AnonTalk: Difference between revisions

From /i/nsurgency W/i/ki
Jump to navigationJump to search
>AnonRAGE
No edit summary
>Tolp
Line 46: Line 46:


http://anonym.to/http://ant-news.blogspot.com/
http://anonym.to/http://ant-news.blogspot.com/
As of january the 6th, new Anontalk spam appeared on /b/:
w w w . A n o n T a l k . c o m
4chan has been illegally DDoSing this site mentioned above for the last few weeks. To help AT pay for DDoS protection, which is very expensive (over $500 USD/month), donate or invest in AT by sending an e-mail to aid@a n o n t a l k . c o m or see http://ant-news.blogspot.com/ for details.
Only you can help save the BEST site on the Web. (These messages WILL continue until the attacks STOP PERMANENTLY or when enough money for at least a few months worth of DDoS protection is collected.)
Lol, the fucktard is asking /b/ for donations now, after we pwned his site?
This bastard still hasn't given up. I don't think they have the DDoS protection as of now, mainly because all Anontalk regulars are poor pedophiles who don't give a fuck. Maybe it's time to show the fucktard we're not going to give up, and organise another massive strike?


==WTF ANONTALK==
==WTF ANONTALK==

Revision as of 17:31, 6 January 2009

EVERYBODY CARES ABOUT ANONTALK BECAUSE THEY FUCKING SPAM 4AIL CHAN. PLEASE DON'T DO NOTHING USELESS, AND COME INSIDE

IT'S UP AGAIN DOWN AFTER ONLY 5 HOURS, OH MAN SYSOP IS HAVING A BAD MONTH

GUISE HE WANTS DONATIONS YET AGAIN! so go send him some!

RECENT DEVELOPENTS

As of 12/29/2008, Anontalk is back up under a Swiss webhost that has anti DDOS filtering: http://anonym.to/http://www.dragonara.net/ Apparently some retard(s) donated $500 to Sysop within hours of his butthurt post asking for donations.

However, reading the their terms of service here, we find that Dragonara is against hosting material witch:

  • constitutes, fosters, or promotes child pornography content;
  • is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
  • is defamatory or violates a person's privacy;

A mass of complaints to anti-pedo organizations as well as shitstorm user complaints may get Anontalk to lose this host. So let's try to get things moving.

PS: The Anontalk bot is still spamming the gay bar. RAGE.

PPS: the IRC channel for this raid is IRC.chatnets.org #antraid




LULZ Dragonara nuked them, did anyone send any CP complaints? I was gonna but got busy fapping...

Anyway from their status site:

Turns out that Dragonara.net is just another scam company. They decided to pull the plug without any notice whatsoever and only after contacting them did they give me some vague bullshit lies in bad English about AT hosting child porn (AT doesn't even host a single image, video clip, file archive or malicious script, so that's obviously not true). Do NOT do business with them; it's a complete waste of time and they are very incompetent and unprofessional.

The future of AT? We're gonna need donations. PRQ, even if they have switched owners, should be perfect... Donation details (real bank account)

BIC/SWIFT: NDEASESS IBAN: SE5530000000032473805199

Also, another curious thing I've noticed, before he was asking for donations via paypal but then said exactly the same thing that they scammed him and took his money. I dunno about anyone else but I've never heard any paypal shit. My gut tells me Sysop has decided to give up on AnT and try to scam his way into some $ from donating idiots, and by using direct bank account shit, the users can't report him to paypal for abuse, as usually banks just say LUL GTFO if you want to cancel a transaction.

Either way, the plot thickens!

http://anonym.to/http://ant-news.blogspot.com/

As of january the 6th, new Anontalk spam appeared on /b/:

w w w . A n o n T a l k . c o m

4chan has been illegally DDoSing this site mentioned above for the last few weeks. To help AT pay for DDoS protection, which is very expensive (over $500 USD/month), donate or invest in AT by sending an e-mail to aid@a n o n t a l k . c o m or see http://ant-news.blogspot.com/ for details.

Only you can help save the BEST site on the Web. (These messages WILL continue until the attacks STOP PERMANENTLY or when enough money for at least a few months worth of DDoS protection is collected.)

Lol, the fucktard is asking /b/ for donations now, after we pwned his site?

This bastard still hasn't given up. I don't think they have the DDoS protection as of now, mainly because all Anontalk regulars are poor pedophiles who don't give a fuck. Maybe it's time to show the fucktard we're not going to give up, and organise another massive strike?

WTF ANONTALK

 
 
people started talking about it less than two weeks ago when everyone got really fed up with the ads of AT so someone suggested we ddos it like old times and some people didn't agree, but some people did, so it continued, the sysop of AT said he wanted some people to raid the chans back, there are rumors of him wanting to take down the server etc
 

 

- Anonymous

The myriad *chan sites has a history of being free and open, not being full of moralfags and all that. A person was fed up with some of the parts of the culture that he disagreed with (*chan memes, etc.) That person, who calls himself 'Sysop' (also known as Anonymous 47ae211000a6a8.34833955) was fed up with some of the bans committted by some of the *chan sites, which he disagreed with and considered 'wrong'. He wanted to make his own anonymous textboard, that would be relatively free of chan memes and references and discuss things in more 'formal' ways. He originally was relatively slow on blocking words, and was lax in his administration. Unfortunately, due to various reasons he went fucking NAZI (over time) and banned anyone using a chan meme or reference, nimped random innocents, and began spamming several chan sites with bots advertising anontalk. Many people wondered, "Was this guy sodomized by moot as a child or something?" There have been several incidents and skirmishes between AT and *chan due to those issues, spamming on both sides. During the Chanapocalypse, anontalk was hit decently hard by 4chan's /b/ but they also inflicted losses on the /b/ raiders. The bots still continue to spam *chan; Sysop continues to rule like a tyrant and does not relinquish control (or lessen it). Therefore, we must attack his site to prevent this threat from growing further. A raid will be commenced, lead by 4chan's /b/, as well as any /i/nsurgents who also participate in this battle.

Regarding anontalk. AnonTalk and kimmoa.se are hosted on the same computer on a high speed home connection (as opposed to professional hosting or leased servers). KimmoA is in fact a known Swedish e-mail spammer and his real name is Kimmo Alm. He resides in Stockholm.

  • Update* On Dec. 13, 2008, Epic win was achieved by the collapse of anontalk.com. Have some Cake.

The site was down for approximately one week, resulting in plenty of L-O-L corruption.

They are currently up again. Perhaps it's time for an 'aftershock'?

Looks like they're down again...

DDoS tools

Some of the many DDoS tools you can to to fight this cancer is the Longcat Flooder. Longcat Flooder is a multi-protocol flooding tool written during the Subeta raids, by the same creator as the newer bandwidth raeping tool, BWRaeper.NET. It quickly became popular amongst Anonymous due to its simplicity in use and powerful features. The protocols supported are TCP (SYN flooding), UDP and HTTP.

Research has shown that SYN and UDP provide the best results. However, using the HTTP flooder can be useful in several situations:

  • Web server with limited bandwidth
  • Web server with limited CPU power
  • Website with search URLs

Constantly flooding a URL where a search or other heavy SQL command gets executed has proven to be destructive during the Subeta raid. Only several Longcat Flooders were needed to take down the MySQL database when executing search commands.

There are two different types of Longcat Flooder out there. One is a standalone version and one is a distributed version relying on a central server to provide raep information. The current version of the standalone version of the Longcat Flooder is v2.3 Final. The current version of the distributed version of the Longcat Flooder Client is 3.0 Beta. The Longcat Flooder Server has version 1.0.

CopyPasta to spread

To make it a little harder to trace yourself, change your MAC address, find somebody else's unprotected Wi-Fi, and attack. MAC changer in the Dangerous Kitten Pack <http://i33.tinypic.com/2diiz5s.jpg>. Details at <http://i37.tinypic.com/63ytub.jpg>. W/i/ki at <http://partyvan.info/index.php?title=Operation_AntFuck>. Make sure to keep the www, or it is useless. Newfags, read <http://partyvan.info/index.php> and <http://www.mediafire.com/?353ge2yzm2e> to learn more. AND REMEMBER RULES 1 AND 2 OF THE INTERNET, NO MATTER WHAT. kthxbye.

Using Longcat Flooder

Everybody's pretty sure that AnT runs on mySQL, and they have a deep search function. Just flood the URL for a deep search for one letter (such as "a") in order to overload their mySQL server.

Upon trying this I get 403ed after 2+ searches and need to get a new IP to do it again, they probably upgraded their ram. Any ideas ?

-1337 hackers on steroids could write a program that basically fakes a connection from a random IP, IE: computer on 192.146.28.93 Sends a SYN that looks like it's from 1.1.1.1, then sends an ACK that looks like it's from 1.1.1.1, then sends the TCP packets that call the search function. So pretty much spoof the whole sequence.

DOX

After tracing Sysop's phone number (he is the admin of AT) we managed to get his address. If moar is found, then post it here.

Supposed pic of Kimmo

http://img139.imageshack.us/img139/9417/kimmoavt3cj3.jpg

Address:
Gunlög Alm
08-97 29 34
Elsa beskows gata 21
12955 HÄGERSTEN

Phone
+46 (0)8-972934

Email and shit
kimmoa@gmail.com
kimmoalm@hotmail.com
ICQ 34099478

Bank account:
BIC/SWIFT: NDEASESS IBAN: SE5530000000032473805199

It's Dangerous to go alone! Take this.

http://i33.tinypic.com/2diiz5s.jpg