Evo moj mali doprinos "for the righteous cause" ;)
Code:
RFC: 31337
OWNING PEOPLE PROTOCOL
H0NO INTERNET PROGRAM
PROTOCOL SPECIFICATION
December 2004
prepared for
Defense Advanced Research Projects Agency
Lamers on #darknet && #blackhat && IRC
by
core h0no staff
PREFACE .......................................................... 3
1. INTRODUCTION ..................................................... 1
1.1 Motivation .................................................... 3
1.2 Scope ......................................................... 3
2. OWNING PROTOCOL................................................... 7
2.1 Defining Hacking a System ..................................... 3
2.2 Model of Operation ............................................ 1
2.3 Actual owning technique ....................................... 3
2.4 Cleaning up ................................................... 3
3. CLOSING STATEMENT.................................................. 7
3.1 Telling the parents ........................................... 3
3.2 Bragging rights ............................................... 1
PREFACE
This document describes the H0NO Standard Owning People Protocol. It was
implemented by Dr. Zeus Procaeus & the spirit of my dead cat.
SnowBall II
Editor
RFC: 31337
Replaces: RFC *
OWNING PEOPLE PROTOCOL
DARPA INTERNET PROGRAM
PROTOCOL SPECIFICATION
1. INTRODUCTION
The Owning People Protocol (OPP) is intended for use as a highly reliable
hacker-to-hacker attacking protocol between computer hackers in a packet-
switched alternate reality.
1.1. Motivation
Computer communication systems are playing an increasingly important
role in military, government and child porn trading environments. This
document focuses the attention on you, the hacker. So heres your motivation,
your 19 years old, I raped your sister, fucked your mother, read your email
and you guessed it - wrote your root password in blackmarker on the wall.
Motivated enough? good.
1.2 Scope
We recommend any with laser sights and night vision, perfect for picking off
whitehats at night.
2. OWNING PROTOCOL
What follows is an indepth discussion on OOP, get out your Sybex course material
and begin studying up - this could save your life one day.
2.1 Defining Hacking a System
Hackers have debated what is a hacker for many years, but what is actually
hacking a system? Hacking the system is done by h0no with a magic wand, which
was given to us by harry potter. So fucking fear us, but you can be classed
as having read write or execute on some level or another, perhaps you maybe
on the lowest level (with bx and dvdman) and actually be a small ascii penis.
The next section shows this in a cute ascii diagram from this foxy bitch
down at the DoD (We fucked her for passwords).
2.2 Model of operation
+---------------------+
|srwx h0no eliteness |
+---------------------+
|????-rwx------ root |
+---------------------+
|????----rwx--- group |
+---------------------+
| 8=========> you |
+---------------------+
As you can see, at the top of the diagram is h0no, just below that is root,
root is actually pretty cool and to own someone you gotta be root, everywhere
they have an account and at their homes - you will be root.Beneath that is
group, at this level you should have an account on their box and finally at the
bottom is you, an ascii penis which looks almost like dvdman if you stand it
on its side.
2.3 Actual Owning technique
Actual owning technique varies, h0no just wave our wands and we instantly obtain
the h0no srwx flags to all the user's life and personal data. It is a cool wand
that only dark wizards can get if they bully harry potter at school. As you
are probably whitehat or cop you only know how it feels to be bullied at school.
So to help you understand the wand, here is a datagram from our wang.
OOP Header Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Victims ICQ No | Victims AIM Name |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Victims IRC whois and channels |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved for more info |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | |O|W|N|E|D|!| |
| Quotes| Pictures |!|O|W|N|E|D| Data of family |
| | |X|X|X|X|X|X| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| h0no commands | Nakid pictures |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| All the victims warez | Padding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Izzy Wizzy lets get busy |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2.4 Cleaning up
Now that you have finished waving your wand and have complete control of the
persons systems and life, we need to clean up. To do this type the following
command on all systems.
"rm -rf /*"
3. CLOSING STATEMENT
3.1 Telling the parents
After you have followed OOP you will have one very distressed kiddy to deal with,
at this point we recommend contacting the genetic ancestors of the creature. H0no
likes to do this personally, over the phone. Also it is wise to flyer all neighbouring
houses with a leaflet saying that the hacker is a convicted paedophile. A typical
phone call to the parents of such an hacker goes like this.
<RING>
h0no "YOUR SON JON PLAYS WITH HIS PENIS ON THE INTERNET FOR MONEY!"
MOM "OMG HE DOES WHAT NOW?!?"
3.2 Bragging rights
This is the most important part of the OOP, you need to boast about your conquests to
all the other hackers in the world so everyone who hears your name trembles in fear
and does not want to play around with you. Because your a psycho. Who will call their
Mom's. We recommend boasting in any of the channels shown in dvdman's whois for
maximum attention.