<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>network Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/network/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/network/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Thu, 26 Jan 2023 11:23:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>network Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/network/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>9 Things Everyone Should Know About The Hacktivist Group Anonymous</title>
		<link>https://goodshepherdmedia.net/9-things-everyone-should-know-about-the-hacktivist-group-anonymous/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 27 Dec 2022 21:34:28 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[(DDoS)]]></category>
		<category><![CDATA[(LOIC)]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[community]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[detest Censorship]]></category>
		<category><![CDATA[distributed-denial-of-service]]></category>
		<category><![CDATA[FREEDOM]]></category>
		<category><![CDATA[freedom fighters]]></category>
		<category><![CDATA[gain access]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hacktivist]]></category>
		<category><![CDATA[Hacktivist Group]]></category>
		<category><![CDATA[launch DDoS attacks]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Massive Botnets]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[network overload]]></category>
		<category><![CDATA[overload]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[utilize the processing power of every computer]]></category>
		<category><![CDATA[wave of cyber-attacks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=7401</guid>

					<description><![CDATA[Who are Anonymous and why are they fighting alongside Ukraine? Anna Zhadan cited  Hacking group Anonymous has declared a cyberwar on Russia in response to its attack on Ukraine. But who are Anonymous, and what interest do they have in siding with Ukraine? Now easily distinguishable by a white mask with a grin, Anons are members [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: center;">Who are Anonymous and why are they fighting alongside Ukraine?</h1>
<p><a class="link article-info__link" href="https://cybernews.com/author/annaz/">Anna Zhadan</a> <a href="https://cybernews.com/editorial/who-are-anonymous-and-why-are-they-fighting-alongside-ukraine/" target="_blank" rel="noopener">cited </a></p>
<p><strong><em>Hacking group Anonymous has declared a cyberwar on Russia in response to its attack on Ukraine. But who are Anonymous, and what interest do they have in siding with Ukraine?</em></strong></p>
<p>Now easily distinguishable by a white mask with a grin, Anons are members of a decentralized international collective of tech activists and hackers. As they would claim, Anonymous is no one and everyone at once, with anyone being able to sign their hacking effort under the coalition’s name.</p>
<p>Their targets have included governments, state organizations, tech giants, and big enterprises. Perhaps most famous for their politically and socially motivated cyberattacks, they are viewed by many as “digital superheroes,” who serve their own justice – especially when law enforcement fails to do so.</p>
<p>“In the new video Vibes made, Anonymous represents extrajudicial justice, the superhero entering to right what the normal course of the law cannot—an idea that can seem deeply appealing now that the ordinary enforcers of justice—the police—appear to some to be the source of the crime,” Dale Beran writes for <a href="https://www.theatlantic.com/technology/archive/2020/08/hacker-group-anonymous-returns/615058/" target="_blank" rel="noopener noreferrer nofollow"><em>The Atlantic</em></a>.</p>
<p>The group is believed to have originated in 2003 on the message board 4chan, which gave the name “Anonymous” to all users who decided not to specify their usernames. Mostly teenagers, users would gather together in virtual chats to discuss modern politics.</p>
<p>Small-scale hacks started off as coordinated pranks and raids on online games and chat rooms. But by 2008, the group began choosing more serious targets, such as the Church of Scientology. At the same time, their signature Guy Fawkes masks, used as an inspiration by David Lloyd in <em>V for Vendetta</em>, became a symbol of Anonymous and their rebellion against the abusers of power.</p>
<h2 id="fight-for-ukraine" class="content__heading ">Fight for Ukraine</h2>
<p>On February 24th, the hacktivist collective announced that they’re officially in cyberwar against the Russian government following the invasion of Ukraine.</p>
<div class="embed content__item embed_twitter">
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-0" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?creatorScreenName=CyberNews&amp;dnt=false&amp;embedId=twitter-widget-0&amp;features=eyJ0ZndfdGltZWxpbmVfbGlzdCI6eyJidWNrZXQiOlsibGlua3RyLmVlIiwidHIuZWUiLCJ0ZXJyYS5jb20uYnIiLCJ3d3cubGlua3RyLmVlIiwid3d3LnRyLmVlIiwid3d3LnRlcnJhLmNvbS5iciJdLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdGltZWxpbmVfMTIwMzQiOnsiYnVja2V0IjoidHJlYXRtZW50IiwidmVyc2lvbiI6bnVsbH0sInRmd190d2VldF9lZGl0X2JhY2tlbmQiOnsiYnVja2V0Ijoib24iLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3JlZnNyY19zZXNzaW9uIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19zaG93X2J1c2luZXNzX3ZlcmlmaWVkX2JhZGdlIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19jaGluX3BpbGxzXzE0NzQxIjp7ImJ1Y2tldCI6ImNvbG9yX2ljb25zIiwidmVyc2lvbiI6bnVsbH0sInRmd190d2VldF9yZXN1bHRfbWlncmF0aW9uXzEzOTc5Ijp7ImJ1Y2tldCI6InR3ZWV0X3Jlc3VsdCIsInZlcnNpb24iOm51bGx9LCJ0ZndfbWl4ZWRfbWVkaWFfMTU4OTciOnsiYnVja2V0IjoidHJlYXRtZW50IiwidmVyc2lvbiI6bnVsbH0sInRmd19zZW5zaXRpdmVfbWVkaWFfaW50ZXJzdGl0aWFsXzEzOTYzIjp7ImJ1Y2tldCI6ImludGVyc3RpdGlhbCIsInZlcnNpb24iOm51bGx9LCJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2R1cGxpY2F0ZV9zY3JpYmVzX3RvX3NldHRpbmdzIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd192aWRlb19obHNfZHluYW1pY19tYW5pZmVzdHNfMTUwODIiOnsiYnVja2V0IjoidHJ1ZV9iaXRyYXRlIiwidmVyc2lvbiI6bnVsbH0sInRmd19zaG93X2JsdWVfdmVyaWZpZWRfYmFkZ2UiOnsiYnVja2V0Ijoib24iLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3Nob3dfZ292X3ZlcmlmaWVkX2JhZGdlIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19zaG93X2J1c2luZXNzX2FmZmlsaWF0ZV9iYWRnZSI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9mcm9udGVuZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9fQ%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1496965766435926039&amp;lang=en&amp;origin=https%3A%2F%2Fcybernews.com%2Feditorial%2Fwho-are-anonymous-and-why-are-they-fighting-alongside-ukraine%2F&amp;sessionId=ea3c970d0c2dcdccb22202bfda25e355da97117d&amp;siteScreenName=CyberNews&amp;theme=light&amp;widgetsVersion=a3525f077c700%3A1667415560940&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1496965766435926039" data-mce-fragment="1"></iframe></div>
</div>
<p>Since then, they have <a href="https://cybernews.com/news/anonymous-leaks-database-of-the-russian-ministry-of-defence/">leaked the database</a> of the Ministry of Defence and the Ministry of Economic Development of Russia, taken down many state websites, including government.ru, hacked Russian state TV channels, and intercepted Russian military communications.</p>
<div class="embed content__item embed_twitter">
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-1" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?creatorScreenName=CyberNews&amp;dnt=false&amp;embedId=twitter-widget-1&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1497571513482063874&amp;lang=en&amp;origin=https%3A%2F%2Fcybernews.com%2Feditorial%2Fwho-are-anonymous-and-why-are-they-fighting-alongside-ukraine%2F&amp;sessionId=ea3c970d0c2dcdccb22202bfda25e355da97117d&amp;siteScreenName=CyberNews&amp;theme=light&amp;widgetsVersion=a3525f077c700%3A1667415560940&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1497571513482063874" data-mce-fragment="1"></iframe></div>
</div>
<p>“Anonymous has ongoing operations to keep .ru government websites offline,, and to push information to the Russian people so they can be free of Putin&#8217;s state censorship machine. We also have ongoing operations to keep the Ukrainian people online as best we can,” the collective shared in a tweet.</p>
<p>While most Russian organizations remained silent about the nature of attacks, Russia Today (RT) – the state-run TV channel that Anonymous referred to as “the Russian propaganda station” – has attributed DDoS attacks on its website to the group.</p>
<p>“After a statement by Anonymous, RT’s websites became the subject of massive DDoS attacks from some 100 million devices, mostly based in the U.S. Due to the attacks there might be temporary website access limitations for some users, yet RT is promptly resolving these issues,” an RT spokesperson told <em>Motherboard </em>in an email.</p>
<p>On the other hand, Roscosmos has denied claims that a series of disruptive attacks by the affiliates of Anonymous led to Russian officials losing control over their “spy satellites.” Originally, the NB65 hacking group claimed to have shut down the Control Center of the Russian Space Agency. The Director-General of Roscosmos, Dmitry Rogozin, called the information of “petty swindlers” to be false, previously stating that the Russian space industry is effectively protected from cyberattacks.</p>
<div class="embed content__item embed_twitter">
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-2" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?creatorScreenName=CyberNews&amp;dnt=false&amp;embedId=twitter-widget-2&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1498903566135832577&amp;lang=en&amp;origin=https%3A%2F%2Fcybernews.com%2Feditorial%2Fwho-are-anonymous-and-why-are-they-fighting-alongside-ukraine%2F&amp;sessionId=ea3c970d0c2dcdccb22202bfda25e355da97117d&amp;siteScreenName=CyberNews&amp;theme=light&amp;widgetsVersion=a3525f077c700%3A1667415560940&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1498903566135832577" data-mce-fragment="1"></iframe></div>
</div>
<p>Since the conflict is ongoing and many Russian entities are reluctant to disclose cyberattacks, it can be complicated to verify their source and accuracy. However, many experts suggest that it is indeed in line with the collective’s previous deeds and capabilities.</p>
<p>“It can be difficult to directly tie this activity to Anonymous, as targeted entities will likely be reluctant to publish related technical data. However, the Anonymous collective has a track record of conducting this sort of activity and it is very much in line with their capabilities,” Jamie Collier, a consultant at US cybersecurity firm Mandiant, <a href="https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia" target="_blank" rel="noopener noreferrer nofollow">told</a> <em>The Guardian</em>.</p>
<p>But what’s next? As hackers also join the Russian forces – such as the Conti ransomware group that sided with Putin – it looks like we’ll find ourselves not only in a state-led cyberwar, but also in a conflict reflecting private interests and personal values. Cyberwarfare is rather different from a traditional war in the sense that independent hacktivist groups often have as many – if not more – skills and resources to cause real disruption.</p>
<p>In today’s world, as some experts believe, cyberattacks are not some distinct digital incidents that have no physical effect anymore – they’re a part of a real war happening on the ground.</p>
<p>“We have long theorized that cyberattacks are going to be part of any nation-state’s arsenal and I think what we’re witnessing for the first time frankly in human history is cyberattacks have become the weapon of first strike,” Hitesh Sheth, CEO of Vectra AI, <a href="https://www.cnbc.com/2022/02/25/will-the-russia-ukraine-crisis-lead-to-a-global-cyber-war.html" target="_blank" rel="noopener noreferrer nofollow">told</a> <em>CNBC</em>.</p>
<h2 id="the-anti-oppression-coalition" class="content__heading ">The anti-oppression coalition</h2>
<p>Over time, many people have been arrested over affiliation with Anonymous in the US, the UK, India, Spain, the Netherlands, Turkey, and other countries. The group has drawn the attention of the FBI and various governments following a series of high-profile cyberattacks.</p>
<p>In 2010, Anonymous targeted PayPal, Visa, Amazon, and Mastercard for cutting off WikiLeaks donations.</p>
<p>Later in 2011, they successfully launched DDoS attacks on eight Tunisian government&#8217;s websites during the Tunisian revolution. Continuing with their support for the Arab Spring, they’ve leaked the passwords of the email addresses, as well as emails, of hundreds of Middle Eastern governmental officials and targeted Egyptian government websites during the Egyptian revolution.</p>
<p>Many attacks were to follow: from hacking the Syrian Defense Ministry website and placing a pro-democracy flag on it to joining Nigeria’s People&#8217;s Liberation Front and the Naija Cyber Hacktivists.</p>
<p>While not all deeds of the collective always had a positive outcome (for example, in 2014, they outed a wrong man for the police shooting of Michael Brown in 2014’s Missouri protests,) they earned them a reputation of fighters for justice.</p>
<p>Whether you applaud their Robin Hood-style ideology of championing free speech or detest their reckless disregard for the consequences of their actions, it’s undeniable that Anonymous has become a force to be reckoned with in recent years. From hacking politicians’ emails to taking down government websites, many of the group’s actions seem to straddle the line between good and evil. Maybe you can figure out which side of the fence they land on after reading these nine facts.</p>
<hr />
<h1 class="flex-grow font-headline text-3xl md:text-5xl text-royal-blue leading-tighter" style="text-align: center;">9 Things Everyone Should Know About The Hacktivist Group Anonymous</h1>
<p style="text-align: center;">By: <a href="https://computer.howstuffworks.com/9-things-everyone-should-know-about-the-hacktivist-group-anonymous.htm" target="_blank" rel="noopener">Wes Walcott</a></p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="1" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous1.htm"><span class="flex cursor-pointer " style="color: #0000ff;" role="button" aria-expanded="true" aria-controls="page1">9. It’s Not an Organization</span></h2>
<div id="page1" class="page-body se" data-slide="1" data-track-gtm="Content">
<p>The website <a class="ext-link" href="http://www.4chan.org/">4chan</a> is an image message board where people can gather to discuss, gripe about, or confess pretty much anything they want. To facilitate the sharing of possibly incriminating matters, users on the /b/ discussion board generally used the screen name “anonymous” and from that, a subculture of similar-minded individuals with a strong sense of justice and desire the to stir things up eventually became what we know today as Anonymous. But the group has no leader—a fact symbolized by their headless man logo—and they follow no legitimate guidelines or code of conduct. Members just come and go as they please and contribute as much or as little as they like. According to journalist and former member Barret Brown, the most powerful people in Anonymous are those who can rally others to their cause and have proven their hacking skill.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="2" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous2.htm"><span class="flex cursor-pointer " style="color: #ff00ff;" role="button" aria-expanded="true" aria-controls="page2">8. Anyone Can Join</span></h2>
<div id="page2" class="page-body se" data-slide="2" data-track-gtm="Content">
<p>No authority is going to try and stop you from joining Anonymous. But if this is something you’re seriously considering, it might be a good idea to first join up with an activism group that obeys the law. This way you can get a feel for what’s involved without risking involvement in any type of illicit behavior. After that, if you still wish to engage with Anonymous, <span style="color: #ff0000;"><strong><em><a class="ext-link" style="color: #ff0000;" href="https://anonops.com/">there’s a website</a></em></strong></span> you can go to that explains how you can encrypt your computer so you can contact them privately over internet relay chats (IRCs). Be advised that it can take several years to build the relationship with the community required to gain access to the more serious hacktivist discussions, and there are likely people lurking in the forums who aren’t who they claim to be. Although Anonymous does have members who genuinely want to do good, the fact that anyone can join means that moral values likely vary wildly. There are some cases where naive members have ended up doing jail time because they trusted the wrong anons.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="3" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous3.htm"><span class="flex cursor-pointer " style="color: #339966;" role="button" aria-expanded="true" aria-controls="page3">7. Most Members Aren’t Actually Hackers</span></h2>
<div id="page3" class="page-body se" data-slide="3" data-track-gtm="Content">
<p>It’s a misconception that everyone in Anonymous is a supreme hacker with the ability crush multinational corporations with nothing more than a laptop and modem. In fact, due to the relative ease of entry, the average Anonymous member probably has very few skills that fall into the realm of hacking. However, that’s not to say that those member don’t contribute, since many of the infamous hacks carried out by the group consist of distributed-denial-of-service (DDoS) attacks that utilize the processing power of every computer available to them. In a DDoS attack, networks are overloaded with an influx of information which causes them to crash and results in associated websites being taken offline. These types of attacks can be very frustrating for website administrators and users who are unable to access affected websites until the web traffic returns to normal. In the real world, this would be the equivalent of going in to work and being denied access to the job site by a group of angry protesters.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="4" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous4.htm"><span class="flex cursor-pointer " style="color: #0000ff;" role="button" aria-expanded="true" aria-controls="page4">6. How to Become an Active Participant</span></h2>
<div id="page4" class="page-body se" data-slide="4" data-track-gtm="Content">
<p>After you’ve encrypted your computer and joined the Anonymous community, the next thing to consider, if you haven’t already, is finding a cause that you support. For instance, if you wanted to get involved with the operation against the Islamic State in Syria (ISIS), the first thing you should do is find the IRC chat room dedicated to that operation and pledge your support there.</p>
<p>When they need to flex their muscle, Anonymous uses a special piece of software known as a “low-orbit ion cannon” (LOIC) to launch DDoS attacks. The software enables a computer to make a large-scale attack on any website. Targets are chosen through a voting system and launching an attack is a simple as entering a URL and then inputting the number of hits you want to send (typically enough to overload the network). However, if you disagree with a selected target, you have the option of withdrawing your computer from the botnet, thereby decreasing your involvement and weakening the power of the ion cannon.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="5" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous5.htm"><span class="flex cursor-pointer " role="button" aria-expanded="true" aria-controls="page5">5. Using the Low-Orbit Ion Cannon Can Put You at Risk</span></h2>
<div id="page5" class="page-body se" data-slide="5" data-track-gtm="Content">
<p>It should be noted that no legal ramifications should result from you joining Anonymous or chatting with others who claim affiliation, but once you get involved with the deployment of the LOIC, there’s a chance you could be looking at jail time.</p>
<p>In 2008, Anonymous orchestrated a number or protests against the Church of Scientology. Some of the prank-like attacks included flooding the Scientology headquarters with prank calls, sending various departments all-black faxes to deplete their ink, and even a physical protest with participants dawning bandanas and Guy Fawkes masks to conceal their identities. But the real blow came when Anonymous used the LOIC to take the Scientology website offline. Unfortunately, many anon newcomers didn’t realize that the LOIC attacks were traceable and, consequently, some of them, like 18-year-old Brian Mettenbrink, ended up serving a year in prison and coughing up $20,000 in damages to the Church of Scientology.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="6" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous6.htm"><span class="flex cursor-pointer " style="color: #ff0000;" role="button" aria-expanded="true" aria-controls="page6">4. They Can Use Malware to Create Massive Botnets</span></h2>
<div id="page6" class="page-body se" data-slide="6" data-track-gtm="Content">
<p>A botnet is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives. This makes them perfect for cyber attacks that involve spamming, flooding email inboxes, spreading viruses, and, of course, distributed-denial-of-service. The bots are any computers being controlled or programmed by an external source. The attacker typically gains access to the “zombie” network of computers by way of a virus or some piece of miscellaneous code.</p>
<p>In 2010, PayPal, under heavy pressure from the government, cut off its services to WikiLinks after the document leaking website began releasing hundreds of thousands of secret U.S. diplomatic cables. In response to the situation, Anonymous went after PayPal’s main site, but the reinforced network withstood the LOIC attack. They just didn’t have enough power to bring down PayPal; that is, until two hackers going by the aliases “Snitch” and “Civil” used a virus to bring a legion of computers under their control. With the a new army of zombie computers at their disposal, Anonymous had the ion cannons it needed to take down PayPal’s main transaction site. PayPal estimated that the damage cost them close to $6 million.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="7" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous7.htm"><span class="flex cursor-pointer " role="button" aria-expanded="true" aria-controls="page7">3. They Gave Birth to LulzSec</span></h2>
<div id="page7" class="page-body se" data-slide="7" data-track-gtm="Content">
<p>Now that Anonymous could control zombie botnets, a horde of members was no longer necessary to carry out DDoS attacks. This might have been what prompted a few of the most skilled hackers to break off and form an elite team. Calling themselves LulzSec, the new group was led by “Sabu,” who was largely considered the most skilled hacker in the entire Anonymous crowd.</p>
<p>Having grown tired of all the activism Anonymous was getting involved in, LulzSec was more interested in messing around and causing anarchy just for the fun of it. Their first exploit came at the expense of Fox when the personal information of over 70,000 <i>X Factor</i> contestants was leaked online. PBS became the next target when a hacker posted a fake news story stating that the Notorious B.I.G. and Tupac were still alive and living together in New Zealand. But it wasn’t long before LulzSec dispensed with the low-risk crimes and started going after government websites belonging to organizations like the CIA and FBI.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="8" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous8.htm"><span class="flex cursor-pointer " style="color: #ff0000;" role="button" aria-expanded="true" aria-controls="page8">2. They Detest Any Form of Censorship</span></h2>
<div id="page8" class="page-body se" data-slide="8" data-track-gtm="Content">
<p>In 2010, several Bollywood companies hired a software company called Aiplex to launch DDoS attacks on sites that were pirating their movies. This immediately grabbed the attention of the hacktivists who hate censorship in all its forms. They responded by unleashing a wave of cyber-attacks on a number of anti-piracy and pro-copyright organizations.</p>
<h2 class="page-title firePageview text-2xl mb-6 font-bold se" data-page-nbr="9" data-logged="true" data-page-url="9-things-everyone-should-know-about-the-hacktivist-group-anonymous9.htm"><span class="flex cursor-pointer " style="color: #ff0000;" role="button" aria-expanded="true" aria-controls="page9">1. They Help Solve Crimes</span></h2>
<div id="page9" class="page-body se" data-slide="9" data-track-gtm="Content">
<p>Following a 2011 party, an intoxicated female teen was sexually assaulted in Steubenville, Ohio. Soon after, pictures of the incident surfaced online and were circulated in her school. But when the case was reported to the local police, they dismissed it claiming there was a lack of evidence. Well, apparently it was enough evidence for a local group of anons who picked up the trail and soon gathered enough information to get the names and physical descriptions of those suspected of the crime. The attention they brought to the case forced police to actually conduct an investigation which led to the arrest of the culprit.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<blockquote>
<h3 style="text-align: center;"><em><strong>Hiding in Plain Sight amongst them&#8230;.. <span style="color: #3366ff;">MEMBERS OF THE US GOVERNMENT</span> ARE ALSO IN THE <span style="color: #ff00ff;">Hacktivist Group Anonymous</span> <span style="color: #ff0000;">P</span><span style="color: #0000ff;">A</span><span style="color: #ff0000;">T</span><span style="color: #0000ff;">R</span><span style="color: #ff0000;">I</span><span style="color: #0000ff;">O</span><span style="color: #ff0000;">T</span><span style="color: #0000ff;">S</span> TILL THE END!</strong></em></h3>
</blockquote>
<div class="mceTemp"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Hack WiFi Password: Guide to Crack Wi-Fi Network</title>
		<link>https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 24 Dec 2022 07:14:48 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Crack Wi-Fi Network]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hack Wi-Fi Network]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[How to Hack]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Wi-Fi Network]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=9915</guid>

					<description><![CDATA[How to Hack WiFi Password: Guide to Crack Wi-Fi Network By Lawrence Williams source Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. In this tutorial, we will introduce you to common techniques used to exploit weaknesses [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="entry-title">How to Hack WiFi Password: Guide to Crack Wi-Fi Network</h1>
<p><span class="meta-label">By </span><span class="author vcard"><a class="url fn n" href="https://www.guru99.com/author/lawrence">Lawrence Williams</a></span> <a href="https://www.guru99.com/how-to-hack-wireless-networks.html" target="_blank" rel="noopener">source</a></p>
<p><strong>Wireless networks are accessible to anyone within the router’s transmission radius. </strong>This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.</p>
<p>In this tutorial, we will introduce you to common techniques used to <strong>exploit weaknesses in wireless network security implementations</strong>. We will also look at some of the countermeasures you can put in place to protect against such attacks.</p>
<h4>Topics covered in this How to Hack WiFi Tutorial</h4>
<ul>
<li><a href="https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network#1">What is a wireless network?</a></li>
<li><a href="https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network#2">How to access a wireless network?</a></li>
<li><a href="https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network#3">Wireless Network Authentication WEP &amp; WPA</a></li>
<li><a href="https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network#4">How to Crack WiFI (Wireless) Networks</a></li>
<li><a href="https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network#5">How to Secure wireless networks</a></li>
<li><a href="https://goodshepherdmedia.net/how-to-hack-wifi-password-guide-to-crack-wi-fi-network#6">How to Hack WiFi Password</a></li>
</ul>
<h2><a id="1" data-lasso-id="198236"></a>What is a wireless network?</h2>
<p>A wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model.</p>
<p>&nbsp;</p>
<h2><a id="2" data-lasso-id="198237"></a>How to access a wireless network?</h2>
<div class="code-block code-block-2">
<div class="videocontentmobile">
<div id="div-gpt-ad-9092914-1" class="pubwise-lazysplit pubwise-bidded pubwise-displayed" data-google-query-id="CMHho4-N5fwCFd4IiAkdH_YNyA">
<div id="google_ads_iframe_/24132379/guru99.com_728x90_0__container__"></div>
</div>
</div>
</div>
<h2><a id="3" data-lasso-id="198238"></a>Wireless Network Authentication</h2>
<p>Since the network is easily accessible to everyone with a wireless network enabled device, most networks are password protected. Let’s look at some of the most commonly used authentication techniques.</p>
<h2>WEP</h2>
<p>WEP is the acronym for Wired Equivalent Privacy. It was developed for IEEE 802.11 WLAN standards. Its goal was to provide the privacy equivalent to that provided by wired networks. WEP works by encrypting the data been transmitted over the network to keep it safe from eavesdropping.</p>
<h3>WEP Authentication</h3>
<p>Open System Authentication (OSA) – this methods grants access to station authentication requested based on the configured access policy.</p>
<p>Shared Key Authentication (SKA) – This method sends to an encrypted challenge to the station requesting access. The station encrypts the challenge with its key then responds. If the encrypted challenge matches the AP value, then access is granted.</p>
<h3>WEP Weakness</h3>
<p>WEP has significant design flaws and vulnerabilities.</p>
<ul>
<li><strong>The integrity of the packets is checked using Cyclic Redundancy Check (CRC32).</strong> CRC32 integrity check can be compromised by capturing at least two packets. The bits in the encrypted stream and the checksum can be modified by the attacker so that the packet is accepted by the authentication system. This leads to unauthorized access to the network.</li>
<li><strong>WEP uses the RC4 encryption algorithm to create stream ciphers.</strong> The stream cipher input is made up of an initial value (IV) and a secret key. The length of the<strong> initial value (IV) is 24 bits long while the secret key can either be 40 bits or 104 bits long</strong>. The total length of both the initial value and secret can either be 64 bits or 128 bits long.<strong>The lower possible value of the secret key makes it easy to crack it</strong>.</li>
<li><strong>Weak Initial values combinations do not encrypt sufficiently</strong>. This makes them vulnerable to attacks.</li>
<li><strong>WEP is based on passwords; this makes it vulnerable to dictionary attacks</strong>.</li>
<li><strong>Keys management is poorly implemented</strong>. Changing keys especially on large networks is challenging. WEP does not provide a centralized key management system.</li>
<li><strong>The Initial values can be reused</strong></li>
</ul>
<p>Because of these security flaws, WEP has been deprecated in favor of WPA</p>
<h2>WPA</h2>
<p><strong>WPA is the acronym for Wi-Fi Protected Access</strong>. It is a security protocol developed by the Wi-Fi Alliance in response to the weaknesses found in WEP. It is used to encrypt data on 802.11 WLANs. It uses higher Initial Values 48 bits instead of the 24 bits that WEP uses. It uses temporal keys to encrypt packets.</p>
<h3>WPA Weaknesses</h3>
<ul>
<li>The collision avoidance implementation can be broken</li>
<li>It is vulnerable to denial of service attacks</li>
<li>Pre-shares keys use passphrases. Weak passphrases are vulnerable to dictionary attacks.</li>
</ul>
<div class="code-block code-block-3">
<div class="content2"></div>
</div>
<h2><a id="4" data-lasso-id="198239"></a>How to Crack WiFI (Wireless) Networks</h2>
<h3>WEP cracking</h3>
<p>Cracking is the process of exploiting security weaknesses in wireless networks and gaining unauthorized access. WEP cracking refers to exploits on networks that use WEP to implement security controls. There are basically two types of cracks namely;</p>
<ul>
<li><strong>Passive cracking</strong>– this type of cracking has no effect on the network traffic until the WEP security has been cracked. It is difficult to detect.</li>
<li><strong>Active cracking</strong>– this type of attack has an increased load effect on the network traffic. It is easy to detect compared to passive cracking. It is more effective compared to passive cracking.</li>
</ul>
<h2>WiFi Password Hacker (WEP Cracking) Tools</h2>
<ul>
<li><strong>Aircrack</strong>– network sniffer and WEP cracker. This WiFi password hacker tool can be downloaded from <a href="https://www.aircrack-ng.org/" rel="nofollow noopener" data-lasso-id="198240">http://www.aircrack-ng.org/</a></li>
<li><strong>WEPCrack</strong>– this is an open source Wi-Fi hacker program for breaking 802.11 WEP secret keys. This WiFi hacker app for PC is an implementation of the FMS attack. <a href="http://wepcrack.sourceforge.net/" rel="nofollow noopener" data-lasso-id="198241">http://wepcrack.sourceforge.net/</a></li>
<li><strong>Kismet</strong>– this WiFi password hacker online detects wireless networks both visible and hidden, sniffer packets and detect intrusions. <a href="https://www.kismetwireless.net/" rel="nofollow noopener" data-lasso-id="198242">https://www.kismetwireless.net/</a></li>
<li><strong>WebDecrypt</strong>– this WiFi password hack tool uses active dictionary attacks to crack the WEP keys. It has its own key generator and implements packet filters for hacking WiFi password. <a href="http://wepdecrypt.sourceforge.net/" rel="nofollow noopener" data-lasso-id="198243">http://wepdecrypt.sourceforge.net/</a></li>
</ul>
<h2>WPA Cracking</h2>
<p>WPA uses a 256 pre-shared key or passphrase for authentications. Short passphrases are vulnerable to dictionary attacks and other attacks that can be used to crack passwords. The following WiFi hacker online tools can be used to crack WPA keys.</p>
<ul>
<li><strong>CowPatty</strong>– this WiFi password cracker tool is used to crack pre-shared keys (PSK) using brute force attack. <a href="https://sourceforge.net/projects/cowpatty/" rel="nofollow noopener" data-lasso-id="198244">http://wirelessdefence.org/Contents/coWPAttyMain.htm</a></li>
<li><strong>Cain &amp; Abel</strong>– this WiFi hacker for PC tool can be used to decode capture files from other sniffing programs such as Wireshark. The capture files may contain WEP or WPA-PSK encoded frames. <a href="https://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml" rel="nofollow noopener" data-lasso-id="198245">https://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml</a></li>
</ul>
<h2>General Attack types</h2>
<ul>
<li><strong>Sniffing</strong>– this involves intercepting packets as they are transmitted over a network. The captured data can then be decoded using tools such as Cain &amp; Abel.</li>
<li><strong>Man in the Middle (MITM) Attack</strong>– this involves eavesdropping on a network and capturing sensitive information.</li>
<li><strong>Denial of Service Attack</strong>– the main intent of this attack is to deny legitimate users network resources. FataJack can be used to perform this type of attack. More on this in <a href="https://www.guru99.com/how-to-hack-web-server.html" data-lasso-id="198246">article</a></li>
</ul>
<h2>Cracking Wireless network WEP/WPA keys</h2>
<p>It is possible to crack the WEP/WPA keys used to gain access to a wireless network. Doing so requires software and hardware resources, and patience. The success of such WiFi password hacking attacks can also depend on how active and inactive the users of the target network are.</p>
<p>We will provide you with basic information that can help you get started. Backtrack is a Linux-based security operating system. It is developed on top of Ubuntu. Backtrack comes with a number of security tools. Backtrack can be used to gather information, assess vulnerabilities and perform exploits among other things.</p>
<p>Some of the popular tools that backtrack has includes;</p>
<ul>
<li>Metasploit</li>
<li>Wireshark</li>
<li>Aircrack-ng</li>
<li>NMap</li>
<li>Ophcrack</li>
</ul>
<p>Cracking wireless network keys requires patience and resources mentioned above. <strong>At a minimum, you will need the following tools</strong></p>
<p>A <strong>wireless network adapter with the capability to inject packets</strong> (Hardware)</p>
<ul>
<li><strong>Kali Operating System</strong>. You can download it from here <a href="https://www.kali.org/downloads/" rel="nofollow noopener" data-lasso-id="198247">https://www.kali.org/downloads/</a></li>
<li><strong>Be within the target network’s radius</strong>. If the users of the target network are actively using and connecting to it, then your chances of cracking it will be significantly improved.</li>
<li>Sufficient <strong>knowledge of Linux based operating systems and working knowledge of Aircrack</strong> and its various scripts.</li>
<li><strong>Patience</strong>, cracking the keys may take a bit of sometime depending on a number of factors some of which may be beyond your control. Factors beyond your control include users of the target network using it actively as you sniff data packets.</li>
</ul>
<h2><a id="5" data-lasso-id="198248"></a>How to Secure wireless networks</h2>
<p>In minimizing wireless network attacks; an organization can adopt the following policies</p>
<ul>
<li><strong>Changing default passwords</strong> that come with the hardware</li>
<li>Enabling the <strong>authentication mechanism</strong></li>
<li><strong>Access to the network can be restricted</strong> by allowing only registered MAC addresses.</li>
<li><strong>Use of strong WEP and WPA-PSK keys</strong>, a combination of symbols, number and characters reduce the chance of the keys been cracking using dictionary and brute force attacks.</li>
<li><strong><a href="https://www.guru99.com/best-free-firewall.html" data-lasso-id="287507">Firewall Software</a></strong> can also help reduce unauthorized access.</li>
</ul>
<div class="code-block code-block-4">
<div class="content61"></div>
</div>
<h2><a id="6" data-lasso-id="198249"></a>How to Hack WiFi Password</h2>
<p>In this practical scenario, we are going to learn how to crack WiFi password. We will <strong>use Cain and Abel to decode the stored wireless network passwords in Windows</strong>. We will also provide <strong>useful information that can be used to crack the WEP and WPA keys of wireless networks</strong>.</p>
<h3>Decoding Wireless network passwords stored in Windows</h3>
<p><strong>Step 1) Download the Cain and Abel tool</strong></p>
<ul>
<li>Download Cain &amp; Abel from the link provided above.</li>
<li>Open Cain and Abel</li>
</ul>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-9917" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless1.webp" alt="" width="697" height="361" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless1.webp 697w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless1-300x155.webp 300w" sizes="(max-width: 697px) 100vw, 697px" /></p>
<p><strong>Step 2) Select the Decoders tab and choose Wireless passwords</strong></p>
<ul>
<li>Ensure that the Decoders tab is selected then click on Wireless Passwords from the navigation menu on the left-hand side</li>
<li>Click on the button with a plus sign</li>
</ul>
<p><img decoding="async" class="alignnone size-full wp-image-9916" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless2.webp" alt="" width="377" height="193" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless2.webp 377w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless2-300x154.webp 300w" sizes="(max-width: 377px) 100vw, 377px" /></p>
<p><strong>Step 3) The passwords will be shown</strong></p>
<ul>
<li>Assuming you have connected to a secured wireless network before, you will get results similar to the ones shown below</li>
</ul>
<p><img decoding="async" class="alignnone size-full wp-image-9918" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless3.webp" alt="" width="758" height="224" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless3.webp 758w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/wireless3-300x89.webp 300w" sizes="(max-width: 758px) 100vw, 758px" /></p>
<p><strong>Step 4) Get the passwords along with encryption type and SSID</strong></p>
<ul>
<li>The decoder will show you the encryption type, SSID and the password that was used.</li>
</ul>
<h2>Summary</h2>
<ul>
<li>Wireless network transmission waves can be seen by outsiders, this possesses many security risks.</li>
<li>WEP is the acronym for Wired Equivalent Privacy. It has security flaws which make it easier to break compared to other security implementations.</li>
<li>WPA is the acronym for Wi-Fi Protected Access. It has security compared to WEP</li>
<li>Intrusion Detection Systems can help detect unauthorized access</li>
<li>A good security policy can help protect a network.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
