![]() |
|
Register | FAQ | The Twelve Commandments | Members List | Calendar | Arcade | Find the Best VPN | Today's Posts | Search |
BearShare Open Discussion Open topic discussion for BearShare users
Preview this popular software (BearShare Beta v5 "Download") |
| LinkBack | Thread Tools | Display Modes |
| |||
![]() STRATEGIC ANTI BEARSHARE CYBERWAR ALLIANCE (SABCA) Weaken important structures of the enemy: 1) Crash BS peers providing incoming connections 2) Prevent BS downloads files 3) Stop webpage and propaganda of the enemy 4) Decrease enemy's user base 5) Secret intelligence work Improve the strength of our own forces and allies: 6) Improve technologies and find more programmer and hacker 7) Improve alternative Gnutella protocol and clients of allies to 1) Crash BS peers providing incoming connections A modified Gnutella client "Freedom" will connect continously to the BS hostcaches (with faked BS identification) and hunt; another modified client "Honour" (also faked BS ID) which will sneak into the BS network and keeps steady connections to as many enemies as possible, fools and attacks them. One single Freedom and one single Honour communicate and work with each other. In future it might become necesarry to coordinate communication between many Honour clients. Freedom collects as much as possible IPs of BS peers with incoming connections ('not firewalled'), crashing them will make connecting to the BS network much harder. Additional Freedom acts as a TTL2 crawler and searchs for long alive BS peers with incoming connections, crashing them is our primary target and will segment BS network into smaller networks or bring it to deadlock. Peers with incoming connections are rare, destroying them will hurt downloads an functionality of the enemy's network. As soon as BS comes with Supernodes, they will be high primary target! Crashing peers can be performed with a various number of (distributed) denial of service attacks. a) Flooding the peer's TCP/IP stack with connection attempts and fill as many as possible ports for a longest time (Freedom has to inform other Honour clients to flood an enemy peer and Honuor itself will abuse the enemies with wrong descriptors to attack their own troups). b) Running an OS detection and crash the oponnent's PC with an exploit. Many hosts do still run Windows98, Bearshare runs not on Linux. c) Freedom and Honour can direct attack peers if a known weakness inside the BS clients itself is detected. Software is never fault safe, finding an easy possibility to crash BS clients is only a matter of time. Notes: Ensure that Freedom and Honour can distinguish between friend and foe, make them shock proof! Enemies (including RIAA) may not be allowed to modify our tools and abuse them to target against our own allies (no open source, use checksums/scambler against modifications with hexeditor and debugger). This point is critical! Our technical service will advice you, our secret service informs about any danger of stealing or of abusing our technology. to 2) Prevent BS downloads files A modified client "Honour" will replace as much as possible important BS peers. Typically Honour should provide incoming connections for other BS clients, our technical service will advice you about firewall and router settings. Honour will route every traffic but _no_ Pushs, it will also fake _any_ Queryhit, containing IP/ports of BS clients to become crashed ("Freedom" will deliver them), it will also fake _any_ Hash and set Metadata to wrong values while routing. Download of files will become hard or impossible after PUSHs are eliminated on the enemy's network. Aditionaly, hundreds of faked Queryhits will tell BS clients to flood one of their own peers, causing it's brakedown. Additionally, a programmer team will post patches for all known client to block BS clients from connection and download. Spread those patches on all known places and update if allied clients (or enemies behaviour) is modified. Our technical service will support you. Notes: Ensure that Honour connect only to BS clients, make it shock proof! Allies networks have to keep safe from traffic modification as far as possible. We expect the enemy will modify it's own clients to detect our Honour clients, constantly debugging and adjustment of our technology is required. to 3) Stop webpage and propaganda of the enemy A tiger team has to hack into the enemy's webpage -or- flood it with denial of service attacks. Honour clients with some extra bandwith might launch steady floddings on the webpage (secondary target) and generate fake Querhits to stop the enemy's home propaganda. Do not attack the BS hostcaches, they are currently of important strategic meaning for our own forces! Additionally, civil helpers will inform users about the disadvantages of the enemy's client and behaviour. The enemy's home and well known filesharing portals are destinations for placing information. to 4) Decrease enemy's user base This is the goal of our mission. Once the enemy's user base is drastically reduced, they are running out of spyware reinforcements. Every taken action, civil or cybermilitary, has to make BS less attractive! Honour clients with some extra bandwith might launch floddings on random users clients (secondary target) and drop random incoming connections time by time, so cause the BS network to be more unstable in the eyes of it's users. Additionally, civil helpers will inform users about the advantages of our allies. The enemy's home and well known filesharing portals are destinations for placing information, news artiles, reports and screenshots. Positive counter propaganda is very important to decrease the enemy's user base. to 5) Secret intelligence work Classified, members only. Contact our technical support, currently searching virus and network specialists. to 6) Improve technologies and find more programmer and hacker Maintainance and devlopment of our tools is most important! Join the allience today and fight the filesharing evil! We need all type of skills and support, from average user up to skilled programmer or cyberwarrior. Please contact us! to 7) Improve alternative Gnutella protocol and clients of allies Join civil projects to develop an alternative Gnutella network. Help to improve our allies! More information available in our civil brochure. Free gnutella! ----- PS: only theory... don't be scared BS trolls. |
| |
![]() | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Introducing, Da CaT | johnconnor | Chat - Open Topics - The Lounge | 7 | August 19th, 2006 11:16 AM |
opensource | WattsTech | General Discussion | 4 | October 7th, 2002 01:35 AM |
OpenSource P2P Debate, it's about choice | Unregistered | General Gnutella / Gnutella Network Discussion | 210 | June 16th, 2002 11:29 PM |
OpenSource P2P Net Info and IP posts | Anonnn | General Gnutella / Gnutella Network Discussion | 36 | April 20th, 2002 08:53 AM |
OpenSource P2P Net Discussion Thread | Anonnn | General Gnutella / Gnutella Network Discussion | 216 | March 31st, 2002 05:03 AM |