Thinking about hopping off the Poojeet Express?
Perfect place for this:
RUN DBAN ON YOUR WINDOWS MACHINE IF YOU EVER TRY AND REPLACE IT. You need to nuke that shit from orbit.
Your Panther folder is a built in backdoor for ransom-wear. You damn near need to completely alter any unique ID's that your machine has to you.
Am I in demo mode?
- Win+R, type msconfig
Those are your current configurations. Check em out, you can share so much stuff!
Do I have LinkedIn tagging me?
- LinkedIn tag jacking is absolutely effective in marking somone one.
Do I have Bluetooth services running anywhere?
- Qualcomm has some solid malware when it comes to bluetooth adapters. Huge attack vector and they've been notified about the SigOver attack vector.
A SigOver is basically injecting malicious scripting into sub-packets on
anything running the 3GPP stack and I'm sure it'll work it's way into 5G. Turning off Bluetooth functionality is very important. Like it or not, all your shit is a beacon.
Is my registry extremely complicated?
Yes. It's designed that way on purpose. CLSIDs are "social security numbers" for services. Every action gets a unique ID. Take a look at this fucking mess:
You'll see a common pattern here. Leads me to:
ActiveX applets and locking that shit down.
ActiveX will run modules and flash player pretty much making your Windows machine an open target for anyone who can copypaste java and inject it into XML script. More so, if you dig deeper you'd see that the built in "feature" of native XML is pretty much breaking all your internet activity down into XML data with hashsets.
All of this is done via Windows 32-bit from my experience at least. The only useful tools I have found have been PowerShell and CMD scripting.
-Tip: PowerShell ISE is an amazing tool
-Tip: to run multi-line scripts type in "@echo off". To end you can go "@echo on", though there are a variety of possibilities.
Your Linux distro's can be rooted like cake, I lost hours trying to wipe a hostage machine because BT malware just decided to hijack the grub bootloader and make itself the sudo user.
I'm currently working on hardening scripts. I had 10 years worth of work and accounts obliterated in seconds by kids with power-tools.
There's no one to go to about "getting hacked". Trying to explain to the VA police that VA server breaches were a crime was an utterly mind-blowing experience.
Don't install Brave, it's a total honeypot. Brave extensions? They totally logged all my futa consumption and set me up as a crypto miner and an OSINT data miner. Oddly enough, Safari has been very extensible, so has Firefox. I will never use a Google application by choice again.
Google basically had a bunch of high-speed dudes build out some high-speed shit and gave the keys to the lambo to shit bag college kids who weren't exemplary, only exceptional.
#Note:
If you got questions about this or whatever, DM me. I'll be more than happy to answer any questions. Uneducated dudes that click stickers shouldn't be what you base the truth of this on.
btw
Just to show you.
While I'm on the subject, I remember the dickheads that thought I was being stupid with the fact your VPN's are money sinks:
lol, yea keep using your "safe" connection. (this is a fresh Windows 10 Pro Edition with malwarebytes btw). Hold up, I bet I have self signingphony root CA's that listen into this
Here you go faggots, look at these totally legit root CA's that auto install themselves.:
How could I forget about the Poojnet logins?! Poojnets keep logging into my computer unrestricted
Lol I must be nuts!, I wonderwhat sites these run?
LOL, BINGO, WILDCARD!!!
Alright boys. Lets think this through..l micosoft runs ActiveX Java Applets with XML. They use XSLT to map the XML to http and vice versa. Think hat for a moment. JAVA INJECTION?!?! YEA BOIIII!!! Thats not even getting down to the important shit because this is all at an assembly level. We are going to literally need to sanitize our ADC waves with near 100% precision. Because every chip has offsect correction, and even though a necessity this really make santizing difficult. Any kind of em packent sent at, lets say a eNodeB Tower,: you got an SDR, query the tower.
>Tower's like "I send out packets every 10 seconds".
>Then you could be like "sweet, 10+t2".
Tower sends out on time your device sends out a slightly more powerful signal that hijacks the subpacket transmission right as the phone gets it . You can signal storm cell towers with 97% efficay with this. The FCC would shit their fucking pants if they just say dude knockin towers out like that. But they don't give a shit that their regulations fuck you.