User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 110
  6. 111
  7. 112
  8. 113
  9. 114
  10. 115
  11. ...
  12. 139
  13. 140
  14. 141
  15. 142

Thanked Posts by Sophie

  1. Sophie Pedophile Tech Support
    Originally posted by snab_snib except it doesn't.

    Except it's the best framework to date to explain everything about the Universe and reliably predict it's behavior. Riddle me that, nigger faggot.
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. Sophie Pedophile Tech Support
    Clearly you've never done opiates. There is no sadness in opiate land, only dull comfort.
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. Sophie Pedophile Tech Support
    Originally posted by Discount Whore There is nothing hotter than hiding from the Nazis in a cramped attic. I get chills down my genitals just thinking of it. The breath on your neck, the knowledge that the slightest of noises might land you in a concentration camp. Then the penis stroking starts, and your breath gets heavy. You're trying hard to control it. There are footsteps downstairs. One, two, three of them. You can hear three of them.

    The stroking picks up pace. You can't see Anne there in the dark, but you know she's looking you in the eyes. Some things you can just feel.

    Up the stairs now. They're turning down the hallway where the secret entrance lies. You can hear one of the employees of the Achterhuis talking to the men. Your heart is pounding. Half because you you've over heard the Gestapo are with an SS. Half because Anne is quickening her pace, and the pressure is now snowballing. You doubt your ability to hold it much longer and have to bite your lip to retain confidence.

    You hear metal swing. Light floods the room. The Gestapo are coming, and you are too.


    Anne is 18+ in the above writing, which takes place in an alternate universe.

    Bonus points for using "Achterhuis" and "The Gestapo are coming, so are you".

    I had a hearty lol. Also Anne should be the age she was when she was in Het Achterhuis.

    So it's a thrill thing, i see, i see.
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. Sophie Pedophile Tech Support
    By now i am sure you have all heard about the WanaCryptor ransomworm.

    What you may not know however is that there was a very specific exploit used in combination with this ransomware/worm. So for some background, a while ago NSA offshoot EQUATIONGROUP was hacked by a group of people calling themselves "the Shadow Brokers". It was claimed a large arsenal of 0days and custom exploits were taken in the data breach. This later turned out to be true when the Shadow Brokers dumped all the tools they had online.


    One of the vulnerabilities disclosed by the leak was one called MS17-010. Which is a critical vulnerability in the way Windows handles the Server Message Block implementation or SMB. SMB is a file transfer protocol. The flaw here is the way in which SMB handles specially crafted requests. With the right request this can allow for remote code execution and it is in this way that the Ransomware acts as a worm as well.


    Once an initial foothold is gained the ransomware scans the local network for the SMB service. If found it will it will launch an exploit to propagate over the network and infect as many machines as possible. If you're interested BAE Systems has a detailed analysis report On the malwares functionality.



    In the mean time Rapid7 has added a module for the exploit dubbed EternalBlue to the metasploit framework. The details for which can be found by clicking here.


    Interestingly enough as you can read in the BAE Systems article, the malware had some sort of kill switch functionality. What it does is check for the existence of a certain domain, if the domain is found it stops the execution of the payload. This is most likely done as a sandbox evasion technique.

    Ironically, once researchers found this out they were quick to register the domain which resulted in a drop in infections. The interesting thing about this ransomware attack is that it used a nation-state level exploit to act as a worm and that contrary to the usual delivery mechanism(Phishing campaign) it would appear SMB services facing the internet were directly targeted by the malware.

    Furthermore, Microsoft has come out with a patch. You are advised to update if you run Windows as OS on any boxes you have. If you'd like to know if your Windows is vulnerable you can use this Python script to fins out.


    #!/usr/bin/python
    # -*- coding: utf-8 -*-

    #
    # References:
    #
    # https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/
    # https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_ms17_010
    # https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb
    # https://www.symantec.com/security_response/vulnerability.jsp?bid=96707
    # https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-SMB2/[MS-SMB2]-151016.pdf
    # https://msdn.microsoft.com/en-us/library/windows/desktop/aa365233(v=vs.85).aspx
    # https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
    # https://community.rapid7.com/community/metasploit/blog/2017/04/03/introducing-rubysmb-the-protocol-library-nobody-else-wanted-to-write
    # https://msdn.microsoft.com/en-us/library/ee441741.aspx
    # https://github.com/countercept/doublepulsar-detection-script/blob/master/detect_doublepulsar_smb.py
    # http://stackoverflow.com/questions/38735421/packing-an-integer-number-to-3-bytes-in-python
    # https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html

    """
    $ python2.7 smb_exploit.py 192.168.206.152
    [+] [192.168.206.152] is likely VULNERABLE to MS17-010! (Windows 7 Ultimate 7600)

    $ python2.7 smb_exploit.py 192.168.206.130
    [+] [192.168.206.130] is likely VULNERABLE to MS17-010! (Windows 5.1)
    """

    from ctypes import *
    import socket
    import struct
    import logging


    logging.basicConfig(level=logging.INFO, format="%(message)s")
    log = logging.getLogger(__file__)

    # negotiate_proto_request
    # session_setup_andx_request
    # tree_connect_andx_request
    # peeknamedpipe_request
    # trans2 request


    class SMB_HEADER(Structure):
    """SMB Header decoder.
    """

    _pack_ = 1 # Alignment

    _fields_ = [
    ("server_component", c_uint32),
    ("smb_command", c_uint8),
    ("error_class", c_uint8),
    ("reserved1", c_uint8),
    ("error_code", c_uint16),
    ("flags", c_uint8),
    ("flags2", c_uint16),
    ("process_id_high", c_uint16),
    ("signature", c_uint64),
    ("reserved2", c_uint16),
    ("tree_id", c_uint16),
    ("process_id", c_uint16),
    ("user_id", c_uint16),
    ("multiplex_id", c_uint16)
    ]

    def __new__(self, buffer=None):
    return self.from_buffer_copy(buffer)

    def __init__(self, buffer):
    log.debug("server_component : %04x" % self.server_component)
    log.debug("smb_command : %01x" % self.smb_command)
    log.debug("error_class : %01x" % self.error_class)
    log.debug("error_code : %02x" % self.error_code)
    log.debug("flags : %01x" % self.flags)
    log.debug("flags2 : %02x" % self.flags2)
    log.debug("process_id_high : %02x" % self.process_id_high)
    log.debug("signature : %08x" % self.signature)
    log.debug("reserved2 : %02x" % self.reserved2)
    log.debug("tree_id : %02x" % self.tree_id)
    log.debug("process_id : %02x" % self.process_id)
    log.debug("user_id : %02x" % self.user_id)
    log.debug("multiplex_id : %02x" % self.multiplex_id)


    def generate_smb_proto_payload(*protos):
    """Generate SMB Protocol. Pakcet protos in order.
    """
    hexdata = []
    for proto in protos:
    hexdata.extend(proto)
    return "".join(hexdata)


    def calculate_doublepulsar_xor_key(s):
    """Calaculate Doublepulsar Xor Key
    """
    x = (2 * s ^ (((s & 0xff00 | (s << 16)) << 8) | (((s >> 16) | s & 0xff0000) >> 8)))
    x = x & 0xffffffff # this line was added just to truncate to 32 bits
    return x


    def negotiate_proto_request():
    """Generate a negotiate_proto_request packet.
    """
    log.debug("generate negotiate request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x54' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x72', # 'smb_command': Negotiate Protocol
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x28', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    '\x00\x00', # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    negotiate_proto_request = [
    '\x00', # 'word_count'
    '\x31\x00', # 'byte_count'

    # Requested Dialects
    '\x02', # 'dialet_buffer_format'
    '\x4C\x41\x4E\x4D\x41\x4E\x31\x2E\x30\x00', # 'dialet_name': LANMAN1.0

    '\x02', # 'dialet_buffer_format'
    '\x4C\x4D\x31\x2E\x32\x58\x30\x30\x32\x00', # 'dialet_name': LM1.2X002

    '\x02', # 'dialet_buffer_format'
    '\x4E\x54\x20\x4C\x41\x4E\x4D\x41\x4E\x20\x31\x2E\x30\x00', # 'dialet_name3': NT LANMAN 1.0

    '\x02', # 'dialet_buffer_format'
    '\x4E\x54\x20\x4C\x4D\x20\x30\x2E\x31\x32\x00' # 'dialet_name4': NT LM 0.12
    ]

    return generate_smb_proto_payload(netbios, smb_header, negotiate_proto_request)


    def session_setup_andx_request():
    """Generate session setuo andx request.
    """
    log.debug("generate session setup andx request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x63' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x73', # 'smb_command': Session Setup AndX
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x20', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    '\x00\x00', # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    session_setup_andx_request = [
    '\x0D', # Word Count
    '\xFF', # AndXCommand: No further command
    '\x00', # Reserved
    '\x00\x00', # AndXOffset
    '\xDF\xFF', # Max Buffer
    '\x02\x00', # Max Mpx Count
    '\x01\x00', # VC Number
    '\x00\x00\x00\x00', # Session Key
    '\x00\x00', # ANSI Password Length
    '\x00\x00', # Unicode Password Length
    '\x00\x00\x00\x00', # Reserved
    '\x40\x00\x00\x00', # Capabilities
    '\x26\x00', # Byte Count
    '\x00', # Account
    '\x2e\x00', # Primary Domain
    '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x32\x31\x39\x35\x00', # Native OS: Windows 2000 2195
    '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x35\x2e\x30\x00', # Native OS: Windows 2000 5.0
    ]

    return generate_smb_proto_payload(netbios, smb_header, session_setup_andx_request)


    def tree_connect_andx_request(ip, userid):
    """Generate tree connect andx request.
    """
    log.debug("generate tree connect andx request")

    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x47' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x75', # 'smb_command': Tree Connect AndX
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x20', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    userid, # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    ipc = "\\\\{}\IPC$\x00".format(ip)
    log.debug("Connecting to {} with UID = {}".format(ipc, userid))

    tree_connect_andx_request = [
    '\x04', # Word Count
    '\xFF', # AndXCommand: No further commands
    '\x00', # Reserved
    '\x00\x00', # AndXOffset
    '\x00\x00', # Flags
    '\x01\x00', # Password Length
    '\x1C\x00', # Byte Count
    '\x00', # Password
    ipc.encode(), # \\xxx.xxx.xxx.xxx\IPC$
    '\x3f\x3f\x3f\x3f\x3f\x00' # Service
    ]

    length = len("".join(smb_header)) + len("".join(tree_connect_andx_request))
    # netbios[1] = '\x00' + struct.pack('>H', length)
    netbios[1] = struct.pack(">L", length)[-3:]

    return generate_smb_proto_payload(netbios, smb_header, tree_connect_andx_request)


    def peeknamedpipe_request(treeid, processid, userid, multiplex_id):
    """Generate tran2 request
    """
    log.debug("generate peeknamedpipe request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x4a' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x25', # 'smb_command': Trans2
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x28', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    treeid,
    processid,
    userid,
    multiplex_id
    ]

    tran_request = [
    '\x10', # Word Count
    '\x00\x00', # Total Parameter Count
    '\x00\x00', # Total Data Count
    '\xff\xff', # Max Parameter Count
    '\xff\xff', # Max Data Count
    '\x00', # Max Setup Count
    '\x00', # Reserved
    '\x00\x00', # Flags
    '\x00\x00\x00\x00', # Timeout: Return immediately
    '\x00\x00', # Reversed
    '\x00\x00', # Parameter Count
    '\x4a\x00', # Parameter Offset
    '\x00\x00', # Data Count
    '\x4a\x00', # Data Offset
    '\x02', # Setup Count
    '\x00', # Reversed
    '\x23\x00', # SMB Pipe Protocol: Function: PeekNamedPipe (0x0023)
    '\x00\x00', # SMB Pipe Protocol: FID
    '\x07\x00',
    '\x5c\x50\x49\x50\x45\x5c\x00' # \PIPE\
    ]

    return generate_smb_proto_payload(netbios, smb_header, tran_request)


    def trans2_request(treeid, processid, userid, multiplex_id):
    """Generate trans2 request.
    """
    log.debug("generate tran2 request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x4f' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x32', # 'smb_command': Trans2
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x07\xc0', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    treeid,
    processid,
    userid,
    multiplex_id
    ]

    trans2_request = [
    '\x0f', # Word Count
    '\x0c\x00', # Total Parameter Count
    '\x00\x00', # Total Data Count
    '\x01\x00', # Max Parameter Count
    '\x00\x00', # Max Data Count
    '\x00', # Max Setup Count
    '\x00', # Reserved
    '\x00\x00', # Flags
    '\xa6\xd9\xa4\x00', # Timeout: 3 hours, 3.622 seconds
    '\x00\x00', # Reversed
    '\x0c\x00', # Parameter Count
    '\x42\x00', # Parameter Offset
    '\x00\x00', # Data Count
    '\x4e\x00', # Data Offset
    '\x01', # Setup Count
    '\x00', # Reserved
    '\x0e\x00', # subcommand: SESSION_SETUP
    '\x00\x00', # Byte Count
    '\x0c\x00' + '\x00' * 12
    ]

    return generate_smb_proto_payload(netbios, smb_header, trans2_request)

    def check(ip, port=445):
    """Check if MS17_010 SMB Vulnerability exists.
    """
    try:
    buffersize = 1024
    timeout = 5.0

    # Send smb request based on socket.
    client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    client.settimeout(timeout)
    client.connect((ip, port))

    # SMB - Negotiate Protocol Request
    raw_proto = negotiate_proto_request()
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    # SMB - Session Setup AndX Request
    raw_proto = session_setup_andx_request()
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36] # SMB Header: 32 bytes
    smb = SMB_HEADER(smb_header)

    user_id = struct.pack('<H', smb.user_id)

    # parse native_os from Session Setup Andx Response
    session_setup_andx_response = tcp_response[36:]
    native_os = session_setup_andx_response[9:].split('\x00')[0]

    # SMB - Tree Connect AndX Request
    raw_proto = tree_connect_andx_request(ip, user_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36] # SMB Header: 32 bytes
    smb = SMB_HEADER(smb_header)

    tree_id = struct.pack('<H', smb.tree_id)
    process_id = struct.pack('<H', smb.process_id)
    user_id = struct.pack('<H', smb.user_id)
    multiplex_id = struct.pack('<H', smb.multiplex_id)

    # SMB - PeekNamedPipe Request
    raw_proto = peeknamedpipe_request(tree_id, process_id, user_id, multiplex_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36]
    smb = SMB_HEADER(smb_header)

    # nt_status = smb_header[5:9]
    nt_status = struct.pack('BBH', smb.error_class, smb.reserved1, smb.error_code)

    # 0xC0000205 - STATUS_INSUFF_SERVER_RESOURCES - vulnerable
    # 0xC0000008 - STATUS_INVALID_HANDLE
    # 0xC0000022 - STATUS_ACCESS_DENIED

    if nt_status == '\x05\x02\x00\xc0':
    log.info("[+] [{}] is likely VULNERABLE to MS17-010! ({})".format(ip, native_os))

    # vulnerable to MS17-010, check for DoublePulsar infection
    raw_proto = trans2_request(tree_id, process_id, user_id, multiplex_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36]
    smb = SMB_HEADER(smb_header)

    if smb.multiplex_id == 0x0051:
    key = calculate_doublepulsar_xor_key(smb.signature)
    log.info("Host is likely INFECTED with DoublePulsar! - XOR Key: {}".format(key))

    elif nt_status in ('\x08\x00\x00\xc0', '\x22\x00\x00\xc0'):
    log.info("[-] [{}] does NOT appear vulnerable".format(ip))
    else:
    log.info("[-] [{}] Unable to detect if this host is vulnerable".format(ip))

    except Exception as err:
    log.error("[-] [{}] Exception: {}".format(ip, err))
    finally:
    client.close()


    if __name__ == '__main__':
    import sys

    if len(sys.argv) != 2:
    print("{} <ip>".format(sys.argv[0]))
    sys.exit(1)
    else:
    check(sys.argv[1])



    The credits for which of course go to the original author. I would link you directly to a Github account but a lot of people have independently uploaded the same code so i don't know who exactly the original author is.


    In conclusion, if you are looking for samples of WanaCryptor, below i have linked all samples as they are known to me.

    Samples.

    https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
    https://transfer.sh/PnDIl/CYBERed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.EXE
    https://transfer.sh/ZhnxR/CYBER1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.EXE (main dll)

    Binary blob in PE crypted with pass 'WNcry@2ol7'.

    parents https://pastebin.com/quvVH5hS (all known variants of the Wcry launcher containing eternalblue)
    children https://pastebin.com/A2pxw49F (all variants of Wcry, the actual ransomware, being currently observed in the wild)


    Further Reading.

    Post last edited by Sophie at 2017-05-17T22:23:36.599118+00:00

    Post last edited by Sophie at 2017-05-17T22:26:27.793561+00:00
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. Sophie Pedophile Tech Support
    Originally posted by Totse 2001 is SMB the only file transfering built in. I see it as an option to block.

    I don't understand coding really.. very limited of the basics yet the guy who found this vulnerability had found a shutdown command which was easy for him to turn on. that's all it took. i dont know if it freed from bitcoin demand but it stopped from infecting more? now the say it will just be modified to block that command from being requested. Allowing future hacks to go on, and be more difficult to stop.

    Disabling the SMB service will help. Also, it was not an issue of a specific command, it was the fact the malware tried to ping a non-existent domain. If it got a response, it would likely be in a sandbox so the payload would not be executed. However the researchers registered the domain, thereby tricking the ransomware to think it was in a sandbox and not executing.

    Also, once you have a bitcoin demand on your desktop it's already too late. Once the ransom demand drops, all your files are inaccessible, beyond repair. Until such a time as that you retrieve the key or roll a back up.

    You should manually disable SMB and update your Windows install just to be sure.
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. Sophie Pedophile Tech Support
    Originally posted by Kolokol-1 Don't worry, so was kolokol-1 from two years ago.

    Thank God we're not alone.
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. Sophie Pedophile Tech Support
    This calls for a narco-corrido.

    The following users say it would be alright if the author of this post didn't die in a fire!
  8. Sophie Pedophile Tech Support
    No. Obviously you wouldn't.

    The following users say it would be alright if the author of this post didn't die in a fire!
  9. Sophie Pedophile Tech Support
    Originally posted by reject Dampkring was a nice coffee shop, from what I recall. Awesome milkshakes. I smuggled back about 4g hash and 3g bud like an international drug smuggling badass.

    Dampkring is an awesome name for a coffee shop if you know Dutch. Dampkring means "Atmosphere". It literally translates to "Vapor Circle" as in the circle of gas that surrounds the planet. But it so happens that in Dutch you can use the word for vapor "damp" for "smoke" as well.
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. Sophie Pedophile Tech Support
    Bump for Anne Frank. She died for our pleasure.
    The following users say it would be alright if the author of this post didn't die in a fire!
  11. Sophie Pedophile Tech Support
    FOK JULLE NAAIERS!
    The following users say it would be alright if the author of this post didn't die in a fire!
  12. Sophie Pedophile Tech Support
    #TeamImouto #LoliLyfe #SisCon #Senpaism

    The following users say it would be alright if the author of this post didn't die in a fire!
  13. Sophie Pedophile Tech Support
    That's an excellent question. Most discussion is probably some type of mutual search for truth. Although it would seem people have some major malfunction where at some point it ends up in autistically screeching at one another with regards to who is most right.

    What does being right even mean. Is there an objective standard by which we can measure and compare all of our subjective experiences? Is life a movie? Am i the main character or do i play a minor role? Is it even important? I don't even know man.
    The following users say it would be alright if the author of this post didn't die in a fire!
  14. Sophie Pedophile Tech Support
    I did your test HTS, now what.


    67% Dominant
    66% Daddy/Mommy
    62% Primal (Hunter)
    59% Ageplayer <- what an unexpected result
    58% Owner
    51% Rigger
    48% Switch
    47% Vanilla
    43% Master/Mistress
    38% Experimentalist
    9% Non-monogamist
    7% Exhibitionist
    3% Voyeur
    3% Girl/Boy
    3% Submissive
    2% Brat
    1% Rope bunny
    1% Sadist
    1% Degrader
    0% Slave
    0% Degradee
    0% Primal (Prey)
    0% Masochist
    0% Pet
    The following users say it would be alright if the author of this post didn't die in a fire!
  15. Sophie Pedophile Tech Support
    u cud just look at sauce br0
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. Sophie Pedophile Tech Support
    This thread got a little too gay for my taste.

    The following users say it would be alright if the author of this post didn't die in a fire!
  17. Sophie Pedophile Tech Support
    [nigger][/nigger]

    holy shit
    The following users say it would be alright if the author of this post didn't die in a fire!
  18. Sophie Pedophile Tech Support
    Originally posted by Malice Unconditional love for a malicious/destructive psychopath really is unusual, but I suppose you can recognize the immense suffering and hardship they face and hope one day they get better, as it would be best for anyone.

    No it's not uncommon, such a situation is by design.
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. Sophie Pedophile Tech Support
    That taxation is theft.





    The following users say it would be alright if the author of this post didn't die in a fire!
  20. Sophie Pedophile Tech Support
    I never liked Mash, fuck him. I hope he continues not taking meds and ends up dead.
    The following users say it would be alright if the author of this post didn't die in a fire!
  1. 1
  2. 2
  3. 3
  4. ...
  5. 110
  6. 111
  7. 112
  8. 113
  9. 114
  10. 115
  11. ...
  12. 139
  13. 140
  14. 141
  15. 142
Jump to Top