SPREAD EVERYWHERE ! HES ON MOST OF OUR FRIENDS LIST!
Full Dox & evidence of him reporting Anons to feds.
Name: Arran Richard Seel
Reason: Little Fucktard. Claims to have reported over 20 Anons to FBI.
DOB: 9 / 21 / 1997
Marital Status: Single/Unmarried
Address: 6534 Indigo Street, Mesa, Arizona
Phone Number: (480) 981-8014
Email: Bandman22222@Gmail.com
Facebook:http://www.facebook.com/arran.r.seel; http://www.facebook.com/arran.seel.7
Google+: https://plus.google.com/110723496790282135042
Youtube: https://www.youtube.com/user/Airhead5678
External IP Address: 68.98.57.237
ISP: Cox Communications Inc.
Relations:
Richard G. Seel (father, 77 years old)
EDUCATION DETAILS
Shepherd Junior High School, Mesa AZ
Red Mountain High School, Mesa AZ (attends now)
FINANCIAL STATUS
HOUSING DETAILS:
• APN: 14184523
• RESIDENTIAL
• Lot Size: 10,973 Sq. Ft.
• Subdivision: MAPLEWOOD 2 LOT 1-126 TR A
• Year Built: 1986
• County: Maricopa
• Date Sold: /
• Sale Price.$0
• Est. Value: $117,800
• Sq. Ft.: 1,704 Sq. Ft.
• Land Value: $23,500
Arran R. Seel
CEO & Founder at The Messenger
Studying Military at ASU
Lives in Phoenix, Arizona
SPREAD EVERYWHERE ! HES ON MOST OF OUR FRIENDS LIST!
Full Dox & evidence of him reporting Anons to feds.
Name: Arran Richard Seel
Reason: Little Fucktard. Claims to have reported over 20 Anons to FBI.
DOB: 9 / 21 / 1997
Marital Status: Single/Unmarried
Address: 6534 Indigo Street, Mesa, Arizona
Phone Number: (480) 981-8014
Email: Bandman22222@Gmail.com
Facebook:http://www.facebook.com/arran.r.seel; http://www.facebook.com/arran.seel.7
Google+: https://plus.google.com/110723496790282135042
Youtube: https://www.youtube.com/user/Airhead5678
External IP Address: 68.98.57.237
ISP: Cox Communications Inc.
Relations:
Richard G. Seel (father, 77 years old)
EDUCATION DETAILS
Shepherd Junior High School, Mesa AZ
Red Mountain High School, Mesa AZ (attends now)
FINANCIAL STATUS
HOUSING DETAILS:
• APN: 14184523
• RESIDENTIAL
• Lot Size: 10,973 Sq. Ft.
• Subdivision: MAPLEWOOD 2 LOT 1-126 TR A
• Year Built: 1986
• County: Maricopa
• Date Sold: /
• Sale Price.$0
• Est. Value: $117,800
• Sq. Ft.: 1,704 Sq. Ft.
• Land Value: $23,500
Arran R. Seel
CEO & Founder at The Messenger
Studying Military at ASU
Lives in Phoenix, Arizona
http://www.anonpaste.me/anonpaste2/index.php?1c0c1bc9ed5c6bae#E5NTfkWXM33J0xR6WLChF4OgFyx457AW01X78So9DA8=
http://pastebin.com/fVquTdT2
November 19, 2012
FedRat infiltrating Anonymous #Expose #Rats #Legion #Snitches #pigs
Labels:
#Expose .#Rats .#Legion. #Snitches,
FedRat
Anonymous Claims to Have Hacked into Karl Rove, ORCA Thus Stopping His Vote-Switching
The Hacker Group and Freedom-minded organization, Anonymous, claims to have stopped Karl Rove from stealing the US elections.
Anon_Rove_Letter.pdf
Anonymous Claims to Have Hacked into Karl Rove, ORCA Thus Stopping His Vote-Switching
As expected, any Romney supporter (with heavy financing), was shocked at the final outcome from November 6th, the night President Obama retained his seat. We have all heard the whining, crying, finger-pointing, foul, and so on and so on. But there were a couple of items which stood out more than others.
We all know that Karl Rove flipped out on FOX News when they announced Obama won Ohio. The video is below if you haven’t seen it. Basically, Rove just could NOT understand what was happening, which is what I expected. Although he did have a very shocked “the sun just rose in the west” look on his face, and that is what surprised me. Even more shocking was hearing many top supporters and chiefs cry that Romney was supposed to win with a landslide. That is NOT what the polls had been showing the entire time.
These cyber “protectors of what’s right” – who refers to themselves as “The Protectors” – said that they had been following the digital structure of Rove’s operation and of ORCA, a Republican get out the vote software application. After finding open “doors” in the systems, they created a “password protected firewall” called “The Great Oz,” and installed it on servers that Rove planned to use on election night to re-route and change election results “from three states.”
“ORCA Killer” was launched at 10am EST followed by “The Great Oz” at 8pm EST on November 6th. Both sides watched as ORCA crashed and failed throughout Election Day. Rove even mentions computer problems while on FOX News that night. Rove’s computer techs tried 105 times to penetrate “The Great Oz” using different means and passwords.
Is this what happened to Kerry back in 2004 in Ohio when he ran against Bush? A server went down for approximately 90 minutes. When it crashed, Kerry was clearly in the lead. When it finally booted back up, Bush had taken the lead. How? Read on for a theory.
References: Occupy for Accountability: Karl Rove Loses Election After Being Checkmated By Cyber Sleuths?
Democratic Underground: Anonymous Claims It Stopped Karl Rove From Hacking The Election By Hacking ORCA
Democratic Underground: Pivotal Ohio 2004 Vote-Kerry Was Ahead-Then Server Went Down for 90 Minutes-Result-Bush Had Lead!
Wonkette: ANONYMOUS CLAIMS IT STOPPED KARL ROVE FROM HACKING THE ELECTION BY HACKING ORCA, WE THINK
----------
I find it very interesting how Rove is so willing now to move on from the election. There is no cry of foul, despite numerous reports about uneven vote tallies and counties that are 100% Obama in some urban areas. Perhaps Anonymous' threat to send their evidence to the authorities may have something to do with that.
Everyone should be ready to move on, there is much present and upcoming to claim our attention, but this event may go down as one of the biggest coups in history for Hackers, and also for Truth movements around the world, if true.
Labels:
CDeception,
Expect all a us,
Expose all,
Karl Rove,
ORCA .Vote Fraul
November 9, 2012
Partido Socialista Unido de Venezuela - HUGO CHAVEZ #LulzSecPeru
_ _ _____ _____
| | | | / ____| | __ \
| | _ _| |____| (___ ___ ___ | |__) |___ _ __ _ _
| | | | | | |_ / \___ \ / _ \/ __| | ___// _ \ '__| | | |
| |____| |_| | |/ / ____) | __/ (__ | | | __/ | | |_| |
|______|\__,_|_/___||_____/ \___|\___| |_| \___|_| \__,_|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
https://www.facebook.com/LulzSecPeru
https://twitter.com/LulzSecPeru
---------------------------------------------------------------
Hacked : Partido Socialista Unido de Venezuela - HUGO CHAVEZ
www.psuv.org.ve
---------------------------------------------------------------
Emails
https://anonfiles.com/file/3da1f377f85c46f16aea7a89899f782d amanda_rina.zip (117MB)
https://anonfiles.com/file/b63630457b626cfc3560e3438f7dabb1 comisioninternacional.zip (275MB)
https://anonfiles.com/file/439d74c523110d0a5c95a2e5f57de658 cojedesmovilizacionyeventos.zip (65MB)
https://anonfiles.com/file/ad299de34f50d5b9ecc9256d3c9dafd5 anzoateguimovilizacionyeventos.zip (35MB)
https://anonfiles.com/file/dd0d1d9a32e0e6604ae95109feabd028 hpinto.zip (88MB)
https://anonfiles.com/file/4e2383183081a5949f80d3faee295a19 amarilisgutierrez.zip (57MB)
-------------------------------------------------------------
First Server
$ id
uid=0(root) gid=0(root) groups=0(root)
$ uname -a
Linux debian1 2.6.32-5-amd64 #1 SMP Wed Jan 12 03:40:32 UTC 2011 x86_64 GNU/Linux
$ ls -la /var/www/
total 28
drwxr-xr-x 6 root root 4096 Nov 1 07:10 .
drwxr-xr-x 16 root root 4096 Oct 30 10:10 ..
drwxr-xr-x 9 www-data www-data 4096 Oct 30 15:07 bolivar
drwxr-xr-x 5 www-data www-data 4096 Nov 7 04:35 cuentos
-rw-r--r-- 1 root root 177 Oct 30 10:11 index.html
drwxr-xr-x 5 www-data www-data 4096 Feb 23 2011 juventudpsuv
drwxr-xr-x 5 www-data www-data 4096 Oct 30 15:38 lottt
$ cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
Debian-exim:x:101:103::/var/spool/exim4:/bin/false
statd:x:102:65534::/var/lib/nfs:/bin/false
sshd:x:103:65534::/var/run/sshd:/usr/sbin/nologin
liendoc:x:1000:1000:cassiel liendo,,,:/home/liendoc:/bin/bash
snmp:x:104:106::/var/lib/snmp:/bin/false
mysql:x:105:108:MySQL Server,,,:/var/lib/mysql:/bin/false
---------------------------------------------------------------
Second server
$ uname -a
Linux webcandanga03 2.6.26-2-amd64 #1 SMP Sun Mar 4 21:48:06 UTC 2012 x86_64 GNU/Linux
$ id
uid=0(root) gid=0(root) groups=0(root)
$ cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
Debian-exim:x:101:103::/var/spool/exim4:/bin/false
statd:x:102:65534::/var/lib/nfs:/bin/false
operador:x:1000:1000:operador,,,:/home/operador:/bin/bash
sshd:x:103:65534::/var/run/sshd:/usr/sbin/nologin
mysql:x:104:106:MySQL Server,,,:/var/lib/mysql:/bin/false
snmp:x:105:65534::/var/lib/snmp:/bin/false
solicitud:x:1001:1001::/home/solicitud:/bin/bash
proftpd:x:106:65534::/var/run/proftpd:/bin/false
ftp:x:107:65534::/home/ftp:/bin/false
---------------------------------------------------------------
Labels:
-HUGO CHAVEZ,
#LulzSecPeru,
Partido,
Socialista,
Venezuela
Argentina's presidency.. page tld Un10n 4rg3nt1n4 #FREESEC
This domain is hosted page Argentina's presidency!
The domain is registered jgm.gob.ar from 16/07/1998.
Due Date: 16/07/2013
Registering Entity:
Cabinet of Ministers
Country:
Argentina
Activity:
Government
Data in Argentina
Address:
Av Julio A. Rock 782
City / Town:
City of Buenos Aires
Province:
City of Buenos Aires
Postal Code:
1067
Phone:
4343-0181 int. 5052
Fax:
4342-0427
Responsible Person:
Claudia Lacanna
Address:
Av Roque Saenz Pena 511 5
City:
Federal Capital
Postal Code:
1135
Province:
Buenos Aires
Country:
Argentina
Phone:
43433774
Fax:
43433774
Contact hours:
8 to 21
Managing Entity:
Cabinet of Ministers
Address:
Av Julio A. Rock 782
City:
City of Buenos Aires
Postal Code:
1067
Province:
City of Buenos Aires
Country:
Argentina
Phone:
4343-0181 int. 5052
Fax:
4342-0427
Activity:
Government
Technical Contact:
Ariel Diego Marino
Address:
Av Julio A. Rock 782 5th. floor
City:
City of Buenos Aires
Postal Code:
1067
Province:
Buenos Aires
Country:
Argentina
Phone:
4343-0181/9 int. 5052
Fax:
4343-0181/9 int. 5667
Contact hours:
8.00hs to 22.00hs
DNS Servers:
Primary DNS:
Name: ns1.jgm.gov.ar
IP Address: 200.47.118.48
Secondary DNS:
Name: nsii.sgp.gov.ar
IP Address: 200.123.99.242
Optional:
Alternate server:
Name: ns2.jgm.gov.ar
IP Address: 200.47.118.49
Alternate server:
Name: ns3.jgm.gov.ar
IP Address: 200.47.118.50
Alternate server:
Name: nsii3.sgp.gov.ar
IP Address: 190.210.163.2
United Nations Educational Unesco.org Hacked By Ur0b0r0x
United Nations Educational Unesco.org Hacked By Ur0b0r0x
+-----------------------------------------------------------------------------------+
| |
| United Nations Educational Scientific and Cultural Organization |
| <<< BREACHED ACCOUNTS >>> |
| PWNED BY UR0B0R0X |
+-----------------------------------------------------------------------------------+
_ _ _____ ___ ____ ___ _____ _____ __
| | | | __ \ / _ \| _ \ / _ \| __ \ / _ \ \ / /
| | | | |__) | | | | |_) | | | | |__) | | | \ V /
| | | | _ /| | | | _ <| | | | _ /| | | |> <
| |__| | | \ \| |_| | |_) | |_| | | \ \| |_| / . \
\____/|_| \_\\___/|____/ \___/|_| \_\\___/_/ \_\
..###' '###,.
'####; .ooooo. ;####'
'##, .o8P"""""Y8o. ,##' x0> Unesco PWNED }8=)
'##, 88' '88 ,##' x1> Twitter: @ur0b0r0x
'##8' '8##' x2> Fuck FeedBack 0-Day
'#8 ,o. .o, 8#' x3> Null Security
8 8 888; :888 8 8 x4> Cyberpunk
8P '88' '88' Y8 x5> Happy Hack :)
P 8 'Y
b 888 d
`8b d8`
88'"88888"'88
8 `"""""""` 8
`8ooooooo8`
,##' '##,
,##' '##,
,##' '##,
.#####, ,#####.
`##' '##`
host: unesco.org
/index.php?s=films_details&id_page=33&id=%
/convention.asp?KO=31038&language=%
/index.php?lg=es&pg=%
Data_Base
#############################
# p_dit_archives_multimedia #
#############################
- barner
- geoportal
- iftc
- rss
- scripts
- error
- science
- forum
- education
- forum2
- ulis
- moscow_new
- user
- ulis2
- new
- fr
- tip_a_
- friend
- en
- news
- es
- fileadmin
- modules
- cp-nav
- logirea
- conference
- intranet
- formulaire
- unesco
- bfc
##################
################################################################################
| EMAIL | PASSWD |
################################################################################
| wpd2012.inscription@unesco.org | 3f85829876243750f400e74b5a3b328f |
| admin.unix@unesco.org | 6340456f467ffe961a876eddbdf01f4b |
| e.lannaud@unesco.org | 66689bf12478f0b6789bbd506385c85c |
| etrapani@unesco.org | 634095008ffe961ad7e890ddbdf01f42 |
| p.fernandes@unesco.org | 564c43d17e9cc2db1d66c125fbc60cc9 |
| a.forcioli@unesco.org | 73bc016c2ef6d567321|39d57e82baff |
| padirac@unesco.org | 37de6442ee1aeee4dada4374eea39aba |
| t.fuentes@unesco.org | a0c32213d00678f1ef09805921fe456a |
| j.dann@unesco.org | b19f0c3928d345690de8118c6d4ecef0 |
| karimabdi@unesco.org | 00f6f5321bdacd1a71d89c09743f0aab |
| guillaume@unesco.org | 8a41fa0054eeecedee32ef2ee3d2a0c0 |
| communicationschief@unesco.org | 2cbf77fc82edf5fc1e2a432d6cc0e665 |
| avonphilippe@unesco.org | f567a64089444764c2f534e0b7643d4d |
| printshop@unesco.org | d0a87c900b04850d68f7a224f8f43123 |
| library@unesco.org | 01d0d0db791e4f2f69e3bd063451dee0 |
| educationmanager@unesco.org | 2944f7951246bb913da54f2aa234d6b5 |
| documentalist@unesco.org | 6a5d6757d67fa9bb5344b6ae239b3424 |
| bitoun@unesco.org | 124c19330cda129d827afc481c60d1eb |
| aurore@unesco.org | 5f56731a6a6bd56ec6b26adf0e3ab76b |
| r.manowalailao@unesco.org | ec455b23b4d86964cca5676f5bb7ab04 |
| a.cairola@unesco.org | fd46f5333b7f911fcecf2828b0add08d |
| l.loupis@unesco.org | dbe7dea6d9a975be16e4576898043213 |
| grauwe@unesco.org | d05461c7c4634c80c53d81501bebe5af |
| lynbird@unesco.org | d1d9dfbe86e561910758229724ae3588 |
| larraine@unesco.org | f5f6258402de368ee16f643d3e527041 |
| vellienj@unesco.org | 299bba62a6f35794f7066df546042329 |
| financeoffi@unesco.org | 6a3540e9b41010f208de5520456410cf |
| clerk@unesco.org | e6674b446538dbaab5742df6bf78d308 |
| e.stirnemann@unesco.org | 21bd21f82ab6425bc2dab12eb1d8afbd |
| p.gaye@unesco.org | 569b34a0ec9470c7c5a993a92055d02f |
| m.blackwell@unesco.org | 8377a1a288f13453b5df3ee536757663 |
| n.diayemo@unesco.org | 4552078f34521b1072062442947e6543 |
| poisson@unesco.org | f764f39c654e4411a0353468d543556c |
| saitomioko@unesco.org | 232cd0baf97e0614f654886ebbca41ae |
| diouf@unesco.org | 56f9c32a0ce4fc656c531ba7f43a76be |
| kitaev@unesco.org | 880ea6a14ea49e546b52fbdc5015a024 |
| dolata@unesco.org | 249c8f715cc9c290beb37bf840f4c29a |
| adminorg@unesco.org | edbf2053572f6e737bf34535a1ce1b0e |
| iiep@unesco.org | 529db11fd92d89d54f1b645322df21b1 |
| assistant@unesco.org | 0e3f60c756f61aa0fc01a32f564db275 |
| suzanls@unesco.org | 70d73d6577d4a64919bb77e9d9dac748 |
| appere@unesco.org | 69fb70305d8b0c07bdb14fabe54ff765 |
| programme@unesco.org | fa45faed570d4593c54553ff5ac58f86 |
| specialist@unesco.org | d6645bcdca4998ab6029fee65789304d |
| martin@unesco.org | b5c7ad15b22da150a4b1d8cc05463dfa |
| nvvarghese@unesco.org | a9c290e786f9b7c55623128bdb2f60c1 |
| dl.azerbaidjan@unesco.org | 6b6195ee3c61bb3c9d706686d0287413 |
| cofpeace@unesco.org | 54632d7beeabb9260a5c854bc85b675f |
| s.williams@unesco.org | bf32ebb32b170bc1e65f578ab093b93b |
| m.sanjines@unesco.org | fce9275418a540de181d27a68497a72a |
| adzim@istic-unesco.org | 556669f5427e683991e806447be9e782 |
| gmrevent@unesco.org | 675673d0e2450d569eef7263f677be3a |
| paulemontage@unesco.org | 234bb22a28694478c6790621596058d8 |
| peanoser@unesco.org | 4552078f29351b1072062442947e7345 |
| altnet@unesco.org | 56f9c32a0ce4fc758c433ba7f43a63be |
| diaspatricia@unesco.org | 249c8f715cc9c290beb37bf840f4c29a |
| yasminhaq@unesco.org | c6c5f102b8a6fec68fc51759453e6566 |
| peryrajime@unesco.org | 7de233e1c5e75d62df8ddf6555c3751c |
| veroqyenehen@unesco.org | 454c6e3132300b80a05567de42237f0d |
| ludivine@unesco.org | d6678bcdca4998ab6029fee96577e04d |
| gender.bgk@unesco.org | 5fda2534e03fc39486344436623ee506 |
| grede@unesco.org | b5dc4837a611a2ed6ddcc07cd45645d2 |
| e.dutton@unesco.org | 234bb22a28694478c6790621596058d8 |
################################################################################
Argentina Ministry of Technology EXPOSED By @SECTORLEAKS_404 Y @SECTOR_404 #FREESEC
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMNNNNNNNNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMNNNmmmmmmmmmmmmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMNyydmdhhysssooooosymmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMh:/+ooooooooooooooosmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMs:-/ooooooooooooooooymmmMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMo:-/ooooooooooooooooohmmmMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM+:-/oooooooooooooooooodmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM/--+oooooooooooooooooosmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM::-+oooooooooooooooooooymmmMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMN:--+oooooooooooooooooooohmmmMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMm:--+ooooooooooooooooooooodmmNMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMm:-:oooooooooooooooooooooosmmmNMMMMMMMMMMMMMNMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMd:-:ooooooooooooooooooooooohmmmMMMMMMMMMMMdmmmMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMh:-:oooooooooo+++++oosssyyhhdmmmMMMMMMMMNyshmmMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMy--:++++///ossso+/:/dmmdddddddddmMMMMMMdso+hmmNMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMs:+osssoo:-smmdhyh/-ymmmddddhhhhhNMMMmyso+ommmMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMyddddddmms.ommddmmh-/mmddhhhhhddddNNdyso+sdmmNMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMddddhhddmd-/mmddddm/-dmddhhdddddddmmhsosydmmNMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMdhhhhhhddm/-hmmddmmo+mmmdddmmmmdhyssyyhdmNNMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMdddddddddmy:+mmmmmmyhmmmmmmmdhyso+ohmmmNMMMMMMMMMMMMMMMM
MMMMMMMMNNMMMMMMMMMMMMNNmmmmmmmmmmdo/ohhhhysshhhhyssssso+::hmmMMMMMMMMMMMMMMMMMM
MMMMMMMMmsoyhddmmmmmmddhhhddddddddhso+oooooooooosyhhhhhhh+-:dmNMMMMMMMMMMMMMMMMM
MMMMMMMMMNmysoo++++++//:::ossoo++////+ooooooooshdmmNNNMMMN/.ommMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMNNNmmmdhh/.-dmmhyyso/-.-/+ooooshmmmNMMMMMMMMd-:mmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMy-:mNMMMMMMNo---://+hmmmNMMMMMMMMMMm-:mmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMN:-dNMMMMMMMMdo//--/mmNMMMMMMMMMMMMy:smNMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMd-omNMMMMMMMMMNNh-:mmMMMMMMMMMMMMN++mNMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMh/mmNMMMMMMMMMMM/-dmMMMMMMMMMMMNysdNMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMddddymmmNMMMMMMMMMN+ommdNMMMMMMMNmyymmNMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMM//oyshmmmNMMMMMMNNmdNMMdsdNMMMNmhysydmmmmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMM:--+yyhhddmNNNmmmmNMMMMMN+ymNmdyo+//+smmmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMM/--/sdmms+/+oosdmNMMMMMMNo:/yyysoo:.:ommmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMhossoohNMNdysooyhdmhyydyo+oshdmmNd-/yhdmNMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMm/yNMMMMMMNNNNNNNNNMMMMMMMMM+/mMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMd:hNMMMMMMMMMMMMMMMMMMMMMMh/dMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMy/mNMMMMMMMMMMMMMMMMMMMMN/hNMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMM/omMMMMMMMMMMMMMMMMMMMMsoNMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMd-hNMMMMMMMMMMMMMMMMMMm/mMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM/+mMMMMMMMMMMMMMMMMMMoyNMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMy-dNMMMMMMMMMMMMMMMMN/mMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN-omMMMMMMMMMMMMMMMMdhNMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMs:/sdmNNNMMMMMNNNNNmmMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMNdy+/+shdmmmmmmmmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMmy/--/+ydmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMmhNNMMMMMMdo::odmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMNds+sdmMMMMMMMmyydNMMMMMMMMMMMMmNMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMmomhyd/+MMMMMNooddy/+mMMMMMMMMMy.dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMNy+syhso.oMMMMN:+MMMMN/.NMMMMMMmo/ dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM+ddhy+hN-oMMMMs`NMMMMMd`+MMMMMy+my dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMddyhys+NMN-oMMMM/.MMMMMMN:.MMMN+sMMy dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMmohyyd+yMMMN-+MMMN/.MMMMMMN:.MMh/dMMMy hMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMNNym+/oooo+`-+/mM+`NMMMMMN-/Mh:+++++: :++MMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN-oMMMMd.oMMMMMy.mMMMMMMMMy dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMm./MMMMMh-oNMNy-hMMMMMMMMMs hMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMNddyyhmMMMMNhssshNMMMMMMMMmhhyyhNMMMMMMMMMMMMMMMMM
----------BINGO EXPOSED- http://www.mincyt.gob.ar/ MINISTERIO DE CIENCIA Y TECNOLOGIA
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMNNNmmmmmmmmmmmmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMNyydmdhhysssooooosymmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMh:/+ooooooooooooooosmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMs:-/ooooooooooooooooymmmMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMo:-/ooooooooooooooooohmmmMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM+:-/oooooooooooooooooodmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM/--+oooooooooooooooooosmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM::-+oooooooooooooooooooymmmMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMN:--+oooooooooooooooooooohmmmMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMm:--+ooooooooooooooooooooodmmNMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMm:-:oooooooooooooooooooooosmmmNMMMMMMMMMMMMMNMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMd:-:ooooooooooooooooooooooohmmmMMMMMMMMMMMdmmmMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMh:-:oooooooooo+++++oosssyyhhdmmmMMMMMMMMNyshmmMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMy--:++++///ossso+/:/dmmdddddddddmMMMMMMdso+hmmNMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMs:+osssoo:-smmdhyh/-ymmmddddhhhhhNMMMmyso+ommmMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMyddddddmms.ommddmmh-/mmddhhhhhddddNNdyso+sdmmNMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMddddhhddmd-/mmddddm/-dmddhhdddddddmmhsosydmmNMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMdhhhhhhddm/-hmmddmmo+mmmdddmmmmdhyssyyhdmNNMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMdddddddddmy:+mmmmmmyhmmmmmmmdhyso+ohmmmNMMMMMMMMMMMMMMMM
MMMMMMMMNNMMMMMMMMMMMMNNmmmmmmmmmmdo/ohhhhysshhhhyssssso+::hmmMMMMMMMMMMMMMMMMMM
MMMMMMMMmsoyhddmmmmmmddhhhddddddddhso+oooooooooosyhhhhhhh+-:dmNMMMMMMMMMMMMMMMMM
MMMMMMMMMNmysoo++++++//:::ossoo++////+ooooooooshdmmNNNMMMN/.ommMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMNNNmmmdhh/.-dmmhyyso/-.-/+ooooshmmmNMMMMMMMMd-:mmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMy-:mNMMMMMMNo---://+hmmmNMMMMMMMMMMm-:mmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMN:-dNMMMMMMMMdo//--/mmNMMMMMMMMMMMMy:smNMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMd-omNMMMMMMMMMNNh-:mmMMMMMMMMMMMMN++mNMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMh/mmNMMMMMMMMMMM/-dmMMMMMMMMMMMNysdNMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMddddymmmNMMMMMMMMMN+ommdNMMMMMMMNmyymmNMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMM//oyshmmmNMMMMMMNNmdNMMdsdNMMMNmhysydmmmmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMM:--+yyhhddmNNNmmmmNMMMMMN+ymNmdyo+//+smmmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMM/--/sdmms+/+oosdmNMMMMMMNo:/yyysoo:.:ommmMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMhossoohNMNdysooyhdmhyydyo+oshdmmNd-/yhdmNMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMm/yNMMMMMMNNNNNNNNNMMMMMMMMM+/mMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMd:hNMMMMMMMMMMMMMMMMMMMMMMh/dMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMy/mNMMMMMMMMMMMMMMMMMMMMN/hNMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMM/omMMMMMMMMMMMMMMMMMMMMsoNMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMd-hNMMMMMMMMMMMMMMMMMMm/mMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM/+mMMMMMMMMMMMMMMMMMMoyNMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMy-dNMMMMMMMMMMMMMMMMN/mMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN-omMMMMMMMMMMMMMMMMdhNMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMs:/sdmNNNMMMMMNNNNNmmMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMNdy+/+shdmmmmmmmmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMmy/--/+ydmmmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMmhNNMMMMMMdo::odmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMNds+sdmMMMMMMMmyydNMMMMMMMMMMMMmNMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMmomhyd/+MMMMMNooddy/+mMMMMMMMMMy.dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMNy+syhso.oMMMMN:+MMMMN/.NMMMMMMmo/ dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMM+ddhy+hN-oMMMMs`NMMMMMd`+MMMMMy+my dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMddyhys+NMN-oMMMM/.MMMMMMN:.MMMN+sMMy dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMmohyyd+yMMMN-+MMMN/.MMMMMMN:.MMh/dMMMy hMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMNNym+/oooo+`-+/mM+`NMMMMMN-/Mh:+++++: :++MMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN-oMMMMd.oMMMMMy.mMMMMMMMMy dMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMm./MMMMMh-oNMNy-hMMMMMMMMMs hMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMNddyyhmMMMMNhssshNMMMMMMMMmhhyyhNMMMMMMMMMMMMMMMMM
----------BINGO EXPOSED- http://www.mincyt.gob.ar/ MINISTERIO DE CIENCIA Y TECNOLOGIA
BINGO ---------- EXPOSED - http:// www.mincyt.gob.ar / MINISTRY OF SCIENCE AND TECHNOLOGY
#
ARGENTINE GOVERNMENT - HAVE EXPOSED THE CURRICULUM OF HIS MINISTRY OF
SCIENCE AND RESUMES WITH MAILS, USERS, TELS, addresses, pictures and
confidential data, we have penetrated SECURITY SYSTEM AND VIOLATED YOUR
SERVER, we're releasing sensitive information like FIND THE
MANIFESTATION abuses of government, we have seen that the cry of the
nation has been USELESS TO MEET THE NEEDS DENUESTRO people, so # Y #
ANONYMOUS SECTOR404 reject authoritarianism and condemn abuses of power,
enough!
# 4THELULZ ON BEHALF OF THE HIVE-Latin American ANONYMOUS IS PRESENT AND WILL CONTINUE THE VIRTUAL EVENTS ... LULZ FOR ALL!.
LEAKED DOWLOAD ----------------------- <>
+ ------------------------------------------ +
http://depositfiles.com/files/zrh2e1j44
+ ------------------------------------------ +
+ ------------------------------------------------- ---------------------------------------------- +
+-----------------------------------------------------------------------------------------------+
Administrador User Pass
+ Emiliano Emiliano Griego 07f66d602043ecc41eaa6bf94aebfb10f90b2d67
+ Monica Monica Sire 6774ec214523a04d03aceb1696149610a0531baa
+ Cintia Cintia Ruo 74b8c25afdd10252f7bff3908c466162a48e55a5
+ Eleonora Eleonora Lanfranco 343b3672630ab8156d5b7b156c9b541a200bf96e
+ Alejandra Alejandra Stafetta 0d495f168d79a2109177aa750f52b11f72eb9952
+ Anahi Anahí Molina 332bb9ac49de4b646fea5593f1dee95053b2cfd7
+ Julieta Julieta Lichtensztein 915de3b5966d41cfc0470cb98ee59de033533a17
+ Gabriela Gabriela Larios 6a35b8bb3de2ae0c864528e1367222bb72f3c7fd
+ Federico Federico Rey 6f4585588e079e6e82a60c51f9f02852189f4048
+ Mariana Mariana Aguilar 6685d8a3c130e83d1e5c817fdcd836284e28b251
+ Nacho Ignacio Puente 8d43c4ee9ce756996ff52011501d33c00ce8f27e
+ GabrielaM Gabriela Martinez 15beb7039fe21c083db87e0afe57f8e2d513897a
+ Milagros Milagros Oreja 6bbd1f819275c60513f0af477a2b496920acb9e0
+ Mariana M Mariana Malant aef0fdefe0324d757cb68cff013c37f19773824a
+ Andres Andrés Grippo 3c3badd00b1ca8626ba8784f172be11edc4e3d7c
+ Hernan Hernán Bongioanni af6591e97f6c9366fbf8bf23bb746f8bc28df4c4
+ Sergio Sergio Hernández dd9e2accf05074798b65f722063131c2120090ad
+ Pedro Pedro Mairal 865324536db17f1f2ac205fb6518589dc9cf3b13
+ Roberto Roberto Gomez abfcc2ad3ebe46f6f0326d1c886f89541035c289
+ Webmaster Ana Lloret 75027294ec7e7bd26a97076c69019d4a367037bf
+ Pablo Pablo 4c08d94e55dd023533793fb3db22023c23a6f46d
+----------------------------------------------------------------------------------------------+
WE ARE ANONYMOUS
WE ARE LEGION
NOT FORGIVE
NOT FORGOTTEN
Wait for us
BY @ SECTORLEAKS_404 Y @ SECTOR_404 # FREESEC
http://pastebin.com/gBtd8XXY
Labels:
#FREESEC,
Argentina,
Exposed,
Ministry of Technology
November 4, 2012
Canzando the pedophile: @Pipison21 #d0x #Cak3 #PEDO
DOXEADO por: D4rk_Floyd & Anonymous Panama
Alfredo Reid --> @Pipison21 <--este br="br" merece="merece" morir.="morir." pedofilo="pedofilo">
Nacio el:
Febrero 21, 1983
Graduado del:
Instituto Jose Dolores Moscote
IPTC de Comercio
Cuenta personal de Facebook:
https://www.facebook.com/dj.junier.infiltrado
Cuenta personal de twitter:
@junier2101
Foto:
pic.twitter.com/MvpsWoOi
BlackBerry pin:
Lugar donde vive:
Habita en Panamá,
ciudad de Panamá,
Dentro de San Joaquin,
calle Colon.
No debemos resaltar que esta persona es un pedofilo por sus fotos tanto en redes sociales anonimas como en las personales, le pedimos a la policia nacional que le de sancion por esto ya que es una AMENAZA para los niños dentro de la red...
Pruebas de que es un pedofilo con pruebas en fotografia de una converzacion utilizando ingenieria inversa para revelar su verdadera cara:
pic.twitter.com/GBTMeZWb
pic.twitter.com/0Knd9aqV
Saludos a todos Somos Anonymous
Somos Legion
No perdonamos
No olvidamos
Pedofilos
Ya llegamos ;D--este>
DOXEADO by: Anonymous D4rk_Floyd & Panama
Alfredo Reid --> @Pipison21 <--este br="br" merece="merece" morir.="morir." pedofilo="pedofilo">
Nacio el:
Febrero 21, 1983
Graduado del:
Instituto Jose Dolores Moscote
IPTC de Comercio
Cuenta personal de Facebook:
https://www.facebook.com/dj.junier.infiltrado
Cuenta personal de twitter:
@junier2101
Foto:
pic.twitter.com/MvpsWoOi
BlackBerry pin:
Lugar donde vive:
Habita en Panamá,
ciudad de Panamá,
Dentro de San Joaquin,
calle Colon.
No debemos resaltar que esta persona es un pedofilo por sus fotos tanto en redes sociales anonimas como en las personales, le pedimos a la policia nacional que le de sancion por esto ya que es una AMENAZA para los niños dentro de la red...
Pruebas de que es un pedofilo con pruebas en fotografia de una converzacion utilizando ingenieria inversa para revelar su verdadera cara:
pic.twitter.com/GBTMeZWb
pic.twitter.com/0Knd9aqV
Saludos a todos Somos Anonymous
Somos Legion
No perdonamos
No olvidamos
Pedofilos
Ya llegamos ;D--este>
ENGLISH TRANSLATED
DOXEADO by: Anonymous D4rk_Floyd & Panama
Alfredo Reid -> @ Pipison21 <- deserves="deserves" die.="die." pedophile="pedophile" span="span" this="this" to="to"> ->
Born on:
February 21, 1983
Graduated from:
Jose Dolores Moscote Institute
IPTC Trade
Personal account of Facebook:
Personal Twitter account:
@ Junier2101
Photo:
BlackBerry pin:
Where you live:
It lives in Panama,
Panama City
In San Joaquin,
Colon Street.
We should point out that this person is a pedophile for his pictures
both in social networks and in the personal anonymous, we ask your
national police sanction for this as it is a threat to children within
the network ...
Evidence that is a pedophile with a photograph evidence converzacion using reverse engineering to reveal his true colors:
Hello everyone We are Anonymous
We are Legion
We do not forgive
Do not forget
Pedophiles
Here we are; D
Labels:
#Cak3,
#PEDO,
Pipison21 #d0x
Anonymous Message to the Argentine Government. #OpArgentina8N
Anonymous Message to the Argentine Government. (Original in Portugese )
This is a warning Hacktivists Anonymous groups in Latin America.
Madam President of Argentina, these are our demands and the people to
whom we belong, therefore intimamos you to take the following urgent
measures demanded by mobilized citizens, that the national government
should take to restore social peace.
1. The national government must comply with the law, respecting the basic principles of the Republican and democratic system. Framing all of their acts within the Constitution, respecting the separation of powers and freedom of expression.
2.
The National Government shall declare an emergency in the
administration of justice, applying to the National Congress to impeach
corrupt judges and prosecutors, suspending while processing the case to
the accused. Also request a waiver of all members of the Judicial Council, a constitutional body for the appointment and removal of judges. Calling new fair and transparent elections.
Should be covered promptly 2/1- vacancies national and provincial
courts, now headless due to bureaucracy induced from the government
itself and the Council of the Magistracy.
2/2- The National Government will comply IMMEDIATELY firm failures
dictated by the Supreme Court of Justice of the Nation, who order and
adjust retirees pay wages.
3.
The National Government shall declare an emergency Security Ministry of
persecution and mistreatment of members of the Security Forces and
Armed Forces of the Nation and the provincial ministries, allocating the
necessary financial and human resources and putting an end.
Should be discontinued 3/1- Law 24.660, ordering judges and prosecutors
cease to grant temporary release and all kinds of prisoners tried and
convicted for crimes of rape, robbery, murder, kidnapping, and drugs
must. Reviewing the merit of the benefits provided.
3/2- The child arrested for crimes appointees should not be released
under excuse of being "minor", but under the current Youth Criminal
Regime, chords being housed in schools, with surveillance and security.
4. The National Government will end the labor abuse and / or abusod of all public employees. All public employees should be actually made, respecting the right to administrative and career ladder.
5.
The National Government shall appoint a committee of notable
independent effects of cleaning up the INDEC, today lies institute K.
On the other hand, is reported to the Executive to be declared an end
to abuse of the national chain, ruling the advertising of all kinds
lining the cycle Football broadcasts for everyone. Leave off the air ultraoficialista cycle "678" and other programs designed to end exclusive government propagandist.
6.
The Executive Branch must leave, effective and immediate implementation
of mechanisms of extortion against provincial governors.
6/1- The executive must abandon addressing public works projects to the
provinces with governors "friendly" towards entrepreneurs and
accomplices.
6/2- The National Executive will immediately pay final judgments of the
Supreme Court of Justice for amounts owed to the provinces of San Luis
and Cordoba.
7.
The national government shall cease data collection, bordering on
espionage by the Federal Administration of Public Revenue
(AFIP-Echegaray) and the Department of Transportation (UP).
7/1- call on citizens to report, in this web-site if your neighborhood,
city or town lies a government official, and publish his home.
Whether of Deputies, Senators, Judges, Prosecutors, Secretaries of
State, or any position with decision on the existence and daily life of
each of us, providing all possible accuracy for location and
identification.
8. The National Government will send Congress a bill repealing the Act Patria Grande. Driving immediate control of immigration.
Expelling immigrants who have committed crimes and / or who are in
illegal activity and establishing quotas by region and for those that
are would-be immigrants in Argentina.
9.
The Lady President of Argentina, Cristina Fernandez de Kirchner,
understand that was chosen to manage the National Trust, but should also
know that embezzlement is a serious offense under the Criminal Code.
9/1- For the specific case of the frigate ARA "Freedom", an appropriate
mechanism be established with sufficient means for immediate recovery.
10.
Failure to find Mrs. President of the Nation, the will to correct the
erratic course of management, citizenship organized public
demonstrations continued steadily after November 8, 2012.
With the sole aim to remind all the political leadership of the country
that it does not own property and public resources, but are mere
administrators and casual, with civil and criminal liability for their
actions.
This Nov. 8, the teams from all over Latin America Anonymous we will be operating on servers and Argentina government sites.
We know their systems and their limited knowledge.
We see and can not see us. We the People.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Tarry, Government of Argentina.
# OpArgentina8N launched November 8, 2012 18 Hs Arg
We thank the people of our country to all organizations, assemblies,
and communities of Anonymous Teams around the world by supporting this
operation.
Labels:
#OpArgentina8N,
Government Argentine,
Message
Sometimes They Come Back: Team GhostShell Leaks 120K Records from Top 100 Universities
This summer, when Team GhostShell released one million accounts as part of their Project HellFire campaign, I was particularly impressed by one sentence contained in the pastebin statement which accompanied the release.
One million accounts/records leaked. We are also letting everyone know that more releases, collaborations with Anonymous and other, plus two more projects are still scheduled for this fall and winter. It’s only the beginning.
I was wondering what else the hacking
collective had in mind, and unfortunately I did not have to wait too
long for the answer. As promised, at the beginning for this fall
Team
GhostShell returned with a new campaign called “ProjectWestWind”, aimed
at “raising awareness towards the changes made in today’s education,
how new laws imposed by politicians affect us, our economy and overall,
our way of life”.

Their interpretation of their concept of
“raising awareness” is a little bit complicated since, in order to raise
awareness they hacked top 100 International Universities and leaked
more than 120,000 accounts (leaving in their servers hundreds of
thousands more). The list includes Harvard, John Hopkins, the University
of Michigan, Tokyo University, New York University, Princeton and the
University of Rome and leaked data contains email addresses, hashed
passwords, IDs and names of students and faculty members.
It worth to mention that they claimed to
have found a lot of servers infected with malware, and some other
storing credit card information.
There is not so much to comment. I would
prefer to limit myself to the Italian situation: when dealing with the
quality of infrastructures, Italian Universities rank inevitably at the
bottom of every possible chart, when dealing with being hacked, they
rank inevitably at the top…
Labels:
#ProjectHellFire,
#TeamGhostShell,
Leak,
ProjectWestWind,
University
Cyber Security Tools list 2012 [ #TOOLS]
Cyber Security Tools list 2012
This list is an collection of cyberwarfare and cybercrime tools.
Security tools that have been collected from the internet can be found
here. They all have an legit and trusty source.
The tools that criminals use are mostly the same tools that security experts use to audit their systems. This goes the same for cyberwarfare and cybercrime tools. Cyberwarfare or hacktivism tools like DDOS scripts are used by pentesting experts to pentest and audit an environment.
Security tools like Firewall Analyzers and password cracking tools are needed to create and provide secure environments. This list offers an wide range of tools: real time protection tools, portable anti virus programs, anti rootkit tools, sniffing tools and several company provided tools.
Cyberwarzone has listed several cyber security tools to help you gain an better understanding of security.
Most of the products you can find for security are paid security solutions. Cyberwarzone has tried to collect tools that are being provided for FREE. So if you need an free cyber security tool then you are at the right address.

These devices and tools all create logfiles that can be analyzed to
Tools to review code.
Tools to review config files.
Interception Tools
Have you lost your password and you need to retrieve your password? Then take a look at these password retrieval tools.
The tools that criminals use are mostly the same tools that security experts use to audit their systems. This goes the same for cyberwarfare and cybercrime tools. Cyberwarfare or hacktivism tools like DDOS scripts are used by pentesting experts to pentest and audit an environment.
Security tools like Firewall Analyzers and password cracking tools are needed to create and provide secure environments. This list offers an wide range of tools: real time protection tools, portable anti virus programs, anti rootkit tools, sniffing tools and several company provided tools.
Cyberwarzone has listed several cyber security tools to help you gain an better understanding of security.
Most of the products you can find for security are paid security solutions. Cyberwarzone has tried to collect tools that are being provided for FREE. So if you need an free cyber security tool then you are at the right address.

Security tools
You can find a lot of security tools on the internet. But it is hard to find the right tool for the right job. Here you will be able to download firewall analyzers and several security tools. Cyberwarzone has listed these tools for you.If you believe we missed out on a security tool you can send us an message or simply post it as an comment.
Real time protection
Avast! | Free |
Ad-Aware | Free |
AVG | Free |
Panda Cloud | Free |
Avira free antivirus | Free |
Microsoft Security Essentials | Free |
Comodo | Free |
Fprot (with Returnil) | Free |
PC Tools Free | Free |
FortiClient Lite | Free |
Unthreat Antivirus | Free |
Preventon | Free |
Rising | Free |
Zillya! | Free |
NANO | Free |
Digital Defender | Free |
ClearSight | Free |
Zoner | Free |
BkavHome | Free |
CMC Infosec | Free |
Clam Sentinel | Free |
Moon Secure | Free |
ZenOK |
Free |
Ainvo Antivirus | Free |
Portable anti-virus programs
Anti Root kit
Firewall analyzer
Security is effective when you know what is going on in your environment. The most of us protect ourselves with Firewalls, IDS, IPS and multiple monitor tools.These devices and tools all create logfiles that can be analyzed to
Software | Free / Paid | Download link |
---|---|---|
Firemon | Paid | http://www.firemon.com |
Barracudanetworks | Paid | http://www.barracudanetworks.com |
Splunk | Paid | http://www.splunk.com |
Monitor tools
If you want to monitor your environment you can use these monitor tools to find out what is happening in your environment.Software | FREE / Paid | Download link |
---|---|---|
Zenoss Core | Free | http://community.zenoss.org/ |
NTA Monitor | Free | http://www.nta-monitor.com/tools/ike-scan/ |
Sniffers
Do you need to analyze an packet? You can use this packet analyzers to sniff packets that cross your network. You can analyze network problems, detect network intrusion attempts and more.Software | Free / Paid | Download link |
---|---|---|
Wireshark | Free | http://www.wireshark.org |
NMAP | Free | http://nmap.org/ |
Code Review Tools
Tools to review code.Software | Free / Paid | Download link |
---|---|---|
Rough Auditing Tool for Security | Free | https://www.fortify.com |
Config Review Tools
Tools to review config files.
Software | Free / Paid | Download link |
---|---|---|
Apache Benchmark | Free | http://www.cisecurity.org/ |
Microsoft Best Practice Analyzer | Paid | http://www.microsoft.com |
Database Tools
Software | Free / Paid | Download link |
---|---|---|
SQL Server Express Utility | Free | http://www.microsoft.com |
MySQL Command-Line Tool | Free | http://dev.mysql.com/ |
Leviathan | Free | http://leviathan.sourceforge.net/ |
WinSQL without installer | Free | http://web.synametrics.com/rawfiles.htm |
Debugging Tools
Software | Free / Paid | Download link |
---|---|---|
OllyDbg | Free | http://www.ollydbg.de/ |
Free | ||
Free | ||
Free |
Forensic Tools
Software | Free / Paid | Download link |
---|---|---|
Mandiant Red Curtain | Free | http://www.mandiant.com/ |
Mandiant Red Line | Free | http://www.mandiant.com/ |
Free | ||
Free |
Fuzzer Tools
Software | Free / Paid | Download link |
---|---|---|
Skipfish | Free | http://code.google.com/p/skipfish/ |
WSFuzzer Project | Free | https://www.owasp.org/ |
FileFuzz | Free | http://www.securiteam.com/tools |
Fuzzdb | Free | http://code.google.com/p/fuzzdb/ |
SAP tools
Software | Free / Paid | Download link |
---|---|---|
SAPYTO | Free | http://www.security-database.com/ |
Backdoor Tools
Software | Free / Paid | Download link |
---|---|---|
TINI | Free | http://ntsecurity.nu/toolbox/tini/ |
Brute Force Tools
Software | Free / Paid | Download link |
---|---|---|
Hydra Brute Force Utility | Free | http://www.madirish.net/ |
BRUTUS | Free | http://www.hoobie.net/brutus/ |
TSGrinder | Free | http://www.hammerofgod.com/ |
Patator | Free | http://code.google.com/p/patator/ |
Truecrack Password cracking for truecrypt encrypted volume files click here
Interception Tools
Software | Free / Paid | Download link |
---|---|---|
Echomirage | Free | http://www.bindshell.net/tools/ |
Password Cracking Tools
Software | Free / Paid | Download link |
---|---|---|
Cain & Abel | Free | http://www.oxid.it/cain.html |
John the Ripper | Free | http://www.openwall.com/john/ |
Ophcrack | Free | http://ophcrack.sourceforge.net/ |
Password Retrieval Tools
Have you lost your password and you need to retrieve your password? Then take a look at these password retrieval tools.
Software | Free / Paid | Download link |
---|---|---|
Creddump | Free | http://code.google.com/p/creddump/ |
FGdump | Free | http://www.foofus.net/~fizzgig/fgdump/ |
Pass-The-Hash toolkit | Free | http://oss.coresecurity.com/ |
PWdump | Free | http://www.foofus.net/~fizzgig/pwdump/ |
Token Impersionation Tools
Software | Free / Paid | Download link |
---|---|---|
Incognito | Free | http://sourceforge.net/projects/incognito/ |
Pass-The-Hash toolkit | Free | http://oss.coresecurity.com/ |
Windows Credentials Editor | Free | http://www.ampliasecurity.com/research.html |
LIVE CD's
Software | Free / Paid | Download link |
---|---|---|
Backtrack | Free | http://www.backtrack-linux.org/ |
Hiren | Free | http://www.hiren.info/pages/bootcd |
Great Tool resources
Software | Free / Paid | Download link |
---|---|---|
HackArmoury | Free | http://hackarmoury.com/tools |
Microsoft | Free | http://www.microsoft.com/download/ |
Phenoelit | Free | http://phenoelit.org/fr/tools.html |
techsupportalert | Free | Massive tools list |
Kaspersky Free Tools
Kaspersky Virus Removal Tool | free | Virus Removal Tool is a utility designed to remove all types of
infections from your computer. It implies effective algorithms of
detection used by Kaspersky Anti-Virus and AVZ. It cannot substitute a
resident antivirus application. http://www.kaspersky.com/antivirus-removal-tool-register |
Kaspersky Rescue Disk 10 | free | Kaspersky Rescue Disk is designed to scan, disinfect and restore
infected operating systems. It should be used when it is impossible to
boot the operating system. http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso |
Kaspersky Security Scan |
free | Kaspersky Security Scan provides a free-of-charge, easy way to find
viruses and other threats that may be hidden on your PC… plus get advice
on your PC’s security status. http://products.kaspersky-labs.com/products/multilanguage/special/kss2/kss12.0.1.117mlg_en_ru_fr_de.exe |
Mandiant free tools
Redline
Mandiant Redline is a free utility that accelerates the process of
triaging hosts suspected of being compromised or infected while
supporting in-depth live memory analysis.
More
More
IOC Editor
Mandiant IOC Editor is a free editor for Indicators of Compromise (IOCs).
More
More
IOC Finder
Mandiant IOC Finder is a free tool for collecting host system data
and reporting the presence of Indicators of Compromise (IOCs).
More
More
Memoryze
Free memory forensics software designed to help incident responders find evil within live memory.
More
More
Audit Viewer
Audit Viewer is an open source tool that allows users to examine the results of Memoryze's analysis.
More
More
Highlighter
Highlighter is designed to help security analysts and system administrators rapidly review log and other structured text files.
More
More
Red Curtain
Software for incident responders that helps find and analyze unknown malware.
More
More
Web Historian
Assists users in reviewing websites that are stored in the history files of the most commonly used browsers.
More
More
Research: PdbXtract
PdbXtract is a tool to help you explore symbolic type information as extracted from Microsoft programming database files.
More
More
Research: Mandiant ApateDNS
ApateDNS is a tool for controlling DNS responses though an easy to use graphical user interface (GUI).
More
More
Research: Mandiant Find Evil
A malware discovery tool which uses disassembly to detect packed executables.
More
More
Research: Mandiant Heap Inspector
Heap Inspector is a heap visualization and analysis tool. It has the
ability to collect a process' heaps using both API and raw methods.
More
More
Research: Mandiant Metasploit Forensic Framework
The Metasploit Forensic Framework (MSFF) is a proof of concept tool
that can potentially reconstruct an attacker's meterpreter sessions.
More
More
Research: Mandiant MindSniffer
MindSniffer is a tool that will allow the user to translate snort
signatures to either XML jobs or Python plug-ins that can be used to
identify processes containing strings that match snort signatures.
More
More
Research: Mandiant Restore Point Analyzer
A simple forensic tool to analyze change.log files from restore
points to determine the original paths and file names of files stored
inside restore points.
More
More
BindShell Tools link
- BeEF
BeEF is the browser exploitation framework. Its purposes in life is to provide an easily integratable framework to demonstrate the impact of browser and cross-site scripting issues in real-time. The modular structure has focused on making module development a trivial process with the intelligence existing within BeEF. Some of the basic functionality includes Keylogging and Clipboard Theft.
- Become
The become utility changes the current effective, or real, user and group identity to those specified on the command line. The default shell (/bin/sh) is then executed.
UID and GID are specified numercially and do not have to be currently defined on the system.
Lots of fun when playing around with other peoples NFS exports.- Coder
A windows utility to encode and decode various encoding schemes. Currently supports Base64, Hex, HTTP URL Encoding and MD5.
- Dnetj
Dnetj is a distributed client/server version of John the ripper.
It is operated in much the same way as distributed.net or setiathome, but is designed to crack password hash files.- ETrace
ETrace is a configurable static port network tracing tool, similar to traceroute, but supporting ICMP, TCP, UDP and other IP protocols.
- Echo Mirage
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function calls so that data transmitted and received by local applications can be observed and modified.
- GenIP
IA small utility, based on the NMap target specification code, for quickly and easily generating lists of IP addresses.
- ICMPScan
Does what it says on the tin: Scans the specified address, or addresses, for ICMP responses. Handles echo (type 8 ), timestamp (type 13), address mask (type 17), information (type 15) and router solicitation (type 10) requests.
- John The Ripper MPI Patch
This is an updated version of Ryan Lim's patch for john the ripper to support MPI, in addition to a large number of third party patches to support additional ciphers and such.
- MassResolve
This program performs multi-threaded reverse DNS lookups. It can be passed a netblock or a file of IP addresses to process.
- ObexSend
ObexSend is a simple command line tool to transfer a file via OBEX FTP to a device with a Bluetooth interface. It requires the user to specify the MAC address of the desination device, the OBEX FTP channel and the name of the file to send.
- Odysseus
Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Odysseus will intercept an HTTP session's data in either direction and give the user the ability to alter the data before transmission.
- RFIDTool
RFIDtool has been designed to perform atomic tasks on RFID tags. This focus allows for the tool to be easily incorporated into scripts to acheive more complex and useful tasks. One example is to load RFID tags with varying data depending up their storage size.
- SSLCat
SSLCat is a netcat like utility with SSL support. SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
SSLCat accepts a hostname and optional port number (443 is used if none is specified) and attempts to form a SSLv2 connection to the specified host. If all goes well, data is read from stdin and sent across the encrypted connection, while incoming data from the encrypted connection is sent to stdout.- Screen Shooter
A windows utility to simplifies taking screen shots of either the currently focused window or the entire desktop. Screen Shooter uses configurable hot keys hot keys and supports Bitmap, GIF, JPEG, PNG and TIF image formats.
- SynScan
A quick half-open portscanner. This tool will send TCP packets with the SYN flag set at the destination address. SynScan will send traffic as fast as the host network interface can support.
- Telemachus
A companion utility for Odysseus allowing further analysis and manipulation of HTTP transactions.
This article is being updated on a regurlar basis.
ONLY USE THESE TOOLS ON YOUR OWN NETWORK
Share this article with your environment.
http://www.cyberwarzone.com/cyberwarfare/cyber-security-tools-list-2012
Subscribe to:
Posts (Atom)