STILL UNDER CONSTUCTION HIGH-TECH STALKING #2

1509379245
1509289243
1509289259
1509289228

 A SHORT GUIDE TO PROTECTING YOURSELF FROM TECHNO WITCHCRAFT AND CYBER TORTURE ON PUBLIC  WIFI SITES:


( I just spent two hours editing, rewriting the copy at Pizza My Heart where I use WiFi. I spent 4 hours on it. It just disappeared off the screen and I got a message on my computer to cancel my website account. The UCSC " Slugs" party people in the room party people just claimed responsibility for blocking the truth once again by remotely deleting my file and blaming it on a man named Tim May. I worked on this article using an internal word processor as a test. These sadistic and satanic little twenty year old drug dealer, prostitution, porno punks are getting off on it.)


Here is some basic advise. Protect your identity and sensitive information by  being invisible on any public WiFi network. Use Private Wifi when ever possible. Make every effort to protect your personal information. Once fools like this get into your life, they'll always be trying to exploit you.  Cut your mobile data usage as much as possible.


It's scary how many tools are available that hackers can use to access your private computer and cell phone communication in WiFi hotspots. 


Here are a few of the most well-known WiFi hacking tools, keep in mind, the are thousands of more. Drug dealers, pornographers, prostitutes the other side line profit centers for the hackers community  can utilize more than 100,000 videos on WiFi hacking, some with millions and millions of views on Youtube. There are many other hacking websites out there, Multi millions of copies of these programs are downloaded on the internet on an annual basis. Multi millions of copies of these programs are downloaded on the internet on an annual basis.


Hackers are criminal scumbags and are generally involved in other criminal parasites, it a little comforting to. know the malware installed on there own sites infects other hackers all over the.world. Everything that happens in the hackers world is selfish, cruel, and a huge risk to all of us, these are not nice people these are nasty criminals driven by greed and lust for power. These are not heroes, and virtuous people. These are unethical, moral less little punks and parasites trying to live off of good people like me. They hate Christians ,  Jews,  Buddhists  with a passion. The represent both the anti corporation and the anti Christ.


Here are just a few of the  tools that the party people use to do party favours in the SF Bay Area invade. They invade and exploit anyone they perceive in there sociopathic, paranoid world to be counter to the agenda of the party witches basically the agenda of the coca pot cartel. 


Here  are just a few examples of techno witchcraft magic utilized by UCSC " slugs" Once again sexual bribery is implied and offered in lew of rebuilding two hours of difficult work an hour hacked and ruined one hour before Pizza My Heart closes. This is Tom at the Mission Inn Style, Manfree at Lulu Carpenters, , David at Chocolate, style cons, ( incidentally the digital music Im listening to just had the statement " your right " added to the U2 song Im listening to silicon valley vodoo do do) The mexican Pizza cooks and the UCSC party people say " our people are experts at it, we control the internet, the mexicans, the kids control the internet" your old go home, that won't be there in the morning, well change all that,. This version of the copy is not as good as the first and remembering it from the earlier hacked and deleted version is made more difficult that part of the hacking, social engineering con too. This is what Shaun Stephenie, Andreous, Coonerty, etal at Next Space are all about: modern social engineering


The internet is full of inexpensive ready to use  hardware wireless hacking tools for wifi. People are making billions of dollars off of supplying and teaching your children and grand parents to be devious criminals everyday. Here are a few examples:  


A WiFi Pineapple is  a simple, small, portable device used in  any hotspot to attract any laptop trying to find a WiFi  access point. The Pineapple is an Evil Twin attack. Tools like KARMA( see more on this later) have been used  to do the same thing for years. Pineapple, costs $100  and allows your twelve year old or your next door neighbors grandma to become a hacker without downloading or installing any software. The website says: "Of course all of the Internet traffic flowing through the pineapple such as e-mail, instant messages and browser sessions are easily viewed or even modified by the pineapple holder."


Here are a small example of other wifi hacker 

tools there are hundreds of thousands of commercial and underground hardware and software to facilitates the theft of your data, identity, and life while slowly murdering you a little bit at a time every day by the systematic application of stressors. 

Make no mistake hackers are perverts, sadists, and satanic by definition. These are the same people who commit acts of bioterrorism all over the bay area and in your town and city two and there ranks are growing.


Aircrack-ng: This suite of tools includes 802.11 WEP and WPA-PSK key cracking pr  ( my computer just jammed right here to screw up the copy) programs. Wireless packets and recover keys are acfessed  once enough information been captured. Aircrack-ng supports newer techniques that make WEP cracking much faster. 


Airjack: An 802.11 packet injection tool Airjack is used as a development tool to capture and inject or replay packets. It is used to inject forged deauthentication packets. A technique used in many denial-of-service and Man-in-the-Middle attacks havoc on the connections between wireless clients and access points. Injecting deauthentication packets into a network wreaks havoc on the connections between wireless clients and access points.


AirSnort is wireless LAN (CLAN) tool which recovers WEP encryption keys.  Passively monitoring transmissions and gathering packets facilitates  computing the encryption key. Data sent over the network can then be decrypted into plain text using the cracked WEP key.


Cain & Able: A multi-purpose tool that  intercepts network traffic, using information contained in packets to crack encrypted passwords using dictionary, brute-force and cryptanalysis attack methods. It  records VoIP conversations, recovers wireless network keys, and analyzes routing protocols. Its purpose is the  recovery of 

passwords and credentials. 


CommView for WiFi:Designed for capturing and analyzing wifi network packets.It uses a wireless adapter to capture, decode, and analyze packets sent over a single channel. Hackers can view network connections and vital IP statistics while examining  individual packets.


Elcomsoft -Wireless Security Auditor: An all-in-one cracking solution automatically locates wireless networks, intercepts data packets, and uses cryptanalysis techniques to crack WPA/WPA2 PSKs.Wireless networks, are displayed and identified by channel number, AP MAC address, SSID, speed, load, and encryption parameters. ElcomSoft is used by professional  wireless security auditors.


Ettercap: Ettercap uses  man-in-the-middle attacks, sniff live connections, and filter intercepted packets on the fly. It includes many features for network and host analysis. 


Firesheep: A Firefox browser plug in that allows the capture SSL session cookies sent over any unencrypted network. To  use them to steal  owner’s identities. Websites protect user passwords by encrypting the initial login with SSL, but then never encrypt anything else sent after login, which leaves the cookie (and the user) vulnerable to "sidejacking." When a hacker uses Firesheep to grab these cookies, he may then use the SSL-authenticated session to access the user’s account.


Hotspotter: Like KARMA, Hotspotter is a wireless attack tool that mimics any access point being searched for by nearby clients, and then dupes users into connecting to it instead.


IKECrack: This is an open source IPsec VPN authentication cracking tool which uses brute force attack methods to analyze captured Internet Key Exchange (IKE) packets to find valid VPN user identity and secret key combinations. Cracked,  credentials can be used to gain unauthorized access to an IPsec VPN.


KARMA: This evil twin attack listens to nearby wireless clients to determine the name of the network they are searching for and then pretends to be that access point. Once a victim connects to a KARMA evil twin, this tool can be used to redirect web, FTP, and email requests to phone sites in order to steal logins and passwords.


Kismet: Is an intrusion detection approach to wireless security. It is used to detect and analyze access points within radio range of the computer on which it is installed. This software reports SSIDs (Service Set Identifiers – used to distinguish one wireless network from another) advertised by nearby access points, whether or not the access point is using WEP, and the range of IP addresses being used by connected clients.


NetStumbler: Any WiFi-enabled Windows laptop into an 802.11 network detector. NetStumbler is a "war driving" program. It can be used with other attack tools to find a$2nd hack wifi networks.


WireShark-Freeware LAN analyzer that can be used to passively capture 802.11 packets being transmitted over a wifi  network. 


Fortunately, there are resources that you can use to help combat these threats. Here are two books that can help.


Hacking Exposed: Network Security Secrets & Solutions, by Joel Scambray.

WiFoo: The Secrets of Wireless Hacking, by A. Vladimirov, K. Gavrilenko, and A. Mikhailovsky.


Linux-based operating systems use to be used by academia, the government, the military, and corporate america, now it has been subverted to create open source penetration test tools from which to launch an overwhelming variety of attacks.


Here are just a few of the tools that the party people use to do party favours in the SF Bay Area invade. They invade and exploit anyone they perceive in there sociopathic, paranoid world to be counter to the agenda of the party witches basically the agenda of the coca pot cartel. 


WiFi net users beware this is just the tip of the pyramid of what is available too fools to be used to destroy your life, liberty, and pursuit of happiness in America today.


The following list includes common WiFi terms.  For additional terms and definitions, please see the link for an online glossary.


Encryption -  is the translation of data into a secret code. To read encrypted data, you must have access to the secret key or password that was used to translate the data into cipher text. That same key or password enables you to decrypt cipher text back into the original plain text. Encryption is the most effective way to achieve data security, but depends on using keys known only by the sender and intended recipient. If a hacker can guess (crack) the key, data security is compromised.


Evil Twin- WiFi access points that appears to be a legitimate can be set up by a hacker to intercept wireless communications.  A hacker fools wireless users into connecting their laptop or mobile phone by posing as a legitimate access point (such as a hotspot provider). When a victim connects to the Evil Twin, the hacker  listens in on all Internet traffic, or ask for credit card or personal information in what appears to be a standard pay-for-access deal. . One recent study found that over 56% of laptops were broadcasting the name of their trusted WiFi networks, and that 34% of them were willing to connect to highly insecure WiFi networks.


HTTPS-Hypertext Transfer Protocol Secure (HTTPS) combines the Hypertext Transfer Protocol used by browsers and websites with the SSL/TLS protocol used to provide encrypted communication and web server authentication. HTTPS connections are often used to protect payment transactions on the Internet so that anyone that might intercept those packets cannot decipher sensitive information contained therein.


Man in the Middle- Cyber attackers can make an independent connection to a communication source and destination and  then relay data and or messages between them, making victims believe that they are talking directly to each other, when in fact the entire conversation is being controlled and manipulated by cyber punks. It is Eavesdropping  on steroids. The attacker must be able to intercept all messages exchanged between the two victims WiFi access points that are not encrypted and are in range, are an easy target for these sociopaths to manipulate. All packets run through an Evil Twin.  


Phishing- website  pose as legitimate online banks, merchants, or services, conning victims into  sign on to a bogus server over a SSL connection Attackers then log onto the real server using victim-supplied ID, capturing all messages exchanged between the user and real server – for example, to steal credit card numbers.


Side Jacking- Cookies from a session on a website you accessed can be accessed by a hacker using packet sniffing. These cookies are generally sent back to browsers unencrypted, even if the original website log-in was protected via HTTPS. Cookies are stolen and then used to access your authenticated web session. The Firefox plug-in called Fire sheep that makes it easy for an intruder sitting near you on an open network (like a public wifi hotspot) to sidejack many popular website sessions. Taking over your Facebook session, thereby gaining access to all of your sensitive data, and even send viral messages and wall posts to all of your friends.


Sniffers- The most basic and easiest type of wireless cyber attack. Hackers can remotely access all data sent from your laptop, smartphone and  web server on the Internet.  Any  data transfer, web search, or email, ,between computers or open from network locations on an unsecured wireless network can be exploited and  documented by a hacker using a sniffer. The web provides Sniffing tools for free to anyone, backed up by hundreds of instructional videos on youtube.  To  protect yourself against WiFi sniffing in most public WiFi hotspots  use a VPN to encrypt everything sent over the air. WEP and WPA are security protocols used to protect wireless networks. Wired Equivalent Privacy (WEP) is a deprecated security protocol for IEEE 802.11 wireless networks. Because all wireless transmissions are susceptible to eavesdropping, WEP was introduced as part of the original 802.11 standard in 1997. It was intended to provide confidentiality comparable to that of a traditional wired network.


Since 2001, several serious weaknesses in the protocol have been identified so that today a WEP connection can be cracked within minutes. In response to these vulnerabilities, in 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). Wi-Fi Protected Access versions 1 and 2 (WPA and WPA2) refer to certification programs that test WiFi product support for newer IEEE 802.11i standard security protocols that encrypt data sent over the air, from WiFi user to WiFi router.


Hotspotter: Like KARMA, Hotspotter is another wireless attack tool that mimics any access point being searched for by nearby clients, and then dupes users into connecting to it instead.

IKECrack: This is an open source IPsec VPN authentication cracking tool which uses brute force attack methods to analyze captured Internet Key Exchange (IKE) packets to find valid VPN user identity and secret key combinations. Once cracked, these credentials can be used to gain unauthorized access to an IPsec VPN.


WiFi net users beware this is just the tip of the pyramide of what is available too fools to be used to destroy your life, liberty, and pursuit of happiness in America today.



- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 -