By AntiSec Productions NO©™





Share by #OpHackStorm #OpShitStorm Joint-Venture for LULZ

Anonymous/#Tutorials

Welcome. This is a list of the current tutorials from the AnonOps IRC.



BASIC ANONYMITY/PRIVACY

Before you get into the IRC, You will need to learn how to hide yourself. VPNs and Proxys are most popular but some use Tor for their browsers. Tor is blocked in AnonOps because of abuse.

Popular VPNs are :

http://vpntunnel.se [Secure, fast and accepts UKash]

http://swissvpn.net [Popular, fast]

☢☢☢ ☠ ☢☢☢ ☠ ☢☢☢ Feel free to add more ☢☢☢ ☠ ☢☢☢ ☠ ☢☢☢

Tor project link :

http://torproject.org

https://www.torproject.org/docs/installguide.html

Tor on Linux Tutorial :

http://bit.ly/ik50kW

Tor on OS X Tutorial [Video] :

http://bit.ly/jaoKxS

Privoxy :

http://www.privoxy.org/

Documentation: http://www.privoxy.org/user-manual/index.html

Check user-agent: http://whatsmyuseragent.com/

I2P :

http://bit.ly/78At2Y

Ethical Hacking :

http://bit.ly/qKQaQf

Anonymous/Disposable emails :

http://www.email-wgwerf.de/wegwerfemail-liste.html

http://www.yopmail.com

AnonTiny

Windows only communication package for tor, with the ability to host a hidden IRC or WEB server : Includes a tinyC compiler and a LOLCODE interpreter

http://bit.ly/qhC55s

HACKING AND ATTACKING

Anonymous and its groups use lots of ways to attack websites, servers and computers. Here is a list of tutorials found and made by people in #Tutorials.

A few books on hacking :

Hacking exposed 2011 :

http://bit.ly/pC8PWl

Hacking Exposed Web Applications :

http://tinyurl.com/5shry2p

Hackers Under Ground Handbook :

http://tinyurl.com/6zr6yvw

Hacking Exposed Linux Third Edition :

http://tinyurl.com/6hkj7jh





How to exploit a site with XML bug :

http://bit.ly/nAiOIf

Javascript trojan installer

***You just need to edit the source code for your website, and .exe for your trojan***

http://bit.ly/oBhdOe

SQLi Hacking

http://bit.ly/j6LQ3W

Slow Posting with Pyloris

http://bit.ly/jM3mLu

Google Hacking For Penetration Testers Johnny Long:

http://bit.ly/ebf6q3 Volume 1

http://bit.ly/ljyySd Volume 2

Intersting Tools for Windows :

Fiddler - decrypt / intercept SSL and capture web-traffic

http://www.fiddler2.com/fiddler2/

Nmap

http://bit.ly/qUrrTd

Misc. Tools

http://bit.ly/1o5cov

Metasploit Meterpreter

http://bit.ly/n9H1ke

Oracle Security

http://bit.ly/qHJebW

XSS

http://bit.ly/1bqjvv

SQl Injection

http://bit.ly/qWWaW7





ADVANCED ANONYMOUS DEFENCE

Ok, As noted at the beginning, VPNs and Proxy are crucial to your online security. Follow these tips and you should be fine :)



1) Get your VPN and Proxy now.

2) Make sure you ALWAYS use your VPN and Proxy.

3) Clear your HDD’s every month or so (This makes sure you are never in a botnet and your secure.



4) Get TrueCrypt!! Google it and use it.

(Hidden OS in truecrypt http://pastebin.com/rm43fJjK )



5) Configure ALL or most of your programs to only work under a proxy or VPN.



If you ever need or want to request a tutorial, then join our IRC (above) and our channel #Tutorials and ask, We will try our best :)

By AntiSec Productions NO©™





Share by #OpHackStorm #OpShitStorm Joint-Venture



Putting toys in the hands of Boys



#Anonymous #H4ck3rz

Will Prepare You to Share chaos & mayhem for #LulzWar





☣ I’m a Pirate ☠



I am a 21st century Revolutionary, liberating files from the English, capitalist overlords.



☢☢☢ ☠ ☢☢☢ ☠ ☢☢☢



Long live the ones who dare..



UNITED AS ONE DIVIDED BY ZERO #WeAreLegion #SailStrong



☠SHARE ☠SHARE ☠SHARE ☠SHARE ☠SHARE



☠SHARE ☠SHARE ☠SHARE ☠SHARE ☠SHARE