Results 1 to 2 of 2

Thread: Re: Exposing Malnet Strategies and Best Practices for Threat Protection

Hybrid View

  1. #1
    bugeater.duckfart Guest

    Re: Exposing Malnet Strategies and Best Practices for Threat Protection

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    In article <XnsA0B9F26EF5F7DHHI2948AJD832@no>
    Dustin <bughunter.dustin@gmail.com> wrote:
    >

    edited junk
    >
    > To be fair to the hashing systems, changing the search ID once you know
    > what the antivirus/antimalware app is hitting on accomplishes the same
    > thing. Fact is, with HLL server side poly; life's a ***** for the
    > researcher. As far as consistent hits with one search string, or a
    > simple algorithm. While you might score thousands, the damn thing is
    > likely able to generate hundreds of thousands if not outright millions
    > of different samples.
    >
    >


    This "dissertation" on hashing systems is a real f'kn joke coming from
    some ****head who claims to have 'cracked' my PGP sig and -
    =====================
    Duck**** claimed:
    "that damn pgp signature ****
    in this case worked against the person. It's allowed me to identify a base
    ISP as the source. I'll soon have the account holders name and addy, then
    it's my turn for some real fun.
    ======================

    Of course, when Duckfarts couldn't make good on his fraudulent brag,
    he claimed my ISP wouldn't allow him the information.

    Don't you dummy ****s get the message yet?

    This Dustin Cook bugeating faggot jagoff is a TOTAL FRAUD!

    That's why he doesn't venture out of groups used by f'kn dummies who
    don't know a 'call' from a 'push'.

    Every time his ego got away from him and he went into a *real*
    programming group, he had to have his ass glued back on after leaving
    it.

    He's a TOTAL, F'KN FRAUD!
    =========================

    But - back now to where he 'cracked' my PGP sig. BWWWWWWWWWWWWWWWHAHAHAHAHAHAHA!!!!! NOT!!!!!


    https://groups.google.com/forum/?hl=...th/rI5Y7lbasmw

    or

    http://************/cgcb4fb


    Re: The Dustin Cooks Troll list
    Other recipients:
    "Hot-Text" <hot-text@Use-Author-Supplied-Address.invalid> wrote in
    news:201110240325.UTC.j82ls3$a75$1@tioat.net:

    edited out absolute junk

    >
    > for there PGP Keys
    > @ news.mixmin.net Newgroup: alt.anonymous.messages
    > is there too!
    >
    > And you say I do not know how it Works
    > LOOL
    >


    Probably why he/she has decided to play elsewhere. They're worried I've
    really discovered that they didn't always do it properly. Yes, in case your
    wondering; I *know* you ****ed up. I've known for sometime now...

    Not you hot-text, but our remailing friend.. They didn't always use the
    remailer chain like they should have... And, that damn pgp signature ****
    in this case worked against the person. It's allowed me to identify a base
    ISP as the source. I'll soon have the account holders name and addy, then
    it's my turn for some real fun.


    LOL!

    Good work on your part Hot text.

    (I guess Hot **** did the blow job right.)

    -----BEGIN PGP SIGNATURE-----
    Version: RAID [SLAM] Ver. 0.4.6 (RAID'S True I.Q.)
    Comment: RAID [SLAM] Is a Dangerous Sociopathic Monster
    Comment: KeyID: 0x2D53F7F5
    Comment: Fingerprint: 869B 753C F27C EC0F C9ED 27C5 BE60 5370 2D53 F7F5

    iQA/AwUBUDhqQL5gU3AtU/f1EQKFHQCeMY8d2/ft+lrznMfTYbL86YILbV0An0XR
    eU8pwzWFFaGPK5JUn/oymAN3
    =1mtJ
    -----END PGP SIGNATURE-----


  2. #2
    Dustin Guest

    Re: Exposing Malnet Strategies and Best Practices for Threat Protection

    bugeater.duckfart <nobody@slug.sluggish.net> wrote in
    news:6d8b762c63495845b0bc5a89e20de09e@slug.slugish .net:

    > -----BEGIN PGP SIGNED MESSAGE-----
    > Hash: SHA1
    >
    > In article <XnsA0B9F26EF5F7DHHI2948AJD832@no>
    > Dustin <bughunter.dustin@gmail.com> wrote:
    >>

    > edited junk
    >>
    >> To be fair to the hashing systems, changing the search ID once you
    >> know what the antivirus/antimalware app is hitting on accomplishes
    >> the same thing. Fact is, with HLL server side poly; life's a *****
    >> for the researcher. As far as consistent hits with one search
    >> string, or a simple algorithm. While you might score thousands, the
    >> damn thing is likely able to generate hundreds of thousands if not
    >> outright millions of different samples.
    >>
    >>

    >
    > This "dissertation" on hashing systems is a real f'kn joke coming
    > from some ****head who claims to have 'cracked' my PGP sig and -


    So you've got something specific I wrote that you're taking issue with
    and have supporting evidence to back your position? No? It's okay, I
    didn't really think so. I just felt like responding.


    Btw,

    Aren't you overdue for accusing me of hacking googles archives? I didn't
    want rebecca snuffed. ;p Again, Rebecca wanted me snuffed out. Whatcha
    think?

    Oh, did you try compiling kmans "fixed" code yet? How'd it work out for
    you? LOLz!


    --
    There ain't no rest for the wicked. Money don't grow on trees. I got
    bills to pay. I got mouths to feed. Ain't nothing in this world for
    free. Oh No. I can't slow down, I can't hold back though you know I wish
    I could. Oh no there ain't no rest for the wicked, until we close our
    eyes for good.




Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •