User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 28
  6. 29
  7. 30
  8. 31
  9. 32
  10. 33
  11. 34
  12. 35
  13. 36
  14. 37

Posts That Were Thanked by SBTlauien

  1. snab_snib African Astronaut
    Originally posted by Malice Fuck third world countries.

    this is the smartest thing you've ever said
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. snab_snib African Astronaut



    dual watercooled 3.3ghz xeon e5-2670's, 16 cores 32 threads 40mb l3 cache, 64gb ecc ram, 8gb vram quadro M4000, 2x samsung 850 pro 512gb in RAID0.

    Post last edited by snab_snib at 2017-05-18T06:12:33.892277+00:00
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. Originally posted by SBTlauien Donald Trump

    This isn't a wishlist
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. Sophie Pedophile Tech Support
    Originally posted by Totse 2001 is SMB the only file transfering built in. I see it as an option to block.

    I don't understand coding really.. very limited of the basics yet the guy who found this vulnerability had found a shutdown command which was easy for him to turn on. that's all it took. i dont know if it freed from bitcoin demand but it stopped from infecting more? now the say it will just be modified to block that command from being requested. Allowing future hacks to go on, and be more difficult to stop.

    Disabling the SMB service will help. Also, it was not an issue of a specific command, it was the fact the malware tried to ping a non-existent domain. If it got a response, it would likely be in a sandbox so the payload would not be executed. However the researchers registered the domain, thereby tricking the ransomware to think it was in a sandbox and not executing.

    Also, once you have a bitcoin demand on your desktop it's already too late. Once the ransom demand drops, all your files are inaccessible, beyond repair. Until such a time as that you retrieve the key or roll a back up.

    You should manually disable SMB and update your Windows install just to be sure.
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. Malice Naturally Camouflaged
    Fucking christ Spectral, I have no problem believing your stories.

    Contrary to what many believe, the world was not a better place back then, and the data clearly backs it up. It's all about cognitive biases and ignorance, incorrect beliefs. Mean world syndrome is a major explanation for why people think society has been getting worse.

    A lot of the world is still incredibly fucked up, and was so much worse just within the last 100 years. Sure as hell didn't seem to do any good since clearly life was so shitty for the vast majority of people.
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. Sophie Pedophile Tech Support
    By now i am sure you have all heard about the WanaCryptor ransomworm.

    What you may not know however is that there was a very specific exploit used in combination with this ransomware/worm. So for some background, a while ago NSA offshoot EQUATIONGROUP was hacked by a group of people calling themselves "the Shadow Brokers". It was claimed a large arsenal of 0days and custom exploits were taken in the data breach. This later turned out to be true when the Shadow Brokers dumped all the tools they had online.


    One of the vulnerabilities disclosed by the leak was one called MS17-010. Which is a critical vulnerability in the way Windows handles the Server Message Block implementation or SMB. SMB is a file transfer protocol. The flaw here is the way in which SMB handles specially crafted requests. With the right request this can allow for remote code execution and it is in this way that the Ransomware acts as a worm as well.


    Once an initial foothold is gained the ransomware scans the local network for the SMB service. If found it will it will launch an exploit to propagate over the network and infect as many machines as possible. If you're interested BAE Systems has a detailed analysis report On the malwares functionality.



    In the mean time Rapid7 has added a module for the exploit dubbed EternalBlue to the metasploit framework. The details for which can be found by clicking here.


    Interestingly enough as you can read in the BAE Systems article, the malware had some sort of kill switch functionality. What it does is check for the existence of a certain domain, if the domain is found it stops the execution of the payload. This is most likely done as a sandbox evasion technique.

    Ironically, once researchers found this out they were quick to register the domain which resulted in a drop in infections. The interesting thing about this ransomware attack is that it used a nation-state level exploit to act as a worm and that contrary to the usual delivery mechanism(Phishing campaign) it would appear SMB services facing the internet were directly targeted by the malware.

    Furthermore, Microsoft has come out with a patch. You are advised to update if you run Windows as OS on any boxes you have. If you'd like to know if your Windows is vulnerable you can use this Python script to fins out.


    #!/usr/bin/python
    # -*- coding: utf-8 -*-

    #
    # References:
    #
    # https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/
    # https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_ms17_010
    # https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb
    # https://www.symantec.com/security_response/vulnerability.jsp?bid=96707
    # https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-SMB2/[MS-SMB2]-151016.pdf
    # https://msdn.microsoft.com/en-us/library/windows/desktop/aa365233(v=vs.85).aspx
    # https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
    # https://community.rapid7.com/community/metasploit/blog/2017/04/03/introducing-rubysmb-the-protocol-library-nobody-else-wanted-to-write
    # https://msdn.microsoft.com/en-us/library/ee441741.aspx
    # https://github.com/countercept/doublepulsar-detection-script/blob/master/detect_doublepulsar_smb.py
    # http://stackoverflow.com/questions/38735421/packing-an-integer-number-to-3-bytes-in-python
    # https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html

    """
    $ python2.7 smb_exploit.py 192.168.206.152
    [+] [192.168.206.152] is likely VULNERABLE to MS17-010! (Windows 7 Ultimate 7600)

    $ python2.7 smb_exploit.py 192.168.206.130
    [+] [192.168.206.130] is likely VULNERABLE to MS17-010! (Windows 5.1)
    """

    from ctypes import *
    import socket
    import struct
    import logging


    logging.basicConfig(level=logging.INFO, format="%(message)s")
    log = logging.getLogger(__file__)

    # negotiate_proto_request
    # session_setup_andx_request
    # tree_connect_andx_request
    # peeknamedpipe_request
    # trans2 request


    class SMB_HEADER(Structure):
    """SMB Header decoder.
    """

    _pack_ = 1 # Alignment

    _fields_ = [
    ("server_component", c_uint32),
    ("smb_command", c_uint8),
    ("error_class", c_uint8),
    ("reserved1", c_uint8),
    ("error_code", c_uint16),
    ("flags", c_uint8),
    ("flags2", c_uint16),
    ("process_id_high", c_uint16),
    ("signature", c_uint64),
    ("reserved2", c_uint16),
    ("tree_id", c_uint16),
    ("process_id", c_uint16),
    ("user_id", c_uint16),
    ("multiplex_id", c_uint16)
    ]

    def __new__(self, buffer=None):
    return self.from_buffer_copy(buffer)

    def __init__(self, buffer):
    log.debug("server_component : %04x" % self.server_component)
    log.debug("smb_command : %01x" % self.smb_command)
    log.debug("error_class : %01x" % self.error_class)
    log.debug("error_code : %02x" % self.error_code)
    log.debug("flags : %01x" % self.flags)
    log.debug("flags2 : %02x" % self.flags2)
    log.debug("process_id_high : %02x" % self.process_id_high)
    log.debug("signature : %08x" % self.signature)
    log.debug("reserved2 : %02x" % self.reserved2)
    log.debug("tree_id : %02x" % self.tree_id)
    log.debug("process_id : %02x" % self.process_id)
    log.debug("user_id : %02x" % self.user_id)
    log.debug("multiplex_id : %02x" % self.multiplex_id)


    def generate_smb_proto_payload(*protos):
    """Generate SMB Protocol. Pakcet protos in order.
    """
    hexdata = []
    for proto in protos:
    hexdata.extend(proto)
    return "".join(hexdata)


    def calculate_doublepulsar_xor_key(s):
    """Calaculate Doublepulsar Xor Key
    """
    x = (2 * s ^ (((s & 0xff00 | (s << 16)) << 8) | (((s >> 16) | s & 0xff0000) >> 8)))
    x = x & 0xffffffff # this line was added just to truncate to 32 bits
    return x


    def negotiate_proto_request():
    """Generate a negotiate_proto_request packet.
    """
    log.debug("generate negotiate request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x54' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x72', # 'smb_command': Negotiate Protocol
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x28', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    '\x00\x00', # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    negotiate_proto_request = [
    '\x00', # 'word_count'
    '\x31\x00', # 'byte_count'

    # Requested Dialects
    '\x02', # 'dialet_buffer_format'
    '\x4C\x41\x4E\x4D\x41\x4E\x31\x2E\x30\x00', # 'dialet_name': LANMAN1.0

    '\x02', # 'dialet_buffer_format'
    '\x4C\x4D\x31\x2E\x32\x58\x30\x30\x32\x00', # 'dialet_name': LM1.2X002

    '\x02', # 'dialet_buffer_format'
    '\x4E\x54\x20\x4C\x41\x4E\x4D\x41\x4E\x20\x31\x2E\x30\x00', # 'dialet_name3': NT LANMAN 1.0

    '\x02', # 'dialet_buffer_format'
    '\x4E\x54\x20\x4C\x4D\x20\x30\x2E\x31\x32\x00' # 'dialet_name4': NT LM 0.12
    ]

    return generate_smb_proto_payload(netbios, smb_header, negotiate_proto_request)


    def session_setup_andx_request():
    """Generate session setuo andx request.
    """
    log.debug("generate session setup andx request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x63' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x73', # 'smb_command': Session Setup AndX
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x20', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    '\x00\x00', # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    session_setup_andx_request = [
    '\x0D', # Word Count
    '\xFF', # AndXCommand: No further command
    '\x00', # Reserved
    '\x00\x00', # AndXOffset
    '\xDF\xFF', # Max Buffer
    '\x02\x00', # Max Mpx Count
    '\x01\x00', # VC Number
    '\x00\x00\x00\x00', # Session Key
    '\x00\x00', # ANSI Password Length
    '\x00\x00', # Unicode Password Length
    '\x00\x00\x00\x00', # Reserved
    '\x40\x00\x00\x00', # Capabilities
    '\x26\x00', # Byte Count
    '\x00', # Account
    '\x2e\x00', # Primary Domain
    '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x32\x31\x39\x35\x00', # Native OS: Windows 2000 2195
    '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x35\x2e\x30\x00', # Native OS: Windows 2000 5.0
    ]

    return generate_smb_proto_payload(netbios, smb_header, session_setup_andx_request)


    def tree_connect_andx_request(ip, userid):
    """Generate tree connect andx request.
    """
    log.debug("generate tree connect andx request")

    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x47' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x75', # 'smb_command': Tree Connect AndX
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x20', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    userid, # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    ipc = "\\\\{}\IPC$\x00".format(ip)
    log.debug("Connecting to {} with UID = {}".format(ipc, userid))

    tree_connect_andx_request = [
    '\x04', # Word Count
    '\xFF', # AndXCommand: No further commands
    '\x00', # Reserved
    '\x00\x00', # AndXOffset
    '\x00\x00', # Flags
    '\x01\x00', # Password Length
    '\x1C\x00', # Byte Count
    '\x00', # Password
    ipc.encode(), # \\xxx.xxx.xxx.xxx\IPC$
    '\x3f\x3f\x3f\x3f\x3f\x00' # Service
    ]

    length = len("".join(smb_header)) + len("".join(tree_connect_andx_request))
    # netbios[1] = '\x00' + struct.pack('>H', length)
    netbios[1] = struct.pack(">L", length)[-3:]

    return generate_smb_proto_payload(netbios, smb_header, tree_connect_andx_request)


    def peeknamedpipe_request(treeid, processid, userid, multiplex_id):
    """Generate tran2 request
    """
    log.debug("generate peeknamedpipe request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x4a' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x25', # 'smb_command': Trans2
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x28', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    treeid,
    processid,
    userid,
    multiplex_id
    ]

    tran_request = [
    '\x10', # Word Count
    '\x00\x00', # Total Parameter Count
    '\x00\x00', # Total Data Count
    '\xff\xff', # Max Parameter Count
    '\xff\xff', # Max Data Count
    '\x00', # Max Setup Count
    '\x00', # Reserved
    '\x00\x00', # Flags
    '\x00\x00\x00\x00', # Timeout: Return immediately
    '\x00\x00', # Reversed
    '\x00\x00', # Parameter Count
    '\x4a\x00', # Parameter Offset
    '\x00\x00', # Data Count
    '\x4a\x00', # Data Offset
    '\x02', # Setup Count
    '\x00', # Reversed
    '\x23\x00', # SMB Pipe Protocol: Function: PeekNamedPipe (0x0023)
    '\x00\x00', # SMB Pipe Protocol: FID
    '\x07\x00',
    '\x5c\x50\x49\x50\x45\x5c\x00' # \PIPE\
    ]

    return generate_smb_proto_payload(netbios, smb_header, tran_request)


    def trans2_request(treeid, processid, userid, multiplex_id):
    """Generate trans2 request.
    """
    log.debug("generate tran2 request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x4f' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x32', # 'smb_command': Trans2
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x07\xc0', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    treeid,
    processid,
    userid,
    multiplex_id
    ]

    trans2_request = [
    '\x0f', # Word Count
    '\x0c\x00', # Total Parameter Count
    '\x00\x00', # Total Data Count
    '\x01\x00', # Max Parameter Count
    '\x00\x00', # Max Data Count
    '\x00', # Max Setup Count
    '\x00', # Reserved
    '\x00\x00', # Flags
    '\xa6\xd9\xa4\x00', # Timeout: 3 hours, 3.622 seconds
    '\x00\x00', # Reversed
    '\x0c\x00', # Parameter Count
    '\x42\x00', # Parameter Offset
    '\x00\x00', # Data Count
    '\x4e\x00', # Data Offset
    '\x01', # Setup Count
    '\x00', # Reserved
    '\x0e\x00', # subcommand: SESSION_SETUP
    '\x00\x00', # Byte Count
    '\x0c\x00' + '\x00' * 12
    ]

    return generate_smb_proto_payload(netbios, smb_header, trans2_request)

    def check(ip, port=445):
    """Check if MS17_010 SMB Vulnerability exists.
    """
    try:
    buffersize = 1024
    timeout = 5.0

    # Send smb request based on socket.
    client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    client.settimeout(timeout)
    client.connect((ip, port))

    # SMB - Negotiate Protocol Request
    raw_proto = negotiate_proto_request()
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    # SMB - Session Setup AndX Request
    raw_proto = session_setup_andx_request()
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36] # SMB Header: 32 bytes
    smb = SMB_HEADER(smb_header)

    user_id = struct.pack('<H', smb.user_id)

    # parse native_os from Session Setup Andx Response
    session_setup_andx_response = tcp_response[36:]
    native_os = session_setup_andx_response[9:].split('\x00')[0]

    # SMB - Tree Connect AndX Request
    raw_proto = tree_connect_andx_request(ip, user_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36] # SMB Header: 32 bytes
    smb = SMB_HEADER(smb_header)

    tree_id = struct.pack('<H', smb.tree_id)
    process_id = struct.pack('<H', smb.process_id)
    user_id = struct.pack('<H', smb.user_id)
    multiplex_id = struct.pack('<H', smb.multiplex_id)

    # SMB - PeekNamedPipe Request
    raw_proto = peeknamedpipe_request(tree_id, process_id, user_id, multiplex_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36]
    smb = SMB_HEADER(smb_header)

    # nt_status = smb_header[5:9]
    nt_status = struct.pack('BBH', smb.error_class, smb.reserved1, smb.error_code)

    # 0xC0000205 - STATUS_INSUFF_SERVER_RESOURCES - vulnerable
    # 0xC0000008 - STATUS_INVALID_HANDLE
    # 0xC0000022 - STATUS_ACCESS_DENIED

    if nt_status == '\x05\x02\x00\xc0':
    log.info("[+] [{}] is likely VULNERABLE to MS17-010! ({})".format(ip, native_os))

    # vulnerable to MS17-010, check for DoublePulsar infection
    raw_proto = trans2_request(tree_id, process_id, user_id, multiplex_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36]
    smb = SMB_HEADER(smb_header)

    if smb.multiplex_id == 0x0051:
    key = calculate_doublepulsar_xor_key(smb.signature)
    log.info("Host is likely INFECTED with DoublePulsar! - XOR Key: {}".format(key))

    elif nt_status in ('\x08\x00\x00\xc0', '\x22\x00\x00\xc0'):
    log.info("[-] [{}] does NOT appear vulnerable".format(ip))
    else:
    log.info("[-] [{}] Unable to detect if this host is vulnerable".format(ip))

    except Exception as err:
    log.error("[-] [{}] Exception: {}".format(ip, err))
    finally:
    client.close()


    if __name__ == '__main__':
    import sys

    if len(sys.argv) != 2:
    print("{} <ip>".format(sys.argv[0]))
    sys.exit(1)
    else:
    check(sys.argv[1])



    The credits for which of course go to the original author. I would link you directly to a Github account but a lot of people have independently uploaded the same code so i don't know who exactly the original author is.


    In conclusion, if you are looking for samples of WanaCryptor, below i have linked all samples as they are known to me.

    Samples.

    https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
    https://transfer.sh/PnDIl/CYBERed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.EXE
    https://transfer.sh/ZhnxR/CYBER1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.EXE (main dll)

    Binary blob in PE crypted with pass 'WNcry@2ol7'.

    parents https://pastebin.com/quvVH5hS (all known variants of the Wcry launcher containing eternalblue)
    children https://pastebin.com/A2pxw49F (all variants of Wcry, the actual ransomware, being currently observed in the wild)


    Further Reading.

    Post last edited by Sophie at 2017-05-17T22:23:36.599118+00:00

    Post last edited by Sophie at 2017-05-17T22:26:27.793561+00:00
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. fag Houston
    I fucking hate feminists, especially the male ones.
    The following users say it would be alright if the author of this post didn't die in a fire!
  8. Originally posted by AltarEgo Lets just keep them in a jail called a hijab and treat them as property.

    You say that sarcastically but it's a great idea.

    This is why Islam is the best religion.
    The following users say it would be alright if the author of this post didn't die in a fire!
  9. Why don't we just cut our own dicks off and shove them up our assholes?
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. kroz weak whyte, frothy cuck, and former twink
    http://www.dailymail.co.uk/news/article-4513584/Austin-man-sues-woman-date-texting.html

    Brandon Vezmar, 37, from Austin, Texas, sued his date last Thursday for $17.31 because she was texting during a movie. The specific amount, according to Vezmar, is to compensate for the cost of the movie ticket to the 3-D showing of 'Guardians of the Galaxy, Vol. 2. Vezmar said his date's texting was a 'direct violation' of the policy at the theater and that his experience was 'adversely' affected by it

    In his petition, Vezmar got into the minutiae of his date's texting habits during Guardian of the Galaxy. She 'activated her phone at least 10-20 times in 15 minutes to read and send text messages,' he claimed, adding that it was a 'direct violation' of the policy at the theater and that his experience was 'adversely' affected by it. Vezmar says that he asked his date to stop texting, and then suggested she go outside if she was going to continue to do it. She then left the theater and drove away, which Vezmar says left him without a ride.

    Vezmar's date, who is not named, first found out about the suit when the Austin American-Statesman called her on Tuesday. She maintained that she was texting a friend who was having a fight with her boyfriend.

    'I had my phone low and I wasn't bothering anybody. It wasn't like constant texting,' she said.

    When Vezmar texted her afterwards and asked that she pay him back for the movie ticket and pizza, she refused. She cited her reasoning as: 'he took me out on a date.' She said she is also going to file a protective order against Vezmar because he allegedly tried to contact her little sister for the money he felt he was owed.

    The following users say it would be alright if the author of this post didn't die in a fire!
  11. Sophie Pedophile Tech Support
    Originally posted by SBTlauien Well, I thought it was a good example. It's more suited for the ignorant. Your knowledge of science puts you on another level.

    I wasn't trying to be a smartass, i was expanding on the analogy. In a way consistent with the physics of light. It was a good amalogy.
    The following users say it would be alright if the author of this post didn't die in a fire!
  12. Malice Naturally Camouflaged
    It was a good example of what death is like, in a way.

    It really can be like flicking a switch. One moment you're there, the next you aren't. You no longer exist, there's just nothing. It's something that most people have a hard time grasping because of course you can't experience non-existence. Although, I suppose the closest thing is when you're sleeping and don't dream, or at least don't remember dreaming. Imagine just going to sleep and never waking up. You aren't suffering, you aren't in fear or pain, because there no longer is any you to experience, it's just nothingness.

    Most people simply cannot come to terms with this. Religion has been called the opioid of the masses for a good reason, it's a very difficult and unnerving subject to fully understand and come to terms with, to accept.

    Dwelling on it won't do you any good, of course. Best to just be alive, be in the present, focus on whatever makes you happy. At some point it will either happen or it won't. No man knows the hour. Even the suicidal can't be certain of when they'll finally be pushed over the edge.
    The following users say it would be alright if the author of this post didn't die in a fire!
  13. kroz weak whyte, frothy cuck, and former twink
    who described the emotional state of a psychopath as "that of a subhuman animal"? You might be right about all the other stuff but that first part seems flawed to say the least.

    from what I've read, sure some people are more prone towards being agressive/violent but its a spiritual malady for the most part that became because of how the serial killer was raised and past experiences, just like things like schizophrenia and bipolar disorder.
    The following users say it would be alright if the author of this post didn't die in a fire!
  14. aldra JIDF Controlled Opposition
    Honestly would recommend waiting until 25 or so before deciding on something so final; it's around that age your brain stops developing and changing. At the very least move out, get out of your current environment - it's all you've ever known so an external change might also change your perspective.
    The following users say it would be alright if the author of this post didn't die in a fire!
  15. nein

    The following users say it would be alright if the author of this post didn't die in a fire!
  16. infinityshock Black Hole
    Originally posted by Phoenix I would rather not, but here have a tasteful non-nude:


    God I hate myself.

    I'm not quite sure what that is...but I can't say that I wouldn't hit it.
    The following users say it would be alright if the author of this post didn't die in a fire!
  17. Originally posted by Darth Beaver Even the fat knees?

    I'll suck your dick, asshole.
    The following users say it would be alright if the author of this post didn't die in a fire!
  18. Originally posted by SCronaldo_J_Trump I bet every inch of your body is delicious.

    Even the fat knees?
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. Originally posted by SBTlauien I disagree for the most part.

    Without allowing some shitposting, the forum would be extremely slow.

    I think to up the quality, the forum needs a few small upgrades.

    Articles would be nice and would attract the right kind of people.

    What's needed is strict enforcement of topicality in specialty forums. That's the end and the beginning. Now I know lenno doesn't want to bother with it. And I know nobody wants mods. So idk what the solution is, but shitposting just needs to be cut from specialty forums. I was going to suggest some sort of a collective "fuck off" button, like Reddit downvotes, but I know it would just be used by retard coalitions like the obvious shitposters to fuck with people.

    Post last edited by Captain Falcon at 2017-05-14T19:39:09.650964+00:00
    The following users say it would be alright if the author of this post didn't die in a fire!
  20. infinityshock Black Hole
    this is what you consider a good idea for making a thread about.

    fucking retard.
    The following users say it would be alright if the author of this post didn't die in a fire!
  1. 1
  2. 2
  3. 3
  4. ...
  5. 28
  6. 29
  7. 30
  8. 31
  9. 32
  10. 33
  11. 34
  12. 35
  13. 36
  14. 37
Jump to Top