PoS is being investigated by FBI and CISA. How long do I have?
by viceCoolMan - Monday October 28, 2024 at 04:40 AM
#1
Hello, hey, how's it going?


Context:

         I quit my shit job while thinking I wasn't good enough to get into the field I wanted, so why even try. I wanted to test my skills to see if I was even good enough to compete with anyone else trying to get the same entry-level job. I started thinking of hard things to hack and landed on US critical infrastructure. While looking for specific things, I landed on The Port of Seattle. Within 5 days of quitting my minimum wage, customer-jerking, shit job, I'd gained "nt authority system" access on their meetings portal. I maintained persistence for a month, but one day, while trying to access my backdoor, the site was offline. A ransomware group hit SEA-TAC International, and PoS responded by taking everything offline. Eventually, my backdoor came back online, and I thought they'd eventually find it. So, on September 2, 2024, I made my own ransomware and launched it. I posted the two hacks along with the site defacement on my account if you want to validate this.

Currently:

As I become increasingly paranoid and research possible agencies investigating the hack I did on September 2 and September 8, I can't help but think my time is short. Along with investigating SEA-TAC International, the FBI and probably CISA, will most likely investigate my hack on the PoS Meetings Portal. In a public meeting, they mentioned they couldn't do something related to the current meeting because of the meeting's page outage. I used Tor most of the time and even coded my RCE script to only work over Tor. However, when they brought the site back up, I think on the 6th and I hacked into the new server, but I was so excited and rushing, that uploaded the shell over my VPN instead of Tor. I checked the VPN privacy policies, and I think I'm good. But I can't help but think they're going to find me, either soon or in a few years when they have enough evidence. What do you think?
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Self-Ban | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply
#2
From "quitting a shit job because you think you weren't good enough to hacking Port of Seattle with a backdoor to creating and launching your own ransomware" all this in just a few days? Dude you are a fucking monster. FBI will come for you if they found something remotely worth dragging your ass Tongue
Reply
#3
(10-28-2024, 04:40 AM)viceCoolMan Wrote: Hello, hey, how's it going?


Context:

         I quit my shit job while thinking I wasn't good enough to get into the field I wanted, so why even try. I wanted to test my skills to see if I was even good enough to compete with anyone else trying to get the same entry-level job. I started thinking of hard things to hack and landed on US critical infrastructure. While looking for specific things, I landed on The Port of Seattle. Within 5 days of quitting my minimum wage, customer-jerking, shit job, I'd gained "nt authority system" access on their meetings portal. I maintained persistence for a month, but one day, while trying to access my backdoor, the site was offline. A ransomware group hit SEA-TAC International, and PoS responded by taking everything offline. Eventually, my backdoor came back online, and I thought they'd eventually find it. So, on September 2, 2024, I made my own ransomware and launched it. I posted the two hacks along with the site defacement on my account if you want to validate this.

Currently:

As I become increasingly paranoid and research possible agencies investigating the hack I did on September 2 and September 8, I can't help but think my time is short. Along with investigating SEA-TAC International, the FBI and probably CISA, will most likely investigate my hack on the PoS Meetings Portal. In a public meeting, they mentioned they couldn't do something related to the current meeting because of the meeting's page outage. I used Tor most of the time and even coded my RCE script to only work over Tor. However, when they brought the site back up, I think on the 6th and I hacked into the new server, but I was so excited and rushing, that uploaded the shell over my VPN instead of Tor. I checked the VPN privacy policies, and I think I'm good. But I can't help but think they're going to find me, either soon or in a few years when they have enough evidence. What do you think?

your freedom is only guaranteed by some shit-tier VPN company that most likely lied in their privacy policy eheheheheheh
deserved for trying to go into whitehat fuckery
Reply
#4
(10-28-2024, 09:19 PM)chanvria Wrote: your freedom is only guaranteed by some shit-tier VPN company that most likely lied in their privacy policy eheheheheheh
deserved for trying to go into whitehat fuckery

Disable autoconnect
Forget all cached Wi-Fi passwords
Spoof MAC address
Connect to far away wifi network (crack some nearby ones beforehand)

A VPN is not everything
Reply
#5
(10-28-2024, 04:40 AM)viceCoolMan Wrote: Hello, hey, how's it going?


Context:

         I quit my shit job while thinking I wasn't good enough to get into the field I wanted, so why even try. I wanted to test my skills to see if I was even good enough to compete with anyone else trying to get the same entry-level job. I started thinking of hard things to hack and landed on US critical infrastructure. While looking for specific things, I landed on The Port of Seattle. Within 5 days of quitting my minimum wage, customer-jerking, shit job, I'd gained "nt authority system" access on their meetings portal. I maintained persistence for a month, but one day, while trying to access my backdoor, the site was offline. A ransomware group hit SEA-TAC International, and PoS responded by taking everything offline. Eventually, my backdoor came back online, and I thought they'd eventually find it. So, on September 2, 2024, I made my own ransomware and launched it. I posted the two hacks along with the site defacement on my account if you want to validate this.

Currently:

As I become increasingly paranoid and research possible agencies investigating the hack I did on September 2 and September 8, I can't help but think my time is short. Along with investigating SEA-TAC International, the FBI and probably CISA, will most likely investigate my hack on the PoS Meetings Portal. In a public meeting, they mentioned they couldn't do something related to the current meeting because of the meeting's page outage. I used Tor most of the time and even coded my RCE script to only work over Tor. However, when they brought the site back up, I think on the 6th and I hacked into the new server, but I was so excited and rushing, that uploaded the shell over my VPN instead of Tor. I checked the VPN privacy policies, and I think I'm good. But I can't help but think they're going to find me, either soon or in a few years when they have enough evidence. What do you think?

hide if you get caught FBI will shoot you two 556 in chest and one at head everybody is hacker man until the FBI is knocking
Reply
#6
(10-28-2024, 04:40 AM)viceCoolMan Wrote: Context:
I started thinking of hard things to hack and landed on US critical infrastructure.

Translates to: I quit my job and decided to spend the rest of my life staring at a prison wall
Reply
#7
Why dont you get of out there first ? What are you waiting for ? Huh
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  U.S. Sanctions on Latin American Countries – What Are the Long-Term Effects? jodjahsjdhak 2 107 4 hours ago
Last Post: Croxx_69
  How Long Does It Take Hackers to Crack Modern Hashing Algorithms? kikinijuan 0 348 01-29-2025, 12:41 AM
Last Post: kikinijuan
  How Would Russia Likely React if Ukraine Attacked Moscow with U.S.-Provided Long-Rang levi12 10 930 11-25-2024, 07:56 AM
Last Post: sandi24
  House Homeland Security leaders seek briefing on Salt Typhoon attacks from FBI, CISA icesig 0 523 10-28-2024, 03:40 PM
Last Post: icesig
  CISA Issues Emergency Directive After Midnight Blizzard Microsoft Hits FeldsteinIsip 0 335 04-15-2024, 05:11 AM
Last Post: FeldsteinIsip

Forum Jump:


 Users browsing this thread: 1 Guest(s)