[GET] Powerful anti-domain weapon ;) - I am *NOT* responsible for how you use this

Apr 1, 2012
202
7
0
:xmas-smiley-016: Something very naughty for the truly wiicked:
Code:
http://www.2shared.com/file/2XBBjElI/junkshitcomplainers.html

This right here is a list of 90k unique domains that harbor *SUPER* loud complainers to be used in conjunction with scrapebox. Blast out links and your efforts will most certainly have a negative effect on a domain's rankings.

The main reason isn't so much that you're building porn/abuse backlinks, but the domain being blasted will pop up in virtually every spam blacklist agency including email monitoring services from here to Timbuktu. Not to mention a plethora of other stop-forum-spam lists. They'll face a number of complaints, real live people calling and emailing, talking tons of shit and harassing hosting services, etc.... I use this list to completely wipe a site off google + any decent search engine. It can pretty much destroy anything up to a pr 3 (especially effective if you know how to spoof ips to make it look like the website is blasting out links) if you hit them up several times with very annoying and aggressive messages.

Oh and you'll probably lose your vps in the process if you're not bulletproof. Enjoy!

Oh and if you truly have a bone to pick, use the list to harvest even more urls within each domain. You'll end up with a truly huge and poisonous list. Nothing screams "rape me" like a spam bot posting on every single blog page of a government website.
 


Interested in this spoofing IPs thing. Can you hit me up with some more info?

When doing this, would you use negative anchor texts or target the website's real keywords?
 
Interested in this spoofing IPs thing. Can you hit me up with some more info?

When doing this, would you use negative anchor texts or target the website's real keywords?

Yeah, you can't spoof a tcp connection. It's impossible and he's full of shit.
 
  • Like
Reactions: Tro Shi
Yeah, you can't spoof a tcp connection. It's impossible and he's full of shit.

God you're fucking retarded. This isn't ddosing dumbass, it's spoofing ips on blog comments so that you don't completely rape your own ips and make it look like the website is spamming. It's as old as the hills and this is literally what transparent proxies do.

Tro, just change the user agent x-forwarded-for and x-real-ip. easiest way to do it is with an iframe. for sb purposes though, you'll need to create/buy a firewall that handles that for you. This won't work for all websites but most un-savvy webmasters won't detect it unless they have ROOT access to the server that they're hosted on.

It's actually very very easy and slimy.
 
  • Like
Reactions: Tro Shi
Interested in this spoofing IPs thing. Can you hit me up with some more info?

When doing this, would you use negative anchor texts or target the website's real keywords?

Negative anchor texts. Without really going into the details, you can make them look compromised. Can't discuss this publicly.
 
God you're fucking retarded. This isn't ddosing dumbass, it's spoofing ips on blog comments so that you don't completely rape your own ips and make it look like the website is spamming. It's as old as the hills and this is literally what transparent proxies do.

rofl I'm the retard. You don't even know what spoofing an ip is. Go back to being a bad troll. That's not what a transparent proxy does. A proxy servers does 0 spoofing.

Spoofing an IP is when you change the IP in the IP header part of a TCP/UDP/wtf ever packet. What you're talking about is called "using a proxy".
 
Rofl, crackpot i realize you're kind of pissed off that I'm way more aggressive, intelligent and knowledgeable than you are concerning computer networks, but it's no reason to keep spouting bullshit from your stupid mouth. It just makes you look dumber.

If you had half a brain, you'd realize I was implying that transparent proxies use a SIMILAR concept to silently pass along the real ip address, whereas anonymous and elite proxies strip this from the user agent information. I know exactly what proxy servers do, I didn't say they SPOOF ips. Learn to read, or better yet just kill yourself.
 
Spoofing an IP is when you change the IP in the IP header part of a TCP/UDP/wtf ever packet. What you're talking about is called "using a proxy".

Hahah, oh my goodness. You really don't know your asshole from a keyboard, do you? Spoofing is a very general term used when you intentionally attempt to mislead a server by passing along incorrect IP information. This covers proxies and a wide range of other things.

Nowhere will you see any security expert say it's limited to exclusively UDP/TCP packets. Ever. And for the record, you can "spoof" those too, and not in the way you're thinking about (you actually don't even know what I'm referring to, and kids shouldn't play with dangerous toys, so back the fuck up).
 
rofl I'm the retard. You don't even know what spoofing an ip is. Go back to being a bad troll. That's not what a transparent proxy does. A proxy servers does 0 spoofing.

Spoofing an IP is when you change the IP in the IP header part of a TCP/UDP/wtf ever packet. What you're talking about is called "using a proxy".

That may kinda work for individual packets, but for something like comment spam, you're not going to get any kind of tcp connection. That kinda stuff hasn't been possible since they patched a bunch of bind bugs long long ago.
 
Yeah, you can't spoof a tcp connection. It's impossible and he's full of shit.

Technically, you are wrong. It is however extremely unlikely that you'd get all the sequence numbers right, and you'd have to know what the expected response is going to be. Though, depending on the stack, you could ack a packet sequence anyway.

Spoofing an encrypted handshake connection on the other hand, now that is statistically impossible.

Though, if you controlled an upstream router of your victim, you could man in the middle a spoofed TCP connection rather easily, even an encrypted handshake.