Results 1 to 10 of 20
-
25th Oct 2011, 04:05 PM #1OPmmm mmm!
Anonymous attacks kiddieporn websites
From Anonymous
Code:_ __ ___ __ _ | | / /__ / | ________ / / ___ ____ (_)___ ____ | | /| / / _ \ / /| | / ___/ _ \ / / / _ \/ __ `/ / __ \/ __ \ | |/ |/ / __/ / ___ |/ / / __/ / /___/ __/ /_/ / / /_/ / / / / _ _ _ |__/|__/\___/ /_/ |_/_/ \___/ /_____/\___/\__, /_/\____/_/ /_(_|_|_)_) /\_/ / \ _ / #OpDarknet Press Release - 10/15/2011 ------------------------ Timeline of Events ------------------------ At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Hard Candy which was dedicated to links to child pornography. We then removed all links on the website, within 5 minutes the links were edited back in by an admin. For this reason, we will continue to make the Hidden Wiki unavailable. -- At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden Wiki shared a digital fingerprint with the shared hosting server at Freedom Hosting. -- At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the host of the largest collection of child pornography on the internet. We then issued a warning to remove the illegal content from their server, which they refused to do. -- At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting server of Freedom Hosting and shutdown services to all clients due to their lack of action to remove child pornography from their server. -- At apprx 5:00pm CST on October 15, 2011 Freedom Hosting installed their backups and restored services to their child pornography clients. We then issued multiple warnings to remove all child pornography from their servers, which Freedom Hosting refused to do. -- At apprx 8:00pm CST on October 15, 2011 despite new security features, we once again infiltrated the shared hosting server at Freedom Hosting and stopped service to all clients. -- ------------------------ Our Statement ------------------------ The owners and operators at Freedom Hosting are openly supporting child pornography and enabling pedophiles to view innocent children, fueling their issues and putting children at risk of abduction, molestation, rape, and death. For this, Freedom Hosting has been declared #OpDarknet Enemy Number One. By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography. We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography. ------------------------ Our Demands ------------------------ Our demands are simple. Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target. ------------------------ Images & Misc ------------------------ Dead Server Screenshot: http://i55.tinypic.com/vy9w7k.jpg -- Freedom Host PR Screenshot: http://i53.tinypic.com/o5qlip.jpg -- Our Manifesto: http://www.youtube.com/watch?v=aFuJp_zPIlU -- #Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSteet | #OWS We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us. ------------------------ Server Information ------------------------ phpinfo() of FreedomHosting: System FreeBSD server 8.2-RELEASE-p3 FreeBSD 8.2-RELEASE-p3 #0: Tue Sep 27 18:45:57 UTC 2011 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 Build Date Aug 26 2011 03:00:30 Configure Command './configure' '--with-layout=GNU' '--localstatedir=/var' '--with-config-file-scan-dir=/usr/local/etc/php' '--disable-all' '--enable-libxml' '--with-libxml-dir=/usr/local' '--with-pcre-regex=/usr/local' '--with-zlib-dir=/usr' '--program-prefix=' '--disable-cgi' '--with-apxs2=/usr/local/sbin/apxs' '--with-regex=php' '--with-zend-vm=CALL' '--disable-ipv6' '--prefix=/usr/local' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-portbld-freebsd8.2' Server API Apache 2.0 Handler Virtual Directory Support disabled Configuration File (php.ini) Path /usr/local/etc Loaded Configuration File /usr/local/etc/php.ini Scan this dir for additional .ini files /usr/local/etc/php Additional .ini files parsed /usr/local/etc/php/extensions.ini PHP API 20090626 PHP Extension 20090626 Zend Extension 220090626 Zend Extension Build API220090626,NTS PHP Extension Build API20090626,NTS Debug Build no Thread Safety disabled Zend Memory Manager enabled Zend Multibyte Support disabled IPv6 Support disabled Registered PHP Streams php, file, glob, data, http, ftp, zip, compress.zlib Registered Stream Socket Transports tcp, udp, unix, udg Registered Stream Filters convert.iconv.*, string.rot13, string.toupper, string.tolower, string.strip_tags, convert.*, consumed, dechunk, zlib.* Configuration apache2handler Apache Version Apache Apache API Version 20051115 Server Administrator you@example.com Hostname:Port xqz3u5drneuzhaeo.onion:0 User/Group www(80)/80 Max Requests Per Child: 10000 - Keep Alive: off - Max Per Connection: 100 Timeouts Connection: 900 - Keep-Alive: 60 Virtual Server Yes Server Root /usr/local Loaded Modules core prefork http_core mod_so mod_authz_host mod_file_cache mod_cache mod_disk_cache mod_filter mod_deflate mod_env mod_expires mod_headers mod_setenvif mod_mime mod_status mod_autoindex mod_dir mod_alias mod_rewrite mod_bw mod_php5 mod_alias_basedir mod_vhost_alias_frdmhst Apache Environment Variable Value HTTP_HOST xqz3u5drneuzhaeo.onion HTTP_CONNECTION close HTTP_USER_AGENT Mozilla/5.0 (Windows NT 6.1; rv:5.0) HTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 HTTP_ACCEPT_LANGUAGE en-us,en;q=0.5 HTTP_ACCEPT_CHARSET ISO-8859-1,utf-8;q=0.7,*;q=0.7 HTTP_DNT 1 HTTP_COOKIE visitz=0; sort=0a PATH /bin:/usr/bin:/usr/ucb:/usr/bsd:/usr/local/bin SERVER_SIGNATURE no value SERVER_SOFTWARE Apache SERVER_NAME xqz3u5drneuzhaeo.onion SERVER_ADDR 10.0.1.2 SERVER_PORT 80 REMOTE_ADDR 10.0.1.2 DOCUMENT_ROOT /home/fh/www SERVER_ADMIN you@example.com SCRIPT_FILENAME /home/fh/users/l/i/lolitacity/www/index.php REMOTE_PORT 56818 GATEWAY_INTERFACE CGI/1.1 SERVER_PROTOCOL HTTP/1.0 REQUEST_METHOD GET QUERY_STRING no value REQUEST_URI /users/lolitacity/index.php SCRIPT_NAME /users/lolitacity/index.php
Daniel Reviewed by Daniel on . Anonymous attacks kiddieporn websites From Anonymous _ __ ___ __ _ | | / /__ / | ________ / / ___ ____ (_)___ ____ | | /| / / _ \ / /| | / ___/ _ \ / / / _ \/ __ `/ / __ \/ __ \ | |/ |/ / __/ / ___ |/ / / __/ / /___/ __/ /_/ / / /_/ / / / / _ _ _ |__/|__/\___/ /_/ |_/_/ \___/ /_____/\___/\__, /_/\____/_/ /_(_|_|_)_) /\_/ / \ _ Rating: 5HATERS GONNA probably bring up some valid points considering I am an ignorant little twat so far up my own ass that i blame my problems on everyone and if you criticize me you're automatically wrong.
-
25th Oct 2011, 04:09 PM #2MemberWebsite's:
reddit.comThis is kinda old news.. There is the sequel:
http://pastebin.com/YHDnL3deI design free logos. click here.
-
25th Oct 2011, 04:10 PM #3OPmmm mmm!
It's from yesterday - not that old
HATERS GONNA probably bring up some valid points considering I am an ignorant little twat so far up my own ass that i blame my problems on everyone and if you criticize me you're automatically wrong.
-
25th Oct 2011, 04:13 PM #4BannedWebsite's:
PakCyberArmy.Net HackAll.Net LinkDDL.Com HackersMedia.CoMi have got this pm few days back,made me l0l
-
25th Oct 2011, 04:13 PM #5MemberWebsite's:
reddit.comActually 3 days ago, but this now made me realize the amount of hours i spent online the past week.. holy shit!
I design free logos. click here.
-
25th Oct 2011, 04:16 PM #6Respected MemberWebsite's:
DL4Everything.com Soft2050.inBest move they haz taken by hacking websites
-
25th Oct 2011, 04:29 PM #7Banned
it is old news but it is new for me
-
25th Oct 2011, 04:33 PM #8Member
nice hope whey kill more ilegal site
Sorry for my bad English
-
25th Oct 2011, 04:37 PM #9Respected Member
Anonymous, the interwebz's very own justice league.
-
25th Oct 2011, 05:19 PM #10Member
I found a site where the admin posts underage stuff all the time, I got the site taken down but its back and still he posts underage stuff.
I reported him to filehosts and they only remove 1 file at a time, the DC ignored me until i posted on a very public site, in all i spent about 18h getting his content removed before i realised i was wasting my time and just reported the site to the FBI.
The worst thing is this guy is in top 100 earners at a certain filehost, it makes you sick this content is so popular and little is done about it.
Nice one Anonymous for taking this down.
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
Anonymous tricked people into joining Web site attacks
By Bharat in forum News & Current EventsReplies: 6Last Post: 21st Jan 2012, 11:12 PM -
LulzSec publicly attacks fellow hacker group Anonymous
By ShareShiz in forum News & Current EventsReplies: 10Last Post: 17th Jun 2011, 04:30 AM -
[Selling] Tweet Attacks and Tweet Attacks Account Creator for Sale
By channing in forum Completed TransactionsReplies: 6Last Post: 14th Mar 2011, 03:16 AM
themaCreator - create posts from...
Version 3.24 released. Open older version (or...