Showing posts sorted by relevance for query Hydra. Sort by date Show all posts
Showing posts sorted by relevance for query Hydra. Sort by date Show all posts

THC-HYDRA 6.4 is Now Available



One of the most famous network logon cracker – THC-HYDRA, has been updated. We now have THC-HYDRA version 6.4!
THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and securityconsultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux,Windows/Cygwin, Solaris, FreeBSD and OSX.

Changelog for thc-hydra v6.4

Update SIP module to extract and use external IP addr return from server error to bypass NAT
Update SIP module to use SASL lib
Update email modules to check clear mode when TLS mode failed
Update Oracle Listener module to work with Oracle DB 9.2
Update LDAP module to support Windows 2008 active directory simple auth
Fix to the connection adaptation engine which would loose planned attempts
Fix make script for CentOS, reported by ya0wei
Print error when a service limits connections and few pairs have to be tested
Improved Mysql module to only init/close when needed
Added patch from the FreeBSD maintainers
Module usage help does not need a target to be specified anymore
configure script now honors /etc/ld.so.conf.d/ directory


Download THC-HYDRA v6.4 (hydra-6.4-src.tar.gz)  here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

HYDRA V6.3 RELEASED WITH ORACLE & SNMP-ENUM


A very fast network logon cracker which support many different services. Have a look at the feature sets and services coverage page – including a speed comparison against ncrack and medusa! Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.
Version 6.x was tested to compile cleanly on Linux, Windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX.

CHANGELOG for 6.3
  • * Added patch by Petar(dot)Kaley(at)gmail.com which adds nice icons to cygwin hydra files
  • * Added patch by Gauillaume Rousse which fixes a warning display
  • * New Oracle module (for databases via OCI, for TNS Listener passwd, for SID enumeration)
  • * New SMTP user enum module (using VRFY, EXPN or RCPT command)
  • * Memory leak fix for -x bruteforcing option reported by Alex Lau
  • * Fix for svn module, for some versions it needs one more lib, thanks to the Debian team for reporting!
  • * Fix ssh module, on connection refused a credential could be lost
  • * Fix http-form module, a redirect was not always followed
  • * QA on all modules for memory leaks
  • * Better gtk detection (to not even try xhydra compilation when its useless)
  • * First blant attempt for configuring to x64 systems (Linux and *BSD)
  • * Updated network password cracker comparison on the web page (for hydra and ncrack updates)
  • * Indented all source code
The source code of state-of-the-art Hydra: hydra-6.3-src.tar.gz
(compiles on all UNIX based platforms – even MacOS X, Cygwin on Windows, ARM-Linux, etc.)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA v6.5


THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX

New Features of THC Hydra v6.5:-
  • Added dpl4hydra script by Roland Kessler, which creates a default password for a device. Thanks!
  • Improved HTTP form module: getting cookie, fail or success condition, follow multiple redirections, support cookie gathering URL, multiple user defined headers
  • Added interface support for IPv6, needed for connecting to link local fe80:: addresses. Works only on Linux and OS/X. Information for Solaris and *BSD welcome
  • Added -W waittime between connects option
  • The -x bruteforce mode now allows for generated password amounts > 2 billion
  • Fix if -L was used together with -x
  • Fixes for http- modules when the http-…://target/options format was used
  • Fixed a bug in the restore file write function that could lead to a crash
  • Fixed XMPP module jabber init request and challenge response check, thx “F e L o R e T”
  • Fix: if a proxy was used, unresolveable targets were disabled. now its fine
  • Fix for service://host/ usage if a colon was used after the URI without a port defined


Download THC-HYDRA v6.5 (hydra-6.5-src.tar.gz)
here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA Updated Version 7.2 Released

THC-HYDRA Updated Version 7.2 Released 

Earlier we have discussed many times about THC-HYDRA. Now the developer officially released the updated version of the world's one of the most fastest login cracker Ver 7.2. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX. Additional information can be found here

Official Change Log:- 
  • Speed-up http modules auth mechanism detection
  • Fixed -C colonfile mode when empty login/passwords were used (thanks to will(at)configitnow(dot)com for reporting)
  • The -f switch was not working for postgres, afp, socks5, firebird and ncp, thanks to Richard Whitcroft for reporting!
  • Fixed NTLM auth in http-proxy/http-proxy-url module
  • Fixed URL when being redirected in http-form module, thanks to gash(at)chaostreff(dot)at
  • Fix MSSQL success login condition, thanks to whistle_master(at)live(dot)com
  • Fix http form module: optional headers and 3xx status redirect, thx to Gash
  • Fix in configure script for –prefix option, thanks to dazzlepod
  • Update of the dpl4hydra script by Roland Kessler, thanks!
  • Small fix for hydra man page, thanks to brad(at)comstyle(dot)com

To Download THC-HYDRA 7.2 Click Here


 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA ver7.0 (Network Logon Cracker)


THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX.

Official change log for THC-HYDRA v7.0:-

  • New main engine for hydra: better performance, flexibility and stability
  • New option -u – loop around users, not passwords
  • Option -e now also works with -x and -C
  • Added RDP module, domain can be passed as argument
  • Added other_domain option to smb module to test trusted domains
  • Small enhancement for http and http-proxy module for standard ignoring servers
  • Lots of bugfixes, especially with many tasks, multiple targets and restore file
  • Fixes for a few http-form issues
  • Fix smb module NTLM hash use
  • Fixed Firebird module deprecated API call
  • Fixed for dpl4hydra to work on old sed implementations (OS/X …)
  • Fixed makefile to install dpl4hydra (thx @sitecrea)
  • Fixed local buffer overflow in debug output function (required -d to be used)
  • Fixed xhydra running warnings and correct quit action event
 To download THC-HYDRA ver7.0 Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-IPv6 Attack Toolkit, A Tool to Attack the Inherent Protocol Weaknesses of IPV6 & ICMP6


THC-IPv6 Attack Toolkit, A Tool to Attack the Inherent Protocol Weaknesses of IPV6 & ICMP6

German hackers group, widely known as THC -The Hacker's Choice released an comprehensive attack toolkit for the IPv6 protocol suite named 'THC-IPv6 Attack Toolkit'. THC is the first group who is releasing such attacking tool for IPv6 protocol. According to the release note this is  a complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. 

Features at a Glance:- 
  • parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite)
  • alive6: an effective alive scanng, which will detect all systems listening to this address
  • dnsdict6: parallized dns ipv6 dictionary bruteforcer
  • fake_router6: announce yourself as a router on the network, with the highest priority
  • redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer
  • toobig6: mtu decreaser with the same intelligence as redir6
  • detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan these systems etc.
  • dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on the network (DOS).
  • trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
  • flood_router6: flood a target with random router advertisements
  • flood_advertise6: flood a target with random neighbor advertisements
  • exploit6: known ipv6 vulnerabilities to test against a target
  • denial6: a collection of denial-of-service tests againsts a target
  • fuzz_ip6: fuzzer for ipv6
  • implementation6: performs various implementation checks on ipv6
  • implementation6d: listen daemon for implementation6 to check behind a fw
  • fake_mld6: announce yourself in a multicast group of your choice on the net
  • fake_mld26: same but for MLDv2
  • fake_mldrouter6: fake MLD router messages
  • fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
  • fake_advertiser6: announce yourself on the network
  • smurf6: local smurfer
  • rsmurf6: remote smurfer, known to work only against linux at the moment
  • sendpees6: a tool by willdamn(ad)gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice.
  • thcping6: sends a hand crafted ping6 packet [and about 25 more tools for you to discover]
For detailed information about the usage, library interface & so on click here. To Download THC-IPv6 Attack Toolkit Click Here (Linux Only). For those who are hearing the name THC first time, we want to give you reminder that before this tool, this German hackers group published few other hack tools like Hydra (Fastest Login Cracker), THC SSL Dos and so on. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Infondlinux: Install Useful Security Tools and Firefox Addons!



infondlinux is a script that installs most of tools, that we use during penetration tests and capture the flag tournaments. It is a post configuration script for Ubuntu Linux. We can also install it on other *nix system but not all of the below mentioned tools may work depending on environment. It has been actively tested on Ubuntu 10.10.
It installs useful security tools and Firefox addons. Tools installed by script are listed at the beginning of source code, which we can edit as per our requirement.
List of security tools included:
Debian packages:

  • imagemagick
  • vim
  • less
  • gimp
  • build-essential
  • wipe
  • xchat
  • pidgin
  • vlc
  • nautilus-open-terminal
  • nmap
  • zenmap
  • sun-java6-plugin et jre et jdk
  • bluefish
  • flash-plugin-nonfree
  • aircrack-ng
  • wireshark
  • ruby
  • ascii
  • webhttrack
  • socat
  • nasm
  • w3af
  • subversion
  • mercurial
  • libopenssl-ruby
  • ruby-gnome2
  • traceroute
  • filezilla
  • gnupg
  • rubygems
  • php5
  • libapache2-mod-php5
  • mysql-server
  • php5-mysql
  • phpmyadmin
  • extract
  • p0f
  • spikeproxy
  • ettercap
  • dsniff :
    • arpspoof Send out unrequested (and possibly forged) arp replies.
    • dnsspoof forge replies to arbitrary DNS address / pointer queries on the Local Area Network.
    • dsniff password sniffer for several protocols.
    • filesnarf saves selected files sniffed from NFS traffic.
    • macof flood the local network with random MAC addresses.
    • mailsnarf sniffs mail on the LAN and stores it in mbox format.
    • msgsnarf record selected messages from different Instant Messengers.
    • sshmitm SSH monkey-in-the-middle. proxies and sniffs SSH traffic.
    • sshow SSH traffic analyser.
    • tcpkill kills specified in-progress TCP connections.
    • tcpnice slow down specified TCP connections via “active” traffic shaping.
    • urlsnarf output selected URLs sniffed from HTTP traffic in CLF.
    • webmitm HTTP / HTTPS monkey-in-the-middle. transparently proxies.
    • webspy sends URLs sniffed from a client to your local browser
  • unrar
  • torsocks
  • secure-delete
  • nautilus-gksu
  • sqlmap
Third party packages:
  • tor
  • tor-geoipdb
  • virtualbox 4.0
  • google-chrome-stable
Manually downloaded software’s and versions:
  • DirBuster (1.0RC1)
  • truecrypt (7.0a)
  • metasploit framework (3.6)
  • webscarab (latest)
  • burp suite (1.3.03)
  • parosproxy (3.2.13)
  • jmeter (2.4)
  • rips (0.35)
  • origami-pdf (latest)
  • pdfid.py (0.0.11)
  • pdf-parser.pym (0.3.7)
  • fierce (latest)
  • wifite (latest)
  • pyloris (3.2)
  • skipfish (1.86 beta)
  • hydra (6.2)
  • Maltego (3.0)
  • SET
Author made scripts:
  • hextoasm
  • md5crack.py (written by Corbiero)
  • chartoascii.py
  • asciitochar.py
  • rsa.py
Firefox extensions:
  • livehttpheaders
  • firebug
  • tamperdata
  • noscript
  • flashblock
  • flashgot
  • foxyproxy
  • certificatepatrol
  • chickenfoot 1.0.7
Pretty good list of applications we must say.
How to install?
1
sudo infondlinux.sh
or
1
sh infondlinux.sh
Download infondlinux v0.5 (infondlinux.sh) here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Patator -A Multi-Purpose Brute-Forcer


Earlier we have several times talked about Brute forcer tool like THC-Hydra, Cain & Abel, Rainbow Crack and many more. Today we will discuss about Patator is a multi-purpose brute-forcer, written in pyton language, with a modular design and a flexible usage. Can be modified and rewritten as per our environment requirement. Patator is licensed GPLv2.

Modules Supported:-
ftp_login : Brute-force FTP
ssh_login : Brute-force SSH
telnet_login : Brute-force Telnet
smtp_login : Brute-force SMTP
smtp_vrfy : Enumerate valid users using the SMTP VRFY command
smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
http_fuzz : Brute-force HTTP/HTTPS
pop_passd : Brute-force poppassd (not POP3)
ldap_login : Brute-force LDAP
smb_login : Brute-force SMB
mssql_login : Brute-force MSSQL
oracle_login : Brute-force Oracle
mysql_login : Brute-force MySQL
pgsql_login : Brute-force PostgreSQL
vnc_login : Brute-force VNC
dns_forward : Forward lookup subdomains
dns_reverse : Reverse lookup subnets
snmp_login : Brute-force SNMPv1/2 and SNMPv3
unzip_pass : Brute-force the password of encrypted ZIP files
keystore_pass: Brute-force the password of Java keystore files

Features of Patator:-
  • No false negatives, as it is the user that decides what results to ignore based on:
  • status code of response
  • size of response
  • matching string or regex in response data
  • Modular design
  • not limited to network modules (eg. the unzip_pass module)
  • not limited to brute-forcing (eg. remote exploit testing, or vulnerable version probing)
  • Interactive runtime
  • show verbose progress
  • pause/unpause execution
  • increase/decrease verbosity
  • add new actions & conditions during runtime in order to exclude more types of response from showing
  • Use persistent connections (ie. will test several passwords until the server disconnects)
  • Multi-threaded
  • Flexible user input
  • Any part of a payload is fuzzable:
  • use FILE[0-9] keywords to iterate on a file
  • use COMBO[0-9] keywords to iterate on the combo entries of a file
  • use NET[0-9] keywords to iterate on every host of a network subnet

To Download Patator Click Here 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DEFT 7 RC1 Linux- For Computer & Mobile Forensic


Good news for all those who are passion in cyber forensic. Now you have another Linux distribution named DEFT 7 RC1. Its  is a new concept of Computer Forensic live system that uses LXDE as desktop environment and thunar file manager and mount manager as tool for device management. It is a very easy to use system that includes an excellent hardware detection and the best free and open source applications dedicated to incident response and computer forensics. This can be considered as a very stable DEFT version as it has been duly tested on Lenovo, DELL, ASUS, Acer, Apple, IBM laptops, IBM and DELL servers as well as Acer, Lenovo and Dell desktop PCs. This DEFT Linux release will also add more support for mobile forensics. It now contains several tools that allow you to analyze files and databases used in new generation smartphones (Android and iPhone). There has also been a complete review of reporting functionalities - KeepNote - an excellent tool that allows the logical organization of collected evidences.

Main Features:-
  • Based on Lubuntu 11.10
  • Installable Distro
  • Linux kernel 3.0.0-12, USB 3 ready
  • Libewf 20100226
  • Afflib 3.6.14
  • TSK 3.2.3
  • Autopsy 2.24
  • Digital Forensic Framework 1.2
  • PTK Forensic 1.0.5 DEFT edition
  • Maltego CE
  • KeepNote 0.7.6
  • Xplico 0.7.1
  • Scalpel 2
  • Hunchbackeed Foremost 0.6
  • Findwild 1.3
  • Bulk Extractor 1.1
  • Emule Forensic 1.0
  • Guymager 0.6.3-1
  • Dhash 2
  • Cyclone wizard acquire tool
  • SQLite Database Browser 2.0b1
  • BitPim 1.0.7
  • Bbwhatsapp database converter
  • Creepy 0.1.9
  • Hydra 7.1
  • Log2timeline 0.60
  • Wine 1.3.28

To Download DEFT Linux 7 RC1 Click Here 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Gave Warrig to NATO


Responding to a recent report from the North Atlantic Treaty Organization condemning  Anonymous, the online "hacktivist" group has issued a public response warning the global organization not to challenge it. Claiming that the NATO report singled it out as a threat to "government and the people," Anonymous defended some of its recent actions in the name of freedom and dissent. In its message (Google cached version), it also asserted that NATO fears the group not because it's a "threat to society," but because it's a "threat to the established hierarchy."
Issued last month by Lord Joplin, general rapporteur of NATO, the report warned member nations about the rising threat of "hacktivism," or carrying out cyberattacks for political purposes. Singling out Anonymous, NATO described several of the group's most recent actions, including the distributed denial-of-service attacksagainst MasterCard, Visa, PayPal, Amazon, and others that had cut off services for WikiLeaks.
Noting that Anonymous has become more sophisticated, the NATO report cautioned that it could hack into sensitive government, military, and corporate information and described a strong response against the group. "Today, the ad hoc international group of hackers and activists is said to have thousands of operatives and has no set rules or membership," said the report. "It remains to be seen how much time Anonymous has for pursuing such paths. The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted." In its response, Anonymous tried to soften its stance in parts by saying that it doesn't want to threaten anyone's way of life or terrorize any nation. But it made clear its reaction to NATO's report. "Finally, do not make the mistake of challenging Anonymous," warned Anonymous in its message. "Do not make the mistake of believing you can behead a headless snake. If you slice off one head of Hydra, ten more heads will grow in its place. If you cut down one Anon, ten more will join us purely out of anger at your trampling of dissent." NATO's report also provided a larger look into the growing danger of cyberattacks and how governments should respond to them. In the report, Joplin asked the question of how NATO should react if one of its member nations was the victim of a cyberattack. "Can one invoke Article 5 of the Washington Treaty after a cyber attack?" asked the report. "And what response mechanisms should the Alliance employ against the attacker? Should the retaliation be limited to cyber means only, or should conventional military strikes also be considered? Both the U.S. and the U.K. have recently made their own positions clear--that they consider cyberwarfare another form of warfare, and one potentially subject to a response using conventional military weapons.

 You May also Like this one:- 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Updated BackBox Linux 1.05 is now avilable



BackBox is a Linux distribution based on Ubuntu Lucid 10.04 LTS developed to perform penetration tests and security assessments. Designed to be fast, easy to use and to provide a minimal yet complete desktop environment thanks to its own software repositories always been updated to the last stable version of the most known and used ethical hacking tools.

This is the official change log:
  • New ISO image (32bit & 64bit)
  • System upgrade
  • Performance boost
  • New look and feel
  • Improved start menu
  • Bug fixing
  • Hacking tools new or updated: Firefox 4, Hydra 6.2, Kismet 2011.03.2, Metasploit Framework 3.6.0, NMap 5.51, SET 1.3.5, SqlMap 0.9,  sslstrip 0.8, w3af 1.0-rc5, weevely 0.3, WhatWeb 1.4.7, Wireshark 1.4.5, Zaproxy 1.2, etc.
This BackBox Linux 1.05 features the following upstream components: Ubuntu 10.04, Linux 2.6.32 and Xfce 4.6.1. Slowly, yet surely, this distribution is going to be great!
Download BackBox Linux 1.05 (backbox-1.05-i386.iso) here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpRobinHood By TeaMp0isoN & Anonymous, Thousands Of User Data Stolen From United Nations Server


Hacktivist Anonymous is now teamed up with another hacker group named TeaMp0isoN for their latest campaign Operation RobinHood (#OpRobinHood). As a result more than 1,000 usernames and passwords stolen from a United Nations server. TeamPoison and Anonymous posted an announcement while threatening a series of data breaches and robberies against major banks under the name Operation Robin Hood, which the two groups describe as a continuation of the Occupy Movement protests begun in New York two months ago. 
As a way to strike back against "the banks," TeamPoison and Anonymous will take from the rich and give to the poor through some kind of ill-defined credit-card scam, though it's not clear if the credit cards being targeted will belong to "the banks" or whether Anonymous and TeamPoison plan to make fraudulent charges on consumer credit cards that will indirectly punish the banks backing those cards. 
The stolen username and passwords from the United Nations server was openly posted on a pastebin, later it was removed for violence. 

Anonymous & TeaMp0isoN Official Press Release:-

"#OpRobinHood: TeaMp0isoN and Anonymous 
Hello, we are p0isAnon. Anonymous and TeaMp0isoN have joined forces to fight censorship in the name of OpCensorThis. There is a new operation that has been taking place over the actions of Banks in response to the Occupy Movement. We have watched our brothers and sisters being refused their hard earned money by the banks on top of being beaten and brutalized by officers during peaceful demonstrations. Congratulations banks, you have gotten our attention. 
You ignore your customers and use authorities to censor their voices. Operation Censor This will not stand for such acts and is spawning another operation under Operation Cash Back which already removed well over 500,000 accounts from banks and put them into credit unions. This is the next step. Banks have stolen millions from its customers as well as lacked the security to protect them. We give you Operation Robin Hood. 
In regards to the recent demonstrations and protests across the globe, we are going to turn the tables on the banks. Operation Robin Hood is going to return the money to those who have been cheated by our system and most importantly to those hurt by our banks. Operation Robin Hood will take credit cards and donate to the 99% as well as various charities around the globe. The banks will be forced to reimburse the people there money back.
We are going to take what belongs to us. The Banks have thrown people out on the streets with corrupted actions. When the poor steals, it’s considered violence, but when the banks steal from us, it’s called business. 
We have already taken Chase, Bank of America, and CitiBank credit cards with big breaches across the map. We have returned it to the poor (the TRUE 99%) who deserve it. 
We have donated thousands to many protests around the world. We have donated thousands to the homeless and other charities. Our government has fallen short in many ways. It’s time for the people to step up. We are finished depending on our government to do right by us. How safe can the banks be keeping you when we are easily able to steal thousands already. You have the benefit of us being the good guys.
We are not afraid of the Police, Secret Service, or the FBI. We are going to show you banks are not safe and take our money back. We are going to hit the true evil while not harming theirs customers and helping others. We are not only starving the banks but are ready to start the attack. We have come to take the 99% ‘s money back. We are not asking permission. 


Let’s see how Banks like paying out money like they made us do. Is it called stealing when one takes what was theirs in the first place? Is it called stealing elections when banks are funneling our millions into paying off congressmen and lobbyists. It’s time for the banks to pay for their crimes and corruption. We are not waiting for our government to step up and take action. It’s time for the banks to pay for not protecting you and only causing harm. But why feel sorry for them while they make us pay every day? Make us over pay for their services? Make us pay all their little charges? Operation Robin Hood urges YOU, to now move your accounts into secure credit unions, before it’s too late while we hit them from the inside. 
We are going to make the banks deliver your money back to you with a smile on their faces and hate in their heart. The only fraud happening has been the actions of the banks frauding the people. It’s time for the banks to do business with Anonymous and TeaMp0isoN. And one of us is not as harsh as all of us. We are looking forward to start doing business with you pigs. 
How loud will you squeal when the same is being done to you? We will avenge every person banks turned down and stolen from. Join us in Operation Robin Hood. Take from the banks and give to the poor. Our actions will be swift. It’s time for the people to rise up and the banks to remember who they work for. It’s time we fight back. It’s time YOU take back your freedom. We are done asking politely.
Banks, you have got the attention of the Hydra of the internet that has grown fangs of poison. 
The only question now, is do they expect us? 


We are p0isAnon
We are Robin Hood
We are Legion
We do not forgive
We do not forget
Expect us.


Operation Robin Hood… fully initiated."








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...