creepy/scary/fucked up DARKNETS 0_0
someone sent me this little story, http://thecolligere.com/wp-content/u...9540700438.png , it could be completely fake, but it seems somewhat realistic.
Have any of you IT/network guys ever run across something like this? |
Someone page Joe.
|
what is the image?
|
The story.
|
Thats horrific to say the least and I can say that stuff like that does happen quite frequently around the world and even here in the states. Ive seen many things in my relatively short life and I can say there is a deplorable underworld that thrives on such acts in order to maintain and gain power.
|
Originally Posted by Braineack
(Post 696662)
what is the image?
|
Bullshit I system built to handle 3tb+ of data ingest would not have been running windows 98. Even in 1998. Also, there is no technical jargon in the article and a real hacker/programmer would not hesitate to use it. And blah blah stupid story. |
The story and how it was obtained I think is bullshit but I know the described act is a factual reality.
|
too many words.
|
Surea, there are 8 billion people on earth. All sorts of shit happens. |
And for those that like clandestine secret stuff, yes, there are shitloads of darknets that will never touch the interweb. Read up on information compartmentalization. Its a "best practice" for the miltary and other criminal organizations. Woops |
Originally Posted by leatherface24
(Post 696669)
I know the described act is a factual reality.
|
forced sex with a corpse
|
Working your way into hidden shit is no biggie, yet he needs several hours to set up a scanner
|
Even though it's pretty horrifying, I'm sure things like that happen all time. The 3TB/Windows 98 made me wonder, because I really don't know but I assume it could work and maybe it was set up like that to appear to be dormant and subtle.
The whole "darknet" thing freaks me out a little though (of course because it's so unknown/dark it's mysterious or whatever), but I know some serious organized crime goes on via the internet. I'm curious if anyone has run into it though and how far from/close to reality the above story is. |
Originally Posted by Pusha
(Post 696660)
Someone page Joe.
|
Originally Posted by Joe Perez
(Post 696694)
I don't know why my name seems to get dragged into the conversation up every single time somebody is forced to have sex with their daughter's mutilated corpse...
|
Originally Posted by Joe Perez
(Post 696694)
I don't know why my name seems to get dragged into the conversation up every single time somebody is forced to have ...
Generally I get called in for the sex with their daughter's mutilated corpse ;) |
Originally Posted by leatherface24
(Post 696701)
No you were called in because of the above mentioned by stoole-Pusha.
So, serious question time: am I missing something which ought to be intuitively obvious regarding this whole darknet concept? "Dark" networks have existed pretty much since the ratification of RFC1122 (the beginning of the modern internet as we know it.) They're hosts on the internet which are "unreachable" owing to exclusion from routing tables or the use of nonstandard protocols. |
I dont know much about darknets or things of that ilk. My devious behavior is just good old fashioned violence not e-terror in the deep hacker kinda way.
|
Originally Posted by leatherface24
(Post 696726)
not e-terror in the deep hacker kinda way.
|
Originally Posted by Joe Perez
(Post 696735)
The use of the word "hacker" in this context has always bothered me.
|
I'm going with story someone made up to post on 4chan and freak people out.
(article isn't really relevant, but anyway). http://thecolligere.com/internet/intro-to-deep-web |
Originally Posted by mgeoffriau
(Post 696741)
As opposed to what? Cracker?
Though in fairness, I'll admit to devious use of same myself... The aforementioned university, at the time when I was there, had begun to install large numbers of general purpose PCs (and small numbers of X-terminals) in many locations, in lieu of the VT-220 dumb terminals. Many of these machines were situated together in a large space seating hundreds of users, which formed the ground floor of the CIRCA building, and from which you could peer through the glass at the two majestic VAX 11/780 mainframes with their RA-81 disk drive cabinets (and the less visually impressive but rather more useful rack containing a cluster of DEC Alpha machines.) The PCs were mostly of the IBM PS/2 variety, fairly unimpressive. I can't even recall which OSes they all had on them. They could be used for word processing, running NCSA Mosaic (holy shit! The Web with PICTURES! This was heady stuff at the time), sending print jobs to a cluster of dot-matrix printers (these were much slower, obviously, than the big DEC band printers, but were more convenient as they were self-service), etc. You could also run NetScout. The university, for whatever reason, had chosen to network all of these PCs using 10base-2 (coaxial) ethernet, rather than 10Base-T. Cost was probably a factor, as ethernet hubs weren't exactly cheap back then. For those not familiar with ethernet technology, we take it for granted these days that our computer is plugged into a switch or router, and that device provides all manner of intelligent traffic switching functions. Not so with 10B2. That was a switchless broadcast network, in which each computer was connected directly to the next in daisy-chain fashion, with a terminator at one end and a connection to some larger network at the other. In practical terms, this meant that every single packet transmitted from any one computer was broadcast to every other computer on the segment, and it was the responsibility of each individual PC to analyze the packet and determine whether or not that packet was intended for it. This is a massively inefficient way of doing things, but it's cheap and simple to implement. Now, these were the days before we took encryption for granted. Sure, a few truly paranoid folks used PGP, but it wasn't like the connection between your web browser and whatever server you were accessing was in any way secure. For that matter, a lot of folks still used Telnet, Gopher, and Archie / FTP for their day-to-day computing needs. To the designers of those systems, security meant making sure that the door to the room containing the server closed behind you. It goes without saying that we ended up with a database of the usernames and passwords of a significant fraction of the student body. This was before it was commonplace to transmit things like credit card numbers across the internet so there was no financial gain, so in the grandest tradition of chickenshit nerds everywhere, we mostly used it as a revenge tool against people who we didn't particularly like. |
maybe its the nerd in me , but i lol'd when i read 3tb or storage in windows 98. maybe GB's since that is the limit of fat16. :laugh:
|
1 Attachment(s)
Originally Posted by Joe Perez
(Post 696773)
For that matter, a lot of folks still used Telnet, Gopher, and Archie / FTP for their day-to-day computing needs.
EDIT: My work computer: Attachment 190622 |
Hey man, I'm sorry I gotta tell you this, but the 80's called. They want their computer back.
|
No way man, look at the top right of the screen....it was updated in 1999.
|
Originally Posted by Reverant
(Post 696795)
Hey man, I'm sorry I gotta tell you this, but the 80's called. They want their computer back.
|
Originally Posted by PatrickB
(Post 696777)
maybe its the nerd in me , but i lol'd when i read 3tb or storage in windows 98. maybe GB's since that is the limit of fat16. :laugh:
or FAT32 which has a higher limit. |
Yes that's why I didnt comment on the filesystem size. There were probably middleware apps that would allow a network mount or even volume managers Btw joes anecdote is how the real deal would sound... Full of lots of shit the layperson would not understand. Fwiw I had a ps2 joe it was my familys first computer. My mother did get on the web too in 94 and was jabbering about mosaic and usenet back then. She wasa professor at the time. I wonder what nascent tech is propagating in academia nowdays? Prob nothin as awesome as the web |
Darknet is anything that's not indexed by search engines, right? So FTP, newsgroups, etc are all darknet as well I believe.
But there is alot of screwed up stuff on there that can be accessed through TOR. I believe you have to disable Java and some other things in your browse since many of those sites are monitored by the FBI (especially the pedo sites). I personally wouldn't mess with it. There was a super long thread on body building forum about this a while back. |
Originally Posted by kenzo42
(Post 696842)
Darknet is anything that's not indexed by search engines, right? So FTP, newsgroups, etc are all darknet as well I believe.
. You're thinking of the "deep web". |
Originally Posted by Jeff_Ciesielski
(Post 696847)
You're thinking of the "deep web".
|
Originally Posted by Faeflora
(Post 696826)
Btw joes anecdote is how the real deal would sound... Full of lots of shit the layperson would not understand.
I wonder what nascent tech is propagating in academia nowdays? |
Originally Posted by kenzo42
(Post 696842)
Darknet is anything that's not indexed by search engines, right? So FTP, newsgroups, etc are all darknet as well I believe.
But there is alot of screwed up stuff on there that can be accessed through TOR. I believe you have to disable Java and some other things in your browse since many of those sites are monitored by the FBI (especially the pedo sites). I personally wouldn't mess with it. There was a super long thread on body building forum about this a while back. WTF is TOR??? |
Originally Posted by Faeflora
(Post 696908)
WTF is TOR???
Instead of directly connecting to a website/server, you send network traffic through a tunnel (tor) which then comes out randomly at another location and connects to the destination. The destination server then sends its reply back through the tor tunnel to your PC. Heres the catch: say you connect to amazon.com through tor. You are in the US, but the outlet for the tor network might be in Moscow. Then you disconnect and come back the next day. This time it might be in Beijing. This is what creates the anonymity, you will (in theory) never connect through the same path twice. The downside to this is that it is very slow. |
Originally Posted by Jeff_Ciesielski
(Post 696921)
Think of tor as a proxy on steroids. It wont do what kenzo was talking about, but what it does allow you to do is surf the internet/download/P2P with almost complete anonymity.
https://www.torproject.org/ Never heard of this before! I torrent a lot and this looks great. Hmm |
creepypasta is creepy.
Subscribed for curiosity. |
This is why I don't own a computer.
|
Originally Posted by Joe Perez
(Post 696773)
running NCSA Mosaic (holy shit! The Web with PICTURES! This was heady stuff at the time)
Hell yes!!! I so rarely come across anyone who has ever heard of this, let alone used it. The last programming seminar I attended (Silverlight, ugh), even the "teacher" had never heard of Mosaic or been online before the Netscape days. Anyways, great story, OP. Fabrication or not, it was well written. And awesome to read on a png. |
Anyone remember his Fidonet address?
|
Originally Posted by revlimiter
(Post 697739)
The last programming seminar I attended (Silverlight, ugh), even the "teacher" had never heard of Mosaic or been online before the Netscape days.
I actually resisted Mosaic for a long time. Compared to Lynx, it was fairly sluggish, especially if you had encountered a page with images. Remember when the background attribute was first added to <body>, and every living human suddenly felt the need to add a needlessly large and garish background to their webpage? That made life suck very badly if you were connecting via PPP through TIA through a 4800 baud connection. Sloooooooooooooooooow. Between Lynx and Pine, that was pretty much all the internet I needed until about '96 or so.
Originally Posted by Reverant
(Post 697740)
Anyone remember his Fidonet address?
I honestly don't recall that the BBS I used to access Fidonet (Castle of Atlantis, running Wildcat on a 286) supported Fidonet email. It might have, I just don't recall ever using it. I used Fido for echomail, which was roughly analogous to a modern-day web forum (or to usenet, for you old-timers.) |
Ah, Pine. It was superior to Elm. I even had PC-Pine for my university dial-up email access. Those were the good ol' days.
And I believe the system I'm typing on at this moment has lynx. =) I've not used it for a little while. Not since I last wanted to test a site without a CSS skin applied. I entertained my coworkers just last Friday by using FTP from a windows command line. And, if confronted with one, I think I could still type SMTP commands into a telnet window... |
AHH PINE. Fuck yah sweet pine! That shit was awesome. I should install that and use it again. Fuck that is all that is needed for email.
|
|
Originally Posted by revlimiter
(Post 697806)
Ah, Pine. It was superior to Elm. I even had PC-Pine for my university dial-up email access.
Aah, my first exposure to recursive acronyms. You know, there are a lot of things that I genuinely do miss about that era in computing. In many ways, it was simpler. Realistically speaking, Pine was so much faster and more responsive then Outlook is today, despite the fact that my little desktop PC is orders of magnitude faster than the ole' VAX. On the other hand, I now have the ability to do things like insert images inline with a posting, from a device that weighs 8 ounces and fits in the palm of my hand, while sitting on the toilet, in an airport. I entertained my coworkers just last Friday by using FTP from a windows command line. Anyway, I'm rambling. Long story short if that when you are configuring a machine by hand (eg: in the lab for testing) and need to do something simple to the machine, like command it to read the config file you just uploaded, you just type "Literal Init Router" and it does it. In this case, "Init" is the instruction, and "Router" is a modifier that tells the machine what part of the system to reinitialize. We also have a Literal Reset command, and a facility for remotely executing macros by "Literal xxx.MAC" where xxx is the filename of the macro. For some odd reason, most of the hardware guys in the lab equate the use of the command line in this way to be tantamount to wizardly hacking. Goes to show you how much times have changed, I guess. (Bear in mind, a few of these guys grew up with punched cards, so I really don't see why this is odd.) And, if confronted with one, I think I could still type SMTP commands into a telnet window... Man, I'd forgotten all about that until now. I wonder how much other rusty old crap is rolling around in my head? |
Originally Posted by revlimiter
(Post 697806)
And, if confronted with one, I think I could still type SMTP commands into a telnet window...
|
You've never really lived...
1 Attachment(s)
...until you wrote code and JCL on these:
|
1 Attachment(s)
...or one of these...
|
Shit I remember when floppy disks were floppy. You know, like FLACCID. 8" flaccid disks.
Go ahead baby, insert your 8" flaccid disk into my slot... I remember the TRS-80. And the Apple 2. And playing with BASIC on some IBM terminals when I was 11... |
telnet ea.oac.uci.edu
|
Originally Posted by Faeflora
(Post 697826)
AHH PINE. Fuck yah sweet pine! That shit was awesome. I should install that and use it again. Fuck that is all that is needed for email.
|
Originally Posted by kenzo42
(Post 699141)
telnet ea.oac.uci.edu
|
What the fuck?
I just realized that Win7 doesn't include a command-line telnet application! |
Originally Posted by Joe Perez
(Post 699180)
What the fuck?
I just realized that Win7 doesn't include a command-line telnet application! or use hyperterminal. |
1 Attachment(s)
I've already got TeraTerm (I use it for all my RS-232 terminal work), I'm just accustomed to being able to hit Attachment 241304-R and then type "Telnet xxx" and be instantly connected. Having to first open an application by doing several mouse clicks, and then use the mouse to click on several more buttons to go through a whole "connect to..." dialog just needlessly slows me down.
They still support the command-line FTP client (I'd have thrown my Win7 disc out the window on day 1 if that were gone) so what the hell was gained by ditching the telnet client? Why the fuck does Windows have to punish me for preferring keyboard shortcuts and command-line applications vs. pushing a mouse around to accomplish the same task in more time? Sidebar: Did you know that you can buy a keyboard with a Tux key? http://farm1.static.flickr.com/7/113...b964ca84_z.jpg No, that's not a Photochop. You can buy it here: http://zareason.com/shop/Tux-Keyboard.html?page=1 |
Originally Posted by Joe Perez
(Post 699205)
I've already got TeraTerm (I use it for all my RS-232 terminal work), I'm just accustomed to being able to hit
Make an alias/shortcut/symlink to ttermpro.exe and call it telnet.exe Save it in the tterm directory Right click on my computer/properties/environment variables/path and add the tterm folder to the path (seperate with semicolon) Then kill and restart explorer Then do winkey/R and type telnet and the flags: Command line (shortcut link) format TTERMPRO (replace with telnet) [<host>[[:]<TCP port#>]] [/B] [/C=<serial port#>] [/F=<setup file>] [/FD=<file transfer directory>] [/H] [/I] [/K=<keyboard setup file>] [/KR=<kanji code (receive)>] [/KT=<kanji code (transmit)>] [/L=<log file>] [/LA=<language>] [/M=<macro file>] [/P=<TCP port#>] [/R=<replay file>] [/T=<telnet flag>] [/V] [/W="<window title>"] [/X=<window pos (x)] [/Y=<window pos (y)] [;<comment>] :) In short tterm can be initiated from windows run or cli and open a session with a port. |
Originally Posted by Faeflora
(Post 699210)
OK hopefully this helps:
Make an alias/shortcut/symlink to ttermpro.exe and call it telnet.exe Save it in the tterm directory Right click on my computer/properties/environment variables/path and add the tterm folder to the path (seperate with semicolon) Then kill and restart explorer Then do winkey/R and type telnet and the flags: Command line (shortcut link) format TTERMPRO (replace with telnet) [<host>[[:]<TCP port#>]] [/B] [/C=<serial port#>] [/F=<setup file>] [/FD=<file transfer directory>] [/H] [/I] [/K=<keyboard setup file>] [/KR=<kanji code (receive)>] [/KT=<kanji code (transmit)>] [/L=<log file>] [/LA=<language>] [/M=<macro file>] [/P=<TCP port#>] [/R=<replay file>] [/T=<telnet flag>] [/V] [/W="<window title>"] [/X=<window pos (x)] [/Y=<window pos (y)] [;<comment>] :) In short tterm can be initiated from windows run or cli and open a session with a port. Start-> Control Panel->Programs & Features-> Turn Windows Components On/Off -> Enable telnet LIKE A BOSS. Why Microsoft didn't make this a default is beyond me. |
Jeff is the man.
|
All times are GMT -4. The time now is 11:02 AM. |
© 2024 MH Sub I, LLC dba Internet Brands