best results. However, using the HTTP flooder can be useful in several situations:

  • Web server with limited bandwidth
  • Web server with limited CPU power
  • Website with search URLs

Constantly flooding a URL where a search or other heavy SQL command gets executed has proven to be destructive during the Subeta raid. Only several Longcat Flooders were needed to take down the MySQL database when executing search commands.

There are two different types of Longcat Flooder out there. One is a standalone version and one is a distributed version relying on a central server to provide raep information. The current version of the standalone version of the Longcat Flooder is v2.3 Final. The current version of the distributed version of the Longcat Flooder Client is 3.0 Beta. The Longcat Flooder Server has version 1.0.

CopyPasta to spread

To make it a little harder to trace yourself, change your MAC address, find somebody else's unprotected Wi-Fi, and attack. MAC changer in the Dangerous Kitten Pack <http://i33.tinypic.com/2diiz5s.jpg>. Details at <http://i37.tinypic.com/63ytub.jpg>. W/i/ki at <http://partyvan.info/index.php?title=Operation_AntFuck>. Make sure to keep the www, or it is useless. Newfags, read <http://partyvan.info/index.php> and <http://www.mediafire.com/?353ge2yzm2e> to learn more. AND REMEMBER RULES 1 AND 2 OF THE INTERNET, NO MATTER WHAT. kthxbye.

Using Longcat Flooder

Everybody's pretty sure that AnT runs on mySQL, and they have a deep search function. Just flood the URL for a deep search for one letter (such as "a") in order to overload their mySQL server.

Upon trying this I get 403ed after 2+ searches and need to get a new IP to do it again, they probably upgraded their ram. Any ideas ?

DOX

After tracing Sysop's phone number (he is the admin of AT) we managed to get his address. If moar is found, then post it here.

Supposed pic of Kimmo

http://img139.imageshack.us/img139/9417/kimmoavt3cj3.jpg

Address:
Gunlög Alm
08-97 29 34
Elsa beskows gata 21
12955 HÄGERSTEN

Phone
+46 (0)8-972934

Email and shit
kimmoa@gmail.com
kimmoalm@hotmail.com
ICQ 34099478

It's Dangerous to go alone! Take this.

http://i33.tinypic.com/2diiz5s.jpg

Oh. Yes that has the 'Dangerous Kitten' toolkit. Open in WinRAR or whatnot to access.