Monday, February 20, 2012

HOW TO MANUAL - THE END OF DELETERS



"- - = W A R E Z P I R A T E Z = - -
HOW TO MANUAL - THE END OF DELETERS
===================================
CREATED BY: [Piratez] 04/11/01

TABLE OF CONTENTS
=================

Title Line

1. Introduction_______________________________________________________23
2. Invisible Directories______________________________________________36
3. Inaccessable Directories___________________________________________83
4. Smart Directories__________________________________________________135
5. Undeletable Files__________________________________________________168
6. Ultimate Protection________________________________________________199
7. FAQ________________________________________________________________228
8. Contacts___________________________________________________________250
9. Credits____________________________________________________________256


Introduction
============

This doucmentation should not be used to exploit webservers. Some of the
techniques used here have certain outputs that can crash old servers making
them unusable. Throughout this manual, techniques will be passed on from
exploits found in the 'windows' OS. That 'ACTUALLY' helps in the prevention
of deletion. There are lots of methods in stopping a deleter, without the
ANY restrictions set on the server but most have some weak point. After
comming across foure new techniques, making a folder 'invisible' or
undetectable from an ftp client LIST fuction. Making folders/directories
inaccessable and clone prevention, creating smart directories which slows
down the users attempt. I'm sure most users would thank me for this,
'undeletable files'. After experiencing rock solid protection and safe
files. I decided to document it for future reference of the next generation
of software pirates.


Invisible Directories
=====================

The idea of invisiable directoires came about when I came across paths that
were "/ /example/" and was not listed in the main folder but was still
'accessable'. These can be created in all directories without other users
knowing it exists unless being searched for 'MANUALLY', which takes ages at
the present time to search through each folder for "/ /".

Creating Invisible Directories
------------------------------
1. before
******************************************************************
./pub/
./images/
./_vti_pvt/
./_vti_cnf/
./_vti_log/
./temp/
******************************************************************

2. after
******************************************************************
./ /~/temp/tagged/for/team/warezpiratez/fxp/ <- hidden folder
./pub/
./images/
./_vti_pvt/
./_vti_cnf/
./_vti_log/
./temp/
******************************************************************

To create the hidden folders, make a new dir. as follows using this method.
[backslash][space][backslash][foldername1][backslash][foldername2]...
ie. / /foldername1/foldername2/...
the 'space' isn't a name but a 'character' that does not get listed,
therefore making the directories impossible to view.

NOTE: Making the hidden folders several LAYERS/SUB-DIRECTORIES deep is
recommended.
ie. / / / /~/temp/tagged/for/ /team/warez/ /piratez/fxp/
meaning.

This technique is not 'anti-deletion proof' but hidden from deletion proof!
Wink
Read more to find out how to combine ALL THREE TECHNIQUE to make it
'REMOTELY' impossible to delete. Please note the 'quotes', REMOTELY in a
sense that remote/local host. The 'siteadmin' can still 'delete' the folder
"if he's around that is Smile"


Inaccessable Directories
========================

Inaccessable directories prevents the user from 'entering' the folder
period. The user will not be able to enter the folders unless knowing the
'entire' remote path.

Creating Inaccessable Directories
----------------------------------

1. before
****************************************************************************
**********************************
./temp/tagged/for/team/warezpiratez/fxp/
./pub/
./images/
./_vti_pvt/
./_vti_cnf/
./_vti_log/
./temp/
****************************************************************************
**********************************

2. after
****************************************************************************
**********************************
./COM1 / temp/tagged/for/team/warezpiratez/fxp/ <- inaccessable directories,
due to 'COM1' former windows bug.
./pub/
./images/
./_vti_pvt/
./_vti_cnf/
./_vti_log/
./temp/
****************************************************************************
**********************************
To create inaccessable folders, use the following list of 'UNUSABLE NAMES'

COM1 COM1 COM3 COM4 (Windows COM PORTS)
LPT1 LPT2 LPT3 LPT4 (Windows Printer Ports)
AUX
NUL

Make a new folder "COM1[space][backslash][space][backslash]
ie. /COM1 / /

NOTE: This makes the folder inaccessable, even to the siteadmin.(unless
accessed from DOS, local with access to the machine.)

To use the dir. Create a new folder called
"COM1[space][backslash][space][foldername1][backslash][foldername2]
ie. /COM1 / / ~/temp/tagged/

NOTE: This folder is still inaccessable, if a user attempts to enter it. To
gain access to the folder, the 'full path' must be known. To enter the
folder use the RAW command 'CWD' change dir. path. to enter the folder.
ie. CWD /COM1 / / ~/temp/tagged/ and voila the folder is usable and working.

TIP: Creating the folder 'several' LAYERS/SUB-DRIECTORIES deep. It is
impossible to enter.


Smart Directories
=================

This technique involves, the creation of directories that are 'COPYRIGHT' Wink
How's that for a simple description. The idea is to create directories that
would contain [peroids] thorough each of the subdirectories or segmenets.
The use of this is quite sipmle, note the word 'COPY'RIGHT. Most users use
the ftp://login :password at ip :port/path/ format for faster access to an ftp.


Creating Smart Directories
--------------------------
To create 'smart' directories. Make the folder names of each sub directories
contain a period before, inside, and after words within the subdirectories
creating a fake 'file' recognition. The Widows based clients will assume the
folders to be files with windows using its 8.3 format for file names
1. before
****************************************************************************
**********************************
ftp://anonymous@anonymous@123.456.789:21/temp/tagged/for/team/warezpiratez/f
xp/
****************************************************************************
**********************************

2. after
****************************************************************************
**********************************
ftp://anonymous@anonymous@123.456.789:21/temp/tagged ./for . /team. /. warez
.piratez/fxp
****************************************************************************
**********************************

NOTE: Be as creative as possible with the dot formation, to prevent COPYING
of all folders through each directories. The idea is to make the directories
act as file extensions therefore when copied, it will be 'queued'
and the user has to enter the directories MANUALLY. Other 'SYMBOLS' can be
used NOT ONLY just periods. But I find this most common, if the creator
intends to create a catch phrase 'memorable' to him alone.

****************************************************************************
**********************************
QUEUE: 1. /temp/tagged ./for . /team. /. warez .piratez/fxp <- result of
folder extensions
****************************************************************************
**********************************


Undeletable Files
=================

Sad that we had to resolve to this but, this might be the end of deletion as
we speak. I find no other method out there that can accomplish this task
except setting restrictions from the server. This method involves the file
being self-protected. Meaning the files are 'accessable'/'downloadable' but
can NOT be deleted. The idea is to make the file corrupted/crash making it
'in use'.

Creating Undeletable Files
--------------------------
To create a self protected file, rename the entire file including the
extensions to the follwoing format
filename[space][period]/[space]/ ie. filename ./ / The / / in the name as
shown above in the previous example
of creating invisible directories makes the .extesion impossible to view on
the pub as a windows recognized mime
but, once dowloaded it will be shown and accessable. How's that for wits.
Wise up deleters, ~censored~ off!

1. before
****************************************************************************
**********************************
warezpiratez.rar <- rar mime, winrar.
****************************************************************************
**********************************

2. renaming
****************************************************************************
**********************************
warezpiratez ./ /
****************************************************************************
**********************************

3.
****************************************************************************
**********************************
warezpiratez <- unknown file(undeletable,downloadable) <- file will take the
correct mime format on localhost
****************************************************************************
**********************************


Ultimate Protection
===================
The ultimate protection is OBVIOULY, YOUR SELF and YOUR wits against the
deleters. Use private FTPs, get
fast sites T1+, but in this case, it would be the combination of all four
techniques. Using them into one major and
thoughtout plan.

Creating The Ultimate Protection
--------------------------------

To create the ultimate protection that is desirable, first of all, create
the invisible folders as shown above, several sub.dirs deep. Then creating
an 'inaccesable' folder within those invisible folders. Then the next step
is to create those smart directories so it slows down ANY attempt to gain
full access, and also it makes to user run into inaccessable folders
because. The idea is to trap the user before those folders using the smart
directories idea. I didn't think that was ingenieus but just common sense
and seemd smart!.

1. before
****************************************************************************
**********************************
/temp/tagged/for/team/warezpiratez/fxp/ <- no protection
****************************************************************************
**********************************

2. after
****************************************************************************
**********************************
/ / /./ ./COM1 / temp/tagged ./for . /team. /. warez .piratez/fxp <-
protection(still weak)
****************************************************************************
**********************************

NOTE: You can be creative with this technique, make it more complex, I
didn't do it in this manual because then
that would make YOU just confused. I hope this helps, and please UNDERSTAND.
It is not hard, unless YOU didn't read
from the Introduction. I made this well detailed. For it to be as simple as
possible.

FAQ
===

1. What is a SUB-DIRECTORY
- It is the folder that is second/inside another folder. ie.
firstfolder/subdir/

2. What is a pub
- Short for public ftp. There are, no restrictions/protection on the access
over files. Some
have them in most cases but then uploads/downloads are denied. Some would
not allow fxp.

4. What does all this mean?
- Good question, this means that there should be more warez around in the
future. More gamez for YOU, more appz
for me. Wink You too.

5. Who are deleters?
- Deleters are mean and NASTY people, shit faces. There spammers and lame
sometimes ANTI-PIRACY groups that hang
among us, without knowing. Deleting files when possible to stop the warez
scene or just being GAY!

6. What can I do to help?
- You can help the WAREZ scene, getting this manual to them informing them
of HOPE! and not DOH!PE


Contacts
========

[Piratez] - EFnet IRC


Credits
========

This manual was inspired from the makers of other how to stop the deleter
manuals but never worked or at least it was not doucmented in detail to
understand much. The information was gathered from other sources that had
some lines of credit others none. All samples and examples are original,
well planned out. Unless a flaw is dettected, please report for another
release. I REALLY hate deleting bitches. Thanks goes to #NBK(EFnet IRC) and
other linux members for bug fixing windows and its exploit to help stop
spammers/deleters around the world. Your skills are HIGHLY admired and
apprechiated. Keep the warez scene alive. Greets goes out the the deleters,
with one last request. DELETE ME NOW BITCH!


THE END

0 comments:

Post a Comment