luv2drnkbr (OP)
|
|
September 11, 2013, 07:21:36 AM |
|
I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)
Does anybody have some torrents or other links to something best suited for this purpose.
|
|
|
|
greyhawk
|
|
September 11, 2013, 08:18:51 AM |
|
I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)
Does anybody have some torrents or other links to something best suited for this purpose.
http://www.downloadstuffserversite.org/howtogetbuttfucked4freeinguantanamo.txt
|
|
|
|
r3wt
|
|
September 11, 2013, 09:14:25 AM |
|
Just encrypt a jpg of Rick Astley => Rickroll the NSA.
fucking genius. you sir are awesome.
|
My negative trust rating is reflective of a personal vendetta by someone on default trust.
|
|
|
b!z
Legendary
Offline
Activity: 1582
Merit: 1010
|
|
September 11, 2013, 10:43:31 AM |
|
Zeus, Carberp source are available for download on the web. SpyEye and many other banking trojan builders have been cracked. Enjoy your stay in Guantanamo Bay.
PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things.
|
|
|
|
pgbit
Sr. Member
Offline
Activity: 771
Merit: 258
Trident Protocol | Simple «buy-hold-earn» system!
|
|
September 11, 2013, 10:46:21 AM |
|
Zeus, Carberp source are available for download on the web. SpyEye and many other banking trojan builders have been cracked. Enjoy your stay in Guantanamo Bay.
PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things.
Rickrolling will be made illegal!
|
| . SECONDLIVE | | | │ | | | | | | │ | | | ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ S T A K E L I T T L E W I N B I G ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ | ▄▄███████▄▄▄ ▄▄████████████████▄▄ ██████████████████████▄ ████████▀▀▀██████████████ ███████▌ ▀█████████████ ████████▀ ▀▀▄▄██▀▀▀██████████ ███████ ▀████████ ███████▄ ████████ ████████▄▄ ▄████████ ███████████▄▄▄▄██████████ ▀█████████████████████▀ ▀████████████████▀▀ ██████████████████████ |
|
|
|
surebet
|
|
September 11, 2013, 10:49:40 AM |
|
|
|
|
|
luv2drnkbr (OP)
|
|
September 11, 2013, 12:27:36 PM |
|
. ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!.... . PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things. Well it's more a form of protest, and also I'm assuming a lot of the process might be automated. I don't really expect them to fall for it though, it's more a "fuck you" than anything else. Also, I think they'd have an interesting time trying to show to a court that me sending an encrypted attachment to a MY friends via MY e-mail account counts as "doing something malicious" with malware.
|
|
|
|
Mooshire
|
|
September 11, 2013, 12:29:08 PM |
|
Your avatar makes me happy
|
|
|
|
luv2drnkbr (OP)
|
|
September 11, 2013, 12:36:03 PM |
|
Your avatar makes me happy
Haha, thanks
|
|
|
|
surebet
|
|
September 11, 2013, 01:16:47 PM |
|
ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!....
What reason did you put in for your access request?
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
September 11, 2013, 02:02:01 PM |
|
I used to keep a "virus zoo". They were all floppies locked up in a cage. I got a couple now from my office but every anti-virus can easily tag it. Pretty sure I can make some neato malware custom made trojan now that instantly nukes your drive (assuming it's windows) when executed.
I don't think this will work though, because what will happen is they will store the email and the files, but never open them or run the executables.
|
|
|
|
b!z
Legendary
Offline
Activity: 1582
Merit: 1010
|
|
September 11, 2013, 03:14:01 PM |
|
ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!....
What reason did you put in for your access request? Probably "i want to troll the NSA". VXShare is mostly full of crap, nothing useful anyways :-)
|
|
|
|
BitBlitz
Sr. Member
Offline
Activity: 285
Merit: 250
Turning money into heat since 2011.
|
|
September 11, 2013, 03:37:18 PM |
|
From the book of old school: Create a HUGE file that just consists of one character repeated over and over (think /dev/zero piped into a 100G file). It will compress down to a few bytes when zipped, but any system expanding/decrypting it will be consuming a lot of resources.
|
I see the value of Bitcoin, so I don't worry about the price...
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
September 12, 2013, 12:08:53 AM |
|
From the book of old school: Create a HUGE file that just consists of one character repeated over and over (think /dev/zero piped into a 100G file). It will compress down to a few bytes when zipped, but any system expanding/decrypting it will be consuming a lot of resources.
You just described the zip bomb, and most modern extractors can easily detect this and not continue. The updated method is to zip one of these giant babies, then to copy them multiple times to another zip file, then to copy those multiple times to another zip file, and you nest them very deep for a combined total size exceeding most hard drive capacities. But, like I said, most modern archivers and extractors will detect this.
|
|
|
|
01BTC10
VIP
Hero Member
Offline
Activity: 756
Merit: 503
|
|
September 12, 2013, 12:12:57 AM |
|
It won't work. It's not like it's their first infected file. If you put this string in a file and rename it to exe it will be detected as a virus by all AV: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
|
|
|
|
Nixsy
|
|
September 12, 2013, 12:13:35 AM |
|
open a text document and add this X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* save the file with the extension .exe This is not a malicious file but should trigger any antivirus as being malicious. "The file is a legitimate DOS program, and produces sensible results when run (it prints the message "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!")." http://www.eicar.org/86-0-Intended-use.html
|
|
|
|
01BTC10
VIP
Hero Member
Offline
Activity: 756
Merit: 503
|
|
September 12, 2013, 12:15:30 AM |
|
lol, I ninja edited my post while you were writing yours.
|
|
|
|
Nixsy
|
|
September 12, 2013, 12:20:21 AM |
|
damnit .. made me look like I copied your stuff..
I know !!!
I forked it.
This 360 second delay business it like hammering six inch nails into a 2 x 4, Repetitive but I will get there in the end.
|
|
|
|
BitBlitz
Sr. Member
Offline
Activity: 285
Merit: 250
Turning money into heat since 2011.
|
|
September 12, 2013, 01:24:25 AM |
|
You just described the zip bomb, and most modern extractors can easily detect this and not continue.
The updated method is to zip one of these giant babies, then to copy them multiple times to another zip file, then to copy those multiple times to another zip file, and you nest them very deep for a combined total size exceeding most hard drive capacities.
But, like I said, most modern archivers and extractors will detect this.
The reality is that nothing mentioned here would do what the OP wants.. .....Like the NSA is just going to run every executable they find as root/admin
|
I see the value of Bitcoin, so I don't worry about the price...
|
|
|
Kluge
Donator
Legendary
Offline
Activity: 1218
Merit: 1015
|
|
September 12, 2013, 01:38:50 AM |
|
Hm... Is there any software to generate "multiple-outcome" encrypted text or other documents? It would have multiple hashes to "solve," but only one would be legitimate.
For example passw0rd would give: Hey, there. I lost your most recent pubkey. Would you mind sending it over, again?
while a3nomalym@@kZer39jooL would give: Hey, there. Ready to bomb X embassy in PleaseDon'tRaidMyHouse-istan?
Would be similar to Truecrypt's ability to give "fake" information with certain passwords. This could be useful as an added layer in case a PGP privkey is compromised, for example. I'd guess the initial password key(chain) would have to be given in a very private manner, like in a face-to-face kind of way, then entered with a randomly-scrambling virtual keyboard offline.
|
|
|
|
|