User Controls

Problems compiling C source code.

  1. #21
    Sophie Pedophile Tech Support
    I'm just fucking with him,

    Mhm, cuz we all know how good at compsci you actually are, curry nigger.
  2. #22
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Mhm, cuz we all know how good at compsci you actually are, curry nigger.


    I'm actually the best. You couldn't get better than me. I'm even better than Lanny. That doesn't mean I'm going to help you at all or be straight with you, because you're nothing but a worthless rat.
  3. #23
    Sophie Pedophile Tech Support
    I'm actually the best. You couldn't get better than me. I'm even better than Lanny. That doesn't mean I'm going to help you at all or be straight with you, because you're nothing but a worthless rat.

    A wise man knows he knows nothing spectral, all you are good at is displaying the dunning-kruger effect.
  4. #24
    -SpectraL coward [the spuriously bluish-lilac bushman]
    A wise man knows he knows nothing spectral, all you are good at is displaying the dunning-kruger effect.



    You would be wise not to anger me.
  5. #25
    Sophie Pedophile Tech Support
    You would be wise not to anger me.

    Too bad you don't have a handy staff control panel to hide behind now, eh, you fucking cowardly pedophile? You're lucky I even allow you to stay here. That I haven't fried your motherboard by now, by changing the voltage on it to an undesirable setting, is a miracle in itself.

    I don't need a control panel to frustrate you it seems. Such strong language for someone who supposedly does not care.

    Also spectral come on, you don't even know how to change the value of a hidden field in a html form. All you have demonstrated so far is that you can run a portscan.

    This still requires you to know my IP adress and i suppose if you were competent you could drop lanny's database and get it that way. Now i do not know how lanny's database handles IP adresses but if somehow you could sort my accountt to them you would have a over 9000 IP's since i use TOR or VPN or a proxy or even a proxychain depending on what i am doing with the rest of my rig while browsing.

    Say you social engineered me got me to think you are someone else. Ok, want to chat? I only use skype for people i know IRL, and even then i hardly ever not have a vpn running. So no dice again. Say by some kind of miracle you got my actual IP, my router does not come with a remote login function and even if it did it has a 32 character password and that's a string of random characters. Have fin bruteforcing that.

    I have no ports forwarded or open facing the internet and the firewall of my router customely configured to harden against attacks. Furthermore all services are behind my firewall, so how would you enumerate them? And you are going to seriously have to leverage some trusted/privileged services, process or similar if you want mess with me on the hardware level if that is even remotely possible.

    I have no SSH channels/clients whatever open so you cannot bypass the firewall, even if you hattancd d credentials, i am not hosting any web applications on my box so no vector there.

    All in all your best bet would be to write a trojan that takes commands from a server you control, have it run shellcode on my machine
    to fuck with the master boot record. But we all know you can't code for shit. And then still you would have the problem of delivering your malware to me.

    In conclusion i am in no way saying cannot be hacked or infected but the skill level you have displayed over the years has shown everyone that "frying my motherboard" is a process by far beyond your limited comprehension of cyber security.


    So go ahead sp3c7r41 13373s7 0f h4xx0rz.

    I would invite you to try, hey maybe you will even find my hidden veracrypt volume full of childpornography and bruteforce the 64 character password i keep in a notebook for safekeeping. You could have me thrown in jail for 20 years. Imagine the headlines: Heroic hacktivist sends pedophile to prison. Won't that be great?

    It's such a shame all you can do is talk, oh and the people who actuallly know compsci talk to. They laugh each time you open your ignorant mouth.


    Some dumb shit specfag said

    Early on in zoklet history there were some DDoS shenanigans if i recall, but even totse itself was DDoS'd at some point. Obviously patches don't do shit in the event of a DDoS with sufficient bandwidth, the only database deletion of a clone that i recall was performed by associates of Sophie and that was the LLZ DB, after my falling out with hc45. Idio and co went bananas on their own site after burnish, another one of my associates Doxed idio. And i was the one who made crazy mikes server 505 after a number of unfortunately crafted SQLi payloads and that wasn't even a proper hack that was just me messing up the query. Not sure what is up with taintedbrowser atm tho i think crazy mike forgot to pay hosting and got suspended…

    also the zoklet dos was a lot less extensive than you claim, and rdfrn was never dos'd to my knowledge. Also totseans is still around, and what are these other clones speak of?

    also saying a totse clone got dos'd does not prove it was you. I might as well say: oh yeah? If i can't write malware then how do you explain stuxnet!

    Furtermore performing a ddos attack is trivial, you can easily download a DNS amp script find a list of DNS servers and run it on a small set of computers or VPS's to get decent bandwidth.

    All i am saying is taking credit for something isn't going to convince anyone you did it. Now like i said in the quotes in the OP anyone can see my work simply by going to T&T, my github or my twitter feed, respect and renown in the infosec community is won by your skill and actions as a hacker and while i may be of average skill level at best at least anyone can see my work and judge for themaelves how well or bad i do what i do.

    i have never seen a piece of code you did not copy and paste, i have never heard you talk of the theory behind any sort of cyber attack and any hacking related thread in which you give "advice" it is more than often vague, unrelated or plain wrong.

    It is true in my opinion you know a little more about compsci than your average person on the street just do not make the mistake that everyone on here is around or below your "skill" level.

    Frankly spectral if you stopped bullshitting for once you might actually learn something when The rest of us are discussing relatively advanced stuff in T&T.

    That is, IF you actually have an interest in infosec and don't just want to look cool to the people who know zero about compsci

    Jeff Hunter's spare administrator account was fully compromised and used to take complete and utter control over the entire site and all its accounts and databases. How do you explain that?

    Taking credit for things that happened isn't proof you did it. Also, say you did actually do it. This was way back when in the days there was no limit to the amount of times you could try to log in, so bruteforcing the account with a wordlist would have been trivial as well.


    Also if you actually did do it and it was actually a more complex procedure than simply pointing a script and a wordlist at a login form why don't you go ahead and describe to us in detail how tou went about it.

    Don't worry about divulging "trade secrets" web app technologies have come a lomg way from the days of dial up bbs.

    As expected all i hear is talk talk talk, what's your github spectral? Where are your custom tools and exploits? That's right you have niether.

    Quite funny how you also mentioned how the account you supposedly took over also had control over the database and such, as if it were an additional hack, top fucking kek, of course all admin accounts have access to backend systems that's kind of the point.

    Proceed in thine act, sodomite.

    For reference, here is my github. So you may bask in the glory of someone that actually knows a little of what they're talking about.

    www.github.com/NullArray

    If you want you can even see my infosec twitter account, where i post hacks about each week, got twitter? Got github? Let's compare and we'll see who's more 'dangerous' with a keyboard.


    Also i am not one for boasting because that makes me look exactly like you(Except you lie about everything) but when it comes to your incompetent ass i can't help but haul out the actual proof i know more than you. You know why? Because you don't know shit and i want the world to know.
  6. #26
    -SpectraL coward [the spuriously bluish-lilac bushman]
    How can I "not know shit", when I've been on the Internet since the WWW came into existence? I must have learned something in that time, mustn't I have? You silly person, you. I'm a literal wealth of knowledge and trickery.
  7. #27
    Sophie Pedophile Tech Support
    How can I "not know shit", when I've been on the Internet since the WWW came into existence? I must have learned something in that time, mustn't I have? You silly person, you. I'm a literal wealth of knowledge and trickery.

    Trickery indeed. I even said in one of the quotes you did not bother reading probably that you even know more than your average lay person. However, this does not mean you're any good at hacking or programming.

    Therefore, post your github(which you probably don't even have) or your infosec related twitter. And we may judge your actual work(which you probably don't even have) and can see once and for all the greatness of your hacking/coding abilities, spectral. Either put your money where your mouth is, or shut up, andlet everyone see what a fraud you are.
  8. #28
    -SpectraL coward [the spuriously bluish-lilac bushman]
    It's not nice to kiss and tell.
  9. #29
    Sophie Pedophile Tech Support
    It's not nice to kiss and tell.


    Spectral confirmed for fraud.

    Also github is as anonymous as you'd like it to be, so it's not as if you're compromising your opsec(which you probably don't even practice) I have no problems posting my github, also, any hacking tools i make, adapt or improve, i share with the infosec community via github to be judged, or improved further or used by everyone who wants and/or is able to, because that's what the infosec community does, we learn together, we teach eachother, and work on open source projects and whatnot to improve our collective skill. Seeing as you do not understand this basic principle it's safe to say, you're in no way part of the infosec community.

    In fact spectral, i'd be willing to help you actually get familiar with the things i could teach you, like a little bash, some python, working some scripts and tools that sort of thing, but that would mean you'd have to drop the act of being the most amazing haxx0r out there and that probably won't ever happen. So not only are you making yourself look stupid to the people with knowledge in the relevant field, you're preventing yourself from actually becoming what you pretend to be.

    IDK, maybe you think it's too much work, fuck, god knows it's a shitload to learn but hey, if you don't do it, you'll never get good. Since i started getting into this whole compsci, infosec, hacking thing the most important lesson i have learned is that no matter how much i know there'll always be more to learn.

    I hope you read this all because i'm trying to be sincere with you, maybe you have noticed that from time to time, i actually respond in a respectful and productive manner in hacking related threads in which you post/reply. All i am saying with that is i can drop the animosity to discuss something i and supposedly you too have a shared interest in, if you are sincere about being interested in cyber security it would be in your interest to respond in a sincere manner as well, that's not meant as a threat, it's just a piece of advice, you might just pick something up.

    Probably will never happen, but i can tell you this much, if you do, you'll earn the respect of the rest of us, i am fairly sure.

    But by all means, do whatever, it's your choice.



  10. #30
    -SpectraL coward [the spuriously bluish-lilac bushman]
    I've worked at the highest technical levels inside major communications companies such as Time Warner, Roadrunner, Charter Communications, AT&T, etc, and you think you're dealing with someone who just fell off the turnip truck this morning? You're the one one who's green, kid. And I mean wayyy green. If you had the vast array of knowledge I posses, you wouldn't even know how to handle, control or restrain it. You have no cooth. No style. You're literally like a bull in a China shop.
  11. #31
    Sophie Pedophile Tech Support
    Spectral confirmed for fraud.

    Also github is as anonymous as you'd like it to be, so it's not as if you're compromising your opsec(which you probably don't even practice) I have no problems posting my github, also, any hacking tools i make, adapt or improve, i share with the infosec community via github to be judged, or improved further or used by everyone who wants and/or is able to, because that's what the infosec community does, we learn together, we teach eachother, and work on open source projects and whatnot to improve our collective skill. Seeing as you do not understand this basic principle it's safe to say, you're in no way part of the infosec community.

    In fact spectral, i'd be willing to help you actually get familiar with the things i could teach you, like a little bash, some python, working some scripts and tools that sort of thing, but that would mean you'd have to drop the act of being the most amazing haxx0r out there and that probably won't ever happen. So not only are you making yourself look stupid to the people with knowledge in the relevant field, you're preventing yourself from actually becoming what you pretend to be.

    IDK, maybe you think it's too much work, fuck, god knows it's a shitload to learn but hey, if you don't do it, you'll never get good. Since i started getting into this whole compsci, infosec, hacking thing the most important lesson i have learned is that no matter how much i know there'll always be more to learn.

    I hope you read this all because i'm trying to be sincere with you, maybe you have noticed that from time to time, i actually respond in a respectful and productive manner in hacking related threads in which you post/reply. All i am saying with that is i can drop the animosity to discuss something i and supposedly you too have a shared interest in, if you are sincere about being interested in cyber security it would be in your interest to respond in a sincere manner as well, that's not meant as a threat, it's just a piece of advice, you might just pick something up.

    Probably will never happen, but i can tell you this much, if you do, you'll earn the respect of the rest of us, i am fairly sure.

    But by all means, do whatever, it's your choice.

    I've worked at the highest technical levels inside major communications companies such as Time Warner, Roadrunner, Charter Communications, AT&T, etc, and you think you're dealing with someone who just fell off the turnip truck this morning? You're the one one who's green, kid. And I mean wayyy green. If you had the vast array of knowledge I posses, you wouldn't even know how to handle, control or restrain it. You have no cooth. No style. You're literally like a bull in a China shop.

    At least i tried, sadly you seem to be willfully ignorant. All i want spectral is, one exploit you wrote, one hacking tool you made, one server you compromised, one database you dropped and i'll STFU about you being incompetent, but since you can produce niether of those i'm just going to have to assume you're bullshitting, as your posts on the forum seem to support.


    >You're the one one who's green, kid.


    Perhaps, but at least i don't feel the need to pretend i'm something that i'm not.
  12. #32
    -SpectraL coward [the spuriously bluish-lilac bushman]
    You don't have to pretend. I can see what you're not.
  13. #33
    Sophie Pedophile Tech Support
    You don't have to pretend. I can see what you're not.

    Kewl, let's reverse roles then for a second this should be fun. What exactly am i not spectral.

  14. #34
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Kewl, let's reverse roles then for a second this should be fun. What exactly am i not spectral.



    You are not:

    1. the lovable character you pretend to be
    2. very deeply knowledgeable in Sec
    3. a champion for freedom of information
    4. even moderately intelligent
    5. easy to look at
  15. #35
    Sophie Pedophile Tech Support

    >You are not:

    >1. the lovable character you pretend to be
    >2. very deeply knowledgeable in Sec
    >3. a champion for freedom of information
    >4. even moderately intelligent
    >5. easy to look at


    1. That would depend on who i'm talking to.
    2. Very deeply? No, more deeply than you? Yes.
    3. Why not? On Zoklet and redfern i used to and here i share knowledge all the time.
    4. I am actually very intelligent, ask the other smart people on the forum.
    5. That may be, but don't imply you've ever seen my face and if you have i hope you saved the picture because you have my full permission to post it. Protip: You can't.
  16. #36
    Sophie Pedophile Tech Support
    Also, get on my level, i'm fucking featured on the security network website bitch.

    http://seclist.us/roothelper-a-bash-...ux-system.html

    https://github.com/NullArray/RootHelper

    http://niggasin.space/forum/technophiliacs-technophiles/52613-roothelper-new-and-improved-extra-functionality-and-exploit-suggester
  17. #37
    -SpectraL coward [the spuriously bluish-lilac bushman]
    I was named Agent of the Year for eight consecutive years from 2002-2009, with metrics in the range of 95%+. You can't beat that.
  18. #38
    I was named Agent of the Year for eight consecutive years from 2002-2009, with metrics in the range of 95%+. You can't beat that.

    source or bullshit.
  19. #39
    Sophie Pedophile Tech Support
    source or bullshit.

    Quite right, i provided sauce, only fair you do the same.
  20. #40
    -SpectraL coward [the spuriously bluish-lilac bushman]
    source or bullshit.

    Would I lie to you about something like that?
Jump to Top