AnonTalk
UP AGAIN
TAKE HIM DOWN FOREVER
GUISE HE WANTS DONATIONS YET AGAIN! so go send him some!
STATUS BLOG: http://anonym.to/http://ant-news.blogspot.com/ <<< BLOG REMOVED, FAGGOT BLOGSPOT.
RECENT DEVELOPMENTS
AnonTalk is currently hosted on a co-located server in the Netherlands, here is the website for the data-center. Feel free to report the pedophilic content on AnonTalk to them.
Kimmo Alm no longer hosts the website from his home, he wants a better up-link / firewall to some what resist DDoS attacks. He is in debt for hundreds of dollars as he has been mailing his server to different data-centers across the world to find that the majority will not allow Anontalk to be hosted there.
Anontalk will eventually kill itself, as long as it receives little traffic and donations. However you can speed up the process and depress the creator, by spamming Anontalk (the website & email addresses), DDoSing it and reporting to the police.
Where to report:
- AnonTalk's current ISP (Russian)
- Internet Watch Foundation
- Dyżurnet - Polish users can send CP complaints here
- ASACP
- itbrott@rkp.police.se
- childabuse@rkp.police.se
- polismyndigheten.stockholm@polisen.se
- for norwegian users
- Anonymous |
- Anonymous |
WTF ANONTALK

- Anonymous |
The myriad *chan sites has a history of being free and open, not being full of moralfags and all that. A person was fed up with some of the parts of the culture that he disagreed with (*chan memes, etc.) That person, who calls himself 'Sysop' (also known as Anonymous 47ae211000a6a8.34833955) was fed up with some of the bans committted by some of the *chan sites, which he disagreed with and considered 'wrong'. He wanted to make his own anonymous textboard, that would be relatively free of chan memes and references and discuss things in more 'formal' ways. He originally was relatively slow on blocking words, and was lax in his administration. Unfortunately, due to various reasons he went fucking NAZI (over time) and banned anyone using a chan meme or reference, nimped random innocents, and began spamming several chan sites with bots advertising anontalk. Many people wondered, "Was this guy sodomized by moot as a child or something?" There have been several incidents and skirmishes between AT and *chan due to those issues, spamming on both sides. During the Chanapocalypse, anontalk was hit decently hard by 4chan's /b/ but they also inflicted losses on the /b/ raiders. The bots still continue to spam *chan; Sysop continues to rule like a tyrant and does not relinquish control (or lessen it). Therefore, we must attack his site to prevent this threat from growing further. A raid will be commenced, lead by 4chan's /b/, as well as any /i/nsurgents who also participate in this battle.
Regarding anontalk. AnonTalk and kimmoa.se are hosted on the same computer on a high speed home connection (as opposed to professional hosting or leased servers). KimmoA is in fact a known Swedish e-mail spammer and his real name is Kimmo Alm. He resides in Stockholm.
- Update* On Dec. 13, 2008, Epic win was achieved by the collapse of anontalk.com. Have some Cake.
The site was down for approximately one week, resulting in plenty of L-O-L corruption.
They are currently up again. Perhaps it's time for an 'aftershock'?
Looks like they're down again...
Nope they're up again.
DDoS tools
Some of the many DDoS tools you can to to fight this cancer is the Longcat Flooder. Longcat Flooder is a multi-protocol flooding tool written during the Subeta raids, by the same creator as the newer bandwidth raeping tool, BWRaeper.NET. It quickly became popular amongst Anonymous due to its simplicity in use and powerful features. The protocols supported are TCP (SYN flooding), UDP and HTTP.
Research has shown that SYN and UDP provide the best results. However, using the HTTP flooder can be useful in several situations:
- Web server with limited bandwidth
- Web server with limited CPU power
- Website with search URLs
Constantly flooding a URL where a search or other heavy SQL command gets executed has proven to be destructive during the Subeta raid. Only several Longcat Flooders were needed to take down the MySQL database when executing search commands.
There are two different types of Longcat Flooder out there. One is a standalone version and one is a distributed version relying on a central server to provide raep information. The current version of the standalone version of the Longcat Flooder is v2.3 Final. The current version of the distributed version of the Longcat Flooder Client is 3.0 Beta. The Longcat Flooder Server has version 1.0.
CopyPasta to spread
To make it a little harder to trace yourself, change your MAC address, find somebody else's unprotected Wi-Fi, and attack. MAC changer in the Dangerous Kitten Pack <http://i33.tinypic.com/2diiz5s.jpg>. Details at <http://i37.tinypic.com/63ytub.jpg>. W/i/ki at <http://partyvan.info/index.php?title=Operation_AntFuck>. Make sure to keep the www, or it is useless. Newfags, read <http://partyvan.info/index.php> and <http://www.mediafire.com/?353ge2yzm2e> to learn more. AND REMEMBER RULES 1 AND 2 OF THE INTERNET, NO MATTER WHAT. (They apply everywhere asshole, check ED.) kthxbye.
Using Longcat Flooder
Anontalk runs on PostgreSQL (confirmed), and they have a deep search function. Just flood the URL for a deep search for many letters (such as "AkXjccHSddJ") in order to waste CPU time.
-1337 hackers on steroids could write a program that basically fakes a connection from a random IP, IE: computer on 192.146.28.93 Sends a SYN that looks like it's from 1.1.1.1, then sends an ACK that looks like it's from 1.1.1.1, then sends the TCP packets that call the search function. So pretty much spoof the whole sequence.
^^^^^^^^^^ No. lrn2tcp/ip.
Anontalk's ban system works something like this: 1. Check for banned IP address 2. Check for banned host-name (If those checks returned false, it will continue) 3. Check to see if user is using an open proxy (see if ports serving HTTP are open, such as 80, 8080, 3128)
However open proxy detection is negated if the user's first post was made longer than a few hours ago. Making the server perform these resourceful tasks is easy, just make a post.
DOX
After tracing Sysop's phone number (he is the admin of AT) we managed to get his address. If moar is found, then post it here.
Supposed pic of Kimmo
http://img139.imageshack.us/img139/9417/kimmoavt3cj3.jpg
ID:
Name: Kimmo Alm
Gender: Male
Burfday: 01.08.1985
Age: 23
Address:
Gunlög Alm
08-97 29 34
Elsa beskows gata 21
12955 HÄGERSTEN
Phone
+46 (0)8-972934
Contact
kimmoa@gmail.com
kimmoalm@hotmail.com
ICQ#:34099478
http://www.kimmoa.se/ DONT PLAY THE GAMES ON HIS SITE MOTHERFUCKER
Bank account:
BIC/SWIFT: NDEASESS
IBAN: SE5530000000032473805199