Subj : RE: Urban Exploration To : warmfuzzy From : debianz Date : Sun Nov 10 2024 14:29:35 wa> launch attacks on various targets. If the attack is back-traced The wa> Man would only find an abandoned building and still would be unlikely wa> to find the hacker nest. Depends on the opsec of the hacker involved. C2 servers require power and internet connection to run. If the hacker is smart, power and internet will not have their actual name and address listed. Internet will be obfuscated so backtracing the IP isn't as easy to do, all files, data and comms will be encrypted and metadata scrubbed. This would be a more ideal set up for a C2 server. But you've got to think about that too. How will you set up power? How will you set up internet? You need to gain power and internet in a way that is unnoticeable (as much as possible anyways) and does not require identification. wa> Some hackers think that the law will wa> never come knocking on their door, but if they do, and you get a These hackers soon find out very quickly what happens with that lack of opsec wa> criminal record, for just having fun, you will be in a really bad spot wa> legally. It is difficult to find employers who will hire you if you wa> have a criminal record. So this is sort of a balance: is the fun worth wa> the possibility of a criminal record? Maybe there are more safe ways to If you do plan on doing something like this (which I do not recommend for aforementioned legal reasons), then you need to do some deep research into this, especially into those who were arrested. -Debianz .... The Law of Maximum Inconvenience is always operational. --- Mystic BBS v1.12 A49 2024/05/29 (Linux/64) * Origin: 2o fOr beeRS bbS >> 20ForBeers.com:1337 (700:100/71) .